Bonum Certa Men Certa

Links 31/5/2018: Many Stable Kernels, Cutelyst 2.4.0, Cockpit 169, MAAS 2.4.0, Rust 1.26.1





GNOME bluefish

Contents





GNU/Linux



Free Software/Open Source



  • 4 open source tools for distraction-free online reading
    I’m willing to bet that you do some (probably more than some) reading in a web browser. That reading might include everything from blog posts, articles, and essays to long forum posts and more.

    The problem with reading in a browser window is that it's full of distractions. Elements like navigation tools, headers and footers, ads, link boxes, and more can slow your reading and cause frustration.

    Let’s take a look at four open source tools that can get rid of those distractions.


  • Feeling secure enough to use open source for IAM projects
    Identity is big, really big, especially when it is customer-facing. There are a lot of moving parts to build, pieces to hook up, and external functionality to integrate. The whole makes the identity ecosystem which was once a dream of a few but is fast becoming a reality for many.

    Part of this movement towards a more all-encompassing and task-driven identity data system is the use of an API-approach to identity. These core functional API components are then augmented using open source code to add the bells and whistles. This extends the functionality of the service, quickly, cost-effectively, and easily.

    The thing is, as usual, with the swings come roundabouts. Identity data is a powerful engine that will drive our online transactions to new heights of usability and assurance. However, it comes with a serious price tag. Identity theft is at an all-time high. According to figures from Javelin, 2017 was a record year for stolen identity. In the U.S 16.7 million people had their identity stolen and fraudsters are becoming ever more sophisticated. One of the reasons for this is the increasing use of online identity, used for high value transactions, that has software vulnerability issues.


  • What's coming in OpenLDAP 2.5
    If pressed, I will admit to thinking that, if NIS was good enough for Charles Babbage, it's good enough for me. I am therefore not a huge fan of LDAP; I feel I can detect in it the heavy hand of the ITU, which seems to wish to apply X.500 to everything. Nevertheless, for secure, distributed, multi-platform identity management it's quite hard to beat. If you decide to run an LDAP server on Unix, one of the major free implementations is slapd, the core engine of the OpenLDAP project. Howard Chu is the chief architect of the project, and spoke at FLOSS 2018 about the upcoming 2.5 release. Any rumors that he might have passed the time while the room filled up by giving a short but nicely rendered fiddle recital are completely true.

    OpenLDAP, which will be twenty years old this August, is produced by a core team of three members, and a "random number" of additional contributors. Development has perhaps slowed down a little recently, but they still manage a feature release every 12-18 months, with maintenance releases as needed. OpenLDAP version 2.4, which was first released in 2007, is still the production release; it is theoretically feature-frozen, having had only three releases in the past two years, but the commit rate is still fairly high and fixes, particularly in documentation, continue. Chu noted that despite it being feature-frozen, 2.4.47 will have some minor new features, but this is definitely the last time this will happen and 2.4 is now "absolutely, for-sure, frozen". Probably.


  • Microsoft Previews Azure AD for Linux Virtual Machines Extension [Ed: Microsoft is trying to make GNU/Linux depend on Microsoft's proprietary protocols]
    Microsoft this month announced a preview of the ability to log into a Linux-based virtual machine (VM) running on its Azure public cloud service using Azure Active Directory credentials.


  • Open source SDN project could let network admins duplicate production environments
    Software Defined Networking (SDN) is an increasingly attractive option for organizations looking to automate more of their data center operations. However, SDN deployments typically accompany vendor lock-in, as hardware manufacturers such as Cisco provide proprietary software solutions to go with bundles of network hardware. Similarly, turn-key software defined data center (SDDC) solutions often rely on top-down vendor integration, or have similar limitations for using products from qualified vendors.

    One team is working to change that. Japanese software firm axsh is developing an open-\ source software stack—code named LiquidMetal—that combines their existing OpenVNet SDN software, with OpenVDC VM orchestration software.


  • Events



    • OpenStack Summit Vancouver Defines Open Infrastructure Efforts


    • In Defense of Small Conferences


      We didn’t discuss this at the time, for obvious reasons, but the strategy behind that decision was damage control. In the event that the conference proved to be a disaster, which seemed like a real possibility, a small disaster would be preferable to a large one.

      Fortunately for everyone involved, the event was not a disaster, and we’ve been lucky enough to follow the original up with six more events with an eighth scheduled this fall. Having had some small success with the events, we get asked every year about the capacity: specifically, when we’re going to scale them up, make them bigger. In truth, the event today is bigger than it was that first time, but at a maximum headcount of 150 by any measure the Monktoberfest remains a tiny conference. Because some of the attendees seem to enjoy the experience, they ask us why that is.

      There are many answers to that question, the most obvious being logistics. We’re an industry analyst firm with no ambitions to be an event production company. The events that we run are very much labors of love, labors that we undertake on top of our day jobs on behalf of our community. Running dramatically larger events would alter that dynamic, inevitably.

      But that’s not the real answer. The truth is that the Monktoberfest is not much larger today because of a conversation I had in the wake of the first, deliberately small event. In discussing the experience, one of the attendees told me that he’d met more people at the Monktoberfest than at any event he’d previously attended, ever. And he meant it.

      Which floored me, frankly. How could that even be possible, given the tiny population? Next to the largest conferences in our industry, the Monktobefest’s attendance numbers are a rounding error, the kind of ticket allotment that a Platinum sponsor might get to a larger event by itself. At an OpenStack Summit several years back, HP sent five times as many employees to that event as we admitted in total to our own conference.





  • Web Browsers



    • Mozilla



      • Happy BMO Push Day!


      • What to do when Firefox crashes under test automation with Selenium
        If you have the task to create automated tests for websites you will most likely make use of Selenium when it comes to testing UI interactions. To execute the tests for the various browsers out there each browser vendor offers a so called driver package which has to be used by Selenium to run each of the commands. In case of Firefox this will be geckodriver.

        Within the last months we got a couple of issues reported for geckodriver that Firefox sometimes crashes while the tests are running. This feedback is great, and we always appreciate because it helps us to make Firefox more stable and secure for our users. But to actually being able to fix the crash we would need some more data, which was a bit hard to retrieve in the past.


      • Neutrino: Deploying to Netlify
        Neutrino is my preferred tool to kickstart a React app and Netlify is my preferred SPA deployment service.

        Netlify makes it very easy to deploy your static sites, however, it needs some initial configuration.

        You won’t find Neutrino as one of the tools listed in their docs, thus, adding some docs in here. We’ll see if my instructions are right and maybe ask them to include them in their docs.


      • Firefox Performance Update #9
        Hello, Internet! Here we are with yet another Firefox Performance Update for your consumption. Hold onto your hats – we’re going in!


      • This Week in Rust 236


      • when an implementation monoculture might be the right thing
        It’s looking increasingly likely that Firefox will, in the not-too-distant future, build with a single C++ compiler across the four major platforms we support. I’m uneasy with this, but I think I’ve made my peace with it, partly as a result of writing the piece below.

        Firefox currently builds with three major C++ compilers across four platforms: Microsoft’s Visual C++ compiler (MSVC), GCC, and Clang. A fair amount of work has been done to deal with peculiar bugs in all three compilers: you can go search the source code and/or Bugzilla to find hacks that were needed for one reason or another. A fair amount of work has also been stalled or shelved because one or two compilers don’t quite measure up in some required area (e.g. standards support). As you might imagine, many a Firefox engineer has bemoaned the need for cross-compiler compatibility.


      • ARCEP report: “Device neutrality” and the open internet


        In February 2018, the French regulator, ARCEP, published a report on how device, browser, and OS level restrictions (under the broad label of “devices”) could be the ‘missing link’ towards achieving an open internet. In March 2018, the Body of European Regulators for Electronic Communications (BEREC) also published a report on how devices can impact user choice, where it noted the possible incentives for providers with sufficient market power to allow for a “less open use of the internet.”

        It should not be possible for device, OS, and app store providers to leverage their gatekeeping power to distort the level playing field for content, to unfairly favour their own content or demote that of competitors. This could be done in a variety of ways, and the report highlights some of these: restricting device and API functions, unfairly discouraging the use of alternative app stores, or non-transparency in app store rankings. In this blog, we put forth a principles-based response to these concerns, and potential policy solutions put forth by ARCEP.




  • Databases



    • Redis 5.0 Nearing Release With New Streams Data Type
      For users of the Redis in-memory key-value database, the Redis 5.0 release candidate is out today for testing.

      This very popular NoSQL database has been working on many features for its Redis 5.0 release, the biggest of which is the Streams data type implementation. Redis Streams is modeled on a log data structure and intended to be an append-only data structure for purposes like logs. Details on this new Redis data type can be found on the Streams documentation.


    • DataStax: balancing yin & yang in the holistic dream
      Computer Weekly Open Source Insider talks to Patrick McFadin in his role as vice president for developer relations at DataStax.

      DataStax is a distributed cloud database built on Apache Cassandra – the firm is a key contributor to the Cassandra project and describes its technology as an always-on data platform.


    • IBM, GSA reach governmentwide agreement for database solutions [Ed: IBM still deploys proprietary databases instead of free/libre ones]


    • GSA inks governmentwide database deal with IBM
      Services on the new contract include IBM Db2 database software for Linux, UNIX and Windows, including versions of Db2 Developer Edition, Db2 Enterprise Server Edition and Db2 Advanced Enterprise Server Edition. The software, according to IBM, helps users manage databases across a variety of platforms, languages and data types.




  • Pseudo-Open Source (Openwashing)



  • FSF/FSFE/GNU/SFLC



    • Minifree Libreboot X200 Tablet now FSF-certified to Respect Your Freedom
      This is the third device from Minifree Ltd to receive RYF certification. The Libreboot X200 Tablet is a fully free laptop/tablet hybrid that comes with Trisquel and Libreboot pre-installed. The device is similar to the previously certified Libreboot X200 laptop, but with a built-in tablet that enables users to draw, sign documents, or make handwritten notes. Like all devices from Minifree Ltd., purchasing the Libreboot X200 Tablet helps to fund development of Libreboot, the free boot firmware that currently runs on all RYF-certified laptops. It may be purchased at https://minifree.org/product/libreboot-x200-tablet/, and comes with free technical support included.


    • FSF Certifies Refurbished Lenovo X200 Convertible Notebook/Tablet For RYF


    • Red Hat Compiler Developer Working On Compiler-Assisted Performance Analysis For GCC
      Longtime GNU toolchain developer at Red Hat, David Malcolm, has announced the work he is pursuing on compiler-assisted performance analysis with GCC.

      David Malcom is hoping to make the GNU Compiler Collection produce more useful information about how the compiler optimizes code for GCC developers and advanced end-users. This would provide details about how an optimization could be improved or bugs fixed within GCC as well as for developers/end-users to understand what command-line flags are being used and how they could potentially rework their code for greater performance.


    • [parabola] Server outage
      One of our servers, winston.parabola.nu, is currently offline for hardware reasons. It has been offline since 2018-05-30 00:15 UTC. Hang tight, it should be back online soon.


    • Friday Free Software Directory IRC meetup time: June 1st starting at 12:00 p.m. EDT/16:00 UTC
      Help improve the Free Software Directory by adding new entries and updating existing ones. Every Friday we meet on IRC in the #fsf channel on irc.freenode.org.

