Bonum Certa Men Certa

Links 28/9/2018: Kubernetes 1.12 Released, Intel DRM in Linux, Krita 4.1.3, Ubuntu Beta





GNOME bluefish

Contents





GNU/Linux



  • Desktop



    • Why Nerds Use Linux
      1) A good reason to use Linux is to have the pleasure of saying you do not use Windows when someone asks you to go to your home to fix your computer and you do not know the reason for the problem. You can say that you do not know Windows and can not fix it.

      ​Not infrequently we find an unrecoverable pirated Windows full of malware and everything else, with important data that the user does not want to lose, but of course, did not make a simple backup. After this grim picture, we can only say: "Sorry, my friend, I do not know Windows, I only use Linux."


    • System76 To Release A "New Open-Source Computer"
      Longtime Linux PC vendor System76 has begun teasing a "new open-source computer" they will release in the coming weeks.


    • Linux hardware vendor System76 has begun teasing their new 'open-source computer'
      System76 [Official Site], the hardware vendor that focuses on putting out well-supported Linux laptops, desktops and servers are teasing something new.


    • System76 Launching a New Open-Source Computer, Krita 4.1.3 Released, the Hyperledger Project Gains 14 New Members, Distro Maintainers Need to Merge Kernel Security Fixes Faster and Java 11 Now Available
      System76 is launching a new open-source computer, which will be available for pre-order next month. Before announcing the finalized hardware, the company will be releasing a four-part animation each week with "design updates hidden within a game portion of the story". That story will contain "different worlds, each representing an antithesis to open source ideals. These themes are utilized to draw attention to the importance of open source in the evolution of technology". If you're interested, you can sign up here to follow the saga and receive updates leading up to the pre-order.


    • You can pre-order System76's Linux-powered open source 'Thelio' computer next month
      When you buy a System76 computer today, you aren't buying a machine manufactured by the company. Instead, the company works with other makers to obtain laptops, which it then loads with a Linux-based operating system -- Ubuntu or its own Pop!_OS. There's nothing really wrong with this practice, but still, System76 wants to do better. The company is currently working to manufacture its own computers ("handcrafted") right here in the USA! By doing this, System76 controls the entire customer experience -- software, service, and hardware.

      Today, the company announces that the fruits of its labor -- an "open-source computer" -- will be available to pre-order in October. Now, keep in mind, this does not mean the desktop will be available next month. Hell, it may not even be sold in 2018. With that said, pre-ordering will essentially allow you to reserve your spot. To celebrate the upcoming computer, System76 is launching a clever animated video marketing campaign.




  • Server



    • Kubernetes 1.12 Released


      Today, the Kubernetes Project released version 1.12. The big updates in this version are the general availability of TLS bootstrapping, a maturing story around scaling, and better multitenancy. Head on over to the CoreOS Blog to check out the full details of this release.


    • Welcome to Kubernetes 1.12
      Today, we celebrate this week’s release of Kubernetes 1.12, which brings a lot of incremental feature enhancements and bug fixes across the release that help close issues encountered by enterprises adopting modern containerized systems. Each release cycle, we’re frequently asked about the theme of the release. There are always exciting enhancements to highlight, but an important theme to note is trust and stability.

      The Kubernetes project has grown immensely over the last few years and has come to be respected as a leader in container orchestration and management solutions. With that stature comes the responsibility to build APIs and tools that are well-tested, easy to maintain, highly performant, and scalable; qualities that are trusted and stable. In each of the upcoming release cycles, we expect to continue to see a community effort around prioritizing the maturation and stabilization of existing functionality over the delivery of new features.


    • Open-source boffins want to do for the IoT edge what Kubernetes did for containers
      Two high-profile open-source collaborations are putting their heads together to work out how to take Kubernetes, more familiar in hyperscale environments, out to Internet of Things edge computing projects.

      The Kubernetes IoT Edge Working Group is the brainchild of the Cloud Native Computing Foundation (CNCF) and the Eclipse Foundation.

      Speaking to The Register, CNCF's Chris Aniszczyk said the idea of using Kubernetes as a control plane for IoT is "very attractive".

      That sums up the brief of the working group, he said, "to take the concept of running containers, and expand that to the edge".


    • Linux Foundation Networking & Cloud Native Computing Foundation Get Jiggy
      Open Networking Summit Europe -- The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced further collaboration between telecom and cloud industry leaders enabled by the Cloud Native Computing Foundation (CNCF) and LF Networking (LFN), fueling migrations of Virtual Network Function (VNFs) to Cloud-native Network Functions (CNFs).


    • ​Linux now dominates Azure
      Three years ago, Mark Russinovich, CTO ofAzure, Microsoft's cloud program, said, "One in four [Azure] instances are Linux." Then, in 2017, it was 40 percent Azure virtual machines (VM) were Linux. Today, Scott Guthrie, Microsoft's executive vice president of the cloud and enterprise group, said in an interview, "it's about half now, but it varies on the day because a lot of these workloads are elastic, but sometimes slightly over half of Azure VMs are Linux." Microsoft later clarified, "about half Azure VMs are Linux."




  • Audiocasts/Shows





  • Kernel Space



    • Linus Torvalds: 'I'll never be cuddly but I can be more polite' [Ed: Famously Linux-hostile BBC (lots of ex-Microsoft UK managers at BBC) the latest to perpetuate smears against Torvalds and Linux]
      He has always had a reputation as someone who provides blunt feedback to engineers, with expletive-laden emails, once describing an Intel fix as "complete and utter garbage".


    • Code, conflict, and conduct
      A couple of surprising things happened in the kernel community on September 16: Linus Torvalds announced that he was taking a break from kernel development to focus on improving his own behavior, and the longstanding "code of conflict" was replaced with a code of conduct based on the Contributor Covenant. Those two things did not quite come packaged as a set, but they are clearly not unrelated. It is a time of change for the kernel project; there will be challenges to overcome but, in the end, less may change than many expect or fear.


    • The Woman Bringing Civility to Open Source Projects
      Codes of conduct are designed to make open source projects more inviting to everyone, and the idea is catching on. Today, more than 40,000 projects have adopted the Contributor Covenant, including Google's artificial intelligence platform TensorFlow and the increasingly popular programming framework Vue. Even Linux is finally on board: Earlier this month the project adopted the Contributor Covenant, and Torvalds apologized for his past behavior.

      André Arko, lead maintainter of the popular Ruby tool Bundler, says the Contributor Covenant has changed the project for the better. Before the project adopted the Covenant, the team struggled to find enough contributors to maintain the project. That changed quickly. "We've had dramatically more participation," he adds. That’s meant more participation from women, minorities, and other underrepresented groups, but also more contributions from white men as well.


    • I’m very disappointed in Linus Torvalds
      It’s similar to how a few days ago 3D gun pioneer Cody Wilson also became wanted for “sexual assault”; it seems the US government, through entrapment, finally found a more effective way to attack him and stop his efforts of getting 3D printed guns to people via the Internet. And of course, this is very similar to what happened to Jacob Applebaum and Julian Assange. You would hope that activists and open-source leaders would have learned by now to avoid such traps, where sexuality and women are (ab)used to damage people’s reputations and gain power over them.


    • The Culture War Comes to Linux
      A small group of programmers are calling for the rescission of code contributed to Linux, the most popular open source operating system in the world, following changes made to the group’s code of conduct. These programmers, many of whom don’t contribute to the Linux kernel, see the new Code of Conduct as an attack on meritocracy—the belief that people should mainly be judged by their abilities rather than their beliefs—which is one of the core pillars of open source software development. Other developers describe these attacks on the Code of Conduct as thinly veiled misogyny.

      It’s a familiar aspect of the culture war that many online and IRL communities are already dealing with, but it has been simmering in the Linux community for years. The controversy came to the surface less than two weeks after Linus Torvalds, the creator of Linux, announced he would temporarily be stepping away from the project to work on “understanding emotions.” Torvalds was heavily involved with day to day decisions about Linux development, so his departure effectively left the community as a body without a head. In Torvalds’ absence, certain developers seem committed to tearing the limbs from this body for what they perceive as an attack on the core values of Linux development.

      [...]

      Over the last three years, however, the verbal abuse among Linux developers, a lot of it coming from Torvalds himself, hardly abated. In fact, Elon University computer science professor Megan Squire even used machine learning to recognize Torvalds’ insults, which numbered in the thousands during a four year period. According to Squire’s analysis, most of this abusive language wasn’t gendered.



    • Compiling kernel UAPI headers with C++
      Linux kernel developers tend to take a dim view of the C++ language; it is seen, rightly or wrongly, as a sort of combination of the worst (from a system-programming point of view) features of higher-level languages and the worst aspects of C. So it takes a relatively brave person to dare to discuss that language on the kernel mailing lists. David Howells must certainly be one of those; he not only brought up the subject, but is working to make the kernel's user-space API (UAPI) header files compatible with C++.

      If somebody were to ask why this goal is desirable, they would not be the first to do so. The question has not actually gotten a complete answer, but some possible motivations come to mind. The most obvious one is that some developers might actually want to write programs in C++ that need access to the kernel's API; there is no accounting for taste, after all. For most system calls, the details of the real kernel API (as opposed to the POSIX-like API exposed by the C library) tend to be hidden, but there are exceptions; the most widespread of those is almost certainly the ioctl() system call. There is a large set of structures used with ioctl(); their definition is a big part of the kernel's UAPI. If a C++ compiler cannot compile those UAPI definitions, then those ioctl() calls cannot be invoked from C++.


    • Fake news: No Linux devs are threatening to pull code
      There was no mention of anyone having yet done so.

      There are a couple of additional points to be borne in mind: one, when corporate contributions are made to the kernel, the developer has to assign copyright to the corporation. Ninety percent of code contributed to Linux fits in this bracket.

      And two, soon after the SCO Group announced its decision in 2003 to sue IBM for copyright over UNIX code that it (SCO) claimed to own, the Linux kernel project decided to ask developers to provide a standard, signed form in which they assigned copyright for code changes they submitted to the project to the people running said project.

      These two factors may not get in the way of some upstart wanting his/her code back. But it definitely will not make it any easier.

      The second source for this article is a man of the past, Eric Raymond, once a luminary of the open source community, but now only a fringe player. Raymond wrote a blog post about the Torvalds episode, and the throwaway line "let me confirm that this threat (ie. developers asking for their code back) has teeth" seems to have got the author of the article in question a little excited.


    • BLK-MQ To Support Runtime Power Management With Linux 4.20~5.0
      The Linux mult-queue block I/O layer (blk-mq) has been working out well for delivering very fast performance particularly for modern NVMe solid-state storage and SCSI drives. But it turns out run-time power management hasn't been in use when blk-mq is active.

      The multi-queue block code brings per-CPU software queues and these software queues can map to hardware issue queues. These multiple queues can reduce locking contention and the overall blk-mq design jives with current high-performance solid-state drive characteristics. The key drivers have been ported over to using blk-mq for a while now (end of Linux 3.xx / early 4.x kernels) and for Linux systems not using it by default can be activated easily via the scsi_mod.use_blk_mq=1 boot option.


    • FUSE Getting Another Performance Boost In Linux 4.20~5.0
      Separate from the recent FUSE performance work talked about for making FUSE faster with the eBPF in-kernel JIT that hasn't been staged for mainlined, "File-Systems in User-Space" are set to see better performance on the next kernel (Linux 4.20~5.0) thanks to other changes.

      Already having been queued for this next kernel cycle is copy_file_range support for FUSE to yield more efficient copy operations.


    • Linux Foundation

      • Linux Foundation Moves to Bring Virtual Network Functions to Cloud Native Network Functions on Kubernetes


      • Open Source Culture Starts with Programs and Policies [Ed: "The Linux Foundation sponsored this post."]
        More than anything, open source programs are responsible for fostering “open source culture,” according to a survey The New Stack conducted with The Linux Foundation’s TODO Group. By creating an open source culture, companies with open source programs see the benefits we’ve previously reported, including increased speed and agility in the development cycle, better licence compliance and more awareness of which open source projects a company’s products depend on.


      • New Video Applications Will Represent Majority of Edge Traffic by 2020, Survey Finds
        In an effort to identify early edge applications, we recently partnered with IHS Markit to interview edge thought leaders representing major telcos, manufacturers, MSOs, equipment vendors, and chip vendors that hail from open source, startups, and large corporations from all over the globe. The survey revealed that edge application deployments are still young but they will require new innovation and investment requiring open source.

        The research investigated not only which applications will run on the edge, but also deployment timing, revenue potential and existing and expected barriers and difficulties of deployment. Presented onsite at ONS Europe by IHS Markit analyst Michael Howard, the results represent an early look at where organizations are headed in their edge application journeys.


      • FedEx Joins Hyperledger Blockchain Hub, ‘Big Implications’ for Logistics
        American courier delivery services giant FedEx has joined Hyperledger, an open-source project established to improve cross-industry blockchain technologies, according to a press release published September 26.

        Hyperledger, which is hosted by the Linux Foundation, enables organizations to build blockchain-based industry-grade applications, platforms and hardware systems in the context of their individual business transactions.


      • FedEx joins open-source blockchain project
        Global shipping company FedEx has joined Hyperledger, an open-source blockchain venture that now has more than 270 members, according to a press release.

        FedEx is taking part in the collaborative project “to advance cross-industry blockchain technologies,” which already includes members such as American Express, Deutsche Bank, IBM, Intel and JPMorgan.
      • FedEx joins open source blockchain hub
        Hyperledger, an open source collaborative effort created to advance cross-industry blockchain technologies, has announced 14 members, including FedEx, have joined its growing global community.

        More than 270 organisations are now contributing to the growth of Hyperledgers’ open source distributed ledger frameworks and tools.
      • 14 new members join open source blockchain project Hyperledger
        Hyperledger, an umbrella project of open source blockchains has announced on Wednesday that it will be collaborating with 14 new members who have joined its global community.

        As of now, 270 plus members are contributing to the growth of Hyperledgers’ open source distributed ledger frameworks and tools.


      • FedEx Joins Hyperledger in Blockchain Consortium's Latest Expansion
        Global shipping giant FedEx has just become one of the 14 newest members to join the Hyperledger consortium.

        Hyperledger announced that FedEx, Honeywell International, as well as a number of crypto startups, have become the newest participants in its mission to to build blockchain platforms and applications for enterprises, according to a press release on Wednesday.



      • Wanchain (WAN) joins Linux Foundation’s Hyperledger
        Linux Foundation’s Hyperledger launched in 2016 has attracted many members to its singular technology, the latest members being FedEx, Honeywell International Inc., and Conste11ation Labs. Wanchain (WAN) also announced today that it has officially joined the hyperledger community where it will focus on “blockchain interoperability”.

        The Hyperledger is an open source project focused on uniting blockchain of different cryptocurrencies and industries to work together and share value. Members of the Hyperledger community come from different sectors of the world economy. In a press release made available by the company, Hyperledger now has 14 new members cutting across different fields of endeavour, one of which is Wanchain.


      • Constellation Joins Hyperledger


      • FedEx Joins Hyperledger in further push for Logistics efficiency
        FedEx the giant US courier company, proactive adopter of blockchain technology and BiTA member, has joined Linux hosted open-source project Hyperledger to further advance the use of distributed ledger in logistics, and transportation.


      • Wanchain 3.0 — Bridging Bitcoin & Ethereum — Alpha Testnet is Live!
        We are very pleased to announce that invite-only testing for Bitcoin Integration (Wanchain 3.0) is now live — see below for registration details. This is the Alpha testnet for Wanchain’s 3.0 launch that has been planned to go live by the end of 2018. We have been making remarkable progress on our technology and are excited to deliver this Alpha testnet ahead of schedule.


      • Hyperledger Continues Strong Momentum with 14 New Members
        Hyperledger, an open source collaborative effort created to advance cross-industry blockchain technologies, today announced 14 members have joined its growing global community. More than 270 organizations are now contributing to the growth of Hyperledgers' open source distributed ledger frameworks and tools.


      • Linux Foundation helps bring VNFs to Kubernetes


        The Linux Foundation announced further collaboration between the telecom and cloud industries through its Cloud Native Computing Foundation (CNCF) and LF Networking (LFN) in order to fuel migrations of virtual network functions (VNFs) to cloud-native network functions (CNFs).

        Two of the fastest-growing Linux Foundation projects – ONAP (part of LF Networking) and Kubernetes (part of CNCF) – are coming together in next-generation telecom architecture as operators evolve their VNFs into CNFs running on Kubernetes. Compared to traditional VNFs (network functions encapsulated in a virtual machine running in a virtualized environment on OpenStack or VMware, for example), CNFs (network functions running on Kubernetes on public, private, or hybrid cloud environments) are lighter weight and faster to instantiate, the foundation said. Container-based processes are also easier to scale, chain, heal, move and back up.


      • Open source communities unite around Cloud-native Network Functions
        Cloud Native Computing Foundation (CNCF), chiefly responsible for Kubernetes, and the recently established Linux Foundation Networking (LF Networking) group are collaborating on a new class of software tools called Cloud-native Network Functions (CNFs).

        CNFs are the next generation Virtual Network Functions (VNFs) designed specifically for private, public and hybrid cloud environments, packaged inside application containers based on Kubernetes.


      • Blockchain development made easy: Getting started with Hyperledger Iroha
        Our ‘Blockchain development made easy’ series continues with Hyperledger Iroha, a simple blockchain platform you can use to make trusted, secure, and fast applications. What are the advantages and how can developers get started with it? We talked to Makoto Takemiya, co-founder and co-CEO of Soramitsu about what’s under this project’s hood.


      • Open FinTech Forum Offers Tips for Open Source Success
        2018 marks the year that open source disrupts yet another industry, and this time it’s financial services. The first-ever Open FinTech Forum, happening October 10-11 in New York City, focuses on the intersection of financial services and open source. It promises to provide attendees with guidance on building internal open source programs along with an in-depth look at cutting-edge technologies being deployed in the financial sector, such as AI, blockchain/distributed ledger, and Kubernetes.

        Several factors make Open FinTech Forum special, but the in-depth sessions on day 1 especially stand out. The first day offers five technical tutorials, as well as four working discussions covering open source in an enterprise environment, setting up an open source program office, ensuring license compliance, and best practices for contributing to open source projects.




    • Graphics, Hardware and Virtualization



      • Intel Iris Gallium3D Forming As Their Future OpenGL Driver, Promising Early Results
        Last month we noted a new Gallium3D driver in-development by Intel dubbed "Iris" and potentially replacing their existing "classic i965" Mesa driver for recent generations of Intel HD/UHD/Iris graphics hardware. Intel developers have begun talking about this new open-source Linux GPU driver today at the XDC 2018 conference in A Coruña, Spain.


      • AMD Zen-Based Hygon Dhyana CPU Support Queued Ahead Of Next Linux Cycle
        Support for the Hygon Dhyana, a Chinese x86 server CPU based on AMD Zen/EPYC, will find its way into the next Linux kernel cycle.

        The partnership between AMD and Haiguang IT Co was announced earlier this year for creating x86 CPUs targeting the Chinese server market. Hygon "Dhyana" is the first family of these new x86 CPUs licensed from AMD and based upon their Zen / Family 17h architecture. For the past several months there have been rounds of kernel patches sent out for review adding this Hygon Dhyana support to the Linux kernel.


      • Mesa 18.2.1 Going Into Ubuntu 18.10 For Fresh Open-Source GPU Drivers
        It was a bit nerve-racking seeing Mesa 18.1 still in use by the Ubuntu 18.10 "Cosmic Cuttlefish" in recent days, but fortunately it looks like the feature freeze exception is secured and Mesa 18.2 is on its way to landing.

        Since yesterday, Mesa 18.2.1 is now queued in cosmic-proposed. It's not in the official "Cosmic" archive yet, but should soon be -- well in time for the Ubuntu 18.10 release expected on 18 October.


      • Intel Working On Improving Linux Virtualization With VT-d Scalable Mode
        Intel VT-d revision 3.0 adds a "Scalable Mode" translation mode for enabling Scalable I/O virtualization and the patches have been in the works for supporting this within the Linux kernel.

        Intel open-source developer Ashok Raj has written a detailed block post covering this Intel virtualization enhancement for directed I/O and its benefit on performance and overcoming existing I/O virtualization shortcomings.


      • MoltenVK Updated Against Vulkan 1.1.85, New Features
        For developers interested in delivering cross-platform Vulkan games/applications and using MoltenVK for delivering macOS/iOS support, a new release is available that has a number of feature additions.


      • Intel Opens Up Their Mesa 3D Continuous Integration Test Data To All
        At XDC2018 in Spain this morning the talks were focused on testing of Mesa / continuous integration. During the talk by Mark Janes, the Intel open-source crew announced the public availability of all their CI data.


      • AMD Arcturus Might Be The Codename Succeeding Navi
        While it will be a ways from release, the codename to the successor of the AMD Radeon "Navi" GPUs might be Arcturus.

        Navi is the codename of the next-gen AMD GPUs due out in 2019 and is the nickname of the star Gamma Cassiopeiae. Current generation Vega also ties into the astronomical theme as it's the brightest star in the Lyra constellation.. It was "Polaris" that kicked off this theme with the Radeon RX 480 series launch. Now it looks like the AMD Navi successor might be Arcturus. Arcturus is a large red star and the brightest of the constellation of Boötes.


      • HDCP 2.2 Support Updated For The Intel DRM Linux Driver
        This year Intel HDCP support was merged into the mainline Linux kernel for those wanting to utilize this copy protection system in combination with a supported Linux user-space application, which for now appears to be limited to Chrome OS. HDCP 2.2 support is the latest revision now being worked on for the open-source Intel Direct Rendering Manager driver.
      • VirtualBox DRM Driver Gets Patches To Go Atomic, Promote Out Of Staging
        We've known Red Hat was working on converting the VirtualBox "vboxvideo" DRM/KMS driver to using the atomic APIs for atomic mode-setting to replace the legacy APIs and now those patches are out there.

        Red Hat's Hans de Goede sent out the 15 patches on Wednesday for wiring up the atomic mode-setting interfaces to replace the legacy APIs. Red Hat developers have been doing this as they were the ones pushing for getting the VirtualBox guest drivers into the mainline kernel itself with Oracle's developers working on VirtualBox sadly lacking that initiative.


    • Benchmarks



      • macOS 10.14 Mojave vs. Ubuntu 18.04 LTS vs. Clear Linux Benchmarks
        With macOS Mojave having been released earlier this week, I've been benchmarking this latest Apple operating system release on a MacBook Pro compared to Ubuntu 18.04.1 LTS with the latest updates as well as Intel's high-performance Clear Linux rolling-release operating systems to see how the performance compares.

        MacOS Mojave is more focused on delivering the new "dark mode" and various app improvements over a particular performance focus, but from our side it's always interesting to see how Apple's latest macOS releases compare to the performance of Linux distributions on Apple's own hardware. For comparison, macOS 10.13.6 High Sierra was benchmarked alongside macOS 10.14.0 Mojave.






  • Applications



  • Desktop Environments/WMs



    • 5 cool tiling window managers
      The Linux desktop ecosystem offers multiple window managers (WMs). Some are developed as part of a desktop environment. Others are meant to be used as standalone application. This is the case of tiling WMs, which offer a more lightweight, customized environment. This article presents five such tiling WMs for you to try out.


    • K Desktop Environment/KDE SC/Qt



      • KDE Neon Now Based on Ubuntu 18.04 ‘Bionic Beaver’
        The wait is over: the KDE Ubuntu 18.04 release is finally here.

        Developers behind the KDE-centric Linux distro€¹ have announced that they’ve successfully rebased KDE Neon on Ubuntu 18.04 LTS ‘Bionic Beaver’, which was released earlier this year.

        With the bump to Bionic KDE Neon users unlock access to newer packages, third-party tools, and hardware drivers. They also benefit from a more recent Linux kernel.
      • Monthly Munchen KDE Hackaton


        The idea is not to hack in complex applications for now, but to integrate wannabe KDE hackers into actually being KDE hackers, so I’ll focus on small tasks at first untill we have a solid base here the same way I did when I joined KDE and had those sessions with Sandro Andrade at the Universities Ruy Barbosa. Also, my german language skills are really weak, I’m also trying to learn some german here and I belive this is a good way to meet people.



      • Krita 4.1.3 Released
        Today we’re releasing the latest version of Krita! In the middle of our 2018 fundraiser campaign, we’ve found the time to prepare Krita 4.1.3. There are about a hundred fixes, so it’s a pretty important release and we urge everyone to update! Please join the 2018 fundraiser as well, so we can continue to fix bugs!


      • Interview on Linux Unplugged podcast
        A few days ago Jupiter Broadcasting’s Chris Fisher approached me about doing an interview for his Linux Unplugged podcast, so I said sure! I talked about the Usability & Productivity initiative, Kubuntu and KDE Neon, my history at Apple, and sustainable funding models for open-source development.


      • Elementary, My Dear Plasma
        We chat with Nate Graham who’s pushing to make Plasma the best desktop on the planet. We discuss his contributions to this effort, and others.




    • GNOME Desktop/GTK



      • Vince – A Stylish GTK Theme for Linux
        Vince is a beautiful modern GTK theme and it is compatible with all GTK3 and GTK2-based Desktop Environments including Xfce, Mate, Gnome, etc.

        It has 3 colour variants which are Materia, Materia-dark, and Materia-light and they all feature a minimalist UI with clean design elements and neat animation effects.

        It is based on the nana-4 Material Design theme (formerly Flat-Plat) which is based on GNOME’s Adwaita theme.

        This is not the first time a theme is what can be referred to as the 3rd-generation fork from another theme. Sometimes the “generation” count goes as high as 6. But this is open-source so more power to the developer.






  • Distributions



    • What’s New in BlankOn 11 Uluwatu


      Blankon 11 Uluwatu is the latest version of Blankon Linux Distribution. This release ships with a custom desktop environment based-on GNOME Shell 3.26.2 called manokwari, Powered by Linux kernel 4.14 series and based-on Debian SID. Blankon installer was improved, developed using HTML5 technology, java and vala. it now support for UEFI partition.

      Includes a new LibreOffice version 6.0.1.1 for default office suite. Firefox Quantum 58 as default browser, GIMP 2.8.20, Inkscape 0.92, Audacious 3.9, Corebird for default twitter app, VLC media Player 3.0, and GNOME apps 3.26.


    • Reviews



      • What’s New in Bodhi Linux 5.0
        Bodhi Linux 5.0 the latest release of Bodhi Linux has been released by Jeff Hoogland. This release ships with a latest Moksha Desktop 0.3, Powered by Linux kernel 4.15 series and Based on Canonical’s long-term supported Ubuntu 18.04 LTS (Bionic Beaver).

        Bodhi Linux 5.0 promises to offer users a rock-solid, Enlightenment-based Moksha Desktop experience, improvements to the networking stack, and a fresh new look based on the popular Arc GTK Dark theme but colorized in Bodhi Green colors. also comes with a new default wallpaper, new login, and boot splash screen themes, as well as an AppPack version for those who want to have a complete application suite installed by default on their new Bodhi Linux installations.


      • New MakuluLinux Deserves a Spot in the Majors
        Since LinDoz is now officially available for download, I will wrap up with a focus on what makes MakuluLinux LinDoz a compelling computing option. I no doubt will follow the Flash and the Core edition releases when those two distros are available in final form.

        One of the more compelling attributes that LinDoz offers is its beautiful form. It is appealing to see. Its themes and wallpapers are stunning.

        For the first time, you will be able to install the new LinDoz once and forget about it. LinDoz is now a semi-rolling release. It receives patches directly from Debian Testing and MakuluLinux.

        Essential patches are pushed to the system as needed.

        Caution: The LinDoz ISO is not optimized for virtual machines. I tried it and was disappointed. It loads but is extremely slow and mostly nonresponsive. Hopefully, the developer will optimize the ISO swoon to provide an additional option for testing or using this distro.

        However, I burned the ISO to a DVD and had no issues with the performance in live session. I installed LinDoz to a hard drive with very satisfying results.




    • New Releases



      • SparkyLinux 5.5 "Nibiru" GameOver, Multimedia, and Rescue Editions Are Out Now
        Initially launched this summer on July 27, 2018, the SparkyLinux 5.5 "Nibiru" Rolling operating system series brought all the latest updates and security fixes from the Debian Testing repositories a.k.a. Debian GNU/Linux 10 "Buster," and was available as MinimalGUI (Openbox), MinimalCLI, and LXQt editions.

        New ISOs were made available last week with even more recent updates from the Debian Testing repositories, and today the special editions were released too as SparkyLinux 5.5 GameOver, SparkyLinux 5.5 Multimedia, and SparkyLinux 5.5 Rescue, synced with the Debian Buster repositories as of September 24, 2018.




    • Gentoo Family



      • New copyright policy explained
        The policy aims to cover all copyright-related aspects, bringing Gentoo in line with the practices used in many other large open source projects. Most notably, it introduces a concept of Gentoo Certificate of Origin that requires all contributors to confirm that they are entitled to submit their contributions to Gentoo, and corrects the copyright attribution policy to be viable under more jurisdictions.




    • Red Hat Family



      • Indeni to Participate in Red Hat Ansible Automation Community
        Indeni, provider of the crowd-sourced network automation platform, today announced its sponsorship of AnsibleFest 2018 to showcase the collaboration between Indeni and Red Hat Ansible Automation around initiatives designed to benefit IT operations and help advance network automation solutions.


      • Red Hat debuts infrastructure migration


        Red Hat is introducing an offering to help provide an open pathway to digital transformation.

        Designed to help enterprises cut costs and speed innovation through cloud-native and container-based technologies, Red Hat infrastructure migration solution enables enterprises to break down closed technology silos centered on proprietary virtualisation.
      • Hybrid Cloud: As the industry matures, think big, start small, scale fast
        The number one complaint we hear from customers is their struggle to run tomorrow’s workloads on yesterday’s infrastructure. With a lot of new technologies coming to the forefront—containers, microservices, and so on—modern workloads are significantly different than even three or four years ago. They’re now distributed across multiple footprints, and organizations are struggling to keep pace.


      • Orange Spain taps Red Hat for new 'X by Orange' B2B unit
        Open source software provider Red Hat announced that it’s been selected as a core technology partner by ‘X By Orange’, the new subsidiary of Orange Spain focused on business-to-business (B2B) digital services. Launched earlier this month, X by Orange is building a greenfield, cloud-native platform, enabling the service provider to embrace DevOps and agile development and more rapidly create and deliver digital services to business customers.


      • Is X by Orange Showing Us the OTT Future for Telcos?
      • X By Orange selects Red Hat as technology partner


      • X by Orange takes cloud-native approach to serving business customers
        Orange Spain subsidiary X by Orange is embracing a cloud-native platform to deliver digital services to its business customers.

        X by Orange is notable because it eschews traditional network infrastructure and legacy hardware by instead creating a separate platform that is software-based. Using Red Hat's OpenShift Container Platform, along with its consulting team, X by Orange is able to put services in a public cloud by using the greenfield, cloud-native platform.


      • Orange Launches 'X By Orange' Venture with Red Hat's 'Cloud-Native' Tech
        Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions, today announced that X By Orange, a subsidiary of Orange Spain focused on business-to-business (B2B) digital services, selected Red Hat as a core technology partner to help create its software-defined strategy with Red Hat OpenShift Container Platform in collaboration with Red Hat Consulting. With the industry’s most comprehensive enterprise Kubernetes platform, X by Orange is building a greenfield, cloud-native platform, enabling the service provider to embrace DevOps and agile development and more rapidly create and deliver digital services to business customers.


      • Red Hat OpenShift Helps Make X by Orange’s Hardware-Free Vision of Business Communications Services a Reality


      • Source versus binary S2I workflows with Red Hat OpenShift Application Runtimes
        Red Hat OpenShift supports two workflows for building container images for applications: the source and the binary workflows. The binary workflow is the primary focus of the Red Hat OpenShift Application Runtimes and Red Hat Fuse product documentation and training, while the source workflow is the focus of most of the Red Hat OpenShift Container Platform product documentation and training. All of the standard OpenShift Quick Application Templates are based on the source workflow.

        A developer might ask, “Can I use both workflows on the same project?” or, “Is there a reason to prefer one workflow over the other?” As a member of the team that developed Red Hat certification training for OpenShift and Red Hat Fuse, I had these questions myself and I hope that this article helps you find your own answers to these questions.


      • Aging like milk, not wine: The realities of container security


        In many ways, age brings refinement. Wine, cheese, and, in some cases, people, all improve as they grow older. But in the world of enterprise IT, age has a different connotation. Aged systems and software, can bring irrelevance and technical debt and, at worst, increased security risks. With the rise of Linux containers as a functional underpinning to the digitally-transforming enterprise, the ill effects of technological age are front and center.

        To think of it more simply: Containers age like milk, not like wine. Think of it in terms of food: Milk is a key component in cooking, from baking to sauces. If the milk sours or goes bad, so to does the recipe. The same things happens to containers, especially as they are being looked to as key components for production systems. A stale or “soured” container could ruin an otherwise promising deployment.


      • Sticking with HEAD on OpenShift with Image Streams
        Many modern developers have learned that ‘sticking with HEAD’ (the most recent stable release) can be the best way to keep their application more secure. In this new ‘devops’ world there’s a fine line between using the latest and greatest, and breaking changes introduced by an upgrade. In this post we’ll explore some configuration options in Red Hat OpenShift which can make keeping up with the latest release easier, while reducing the impact of breaking changes. For more information on image streams I encourage you to read the source-to-image FAQ by Maciej Szulik.

        [...]

        Using scheduled source-to-image base image streams, along with a build configuration which disables ImageChange triggers, we can strike a nice balance between “sticking with head”, and avoiding breaking changes. Consider updating the pre-installed image streams in the ‘openshift’ project to allow your developers get the latest security updates in language runtimes and build tools.

        While I used CentOS images for demonstration purposes in this post, I’d recommend using RHEL images for your production applications. The Red Hat Container Catalogue contains regularly updated and certified container images, fully supported by Red Hat.


      • Security Technologies: FORTIFY_SOURCE
        FORTIFY_SOURCE provides lightweight compile and runtime protection to some memory and string functions (original patch to gcc was submitted by Red Hat). It is supposed to have no or a very small runtime overhead and can be enabled for all applications and libraries in an operating system. The concept is basically universal meaning it can be applied to any operating system, but there are glibc specific patches available in gcc-4 onwards. In gcc, FORTIFY_SOURCE normally works by replacing some string and memory functions with their *_chk counterparts (builtins). These functions do the necessary calculations to determine an overflow. If an overflow is found, the program is aborted; otherwise control is passed to the corresponding string or memory operation functions. Again all this is normally done in assembly so the overhead is really minimal.


      • Empowered, inspired and energized at the Grace Hopper Celebration of Women in Computing
        Six years ago, when Red Hat sponsored the Grace Hopper Celebration of Women in Computing (GHC) event for the first time, we had a small presence. There were just five Red Hatters in attendance! Being new to the event, few people knew who we were, and they were even less were familiar with open source. It was an exciting time to join this event, because across the industry, the topic of women in tech was beginning to gain momentum.

        Today the idea of diversity and inclusion isn’t a new topic, but it’s still a crucial one. The role that women play in tech and the importance of creating a strong pipeline of talent will be something the industry will need to continue to address.


      • Finance



      • Fedora



        • Fedora reawakens the hibernation debate
          Behavioral changes can make desktop users grumpy; that is doubly true for changes that arrive without notice and possibly risk data loss. Such a situation recently arose in the Fedora 29 development branch in the form of a new "suspend-then-hibernate" feature. This feature will almost certainly be turned off before Fedora 29 reaches an official release, but the discussion and finger-pointing it inspired reveal some significant differences of opinion about how this kind of change should be managed.


        • Fedora 29 Beta
          As is my habit, I upgraded my laptop at Beta time. dnf system-upgrade didn’t work for me because of some dependency issues. In the process of working through a dnf upgrade, I discovered that it was due to some odd homegrown Python RPMs I’d made and forgotten about, and gource, which was still FBTBS. After working those out, it was uneventful.
        • Fedora 29 Atomic and Cloud Test Day 2018-10-01






    • Debian Family



      • Debian Policy call for participation -- September 2018
        Here’s a summary of some of the bugs against the Debian Policy Manual that are thought to be easy to resolve.


      • My Work on Debian LTS (September 2018)
        In September 2018, I did 10 hours of work on the Debian LTS project as a paid contributor. Thanks to all LTS sponsors for making this possible.


      • Derivatives



        • Canonical/Ubuntu



          • Canonical unveils the official Ubuntu Linux 18.10 'Cosmic Cuttlefish' wallpaper
            Twice a year, a new version of Ubuntu is released -- in April and October. We are currently in September, meaning a new release is just around the corner. As per normal naming guidelines (YY.MM), it will be version 18.10. In addition to a number, Canonical assigns a fun name too -- based on an animal, alphabetically, preceded by a word that starts with the same letter. In this case, Ubuntu 18.04 is using the letter "C." What is it called? Cosmic Cuttlefish.

            The name and version number is only part of the tradition, however, In addition, Canonical releases a special wallpaper based on the name. The animal is often a line drawing with the background using the classic Ubuntu magenta/orange gradient color. Today, on Twitter, Canonical unveils the official Cosmic Cuttlefish wallpaper.


          • Ubuntu 18.10 (Cosmic Cuttlefish) Beta released
            The Ubuntu team is pleased to announce the final beta release of the Ubuntu 18.10 Desktop, Server, and Cloud products.

            Codenamed "Cosmic Cuttlefish", 18.10 continues Ubuntu's proud tradition of integrating the latest and greatest open source technologies into a high-quality, easy-to-use Linux distribution. The team has been hard at work through this cycle, introducing new features and fixing bugs.

            This beta release includes images from not only the Ubuntu Desktop, Server, and Cloud products, but also the Kubuntu, Lubuntu, Ubuntu Budgie, UbuntuKylin, Ubuntu MATE, Ubuntu Studio, and Xubuntu flavours.

            The beta images are known to be reasonably free of showstopper CD build or installer bugs, while representing a very recent snapshot of 18.10 that should be representative of the features intended to ship with the final release expected on October 18th, 2018.

            Ubuntu, Ubuntu Server, Cloud Images: Cosmic Final Beta includes updated versions of most of our core set of packages, including a current 4.18 kernel, and much more.


          • Ubuntu 18.10 Beta Now Available For Testing The Cosmic Cuttlefish
            The Ubuntu 18.10 Beta was released today for the official desktop, server, and cloud products. As well, 18.10 betas are out today for Kubuntu, Lubuntu, Ubuntu Budgie, Ubuntu Kylin, Ubuntu MATE, Ubuntu Studio, and Xubuntu.

            It's been a busy Ubuntu 18.10 cycle while for desktop users the most evident change is the new default theme for the GNOME Shell session. Ubuntu 18.10 brings many "under the hood" upgrades from the GCC 8 compiler, the big X.Org Server 1.20 release, the new Linux 4.18 kernel, and a lot of other package upgrades.


          • Ubuntu 18.10 Beta is Now Available to Download
            Developers, bug battlers, and enthusiastic fans alike are invited to download Ubuntu 18.10 beta to help test the release ahead of its stable release next month.

            This is the only beta build that Ubuntu or its community cohorts have released this cycle. The opt-in beta that flavors like Kubuntu and Ubuntu MATE usually make use of? Well, that was retired from the 18.10 release schedule.

            Anyway, keep reading for a condensed overview of the highlights of Ubuntu 18.10 beta, or scroll on down to the download section to acquire an ISO ripe for throwing on the nearest suitably-sized USB drive.


          • Flavours and Variants



            • Ubuntu MATE 18.10 Beta
              Ubuntu MATE 18.10 is a modest, yet strategic, upgrade over our 18.04 release. If you want bug fixes and improved hardware support then 18.10 is for you. For those who prefer staying on the LTS then everything in this 18.10 release is also important for the upcoming 18.04.2 release. Read on to learn more…

              We are preparing Ubuntu MATE 18.10 (Cosmic Cuttlefish) for distribution on October 18th, 2018 With this Beta pre-release, you can see what we are trying out in preparation for our next (stable) version.


            • Lubuntu Cosmic Cuttlefish Beta has been released!
              Thanks to all the hard work from our contributors, we are pleased to announce that the Lubuntu Cosmic Cuttlefish Beta (soon to be 18.10) has been released!












  • Devices/Embedded





Free Software/Open Source



  • Resource control at Facebook
    Facebook runs a lot of programs and it tries to pack as many as it can onto each machine. That means running close to—and sometimes beyond—the resource limits on any given machine. How the system reacts when, for example, memory is exhausted, makes a big difference in Facebook getting its work done. Tejun Heo came to 2018 Open Source Summit North America to describe the resource control work that has been done by the team he works on at Facebook.

    [...]

    It is difficult to tell whether a process is slow because of some inherent limitation in the program or whether it is waiting for some resource; the team realized it needed some visibility into that. Johannes Weiner has been working on the "pressure stall information" (PSI) metric for the last two years. It can help determine that "if I had more of this resource, I might have been able to run this percentage faster". It looks at memory, I/O, and CPU resource usage for the system and for individual cgroups to derive information that helps in "determining what's going on in the system".

    PSI is used for allocating resources to cgroups, but is also used by oomd, which is the user-space OOM killer that has been developed by the team. Oomd looks at the PSI values to check the health of the system; if those values are too bad, it will remediate the problem before the kernel OOM killer gets involved.

    The configuration of oomd can be workload-dependent; if the web server is being slowed down more than 10%, that is a big problem, Heo said. On the other hand, if Chef or YUM are running 40% slower, "we don't really care". Oomd can act in the first case and not in the second because it provides a way to specify context-specific actions. There are still some priority inversions that can occur and oomd can also help ameliorate those.



  • Using Open Source Languages Effectively in the Enterprise
    Those who are enthusiastic about open source languages have been contributing to open source language projects and building versions of languages including Perl, JavaScript, Go, Tcl, Ruby and Python. There has been a massive shift in the adoption of open source languages and genesis of new ones in the last 20 years. Even large corporations such as Microsoft, Google and IBM contribute to open source projects that are hosted on GitHub, and Spotify, Dropbox and Reddit are among the big names that use Python.


  • Enterprise Search Has an Open Source Secret


    A different model emerged in the '80s: open source software. From the start, the idea was to create software that anyone could download and use for free. On top of that, anyone could modify and use the source code and submit modifications and bug fixes back to the original project. Over time, several different types of open source licenses evolved, and a number of software products we use every day were created.

    [...]

    In the early days of the web, a group known initially as the Apache Group, now the Apache Software Foundation, was developing the first free and open source web server. The organization has since expanded into many other projects. Because many of the projects are assigned names of animals — from Ant to Zookeeper — they are often collectively known as the "Apache Zoo" as I wrote back in 2015.


  • Bossies 2018: The Best of Open Source Software Awards
    Remember Snort? Or Asterisk? Or Jaspersoft or Zimbra? Heck, you might still be using them. All of these open source champions—InfoWorld Best of Open Source Software Award winners 10 years ago—are still going strong. And why not? They’re still perfectly useful.


  • InfoWorld Recognizes Open Source Software Technologies Driving Business Innovation


  • The 2018 InfoQ Editors’ Recommended Reading List: Part One


  • Sysdig Falco, sysdig, and Sysdig Inspect Win InfoWorld Best of Open Source Software Awards


  • Can your organisation benefit from embracing the open source way?
    A recent Forbes article indicates that corporate engagement with open source communities has grown to become a strategic imperative over the past couple of decades. An increasing number of companies are paying their employees to contribute to such communities. This is one manifestation of a broader growing trend toward closer collaboration between companies and open source communities. Well-recognised companies such as Google, Uber, Facebook, and Twitter have open sourced their projects and encouraged their employees to contribute to open source communities. Among software developers who contribute to such communities, estimates suggest that up to 40% of them are paid by their company to do so. Some companies see this as an opportunity to enhance their employees’ skills while others aim to influence open source product development to support their own complementary products and services. Regardless of the motives, managers should consider the impact of such arrangements on the employees involved.


  • Surge Synth Set Free
    Vember Audio tells us that, as of 21th September 2018, Surge stopped being a commerical product and became an open-source project released under the GNU GPL v3 license. They say that, for the existing users, this will allow the community to make sure that it remains compatible as plug-in standards and Operating Systems evolve and, for everyone else, it is an exiting new free synth to use, hack, port, improve or do whatever you want with.


  • Vember Audio’s Surge synth plugin is now free and open-source
    Reviewing Vember Audio’s Surge synth over a decade ago, we said: “This is a big, beautiful-sounding instrument. It's not cheap, but few plugins of this quality are.” Well, the sound hasn’t changed, but the price has; in fact, Surge has just been made free and open-source.

    Thanks to its wavetable oscillators and FM-style algorithms, Surge is capable of creating some pretty sparkling sounds, but it also has analogue-style functions that make it suitable for producing vintage keyboard tones.

    Vember Audio says that it’s been set free so that it can continue to be developed by the community and remain compatible with current standards and operating systems.


  • Pulsar graduates to being an Apache top-level project
    In Montreal at ApacheCon, the Apache Software Foundation (ASF) announced that Pulsar had graduated to being an Apache top-level project. This pub-sub messaging system boasts a flexible messaging model and an intuitive client application programming interface (API).

    Pulsar is a highly scalable, low-latency messaging platform running on commodity hardware. It provides simple pub-sub and queue semantics over topics, lightweight compute framework, automatic cursor management for subscribers, and cross-datacenter replication. It was designed from day one to address gaps in other open-source messaging systems.


  • Webhint Open Source Linting Tool


    The webhint project provides an open source linting tool to check for issues with accessibility, performance, and security. The creation of websites and web apps has an increasing number of details to perfect, and webhint strives to help developers remember these details.

    webhint is available as either a CLI tool or as an online scanner. The quickest way to get started with webhint is with the online scanner, which requires a public facing URL to run a report and get insights about an application.


  • Mobile app testing tools embrace automation, open source
    Sauce Labs Inc., based in San Francisco, provides automated mobile app testing tools. The company this week announced support for Google Android and Apple iOS native test automation frameworks such as XcuiTest and Espresso. In this Q&A, Steven Hazel, co-founder and CTO of Sauce Labs, discusses best practices and trends around mobile app testing tools.


  • Events



    • KDAB demos at Qt World Summit, Boston
      KDAB is the main sponsor at Qt World Summit Boston and in addition to the Introductory and Advanced one day training courses on Day 1, two talks on Day 2: Creating compelling blended 2D/3D applications – a solution for artists and developers, and KDAB’s Opensource Tools for Qt.


    • 2018 Linux Security Summit North America: Wrapup


      The 2018 Linux Security Summit North America (LSS-NA) was held last month in Vancouver, BC.

      [...]

