Bonum Certa Men Certa

Links 25/9/2018: Mesa 18.1.9, New Fedora Beta, and Oracle Solaris 11.4 SRU1





GNOME bluefish

Contents





GNU/Linux



Free Software/Open Source



  • Gnanavelkandan Kathirvel, Director Member Technical Staff, AT&T, Board of Directors at OpenStack, TSC Chair of Akraino Edge Stack [Ed: IDG has been reduced to "sponsored" (fake, ads) 'articles'.]


  • Deutsche Telekom and Aricent to Open-Source Edge Software Platform for 5G


  • KITE conducts training on free and open source software applications
    In continuance with the Public Education Rejuvenation Mission of Kerala Government, a two-day sub-district wise training camp on Free and Open Source Software (FOSS) applications for the Little KITE members would be conducted by KITE (Kerala Infrastructure and Technology for Education).

    As part of the PERM initiative,the Little KITE clubs currently include 58,380 student members from 1901 schools and it would be the 14,000 students out of these who excelled in school level trainings, who have been included for the 2-day camp. Training centers have been arranged in each of the 163 sub districts for the 2-day camp, which would only make use of Free and Open Source Software.


  • Does Open Source Resolve the Storage Dilemma?
    Today’s business IT landscape has grown and exceeded beyond the highest estimates, and storage growth is no exception. People and machines are consuming unstructured data more than ever, and businesses have to continually reinforce their storage capabilities to keep up with the challenges of storing large volumes of business data.

    For CIOs, storage systems that can provide greater flexibility and choice, as well as the capability to identify unstructured data better to categorize, utilize and automate the management of it throughout its lifecycle are seen as the ideal solution.

    One answer to solving the storage issue is software-defined storage (SDS) which separates the physical storage hardware (data plane) from the data storage management logic or ‘intelligence’ (control plane). Needing no proprietary hardware components, SDS is the perfect cost-effective solution for enterprises as IT can use off-the-shelf, low-cost commodity hardware which is robust and flexible.


  • French cybersecurity agency open sources security hardened CLIP OS


    After developing it internally for over 10 years, the National Cybersecurity Agency of France (ANSSI) has decided to open source CLIP OS, a Linux-based operating system developed “to meet the specific needs of the [French] administration,” and is asking outside coders to contribute to its development.


  • Knowledge Sharing in Software Projects
    We are extremely grateful to those who filled out the survey. We feel that our research can help create better environments at work, where team members can share knowledge and innovate.

    Purpose of the Study Our research is focused on knowledge sharing in ambiguous circumstances. Six Sigma is a method of quality control that should reduce ambiguity, given its structured approach. We ask whether the reduction in ambiguity is coupled with a reduction in knowledge sharing as well.


  • Editor's Corner—Open source is not 'one size fits all' [Ed: But that's a plus, not a minus. With proprietary software it's one unsuitable thing for everything; doesn't scale.]
    Open source communities are no doubt playing a key role in moving the telecommunications industry forward, but not everyone is on board the bandwagon.

    Over the past five months or so, we've spent a fair amount of time writing about open source groups and standards development organizations (SDOs) such as the Linux Foundation, MEF, Open Networking Foundation, OpenDaylight, the TM Forum and ETSI, and there's clearly more cooperation afoot for the good of the industry.

    But artificial intelligence startup B.Yond's chief marketing officer, Rikard Kjellberg, said his company has to be careful when it comes to choosing which open source community to commit its resources to. Kjellberg spoke to FierceTelecom on the heels of the AT&T Spark conference earlier this month.


  • Collabora Had Another Stellar Year For Open-Source Consulting
    The Collabora open-source consulting firm whose expertise spans from the Linux kernel to LibreOffice and X.Org had another successful year. The UK-based company last week reported their 2017 financial position last week providing a glimpse at the viability of open-source / free software consulting.


  • Daniel Stenberg: The Polhem prize, one year later


    Family and friends have gotten a rudimentary level of understanding of what curl is and what it does. I'm not suggesting they fully grasp it or know what an "internet protocol" is now, but at least a lot of people understand that it works with "internet transfers". It's not like people were totally uninterested before, but when I was given this prize - by a jury of engineers no less - that says this is a significant invention and accomplishment with a value that "can not be overestimated", it made them more interested. The little video that was produced helped:



  • Open Source Voice Assistant, Mycroft AI, Named Top Deal By KingsCrowd


  • Service providers increasingly adopt open source for their networks


    Communications service providers (CSPs) are increasingly keen to adopt open source technologies to deliver their services, according to research.

    At this week’s Open Networking Summit Europe in Amsterdam, delegates heard that DevOps, automation, cloud, big data and analytics, software-defined networking (SDN), and management and orchestration (MANO) were increasingly being supported by open source solutions.

    Commissioned research questioned 150 CSP representatives across 98 companies worldwide. It found that 98% of CSPs are “confident” that open networking solutions can achieve the same level of performance as traditional networking solutions.


  • Communications Service Providers Overwhelmingly Confident in Open Source Networking Solutions, Survey Finds


  • Events



  • Web Browsers



    • Chrome



      • Why I’m done with Chrome


        When Google launched Chrome ten years ago, it seemed like one of those rare cases where everyone wins. In 2008, the browser market was dominated by Microsoft, a company with an ugly history of using browser dominance to crush their competitors. Worse, Microsoft was making noises about getting into the search business. This posed an existential threat to Google’s internet properties.

        In this setting, Chrome was a beautiful solution. Even if the browser never produced a scrap of revenue for Google, it served its purpose just by keeping the Internet open to Google’s other products. As a benefit, the Internet community would receive a terrific open source browser with the best development team money could buy. This might be kind of sad for Mozilla (who have paid a high price due to Chrome) but overall it would be a good thing for Internet standards.


      • Google secretly logs users into Chrome whenever they log into a Google site
        This system, Sync, allows users to log in with their Google accounts inside Chrome and optionally upload and synchronize local browser data (history, passwords, bookmarks, and other) to Google's servers.

        Sync has been present in Chrome for years, but until now, the system worked independently from the logged-in state of Google accounts. This allowed users to surf the web while logged into a Google account but not upload any Chrome browsing data to Google's servers, data that may be tied to their accounts.


      • Here’s How Chrome’s New Auto-Login Puts Your Privacy At Massive Risk
        Google brought in a bunch of new features in the new Chrome 69 version. While many of them were much appreciated, some didn’t go well with the users. Apparently, there is another less advertised tweak that people are not happy about.


      • A Seemingly Small Change to Chrome Stirs Big Controversy


      • Chrome 69 secretly logs you in to Chrome Sync when you visit a Google site

        A number of reports have highlighted that Chrome 69 - the one that made your tabs all curvy - is automatically logging people in as soon as they hit a Google-owned site. In other words, if you use Google, Gmail, YouTube, Google Docs, Google Maps and are logged in, then Chrome will also follow suit.



      • Now Chrome Doesn’t Delete “Google Cookies” Even If You Clear All Cookies
        Yet another privacy concern for Google Chrome users! Previously, we talked about Google’s auto-login mechanism which is hijacking our local Google Chrome data. Now, another Chrome 69 setting has come to light which is risking our freedom to remove data.




    • Mozilla



      • R.I.P., Charles W. Moore, a fine man who liked fine Macs
        A farewell and au revoir to a great gentleman in making the most of your old Mac, Charles W. Moore, who passed away at his home in rural Canada on September 16 after a long illness. Mr Moore was an early fan of TenFourFox, even back in the old bad Firefox 4 beta days, and he really made his famous Pismo PowerBook G3 systems work hard for it.


      • Consent management at Mozfest 2018


        Good news. It looks like we're having a consent management mini-conference as part of Mozfest next month. (I'm one of the organizers for the Global Consent Manager session, and plan to attend the others.)


      • Introducing Firefox Monitor, Helping People Take Control After a Data Breach
        Data breaches, when information like your username and password are stolen from a website you use, are an unfortunate part of life on the internet today. It can be hard to keep track of when your information has been stolen, so we’re going to help by launching Firefox Monitor, a free service that notifies people when they’ve been part of a data breach. After testing this summer, the results and positive attention gave us the confidence we needed to know this was a feature we wanted to give to all of our users.


      • Firefox Monitor, take control of your data
        That sinking feeling. You’re reading the news and you learn about a data breach. Hackers have stolen names, addresses, passwords, survey responses from a service that you use. It seems like we’re having that sinking feeling more and more. But we don’t have to despair. While technology will never be impervious to attacks, we can make sure that we’re able to respond when we learn that our personal data and passwords are part of a breach.


      • Firefox Quantum, Beta and Nightly Affected by ‘Reap Firefox’ Crash Attack
        A particular vulnerability in the present Firefox browser has been unraveled by the security researcher and basically the creater of this bug, Sabri Haddouche in his blog post. He pointed towards a bug which brings the browser and also the operating system possibly with a ‘Reap Firefox’ attack crash. This vulnerability affects Firefox versions working under Linux, macOS and Windows.


      • $1.6 Million to Connect Unconnected Americans: Our NSF-WINS Grand Prize Winners
        After months of prototyping and judging, Mozilla and the National Science Foundation are fueling the best and brightest ideas for bringing more Americans online

        Today, Mozilla and the National Science Foundation (NSF) are announcing the grand prize winners in our Wireless Innovation for a Networked Society (NSF-WINS) Challenges — an audacious competition to connect millions of unconnected Americans.

        The grand prize winners are as novel as they are promising: An 80-foot tower in rural Appalachia that beams broadband connectivity to residents. And, an autonomous network that fits in two suitcases — and can be deployed after earthquakes and hurricanes.


      • Firefox collects data on you through hidden add-ons

        Mozilla, the organisation that produces the Firefox browser and makes a loud noise about its open source credentials, is quietly collecting telemetry data on its users by the use of hidden add-ons, even though publicly visible telemetry controls are not selected.



      • WLinux Distro for Windows Subsystem for Linux Now Available, openSUSE Call for Hosts, New Firefox Bug, Firefox Collecting Telemetry Data and Creative Commons Releases Significant CC Search Update


        In other Firefox news, the browser evidently is collecting telemetry data via hidden add-ons, ITWire reports. The ITWire post also quotes Mozilla's Marshall Eriwn, director of Trust and Security: "...we will measure Telemetry Coverage, which is the percentage of all Firefox users who report telemetry. The Telemetry Coverage measurement will sample a portion of all Firefox clients and report whether telemetry is enabled. This measurement will not include a client identifier and will not be associated with our standard telemetry."






  • Oracle/Java/LibreOffice



    • LibreOffice: A history of document freedom
      My reminiscing led me to reach out to the Document Foundation, which governs LibreOffice, to learn more about the history of this open source productivity software.

      The Document Foundation's team told me that "StarWriter, the ancestor of the LibreOffice suite, was developed as proprietary software by Marco Börries, a German student, to write his high school final thesis." He formed a company called Star Division to develop the software.

      In 1999, Sun Microsystems bought Star Division for $73.5 million, changed the software's name to OpenOffice.org, and released the code as open source. Anyone could download the office suite at no charge for personal use. The Document Foundation told me, "For almost 10 years, the software was developed under Sun stewardship, from version 1.0 to version 3.2. It started with a dual license—LGPL and the proprietary SISSL (Sun Industry Standard Software License)—but it evolved to pure LGPL from version 2.0."


    • Announcing Oracle Solaris 11.4 SRU1
      Today we're releasing the first SRU for Oracle Solaris 11.4! This is the next installment in our ongoing support train for Oracle Solaris 11 and there will be no further Oracle Solairs 11.3 SRUs delivered to the support repository. Due to the timing of our releases and some fixes being in Oracle Solaris 11.3 SRU35 but not in 11.4, not all customers on Oracle Solaris 11.3 SRU35 were able to update to Oracle Solaris 11.4 when it was released. SRU1 includes all these fixes and customers can now update to Oracle Solaris 11.4 SRU1 via 'pkg update' from the support repository or by downloading the SRU from My Oracle Support Doc ID 2433412.1.
    • Oracle Solaris 11.4 SRU1 Released
      It's been just under one month since Oracle's long-awaited debut of Solaris 11.4 and now its first stable release update has been issued.

      Solaris 11.4 SRU1 is mainly intended to fix some early bugs and those that didn't make the cut for getting in the initial 11.4 release. One new feature is support for "Memory Reservation Pools for Kernel Zones" to help systems with high levels of memory contention or fragmented memory by allowing memory to be reserved ahead of time.




  • Pseudo-Open Source (Openwashing)



  • Funding



    • 'Netflix for Open Source' Wants Developers to Get Paid
      Henry Zhu makes software that's crucial to websites you use every day, even if you’ve never heard of him or his software.

      Zhu manages a program called Babel, which translates code written in one version of the programming language JavaScript into code written for another version of the language. That might not sound like a big deal. But because not all browsers support the latest version of JavaScript, Babel lets programmers use JavaScript’s latest features without worrying about which browsers will run the code. It's useful enough that it's been adopted by companies like Facebook, Netflix, and Salesforce.


    • This “Netflix For Open Source” Startup Helps Programmers Get Paid
      Open source developers, especially those who work on lesser known projects, do not get much attention or money for the work they do. While some developers are paid to work on open source projects as a part of their day jobs, they can get overwhelmed by the amount of work these projects require.


  • FSF/FSFE/GNU/SFLC



    • Learn the 37 most frequently used shortcuts in GIMP
      GIMP is a fantastic artist's tool for editing digital images, especially with the bevy of impressive features in the recent release of version 2.10. Of course, like all creative applications, you can get working more quickly if you can make yourself familiar with the various keyboard shortcuts and hotkeys available. GIMP, of course, gives you the ability to customize these shortcuts to match what you're personally comfortable with. However, the default shortcuts that GIMP ships with are impressive and generally easy to get used to.

      This cheat sheet is not an exhaustive list of all of the defaults GIMP has available. Instead, it covers the most frequently used shortcuts so you can get to work as fast as possible. Plus, there should be a few in here that make you aware of a few features that maybe you weren't aware of.




  • Programming/Development



    • Why Linux users should try Rust
      Rust is a fairly young and modern programming language with a lot of features that make it incredibly flexible and very secure. It's also becoming quite popular, having won first place for the "most loved programming language" in the Stack Overflow Developer Survey three years in a row — 2016, 2017, and 2018.

      Rust is also an open-source language with a suite of special features that allow it to be adapted to many different programming projects. It grew out of what was a personal project of a Mozilla employee back in 2006, was picked up as a special project by Mozilla a few years later (2009), and then announced for public use in 2010.


    • Perl for the Web: Mojolicious 8.0 Released


      Far gone are the days when you wrote Perl for the web in just CGI. Dancer, Catalyst and Mojolicious are the modern ways of going about it, with Mojo's version 8.0, code-named "Supervillain", being released just last week.

      Each framework has its own distinct advantages, with Dancer being considered the most lightweight and with the lowest entry barrier; and Catalyst being considered the most heavyweight and with a steep learning curve. Mojo floats somewhere in the middle, its own strongest point being its claim to be a "Real time Web framework" due to its Websockets and non-blocking/async capabilities provided out of the box. With that said, let's discover what Mojo's newest version has to offer.


    • Portable Computing Language 1.2 Released For OpenCL On CPUs & More
      The Portable Computing Language (a.k.a. POCL or PortableCL) is the effort for getting OpenCL running on CPUs as well as other hardware for this open-source code-base that supports OpenCL 1.2 with some OpenCL 2.0+ functionality.

      The main "feature" of POCL 1.2 is support for LLVM Clang 7.0 as previously the support was limited to LLVM 6.0, but now this new version of LLVM is supported. The HWLOC 2.0 library is also now supported. There are also some minor feature additions like device-side printf being supported.


    • Robert O'Callahan: More Realistic Goals For C++ Lifetimes 1.0
      Over two years ago I wrote about the C++ Lifetimes proposal and some of my concerns about it. Just recently, version 1.0 was released with a blog post by Herb Sutter.

      Comparing the two versions shows many important changes. The new version is much clearer and more worked-out, but there are also significant material changes. In particular the goal has changed dramatically.






Leftovers



  • Science



    • Google at 20: how two 'obnoxious' students changed the [I]nternet

      In 1996 they began experimenting with the Stanford homepage and soon came up with the PageRank algorithm – a ranking system which would prove to be Page and Brin’s breakthrough idea.

      The algorithm was devised to give more weight to links that came from more authoritative pages – the more backlinks a site had, the more likely it was to be a good source, similar to an academic paper. That allowed Page and Brin to rank search results not only by keyword frequency but by authority. And because the system analysed links, the more the web grew the better Backrub got.

      In August 1996, Backrub became Google, a play on the term googol, meaning the large number 10 to the power of 100. The first version appeared on the Stanford site, run from cobbled-together bits of computers scavenged by Page and Brin. The system demanded so much bandwidth it would regularly take down the whole of Stanford’s internet connection, but it succeeded in letting users search all 24m pages it had stored in its database.



  • Health/Nutrition



    • Brazil Signs Deal With Medicines Patent Pool To Share Patent Information
      Brazil yesterday signed an agreement with the Medicines Patent Pool (MPP), through which the country will share patent information with the MPP. The Brazilian IP office joins several others in an effort to regular update of the MPP’s database on patent information. Separately, high-level representatives of Latin American and Iberian countries met on the side of the annual World Intellectual Property Organization General Assemblies taking place this week.


    • The most dangerous drug of addiction

      A few weeks ago I left the house and while driving realised I had forgotten my smartphone. It was not a good feeling – I felt disadvantaged and disconnected. Yet as a younger man I happily travelled around the world with just my wristwatch and a backpack. What has happened to us since those days?



    • In Sickness and In Health: Comparing Patent Protection for Pharmaceuticals and Dietary Supplements [Ed: Patent maximlists' view]


    • Big Pharma Collects Most Canadian Cannabis Patents [Ed: Patents for billionaires, to help them guard their territory by setting up litigious threats, to scare emerging competition like pot]
      Seven of Canada’s top 10 cannabis patent holders are major multi-national pharmaceutical companies, according to a joint research project between Washington D.C. based New Frontier Data, the global authority in data, analytics, and business intelligence for the cannabis industry, and London based cannabis bio-technology firm, Grow Biotech .

      “Big Pharma’s inevitable entrance into the Cannabis space has arrived. The top nine medical conditions for which Cannabis can be used as an alternative treatment could cannibalize as much as $20 billion in U.S. pharmaceutical sales in the next two years. As more medicinal applications for the plant are discovered, and more physicians and patients integrate cannabis into treatment regimes, the potential impact of cannabis on healthcare will continue to grow for years to come,” said New Frontier Data Founder & CEO Giadha Aguirre de Carcer.


    • [Old] Why pharmaceuticals could be the prescription for trade warfare that truly hurts America
      What began as a trade skirmish over Donald Trump’s imposition of a 10-per-cent tariff on Canadian steel and aluminum is now clearly a trade war. The miasma is only just lifting from the G7 summit in Charlevoix, Que., in which a Justin Trudeau press conference over a spiked communiqué sparked a Trump tantrum.

      But the war’s final battle will not be the tariff that our government has already imposed in retaliation on American pizza, whisky, mattresses, coffee, et cetera—in fact, our tit-for-tat tariffs have only caused the White House to double down and promise even more tariffs against Canada soon. That means that Canada’s symmetrical retaliation is not working—and if we do not rethink our strategy now, we could soon be inside a tornado-like spiral of escalating tariffs, causing rising prices, sinking economies, and growing joblessness on both sides of the border.


    • Canadian Officials are Mulling an Attack on U.S. Pharma, Says Ottawa Lawyer




  • Security



    • Security Flaw Found In Microsoft JET Database Engine by ZDE – Patch Expected In Windows October Update
      Zero Day Initiative or ZDI, a division of the Japanese multinational cyber security and defense company recently found a serious security flaw in Microsoft’s JET Database Engine which is inculcated and used in various different Microsoft products.

      ZDI reported that this vulnerability will allow potential attackers to execute an arbitrary code in Microsoft’s JET Database Engine, which is an underlying component of a database, a collection of information stored on a computer in a systematic way, this acts as the groundwork for many of Microsoft’s product, including the most widely used Microsoft Office. ZDI stated this to be an “out-of-bounds (OOB)” write in the JET, “An attacker could leverage this vulnerability to execute code under the context of the current process, however it does require user interaction since the target would need to open a malicious file,” ZDI further added in their report.


    • The Librem Key Makes Tamper Detection Easy
      From the beginning we have had big plans for the Librem Key. When we first announced our partnership with Nitrokey to produce the Librem Key all we could talk about publicly was the standard USB security token features it would have and some of the integration possibilities between the Librem laptop and Librem Key that would make security easier for the average person. What we couldn’t say at the time was that we were also working toward making the Librem Key do something that doesn’t exist anywhere else–integrate it with the tamper-evident Heads BIOS to make it incredibly easy to tell whether your BIOS has been tampered with. In this post I’m going to talk about why we wanted to add this feature, some of the work that went into it, and dive into some of the technologies that are working behind the scenes to help you understand how it works.


    • YubiKey 5 Series Brings FIDO2 Support, NFC Capability
      While last week Purism entered into the hardware security space with the Librem Key as a USB-based smart card, industry veteran Yubico today announced their YubiKey 5 Series.

      The YubiKey 5 Series is the industry's first multi-protocol security keys with support for FIDO2, the new open authentication standard for passwordless logins. Among the other supported protocols are OpenPGP, FIDO U2F, OATH-HOTP, and others. In addition to USB-C and USB-A interfaces, YubiKey 5 also has near-field communication (NFC) support.
    • YubiKey 5 Series Launched, Google Chrome's Recent Questionable Privacy Practice, PlayOnLinux Alpha Version 5 Released, Android Turns Ten, and Fedora 29 Atomic and Cloud Test Day


      Yubico announced the launch of the YubiKey 5 series this morning, which are the first multi-protocol security keys to support FIDO2/WebAuthn and allow you to replace "weak password-based authentication with strong hardware-based authentication". You can purchase them here for $45.


    • Yubico Launches YubiKey 5 Series, the Industry’s First Multi-Protocol Security Keys Supporting FIDO2
      Yubico, the leading provider of hardware authentication security keys, today announced the launch of the YubiKey 5 Series, the industry’s first multi-protocol security keys supporting FIDO2/WebAuthn. With this new addition, the YubiKey 5 Series has the capability to replace weak password-based authentication with strong hardware-based authentication.


    • Recently in Geoclue
      Since people's location is a very sensitive piece of information, security of this information had been the core part of Geoclue2 design. The idea was (and still is) to only allow apps access to user's location with their explicit permission (that they could easily revoke later). When Geoclue2 was designed and then developed, we didn't have Flatpak. Surely, people were talking about the need for something like Flatpak but even with those ideas, it wasn't clear how location access will be handled.

      Hence we decided for geoclue to handle this itself, through an external app authorizing agent and implemented such an agent in GNOME Shell. Since there is no reliable way to identify an app on Linux, there were mixed reactions to this approach. While some thought it's good to have something rather than nothing, others thought it's better to wait for the time when we've the infrastructure that allows us to reliably identify apps.


    • macOS Mojave Privacy Bypass Flaw Allows Access to Protected Files


    • macOS Mojave Has A Security Flaw That Lets Hackers Access Your Contacts [Ed: Apple already gives all your contacts to the US government (NSA PRISM and beyond); now it'll give these to anyone...]
      A security flaw has been unearthed in macOS Mojave, Apple’s latest desktop OS update, by a well-known security researcher Patrick Wardle.

      As reported by Bleeping Computer, Wardle has discovered a bypass flaw in macOS Mojave using which hackers can gain access to contacts data from the address book with the help of an app that does not have the required permissions.




  • Defence/Aggression



    • UK gov plans cyber warfare unit to tackle threat posed by Russia, North Korea and Iran

      The 'force' would have around 2,000 operatives drawn from GCHQ and the armed forces. However, the establishment of the organisation has been held up by internal political wrangling over funding, and which part of government will have ultimate command of the unit.



    • Importing Jihadi Terror to the UK – Cui Bono?
      If Osama Bin Laden was not sufficient warning that decades of money, arms and other support from the Western security services does not render a jihadi a friend of the West, then the Manchester bomber, Salman Abedi, should have opened British eyes forever to the danger. In collaboration with MI5, Abedi had been fighting in the ongoing proxy war for Western oil interests in Libya, before being rescued by the Royal Navy. Back home in Manchester, he carried out an attack of appalling violence against a primarily young and female target group.

      So it would be very foolish indeed to rely on the fact that the jihadi logistic support and propaganda group the White Helmets is largely British government funded, to expect its members who are now, like Abedi, being brought into the UK, to behave as quiet citizens. The links of the White Helmets to Al-Nusra and Al-Shams and other jihadi groups are deep – they chose to be evacuated to Idlib together from numerous sites. The reason there is no substantial corpus of independently filmed evidence of the White Helmets’ work is that they co-operate with people who would chop off western journalists’ heads on sight. In many well-attested cases, they are the same people.

      In ending all funding to the White Helmets, the Dutch government did not wish to be confrontational towards the other neo-conservative governments who are funding and exploiting the propaganda from the White Helmets. Their report was therefore diplomatically phrased. Funding for the White Helmets may have “inadvertently” fallen into the hands of armed extremists, while unacceptable contact between the White Helmets and extreme jihadists was “inevitable” in the ares they operated.



    • Q&A: George Selley’s A Study of Assassination


      Taking its title from a 1950s CIA manual on killing, the young LCC MA graduate's project reveals the surreal clash of leaked CIA documents, government propaganda, and bananas

      In 1997, a document titled A Study of Assassination was released by the CIA as part of the Freedom of Information Act. It is believed to have been created in 1953 with the purpose of instructing agents on how to kill, and was released with a collection of files relating to the 1954 CIA-backed overthrow of the-then newly-elected leader of Guatemala, Colonel Jacobo Arbenz Guzman. The operation in Guatemala was lobbied for by United Fruit Company, an American corporation that traded in tropical fruit, mainly bananas, and which wielded huge power in Central America at the time.

      When he found out about these documents, George Selley was instantly captivated, and his new project, A Study of Assassination, combines pages from the manual with archival press images, banana advertisements, and Cold War propaganda. BJP caught up with the recent London College of Communication MA graduate to find out more about this project and his approach to images.




  • Transparency/Investigative Reporting



    • Guardian Working for UK Intel Services? 'MI6 Tool' Publishes 'Black Propaganda'
      On September 21, The Guardian ran an absolutely sensational exclusive, based on disclosures made by "multiple" anonymous sources to Luke Harding, one of the paper's leading journalists - in 2017, Russian diplomats allegedly held secret talks in London with associates of Assange, in an attempt to assist in the Wikileaks founder's escape from the UK.

      The dastardly conspiracy would've entailed Assange being smuggled out of the Ecuadorian embassy in Knightsbridge under cover of Christmas Eve in a diplomatic vehicle and transported to Russia, where he'd be safe from extradition to the US, ending his eight-years of effective arbitrary detention in the process.

      In any event, the audacious plot was eventually aborted after being deemed "too risky" — even for the reckless daredevils of Moscow — mere days before its planned execution date. Rommy Vallejo, head of Ecuador's intelligence agency, is said to have travelled to the UK around December 15 to supervise the operation, and left when it was called off.


    • Guardian’s ‘deliberate lies’ over Assange Russia plot slammed by Craig Murray
      According to Murray, Narvaez told the Guardian that there was “no truth” in the story. The publication ran the story, which was written by, among others, former Guardian Moscow correspondent Luke Harding, regardless. The piece relied on four separate sources for their claims, though they give no more details than that.

      Of the Guardian’s sources, Murray states: “I strongly suspect that, as usual, MI6 tool Luke Harding’s “anonymous sources” are in fact the UK security services, and this piece is entirely black propaganda produced by MI6.”

      READ MORE: British Media is not waving, it’s drowning…in a sea of its own mendacity

      Harding worked for the Guardian in Russia for four years before his visa expired. After being subsequently refused entry to Russia, Harding claimed he had been expelled from the country for being critical of the Kremlin, a claim denied by the Russian government. He has since wrote extensively on Russia while based in the UK.


    • Roger Stone Offered to Assist His Alleged WikiLeaks Source With Legal Expenses
      Last year, as investigators examined claims by longtime Donald Trump adviser Roger Stone that he was in contact during the 2016 election with WikiLeaks, Stone asserted that he had only learned about the group’s plans through an intermediary: Randy Credico, a comedian and political activist. Credico has denied being Stone’s go-between. And now he tells Mother Jones that Stone offered to help him pay his legal fees in what Credico believed was an effort to stop him from contradicting Stone’s account of their interactions during the 2016 campaign.

      “He knew that I was upset,” Credico says. “He wanted me to be quiet. He wanted me to go along with his narrative. He didn’t want me talking to the press and saying what I was saying.”

      Stone, a Republican operative who cut his teeth working for Richard Nixon’s presidential campaign, and Credico, a standup comic long involved in left-wing causes, met in 2002 through their mutual work on drug legalization efforts and formed an unlikely friendship. They are now embroiled in a bitter conflict ignited by the Russia investigations undertaken by Congress and by special counsel Robert Mueller.


    • Ecuador Named Assange Adviser to Embassy in Russia, Then Annulled Decision - MP
      Assange has been staying at the Embassy of Ecuador in London since 2012, unable to leave for fear of being detained by the UK authorities.

      Since 2006, WikiLeaks, founded by Assange, has revealed a vast number of classified documents, including sensitive information allegedly related to US diplomats and the American intelligence community. This has led to a criminal investigation into its activities, initiated by US authorities.






  • Finance



    • Stripe is testing cash advances, following Square and PayPal’s moves into business finance

      Asked about the cash advance service, Stripe acknowledged that it was testing something out and pointed us to this tweet without elaborating more. So we don’t know if Stripe has been offering other users different premiums or payback percentages, nor if $25,000 is the cap or if it’s loaning more, nor if it’s working with a third-party to provide the financing, or whether it is offering it off its own balance sheet.



    • A Milestone for Global Capitalism


      Exciting news for capitalism is the recent achievement of trillion-dollar value for both Amazon and Apple, making them the first corporations to obtain such a lofty status. Amazon’s skyrocketing growth makes its CEO, Jeff Bezos, the world’s richest person with an $160 billion net worth.

      Driving the engine of global wealth concentration are giant transnational investment management firms. In 2017, seventeen trillion-dollar investment companies collectively controlled $41.1 trillion of capital. These firms are all directly invested in each other, making them a huge cluster of centralized capital managed by just 199 people, who decide how and where that wealth will be invested.

      In the case of Amazon, the top investment management corporations are: Vanguard $56.7 billion, BlackRock $49.5 billion, FMR $33 billion, Capital $33 billion, State Street $29 billion, and most of the other trillion-dollar Giants and many others who hold 58.6% of Amazon shares.

      So, while Bezos is a large tree in the forest, the forest itself is groomed by a few hundred global power elites making investment decisions that drive the concentration of wealth into coffers of the 1%. These elites interact through non-governmental policy-making organizations—privately funded by large corporations—that include the Council of Thirty, Trilateral Commission, and the Atlantic Council. Their role is to facilitate, manage, and protect the free flow of global capital. They do this by providing policy recommendations and instructions to governments, intelligence services, security forces, NATO, the Pentagon, and transnational governmental groups including the G-7 G-20, World Bank, IMF, and International Bank of Settlements.




  • AstroTurf/Lobbying/Politics



    • White House Admits Exec Order To Regulate Social Media Is 'Real,' But No Idea Who Wrote It, And Won't Use It
      On September 14th, we wrote about a draft executive order basically tasking the executive branch with "investigating" the major internet companies for evidence of "bias" that might lead to antitrust activity. As we wrote at the time, the draft executive order was poorly drafted, didn't make much sense, and was almost certainly unconstitutional. It took a week, but the rest of the tech policy world finally discovered the same draft executive order this past Friday (amusingly with some insisting that they had the "scoop" a week after we wrote about it).

      Now, the White House has admitted that the document is "real", though they're not entirely sure who crafted it, it hasn't gone through any of the normal processes, and there's no intention of moving forward with it. In other words, it sounds like a pet project of someone in the White House to have in a drawer in case it was needed at some future date.




  • Censorship/Free Speech



    • However extreme your views, you’re never hardcore enough for YouTube

      Nobody who knows anything about YouTube will be surprised. Time and again, researchers have discovered that when videos with political or ideological content are uploaded to the platform, YouTube’s “recommender” algorithm will direct viewers to more extremist content after they have watched the first one. Given that most people probably have the autoplay feature left on by default, that means that watching YouTube videos often leads people to extremist sites.

      Strangely, this doesn’t just hold for political or other types of controversial content. Zeynep Tufekci, a well-known technology commentator, found that videos about vegetarianism led to videos about veganism, videos about jogging led to videos about running ultramarathons, and so on. “It seems,” she wrote, “as if you are never ‘hardcore’ enough for YouTube’s recommendation algorithm. It promotes, recommends and disseminates videos in a manner that appears to constantly up the stakes.”

      Given its billion or so users, she concluded that “YouTube may be one of the most powerful radicalising instruments of the 21st century.”



    • Banned Books Wee with Betsy Gomez, Charles Brownstein, and Abena Hutchful
      In observance of Banned Books Week 2018, Mickey speaks with three guests, all involved in different facets of defending Americans’ right to read. Betsy Gomez is coordinator of Banned Books Week, Charles Brownstein is executive director of the Comic Book Legal Defense Fund, and Abena Hutchful leads the Youth Free Expression Program at the National Coalition Against Censorship.
    • Pennsylvania Legislator Thinks He Can Ban Teachers From Talking About Politics In The Classroom


      So, the braintrust behind this assertion includes three missionaries and their children and 6-12 complaints over the past decade. Obviously, the only conclusion to draw is that indoctrination is out of hand and only the powerful velvet fist of government regulation can stop it. If the First Amendment must be destroyed to save the children, it's a sacrifice Tallman is willing to make on behalf of the few that agree with him and the large majority of non-idiots who don't.

      Everyone who isn't Tallman has already greeted his proposed legislation with Constitution-based ridicule. The law will never pass. If something goes horribly wrong and the bill does pass, the courts will strike it down immediately.
    • WhatsApp Appoints ‘Grievance Officer’ To Tackle Fake News In India
      Whatsapp has been trying to curb fake news on its platform for a long time now. After multiple cases of lynching caused due to fake news, the Indian government asked the company to solve this issue or risk a ban in the country.

      Now the instant messaging service has appointed a ‘grievance officer’ to address complaints regarding false news and misinformation spreading on the platform in India.




  • Privacy/Surveillance



    • Which Sensors Do I Have In My Smartphone? How Do They Work? [Ed: It is almost as though (partly joking here) “smart” phones were first conceived by spies as mass surveillance devices and later marketed to the masses as “phones”]
      The smartphones we use today are sophisticated little machines that have gone through an incredible evolution over the last decade. They are now capable of working as a personal assistant that can monitor our heartbeat, track our movements, and anticipate our needs.

      But have you ever wondered how does your smartphone achieve such remarkable feats? A lot of those coolest feats are accomplished through different sensors in your phone. But do you know how many smartphone sensors are there in your device or what their purpose is?
    • ICE Leads The Nation In Encryption-Cracking Expenditures
      We don't hear much from anyone other than FBI officials about the "going dark" theory. The DOJ pitches in from time to time, but it's the FBI's baby. And it's an ugly baby. Earlier this year, the FBI admitted it couldn't count physical devices. The software it used to track uncrackable devices spat out inflated numbers, possibly tripling the number of phones the FBI claimed stood between it and justice. FBI officials like James Comey and Chris Wray said "7,800." The real number -- should it ever be delivered -- is expected to be less than 2,000.

      The FBI also hasn't been honest about its efforts to crack these supposedly-uncrackable phones. Internal communications showed the agency slow-walked its search for a solution to the San Bernardino shooter's locked iPhone, hoping instead for a precedential federal court decision forcing device manufacturers to break encryption whenever presented with a warrant.

      The FBI appears to have ignored multiple vendors offering solutions for its overstated "going dark" problem. At this point, it's public knowledge that at least two vendors have the ability to crack any iPhone. Israel's Cellebrite -- the company presumed to have broken into the San Bernardino phone for the FBI -- is one of them. The other is GrayShift, which sells a device called GrayKey, which allows law enforcement to bypass built-in protections to engage in brute force password cracking.

      We don't know how often the FBI avails itself of these services. A pile of locked phones numbering in the thousands (but which thousands?!) suggests it is allowing the serviceable (vendor services) to be the enemy of the perfect (favorable court rulings and/or legislation).


    • UK Surveillance Regime Violated Human Rights
      On September 13, after a five-year legal battle, the European Court of Human Rights said that the UK government’s surveillance regime—which includes the country’s mass surveillance programs, methods, laws, and judges—violated the human rights to privacy and to freedom of expression. The court’s opinion is the culmination of lawsuits filed by multiple privacy rights organizations, journalists, and activists who argued that the UK’s surveillance programs violated the privacy of millions.

      The court’s decision is a step in the right direction, but it shouldn’t be the last. While the court rejected the UK’s spying programs, it left open the risk that a mass surveillance regime could comply with human rights law, and it did not say that mass surveillance itself was unlawful under the European Convention on Human Rights (a treaty that we discuss below).

      But the court found that the real-world implementation of the UK’s surveillance—with secret hearings, vague legal safeguards, and broadening reach—did not meet international human rights standards. The court described a surveillance regime “incapable” of limiting its “interference” into individuals’ private lives when only “necessary in a democratic society.”

      In particular, the court’s decision attempts to rein in the expanding use of mass surveillance. Originally reserved for allegedly protecting national security or preventing serious threats, use of these programs has trickled into routine criminal investigations with no national security element—a lowered threshold that the court zeroed in on to justify its rejection of the UK’s surveillance programs. The court also said the UK’s mass surveillance pipeline—from the moment data is automatically swept up and filtered to the moment when that data is viewed by government agents—lacked meaningful safeguards.
    • China tips the scale of global cybersecurity by hoarding vulnerabilities


      There is little to celebrate for digital rights in China. A seemingly constant stream of developments is putting human rights defenders on high alert, as the Chinese state grows ever more powerful and cultivates its surveillance capabilities, integrates social media monitoring with everyday policing, and appears to be persuading international companies like Apple and Google to comply with Chinese law and practices that harm human rights in order to enter the market. China also runs the largest biometric policing system known to date.

      Somewhat hidden under the din of this overtly dystopian discourse are the small yet powerful moves that China is making that are likely to have a long-term negative impact on global cybersecurity, even beyond the Great Wall. These include the government’s strategic withholding of technology vulnerabilities from the international community.


    • China Actively Collecting Zero-Days For Use By Its Intelligence Agencies -- Just Like The West
      It all seems so far away now, but in 2013, during the early days of the Snowden revelations, a story about the NSA's activities emerged that apparently came from a different source. Bloomberg reported (behind a paywall, summarized by Ars Technica) that Microsoft was providing the NSA with information about newly-discovered bugs in the company's software before it patched them. It gave the NSA a window of opportunity during which it could take advantage of those flaws in order to gain access to computer systems of interest. Later that year, the Washington Post reported that the NSA was spending millions of dollars per year to acquire other zero-days from malware vendors.

      A stockpile of vulnerabilities and hacking tools is great -- until they leak out, which is precisely what seems to have happened several times with the NSA's collection. The harm that lapse can cause was vividly demonstrated by the WannaCry ransomware. It was built on a Microsoft zero-day that was part of the NSA's toolkit, and caused very serious problems to companies -- and hospitals -- around the world.

      The other big problem with the NSA -- or the UK's GCHQ, or Germany's BND -- taking advantage of zero-days in this way is that it makes it inevitable that other actors will do the same.
    • Australian Government Ignores Experts in Advancing Its Anti-Encryption Bill


    • EFF Opposes Industry Efforts to Have Congress Roll Back State Privacy Protections
      The Senate Commerce Committee is holding a hearing on consumer privacy this week, but consumer privacy groups like EFF were not invited. Instead, only voices from big tech and Internet access corporations will have a seat at the table. In the lead-up to this hearing, two industry groups (the Chamber of Commerce and the Internet Association) have suggested that Congress wipe the slate clean of state privacy laws in exchange for weaker federal protections. EFF opposes such preemption, and has submitted a letter to the Senate Commerce Committee to detail the dangers it poses to user privacy.

      Current state laws across the country have already created strong protections for user privacy. Our letter identifies three particularly strong examples from California's Consumer Privacy Act, Illinois' Biometric Privacy Act, and Vermont's Data Broker Act. If Congress enacts weaker federal data privacy legislation that preempts such stronger state laws, the result will be a massive step backward for user privacy.


    • Instagram’s Founders Leaving Facebook After Clashes With Zuckerberg


    • Instagram Founders Exit Facebook as Zuckerberg Involvement Grows

      Krieger and Systrom built Instagram and sold it to Facebook for $715 million six years ago. When the deal was announced, the company had only 13 employees and 30 million registered users. Now more than 1 billion people use the app monthly, and it is the main source of advertising revenue for Facebook outside the social network’s main news feed.



      [...]

      Kevin Systrom and Mike Krieger, who have been at the company since Instagram’s acquisition by Facebook in 2012, had been able to keep the brand and product independent while relying on Facebook’s infrastructure and resources to grow. Lately, they were frustrated with an uptick in day-to-day involvement by Zuckerberg, who has become more reliant on Instagram in planning for Facebook’s future, said the people, who asked not to be identified sharing internal details.

      Without the founders around, Instagram is likely to become more tightly integrated with Facebook, making it more of a product division within the larger company than an independent operation, the people said.



    • Instagram’s co-founders have resigned from Facebook


    • Instagram’s Co-Founders to Step Down From Company

      Mr. Systrom and Mr. Krieger did not give a reason for stepping down, according to the people, but said they planned to take time off after leaving Instagram. Mr. Systrom, 34, and Mr. Krieger, 32, have known each other since 2010, when they met and transformed a software project built by Mr. Systrom into what eventually became Instagram, which now has more than one billion users.



    • Your whiney Twitter DMs to businesses may have been leaking since 2017

      Twitter has revealed that a bug in the Account Activity API could allow private messages sent to businesses between May 2017 and 10 September 2018 to have been accidentally cc'd to the developer of the business' chosen platform.

      Twitter's apologetic noises initially sound quite reassuring, until you read between the lines. Yes, the bug was fixed "within hours" of discovery, but when the exploit wasn't found for 16 months that's not a great deal of consolation. And sure, the bug affected less than 1 per cent of people on Twitter, but with a user base of 68 million, that could still mean anywhere between one and 680,000 people.





  • Civil Rights/Policing



    • Congress Needs to Take Responsibility for Fixing Harassment in Its Own Halls
      Members of Congress have a duty to protect their staffers from harassment by reforming the Congressional Accountability Act of 1995.

      It’s been nearly one year since the #MeToo movement came into public consciousness and months since the Senate and House of Representatives each passed legislation to reform the way Congress handles claims of harassment in its own workplace. But further action on the bills has stalled, and even after sitting members had to resign over their own misconduct, our elected officials have still not moved to effectively protect the safety of their employees.

      On Thursday, seven former congressional staffers sent a letter to congressional leaders in both the House and Senate, calling for meaningful reform of the Congressional Accountability Act of 1995, a law that applies civil rights and workplace safety laws to Congress. Each of the letter’s signatories experienced harassment or abuse while working for members of Congress. They describe in the letter the trauma and pain exacerbated by the current system that has failed to ensure their safety and hold wrongdoers to account.

      The stories these brave survivors share in their letter are harrowing. Anna Kain, Rebecca Weir, Ally Coll Steele, Katherine Cichy, Winsome Packer, Melanie Sloan, and Lauren Greene — all of whom worked for members of Congress — write of being sexually harassed, verbally berated, and publicly humiliated. They were grabbed and threatened — and they were not protected by the powerful people they served.


    • He Said He Faked Mental Illness to Avoid Prison. Now, Accused in 2 Killings, He’s Sent Back to a State Hospital.
      In 2016, Oregon officials freed Anthony Montwheeler from the Oregon State Hospital, accepting his argument that he had faked mental illness for nearly 20 years to avoid prison.

      Last week, an Oregon judge ruled that Montwheeler, 50, was not competent to stand trial for an assault and two murders that prosecutors say he committed just weeks after his release. The judge ordered him returned to the hospital for treatment of depression brought on by the charges against him.

      The Montwheeler case has raised broader questions about Oregon’s handling of people charged with crimes and judged not guilty by reason of insanity, questions ProPublica and the Malheur Enterprise are examining in a yearlong project.


    • Prosecution Presented Fairly Strong Murder Case Against Former CPD Officer Jason Van Dyke
      State attorneys prosecuting Jason Van Dyke, the former Chicago police officer accused of murdering 17-year-old Laquan McDonald, finished presenting their case on September 20. The defense called its first witness September 24.

      The key moment so far in the trial known for the 16 shots Van Dyke fired—his entire magazine—came near the end of testimony in support of the prosecution’s case.

      A ballistics expert from the FBI testified that a quick movement on video by Van Dyke’s partner, Joseph Walsh, was “consistent with a flinch” commonly seen in people who are near a surprise shot being fired. The expert then used plumes of debris evident in the video to establish a timeline of shots that lasts “at least” 14.2 seconds.

      The expert, Scott Patterson, then showed the jury a video of another agent, one of the FBI’s top marksmen, firing 16 rounds into a target.


    • Hell Forms Bobsled Team After Police Chief Admits Fault In SWAT Raid Targeting Wrong Address


      This is an astounding reaction to incidents that are far too commonplace in this country. This is also an indictment of policing in America. There is no reason this reaction should be as stunning as it is. This should be standard operating procedure when cops screw up. Instead, we're most often greeted with defense of indefensible actions combined with a multitude of efforts designed to make the SWAT raid victim appear as unsympathetic as possible.

      Wrong address raids, killings of unarmed citizens, excessive force deployment… all of these events are normally handled by police departments with maximum defensiveness and minimal acceptance of culpability. A law enforcement agency immediately stepping up to take responsibility for its errors -- especially ones with potentially deadly outcomes -- is a breath of fresh air in the fetid, stagnant swamp of US policing.

      But this shouldn't be the ultra-rare exception. It should be the rule. The public law enforcement serves deserves far better than the condescending, self-serving crap it's so often handed in the wake of incidents like these.




  • Internet Policy/Net Neutrality



    • How bad maps are ruining American broadband

      The problem is much bigger than Cleveland, but the FCC isn’t ready to do much about it. US customers pay some of the highest prices for broadband in the developed world, and broadband availability is sketchy at best for millions of Americans. But instead of tackling that problem head on, the FCC is increasingly looking the other way, relying on ISP data that paints an inaccurately rosy picture of Americans’ internet access. And as long as regulators are relying on a false picture of US broadband access, actually solving the problem may be impossible.



    • Even Wall Street Is Nervous About Comcast's Latest Bid To Grow Bigger For Bigger's Sake
      Comcast's latest effort to grow even larger is spooking even the company's investors. "Growth for growth's sake" has been the mantra of the telecom and TV sectors for years. Once growth in any particular market (like broadband) saturates, companies begin nosing about for efforts to grow larger in other sectors, even if it it's well outside of their core competencies (see Verizon Sugarstring, Go90). Unfortunately for the end user, such growth isn't accompanied by any meaningful parallel investment in quality product or customer service, a major reason so many users "enjoy" Comcast services today.

      At the same time, this growing power results in increased efforts to thwart any effort to rein in this power, leaving oversight of the natural monopolies more precarious than ever (see: net neutrality). That's exceptionally true for Comcast, where the one-two punch of fading state and federal oversight, expiring NBC Universal merger conditions from its last 2011 megadeal, and a growing monopoly over broadband is forging a perfect storm of trouble.




  • Intellectual Monopolies



    • TriZetto secures victory in trade secret lawsuit after discovery refusal
      The TriZetto Group has secured a victory in a trade secrets dispute after Syntel allegedly stole information from them.

      Syntel was previously sanctioned for refusing to comply with discovery orders and in the latest ruling from the US District Court for the Southern District of New York again found that Syntel had failed to comply with court orders.

      TriZettom, who develops and licenses software products in the healthcare industry, provides consulting services and hires contractors to perform some of this work with a previous contractor being Syntel.


    • Qualcomm says FTC motion aims to "radically reshape [standard-essential patent] licensing in the cellular industry"
      The two most important motions for summary judgment that Qualcomm is facing at present (and one might even say has ever faced in its history) are the Federal Trade Commission's motion to hold that Qualcomm itself committed to extending standard-essential patent licenses to rival chipset makers such as Intel (a motion that has drawn broadbased support from industry) and a motion by Apple and four contract manufacturers to end Qualcomm's double-dipping practice (selling chipsets and additionally collecting patent license fees). This post is about Qualcomm's opposition in the Northern District of California to the former, but I'd also like to mention that Qualcomm is trying to duck the latter by means of a motion to dismiss all declaratory judgment claims relating to Qualcomm patents from the Apple (and contract manufacturers) v. Qualcomm case in the Southern District of California. When it turned out that its adversaries were going to insist on an adjudication of their patent exhaustion defense, Qualcomm requested expedited briefing, which Judge Gonzalo Curiel denied. The opposition brief to Qualcomm's attempt to chicken out is due by the end of next week.

      [...]

      There's no question that you need an antenna and electricity for mobile telephony. But that doesn't mean the mobile baseband chip--or "modem chip" in accordance with Qualcomm's brief--doesn't implement the standard simply because it's the central and decisive component. It's the mastermind (a term that is key to the analysis of an alleged "divided infringement" of a method claim and fits here, too). Once the importance of the mastermind component is downplayed, the ultimate consequence may be that not even a device infringes since electricity must be provided by a utility, which in turn needs some energy source somewhere.

      In a 2014 case, GPNE Corp. v. Apple, Judge Koh herself held "as a matter of law that in [that] case, the baseband processor [was] the proper smallest salable patent-practicing unit." And in Judge Koh's court, a 2012 jury sided with Apple against Samsung on patent exhaustion, based on Samsung's license to Qualcomm and Apple's use of Qualcomm chips in certain products at issue back then. The same happened to Samsung in the Netherlands and France (where I attended a preliminary injunction hearing in 2011).


    • A Shot at Patents Misses the Mark and New Study Reinforces Need to Examine Federal Tech Transfer
      This month we’ll revisit two issues covered previously: attempts to promote compulsory licensing as a way for lowering the cost of Medicare drugs and increasing the return on investment from federally-supported R&D.


    • Trademarks



      • Abnormal faces legal battle against 3 Floyds
        Indiana brewery owns “IT’S NOT NORMAL” trademark

        [...]

        This afternoon, Abnormal posted the following on Instagram; additional comment by company president and CEO Matt DeLoach follows. 3 Floyds did not immediately return a request for comment.


      • 3 Floyds Brewing Goes After Abnormal Beer Co. All Because Of Its Trademarked Slogan 'It's Not Normal'
        It's no secret that sometimes a company's lawyers get way out ahead of how their client would want them to behave in protecting their intellectual property. We've seen many a story in which threat letters go out, only to have ownership on both sides of a dispute get together and settle things amicably. And if there's any industry in which this should absolutely happen, it should be the craft brewing industry, where there has long been a tradition of fraternity and peaceful coexistence.




    • Copyrights



      • Don’t share this! EU’s new copyright law could kill the free [I]nternet

        The EU legislation, bad as it is in its own right, must be seen as part of a wider attempt to clamp down on free expression and the free exchange of ideas in the West at a time when fewer people than ever before believe establishment narratives. This month a British MP by the name of Lucy Powell, launched a bill in Parliament entitled the 'Online Forums Bill' to ban private Facebook groups which promote “hate”, “racism” and “fake news”. But who defines what these terms actually mean?



      • Annual International Copyright Law Conference returns to London
        If you would like to discuss the present and future of copyright, our friends at KNect365 would like to let you know that the annual International Copyright Law conference is returning to London on 27 and 28 November 2018.
      • UK copyright in a no-deal Brexit scenario: what will happen?
        A few months ago, this blog reported that the EU Commission had issued a Notice to stakeholders on the impact that a no-deal Brexit would have on UK copyright.

        At that time, UK's withdrawal from the EU without any agreement in place must have seen impossible: if one looks at the comments to the relevant post, a reader who called themselves a 'Broptimist' stated that the EU Commission's document


      • Google, Yandex Discuss Creation of Anti-Piracy Database

        Google, Yandex and other prominent Internet companies in Russia are discussing the creation of a database of infringing content including movies, TV shows, games, and software. The idea is that the companies will automatically query this database every five minutes with a view to removing such content from search results within six hours, no court order required.







Recent Techrights' Posts

[Meme] The Heart of Staff Rep
Rowan heartily grateful
 
Sven Luther, Lucy Wayland & Debian's toxic culture
Reprinted with permission from disguised.work
Coroner's Report: Lucy Wayland & Debian Abuse Culture
Reprinted with permission from disguised.work
Links 18/04/2024: Misuse of COVID Stimulus Money, Governments Buying Your Data
Links for the day
Gemini Links 18/04/2024: GemText Pain and Web 1.0
Links for the day
Gemini Links 18/04/2024: Google Layoffs Again, ByteDance Scandals Return
Links for the day
Gemini Links 18/04/2024: Trying OpenBSD and War on Links Continues
Links for the day
IRC Proceedings: Wednesday, April 17, 2024
IRC logs for Wednesday, April 17, 2024
Over at Tux Machines...
GNU/Linux news for the past day
North America, Home of Microsoft and of Windows, is Moving to GNU/Linux
Can it top 5% by year's end?
Management-Friendly Staff Representatives at the EPO Voted Out (or Simply Did Not Run Anymore)
The good news is that they're no longer in a position of authority
Microsofters in 'Linux Foundation' Clothing Continue to Shift Security Scrutiny to 'Linux'
Pay closer attention to the latest Microsoft breach and security catastrophes
Links 17/04/2024: Free-Market Policies Wane, China Marks Economic Recovery
Links for the day
Gemini Links 17/04/2024: "Failure Is An Option", Profectus Alpha 0.5 From a Microsofter Trying to Dethrone Gemini
Links for the day
How does unpaid Debian work impact our families?
Reprinted with permission from Daniel Pocock
Microsoft's Windows Falls to All-Time Low and Layoffs Reported by Managers in the Windows Division
One manager probably broke an NDA or two when he spoke about it in social control media
When you give money to Debian, where does it go?
Reprinted with permission from Daniel Pocock
How do teams work in Debian?
Reprinted with permission from Daniel Pocock
Joint Authors & Debian Family Legitimate Interests
Reprinted with permission from Daniel Pocock
Bad faith: Debian logo and theme use authorized
Reprinted with permission from Daniel Pocock
Links 17/04/2024: TikTok Killing Youth, More Layoff Rounds
Links for the day
Jack Wallen Has Been Assigned by ZDNet to Write Fake (Sponsored) 'Reviews'
Wallen is selling out. Shilling for the corporations, not the community.
Links 17/04/2024: SAP, Kwalee, and Take-Two Layoffs
Links for the day
IRC Proceedings: Tuesday, April 16, 2024
IRC logs for Tuesday, April 16, 2024
Over at Tux Machines...
GNU/Linux news for the past day
Inclusion of Dissent and Diversity of Views (Opinions, Interpretations, Scenarios)
Stand for freedom of expression as much as you insist on software freedom
Examining Code of Conduct violations
Reprinted with permission from the Free Software Fellowship
Ruben Schade's Story Shows the Toxicity of Social Control Media, Not GNU/Linux
The issue here is Social Control Media [sic], which unlike the media rewards people for brigading otherwise OK or reasonable people
Upgrading IRCd
We use the latest Debian BTW
The Free Software Community is Under Attack (Waged Mostly by Lawyers, Not Developers)
Licensing and legalese may seem "boring" or "complicated" (depending on where one stands w.r.t. development), but it matters a great deal
Jonathan Cohen, Charles Fussell & Debian embezzlement
Reprinted with permission from disguised.work
Grasping at Straws in IBM (Red Hat Layoff Rumours in 2024)
researching rumours around Red Hat layoffs
GNU/Linux Continues to Get More Prevalent Worldwide (Also on the Desktop)
Desktops (or laptops) aren't everything, but...
Who is a real Debian Developer?
Reprinted with permission from Daniel Pocock
Links 16/04/2024: Many More Layoffs, Broadcom/VMware Probed (Antitrust)
Links for the day
Links 16/04/2024: Second Sunday After Easter and "Re-inventing the Wheel"
Links for the day
Upcoming Themes and Articles in Techrights
we expect to have already caught up with most of the administrivia and hopefully we'll be back to the prior pace some time later this week
Links 16/04/2024: Levente "anthraxx" Polyák as Arch Linux 2024 Leader, openSUSE Leap Micro 6 Now Alpha, Facebook Blocking News
Links for the day
Where is the copyright notice and license for Debian GNU/Linux itself?
Reprinted with permission from Daniel Pocock
Halász Dávid & IBM Red Hat, OSCAL, Albania dating
Reprinted with permission from the Free Software Fellowship
Apology & Correction: Daniele Scasciafratte & Mozilla, OSCAL, Albania dating
Reprinted with permission from the Free Software Fellowship
Next Week Marks a Year Since Red Hat Mass Layoffs, Another Round Would be "Consistent With Other Layoffs at IBM."
"From anon: Global D&I team has been cut in half."
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, April 15, 2024
IRC logs for Monday, April 15, 2024