      Tens of thousands of people visit directory.fsf.org each month to discover free software. Each entry in the Directory contains a wealth of useful information, from basic category and descriptions, to providing detailed info about version control, IRC channels, documentation, and licensing info that has been carefully checked by FSF staff and trained volunteers.

      When a user comes to the Directory, they know that everything in it is free software, has only free dependencies, and runs on a free OS. With over 16,000 entries, it is a massive repository of information about free software.

      While the Directory has been and continues to be a great resource to the world for many years now, it has the potential to be a resource of even greater value. But it needs your help! And since it's a MediaWiki instance, it's easy for anyone to edit and contribute to the Directory.


    • Free Software Directory meeting recap, May 2018
      Every week, free software activists from around the world come together in #fsf on irc.freenode.org to help improve the Free Software Directory. We had an exciting month working on the Directory with our wonderful stable of volunteers. These folks show up week in and week out to improve the Directory. It's also important to note the valiant efforts of those volunteers who can't make an appearance at the meeting proper, but still plug away at Directory entries during the week.




  • Public Services/Government



    • A New Open-Source Framework for Government Projects
      The Louisville Metro Government recently recreated its traffic data warehouse in the cloud and open-sourced the code so any city can build the infrastructure nearly for free.

      Last year, Kentucky’s largest city won an Amazon Web Services grant to merge its traffic data with Google-owned Waze’s and then run predictive analytics in the cloud to better time traffic signals to manage flow.

      With the initial work complete, the city turned to local developer Slingshot to roll out a roadmap of new features.




  • Licensing/Legal



    • ​Tesla starts to release its cars' open-source Linux software code
      Tesla is still a long way from fully releasing its cars' full open-source programs and Linux operating system code, but it's on its way.

      [...]

      Tesla has been slowly working with the Software Freedom Conservancy (SFC) to release its code according to strictures of Linux's Gnu General Public License version 2 (GPLv2). SFC leaders Bradley M. Kuhn and Karen M. Sandler wrote: "Conservancy has been engaging with Tesla on its GPL compliance since June 2013, when we advised Tesla that we had received multiple reports of a GPL violation regarding Tesla's Model S. Customers who purchased Tesla's Model S received on-board system(s) that contained BusyBox and Linux, but did not receive any source code, nor an offer for the source."

      The SFC, and other open-source licensing groups, have been working with Tesla to convince its upstream software providers, NVIDIA and Parrot, to disclose complete, corresponding source (CCS) releases for all GPL'd binaries found in Tesla's Model S.





  • Openness/Sharing/Collaboration



    • Why Do Open Innovation Efforts Fail? Scientists Want to Solve Problems Themselves.
      Open innovation processes promise to enhance creative output, yet we have heard little about successful launches of new technologies, products, or services arising from these approaches. Certainly, crowdsourcing platforms (among other open innovation methods) have yielded striking solutions to hard scientific and technological problems—prominent examples being the Netflix predictive recommendation algorithm and the approach to reducing the weight of GE jet engine brackets. But most R&D organizations are still struggling to reap the very real rewards of open innovation. We believe we’ve hit on an important hidden factor for this failure and that it holds the key to a successful integration and execution of open innovation methods.




  • Programming/Development



    • Spanning The Tree : Dr Radia Perlman & Untangling Networks
      As computer networks get bigger, it becomes increasingly hard to keep track of the flow of data over this network. How do you route data, making sure that the data is spread to all parts of the network? You use an algorithm called the spanning tree protocol — just one of the contributions to computer science of a remarkable engineer, Dr. Radia Perlman. But before she created this fundamental Internet protocol, she also worked on LOGO, the first programming language for children, creating a dialect for toddlers.

      Born in 1952, Perlman was a prodigy who excelled in math and science, and in her own words, “Every time there was a new subject or a quiz I would be very excited at the opportunity to solve all sorts of puzzles”. She graduated from MIT in 1973 and got her Masters degree in 1976.


    • Progress releases NativeScript 4.0
      Progress has announced the release of NativeScript 4.0, an open source framework for delivering cross-platform, native iOS and Android apps.

      NativeScript apps are built using JavaScript, or by using any language that ‘transpiles’ to JavaScript, such as TypeScript.


    • Shortening the Python release schedule
      The Python release cycle has an 18-month cadence; a new major release (e.g. Python 3.7) is made roughly on that schedule. But Łukasz Langa, who is the release manager for Python 3.8 and 3.9, would like to see things move more quickly—perhaps on a yearly cadence. In the first session after lunch at the 2018 Python Language Summit, Langa wanted to discuss that idea.

      Before he got started, though, he noticed his name in Larry Hastings's schedule-display application started with the dreaded ▯ rather than Ł. That, he said with a grin, is the story of his life. Hastings dryly suggested that the font he was using predates the addition of the Ł character to Unicode, which elicited a fair bit of laughter.


    • Using GitHub Issues for Python
      In a 2018 Python Language Summit talk that was initially billed as "Mariatta's Topic of Mystery", Mariatta Wijaya described her reasoning for advocating moving Python away from its current bug tracker to GitHub Issues. She wanted to surprise her co-attendees with the talk topic at least partly because it is somewhat controversial. But it would complete Python's journey to GitHub that started a ways back.

      Other Python projects are using GitHub Issues, she said, as are many popular open-source projects. Many people already have a GitHub account. When they run into a Python problem, they can immediately file a GitHub Issue, but might have to create a bugs.python.org (b.p.o) account before filing one there.


    • Pie Menus

      Today (May 15, 2018) is the 30 year anniversary of CHI’88 (May 15–19, 1988), where Jack Callahan, Ben Shneiderman, Mark Weiser and I (Don Hopkins) presented our paper “An Empirical Comparison of Pie vs. Linear Menus”. We found pie menus to be about 15% faster and with a significantly lower error rate than linear menus!



    • Vulkan for Qt on macOS
      Sometimes, development efforts align such that new use cases can be enabled with modest extra effort. The QtBase dev branch (which will become Qt 5.12) now has experimental Vulkan support, courtesy of MoltenVK and prior work in Qt. Let’s take a look at what has happened.


    • Qt 5.12 To Support Vulkan On macOS Via MoltenVK
      The latest project making use of the recently open-sourced MoltenVK that maps Vulkan atop Apple's Metal graphics API for execution on macOS/iOS is now the Qt5 tool-kit.


    • Announcing Rust 1.26.1
      The Rust team is happy to announce a new version of Rust, 1.26.1. Rust is a systems programming language focused on safety, speed, and concurrency.


    • Mouse: A time-saving object system for smaller projects
      There are several great object systems for Perl, and Moose is one of them. But Moose comes with a compile-time penalty that smaller applications may not be willing to pay, particularly for certain CGI or command-line scripts. Moose is incredibly feature-rich, and you may not need all of those features all the time.

      Mouse to the rescue! Mouse is a lightweight object system with a subset of Moose's features. The goal throughout its development has been to make it syntactically consistent with Moose so if you later need to switch to the heavier-duty Moose, you can just substitute 'Moose' for 'Mouse' everywhere in your codebase, and things should just work.


    • Introduction to the Pony programming language
      At Wallaroo Labs, where I'm the VP of engineering, we're are building a high-performance, distributed stream processor written in the Pony programming language. Most people haven't heard of Pony, but it has been an excellent choice for Wallaroo, and it might be an excellent choice for your next project, too.


    • 3 Python command-line tools
      Sometimes the right tool for the job is a command-line application. A command-line application is a program that you interact with and run from something like your shell or Terminal. Git and Curl are examples of command-line applications that you might already be familiar with.

      Command-line apps are useful when you have a bit of code you want to run several times in a row or on a regular basis. Django developers run commands like ./manage.py runserver to start their web servers; Docker developers run docker-compose up to spin up their containers. The reasons you might want to write a command-line app are as varied as the reasons you might want to write code in the first place.






Leftovers



  • Ars Asks: Are your company’s IT policies flexible, or nonsensical?


  • Science



    • Technology is driving us to distraction

      How often are you diverted from a task by the seductive lure of your mobile phone? And does it matter? In a landmark book, James Williams argues we’re losing the power to concentrate



    • Unluckiest man on the planet survived Pompeii eruption only to be crushed by a falling rock
      When Mount Vesuvius erupted way back in the year AD 79, it was one of the most catastrophic events that humans had ever experienced up to that point. The city of Pompeii was utterly devastated by the eruption, and the total death toll still remains unknown to this day. The countless deaths were the result of a number of different factors, including the molten rock being spewed into the air and the pyroclastic flow produced by the volcano.





  • Hardware



    • Apple might have an ARM-based touchscreen computer in the works

      A handful of Apple employees apparently have their hands on these devices for testing, though we have yet to get our peepers on any leaked pics. We're guessing Apple gave them to trustworthy testers who can keep the mouths shut and avoid posting pics to Twitter.



    • Apple’s Star project could be an ARM-based touchscreen hybrid with LTE [U]

      We have been following information about the Star project for a few months, with sources in the supply chain. It is currently in prototype stage, with prototypes being manufactured by Pegatron, Apple’s partner in China which also manufactures other Apple iOS devices. A small number of units have been shipped to Cupertino for testing by Apple employees. These prototypes have been in production since at least January 2018.





  • Health/Nutrition



    • Could New York Be the Next State to Legalize Marijuana?
      The New York Police Department regularly faces criticism over the disproportionate number of Black and brown people who are arrested for marijuana possession. The department’s constant refrain has been that officers go where they are called. They respond to complaints to the city’s 311 assistance line or calls to 911. Arrests, they say, flow naturally from those calls to action.

      But a New York Times analysis published this month threw that contention into serious doubt. As the paper reported, “among neighborhoods where people called about marijuana at the same rate, the police almost always made arrests at a higher rate in the area with more black residents.” An analysis by Politico New York in March also reached a similar conclusion. These reports have energized the campaign to legalize marijuana in the state.

      The disproportionate impact that marijuana arrests have on communities of color in New York City, the state, and the rest of the country is profound — and exceptionally well-documented. Nationwide, Black people are almost four times more likely than their white neighbors to be arrested for marijuana possession, despite similar rates of consumption across racial and ethnic groups. In New York state, which has some of the harshest enforcement practices in the country, more than 80 percent of people arrested for marijuana possession were Black or Latino.


    • ‘This Is Really an Effort to Undermine People’s Access to Birth Control’
      People like to say, “The devil is in the details.” For its account of the Trump administration’s proposed changes to rules around family planning programs, the New York Times headline “Trump Rule Would Bar Some Abortion Advice at Federally Funded Clinics” suggests details might be where it’s at; it’s just some advice at some clinics. Even more so, the headline chosen by the Washington Post: “Is It a Gag Rule After All? A Closer Look at Changes to Title X Funding Regarding Abortion.”

      [...]

      Coverage focused too hard on branch—the Post gives credulous attention to supposed distinctions between abortion “counseling” and “referral”—leaves untested certain unspoken premises: that abortion is not healthcare, and so it’s reasonable to segregate it; that women’s bodies, and especially poor women’s bodies, are ultimately socially owned, and so it’s reasonable for others to debate and decide what happens to them; and that, even though nearly one in four women in the US will have an abortion, it’s OK to leave the subject shrouded in stigma, suffering and misinformation.

      The changes around federal family planning funding offer as good as chance as any to recenter the conversation around reproductive rights. We’re joined now by Kinsey Hasstedt, a senior policy manager in the Guttmacher Institute‘s Washington, DC, office. She joins us by phone from DC. Welcome to CounterSpin, Kinsey Hasstedt.




  • Security



    • Git v2.17.1, v2.13.7, v2.14.4, v2.15.2 and v2.16.4
    • A set of Git security releases


    • Announcing the May 2018 Git Security Vulnerability


    • Git Issues Batch Of New Releases To Fix Security Issues
      The other security fix is CVE-2018-11233 that could lead to reading random pieces of memory when running on an NTFS file-system.
    • ARM's Spectre V4 Mitigation Updated, Speculative Store Bypass Disable
      ARM has updated their set of Linux kernel patches providing mitigation for last week's disclosure of Spectre Variant Four.

      ARM is providing an ARM64 implementation of Speculative Store Bypass Disable (SSBD) for mitigating Spectre V4. Last week they posted the initial ARM64 SSBD patches for this Speculative Store Bypass vulnerability that could lead to unauthorized information disclosure.

      The Intel/AMD CPU mitigation for Spectre V4 was merged last week while some loose ends remained to tidy the code up for 64-bit ARM. The revised patches have various fixes and other minor work, but overall it looks like soon it could be ready for merging. But it remains to be seen if this work will be merged ahead of Linux 4.17.0, which is expected for release next weekend, or held off until the Linux 4.18 kernel merge window and then potentially back-ported to existing stable series.
    • Security updates for Wednesday


    • The FBI wants you to do this one thing to your home router, now
    • FBI wants you to reboot your router: What you need to know
    • Did You Restart Your Router Like the FBI Asked?
    • The FBI is warning you to reboot your router to prevent a new attack — here's everything you need to do


    • Mainstream Media Warns of 'Russian Malware', Ignores CIA's Own Virus Development
      The US Federal Bureau of Investigation has warned hackers may have compromised hundreds of thousands of routers and other home network devices the world over with malware. Perhaps predictably, the Russians are said to be behind the ploy - but past experience suggests the true source may lie closer to home.

      In an official statement, the FBI said the virus — ‘VPNFilter' — was being used to launch attacks on infrastructure and render electronic devices useless. Anyone possessing a router is strongly urged by the Bureau to reset their device — the malware works in three stages, and rebooting the router prevents the implementation of the latter two stages.

      "Owners are advised to consider disabling remote management settings on devices and secure with strong passwords and encryption when enabled. Network devices should be upgraded to the latest available versions of firmware," the Bureau suggested.


    • Securing the container image supply chain


      The question of container trust hardly seems resolved at all; the available solutions are complex and would be difficult to deploy for Kubernetes rookies like me. However, it seems that Kubernetes could make small improvements to improve security and auditability, the first of which is probably setting the image pull policy to a more reasonable default. In his talk, Mouat also said it should be easier to make Kubernetes fetch images only from a trusted registry instead of allowing any arbitrary registry by default.

      Beyond that, cluster operators wishing to have better control over their deployments should start looking into setting up Notary with an admission controller, maybe Portieris if they can figure out how to make it play with their own Notary servers. Considering the apparent complexity of Grafeas and in-toto, I would assume that those would probably be reserved only to larger "enterprise" deployments but who knows; Kubernetes may be complex enough as it is that people won't mind adding a service or two in there to improve its security. Keep in mind that complexity is an enemy of security, so operators should be careful when deploying solutions unless they have a good grasp of the trade-offs involved.

      [...]

      Zephyr doesn’t use the Linux kernel. Its kernel comes from Wind River’s VxWorks Microkernel Profile for VxWorks. The first version of Zephyr, which was launched some two years ago, came out with a kernel, an IP stack, L2 stack, and few services. Then Intel decided to open source it. They took a saw to it and cleaned the code, then they started talking to industry leaders, especially The Linux Foundation. The project was launched with Intel, NXP, and Synopsis as launch members.



    • Victorian speed cameras hit by computer virus
      Independent report into WannaCry virus

      An unsuspecting contractor was blamed for introducing the virus into Victoria’s speed camera network sometime in early June 2017. The malware was first detected on 6 June 2017 when 20 cameras crashed along the Hume Highway and remained offline overnight.

      The infected cameras ran on Windows 7. Another company who used Unix-based cameras still suffered thanks to Windows operating system powered site control units. It wasn’t until 14 June that the true cause of the outages was found and over the next two days, engineers worked on a patch to secure the system. Finally, by 22 June, cameras were fully operational and virus-free again.


    • How the Zephyr Project Is Working to Make IoT Secure
      Zephyr doesn’t use the Linux kernel. Its kernel comes from Wind River’s VxWorks Microkernel Profile for VxWorks. The first version of Zephyr, which was launched some two years ago, came out with a kernel, an IP stack, L2 stack, and few services. Then Intel decided to open source it. They took a saw to it and cleaned the code, then they started talking to industry leaders, especially The Linux Foundation. The project was launched with Intel, NXP, and Synopsis as launch members.

      [...]

      Fragmentation has been a big problem for IoT since the beginning. Companies were doing their own workarounds, there were no standardizations, and there was no collaborative platform that everyone could work on together. Various open source projects are working to solve this problem, but many factors contribute to the woes of IoT devices. Anas Nashif, Technical Steering Committee (TSC) Chair of the Zephyr project believes that software licensing can help.

      Nashif admits that there are already many open source projects trying to address the domain of embedded devices and microcontrollers. “But none of these projects offered a complete solution in terms of being truly open source or being compatible in terms of having an attractive license that would encourage you actually to use it in your product. Some of these projects are controlled by a single vendor and, as such, don’t have an acceptable governance model that breeds confidence within users,” said Nashif.


    • How to Secure Edge Computing
      The notion of edge computing is a relatively nascent one in modern IT. While end user, data center and cloud computing are well understood, Edge computing is still struggling to define itself – and come to terms with some significant security challenges.


    • OpenStack Operators Detail How They Patched for Meltdown, Spectre
      When the Meltdown and Spectre CPU security vulnerabilities were publicly disclosed on Jan. 3, they set off a flurry of activity among IT users and cloud operators around the world. In a panel moderated by eWEEK at the OpenStack Summit in Vancouver, B.C., on May 24, operators detailed how they dealt with patching for Meltdown and why it was a time-consuming process.

      When it comes to OpenStack, no operator in the world is larger than CERN, home of the Large Hadron Collider (LHC) and an OpenStack cloud infrastructure that has approximately 300,000 compute cores. Arne Wiebalck is responsible for the overall operations of CERN's OpenStack cloud, and when vulnerabilities like Meltdown and Spectre appear, it's his responsibility to react and deploy the corresponding fixes.


    • How To Turn PGP Back On As Safely As Possible
      Previously, EFF recommended to PGP users that, because of new attacks revealed by researchers from Münster University of Applied Sciences, Ruhr University Bochum, and NXP Semiconductors, they should disable the PGP plugins in their email clients for now. You can read more detailed rationale for this advice in our FAQ on the topic, but undoubtedly the most frequently asked question has been: how long is for now? When will it be safe to use PGP for email again?

      The TL;DR (although you really should read the rest of this article): coders and researchers across the PGP email ecosystem have been hard at work addressing the problems highlighted by the paper—and after their sterling efforts, we believe some parts are now safe for use, with sufficient precautions.


    • OnePlus 6’s Face Unlock Can Be Fooled By A Photograph
      Do you own a OnePlus 6 or planning to buy one? If yes, you might want to read this one. So apparently, the OnePlus 6’s face unlock method can be tricked by a photograph. A video posted by a Twitter user, shows the phone getting unlocked by a cutout picture of his face.




  • Defence/Aggression



    • 50th Anniversary of May 1968, Paris: Memories of an Illusory Revolution
      In France, reactions to the U.S. war in Vietnam, a former French colony, were viscerally linked to the war in Algeria, which was fresh in people’s memories. For those who had supported Algerian independence from France, achieved only six years earlier, the Vietnamese people’s struggle for independence was a natural follow-on.

      [...]

      Within a week the entire Latin Quarter was in a state of siege. May 10 was the “night of the barricades”. I happened to be there, in the streets near the Pantheon, and was struck by what seemed to me a certain mimesis.

      All night, students around the Pantheon calmly built barricades, passing the paving stones from hand to hand with the same gestures they had seen in the 16-millimeter films of Vietnamese peasant women rebuilding bombed dikes.

      The next day, the streets were cluttered with debris from the police charge. The Latin Quarter was occupied by rows of armed CRS, and students who had been apolitical a few days before wandered in a new landscape, transformed into an oppressed people with an occupation army to overthrow. Was there some latent desire to be like the Vietnamese, who at the time were the object of widespread sympathy and admiration – even adoration?

      In between my library research and my part-time work for a movie dubbing studio, I followed those events unroll as closely as I could. I was present at many of the key happenings, the major skirmishes in the Latin Quarter, the orations at the Odéon theatre, the night of the barricades, the big marches, the speech at the Sorbonne of the student leader Daniel Cohn-Bendit on his triumphant return after being expelled to Germany. I rushed to buy every edition of the daily “Action.” Yes, I was there.


    • CIA says North Korea won't give up nukes, but might open a burger joint
      A new U.S. intelligence assessment has concluded that North Korea does not intend to give up its nuclear weapons any time soon, three U.S. officials told NBC News — a finding that conflicts with recent statements by President Donald Trump that Pyongyang intends to do so in the future.

      President Trump is continuing to pursue a nuclear summit with North Korean leader Kim Jong Un even though the CIA analysis, which is consistent with other expert opinion, casts doubt on the viability of Trump's stated goal for the negotiations, the elimination of North Korea's nuclear weapons stockpile.


    • How Do You Get Off the US "Kill List"?
      After the 9/11 attacks, the Bush administration created a secret "kill list" to step up the targeting of alleged terrorists for assassination. The criteria for inclusion on the list have apparently morphed over three presidential administrations, yet they remain elusive.

      Last year, two journalists filed a federal lawsuit against Donald Trump and other high government officials, asking to be removed from the kill list until they have a meaningful opportunity to challenge their inclusion. Both men claim to have no association with al-Qaeda or the Taliban, to have no connection to the 9/11 attacks, and to pose no threat to the United States, its citizens, residents or national security.

      Kareem and Zaidan Try to Get Off Kill List

      Bilal Abdul Kareem, a US citizen and freelance journalist, has survived five attempts on his life from targeted air-strikes. A Turkish intelligence official told Kareem that the US government is trying to kill him.

      Ahmad Muaffaq Zaidan, a citizen of Syria and Pakistan, is a senior journalist with Al Jazeera. He interviewed Osama bin Laden twice before the 9/11 attacks. Zaidan learned about his inclusion on the kill list from National Security Agency (NSA) documents leaked by Edward Snowden and published by The Intercept.


    • Solving the mystery of the Hunt/Dallas CIA memo hoax
      In 1978, a JFK assassination hoax emerged that continues to fuel conspiracy theories and accusations against the Central Intelligence Agency. Two news stories began to circulate claiming that the House Select Committee on Assassinations had obtained an alleged 1966 CIA memo placing Howard Hunt, of Watergate infamy, in Dallas on the day of President John Kennedy’s assassination. Some conspiracy enthusiasts have tried to use the two articles to corroborate each other, unaware that they shared the same source. A review of over 1,000 pages of documents and testimony gives the story of - and dismantles - the HSCA memo hoax.


    • Narco-Corruption, ISIS 3.0 and the Terror Drone Attack That Never Happened


      For almost 20 years, U.S. drone warfare was largely one-sided. Unlike Afghans and Yemenis, Iraqis and Somalis, Americans never had to worry about lethal robots hovering overhead and raining down missiles. Until, that is, one appeared in the skies above Florida.

      But that’s a story for later. For now, let’s focus on a 2017 executive order issued by Pres. Donald Trump, part of his second attempt at a travel ban directed primarily at citizens of Muslim-majority nations. It begins: “It is the policy of the United States to protect its citizens from terrorist attacks.”

      That sentence would be repeated in a January report from the Department of Justice and the Department of Homeland Security, “Protecting the Nation from Foreign Terrorist Entry into the United States.” Meant to strengthen the president’s case for the travel ban, it was panned for its methodological flaws, pilloried for its inaccuracies, and would even spur a lawsuit by the civil rights organization, Muslim Advocates and the watchdog group, Democracy Forward Foundation.


    • The problem with Ukraine's Arkady Babchenko assassination sting
      n Tuesday, Russian dissident journalist Arkady Babchenko strolled into a Ukrainian press conference to prove that he is, in fact, still alive.

      Put another way, Babchenko proved that he was not in fact killed on Tuesday evening while returning to his Kiev apartment, as had been previously reported. News that Babchenko had been assassinated went viral across the world on Tuesday after Ukrainian authorities declared that he had been found dead. Now the Ukrainian authorities say that faking Babchenko's death was necessary to draw out Russian assassins who had been ordered by the Kremlin to kill him. Those responsible for the plot are supposedly now in custody.

      This might appear like a cool spy game, but it is already looking like a pretty stupid gambit by the Ukrainians.

      By lying to its own people and to the world, the Security Service of Ukraine (SBU) has damaged its credibility. Every statement that the SBU makes in the future, whether in relation to Russian threats on Ukrainian soil or other national concerns, will now be judged skeptically by those who hear it. This credibility deficit will also make it harder for the SBU to recruit sources in that those prospective sources will be unsure whether their SBU handlers are telling them the truth.


    • A Middle East with No Master
      Time was, the countries of the Middle East relied on the United States for patronage, protection, and guidance. Suez taught Israel, Britain, and France that without Washington’s acquiescence, their policies could not succeed. Egypt’s defection showed Russia the limits of its ability to compete for clients in the region. It was U.S. leadership that enabled Israel, Egypt, and Jordan to end the state of war between them.

      The standing of the United States in the region derived in part from its centrality to diplomacy aimed at finding a formula for peaceful coexistence between Israelis and Palestinians and acceptance of Israel’s legitimacy by its Arab neighbors. Except on issues related to Israel, many Arab governments followed America wherever it led. The collapse of the Soviet Union erased Russian influence in the Middle East, as it did elsewhere.

      To recall this history is to underscore the extent of the geopolitical changes that have occurred so far this century. The United States no longer enjoys primacy in the Middle East. The former colonial powers need American military support to intervene in the region, but the countries of the region itself now act independently, confident that they can gain American backing for whatever they do. They do not seem to be wrong about this, judging from U.S. backing for Israel’s wars on its neighbors, Gulf Arab efforts to topple the Asad government in Syria, and the ongoing devastation of Yemen by Saudi Arabia and the U.A.E.




  • Transparency/Investigative Reporting



    • Join the June 19 London vigil demanding freedom for Julian Assange!


      Emmy Butlin is part of a group that has maintained a solidarity vigil in defence of Julian Assange for six years outside the Ecuadorian embassy in London. The WikiLeaks editor was forced to take asylum there in June 2012. On June 19, the Julian Assange Defence Committee is holding a vigil to mark the sixth anniversary of the date Assange entered the building.

      The World Socialist Web Site and the Socialist Equality Party is backing the vigil and working to secure maximum attendance. Emmy spoke to WSWS reporter Robert Stevens about the work of the group and the Julian Assange case.


    • The working class must mobilize to free Julian Assange!
      For nearly six years, Julian Assange, who exposed the crimes of the US military and intelligence apparatus, has been imprisoned in London, trapped in the Ecuadorean embassy under increasingly onerous and precarious conditions. For more than two months, he has been denied any contact with the outside world, unable to receive visitors, make phone calls or access the Internet.

      The perpetrators of this crime are not the governments routinely denounced as “rogue regimes” by imperialist powers and targeted for military aggression, but the imperialist powers themselves—principally the United Kingdom, Australia and the United States.

      Now, the Ecuadorean government of Lenin Moreno is in active negotiations with the UK to push Assange out. Following last year’s elections, Moreno has moved to seek a rapprochement with the US, which would involve handing the journalist over to the torturers and war criminals in Washington.


    • Julian Assange Case Update
      Today on Flashpoints: We bring you an update on the Julian Assange case. First up we’ll speak with Flashpoints correspondent and Live On The Fly hose, Randy Credico. And then, we feature an extended interview with filmmaker and activist, John Pilger.


    • Ecuador's Moreno: Julian Assange's Asylum Will Continue With Conditions
      President Lenin Moreno said granting the Ecuadorean citizenship to Assange was the foreign minister's idea.

      Ecuador's President Lenin Moreno says his country will respect Julian Assange's right to asylum but only if the Wikileaks founder "respects the conditions” his government has put in place for him to continue his stay at their London Embassy.


    • Mueller's Team Grilled London-Based 'Trump Defender' About Interactions With Roger Stone And WikiLeaks
      Special counsel Robert Mueller asked a London-based American academic and self-described “Donald Trump defender” about his connection to Roger Stone, ABC News reports.

      Malloch was detained by federal investigators at Boston’s Logan Airport in March. He told ABC News Mueller’s team spent an hour asking about Stone.

      Malloch, a contributor to InfoWars and close ally of UK Independence Part founder Nigel Farage, is the author to a new book, “The Plot to Destroy Trump: How the Deep State Fabricated the Russian Dossier to Subvert the President.” In it, Malloch alleges the U.S. intelligence community is trying to undermine Trump’s presidency.


    • Safe UK landing is no surprise


      So how come “the puppet” gets a visa with an outstanding arrest warrant against her, yet Julian Assange has to be holed up in the Ecuadorian Embassy?


    • Assange Must Comply with Conditions to Preserve Asylum
      Speaking in an interview Ecuador President Lenin Moreno said that Julian Assange’s actions were a cause of concern for the government

      Ecuador’s President Lenin Moreno says his country will respect Julian Assange‘s right to asylum but only if the Wikileaks founder “respects the conditions” his government has put in place for him to continue his stay at their London Embassy.

      Speaking in an interview with German Broadcaster Deutsche Welle, Moreno said Assange’s actions were a cause of concern for the government of the South American country, but his asylum was not under immediate threat if he complied.


    • Glenn Greenwald on Julian Assange, Ecuador & Threats to Press Freedom


    • Glenn Greenwald on Julian Assange, Ecuador & Threats to Press Freedom
      WikiLeaks founder and editor-in-chief Julian Assange is at risk of being removed from the Ecuadorian embassy in London where he has taken refuge for nearly six years, CNN reports. If he is forced out of the embassy, Assange could face arrest by British authorities and extradition to the United States. The Ecuadorian government cut off Assange’s internet in March. Former Ecuadorian President Rafael Correa told The Intercept that the government has also blocked Assange from receiving visitors, calling the tactic “torture.” Correa said that Ecuador was not maintaining “normal sovereign relations with the American government—just submission.” In other Assange news, last month the Democratic National Committee sued WikiLeaks for its role in publishing hacked materials relating to the 2016 election. We speak with Glenn Greenwald in Rio de Janeiro, who wrote last month for The Intercept that “the DNC’S lawsuit against WikiLeaks poses a serious threat to press freedom.”


    • In 'Blistering' Report, Journalism Watchdog Condemns DNC Lawsuit Against WikiLeaks as Severe Threat to Free Press
      Citing the concerns expressed by numerous First Amendment experts and journalists, CPJ's Avi Asher-Schapiro contends that the DNC's suit—which accuses WikiLeaks of conspiring with Russia and the Trump campaign to tilt the 2016 election by publishing a trove of hacked DNC emails—"goes against press freedom precedents going back to the Pentagon Papers and contains arguments that could make it more difficult for reporters to do their jobs."

      "What the language in this suit is calling 'conspiracy' is the same thing journalists do all the time—report on leaked or stolen documents. Imagine if Trump had the power to go after 'leakers' for 'conspiracy,'" Rolling Stone's Matt Taibbi wrote in a series of tweets highlighting CPJ's "blistering" report on Tuesday. "This case has potentially enormous consequences for the press as a whole."

      "This precedent threatens all journalists," added Glenn Greenwald, co-founder of The Intercept.

      [...]

      As Common Dreams at the time, free speech advocates raised alarm about the DNC's suit when it was filed last month, arguing that it is both riddled with legal holes and full of dangerous implications.

      "I think that this civil suit goes well beyond what the First Amendment permits," Barry Pollack, former president of the National Association of Criminal Defense Lawyers, who represents WikiLeaks founder Julian Assange in criminal cases. "We have seen in DOJs under both parties, a willingness to at least bump right up against the line of pursuing journalists criminally. And that's dangerous."


    • UW settles suit against CIA over 'top secret' data on Salvadoran Army officer
    • CIA Releases Records After University of Washington Lawsuit
      The CIA has turned over 139 documents to settle a lawsuit brought by the University of Washington's Center for Human Rights.

      [...]

      The settlement, reached last week in U.S. District Court in Seattle, brought the release of documents related to former El Salvadoran Col. Sigifredo Ochoa Pérez and his potential ties to the U.S. Some of the documents were formerly designated top secret, and some have never before been seen outside the agency.

      The Center for Human Rights' director, Angelina Snodgrass Godoy, said she was pleased with the settlement.


    • Baruch Invited the CIA to Recruit on Campus, and Faculty Are Steamed






  • Finance



    • Grazie Günther!
      The European commissioner should have been applauded, not scolded, for speaking out on the crisis in Italy.

      [...]

      After months of chest-beating by Yanis Varoufakis, the country’s Marxist finance minister, Greece’s already-dire economic situation worsened. Five months after the leftists took over, market pressure forced them to shutter the stock market, close the banks and implement capital controls.

      In an attempt to save face, Prime Minister Alexis Tsipras called a referendum over whether Greece should accept the bailout terms. The No vote won with over 60 percent.




  • AstroTurf/Lobbying/Politics



    • UK Academic Called a Russian Spy Appears to Be British Agent Instead
      Joseph Mifsud, director of the now-defunct London Academy of Diplomacy, has been a key figure in Russiagate, accused of having high-level connections to the Russian government and helping connect the Trump team with the Russians. A new report by Elizabeth Voz turns that allegation on its head, saying Mifsud is more likely to be a UK asset.

      Voz, co-founder and editor-in-chief of Disobedient Media, joined Fault Lines on Radio Sputnik to discuss.

      [...]

      Mifsud has denied the claim he was associated with Russian intelligence and insisted instead that he's a member of the European Council on Foreign Relations and the Clinton Foundation. Casting even more doubt on the claim, Mifsud was photographed next to Claire Smith in 2012 at a training program on international security organized by the London Academy of Diplomacy, where Mifsud was director. Smith belongs to the UK Joint Intelligence Committee, which oversees the UK's spying agencies.


    • No, the President Was Not Stopped From Entering the Pushkar Temple

      “Even to reach the lake, there are few stairs but the couple and their daughter didn’t go down them and offered the prayers from the one of the stairs. …Whatever is in circulation on social media is fake news,” Surendra Rajguru, priest at the Pushkar lake told The Wire.



    • Trump, Explained
      Now, Roseanne admitted to similar insanity and claimed it was the effect of Ambien, a common sedative… Well, if Trump takes a dose to go to sleep and has been for many years, he might just be into the hallucinatory side-effects regime… So, now we have a conspiracy theory of our own explaining the irrational Tweets. It does not explain the doubling down on the nightmares of the previous night but that might be just laid at the feet of habitually refusing to apologize or to explain. Perfect, eh?
    • Greenwald: FBI Informant in Trump Campaign Once Ran CIA Spy Operation Helping Reagan Win in 1980
      A top House Republican has defended the FBI against a series of attacks by President Trump, who’s claimed without evidence that the bureau planted a spy in his 2016 presidential campaign. Rep. Trey Gowdy, chair of the powerful House Oversight Committee, said Tuesday that the FBI was acting properly when it deployed a confidential informant—Stefan Halper—to investigate Russian attempts to interfere in the election. We talk to Glenn Greenwald about Halper’s involvement in the CIA and the 1980 election of Ronald Reagan.


    • ‘Their Hedge Fund Wants These Massive Profits’
      Since hedge fund Alden Global Capital has taken control of the Denver Post, the paper has seen rounds of layoffs. The newsroom has gone from 200 or so people to more like 70, with 30 more jobs slated to be cut this summer. Journalists have been moved to the printing plant to further cut costs for Alden, whose founder, Randall Smith, describes himself as investing in “distress.”

      Denver Post workers protesting the unceremonious gutting of their newspaper were joined recently by journalists from some of the other 90-odd papers Alden controls, via ownership of Digital First Media, at a rally at the vulture fund’s HQ in New York City. In a New York Times account, the Denver Post’s Elizabeth Hernandez says, as reporters do, that she doesn’t like being the story, but, she adds, “If we don’t tell our own story now, I don’t know how long we’ll be able to tell our community’s.”
    • Wherein Facebook Messes Up Elections By Trying Not To Mess Up Elections
      A few months ago I suggested that calling Facebook a bull in a china shop might not be fair to bulls. I fear the suggestion remains apt, as Facebook throws its considerable weight around in ways that, while potentially well-meaning, leaves all sorts of chaos in its wake. The latest evidence of this tendency relates to its recent announcement of policies designed to limit who can place political ads on Facebook.

      The problem is, that's what it's done: limit who can place ads on Facebook. But according to the Verge, all it's done is limit the ability for SOME people to post political ads. As in, only SOME of the candidates in any particular race.

      The Verge article notes that the Mississippi primary is set for June 5. But in one particular race for Congress, only the incumbent's authentication paperwork is in order, so only he is able to buy ads. As the day of the election draws near, his challenger finds himself locked out of being able to advertise through the medium.


    • New Allegations Added to Lawsuit on How Facebook’s Targeting Tools Helped Advertisers Exclude Older Workers
      Plaintiffs in a federal lawsuit have expanded the scope of their action, alleging that Facebook and other major employers violated federal and state anti-age bias laws by excluding older job seekers from seeing online employment ads.

      The Communications Workers of America and three older workers are suing on behalf of union members and others, who they claim missed employment opportunities because they never saw job postings after employers used Facebook-provided targeting tools and algorithms to direct ads to younger potential applicants.

      The original complaint was filed at the same time as a December ProPublica–New York Times report that raised concerns about online job ads discriminating against later-career workers. Facebook subsequently limited job advertisers’ ability to exclude users in some demographic groups — but not groups defined by age.

      In an amended complaint filed Tuesday with the federal district court for the Northern District of California in San Francisco, CWA and the law firm added claims to those they made in December. Beyond enabling exclusionary ads, the new complaint alleges that Facebook lets employers craft ads for “lookalike audiences” that are demographically narrow or similar to people already working for the employers placing the ads, a move that the plaintiffs say marginalizes older workers.




  • Censorship/Free Speech



    • Tommy Robinson is no free-speech martyr

      Free speech is too important for us to allow it to be consistently warped and slandered by both left and right. Free speech is about allowing a free and unhindered exchange of ideas. But, at the same time, we must recognise that the reason Robinson has a career is that we have become overly sensitive as a society to the kind of arguments he makes. He is a product not of too much free speech, but of too little. His arrest is not symbolic of a state conspiracy to shut him up. But it is at least connected to our continuing discomfort with discussing certain ideas.



    • FOSTA-SESTA is now law—where does that leave the Internet?

      In addition to being ineffectual, FOSTA-SESTA has dangerous consequences for Internet freedom: it marks an end to Section 230’s true “safe harbor” that saw the rise of today’s Internet. Though it may be difficult to prosecute, as the Department of Justice makes clear, it nonetheless creates legal uncertainty for sites that rely on Section 230 to operate. Though Facebook and Google may be able to afford the uncertainty associated with a weakened Section 230, small websites and startups cannot. As a result, FOSTA-SESTA will only help to engrain the current Internet monopolies.



    • Kenya: New Cybercrime Law Opens the Door to Privacy Violations, Censorship
      More and more Kenyans are connecting to the internet, most frequently from mobile devices like phones and tablets.

      There are, of course, big benefits to increased connectivity. These include the rise of mobile money transactions and access to loans. But there are downsides, too. The country has been targeted by hackers in several major attacks.

      In May 2018 the Kenyan government responded to these and other high profile cyber attacks by signing the Computer and Cyber Crime Act into law. This seems a strange decision, since legislation already exists that deals with these issues.
    • Kenya cybercrime law opens door to privacy violations, censorship
    • Reflecting on discourse, censorship after a quarter as Opinion Editor
      Last Spring Quarter, I wrote a column arguing that hate speech should not be free speech. I received a litany of nasty emails and comments calling me a fascist and saying that I didn’t deserve free speech if I opposed it for others. I’ll admit that the piece could’ve been worded better and that it didn’t represent the full scope and nuance of my argument. But I found it interesting that most people who contacted me addressed me as if I had single-handedly ripped the First Amendment from the pages of the Bill of Rights, as if I had shoved my column down their throats and forced them to read it. It was amusing and concerning to me that they felt my opinions were so significant and consequential that they warranted a response.


    • Canada ‘does not censor’ social-media posts in China: Foreign Affairs official
      Canada “does not censor” what it posts to Chinese social media, a Foreign Affairs official said, after a report raised questions about how countries communicate on the tightly controlled Chinese internet.

      Authorities in China routinely delete and otherwise restrict communications made by foreign embassies on the Twitter-like Sina Weibo, whose reach to large numbers of Chinese people has made it a desired location for “weiplomacy.”

      But a report this week that documented the censorship taking place also pointed out countries whose Weibo posts are not being aggressively censored, including Canada, calling into question whether they are redacting themselves.
    • Dexter Navy, Liam Hodges, & Sukeban join anti-censorship t-shirt project
      “Time and time again, we’ve seen cases of brave human rights defenders in repressive countries being subjected to censorship.” So says Kate Allen, the director of Amnesty International UK. She’s explaining the reason behind 50/50, a collaboration with global marketplace Everpress, exploring censorship. Consisting of 50 limited t-shirts, designed and produced by 50 different creatives, the project showcases independent artistry through highlighting some of the most intense manifestations of censorship across the globe. Over the years, Amnesty has protested against increased censorship, while also advising people to fight back against it online.


    • The myth of self-censorship
      As the media in Bangladesh wades through a quagmire of overt and covert censorship, journalists are often ‘accused’ of praticising self-censorship. It is with censure that they are said to ‘play safe’ and censor their own work. In fact, many journalists themselves ‘admit’ to self-censorship or, to put it bluntly, ‘saving their own skins’.

      But if truth be told, would any truly professional journalist practice self-censorship?

      It's a reality. But the question is - is this actually self-censorship or just censorship, plain and simple?


    • Prosper High School Journalists Stand Up to Censorship
      “Censorship keeps our newspaper from covering all the issues that matter to us,” Copy Editor Isabella Abraham said in a press statement released on Thursday. “Just because the opinion is ‘inconvenient’ for the school, doesn’t mean we don’t have a right to voice it.”

      Named the 2009 National Journalism Education Association Adviser of the Year, Lori Oglesbee-Petter has led the student journalists to earn over 100 awards for their reporting. Yet, Prosper High principal John Burdett has reportedly opted to end Oglesbee-Petter’s contract in a move the students fear signals the end of the journalism program.


    • [CENSORED] was meant to celebrate freedom. Instead it exposes something darker
      In 1969 Australian government censors claimed a Swedish film playing at the Sydney film festival included an actual sex scene involving a heavily pregnant woman. The film could only play, they said, if the offending copulation were deleted. But the scene in question involved no sex whatsoever. The censors apparently couldn’t distinguish between an embrace and penetrative sex – and weren’t prepared to admit they were wrong.

      This wasn’t the first time the Australian government had tried to cut scenes from films showing in Australian cinemas – they had been secretly banning films and slicing out scenes as they came through customs for years. But the uproar over this particular film became the catalyst for reforming the censorship laws at the dawn of the 1970s.


    • No scope for censorship in modern world: PM
      The Prime Minister, Shahid Khaqan Abbasi, has reminded that in a modern world there is no scope for any censorship.

      “Such measures may bring temporary benefits, but they are never in the interest of a country and the nation in the long run,” the prime minister said while addressing 28th award ceremony of the All Pakistan Newspapers Society (APNS) here Wednesday at the Prime Minister Office (PMO). The ceremony was also addressed by Dawn Media Group CEO and APNS President Hameed Haroon, Secretary General Sarmad Ali and federal information and broadcasting Minister Marriyum Aurangzeb.


    • Censoring media not in national interest, says PM Abbasi
      Prime Minister Shahid Khaqan Abbasi on Wednesday said that the social media has rendered censorship in the media redundant and urged the media organisations to ensure responsible reporting by exercising due diligence in verifying facts.

      Addressing an awards ceremony at All Pakistan Newspapers Society (APNS) in Islamabad, the prime minister said the social media has transformed the media landscape by making all information available to anyone.

      “Media censorship may render short-term advantages but it is never in national interests, especially in the modern age,” he said.


    • Pakistan’s censorship model
      On May 12, Dawn, Pakistan’s oldest and most prestigious English daily, published an interview with former Prime Minister Nawaz Sharif, in which Sharif uttered four relatively oblique sentences: “Militant organizations are active. Call them non-state actors, should we allow them to cross the border and kill 150 people in Mumbai? Explain it to me. Why can’t we complete the trial?” He was referring, ostensibly, to Lashkar-e-Taiba’s involvement in the 2008 Mumbai attack. Lashkar and its leader, Hafiz Saeed, have not been held accountable, and the trial has stalled in an anti-terrorism court in Pakistan.

      [...]

      No one doubts the military’s involvement in this censorship. It is the latest example of a steadily accumulating set of suppressive measures it seems to be taking against the media in recent months, to various ends: to control its own narrative and maintain its hold on the country, to control Pakistan’s global image, to weaken Sharif, and to try to meddle in the upcoming general election this July.



    • Media censorship is never in country's interest, says PM Abbasi
      Prime Minister Shahid Khaqan Abbasi on Wednesday said that his government did not believe in resorting to media censorship but urged the media to adopt a mechanism for self-regulation.

      Speaking at the All Pakistan Newspapers Society (APNS) Awards ceremony in Islamabad, the prime minister said media censorship was not possible in today's age of social media and the internet.

      Even in the past, he said, all efforts to censor the media did not prove to be fruitful.

      "You may achieve short-term gains by imposing censorship on media, but it never goes in the country's interests," he stressed.



    • Shutting down facebook in PNG is a reality

      Communications Minister Sam Basil said that the shutdown would enable the department and National Research Institute to conduct further research on how the social network was being used by users.



    • Papua New Guinea bans Facebook for a month to root out 'fake users'

      Analysts will explore how fake news and pornography spreads, and assess whether country needs its own version of the platform

    • Papua New Guinea considers 'temporary' ban on Facebook, citing illegal use


    • Papua New Guinea bans its citizens from Facebook for a month


    • PNG to push out Facebook, taking a sharp turn into cyber censorship


    • Instagram's Censorship of #Stripper Sparks Outcry from Sex Workers and Allies


    • Madmind Studio had to make a compromise with censorship in Agony


    • AGONY: The most controversial game since Grand Theft Auto has just been released


    • Republican congressional candidate Steve Toft accuses Facebook of censorship; ads restored after protest


    • New US sanctions target Iran for human rights abuses, censorship


    • U.S.: Treasury Department Sanctions Iranian Individuals, Entities Over Human Rights Abuses, Censorship


    • US sanctions Iran groups, Evin Prison for rights abuses


    • More Groups Call on Government to Reign in Tech Companies for Censorship, Nazi-like policies [video] [Ed: Natural News is full of rubbish so for their rubbish being deranked they call tech firms "Nazis"]
      Mike Adams, the founder of Natural News, a science-based natural health advocacy organization, is demanding that the government regulate Google, Facebook, YouTube and Twitter “to halt malicious censorship and create a fair platform for public debate.”


    • Censorship Plague Infects America [Ed: It's pretty rich when Nazi-ish sites compare those who suppress their speech to Nazis...]


      On May 10, 1933, 40,000 pro-Nazi Germans gathered in Berlin to stage a gigantic book-burning bonfire. Exactly 85 years later, on May 10, 2018, philosopher and author Gilad Atzmon was barred from the Wil-Mar Community Center in Madison, Wisc. on the grounds that he was a supposed “Holocaust denier.”


    • Spotify’s Censorship Crisis is About Social Responsibility
      Spotify has been forced into something of a rethink regarding its hate speech policy. Spotify announced it was removing music from playlists of artists that do not meet its new policy regarding hate speech and hateful behaviour. R.Kelly, who faces allegations of sexual abuseand XXXTentacion, who is charged with battering a pregnant woman, were two artists that found their music removed. Now Spotify is softening its stance following push back externally and internally, including from Troy Carter who made it known that he was willing to walk away from the company if the policy remained unchanged. Spotify had good intentions but did not execute well. However, this forms part of a much bigger issue of the changing of the guard of media’s gatekeepers.




  • Privacy/Surveillance



    • GDPR & Your website - Guide to privacy and peace of mind


      One day, you're a carefree blogger. The next, you're suddenly dealing with this big, looming thing called GDPR. The EU has introduced a new privacy-focused regulation, GDPR, and it dictates important privacy, security and data transparency requirements for websites handling personal data. You're asking yourself, does this affect me? And you're worried. Today, this article will help you better understand who, what, when and how, and hopefully give you both the knowledge and the tools to become a carefree blogger once again AND be merrily compliant.

      Now, the one extra question that you maybe asking yourselves is: why are publishing this only now, AFTER the regulation came into effect? Well, the answer is, believe or not, most tools and services out there released GDPR-compliant updates only in the past week or so, and that finally allowed me to put this guide together. Let's see what gives.
    • EFF and Other Groups Fight State Department Collection of Social Media Information … Again
      EFF and 54 civil liberties organizations joined comments this week written by the Brennan Center for Justice and the Electronic Privacy Information Center (EPIC) standing up against the U.S. government’s plans to collect social media information from foreigners entering the United States. This is the fifth time we’ve fought this battle in the past two years.

      The U.S. State Department’s recent proposal is to collect social media identifiers, phone numbers, and email addresses used in the last five years from all visa applicants. This plan would apply to applicants seeking both immigrant and non-immigrant visas to the United States.

      EFF opposed the plan in April 2018 when it was first revealed. As we wrote then, “This questioning invades the free speech and privacy rights of foreign visitors to the U.S., as well as the rights of their American friends, families, and professional associates.” We also expressed concerns about the breadth of the program, which would affect 710,000 immigrant visa applicants and 14 million non-immigrant visa applicants, according to the State Department.


    • A trip to the ER with your phone may mean injury lawyer ads for weeks

      Law firms are using geofencing in hospital emergency rooms to target advertisements to patients’ mobile devices as they seek medical care, according to Philadelphia public radio station WHYY. Geofencing can essentially create a digital perimeter around certain locations and target location-aware devices within the borders of those locations. Patients who unwittingly jump that digital fence may see targeted ads for more than a month, and on multiple devices, the outlet notes.



    • Trial begins for ex-CIA man accused of espionage for China
      A trial is under way for a former CIA case officer accused of giving top-secret documents to the Chinese.

      Kevin Mallory of Leesburg, Virginia, was charged last year under federal espionage statutes with delivering defense information to a foreign government.

      Prosecutors say they caught Mallory last year after he returned to the U.S. on a flight from Shanghai with more than $16,000 in undeclared cash.
    • US eavesdropping base in Yorkshire flouting UK law, claims group
      The information commissioner is to launch an investigation after a complaint by a campaign group that forces at the US’s largest eavesdropping centre in Britain are breaking the law.

      Reprieve said US forces at Menwith Hill in North Yorkshire were failing to comply with the provisions of the UK Data Protection Act by collecting and processing personal data without registering with the information watchdog.

      Drawing on reports about how US surveillance operations identified targets for drone strikes, the charity said personnel at the base operated programmes that monitored and located communications, including mobile phone calls and wifi traffic.

      In a letter to the Information Commissioner’s Office (ICO), Reprieve detailed the experience of the al-Manthari family in Yemen, who were caught up in a March 2018 US drone strike. While the US claimed the strike had killed members of al-Qaida, Reprieve alleges that its investigations revealed all the victims were civilians.


    • Apple's Latest Transparency Report Shows Gov't Still Not All That Interested In Seeking Warrants [Ed: Remember that so-called ‘Transparency’ Reports are a corporate PR opportunity. They are not obligatory, but companies and shareholders choose to release these, selectively showing some numbers that they then twist to tell misleading stories. PR stunts.]


      That being said, there's a lot of detail in the report that isn't found in transparency reports by other tech companies. The whole thing is worth reading, if only to marvel at the massive amount of data demands being made by US law enforcement. And it appears the FBI (and other federal agencies) still prefer writing their own paperwork, rather than subject themselves to the minimal judicial scrutiny subpoenas require. National Security Letters are, by far, the most popular way for the government to seek subscriber/customer data. Apple received more than 16,000 NSLs targeting ~8,000 accounts in the last six months of 2017 alone.
    • Email Privacy Act Comes Back Hopefully to Stay
      The Email Privacy Act is back. We hope it can stay.

      The House of Representatives passed a bill this week called the National Defense Authorization Act (NDAA), which authorizes the nation’s military and defense programs. Earlier in the week, scores of Representatives offered amendments to this must-pass bill in hopes of ensuring that their ideas get a chance to become law.

      Rep. Kevin Yoder (R-KS) used this opportunity to include as an amendment the Email Privacy Act, a piece of legislation long-favored by EFF. The Email Privacy Act would codify the rule announced by the Sixth Circuit—and now followed by providers nationwide—that requires government agents to first obtain a probable cause warrant when seeking the content of communications stored by companies like Google, Facebook, Slack, Dropbox, and Microsoft.

      On Thursday night, the House approved the NDAA–including the amendment with the Email Privacy Act—in a 351-66 vote. We applaud the House’s inclusion of this important statutory language in the must-pass NDAA.

      Rep. Yoder’s amendment, which you can read here, is identical to the Email Privacy Act (H.R. 387) that EFF supported in 2017. The amendment is also a revival of the Email Privacy Act (H.R. 699) that EFF likewise supported in 2016. That bill received unanimous support from the House of Representatives in a 419-0 vote.

      This is a battle we’ve fought for years. Rep. Yoder’s amendment is the latest chance for Congress to get it right.


    • Advocacy Groups Call On Retailers to Halt Sale of CloudPets Toys
      Civil liberties and child advocacy organizations are calling on Walmart, Target, and Amazon to halt sales of CloudPets, stuffed toys that allow the recording and sharing of voice messages, until the manufacturer addresses known security breaches and vulnerabilities—including a critical flaw that allows someone within bluetooth range to eavesdrop on, and send messages to, users of the toy.

      CloudPets may sound benign: stuffed unicorns, bears, monkeys, and other animals that double as voice messaging platforms, allowing children, parents, or friends of children to send recorded messages to and from each other via the toys. But the manufacturer, Spiral Toys, has a track record of failing to protect consumers—and those most likely to fall victim to these vulnerabilities, children. Researchers and others have contacted the toymaker about several flaws, but many of these concerns have gone unheeded.

      Read the letter from the coalition asking retailers to halt sales of CloudPets.


    • UK won't have a say in European AI or data protection rules after Brexit

      The European Commission's chief negotiator on Brexit, Michel Barnier, has shot down the ICO's suggestion that the UK have a seat at the decision-making table after the country leaves the Union.



  • Civil Rights/Policing



    • Nicaragua unrest: Government colluding with mobs, says Amnesty

      Amnesty International has accused the Nicaraguan government of colluding with paramilitary groups to suppress weeks of student-led demonstrations against President Daniel Ortega.



    • Ukraine blames Russia for shooting of journalist Arkady Babchenko


    • Ohio Wants to Make Sexting Illegal for Anyone Under 19
      Teen sexting may be unwise, but it should not be grounds to ruin young people’s lives.

      Oftentimes, when lawmakers don’t know how to make sense of something, or it scares them, they criminalize it.

      Exhibit A: sexting.

      Sexting is very common among teens, frequently referenced in pop-culture, and perhaps a mystery to people who didn’t grow up with a cellphone. Some may call it “unwise.” Friends may steer friends away from doing it. But one thing is for sure, sexting should not be criminal.

      After all, if teenagers decide to engage in some racy sexting, is it really the government’s place to punish them? If a photo or text conversation goes viral, sometimes the young person whose privacy was violated is punished in the court of law, which is just plain wrong. And all parties in these situations are young people who may not have the judgment to make the best decisions — so should they have the rest of their life ruined because of a bad decision?

      The answer should be no.

      Enter Ohio lawmakers, a group of (mostly) angry older white guys who are shaking their fists and bemoaning kids today while doing little, if anything, to understand the millennial generation. On May 22, members of the Ohio House Criminal Justice Committee passed a “teen sexting ban.” This misguided and over-the-top legislation proposes to “ban sexting” for anyone under the age of 19. The full House is expected to vote on this bill soon.


    • The CIA and Pelé


      A 1975 memo from Henry Kissinger uncovered in the Central Intelligence Agency archives details the then-Secretary of State’s talking points for an upcoming Oval Office meeting with Edson Arantes do Nascimento, the Brazilian soccer phenom better known as Pelé.


    • Court Has No Problem With Multiple Invasive Probings In Search Of Drugs That Didn't Exist
      If a government employee suspects you might be carrying drugs, be prepared to engage in a nonconsensual, highly-intimate relationship with the feds and their helpers. A New Mexico resident suspected of carrying drugs was subjected to multiple anal probings and enemas before law enforcement finally decided he wasn't actually carrying any drugs on him (or in him). An 18-year-old Arizona woman was subjected to vaginal and anal probing when attempting to return from a short trip to Nogales, Mexico. Again, no drugs were found but the helpful medical "professional" decided to go from CBP accusation to painful probing, bypassing less intrusive options (x-rays, etc.) in his earnest desire to save America from illicit substances.

      Another incident with lots of probing and violations but zero drugs has landed in the Fifth Circuit Appeals Court. Gloria Bustillos (an American citizen) was attempting to return to El Paso, Texas after a visit to Juarez, Mexico when CBP agents decided she must be trafficking drugs. The indignities began immediately.


    • Pictures From an Interrogation: Drawings by Abu Zubaydah
      The CIA spent years trying to probe the mind of Abu Zubaydah, the first terror suspect it subjected to “enhanced interrogation techniques” in the aftermath of 9/11. The cables and reports that document the agency’s interrogations of Zubaydah fill thousands of pages; scores of those pages have since been made public in redacted form. Diaries that Zubaydah kept before his capture in Pakistan in 2002 have also been released, as have excerpts from a first-person account of his brutal treatment at the hands of CIA interrogators.

      Another glimpse into the mind of Zubaydah now emerges from a series of drawings he made during his years in U.S. custody. They are by turns haunted and bizarre, ranging in subject matter from graphic depictions of his abuse to creatures drawn from some indistinct mythology. The drawings were released to ProPublica in partial response to a Freedom of Information Act lawsuit filed by the Media Freedom and Information Access Clinic at Yale Law School.


    • Racist Jury Selection at the Heart of a 1977 Murder Conviction
      Racial bias continues to render death sentences unreliable and deny defendants equal justice.

      Johnny Lee Gates, a Black man convicted in 1977 by an all-white jury of murdering a white woman in Muscogee County, Georgia, is currently fighting for his right to a retrial free from racial discrimination.

      Despite strong evidence of racial bias in jury selection during the original trial, whether he will be granted a retrial is far from certain. New evidence from his decades-old case — evidence that was only turned over to Gates’ attorneys in March of this year — unquestionably reveals the racism guiding the juror selection process. The prosecution’s notes, for example, contain jury-selection notations of “W” next to white prospective jurors and “N” next to Black prospective jurors.

      These notes are reprehensible. They also illustrate exactly the kind of racial discrimination in capital jury selection that the U.S. Supreme Court addressed and correctly deemed unconstitutional in Foster v. Chatman in 2016.

      The Supreme Court has a long history of condemning racial bias in capital jury selection. In 1880, for example, it outlawed the categorical exclusion of Black people from juries in Strauder v. West Virginia. Yet that decision did not usher in an age of racial equality in jury selection. Today, 138 years later, discrimination against and exclusion of jurors of color continue in full force in courtrooms across America, including in the gravest of contexts: trials to determine if someone lives or dies.

      Weeding out jurors of color can impact the outcome of a trial, whether by robbing the jury of valuable perceptions on identifications across racial lines and policing, or by playing into the immeasurable other ways that implicit biases pervade our justice system.




  • Internet Policy/Net Neutrality

    • ESPN Analysts Routinely Told Execs Not To Worry About Cord Cutting
      ESPN has long personified the cable and broadcast industry's tone deafness to cord cutting and TV market evolution. The company not only spent years downplaying the trend as something only poor people do, it sued companies that attempted to offer consumers greater flexibility in how video content was consumed. ESPN execs clearly believed cord cutting was little more than a fad that would simply stop once Millennials started procreating, and ignored surveys showing how 56% of consumers would ditch ESPN in a heartbeat if it meant saving the $8 per month subscribers pay for the channel.

      As the data began to indicate the cord cutting trend was very real, insiders say ESPN was caught flat footed by the trend. Instead of adapting for the streaming era, the company spent years doubling down on bloated sports licensing deals and SportsCenter set redesigns.

      These decisions ultimately came back to haunt the "worldwide leader in sports," resulting in ESPN losing 16 million subscribers over seven years (and an estimated 17,000 defecting viewers per day). As the accountability hammer began to fall, ESPN execs tried to pretend they saw this coming all along. ESPN subsequently decided the only solution was to fire hundreds of longstanding sports journalists and support personnel, but not the executives like John Skipper (since resigned) whose myopia made ESPN's problems that much worse.


    • TV still king, but Finland's media habits are changing, survey says
      At least half of respondents said they watch TV at least an hour a day, but media consumption habits in Finland appear to be splintering.




  • Intellectual Monopolies



    • No, Counting The Number Of Patent Infringement Lawsuits Is Not A Good Way To Quantify A Company's IP Ethics
      Much has been made about Donald Trump walking back sanctions placed on ZTE, a partly state-owned Chinese cellphone manufacturer, for selling products to Iran and North Korea. (Fun fact: our law enforcement agencies still do business with tech companies that sell to blacklisted countries.) The company has already paid millions of dollars in fines to the US for these violations, even if the working theory is the company paid zero dollars and the Chinese government picked up the tab.

      The actual badness of ZTE is somewhere between the extremes resulting in sanctions and the trade war victim it tries to present itself as. Trump is a fan of trade wars, even if Pyrhhic stalemates are still considered righteous wins in the Trade War Game. Trump has decided to lift the US government boot from ZTE's mostly-unbruised neck as a gesture of goodwill or something after slapping the world's largest exporter of consumer goods with a bunch of tariffs that seem to be doing more harm than good on the home front.

      And, because it's Trump lifting the sanctions, lots of people are claiming it's unilaterally a bad thing for him to do. This has resulted in some really bad arguments for maintaining sanctions and there's one being made at TechCrunch. It begins with a horrendous attempt to quantify the "terribleness" of ZTE by using an incredibly meaningless stat.

      [...]

      Apple has been sued for patent infringement 296 times over the same period. It must be at least twice the egregious IP violator ZTE is, and no one (outside of the IPWatchdog staff) believes the US government should sanction it.
    • The smartphone wars may have been good for Samsung, but they were even better for Google
      The dying embers of the smartphone wars were back in the headlines last week as Samsung found itself on the wrong end of a $539 million jury verdict for infringing several of Apple’s patents. The decision was the latest twist in the long-running litigation saga between the two giant device manufacturers who have become the undoubted leaders of the smartphone age. Although the jury ruled against Samsung, as Joff Wild made clear on this blog over the weekend there’s a very strong case to be made that the South Korean company has emerged as the overall victor in the dispute.


    • Beijing High Court upholds China’s first-ever SEP injunction in Iwncomm v. Sony
      On March 28, 2018, the Beijing High Court issued its decision for Iwncomm v. Sony, a high profile case concerning infringement of a standard essential patent (SEP). The appellate court amended the trial judgment on some key findings, but still upheld a permanent injunction and damages of about CNY 9 million (USD 1.3 million). This case has received widespread attention and sparked discussion of both IP professionals and the telecommunication industry. The Beijing High Court’s reasoning and conclusions will be likely to impact on SEP licensing negotiations generally.


    • Analysis on SEP Infringement Case IWNCOMM v. Sony
      Beijing High Court issues a final judgment in March 2018 on a high profile SEP infringement case IWNCOMM v. Sony ((2017)Beijing Civil Final No.454). The judgment of first instance is made by Beijing IP Court in March 2017, attracting extensive attention in the whole IP field. Some legal issues in this case are rather controversial and pioneering, with few precedent cases. Although this final judgment affirms injunction and damages determined by the first instance judgment, opinions of Beijing High Court on some legal issues are different from those of Beijing IP Court.


    • Would the proposed “manufacturing waiver” really pass the TRIPS test?
      As most readers will know, yesterday the European Commission published a proposal to amend Regulation 469/2009 concerning the supplementary protection certificate for medicinal products (the “SPC Regulation”) aimed at introducing a so-called “manufacturing exemption for export purposes” (in short, a “manufacturing waiver”). The rationale behind it is that the introduction of this new exemption to the rights conferred by supplementary protection certificates (“SPCs”) would allegedly boost the European generics and biosimilars industry. It would bring all sorts of benefits to Europe. Thousands of jobs would be created. Europe would become the pharmaceutical industry’s paradise. There are even rumours that Real Madrid would no longer win the Champion’s League (by the way, congratulations to Real Madrid supporters). No such comparable benefits can be traced back in history since the time when Noah devised his famous Ark.



    • China extends drug patent exclusivity to 25 years


      China extends drug patent exclusivity to 25 yearsOn May 11th, the office of U.S. Food and Drug Administration (FDA) Commissioner Scott Gottlieb issued a press release discussing aspects of President Donald Trump’s plans to lower the prices of drugs prescribed to United States citizens. Commissioner Gottlieb noted that the agency was increasing its efforts to implement the Drug Competition Action Plan by removing market barriers to generic pharmaceuticals. The press release also indicated that the agency would be calling out the actions of specific companies it believes are abusing the system “to reduce gaming of statutory and regulatory requirements to help ensure that drug companies don’t use anticompetitive strategies to delay development and approval of important generic drugs.”


    • A new exemption from supplementary protection certificates (SPC) in the EU
      On 28 May, 2018, the European Commission published its proposal to amend Regulation (EC) No 469/2009 concerning supplementary protection certificate for medicinal products. Urged by the European Parliament, the Commission introduces a so-called manufacturing exemption for export purposes, also known as a “manufacturing waiver” to the protection conferred by the certificate.


    • EU Commission Proposes Softening Of SPC Law To Assist EU-Based Manufacturers
      The European Commission has proposed a "targeted adjustment" to intellectual property law with a view to reducing the restrictions on EU-based manufacturers of pharmaceuticals seeking to compete in global markets.


    • European Commission proposes manufacturing waiver for SPCs
      The European Commission has proposed to introduce an ‘export manufacturing waiver’ to Supplementary Protection Certificates (SPCs) to ‘help Europe’s pharmaceutical companies tap into fast-growing global markets and foster jobs, growth and investments in the EU’.

      According to a press release of 28 May 2018, ‘Supplementary Protection Certificates extend patent protection for medicinal products which must undergo lengthy testing and clinical trials prior to obtaining regulatory marketing approval. Thanks to the waiver, in the future EU-based companies will be entitled to manufacture a generic or biosimilar version of an SPC-protected medicine during the term of the certificate, if done exclusively for the purpose of exporting to a non-EU market where protection has expired or never existed.’


    • Trademarks



      • Author Trademarks the Word 'Cocky,' Earns the Ire of Romance Writers Everywhere
        It’s a bad idea to come after romance authors’ favorite double entendres. Unfortunately, Faleena Hopkins, holder of a trademark on the word “cocky” and a shaky understanding of trademark law, fired a bunch of shots and not only missed the mark, but managed to turn her entire industry against her.

        Hopkins is the author of a series of romance novels about the “Cocker Brothers” which she has named “The Cocky Series.” Hopkins obtained a trademark for the word “cocky” on April 17, 2018. On May 7, 2018, Kevin Kneupper filed a challenge [pdf] to the trademark. That’s only three weeks, but a lot happened in that time.

        Hopkins filed for two trademarks. One is for the word “cocky” in a specific font. The second is just for using the word in a series of books, downloadable and regular, “in the field of romance.” Once Hopkins had that mark, things spiraled.

        Authors T.L. Smith and Melissa Jane were contacted by Audible about their upcoming book Cocky Fiancé, telling them they had received a notice that their title was infringing. They then got an email from Hopkins, followed very quickly, they told Vox, by a notice from Amazon about infringement. Seeing that Hopkins did have a registered mark, the two changed their book title to Arrogant Fiancé and ate the cost of the merchandise with Cocky Fiancé printed on it.




    • Copyrights



      • Vevo Flop Shows, Once Again, How Badly The Record Labels Underestimate Technology
        Just last week we wrote about how the big record labels have a hilariously long history of failing to grasp the importance of providing a good underlying technology service for music online and how they always overvalue the content, and assume that the technology and services are a commodity that is effectively worthless. And, yet again, that approach has failed them. The latest is the collapse and capitulation of Vevo, the service put together by a few of the major record labels to try to "take on" YouTube (even while using some of YouTube's underlying technology). Earlier this week, Vevo announced that it was shutting down its own site and app, which basically no one used anyway. Instead, it'll just focus on using YouTube, which was where everyone watched Vevo videos in the first place.


      • Copyrighting Software: Case Likely Heading to Supreme Court


        Google has now filed an en banc rehearing petition in its dispute with Oracle over copyrightability of the naming system for an application programming interface — namely Oracle’s Java API that Google copied. [Oracle Am. v. Google LLC Rehearing Petition]

        The basic issue here stems from Google’s program interface for Android App development. Rather than creating its own set of functions and methods, Google decided to mimic the method-calls of Java. At the time, Google’s third-party app marketplace was lagging far behind Apple’s, and the Java-API mimic was seen as a strategy to facilitate more rapid development of apps since the programming language was already so popular.

        [...]

        Although Java was available for licensing, Google refused. Although Java’s originator Sun Microsystems was known for its lack of IP enforcement, that all changed when Oracle acquired the company.

        In the most recent iteration of the case, the jury found that Google’s use was a “fair use” and thus not an infringement. On appeal, however, the Federal Circuit reversed — finding the API the proper subject of copyright protection and not subject to a fair use defense in this case. As Jason Rantanan wrote: “the court’s analysis all but says (expressly so!) that fair use can never apply.”


      • WIPO Didn't Want The Pirate Party To Observe Its Efforts, But Happy To Include A Group Whose Mission Is To Battle Space Lizards
        You may recall five years ago how WIPO -- the World Intellectual Property Organization, a UN body that is famous for its maximalist and expansionary approach to intellectual property -- delayed and then rejected the Pirate Parties International request to become an "observer." As we noted, the "observer" process is more or less a formality, and it's pretty common to see everyone who applies get approved. So it was a bit odd that WIPO rejected the Pirates.

        And it's even odder when you consider just who WIPO allowed in this year. As noted by Intellectual Property Watch, one of the organizations whose application was rubber-stamped this year to become a WIPO observer is that of the generically named "IP Centre."
      • PUBG takes US game firm to court
        Korean game developer PUBG, a subsidiary of Bluehole, has filed a copyright violation lawsuit against U.S.-based Epic Games, asking a court to determine whether the latter's "Fortnite" was copied from the former's "PlayerUnknown's Battlegrounds."

        A PUBG official said Friday that the firm filed an injunction, alleging copyright infringement, with the Seoul Central District Court against Epic Games Korea.

        "We filed the suit to protect our copyright in January," said the official.
      • Epic Game’s Fortnite Sued By PUBG Makers Over ‘Copyright Violation’
        he makers of PUBG have filed a lawsuit against Epic Game’s Fortnite on the ground of copyright infringement.

        Last year, PlayerUnknown’s Battlegrounds gained massive popularity by introducing the battle royale shooter genre for the players. Seeing it gain traction, Fortnite came up with its own battle royale mode and now it stands as the most popular game on the planet.
      • New Organization Formed In South Africa To Promote The Rights Of Creators And Support Intelligent Copyright Reform
        Over the years, Techdirt has written about some pretty bad stuff happening in South Africa on the copyright front. For example, there was the Business Software Alliance using made-up figures in an attempt to revise copyright law in its favor. The South African music rights organization tried to put public domain works under copyright. And -- most insane of all -- the South African recording industry association ran a stupid "anti-piracy" campaign called "Shoot the Pirate", which resulted in actual violence. So it makes a pleasant change to report on some good news from the country. A new organization of creators has been formed to press for a more balanced copyright system in South Africa. They call themselves ReCreate...


      • Pressure grows ahead of key parliamentary vote on major shake up of EU-wide copyright laws

        It is claimed that some committee members have been told of “possible repercussions” if they fail to support the proposal.

        They have allegedly been told that to “stay away” from the meeting if they intend to reject the new law, with substitute members, who are more sympathetic to the plans, lined up to vote instead.



      • Germany's scientific texts were made free during and after WWII; analyzing them today shows the negative effect of paywalls on science

        Here's the headline finding: "This artificial removal of copyright barriers led to a 25% decline in prices, and a 67% increase in citations. These results suggest that restrictive copyright policies slow down the progress of science considerably."



      • Effects of copyrights on science

        Copyrights grant publishers exclusive rights to content for almost a century. In science, this can involve substantial social costs by limiting who can access existing research. This column uses a unique WWII-era programme in the US, which allowed US publishers to reprint exact copies of German-owned science books, to explore how copyrights affect follow-on science. This artificial removal of copyright barriers led to a 25% decline in prices, and a 67% increase in citations. These results suggest that restrictive copyright policies slow down the progress of science considerably.

        With digitisation, the costs of distributing new research, textbooks, and other types of knowledge has become negligible. In principle, people across the world could now have access to a new research paper within minutes of its publication. Yet copyrights, which grant publishers exclusive rights to content for nearly 100 years, create enormous access costs. These costs are high enough to prevent people outside of universities and wealthy institutions from accessing new research. If the creation of new science and innovation depends on access to existing science, as Scotchmer (1991) has argued, the social costs of increased access costs through copyrights may be immense.



      • FCC Republican asks Amazon and eBay to boost crackdown on pirate TV boxes

        Commissioner Michael O'Rielly, part of the FCC's Republican majority, wrote a letter to the Amazon and eBay CEOs asking them to crack down on set-top boxes that violate FCC rules.



      • FCC Asks Amazon & eBay to Help Eliminate Pirate Media Box Sales

        FCC Commissioner Michael O'Rielly has written to the heads of Amazon and eBay with a request to eliminate sales of pirate media boxes which illegally display the FCC compliance logo. In a letter to Devin Wenig and Jeff Bezos, O'Rielly seeks the total removal of such devices, noting that their fraudulent labeling is exacerbated by the effect they have on the entertainment industries.



      • Hong Kong Customs Arrest Pirate Streaming Device Vendors

        On May 25 and 26, Hong Kong Customs carried out a series of raids against four retail outlets suspected of selling "fully loaded" set-top boxes which provided unauthorized access to movies and TV shows. Seven men and one woman were arrested and charged with copyright infringement offenses. Officials have warned that offenders could be imprisoned for up to four years.



      • PUBG Sues Fortnite over Copyright Infringement

        PUBG and Fortnite are two of the hottest games of the moment. While the games share some similarities, thus far they have managed to coexist without significant trouble. However, that is no longer the case since PUBG has taken Epic Games to court in South Korea over alleged copyright infringement.









Recent Techrights' Posts

The Latest Wave of Microsoft Crime, Bribes, and Fraud
Microsoft is still an evil, highly corrupt company
Links 19/04/2024: Running a V Rising Dedicated Server on GNU/Linux and More Post-"AI" Hype Eulogies
Links for the day
[Video] Novell and Microsoft 45 Years Later
what happened in 2006 when Novell's Ron Hovsepian (who had come from IBM) sealed the company's sad fate by taking the advice of Microsoft moles
EPO “Technical” Meetings Are Not Technical Anymore, It's Just Corrupt Officials Destroying the Patent Office, Piecewise (While Breaking the Law to Increase Profits)
Another pillar of the EPO is being knocked down
Sven Luther, Lucy Wayland & Debian's toxic culture
Reprinted with permission from disguised.work
 
Matthew Garrett, Cambridge & Debian: female colleague was afraid
Reprinted with permission from disguised.work
David Graeber, village wives & Debian Outreachy internships
Reprinted with permission from disguised.work
Neil McGovern & Ruby Central part ways
Reprinted with permission from disguised.work
Links 20/04/2024: Chinese Diplomacy and 'Dangerous New Course on BGP Security'
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, April 19, 2024
IRC logs for Friday, April 19, 2024
Gemini Links 19/04/2024: Kolibri OS and OpenBSD
Links for the day
[Meme] EPO “Technical” Meetings
an institution full of despots who commit or enable illegalities
Red Hat Communicates the World Via Microsoft Proprietary Spyware
Red Hat believes in choice: Microsoft... or Microsoft.
Chris Rutter, ARM Ltd IPO, Winchester College & Debian
Reprinted with permission from disguised.work
[Video] Microsoft Got Its Systems Cracked (Breached) Again, This Time by Russia, and It Uses Its Moles in the Press and So-called 'Linux' Foundation to Change the Subject
If they control the narrative (or buy the narrative), they can do anything
Links 19/04/2024: Israel Fires Back at Iran and Many Layoffs in the US
Links for the day
Russell Coker & Debian: September 11 Islamist sympathy
Reprinted with permission from disguised.work
Sven Luther, Thomas Bushnell & Debian's September 11 discussion
Reprinted with permission from disguised.work
G.A.I./Hey Hi (AI) Bubble Bursting With More Mass Layoffs
it's happening already
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, April 18, 2024
IRC logs for Thursday, April 18, 2024
Coroner's Report: Lucy Wayland & Debian Abuse Culture
Reprinted with permission from disguised.work
Links 18/04/2024: Misuse of COVID Stimulus Money, Governments Buying Your Data
Links for the day
Gemini Links 18/04/2024: GemText Pain and Web 1.0
Links for the day
Gemini Links 18/04/2024: Google Layoffs Again, ByteDance Scandals Return
Links for the day
Gemini Links 18/04/2024: Trying OpenBSD and War on Links Continues
Links for the day
IRC Proceedings: Wednesday, April 17, 2024
IRC logs for Wednesday, April 17, 2024
Over at Tux Machines...
GNU/Linux news for the past day