EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

04.26.18

Links 26/4/2018: KStars 2.9.5, Ubuntu 18.04 LTS, NetBSD 8.0 RC1

Posted in News Roundup at 9:38 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • Native Linux apps in Chrome OS will have a slick, electric Material Design theme

      The Chrome OS developers have been working out the stylistic elements of what you’ll see once you open your first native Linux apps in Chrome OS, and they’ve opted for Adapta, a popular Material Design-inspired Gtk theme that can be used on many of your favorite GNU/Linux distributions.

      For those of you not keeping track, the Chrome OS developers have been busy baking native container functionality into Chrome OS that allows the user-friendly startup of regular Linux applications in containers-within-VMs. This project, codename “Crostini,” is the largest change to Chrome OS since Android apps were introduced. Containers allow for applications to run in their own dedicated environment in isolation of the host OS – like a virtual machine, except unlike a VM, it doesn’t virtualize the whole OS to make the application work, it just bundles up the application and necessary baggage into an executable package.

  • Server

    • 3 questions about Kata Containers answered

      Kata Containers is a new open source project licensed under Apache 2.0 and governed by the OpenStack Foundation that combines the speed of containers with the security of virtual machines. Kata Containers will be featured in a number of upcoming sessions at OpenStack Summit and KubeCon EU. Can’t make it to either of those events? We’ve brought you answers to three of the top questions we hear from users.

    • What Stratis learned from ZFS, Btrfs, and Linux Volume Manager

      The reasons vary. First, let’s consider ZFS. Originally developed by Sun Microsystems for Solaris (now owned by Oracle), ZFS has been ported to Linux. However, its CDDL-licensed code cannot be merged into the GPL-licensed Linux source tree. Whether CDDL and GPLv2 are truly incompatible is a subject for debate, but the uncertainty is enough to make enterprise Linux vendors unwilling to adopt and support it.

      Btrfs is also well-established and has no licensing issues. For years it was the “Chosen One” for many users, but it just hasn’t yet gotten to where it needs to be in terms of stability and features.

      So, fuelled by a desire to improve the status quo and frustration with existing options, Stratis was conceived.

    • Heptio Debuts Gimbal Kubernetes Load Balancer Project

      Kubernetes startup Heptio has added another project to its roster of open-source efforts that provide expanded capabilities for container orchestration users.

    • Heptio Launches Kubernetes Load Balancing Application
    • The Role of Site Reliability Engineering in Microservices

      You can always spot the hot jobs in technology: they’re the ones that didn’t exist 10 years ago. While Site Reliability Engineers (SREs) did definitely exist a decade ago, they were mostly inside Google and a handful of other Valley innovators. Today, however, the SRE role exists everywhere, from Uber to Goldman Sachs, everyone is now in the business of keeping their sites online and stable.

      While SREs are hotshots in the industry, their role in a microservices environment is not just a natural fit that goes hand-in-hand, like peanut butter and jelly. Instead, while SREs and microservices evolved in parallel inside the world’s software companies, the former actually makes life far more difficult for the latter.

  • Audiocasts/Shows

    • Lying with statistics, distributions, and popularity contests on Cooking With Linux (without a net)

      It’s Tuesday and that means it’s time for Cooking With Linux (without a net), sponsored and supported by Linux Journal. Today, I’m courting controversy by discussing numbers, OS popularity, and how to pick the right Linux distribution if you want to be where are the beautiful people hang out. And yes, I’ll do it all live, without a net, and with a high probability of falling flat on my face.

  • Kernel Space

    • The rhashtable documentation I wanted to read

      The rhashtable data structure is a generic resizable hash-table implementation in the Linux kernel, which LWN first introduced as “relativistic hash tables” back in 2014. I thought at the time that it might be fun to make use of rhashtables, but didn’t, until an opportunity arose through my work on the Lustre filesystem. Lustre is a cluster filesystem that is currently in drivers/staging while the code is revised to meet upstream requirements. One of those requirements is to avoid duplicating similar functionality where possible. As Lustre contains a resizable hash table, it really needs to be converted to use rhashtables instead — at last I have my opportunity.

      It didn’t take me long to discover that the rhashtable implementation in Linux 4.15 is quite different from the one that originally landed in Linux 3.17, so the original LWN introduction is now barely relevant. I also quickly discovered that the in-kernel documentation was partially wrong, far from complete, and didn’t provide any sort of “getting started” guide. Nevertheless I persisted and eventually developed a fairly complete understanding of the code, which seems worth sharing. This article gives an introduction to the use of the rhashtable interfaces without getting into too many internal implementation details. A followup will explain how rhashtables work internally and show how some of the mechanism details leak though the interfaces.

    • The second half of the 4.17 merge window

      By the time the 4.17 merge window was closed and 4.17-rc1 was released, 11,769 non-merge changesets had been pulled into the mainline repository. 4.17 thus looks to be a typically busy development cycle, with a merge window only slightly more busy than 4.16 had. Some 6,000 of those changes were pulled after last week’s summary was written.

    • Linux Foundation

      • Developers: Prepare Your Drivers for Real-Time Linux

        Although Real-Time Linux (RT Linux) has been a staple at Embedded Linux Conferences for years — here’s a story on the RT presentations in 2007 — many developers have viewed the technology to be peripheral to their own embedded projects. Yet as RT, enabled via the PREEMPT_RT patch, prepares to be fully integrated into the mainline kernel, a wider circle of developers should pay attention. In particular, Linux device driver authors will need to ensure that their drivers play nice with RT-enabled kernels.

        At the recent Embedded Linux Conference in Portland, National Instruments software engineer Julia Cartwright, an acting maintainer on a stable release of the RT patch, gave a well-attended presentation called “What Every Driver Developer Should Know about RT.” Cartwright started with an overview of RT, which helps provide guarantees for user task execution for embedded applications that require a high level of determinism. She then described the classes of driver-related problems that can have a detrimental impact to RT, as well as potential resolutions.

        One of the challenges of any real-time operating system is that most target applications have two types of tasks: those with real-time requirements and latency sensitivity, and those for non-time critical tasks such as disk monitoring, throughput, or I/O. “The two classes of tasks need to run together and maybe communicate with one another with mixed criticality,” explained Cartwright. “You must resolve two different degrees of time sensitivity.”

        One solution is to split the tasks by using two different hardware platforms. “You could have an Arm Cortex-R, FPGA, or PLD based board for super time-critical stuff, and then a Cortex-A series board with Linux,” said Cartwright. “This offers the best isolation, but it raises the per unit costs, and it’s hard to communicate between the domains.”

      • Clarifying the Linux Real Time Issue

        I recently posted an article about the increasing development and availability of Linux-powered automation devices. This is a clear industry trend that’s unavoidable for anyone following the automation technology industry.

        Shortly after posting the article, I heard from a reader who wrote: “I read your article and I am surprised that you would promote the idea that anyone would use Linux for anything critical. It isn’t even a real-time control system. It can be used for non-critical applications, but the article implies that industry is adopting it for everything.”

        This reader brings up a valid point. Linux is not a real-time OS in and of itself. As Vibhoosh Gupta of GE Automation & Controls noted in the original article, GE uses “Type 1 hypervisor technology to run a real-time OS, such as VxWorks, running traditional control loops alongside our PAC Edge technology operating on Linux.”

        [...]

        The Linux Foundation launched the RTL (Real Time Linux) Collaborative Project in October 2015. According to the Foundation, the project was “founded by industry experts to advance technologies for the robotics, telecom, manufacturing and medical industries. The aim of the RTL collaborative project is mainlining the PREEMPT_RT patch.”

        While there are plenty of mission critical applications running Linux OS with real-time extensions—as highlighted by GE, Opto and Wago—the Linux Foundation notes on its site that there remains “much work to be done.”

      • Linux Launches Deep Learning Foundation For Open Source Growth In AI

        The Linux Foundation has launched the LF Deep Learning Foundation, an umbrella organisation which will support and sustain open source innovation in artificial intelligence, machine learning, and deep learning. The organisation will strive to make these critical new technologies available to developers and data scientists everywhere, said a statement published by LF.

        Founding members of LF Deep Learning include Amdocs, AT&T, B.Yond, Baidu, Huawei, Nokia, Tech Mahindra, Tencent, Univa, and ZTE, among others. LF Deep Learning, members are working to create a neutral space where makers and sustainers of tools and infrastructure can interact and harmonise their efforts and accelerate the broad adoption of deep learning technologies.

      • OpenTracing: Distributed Tracing’s Emerging Industry Standard

        What was traditionally known as just Monitoring has clearly been going through a renaissance over the last few years. The industry as a whole is finally moving away from having Monitoring and Logging silos – something we’ve been doing and “preaching” for years – and the term Observability emerged as the new moniker for everything that encompasses any form of infrastructure and application monitoring. Microservices have been around for a over a decade under one name or another. Now often deployed in separate containers it became obvious we need a way to trace transactions through various microservice layers, from the client all the way down to queues, storage, calls to external services, etc. This created a new interest in Transaction Tracing that, although not new, has now re-emerged as the third pillar of observability.

      • There’s a Server in Every Serverless Platform [Ed: "Serverless" is a lie. It's a server. One that you do not control; one/s that control/s you. Even Swapnil finally or belatedly gets it. The LF really likes buzzwords.]

        Serverless computing or Function as a Service (FaaS) is a new buzzword created by an industry that loves to coin new terms as market dynamics change and technologies evolve. But what exactly does it mean? What is serverless computing?

      • Take the Open Source Job Survey from Dice and The Linux Foundation

        Interest in hiring open source professionals is on the rise, with more companies than ever looking for full-time hires with open source skills and experience. To gather more information about the changing landscape and opportunities for developers, administrators, managers, and other open source professionals, Dice and The Linux Foundation have partnered to produce two open source jobs surveys — designed specifically for hiring managers and industry professionals.

    • Graphics Stack

      • Jim Keller Reportedly Joins Intel After AMD, Tesla Stint

        Legendary CPU designer Jim Keller has reportedly joined Intel following his brief stint at Tesla after leading the Zen team at AMD.

      • AMDGPU Linux Kernel Driver Gets Patches For Vega M Support – Intel Kabylake G

        Earlier this month Vega M support came to RadeonSI OpenGL, with Vega M being the Radeon graphics found within Intel’s Kabylake G processors. There was then Vega M support for the RADV Vulkan driver but these user-space drivers won’t work without the kernel bits and now there is that support with 32 AMDGPU DRM patches.

        Alex Deucher of AMD last night mailed out the AMDGPU Direct Rendering Manager driver patches for supporting accelerated graphics on Vega M / Kabylake G. These patches are fairly straight-forward and mostly involve support for loading new firmware files for “VegaM” and then mostly taking the driver’s existing Polaris code-paths. Yes, the GPU for Intel is advertised as being part of the “Vega” family, but from the RadeonSI/RADV/AMDGPU driver patches, the indications are that it’s really more in common with Polaris at least from the driver perspective.

      • NVIDIA 396.18.05 Linux Vulkan Driver Released With Fixes

        Just a week after the NVIDIA 396.18.02 Linux driver beta is an updated Linux driver build (and for Windows too).

      • X.Org Server 1.20 Git Corrects DRI3 Fallout For Non-Modesetting DDX Drivers

        With the recent release candidates to the long overdue X.Org Server 1.20, OpenGL rendering has been broken when using DDX drivers like Intel and Nouveau rather than the generic xf86-video-modesetting. That was fixed today.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • 3 Students Accepted for Google Summer of Code 2018

        Since 2006, we have had the opportunity for Google to sponsor students to help out with Krita. For 2018 we have 3 talented students working over the summer. Over the next few months they will be getting more familiar with the Krita code base and working on their projects. They will be blogging about their experience and what they are learning along the way. We will be sure to share any progress or information along the way.

        Here is a summary of their projects and what they hope to achieve.

      • Plasma widgets – Beltway Bandit Unlimited

        The concept of addons is an interesting one. At some point over the past decade or two, companies developing (successful) software realized that bundling an ever-growing code base into their products in order to meet the spiraling tower of requests from their users would result in unsustainable bloat and complexity that would not warrant the new functionality. And so, the idea of addons was born.

        Addons come in many flavors – extensions, plugins, applets, scripts, and of course, widgets. A large number of popular programs have incorporated them, and when done with style, the extra functionality becomes as important as the core application itself. Examples that come to mind: Firefox, Notepad++, VLC, Blender. And then, there’s the Plasma desktop environment. Since inception, KDE has prided itself on offering complete solutions, and the last incarnation of its UI framework is no different. Which begs the question, what, how and why would anyone need Plasma widgets? We explore.

        [...]

        Conclusion

        A good mean needs no seasoning, indeed. And Plasma is a proof of that, with the widgets the best example. Remarkably, this desktop environment manages to juggle the million different usage needs and create a balanced compromise that offers pretty much everything without over-simplifying the usage in any particular category. It’s a really amazing achievement, because normally, the sum of all requests is a boring, useless muddle.

        Plasma’s default showing is rich, layered, complex yet accessible, and consistent. And that means it does not really need any widgets. This shows. The extras are largely redundant, with some brilliant occasional usage models here and there, but nothing drastic or critical that you don’t get out of the box. This makes Plasma different from most other addons-blessed frameworks, as they do significantly benefit from the extras, and in some cases, the extensions and plugins are critical in supplementing the missing basics.

        And so, if you wonder, whether you’ll embark on a wonderful journey of discovery and fun with Plasma widgets, the answer is no. Plasma offers 99% of everything you may need right there, and the extras are more to keep people busy rather than give you anything cardinal. After all, if it’s missing, it should be an integral part of the desktop environment, and the KDE folks know this. So if you’re disappointed with this article, don’t be. It means the baseline is solid, and that’s where you journey of wonders and adventure should and will be focused.

      • My KDE PIM Update

        This blog post is long overdue, but now that I’m back home from the KDE PIM Sprint in Toulouse, which took place last weekend, there’s some more news to report.

      • KDAB at QtDay 2018

        QtDay is the yearly Italian conference about Qt and Qt-related technologies. Its 2018 edition (the seventh so far!) will be once more in the beautiful city of Florence, on May 23 and 24. And, once more, KDAB will be there.

      • Google Summer of Code 2018 with KDE

        It’s been 2 days since the GSoC accepted student list was announced and I’m still getting goosebumps thinking about the moment I saw my name on the website.

        I started contributing to open source after attending a GSoC session in our college by one of our senior and a previous GSoC student with KDE: Aroonav Mishra. I was very inspired by the program and that defined the turning point of my life.

        [...]

        Then I came across GCompris and it caught my eye. I started contributing to it and the mentors are really very helpful and supportive. They always guided me whenever I needed any help or was stuck at anything. Under their guidance, I learnt many things during the period of my contributions. I had never thought I would get this far.

    • GNOME Desktop/GTK

      • Dependencies with code generators got a lot smoother with Meson 0.46.0

        Most dependencies are libraries. Almost all build systems can find dependency libraries from the system using e.g. pkg-config. Some can build dependencies from source. Some, like Meson, can do both and toggle between them transparently. Library dependencies might not be a fully solved problem but we as a community have a fairly good grasp on how to make them work.

        However there are some dependencies where this is not enough. A fairly common case is to have a dependency that has some sort of a source code generator. Examples of this include Protocol Buffers, Qt’s moc and glib-mkenums and other tools that come with Glib. The common solution is to look up these binaries from PATH. This works for dependencies that are already installed on the system but fails quite badly when the dependencies are built as subprojects. Bootstrapping is also a bit trickier because you may need to write custom code in the project that provides the executables.

      • Expanding Amtk to support GUIs with headerbar

        I initially created the Amtk library to still be able to conveniently create a traditional UI without using deprecated GTK+ APIs, for GNOME LaTeX. But when working on Devhelp (which has a modern UI with a GtkHeaderBar) I noticed that some pieces of information were duplicated in order to create the menus and the GtkShortcutsWindow.

      • GLib/GIO async operations and Rust futures + async/await

        Unfortunately I was not able to attend the Rust+GNOME hackfest in Madrid last week, but I could at least spend some of my work time at Centricular on implementing one of the things I wanted to work on during the hackfest. The other one, more closely related to the gnome-class work, will be the topic of a future blog post once I actually have something to show.

      • Introducing Chafa
      • Infra Hackfest
      • Madrid GNOME+Rust Hackfest, part 3 (conclusion)

        I’m back home now, jetlagged but very happy that gnome-class is in a much more advanced a state than it was before the hackfest. I’m very thankful that practically everyone worked on it!

      • GNOME loves Rust Hackfest in Madrid

        The last week was the GNOME loves Rust hackfest in Madrid. I was there, only for the first two days, but was a great experience to meet the people working with Rust in GNOME a great community with a lot of talented people.

      • GNOME Mutter 3.29.1 Now Works With Elogind, Allows For Wayland On Non-Systemd Distros

        GNOME Mutter 3.29.1 has been released as the first development snapshot of this window manager / compositor in the trek towards GNOME 3.30.

        Mutter 3.29.1 overshot the GNOME 3.29.1 release by one week, but for being a first development release of a new cycle has some pretty interesting changes. Among the work found in Mutter 3.29.1 includes:

        - Mutter can now be built with elogind. That is the systemd-logind as its own standalone package. This in turn allows using Mutter with its native Wayland back-end on Linux distributions using init systems besides systemd.

  • Distributions

    • Screenshots/Screencasts

      • What’s New in Calculate Linux 17.22.2

        Calculate Linux 17.12.2 KDE Edition is the latest release of Linux distribution based on Gentoo, Calculate Linux 17.12 series. This release uses KDE plasma 5.11 as default desktop environment, along with KDE Frameworks 5.43 and KDE Applications 17.08.3. Powered by the long-term supported Linux 4.14 series, which means that it offers support for the latest hardware components available on the market. Also include graphical tool for network acces to the Calculate utilities 3 server, Calculate Console 3.5 series.

    • Red Hat Family

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • What’s New in Ubuntu 18.04 LTS Bionic Beaver

            Have a look at the new features coming to Ubuntu 18.04 LTS.

          • Welcome To The (Ubuntu) Bionic Age: Behind communitheme: interviewing Aaron

            I’m Aaron Papin and I’m from Trinidad and Tobago. I work at an IT consultancy that specializes in open-source solutions for SMBs. I’m a technician, but I also work in designing and deploying websites and even on ads from time to time. It’s pretty freeform and fun.

