EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

12.19.18

Links 19/12/2018: VirtualBox 6.0, RawTherapee 5.5, Mir 1.1.0, LibreOffice 6.1.4 Released

Posted in News Roundup at 5:45 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Events

    • Event Report: g0v Summit 2018 — Taipei

      Gov zero summit is a decentralized, grass-roots civic tech community based in Taiwan. Built on the spirits of open source and activism, g0v aims to use technology in the interest of the public good, advocate information transparency and build tech solutions to promote civic engagement. I was lucky my talk got selected and got an opportunity to speak at the event.

  • Web Browsers

    • Mozilla

      • BBN challenge resolution: Getting the flag from a browser extension

        My so far last BugBountyNotes challenge is called Can you get the flag from this browser extension?. Unlike the previous one, this isn’t about exploiting logical errors but the more straightforward Remote Code Execution. The goal is running your code in the context of the extension’s background page in order to extract the flag variable stored there.

        If you haven’t looked at this challenge yet, feel free to stop reading at this point and go try it out. Mind you, this one is hard and only two people managed to solve it so far. Note also that I won’t look at any answers submitted at this point any more. Of course, you can also participate in any of the ongoing challenges as well.

  • LibreOffice

    • LibreOffice 6.1.4 Office Suite Released with More Than 125 Bug Fixes, Update Now

      LibreOffice 6.1.4 comes one and a half months after version 6.1.3 with yet another layer of bug fixes across all the components of the office suite, including Writer, Calc, Draw, Impress, Base, and Math. However, it remains the choice of bleeding-edge users and early adopters until the LibreOffice 6.1 series matures enough to be offered to enterprises. A total of 126 changes are included, as detailed here and here.

    • LibreOffice 6.1.4 announced

      The Document Foundation announces LibreOffice 6.1.4, the 4th minor release of the LibreOffice 6.1 family, targeted at tech savvy individuals: early adopters, technology enthusiasts and power users.

  • Openness/Sharing/Collaboration

    • Open Hardware/Modding

      • MIPS Processor ISA To Be Open-Sourced In 2019

        Months after MIPS Technologies was acquired by Wave Computing, the company announced it’s working on open-sourcing the MIPS processor instruction set architecture.

        The MIPS ISA will be open-sourced with both the 32-bit and 64-bit versions opening up and will be free of any licensing or royalty fees as well as access to existing MIPS patents.

  • Programming/Development

Leftovers

  • Security

    • How Shopify Avoided a Data Breach, Thanks to a Bug Bounty

      At KubeCon + CloudNativeCon NA 2018, Shopify and Google detail a Kubernetes security incident reported by a bug bounty security researcher that was quickly remediated before any harm was done.

    • Logitech Options App Plagued By PID Exploit, Security Vulnerability Fixed With New Update

      Logitech Options is an app that controls all of Logitech’s mice and keyboards. It offers several different configurations like Changing function key shortcuts, Customizing mouse buttons, Adjusting point and scroll behavior and etc. This app contained a huge security flaw that was discovered by Tavis Ormandy who is a Google security researcher. It was found that Logitech Options was opening a WebSocket server on each individual computer Logitech Options was run on. This WebSocket server would open on port 10134 on which any website could connect and send several various commands which would be JSON-encoded.

    • pwnedkeys: who has the keys to *your* kingdom?

      I am extremely pleased to announce the public release of pwnedkeys.com – a database of compromised asymmetric encryption keys. I hope this will become the go-to resource for anyone interested in avoiding the re-use of known-insecure keys. If you have a need, or a desire, to check whether a key you’re using, or being asked to accept, is potentially in the hands of an adversary, I would encourage you to take a look.

    • “123456” Tops The List Of Worst Passwords For 5th Consecutive Year
  • Defence/Aggression

    • Peoples Vote in Danger of Becoming War Criminal Rehabilitation

      Regular readers know I have largely steered clear of discussing Brexit for the three years its possibility then prospect has dominated the UK political agenda. I used to be enthusiastically pro-EU, as part of my general outlook of supporting international law and organisations. I was however shocked, deeply, by the enthusiastic support of all three institutional strands – council, commission and parliament – for the appalling Francoist paramilitary violence in Catalonia, and decided that the EU is no longer an institution I can support.

      The increasingly illiberal developments of the EU’s Third Pillar – including the abuse of arrest warrant procedure against Julian Assange and the internationalising of “Prevent” style Islamophobia – had already increasingly been worrying me. My reservations about the EU are therefore different to those of many. I particularly bemoan the loss of Freedom of Movement which I believe to have been one of the greatest achievements of civilisation in my lifetime. I remain incensed at the success of the elite in conning the deprived that their poverty is caused by immigrants, whereas it is caused by massive inequality of wealth.

