This past weekend, Elon Musk-led private space company SpaceX made history by launching a pair of NASA astronauts into orbit, an accomplishment that could upset the balance of the international space industry.
 In this series, we look at a range of home activities where Linux can make the most of our time at home, keeping active and engaged. The change of lifestyle enforced by Covid-19 is an opportunity to expand our horizons, and spend more time on activities we have neglected in the past.
We’ve seen welcome relief in the past few weeks in European countries, with marked declines in Covid-19 associated deaths. Sadly, the pandemic is rampant in many countries including Mexico, USA, Brazil, and India.
Given that working from home is likely to remain popular, it’s essential we strike a balance. When working from home, it’s very easy to lose track of time. It’s important to take regular breaks. Playing video games offers one avenue. There are many benefits of playing video games. Examples include improved coordination, problem-solving skills, it improves attention and concentration, and much more.
Following the news that it will soon offer Linux laptops, Lenovo has now announced that it will also be bringing Ubuntu and Red Hat Linux to its full workstation portfolio.
Many Linux users prefer to customize their own machines by configuring and installing Linux distros themselves but this can raise uncertainty when it comes to system stability, restricted performance compatibility, end-user productivity and even IT support for devices.
Now though, demand has increased for an out-of-the-box solution that removes the barrier for deployment of enterprise-grade hardware within a Linux software ecosystem which is why Lenovo has decided to bring Linux to its workstations.
PC giant Lenovo is bringing serious support to Linux...big support. The entire line of Lenovo workstations (minus the IdeaPad) will now be fully certified to work with Linux. That’s not all. Lenovo will also start selling the entire line of ThinkStation PCs and ThinkPad P series laptops with either Ubuntu LTS or Red Hat Enterprise Linux pre-installed.
Lenovo will also include full web support and dedicated Linux forums into the mix.
For many, within the Linux community, this could be the biggest piece of news to develop for the open source operating system. Lenovo adding their support behind Linux not only gives consumers far more options for Linux hardware, it could easily help companies to realize the open source operating system is a viable option for the desktop. And with Lenovo also adding their drivers into the upstream kernel, all of their hardware will work with Linux, out of the box. No more tweaking or compiling to get features like Wi-Fi, sound, and fingerprint readers to work.
2020 has done everything it can to rob of us joy and progress. It seems there's some new bit of news that deflates all hope and sucks the wind out of our sails. But then, we get the slightest glimmer of good news and, no matter how insignificant it may seem in the grand scheme of things, we hold onto like it like it was a pot of gold at the end of every rainbow in the sky.
Such is the case when Lenovo made the announcement that they were broadening their support for desktop Linux.
Today we’re announcing the general availability of Longhorn, an enterprise-grade, cloud-native container storage solution. Longhorn directly answers the need for an enterprise-grade, vendor-neutral persistent storage solution that supports the easy development of stateful applications within Kubernetes.
We’ve been working on Longhorn for almost as long as we’ve been around as a company. We launched the project in 2017, and then in 2019, we contributed it to the Cloud Native Computing Foundation (CNCF) as a sandbox project. So it’s that CNCF open source project that is now generally available.
Earlier this year, the Kubernetes team released Kubernetes 1.18, which extended Ingress. In this blog post, we’ll walk through what’s new in the new Ingress specification, what it means for your applications, and how to upgrade to an ingress controller that supports this new specification.
Kubernetes is a popular container orchestration platform used by many professionals around the world. It’s an open-source platform that enables you to manage containerization, providing you with feature-rich controls. However, Kubernetes is not easy to learn and maintain. To properly secure Kubernetes operations, you need to adopt certain best practices.
  Kubernetes is an enterprise-grade container-orchestration system designed from the start to be cloud-native. It has grown to be the de-facto cloud container platform, continuing to expand as it has embraced new technologies, including container-native virtualization and serverless computing.
Kubernetes manages containers and more, from micro-scale at the edge to massive scale, in both public and private cloud environments. It is a perfect choice for a "private cloud at home" project, providing both robust container orchestration and the opportunity to learn about a technology in such demand and so thoroughly integrated into the cloud that its name is practically synonymous with "cloud computing."
Doc Searls and Simon Phipps talk to Kyle Rankin, Chief Security Officer and Vice President at Purism. Purism is security focussed software & hardware company that believes in building products that respect and protect individuals' privacy, security, and freedom.
Scheduling in NetBSD, ZFS vs. RAID on Ironwolf disks, OpenBSD on Microsoft Surface Go 2, FreeBSD for Linux sysadmins, FreeBSD on Lenovo T480, and more.
Based on the recently released Linux 5.7 kernel series, the GNU Linux-Libre 5.7 kernel is here to disable blob loading in the Azoteq IQS62x MFD driver, IDT 82P33xxx PTP clock driver, Marvell OcteonTX CPT driver, Mediatek MT7622 WMAC driver, MHI bus driver, and Qualcomm IPA driver.
It also introduces new blob names in the AMDGPU, Arm64 DTS files, Broadcom FMAC, m88ds3103 DVB frontend, Mediatek mt8173 VPU, Mediatek 7622 and 7663 WiFi, Meson VDec, Qualcomm Venus, Realtek Bluetooth, and Silead x86 touchscreen drivers.
Linux kernel overlord Linus Torvalds has railed against 80-character-lines as a de facto programming standard and has moved to make reminders to keep things short a thing of the past.
Torvalds weighed in on a Linux kernel clean-up post that somehow strayed into the topic of line lengths. Some advocated for the retention of 80-character lines on grounds that they're a long-standing convention and that large monitors can handle many small windows when column width is limited.
Torvalds respectfully disagreed on grounds that limiting lines to 80 characters makes for lots of line breaks.
"Excessive line breaks are BAD. They cause real and every-day problems," he wrote.
"They cause problems for things like 'grep' both in the patterns and in the output, since grep (and a lot of other very basic unix utilities) is fundamentally line-based."
David Miller on Tuesday sent in all of the networking subsystem updates for the Linux 5.8 kernel and there is a lot in store.
Among the many networking changes as usual are the following new items for Linux 5.8:
- A network cable test infrastructure has been added to the kernel and initially supported by the Marvell 1G PHY driver. This is intended for helping to figure out if a cable may be shorted, broken, not plugged in on the opposing end, or similar issues. This diagnostics support requires PHY support with some even being able to estimate how far along a cable fault may be on the wire. With Linux 5.8 this necessary infrastructure is in place but for now just the Marvell PHY driver is supported. Infrastructure is added to Ethtool and phylib for initiating such tests.
The Linux 5.8 media subsystem changes restore a previously dropped driver for supporting the cameras found on multiple generations of Intel Atom devices.
The "atomisp" driver is a big one at more than 168k lines of code and is for supporting the Intel ISP2 camera and MIPI sensors on multiple generations of Intel Atom laptops/tablets/2-in-1 type devices. But back in 2018, the atomisp driver was removed from the Linux kernel.
There is new hardware support as part of the sound subsystem updates for the in-development Linux 5.8 kernel.
AMD’s Big Navi graphics card – or at least what could be the incoming high-end GPU – has been spotted in a bunch of Linux patches that have just arrived, which further suggests that the card might be inbound for a potential October release.
  Following the initial benchmarks of the AMD Ryzen 5 4500U performance a few days ago, here is another more exhaustive look at the performance of this six-core Zen 2 mobile processor as well as that of the eight core Ryzen 7 4700U and several competing Intel CPUs in 140+ benchmarks.
Here is a fresh round of benchmarking with the Core i7 1065G7, Core i7 8565U, and Core i7 9750H up against the Ryzen 5 4500U and Ryzen 7 4700U.
The comparable Intel parts were based upon what I had available for testing... Given laptop vendors generally being less than interested in Linux benchmarks/reviews, generally I have to buy the laptops for Linux testing, thus the limited selection compared to our desktop and server benchmarking. The Ryzen 5 4500U and Ryzen 7 4700U are the only Ryzen 4000 mobile parts I have at the moment that were acquired through retail channels. The Ryzen 5 4500U is within the Lenovo Flex 5 and the Ryzen 7 4700U in the Lenovo IdeaPad 5 (14).
Today AMD and Amazon announced the general availability of 2nd Gen AMD EPYC "Rome" processors available via the Elastic Compute Cloud. AMD EPYC "Rome" on EC2 with the new "C5a" instance types offer very competitive performance against the latest Intel Xeon instance types, Amazon's own Graviton2 Arm-based instances, and a big upgrade compared to the first-generation EPYC processors in the cloud.
  In the days when Linux was a fledgling operating system, font handling was often identified as a major weakness. It was true that Linux then had problems with dealing with TrueType fonts, its font subsystem was prehistoric compared to its competitors, there was a dearth of decent fonts, difficulties in adding and configuring fonts made it almost impossible for beginners to improve matters for themselves, and jagged fonts with no anti-aliasing just added to a rather amateurish looking desktop.
Fortunately, the situation is considerably better these days, with a better quality of user interface typography. With the continuing improving FreeType font engine producing high quality output, natively supporting scalable font formats like TrueType, Linux is making great strides although there’s still some way to go. Dealing with fonts under Linux can sometimes be tricky.
Manuskript is a program designed to assist with the writing of fictional stories and non-fiction papers. It allows you to easily organize all your ideas for plots, characters, and world details, create an outline, and then let you begin writing your first drafts.
When you first launch Manuskript, you need to select which kind of project you want to create, though there isn't really that much difference between the fiction and non-fiction project types (Non-fiction projects are divided into sections rather than chapters). You can then set how many chapters you want it to have, how many scenes per chapter, and a word count goal for each scene. This can all be adjusted at a later stage from the Editor tab.
[...]
Manuskript is a great planning and organizing tool for writers, though it definitely seems to be intended more for fiction than non-fiction. I did unfortunately encounter a few bugs though, but the program is still fairly early in development. I'm not really much of a fiction writer myself, so I probably won't be using Manuskript that much, but I can definitely see how useful it could be for some writers.
Blender 2.83 was released a few days ago. It’s marked as the first LTS (Long Term Support) release with 2-year support with critical fixes.
This guide explains the steps you need to move Virtual Machine Image to Another Host Using GNOME Boxes.
Stoneshard, an Early Access turn-based and open-world RPG from Ink Stains Games that has a ridiculously huge amount of potential just had another big update.
The 0.5.9.0 "Bolt Thrower" update adds in quite a lot of extra content. It's surprising how quickly they're able to keep building it up. Ranged combat is definitely a lot more interesting now with Spears and Crossbows, and the addition of arrowhead variation. New skills to learn were added as part of this too including Dual Wielding, there's new fauna like sweet little Hedgehogs and new flora.
Two awesome things together: space and trains. I'm not going to question how that's even possible but it sounds like quite a fun little mix of strategy and puzzles.
A simple yet quite fun and absurd sounding idea. You build an interplanetary industrial rail network, while discovering new plants and assigning projects to them. When doing so, space trains will ferry everything around. There's even a research system that will give you tech that ranges from "silly to literally game-winning, sometimes both". Looking at some of the options, it's got a nice bit of comedy to it. Like "Trapped Gas Mining" which mentions "Interstellar trains aren't going to power themselves; time to start drilling. Half these planets could do with some global warming anyway.". Gave me a bit of a chuckle.
Want to jump into the latest version of OpenTTD and you're on the latest Ubuntu 20.04 LTS? Good news, they now have some official packages setup for it.
Info - OpenTTD is an open source simulation game based upon Transport Tycoon Deluxe. It attempts to mimic the original game as closely as possible while extending it with new features and accessibility enhancements. You could have installed it previously using the Snap package but considering how slow they can often be to start, and plenty of people just don't like Snaps, having proper native .deb packages setup seems like a good idea. This way they enable as many people on Ubuntu as possible to easily play OpenTTD.
Hidden Folks, a somewhat hilarious hidden-object game that's like a much more interactive 'Where's Wally?' has a huge update.
Previously, Hidden Folks had DLC for extra content but that's no longer the case. They've unified the game into a single install and one payment but as a result the price has risen. So all existing players get free content, everyone else just pays a little more for a much bigger game, fair enough. This means the Beach area with 5 themed areas is now part of the game. On top of that, yesterday they release another huge free 'On Tour' update.
Enjoy a good codewords puzzle and in need of some more? Simply Puzzles: Codewords released recently with 100 levels to tease your brain with.
There's no fluff to find here, no special shiny additions. Just an easy to grasp codewords puzzle game that has you code-crack your way through crossword-like puzzles. The developer, Simply Puzzles, mentioned to us they thought there wasn't enough "clean, simple puzzle games on Steam" with this being their first of many planned games like it.
After being available in an Early Access stage on itch.io, with a demo available in the form of Core Defense: Prelude, the full Core Defense game is now set to launch on July 31.
Core Defense is quite unlike other Tower Defense games. It doesn't have a big colourful map with only a few set tower places. Instead, it uses a blank-slate map that you build up however you want to face the various enemy waves in a more roguelike way. It's also another game to sprinkle in some card mechanics in a sort-of deck-builder way as you pick a card between waves to build up your arsenal.
xow is another fantastic bit of open source, enabling the use of an Xbox One wireless dongle on Linux to be a much nicer experience overall. Supporting what looks like most of the variations now, it's got some fun advanced features with input mapping being based on existing kernel drivers like xpad.
The latest release, xow 0.5, went up yesterday which further advances what's possible including external pairing mode activation using SIGUSR1 to communicate and there's also a new compatibility mode option to spoof Xbox 360 controllers. Why the need to spoof the gamepad name? Some games aren't built to work with or detect the Xbox One pad but they work fine with the 360 pad, this workaround enables you to use your Xbox One pad in even more games.
Let's try to answer what Love 2D is: LöVE (or Love2D) is an open source multiplatform engine for the development of 2D video games. The engine is written in C ++ and uses Lua as its scripting language. It is published under the zlib license.
The API provided by the engine provides access to the video and sound functions of the host machine through the SDL and OpenGL libraries, or, since version 0.10, also OpenGL ES 2 and 3. Fonts can be rendered using the FreeType engine. A version of the engine called piLöve was ported specifically to Raspberry Pi.
It also provides basic "sandbox" management of files to prevent access to the entire disc and system from the running games. In other words, the games in Love 2D language are sandboxed, to limit their level of access to the host machine.
LöVE is still maintained by its original developers.
This engine is often found in the compositions of video game development competitions, such as the international competition Ludum Dare.
New EA games developed for PC will also launch on Steam alongside other platforms, including the Command & Conquerâ⢠Remastered Collection which launches tomorrow, providing mod support with the Steam Workshop as this game is one of the first major RTS franchises to open source their source code under the GPL
Let’s walk down memory lane to 2013. Valve had launched Steam for Linux in 2012, and the following year, introduced their idea of console gaming with SteamOS.
It was an exciting time for Linux gaming. Gabe Newell complained of Windows 8 and its’ awful representation of being a desktop-tablet hybrid, along with their walled garden that is the Windows Store. So Valve decided to take matters into their own hands by using the power of Linux, and in so doing, created SteamOS — a Debian-based distribution that launches Steam Big Picture Mode on startup, thereby preventing the need for a mouse and keyboard.
Needless to say, I think we’re all aware that Valve’s partnership with various distributors like Dell and iBuyPower to get SteamOS on their machines — dubbed the Steam machines — had been met with a lot of skepticism and therefore launched poorly. Not only was the selection of games limited — due to the need for Steam games to be natively built for Linux in order to work with SteamOS — but console gamers reasoned, “Why should I have to pay nearly twice the money on this, when I can get a traditional console for a lot less?”
Then there was the nightmare that was installing SteamOS, for creating your own Steam machine. Ekianjo had penned his frustrations with SteamOS a few years back, and much of his thoughts I concur with — getting partitions to work along nicely, getting Wi-Fi drivers to work, outdated video drivers, a bunch of other junk I don’t need to fill you up on.
I know I’ve already offended a few die-hards out there. But there’s a huge plus to all this that I haven’t covered.
Working from home certainly has a lot of challenges but Paradox Development Studio has continued on with Crusader Kings 3 and they have another roundup of what's to come.
The latest video covers development topics across April and May, covering a multitude of topics important to all aspiring rulers. Bits covered includes more insight into religion and faith systems, heresies and doctrines, map features and modes and the list goes on. Crusader Kings 3 is shaping up to be a massive game at release, which isn't surprising since it's a grand strategy game and they likely want to avoid the issues Imperator had.
Michaà â Brzozowski, developer of long-running roguelike KeeperRL, announced the release of the Alpha 30 and it's big with some seriously fun sounding features. KeeperRL became quite popular due to the way it merges together roguelike, base-building and a mix of strategy and RPG mechanics all into one roof.
One of the biggest additions in Alpha 30 are the Gnomes, a new playable faction. They're not powerful directly in combat but they are a crafty bunch. You can make mechanical contraptions to dominate dungeons and battlefields with a new automaton crafting mechanic.
State Share, one of the features of Stadia that Google announced early on looks to be finally coming along with the release of the Stadia exclusive Crayta.
Crayta is one of the titles announced during the April Stadia Connect presentation. It looks like a huge amount of fun too. A creative game where you and others can build and share multiplayer games, bringing down barriers to enable play and creation in real-time and then instant play them and get anyone else to join in. It's one of the games that (in my opinion) might actually pull people into Stadia properly because of the uniqueness to it and how Stadia can benefit such a game.
Despite a very active development in the recent couple of weeks, we still need to finalize a couple of things before we can do the release for version 2.8.
While going through the remaining issues, we found some time to work on users’ suggestions, test our nightly builds and provide feedback. We fixed several reported bugs and also implemented a couple of smaller features that were recently requested. The purpose of this short post is to update you on the latest developments.
LabPlot supports different analysis methods, like fitting, smoothing, Fourier transformation, etc. For smoothing we recently added the calculation of rough values. The difference between the approximating smooth function and the original data is called “rough” in this context (data = smooth + rough). This is very similar to the calculation of “residuals” for the fit algorithms. In 2.8 we calculate and expose the rough values, made it possible to visualize them and to check the goodness of the smoothing process.
I didn’t believe her, seeing that it only happened inside Krita. I converted Disney’s existing imageSynth2 demo and compiled it inside our toolchain to see if it was the compiler instead, but to no avail.
Without any other options left, I jumped deep inside the rabbit hole that is SeExpr’s parser, and started by tracing the calls that yield the (truncated) constants.
The state dump I posted before says a class called N7SeExpr211ExprNumNodeE represents them; this is just a mangled name for the ExprNumNode class. I put a breakpoint on the value() call, but the value had already been truncated. I tested with the constructor itself, but wasn’t able to get the actual value, as it’d been <optimized out> according to gdb.
 Linuxfx is a great OS to run on older computers. It does not need very advanced hardware. A dual-core rig with a minimum of 2 GB of RAM is enough to run the system without lags or sluggishness.
However, you will experience far superior performance if your hardware exceeds the minimum requirement. The sweet spot is at least 4 GB RAM and 16 GB of free disk space.
Installation is a no-brainer as well. It is a fairly straightforward process that takes around 5 minutes.
LibreELEC 9.2.3 (Leia) the final version has arrived based upon Kodi v18.7.1.
Firstly, and most importantly, we hope that everyone and their loved ones are staying safe. We continue to work on and develop OSMC during this time and offer support and our store also remains open with orders being fulfilled promptly and without delay.
Team Kodi recently announced the 18.7 point release of Kodi Leia. We have now prepared this for all supported OSMC devices and added some improvements and fixes.
We continue to work on our improved video stack for Vero 4K and Vero 4K + which brings HDR10+ and 3D MVC support. We also continue to work on Raspberry Pi 4 support and we will shortly make some kernel 5.x test builds available in our forums for currently supported Pi models so we can use a unified kernel code base for all models.
Does anyone remember PC-BSD, the FreeBSD-based distribution aimed at desktop users? After being acquired by iXsystems and renamed to TrueOS, the graphical installer was removed in 2018 because TrueOS served more as a base for iXsystems’ other offerings, such as FreeNAS, And now, in April of this year – we missed it – development has been halted entirely.
In this video, we are looking at the beautiful backgrounds of the upcoming Linux Mint 20.
The design of the Blade Runner game was extremely ambitious for the time. In contrast to many contemporary games, the game engine included pre-rendered backgrounds and 3D characters, but did not require the use of any 3D hardware accelerator. Designers David Leary and James Walls achieved this through self-developed technology using voxels (pixels with width, height and depth). Castle explains:
"We had to invent a new technology for the characters. We went back to voxel technology and used it as a launch pad. What we are using are not voxels, but a kind of 'voxels plus'. We use voxels to make rotations, transformations and three-dimensional projections that create the character, but in fact we use a very fast polygon rendering engine to render the polygons on the screen. Because we do not need a voxel model that is so dense that every pixel is a voxel, we are able to achieve much higher frame rates with many more polygons on the screen and with many characters."
"When we told Intel that we were making a 640x480 game, 65,000 colors that emulates true colors, with 16-bit Z-buffer and six-channel CD-quality audio, they said: You can't - the PCI bus doesn't support it.
"So we feel good about ourselves, because we haven't mentioned the 750,000 polygons for the characters yet", Castle said, with a smirk.
Graphically, the game resembles some games of the time, with pre-rendered 3D scenarios, and 3D characters, in this case, with the voxel-plus technique. It's something similar to franchises like Alone in the Dark and Resident Evil. However, in a totally different and exciting way, the scenarios have lighting, and even though they are pre-rendered images, they are animated: fans that roll (and the game has many), and the lights change, blink. There are NPCs walking and spinners in the skies. The rain constantly falls, and it makes puddles on the ground.
[...]
Speaking in 2015 about a possible re-release of the game via Steam or GOG.com, Louis Castle explained that the source code and assets were lost when Westwood moved its studio from Las Vegas to Los Angeles, making a relaunch or an HD remaster impossible. Even if the code were found, restoring almost a terabyte of assets, whether for new pre-rendered or 3D real-time scenarios, would cost tens of millions of dollars, making the relaunch as unlikely as a sequel. The Blade Runner partnership and Electronic Arts held the rights to the game for many years at this point.
However, the game would finally arrive on GOG.com on December 17, 2019, following an agreement with Alcon Interactive Group and the website, using ScummVM: Several attempts have been made to reverse engineer the game's engine. As it is technically complex with voxel graphics for game actors, video backgrounds and random paths, the final project took eight years to complete. The new Blade Runner engine was added to the ScummVM game engine collection on October 13, 2016 and took another three years to be ready for public testing on June 16, 2019 and included in ScummVM version 2.1.0.
I had been curious to try it out for a long time before actually trying it. The first time was in 1998. I asked a friend to help me that I knew had some knowledge, but he just brushed me off and said it would be too difficult. An install required floppy disks and quite a bit of command line work. After scratching my head on my own for a little while, I gave up and didn't give it much thought before 2006, when I had problems with instability of my router. I installed Linux based firmware on it and noticed how much better it ran. This made me curious about GNU/Linux on the desktop, because my installation of Windows at the time needed reboots roughly every other day, and the install tended to slow down over time.
The second thing that sparked my curiosity, and would make the transition easier, was that I was already running many types of GNU software on my Windows installation.
I ordered a free CD of Ubuntu, and got it in the late summer of 2006. It was Ubuntu 6.06 Dapper Drake. It was underwhelming at first, and I bumped into many beginner's problems that I was unable to solve at the time. So I wiped the install in frustration and installed Windows. I don't know if anyone has tried to install Windows without an OEM, but hunting drivers online and setting everything up, took a whole day. That reminded me of how easy and flawless the installation of Ubuntu had been, so a few days later, after reading about the stuff that was causing me trouble the first time, I installed it again. I have been using variants of GNU/Linux ever since.
What specific equipment do you currently use with PCLinuxOS?
I am currently using a HP EliteBook 2570p with 6 GiB RAM and 240 GiB SSD. It is not the newest hardware, but it is very rugged and so blazing fast with PCLinuxOS and KDE Plasma that it would be silly upgrading it.
Just this past week, the new version of of Baïkal (0.7.0)—a PHP CalDAV and CardDAV server based on Sabre—was released, and one of the key changes was that support was added for more modern versions of PHP (like 7.4).
Since my personal Gentoo server is running the ~amd64 branch, I had to wait for this release in order to get my CalDAV server up and running. For the most part, installing Baïkal 0.7.0 was a straightforward process, but there were a couple of “gotchas” along the way.
A feature proposal raised by Red Hat's Jeff Law would allow Fedora packages to be built under the LLVM Clang compiler rather than defaulting that all packages to be built under GCC. Clang-built packages would happen where the upstream software recommends using Clang by default or for software without an upstream to let the packager(s) make their own decision.
Version 2.1 of Red Hat's Stratis daemon is now available that aims to bring Btrfs/ZFS-like functionality atop the XFS file-system paired with LVM.
Stratis 2.1 is the first release in three months for this Red Hat storage project. Most notable to Stratis 2.1 is the daemon now handling encryption support, closing off a string of bug reports / requests over such functionality considering other modern Linux file-systems long offering easy to manage encryption support. The Stratis 2.1 storage encryption makes use of LUKS2 for encryption.
I've been struggling with replacing parts of my old sysadmin monitoring toolkit (previously built with Nagios, Munin and Smokeping) with more modern tools (specifically Prometheus, its "exporters" and Grafana) for a while now.
Replacing Munin with Prometheus and Grafana is fairly straightforward: the network architecture ("server pulls metrics from all nodes") is similar and there are lots of exporters. They are a little harder to write than Munin modules, but that makes them more flexible and efficient, which was a huge problem in Munin. I wrote a Migrating from Munin guide that summarizes those differences. Replacing Nagios is much harder, and I still haven't quite figured out if it's worth it.
[...]
A naive implementation of Smokeping in Prometheus/Grafana would be to use the blackbox exporter and create a dashboard displaying those metrics. I've done this at home, and then I realized that I was missing something.
One of the original promises of open source software is that distributed peer review and transparency of process results in enhanced end-user security. Nonetheless, whilst anyone may inspect the source code of free and open source software for malicious flaws, almost all software today is distributed as pre-compiled binaries. This allows nefarious third-parties to compromise systems by injecting malicious code into seemingly secure software during the various compilation and distribution processes.
It's been over ten years since I started in Arm, and nine since I joined Linaro as an assignee. It was wonderful working with some excellent people in both companies, but around the end of last year I started to think that it might be time to look for something new and different. As is the usual way in Cambridge, I ended up mentioning this to friends and things happened!
[...]
Where do I fit in? Pexip is a relatively small company with a very flat setup in engineering, so that's a difficult question to answer! I'll be starting working in the team developing and maintaining PexOS, the small Linux-based platform on which other things depend. (No prizes for guessing which distro it's based on!) But there's lots of scope to get involved in all kinds of other areas as needs and interests arise. I can't wait to get stuck in!
Although I'm no longer going to be working on Debian arm port issues on work time, I'm still planning to help where I can. Let's see how that works...
As part of the ongoing work to reduce authentication fatigue, the elementary OS team are going over everything with a fine-tooth comb to ensure asking for admin / root permission makes sense.
One idea they came up with, which appears to be integrated into elementary OS 5.1.5 'Hera', is the removal of needing to enter the admin password when you're doing updates with the AppCenter. The question is why? As they explained, you already gave your full permission to install the applications originally and that they "provide clear expectations around curated versus non-curated apps" so they felt it didn't make sense to authenticate again just to do updates.
I’ve been using Linux for around 10 years now; most of that has been Ubuntu based distributions, but I also spent a couple of years on Fedora too. In recent years I’ve flipped from being a distro hopper to preferring stable systems that I know intimately well.
My desktop, for example, has gone from running Pop OS 18.04, right the way through to the current 20.04 release. Because Pop follows the Ubuntu 6 month release cycle, that’s 4 major OS upgrades.
Throughout that time, I haven’t had a single issue with Pop OS, which I think is a testament to the stability of modern Linux distributions.
Anyway, on with my thoughts…
The Ubuntu OpenStack team at Canonical is pleased to announce the general availability of OpenStack Ussuri on Ubuntu 20.04 LTS and on Ubuntu 18.04 LTS via the Ubuntu Cloud Archive.
Compulab’s rugged, 112 x 84 x 25mm “IOT-GATE-iMX8” gateway and “SBC-IOT-iMX8” run Linux on an i.MX8M Mini via an LGA module. Features include 2x LAN, 2x CAN, 2x mini-PCIe for WiFi/BT and LTE, and modular I/O.
In February, Compulab announced a 38 x 28mm, LGA form factor UCM-iMX8M-Mini module and sandwich-style, 104 x 80 x 23mm SBC-iMX8M-Mini SBC based on NXP’s i.MX8M Mini. Now, the company has launched an IoT gateway and a second SBC based on the module. The IOT-GATE-iMX8 is built around a UCM-iMX8M-Mini equipped SBC-IOT-iMX8 mainboard, which can be purchased separately.
Like the original NexDock the new model is a 14.1-inch laptop shell, complete with keyboard, trackpad, and touchscreen, but no computer inside.
Nope, none...
The idea is that you connect an Android phone or tablet (ideally one with Android ‘desktop mode’ functionality available) or attach a single-board computer (like the Raspberry Pi 4 or HardROCK64). It’s the peripheral that acts as the “brain” in the set-up, while the NexDock functions as the rest of the laptop.
Although it is not often publicised you can use the NexDock as a second monitor for an existing Linux laptop, Chromebook, or Apple MacBook. I won’t pretend that having a 14-inch laptop sat next to an existing laptop is an efficient way to work, but in a pinch it might just be handy all the same.
  RunSafe Security has released a version of its Alkemist security software that supports Yocto-based projects. Alkemist’s Load-time Function Randomization re-stacks memory functions to make it harder for attackers to find a target.
RunSafe Security announced new support for Yocto Project in its Alkemist security software. Developers can now use Alkemist to “immunize” their embedded Linux stacks by adding a layer into Yocto build environments “without changing a line of code or slowing down product releases,” says RunSafe.
  Excelfore announced a development kit for its eSync Automotive OTA software that includes two Raspberry Pi’s that emulate device and gateway. CAN expansion boards will be added soon.
Excelfore has launched a Linux-based development kit for its eSync OTA software for automotive over-the-air updates and data aggregation. The company refers to the kit as the eSync OTA software development kit (SDK), although it also includes a pair of Raspberry Pi SBCs, with expansion boards on the way.
I've used Nextcloud, a great open-source Infrastructure-as-a-Service (IaaS) cloud, for years on both my own on-premise and shared servers. It works well, it's simple to set up, and it does the main job of replacing public cloud storage services such as Google Drive, Microsoft OneDrive, and DropBox flawlessly. With this latest edition, Nextcloud Hub 19 is also adding improvements to its built-in, office Software-as-a-Service (SaaS) programs.
  Bitwarden is unquestionably one of the best password managers available for Linux. It’s also a cross-platform solution — so you can use it almost anywhere you like.
You can also read our review of Bitwarden if you want to explore more about it.
Now, coming back to the news. Recently, Bitwarden introduced two new major features that makes it even better.
  English speakers have so many wonderful open source resources that it's easy to forget that communications in English aren't accessible to everyone everywhere. Therefore, I've been looking for great open source resources in Spanish and French, so I can recommend them when the need arises.
One I've been looking at recently is LinuxFr.org, which seems to be a fine "agora" for all sorts of interesting conversations in French about open source specifically and open everything else as well.
Data loss is a common threat we all face these days. Disk failure or other user mistakes might result in data loss. Losing data is more hazardous for a data center which stores tons of information every day. There are so many backup Utilities available in the market which makes it confusing to choose the best one among the numerous options. This article will help you select the most appropriate free backup utility for Linux that might fit your needs.
Last week was the Libre Graphics Meeting (LGM) 2020 online conference. The LGM is normally an occasion for all the contributors of graphics related Free Software to meet physically, and this year we had planned to organize it in our city of Rennes, France. But of course, with the current situation, we were forced to cancel the physical event. We hesitated to make an online event instead, as the biggest interest in this event is to have a physical meeting. We ran a poll to see if there was enough interest for an online event, and the result showed us that there was.
As several people asked me about the technical setup used for the stream, I’m going to explain it here.
I was inspired a lot by the solution used for the Libre Planet conference, which used a jitsi meet instance to receive the stream of remote speakers, and sent it to an icecast server using a GStreamer based script to record the screen.
The first difference is that we decided to ask all the speakers to send a pre-recorded video of their presentation. We felt it was safer to get a good quality source for the talks, as some speakers may not have enough bandwidth on their internet connection for a reliable high-quality live session. And it was also safer to have a good quality recording available to publish the videos after the event.
The State of the Source Summit invites open source communities of practice from around the world to organize and contribute to a global conversation on the current state of open source software: non-technical issues that foster development and community, the licenses that enable collaboration, the practices that promote contribution, and the issues confronting cooperation.
Firefox 77 is released. I really couldn't care less about Pocket recommendations, and I don't know who was clamouring for that exactly because everybody be tripping recommendations, but better accessibility options are always welcome and the debugging and developer tools improvements sound really nice. This post is being typed in it.
There are no OpenPOWER-specific changes in Fx77, though a few compilation issues were fixed expeditiously through Dan Horák's testing just in time for the Fx78 beta. Daniel Kolesa reported an issue with system NSS 3.52 and WebRTC, but I have not heard if this is still a problem (at least on the v2 ABI), and I always build using in-tree NSS myself which seems to be fine. This morning Daniel Pocock sent me a basic query of 64-bit Power ISA bugs yet to be fixed in Firefox; I suspect some are dupes (I closed one just this morning which I know I fixed myself already), and many are endian-specific, but we should try whittling down that list (and, as usual, LTO and PGO still need to be investigated further). I'm still using the same .mozconfigs from Firefox 67.
Regular expressions – commonly known as RegExps – are a powerful tool in JavaScript for manipulating strings. They provide a rich syntax to describe and capture character information. They’re also heavily used, so it’s important for SpiderMonkey (the JavaScript engine in Firefox) to optimize them well.
Over the years, we’ve had several approaches to RegExps. Conveniently, there’s a fairly clear dividing line between the RegExp engine and the rest of SpiderMonkey. It’s still not easy to replace the RegExp engine, but it can be done without too much impact on the rest of SpiderMonkey.
In 2014, we took advantage of this flexibility to replace YARR (our previous RegExp engine) with a forked copy of Irregexp, the engine used in V8. This raised a tricky question: how do you make code designed for one engine work inside another? Irregexp uses a number of V8 APIs, including core concepts like the representation of strings, the object model, and the garbage collector.
  The trend towards open-source software on government computers is gathering pace in Germany.
In the latest development, during coalition negotiations in the city-state of Hamburg, politicians have declared they are ready to start moving its civil service software away from Microsoft and towards open-source alternatives.
The declaration comes as part of a 200-page coalition agreement between the Social Democratic and Green parties, which will define how Hamburg is run for the next five years.
As Techdirt has reported, the open access movement seeks to obtain free access to research, particularly when it is funded by taxpayers' money. Naturally, traditional academic publishers enjoying profit margins of 30 to 40% are fighting to hold on to their control. Initially, they tried to stop open access gaining a foothold among researchers; now they have moved on to the more subtle strategy of adopting it and assimilating it -- rather as Microsoft has done with open source. Some advocates of open access are disappointed that open access has not led to any significant savings in the overall cost of publishing research. That, in its turn, has led many to urge the increased use of preprints as a way of saving money, liberating knowledge, and speeding up its dissemination. One reason for this is a realization that published versions in costly academic titles add almost nothing to the freely-available preprints they are based on.
If you are here reading this post, there is a high probability that you have heard or interacted with Github, and you now want to learn Git. Before we continue with showing you some of the cool Git commands, let's understand the difference between Git and GitHub.
In this post, I describe the steps involved in the execution of a kms_cursor_crc subtest. In my approach, I chose a subtest (pipe-A-cursor-alpha-transparent) as a target and examined the code from the beginning of the test (igt main) until reaching the target subtest and executing it.
This is my zero version. I plan to incrementally expand this document with evaluation/description of the other subtests. I will probably also need to fix some misunderstandings.
AcceleratXR announced the launch of its new open source project – Composer.js. Composer.js is a framework and toolset for rapidly building back-end API services using NodeJS. The project is a fork of the internal tools and technology the company has been steadily building its innovative MMO gaming platform with over the last two years.
The Early Access Program for our next major release, PyCharm 2020.2, is now open! If you are the kind of person who is always looking forward to the next ‘big thing’, we encourage you to join and share your thoughts on the latest PyCharm improvements! Our upcoming release is loaded with cool features!
In this tutorial, we will cover how to drop or remove one or multiple columns from pandas dataframe.
What is pandas in Python?
pandas is a python package for data manipulation. It has several functions for the following data tasks:
Drop or Keep rows and columns Aggregate data by one or more columns Sort or reorder data Merge or append multiple dataframes String Functions to handle text data DateTime Functions to handle date or time format columns
In this episode, I focused on a single view for adding a course to a school year. This view is reusing a form class from a different part of the app and sharing a template. We worked through the details of making a clear CreateView. The stream started with me answering a question about how I design a new feature. I outlined all the things that I think through for the different kinds of features that I need to build.
This Wing Tip provides a roadmap to the configuration options available for Wing's debugger, to make it easier to understand the available possibilities and how these can be applied to your development projects.
The Rust team has published a new version of Rust, 1.44.0. Rust is a programming language that is empowering everyone to build reliable and efficient software.
This is a shorter blog post than usual: in acknowledgement that taking a stand against the police brutality currently happening in the US and the world at large is more important than sharing tech knowledge, we decided to significantly scale back the amount of promotion we're doing for this release.
The Rust Core Team believes that tech is and always will be political, and we encourage everyone take the time today to learn about racial inequality and support the Black Lives Matter movement.
Widely reported in the technical press, USB4, a.k.a. USB 4.0, should be finding its way to your computing world soon. There is hope for a late-2020 rollout for cables and devices, but sometime in the first half of 2021 is more realistic, given the global manufacturing shutdown prompted by the coronavirus pandemic. You can download the "official" spec information for USB4 here (zip file).
For a little bit of background, in 2017, Intel donated the Thunderbolt 3 specs to the USB Implementers Forum for third-party use. Thunderbolt 3 is significant, due to it sporting 40Gbps transfer speeds. While the standard for Thunderbolt 3 is free to use and implement, the use of the Thunderbolt 3 trademark is not, and still requires certification by Intel before advertising that a device is Thunderbolt 3 compatible. Additionally, the Thunderbolt 3 compatibility is only available if individual manufacturers choose to build it in. And, I have to admit that I had never heard of Thunderbolt until I started to write this article. But then again, I don't spend endless hours perusing new computer systems that I know I cannot afford, either, which is most likely why Thunderbolt never appeared on my radar.
After experiencing the confusing rollout of the USB 3 standard, and its subsequent (and even more confusing) split into USB 3.1 and USB 3.2 "standards," don't hold your breath for anything less confusing with the USB4 rollout. Like most users, I'll withhold judgement. After all, I live in Missouri, who's nickname is "The Show Me" state.
In America, we hope that businesses will grow by inventing amazing things that people love – rather than through deep-pocketed catch-and-kill programs in which every competitor is bought and tamed before it can grow to become a threat. We want vibrant, competitive, innovative markets where companies vie to create the best products. Growth solely through merger-and-acquisition helps create a world in which new firms compete to be bought up and absorbed into the dominant players, and customers who grow dissatisfied with a product or service and switch to a "rival" find that they're still patronizing the same company—just another division.
To put it bluntly: we want companies that are good at making things as well as buying things.
We can be sure that the public grandiloquence of Barack Obama grated mightily on at least half of the country during his eight years in the Oval Office. Now, we Libtards find every Trump tweet excruciatingly inane – or horrifyingly inflammatory. As ever, it is the style, not the content, of American political leadership that is in question. For Its neoliberal ideology has been unwavering for four decades and is but the contemporary version of an implicitly racist dedication to the well-being of the wealthy that was fundamental to the founding of the Republic. Committed to the economization of all facets of public and private life, we citizens are remade as human capital: mini entrepreneurs whose only civic duty is towards pumping up the GDP. This is what our government demands of us, and we would be foolish to expect more from it than further destruction of the public realm and further trivialization of the democratic process. Having relinquished our individual roles as a necessary part of the Republic’s sovereignty, our vote is rendered superfluous at a time of a viral pandemic, unprecedented unemployment and expectations of further economic dislocation likely to eclipse the melt-down of 2008.
“There’s no crying in baseball,” says Tom Hanks in A League of Their Own, the most popular baseball film of all time. But a more subtle theme of the film is that there are no lesbians in baseball. The film made no mention of the fact that many of the athletes in the All American Girls Professional Baseball League (AAGPBL) were lesbians, although none of them were open about their sexuality except to close friends and some teammates.
These days, teaching graduating college seniors has me, as the Brits would say in the London Underground, “minding the gap.” In my case, however, it’s not the gap between the platform and the train I’m thinking of, but a couple of others: those between U.S. citizens and our government, as well as between different generations of Americans. The Covid-19 crisis has made some of those gaps far more visible than usual, just as my students leave school with many of their personal expectations in tatters.
The possibility has sparked a variety of think pieces about how a tech exodus could reshape Silicon Valley. Already, restaurants that catered to the downtown lunch crowd have been forced to close, and public transit agencies are struggling to survive without riders. Even the housing market — one of the region’s most expensive and intractable problems — has seen prices fall ever so slightly.
It’s too early to tell whether the work from home trend will extend beyond a few companies to reshape the fabric of Silicon Valley. While Twitter, Square, and Facebook are going all-in on remote work, companies like Google and Salesforce are extending work from home options for the rest of the year with plans to reopen in 2021.
The response of socialist Cuba to the global SARS-CoV2 pandemic has been outstanding both domestically and for its international contribution. That a small island nation, subjected to hundreds of years of colonialism and imperialism and, since the Revolution of 1959, six decades of the criminal United States blockade, can play such an exemplary role is due to Cuba’s socialist system. The central plan directs national resources according to a development strategy which prioritises human welfare and community participation, not private profit.
Over the years, the mining industry has taken advantage of dictatorship, disasters, and a variety of distractions to expand operations in Latin America. In the time of Covid-19, with entire populations under lockdown and economies falling apart, mining companies have also hopped on the pandemic profiteering bandwagon.
The authorities in Russia’s northern Arkhangelsk region will be restricting entry and exit from the city of Severodvinsk beginning on June 6, the regional government’s website says.€
According to official data alone, more than 3,000 medical workers in St. Petersburg have fallen ill with the coronavirus — that’s about 20 percent of the total number of COVID-19 cases in the city. In addition to the increasing number of doctors contracting the disease, the general outbreak in St. Petersburg isn’t getting any better: between 350–390 new cases are registered daily, and this number isn’t going down. To illustrate how the pandemic is impacting St. Petersburg’s medical workers and their families, Meduza tells the story of€ Olga Novikova, who worked as nurse at St. Petersburg’s Dzhanelidze First Aid Research Institute. She died of the coronavirus on May 2nd — she was only 46 years old.
Over the past week, we’ve seen editors and reporters, looking for a new angle on the pandemic, start to suggest—with the help of some experts—that protests risk fueling a resurgence of Covid-19 around the United States. Are these gatherings, large and small, something we should be worrying about? Anywhere people assemble in close proximity for extended periods presents some risk of viral transmission, so these protests are certainly not risk-free, even if they are outdoors, where the risk from SARS-COV-2 is far less than in indoor environments. But as Howard Markel, a historian of science and medicine at the University of Michigan, reminds us, outdoor events can carry great epidemiological significance. The Liberty Loan parades in Philadelphia and Detroit likely helped to spread influenza in 1918. In most cases, bringing thousands of people together for several hours in cities and towns across the country as we have seen over the past week wouldn’t be advisable. But this is not “most cases.”
When it was his turn to address a forum on AIDS in New York in 1991, Larry Kramer took an uncharacteristic pause before speaking. He rubbed his ear and ran his hand through his thinning hair. Eyes cast down, he sat in silence for another moment. Then a syllable burst through his grimacing lips: “Plague!” Another pause. Then staccato. “We are in the middle of a fucking plague. Plague!” He pounded the table in time to his words. “Forty million infected people is a fucking plague, and nobody acts as if it is. Nobody in this hospital, nobody in this city, nobody in this world. Forty million people is a fucking plague. Every person I talk to, in every city, in every agency—gay, straight—is as despondent as they can possibly be. Nobody knows what to do next. Nobody knows what to do next.” He looked down and shuffled some papers. Sighed. Took in a breath and blew it through billowing cheeks.
It was the sort of miracle cure that the board of a rural Oklahoma hospital on the verge of closure had dreamed about: A newly formed management company promised access to wealthy investors eager to infuse millions of dollars.
The company, Alliance Health Southwest Oklahoma, secured an up to $1 million annual contract in July 2017 to manage the Mangum Regional Medical Center after agreeing to provide all necessary financial resources until the 18-bed hospital brought in enough money from patient services to pay its own bills.
At least 13 hospitals in Oklahoma have closed or experienced added financial distress under the management of private companies. These companies sold themselves to rural communities in Oklahoma and other states as turnaround specialists.
Revenues soared at some rural hospitals after management companies introduced laboratory services programs, but those gains quickly vanished when insurers accused them of gaming reimbursement rates and halted payments. Some companies charged hefty management fees, promising to infuse millions of dollars but never investing. In other cases, companies simply didn’t have the hospital management experience they trumpeted.
"Not only is there no benefit, but we saw a very consistent signal of harm," study leader Dr. Mandeep Mehra of Brigham and Women's Hospital in Boston told The Associated Press when the work was published.
The World Health Organisation this week declared Latin America to be the new global epicentre of the coronavirus pandemic, and experts are warning that the real death toll in the region could be far higher than what is being reported, due to inaccurate or incomplete data.
While Brazil, Mexico, Peru, Chile, and Ecuador appear hardest hit, it’s difficult to measure the extent to which COVID-19 is taking hold in a country like Venezuela that was already data-poor and engulfed in a humanitarian crisis long before the pandemic arrived.
Official records show 1,952 confirmed coronavirus cases and 20 deaths as of 3 June. But Venezuela’s Academy of Physical, Mathematical and Natural Sciences published a report in May stating that the low numbers of COVID-19 cases appear inconsistent with the real scale of the epidemic. Venezuelan authorities have called for an investigation of the Academy.
In the simplest terms possible, NetWare was a dedicated network operating system. It was designed around fast and reliable network operations at the expense of almost everything else. Novell had invested massive amounts of research in figuring out how to do fast I/O and minimizing any delays from hardware related sources. The end result was a very lean system that remained stable and performant with a large number of clients attached. As networking was Novell's bread and butter, NetWare had excellent support for everything: clients were available for DOS, Windows, UNIX, Macintosh, OS/2 and probably other platforms I've never even heard of.
The early history of NetWare is very muddled, and pre-2.0 versions have been lost to time. This compounded with poor documentation has made it very difficult to trace the early history of the product. However, while NetWare was not the first (or only) network product for IBM PCs, it quickly became the largest, displacing IBM's PC Network, and laughed at Microsoft's LAN Manager, and IBM OS/2 LAN Server.
While NetWare did compete on UNIX, Sun had already gotten their foot in the door by porting NFS and making it the de-facto solution for all UNIXs of the era, as well as Linux. Meanwhile, Apple held onto AppleTalk which itself survived well into the early 2000s when NetWare had already disappeared into the aether. The explosion of Wintel PCs throughout the 90s had given NetWare a market position that should have been very difficult to dislodge.
The full story of NetWare's fall from grace is a story for another time, but I do want to go into the more technical aspects that were both the boon and bane of NetWare. Much of NetWare's success can be attributed to its own IPX protocol which made networking plug and play and drastically lowered latencies compared to NetBIOS or even TCP/IP.
When enabling macros on the malicious Excel spreadsheet, the victim host retrieved the ZLoader DLL as shown in the previous section, saved the DLL to the victim's Documents folder, and ran it using rundll32.exe.
But what is SmartScreen?
SmartScreen collects installation data from all Windows users in order to establish “reputation”. If the program does not have an established good reputation, you get this big warning message. By this time most users have deleted the .exe already thinking it is a malware, but SmartScreen can be bypassed by clicking on “More info” then “Run anyway”.
The digital signature racket
But let’s say you bite the bullet, you buy yourself an overpriced piece of prime numbers generated by a computer, sign your code and re-publish your application. You can now start getting users to install your app right? Wrong.
But how do you build reputation? First of all, Microsoft needs to be able to gather information on who has published the app, and this is done by a code signing certificate. The most obvious implication is that unsigned apps will always trigger SmartScreen. The more insidious implication is that acquiring a code signing certificate is a big expense for an individual developer. There is currently no “Let’s Encrypt” equivalent to code signing certificates; so you have to purchase it from trusted authorities. The price range is wide but a certificate only valid for a year will typically go for about $100.
It remains unclear as to how and when the attack happened, and what the ransom demand is.
NetWalker is one of twelve ransomware gangs who threaten to publish data in revenge if organisations refuse to pay the ransom demand.
MSU have not official disclosed the incident, however, an MSU spokesperson, Dan Olsen shared the following statement to EdScoop: “We are aware of a possible intrusion and we are actively looking into it.”
University officials believe the latest breach occurred on Memorial Day and took relevant computer systems offline within hours of the intrusion, according to a news release. It compromised data associated with the Department of Physics and Astronomy, and information technology teams are coordinating with law enforcement to understand the scope of the breach. Investigators are notifying and providing support to affected MSU affiliates as they are identified.
The cybersecurity breach, known as a ransomware attack, first became public May 27 when a [cr]acker-affiliated blog posted screenshots of files allegedly belonging to MSU affiliates. Images circulating on social media include a redacted passport and a list of transactions related to physics and astronomy projects. They also show a countdown clock that warns of “secret data publication” less than one week from when the screenshots were taken.
The ransom demanded was not specified, but the ransomware gang is prepared to release the university's documents.
The NetWalker, a newer form of ransomeware sometimes labeled as Mailto, blog post threatened publication of 'secret' documents dated with a countdown clock with close to a week remaining.
The Malware team NetWalker launched a new ransomware attack against the Austrian village of Weiz which affected the public service system and leaked a lot of the stolen data from building applications as we are about to read more in the following latest cryptocurrency news.
According to the cybersecurity firm Panda Security, the Malware team managed to enter the town’s public network through phishing emails related to the Coronavirus pandemic. The subject of the emails which was ‘’information about the coronavirus’’ was used to bait the employees of the public infrastructure of the city into clicking on malicious links which triggered the ransomware.
Panda Security claims that the ransomware attack belongs to a new version of a ransomware family that spreads by using VBScripts. If the infection is successful, it will spread through the entire windows network to which the infected machine is related. The report details that the ransomware terminates and services under Windows which encrypts files on all available disks thus eliminating the backups.
The crooks deployed a pirated copy of the Virtual Box virtual machine (VM) software to every computer on the victim’s network, plus a VM file containing a pirated copy of Windows XP, just to have a “walled garden” for their ransomware to sit inside while it did its cryptographic scrambling.
But that’s far from everything that today’s crooks bring along for a typical attack, as SophosLabs was able to document recently when it stumbled upon a cache of tools belonging to a ransomware gang known as Netwalker.
For more than five months, Lastline security researchers have tracked the evolution of malicious Excel 4.0 (XL4) macros, observing the fast pace at which malware authors change them to stay ahead of security tools.
A central part of many organizations’ productivity tools, Excel opens the door for phishing attacks where victims are tricked into enabling macros in malicious documents, which can results in the attackers gaining a foothold on the network, in preparation for additional activities.
During their five-month research, Lastline observed thousands of malicious samples, clustered into waves that provide a comprehensive picture of how the threat has evolved in both sophistication and evasiveness.
EdScoop reported the ransomware attack on May 27 and provided screenshots from a blog on the dark web, showing what appear to be a student's passport, MSU financial documents and files from the MSU network, as well as a countdown that had about one week remaining as of May 27.
Debian says the problem is fixed in many versions.
The table below lists information on source packages.
Make sure to keep all internet facing systems as up to date as possible.
[...]
The pppd daemon works in conjunction with the core PPP driver to establish and maintain a PPP connection with another system (called a partner) and negotiate IP addresses for each end of the connection.
Even if two components have the same name, they can be very different depending on which organization or developer community has created them, or the various iterations and forks which they have experienced. While they might share similar purpose or functionality, these components might contain slight changes that reflect the needs or preferences of the people who influenced their evolution. A good example of this is the difference between Red Hat Enterprise Linux and Ubuntu. In practice, these slight differences can add up to create a significant impact on functionality, compatibility, and security, and thus must be considered when researching which “recipe” to follow.
Break in case of emergency: Language is everything. Delineate clearly in all written comms between a ‘potential incident’ - and an actual one. Don’t start turning one of the hundreds of security events you see into a ‘security incident’ before the most essential facts are understood. Halpert’s threshold for incidents that need to be covered by legal privilege are: a) An incident that gives rise to an obligation to notify a regulator, or a contractual obligation to notify a business partner; or b) An incident that exposed trade secrets or otherwise would affect the share price of a company; or c) An incident that would cause significant reputational hit to the company; or d) An incident in which a crime is committed.
It’s a significant ruling that effectively affords the attorneys suing Capital One with a breakdown of which bank behaviors were successful, and which failed. It’s common for Fortune 500 companies to keep incident response firms like Mandiant on retainer, though it’s rare for those firms’ insights on high profile breaches to be made public. Similar rulings in the future could provide aggrieved customers with ammunition to seek higher pay-outs in court.
The full weight of U.S. policing has descended upon protesters across the country as people take to the streets to denounce the police killings of Breonna Taylor, George Floyd, and countless others who have been subjected to police violence. Along with riot shields, tear gas, and other crowd control measures also comes the digital arm of modern policing: prolific surveillance technology on the street and online.
For decades, EFF has been tracking police departments’ massive accumulation of surveillance technology and equipment. You can find detailed descriptions and analysis of common police surveillance tech at our Street-Level Surveillance guide. As we continue to expand our Atlas of Surveillance project, you can also see what surveillance tech law enforcement agencies in your area may be using.€
Your phone is your life. It’s where you communicate, get your news, take pictures and videos of your loved ones, relax and play games, and find a significant other. It can track your health, give you directions, remind you of events, and much more. It’s an incredibly helpful tool, but it can also be used against you by malicious actors. It’s important to know what your phone contains and how it can also make you vulnerable to attacks.
Your threat model is unique and personal. And you will have to decide which solutions are the best for you. The best protection is to avoid creating the opportunity for an attacker to gain physical access to your phone or its metadata. The safest solution would be not to bring your phone to high-risk activities, such as protesting, but this might not be feasible for everyone.
Facebook is implementing end-to-end encryption in its Messenger service. This has made a number of government officials unhappy. Claiming this will lead to an increase in child sexual exploitation, multiple governments (including our own) have pounded their respective tables in Facebooks' direction, demanding the company not give its users secure communications.
“Multiple federal agencies are flying surveillance planes over protests, and it’s likely that some of these planes are outfitted with a Dirtbox or similar technology,” Martin Shelton, principal researcher at Freedom of the Press Foundation, told Motherboard. A Dirtbox is device that can act like its a cell tower, thereby duping smartphones into giving up their physical location.
“What this means for protesters and journalists covering these events is that phone numbers, as well as voice calls and text messages, are likely being scooped up for analysis,” Shelton added.
The move to Amazon Chime for Slack voice and video calls is also a significant part of the deal. Voice and video conferencing is a particular weak point of Slack compared to Microsoft Teams, but this new integration should mean it will be vastly improved in the future. Slack has already started the migration, and it’s looking into new features. “For now, we’re just focused on shoring up the back end,” says Armstrong. “As Chime has additional features, we’re looking at bringing the mobile experience to include video, which it doesn’t today. We’re also looking at transcription.”
Google is being sued for 5 billion USD in a class action lawsuit over the tracking of private internet activity. Boies Schiller Flexner LLP has filed a massive lawsuit against Google and Alphabet Inc. for tracking and storing private internet activity. The suit, Case No. 20-3664, was filed on behalf of plaintiffs Chasom Brown, Maria Nguyen, and William Byatt as well as similar Google users – of which there are many – in a class action lawsuit that lawyers are hoping will be heard by a jury.
It's not bad enough that privacy issues before the pandemic were mounting. Now, with many people telecomputing from home, bosses are attempting to log how much time employees working from home are spending doing their jobs, taking privacy concerns to new heights.
According to an article from NPR (National Public Radio in the U.S.), the increased incidence of working from home has led to an increase in surveillance by bosses spying on those working-from-home workers.
One company required its WFH (work from home) workers to install Hubstaff on their computers. In turn, Hubstaff logged every mouse movement, keystroke, and website the workers visited. The same company required WFH workers to install an app on their phones, called TSheets, to keep track of the worker's whereabouts during work hours.
Companies try to sell it on the merits of "improving team productivity and efficiency." But many WFH workers aren't buying it. Nor are privacy advocates, who are fearful that the extra surveillance of WFH workers will normalize workplace surveillance, and that the digital surveillance will continue once workers return to working "on site."
The software is intrusive and unforgiving. "If you're idle for a few minutes, if you go to the bathroom or whatever, a pop-up will come up and it'll say, 'You have 60 seconds to start working again or we're going to pause your time,' " one woman said. But most workers, including this one woman, are afraid to say anything, fearful that they will lose their jobs.
Meanwhile, the companies selling the software say that the demand for and usage of their software has at least tripled since the beginning of the pandemic. Of course, that means more money for them, and we all know how powerful of a motivator GREED is.
Is it intrusive? Without a doubt. Is it illegal? Not at all. While there are laws (in the U.S.) that are supposed to prevent the government spying on its citizens, employers are not subject to those laws. In fact, the laws governing employers vary wildly from state to state.
Attackers were spotted targeting over one million WordPress websites in a campaign over the weekend. The campaign unsuccessfully attempted to exploit old cross-site scripting (XSS) vulnerabilities in WordPress plugins and themes, with the goal of harvesting database credentials.
The attacks were aiming to download wp-config.php, a file critical to all WordPress installations. The file is located in the root of WordPress file directories and contains websites’ database credentials and connection information, in addition to authentication unique keys and salts. By downloading the sites’ configuration files, an attacker would gain access to the site’s database, where site content and credentials are stored, said researchers with Wordfence who spotted the attack.
Between May 29 and May 31, researchers observed (and were able to block) over 130 million attacks targeting 1.3 million sites.
In our documentary movie “The Doctrine of Discovery: Unmasking the Domination Code,” directed by Sheldon Wolfchild (Dakota Nation), we quote language from the papal document Dum diversas, issued by the Catholic Church in 1452. The dehumanizing language expressed in that papal document provides a means of understanding the heartless killing of an African-American named George Floyd by Minneapolis, Minnesota police.
"President Trump has set a violent and misguided tone in the wake of George Floyd's tragic murder. It is time for our leaders at every level to challenge and repudiate this dangerous rhetoric—and for those at the top of our military, who failed in this responsibility, to step down."
I was naive until I wasn’t.
As the revolt against The New York Times’ decision to publish GOP Senator Tom Cotton’s op-ed calling on President Donald Trump to “send in the troops” spread across social media Wednesday night, encouraged by brave Times writers who publicly challenged the move, it was clear that Times leadership—in this case James Bennet, who edits the opinion section—had made another boneheaded choice. It looked especially bad when, later the same day, The Atlantic published a searing, eloquent broadside against all of Donald Trump’s fascist posturing from Trump’s former defense secretary James Mattis.
With the U.S. deciding to walk out of the Open Skies agreement, the U.S. is signaling to the world that it intends to return to days of Pax Americana that existed post-World War II, when it was the sole possessor of nuclear weapons. It has already walked out of the Anti-Ballistic Missile (ABM) Treaty in 2002 under George W. Bush, and the Intermediate-Range Nuclear Forces (INF) Treaty under Trump. The only nuclear arms control treaty that still remains in place is the New Strategic Arms Reduction Treaty (START), which provides a rough limit and parity on the U.S. and Russia’s nuclear arsenals. Its days also seem to be numbered, as it expires on February 5, 2021, leaving very little time for any serious discussion.
The great game in Libya has begun surging with the United States shedding its strategic ambivalence and resorting to a proactive role. At the end of May, the Pentagon marked a dramatic escalation by accusing Moscow of bolstering “Kremlin-linked mercenaries” who are allegedly helping Khalifa Haftar, the eastern warlord in Libya.
Sen. Rand Paul, R-Ky., is blocking the passage of a Senate bill that would make lynching a federal hate crime, because he worries that it would be used for lesser violent crimes that result in only “minor bruising.”
There is an iconic scene in the film The Dead Zone where a thoroughly unglued President Stilson, played by Martin Sheen, bulldozes one of his generals into co-authorizing a nuclear strike. “You are not the voice of the people, I am the voice of the people!” Stilson rages. “The people speak through me, not you!” After the launch is effected, upon being told an attack is not necessary, Stilson says with a smile, “The missiles are flying, hallelujah, hallelujah.”
The Trump campaign on Tuesday sought to defend the president’s Bible-toting photo-op — which was made possible after police backed by the National Guard dispersed peaceful protesters with tear gas — by claiming that tear gas had not actually been used on the protesters.
The mass media, as Noam Chomsky and Edward Herman documented decades ago, are structurally dependent on pre-ordained “experts,” who play a decisive role in filtering the information reaching the public.
Police officers are€ explicitly trained€ to conceive of themselves as warriors in battle, always€ on high alert€ and€ prepared to kill.
After more than a week of nationwide protests, all four Minneapolis police officers involved in the killing of George Floyd have been charged with murder or aiding and abetting murder in a case that triggered historic protests across the country. “If you look at the video … the pressure from all three officers on Mr. Floyd’s body contributed to his death,” says activist and civil rights attorney Nekima Levy Armstrong, former president of the Minneapolis chapter of the NAACP. “They heard the man pleading, saying 'I can't breathe,’ and they had a callous disregard for his life.”
Americans in all 50 states are protesting against police brutality. That alone should be all anyone needs to know that something is gravely wrong and that police violence has touched every community in the nation. And yet, as people continue to deny what they are seeing, it’s important to remember the reasons why police brutality is undeniable. One of those is the internet’s favorite way of making a death threat: calling on SWAT teams to terrorize people in their homes.
Swatting is when someone makes an anonymous, fake emergency call that baits a heavily-armed police response. These hoaxes can have deadly results, and many of the perpetrators are never found. Swatting has been used to terrorize victims by a variety of perpetrators, from angry gamers to organized neo-Nazi groups. Here are just a few examples: [...]
Distributed denial-of-service attacks against advocacy organizations increased by 1,120% since a Minneapolis police officer killed George Floyd by kneeling on his neck, sparking demonstrations throughout the U.S.
In figures published Tuesday, the internet security firm Cloudflare said it blocked more than 135 billion malicious web requests against advocacy sites, compared to less than 30 million blocked requests against U.S. government websites, such as police and military organizations. The company did not disclose which websites were affected, specifically.
When Amira Chowdhury joined a protest in Philadelphia against police violence on Monday, she wore a mask to protect herself and others against the coronavirus. But when officers launched tear gas into the crowd, Chowdhury pulled off her mask as she gasped for air. “I couldn’t breathe,” she said. “I felt like I was choking to death.”
Chowdhury was on a part of the Vine Street Expressway that ran underground. Everyone panicked as gas drifted into the dark, semi-enclosed space, she said. People stomped over her as they scrambled away. Bruised, she scaled a fence to escape. But the tear gas found her later that evening, inside her own house; as police unleashed it on protesters in her predominantly black neighborhood in West Philadelphia, it seeped in.
However, China has long detested the vigil, the only such activity allowed on Chinese territory to commemorate victims of the crackdown, which remains a taboo subject on the mainland. Hundreds, possibly thousands of people were killed when tanks and troops assaulted the centre of Beijing on the night of June 3-4, 1989, to break up weeks of student-led protests seen as posing a threat to authoritarian Communist Party rule.
Law himself has already spent time in Chinese prisons for his work. Some activists have fled abroad to the U.S., Europe or Taiwan to escape persecution, raising the possibility that the anti-Beijing movement may have to go abroad to survive, as after the Tiananmen Square protests.
But protest abroad carries less weight than at home. The CCP's fearsome censorship system controls what its citizens see and hear. Displaced Hong Kong activists might make international headlines--but their compatriots won't see them.
"Democratic activists like us will be the first wave of the ones that are being prosecuted," Law said, though he stressed, "I'll definitely stay in Hong Kong."
Authorities in the southwestern Chinese province of Sichuan are believed to be holding dissident and 1989 pro-democracy movement veteran Chen Yunfei for marking the anniversary of a massacre of civilians in Beijing on June 4, 1989.
Friends of Chen's said he has been incommunicado a couple of days ahead of Thursday's anniversary of the bloodshed that ensued when the ruling Chinese Communist Party leadership ordered the People's Liberation Army (PLA) to clear downtown Beijing of protesters using machine guns and tanks.
His apparent detention comes after some 200 rights activists launched an online event to mark the 31st anniversary of the massacre on Sunday.
They grabbed their guns -- mostly assault rifles -- hopped into their vehicles, and made the 18-hour trek to Minneapolis.
The Boogaloos are an emerging incarnation of extremism that seems to defy easy categorization. They are yet another confounding factor in the ongoing effort among local, state and federal officials to puzzle out the political sympathies of the agitators showing up to the mostly peaceful George Floyd rallies who have destroyed property, looted businesses, or -- in the case of the Boogaloos who descended on Minneapolis -- walked around the streets with assault rifles.
Boogaloo members appear to hold conflicting ideological views with some identifying as anarchists and others rejecting formal titles. Some pockets of the group have espoused white supremacy while others reject it. But they have at least two things in common: an affinity for toting around guns in public and a "boogaloo" rallying cry, which is commonly viewed as code for another US civil war.
More than three decades after the massacre on the night of June 3-4, the Tiananmen Mothers' victims group has called on the administration of President Xi Jinping to make public ruling Chinese Communist Party records from that time, and explain the chain of events that led to the deaths of their loved ones.
The group, in an annual open letter to China's leaders, takes aim at the official silence surrounding the events of June 4 and the immediate aftermath, when hundreds, possibly thousands, died or were injured in the crackdown.
Trump attorney Rudy Giuliani went completely off the rails during an interview with British journalist Piers Morgan on Thursday after Morgan confronted the former New York mayor about some of President Donald Trump's inflammatory tweets.
During the interview, Morgan demanded to know why it was acceptable for Trump to send out a tweet that promoted the shooting of looters.
Order denounced as "latest in string of outlandish authoritarian acts" from the U.S. president.
The ancient UK city of Oxford has registered a month-long sunshine record, the sunniest in nearly 150 years.
As anger rages across the country at the brutal killings of black and brown people, the climate movement must join the call to divest from the police and invest in communities.
"In moments of crisis, people want services and resources that go directly to help people rather than police that surveil, brutalize, and kill us."
Following a massive fuel spill in the Russian Arctic, the environmental NGO Greenpeace Russia reports that the ecological damage to bodies of water in the affected region alone could exceed six billion rubles ($86.3 million).€
"It's time for a #GreenRecovery: resilient, fair, sustainable economies that meet the climate crisis," declared Greenpeace's executive director.
"By recklessly buying billions in fossil fuel bonds the bank is propping up the single biggest obstacle to tackling the climate crisis."
In 2017 the Dutch ambassador to Nigeria, Robert Petri, leaked confidential information about an extensive corruption investigation into Shell to the oil company itself, NRC reports based on information revealed in an integrity investigation into Petri. The ambassador warned Shell that it was under investigation over bribery allegations.
The Forest Service is proposing to remove the prohibition against logging trees larger than 21 inches that grow in national forests on the eastside of the Cascades in Oregon. The probation was put into place when ecological studies demonstrated the critical importance of large-diameter old-growth trees to overall forest ecosystem function.
Changes in marine biodiversity—the variety and variability of life in the ocean—can be an early indicator of change, provided it's noticed. The U.S. Marine Biodiversity Observation Network (MBON) aims to ensure that scientists not only notice changes in biodiversity at locations around the nation, but also have the tools in place to better understand what these changes tell us about ocean health over time. But marine life doesn't know borders. That's why the U.S. network also supports international cooperation with other marine biodiversity networks, research institutions, governmental and non-governmental organizations and stakeholders around the world towards development of a truly global MBON.
"Surging billionaire wealth juxtaposed with the suffering and plight of millions undermines the social solidarity required for us to recover together in the years ahead."
Across the US, cities, especially fancy malls and outlets of major retail chains, are being busted into and ransacked, as police squad cars get flipped over and torched, in scenes not seen in the US since the mid to late 1960s.
Will we advance our unfinished revolution or will our spontaneous actions end in the acceptance of petty reforms and a return to the status quo?
The economic impact of the COVID-19 crisis on Latin America could be potentially devastating, according to a new Special Report by the UN’s Economic Commission for Latin America and the Caribbean (ECLAC). The report, based on the available data in mid-April, has estimated a -5.3 percent drop for the region’s GDP growth in 2020 — the largest in the region’s history. If this is the case, ECLAC calculates, 29 million more people would be pushed into poverty and 16 million more into extreme poverty, alongside a dramatic increase in inequality in what is already the most unequal region in the world.
It would be too simple to regard the latest space venture, funded by Elon Musk, as entirely a matter of vast ego and deeply-pocked adventurism. But it would be close. The successful delivery of astronauts Douglas Hurley and Robert Behnken of NASA as part of the joint mission with SpaceX to the International Space Station by the Dragon capsule proved intoxicating for followers and devotees. Behnken was himself keen on the idea of travelling into the heavens away from a messy, trouble-torn planet. “This is still something that we are going to be successful at, and we’re going to do it in the face of the pandemic.” Good of him to think so.
Which America will be ours after the pandemic?
In the summer of 1995, when I was 18, I started visiting Tent City, a temporary encampment in an abandoned lot in northeast Philadelphia. About 40 families had taken up residence in tents, shacks, and other makeshift structures. Among them were people of various races, ages, and sexual orientations, all homeless and fighting for the right to live.
In the middle of March, L., a 23-year-old culinary school graduate from the Philippines, was scrambling eggs in her kitchen when her supervisor called.
L. sensed trouble was coming. As part of the J-1 Exchange Visitor Program overseen by the U.S. Department of State, she had a job setting up the breakfast buffet at a luxury resort in Virginia. For weeks, as COVID-19 spread across the United States, she had noticed the guest count dropping on the white board in the kitchen.
Misclassification is a business model that depends on tax, insurance, and payroll fraud. It is an assault on a century of hard-won workers’ rights.
"This moment requires renewed and revitalized leadership across the country AND at the ballot box."
A vast protest of unprecedented scope and intensity has spread over the United States since the police assassination of George Floyd on May 25. The American people are aware of this and it requires no elaboration.
Is U.S. President actually using a calculated strategy that COVID-19 is not an equal-opportunity killer?
"The numbers of U.S. military security forces in D.C. right now is just ridiculous. This is pure intimidation. Trump is very afraid. The longer we stay in the streets, the more frightened he gets."
Donald Trump is a desperate man who knows his reelection prospects are narrowing. So he is determined to make a political issue of the upsurge in protest against police brutality and the failure of our criminal justice system.
I imagine that these are difficult days to be a professional soldier serving in the armed forces of the United States. As a long-ago soldier myself, I hope they are.
"Running this puts @nytimes' Black staff in danger."
Chinese artist Qianci (Twitter account @Cian_Ci) told Taiwan News that he created this illustration on June 4 as a personal commemoration of the bloody crackdown that took place in Beijing's Tiananmen Square exactly 31 years ago to the day. Qianci said that because the current Monument to the People's Heroes does not include recognition of the thousands who died that day, he decided to create his own revised version.
We are so hip here at Techdirt that we've been writing about Section 230 long before it was cool. But even though everyone and their President seems to be talking about it these days, and keen to change it, it does not seem like everyone necessarily knows what it actually says or does. Don't let this happen to you!
YouTube moderators have deleted a Russian campaign video that used homophobic humor to urge participation in an upcoming plebiscite on constitutional amendments. “This video has been removed for violating YouTube's policy on hate speech,” says a message where the video used to be accessible, followed by a hyperlink to the website’s policy on hate speech, which says the company removes content that promotes hatred against groups based on an array of attributes, including sexual orientation.€
The Jeddah-based cleric, who is a well-known propagator in the English language and who regularly appears on Saudi-owned religious satellite channel Huda TV, which is aimed at English speakers told his 161,500 followers that “It is not permissible to protest in Islam”.
Residents across the city gathered to commemorate the victims of China’s 1989 crackdown, despite a police ban. Hours earlier, the city made mocking China’s anthem a crime.
From 2016 through 2019, state lawmakers introduced ten bills that either made obstructing traffic on highways a misdemeanor or increased penalties for protesting near oil and gas facilities. Most of these legislative proposals were introduced in response to ongoing protests against a controversial oil pipeline as well as those following the police killing of Philando Castile in a St. Paul suburb in 2016. The bills would have allowed protesters to be jailed for up to a year, fined offenders up to $3,000 each, and allowed cities to sue protesters for the cost of police response. Many of the bills were introduced in 2017 after racial justice activists in the state made headlines shutting down a major highway. A couple others were in response to protests in 2016 and 2019 against the energy company Enbridge’s planned replacement of a pipeline running from Alberta to Wisconsin.
None of the bills have yet become law, but three failed only because they were vetoed by the governor. Two bills introduced earlier this year are still on the table. One would make trespassing on property with oil and gas facilities punishable by up to three years in prison and a $5,000 fine. The other would make those who assist such activity civilly liable for damages.
At least 63 professional journalists were killed doing their jobs in 2018, a 15 percent increase over last year, said the group, Reporters Without Borders. The number of deaths rises to 80 when all media workers and people classified as citizen journalists are included, it said in its annual report.
The world's five deadliest countries for journalists include three — India, Mexico and, for the first time, the United States — where journalists were killed in cold blood, even though those countries weren't at war or in conflict, the group said.
On Monday, June 1, the U.S. Second Circuit in New York substantially reversed a district court’s ruling on appeal in the case of the police killing of Kenneth Chamberlain, Sr., in which the lower court had found mainly for the defendants.
These tin soldiers are the violent, cowardly, bullying products of a dying empire, the death dreams of a sybaritic system breathing its last. They are America's Id.
The country is filled with so much anger and so much action – but, as far as I can see, so little leadership!
In light of the current protests across the country against racism and police brutality, we want to call attention to EFF’s attorney referral services. We are opening up our Cooperating Attorneys list to people facing legal troubles as a result of their participation in the ongoing demonstrations, especially those involving surveillance or devices such as phones. We urge anyone in such a position to contact us for help in finding representation.
Our referral list is comprised of hundreds of lawyers from around the nation who share an interest in our issues. Like EFF, the attorneys on this list focus on issues where technology and the law intersect, so we especially encourage those whose arrests involved digital rights issues to contact us. For instance, if you believe your phone’s contents were accessed and stored after arrest, or if you are a journalist being compelled to share your footage with law enforcement, we want to hear from you.
In a country founded on racism, real change must be deeply structural.
The life you save may not be your own. Those who wear a mask at protests are making clear that they're willing to undergo some discomfort to protect people they don't even know.
"Trump's going to call Biden a lefty no matter what, right? So let's energize our base, let's energize the middle. Let's do what's right."
"Essential workers are exempt from the curfew, and what we are doing here is essential."
The recent destruction of sacred Aboriginal sites in Western Australia by an Australian mining giant should outrage us all, writes Georgia McGrath.
In 2015, Minneapolis was one of six cities selected by Barack Obama’s Department of Justice to pilot a new kind of policing. Said to be grounded in rigorous social science research, the new initiative aimed “to build trust” between the police and the community being policed. The Minneapolis Police Department would undergo implicit bias training, wear body cameras, and practice mindfulness and “racial reconciliation” as part of a three-year, $4.75 million project tied to Obama’s “My Brother’s Keeper” campaign. The national reform program was described by then–Attorney General Eric Holder as “groundbreaking.”
On June 4, 1989, the Chinese military violently suppressed the protest movement of students and workers in Beijing’s Tiananmen Square. The protests had begun earlier that spring; at their peak, they may have included as many as 1 million people. To put an end to them, the government invaded Beijing with as many as 250,000 soldiers, supported by tanks and armored personnel carriers, who shot, bayoneted, and ran over civilians. Protesters resisted by building blockades along the road to Tiananmen Square, setting vehicles on fire, and fighting back with rocks and Molotov cocktails. But they were overwhelmed.
The Center for Democracy and Technology appears to be the first out of the gate in suing Donald Trump to block his silly executive order on Section 230. In the aftermath of the EO being issued I know some people wondered if it was actually worth suing over, since it actually did so little in practice. But, as I discussed in this week's podcast, it can still be used to create havoc.
The state-owned Russian Public Opinion Research Center (VTsIOM) has released the results of its most recent telephone survey on Russia’s upcoming constitutional plebiscite.
Days after Minneapolis police murdered George Floyd and sparked a rebellion, Minnesota Governor Tim Walz claimed state officials “assessed that up to 80 percent of those protesting or rioting came from outside Minnesota.” He suggested “far-right white supremacists” and “organized drug cartels” were responsible.
“We are now confronting white supremacists, members of organized crime, out-of-state instigators, and possibly even foreign actors to destroy and destabilize our city and our region,” Walz declared on May 29.
The fury of the anti-choice movement is always in Kwajelyn Jackson’s face.
Protesters stand outside of the Feminist Women’s Health Center in Atlanta, Georgia, where she works. They harass her doctors. They destroy clinic property. They break COVID-19 social distancing rules. They hound her patients, who are mostly poor and black or Hispanic.
Donald Trump, who has cratered in opinion polls this spring as the pandemic and the economic collapse have battered the U.S., is attempting to turn this past week’s explosion of political protest amid a deadly pandemic into his Reichstag fire moment.
During a virtual town hall event on Wednesday afternoon, former President Barack Obama discussed the need for police reform in the U.S., and support for protests across the country in the wake of the death of George Floyd last week.
When you tell people they won’t be held accountable for their actions, it almost always ends badly. That’s what’s happened with our police and our social media, two institutional pillars of personal and political society in America today. Removing those dual immunities could dramatically change—for the better—the lives of millions of Americans.
"If we are to change this pattern of violent racism, we need to fundamentally restructure our criminal justice system."
As Trump declares "law and order" clampdown against peaceful demonstrations, author and activist reminds people of most important lesson she's learned studying history of shock doctrine tactics.
"Sometimes, sitting by quietly and saying nothing is not an option," the International Crisis Group wrote.
The death of George Floyd at the hands of police in Minneapolis has drawn historic levels of interest in police misconduct and drawn condemnation from law enforcement leaders nationwide.
As a reporter covering law enforcement for the Asbury Park Press in New Jersey, and now in partnership with ProPublica’s Local Reporting Network, I use investigative reporting techniques to strengthen police accountability. Other journalists do the same. But, in truth, any citizen can apply the same methods to ensure the law enforcement system they’re funding is serving them well.
As Minnesota Attorney General Keith Ellison files charges against all four Minneapolis police officers involved in the killing of George Floyd, a mass uprising against police brutality continues. “At this point, we’re looking at a nation and a world that has decided that what we saw happen on camera … is no longer acceptable, and we cannot continue to meet and ask and cry and beg for change. People have taken to the streets to demand change,” says Tamika Mallory, former national co-chair of the 2017 Women’s March.
Mutual aid is flourishing in south Minneapolis, where the police killing of an unarmed Black man and a revolt against state violence has left a community hungry for connection and racial justice. The alleged murder of George Floyd and the ensuing powerful uprisings have made the need to forge material support networks among neighbors all the more apparent, say activists – and they are up to the challenge.
Protesters have continued to pour onto the streets of Washington, D.C., night after night, despite the city’s attempt to suppress protest through the deployment of the National Guard and the imposition of nightly curfews.
With protests sparked by the killing of George Floyd by Officer Derek Chauvin erupting all over the nation, states are beginning to ask the National Guard to step in. The epicenter of these demonstrations is Minneapolis, Minnesota, where the National Guard has already been deployed to handle protests and enforce the curfew.
We go to Louisville, where protesters are calling for charges against the officers involved in the death of Breonna Taylor, the 26-year-old African American woman who was an emergency room technician treating COVID patients and was shot to death by police inside her own apartment in March. This comes as the National Guard fired shots at a crowd of protesters on Monday, killing David McAtee, a local barbecue restaurant owner who regularly gave police officers free meals. We speak with Sadiqa Reynolds, president and CEO of Louisville Urban League.
We go to Louisville, where protesters are calling for charges against the officers involved in the death of Breonna Taylor, the 26-year-old African American woman who was an emergency room technician treating COVID patients and was shot to death by police inside her own apartment in March. This comes as the National Guard fired shots at a crowd of protesters on Monday, killing David McAtee, a local barbecue restaurant owner who regularly gave police officers free meals. We speak with Sadiqa Reynolds, president and CEO of Louisville Urban League.
Hearing the boat motor click off, she burrowed deep into her sleeping bag.
It was 4:30 a.m. one August morning in 2013 and they had been traveling for hours. Just Cathleen and the captain aboard a fishing boat little bigger than a minivan, now bobbing somewhere in Prince William Sound.
According to the poster, Gasland director Josh Fox, this arrest took place around 50th Street and Third Avenue, where on Wednesday at 9 p.m. police swarmed a peaceful demonstration that began two hours earlier with a 30-minute silent vigil in front of Gracie Mansion. Demonstrators marched south from the mayor’s Upper East Side residence, wending their way into midtown Manhattan. “Fuck your cur-few!” they chanted as 8 p.m. came and went. Signs read, “We See Police Get Away With Murder,” and “Defund the NYPD,” and “Resources, Not Police Forces!”
“It was [de Blasio’s] own Blackout Tuesday,” Patrick Bobilin, one of the vigil’s organizers, tells Rolling Stone of the curfew. “He blacked out our demands. They asked for an end to police violence — they got more police violence. People marched all night, they got a curfew. It shows an unwillingness to lead and an unwillingness to control police violence.”
A black man who called out “I can’t breathe” before dying in police custody in Tacoma, Wash., was killed as a result of oxygen deprivation and the physical restraint that was used on him, according to details of a medical examiner’s report released on Wednesday.
The Pierce County Medical Examiner’s Office concluded that the death of the man, Manuel Ellis, 33, was a homicide. Investigators with the Pierce County Sheriff’s Department were in the process of preparing a report about the March death, which occurred shortly after an arrest by officers from the Tacoma Police Department, said the sheriff’s spokesman, Ed Troyer.
More than 400 union workers, including Minneapolis postal workers, nurses, teachers, and hotel workers have signed the petition posted on the Facebook group Union Members for #JusticeForGeorgeFloyd pledging not to aid the policing of the protests with their labor, according to Adam Birch, a Minneapolis bus driver who wrote the petition.
The disturbing and tragic news of a 13-year-old Romina Ashrafi being beheaded with a sickle by her own father in Iran, described as an “honor killing,” has been circulating on the web. This news is indeed sad, but so is the killer not being punished in Iran under the misogynist laws of the mullahs’ regime.
Actions were organised in Bielefeld, Germany and Copenhagen to protest against Turkish racism and the murder of BarÃ±à Ÿ Ãâ¡akan.
Thursday marks the 31st anniversary of Tiananmen Massacre where hundreds, perhaps thousands died from the People’s Liberation Army crackdown on a student-led movement in Beijing on June 4, 1989. HKFP rounds up reactions from political leaders and activists as the Hong Kong authorities ban the annual vigil for the first time, citing Covid-19 regulations.
As China tightens its control over Hong Kong, activists in the city defied a police ban and broke through barricades Thursday evening to mark the 31st anniversary of the crushing of a democracy movement centered on Beijing’s Tiananmen Square.
With democracy all but snuffed out in mainland China, the focus has shifted increasingly to semi-autonomous Hong Kong, where authorities for the first time banned an annual candlelight vigil marking the anniversary of the 1989 crackdown.
White evangelicals remain some of Donald Trump’s most steadfast supporters. Their strong support for the president in the last election—roughly 81 percent voted for him—puzzled many liberals; they found it hypocritical for evangelicals to support someone whose lifestyle so egregiously contradicts their puritanical moralism. But the group that seemed most surprised was the evangelical leadership. Take Daniel Reid, former editor of InterVarsity Press, one of the major evangelical publishing houses: “How can Trump have gotten eighty-one percent? I don’t know a single person at InterVarsity who voted for Trump.” Mark Galli, the former editor-in-chief of Christianity Today—the flagship magazine of evangelical thought—echoed this sentiment last December in an editorial that called for Trump to be removed from office in light of the impeachment hearings. He and his colleagues had “done our best to give evangelical Trump supporters their due, to try to understand their point of view,” but no longer could. The problem with today’s evangelicals, said Galli in response to the negative reception of his editorial, is their “widespread ignorance” and “ethical naïveté.” Evangelical historian Thomas Kidd has even questioned their religious credentials: “I suspect that large numbers of these people who identify as ‘evangelicals’ are really just whites who watch Fox News and consider themselves religious.” When they do acknowledge that a significant amount of support exists, evangelical intellectuals like Galli are drawn to cultural explanations for the reactionary white populist surge that they claim has only recently overtaken their movement. The faithful, so the argument goes, avoid extremes when they attend church regularly and adhere to orthodox theology. When these practices break down, chaos and crisis await. The argument that the gospel can serve as a source of moderation in politics has a long tradition in religious thought. Had Catholic orthodoxy not been compromised by the medieval Church, the Reformation would have had little appeal. Had fin-de-siècle Europe not been swept over by a wave of secularization, workers would have continued to keep faith in paradise in another world, rather than putting their hopes in totalitarian regimes that promised paradise in this one. White evangelicals, according to this perspective, have substituted the real truth of the gospels for an exclusionary religious nationalism. The absence of a deeper theological and spiritual foundation contributes to a sense of grievance and resentment. For Never Trump evangelicals, this cultural drift explains the wide gulf that separates evangelical Protestant theology from the rank-and-file’s political beliefs. The moral failings of churches, then, are distinct from their central theological doctrines. But it’s harder than evangelical intellectuals think to separate religious doctrine and history from the problems of contemporary racist nationalism on the right. As far back as the founding moment of the United States, the evangelical movement has depended on the nation-state for its survival. Its salvific mission is deeply connected to a theology of exclusionary Christian nationalism.
What is evangelicalism? While it can prove difficult to find a simple definition for a global movement involving scores of denominations and ethnic groups, scholars and religious leaders today most often point to the “Bebbington Quadrilateral,” named for historian David Bebbington. In his 1989 book Evangelicalism in Modern Britain, Bebbington laid out four core principles: 1. Conversionism, or the belief that lives need to be transformed through a “born-again” experience and a lifelong process of following Jesus; 2. Activism, which expresses the gospel through missionary and social reform efforts; 3. Biblicism—a high regard for and obedience to the Bible as the ultimate authority; and 4. Crucicentrism, or a stress on the sacrifice of Jesus Christ on the cross for the redemption of humanity. While the Bebbington Quadrilateral has become the standard definition of evangelicalism, it offers little insight into why white evangelicals have been drawn to right-wing populism. The crisis in understanding only deepens when we learn that, according to some Pew polls, increased church attendance correlates with higher levels of support for Trump. Yet African-American evangelicals hold these exact same doctrinal beliefs and vote for the Democratic Party (as do many Latino evangelicals). This helps Never Trump evangelicals to avoid implicating theology, but it doesn’t help explain white evangelical support for the president. A historical approach to the relationship between doctrinal belief and political principle—political theology—can help make sense of these patterns.
In the long history of protest, governments have often sought to discredit political activists who challenge the status quo. President Donald Trump’s recent declaration, that “Antifa”—shorthand for “anti-fascist”—is a domestic terrorist organization, is no departure from this tradition. As protests continue to erupt around the country in response to the murder of George Floyd by a Minneapolis Police officer on May 25, people of all classes, races, genders, and political orientations are expressing outrage and grief in the streets and on social media. The demonstrators have been repeatedly and violently attacked by heavily militarized police departments using an array of tactics—including chemical weapons during a global pandemic—against people in the streets. In an effort to shift blame away from legitimate calls for racial justice and the violent police response to protests, the President is using his bully pulpit to obscure the fact that these demonstrations are supported by a broad majority of Americans.
[...]
While the Department of Justice (DOJ) can indict people on federal terrorism charges, no clear legal authority exists for the President to designate Antifa a “domestic terrorist organization.” Nevertheless, Attorney General William Barr quickly followed Trump’s declaration with an official statement announcing that the DOJ would use its existing network of 56 FBI Joint Terrorism Task Force (JTTF) offices to investigate Antifa. DOJ investigations will only serve to harass protesters and provide the state with additional means to prosecute political activists. The Trump administration’s threats are nothing more than political theater and an attempt to sow division and intimidate those who exercise their right to fight injustice.
“Trump’s declaration that Antifa is a domestic terrorist organization has no basis in fact or law and is merely an attempt to criminalize ordinary people who are exercising their right to protest,” said NLG Mass Defense Director Tyler Crawford. “The NLG condemns any such attempts by the government to interfere with the right of the people to have their voices heard in demanding justice for George Floyd and an end to racist police violence.”
The NLG will continue to oppose any attempts to exploit this crisis to repress political activism and social justice movements working to end to white supremacy. The Trump administration continues to ignore the ongoing injustice wrought on Black communities by institutional racism, including police brutality, in favor of seeking to physically or politically punish those who are part of anti-racist and anti-fascist movements. The NLG will continue to provide legal support to activists as they take to the streets to call for justice for George Floyd, from Minneapolis to Washington, D.C. and many other cities.
Spurred by the uprising in Minneapolis last week in response to the police killing of George Floyd, demonstrations took place in more than 75 cities over the weekend of May 29-31 as thousands of people protested to demand an end to racialized police violence and justice for Floyd, Breonna Taylor, Tony McDade, and so many others. National Lawyers Guild (NLG) Chapters across the country have mobilized to provide legal support to these people’s movements and will continue to do so for as long as necessary. As a grassroots organization led by volunteer members who take direction from movements on the ground, we remain committed to the struggle for Black lives and an end to white supremacy.
They’ll currently be chanting. Then there’s music and speeches and poetry and a lie-down. I’m not there. I wish I was there.
This is part of the Black Lives Matter protests going on around the world, because again a black man was murdered by police. His name was George Floyd. That was in Minneapolis; a couple of months ago Breonna Taylor, a black woman, was shot eight times by police in Louisville. Here in the UK black and minority ethnicity people die in police custody twice as much as others.
It’s 31 years to the day since the Tiananmen Square protests in China in which a man stood in front of a tank, and then he disappeared. Nobody even knows his name, or what happened to him.
A myth often pushed by incumbents who want to forestall universal fiber is that there is a high “cost” of fiber and cheaper alternatives. They’ll point to figures that for example show that a fiber-to-the home approach costs several thousands of dollars per household,€ when upgrading the copper DSL line or cable line can be done at a fraction of the price. They then use this argument for “cheaper” networks to advocate that government subsidies and public investments make a short-sighted focus on building networks with slow speeds, but broader coverage. But what they leave out is, despite the appearance of lower costs, they are in fact setting up these government programs for an exorbitant amount of waste—that translates into company profit— in the long run. If the government incentivizes building fast networks for the future, not just fast-enough for today, we will all save a lot of money over the long-term.€
Cable and DSL networks, absent the investment in fiber optics, are not getting any faster and are deteriorating after decades of use. EFF has written this technical analysis explaining in great detail why this is the case.€ In short, the capacity of those wires to transmit data have real world limits whereas fiber optic wires have a capacity that our network technology has not even begun to reach. In cable and DSL networks, copper wires can only carry so much data over so much distance. Any significant improvements in the future will involve replacing big sections of the copper cables with fiber optics. But for pure fiber networks, the limit on capacity isn’t the cables, it’s the transmitters and receivers at each end. Once the fiber is in place, we’ll be able to upgrade these networks for years to come without having to bury any new cables. Because of the massive capacity differences, there is a “speed chasm” between legacy networks and fiber networks. and this plays directly into the true costs of choosing to incrementally upgrade an old network or switching over to all fiber.€
On one end, you've got wireless carriers implying that 5G is some type of cancer curing miracle (it's not). On the other hand, we have oodles of conspiracy theorists, celebrities, and various grifters trying to claim 5G is some kind of rampant health menace (it's not). In reality, 5G's not actually interesting enough to warrant either position, but that's clearly not stopping anybody in the post-truth era.
With this in mind, one can see how the executive order is problematic, setting in motion a dangerous precedent both for the Internet and speech. The problem is that a lot of the provisions in this order appear to be what Stanford’s Director of Intermediary Liability, Daphne Keller, calls “atmospheric” – politically driven questions that should not be part of the legal debate related to the scope of intermediary liability protections. They constitute a distraction, which could cause a series of unintended consequences for the evolution of the Internet.
While conversations about the evolving scope of Section 230 are healthy, they should not be based on fashionable political motivations. Section 230 has a historical track record of promoting innovation and creativity online. By separating it from partisan politics, we can ensure that these benefits are retained.
The architecture of the Internet is changing. A novel expansive construction of communication and making available to the public has been shaking the Internet ecosystem. It reaches into basic online activities, such as linking. Departing from well-established international approaches, the Court of Justice of the European Union (CJEU) has recently decided a multitude of cases that redesigned the notion of communication to the public in the Internet, while discussing linking activities in particular. This jurisprudence stands against a fluid legal framework searching for the optimal allocation of intermediary liability of information service providers. [...]
Besides bringing back the EBCDIC to ASCII translation library, something else unexpected happened. While I was on YouTube, I came across a video that brought back memories of the early days of the Web.
How many of you remember a web hosting service called GeoCities?
This brings back memories as my flagship site (Horneker Online) got its start on GeoCities back in 1996 as a single page website about OS/2 (called "OS/2 Junction").
GeoCities was founded in 1994 by David Bohnett and John Rezner as a web hosting service where anyone who wanted a website on the Internet could build one. Websites hosted here were organized into neighborhoods based on the topic of websites, such as SiliconValley, Heartland, and MadisonAvenue.
My website there was placed in SiliconValley as it was a website about OS/2. (This was back in 1996, long before I started using Linux.) The URL for that site was http://www.geocities.com/SiliconValley/Heights/4301. The Wayback Machine at Internet Archive can be used to view websites that were on GeoCities back in the day.
Some neighborhoods got so large, sublets were introduced to further organize the location of websites hosted at GeoCities. On the filesystem used in GeoCities, sublets are nothing more than subdirectories contained with the directories assigned to the neighborhoods.
In a world largely of national laws with territorial jurisdiction and enforcement, the internet is a complicating factor. Online activities have the potential for instantaneous, global effects, implicating a variety of national legal regimes. Thus, as the internet becomes increasingly integral to much of our daily lives, conflict of law issues are certain to arise.
In Conflict of Laws and the Internet, Pedro de Miguel Asensio (Complutense University of Madrid, Spain) presents a thorough analysis of the fundamental issues of private international law regarding online activities. Presented in six chapters, the book explores a variety of legal concerns implicated by online activity, including the regulation of illegal material, the protection of personal data and personality rights, copyright law, trademarks and unfair competition, and online contracts.
In my read, the big upshot for current IP theory is O'Connor's view that the historic purpose of patents and copyright was "not to incentivize the authorship or invention of new things. Such creation had been taking place, often quite prodigiously, throughout human history." (2). Instead, it was to encourage sharing those things by transferring them from the private to the public sphere. "From at least Greco-Roman antiquity," O'Connor writes, "an important divide was acknowledged between the private and public spheres. An intentional act of publicare was required to transfer something from the private to the public." (2). He argues that this transfer would not occur without patents and copyrights.
Covalon Technologies Ltd. (the "Company" or "Covalon") (TSXV: COV; OTCQX: CVALF), an advanced medical technologies company, today announced that the Company has been granted key antimicrobial patents by the United States Patent and Trademark Office ("USPTO"), the Canadian Intellectual Property Office ("CIPO"), and the European Patent Office ("EPO").
Covalon's Antimicrobial Silicone-based Wound Dressing patent has been granted in the United States by the USPTO, in Canada by the CIPO, and in Europe by the EPO. This antimicrobial patent is integral to the Company's CovaClear€® platform technology and the Company's IV Clear€®, MediClear€® PreOp, and SurgiClear€® products.
HGF continues to remain fully operational at this time, with the majority of staff working remotely due to the ongoing situation regarding the COVID-19 outbreak.
The status of our offices can be found here and is updated on a daily basis. Please do not send any documents by post at this time as our UK offices continue to remain physically closed and we do not have guaranteed access to documents and correspondence sent by post. For all matters, please contact us by email or telephone. When sending us instructions always send a copy by email to docketing@hgf.com and ensure you receive a personal acknowledgement of receipt.
Official Intellectual Property offices in the jurisdictions in which HGF operates continue to remain fully operational at this time, but some are offering extensions to deadlines in order to support applicants and their attorneys who have been affected by the pandemic. We have provided an updated list of the specific situations below.
Three of the study's authors said they could not longer vouch for its veracity because Surgisphere, a healthcare firm behind the data, would not allow an independent review of its dataset.
A Twitter spokesperson told The Hill they received a complaint from a copyright owner of at least one of the images in the video, although it’s unclear which one. Harvard University's Lumen Database, a third-party research group Twitter uses to study cease and desist letters, reviewed the complaint and found it to be valid under the Digital Millennium Copyright Act.
"Today, three of the authors of the paper, 'Hydroxychloroquine or chloroquine with or without a macrolide for treatment of COVID-19: a multinational registry analysis', have retracted their study," the editors of The Lancet said in a statement Thursday. "They were unable to complete an independent audit of the data underpinning their analysis. As a result, they have concluded that they 'can no longer vouch for the veracity of the primary data sources.' The Lancet takes issues of scientific integrity extremely seriously, and there are many outstanding questions about Surgisphere and the data that were allegedly included in this study."
Moreover, the Broadcast and Telecommunications Legislative Review Panel, which Canadian Heritage Minister Steven Guilbeault plans to implement, recommended extending Canada’s broadcast regulatory framework to the Internet, including sites and services that aggregate the news. The panel referenced the broadcast standards panel, stating that it is part of a system used to suppress misinformation and manipulation. It continued with a recommendation that the “federal government introduce legislation with respect to liability of digital providers for harmful content and conduct using digital technologies, separate and apart from any responsibilities that may be imposed by communications legislation.” The fear then – and now – is that the recommendations would invariably lead to increased speech regulation online in keeping with its questionable conclusion that it is all part of the “Canadian broadcast system.”
Even a cursory review of just the headlines on our posts about YouTube's ContentID will demonstrate a theme. That theme mostly centers around how the automagic copyright detection system that YouTube put in place is mostly useful for creating collateral damage on non-infringing material, often times at the expense of the rightsholders themselves. Whenever this happens, there are usually apologies issued, blame cast on ContentID for the mistake, and then everything continues on with no changes made. Which is absurd. These situations identify a flaw in the ContentID system, or the use of an automated system of any kind, and yet we never do anything about it.
For many years, we've said that if the public library were invented today, the book publishers would sue it out of existence. It appears that the big book publishers have decided to prove me right, as they have decided to sue the Internet Archive for lending ebooks without a license.
Several Hollywood studios and Netflix have filed a complaint with Github over the pirate streaming app 'Movies Time'. The companies claim that the Microsoft-owned platform hosts not only the application itself but the website used for its distribution. In response, the operator of Movies Time has already taken evasive action.
A new survey published by Synamedia shows that more than half of all sports fans access pirated content at least once a month. On average, these pirates are more engaged than other sports fans. At the same time, however, the findings show that there are many different types of pirates, all with their own preferences and habits.
Over the past months, we’ve talked on the Creative Commons blog about the effect of the pandemic on science and education and asserted how important it is to share knowledge and culture as openly as possible, now more than ever. We also launched the Open COVID Pledge, a groundbreaking initiative founded on the idea that relevant scientific resources and intellectual property owned or developed in relation to COVID-19 should be made freely available to anyone in the world to use and build upon to end the pandemic.