            I knew of Linux for years, but I only dove in after a hard drive failure a couple years ago. Because why not at that point? It didn’t take me long to start using it mostly full time (games). Even though I’ve worked on my own themes in the past, I’m still pretty new to the Linux community. Hobby-wise, I really like TV, cooking, video games and keeping fit when I’m not on an “extended break”.

          • Purism and UBports officially collaborate to offer Ubuntu Touch on Librem 5

            Purism and UBports are partnering to offer Ubuntu Touch as a supported operating system on Purism’s Librem 5 smartphone.

            Being able to work with Purism and focus on the Librem 5 hardware platform ensures that the Ubuntu Touch mobile operating system developed by UBports will be well supported, tightly integrated, and that future compatibility will remain. When the Librem 5 is delivered to pre-order customers, it will become one of just a few smartphones that support the free and open source operating system.

          • Open Source Smartphone Librem 5 Will Officially Support Ubuntu Touch

            When Canonical decided to halt the development of Ubuntu Touch mobile operating system, it came as a surprise to many. However, due to the lack of interest of smartphone manufacturers and community, this tough decision was taken. Later, UBPorts decided to take up the Ubuntu Touch development work.

          • Purism Partners with UBports to Offer Ubuntu Touch on the Librem 5, Red Hat Storage One Launches and More

            Purism has partnered with UBports to offer Ubuntu Touch on its Librem 5 smartphone. By default, the smartphone runs Purism’s PureOS, which supports GNOME and KDE Plasma mobile interfaces. UBports is ensuring Ubuntu Touch will run on the phones as well, so the Librem 5 can “now offer users three fully free and open mobile operating system options”.

          • Checking Out Ubuntu 18.04′s Hardware/Software Software Survey

            Back in February was the controversial announcement that Canonical would begin offering a hardware/software survey for Ubuntu installations to premiere with Ubuntu 18.04 LTS. This week while running some benchmarks of the effectively final release of Bionic Beaver, I noticed they finally got the feature exposed to users. Here’s what it looks like and some of the hardware and software information detailed in these opt-out reports to Canonical.

            Back in February the plan was to add a checkbox (checked by default) where the user could opt-out of the hardware/software survey, but otherwise various system details would be submitted to Canonical’s servers, but they would not be recording the user’s IP address. In the form it’s now in for the Ubuntu 18.04 LTS release, it’s not part of the installer but has been punted off to be part of the first-run process when initially logging into your new Ubuntu system – thereby offering the survey to those that may have received Ubuntu through an OEM install, etc.

          • How to Move Ubuntu’s Launcher Bar to the Bottom or Right
          • How to Install and Configure OpenSSH on Ubuntu 16.04
          • How to Manage Docker Containers using Portainer on Ubuntu
          • How to Use Sensu and RabbitMQ on Ubuntu to Monitor Your WordPress Website
          • How to Install PyroCMS on Ubuntu Linux
          • How to Find Packages Owns Specific File on Ubuntu
          • Install Dropbox In Ubuntu 18.04 LTS Server
          • Things to do After Installing Ubuntu 18.04

            This list of things to do after installing Ubuntu 18.04 helps you get started with Bionic Beaver for a smoother desktop experience.

          • How to Upgrade from Ubuntu 17.10 or Ubuntu 16.04 LTS to Ubuntu 18.04 LTS

            Before we go through the upgrade process in more detail, there are a few things you should know. First and foremost, make sure you have a recent backup of your most important files on an external drive, do it now! Second of all, if you’re upgrading from Ubuntu 16.04 LTS, you’ll have to deal with some major desktop changes if you use Unity.

            Ubuntu 16.04 LTS (Xenial Xerus) uses the Unity desktop environment by default, but Ubuntu 18.04 LTS uses the GNOME desktop environment with a highly customized interface to make it look like Unity, which Canonical said it won’t be removed during the upgrade process and will remain available as an alternative if you still want to use it.

          • Ubuntu 18.04 LTS is out

            Ubuntu 18.04 LTS has been released. The new version of Ubuntu is available in Desktop, Server, Cloud and core variants, and it is a long-term support release which means that the Desktop, Server, Core and Kylin releases will be supported for five years until April 2023.

            You can download the release version by following links in the release notes. The main Ubuntu website and download pages have yet to be updated.

            Ubuntu systems running Ubuntu 16.04 LTS or Ubuntu 17.10 can be upgraded in the following way

          • 14 Biggest Features Of Ubuntu 18.04 LTS Bionic Beaver

            Ubuntu 18.04 is scheduled to arrive today. When Canonical will offically release the OS, we’ll be updating this article with download links (they’ll be available here). Till then, get to know about all the biggest Ubuntu 18.04 features.

  • Devices/Embedded

Free Software/Open Source

  • What Do High School Students Know or Understand about Open Source Software?

    Only 20 years after the label “Open Source” was coined, the entire tech ecosystem has embraced its values of sharing, collaboration and freedom. Although Open Source Software is pervasive to our everyday life, does everyone and especially the younger generation realize how to leverage it?

    Last summer, over the course of 3 weeks, High School students with no prior experience in Computer Science (CS) joined Holberton School’s first Immersion Coding Camp to learn how to code and build their own website.

  • TIBCO Messaging now supports Apache Kafka

    Apache Kafka is a distributed open source publish-subscribe messaging system designed to replace traditional message brokers – as such, it can be classed as a stream-processing software platform. The project aims to provide a unified, high-throughput, low-latency platform for handling real-time data feeds. It is written in the Scala and Java programming languages.

  • Former Nimble CEO Becomes New Leader Of Open-Source Container Vendor Sysdig
  • Propy Announces An Open Source Developer Program and gets listed on Bittrex

    On April 17, 2018, global real estate store with a decentralized title registry Propy announced their open source Developer Program. The news were followed by an announcement from Bittrex, the most popular U.S.-based blockchain trading platform, on listing the PRO token. Propy users need tokens to execute the purchase process for real estate, located in California, as of today.

    The idea behind Propy: it allows anyone to buy or sell real estate, anywhere, online. Propy provides an efficient crypto and fiat payment and an immutable record on the blockchain, ensuring that title deeds and property rights will be there forever.

  • Robo-Taxi Startup Voyage to Make its Autonomous Safety Systems Open Source

    Silicon Valley startup Voyage, which recently launched a pilot autonomous ride-hailing service in two retirement communities in California and Florida, is taken a proactive, safety first approach. Starting today, the company announced today it is opening its safety requirements, test scenarios, metrics, tools, and source code that it has developed for its own autonomous taxis.

  • Voyage open sources its approach to autonomous vehicle safety

    In an effort to improve autonomous vehicle safety, Voyage is open sourcing its Open Autonomous Safety (OAS) library that contains the company’s internal safety procedures, materials, and test code that is intended to supplement the existing safety programs at autonomous vehicle startups. Voyage is the self-driving business from the educational organization Udacity.

  • Events

  • Web Browsers

    • Mozilla

      • Firefox release speed wins

        Sylvestre wrote about how we were able to ship new releases for Nightly, Beta, Release and ESR versions of Firefox for Desktop and Android in less than a day in response to the pwn2own contest.

        People commented on how much faster the Beta and Release releases were compared to the ESR release, so I wanted to dive into the releases on the different branches to understand if this really was the case, and if so, why?

        [..]

        We can see that Firefox 59 and 60.0b4 were significantly faster to run than ESR 52 was! What’s behind this speedup?

  • Oracle/Java/LibreOffice

    • LibreOffice 6.1 Alpha 1 Is Ready To Roll For Advancing The Open-Source Office

      LibreOffice 6.1 Alpha 1 was tagged overnight as the first development release towards this next updated open-source office suite release succeeding the big LibreOffice 6.0.

      LibreOffice 6.1.0 is set to be released by the middle of August and for that to happen the alpha release has now been hit followed by the beta release this time next month, and the release candidates to come through the month of July. The feature freeze and branching occurs at next month’s beta stage while the hard code freeze is expected for the middle of July.

  • Pseudo-Open Source (Openwashing)

  • BSD

  • Public Services/Government

    • Should we open source election software?

      Late last year, R. James Woolsey and Brian Fox wrote an op-ed piece about the security benefits of open sourcing election software. Woolsey is a former director of the Central Intelligence Agency. Fox is the creator of several open source components, including the GNU Bash shell, and a board member of the National Association of Voting Officials.

      Woolsey and Fox assert as a main piece of their argument that open source software exposes the code to the larger developer community, allowing many eyes to comb through that code for security vulnerabilities, transparency that makes it more secure than software developed by commercial organizations.

      If the open source model for voting systems gains traction, as the editorial advocates, effective management of open source security will become extremely important. At the 2017 DEF CON 25 convention it took only a few hours for white hat hackers to break into five different voting machines, one via a vulnerability in an open-source component.

      The reality is that all software, whether developed in a transparent manner or otherwise, contains defects. Regardless of available resources and expertise, uncovering a defect can be challenging.

  • Programming/Development

    • Node.js announces the first release in its latest 10.x release line

      Node.js has announced 10.0.0, the first release in its 10.x line. Starting in October 2018, the Node.js 10.x releases will be the new release line with Long Term Support. Releases in the Long Term Support line focus on stability, extended support, and providing a reliable platform for applications of any scale.

    • Enhance your Python with an interactive shell

      The Python programming language has become one of the most popular languages used in IT. One reason for this success is it can be used to solve a variety of problems. From web development to data science, machine learning to task automation, the Python ecosystem is rich in popular frameworks and libraries. This article presents some useful Python shells available in the Fedora packages collection to make development easier.

    • Best Free Python Web Frameworks – Rapid Development

      Python is an increasingly popular programming language. It ranks very highly on sites listing the popularity of programming languages, such as the TIOBE Index, IEEE Spectrum ranking, and the PYPL PopularitY of Programming Language.

      The prominence of Python is, in part, due to its flexibility, with the language frequently used by web and desktop developers, system administrators, data scientists, and machine learning engineers. It’s easy to learn and powerful to develop any kind of system with the language. Python’s large user base offers a virtuous circle. There’s more support available from the open source community for budding programmers seeking assistance.

    • Intel OpenCL NEO Compute Stack Moves To “Production” Quality OpenCL 2.1

      This year Intel open-sourced their “NEO” OpenCL compute stack included a new compute runtime, a new LLVM/Clang-based compiler, makes use of the Intel Graphics Memory Management Library (GMMLIB), etc. While we don’t hear too much from the NEO effort on an ongoing basis, their OpenCL 2.1 support for recent hardware generations is now to production quality.

      From early March was my last reporting and testing on the Intel OpenCL NEO effort in Trying Out The New Intel Open-Source OpenCL NEO Compute Driver.

    • GitLab 10.7 Released with Open Source Web IDE and Extended SAST Support
    • GCC 8.1 RC1 Released, The Big Compiler Update Could Officially Debut Next Week

      This morning I wrote about GCC 8 being branched and development on the master branch now being open for GCC 9.0. The GCC 8.1 release candidate has now been issued with the official release perhaps coming next week.

      Jakub Jelinek of Red Hat announced on the mailing list that they reached zero P1 regressions (the most critical) and less than 100 P2/P3 regressions, so the GCC 8 code was branched. As part of this status report he mentioned that if no show-stopper bugs appear, the developers would like to officially release GCC 8.1.0 by the end of next week or soon thereafter. But if any important fixes come about, a second release candidate may be warranted.

    • GCC 8 Has Been Branched, GCC 9.0 Development On Main

      The GNU Compiler Collection 8 stable release (GCC 8.1) is almost ready to make its debut.

      As of this morning, the GCC 8 code has been branched from master. The branched GCC 8 code is now marked as a pre-release.

Leftovers

  • L.A. Lawmakers Looking To Take Legal Action Against Google For Not Solving Long-Running City Traffic Problems

    The city’s government believes the traffic/mapping app has made Los Angeles’ congestion worse. That the very body tasked with finding solutions to this omnipresent L.A. problem is looking to hold a private third party company responsible for its own shortcomings isn’t surprising. If a third-party app can’t create better traffic flow, what chance do city planners have? But beyond the buck-passing on congestion, the city may have a point about Waze making driving around Los Angeles a bit more hazardous.

    For several months, it’s been noted that Waze has been sending drivers careening down the steepest grade in the city — Baxter Street. Drivers seeking routes around Glendale Ave. traffic choke points have been routed to a street with a 32% grade, increasing the number of accidents located there and generally resulting in barely-controlled mayhem. When any sort of precipitation falls from the sky, the city goes insane. Drivers bypassing Glendale are now hurtling down a steep, water-covered hill, compounding the problem.

  • Even Microsoft’s lost interest in Windows Phone: Skype and Yammer apps killed

    Microsoft’s given users of its collaboration apps on Windows Phone under a month’s warning of their demise.

    A support note from late last week advises that “Windows phone apps for Skype for Business, Microsoft Teams, and Yammer are retiring on May 20, 2018.”

    “Retiring” means all three will vanish from the Microsoft store on May 20, with differing results.

  • Health/Nutrition

    • Interpol Highlights Takedown Of Deadly Global Fake Food And Drink Operations [Ed: Interpol won’t arrest very rich individuals accused of serious crimes, or even a US President who abused women (then called it ‘fake news’), but it goes after ‘fake food’. If Interpol was serious about food health rather than protecting billionaires' food/beverage corporations from imitation/competition, it would also crack down on drinks with toxic chemicals like Coke ('diet' or otherwise).]

      Weevil-infested flour, deadly methanol added to alcohol, borax to make products seem fresher, pesticide-laced shrimp, fake medicines. Global police organisation Interpol today detailed a multi-agency operation that dismantled nearly 50 criminal networks worldwide that provided fake and substandard food and drink that put people in danger and killed dozens. Operation Opson, as the widespread was called, recovered some 3,620 tonnes and nearly 10 million litres of hazardous fake food and drink, with a value of EUR 55 million, it said in a release.

    • The Flint Water Crisis Isn’t Over

      Four years to the day that the Flint water crisis began, there has been notable progress. Multiple tests, both independent and government-run, have shown average lead levels dropping back below the federal action level as a result of switching the city from the highly corrosive Flint River back to the safe and clean Detroit water system. In response to the testing, Gov. Rick Snyder recently announced that the state would no longer provide free bottled water to the city’s residents, but it would continue to provide water filters free of charge.

      But many of the city’s residents don’t much believe the water’s safe. Who can blame them? Because of decisions made by state-appointed emergency managers and the Michigan Department of Environmental Quality, they were forced to use water laced with dangerously high levels of lead, a potent neurotoxin, and contaminated by bacteria that cause Legionnaires’ disease, which claimed at least 12 lives during the 18 months the city used the Flint River as its municipal water source. Despite the concerns voiced by residents and mounting scientific evidence that a massive problem existed, those same officials repeatedly offered assurances that the water was safe and attacked the credibility of those attempting to reveal the truth.

  • Security

    • Security updates for Wednesday
    • Hackers Leaked The Code Of iPhone Cracking Device “GrayKey”, Attempted Extortion

      The mysterious piece of hardware GrayKey might give a sense of happiness to cops because they can get inside most of the iPhone models currently active, including the iPhone X.

      The $30,000 device is known to crack a 4-digit iPhone passcode in a matter of a few hours, and a six-digit passcode in 3 days, or possibly 11 hours in ideal scenarios. That’s why security experts suggest that iOS users should keep an alphanumeric passcode instead of an all-number passcode.

    • Someone Is Trying to Extort iPhone Crackers GrayShift With Leaked Code

      Law enforcement agencies across the country are buying or have expressed interest in buying GrayKey, a device that can unlock up-to-date iPhones. But Grayshift, the company that makes the device, has attracted some other attention as well.

      Last week, an unknown party quietly leaked portions of GrayKey code onto the internet, and demanded over $15,000 from Grayshift—ironically, the price of an entry-level GrayKey—in order to stop publishing the material. The code itself does not appear to be particularly sensitive, but Grayshift confirmed to Motherboard the brief data leak that led to the extortion attempt.

    • It’s not you, it’s Big G: Sneaky spammers slip strangers spoofed spam, swamp Gmail sent files

      Google has confirmed spammers can not only send out spoofed emails that appear to have been sent by Gmail users, but said messages also appear in those users’ sent mail folders.

      The Chocolate Factory on Monday told The Register that someone has indeed created and sent spam with forged email headers. These not only override the send address, so that it appears a legit Gmail user sent the message, but it also mysteriously shows up in that person’s sent box as if they had typed it and emitted themselves. In turn, the messages would also appear in their inboxes as sent mail.

    • Cilium 1.0 Advances Container Networking With Improved Security

      For last two decades, the IPtables technology has been the cornerstone of Linux networking implementations, including new container models. On April 24, the open-source Cilium 1.0 release was launched, providing a new alternative to IPtables by using BPF (Berkeley Packet Filter), which improves both networking and security.

      The Cilium project’s GitHub code repository defines the effort as Linux Native, HTTP Aware Network Security for Containers. Cilium development has been driven to date by stealth startup Covalent, which is led by CEO Dan Wendlandt, who well-known in the networking community for his work at VMware on software-defined networking, and CTO Thomas Graf, who is a core Linux kernel networking developer.

    • Hijack of Amazon’s internet domain service used to reroute web traffic for two hours unnoticed

      Between 11am until 1pm UTC today, DNS traffic — the phone book of the [I]nternet, routing you to your favourite websites — was hijacked by an unknown actor.

    • Amazon Wants to Put Some Junk In Your Trunk

      Amazon wants inside your home. It wants to let other people inside your home. Now, it wants to deliver packages inside your car. Don’t worry, though. This one probably isn’t for you.

    • Suspicious event hijacks Amazon traffic for 2 hours, steals cryptocurrency

      Amazon lost control of a small number of its cloud services IP addresses for two hours on Tuesday morning when hackers exploited a known Internet-protocol weakness that let them to redirect traffic to rogue destinations. By subverting Amazon’s domain-resolution service, the attackers masqueraded as cryptocurrency website MyEtherWallet.com and stole about $150,000 in digital coins from unwitting end users. They may have targeted other Amazon customers as well.

    • PyRoMine malware disables security & mines Monero using NSA exploits [Ed: Microsoft Windows works for the NSA. Now it works for any cracker out there.]
    • Email security in 2018
    • Should You Build Your Own DIY Security System?
  • Defence/Aggression

    • How Many Millions Have Been Killed in America’s Post-9/11 Wars? Part 3: Libya, Syria, Somalia and Yemen

      In the first two parts of this report, I have estimated that about 2.4 million people have been killed as a result of the U.S. invasion of Iraq, while about 1.2 million have been killed in Afghanistan and Pakistan as a result of the U.S.-led war in Afghanistan. In the third and final part of this report, I will estimate how many people have been killed as a result of U.S. military and CIA interventions in Libya, Syria, Somalia and Yemen.

      Of the countries that the U.S. has attacked and destabilized since 2001, only Iraq has been the subject of comprehensive “active” mortality studies that can reveal otherwise unreported deaths. An “active” mortality study is one that “actively” surveys households to find deaths that have not previously been reported by news reports or other published sources.

    • Talk Nation Radio: Ray McGovern: Russia and U.S. Senators Want Disarmament, U.S. Media Does Not

      Ray McGovern explains how the media, the “blood-drenched arms merchants,” and the neocon “crazies” (like national security adviser John Bolton) have thwarted President Trump’s fledgling efforts, backed by three Senators, to respond positively to Putin’s offer to talk arms control.

      Ray also reveals information he’s learned from the ground in Syria about how many of those U.S., UK, and French missiles were shot down on April 14 before they reached their Syrian targets; he discusses the buffoonish l’Affaire Skripal with chemicals “of a type developed by Russia;” dismisses drivel from two Johns, McCain and Bolton, about alleged “Russian cyber-attacks” being an “act of war;” and Ray also give us a dose of nostalgia as he sings a bar from “Once in love with Amy.”

  • Transparency/Investigative Reporting

    • Cameroon: Govt Cracks Down on Social Media Leaks

      “It is not only about those who are leaking official information, but there has been [a] systematic crackdown against all those who try to dissent in Cameroon,” he said. “So it’s a very alarming situation, and civic space in Cameroon has been closing very considerably in the last few years.”

    • The WikiLeaks Shop is Accepting Litecoin (LTC)

      The official merchandising outlet for WikiLeaks has announced that it now is accepting Litecoin (LTC) for purchases.

      Charlie Lee, Litecoin founder, has been on a recruitment drive of late, putting out the call for merchants and businesses to begin accepting the LTC digital token for payments and purchases. It appears the WikiLeaks Foundation has jumped at the chance, having previously adopted Litecoin for the acceptance of donations alongside Bitcoin (BTC), ZCash (ZEC) and Monero (XMR)

      Consumers may now purchase WikiLeaks-related merchandise through six cryptocurrencies, Litecoin (LTC), Bitcoin (BTC), Bitcoin Cash (BCC), Ethereum (ETH), Monero (XMR) and ZCash (ZEC).

    • Court Summons Trump Campaign, Assange in Lawsuit by US Democrats – Documents

      The US District Court for the Southern District of New York has issued summons’ to 14 groups and individuals notifying them of the lawsuit filed by the Democratic National Committee (DNC) over alleged Russian interference and collusion with the Trump campaign in the 2016 election, court documents said on Wednesday.

  • Finance

    • Power-sucking Bitcoin ‘mines’ spark backlash

      But as the once-high-flying bitcoin market has waned, so too has the enthusiasm for bitcoin miners. Mining operations with stacks of servers suck up so much electricity that they are in some cases causing power rates to spike for ordinary customers. And some officials question whether it’s all worth it for the relatively few jobs created.

    • Mulvaney, Watchdog Agency’s Leader, Advises Bankers on Ways to Curtail It

      Mick Mulvaney, acting director of the bureau, also described the two types of people he was most responsive to as a lawmaker: constituents and the lobbyists who contributed to his campaign.

    • China, Russia Are Most Restricted Countries For Digital Trade, Index Says [Ed: Another "shame list" that seems a tad political, putting pressure on Russia and China based on how subservient they are to NATO/Western billionaires]

      A new European index measuring the extent to which 64 countries restrict digital trade found China at the top of the list, while New Zealand was the most open.

      The Digital Trade Restrictiveness Index was developed by the European Centre for International Political Economy (ECIPE). ECIPE espoused the view in the report that restricted trade drives up costs for businesses and consumers, while free digital trade gives more access to consumers and helps business become more efficient and reach more customers.

  • AstroTurf/Lobbying/Politics

    • The Hidden Hand of a Casino Company in Trump’s Contact with Vietnam — “Trump, Inc.” Podcast

      Trump’s first call with the Vietnamese prime minister was arranged by Marc Kasowitz, a Trump personal lawyer who has another client with business interests in Vietnam.

    • Comcast-Owned MSNBC Blasted For 8 Minute ‘News’ Love Letter to Comcast

      Cohen played the starring role in selling regulators on Comcast’s acquisition of NBC Universal in 2011, crafting conditions it would later be discovered Comcast ignored at its leisure. Cohen’s secret weapon during that transaction was Internet Essentials, a program that promised low-income households $10, 5 Mbps broadband for a limited time should they jump through a laundry list of conditions. The program was frequently criticized for being intentionally hard to qualify for, though it provided Cohen an endless sea of photo opportunities to help portray Comcast as a bottomless well of pure altruism.

      Cohen’s minority and low-income advocacy schtick was so effective, he ultimately nabbed the title of “Chief Diversity Officer” to help further advertise his selfless altruism. Of course that title also conveniently lets Cohen tap dance around flimsy federal lobbying rules, which require an employee register as a lobbyist if they spend more than 20% of their time lobbying for a single client during any three-month span. And again, when you point this out, I’ve found that Comcast tends to get really upset with you.

      The reality is that Comcast would need to do a hell of a lot more volunteering and donating to counter the obvious harm most of the company’s terrible policies have on the country. It’s indisputable that the company’s attacks on net neutrality and privacy protections will drive up costs and harm diverse media outlets and smaller businesses. Comcast’s support of protectionist state laws also routinely undermine efforts to bring competition to under-served broadband markets, driving up costs for everybody in the internet ecosystem (but especially the downtrodden parts of the country Comcast professes to adore).

    • Throwing the Target of Trolls Under the Zamboni

      Ten young players from the Broncos Bantam A hockey team of Humboldt, Saskatchewan, along with six coaches and other team staffers, died on April 6 when their bus collided with a tractor-trailer in Western Canada. Because young, prairie hockey players died, the awful tragedy unquestionably stirred Canadian national myths—enough to trigger the second-biggest GoFundMe campaign ever for the survivors and victims’ family, eventually topping CDN$15 million.

      Any guess how this horrible accident could lead a troll army to attack a female journalist with rape and death threats—in the name of “respect” and “compassion”—as a national newsweekly that had published that journalist threw her under the Zamboni without hesitation? If your answer includes the words “Neo-Nazi” and “Trump,” you’re obviously no stranger to Reality 2018.

      On April 8, only two days into the GoFundMe campaign, when the total raised had reached CDN$4 million, freelance journalist Nora Loreto tweeted: “This is a lot of money.” A lot, she seemed to be suggesting, in comparison to funds raised for the victims of other tragedies; for example, it took 14 months for GoFundMe to collect $402,173 for the 19 wounded and the families of the six people murdered by the Trump-loving Quebecois terrorist Alexandre Bissonette at a Quebec City mosque in January 2017.

    • ‘The US Is Not at All Interested in the Welfare of the Syrian People’

      Talking about Syria, it seems, is not so much having a conversation as occupying a narrative. Either Syria’s president, Bashar al-Assad, is the sole source of Syria’s pain, those who oppose him represent the true will of the Syrian people and critical outsiders are benighted; or Assad, though flawed, represents the people’s will, the rebels are if anything more cruel, and backed by foreigners to boot. Because the US lies, Russia cannot be lying—or else vice versa.

  • Censorship/Free Speech

  • Privacy/Surveillance

    • Uber Might Stop Drivers From Looking Up Your Address History

      Your Uber driver literally knows where you live, and they can look it up if they forget. Uber is considering changing the second point.

      Uber drivers can currently scroll through their driver history and see the exact places they picked up and dropped off people. Drivers can access this information even if you delete your Uber account. This has enabled stalking and other violations of privacy by drivers.

    • Uber Plans to Stop Giving Drivers a Log of Your Exact Pickup and Drop-Off Locations

      In a pilot program launching soon, Uber will begin obscuring riders’ exact pickup and drop-off locations in the trip history displayed to drivers. Instead, it will display a broader location area.

      The change is intended to enhance rider privacy and safety, the first of several upcoming changes Uber is making to limit the exposure of users’ location data.

      Currently, Uber drivers are given a record of the precise drop-off and pickup addresses in their trip history. The addresses are stored indefinitely in a driver’s trip history, which enables them go back at any time and look at a rider’s address. That data is maintained even if a rider deletes their account and data from Uber.

    • ISO blocks NSA’s latest IoT encryption systems amid murky tales of backdoors and bullying

      Two new encryption algorithms developed by the NSA have been rejected by an international standards body amid accusations of threatening behavior.

      The “Simon” and “Speck” cryptographic tools were designed for secure data to and from the next generation of internet-of-things gizmos and sensors, and were intended to become a global standard.

      But the pair of techniques were formally rejected earlier this week by the International Organization of Standards (ISO) amid concerns that they contained a backdoor that would allow US spies to break the encryption. The process was also marred by complaints from encryption experts of threatening behavior from American snoops.

    • Encryption for the ‘internet of things’ and a setback for the NSA

      Expert delegates at an International Organization for Standardization (ISO) meeting in Wuhan, China, voted against plans to adopt ‘Simon’ and ‘Speck’ as standard block cipher algorithms.

      The encryption methods, intended to improve security in technology that make up the “internet of things,” had been championed by the U.S. delegation, including the NSA.

    • ISO rejects the NSA’s IoT crypto standard, believing it to be backdoored

      The NSA has a history of sabotaging cryptographic standards; most famously, documents provided by Edward Snowden showed that the NSA had sabotaged NIST security standards, but the story goes farther back than that: I have been told by numerous wireless networking exercises that the weaknesses in the now-obsolete Wireless Encryption Protocol (WEP) were deliberately introduced by NSA meddling. And of course, the NSA once classified working cryptography as a munition and denied civilians access to it, until EFF got a court to declare code to be a form of protected speech under the First Amendment.

      Now, the NSA has been defeated at ISO, with its chosen ciphers firmly rejected by the committee members, who were pretty frank about their reason for rejecting Simon and Speck: they don’t trust the NSA.

    • Apple’s Consumer Data Collection Patents Prove that Data Privacy Risks Are Not Just a Facebook Problem

      In the current zeitgeist regarding the collection of user data by tech giants, a moment which has been fueled by concerns over Facebook’s Cambridge Analytica scandal, Cupertino, CA-based consumer electronics giant Apple Inc. (NASDAQ:AAPL) has been doing its best to appear to be a model citizen among the world’s tech titans. In the days following news of the Cambridge Analytica fiasco, Apple CEO Tim Cook said that he “wouldn’t be in this situation” when asked what he’d do if he were Facebook’s CEO at a town hall interview.

    • The Australian Bureau of Statistics Tracked People By Their Mobile Device Data.

      Remember the outrage about the ABS 2016 Census retaining real names and addresses? Maybe you thought the ABS got the message that the public seems to give more of a damn about privacy than public servants assume, and perhaps yanked themselves back into line?

    • Australian Gov’t Scooped Up Tons Of Cell Site Location Data To Track Citizens’ Movements

      Third-party records are almost always easily-accessible. They are subject to very limited protections. But generally when the government wants access to records, it’s because they’re targeting someone in a criminal or national security investigation. What few people expect is for the government to obtain this data en masse, then proudly proclaim its usefulness a couple of years after it’s already made use of it.

      Cellphone users weren’t informed of the government’s plans. And the telco made no effort to inform affected customers or give them an opportunity to opt out. While it may look like an innocuous effort to gauge temporary population increases linked to special events and holiday weekends, the information obtained could easily be mined to gain insight on traffic to places of worship, government buildings, airports, workplaces, and protests.

      Supposedly, the information has been anonymized. It obviously hasn’t been completely stripped of personal information. The slide deck [PDF] detailing the effort notes the data can be broken down by age and sex. The anonymization claim is made without any support from the ABS, which still has yet to provide any further info — much less a privacy impact assessment — via its website.

    • Why I’m Quitting Google, Amazon, Microsoft, Facebook, and Apple for a Month

      Despite my total dependence on these products, however, I also have a deep-seated distrust of the companies behind them.

    • The problem isn’t that Facebook is creepy, it’s that it’s creepy AND HUGE

      I’ve been giving some thought to how to break up Big Tech lately — what a competitive landscape would look like. I’ve been toying with the idea that we should test outcomes, rather than mandating measures: for example, there are a lot of people who can’t leave Facebook because it’s the only way they can access key services and communities. Maybe the answer is that any company whose users can’t leave it should be given a certain period to remedy that situation by whatever means it believes would work (e.g., creating an API that lets non-Facebook users interact with communities on Facebook), and when the time is up, evaluate whether the solution has worked, and if it hasn’t, hit the company with massive fines and give them another period to remedy the situation. Repeat until the company’s shareholders get tired and fire the CEO, or until no one has the “I can’t afford to leave Facebook” problem anymore.

    • I am not a number; I am a free man, OR, why you should never rely on social media

      In my post about switching to decentralized social media, I mentioned that I would later talk about G+.

      Yes, I know, most people don’t pay a lot of attention to G+ anyway, but that’s what really brought home something that I’d actually been saying since 2015: If you don’t personally own your website and data, you don’t have a website or data. Quite simply, you cannot rely on someone else for you to have a website, platform, or social media presence.

    • Oakbrook Center security scans license plates in its parking lots, raising privacy concerns

      Maass said potential privacy concerns over the type of system being used at Oakbrook Center include whether the system is being checked for cyber security, possible use of a third-party server for collected data, whether any stored photos taken may include more than a license plate, how long data is retained, whether notice of system use is posted and who is authorized to access data, including police.

    • Your Next Job Interview Could Be with a Racist Bot

      Maltby pointed out that employers have been misusing exciting new technology during the hiring process for decades. “Employers have a long history of falling in love with technology that promises easy answers to difficult decisions,” he said.

    • Gmail Is Getting a Long-Overdue Upgrade

      Google also plans to use artificial intelligence to identify the most urgent incoming emails, and allow you to limit mobile notifications to these. It will also try to identify mailing lists you can unsubscribe from by keeping tabs on how often you actually read messages from lists, and how long it takes you to open those messages.

    • Twitter announces updated privacy policy ahead of new EU laws

      The social media giant announced their new plans on Tuesday, but the policy update will go into effect on May 25 — the same day the European Union’s General Data Protection Regulation is set to go into effect.

    • The two-pizza rule and the secret of Amazon’s success

      AWS is large enough that it is dealt with on the same tier as the entire rest of the world. AWS is large enough that Netflix, a company that accounts for around a third of all internet traffic in North America, is just another customer.

    • Amazon will now deliver packages to the trunk of your car

      Amazon announced today a new service that gives its couriers access to a person’s vehicle for the purpose of leaving package deliveries inside. But rather than use smart locks and a cloud-connected camera to gain entry, Amazon wants to use the connected technologies embedded in many modern vehicles today. The company is launching this new service in partnership with two major automakers — General Motors and Volvo — and will be rolling out in 37 cities in the US starting today.

    • Amazon Will Start Delivering Packages Straight to Your Parked Car

      The two carmakers are logical partners for Amazon. GM has millions of cars that are wirelessly connected. With Volvo, the collaboration with Amazon is an expansion of a service that has been available in Sweden and Switzerland since 2015 through the Swedish carmaker’s Volvo On Call app.

    • Turns Out Lots Of People Want To Play The CIA’s Card Game

      Well, it appears we can both confirm and acknowledge that lots and lots of people want to play the CIA’s in-house training card game. As we announced on Monday, we’ve taken the available details of the internal CIA game Collection Deck, and are in the process of turning it a version you can actually play, which we’re renaming CIA: Collect It All. To see if anyone else actually wanted it, we put it on Kickstarter and set what we thought was a fairly high bar: $30,000. And yet, we hit that in about 40 hours and we still more than three and a half weeks to go. We’re a bit blown away by how many people are interested, and we’re committed to making the game as awesome as we can possibly make it. We recently posted an update to the campaign concerning questions around international shipping, since that’s been a big topic of conversation, so if you’re interested in that, go check it out.

      CIA: Collect It All on Kickstarter

    • CIA: Collect It All

      Ever wondered what it’s like to be a CIA operative? The CIA designed a classified card game which they use to train their analysts. They recently declassified it and we’re adapting the game so you can play it too.

      [...]

      This game is a collaboration between Techdirt and Diegetic Games. Techdirt has spent over 20 years reporting on a variety of topics including the CIA and its intelligence gathering, as well as the whole FOIA process — not to mention the importance of the public domain to encourage creative reuse of content. Diegetic Games makes storytelling and card games; it is Randy Lubin’s design studio. We’re excited to work together and bring this game to a wider audience.

  • Civil Rights/Policing

    • Epic Responds to Cheating Fortnite Kid’s Mom in Court
    • The Noisy Frenchman

      In the summer of 1975 I was sixteen years old and sitting on the edge of the fountain in the Aviemore Centre, waiting to fix a kiddie kart when it broke down or the coin mechanism jammed, and reading a Penguin edition of The Quiet American by Graham Greene. It detailed the origin of the US entry into the Vietnam conflict as the French colonial hold weakened, and of course the plot revolved around a false flag bombing incident designed to facilitate American intervention. The introduction to that edition made very clear that the novel was closely based on true events by Greene – who was there in Vietnam at the time – and in my memory across 43 years it actually named and discussed the real life false flag bomb incident on which the book was based. I do not think the existence of the real false flag bombing at the heart of the story has ever been seriously disputed. The novel was quite startling to a sixteen year old boy.

      It was impossible not to recall The Quiet American while watching Trump and Macron give their presser at the White House yesterday. Reinstating the role of France, the former colonial power, in Syria though a continuing US/French military presence was the main theme, under the guise of “preventing hegemony” – clearly aimed at Iran. The haunting parallels to Indo-China are striking. So too is the fact that Graham Greene was a deservedly admired figure in British culture and society. The BBC and the Times never attacked him as a “conspiracy theorist” or a lunatic for writing passionately of a false flag attack. This was partly because everybody understood these things actually do happen, and partly because in the early part of my life political dissent was permitted without social ostracism. The latter is no longer the case and an orchestrated media is trying to eradicate the former knowledge.

    • How an Oregon Weekly Forced Release of Key Records in Murder Cases

      Oregon sued a tiny newspaper to keep records secret relating to the state’s release of defendants found “guilty except for insanity.” The paper prevailed and is using the records to explore a series of troubling cases.

    • Oregon Doctors Warned That a Killer and Rapist Would Likely Attack Again. Then the State Released Him.

      Charles Longjaw was being held at the Oregon State Hospital after being found insane. Oregon changed its interpretation of the law and he was released, raising questions about how states manage violent offenders with mental illness.

    • Oregon Board Explains Why It Repeatedly Released Killer From Psychiatric Hospital

      In response to our questions, the Psychiatric Security Review Board explains why danger alone is not enough to keep violent people with mental illness under state jurisdiction.

    • Cops used dead man’s finger in attempt to access his phone. It’s legal, but is it okay?

      Armstrong, 28, happened to be at Sylvan Abbey Funeral Home in Clearwater the day two detectives showed up with Phillip’s phone, she said. They were taken to Phillip’s corpse. Then, they tried to unlock the phone by holding the body’s hands up to the phone’s fingerprint sensor.

    • EU Commission Outlines Approach On Artificial Intelligence [Ed: EU Commission is wasting time on buzzwords. It's just "computers" or "algorithms". But when you put nontechnical politicians in charge you get this...]

      The European Commission today issued an outline of a European approach on artificial intelligence to “boost investment and set ethical guidelines.” The aim is to have a coordinated plan with member states by year’s end.

    • State Appeals Court Upholds Criminal Conviction For Twitter Harassment Targeting An Autistic Student

      Another fine example of man’s inhumanity to man: high school edition. Trash rando A.J.B. ended up with two misdemeanor charges and one felony stalking charge — the latter predicated on the victim’s disabilities. There are a few concerns with the resulting ruling, not to mention the events leading up to the criminal charges.

      To begin with, the victim was not even aware of the tweets until a school administrator brought them to his attention. The administrator had presumably been tipped off by other students. This led to the victim expressing suicidal thoughts and an extreme reluctance to return to school.

      This dovetails into the court’s weird interpretation of Twitter mechanics. This confusion over how Twitter operates may have played a part in upholding the charges and finding A.J.B.’s speech unprotected by the Constitution. Eric Goldman points out this misapprehension allows the court to bypass the student’s free speech defenses, one of which compared tweeting unpleasant messages was no different than “posting flyers on walls.”

      [...]

      The law is bad and the court is reading the law as the legislators wrote it. This could also be the way the legislators intended it to be read, rationalizing that no prosecutor would move forward with questionable charges predicated on a broadly-written law with an absurdly low bar for engagement (two tweets). Legislators either don’t know or don’t care that prosecutorial discretion means pursuing ridiculous prosecutions and overcharging defendants. It almost never means refusing to move forward with questionable cases. If the ruling is bad, it’s because the law invites bad rulings. The fact that the court doesn’t understand how Twitter works only makes it worse.

    • State Trooper Facing Murder Charges After Tasing A Teen Riding An ATV

      More than two dozen hours of recordings and 600 pages of documents obtained by the Detroit Free Press have uncovered disturbing details of the senseless killing of 15-year-old Damon Grimes by Michigan State Trooper Mark Bessner last fall.

      Lots of killings are senseless, including many of those committed by officers authorized to use deadly force. But this one was especially senseless. Trooper Bessner decided against all policy and reason to fire his Taser at Grimes while both he and Grimes — riding an ATV — were traveling at 35 mph down a residential street. To add to the insanity of his act, Bessner was the passenger in the cruiser. Having initiated the pursuit, Bessner decided to end it by tasing Grimes. The result was the complete, gruesome destruction of a human being.

    • California Can Build Trust Between Police and Communities By Requiring Agencies to Publish Their Policies Online

      If we as citizens are more informed of police policies and procedures, and we can easily access those materials online and study them, it’ll lead to greater accountability and better relations between our communities and the police departments that serve us. EFF supports a bill in the California legislature which aims to do exactly that.

      [...]

      Last year, Gov. Jerry Brown vetoed a previous version of this bill, which had broad support from both civil liberties groups and law enforcement associations. The new bill is meant to address his concerns of the bill’s scope, and removes a few of the state law enforcement agencies from the law’s purview, like the Department of Alcoholic Beverage Control and California Highway Patrol, among others.

      We hope that the legislature will once again pass this important bill, and that Gov. Brown will support transparency and accountability between law enforcement and Californians.

    • The Legal Battle Over a $75 Boating Fine Where Liberty Itself Is at Stake

      The outcome of this case will impact one of our fundamental constitutional rights.

      On a pleasant May evening in 2016, Fred Karash and four friends were enjoying a boat trip on Lake Erie when, without warning, they were stopped by law enforcement officers and detained for more than an hour while the officers searched Fred’s 23-foot cabin cruiser.

      The officers, who admitted they had no reason to suspect the boaters had violated any law or regulation, claimed authority under state law to search any boat at any time on any Pennsylvania waterway to conduct a “safety inspection.”

      But that sort of unfettered discretion violates the Fourth Amendment, which protects against unwarranted and even vindictive government incursions upon our privacy by requiring that authorities have probable cause to search someone’s home or property. That safeguard, as the Pennsylvania Supreme Court has recognized, “is second to none in its importance in delineating the dignity of the individual living in a free society.”

    • 18 Years Removed From Prison, and I’m Still a ‘Returning Citizen’

      While I am sure that this was not the last thing said to me before I walked past the gun tower and through the barbed wire fence at the Pennsylvania State Correctional Institution at Camp Hill on January 12, 2000, it is certainly the last thing I clearly remember hearing upon my departure from prison.

      A friend of mine was waiting for me in the prison’s parking lot. I got in the car, and we drove silently for several hours towards Philadelphia where I was mandated to report to a halfway house, Community Corrections Center, for a minimum of 90 days.

  • Internet Policy/Net Neutrality

    • No, Net Neutrality Isn’t Officially Dead (Yet), And The FCC Is Stalling For A Reason

      My informed guess (supported by at least two industry lawyers I’ve spoken to) is that Pai is trying to buy time. Why? ISPs know that the FCC’s repeal is on shaky legal ground thanks in large part to bizarre FCC behavior and numerous ethical gaffes. ISPs like Comcast are also nervous about the fact that more than half the states in the country are now pursuing their own net neutrality rules. As such, ISP lobbyists and hired wonks are pushing for a fake, loophole-filled net neutrality law with one real purpose: pre-empting tougher state laws and preventing the 2015 rules from being re-established should the FCC lose in court.

      It’s likely the FCC bogged things down in bureaucracy intentionally to buy time for ISP lobbyists to try and drum up support for this bogus law. Unfortunately, as they have throughout this entire affair, ISPs appear to have misjudged the political environment here, and have faced a steep uphill climb in getting support for the crap law they wrote (incarnations of which are being pushed by Marsha Blackburn in the House and John Kennedy in the Senate).

      As ISPs grow more nervous about losing in court and state net neutrality efforts, calls for an ISP crafted “Congressional solution” have only grown. But by and large most net neutrality supporters on the streets and in Congress appear to not be falling for this little ruse, knowing full well that the chance of this cash-compromised Congress actually passing tough rules are virtually nonexistent.

      If you’re a fan of net neutrality, the best chance in saving the rules rests with a reversal by the courts during the looming court battle. Failing that, your best bet is voting in politicians that prioritize healthy competition, truly open markets, and consumer and small business welfare over monopoly protectionism and cronyism.

    • The FCC’s Bullshit Order Killing Net Neutrality Hasn’t Actually Gone Into Effect—Yet

      Among other things, the new rules would reclassify internet provision as a Title I instead of Title II information service, which would allow ISPs to implement paid prioritization programs, as well as block or throttle content from competitors or just about anyone they wager is using too much bandwidth. Broadband providers will mostly cease to be regulated by the FCC, and thereby be bound only by their own promises (the FCC cleverly passed most of its authority to penalize ISPs that lie to customers to the Federal Trade Commission, a separate agency ill-equipped to handle telecom issues).

    • Net neutrality is all but officially dead. Now what?

      The order is supposed to take effect Monday, following the commission’s publication of the final notice of the repeal in the Federal Register (which started a 60-day clock until the rules were removed). But only parts of the order are effective today. Significant parts still need OMB approval as part of the modified information collection requirement. The FCC will issue another order making it official when the OMB gives the green light.

      The most significant change resulting from the removal of the rules is the stripping away of the FCC’s authority to regulate broadband and the shifting of that responsibility to the Federal Trade Commission. Under the 2015 rules, the FCC reclassified broadband as a utility, which gave it the authority to regulate broadband infrastructure much as it did the old telephone network.

    • DOJ Investigating AT&T, Verizon for Making It Harder To Switch Wireless Carriers

      AT&T and Verizon have enjoyed a stranglehold over fixed and mobile residential broadband for years. They also enjoy a relative monopoly over broadband business data services, a market that services everything from cellular tower backhaul to ATMs. Given that both companies have a rich, deep history of engaging in all manner of dubious behavior to keep these markets as uncompetitive as possible, there would be absolutely no shortage of ammunition for regulators seeking to punish them on antitrust grounds.

      Given that both companies are politically powerful campaign contributors, that generally doesn’t happen, regardless of the party in power.

    • U.S. Investigating AT&T and Verizon Over Wireless Collusion Claim

      The Justice Department has opened an antitrust investigation into potential coordination by AT&T, Verizon and a telecommunications standards organization to hinder consumers from easily switching wireless carriers, according to six people with knowledge of the inquiry.

      In February, the Justice Department issued demands to AT&T, Verizon and the G.S.M.A., a mobile industry standards-setting group, for information on potential collusion to thwart a technology known as eSIM, said two of the people, who spoke on the condition of anonymity because the details are confidential.

      The technology lets people remotely switch wireless providers without having to insert a new SIM card into a device. AT&T and Verizon face accusations that they colluded with the G.S.M.A. to try to establish standards that would allow them to lock a device to their network even if it had eSIM technology.

  • Intellectual Monopolies

    • When fashion sought to protect itself through private collective action: recalling the Fashion Originators Guild

      The Guild was established in 1932 in the teeth of the Great Depression. After the laissez-faire administrations of Presidents Calvin Coolidge and Herbert Hoover, President Franklin Delano Roosevelt, through his New Deal, signaled that solutions for economic ills could be found in collective action. The Guild can be viewed against this backdrop. Its members designed and manufactured medium to high-priced dresses, for sale to retailers, who selected the merchandise from dresses that were shown in various showrooms in New York City. The members claimed that their dresses were all based on “original designs.” Under U.S. law, there was no copyright or patent protection. As such, according to the Guild, other dress manufacturers, which were called “style pirates”, designed and sold so-called “unauthorized” copies.

    • Copyrights

      • Standard Ebooks Offers Public Domain Downloads That Aren’t Ugly

        This site gets the details right. Every book also has a beautiful cover made using public domain artwork. Books are proofread by an actual human, meaning there aren’t weird typos caused by the scanning process. Everything has complete metadata. And there are platform-specific downloads for Kindle and Kobo, meaning all features of those platforms are properly supported.

      • AG Campos Sánchez-Bordona denies communication to the public in ‘Cordoba’ case

        A few months ago, this GuestKat reportedabout yet another CJEU case that tries to capture the scope of the right of communication to the public within Article 3 (1) of the InfoSoc Directive.

        In ‘Cordoba’, the plaintiff’s photograph was freely accessible to all internet users with his consent on a travel-related website. A student of a German school used this picture (without asking for permission) in a written report for her Spanish class. The report was subsequently copied to the school’s servers and from there added to the (public) website of the school.

      • Music publishers score major victory in closely watched copyright case [Ed: Music publishers" is a very nonsensical way to refer to people who exploit musicians without actually making any]
      • Ninth Circuit appeals court denies monkey’s copyright claims

        Barring an en banc review or Supreme Court intervention, the three-year monkey selfie saga has come to a close, with the animal’s copyright claims denied

        The Court of Appeals for the Ninth Circuit has affirmed the district court’s ruling that a monkey lacked statutory standing to claim copyright infringement of photographs known as the “Monkey Selfies”.

      • Academics Against Press Publishers’ Right: 169 European Academics Warn Against It – IVIR

        Academics from all over Europe give a final warning against the ill-conceived plans for the introduction of a new intellectual property right in news.

      • It’s Thanks To The Pirate Community That Amazon’s Attempt To Degrade Its Streaming Service Is Now Public

        It’s said that there is no honor among thieves, but it should be obvious that such a blanket axiom is bound to be at least partially bullshit. Still, this mantra gets applied to the pirating community by its enemies, with those that rip and/or view pirated content labeled as ungrateful kid-slobs, simply looking for any content they can gobble up without any payment whatsoever. Any value or benefit derived from this community is denied or ignored, with the spotlight being only on the inflated injury this same community inflicts on unimaginably wealthy companies and studios.

        Again, it should be obvious that this is all bound to be bullshit.

        In fact, we’ve discussed the potential benefits to be found within these communities often in the past. Pirate communities can be viewed as a sort of market study companies get for free, serve as a spotlight on under-served potential customers, and not to mention that this community often buys more content then does their non-pirating cousins. None of this is to excuse copyright infringement, of course, but rather serves to remind us that the world is not black and white, and is instead muddled, complicated, and mushy.

      • German Supreme Court: Adblocking does not violate copyright

        German newspapers had sued AdBlock Plus for everything including the kitchen sink, such as “unfair competition” and copyright violation, for letting users opt out of the newspapers’ annoying and insecure advertising. This week, those newspaper publishers lost decisively in the German Supreme Court.

      • German Supreme Court rules ad blockers legal, in defeat for Springer

        In its ruling the court in Karlsruhe struck down the case brought by Springer. It found online ad blockers to be legal, and overturned a lower court decision that operating a white list was tantamount to unfair competition.

      • German Supreme Court rules ad-blocking not unfair competition

        The German Federal Supreme Court has ruled that popular ad-blocking software AdBlock Plus does not break the country’s unfair competition rules

        The German Federal Supreme Court ruled on April 19 that popular ad-blocking software AdBlock Plus, which blocks banners, pop-ups and other advertisements, does not break the country’s unfair competition rules.

      • Thanks to streaming, recording industry revenues are back up to pre-internet levels, but musicians are poorer than ever

        Last year, the record industry gained an extra $1.4 billion in new revenues, mostly from streaming, restoring its overall revenues to pre-internet levels, when the labels had grown accustomed to reselling the same music every couple of years in new formats (vinyl, 8-track, cassette, CD). Overall, streaming services remit $7.4 billion to rightsholders.

      • Global Recorded Music Revenues Grew By $1.4 Billion in 2017
      • MPAA Chief Says Fighting Piracy Remains “Top Priority”

        With a record international box office of over $40 billion behind him, MPAA chief Charles Rivkin has told movie exhibitors at CinemaCon that keeping a lid on unauthorized sites is one of his group’s main goals. Describing the tackling of piracy as a “top priority”, Rivkin framed the ACE anti-piracy coalition as a powerful group ensuring that movie makers maintain control and reap the rewards for their hard work.

      • Japan ISP Says it Will Voluntarily Block Pirate Sites as Major Portal Disappears

        A major ISP in Japan says it will begin blocking pirate sites voluntarily. There is no legal basis for site-blocking and the country’s constitution forbids censorship. However, NTT says that it has adopted “emergency measures” until the necessary legislation can be put in place. Meanwhile, one of the sites targeted has mysteriously disappeared, abandoning 100m monthly visitors.

04.25.18

Battistelli Misuses EPO Budget to Saturate the European Media With Puff Pieces About His Event

Posted in Europe, Patents at 6:57 pm by Dr. Roy Schestowitz

Saint-Germain-en-Laye event

Summary: The latest examples of ‘synthetic’ coverage or fluff about Battistelli’s expensive event that he cryptically and mysteriously chose to have at his other workplace in Saint-Germain-en-Laye

THE EPO is in effect bribing the media, more so nowadays than ever before. It’s nothing entirely new however. Years ago we showed that the EPO had been paying IAM though PR firms.

EPO management deserves an “inventor of the year” award. It would be awarded for inventing ways to distract from scandals/abuses/corruption and silencing the media. It works! Well done, Mr. Battistelli! But at whose expense? And at what cost to society? It corrupts the fourth estate.

“EPO management deserves an “inventor of the year” award. It would be awarded for inventing ways to distract from scandals/abuses/corruption and silencing the media.”Last year we wrote about Microsoft-EPO connections in relation to software patents; years prior to that we showed other EPO scandals that were associated with Microsoft. Some EPO applicants find themselves having to become Microsoft customers just to be able to interact with the EPO. How abusive is this compared to more blatant examples of abuse?

Earlier this week we saw this Microsoft person named as European Inventor Award 2018 finalist. We were rather disgusted today just seeing the EPO puff pieces and press releases with the usual Battistelli quotes (it’s all about him, as usual). Yes, the usual Battistelli quotes (it’s all about him) are embedded in virtually all these pieces, e.g. this one: (maybe ghostwritten/PR-driven)

“Sans Takeuchi’s innovative work on energy storage and power sources is enabling life-saving technologies that benefit millions of heart-failure patients,” EPO President Benoît Battistelli said in a statement announcing the finalists.

Then there’s the Irish media [1, 2, 3], which might be working with the EPO’s PR agency in the UK. They’ve just hired one (again).

“Campinos’ EU organisation also helps promote the event of Battistelli — the near-literal heist that happens 3 weeks before Campinos takes Battistelli’s job (that he set up for him).”The EPO’s management — using money it habitually misuses — has co-opted the British Science Museum and other institutions in order to help promote Battistelli’s agenda. See these tweets from Roger Highfield [1, 2] and the posts these link to. Here’s an example from other institutions (indirect, but there are also direct examples).

This is not normal. It’s not like these institutions just search for some press releases and then decide to write about them. They work in coordination with (hand in glove) the EPO’s PR staff and external PR agencies. It’s all manufactured, it’s faked, it’s paid for.

“This often explains why particular publishers are so unwilling to cover serious cases of law-breaking, corruption, and so on.”Campinos’ EU organisation also helps promote the event of Battistelli — the near-literal heist that happens 3 weeks before Campinos takes Battistelli's job (that he set up for him). Some more retweets [1, 2] and originals from today follow that same pattern.

One of the key issues we’ve highlighted for over 3 years is that the EPO exploits cash repositories to buy positive publicity and create a financial dependence for publishers. This often explains why particular publishers are so unwilling to cover serious cases of law-breaking, corruption, and so on.

Battistelli’s EPO Continues to Promote Software Patents and Even Pays the Media to Play Along, Impacting Other Continents

Posted in Deception, Europe, Patents at 6:26 pm by Dr. Roy Schestowitz

Waste of stakeholders’ money and a source of shame for the EPO, which goes in the opposite direction of the USPTO and the EPC itself

A revolution
Referring to abstract patents as a “revolution” (as in “4IR”)

Summary: With silly new terms such as “4IR” (the EPO used to say “ICT”, “CII”, “Industry 4.0″ etc.) Team Battistelli is hoping to make software patents look/sound acceptable, honourable and inherently innovative or “revolutionary”

THE US moves further and further away from software patents — a subject we’ll revisit yet again in the weekend. The USPTO, even under newer leadership, does not intend to change that. It cannot. The highest court calls the shots.

But watch what the EPO has been doing today. It’s actively promoting software patenting at an event in the US. Totally inappropriate. It did it this morning and once again later in the day.

“This is a showing of how grotesque EPO corruption of media has gotten; it poisons everything worldwide.”The EPO’s buzzword of choice for software patents is nowadays “4IR” (we’ll show some time very soon how the EPO presents that in its Gazette). It’s an EPO-sourced of EPO-boosted buzzword (which it literally paid the media to promote) and it stands for ‘Fourth’ ‘Industrial’ ‘Revolution’, which means pretty much nothing. All these words are misnombers. It’s pure marketing.

This buzzword has just spread to Korea. This is a showing of how grotesque EPO corruption of media has gotten; it poisons everything worldwide. The Korea Bizwire has just published this nonsense and it ought to know that accelerating the granting of monopolies is not a desirable thing, especially not in technology (they mean software) where one has to be highly careful distributing monopoles. The Korean Intellectual Property Office (KIPO) does not allow software patenting, but what if it labeled these “4IR” like the EPO does?

From the article:

South Korea has cut short the patent application process for a number of technologies that are part of the so-called ‘Fourth Industrial Revolution’.

The Korean Intellectual Property Office (KIPO) launched a fast track today for patent applications for a select few technologies including 3D printing, self-driving, big data, cloud computing and the Internet of Things, allowing companies to obtain a patent in fewer than six months.

The fast track program is available for ongoing technology development projects and those by startups, as well as ones for which the KIPO has reached agreement with international intellectual property offices.

[...]

Other countries have taken similar steps. Japan launched an assessment team dedicated to technology patents last year, and set out new standards for software development this year, while China also ramped up efforts to protect software patents last year.

To explain the term “4IR” they just use some more buzzwords (one buzzword expanded to mean several others) and we remain concerned that this may eventually become ‘normal’.

“To explain the term “4IR” they just use some more buzzwords (one buzzword expanded to mean several others) and we remain concerned that this may eventually become ‘normal’.”The Knowledge Group (mentioned here several days ago) has just promoted this upcoming ‘webcast’ in which it will explain “How to implement it [2017 Actavis Decisions] in oral proceedings and submissions before the EPO…”

In the case of software, the EPO’s leadership already suggests using all sorts of buzzwords and then brainwashes patent examiners (we’ll show the contents of the Gazette some time soon) to urge them to accept software patent applications. In Seattle it’s about to explicitly give tips on how to achieve this.

Links 25/4/2018: Ubuntu 18.04 Coming Shortly, Fedora 28 Next Month

Posted in News Roundup at 6:53 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Configuring local storage in Linux with Stratis

    Configuring local storage is something desktop Linux users do very infrequently—maybe only once, during installation. Linux storage tech moves slowly, and many storage tools used 20 years ago are still used regularly today. But some things have improved since then. Why aren’t people taking advantage of these new capabilities?

    This article is about Stratis, a new project that aims to bring storage advances to all Linux users, from the simple laptop single SSD to a hundred-disk array. Linux has the capabilities, but its lack of an easy-to-use solution has hindered widespread adoption. Stratis’s goal is to make Linux’s advanced storage features accessible.

  • Desktop

    • Google looks set to offer Linux on Chromebooks in the next few months

      If that wasn’t enough, a new commit in the parent Chromium OS offers “new device policy to allow Linux VMs on Chrome OS.” Which about seals it.

      Read the accompanying Gerrit documentation and you get further confirmation: “At this time, in order for Linux VMs to run, the Finch experiment also needs to be enabled. After this feature is fully launched, the Finch control logic will be removed.”

  • Kernel Space

    • Linux 4.16.4
    • Linux 4.14.36
    • Linux 4.9.96
    • Linux 4.4.129
    • Linux 3.18.106
    • Graphics Stack

      • VC4 display, VC5 kernel submitted

        For VC5, I renamed the kernel driver to “v3d” and submitted it to the kernel. Daniel Vetter came back right away with a bunch of useful feedback, and next week I’m resolving that feedback and continuing to work on the GMP support.

        On the vc4 front, I did the investigation of the HDL to determine that the OLED matrix applies before the gamma tables, so we can expose it in the DRM for Android’s color correction. Stefan was also interested in reworking his fencing patches to use syncobjs, so hopefully we can merge those and get DRM HWC support in mainline soon. I also pushed Gustavo’s patch for using the new core DRM infrastructure for async cursor updates. This doesn’t simplify our code much yet, but Boris has a series he’s working on that gets rid of a lot of custom vc4 display code by switching more code over to the new async support.

      • V3D DRM Driver Revised As It Works To Get Into The Mainline Kernel

        Eric Anholt of Broadcom has sent out his revised patches for the “V3D” DRM driver, which up until last week was known as the VC5 DRM driver.

        As explained last week, the VC5 driver components are being renamed to V3D since it ends up supporting more than just VC5 with Broadcom VC6 hardware already being supported too. Eric is making preparations to get this VideoCore driver into the mainline Linux kernel and he will then also rename the VC5 Gallium3D driver to V3D Gallium3D.

      • AMDVLK Driver Gets Fixed For Rise of the Tomb Raider Using Application Profiles

        With last week’s release of Rise of the Tomb Raider on Linux ported by Feral Interactive, when it came to Radeon GPU support for this Vulkan-only Linux game port the Mesa RADV driver was supported while the official AMDVLK driver would lead to GPU hangs. That’s now been fixed.

        With the latest AMDVLK/XGL source code as of today, the GPU hang issue for Rise of the Tomb Raider should now be resolved.

      • xorg-server 1.19.99.905

        More bugfixes, and streams support for Xwayland. This will almost certainly be the last RC.

      • X.Org Server 1.20 RC5 Released, Adds EGLStreams To Let NVIDIA Work With XWayland

        Adam Jackson of Red Hat today announced the X.Org Server 1.20 Release Candidate 5, which he believes will be the last test release before going gold. Most excitingly about this new release candidate is the merged support for allowing the NVIDIA proprietary driver to work with XWayland.

    • Benchmarks

      • AMD Ryzen 7 2700X Linux Performance Boosted By Updated BIOS/AGESA

        With last week’s initial launch-day Linux benchmarks of the Ryzen 5 2600X / Ryzen 7 2700X some found the Linux performance to be lower than Windows. While the root cause is undetermined, a BIOS/AGESA update does appear to help the Linux performance significantly at least with the motherboard where I’ve been doing most of my tests with the Ryzen 7 2700X. Here are the latest benchmark numbers.

      • AMD Ryzen 7 2700X Linux Performance Boosted By Updated BIOS/AGESA

        With last week’s initial launch-day Linux benchmarks of the Ryzen 5 2600X / Ryzen 7 2700X some found the Linux performance to be lower than Windows. While the root cause is undetermined, a BIOS/AGESA update does appear to help the Linux performance significantly at least with the motherboard where I’ve been doing most of my tests with the Ryzen 7 2700X. Here are the latest benchmark numbers.

  • Applications

  • Distributions

    • New Releases

      • AV Linux Multimedia-Focused OS Gets New Stable Release with Meltdown Patches

        AV Linux, the open-source GNU/Linux distribution designed for multimedia content creation, has been updated recently to version 2018.4.2, a release that adds Meltdown mitigations, updated components, and various other enhancements.

        Probably the most important change in the AV Linux 2018.4.2 release is the implementation of the KPTI (Kernel page-table isolation) patch to protect users against the Meltdown security vulnerability, but only for 64-bit installations. The distribution is now powered by the long-term supported Linux 4.9.76 kernel, and users can disable the KPTI patch at boot.

      • Q4OS Centaurus 3.2 – new testing release

        A new updated image of the Q4OS Centaurus testing live media has been just released, its core is based on the latest Debian Buster testing and Trinity Desktop 14.0.5 testing versions.

    • OpenSUSE/SUSE

      • Request Travel Support for openSUSE Conference 2018

        The Travel Support Program (TSP) provides travel sponsorships to openSUSE community who want to attend the openSUSE conference and need financial assistance. The openSUSE conference 2018 will be in Prague, Czech Republic from May 25 to May 27.

        The goal of the TSP is to help everybody in and around openSUSE to be able to attend the openSUSE Conference!

    • Red Hat Family

      • Announcing new product updates of CDK 3.4, DevStudio 11.3, DevSuite 2.3

        We’re extremely pleased to announce additions and updates to our suite of Red Hat Developers desktop tooling products, including Container Development Kit 3.4, JBoss Developer Studio 11.3, and our DevSuite 2.3 installer. These updates are a continuation of our efforts to increase developer usability, while adding new features that matter most for users of Red Hat platforms and technologies.

      • Announcing Developer Studio 11.3.0.GA, JBoss Tools 4.5.3 for Eclipse Oxygen.3a
      • Red Hat introduces JDK 10

        Java™ 10 is now supported with Red Hat JBoss Developer Studio 11.3.

        Please note that Red Hat JBoss Developer Studio does not run on a Java™ 9/10 virtual machine, but allows for managing and building of Java™ 9/10 projects and artifacts. So, you must first define in your workspace a Java™ 9/10 JDK if you want to manage and build Java™ 9/10 projects.

      • Give the gift of revealing your insecurities

        A few weeks ago, I was having a discussion with a fellow manager on my team. This person reports to someone who reports to me, generally has a different set of concerns than I do, and therefore holds a unique perspective on the challenges we face. I’d been digressing on a hypothetical course of action when the manager interrupted me to say, “Excuse me, I just want to say that I’m not comfortable with the direction this is going in.” I immediately stopped talking and thought about what I’d been saying. I tried to explain what I meant, to give more context, and to go at it from a different angle. The manager also shared some context and perspective, which helped me understand the discomfort.

      • A (Belated) Happy 25th to Red Hat: So, What Does the Future Hold?

        Better late than never: last month Red Hat celebrated 25 years. (The cake and candles may seem like ancient history to Jim Whitehurst, CEO of the open source pioneer, but we believe in prolonging anything involving icing.) Jim spoke with Computer Business Review; looking both back on 25 years of Red Hat and to the future.

      • Fedora

        • Top Badgers of 2017: Carl George
        • Warming up for Fedora Workstation 28

          Been some time now since my last update on what is happening in Fedora Workstation and with current plans to release Fedora Workstation 28 in early May I thought this could be a good time to write something. As usual this is just a small subset of what the team has been doing and I always end up feeling a bit bad for not talking about the avalanche of general fixes and improvements the team adds to each release.

        • Fedora Workstation 28 Is Shaping Up To Be Another Terrific Update

          Fedora Workstation 28 is shaping up to be another compelling update for those that are fans of this bleeding-edge Red Hat sponsored Linux distribution. I’ve been running Fedora Workstation 28 snapshots on a few laptops and test machines here and am quite happy with how it’s shaped up as another Fedora release that delivers not only the latest features, but doing so in a seemingly sane and stable manner: I haven’t encountered any problems unlike some of the past notorious Fedora releases from years ago. Overall, I am quite excited for next month’s Fedora 28 release and will be upgrading my main production system to it.

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Things You Should Know About Ubuntu 18.04

            This article answers frequently asked questions about Ubuntu 18.04 and thus informing you of the important things you should know about Ubuntu 18.04.

          • Ora as a snap: ensuring users are benefiting from the latest version

            Ora is a user-friendly task management service with integrated time-tracking, reports, list view, git integrations and many other features. Often referred to by users as ‘the sweet spot between Trello and Jira’, Ora provides almost a complete match of Jira’s feature set but in a new and more accessible way.

            Last month, Ora launched their application as a snap and thereby broadening out their reach across the Linux user base. We spoke to Nikolay Mihaylov, co-founder at Ora, who told us more about their reasons to publish a snap and how it will help Ora move forward.

          • Welcome To The (Ubuntu) Bionic Age: Behind communitheme: interviewing Merlijn

            As discussed last week when unveiling the communitheme snap for ubuntu 18.04 LTS, here is a suite of interview this week on some members of the core contributor team shaping this entirely community-driven theme.

            Today is the turn of Merlijn, merlijn-sebrechts on the community hub.

          • LXD weekly status #44

            Another week of bugfixes for us as more and more people update to the 3.0 releases!

            Quite a bit of work went into improving the handling of the two database in LXD 3.0, making it easier for us to debug issues and provide fixes to our users when something goes wrong. Work is also continuing on the new backup/restore API for LXD with it hopefully landing later this week.

            We’re also excited to see LXD debuts on the Chromebooks through the new Crostini feature. This also led to a minor change to LXD to allow restricting users to unprivileged containers as was needed for those users.

          • Canonical Releases Kernel Security Updates for Ubuntu 17.10 and Ubuntu 16.04 LTS

            For Ubuntu 17.10 (Artful Aardvark) users, today’s security update addresses a bug (CVE-2018-8043) in Linux kernel’s Broadcom UniMAC MDIO bus controller driver, which improperly validated device resources, allowing a local attacker to crash the vulnerable system by causing a denial of service (DoS attack).

            For Ubuntu 16.04 LTS (Xenial Xerus) users, the security patch fixes a buffer overread vulnerability (CVE-2017-13305) in Linux kernel’s keyring subsystem and an information disclosure vulnerability (CVE-2018-5750) in the SMBus driver for ACPI Embedded Controllers. Both issues could allow a local attacker to expose sensitive information.

          • Ubuntu Touch lives on in Purism’s Librem 5 smartphone

            Not quite five years ago, Canonical tried to challenge Apple iOS and Google Android with Ubuntu Touch, an alternative smartphone Linux. Users, phone carriers, and the open-source community failed to support it, so Ubuntu founder Mark Shuttleworth closed the door on Ubuntu Touch development. But, in open source, programs don’t die until its last developer gives up on it. Purism and UBports have partnered to offer Ubuntu Touch on Purism’s Librem 5 smartphone.

          • Saying Something in April 2018

            Being able to bang on (that is to say, percussively test) Bionic Beaver has been a blast. I haven’t done ISO testing this round. Instead, I’ve been using my Xubuntu desktop daily watching things break and have been watching apport file bugs. Doing so makes me realize that, frankly, I am not normal in terms of installed packages or workflow. I have quite a bit of LaTeX installed due to church work. I have many ham radio-related things installed. Audio production and video production packages are installed too. Yes, sometimes I break down and even use LibreOffice. I don’t have the whole package archive installed but I have a visible chunk of it in place as I use many things in many ways.

          • Flavours and Variants

            • Ubuntu-Based ExTiX Distro, the Ultimate Linux System, Updates Its Deepin Edition

              Based on the Ubuntu 18.04 LTS (Bionic Beaver) operating system, the ExTiX 18.4 Deepin Edition is now available and it ships updated components, including the latest Deepin 15.5 Desktop, the Calamares 3.1.12 universal installer framework, and a custom Linux 4.16.2 kernel with extra hardware support.

              “I’ve made a new extra version of ExTiX with Deepin 15.5 Desktop (made in China!),” said Arne Exton in the release announcement. “Only a minimum of packages is installed in ExTiX Deepin. You can, of course, install all the packages you want, even while running ExTiX Deepin live, i.e. from a DVD or USB stick.”

            • Cinnamon 3.8 Desktop Environment Released with Python 3 Support, Improvements

              Scheduled to ship with the upcoming Linux Mint 19 “Tara” operating system series this summer, the Cinnamon 3.8 desktop environment is now available for download and it’s a major release that brings numerous improvements, new features, and lots of Python 3 ports for a bunch of components.

              Among the components that got ported to Python 3 in the Cinnamon 3.8 release, we can mention cinnamon-settings, cinnamon-menu-editor, cinnamon-desktop-editor, cinnamon-settings-users, melange, background slideshow, the switch editor and screensaver lock dialogs, desktop file generation scripts, as well as all the utilities.

  • Devices/Embedded

Free Software/Open Source

  • Voyage open-sources autonomous driving safety practices

    Dubbed Open Autonomous Safety, the initiative aims to help autonomous driving startups implement better safety-testing practices. Companies looking to access the documents, safety procedures and test code can do so via a GitHub repository.

  • Open-Sourcing Our Approach to Autonomous Safety

    Without a driver to help identify and mitigate failures, autonomous vehicle systems need incredibly robust safety requirements and an equally comprehensive and well-defined process for analyzing risks and assessing capabilities. Voyage models its safety approach after the ISO 26262 standard for automotive safety, taking the best practices from the automotive industry and applying them to autonomous technology. The automotive industry continues to reach for new levels of safety in manufacturing vehicles, and we are inspired by that approach.

  • Startup Voyage Wants to Open Source Self-Driving Car Safety

    Under what the company calls its Open Autonomous Safety initiative, Voyage is publishing information on its safety procedures, materials, and test code in a series of releases. The goal is to create an open-source library of safety procedures that multiple companies can use as a standard, a Voyage blog post said.

  • This startup’s CEO wants to open-source self-driving car safety testing

    The initial release, which Voyage calls Open Autonomous Safety (OAS), will take the form of a GitHub repository containing documents and code. The functional safety requirements are Voyage’s interpretation of the ISO 26262 standard for automotive safety, updated for autonomous vehicles. “This is our internal driving test for any particular software build,” says Cameron. “It lets us evaluate our designs and look for the different ways they can fail in the real world.”

  • Events

  • Web Browsers

    • Mozilla

      • Rust pattern: Precise closure capture clauses

        This is the second in a series of posts about Rust compiler errors. Each one will talk about a particular error that I got recently and try to explain (a) why I am getting it and (b) how I fixed it. The purpose of this series of posts is partly to explain Rust, but partly just to gain data for myself. I may also write posts about errors I’m not getting – basically places where I anticipated an error, and used a pattern to avoid it. I hope that after writing enough of these posts, I or others will be able to synthesize some of these facts to make intermediate Rust material, or perhaps to improve the language itself.

      • This Week in Rust
      • Mozilla publishes recommendations on government vulnerability disclosure in Europe

        As we’ve argued on many occasions, effective government vulnerability disclosure (GVD) review processes can greatly enhance cybersecurity for governments, citizens, and companies, and help mitigate risk in an ever-broadening cyber threat landscape. In Europe, the EU is currently discussing a new legislative proposal to enhance cybersecurity across the bloc, the so-called ‘EU Cybersecurity Act’. In that context, we’ve just published our policy recommendations for lawmakers, in which we call on the EU to seize the opportunity to set a global policy norm for government vulnerability disclosure.

      • Testing Strategies for React and Redux
      • K Lars Lohn: Things Gateway – a Virtual Weather Station
      • Firefox DevEdition 60 Beta 14 Testday Results

        As you may already know, last Friday – April 20th – we held a new Testday event, for Firefox DevEdition 60 Beta 14.

        Thank you all for helping us make Mozilla a better place: gaby2300, micde, Jarrod Michell, Thomas Brooks.

      • Supporting Same-Site Cookies in Firefox 60

        Firefox 60 will introduce support for the same-site cookie attribute, which allows developers to gain more control over cookies. Since browsers will include cookies with every request to a website, most sites rely on this mechanism to determine whether users are logged in.

        Attackers can abuse the fact that cookies are automatically sent with every request to force a user to perform unwanted actions on the site where they are currently logged in. Such attacks, known as cross-site request forgeries (CSRF), allow attackers who control third-party code to perform fraudulent actions on the user’s behalf. Unfortunately current web architecture does not allow web applications to reliably distinguish between actions initiated by the user and those that are initiated by any of the third-party gadgets or scripts that they rely on.

      • Enterprise Policy Support in Firefox

        Last year, Mozilla ran a survey to find out top enterprise requirements for Firefox. Policy management (especially Windows Group Policy) was at the top of that list.

        For the past few months we’ve been working to build that support into Firefox in the form of a policy engine. The policy engine adds desktop configuration and customization features for enterprise users to Firefox. It works with any tool that wants to set policies including Windows Group Policy.

      • any.js

        Thanks to Ms2ger web-platform-tests is now even more awesome (not in the American sense). To avoid writing HTML boilerplate, web-platform-tests supports .window.js, .worker.js, and .any.js resources, for writing JavaScript that needs to run in a window, dedicated worker, or both at once. I very much recommend using these resource formats as they ease writing and reviewing tests and ensure APIs get tested across globals.

      • Alex Gibson: My fifth year working at Mozilla

        Today marks my fifth year working for Mozilla! This past year has been both fun and frantic, and overall was a really good year for both Mozilla and Firefox. Here’s a run down a few of the things I got to work on.

  • Databases

  • CMS

  • Pseudo-Open Source (Openwashing)

  • Funding

  • FSF/FSFE/GNU/SFLC

    • Glibc 2.28 Upstream Will Build/Run Cleanly On GNU Hurd

      While Linux distributions are still migrating to Glibc 2.27, in the two months since the release changes have continued building up for what will eventually become the GNU C Library 2.28.

      The Glibc 2.28 work queued thus far isn’t nearly as exciting as all the performance optimizations and more introduced with Glibc 2.27, but it’s a start. Most notable at this point for Glibc 2.28 is that it will now build and run cleanly on GNU/Hurd without requiring any out-of-tree patches. There has been a ton of Hurd-related commits to Glibc over the past month.

    • Guix on Android!

      Last year I thought to myself: since my phone is just a computer running an operating system called Android (or Replicant!), and that Android is based on a Linux kernel, it’s just another foreign distribution I could install GNU Guix on, right? It turned out it was absolutely the case. Today I was reminded on IRC of my attempt last year at installing GNU Guix on my phone. Hence this blog post. I’ll try to give you all the knowledge and commands required to install it on your own Android device.

    • GNU Guix Wrangled To Run On Android

      The GNU Guix transactional package manager can be made to run on Android smartphones/tablets, but not without lots of hoops to jump through first.

    • Friday Free Software Directory IRC meetup time: April 27th starting at 12:00 p.m. EDT/16:00 UTC
  • Programming/Development

Leftovers

  • What’s next for Flickr after Yahoo’s sale?

    Future of photo-sharing site remains unclear but its founders say the innovation at Flickr died as soon as it was acquired in 2005

  • Marissa Mayer hits out at ‘gender bias’ as Yahoo is sold for $5bn

    Verizon agreed to buy Yahoo’s core internet business for $4.83bn (£3.62bn) in cash on Monday, marking the final chapter in the struggling fortunes of the fading web pioneer.

  • Science

    • Augmented Reality Is Transforming Museums

      Who owns virtual space, and what recourse does a museum have if an outside party “trespasses” on its virtual space? Moreover, is it even in a museum’s best interest to retaliate against unauthorized virtual augmentations—or should they be embraced as a new, if uninvited, tool for visitor engagement?

  • Hardware

    • Intel Launches Patent for an Innovative Cryptocurrency Mining Accelerator

      Intel, one of the biggest semi conductor firms has requested a patent for an innovative mining chip accelerator for Bitcoin. Known as “Bitcoin Mining Hardware Accelerator,” this patent was submitted in 2016 however is now being publicized for the first time.

      Cryptocurrency and bitcoin mining has long been under inspection for the extreme energy it supposedly uses. For instance, countries such as Iceland admit that more energy is utilized to mine Bitcoin than to power its habitations, while cities like Plattsburgh, NY – a once famous sanctuary for commercial Bitcoin mining have forced strict moratoriums to reduce the growing needs of the miners and the surging prices of electricity.

  • Health/Nutrition

    • A separate NHS tax would only further its fragmentation

      When MPs from different parties put aside their differences to work together, it’s worth listening to what they have to say – especially when it comes to protecting our crisis-ridden NHS. So when Liz Kendall, Norman Lamb and Nick Boles took to the airwaves this morning proposing a cross-party solution to our healthcare crisis, I understand why many people will have listened with interest.

      I agree with a number of the proposals, including a commitment to keeping the NHS free at the point of use, integration of social care and increasing funding above inflation. But sadly – and I don’t doubt these MPs care about the NHS – I believe that the sum total of their “ten principles of long-term funding for NHS and social care” ​risk undermining healthcare in this country.

  • Security

    • Security updates for Tuesday
    • Reproducible Builds: Weekly report #156
    • A Match.com glitch reactivated a bunch of old profiles, raising concerns about user data

      A Match Group spokesperson confirmed that a “limited number” of old accounts had been accidentally reactivated recently and that any account affected received a password reset. Match.com’s current privacy statement, which was last updated in 2016, says that the company can “retain certain information associated with your account” even after you close it. But that Match Group spokesperson also told The Verge that the company plans to roll out a new privacy policy “in the next month or so,” in order to comply with the EU’s General Data Protection Regulation (GDPR); under the new policy, all those years-old accounts will be deleted. The Verge has requested clarification on which accounts will qualify for deletion, and what “deletion” will specifically entail, but has not received a response as of press time.

    • New hacks siphon private cryptocurrency keys from airgapped wallets

      Like most of the other attacks developed by Ben-Gurion University professor Mordechai Guri and his colleagues, the currency wallet exploits start with the already significant assumption that a device has already been thoroughly compromised by malware. Still, the research is significant because it shows that even when devices are airgapped—meaning they aren’t connected to any other devices to prevent the leaking of highly sensitive data—attackers may still successfully exfiltrate the information. Past papers have defeated airgaps using a wide array of techniques, including electromagnetic emissions from USB devices, radio signals from a computer’s video card, infrared capabilities in surveillance cameras, and sounds produced by hard drives.

    • New hacker group targets US health-care industry, researchers say

      The group, which Symantec has named “Orangeworm,” has been installing backdoors in large international corporations based in the U.S., Europe and Asia that operate in the health-care sector.

      Among its victims are health-care providers and pharmaceutical companies, as well as IT companies and equipment manufacturers that work for health organizations.

    • PyRoMine uses NSA exploits to mine Monero and disable security features [Ed: NSA back doors in Microsoft Windows is a gift that keeps giving... to crackers]

      In an age where cryptomining software is beating out ransomware as the go-to for most hackers, a Python-based Monero miner is using stolen NSA exploits to gain an edge.

      In 2016 the Shadow Brokers leaked several hacking tools and zero-day exploits including ETERNALBLUE and ETERNALROMANCE that targeted versions of Windows XP/Vista/8.1/7/10 and Windows Server 2003/2008/2012/2016 and took advantage of CVE-2017-0144 and CVE-2017-0145.

      Fortinet researchers spotted a malware dubbed “PyRoMine” which uses the ETERNALROMANCE exploit to spread to vulnerable Windows machines, according to an April 24 blog post. The malware isn’t the first to mine cryptocurrency that uses previously leaked NSA exploits the malware is still a threat as it leaves machines vulnerable to future attacks because it starts RDP services and disables security services.

  • Defence/Aggression

    • Scarier than Bolton? Think Nikki for President

      The musical chairs playing out among the senior officials that make up the President Donald Trump White House team would be amusing to watch but for the genuine damage that it is doing to the United States. The lack of any coherence in policy means that the State Department now has diplomats that do not believe in diplomacy and environment agency heads that do not believe in protecting the environment. It also means that well-funded and disciplined lobbies and pressure groups are having a field day, befuddling ignorant administrators with their “fact sheets” and successfully promoting policies that benefit no one but themselves.

      In the Trumpean world of all-the-time-stupid, there is, however, one individual who stands out for her complete inability to perceive anything beyond threats of unrelenting violence combined with adherence to policies that have already proven to be catastrophic. That person is our own Ambassador to the United Nations Nikki Haley, who surfaced in the news lately after she unilaterally and evidently prematurely announced sanctions on Russia. When the White House suggested that she might have been “confused” she responded that “With all due respect, I don’t get confused.” This ignited a firestorm among the Trump haters, lauding Haley as a strong and self-confident woman for standing up to the White House male bullies while also suggesting that the hapless Administration had not bothered to inform one of its senior diplomats of a policy change. It also produced a flurry of Haley for higher office tweets based on what was described as her “brilliant riposte” to the president.

  • Transparency/Investigative Reporting

    • Licence to blog: Will ‘Swahili WikiLeaks’ have to close?

      Bloggers in Tanzania will have to pay $920 (£660) for the privilege of posting content online, according to new regulations.

      The government says it wants to protect the East African nation from “lies” being spread online though critics see it as a way of muzzling freedom of expression.

    • What Is Congress Talking About?

      When something happens in Congress, legislators love to brag about it — or condemn it — for their audience of journalists and professionals in Washington and for their constituents back home. The text of their public statements can provide a window into what members are thinking and what matters most to them in any given week.

      A new page on ProPublica’s Represent database — and a new Twitterbot — track what Congress members have said in the past week. It picks out the phrases that are most distinctive to that week’s batch of kudos and complaints contained in Congressional press releases.

    • Why the DNC Is Fighting WikiLeaks and Not Wall Street

      Exactly 200 days before the crucial midterm election that will determine whether Republicans maintain control of Congress, the Democratic National Committee filed a 66-page lawsuit that surely cost lots of money and energy to assemble.

      Does the lawsuit target purveyors of racist barriers to voting that block and deflect so many people of color from casting their ballots?

    • The D.N.C.’s Lawsuit Against Russia and the Trump Campaign Isn’t a Bad Idea

      Last week, the Democratic National Committee filed a multimillion-dollar suit against more than a dozen people, entities, and countries (well, one country), charging that “Russia mounted a brazen attack on American democracy” with the goal of “destabilizing the U.S. political environment, denigrating the Democratic presidential nominee, and supporting the campaign of Donald J. Trump, whose policies would benefit the Kremlin.” The defendants in the case include the Russian Federation, Russian military intelligence, the Trump campaign, WikiLeaks, Julian Assange, Paul Manafort, Jared Kushner, Roger Stone, George Papadopoulos, and Donald J. Trump, Jr. The candidate who was the beneficiary of this alleged conspiracy,

      [...]

      And that, of course, is easier said than done. Thanks to a legal doctrine known as foreign-sovereign immunity, it’s nearly impossible, except in cases of terrorism, to sue another nation (to say nothing of its military) in a United States court. Likewise, WikiLeaks and its leader, Julian Assange (who is currently still holed up in the Ecuadorian embassy in London), maintain only shadowy presences in the United States; it will be difficult for the plaintiffs in the case to serve these defendants and force them to appear in the Manhattan federal court where the case was brought. But several other defendants will undoubtedly be forced to answer the charges. These include, most notably, representatives of the Trump campaign and Kushner and Donald Trump, Jr. These defendants will certainly ask that the charges be thrown out, arguing that they have no connection to the hacking that is at the core of the case. But candidate Trump’s own comments —“I love WikiLeaks!” or “Russia, if you’re listening, I hope you’re able to find the thirty thousand e-mails that are missing”—may suggest enough of a connection for the judge to let the case to proceed to discovery. (The D.N.C. suit is a civil action, so it will not result in any criminal liability.) And that may be the point of the whole enterprise.who is now the President of the United States, is not a defendant—yet.

    • The Democrats’ lawsuit isn’t as nutty as it sounds
    • DNC Sues Russia, The Trump Campaign, Wikileaks

      It’s probably not going to change anything, but the Democratic National Committee has sued Russia (and members of the Russian establishment), members of the Trump campaign, and Wikileaks regard the 2016 election security breaches. The DNC’s complaint includes almost every claim imaginable in response to a hacking incident. If nothing else, it’s a good model for lawyers to crib from.

    • Free Julian Assange!

      In late March, Ecuador’s Lenin Moreno disconnected Julian Assange’s internet access. The reasoning behind this decision involved tensions with Spain and the United Kingdom regarding Assange’s social media messages.

  • Finance

    • Coinbase Picks An Unnecessary Fight With WikiLeaks

      Coinbase is grabbing the wrong headlines again. This time they’ve decided it makes sense to pick a fight with WikiLeaks. Because, that’s always been a good idea. An organization that makes it their mission to publish secrets and uncensored data now has a reason to dig into Coinbase’s dirty laundry. Ummmm…probably the wrong account to ban from your ‘bank’.

      According to WikiLeaks on Twitter, the move was sudden and Coinbase offered no explanation. WikiLeaks has directed its Twitter followers to donate bitcoin on the website, where other digital currencies including Litecoin, Zcash, Monero and Ethereum are listed with the message that “additional cryptocurrency options will be announced.”

      Coinbase, which is registered with the US Department of the Treasury’s Financial Crimes Enforcement Network, only said that the WikiLeaks account “had engaged in prohibited use in violation of our terms and service and we regret to inform you that we can no longer provide you with access to our service.” The WikiLeaks shop was then advised to redirect its remaining balance to an external digital wallet.

    • Up or out: tech company leveling and mandatory promotions

      If you’re thinking about taking a job at a large tech company for the first time, you should remember to ask them how their “leveling” works. This is something that seems to be poorly conveyed to a lot of people, and many folks from outside the valley (myself included, back in the day) have no idea what’s going on or how it should work.

      First, there is the notion of job ladders. A software engineer is not a production engineer/SRE, project manager, or a people manager. Those are all separate ladders, tracks, whatever you want to call them. If you are hired onto a certain ladder, odds are good that you will have to interview to change to another, no matter how long you’ve been doing the gig. I wrote about this in 2011 describing Google, but the same applies to Facebook. It’s probably being practiced in plenty of other places, too.

  • AstroTurf/Lobbying/Politics

    • No Remorse For Hillary

      I am hopeful that the commendable discovery process involved in US litigation will bring to light further details of the genesis of Christopher Steele’s ludicrous dossier on Trump/Russia, and may even give some clues as to whether Sergei Skripal and/or his handler Pablo Miller were involved in its contents.

      The decision by the Democratic National Committee to sue the Russian Government, Wikileaks, Julian Assange personally and the Trump campaign is an act of colossal hubris. It is certain to reveal still more details of the deliberate fixing of the primary race against Bernie Sanders, over which five DNC members, including the Chair, were forced to resign. It will also lead to the defendants being able to forensically examine the DNC servers to prove they were not hacked – something which astonishingly the FBI refused to do, being instead content to take the word of the DNC’s own private cyber security firm, Crowdstrike. Unless those servers have been wiped completely (as Hillary did to her private email server) I know that is not going to go well for the DNC.

    • On ‘Openness’ and Deceit

      In disclosing the deaths of two Western hostages in a U.S. drone strike on an Al-Qaeda compound, President Barack Obama said on Thursday that he had ordered the declassification of the secret operation because “the United States is a democracy committed to openness in good times and in bad.”

      But the reality of the past six years has been that his administration has enforced wildly excessive secrecy, selectively declassified material to mislead the American people, and failed to correct erroneous information on sensitive international issues.

      This failure to trust the people with accurate information has arguably done great harm to U.S. democracy by promoting false narratives on a range of foreign conflicts. With all its talk about “public diplomacy” and “information warfare,” the Obama administration seems intent on using half-truths and falsehoods to herd the people into a misguided consensus rather than treating them like the true sovereigns of the Republic, as the Framers of the Constitution intended with the explicit phrase “We the People of the United States.”

    • Hillary Clinton’s Twitter Bio Won’t Start With ‘Wife’ Anymore

      Hillary Clinton is changing her Twitter bio. After Clinton’s Arthur Miller Freedom to Write lecture at the PEN America World Voices Sunday night, Clinton sat down for a conversation with author Chimamanda Ngozi Adichie. Adichie asked Clinton about her Twitter bio, which reads, “Wife, mom, grandma, women+kids advocate, FLOTUS, Senator, SecState, hair icon, pantsuit aficionado, 2016 presidential candidate.” “The first word that describes you is wife. And then I think it’s mom, and then grandmother. When I saw that, I have to confess I felt just a little bit upset. Then I looked at your husband’s Twitter account, and the first word was not husband,” Adichie said. Was this Hillary’s choice, she asked. Clinton smiled: “When you put it like that, I’m going to change it.”

    • Chimamanda Ngozi Adichie Wants to Know Why Hillary Clinton’s Twitter Bio Leads With ‘Wife’

      Chimamanda Ngozi Adichie interviewed Hillary Clinton at a PEN World Voices Festival lecture at the Cooper Union in Manhattan on Sunday night, and she took the opportunity to confront the former Democratic presidential candidate with something that was bothering her. Why, with all of Clinton’s career accomplishments, did her Twitter bio primarily identify her as a “Wife”?

    • Hillary Clinton and Chimamanda Ngozi Adichie talk censorship, feminism, and Pizzagate

      On Sunday night, Hillary Clinton delivered the Arthur Miller Freedom to Write Lecture at the PEN America World Voices Festival. It was about what you’d expect from the former candidate in her first speech since the publication of James Comey’s memos on Donald Trump. “Today, we have a president who seems to reject the role of a free press in our democracy,” she said. “Although obsessed with his own press coverage, he evaluates it based not on whether it provides knowledge or understanding, but solely on whether the daily coverage helps him and hurts his opponents.” More interesting, however, was Clinton sitting down with novelist Chimamanda Ngozi Adichie after her speech.

  • Censorship/Free Speech

    • #MeToo activists in China are turning to the blockchain to dodge censorship
    • In Suppressing #MeToo Letter, China’s Censors Spark an Uproar
    • Ethereum Used By Chinese #Metoo Activists To Defy Censorship
    • Translation: Open Letter on PKU #MeToo Case
    • Chinese #MeToo Student Activists Use Blockchain to Fight Censors

      Student activists trying to ignite the #MeToo movement in China have turned to the technology behind bitcoin to battle government censorship.

      The rare display of dissent emerged after student Yue Xin accused prestigious Peking University of trying to silence her demands for a public airing of a sexual harassment episode more than 20 years ago. While she wasn’t involved in that long-ago incident, college officials have allegedly tried to intimidate and muzzle her, Yue wrote in an open letter Monday. The school forced her to delete information about the case and asked her parents to confine her to home, the undergraduate wrote.

      [...]

      An anonymous user attached Yue’s letter to an ether transaction and posted it to the blockchain: the decentralized ledger that records all activity for the cryptocurrency. That transaction cost the poster all of 52 cents, according to the record. While that means anyone with access to an ethereum node can now see the memo, it won’t be easy for the general public to access — unless someone copies the message from the ledger and reposts it on the web. Even then, Chinese authorities could easily block the site.

      “It’s symbolic but won’t be easily adopted by the public masses,” said Isaac Mao, a San Francisco-based entrepreneur who’s building a media platform that uses blockchain technology to fight censorship. “Decentralised media still has miles to go. But it gives people new hope.”

    • Global crackdown on fake news raises censorship concerns

      In a world where false and misleading information reaches billions instantly and online manipulation is becoming ever more sophisticated, governments are increasingly turning to legislation to combat fake news.

      [...]

      Infinitely easier and cheaper to produce and spread than ever before, fake news is also “low-hanging fruit” for politicians, Alemanno said: “They can talk to voters about it, whereas tackling the underlying, structural reasons why it’s so pervasive in our society and media environment is far, far harder.”

      From Europe to Asia, leaders are rushing to adopt anti-fake news laws. France – where “fake news”, necessarily narrowly defined so as to protect free speech, has been illegal since 1881 – aims to allow judges to order the deletion of false online content in election periods.

      The legislation will also oblige social media platforms to name advertisers who are financing content, and say how much they are paying, and permit France’s independent broadcasting authority to suspend media seen as trying to destabilise a vote, notably if “influenced by foreigners”.

      Germany earlier this year also introduced an online hate speech law, giving platforms with more than 2 million users 24 hours to remove “obviously illegal” terror content, racist material and fake news or face fines of up to €50m (£44m). Other offensive material must be blocked with seven days.

    • Selective army censorship of press may impact Pak polls

      An article published by a leading British newspaper has said that press freedom in Pakistan is under threat, being selectively censored by that country’s powerful military establishment, which doesn’t take kindly to criticism of its actions, or support for the civilian political class.

      It is now a well known fact that in the month gone by, popular and privately-run Geo TV was taken off the air recently and could only start operations again after it reportedly reached a back door agreement with the military establishment to stop covering former Prime Minister Nawaz Sharif favourably and cease to criticize the military.

    • Lemoore H.S. tackles censorship in ‘Fahrenheit 451′

      Originally aligned with McCarthy, President Eisenhower eventually came to his senses, saying, “Don’t join the book burners. Don’t think you are going to conceal faults by concealing evidence that they ever existed. Don’t be afraid to go in your library and read every book.”

    • Bustos’ opponent claims Facebook censorship

      Bill Fawell, the Republican candidate for the Illinois 17th Congressional District, says Facebook is censoring his Elect Fawell page and that posts shared from a blog called theburningplatform.com were removed.

      Fawell, an author and real estate broker from Galena, will face U.S. Rep. Cheri Bustos, D-Moline, in the Nov. 6 election.

      In a news release Monday, Fawell said Facebook deleted three articles on a discussion of the 1998 book “The Fourth Turning” by William Strauss and Neil Howe. The book theorizes on history and generational changes in society, asserting that every 80 to 100 years a “gray champion” emerges as a leader during a time of crisis.

    • House Judiciary to Hold Online Censorship Hearing

      More social media execs could be coming to Capitol Hill this week, but it’s not yet a done deal.

      The House Judiciary Committee has scheduled a hearing on online censorship and whether social media platforms disfavor or favor certain speech.

      Invited are representatives of Facebook, Google and Twitter, though not word on whether any will show.

    • Congressional candidate alleges Facebook censorship

      Bill Fawell, the Republican candidate for the 17th Congressional District, says Facebook is censoring his Elect Fawell page and that posts shared from a blog called theburningplatform.com were removed.

      Mr. Fawell, an author and real estate broker from Galena, will face U.S. Rep. Cheri Bustos, D-Moline, in the Nov. 6 election.

      In a news release Monday, Mr. Fawell said Facebook deleted three articles on a discussion of the 1998 book “The Fourth Turning” by William Strauss and Neil Howe. The book theorizes on history and generational changes in society, asserting that every 80 to 100 years a “gray champion” emerges as a leader during a time of crisis.

    • Revealed: Facebook’s internal rulebook on sex, terrorism and violence [Ed: Facebook censorship is itself the problem, not "transparency" about it]
    • Facebook Reveals Its Censorship Rules
    • Facebook reveals its censorship guidelines for the first time — 27 pages of them
  • Privacy/Surveillance

    • Facebook Believes “You’re Not The Product” — Tells What Advertisers Know About You

      Facebook, the company that’s getting roasted every next day has published another ‘hard questions’ blog post. This time, Facebook wants to tell us about the information known to the advertisers who want to throw ads in front of the 2 billion people on the social network.

      Just like they have repeatedly stated in the past, Facebook stressed that they don’t sell user data. They take inputs from the advertisers and throw ads accordingly. The company calls it selling “space” on Facebook, similar to what it’s like on TV, radio, or newspaper.

    • Stop Egypt’s Sweeping Ridesharing Surveillance Bill

      The Egyptian government is currently debating a bill which would compel all ride-sharing companies to store any Egyptian user data within Egypt. It would also create a system that would let the authorities have real-time access to their passenger and trip information. If passed, companies such as Uber and its Dubai-based competitor Careem would be forced to grant unfettered direct access to their databases to unspecified security authorities. Such a sweeping surveillance measure is particularly ripe for abuse in a country known for its human rights violations, including an attempts to use surveillance against civil society. The bill is expected to pass a final vote before Egypt’s House on May 14th or 15th.

      Article 10 of the bill requires companies to relocate their servers containing all Egyptian users’ information to within the borders of the Arab Republic of Egypt. Compelled data localization has frequently served as an excuse for enhancing a state’s ability to spy on its citizens.

      Even more troubling, article 9 of the bill forces these same ride-sharing companies to electronically link their local servers directly to unspecified authorities, from police to intelligence agencies. Direct access to a server would provide the Egyptian government unrestricted, real-time access to data on all riders, drivers, and trips. Under this provision, the companies themselves would have no ability to monitor the government’s use of their network data.

    • Facebook Derangement Syndrome: Don’t Blame Facebook For Company Scraping Public Info

      Earlier this month I talked a little bit about “Facebook Derangement Syndrome” in which the company, which has real and serious issues, is getting blamed for other stuff. It’s fun to take potshots at Facebook, and we can talk all we want about the actual problems Facebook has (specifically its half-hearted attempts at transparency and user control), but accusing the company of all sorts of things that are not actually a problem doesn’t help. It actually makes it that much harder to fix things.

      The latest case in point. Zack Whittaker, who is one of the absolute best cybersecurity reporters out there, had a story up recently on ZDNet about a data mining firm called Localblox, that was pulling all sorts of info to create profiles on people… leaking 48 million profiles by failing to secure an Amazon S3 instance (like so many such Amazon AWS leaks, this one was spotted by Chris Vickery at Upgard, who seems to spot leaks from open S3 instances on weekly basis).

    • Amazon Has a Top-Secret Plan to Build Home Robots

      Ten years ago, Amazon introduced the Kindle and established the appeal of reading on a digital device. Four years ago, Jeff Bezos and company rolled out the Echo, prompting millions of people to start talking to a computer.

    • CIA Has Plans To Switch Human Spies With Artificial Intelligence

      The American security agency CIA knows that the future can’t go without artificial intelligence. The agency was all over the news last year because of Wikileaks which published their collection of hacking tools.

      CIA wants to deal with foreign spies, not human but AI-powered spies tracking CIA agents deployed overseas. An effective countermeasure would be using technology instead of humans to get the required intel.

    • CIA plans to replace spies with AI

      Human spies will soon be relics of the past, and the CIA knows it. Dawn Meyerriecks, the Agency’s deputy director for technology development, recently told an audience at an intelligence conference in Florida the CIA was adapting to a new landscape where its primary adversary is a machine, not a foreign agent.

    • The FBI’s War On Encryption Is Personal, According To Comey’s New Book

      A recently-released Inspector General’s report shows the FBI didn’t try as hard as it could to find a way into the San Bernardino shooter’s locked iPhone. It appears FBI officials were more interested in obtaining a favorable court ruling than seeking technical assistance from anyone other than Apple, despite the DOJ’s courtroom claims about time being of the essence.

      This had a lot to do with the current FBI leadership. James Comey made fighting encryption his personal crusade — one that has been carried forward by both the DOJ and the FBI’s new director, Christopher Wray. Comey’s new book about his government career — one that came to an unceremonious end when President Trump fired him — provides a few more details about his crusade against math and personal security.

    • CIA, FBI, NSA say you shouldn’t buy the Huawei P20 Pro. Would you?

      Early this year, Huawei was so, so close to an actual deal with a US carrier. The Mate 10 was supposed to be compatible with and sold through AT&T. But, alas, politics got in the way. The NSA, FBI, and CIA all say US citizens should tread carefully when using the China-made smartphones and managed to pressure AT&T, Verizon, and T-Mobile enough for the carriers to back away.

    • What’s Not Included in Facebook’s ‘Download Your Data’

      But “Download Your Data” hardly tells you everything Facebook knows about you. Among the information not included:

      • information Facebook collects about your browsing history
      • information Facebook collects about the apps you visit and your activity within those apps
      • the advertisers who uploaded your contact information to Facebook more than two months earlier
      • ads that you interacted with more than two months prior

      Download Your Data is particularly spotty when it comes to the information Facebook taps to display ads. Typically, Facebook uses information it collects or buys to place users into categories that advertisers can target. This can include data a user provides explicitly (your age), implicitly (which browser you use) or unknowingly (information on purchases from loyalty cards).

  • Civil Rights/Policing

    • Alibaba, Baidu, and other Chinese tech companies post men-only job listings, report finds

      Under Chinese law, gender discrimination in hiring practices and advertising are illegal, but the law isn’t clear on what exactly constitutes gender discrimination and enforcement of the rules is spotty. Offending companies are usually not punished.

      The Human Rights Watch report reveals gender discrimination amongst major tech companies, as in the rest of Chinese society, is common and widespread. Search engine Baidu listed a job for content reviewers in March 2017 stating that applicants had to be men with the “strong ability to work under pressure, able to work on weekends, holidays and night shifts.”

    • Trump’s Actions Undermine His Rhetoric About Second Chances

      Trump talks the talk on reentry, but neither he nor his administration walks the walk.

      A couple of weeks ago, Trump designated April as Second Chance Month. He declared that our nation must “provide opportunities for people with criminal records to earn an honest second chance.” Just before that declaration, on March 7, Trump established a Federal Interagency Council on Crime Prevention and Improving Reentry. In doing so, Trump said that we need “to provide those who have engaged in criminal activity with greater opportunities to lead productive lives.”

      All this talk sounds great, but unfortunately, that’s all it is.

    • California Bill Would Guarantee Free Credit Freezes in 15 Minutes

      After the shocking news of the massive Equifax data breach, which has now ballooned to jeopardize the privacy of nearly 148 million people, many Americans are rightfully scared and struggling to figure out how to protect themselves from the misuse of their personal information.

      To protect against credit fraud, many consumer rights and privacy organizations recommend placing a ‘credit freeze’ with the credit bureaus. When criminals seek to use breached data to borrow money in the name of a breach victim, the potential lender normally runs a credit check with a credit bureau. If there’s a credit freeze in place, then it’s harder to obtain the loan.

      But placing a credit freeze can be cumbersome, time-consuming, and costly. The process can also vary across states. It can be an expensive time-suck if a consumer wants to place a freeze across all credit bureaus and for all family members.

  • Internet Policy/Net Neutrality

    • The Washington Post Thinks Overpaying For Broadband Bundles Is A Hoot

      Apparently, you don’t actually hate overpaying for cable, broadband and phone service. At least that’s the takeaway from this bizarre editorial over at the Washington Post by columnist Megan McArdle. In it, McArdle ineffectively argues that while the rise in streaming video competition is great and all, over-paying your regional telecom monopoly is something we all secretly love.

    • Saving net neutrality, one house at a time

      If the Facebook privacy debacle has shown one thing, it’s that technology companies have become immensely powerful and seemingly accountable to no one. Recent federal rollbacks of net neutrality and online privacy protections have put Americans in an even weaker position when dealing with Internet service providers.

      But there is a way for the public to push back: through Internet service provided by local governments, which are directly accountable to citizens.

  • Intellectual Monopolies

    • Administrative Suspension

      You have to pay bar dues for your state, meet CLE requirements, and so on, or you can be administratively suspended by your state. If you are, you can’t practice trademark law before the USPTO. There was another recent OED decision recognizing that basic point, here.

      The USPTO once considered making practitioners take CLE, but that failed. But, you can be administratively suspended by the USPTO for various reasons, including failing to keep your contact, and other, information current under 37 CFR 11.11. The USPTO periodically sends surveys to practitioners and those who don’t respond get their names published, and if they fail to correct the problem, they get administratively suspended from patent practice, as shown here.

    • USPTO Seeking IP Attaché In New Delhi

      The United States Patent and Trademark Office has attachés around the world specialised in intellectual property issues, including but not limited to enforcement. The office today announced an opening for a new attaché to be located in New Delhi, India, a key post.

    • Copyrights

      • Court Denies TVAddons’ Request to Dismiss U.S. Piracy Lawsuit

        The people behind TVAddons and the ZemTV Kodi addon have failed to have their case dismissed. The defendants asked the Texas court to drop the case because they are foreign nationals with no connection to the state. However, the court disagrees which means that the legal battle continues.

      • French Minister of Culture Calls For Pirate Streaming Blacklist

        French Minister of Culture, Françoise Nyssen, is considering implementing a national blacklist to target the streaming piracy epidemic. The proposed list should be regularly updated so that ISPs, search engines, and advertising companies can block the sites. The idea comes shortly after industry groups criticized the country for not doing enough to stop piracy.

      • Registrars Suspend 11 Pirate Site Domains, 89 More in the Crosshairs

        Authorities in India are reporting success in their fight against online piracy. After measuring websites against standards established by the UK’s Police Intellectual Property Crime Unit, complaints were filed with the registrars of 11 ‘pirate’ websites. All of the domains were suspended and a further 89 domains are now being targeted.

      • Monkey-selfie lawsuit finally ends: Court affirms adorable macaque can’t sue
      • Naruto, the Article III monkey

        The Ninth Circuit released its opinion in the “monkey selfie” case, reasonably ruling that Naruto the monkey doesn’t have standing under the Copyright laws. The opinion dodges the hard questions about who can be an author (thus leaving for another day questions about artificial intelligence, for example) by instead focusing on mundane things like the ability to have heirs. As a result, it’s not the strongest opinion, but one that’s hard to take issue with.

        But I’d like to focus on an issue that’s received much less attention in the press and among my colleagues. The court ruled that Naruto has Article III standing because there is a case or controversy. I’ll admit that I hadn’t thought about this angle, having instead gone right to the copyright authorship question (when you’re a hammer, everything looks like a nail). But I guess when you’re an appellate court, that whole “jurisdiction and standing section” means something even though we often skim that in our non-civ pro/con law/fed courts classes in law school.

        I’ll first note that the court is doubtful that PETA has standing as “next friend.” Footnote 3 is a scathing indictment of its actions in this case, essentially arguing that PETA leveraged the case for its own political ends rather than for any benefit of Naruto. Youch! More on this aspect here. The court also finds that the copyright statute does not allow for next friend standing, a completely non-shocking result given precedent.

      • Tencent Music Plans IPO; Valuation Could Exceed $25 Billion

        The digital-music business of Chinese internet giant Tencent Holdings Ltd. TCEHY -1.71% plans to interview potential underwriting banks over roughly the next month, according to people familiar with the matter.

04.24.18

Koch Brothers and Big Oil Could Not Buy the Decisions in Oil States, SAS

Posted in America, Courtroom, Patents at 6:38 pm by Dr. Roy Schestowitz

Related: The Anti-PTAB (Patent Trial and Appeal Board) Lobby is Partly Funded by the Koch Brothers and the Right Wing

Inside How the Federalist Society & Koch Brothers Are Pushing for Trump to Reshape Federal Judiciary
Reference: Inside How the Federalist Society & Koch Brothers Are Pushing for Trump to Reshape Federal Judiciary

Summary: In Oil States Energy Services v Greene’s Energy Group, a case which Koch-funded think tanks meddled in (including those whose panel guests send me threatening legal letters), ends up with dissent from a Koch-connected Justice citing or quoting those very same Koch-funded think tanks

THE DECISION that can rattle low-quality patents at the USPTO (but not PTAB, which actually deals with such low-quality patents) was covered here a couple of hours after it had come out (i.e. as soon as I returned home from Town). It turns out, in retrospect, that many people just “tweeted” about it rather than decided to write something detailed, long, and sensible. Media as it used to be is no more; people are getting too lazy to write long articles.

“Media as it used to be is no more; people are getting too lazy to write long articles.”Among the very early reactions we have Professor Risch, who wrote: “Oil States is out: Inter Partes Review is valid, but patents are still property. Gorsuch and Roberts dissent. [] More surprising than Oil States, SAS is out and Gorsuch writes a straightforward (to the 5 who signed on) statutory interpretation: partial institution is not in the statute. The PTO must grant the full petition (or deny it) and decide all claims raised.”

Gorsuch was reusing talking points from Koch-funded ‘scholars’. They got mentioned by Koch-backed Justices. Surprise? They even gloated about it! “Sad and Happy Day,” one of them said, “Supreme Court holds that #patent rights are regulatory-style “public rights” in Oil States v. Greene’s Energy, but at least my scholarship on patents as private #property rights quoted & cited repeatedly in dissenting opinion.”

He means Gorsuch. This reaffirms the Koch (Big Oil) connection. Are Justices up for sale? Can decisions be bought? Well, not entirely, but perhaps some votes can be ‘arranged’ with the power of money and ‘politicians’ like Donald Trump (it was him who nominated Gorsuch).

Another pundit said: “It will be interesting to see what happens after today’s SCOTUS SAS decision on IPR. Will PTAB grant review in pretty much the same number of cases and just need more time (or more judges), or will they deny more petitions for review because of higher per-case workload?”

The goal of slowing down PTAB isn’t a novel one. The patent extremists will do anything they can to make that happen.

Thomas F. Cotter (scholar, albeit not a Koch-funded one) had this to say:

U.S. Supreme Court Upholds Inter Partes Review
In what must be one of its most important patent opinions in recent years, the U.S. Supreme Court this morning upheld the constitutionality of inter partes reviews (IPRs)–the opposition-like procedures that Congress established in 2011 as part of the America Invents Act–in Oil States Energy Services, LLC v. Greene’s Energy Group, LLC. Opinion here. I’m not surprised by the ruling, but I am relieved; some of the questions posed during oral argument last November left me just a tad worried about the ultimate outcome (see post here). The breakdown of opinions does not fall along the typical ideological lines: Justice Thomas writes the majority opinion, joined by Justices Kennedy, Ginsburg, Breyer, Alito, Sotomayor, and Kagan.

Another scholar, Jason Rantanen, wrote about this decision in Oil States Energy Services v Greene’s Energy Group along with SAS. On the former he wrote:

Oil States Energy Services v. Greene’s Energy Group: Inter partes review does not violate Article III or the 7th Amendment. Patents are public rights for purposes of this question. This holding is a self-proclaimed narrow one that “should not be misconstrued as suggesting that patents are not property for the purposes of the Due Process Clause or Takings Clause.” Thomas for the majority; Breyer with a concurring opinion (joined by Ginsburg and Sotomayor), Gorsuch dissenting (joined by Roberts).

The CCIA wrote about it much later. Under “Even If The PTAB Thinks A Claim Is Valid, It Has To Conduct An IPR Anyway” (and in conclusion) the CCIA said:

The second case, SAS v. Matal, focused on the statutory language authorizing IPR. The challenger argued that this required the PTAB to conduct an inter partes review and issue a final decision on every challenged claim if at least one claim appeared to be invalid; in contrast, the PTAB only conducted a review and issued a decision on the claims that they had determined met the invalidity threshold in the institution decision. Patent Progress covered this case when it was filed, and—unfortunately—correctly predicted the outcome.

[...]

The alternative, where the PTAB effectively eliminates substantive analysis in the institution decision (other than stating that a single claim had been shown likely invalid), is even worse. In this case there isn’t even the guidance as to which claims the PTAB believed invalid. Instead, every claim has to be argued over. The parties won’t know the scope of the dispute, meaning that they’re less likely to settle with one another. And district courts, unable to determine if the PTAB feels all claims are invalid or only one, will become less likely to stay cases.

Given the importance of this procedural change, the PTO must provide petitioners and patent owners with information as to what they should expect regarding the conduct of proceedings at the first opportunity. Subsidiary concerns like the standard of review can wait.

Last but not least, Dugie Standeford from IP Watch wrote behind a paywall. The introduction says:

United States Patent and Trademark Office inter partes reviews are legal and do not violate Article III of the Constitution or the 7th Amendment, the US Supreme Court said today. While the decision was expected, practitioners before the USPTO’s Patent Trial and Appeal Board can now rest easy, as one patent lawyer put it.

We expect more spin and lots of worship/love for Gorsuch from patent maximalists in the coming days/weeks. The problem is, not many people will dare speak of the influence of money (like the front groups and think tanks involved). Best dissent oil money can buy?

The European Patent Office (EPO) Wastes a Lot of Money on External PR Agencies for Battistelli’s ‘Heist’

Posted in Europe, Patents at 6:00 pm by Dr. Roy Schestowitz

Saint-Germain-en-Laye event

Summary: The EPO’s management is once again scattering/throwing EPO budget at PR agencies and media companies (publishers/broadcasters) to disseminate a bunch of puff pieces and virtually ignore the very obvious conflict of interest, which should be a scandal on par with that of FIFA (resulting in the arrest of its boss, Mr. Blatter)

THE staff of the EPO is really upset. We can see that. We hear about that. It’s like no matter how abusive the boss is, nothing ever happens to him. He’s above the law.

“The staff of the EPO is really upset.”“I was surprised to see that the administrator of the Theatre Alexandre Dumas (TAD) in St Germain en Laye is not anyone else than the mayor, Arnaud Péricard, himself,” told us one reader, “seconded by, you guess it, Benoît Battistelli . As such the TAD is a part of the administration in St Germain en Laye. Here a link with the TAD team (L’équipe du TAD | Théâtre Alexandre-Dumas de Saint-Germain-en-Laye) who are themselves getting involved in a scandal without being aware of it. With the inventor of the year show taking place in the town where Benoit Battistelli is deputy mayor, there is a MAJOR conflict of interest, and a MAJOR scandal in perspective for which M. Battistelli and the accomplices will be held accountable.”

Here is the list of the people involved/implicated:

TAD team

Arnaud Péricard
Maire-adjoint chargé de la Culture (deputy mayor in charge of culture)

Benoît Battistelli
Conseiller municipal délégué au Théâtre (town counsellor in charge of the Thatre)

Guillaume Estienne
Directeur général adjoint des Services (deputy general director for services)

Francine Chassepot
Directrice de la Vie culturelle (director in charge of cultural life)

Theatre team

Directrice déléguée (deputy director)
Sophie Bauer

Directeur artistique (artistic director)
Benoît Dissaux

Directeur technique (technical director)
Joël Haton

Gestionnaire administrative, accueil des équipes artistiques
(administrative management, reception of artistic teams)
Cathy Alexandre-Skrzypczak

Chargé de la billetterie et de l’accueil
(in charge of ticketing and welcome)
Jérémie Dufour

Régisseur des recettes
(proceeds management)
Mercedes Figuereo

Chargée de la communication et des relations publiques
(public relations and communication)
Johanna Julien

Régisseur général
(stage manager)
Emmanuel Monnet

Régisseur lumière
(lighting designer)
Franck Mérel

Régisseurs plateau
(stage technicians)
Christian Laurent
David Costerg

Régisseur son et vidéo
(sound and image technician)
Thomas Weyant

Agent de sécurité – Affichage
(security officer – display)
Rudy Vasseur

We are hoping to have contact details soon. A day ago we (re)published contact details for various key people in the administration (not just of the threatre). We urge readers to write to these people, preferably but not necessarily in French (most of them are fluent in English, too). It’s not a campaign of harassment but merely an act of accountability — a concept that Battistelli seems incapable of grasping.

“It’s like no matter how abusive the boss is, nothing ever happens to him. He’s above the law.”“The time has come! These are the European Inventor Award 2018 finalists,” the EPO wrote some hours ago. They neglect to mention the likely corruption which everyone at the EPO seems to have whispered about for months. How can he get away with it? As we put it a few weeks ago, what we have here is “One Last Battistelli Heist: Millions of Euros for Saint-Germain-en-Laye” (his town where he works).

Here’s today’s fluff from the EPO: (warning: epo.org link)

The Award winners will be announced on 7 June in Paris, Saint-Germain-en-Laye…

[...]

“The 2018 Award finalists demonstrate that Europe continues to be a world leader in innovation,” said EPO President Benoît Battistelli.

He makes it a world leader in corruption.

“It’s not a campaign of harassment but merely an act of accountability — a concept that Battistelli seems incapable of grasping.”“EPO corruption continues,” Benjamin Henrion wrote about it today, as “Saint-Germain-en-Laye is Batistelli’s commune.”

People are noticing this, but the media refuses to cover or even mention this in passing. The truth of the matter is, the EPO has been bribing the media for a long time (we are covering many examples) and EPO management has once again hired Echolot Public Relations (Barbara Geier) to spam British media about this event. Guess at whose expense…

“People are noticing this, but the media refuses to cover or even mention this in passing.”We can see it based on this press release from today. How many PR agencies is the EPO hiring? We’ve lost count. In the UK alone it has got contracts with at least 3 PR agencies. Some contracts are ‘weighed’ at over a million euros! Talk about money down the drain. EPO management misuses stakeholders’ money for puff pieces such as these in the Irish media [1, 2, 3]. Did they literally pay for these? Indirectly perhaps? Earlier today (and it’s only the start of this week!) the EPO played the media, then linked to (retweeted) the outcome, e.g. [1, 2, 3, 4, 5, 6, 7, 8, 9].

How many PR agencies in how many countries is the EPO hiring this time around? Maybe someone can leak to us documents that may shed light…

Our jaw was on the floor seeing how the EPO even retweeted extremists like Watchtroll and its "bucket of deplorables" several hours ago. Bad optics? No tact? Maybe they don’t understand what they just did…

“Are there any major publishers/broadcasters that Battistelli has not yet corrupted using EPO budget? Or threatened for ‘daring’ to speak of EPO abuses?”Looking at the underlying ‘article’ with all the Battistelli quotes embedded throughout, it looks like a puff piece for the EPO; maybe it was partially ghostwritten by a PR agency. Gene Quinn certainly lacks ethics, so writing this rubbish could/might as well be an EPO partnership. Remember that the EPO already passed money to IAM through one of its PR agencies.

Roger Highfield, judging for Battistelli’s very ‘special’ event (money passage), was retweeted by the EPO after he had posted this puff piece in the site of the Science Museum. It says this:

Roger Highfield, Director of External Affairs, Science Museum Group and judge of the European Inventor Award introduces this year’s finalists and explains how to vote for your favourite.

This isn’t the first time we see Roger Highfield pushing the EPO’s agenda and being retweeted by the EPO; as we showed last year, it’s no longer a secret that the EPO pays travel expenses (flights) for so-called ‘journalists’ who cover these events. This, in our view, is a sort of bribery. But such is the moral level of the EPO these days. We still wait to see which large publisher — if any — will mention the huge scandal in Saint-Germain-en-Laye. Are there any major publishers/broadcasters that Battistelli has not yet corrupted using EPO budget? Or threatened for ‘daring’ to speak of EPO abuses?

Today’s EPO is Not Compatible With the Law and It’s Grossly Incompatible With Truth and Justice

Posted in Europe, Law, Patents at 5:15 pm by Dr. Roy Schestowitz

Fair trial

Summary: Today, once again, the EPO openly advocates software patents while media promotes loopholes (notably hype waves)

THE European Patent Office (EPO) has lost touch with the law, just like Team UPC and various factors that push towards a ‘unitary’ patent. The law does not seem to matter to these people, constitutions are ripped to shreds, lies are habitual, and votes are rigged.

“The term “computer-implemented inventions” or CII is just a euphemism for software patents. They try to disguise these as “AI”, “cloud”, “4IR”, “devices” and nowadays even “blockchain”.”Earlier today Gregory Bacon from Bristows wrote (first time they say anything in weeks) about “provisions [which] will [sic] prohibit ‘double-patenting’ i.e. protection of the same invention by an Italian national patent and a unitary patent; the possibility of such ‘double protection’ had been discussed but decided against (in contrast to the position in Germany, see Double protection and forum shopping under Germany’s draft UPC legislation).”

Well, it’s not like “Germany’s draft UPC legislation” will ever turn into anything. In fact, the UPC as a whole is gathering rust and there’s no progress, no news, nothing to report about it. The latest UPC spin is more of the same. There’s no news from Germany or from the UK. Hence it’s dead.

“It does not even obey its own rules, the national laws, international law, and the EPC.”Meanwhile, the EPO continues trampling all over the law. Software patents are in principle not allowed in Europe, but here comes the EPO again (only hours ago), writing: “How to obtain patents for computer-implemented inventions in biotechnology and healthcare at the EPO?”

The term “computer-implemented inventions” or CII is just a euphemism for software patents. They try to disguise these as “AI”, “cloud”, “4IR”, “devices” and nowadays even “blockchain”. In fact, earlier today a news site published this article titled “The patenteability of blockchain technology in Europe” (nowadays or now that companies/people disguise software patents as “blockchain” to bypass the rules). To quote:

Blockchain is a software-based technology. Computer programs appear in paragraph d) of art. 52, no. 2, of the European Patent Convention, 1973, as a subject which can not constitute an invention. However, in 2005 the European Patent Office (EPO) had already granted more than thirty thousand patents related to computer programs and currently computer-implemented inventions are the subject of approximately 35% of European patent applications.

The reason for this lies in the rule laid down in paragraph 3 of that Article, which provides that computer programs, as well as all matters referred to in paragraph 2, shall not be excluded from patentability unless ‘European patent application or European patent relates to such subject-matter or activities as such’.

The determination of the limits of the patentability of computer-implemented inventions in Europe is essentially the result of the decisions of the Technical Boards of Appeal (TBA) of the EPO and the interpretation thereof, of the relevant rules.

The EPO isn’t out of touch with the law only in the fraud and corruption sense (more on that later). It does not even obey its own rules, the national laws, international law, and the EPC. What kind of message is that supposed to send out?

Quick Mention: As Expected, the US Supreme Court Cements PTAB’s Role With Trump-Appointed Gorsuch Dissenting

Posted in America, Courtroom, Law, Patents at 12:08 pm by Dr. Roy Schestowitz

Scotusblog Live Blog
Live blog of opinions (the reference page for this case has not been updated yet)

Summary: Oil States has been decided and it’s very good news for the Patent Trial and Appeal Board (PTAB); even Conservatives-leaning Justices support PTAB

THE good news is here. It’s not surprising, but it’s still very good.

Dan Ravicher‏, a former lawyer of Free/libre software causes (who happens to be quite Conservatives-leading), wrote that “Oil States has been decided by Supreme Court, 7-2 IPRs are Constitutional. Dissent by Gorsuch and Roberts.”

The ruling is here. We have not checked it yet. There will be hundreds if not thousands of articles about it in the coming days. It will probably be mentioned for many years to come.

IAM retweeted Dan Ravicher and added: “Over to you, Director Iancu! Most were expecting 9-0, so 7-2 is a slight surprise. But it’s an overwhelming endordement [sic] of a status quo that only the USPTO director or Congress can now change.”

So hopes IAM. But it will be difficult to change in defiance of a 7-2 decision from the highest legal authority.

IAM’s patent extremist (Richard Lloyd), who tried to ‘appoint’/install at the top of the USPTO someone who calls PTAB “death squads”, wrote about an hour ago that the “Supreme Court issued its decision in the widely anticipated Oil States case earlier today ruling that inter partes review (IPR) is constitutional and does not violate the US Constitution’s Seventh Amendment. The nine justices split 7-2, with Justices Gorsuch writing a dissent in which he was joined by Chief Justice Roberts. In another IPR-focused case the Supreme Court also found that the Patent Trial and Appeal Board (PTAB) must consider the patentability of all claims challenged in a post-grant review following institution. In that case, SAS Institutes v Iancu, the justices were much more closely divided with the five more conservative…”

It’s almost a bipartisan view then. Gorsuch is the wolf many thought he would turn out to be. At least he made the Koch Brothers happy.

No word yet from Watchtroll and other messengers of patent trolls, just another ‘obligatory’ rant about PTAB today. Mr. Gross, who is writing for patent trolls, has unleashed another storm of rants about PTAB, e.g.:

Oracle patent inventors should have predicted that “determining if locations of devices is correct according to prior transactions” is just abstract idea according to PTAB because apparently we all didn’t know that it is a “fundamental economic practice” https://e-foia.uspto.gov/Foia/RetrievePdf?system=BPAI&flNm=fd2016008640-04-16-2018-1 …

PTAB’s expansive reading of “organizing human activity” exception to 101 swallows/destroys “distance based advertising in a virtual world” filing by IBM bc human COULD replicate process in real world with 2 different pieces of paper of different sized font https://e-foia.uspto.gov/Foia/RetrievePdf?system=BPAI&flNm=fd2016008387-04-16-2018-1 …

PTAB indiscriminate 101 strategy: if invention listed as abstract idea under PTO guidelines, then game over: guidelines become end-all be-all of patentability! And even if its not on list, they say list is not binding on them, they can put it there anyway! https://e-foia.uspto.gov/Foia/RetrievePdf?system=BPAI&flNm=fd2016008387-04-16-2018-1 …

They can moan all they want, but PTAB is here to stay.

« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts