In June of 2016, Linux market share on the desktop according to their statistics hit over 2% for the first time. People were sceptical, but it seems it has mostly stayed above that 2% mark. In May of this year it did dip down to 1.99%, but as of July it recorded the highest yet at 2.53%.
The world of Linux is ready to welcome you, with a shower of free open-source software you can use on any PC: hundreds of active Linux distributions, and dozens of different desktop environments you could run on them. It’s a far cry from the one-size-fits-all, this-is-just-what-comes-with-your-PC vision of Windows.
Everything from software installation to hardware drivers works differently on Linux, though, which can be daunting. Take heart—you don’t even need to install Linux on your PC to get started. Here’s everything you need to know.
When you have a machine with just BIOS (basic input-output system) on it, one way to load an Operating system is to use a bootable thumb drive, similar to the way you work with a laptop. However, installing OS on remote systems in data centers that are present in remote locations might not be feasible. Installing an operating system over the network directly to the computer’s hardware is known as bare metal provisioning.
A network boot screen in a network is similar to the one displayed below that shows up only when both the new gods and old gods are content to give us something known as Preboot Execution Environment (PXE).
If you’re looking into getting into Linux IT, I recommend you watch this video. Two IT industry vets discuss what got them into the field, early experiences and advice going forward.
It's been an interesting week for Linux storage with Red Hat deprecating Btrfs and Stratis being their next-gen Linux storage bet. Independent of that is now the announcement of NOVA, a new Linux file-system coming out of university research into file-systems for persistent memory.
NOVA is short for NOn-Volatile memory Accelerated file-system built for persistent memory. NOVA was developed at the beautiful University of California, San Diego.
The Linux Foundation’s Automotive Grade Linux (AGL) project released Unified Code Base (UCB) 4.0 (“Daring Dab”) for Linux-based in-vehicle infotainment (IVI) systems, and added seven new members. The open source group also launched a new virtualization working group that will enable new UCB profiles for telematics, instrument clusters, and head-up-displays (HUDs). In other Linux automotive news, Ubuntu has been spotted in an Uber self-driving car trial (see below).
The new AGL members bring the total membership to over 100. The newcomers are Brison, Karamba Security, Lear Corp., Luxoft, Thundersoft, SafeRide Cyber Security, and Wipro Ltd. The announcement follows an April expansion of six new members.
There were two announcements about Automotive Grade Linux (AGL). Karamba Security, a provider of cybersecurity solutions for connected and autonomous vehicles, today announced that it has joined the Automotive Grade Linux (AGL) Project and The Linux Foundation to help develop its cybersecurity best practices. AGL released the latest version of the AGL infotainment platform, Unified Code Base (UCB) 4.0, which includes support for SmartDeviceLink integration, Speech Recognition APIs, secure Over-the-Air Updates (SOTA) and improvements to the App Framework and Software Development Kit (SDK).
The Automotive Grade Linux has revealed it's going shopping for a hypervisor so that in-car computers can handle lots of different jobs.
Automotive Grade Linux on Wednesday released version 4.0 of the AGL infotainment platform and announced new projects to support telematics, instrument cluster, heads-up-display and a virtualization component.
The group also announced that seven new companies have joined AGL and The Linux Foundation. The addition of Brison, Karamba Security, Lear Corporation, Luxoft, Thundersoft, SafeRide Cyber Security and Wipro increases AGL's membership to more than 100 partners.
Epic Games has an interesting goal of eventually being able to use the Vulkan graphics API by default on Linux systems running the Unreal Engine.
Intel's Jordan Justen has added to Mesa's feature.txt the current Vulkan extensions as well as indicating the current state of each Mesa Vulkan driver regarding their support.
As most Phoronix readers should know, right now there is just the Intel "ANV" and (unofficial) Radeon "RADV" Vulkan drivers within the Mesa Git tree. And as frequent readers should know, most of the Vulkan extensions are implemented by both drivers.
Epic Games have done a talk at SIGGRAPH 2017 and it turns out they're looking to make Vulkan the default API for exported Linux games.
The Epic Games presentation starts from 1:18:45. If you listen at 1:21:55 it's mentioned a few seconds later that Vulkan will be made the default for Linux.
Serious Sam Fusion [Steam] is Croteam's Vulkan-powered game engine that covers many Serious Sam games and it seems they have some plans.
I just received the Ryzen 3 1200 and Ryzen 3 1300X yesterday, so have been rushing to get out these initial Linux figures for those curious how they compare to the many Windows results that came out last week. In this article are the initial Ryzen 3 Linux benchmark results compared to a variety of Intel and AMD CPUs on Ubuntu Linux. In the days ahead I intend to do several more Ryzen 3 powered articles including a fresh look at Mesa Git with KHR_no_error support enabled, an OpenGL vs. Vulkan comparison with these low-end CPUs, and possibly a fresh compiler comparison and more. If you have any other Linux test requests for Ryzen, feel free to let me know by commenting on this article in our forums.
This tutorial shows you what is an AppImage and how to use AppImage to install applications in Linux. In addition to that, it also tells you a few essential things that you should keep in mind while using AppImage.
TopIcons Plus is a GNOME extension that moves the tray icons (usually from the bottom left of the GNOME shell) to the top panel.
Groupware (also known as “Collaborative software”) is nothing but an app that helps users in everyday tasks such as calendar/scheduling, address books, email, forums, mailing lists, IM, wiki and more. The use of collaborative software in the work space creates a collaborative working environment. You can synchronize and share your files and photos easily using your hardware while maintaining privacy and security. Here is a list of 5 of them that you must know.
When it comes to backups, experience says it’s better to be safe than sorry. Better to have much than not enough – you get the point. In this article, we will present CloudBerry Backup for Linux, a cross-platform cloud backup and disaster recovery software.
Today marks the release of Gitano 1.1. Richard(s) and I have spent quite a lot of time and effort on this release, and there's plenty of good stuff in it. We also released new versions of Lace, Supple, Luxio, and Gall to go alongside it, with bugfixes and improvements.
The Wine development release 2.14 is now available.
Coming one day early off their bi-weekly Friday release cadence, the Wine 2.14 development release is now available.
Wine 2.14 features an updated Mono engine with various bug fixes, a C++ calling convention workaround in the IDL compiler, Z-order support for the Android graphics driver, and support for scalable mouse cursors on macOS.
I won't be giving it any real thoughts until release due to a review embargo, but they've specifically said livestreams and recorded content can be done without restriction, as long as it's not a review video. However, I'm just pleased that another decent looking strategy game will have day-1 Linux support. As you can see, it runs fine.
Dust: An Elysian Tail released for Linux a few years ago and now GOG finally have the Linux version available too.
Another bit of lovely DRM free GOG news for you! GOG just added the Linux version of the rather splendid and destruction-heavy Brigador: Up-Armored Edition.
When we posted the news about our tax wrangle yesterday, we did expect to make some waves. We didn’t expect the incredible response from all of you! A day later, over 500 awesome people have donated a total of €9562 (at the time of writing, check the fancy progress bar we’ve finally managed to create!). Fourteen people have joined the development fund, too! Thank you all!
I didn’t blog yet about my experience during this year’s Akedemy, the annual conference and gathering of the KDE community.
This time it was in Almería, Spain. The organizers made a wonderful work, and everything went perfectly good. The event was well covered locally, with at least three newspaper articles.
Packages updated for the live and minimal install environments
The Arch Linux developers have released the latest version of their popular rolling Linux distro in the form of Arch Linux 2017.08.01. The Antergos developers too have shipped Antergos 17.8 for the Linux beginners who wish to try out Arch Linux. Both these come with updated packages.
Cylon is a menu driven small shall script which basically gives you an idea to manage/maintain the Arch Linux and it’s derivatives by offering fourteen categories with variety of applications (hassle free application installation), which helps you to compete your day to day operation very smoothly.
The script provides updates, maintenance, backups and system checks utilities for an Arch based Linux distribution like Manjaro, Antergos, Chakra, etc.,.
These days when a new version of an operating system is released, there's usually not a lot of gee-whiz new whistles and bells to make the front office folks salivate -- especially if it's a point release. But there are still plenty of new features to make DevOps folks happy -- nuts and bolts stuff that makes everybody's life easier.
Director College Development Council Ashok Kumar Goyal and Director IT enabled services Prof. Sanjay Bhatnagar appreciating the initiative of Abhijeet Roy and Rani Patil from Red Hat, said that students can prepare for Red Hat certification exams with a wide range of high-quality content and live access to training systems from Red Hat.
Open source solutions firm Red Hat Inc has signed an agreement with the Telangana Academy for Skill and Knowledge (TASK) to offer Red Hat Academy training and certification programs to engineering students in the State. The TASK is set up by the State government to equip the youth with job-oriented skills.
We came with some topics we wanted to discuss in mind but no pre-made decisions (Ubuntu artful is just a transitioned Unity -> GNOME Shell environment at the moment) and we wanted to get things figured out at GUADEC, as a community. Talking extensively with the GNOME design team and key GNOME Shell & experience contributor (Allan, Florian, Jakub, Matthias) helped us figuring out where we should head down, with a common upstream agreement and understanding. We discussed what is great in the GNOME Shell experience, what we thought was good in the Unity one, how some notions may be desirable in the future, what we can port back to the upstream repositories and such.
New details about what the Ubuntu desktop will look like in Ubuntu 17.10 have surfaced — and there are some major changes ahead. Among them a change in the position of window controls (or window buttons, depending on your preferred parlance).
Ubuntu will begin shipping with the minimize, maximize, and close buttons on the right-hand side of windows in October, after a survey carried out last month showed that 53.8% of respondents saying they prefer them on the right. Ubuntu is making this change after 7 years of the controls being on the left. Thanks grtitan.
Following a survey carried out last month, Ubuntu will begin shipping with the minimise, maximise, and close buttons on the right-hand side of windows. In the survey 46.2% of people said they prefer their window controls on the left-hand side and 53.8% said they prefer them on the right.
Wayland WILL ship as the default display server in Ubuntu 17.10 'Artful Aardvark'. The confirmation comes by way of Canonical's Didier Roche.
Canonical's Didier Roche has confirmed that the Wayland display server will be used by default in Ubuntu 17.10. The older Xorg will still be available on all installs if you need to fall back but it'll no longer be the default option. Canonical hopes that this will give people enough time to test Wayland for lingering bugs before the rollout of the long term support release, Ubuntu 18.04, in April 2018.
There has been some mixed messages by Ubuntu developers in recent weeks about the default GNOME Shell session planned for Ubuntu 17.10 and whether Wayland would be used. The latest is that Wayland-by-default is still on.
Fresh from GUADEC, Canonical employee Didier Roche blogged today about his experience at the annual GNOME conference.
Did the chair work with Ubuntu? Darn tooting! As well it should have, since the guy I bought it from was running Debian on his too-cool transparent computer, and Ubuntu’s a Debian derivative. I later checked Mint, Fedora, and SUSE. All good. Windows, even. No kidding. Sometimes you hold your breath when you buy something new and crank up Windows (Windows 10 in this case) because… well… you know how Windows can be.
The Ubuntu team is pleased to announce the release of Ubuntu 16.04.3 LTS (Long-Term Support) for its Desktop, Server, and Cloud products, as well as other flavours of Ubuntu with long-term support.
Like previous LTS series', 16.04.3 includes hardware enablement stacks for use on newer hardware. This support is offered on all architectures except for 32-bit powerpc, and is installed by default when using one of the desktop images. Ubuntu Server defaults to installing the GA kernel, however you may select the HWE kernel from the installer bootloader.
As usual, this point release includes many updates, and updated installation media has been provided so that fewer updates will need to be downloaded after installation. These include security updates and corrections for other high-impact bugs, with a focus on maintaining stability and compatibility with Ubuntu 16.04 LTS.
Officially out today is Ubuntu 16.04.3 as the newest point release for this Ubuntu Long Term Support (LTS) release.
As is tradition for Ubuntu LTS releases, 16.04.3 features a new "hardware enablement stack", which is basically pulling in the newer Linux kernel, Mesa, and other components from Ubuntu 17.04. This means Ubuntu 16.04 is now onto the Linux 4.10 kernel and Mesa 17.0! A nice upgrade for those sticking to Ubuntu LTS releases rather than riding each six month release cycle.
Thanks to all the hard work from our contributors, we are pleased to announce that Lubuntu 16.04.3 LTS has been released!
It has been quite a while since we had a stable release, with the previous release being a minor inside the 2.24 series. The delays have been mainly due to edge cases we’ve found in the reverts of such updates into previous releases of the core snap. We take that sort of regression very seriously because some of our systems are entirely based on snaps, and we can’t afford to have a release that cannot be reverted if issues are detected in the wild.
Gumstix has added LoRa add-ons to its Geppetto board design service that work with a RisingRF LoRa module, and launched Overo, Pi, and Arduino LoRa boards.
Many were confused earlier in July when Red, makers of ultra high-end 4K and 8K cameras for Hollywood, announced it was making an Android smartphone.
Dubbed Red Hydrogen, the phone's substantial $1,595 price tag was accompanied by all manner of lofty promises about shattering "the mould of conventional thinking" and "nanotechnology." The phone supposedly had a "holographic" display, too.
I still have an evaluation Moto Z Force Droid from Verizon that I use occasionally to test Moto Mods and the Verizon network. It was one of my favorite devices from last year thanks in large part to the Moto Mods support, stock Android experience, and long battery life.
The new Moto Z2 Force Edition is similar to the Moto Z Force Droid, but thankfully is launching on other carriers besides Verizon. It also supports Moto Mods and has a stock Android experience, but comes with a much smaller battery. After a week of use, see my first impressions from last week, it is a good successor to the Z Force Droid and on my top five list for 2017.
Such things could change the open source landscape drastically. Although open source software powers much of the modern world, with 78% of companies running open source software in 2015, that doesn't mean projects won't feel the effects of a more restricted internet. While larger organizations such as the Apache Foundation or Mozilla might fare okay in a world without net neutrality, smaller projects could be drowned out by ISP restrictions.
Even those larger open source communities might find themselves becoming niche if they're overshadowed by larger companies that can afford to sponsor data or exist in faster tiers. This could cause companies or individuals that would be otherwise willing to support free and open source software (FOSS) to choose a proprietary option due to better access.
eLife joined the Substance Consortium, which provides support for Substance, a JavaScript library for web-based content editing. This open source project supplies custom text editors and other systems that enable knowledge creation and dissemination.
Bitnami announced on August 1 that it is open sourcing the first mobile app for managing Kubernetes, with the public release of Cabin.
Bitnami originally acquired the Cabin technology through the acquisition of privately-held Kubernetes startup Skippbox Ltd in March of this year.
Although Russian hackers are reported to have tried to disrupt the November election with attacks on the voting systems of 39 states, the consensus of the intelligence community is that they were probably unsuccessful in their efforts to delete and alter voter data. But another national election is just 15 months away, and the risk that those working on behalf of President Vladimir Putin of Russia could do real damage — and even manage to mark your ballot for you or altering your vote — remains.
Since the debacle of the 2000 election (remember hanging chads?) American election machinery has been improved to reduce the chances of mis-tallying votes, outright fraud and attacks by hackers. These improvements brought with them a new concern: lack of software security. Most voting machines’ software can now be easily hacked. This is in large part because the current voting systems use proprietary software based on Microsoft’s operating system.
One post-2000 change — a useful one — was to move away from all-electronic touch-screen balloting, with no paper record indicating how someone voted. Nearly half of voters are registered in jurisdictions that use optical-scan systems that read marked paper ballots and tally the results. But one-quarter of voters still use direct-recording electronic voting machines, which produce no paper trail.
At polling places where voting machines don’t provide this backup record, there’s no way for election officials to run an effective recount if the electronics are hacked.
Two long-time developers of the Vuze BitTorrent client, formerly known as Azureus, have launched a new client. BiglyBT emerges at a time when Vuze development has stalled. The developers promise to take the project forward while removing all advertising and other annoyances.
The open source model allows these companies to learn from each other, benefit from one another’s success and further drive innovation. Aragon, for example is built on the Ethereum blockchain, meaning that what is good for Ethereum is good for us and vice versa.
Heptio, the Seattle-based company recently launched by Kubernetes co-founders Craig McLuckie and Joe Beda, wants to make it easier for businesses to use Kubernetes in production. Since its launch in late 2016, the well-funded company has remained pretty quiet about its products, but today, the team released two open source projects into the wild: Ark and Sonobuoy.
BNO Technology Solutions has created the LiberateOS project. The project aim is to create a fork of the Android open source mobile operating system that no longer relies on the programming language Java. The technology shall be replaced with C# and the Mono framework.
In order to achieve this the project uses another research project executed by the company Xamarin in 2011/2012. That former project was called XobotOS which in May of 2012 has been released as open source on GitHub.
These are some of the topics we’re going to be talking about during a session at Mobile World Congress Americas in San Francisco next month. I’ll be moderating an event titled Telecom Transformation: The Marriage of Open Source Software and 5G Networks, with our speakers being:
August 22-29 we're organizing a conference to discuss and work on privacy, self-hosting, security and open source in Berlin: the Nextcloud Conference. We expect some 150-200 people to participate during a week of discussing and coding and, especially on the weekend, presenting and workshopping. So I thought I should blog about why should you be there and what can you expect?
Do you want to send files quickly and securely using your browser? If so, Firefox Send lets you do precisely that.
‘Firefox Send’ is an experimental new feature launched by Mozilla this week. It lets you safely send file(s) (up to 1GB) to someone else without the effort of using email, setting up a sync service like Dropbox, or using a CLI tool like Wormhole.
Please do NOT use this VirtualBox Beta release on production machines. A VirtualBox Beta release should be considered a bleeding-edge release meant for early evaluation and testing purposes.
Oracle has pushed into public beta their first snapshot of the upcoming VirtualBox 5.2 virtualization software.
VirtualBox 5.2 is considered a minor update over the existing VirtualBox 5. New features of VirtualBox 5.2 Beta 1 include allowing virtual machines to be exported to the Oracle Cloud, support for unattended guest installations, and overhauling the VM selector user-interface.
After over 13 million downloads of WordPress 4.8, we are pleased to announce the immediate availability of WordPress 4.8.1, a maintenance release.
This release contains 29 maintenance fixes and enhancements, chief among them are fixes to the rich Text widget and the introduction of the Custom HTML widget. For a full list of changes, consult the release notes, the tickets closed, and the list of changes.
With summer reaching its peak (or winter, for those in the southern hemisphere), open source CMS vendors are keeping their cool by continuing to tweak their products and engage with their communities.
In July, we heard news from Enonic, Liferay, Jahia and Magnolia about new websites, Slack channels and even an office gaming app.
Let's take a look what August holds for the open source CMS space.
I recently finished reading Your Starter Guide to Maker Spaces by Nick Provenzano, a Raspberry Pi Certified Educator. In the book, Nick describes a Raspberry Pi competition at the school where he teaches.
Each student received a Raspberry Pi kit and was told to identify a problem, come up with a solution using the Pi, and not spend more than $75 on their project. The students' solutions varied, but the common result was that the students taught themselves to code. This is what happens when you give students a broad assignment and ample opportunity to explore learning on their own.
Throughout the last decade, we've been undergoing rapid change in the way we deliver services, conduct our business, share our lives on social media, and use digital technology to engage with one another globally. Let's talk about a short list that is now our norm: digital media consumption, on-demand entertainment, self-driving cars, augmented reality, credit card chips, smart phones, smart wearables, and even drone delivery for your "I can't wait" items. We can even create organs on a 3D printer—total sci-fi stuff for anyone born before 1983. These incredible advances came from new ways of thinking, from pioneering an idea to see "what if."
The FreeBSD Testing Project is building an automated test suite for the entire operating system. They have a whole mess of work to do. There’s only four people on the team, so each additional person that contributes can have a serious impact. They have tutorials on how to write tests, and sample tests.
DragonFlyBSD 4.8.1 has been released by Justin Sherrill with various minor updates -- particularly for Intel DRM graphics and other kernel improvements -- over the recent v4.8 milestone.
Those of you tuned in to the wonderful world of system programming may have noticed that glibc 2.26 was released last night (or daytime if you live west of me or middle of the night/dawn if you live east of me, well you get the drift) and it came out with a host of new improvements, including the much awaited thread cache for malloc. The thread cache for malloc is truly a great step forward - it brings down latency of a bulk of allocations from hundreds of cycles to tens of cycles. The other major improvement that a bulk of users and developers will notice is the fact that glibc now detects when resolv.conf has changed and reloads the lookup configuration. Yes, this was long overdue but hey, it’s not like we were refusing patches for the past half a decade, so thank the nice soul (Florian Weimer) who actually got it done in the end.
[...]
Tunables allow you to take this idea further because there are two ways to get performance benefits, (1) by utilizing all of the CPU features that help and (2) by catering to the workload. For example, you could have a workload that performs better with a supposedly sub-optimal memcpy variant for the CPU purely because of the way your data is structured or laid out. Tunables allow you to select that routine by pretending that the CPU has a different set of capabilities than it actually reports, by setting the glibc.tune.hwcaps tunable on x86 processors. Not only that, you can even tune cache sizes and non-temporal thresholds (i.e. threshold beyond which some routines use non-temporal instructions for loads and stores to optimize cache usage) to suit your workload. I won’t be surprised if some years down the line we see specialized implementations of these routines that cater to specific workloads, like memcpy_db for databases or memset_paranoid for a time invariant (or mostly invariant) implementation of memset.
Yesterday Noura Safadi said that she had received confirmation that the Syrian authorities executed her husband, Bassel (Safadi) Khartabil, two years ago. Noura had been looking for Bassel since he disappeared from a Syrian prison in October 2015.
Bassel, a Syrian-Palestinian computer engineer, used his expertise to advance freedom of speech in Syria. Foreign Policy magazine named Bassel one of its Top 100 Global Thinkers of 2012, “for insisting, against all odds, on a peaceful Syrian revolution.” Syrian security forces arrested Bassel in March 2012, and a relative said he was tortured in an unofficial detention facility run by Military Intelligence. Syria’s security services routinely subject detainees to horrific forms of torture in a web of facilities amounting to a torture archipelago.
In December 2012, the authorities transferred Bassel to `Adra prison where Noura was finally able to visit him, and learned he would be tried in a military field court for his peaceful activism. Military field court proceedings are secret and usually last only a few minutes; defendants have no legal representation, and the decisions are not subject to appeal. Bassel appeared before a field court in December 2012 but never heard a verdict.
Just days ago we wrote about an open source 3D printed microscope that could be made for as little as €100 ($118). Now, another project, undertaken by researchers from the University of Bath in the UK, has even higher aspirations than that as it has made a prototype of a 3D printed microscope for only €£30 ($40).
The benefits to existing Solo users are many; the community is now free to maintain and improve upon an established codebase containing many innovative technologies, and developers will be able to “hack” or improve nearly every part of their Solo from now on, including the Controller! The Open Source community in general will also benefit from more generally applicable technologies such as SmartShots and the Artoo controller.
Arduino opened registration for an Arduino Core Developers Workshop following a shakeup in which controversial CEO Federico Musto left the company.
Arduino developers who are wondering what the new Arduino will look like after last week’s shakeup can now sign up for an Arduino Core Developers Workshop to be held in Turin, Italy, from Sep. 29 through Oct. 1 (see farther below). Will the company shift entirely to RISC-V? Will Linux remain part off Arduino’s future? And can it compete both with Espressif’s ESP32 and the Raspberry Pi? Hardware aside, what happened to that open source Arduino Foundation? Maybe we’ll even solve the latest Shroud of Turin mystery.
HHVM 3.21 is released! As this is an LTS release, it will be supported until HHVM 3.27, expected in 48 weeks. This release improves PHP7 compatibility, and adds several new features. Packages have been published in the usual places; see the installation instructions for more information.
Facebook developers have released HHVM 3.21 as their alternate PHP implementation that also powers their Hack programming language. HHVM 3.21 is a long-term support release that will make it maintained for nearly one year.
Drinking alcohol after learning information appears to aid the brain’s ability to store and remember that information later, according to a study of at-home boozing in Scientific Reports. The memory-boosting effect—which has been seen in earlier lab-based studies—linked up with how much a person drank: the more alcohol, the better the memory the next day.
The study authors, led by psychopharmacologist Celia Morgan of University of Exeter, aren’t sure why alcohol improves memory in this way, though. They went into the experiment hypothesizing that alcohol blocks the brain’s ability to lay down new memories, thus freeing up noggin power to carefully encode and store the fresh batch of memories that just came in. In other words, after you start drinking, your ability to remember new things gets wobbly, but your memory of events and information leading up to that drink might be sturdier than normal.
It's an idea that could transform our understanding of how humans went from small bands of hunter-gatherers to farmers and urbanites. Until recently, anthropologists believed cities and farms emerged about 9,000 years ago in the Mediterranean and Middle East. But now a team of interdisciplinary researchers has gathered evidence showing how civilization as we know it may have emerged at the equator, in tropical forests. Not only that, but people started farming about 30,000 years earlier than we thought.
For centuries, archaeologists believed that ancient people couldn't live in tropical jungles. The environment was simply too harsh and challenging, they thought. As a result, scientists simply didn't look for clues of ancient civilizations in the tropics. Instead, they turned their attention to the Middle East, where we have ample evidence that hunter-gatherers settled down in farming villages 9,000 years ago during a period dubbed the "Neolithic revolution." Eventually, these farmers' offspring built the ziggurats of Mesopotamia and the great pyramids of Egypt. It seemed certain that city life came from these places and spread from there around the world.
The knock on the door came at 3am: a police officer telling Rose Humphries that a young man had been found dead of a heroin overdose at a house in town.
It was her youngest son Roland, dead at the age of 23.
He had been trying to get off the drug. That morning, a few hours after the police officer left, a letter arrived at the family home stating that Roland had been accepted on a methadone programme to wean him off heroin.
The Swedish government is restricting outsourcing of privacy sensitive data, following the possible leak of all of its vehicle data, outsourced to IBM in 2015 without the proper security checks. The stricter limits on what may be outsourced, were announced at a press conference on 24 July by Prime Minister Stefan Löfven.
In today's threatscape, anti-malware software provides little peace of mind. In fact, anti-malware scanners on the whole are horrifically inaccurate, especially with exploits less than 24 hours old. After all, malicious hackers and malware can change their tactics at will. Swap a few bytes around, and a previously recognized malware program becomes unrecognizable.
To combat this, many antimalware programs monitor program behaviors, often called heuristics, to catch previously unrecognized malware. Other programs use virtualized environments, system monitoring, network traffic detection and all of the above at once in order to be more accurate. Still they fail us on a regular basis.
As they do every year, hackers descended on Las Vegas this week to show off the many ways they can decimate the internet's security systems. Here's a collection of some of our favorite talks from this week's Black Hat conference, including some we didn't get the chance to cover in depth.
Today, August 3rd 2017 WikiLeaks publishes documents from the Dumbo project of the CIA. Dumbo is a capability to suspend processes utilizing webcams and corrupt any video recordings that could compromise a PAG deployment. The PAG (Physical Access Group) is a special branch within the CCI (Center for Cyber Intelligence); its task is to gain and exploit physical access to target computers in CIA field operations.
Dumbo can identify, control and manipulate monitoring and detection systems on a target computer running the Microsoft Windows operating sytem. It identifies installed devices like webcams and microphones, either locally or connected by wireless (Bluetooth, WiFi) or wired networks. All processes related to the detected devices (usually recording, monitoring or detection of video/audio/network streams) are also identified and can be stopped by the operator. By deleting or manipulating recordings the operator is aided in creating fake or destroying actual evidence of the intrusion operation.
Dumbo is run by the field agent directly from an USB stick; it requires administrator privileges to perform its task. It supports 32bit Windows XP, Windows Vista, and newer versions of Windows operating system. 64bit Windows XP, or Windows versions prior to XP are not supported.
At this time, as a Safari user, you can’t do anything about it. Apparently, Apple does not consider this issue a security breach. We have not heard of any planned patches to address it.
Developers are often viewed as the aggressors when it comes to online security. But participants at a Black Hat USA session argued that developers were actually the new targets of attacks. This is increasingly coming to light as container developers become a bigger part of enterprise operations.
Sagie Dulce, senior security researcher at Aqua Security, said developers in charge of microservices and container deployments have become a prime target by their peers of security attacks.
The internet today is an open network using often insecure protocols and transport mechanisms. One path to improving security could be to embed security into the fabric of the internet, but that's not the path that Facebook Chief Security Officer Alex Stamos wants to take.
In a press Q&A at the Black Hat security conference on July 26, Stamos responded to a question from eSecurityPlanet about making the internet secure by default. In his view, that's not the right approach.
Whoever was behind the WannaCry cryptoransomware worm that ravaged networks worldwide in May has finally collected the ransom paid by some of the worm's victims. The value of bitcoins had grown to about $140,000, but the currency's value got about a 20 percent boost on August 1 triggered by a split in the Bitcoin market, as Quartz reports.
The hackers {sic} behind WannaCry have cashed out more than $140,000 (€£105,000) worth of bitcoins paid by victims of the ransomware bastard.
In reality, the WannaCry hackers will have a tough time liquidating any of their holdings. It has become far more difficult for hackers to cash out because a major bitcoin exchange called btc-e, which allegedly is responsible for laundering 95% of ransomware funds, has gone offline.
More than €£108,000 in bitcoin paid by victims of the WannaCry ransomware attack, which crippled parts of the NHS as well as businesses in 150 countries worldwide, has been withdrawn from the digital wallets the funds were being held in.
A group that supplies a hardening patch for the Linux kernel has sued a well-known free and open-source practitioner for claiming that the patches in question violate the licence under which the kernel is distributed.
The group, Grsecurity which has filed the lawsuit under its trading name Open Source Security, sells its patch to subscribers and has taken offence at Bruce Perens' characterisation of their efforts as presenting "a contributory infringement and breach of contract risk".
Perens issued a statement on 28 June, detailing his reasons why users should avoid using the Grsecurity patch. "It (the patch) is a derivative work of the Linux kernel which touches the kernel internals in many different places. It is inseparable from Linux and cannot work without it," he wrote.
"As a customer, it’s my opinion that you would be subject to both contributory infringement and breach of contract by employing this product in conjunction with the Linux kernel under the no-redistribution policy currently employed by Grsecurity," Perens wrote on his blog.
The following month, Perens was invited to court. Grsecurity sued the open-source doyen, his web host, and as-yet-unidentified defendants who may helped him draft that post, for defamation and business interference.
[...]
Linus Torvalds, who oversees the Linux kernel, has called Grsecurity's patches "garbage."
Grsecurity used to allow others to redistribute its patches, but the biz ended that practice for stable releases two years ago and for test patches in April this year. It offers its GPLv2 licensed software through a subscription agreement. The agreement says that customers who redistribute the code – a right under the GPLv2 license – will no longer be customers and will lose the right to distribute subsequent versions of the software.
Marcus Hutchins, the 23-year-old security professional who accidentally stopped the spread of the virulent WCry ransomware worm in May, has been named in a federal indictment that alleges he was part of a conspiracy that created and distributed a piece of unrelated malware that steals banking credentials from unsuspecting computer users.
According to the eight-page indictment, the conspiracy involved Hutchins and two other individuals whose names still have not been made public. After Hutchins allegedly created the banking trojan dubbed "Kronos," a video circulated in July 2014 on a publicly available website that demonstrated how the malware worked. A month later, one of the unnamed co-conspirators put the malware up for sale at a price of $3,000. Hutchins and one of the co-conspirators allegedly updated Kronos around February 2015.
Motherboard verified that a detainee called Marcus Hutchins, 23, was being held at the Henderson Detention Center in Nevada early on Thursday. A few hours after, Hutchins was moved to another facility, according to a close personal friend.
According to friends, the first clues came when Hutchins failed to text from the airport. “He was radio-silent before his flight which is very unusual,” one friend told The Verge, “and he wasn’t on the Wi-Fi on the plane.”
According to an indictment released by the US Department of Justice on Thursday, Hutchins is accused of having helped to create, spread and maintain the banking trojan Kronos between 2014 and 2015.
Hutchins isn't the only member of the malware "conspiracy" named in the indictment against him. It accuses another person, whose name is redacted from the document, of doing what seems to be the majority of the legwork to distribute Kronos, including listing the malware for sale on criminal forums, creating a video advertisement that showed how it worked, and offering so-called "crypting" services meant to hide the malware from detection. The indictment also accuses Hutchins of helping update the malware in February 2015, at least six months after it first went on sale—the only hint that he may have worked on it after it was being actively used for criminal actions.
According to an indictment provided to CNN Tech, Hutchins created the malware and shared it online. The Eastern District of Wisconsin returned a six-count indictment against Hutchins on July 12, 2017. It was unsealed at the time of his arrest.
British security researcher Marcus Hutchins, who accidentally stopped the spread of the WannaCry ransomware that was affecting Windows machines in May, has been arrested by the FBI in Las Vegas.
According to a US Marshals spokesman, Hutchins was arrested by the FBI shortly after the Defcon/Blackhat conference in Las Vegas, though no one has disclosed the charge. His friends cannot locate him.
A young cyber expert who stopped the WannaCry global cyber attack has been arrested in the US for allegedly conspiring to advertise and sell a malicious software that targeted bank accounts.
As you may recall, earlier this year, when the WannaCry ransomware was spreading like wildfire, it was accidentally stopped by a security researcher in the UK who was (mostly) known only by the pseudonym MalwareTech. He wrote about the whole experience after having tweeted about it earlier. Basically he spotted the domain that WannaCry was pinging and saw that it wasn't registered -- so he registered it, if just to track the spread of the malware. But, that process actually stopped WannaCry from spreading due to the way the ransomware was designed. The story of someone accidentally stopping a massive malware breakout was a good one and it was widely covered by the press. MalwareTech got lots of good press out of it... and as a thank you, at least one UK publication doxxed him and revealed his name, his age, some of his social media photos and even what he liked to eat. That wasn't very nice. Still, now it's known that Marcus Hutchens is MalwareTech, and people should be thanking him.
Nice work, Andrew. Generating a federal indictment is a surefire way to ensure your vanity search results remain unmarred by "offending court decisions." But this DDoS wasn't Rakhshan's only attempt to scrub the web of negative info. Searching through the Lumen (formerly Chilling Effects) database reveals post-alleged attack efforts Rakhshan made to clean up unflattering search results.
The government noted that the actual number of attacks may be higher than it recorded, but added that it is ‘not always possible to identify or record unsuccessful incidents that could be defined as attacks, such as phising emails or those with potential malware that can be filtered before ever reaching the Scottish government.'
The IT glitch, which was resolved at around 9am UK time, caused 'carnage' at check-in desks at the three London airports, according to pissed off holidaymakers.
This is the earliest, since 1969, the occasion has been marked. The date every year is calculated by comparing the total yearly consumption by humans — also known as our ecological footprint — with Earth's ability to regenerate natural resources in the same year.
[...] adding that the “EPA has always followed a cooperative federalism approach since most environmental programs are delegated to states and tribes who carry out the majority of monitoring, permitting, inspections, and enforcement actions.” She also noted how the Trump administration is defunding environmental initiatives on the state and local level as well as the federal one.
Every summer for the last three decades, researchers have cruised the northern Gulf of Mexico during July to study the extent of hypoxia, or low oxygen levels. This summer they found the largest area ever on record: 22,720 square kilometers. This is about the size of New Jersey.
This year's "dead zone," where oxygen levels are so low they threaten fish and other small aquatic life, is about 50 percent larger than normal. The average size of the dead zone over the last 31 years has been 14,037 square kilometers, according to Nancy Rabalais, a researcher at Louisiana State University who has long studied the issue. This year's dead zone was likely even larger than what the scientists found, but there was insufficient time on board the ship to measure its entire extent.
Negotiations on Britain’s withdrawal from the EU have now begun in earnest. They are required, according to article 50, to “take account of the framework” for Britain’s “future relationship with the union”. But what is that future relationship to be?
Economically, the EU comprises three elements: a free trade area; a customs union (an area with a common trade policy and a common tariff); and an internal market in which non-tariff barriers to trade (regulations, standards and the like) are harmonised and, indeed, reduced.
A group of Labour and Conservative MPs are hoping to force a vote on whether the UK should stay in the European Economic Area for at least a few years after Brexit, in the belief that it may be possible to force Theresa May to yield on the issue.
MPs campaigning for a softer Brexit are increasingly concerned that the government’s EU withdrawal bill will not allow the UK to stay in the European Economic Area even temporarily before the final deal with the EU comes into force in around 2022.
But Labour MPs such as Stephen Kinnock, Chuka Umunna and Heidi Alexander are considering ways to work with some Tories to keep the UK in EEA, at least for a transitional period, when the bill comes to the House of Commons in early September. One option would be for a backbencher to table an amendment asking the UK to remain in the EEA during the post-Brexit transition.
"Drivers have developed practices to regain control, even gaming the system," said Dr Mareike Möhlmann, from the University of Warwick Business School. "It shows that the algorithmic management that Uber uses may not only be ethically questionable, but may also hurt the company itself."
But he cautions that big question is what else comes alongside that deal. For example, agreements could be struck with other non-EU countries that boost the economy.
But...the uncertainty over this is affecting, to various degrees, businesses, financial markets and households in this country, he insists.
But this creates another, funnier problem: That's so easy to game! Here's what you do: [...]
The Bank of England has downgraded its UK GDP growth forecasts for both this year and next, as it expects the economy to continue to struggle in the run-up to Brexit.
The rate-setting Monetary Policy Committee also voted, as expected, by six votes to two to keep interest rates on hold at 0.25 per cent.
However, the central bank also sought to send a hawkish message that a rate rise could still be coming sooner than markets currently expect.
Him: Remember what I told you at the start of this circus? They planned to use Trump’s antics for cover, to get done what they most wanted – big tax cuts, rollbacks of regulations, especially financial. They’d work with Pence behind the scenes and forget the crazy uncle in the attic.
JUST OVER A YEAR AGO, in Brasília, one of the most nauseating and humiliating political spectacles I’ve ever seen took place over nine hours. In Brazil’s lower House – a body where a majority of members are implicated in corruption investigations – one dirty, shady cretin after the next stood up in front of television cameras and flamboyantly declared that their conscience, their religion, their God, their children, their devotion to Jerusalem, the memory of their mother, their pastor, the purity of their soul demanded that they punish corruption by removing the elected President, Dilma Rousseff, from office.
Just imagine the most extreme, primitive cartoon version of a gleefully hypocritical moralizer – a preacher who leaves his weekly whorehouse orgy to go directly to Sunday church to rail against hell-bound sinners – and you’ll have a perfect vision of the majority faction that sanctimoniously paraded itself that day. The slime that oozes from their pores is palpable. These are the people who nullified a national election in, and are thus now ruling over, the planet’s fifth most populous country.
I get “privilege” and do not in any way imply our society is not chock-a-block with prejudice. But note more than 19 million whites fall below the poverty line, accounting for more than 41 percent of the nation’s destitute. Also, a bit of history. Before we were a monolithic heap of “white men,” we were Paddys, Kikes, Hillbillies, Wops, Hunkies, Polacks, and all the other forms of prejudice and discrimination.
A big messy part of all this is Trump, who has been anointed the leader of the OWSM “community.”
Trump is an OWSM. He does not represent me, and I do not support him or what he stands for or the way he acts. FYI, I also did not support Hillary Clinton, who is by the way an OWSF, three-quarters of what I am. And don’t dismiss my deeply-thought political choice of whom to vote for as misogynistic.
That America is a nation of immigrants is far from a trope; no other nation on earth has been so formed by immigration, from its national myths to the hard core realization of its industrial revolution to its current draw of immigrants, from the most highly-skilled to the most unskilled, from around the globe.
The US Senate today confirmed the nominations of Republican Brendan Carr and Democrat Jessica Rosenworcel to fill the two empty seats on the Federal Communications Commission.
FCC Chairman Ajit Pai congratulated the commissioners in a statement. “As I know from working with each of them for years, they have distinguished records of public service and will be valuable assets to the FCC in the years to come,” Pai said. “Their experience at the FCC makes them particularly well-suited to hit the ground running. I’m pleased that the FCC will once again be at full strength and look forward to collaborating to close the digital divide, promote innovation, protect consumers, and improve the agency’s operations.”
A former lawyer for the nation’s top telecom companies — ties that earned him some criticism from liberal-leaning consumer groups — Carr is expected to become a reliable ally to Pai as he proceeds with his plans to undo the government’s net neutrality rules and loosen regulation on the telecom industry.
What’s different about China’s approach is the content of the propaganda. The government doesn’t refute critics or defend policies; instead, it overwhelms the population with positive news (what the researchers call “cheerleading” content) in order to eclipse bad news and divert attention away from actual problems.
[...]
But we estimate that the government fabricates and posts 448 million social media comments a year.
A South Carolina psychiatrist in engaged in what might be one of the all-time great windmill tilts. It's a libel lawsuit predicated on a single one-star review -- a review that contains nothing else but the solitary star.
[...]
Beale alleges a lot of things in his suit. He claims the one-star rating -- left by a single person with zero additional commentary -- has led to "extreme and constant distress." He points out he has received mostly positive ratings elsewhere and that the person clicking on the single star -- "Richard Hill" -- is not a patient of his, at least not under that name.
Of course, Beale's online ratings have fallen significantly since the filing of this lawsuit. Some have pointed out the "extreme and constant distress" Beale claims to be suffering as a result of this single single-star review isn't the sort of reaction one would expect from a mental health professional.
[...]
So far, the only thing Beale has accomplished is making a fool of himself. His ratings at multiple sites are starting to collapse. At this point, there's nothing to be gained from pursuing the lawsuit, other than keeping his nonplussed counsel employed. His overreaction to a wordless one-star review has done more damage to his career than ignoring it ever would have.
Apple’s craven obedience to Beijing’s autocratic demands typifies the general stance of the West. From the Tiananmen Square massacre of 1989 to Beijing’s abduction of Hong Kong booksellers today, Stalinist repression in China has never really sparked uproar among Western leaders. Yes, British foreign secretary Boris Johnson greeted the 20th anniversary of Chinese rule over Hong Kong with the limp hope that it would ‘make further progress towards a more democratic and accountable system of government’. But Western IT firms and politicians can hardly pose as guardians of internet freedom.
In recent months, Facebook has repeatedly come under fire for censoring journalists and activists in the name of combating terrorism, often reversing their decisions in the wake of negative media coverage.
Since Russia’s interference in the 2016 U.S. election, many have warned that Putin will be back in 2018 and 2020. But the reality is that Russian influence operations never left. As former Director of National Intelligence James Clapper recently stated, the Kremlin is already beginning to “prep the battlefield” for the 2018 elections. But what does this mean?
When you use a "free" service like Twitter and Facebook, you're buying into the policies and attitudes they pursue, for better or worse.
Twitter has gotten a lot of flack over the years for how it responds to threats and abuse online -- much of it deserved. The company insists that it's gotten much better about this, and now responds much more quickly to inappropriate threats or abuse online. But doing so is often difficult and bound to lead to some really bad decisions. Like one that just happened. Ken White's Popehat account has been temporarily suspended from Twitter. Why? Because he posted a threat he had received from someone else on Twitter to Twitter.
If you're a regular Techdirt reader, I'm sure you're familiar with Ken "Popehat" White, the blogging lawyer who covers a lot of the same stuff we do, mainly in the free speech realm. Ken has also, a few times, represented us in response to silly legal threats we've received. If you're a Twitter user, you may also be aware that Ken is a prolific and masterful user of Twitter often commenting on the news of the day. He also uses Twitter to do some law 'splaining and to call out bullies and trolls. He's pretty good at it. One such recent bully was a Texas lawyer named Jason L. Van Dyke. We actually wrote about Jason a few years ago when he tried to sue the Tor Project, because some revenge porn site used Tor. We didn't hear much about him until a few months ago. It seems that, somehow, Van Dyke was offered a job as an assistant district attorney in Victoria County. For unclear reasons, that job offer was pulled. Van Dyke was not happy. He proceeds to sue the DA for pulling the job offer.
Without Section 230, these businesses might have to review every bit of content a user wanted to publish to make sure that the content would not be illegal or create a risk of civil liability. It’s easy to see how such measures would stifle completely lawful speech.
When she first launched the account about a year ago, she was hesitant. “I didn’t think anyone would be interested,” she says. “[But] in my first week I made over a thousand dollars.” Now, in a good month, with her current supporters, Michelle says she can make $5,000. Operating the Patreon account is her full-time job.
The German duo found that huge datasets of anonymized private Internet histories were being sold by Web analysis companies and data brokers, with much of the material coming from browser extensions. Since these operate before information is sent over any VPN, they can access full details of your Internet activities, and send browser data anywhere. For VPN users, that’s disappointing. Less surprising, perhaps, is the fact that it was relatively easy to discover the identities of many users found in these supposedly anonymized datasets.
House Intelligence Committee chairman Devin Nunes is at it again. After years of unwavering support for NSA surveillance programs -- a one-man booster club operating from inside an oversight committee -- Nunes is now starting to find things he doesn't like about NSA surveillance.
It escalated a few months ago when he was "shocked" to learn NSA surveillance grabs communications between world governments and may have been used to listen in on short-lived National Security Advisor Mike Flynn's conversations with Russian officials.
Nunes' hypocrisy continued when he demanded answers about surveillance activities under Executive Order 12333 -- again in relation to possible surveillance of public officials he liked and supported. Nunes should already have known most of the answers to these questions. After all, he heads a surveillance oversight committee. But he didn't because he's spent most of his tenure with the oversight committee arguing there should be less oversight of Section 702/Executive Order 12333 surveillance programs.
Nunes still won't let it go. He's fired off yet another letter demanding answers about surveillance, this time to new Director of National Intelligence Dan Coats. This time, he's looking to pin surveillance of Trump appointees on the outgoing president -- as if nothing of the sort continues today.
The Federal Trade Commission received a complaint Monday from privacy advocates requesting a full investigation into a new advertising scheme from Google that links individuals’ online browsing data and what they buy offline in stores.
The privacy group that launched the federal complaint, the Electronic Privacy Information Center, alleges that Google is using credit card data to track whether online ads lead to in-store purchases without providing an easy opt-out or clear information about how the system works. The complaint specifically calls out a new advertising program Google unveiled in May that reportedly relies on billions of credit card records, which are matched to data on what ads people click on when logged into Google services.
Joseph Alioto, the lead federal prosecutor, initially suggested that the suspect’s mobile phone company, MetroPCS, needed to somehow activate the Oakland Police Department’s stingray immediately following the January 21, 2013 shooting of a police officer. But that’s not how stingrays work—rather, they act as fake mobile phone towers and do not require any affirmative interaction on behalf of any phone company’s network.
The New York Times and other news outlets are reporting that Ezra Cohen-Watnick, 31, the senior director for intelligence on the National Security Council (NSC), has been dismissed from the White House.
Watnick, described as a “Trump loyalist,” was brought onto the NSC by former director Mike Flynn. Flynn was fired by the administration after he admitted to hiding his links to Russian and other foreign governments.
Flynn’s successor, National Security Adviser H.R. McMaster, has tried to dismiss Cohen-Watnick before. According to the Conservative Review web site, he was overruled by President Donald Trump and his senior advisors Steve Bannon and Jared Kushner.
H.R. McMaster, national security adviser and so-called “adult in the room,” is apparently gaining some ground over the nationalistic forces inside the Trump administration.
On Wednesday, the White House confirmed that the NSC’s senior director of intelligence, 30-year-old Ezra Cohen-Watnick has “left” the NSC. McMaster had allegedly tried to get rid of Cohen-Watnick – who was brought on by Flynn, and also worked on the Trump transition – soon after taking the NSA job. McMaster reportedly expressed doubts about Cohen-Watnick’s qualifications, but advisers Jared Kushner and Steve Bannon intervened on his behalf, and got Trump to step in and overrule McMaster.
'Unmasking' Scandal: Day by day, the scandal of the Obama administration's abuse of domestic intelligence gathered by the National Security Agency grows. Forget the phony Russia-Trump collusion charges — the Obama White House looks increasingly to have committed a crime by using U.S. intelligence for political purposes.
The NSA's insatiable gathering of data and conversations on Americans make it a potentially highly dangerous enemy of Americans' freedoms. Who would want to have a federal government spy shop that knows almost everything you do in public, on the phone, by email, or by computer?
That's why the super-secret NSA, which is much bigger than the better-known CIA, has always operated under strict guidelines for how its intel could be used. In its reports, Americans who are surveilled without a warrant while speaking to a foreign citizen are routinely "masked" — that is, their identity is kept secret — unless there's an overwhelming national security interest in that person being "unmasked."
The BBC Blog explains: "As well as letting a user sign in to BBC services using their unique voice instead of a password, our internal prototype also gives a user the option to select what they want to watch by talking to their device.
The BBC has been working with Microsoft to develop an experimental version of its popular iPlayer service. British iPlayer users can access a range of on-demand content provided by the BBC — funded by the UK’s TV License — and a new experiment is trying to guess what you’d want to watch by listening to your voice.
The new 'Send Money' feature, which has launched in 22 countries including the UK, brings the ability to send and receive peer-to-peer payments with PayPal to Microsoft's messaging app.
But, as noted by Brandon Robbins on Twitter, the new program comes with a pretty big catch: you have to enroll in Verizon Selects, a program that allows the company to track a huge chunk of your personal data. That includes web browsing, app usage, device location, service usage, demographic info, postal or email address, and your interests. Furthermore, that data gets shared with Verizon’s newly formed Oath combination (aka AOL and Yahoo), plus with “vendors and partners” who work with Verizon. Which is kind of a long list of people who have access to what feels like a fairly significant amount of your data.
Carrot Reward’s founder Andreas Souvaliotis explained to the CTV that he had originally started the company to focus on health but quickly realized, through government partnerships, that his app would also be effective in “modifying behavior in other areas as well.” Now, Carrot Rewards has raised over $1.5 million from several local Canadian governments and have rolled out the app to hundreds of thousands of users.
Last week, word began to spread that the Trump administration was considering granting new powers to U.S. Cyber Command. Lolita Baldor of the Associated Press had the scoop, discussing two related but separate steps under consideration: first, to elevate U.S. Cyber Command to the status of a unified command and second, to break the current “dual-hat” arrangement with the National Security Agency (NSA), whereby the commander of U.S. Cyber Command is the same individual as the director of the NSA.
This week we celebrated National Whistleblower Appreciation Day—an appropriate time to speak out against the U.S. government’s continued use of the Espionage Act to prosecute government leakers, and in so doing, restrict the flow of important information to the press.
As we wrote on the 100th anniversary of the Act’s passage, the Espionage Act was designed to prosecute spies who disclosed military secrets to foreign nations, not sources who disclose newsworthy information to the press. Unfortunately, the Espionage Act has been misused throughout its existence, from silencing left-wing speech during the Red Scare days of its origin to the indictments of whistleblowers such as Daniel Ellsberg, Chelsea Manning, and Edward Snowden.
It seems as though a Baltimore police officer forgot about one key feature of his bodycam: the fact that it saves the previous 30 seconds of video recorded before the camera is activated. Most bodycams record and dump constantly. The moment it's activated, the 30 seconds preceding the activation become part of the recording.
What was apparently inadvertently captured by the camera was the officer planting drugs in a can and hiding them in an alley. All three officers then retreat to the sidewalk outside the alley before heading back in to "discover" the drug stash.
License plates are more than numbers and letters you display on your car. When police photograph your license plate, scan it, record the precise times and locations of the scans, and store all that information indefinitely in a database, they can search this information to piece together your movements and travel patterns. It’s highly personal information that reveals where we go, who we visit, and other details of our private lives.
Yesterday we filed an amicus brief asking the Virginia Supreme Court to hold that the state’s law enforcement agencies must purge plate information they collect using Automated License Plate Readers (ALPRs) because it’s personal information. A state law called the Government Data Collection & Dissemination Practices Act, enacted in response to concerns over the increasing use of technologies by governments and companies to compile detailed information about citizens’ private lives, requires agencies to delete personal information. We want the court to protect our privacy and establish that the bar is high for the police to retain personal information.
A Massachusetts woman convicted of involuntary manslaughter because of text messages that cajoled her 18-year-old friend to commit suicide was sentenced Thursday to serve 15 months in jail.
Michelle Carter, now 20, faced a maximum 20-year prison term. Her unusual prosecution was closely watched, and it occurred in a state that has no law forbidding people from encouraging suicide. But the authorities—including a Bristol County judge—concluded that in 2014 Carter sent Conrad Roy text messages that wantonly and recklessly caused him to poison himself in a car with carbon monoxide. She was 17 years old at the time.
Charter Communications has moved 30 percent of the customers it acquired in a blockbuster merger onto new pricing plans, resulting in many people paying higher prices.
“We are not making this update to prioritize Instant Articles,”a Facebook spokesperson told TechCrunch. “We are making this update in response to what people have told us. We know that faster loading webpages are a better experience for people, both on Facebook and across the internet,” they said.
The Gopher protocol isn’t supported by the modern web basically at all, but despite this, it lingers on, a quarter century from its peak. Here’s how.
Disabled people often need to modify digital content so they can consume it. Some advocates are worried new standards will turn them into criminals.
But an equally important activity that DRM interferes with is accessibility adaptation, which, despite being protected in many countries' copyright laws, turns into a legal minefield if DRM has to be removed in order to make a copyrighted work accessible for people with disabilities.
It's stunning how often trademarks that never should have been granted get granted -- leading to all sorts of bad outcomes. One area that sees far too many bad trademarks involves trademarking geographic areas, with the holder of the mark often then trying to lock out local businesses from using the name of the locations in which they reside. If ever there were a trademark type that everyone ought to agree should be rejected, it's one based purely on geography.
You write about enough trademark disputes and you come across some real whoppers. And, man, have I seen some doozies. Still, I never stop being suprised by how silly these things can get. Today's example of this revolves around the Chamber of Commerce for Whiting, Indiana sending out trademark threat letters to the Edwardsville Hometown Committee in Pennsylvania over the latter's 'Edwardsville Pierogi Festival.
While many artists have stepped up to demonize piracy over the years, Def Leppard guitarist Vivian Campbell prefers to see the upside. Describing the effects as "fantastic", Campbell says there's a whole new audience coming to the band's shows, bringing fresh energy to the performance. But how much of this can be attributed to piracy in 2017?
Universal Music Group is being sued by HypeForType, which accuses the record label of using 'pirated' copies of its fonts for the logo of The Vamps. The font is widely used for artwork, promotion material and merchandising of the popular British band, and the font creator is looking for a minimum of $1.25 million in damages.
Bell Canada, TVA, Videotron, and Rogers are collectively suing Kodi addon repository TVAddons, TorrentFreak can reveal. The lawsuit targets TVAddons' operator for the alleged unlawful distribution of Kodi software addons. It's fair to say that thus far, this process has revealed some of the most shocking abuses of power ever seen in an online copyright infringement case.
"I am of the view that its true purpose was to destroy the livelihood of the defendant, deny him the financial resources to finance a defence to the claim made against him," the judge wrote.