      Once again, as is typical, the conference was focused around development, somewhat uniquely in the world of security conferences. It’s interesting to see more attention seemingly being paid to the lower parts of the stack: secure booting, firmware, and hardware roots of trust, as well as the continued efforts in hardening the kernel.




  • Web Browsers



    • Chrome



      • Product updates based on your feedback


        We recently made a change to simplify the way Chrome handles sign-in. Now, when you sign into any Google website, you’re also signed into Chrome with the same account. You’ll see your Google Account picture right in the Chrome UI, so you can easily see your sign-in status. When you sign out, either directly from Chrome or from any Google website, you’re completely signed out of your Google Account.


      • Chrome 70 Will Make Browser Sign-In Optional After Privacy Concerns
        Following a major backlash due to questionable privacy settings in Google Chrome 69, Google today announced that it will make the new features optional in the upcoming Chrome 70 release.

        In the blog post, Google said the Chrome 70, which is scheduled for mid-October release, would add sign-in controls in the “Privacy and Security” settings. This will allow users to delink the mandatory web-based sign-in with the browser sign-in. In simple words, users will now have a choice to avoid logging-in into the Chrome browser while logging-in into Google websites like Gmail, YouTube, etc.




    • Mozilla



      • 25,000 Americans Urge Venmo to Update Its Privacy Settings
        Earlier this week, Mozilla visited Venmo’s headquarters in New York City and delivered a petition signed by more than 25,000 Americans. The petition urges the payment app to put users’ privacy first and make Venmo transactions private by default.

        Also this week: A new poll from Mozilla and Ipsos reveals that 77% of respondents believe payment apps should not make transaction details public by default. (More on our poll results below.)

        Millions of Venmo users’ spending habits are available for anyone to see. That’s because Venmo transactions are currently public by default — unless users manually update their settings, anyone, anywhere can see whom they’re sending money to, and why.

        Mozilla’s petition urges Venmo to change these settings. By making privacy the default, Venmo can better protect its seven million users — and send a powerful message about the importance of privacy. But so far, Venmo hasn’t formally responded to our petition and to the 25,000 Americans who signed their names.


      • Mozilla Firefox Account Gets A New Recovery Key Option For Forgotten Passwords
        The Mozilla team has announced a new recovery key option for Firefox accounts that can be used to access Firefox data if users forget their passwords.

        Starting today, users will be able to generate a one-time recovery key associated with their account. Once the key is used to access the account, it becomes invalid, and the user needs to create another one.

        [...]

        Sync encrypts the user’s browser data on a local computer by using Firefox account password. It then sends this encrypted data to Mozilla’s servers for storage making sure that no one can access it without the user’s password (which acts as a decryption key here).


      • WebRender newsletter #23
        Bonjour everyone! Here comes the twenty third installment of WebRender’s very best newsletter. This time I’m trying something a bit different. Instead of going through each pull request and bugzilla entry that landed since the last post, I’m only sourcing information from the team’s weekly meeting. As a result only the most important items make it to the list and not all items have links to their bug or pull request. Doing this allows me to spend considerably less time preparing the newsletter and will hopefully help with publishing it more often.

        Last time I mentioned WebRender being enabled on nightly by default for a small subset of the users, focusing on nVidia desktop GPUs on Windows 10. I’m happy to report that we didn’t set our nightly user population on fire and that WebRender is still enabled in these configurations (as expected, sure, but with a project as large and ambitious as WebRender it isn’t something that could be taken for granted). The choice of this particular configuration of hardware and driver led to a lot of speculation online, so I just want clarify a few things. We did not strike any deal with nVidia. nVidia didn’t send engineers to help us get WebRender to work on their hardware first. No politics, I promise. We learnt from past mistakes and chose to target a small population of Firefox users at first specifically because it is small. Each combination of OS/Vendor/driver exposes its own set of bugs and a progressive and targeted rollout means we’ll be better equipped to react in a timely manner to incoming bugs than we have been with past projects. Worry not, the end game is for WebRender to be Firefox’s rendering engine for everyone. Until then, are welcome to enable WebRender manually if your OS, hardware or driver isn’t in the initial target.






  • Oracle/Java/LibreOffice



    • LibreOffice 6.1.2 Open-Source Office Suite Lands with 70 Bug Fixes, Download Now
      Coming only two weeks after the release of the first maintenance update, LibreOffice 6.1.1, the LibreOffice 6.1.2 point release is here to address 70 bugs discovered by the development team or reported by users across several components of the office suite. The release was made during the LibreOffice Conference 2018 that takes place these days in Tirana, Albania, and the full changelog is available here.

      "The Document Foundation announces LibreOffice 6.1.2, the second minor release of the LibreOffice 6.1 family, targeted at early adopters, technology enthusiasts, and power users," said Italo Vignoli in today's announcement. "The new release was launched during the LibreOffice Conference 2018, in Tirana, the capital city of Albania. LibreOffice 6.1.2 provides around 70 bug and regression fixes over the previous version."




  • Pseudo-Open Source (Openwashing)



  • FSF/FSFE/GNU/SFLC



    • Happy Birthday, GNU: Why I still love GNU 35 years later
      GNU was publicly announced on September 27, 1983, and today has a strong following.

      GNU is...

      an operating system an extensive collection of computer software free software licensed under the GNU Project's own General Public License (GPL)


    • Google is 20, GNU is 35; Why No GNUgle?


      This week 20 years ago Google was born in a garage, so fitting in with the Silicon Valley creation story; 35 years ago the GNU open source project was announced. Two great, but very different, events. Time to look back and ask why?

      The GNU movement was started to create an open source version of Unix. At the time its rationale seemed obvious and desirable. In the academic world there was a real problem in, for example, teaching operating systems. Windows was closed and proprietary and Unix was just going through some copyright upheavals that made it a risky choice for teaching. The only real alternative was Minix, which also had copyright problems.

      The GNU movement would give academics what they wanted - software they could use without worrying about commercial concerns. The GNU project was, and is, a great success - even if it didn't, and still hasn't, delivered an open source version of Unix; that was achieved by Linus Torvalds and his Linux project. The GNU project did, however, deliver the GCC - GNU Compiler Collection - and many other tools that were needed to create Linux and are still needed today to make use of Linux. It is why the GNU people still insist that we call Linux "GNU Linux".


    • GNU Shepherd 0.5.0 releases
      GNU Shepherd, formerly known as GNU dmd, is a service manager written in Guile and looks after the herd of system services. It provides a replacement for the service-managing capabilities of SysV-init (or any other init) with both a powerful and beautiful dependency-based system and a convenient interface.




  • Licensing/Legal



    • Linux code contributions cannot be rescinded: Stallman


      Linux developers who contribute code to the kernel cannot rescind those contributions, according to the software programmer who devised the GNU General Public Licence version 2.0, the licence under which the kernel is released.

      Richard Stallman, the head of the Free Software Foundation and founder of the GNU Project, told iTWire in response to queries that contributors to a GPLv2-covered program could not ask for their code to be removed.

      "That's because they are bound by the GPLv2 themselves. I checked this with a lawyer," said Stallman, who started the free software movement in 1984.

      There have been claims made by many people, including journalists, that if any kernel developers are penalised under the new code of conduct for the kernel project — which was put in place when Linux creator Linus Torvalds decided to take a break to fix his behavioural issues — then they would ask for their code to be removed from the kernel.


    • Can You “Take Back” Open Source Code?


      It seems a simple enough concept for anyone who’s spent some time hacking on open source code: once you release something as open source, it’s open for good. Sure the developer might decide that future versions of the project close up the source, it’s been known to happen occasionally, but what’s already out there publicly can never be recalled. The Internet doesn’t have a “Delete” button, and once you’ve published your source code and let potentially millions of people download it, there’s no putting the Genie back in the bottle.

      But what happens if there are extenuating circumstances? What if the project turns into something you no longer want to be a part of? Perhaps you submitted your code to a project with a specific understanding of how it was to be used, and then the rules changed. Or maybe you’ve been personally banned from a project, and yet the maintainers of said project have no problem letting your sizable code contributions stick around even after you’ve been kicked to the curb?




  • Openness/Sharing/Collaboration



    • An interview with Robert Fink, Architect of Foundry, Palantir’s open data platform Part Two: Open Source and Open Approaches
      Open data formats and open-source libraries are the lingua franca of open platforms. Take Hadoop as an example: developed as an open-source alternative to Google’s proprietary MapReduce and GFS systems (thankfully Google published research papers describing them in much detail), the Hadoop ecosystem today covers effectively 100% of the “big data” market in terms of data storage systems like HDFS and S3, data formats like Parquet, and compute systems like Apache Spark. The relationship between HDFS and S3 makes for an interesting case study: both are distributed storage systems, one available at no cost for on-prem deployments and the other available as a paid service from Amazon. Critically, both implement the same Hadoop FileSystem API and are thus interchangeable as far as downstream applications like Spark are concerned. Really a perfect example of the open platform idea! Foundry directly inherits this flexibility: we are happy to work with and write data to HDFS and in S3 interchangeably.




  • Programming/Development



    • Java 11 Is Now Available With New Features: Download JDK 11 Here
      When Oracle released Java 10 earlier this year in March, it marked the beginning of a new era with Java development moving to a new six-month cycle. With the recent release of Java 11, we’ve now dived deeper.

      It’s worth noting that Java Development Kit (JDK) 11 is the first version to be shipped as the Long Term Release Support of Java SE platform. This means that Java 11 will be supported for another eight years by Oracle and the users will be able to enjoy fixes and updates.


    • Oracle pours a mug o' Java 11 for its addicts, tips pot of Binary Code License down the sink
      Oracle on Tuesday delivered Java 11, in keeping with the six-month release cadence adopted a year ago with Java 9. It is the first "Long Term Support" (LTS) release, intended for Java users who prioritize stability over Zuckerbergian fast movement and breakage.

      Oracle said it will offer commercial support for Java 11 for at least eight more years. The next LTS release, Java 17, is planned for September 2021, assuming civilization is still functioning at that point.

      After January 2019, Oracle will no longer provide free updates to Java 8, which means shifting to a supported version of Java, relying on OS vendors to provide Java patches, paying a third-party for support, building the OpenJDK on your own, or getting builds from AdoptOpenJDK.


    • What containers can teach us about DevOps
      One can argue that containers and DevOps were made for one another. Certainly, the container ecosystem benefits from the skyrocketing popularity of DevOps practices, both in design choices and in DevOps’ use by teams developing container technologies. Because of this parallel evolution, the use of containers in production can teach teams the fundamentals of DevOps and its three pillars: The Three Ways.


    • How naming of variables works in Perl 6
      In the first four articles in this series comparing Perl 5 to Perl 6, we looked into some of the issues you might encounter when migrating code, how garbage collection works, why containers replaced references, and using (subroutine) signatures in Perl 6 and how these things differ from Perl 5.


    • Programming a game on the ZX81
      This took me back as it was my first ever computer and I had no games so I had to program it. I would recommend that David buys a RAMPACK.
    • binb 0.0.2: Now with presento
      As tweeted three days ago, our still-new binb package with crisper Beamer themes for RMarkdown now contains presento. Versions 0.0.2 with this addition just arrived on CRAN.






Leftovers



  • Hardware



    • What comes after Moore's Law?
      The literal meaning of Moore’s Law is that CMOS transistor densities double every 18 to 24 months. While not a statement about processor performance per se, in practice performance and density have tracked each other fairly well. Historically, additional transistors were mostly put in service of running at higher clock speeds. More recently, microprocessors have mostly gotten more cores instead.

      The practical effect has been that all the transistors delivered by process shrinks, together with design enhancements, meant that we could count on devices getting some combination of faster, cheaper, smaller, or more integrated, at an almost boringly predictable rate.

      At a macro level, we’d simply live in a very different world had the successors to Intel’s first microprocessor, the 4004 released in 1971, improved at a rate akin to automobile fuel efficiency rather than their constant doubling.




  • Health/Nutrition



    • Trump Administration Claims Preventing Young Immigrants from Accessing Abortion is Constitutional
      The Trump administration persists in banning access to abortion for young immigrants in government custody.

      We were in a Washington, D.C., appeals court on Wednesday facing off yet again with the Trump administration over its patently unconstitutional policy of obstructing young immigrant women from accessing abortion.

      Last September, a 17-year-old woman known as Jane Doe arrived in the United States and discovered she was pregnant. Even though she repeatedly made it clear that she wanted an abortion, had received a decision from a state court judge waiving Texas’s requirement that she first obtain parental consent, and had access to private funding, the government refused to allow her to leave the shelter where she was staying to attend any abortion-related appointments.

      We took the administration to court and won. Jane successfully obtained emergency relief from a Washington D.C. district court and was able to get her abortion. The government challenged that decision and it wound up before a three-judge panel of the Court of Appeals for the District of Columbia Circuit that included Judge Brett Kavanaugh, who issued a decision allowing the Trump administration to continue to block Jane’s access to abortion. Fortunately, his decision was later overturned by the full panel of the appeals court.


    • UN General Assembly Adopts High-Level Political Declaration On Noncommunicable Diseases
      At the start of the meeting, the General Assembly adopted the NCD political declaration by acclamation, with no member state objecting. The political declaration includes commitments to reduce NCD mortality by one-third by 2030, and to scale-up funding and multi-stakeholder responses to treat and prevent NCDs.

      María Fernanda Espinosa Garcés of Ecuador, the president of the UN General Assembly, then explained that the high-level meeting today will make a “comprehensive review on the overall theme of scaling up multi-stakeholder responses and prevention of NCDS.”

      “What we need now is political will,” she said, because “ambitious goals require far-reaching measures.”


    • Interview With The President Of Brazil’s Industrial Property Institute
      Luiz Otávio Pimentel is president of the National Institute of Industrial Property (INPI) of Brazil. In Geneva this week for the annual World Intellectual Property Organization General Assemblies he took time to sit down with Intellectual Property Watch’s William New. INPI is part of the Ministry of Industry, Foreign Trade and Services.

      On a breaking issue, Pimentel, speaking through a translator, talked about the case in Brazil involving sofosbuvir, marketed as Sovaldi, Gilead’s effective medicine against hepatitis C that has been known for its exorbitant prices.


    • Equitable Defenses to Legal Claims: Merck v. Gilead Sciences


      On appeal, the Federal Circuit affirmed in a decision that I originally noted had “a few substantial problems — most notably is the fact that unclean-hands traditionally only applies to block a party from seeking equitable relief (as opposed to legal relief).” In its new petition for writ of certiorari, the patentee here seeks to piggy-back on the recent laches decisions that limited laches to issues in equity.

      The pharma giant’s basic argument is that its unclean hands cannot bar the company from asserting its legal rights. As Dan Dobbs explains in his book on remedies: “If judges had the power to deny damages and other legal remedies because a plaintiff came into court with unclean hands, citizens would not have rights, only privileges.”


    • World Leaders Commit To End Tuberculosis At Historic United Nations Meeting
      World leaders and senior representatives came together today for the first-ever High-Level Meeting on the Fight to End Tuberculosis at United Nations headquarters in New York. At the meeting, heads of state adopted a political declaration with commitments to accelerate action and funding to end the tuberculosis epidemic by 2030.




  • Security



    • Critical Linux Kernel Flaw Gives Root Access to Attackers [Ed: Somewhat misleading headline as being an "attacker" isn't enough to pose a threat at all; one needs to already have privileged account on the system. Privilege escalation attacks rely on chaining of holes, where one flaw need to be severe enough for remote access unless you foolishly give accounts to your foes (clients you typically have personal details of, which is enough for deterrence).]
      Multiple Linux distributions including all current versions of Red Hat Enterprise Linux and CentOS contain a newly discovered bug that gives attackers a way to obtain full root access on vulnerable systems.

      The integer overflow flaw (CVE-2018-14634)exists in a critical Linux kernel function for memory management and allows attackers with unprivileged local access to a system to escalate their privileges. Researchers from security vendor Qualys discovered the issue and have developed a proof of concept exploit.


    • Google Project Zero to Linux distros: Your sluggish kernel patching puts users at risk [Ed: Well, at least Linux actually patches (works around) Intel's hardware defects. NSA and Microsoft sit on known BACK DOORS. Until the tools that exploit these leak out of the NSA, shutting down HOSPITALS!]
      Jann Horn, the Google Project Zero researcher who discovered the Meltdown and Spectre CPU flaws, has a few words for maintainers of Ubuntu and Debian: raise your game on merging kernel security fixes, you're leaving users exposed for weeks.


    • Canonical’s Current Security Certifications
      Canonical has entered the security certifications space by achieving a few important security certifications for the first time on Ubuntu.

      Canonical has achieved FIPS 140-2 Level 1 certification for several cryptographic modules on Ubuntu 16.04. Canonical has also achieved Common Criteria EAL2 certification for Ubuntu 16.04. In addition, Defense Information System Agency (DISA) has published Ubuntu 16.04 Security Technical Implementation Guide (STIG) allowing Ubuntu for use by Federal agencies. Center for Internet Security (CIS) has also been publishing benchmarks for Ubuntu which hardens the configuration of Ubuntu systems to make them more secure.

      Canonical has made its security certification offerings available to all Ubuntu Advantage “Server Advanced” customers.


    • Security updates for Thursday
    • Evidence for the Security of PKCS #1 Digital Signatures

      I don't think the protocol is "provably secure," meaning that it cannot have any vulnerabilities. What this paper demonstrates is that there are no vulnerabilities under the model of the proof. And, more importantly, that PKCS #1 v1.5 is as secure as any of its successors like RSA-PSS and RSA Full-Domain.



    • Uber will pay $148 million for 2016 data breach coverup
      The money will be disbursed among all 50 US states as well as Washington, DC.


    • LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group
      UEFI rootkits are widely viewed as extremely dangerous tools for implementing cyberattacks, as they are hard to detect and able to survive security measures such as operating system reinstallation and even a hard disk replacement. Some UEFI rootkits have been presented as proofs of concept; some are known to be at the disposal of (at least some) governmental agencies. However, no UEFI rootkit has ever been detected in the wild – until we discovered a campaign by the Sednit APT group that successfully deployed a malicious UEFI module on a victim’s system.



    • 16-Year-Old Who Hacked Apple Servers Repeatedly Evades Prison
      A 16-year-old Australian teenager who repeatedly hacked Apple servers over a period of two years has evaded jail. He is set to serve a probation period of 8 months.


    • Apple’s Device Enrollment Program Has A Security Flaw; Allows Hackers To Steal Company Passwords
      Researchers have found a security flaw in Apple’s Device Enrollment Program (DEP) that can allow an attacker to gain complete access to a corporate or school network.


    • MDM Me Maybe: Device Enrollment Program Security
      The Device Enrollment Program (DEP) is a service provided by Apple for bootstrapping Mobile Device Management (MDM) enrollment of iOS, macOS, and tvOS devices. DEP hosts an internet-facing API at https://iprofiles.apple.com, which - among other things - is used by the cloudconfigurationd daemon on macOS systems to request DEP Activation Records and query whether a given device is registered in DEP.

      In our research, we found that in order to retrieve the DEP profile for an Apple device, the DEP service only requires the device serial number to be supplied to an undocumented DEP API. Additionally, we developed a method to instrument the cloudconfigurationd daemon to inject Apple device serial numbers of our choosing into the request sent to the DEP API. This allowed us to retrieve data specific to the device associated with the supplied serial number.


    • ARMv8.5-A Support Being Prepped To Battle Spectre-Style Vulnerabilities
      Earlier this month Arm began publishing details of the ARMv8.5-A instruction set update, which is expected to be officially documented and released by the end of Q1'2019, while the LLVM compiler stack has already received initial support for the interesting additions.

      Landing yesterday in LLVM Git/SVN is the new ARMv8.5-A target while hitting the tree today is the more interesting work.


    • Torii Botnet Targeting Poorly Secure IoT Devices [Ed: When all the devices have the exact same default password...]


    • DHS Awards GrammaTech $3.5M to Modernize Open-Source Software Analysis Tools


    • 'Mutagen Astronomy' Linux kernel vulnerability sighted [Ed: This is only privilege escalation on RHEL; not as severe as most bugs]


    • Local-Privilege Escalation Flaw in Linux Kernel Allows Root Access
      A local-privilege escalation vulnerability in the Linux kernel affects all current versions of Red Hat Enterprise Linux and CentOS, even in their default/minimal installations. It would allow an attacker to obtain full administrator privileges over the targeted system, and from there potentially pivot to other areas of the network.




  • Defence/Aggression



    • “Boshirov” is probably not “Chepiga”. But he is also not “Boshirov”.
      The evidence mounts that Russia is not telling the truth about “Boshirov” and “Petrov”. If those were real identities, they would have been substantiated in depth by now. As we know of Yulia Skripal’s boyfriend, cat, cousin and grandmother, real depth on the lives and milieu of “Boshirov” and “Petrov” would be got out. It is plainly in the interests of Russia’s state and its oligarchy to establish that they truly exist, and concern for the privacy of individuals would be outweighed by that. The rights of the individual are not prioritised over the state interest in Russia.

      But equally the identification of “Boshirov” with “Colonel Chepiga” is a nonsense.

      The problem is with Bellingcat’s methodology. They did not start with any prior intelligence that “Chepiga” is “Boshirov”. They rather allegedly searched databases of GRU operatives of about the right age, then trawled photos in yearbooks of them until they found one that looked a bit like “Boshirov”. And guess what? It looks a bit like “Boshirov”. If you ignore the substantially different skull shape and nose.

      [...]

      Yet Higgins now claims his facial identification of Chepiga as Boshirov as “definitive” and “conclusive”, despite the absence of moles, scars and blemishes. Higgins stands exposed as a quite disgusting hypocrite. Let me go further. I do not believe that Higgins did not take the elementary step of running facial recognition technology over the photos, and I believe he is hiding the results from you. Is it not also astonishing that the mainstream media have not done this simple test?

      The bulk of the Bellingcat article is just trying to prove the reality of the existence of Chepiga. This is hard to evaluate, but as the evidence to link him to “Boshirov” is non-existent, is a different argument. Having set out to find a GRU officer of the same age who looks a bit like “Boshirov”, they trumpet repeatedly the fact that Chepiga is about the same age as evidence, in a crass display of circular argument.




  • Transparency/Investigative Reporting



  • Environment/Energy/Wildlife/Nature



    • “A Never-Ending Commitment”: The High Cost of Preserving Vulnerable Beaches
      As lawmakers consider disaster relief in the wake of Hurricane Florence, projects to rebuild North Carolina’s shrunken shorelines are likely to get a healthy chunk of government money.

      To their advocates, these so-called beach nourishment initiatives are crucial steps in buffering valuable oceanfront properties from storm damage and boosting local economies that rely on tourism.

      But such projects replenish the same vulnerable areas again and again, and disproportionately benefit wealthy owners of seaside lots.

      Moreover, pumping millions of cubic yards of sand onto beaches can cause environmental damage, according to decades of studies. It kills wildlife scooped up from the ocean floor and smothers mole crabs and other creatures where sand is dumped, said Robert Young, a geology professor at Western Carolina University.






  • Finance



    • ‘We Would Have Had the Most Dramatic Financial Reform You’d Ever Seen’
      When Donald Trump awarded himself top marks for his administration’s disaster response in Puerto Rico, media had little trouble looking askance, contrasting Trump’s assessment with empirical data and presenting him as, at least potentially, an unreliable narrator.

      That critical posture is not much in evidence, though, as Ben Bernanke, Timothy Geithner and Henry Paulson offer their assessment of the country’s financial crisis, the ten-year anniversary of which was marked this week. In an op-ed in the New York Times, the trio of economic decision-makers discuss how, though they “did not foresee the crisis,” they “moved aggressively to stop it,” and now we’re enjoying the effects: banks that are “financially stronger” and regulators “more attuned to system-wide risks.”
    • A “People’s Vote” on Brexit – be careful what you wish for
      When thinking about Brexit and Europe, we should remember the words of Hans Magnus Enzensberger: short term hopes are futile - long term resignation is suicidal.

      Over two years on from the vote, and now heading fast for the Brexit door, progressives are still in a mess when it comes to Europe and are in danger of turning a crisis into a terminal democratic and political catastrophe. How did we get here – and what do we need to consider before we make any future moves, in particular a second referendum?


    • Amazon's Aggressive Anti-Union Tactics Revealed in Leaked 45-Minute Video
      Amazon, the country’s second-largest employer, has so far remained immune to any attempts by U.S. workers to form a union. With rumblings of employee organization at Whole Foods—which Amazon bought for $13.7 billion last year—a 45-minute union-busting training video produced by the company was sent to Team Leaders of the grocery chain last week, according to sources with knowledge of the store’s activities. Recordings of that video, obtained by Gizmodo, provide valuable insight into the company’s thinking and tactics.




  • AstroTurf/Lobbying/Politics



    • How Effective Is Your Representative?
      Hello, and welcome back to another edition of A User’s Guide to Democracy! If you’re new here, you can check out our previous pieces on what you need to know about political advertising and our round up of the deadlines, rules, and links you need to vote in this year’s midterms.

      Today, let’s talk about who you’re actually voting for in the midterm election: members of Congress. Made up of the House of Representatives and the Senate, Congress is tasked with making laws on our behalf. Since senators keep their jobs for six years at a time, a lot of places don’t have a Senate race this year. But no matter where you live, your congressional district is voting for a House representative in this election. So today I’m going to focus on how you can keep tabs on your representative.

      [...]

      One reason for the gridlock is that, these days, bills on big, national issues are written under the supervision of the Senate majority leader and the House speaker (currently Sen. Mitch McConnell and Rep. Paul Ryan). They receive guidance from only a small group of other congressional power brokers, rather than the rank-and-file lawmakers who used to contribute to the process.




  • Censorship/Free Speech



    • Online censorship is not as bad as claimed – it’s worse

      The open letter to US Attorney General Jeff Sessions from ITIF published in USA Today on 25 September exemplified the lie that permeates America and other parts of the West. The social media censorship debate is not about right versus left as portrayed in the letter but something else entirely.

      True conservatism and liberalism died long ago and no longer exist. Today, the real fight is between freedom of expression and global corporatism.

      The censorship that is taking place on platforms such as Google, Facebook and Twitter, is the silencing and de-platforming of news and opinion sources outside of the corporate media.



    • FOSTA Provides Another Tool For Silencing People You Dislike
      For many years, we've discussed all the different ways that putting liability on intermediaries and internet platforms leads to greater censorship. The liability alone creates strong incentive to shut down speech rather than risk the potential of lawsuits and huge payments. The most obvious example of this for years has been the DMCA process, where the takedown process is quite frequently used for censorship purposes. Indeed, there are many cases where people seem to assume that they can (and should) use the DMCA to take down any content they dislike, whether or not it has anything to do with copyright at all.

      This is a big part of the reason why we were so concerned with FOSTA. While the law is officially supposed to be about "sex trafficking" and "prostitution" the bill actually does absolutely nothing to help victims or go after actual traffickers. Instead, it pins massive liability (including criminal liability) on platforms if they're used for trafficking or prostitution. Given that, it now becomes much easier to take down certain content or close certain accounts by merely suggesting that they are involved in trafficking or prostitution.

      Case in point: Engadget recently had a story talking about how PayPal (and to a lesser extent, Patreon) appeared to be cutting off the accounts of various ASMR YouTubers. Autonomous Sensory Meridian Response (ASMR) is a condition in which people who hear certain noises -- often whispering or soft scratching -- tend to experience a sort of "tingling" sensation. It's been talked about for years, and a bunch of YouTubers have built up followings making ASMR recordings. Earlier this year, we wrote about China banning some ASMR videos as "pornography." However, most ASMR videos are not sexual or pornographic in any way.
    • The Bullshit Rewriting Of History To Claim FOSTA Took Down Backpage
      I was afraid that this was going to happen. If you don't recall, the official "reason" for why we needed FOSTA (originally SESTA) was that it was necessary to "take down Backpage." In the original announcement about the bill by Senator Portman, his press release quoted 20 Senators, and 11 of them mentioned Backpage.com as the reason for the bill. Not one of them seemed to mention that Backpage had already shut down its adult section months earlier. And, over the months of debate concerning FOSTA/SESTA, we noted that there was nothing in the existing law preventing federal law enforcement officials from taking down Backpage if it were actually violating the law.

      And, indeed, before FOSTA was even signed into law, the DOJ seized the website and arrested its founders. Incredibly, even though Backpage was shut down before FOSTA was law, some of the bill's backers tried to credit the bill with taking down the site. The worst was Rep. Mimi Rogers, who directly tried to take credit for FOSTA taking down Backpage (even though FOSTA wasn't even signed into law at the time she took credit for it).


    • Ex-Google employee warns of ‘disturbing’ China plans
      A former Google employee has warned of the firm's "disturbing" plans in China, in a letter to US lawmakers.

      Jack Poulson, who had been a senior researcher at the company until resigning in August, wrote that he was fearful of Google's ambitions.

      His letter alleges Google's work on a Chinese product - codenamed Dragonfly - would aid Beijing's efforts to censor and monitor its citizens online.

      Google has said its work in China to date has been "exploratory".

      Ben Gomes, Google's head of search, told the BBC earlier this week: "Right now all we've done is some exploration, but since we don't have any plans to launch something there's nothing much I can say about it."




  • Privacy/Surveillance



    • Facebook Tells Cops Its 'Real Name' Policy Applies To Law Enforcement Too
      If history is any indication, some words will be exchanged (in letter form) and then not much else will happen. Dave Maass notes the EFF brought the DEA's use of fake profiles to the company's attention four years ago. Some letter writing ensued then, but there's nothing on the record indicating the DEA has ceased setting up fake profiles or that Facebook is proactively monitoring accounts for signs of fakery. Since neither side seems to be taking the fake profile issue seriously, fake accounts set up by law enforcement will continue to proliferate.

      On the plus side, law enforcement can no longer pretend it's unaware setting up fake profiles violates the terms of service. The company's "Information for Law Enforcement Authorities" has been updated to make it clear there's no law enforcement exception to the Facebook rules. But it's likely the use of fake profiles will continue unabated. After all, you can't catch scofflaws without breaking a few policies, right?


    • You Gave Facebook Your Number For Security. They Used It For Ads.
      Add “a phone number I never gave Facebook for targeted advertising” to the list of deceptive and invasive ways Facebook makes money off your personal information. Contrary to user expectations and Facebook representatives’ own previous statements, the company has been using contact information that users explicitly provided for security purposes—or that users never provided at all—for targeted advertising.

      A group of academic researchers from Northeastern University and Princeton University, along with Gizmodo reporters, have used real-world tests to demonstrate how Facebook’s latest deceptive practice works. They found that Facebook harvests user phone numbers for targeted advertising in two disturbing ways: two-factor authentication (2FA) phone numbers, and “shadow” contact information.
    • Vermont’s New Data Privacy Law
      Data brokers intrude on the privacy of millions of people by harvesting and monetizing their personal information without their knowledge or consent. Worse, many data brokers fail to securely store this sensitive information, predictably leading to data breaches (like Equifax) that put millions of people at risk of identity theft, stalking, and other harms for years to come.

      Earlier this year, Vermont responded with a new law that begins the process of regulating data brokers. It demonstrates the many opportunities for state legislators to take the lead in protecting data privacy. It also shows why Congress must not enact a weak data privacy law that preempts stronger state data privacy laws.


    • WhatsApp Co-founder: I “Sold My Users’ Privacy” And Helped Facebook Betray Users
      A little backstory here — Brian Acton, the co-founder of Whatsapp, sold his company to Facebook for about $22 billion, back in 2014, and turned from a “poor guy” into a multi-billionaire.

      For those who don’t know, this is the same guy who was one of the first ones to support “#delete campaign” back in March, when the whole Cambridge Analytica Fiasco was at its peak.
    • Facebook’s former Messenger boss calls WhatsApp co-founder a ‘new standard of low-class’


    • Press release: UK intelligence agency admits unlawfully spying on Privacy International

      The UK's domestic-facing intelligence agency, MI5, today admitted that it captured and read Privacy International's private data as part of its Bulk Communications Data (BCD) and Bulk Personal Datasets (BPD) programmes, which hoover up massive amounts of the public's data. In further startling legal disclosures, all three of the UK's primary intelligence agencies - GCHQ, MI5, and MI6 - also admitted that they unlawfully gathered data about Privacy International or its staff.





  • Civil Rights/Policing



    • Study Buried For Four Years Shows Crime Lab DNA Testing Is Severely Flawed
      DNA is supposed to be the gold standard of evidence. Supposedly so distinct it would be impossible to convict the wrong person, yet DNA evidence has been given far more credit than it's earned.

      Part of the problem is that it's indecipherable to laypeople. That has allowed crime lab technicians to testify to a level of certainty that's not backed by the data. Another, much larger problem is the testing itself. It searches for DNA matches in samples covered with unrelated DNA. Contamination is all but assured. In one stunning example of DNA testing's flaws, European law enforcement spent years chasing a nonexistent serial killer whose DNA was scattered across several crime scenes before coming to the realization the DNA officers kept finding belonged to the person packaging the testing swabs used by investigators.

      The reputation of DNA testing remains mostly untainted, rose-tinted by the mental imagery of white-coated techs working in spotless labs to deliver justice, surrounded by all sorts of science stuff and high-powered computers. In reality, testing methods vary greatly from crime lab to crime lab, as do the standards for declaring a match. People lose their freedom thanks to inexact science and careless handling of samples. And it happens far more frequently than anyone involved in crime lab testing would like you to believe.



    • The Soc Jus Mob Eats Everything In Its Path -- Including Its Own
      Welcome to "Shut-up-land," where nothing about anything of substance can be said; where debate is no longer permitted.



    • The 7 Senators Who Will Decide Kavanaugh’s Fate


      Much of the news coverage about the Supreme Court nomination fight has focused on Christine Blasey Ford, Brett Kavanaugh, Senate Majority Leader Mitch McConnell...


    • “The Strategy Was to Try and Do Something Really Big”: Trump Wanted to Nuke Rosenstein to Save Kavanaugh’s Bacon

      For all the morning’s madness, there may have been an underlying logic. Over the weekend, as Brett Kavanaugh’s prospects appeared increasingly imperiled, Trump faced two tactical options, both of them fraught. One was to cut Kavanaugh loose. But he was also looking for ways to dramatically shift the news cycle away from his embattled Supreme Court nominee. According to a source briefed on Trump’s thinking, Trump decided that firing Rosenstein would knock Kavanaugh out of the news, potentially saving his nomination and Republicans’ chances for keeping the Senate. “The strategy was to try and do something really big,” the source said. The leak about Rosenstein’s resignation could have been the result, and it certainly had the desired effect of driving Kavanaugh out of the news for a few hours.



    • The Government Dropped the Ball on U.S. Torture Accountability. Citizens Picked It Up.
      A new report shows the North Carolina government’s complicity with the CIA torture program and urges a state investigation.

      Sheer stubbornness is required of us when our government violates the law and refuses to recognize it.

      Seeking justice for the U.S. torture program of the post-9/11 period has required a lot of stubbornness. In North Carolina, a 12-year quest has led to a new report, “Torture Flights: North Carolina’s Role in the CIA Rendition and Torture Program.”

      The report was released Thursday by the nongovernmental North Carolina Commission of Inquiry on Torture, a blue-ribbon panel of 10 commissioners established in 2017 after years of official inaction.

      It examines the part that our state played in the CIA rendition, detention, and interrogation (RDI) program. To write it, the commission gathered all available evidence, sought public records from North Carolina government agencies, and heard testimony from torture survivors, former government officials, and legal, medical, and human rights experts.

      After 9/11, the CIA created a global “gulag” of secret “black site” prisons where it systematically and secretly tortured. It also relied on foreign governments to torture prisoners.


    • FBI's Latest Crime Stats Continue To Undermine AG Sessions' Criminal Apocalypse Fantasies
      Crime rates continue to remain at historic lows. We're safer than we've been since the mid-1960s. We should be celebrating this. Law enforcement should be celebrating this. But there's no celebration. Certainly not at the federal level. Attorney General Jeff Sessions has made remarks at a number of law enforcement events in recent months. And they've all been loaded with doom, gloom, and questionable citations.

      [...]

      The messages AG Sessions delivers won't change. As the head of the DOJ, he has something to sell. It isn't justice, despite the name over the door. It's prosecution, which is only part of the justice equation. All crime news is bad news, even as crime rates continue to decline. Welcome to America, where the crime rates are at historic lows but everyone thinks each successive year is the worst it's ever been.




  • Right to Repair

    • A 17-year-old is leading Michigan's Right to Repair movement

      The change prompted Raghavendran to branch out into politics and advocacy: he's joined with Environment Michigan and US PIRG to advocate for a Right to Repair bill (previously) in Michigan. Raghavendran meets with state lawmakers and has circulated a petition and compiled personal stories about the need to protect independent repair.

      Repair services account for 4% of US GDP, and they create community jobs that let neighbors help each other get more use out of their own property, while diverting electronics from landfills.



    • This 17-Year-Old Has Become Michigan's Leading Right to Repair Advocate

      When Surya Raghavendran dropped his iPhone, he learned to repair it himself. Now he wants to protect that right for everyone in his home state of Michigan.





  • Intellectual Monopolies



    • WIPO General Assemblies Mid-Week Notebook: Heating Up
      After two days of general statements, World Intellectual Property Organization delegates delved into more substantial subjects, and convened in small closed informal discussions to try to solve issues left open during the year. Among them is the composition of WIPO Coordination Committee and Program and Budget Committee, both WIPO governing bodies. Others include potential treaties on harmonising international applications by industrial designs creators, and on the protection of broadcasting organisations against signal theft.


    • Copyrights



      • Illuminati Kodi Repository Throws in the Towel After ACE Threats

        The Alliance for Creativity and Entertainment (ACE), the global anti-piracy coalition that counts the major Hollywood studios, Netflix, Amazon, and the BBC among its 30 members, has claimed yet another scalp. The Illuminati Kodi addon repository says that its entire team got hit with ACE letters yesterday so they have shut down with immediate effect.



      • Famous Protest Art Group In Bulgaria Paint Their Feelings About New EU Copyright Law On Gutenberg Statue


        The brave new path to a gatekeeper-manned, non-open internet the EU recently cut with its plainly atrocious new copyright directive was, were you to believe the general media coverage, cheered on by EU artists as a blow to Google and a boon to art because... well, nobody can actually explain that last part. And that's likely because the proposed new legislation, Article 11 and Article 13, essentially forces internet platforms to play total copyright cops or be liable for infringement while gutting the fair use type allowances that had previously been in place. Much of the European legislation that existed on the national level, and which served as the basis for this continental legislation, has done absolutely zero to provide artists or journalists any additional income. Instead, it's re-entrenched legacy gatekeepers and essentially created a legal prohibition on innovation. As the directive goes through its final stages for adoption by EU member states, the general coverage has repeated the line that artists and creators are cheering this on.

        But, despite the media coverage, it isn't true that all of the artistic world is blind to exactly what was just done to the internet and the wider culture. Destructive Creation -- a collection of artists most famous for taking a monument in Europe to Soviet soldiers and painting them all as western superheroes and cultural icons -- has made its latest work an addition to a statue of Johannes Gutenberg.


      • Protest Song Of The Week: ‘John Brown’ By Marc Ribot Featuring Fay Victor
        Marc Ribot is a guitarist, who has released 25 albums that span more than 40 years. His work fuses genres from soul to punk to jazz to roots music.

        With his latest project, “Songs Of Resistance 1942-2018,” Ribot attempts to connect current resistance against President Donald Trump’s administration to musical traditions of protest.

        The album was released on September 14. It reworks songs popularized by the civil rights movement in the United States as well as songs of the anti-fascist resistance in Italy during World War II. Several original songs are featured as well.
      • Rimini v. Oracle
        The Supreme Court has granted a writ of certiorari in the copyright case Rimini Street Inc. v. Oracle USA Inc. following a Ninth Circuit decision in the case. See Oracle USA, Inc. v. Rimini St., Inc., 879 F.3d 948 (9th Cir. 2018). In the case, the district court sided with Oracle in its copyright suit against the DB service provider Rimini and awarded $50 million in damages, plus an additional $70 million in interest, costs, and fees. The Supreme Court case here focuses on the meaning of “full costs” as used in the Copyright Act: “In any civil action under this title, the court in its discretion may allow the recovery of full costs by or against any party. . . the court may also award a reasonable attorney’s fee to the prevailing party as part of the costs.” 17 U.S.C. €§ 505.
      • US Supreme Court takes on “full costs” copyright case
        The question in Rimini Street v Oracle is whether the Copyright Act's allowance of "full costs" to a prevailing party is limited to taxable costs or also authorises non-taxable costs
      • ESPN Has Finally Realized This Whole Streaming Thing Has Legs
        ESPN has personified the cable and broadcast industry's tone deafness to cord cutting and TV market evolution. Executives not only spent years downplaying the trend as something only poor people do, it sued companies that attempted to offer consumers greater flexibility in how video content was consumed. ESPN execs clearly believed cord cutting was little more than a fad that would simply stop once Millennials started procreating, and ignored surveys showing how 56% of consumers would ditch ESPN in a heartbeat if it meant saving the $8 per month subscribers pay for the channel.

        As the data began to indicate the cord cutting trend was very real, ESPN's first impulse was often to try and shoot the messenger. Meanwhile, execs doubled down on bloated sports licensing deals and SportsCenter set redesigns, pretty clearly unaware that the entire TV landscape was shifting beneath their feet.

        By the time ESPN had lost 10 million viewers in just a few years, the company was busy pretending they saw cord cutting coming all the while. ESPN subsequently decided the only solution was to fire hundreds of longstanding sports journalists and support personnel, but not the executives like John Skipper (since resigned for other reasons) whose myopia made ESPN's problems that much worse.
      • Paris tribunal guts Twitter’s T&Cs… including the copyright clause for user-generated content
        Have you ever found yourself clicking-- ‘Yes I agree to these terms & conditions’, without actually reading them? Probably yes [everyone does it…even lawyers]. Did that include your registration with Twitter? If so, you may not have realized that you agreed to a licence allowing Twitter (and its partners) to use at will any of the copyright-protected content you created and uploaded on their site. But not to worry, the Paris Tribunal, in a 236-page-long decision, "righted wrongs" last month by going over Twitter’s terms and conditions with a [very] fine-tooth coomb (see for the decision in French language: Tribunal de Grande Instance, Décision du 07 août 2018, 1/4 social N€° RG 14/07300). The tribunal’s review declared ‘null and void’ most of the clauses challenged by the claimant, including the contract’s copyright licensing provisions for user-generated content.

        Users are consumers, Twitter is not ‘free’

        The case was brought before the Paris Tribunal by the French Consumers’ Association-- ‘Union Fédérale des Consommateurs - QUE CHOISIR’ (UFC), on behalf of the (claimed) collective interest of Twitter’s users. This type of legal action is the closest thing to a class action that exists in France. In this case, UFC’s eligibility to act on behalf of Twitter’s users relied on Article L 621 of the French Consumer Law Code, on the basis of which Twitter users were deemed consumers.


      • BitTorrent Traffic is Not Dead, It’s Making a Comeback

        File-sharing traffic, BitTorrent in particular, is making a comeback. New data from Sandvine, shared exclusively with TorrentFreak, reveals that BitTorrent is still a dominant source of upstream traffic worldwide. According to Sandvine, increased fragmentation in the legal streaming market may play a role in this resurgence.



      • Want the platforms to police bad speech and fake news? The copyright wars want a word with you.

        There are lots of calls for the platforms to police the bad speech on their platform -- disinformation and fake news; hate speech and harassment, extremist content and so on -- and while that would represent a major shift in how Big Tech relates to the materials generated and shared by its users, it's not without precedent.







Recent Techrights' Posts

Techrights' Statement on Code of Censorship (CoC) and Kent Overstreet: This Was the Real Purpose of Censorship Agreements All Along
Bombing people is OK (if you sponsor the key organisations), opposing bombings is not (a CoC in a nutshell)
[Meme] The Most Liberal Company
"Insurrection? What insurrection?"
apple.com Traffic Down Over 7%, Says One Spyware Firm; Apple's Liabilities Increased Over 6% to $308,030,000,000
Apple is also about 120 billion dollars in debt
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, November 23, 2024
IRC logs for Saturday, November 23, 2024
[Meme] GAFAMfox
Mozilla Firefox in a state of extreme distress
Google Can Kill Mozilla Any Time It Wants
That gives Google far too much power over its rival... There are already many sites that refuse to work with Firefox or explicitly say Firefox isn't supported
Free (as in Freedom) Software Helps Tackle the Software Liability Issue, It Lets Users Exercise Greater Control Over Programs
Microsofters have been trying to ban or exclude Free software
In the US, Patent Laws Are Up for Sale
This problem is a lot bigger than just patents
ESET Finds Rootkits, Does Not Explain How They Get Installed, Media Says It Means "Previously Unknown Linux Backdoors" (Useful Distraction From CALEA and CALEA2)
FUD watch
Techdirt Loses Its Objectivity in Pursuit of Money
The more concerning aspects are coverage of GAFAM and Microsoft in particular
Links 23/11/2024: Press Sold to Vultures, New LLM Blunders
Links for the day
Links 23/11/2024: "Relationship with Oneself" and Yretek.com is Back
Links for the day
Links 23/11/2024: "Real World" Cracked and UK Online Safety Act is Law
Links for the day
Links 23/11/2024: Celebrating Proprietary Bluesky (False Choice, Same Issues) and Software Patents Squashed
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, November 22, 2024
IRC logs for Friday, November 22, 2024
Gemini Links 23/11/2024: 150 Day Streak in Duolingo and ICBMs
Links for the day
Links 22/11/2024: Dynamic Pricing Practice and Monopoly Abuses
Links for the day
Topics We Lacked Time to Cover
Due to a Microsoft event (an annual malware fest for lobbying and marketing purposes) there was also a lot of Microsoft propaganda
Microsofters Try to Defund the Free Software Foundation (by Attacking Its Founder This Week) and They Tell People to Instead Give Money to Microsoft Front Groups
Microsoft people try to outspend their critics and harass them
[Meme] EPO for the Kids' Future (or Lack of It)
Patents can last two decades and grow with (or catch up with) the kids
EPO Education: Workers Resort to Legal Actions (Many Cases) Against the Administration
At the moment the casualties of EPO corruption include the EPO's own staff
Gemini Links 22/11/2024: ChromeOS, Search Engines, Regular Expressions
Links for the day
This Month is the 11th Month of This Year With Mass Layoffs at Microsoft (So Far It's Happening Every Month This Year, More Announced Hours Ago)
Now they even admit it
Links 22/11/2024: Software Patents Squashed, Russia Starts Using ICBMs
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, November 21, 2024
IRC logs for Thursday, November 21, 2024