      So I am conflicted on Brexit, but on balance would prefer to leave but stay part of the single market, thus retaining freedom of movement. My personal preferences aside, there is plainly a huge majority against leaving the EU in Scotland, so for Scotland to leave the EU at all at present would be wrong. It is my profound hope that the SNP will find the courage shortly to move on towards Independence.

    • No One’s Asking the Right Questions About Police Drones

      Police drones are expanding, but are the media asking questions?

      The NYPD, the nation’s largest police force, announced this week that they had purchased over a dozen flying robots to fly over Gotham, while promising that the new technology wouldn’t be used for any of the illegal spying shenanigans the police department has been caught up in time and time again. The announcement, however, was awkwardly timed, as the police department had already purchased drones—last December.

      Instead of asking the kinds of questions one might expect for a scandal-plagued agency obtaining expansive new surveillance powers—Why did you wait a year to announce the move? Was the public consulted? Are there oversight mechanisms to guard against misuse?—most media outlets questioned nothing, quoted generously from police officials and (at best) sprinkled in few concerns from legal organizations.

    • He Said He’d Be Murdered If Deported. He Was.

      Nearly a year after a judge rejected Santos Chirino’s case for asylum, his 18-year-old daughter and 19-year-old son returned to the very same courtroom to plead their own.

      “Your honor, this is a difficult case,” their father’s lawyer, Benjamin Osorio, told Judge John Bryant. “I represented their father, Santos Chirino Cruz. … I lost the case in this courtroom. … He was murdered in April.”

      As Maria Sacchetti described for The Washington Post, “Osorio paused, and the judge blanched and stammered.”

      “You said their father’s case — did I understand I heard [it]?” Bryant asked, eyes wide.

      “No,” Osorio said. “In this court. Not before your honor.”

      “Well good, because — all right, my blood pressure can go down now,” Bryant said. “Yeah. I mean. Okay.”

  • Transparency/Investigative Reporting

    • Everyone hates Julian Assange, except for when you used to love him

      It’s not hard to find people in Washington with strong opinions about Wikileaks and its founder, Julian Assange. But good luck finding someone with an opinion about Assange that hasn’t flipped 180 degrees (and maybe back again) over the past ten years.
      Assange has managed the rare feat of becoming a pariah to both the left and the right, politicians and the press, “the masses” and their elected leaders. Foreign and domestic, coastal and “flyover,” red and blue—everyone seems to hate Assange (except for that time when they used to love him).
      As a result, Assange has become a poster boy for the importance of First Amendment protections. At its core, the First Amendment is an expression of “anti-majoritarian” rights—it is meant to protect social pariahs from persecution by political majorities. Popular people and popular ideas generally don’t need constitutional protection. Haters and lunatics and radicals? Their speech needs protection for the very reason that strong majorities reject it—it is so far outside the norm that ordinary politics will almost certainly persecute it.

    • Roger Stone says he pushed false statements on Infowars
    • Twenty-One Thoughts On The Persecution Of Julian Assange

      1. I write a lot about the plight of Julian Assange for the same reason I write a lot about the Iraq invasion: his persecution, when sincerely examined, exposes undeniable proof that we are ruled by a transnational power establishment which is immoral and dishonest to its core.

      2. Assange started a leak outlet on the premise that corrupt and unaccountable power is a problem in our world, and that the problem can be fought with the light of truth. Corrupt and unaccountable power has responded by detaining, silencing and smearing him. The persecution of Assange has proved his thesis about the world absolutely correct.

      3. Anyone who offends the US-centralized empire will find themselves subject to a trial by media, and the media are owned by the same plutocratic class which owns the empire. To believe what mass media news outlets tell you about those who stand up to imperial power is to ignore reality.

      4. Corrupt and unaccountable power uses its political and media influence to smear Assange because, as far as the interests of corrupt and unaccountable power are concerned, killing his reputation is as good as killing him. If everyone can be paced into viewing him with hatred and revulsion, they’ll be far less likely to take WikiLeaks publications seriously, and they’ll be far more likely to consent to Assange’s silencing and imprisonment. Someone can be speaking 100 percent truth to you, but if you’re suspicious of him you won’t believe anything he’s saying. If they can manufacture that suspicion with total or near-total credence, then as far as our rulers are concerned it’s as good as putting a bullet in his head.

  • Privacy/Surveillance

    • PSA: Fake App Store Receipts Are Tricking People Into Providing All Their Personal Details

      A fascinating new phishing attempt it making the rounds disguising itself as a receipt from the App Store, tricking unsuspecting users into coughing up all of their personal details. Here’s what you need to know and how to stay safe.

    • At The CIA, A Fix To Communications System That Left Trail Of Dead Agents Remains Elusive

      Between around 2009 and 2013, the CIA’s online method of communicating with its human sources on the ground all over the world was tragically compromised — leading to the exfiltration, imprisonment or death of dozens of people spying for the agency, according to a November investigation by Yahoo News.

      The failure started when Iranian officials used a double agent to trace back a series of websites the CIA was using to communicate with its sources. Iran then located, detained and in some instances executed CIA sources it identified using this system. The problem then spread to China, where roughly 30 CIA sources were eventually executed. Once Iran and China were able to locate users of these covert CIA platforms in their own countries, sources told Yahoo News, they were very likely able to discover a large number of CIA sources using similar systems worldwide.

      But the fallout from that disaster, including internal battles at the CIA and struggles to replace and fix a complex web of interlocking technical systems, continues to rage on to this day, according to five former intelligence community sources familiar with the matter.

  • Civil Rights/Policing

    • No State Accountability for North Carolina Contractor Who Helped CIA Torture

      On December 9, 2014, the Senate Intelligence Committee released a 500-page executive summary of its 6,000-page report on the history of the CIA’s detention and interrogation program. The report exposed just how brutal and ineffective the torture was, and the lengths to which the CIA went to hide that truth from the public.

      Four years have passed since the report was released—yet only three copies of the full report exist outside Senate Intelligence Committee’s vault, and what is available for public scrutiny is less than 10 percent of the report. The Committee voted only to release a heavily redacted executive summary and, since then, the CIA and its allies in Congress have sought to limit who has access to the report and who can read it in its entirety. The U.S. public, in other words, is still in the dark when it comes to this crucial chapter of its own recent history.

      To be sure, the ACLU has been doing heroic work filing Freedom of Information Act requests. And citizen-led groups—like my own organization, the North Carolina Commission of Inquiry on Torture—work hard to use what’s available in the public record to piece together details on the CIA’s rendition, detention, and interrogation program and inform the public. Nonetheless, the vast majority of what the Senate Intelligence Committee discovered in their investigation remains shielded from public inquiry.

    • CIA created ‘remote controlled dogs’ using brain surgery in secret experiments

      America’s Central Intelligence Agency conducted grisly experiments to create ‘remote controlled dogs’, with electrodes planted in their brains to ‘receive orders’.

    • GEORGE H.W. BUSH (1924-2018), AMERICAN WAR CRIMINAL

      THE UNITED STATES is now in the midst of a grotesque canonization of one of its imperial saints, George Herbert Walker Bush. This week on Intercepted: an honest memorial service for an unrepentant warmonger who dedicated his life to militarism, war, coups, regime change, and the lies of “American exceptionalism.” Jeremy Scahill details the crimes of Bush, the sick propaganda of the corporate media memorials, and the trail of blood, death, and tears Bush leaves behind. Independent journalist Arun Gupta covers decades of Bush, from his time at the helm of the CIA to the presidency. Gupta discusses Bush’s support for Manuel Noriega and his eventual invasion of Panama, the pardoning of Iran-Contra criminals, the dirty wars in Central America, the support for Saddam Hussein, and the launch of the Gulf War. Acclaimed Iraqi poet and scholar Sinan Antoon describes his life under the U.S.-backed dictatorship of Saddam, the horrors of the Gulf War, and how Bush’s destruction of Iraqi civilian society led to the rise of ISIS.

    • George H.W. Bush, the CIA and a Case of State-Sponsored Terrorism

      In early fall of 1976, after a Chilean government assassin had killed a Chilean dissident and an American woman with a car bomb in Washington, D.C., George H.W. Bush’s CIA leaked a false report clearing Chile’s military dictatorship and pointing the FBI in the wrong direction.

      The bogus CIA assessment, spread through Newsweek magazine and other U.S. media outlets, was planted despite CIA’s now admitted awareness at the time that Chile was participating in Operation Condor, a cross-border campaign targeting political dissidents, and the CIA’s own suspicions that the Chilean junta was behind the terrorist bombing in Washington.

      In a 21-page report to Congress on Sept. 18, 2000, the CIA officially acknowledged for the first time that the mastermind of the terrorist attack, Chilean intelligence chief Manuel Contreras, was a paid asset of the CIA.

      The CIA report was issued almost 24 years to the day after the murders of former Chilean diplomat Orlando Letelier and American co-worker Ronni Moffitt, who died on Sept. 21, 1976, when a remote-controlled bomb ripped apart Letelier’s car as they drove down Massachusetts Avenue, a stately section of Washington known as Embassy Row.

    • CIA used mind control experiments on dogs and humans during the 1960s
    • CIA once secretly implanted mind-control devices in dogs’ brains

      The CIA created remote-controlled dogs by operating on their brains during a bizarre mind-control experiment, according to freshly declassified documents.

      During the top-secret 1963 project, researchers implanted a device inside six canines’ skulls and guided them through an open field, according to documents posted on The Black Vault, a website specializing in declassified government records.

    • Trailer for ‘Drugs as Weapons Against Us’ Doc About CIA’s Experiments

      “Much of it remains classified for ‘national security’ reasons.” Gravitas Ventures has released a trailer for an indie documentary titled Drugs as Weapons Against Us, made by first-time filmmaker John Potash. The full title is actually Drugs as Weapons Against Us: The CIA War on Musicians and Activists, and it’s an examination of the CIA’s nefarious past when they manipulated musicians & activists to promote drugs for social control, particularly with the Civil Rights and anti-war movements. Some musicians that resisted these manipulations were killed. We’ve all heard these stories, and while some of it is true, some of it seems like they are drifting into conspiracy theory territory. Based on Potash’s book “Drugs as Weapons Against Us”, the film looks at evidence that the CIA targeted SDS, Black Panthers, Hendrix, Lennon, Cobain, Tupac, and other leftists. The footage in this trailer isn’t that impressive, I wish it looked better than it does.

  • Intellectual Monopolies

    • Patent case: Sprint Communications Co., L.P. v. Time Warner Cable, Inc., USA

      The U.S. Court of Appeals for the Federal Circuit has affirmed a $139.8 million jury verdict in favor of Sprint Communications against Time Warner for infringement of five Sprint patents related to VoIP technology. The appeals court concluded that the district properly admitted evidence relating to the jury verdict in an earlier, related case brought by Sprint against Vonage, another carrier offering VoIP service.

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

What Else is New


  1. Embrace, Extend, Extinguish 2020 Edition

    Embrace, Extend, Extinguish (E.E.E.) is alive and well, but the corrupt (paid by Microsoft) media isn't talking about it anymore; in fact, it actively cheers and encourages people/companies to enter the trap



  2. Links 26/5/2020: SHIFT13mi GNU/Linux Tablet, Linux Kodachi 7.0 and Some Qt Releases

    Links for the day



  3. EPO Propaganda on Steroids (or on EPO)

    What EPO management is saying and what is actually happening



  4. Breton (EU) 'Joins' Team UPC to Help His Buddy Battistelli... Again

    As expected, Breton acts as little but an EPO tool, looking to prop up supremacy of patent litigation over science and innovation



  5. Removing Free/Libre Software as an Inadequate Response to Microsoft Windows (With Back Doors) Getting Compromised, Killing People

    GNU/Linux takes the blame (in a sense) for incidents that are purely the fault of Microsoft and its deficient software with deliberate back doors; it's believed that this boils down to opportunistic retaliation against those looking for a solution to the problem (or merely speaking about the problem)



  6. IRC Proceedings: Monday, May 25, 2020

    IRC logs for Monday, May 25, 2020



  7. Under Distributed Denial of Service Attacks Lately, But We're Too Robust For Those

    Efforts to take Techrights offline have been ramped up lately; but it's not working and it hardly even distracts us from publishing



  8. The Art of Giving: Why Free Software Will Inevitably Survive Attacks Against It

    Societies that share and look after their peers/neighbours will always be better off than predatory societies, which breed exploitation, distrust, discord and eventually systemic collapse



  9. 'Journalism' in 2020: Far More Articles About What Computer Linus Torvalds Bought Than About Linux Releases

    Yesterday's (or late Sunday's) Linux announcement (RC7) is symptomatic of a broader issue we've long spoken about; it restricts people's ability to express an opinion, which can cloud any meritorious and substantial debate about technical matters journalists cannot grasp or comment on (it takes more effort and research)



  10. Links 25/5/2020: Wrapland Redone, DebConf20 Plans, Many More Games

    Links for the day



  11. Media Covers WSL Like People Actually Use This Trash (a Failed Distro Which Only Works With Windows)

    Lots of abundantly redundant puff pieces have appeared in paid-for (by Microsoft) media this past week covering WSL/2, but that's grossly disproportional to the people who care and actually use those types of things (because money talks, not technical substance)



  12. Working From Home on Patent Monopolies Would Lower Their Quality and Perceived Legitimacy

    The patent system wherein people grant monopolies from their sofas and bedrooms isn't helping the already-eroded perception/image of patent offices that mostly grant patents to massive multinationals (and far too many patents overall)



  13. The Attitude of António Campinos Toward Courts and Toward Justice Same as Benoît Battistelli's

    6 years down the road we're still dealing with unaccountable tyrants who laugh at the law, laugh at lawmakers and disregard law enforcers (like the Trump regime across the Atlantic)



  14. IRC Proceedings: Sunday, May 24, 2020

    IRC logs for Sunday, May 24, 2020



  15. Asking Microsoft If It Loves Linux is Like Asking Google If It's Evil

    The media keeps bombarding us with lousy, weakly-sourced messages about Microsoft regretting its stance on “Open Source” and loving “Linux” (both are lies that are very easily debunked), so journalism has an existential problem and maybe too much dependence on ad money (a form of bribery) from “Big Tech” that does “clown computing” and “apps”



  16. Features Considered Harmful

    "But the benefits of Free software, free candy and new features are all meaningless, if the user isn't in control."



  17. Free, as in “App”

    "As everyday users, we need to be able to configure our applications, and this process must/needs to be made as easy and understandable as possible."



  18. Links 25/5/2020: Linux 5.7 RC7 and TeleIRC 2.0.0

    Links for the day



  19. Links 24/5/2020: TUXEDO Computers on AMD, Ardour 6.0 is Out

    Links for the day



  20. Trust Microsoft With Everything Including Your Life

    A timely if not apt meme about the state of Windows-powered hospitals, which very often end up foreign-operated (taken over by crackers in another country)



  21. When the Response to Hospitals Being Systematically Cracked Through Microsoft Products Like Windows is... Blocking the Competition of Microsoft

    People keep dying because Microsoft Windows, poorly designed with NSA back doors in it, falls into the hands of malicious actors (sometimes overseas, sometimes using leaked tools of the NSA itself) and guess who takes the blame when hospitals grind to a halt due to this…



  22. IRC Proceedings: Saturday, May 23, 2020

    IRC logs for Saturday, May 23, 2020



  23. Ode to the 'Orange One'

    Bush Senior and Junior, Hillary/Bill Clinton and now António Battistelli (or Benoît Campinos); are we dealing with monarchies/monarchs and pledges of allegiance or with public institutions beholden to the public, to be governed by the law?



  24. Home Working at the EPO: Your Corporate, Global Monopolies Will Be Rubber-stamped From Private Homes

    We’re expected to believe that EPO employees working under the noses of Microsoft (in another continent!) with kids running around will be able to be both productive and professional; staff already complains about working until midnight and beyond, without any conceivable separation between career and personal life



  25. To Understand Why “Inner Source” is a Cheap Corporate Ploy if Not a Free Software-Hostile 'Scam' Look Who's Behind It

    It's rather easy to see that the O'Reilly-connected and Bill Gates-connected leadership of InnerSource Commons (ISC) doesn't register this fake 'charity' to promote Software Freedom but to fight against it under the guise of "open" (openwashing)



  26. Microsoft: We Were Wrong About Open Source and That's Why We 'Liberate' Code... From 1983 (and We Won't Accept Code Changes, Either!)

    The tiresome openwashing efforts from Microsoft verge on the farcical, but the Microsoft-funded media plays along with it all regardless



  27. The Unitary Patent and Unified Patent Court Book

    The Unified Patent Court (UPC) propaganda must be confronted; there's a book in the making about UPC lies and the anatomy of this legislative coup attempt by litigation fanatics (who profit from monopolies, patent trolls and so on)



  28. Links 23/5/2020: Oracle Solaris 11.4 SRU21, Wine-Staging 5.9

    Links for the day



  29. Spillover: Team UPC Trying to Fill Up the Cup 'Half Empty'

    The European Patent Office's (EPO) corruption is mirrored in UPC corruption; the former hasn't yet seen its downfall due to this corruption and the latter is already up in flames, no matter how media sites (are paid to) spin it, giving false hope for the sake of lobbying by Team UPC



  30. The EPO Continues to Publicly Brag About Granting Illegal Patents to Fake 'Production' (It's Not Really Production But Abuse of the Granting Authority)

    Patents on life, nature and mathematics serve to highlight the degree of corruption embraced by EPO management, eager to fake ‘production’ in order to hoard money, which is then stolen and misused in other ways


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts