Links 5/3/2021: Qubes OS 4.0.4 Release and Wine’s Project Leader is Open to Wayland

Posted in News Roundup at 9:22 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Linux Release Roundup #21.10: Nitrux 1.3.8, Steam Link, Flameshot 0.9, and More New Releases

      In the Linux Release Roundup series, we summarize the new application and distribution versions release in the last few days. This keeps you informed with the latest developments in the Linux world.

    • Linux Magazine

    • Audiocasts/Shows

    • Kernel Space

      • Don’t Try Or Use Linux 5.12-rc1

        Linus Torvalds has renamed Linux 5.12-rc1 to 5.12-rc1-dontuse in git and the release has been pulled from kernel.org due to an extremely unfortunate bug related to swap files, not swap partitions, that could cause random files to be overwritten with garbage data. You may want to revert to a previous kernel if you’ve already upgraded to Linux 5.12 rc1.

      • Updated Kernels Available

        The following kernels have been updated:

        longterm: 5.10.20 2021-03-04
        longterm: 5.4.102 2021-03-04
        longterm: 4.19.178 2021-03-04

        In addition the following firmware pkgs have been updated:


      • Torvalds warns the world: Don’t use the Linux 5.12-rc1 kernel

        As it turns out, when Linus Torvalds flags some code dontuse, he really means it—the problem with this 5.12 release candidate broke swapfile handling in a very unpleasant way. Specifically, the updated code would lose the proper offset pointing to the beginning of the swapfile. Again, in Torvalds’ own words, “swapping still happened, but it happened to the wrong part of the filesystem, with the obvious catastrophic end results.”

        If your imagination is insufficient, this means that when the kernel paged contents of memory out to disk, the data would land on random parts of the same disk and partition the swapfile lived on… not as files, mind you, but as garbage spewed directly to raw sectors on the disk. This means overwriting not only data in existing files, but also rather large chunks of metadata whose corruption would likely render the entire filesystem unmountable and unusable.


        This also leads into one of my own rather frequent warnings to fellow Linux users: don’t blindly leap ahead into cowboy code that hasn’t yet been sufficiently tested. Linux kernel release candidates are usually very, very solid, and it’s tempting to dive into new features as early as possible—but doing so can have very, very ugly consequences. And many of those consequences could have been avoided by waiting for the code to enter production status in the first place.

      • Graphics Stack

        • NVIDIA 470 Linux Driver Series To Be “Even More Wayland-Friendly”

          The next major NVIDIA driver series, the 470 release series, is slated to be “even more Wayland-friendly” but what all that encompasses remains to be seen.

          NVIDIA engineers already had confirmed that the DMA-BUF passing support will be in place for this major driver series. The NVIDIA DMA-BUF passing support is long overdue and should improve their Wayland compositor support will be part of the R470 driver series. This goes along nicely with NVIDIA working on proper XWayland support.

        • NVIDIA Vulkan Beta Driver 455.50.10 rolls out for Linux

          Need the absolute latest special fixes? The developer-focused NVIDIA Vulkan Beta Driver 455.50.10 has rolled out and it includes quite a few fixes – including some just for Linux.

        • Intel Tiger Lake Xe Graphics On Linux 5.12 Git, Mesa 21.1-devel – Phoronix

          Recently I wrapped up some tests looking at the Dell XPS Linux laptop with Core i7 1165G7 “Tiger Lake” processor when looking at the Linux kernel performance of 5.10 vs. 5.11 vs. 5.12 as well as the impact if upgrading to the Linux 5.12 kernel.

          In this quick article are some benchmarks looking at the Tiger Lake Xe Graphics performance with these newest open-source graphics driver components.

    • Applications

      • QBittorrent Support For BitTorrent 2.0 Is Looking Good

        BitTorrent 2.0, defined in BEP52 all the way back in January 2008, is a big upgrade to the existing BitTorrent protocol. It uses SHA-256 instead of the now very insecure SHA-1 hash algorithm, it has a much more efficient directory structure in the .torrent files and the pieces of files within a torrent are represented by merkle hash trees.

        One potentially fun advantage of the new .torrent file format is that individual files within a .torrent get their own hash. That could be used to participate in two or more public swarms if two or more torrents happen to contain the same file(s). There is no code for such a cross-leaching feature as of today, but is in theory quite possible.

        BitTorrent clients have been very slow to implement the new BitTorrent 2.0 protocol. libtorrent-rasterbar 2.0, released in October 2020, was the first widely used BitTorrent library to full support it and all its features.

        The popular qBittorrent client, available for macOS newer than High Sierra, Windows 7+ and Linux, is built on the libtorrent-rasterbar library. The latest stable v4.3.3 release from January 2021 uses libtorrent-rasterbar 1.2.

      • ytfzf – Search (With Thumbnails) And Play YouTube Videos From A Terminal

        ytfzf – search and play youtube with thumbnails from the command line
        ytfzf is a script to search, download and play YouTube videos by making use of mpv and youtube-dl under the hood. It works on Linux and macOS. The command line script had its first stable (1.0.0) release today.

        The tool initially started as a single line script, but has since evolved, recently gaining the ability to show YouTube thumbnails in the terminal, along with other enhancements.

        For each YouTube search query, a list of results in shown in the right-hand side pane. On the left-hand side you can see the selected video title, the channel that posted the video, the number of views, video duration, upload date, and the video thumbnail (which is optional).

        Use the Up and Down arrow keys to navigate through the search results, and press the Enter key to play the video (or download it, it ytfzf was started with the -d command line parameter). The videos are played using mpv by default, but you can change this with another video player, as long as it has the ability to launch YouTube links.

    • Instructionals/Technical

      • Use oathtool Linux command line for 2 step verification (2FA)

        I do not wish to use Google Authenticator or Authy app that generates 2 step verification (2FA) codes on my iOS/Android phone. Is there any way I can produce 2FA codes from Linux command line for popular sites such as Gmail, Twitter, Facebook, Amazon and more?

        The mobile apps generate secure 2 step verification codes to protect your online accounts from hackers (bad guys). You get an additional layer of security. In addition to your password, you need to input 2FA codes for each login. This page explains how to use oathtool OTPs (one-time password) on Linux to secure your Gmail and other online accounts. Instead of waiting for text messages, get verification codes for free from the oathtool Linux command.

      • How to install the NVIDIA drivers on AlmaLinux 8 – LinuxConfig.org

        In this article we will be perform an installation of the NVIDIA Driver on AlmaLinux. Nvidia driver is needed by your NVIDIA Graphics GPU to function with better performance. To do this we are first going to identify your NVIDIA graphic card, download an appropriate NVIDIA driver , disable the default nouveau driver by modifying the GRUB boot menu and finally install a official NVIDIA driver.

      • How to install Jenkins using a .war file on AWS EC2 Ubuntu 20.04 instance

        Jenkins is an open-source Continuous Integration and Continuous Deployment tool. It is an automation tool that helps build, test and deploy software reliably. It is written in Java and comes with hundreds of plugins. Jenkins also supports the distribution of work across multiple servers. It is very easy to configure Jenkins and get started with it. In this article, we will install Jenkins using the .war file in Apache Tomcat. We will use AWS EC2 Ubuntu 18.04 server to perform this activity. You can even use a Virtual Machine on your local machine or remote server with Ubuntu 18.04 on it.

      • How to install Attack on the Deathstar by freds72 on a Chromebook

        Today we are looking at how to install Attack on the Deathstar by freds72 on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • How to configure network settings with Ansible system roles | Enable Sysadmin

        This is the second article in series using Ansible system roles. In the previous article, I introduced you to Ansible and system roles and provided some examples. System roles help you manage OS-level tasks like SELinux, managing network settings, NTP, etc. In that article, you saw an example where you changed SELinux mode using system.role-selinux role. In this article, I look at the network role in detail so that you can modify the remote machine network connections with a single playbook.

      • How to Set Up Multi-Factor Authentication for SSH on Ubuntu 20.04

        SSH is a “Secure Shell Protocol” used to connect and manage remote Linux systems securely over an unsecured network. It is very useful for system administrators to perform day-to-day tasks on the remote server. So securing an SSH server is an essential part of any system administrator.

        By default, you can connect to SSH with a password or using the private key. That means, it is only a single factor authentication. So it is a good idea to implement multi-factor authentication in the SSH server to add an extra layer of security. In multi-factor authentication, you will need to provide your system user password and another password generated on a mobile device. This will significantly enhance your server’s security.

        In this tutorial, we will show you how to set up multi-factor authentication for SSH on Ubuntu 20.04 VPS.

      • How to Install and Use Nmap on Linux Mint 20

        Nmap is a very popular free and open-source network security tool and port scanner. It has been designed to perform security scans and discover hosts on a network by sending different packets to them and then analyzing their responses. In today’s tutorial, I will show you how to install and use Nmap on a Linux Mint 20 system.

      • How to Change the Icon Size in Default File Browser in Ubuntu | UbuntuHandbook

        The default size of files and folders in Nautilus file browser does not meet you need? It’s easy to change it in all current Ubuntu releases with Gnome.

        Though you can’t find how to configure it in the System Settings and Gnome Tweaks, Ubuntu do provide an option to set an even larger or smaller icon size, and here’s the quick tip shows you how.

      • How To Install PostgreSQL on Manjaro 20 – idroot

        In this tutorial, we will show you how to install PostgreSQL on Manjaro 20. For those of you who didn’t know, PostgreSQL is a relational database management system that provides an implementation of the SQL querying language. It’s standards-compliant and has many advanced features like reliable transactions and concurrency without reading locks.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of PostgreSQL on a Manjaro 20 (Nibia).

      • What is Kubernetes ?

        Kubernetes is an open source platform originally developed by Google. Today it is supported and developed by the Cloud Native Computing Foundation. With Kubernetes, containers can be orchestrated. The platform enables the simplification and the automated setup, provision, operation, scaling and maintenance of the containers. It is the basis for many cloud-native applications that consist of microservices.

        The platform works on a master-slave basis with a structure consisting of pods, nodes and clusters. Containers can be operated on physical or virtual computers. Kubernetes provides a technical basis for modern cloud-native applications consisting of many individual microservices.

      • Build a printer UI for Raspberry Pi with XML and Java | Opensource.com

        Creating a GUI from scratch is a very time consuming process, dealing with all the positions and alignments in hard code can be really tough for some programmers. In this article, I demonstrate how to speed up this process using XML.
        This project uses TotalCross as the target framework. TotalCross is an open source, cross-platform software development kit (SDK) developed to create GUIs for embedded devices faster. TotalCross provides Java’s development benefits without needing to run Java on a device because it uses its own bytecode and virtual machine (TC bytecode and TCVM) for performance enhancement.

        I also use Knowcode-XML, an open source XML parser for the TotalCross framework, which converts XML files into TotalCross components.

      • Fix “Implementation of the USB 2.0 controller not found!” VirtualBox Error
      • How to make a multiboot USB for All OS [ Complete Guide ] – Webleit.info

        Have you ever had to install different computers constantly and carry twenty flash drives, Linux, Windows, BSD and many more? Well today we will try to find an easy and pleasant solution to this problem! The software we will use is free and is called Ventoy. Ventoy is extremely easy to maintain as you will simply have to copy it to your flash drive without having to make millions of settings.

      • How to Use Tails Linux OS in VirtualBox Virtual Machine – Linux Shout

        Well, Debian-based Tails is not the Linux system that we can install on our PC like Windows or other Linux distros. Instead, it is a hardened Linux system meant to run in a Live environment via DVD or USB stick. So it offers extensive security. Here we learn the steps to set up, run and use Tails in VirtualBox Virtual Machine to learn and get familiar with it.

        The Tails Linux distribution is designed as a live system particular for data protection and anonymity on the Internet. We can easily write in on a USB drive using software such as Rufus or Etcher; or else burn it on a DVD. This makes it a portable Linux OS that a user can use on any system without leaving a trace behind or storing any data on the computer’s hard drive.

      • Pro tips to master any Linux admin task – TechRepublic

        Linux administrators need to be ready for any job that comes up in the daily routine of managing networks, servers and users. This collection of TechRepublic Premium downloads covers the basics of this job such as selecting the best admin GUI in addition to more complex tasks like how to configure networking on Linux servers.

      • The Top 5 Linux Courses for Developers, Cloud Engineers, and DevOps in 2021

        The world of technology is booming, and there is plenty to learn, especially for developers, cloud engineers, and devops. Add Linux to this list, and you will never fall short of options. There are a series of courses to choose from, all of which can be undertaken from the comfort of your home.

        Choose from a variety of options like Udemy, Coursera, and Pluralsight, amongst others. The best part: some of them even provide you a completion certificate, which you can publish on your LinkedIn profile, and even on your resume.

        Here are some of the best online Linux courses.

      • Installing latest syslog-ng on openSUSE, RHEL and other RPM distributions

        The syslog-ng application is included in all major Linux distributions, and you can usually install syslog-ng from the official repositories. If the core functionality of syslog-ng meets your needs, use the package in your distribution repository (yum install syslog-ng), and you can stop reading here. However, if you want to use the features of newer syslog-ng versions (for example, sending log messages to Elasticsearch or Apache Kafka), you have to either compile syslog-ng from source, or install it from unofficial repositories. This post explains you how to do that.

    • Wine or Emulation

      • Wine’s Project Leader Has Given A Blessing To The Wayland Effort

        Published last month was an updated but still experimental version of the native Wayland support for Wine after that code was originally published last year. One of the lingering questions has been around the prospects of mainlining this Wayland driver in Wine while last week the longtime Wine project leader, Alexandre Julliard, provided some clarity on the matter.

        The engineers at Collabora have been making good progress on the Wayland driver for Wine to allow Windows games/applications to run on Wayland without having to go through XWayland while in the ensuing discussion on the latest version of the patches were the prospects or requirements around getting it accepted upstream.

    • Games

      • Skullgirls: Annie goes up in Beta along with the Season Pass and a Linux support update | GamingOnLinux

        Ready to beat ‘em up? Get ready for a fight as Skullgirls 2nd Encore now has the Annie DLC available in Beta along with the Season Pass and Linux users can get in on the fun.

        Before getting into the thick of it, there’s some really good news to share on two fronts. Not only is Linux support continuing, with the Linux client up to date – they’ve also pulled in a new developer. Well, actually, it’s an old developer – sort of. They announced that Future Club, a co-op formed from the ashes of Lab Zero, has joined them on the development of Annie and the rest of the Season Pass. Perfect news if you’re a Skullgirls fan.

      • Griftlands from Klei Entertainment to arrive on Linux in May, full launch this Summer | GamingOnLinux

        Klei Entertainment creator of the popular Don’t Starve and Oxygen Not Included will be bringing their roguelite deck-builder Griftlands over to Linux in May ahead of the full release.

        “Griftlands is a deck-building rogue-like where you fight and negotiate your way through a broken-down sci-fi world. Every decision is important, be it the jobs you take, the friends you make, or the cards you collect. Death comes quickly, but each play offers new situations and strategies to explore.”

        Originally an Epic Store exclusive, it eventually made its way onto Steam a year or so later in June 2020. It’s still in Early Access and it seems they’ve managed to do well with it hitting an Overwhelmingly Positive user rating overall. They’ve now revealed their updated roadmap, which shows a full launch in the Summer along with a Linux supported build going up in May!

      • CaveExpress – classic 2D platformer with physics-based gameplay

        We’ve received tons of feedback asking for more exposure to Linux’s open source gaming scene. We’re always wanting to make Linux more glamorous, sexy, and attractive. Or it could be that work is sometimes not as exciting as playing an addictive game.

        CaveExpress is a classic 2D platform game set in prehistoric times. You play the hero masquerading as a caveman. Survival is paramount but there are beasties that want to change that. Dinosaurs, mammoths and giant fish to be precise.

        CaveExpress is published under an open source license and it’s cross-platform software.

      • mGBA | Game Boy Emulation on Linux

        I have received quite the number of comments about emulating the Game Boy on modern hardware and all the work that is going into it. I learned so much about the extensive community around emulating Game Boy games and the technology, research and absolute passion that goes into it. Though I was given many suggestions, the one that I settled on trying was mGBA. It appears that the latest version in the openSUSE repositories and on Flathub is 0.8.3, although, there seems to be a bit of discrepancy on what the change log says vs what the application itself says… not big deal. The latest release as of today is 0.8.4 which is available from the Snap Store. Since I am not emulating any of the more difficult games, the changes between the versions won’t likely affect my usage.

        I do recommend checking out this Gameboy Emulator Shootout Matrix from here. I will get to some more of these at some point but considering what is widely available, and I see that it is in the middle of the pack on the tests, this was a good place to start. I would also be interested in more feedback here, what should I try next and what should I specifically check out between the emulators.

      • Proton Has Enabled 7000 Windows Games to Run on Linux

        We are reaching another milestone with ProtonDB: we are very close to 7000 Windows games confirmed to be working out of the box with Proton on Linux.

        Proton has been receiving many updates in the past few months as well, with the introduction of the Soldier Linux runtime container and Proton Experimental on top of the regular Proton releases. We are still getting about 100 new titles working flawlessly (according to user reports) on a monthly basis, which is a very healthy and steady growth. Another point is the percentage of Windows games working out of the box in Proton over time. The number has been close to 50% since for a long time and seems to be fairly stable.

      • Brace yourself, Winter is coming to Crusader Kings III | GamingOnLinux

        As if you didn’t have enough problems with backstabbers, finding someone to marry and keeping your kingdom together – winter is coming to Crusader Kings III in the 1.3 update.

        This will be a free update for everyone that drops along side the first DLC. While there’s no date, we should find out a little bit more when the Paradox Insider event happens on March 13. Fear not though, we’ll keep an eye out for any interesting announcements and let you know after the event.

        When it comes to winter, snow will be heading to Crusader Kings III making the already difficult world much harsher overall. The map will gradually get covered in snow and Paradox said their system is pretty flexible so they can control where it flows. It’s not just a cosmetic change though and does a few interesting things. For starters, there’s going to be variants of it like mild and harsh winters, including visual effects to show the differences.

      • Political strategy game Rogue State Revolution gets a demo and a release date

        Rogue State Revolution from LRDGames, Inc. (Deep Sixed, Precipice) and publisher Modern Wolf is an upcoming challenging roguelike geopolitical thriller strategy game. In the game you take control of the presidency and rebuild, reform and prepare for new challenges as the Glorious People’s Republic of Basenji becomes a new political, economic and cultural hotspot.

        The developer just announced it’s going to release on March 18 with full Linux support.

      • plus-x is a simple tool to help developers on Windows set Linux permissions for games | GamingOnLinux

        Here’s a small and very useful sounding application from game developer Cheeseness. It’s called plus-x and the aim is to allow developers on Windows to set the correct permissions on Linux executables.

        The problem: when game developers put out a Linux build and then zip it up for download, Linux users download it and then often need to manually set permissions on the executable for it to be launched. plus-x gets around that by allowing developers to inspect the package and then set the correct permissions.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

      • GNOME Desktop/GTK

        • António Fernandes: Files 40.beta: More productivity and some eye candy

          Development of the nautilus project has picked up the pace for version 40, thanks to contributions from multiple people, new and old contributors alike.

          I’ve previously blogged about the new Creation date property and the enhanced Wallpaper action, and this time I’m talking about changes which have made it into the beta or are set for the final release. There is a mix of enhancements, bug fixes and redesigns. And lot of screenshots.


          New feature alert!!
          I just wrapped up with my Outreachy internship at the GNOME foundation and I’m very excited to say it’s now possible to “reserve” and “upload” a translation module, directly from the GNOME Translation Editor. However, these changes are yet to be added to the master branch; definitely after the string freeze. There are still a number of UI/UX improvements that need to be done but it’s functional.
          As with every new version, there’s always room for improvement so don’t hesitate to provide feedback.

    • Distributions

      • New Releases

        • Qubes OS 4.0.4 has been released!

          We’re pleased to announce the release of Qubes OS 4.0.4! This is the fourth stable release of Qubes 4.0.

        • XSAs released on 2021-03-04

          The Xen Project released one or more new Xen Security Advisories (XSAs) on 2021-03-04. The security of Qubes OS is not affected by these XSAs. Therefore, no user action is required.

      • BSD

        • NomadBSD 1.4 Release Brings A New GUI to Easily Install Browsers & Other Important Improvements

          NomadBSD is an open-source persistent live system for USB flash drives, this means that one can run this operating system on a USB flash drive and any changes done to the system will be saved and won’t be lost when it is booted the next time. It is based on the popular open-source operating system “FreeBSD“.

          The team behind the development of the operating system have announced the release of “NomadBSD 1.4”. It is based on “FreeBSD 12.2-p4”, this has allowed for enhanced support for trackpads, automatic graphics driver detection and more with this release.


          The release fixes a bug where booting the operating system in UEFI mode would cause issues.

          A new GUI (Graphical User Interface) has been added to the operating system that makes it easy to install software like Linux Chrome, Brave, Vivaldi, Netflix, Spotify and more.

          Also, i386 support for accelerated graphics for Intel and ATI/AMD cards has been dropped due to a legacy DRM driver becoming obsolete.

          For a more detailed outlook of the changes, you can read the official release notes.

      • Screenshots/Screencasts

      • PCLinuxOS/Mageia/Mandriva/OpenMandriva Family

        • Two Nice Discoveries on PCLinuxOS 2021

          Today I bought a wireless mouse. Truth be told, I did it because, long ago, I had read that Linux had problems running such devices and I wanted to experiment.

          I had booted my laptop with PCLinuxOS and, in my ignorance, I got ready to struggle with Bluetooth to configure it. I placed the batteries and plugged in the USB connector. That was all it took for PCLinuxOS to start using the device correctly, he, he. No struggle whatsoever.

          Then I remembered that I could no longer type in Japanese using PCLinuxOS because iBus simply would not be displayed in the task bar (even after a correct installation of all the packages). So, I decided to tinker a bit to see if I could get Japanese IME to function once again.

          All I did was to go to the PCLOS control center, System, Manage localization and, once there, select iBus after choosing the language. A message asked me to restart the session, so I logged out and back in.

          But the iBus icon was not in the task bar. I looked in the menu and found “run iBus,” so I ran it. Still, no icon in the task bar.

      • IBM/Red Hat/Fedora

        • CentOS 7 – Ah ah ah stayin’ alive (in 2021)

          I have to admit I was sad to read about the upcoming and early demise of CentOS 8. As soon as I saw the announcement, I remembered the two instances of CentOS installed on my test laptop, 7 and 8, sitting side by side in a lovely, complex eight-boot setup. Both are heavily tweaked systems, used in the desktop fashion, offering stability and fun in the home environment that were never intended from this server distro. And as it turns out, CentOS 7 will outlive the newer version by a long mile, or furlong if you will.

          So I thought, well, how relevant can CentOS 7 be in the coming years? After all, it’s a good few years behind CentOS 8 software wise. And here, I want to take a purely home use approach. I do not want to discuss or debate the actual announcement or the impact this has on the wider IT industry. I want to see if CentOS 7 is still a viable choice for desktop use, should you decide to put it on your PC or laptop. After me.


          I am surprised not surprised by own experience. I knew CentOS is rock solid, and I didn’t expect any complications, but the results surpass my own expectations. I guess I’ve been removed from the good ole stuff for too long to remember and appreciate the steadfast simplicity from the heyday of the desktop – roughly the first half of the past decade. And if I think more deeply about it, CentOS 7 actually has a wider collection of software available than its successor, as lots of the stuff, even in RPM Fusion and EPEL, didn’t make it into CentOS 8. Like LyX. The one thing I’m missing here is Plasma 5, so maybe I will actually hassle myself up to get this working all nice and proper like, just for fun.

          But there you have it, a coincidental mini-review of an old distro that keeps on giving. Good stuff, excellent functionality and stability, modern, up-to-date software of all sorts and kinds, a beautiful, elegant, fast desktop despite its inherent shortcomings, and still some four years left on the clock. Makes me feel a bit less sad about CentOS 8. Just a little.

        • Siemens, IBM, Red Hat Launch Hybrid Cloud Initiative to Increase Real-time Value of Industrial IoT Data

          Siemens, IBM and Red Hat today announced a new collaboration that will use a hybrid cloud designed to deliver an open, flexible and more secure solution for manufacturers and plant operators to drive real-time value from operational data. In one month, a single manufacturing site can generate more than 2,200 terabytes of data according to a report by IBM – yet most data goes unanalyzed.

          Through the joint initiative, Siemens Digital Industries Software will apply IBM’s open hybrid cloud approach, built on Red Hat OpenShift, to extend the deployment flexibility of MindSphere®, the industrial IoT as a service solution from Siemens. This will enable customers to run MindSphere on-premise, unlocking speed and agility in factory and plant operations, as well as through the cloud for seamless product support, updates and enterprise connectivity.

        • IT leaders see open source as higher quality

          While enterprises believe open source software provides benefits including higher quality software and innovations, they also perceive barriers to adoption including levels of support and compatibility, according to a Red Hat report assessing enterprise open source usage.

          Curiously, security shows up as both a positive and negative in the report, with open source seen as offering better security but the security of the code seen as a barrier. Released on March 2, the 2021 State of Enterprise Open Source report covers data collected from interviews with 1,250 IT leaders worldwide, who were not necessarily Red Hat customers, Red Hat said.

        • Operators over easy: an introduction to Kubernetes Operators

          You’ve probably been hearing a lot about Kubernetes Operators, but if you don’t work directly with Red Hat OpenShift or another Kubernetes distribution you may not know precisely what an Operator is. In this post, we’ll explain what Operators are and why they’re important.

          To better understand the “what” and the “how” about Kubernetes Operators, we need to understand the problem(s) that motivated the need for Kubernetes Operators.

          Kubernetes is notorious in its ability to integrate and facilitate declarative configuration and automation. This was out-of-the-box manageable for most stateless applications. However, for stateful applications this was a bit problematic. How do you manage and persist the state of your application and it’s dependencies? How do you keep the rest of your application going when you add or remove dependencies? Of course, much of this management was done manually and/or required additional personnel resources to help manage (i.e., DevOps) and, in general, required more of your attention.

          Much of these pains, boiled down to one ultimate question at hand: How do you effectively automate stateful applications on Kubernetes?

          That answer came in the form of what we call Kubernetes Operators.

        • Friday’s Fedora Facts: 2021-09

          Here’s your weekly Fedora report. Read what happened this week and what’s coming up. Your contributions are welcome (see the end of the post)! The Beta freeze is underway. The Fedora Linux 34 Beta Go/No-Go meeting is Thursday.

          I have weekly office hours on Wednesdays in the morning and afternoon (US/Eastern time) in #fedora-meeting-1. Drop by if you have any questions or comments about the schedule, Changes, elections, or anything else. See the upcoming meetings for more information.

        • Colin Walters: Why I work on OpenShift and Fedora/RHEL

          Every weekday for many years now I’ve woken up, dropped my kids off at school, then grabbed a coffee and sat down at my computer to work on OpenShift and Fedora+RHEL.

          Doing this for so long, over time I’ve thought about and refined the why I do this, and I want to write it down so that I can refer to this in various places. Some of this is a more condensed/rephrased variant of this blog post.

          I was inspired to be here originally (over 20 years ago) by the Free Software movement – one thing in particular I remember is seeing the Emacs start screen linking to the FSF website on our school’s Solaris workstations (In app advertisement worked!). Along with that, one thing I always found fascinating about software in general is the feeling of “the power of creation” – I can type something and make it happen.

          Since then, software has become much, much more foundational to our society (in some cases, probably too much re: social media, etc). In particular here the rise of software-as-a-service and the public clouds. And while we say “public” which has connotations of “openness” – these are all very proprietary clouds.

      • Canonical/Ubuntu Family

        • Ubuntu 21.04 To Offer GNOME 40 Apps with GNOME 3.38 Desktop

          Ubuntu 21.04 is probably not the most exciting release for some after they decided not to include GNOME 40.

          Of course, that could be a good thing for some users as well.

          However, it looks like even though you won’t get the GNOME 40 desktop experience, you might get the chance to utilize GNOME 40 default applications on top of GNOME 3.38 desktop.

        • Ubuntu Blog: Code the future together using Ubuntu

          Described by the organisers as an event made by developers for developers, CodeMotion is an event that we love to attend. In November last year, we announced that Ubuntu wanted to code the future of Italy and we joined CodeMotion 2020, with a session about MicroK8s and Kubeflow as the necessary tools to build an environment for any artificial intelligence project. This year, Canonical and Ubuntu will also be present for the Italian event.

        • Simos Xenitellis: How to compile lxd-p2c to migrate physical servers to LXD containers

          The lxd-p2c utility helps you to migrate your physical servers to LXD containers. Dan Mac Donald wrote a tutorial with practical instructions on how to perform such a migration. There has been a recent discussion on compiling lxd-p2c and I am summarizing here.

          You would run lxd-p2c on a physical server that is to be migrated to a LXD container. It is preferable to avoid compiling it on that physical server, but rather use a static binary of the executable. By doing so, the executable would not have any dependencies for the system libraries of the physical server. You would just need to have the correct architecture (such as amd64 or i386).

          You can either compile lxd-p2c statically yourself, or grab a pre-compiled static binary from the output of Github Actions. Select which alternative is suitable for you.

        • Fourty [sic] Years On

          On Christmas day 1981 I awoke with the usual excitement of any 9 year old boy. I clearly remember going downstairs and being told not to go into the lounge because my Dad was busy setting up my main Christmas present. In those days we’d get a main present and some other smaller presents. My parents weren’t well off, we lived in a typical 3 bedroom semi in Southern England and got by as best we could.

          After breakfast in the kitchen we were eventually allowed to go into the lounge to open some presents. What greeted me was the device that propelled me into the world of computing. My parents has bought me a Sinclair ZX81.

          The reason we weren’t allowed into the lounge was because my Dad had got up early to go and set it up, connecting it to the family TV. He spent most of the early morning typing in some code from a manual or magazine (I forget which) so I’d have something to play with right away.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Web Browsers

        • Chromium

          • Chromium Is Moving To A 4-Week Release Cycle In Q3 2021

            Google, the company in control of the Chromium web browser codebase used as a basis for Chromium, Microsoft Edge, the Brave Web Browser and many, many more, feels confident enough in their testing and release processes to cut the release-cycle for new major Chromium releases down from six to four weeks.

            The new release-schedule will go into effect starting with Chromium 94 in Q3 2021. Google will begin offering “Extended Stable” releases with an eight week release-cycle for developers using the Chromium codebase and enterprise-customers using the proprietary Google Chrome product. The “Extended Stable” branch will receive security-updates on a bi-weekly schedule.

            Mozilla Firefox has had a four-week release-cycle since 2019. Mozilla Firefox is currently at version 86, the latest stable Chrome/Chromium release is currently at version 89. It is an odd coincidence that Firefox would have overtaken Chrome/Chromium and gotten the higher version number if it were not for this sudden change in Chromiums release-cycle.

          • Chrome release cycle accelerated to four-weekly frenzy

            The Chromium crew has revved its engines and decided it will soon emit a new stable release every four weeks and create a new type of release for those who are built for comfort rather than speed.

            “For more than a decade, Chrome has shipped a new milestone every six weeks,” opens a post by Alex Mineer, technical program manager for Chrome operations.

            “As we have improved our testing and release processes for Chrome, and deployed bi-weekly security updates to improve our patch gap, it became clear that we could shorten our release cycle and deliver new features more quickly.”

      • Education

        • 5 useful Moodle plugins to engage students

          A good e-learning platform is important for education all over the world. Teachers need a way to hold classes, students need a friendly user interface to facilitate learning, and administrators need a way to monitor the educational system’s effectiveness.

          Moodle is an open source software package that allows you to create a private website with interactive online courses. It’s helping people gather virtually, teach and learn from one another, and stay organized while doing it.

          What makes Moodle unique is its high usability that can significantly increase with third-party solutions. If you visit the Moodle plugins directory, you’ll find over 1,700 plugins developed by the open source community.

          Picking the best plugins for your learners might be a challenge with so many choices. To help get you started, here my top five plugins to add to your e-learning platform.

      • FSFE

        • 20 Years FSFE: Interview with Reinhard Müller

          Reinhard Müller claims that his T-shirt folding capabilities are legendary. Without denying this fact, anyone who has worked with Reinhard on behalf of the FSFE can confirm that his dedication to Free Software and the FSFE is legendary as well. Reinhard joined the FSFE as a volunteer in its first year and met in person with the volunteers behind the FSFE’s very first booth at FOSDEM in 2002. In the years following, Reinhard held many different positions inside the FSFE community. Reinhard became a founding member of the Austria country team, joined the FSFE’s General Assembly as an official member and even helped to run the organisation for several years as Financial Officer and part of the FSFE’s Executive Council. In all these positions Reinhard helped shape the organisation of the FSFE and still does, so much that many people are surprised when they hear that Reinhard is a volunteer and not a paid staffer of the FSFE.

      • FSF

        • GNU Projects

          • This Week In Security: Text Rendering On Windows, GNU Poke, And Bitsquatting | Hackaday

            The good folks at GNU have minted the 1.0 release of poke, a new binary editing tool. The real killer feature of poke is that it can interpret binary data, decoding it back into readable data structures. If you’re familiar with the way Wireshark can decode packets and give useful, organized output, it seems that poke will provide a similar function, but not limited to network traffic.

            It looks like it could become a useful tool for getting a look inside otherwise opaque binaries. What poke brings is a system where you can write pretty-printing templates on the fly, which should be very useful when mapping out an unfamiliar binary. Distros will likely pick up and start packaging poke in the coming weeks, making it even easier to get and play with.

      • Programming/Development

        • Ubuntu Makes Flutter ‘Default Choice’ for Future Desktop Apps

          Flutter is the default choice for future mobile and desktop apps created by Canonical.

          Google’s open-source and cross-platform UI making framework continues to grow in popularity, particularly among web devs looking for an easy “in” to mobile and desktop app development.

          Flutter is underpinned by the Dart programming language, but the desktop SDK (which is now available as a stable release) means there’s plenty of support for crafting pseudo-native software that integrates with the underlying desktop OS.

        • How to Build Your Own React Hooks: A Step-by-Step Guide

          Custom React hooks are an essential tool that let you add special, unique functionality to your React applications.

          In many cases, if you want to add a certain feature to your application, you can simply install a third-party library that is made to solve your problem. But if such a library or hook doesn’t exist, what do you do?

          As a React developer, it’s important to learn the process of creating custom hooks to solve problems or add missing features within your own React projects.

          In this step-by-step guide, I will show you how to create your own custom React hooks by breaking down three hooks I’ve made for my own applications, along with what problems they were created to solve.

        • Python

          • What Python’s new pattern matching can do for you | InfoWorld

            Python, for all its power and popularity, has long lacked a form of flow control found in other languages—a way to take a value and match it elegantly against one of a number of possible conditions. In C and C++, it’s the switch/case construction; in Rust, it’s called “pattern matching.”

            The traditional ways to do this in Python aren’t elegant. One is to write an if/elif/else chain of expressions. The other is to store values to match as keys in a dictionary, then use the values to take an action—e.g., store a function as a value and use the key or some other variable as input. In many cases this works well, but can be cumbersome to construct and maintain.

          • PyTorch 1.8 Release, including Compiler and Distributed Training updates, and New Mobile Tutorials

            We are excited to announce the availability of PyTorch 1.8. This release is composed of more than 3,000 commits since 1.7. It includes major updates and new features for compilation, code optimization, frontend APIs for scientific computing, and AMD ROCm support through binaries that are available via pytorch.org. It also provides improved features for large-scale training for pipeline and model parallelism, and gradient compression.

          • PyTorch 1.8 Released With AMD ROCm Binaries – Phoronix

            PyTorch 1.8 was released on Thursday as the newest version of this widely-used machine learning library. Exciting many will be easier AMD Radeon ROCm support with Python wheels now provided for that Radeon Open eCosystem support.

  • Leftovers

    • How Pelé Sold Out

      Pelé’s public image has become something of a sad joke in recent years. He is the embodiment of the commercialization soccer has undergone since the first World Cup television broadcasts in the 1950s, when he became the sport’s first global icon. “A perfect representation of his current persona: nothing more than a walking billboard,” Zito Madu wrote in 2015 for SB Nation. When he was enlisted as a brand ambassador for Subway in 2013, Pelé not only recorded commercials but also posed for pictures behind some of its sandwich counters and dressed up for a Premier League game wearing a necktie with the fast food chain’s colors and two branded enamel pins. A BBC journalist wrote around that time that scoring an interview with him “usually means turning up at a fast food restaurant or bank to be met by an ever-smiling Pelé dressed in the colours and logos of his sponsors.” Just months before the Subway ad blitz, he was reportedly suffering from kidney stones and urinary infections, attached to a dialysis machine in an intensive care unit of a Brazilian hospital.

    • Opinion | Banksy Does Oscar Wilde
    • Postcard From the Ancestors
    • Fire Suppression Hyperbole

      We hear that 100 years of fire suppression has contributed to the “unnatural” accumulation of fuels and is one of the primary reasons for large fires.

      The solution, we are told, is to do more thinning/logging to remove “excess” fuels (or raking if you are former President Trump).

    • Health/Nutrition

    • Integrity/Availability

      • Proprietary

        • Three Top Russian Cybercrime Forums Hacked

          Over the past few weeks, three of the longest running and most venerated Russian-language online forums serving thousands of experienced cybercriminals have been hacked. In two of the intrusions, the attackers made off with the forums’ user databases, including email and Internet addresses and hashed passwords. Members of all three forums are worried the incidents could serve as a virtual Rosetta Stone for connecting the real-life identities of the same users across multiple crime forums.

        • US Navy On The Hook For ‘Pirating’ German Company’s Software

          A couple of years ago, we discussed the somewhat ironic story of a German software company suing the United States Navy for pirating its software. The initial story was a bit messy, but essentially the Navy tested out Bitmanagement’s software and liked it well enough that it wanted to push the software out to hundreds of thousands of computers. After Bitmanagement sued for hundreds of millions of dollars as a result, the Navy pointed out that it had bought concurrent use licenses through a third party reseller. While Bitmanagement pointed out that it didn’t authorize that kind of license itself, the court at the time noted that without a contractual arrangement between the company and the Navy, the Navy had an implied license for concurrent users and dismissed the case.

        • Pseudo-Open Source

          • Openwashing

            • Ever wondered why the big beasts in software all suddenly slapped an ‘I heart open-source’ badge on?

              A shift within the enterprise to open source is gathering pace due less to total cost of ownership and more to innovations around infrastructure and container technologies, according to a new report.

              The survey, based on interviews with 1,250 IT leaders (unaware that it was Red Hat sponsoring the activity) found 64 per cent of respondents citing “infrastructure modernisation” as the top use for enterprise open source (up from 53 per cent two years ago) with application development and the nebulous “digital transformation” coming second and third respectively.

              Almost half of respondents had container technologies (such as Kubernetes) in production and another 37 per cent were using containers for development.

              It all seems a little fast-moving for the traditionally lethargic world of enterprise technology.

        • Security

          • Security updates for Friday

            Security updates have been issued by Fedora (389-ds-base, dogtag-pki, dpdk, freeipa, isync, openvswitch, pki-core, and screen), Mageia (bind, chromium-browser-stable, gnome-autoar, jasper, openldap, openssl and compat-openssl10, screen, webkit2, and xpdf), Oracle (grub2), Red Hat (java-1.7.1-ibm, java-1.8.0-ibm, nodejs:10, and nodejs:12), SUSE (freeradius-server), and Ubuntu (wpa).

          • Reproducible Builds: Reproducible Builds in February 2021

            Welcome to the report from the Reproducible Builds project for February 2021. In our monthly reports, we try to outline the most important things that have happened in the world of reproducible builds. If you are interested in contributing to the project, though, please visit our Contribute page on our website.


            A few days earlier, Eric Brewer, Rob Pike, Abhishek Arya, Anne Bertucio and Kim Lewandowski wrote a post on the Google Security Blog proposing an industry-wide framework they call “Know, Prevent, Fix” which aims to improve how the industry might think about vulnerabilities in open source software, including “Consensus on metadata and identity standards” and — more relevant to the Reproducible Builds project — “Increased transparency and review for critical software”…

          • The Hijacking of Perl.com

            For a week we lost control of the Perl.com domain. Now that the incident has died down, we can explain some of what happened and how we handled it. This incident only affected the domain ownership of Perl.com and there was no other compromise of community resources. This website was still there, but DNS was handing out different IP numbers.

            First, this wasn’t an issue of not renewing the domain. That would have been a better situation for us because there’s a grace period.

            Second, to be very clear, I’m just an editor for the website that uses the Perl.com domain. This means that I’m not actually the “injured party” in legal terms. Tom Christiansen is the domain registrant, and should legal matters progress, there’s no reason for me, nor anyone else, to know all of the details. However, I’ve talked to many of the people involved in the process.

          • Privacy/Surveillance

            • China’s Sharp Eyes CCTV surveillance program redefines the Neighborhood Watch

              Dave Gershgorn described the Neighborhood Watch aspect of the Sharp Eyes Project on OneZero:

            • Data Leaks Found on Android and iOS Apps Stored in Cloud

              If there were ever a compelling season to not trust third-party app developers with your data, it’s this. A mobile security firm has found data leaks from thousands of third-party Android and iOS apps through cloud storage. Data Leaks Discovered It would be great to say this is stunning news, but it’s not. It’s really not all that surprising that user data was leaked while unsuspecting mobile users continued to set up their many accounts.

    • Defence/Aggression

      • Senators Move to Repeal Some Presidential War Powers After Airstrikes in Syria
      • The Pentagon, First, Last, and Always

        Keep in mind that our democracy is suffering as well. After all, former president Donald Trump incited an insurrection when he wasn’t able to win at the polls, an assault on the Capitol in which military veterans were overrepresented among those committed to reversing the election results (and endangering legislators as well). If you want a mood-of-the-moment fact, consider this: even after Joe Biden’s election, QAnon followers continued to insist that Trump could still be inaugurated to his second term in office. Addressing economic and political instability at home will take significant resources and focus, including calling to account those who so grossly mishandled the country’s pandemic response and stoked the big lie of questioning the legitimacy of Biden’s election victory.

        If, however, you weren’t out here in the real world, but in there where the national security elite exists, you’d find that the chatter would involve few of the problems just mentioned. And only in our world would such a stance seem remarkably disconnected from reality. In their world, the “crisis” part of the present financial crisis is a fear, based on widespread rumors and reports about the Biden budget to come, that the Pentagon’s funding might actually get, if not a genuine haircut, then at least a trim — something largely unheard of in the twenty-first century.

      • Opinion | Marshall Islanders Remember “Castle Bravo” Nuclear Bomb with Honolulu Veterans and Supporters

        The Honolulu remembrance was part of the Golden Rule Project’s educational program about the growing danger of nuclear war, and the great damage that has already been done by nuclear weapons.  

      • Opinion | Wait, Don’t Tell Me: The Capitol Riot Was Yet Another “Intelligence Failure”

        This is Washington’s go-to excuse for basic failures of policy, but we should not tolerate it any longer.

      • Berlin Bulletin: Surprise on the Left!

        The surprise was rather that the bitter, possibly fatal inner conflicts, greatly feared by some, greatly desired by others, simply did not happen. Unlike the angry quarrels, hostility and near split-ups which troubled some earlier congresses, this time there was an amiable, friendly atmosphere throughout.

        No surprise, at least for most members, was the choice of new party leaders. Their predecessors stepped down as required after two four-year terms (plus extra months due to the postponements). Only outsiders may have been surprised that both new co-chairs were women, which was new.

      • Aurora Police Killed Without Consequence, Now Their Protestors Face 48 Years for “Kidnapping” Cops

        Elijah McClain would have turned 25 last week. However, in 2019, the introverted Black massage therapist was killed on the street by police in his native Aurora (a part of the Denver metropolitan area). None of the officers involved have faced charges for the incident. Yet the leaders of mass protests against the killing are now facing up to 48 years in prison on a host of charges they see as retaliation for standing up to police power.

    • Environment

    • Finance

      • The Decades-Long Struggle Over Big Corporations and Poverty Wages

        This is just the latest battle in a struggle over big business wage practices that goes back decades. There was a time when landing a job with a large corporation was, even for blue collar workers, a ticket to a comfortable life — good wages, generous benefits, and a secure retirement. Women and workers of color did not share fully in this bounty, but they generally did better at big firms than small ones.

        All this began to unravel in the 1980s, when big business used the excuse of global competition to chip away at the living standards of the domestic workforce. This took the form of an assault on unions, which had played a key role in bringing about the improvements in the terms of employment. In meatpacking, for instance, what had been a high-wage, high-union-density industry turned into a bastion of precarious labor.

      • Is a Tax on ‘Ultra-Millionaires’ the Answer to Massive Inequality?

        On the 2020 presidential primary campaign trail, one of Elizabeth Warren’s applause lines came when she talked about her plan for a “wealth tax”—two cents on every dollar over $50 million. She made the issue vivid. “How many of you own a home?” she asked; at most stops, it was roughly half the crowd. “Well, you already pay a wealth tax on your major asset. You pay a property tax, right?” People start nodding. “I just want to make sure we’re also taxing the diamonds, the Rembrandts, the yachts, and the stock portfolios.” After a few months, Warren admirers would chant “Just two cents!” as she began her pitch.

    • AstroTurf/Lobbying/Politics

      • Fear and Celebration of Substack Are Both Misplaced

        A debate rages in the media world about the trend of writers with substantial online followings moving away from writing for traditional publications and simply going to the website Substack, where writers sell content directly to their readers, untethered from any editorial constraint. (It’s like a less titillating version of OnlyFans.) Substack has a number of investors, including the Silicon Valley venture capital firm Andreessen Horowitz.

      • GOP Bill That ‘Does Nothing But Criminalize Peaceful Protest’ Advances in Florida Legislature

        “We know the true nature of this bill and its origins,” said the ACLU of Florida. “It is not about public safety, but about criminalizing peaceful protesters advocating for racial justice.”

      • Bernie Sanders Slams Ron Johnson after Republican Forces Reading of 628-Page Coronavirus Relief Bill on Senate Floor

        “Good thing we have time during a national emergency to do this,” quipped the independent senator from Vermont.

      • GOP Senators Opposed to Becerra for HHS Have Taken Nearly $10 Million From Big Pharma: Analysis

        “While Xavier Becerra has spent his career taking on the pharmaceutical industry for their corrupt price gouging, Senate Republicans have spent their political careers lining their pockets with millions of dollars from Big Pharma.”

      • Florida Man Goes Fascist: An Encounter With Enrique Tarrio

        Orlando, Fla.—It would be easy to see the relative calm of Donald Trump’s post-insurrection career as an ignominious end to six years of MAGA. For those of us used to waking up every day for the past four years wondering what wreckage he left behind overnight—and then compulsively scrolling through Twitter to find out—it’s been tempting to regard Trump as a spent force. But the atmosphere outside the hotel here last weekend hosting the Conservative Political Action Conference (CPAC)—with demonstrators cavorting in cheerful defiance of Trump’s election defeat—gave a very different vision of that movement’s future. It didn’t take long for me to realize that these people have no plans of going away.1

      • Democrats Can Win in Ohio. Will They Choose the Right Strategy?

        The 2020 election showed that there is a right way and a wrong way for Democrats to try to win in states where they have historically lost. The extent to which they have learned those lessons will be revealed by the ways in which they pursue the winnable open Senate seats in Ohio, Pennsylvania, and North Carolina next year.

      • As House Passes For the People Act Without One GOP Vote, Progressives Warn Bill Is ‘Dead’ If Senate Filibuster Remains

        “Let’s not be coy: Mitch McConnell will filibuster these reforms to death unless pro-democracy senators stop him.”

      • Opinion | Same Old, Same Old from the Mouth That Roared

        Trump’s CPAC speech may have been a rehash of his greatest hits but it made clear his lust for tyranny is undiminished.

      • Enact the “For the People Act,” But Without the Matching Funds Program

        Howie Hawkins, the Green Party presidential candidate in 2020, said today that Congress must enact the For the People Act to protect voting rights from Republican voter suppression efforts in the states. But Hawkins wants it enacted without its matching funds program, which he says effectively excludes third party candidates from public funding and fails to stem the domination of campaign funding by big donors.

        “Federal voting rights must be enacted defeat state-level Republican voter suppression bills that constitute the biggest assault on voting rights since the Jim Crow era. But the matching funds program should be cut from the For the People Act to protect third party candidates’ access to public funding and to reject its protections of big private donors,” Hawkins said.

        “The matching funds program has nothing to do with voting rights. Congress should propose a progressive system of public campaign funding in separate legislation,” Hawkins added.

        The For the People Act (H.R.1/S.1) passed in the House Wednesday night by a 220-210 vote with no Republicans in support. It now heads to the Senate where the Democrats do not have 60 votes for cloture to break a promised Republican filibuster. Meanwhile, over 250 voter suppression bills in 43 states introduced by Republicans are working their way through state legislatures. The conservative US Supreme Court is unlikely to overturn these laws when challenged.

        “Now is the time for the Democrats to kill the filibuster in the Senate before racist senators use it again to block civil rights legislation as they have repeatedly since the 1950s. It is time for the Democratic leadership to play hardball and send the filibuster to the dustbin of history. If they fail, the Democrats are handing the power over to the Republicans even though they have the presidency and a majority in both houses of Congress,” Hawkins said.

    • Censorship/Free Speech

    • Monopolies

      • Arizona Moves Forward With Law To Force Google & Apple To Open Up Payments In App Stores

        Arizona appears to be moving forward with an interesting (though, potentially unconstitutional) bill to say that Apple and Google would need to allow alternative payment systems in their app stores. I think this bill means well in that it’s targeting what appears to be a real issue: the control that Apple (especially) and Google (to a lesser, but still significant extent) have over getting apps onto iOS and Android devices. Both companies take a pretty large cut out of in app-purchases — basically 30% (it’s a little more complicated than that).

      • Patents

        • Anixa Biosciences Announces European Patent Issued for its CAR-T Cancer Therapy

          Dr. Amit Kumar, President and CEO of Anixa Biosciences, stated, “We are pleased that the European Patent Office (EPO) has issued this patent…”

        • What Patent reforms are on the minds of IP Owners?

          The Intellectual Property Owners Association (IPO) is hoping to help push through some patent law reforms and recently published a letter to Congressional leaders on IP reform reiterates suggestions already given to the White House.

        • Paper C 2021 – First solution

          We’re still working on double checking the solution to Paper C 2021, but we didn’t want to delay posting a solution any longer.

          My first impression was that the first half was a bit more work than the second half. The claims related to some fairly complex mechanical structures, so in the first half you spent quite some time getting a grip on things. The second half had more tricky features though, although perhaps a bit less work.

          A funny detail is that some of the dramatis personae of Paper C 2015 returned in this paper. In 2015 Mr. Eilasie Kacez of Sabela Sports Industries asked the attorney Ms Molly Dorsett Pauley to file an opposition against Winterwute Corp. Now in 2021, Eilasie Kaceth (the same person?) switched jobs, but again asks Ms Molly Dorsett Pauley to file an opposition against Winterwute Corp.

        • Paper C e-EQE 2021: first impressions?

          What are your first impressions to this year’s C-paper? Any general or specific comments?

          What was the effect of doing it online? Of typing your answer rather than writing it by hand? Could you benefit from being able to copy from the exam paper into your answer? And from copying parts of your answer elsewhere into your answer?
          How did you experience taking the exam from your home or office location rather than in an examination center?
          (How) was it different due to the due of the LockDown Browser?
          What was the effect of the situation that you had to take the exam largely from the screen (as only a part could be printed) rather than from paper?
          Did you experience any technical difficulties during the exam? How & how fast were they solved?

          How did you handle the situation with the paper being split into two parts?
          What was the effect of the paper being split into two parts?
          How did you use the break?

        • SCOTUS ‘shouldn’t eliminate assignor estoppel altogether’ [Ed: lobbying disguised as 'journalism'; nobody asked about it except the litigation fatnatics and patent profiteers]

          With the deadline for amicus briefs now passed, counsel set out why the US Supreme Court should or shouldn’t preserve assignor estoppel in Minerva v Hologic

        • Jury asks Intel to pay $2.2bn in Albright’s second jury trial

          In Judge Alan Albright’s second jury trial, VLSI Technology was awarded $2.18 billion in damages after a jury ruled on Tuesday, March 2, that Intel infringed two of the plaintiff’s patents.

          The jury, at the District Court for the Western District of Texas, ruled that the patents belonging to the Fortress Investment Group subsidiary were valid and that Intel did infringe, but that the infringement was not wilful.

          It awarded VLSI Technology $1.5 billion for US patent no. 7,523,373 and $675 million for no. 7,725,759. Intel plans to appeal the decision.

          Intel had asked to delay the trial because of COVID, but Albright rejected this request. The case was postponed by a week, however, because of the winter storm that hit Texas last month and caused millions to lose power.

          VLSI Technology v Intel was the second patent jury trial to take place in Albright’s court since his appointment in 2018, and it was the first plaintiff victory. The first jury trial, in MV3 v Roku, ended in December 2020 with a victory for the defendant.

          Albright’s promise to adjudicate proceedings faster than the Patent Trial and Appeal Board, as well as his experience in patent litigation, has made the Western District of Texas an appealing forum for plaintiffs.


          On Monday, March 1, the US Supreme Court heard oral arguments in Arthrex v Smith & Nephew, a case on whether Patent Trial and Appeal Board judges were constitutionally appointed.

          The first question of the case was whether administrative patent judges (APJs) were either principal officers, who must be appointed by the president on advice of the Senate, or inferior officers, who could be appointed by a department head.

          The second question, if APJs were principal officers, concerned whether the Court of Appeals for the Federal Circuit properly cured any appointments clause defect in the current statutory scheme in a 2019 decision.

          Some attorneys expect a ruling that upholds the Federal Circuit decision that APJs are principal officers.

          Brad Lane, shareholder at Brinks Gilson & Lione in Chicago, said Chief Justice John Roberts and Justices Clarence Thomas, Samuel Alito, Neil Gorsuch, Brett Kavanaugh, and Amy Coney Barrett seemed to question whether the America Invents Act regime was enough to characterise APJs as inferior officers.

          Matt Rizzolo, partner at Ropes & Gray in Washington DC, agreed that the majority of justices seemed inclined to affirm the Federal Circuit finding.

          Rizzolo said some justices expressed concern that a ruling that APJs were unconstitutionally appointed could call into question the constitutionality of countless other government officials.

          But, he said, the court may have a path to limit any ruling to situations where officers were acting in an adjudicatory capacity.

          Lane added that although Arthrex may get the court to agree that APJs are principal officers, it will be unlikely to persuade the justices to deem inter partes reviews of patents unconstitutional.

        • FOSS Patents: German patent injunction reform bill fails “Keep It Simple, Stupid” efficacy test: automotive industry, smartphone makers won’t save license fees

          In any legislative context, a reform proposal will be described as overreaching by its opponents, while its supporters will typically ask for more. However, there’s a wide corridor to which this applies. In a section of that corridor, there may be room for a reasonable compromise. At its margins, only one camp is happy and the other merely pretends to be not, and later one or even both sides may claim victory.

          Sadly, there’s also another possibility: the proposal may really suck to the extent that both sides, if the bill was adopted, would be worse off than before. This rarely happens, but the German patent injunction reform process has gone so wrong that this is precisely where things stand.

          It’s not specific to the German patent policy debate, but the same thing in other jurisdictions, that the pharmaceutical and chemical sector opposes any weakening of intellectual property enforcement. Even if a bill was carefully crafted so as not to affect that part of the economy, they’d use their influence to avert any legislative change that would move the front line closer to them.

          Those seeking to preserve the status quo not only outnumbered but also outperformed the pro-reform camp at last week’s parliamentary hearing. In late 2019 and early 2020 I met many of those begging the German government for patent injunction reform, and by and large I saw people who just didn’t have what it takes to win in terms of skills, expertise, strategic thinking, and forcefulness. Worse still, there may even be saboteurs at work, which would serve to explain the “singularity” (“Einzelfall”) non-starter.

          The problem surfaces in patent policy all the time: different industries deal with patent enforcement under different parameters, but lawmakers seek to avoid sectorial rules.


          It doesn’t make sense to adopt a statute that will hurt some but won’t help anyone, except in cases in which plaintiffs are so unsophisticated as to not make a formal licensing offer. I already explained this problem based on the original draft bill early last year (1, 2). Unfortunately, the current proposal has the same structural shortcoming, but pharmaceutical and chemical companies are now worried about the impact of the consideration of third-party interests on their cases. The draft injunction statute belongs into the dustbin of patent policy history.

        • Software Patents

          • $3,000 for Safe Driving Technologies prior art

            On February 19, 2021, Unified Patents added a new PATROLL contest, with a $3,000 cash prize, seeking prior art on at least claim 1 of U.S. Patent 9,713,994. This patent is currently owned by Act-IP, an NPE. The ’994 patent generally relates to a system of sensors to allow a driver to safely drive their vehicle while being able to use smart applications. This patent is currently being asserted against Ford Motor Company in the Delaware District Court.

      • Trademarks

        • Unified Brands Aims to Combat Counterfeiters

          On March 3, 2021, Unified Patents launched a new subsidiary, Unified Brands, which aims to combat counterfeiters on behalf of SMEs on a ‘no cost’ basis. Unified Brands will work with small businesses to recover proceeds of counterfeiting. “Fundamentally we troll counterfeiters on behalf of companies that have counterfeiting problems,” says Shawn Ambwani, chief operating officer (COO) of Unified Patents.

          As a subsidiary of Unified Patents with over 200+ international membership organization, we are very good at deterring others from profiting off IP that isn’t theirs. We scrape online marketplaces, such as Amazon, Wish, Alibaba, AliExpress, and others, to find these counterfeiters. When counterfeit products are found online, Unified Brands will protect a brand from counterfeiting and deter counterfeiters from going after that brand specifically.

How To Deal With Your Raspberry Spy — Part II: Introduction

Posted in Free/Libre Software, GNU/Linux, Hardware at 9:01 pm by Guest Editorial Team

By Gavin L. Rebeiro




1 Acknowledgements

2 YOU ARE HERE ☞ Introduction

2.1 Prerequisite Knowledge
2.2 Apparatus

3 Fundamentals

3.1 Communication
3.2 Kernel Ring Buffer
3.3 Drivers
3.4 Operating Systems
3.5 Special Files

4 Doing The Task

4.1 Preparing The Boot Media
4.2 Connecting Physical Components
4.3 Using Picocom
4.4 OS Installation

5 Thanks

6 OpenPGP Key

A Malicious Hardware

B Linux Kernel Source Tree Analysis

C Digital Multimeter Tests

Summary: Following Part I, published a few hours ago, let’s examine what happened from a technical perspective and what can be done about it technically

We don’t want to be spied on; what happens when we’re faced with an operating system that spies on people? We throw it in the trash where it belongs! I am boycotting the Raspberry Spy myself (you’re free to join me in doing so) but I don’t want people to waste hardware that they already have. So we’re going to walk through an interesting path of installing a different operating system on the Raspberry Spy; I want to show you a few things that will empower you to take greater control over your computing.

We’ll gently walk through and explore the following: how to install an operating system on an embedded device (a Raspberry Spy, in this case) over a USB-to-UART bridge (UTUB). This is the main project we’ve got on our hands. Don’t worry if you’ve never touched embedded systems before; everything here is accessible to people with a modest set of prerequisite knowledge and some basic apparatus.

We’ll delve into things with more depth as we move forward with our project; if you don’t understand something when you first encounter it, just keep reading.

2.1 Prerequisite Knowledge

There’s not much prerequisite knowledge required. Here’s what you need to know:

• A basic grasp of how to operate a shell on a GNU/Linux system. GNU Bash is an example. You don’t need to know how to write shell scripts. Knowledge of how to use the shell interactively will suffice.

That’s it. Really. Anything else you need you will pick up on the way.

2.2 Apparatus

You will need the following apparatus:

• A Raspberry Spy. I’ve got the Raspberry Spy Model 3 B+ so that’s what I’ll be using in this project.

• A working Internet connection.

• A USB thumb drive (used as boot media) for the Raspberry Spy.1

• A power supply for the Raspberry Spy.

• A USB-to-UART bridge (UTUB). I’ve got a CP2104 from Silicon Labs; this is widely available and you can pick it up from an online retailer. You want a module that has all the necessary pins and peripherals already packaged into one, neat, unit. I believe the specific module I have is by WINGONEER.

• 3 female-to-female jump wires.

• A computer with any recent GNU/Linux installed on it. The computer needs to have a working USB port.

• A generic microSD card reader/writer. I have an Anker AR200.

It’s likely that you already have the apparatus to operate your Raspberry Spy. Just acquire the additional bits that you don’t already have. The list here is just for completeness.

Here’s some extra equipment that will make your life easier:

• When you’re dealing with electronics, you should heed the old idiom of “two is one and one is none”. Get spares of whatever you can, as a rule.

• A digital multimeter (DMM) with spare fuses for the multimeter. Being able to do some quality control (QC) before you hook up your UTUB to your hardware is going to give you peace of mind. Don’t skimp on the spare fuses for the DMM; it’s easy to forget how much current you’ve got flowing through a circuit and fry the DMM’s fuse by accident2.

• A 2M or longer USB extension cable. Male-to-female is what you want here. You plug in the male part to your computer and the female part is open for receiving the UTUB. This makes life a lot easier (and safer).

• Nitrile gloves. Helps keep you safe.

• Safety goggles. Again, doesn’t hurt to be careful.

You should now have everything you need to get started!
1 If you’ve got a Raspberry Spy that can only accept an SD card as boot media, you don’t need to fret too much. The procedure is the same; you just write the OS image to an SD card instead of a USB thumb drive. Fixing quirks of SD card installations are, however, out of scope of this project; you should refer to the relevant documentation, IRC chats, and mailing lists. I will provide links to boot-media-specific information, when we discuss boot media; this should give you a starting point to troubleshoot issues.
2 Real fuses were harmed during the making of this document.

How To Deal With Your Raspberry Spy — Part I: Acknowledgements

Posted in GNU/Linux at 7:12 pm by Guest Editorial Team

By Gavin L. Rebeiro


Summary: March 2, 2021 blog post series from a guest author; for some background, see blog posts from Microsoft in the official blog of Raspberry Pi [1, 2] and our response to these


The artwork on the cover of this work is used under explicit written permission by the artist. Any copying, distributing or reproduction of this artwork without the same explicit permission is considered theft and/or misuse of intellectual and creative property.

• Artist: Cay
• Artist Contact Details: catthecay@gmail.com
• Artist Portfolio: https://thecayart.wixsite.com/artwork/contact

These covers are here to spice things up a bit. Want to have your artwork showcased? Just send an email over to contact@e2eops.io and let us know!

For encrypted communications, you can use the OpenPGP Key provided in chapter 6.


• Author: Gavin L. Rebeiro
• Copyright Holder: Gavin L. Rebeiro, 2021
• Contact Author: glr@e2eops.io
• Contact Publisher: contact@e2eops.io

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

For encrypted communications, you can use the OpenPGP Key provided in chapter 6.

Chapter 1


Techrights techrights.org (TR) deserves credit for coverage of the Raspberry Spy Foundation’s underhand tactics; a heart-felt thanks to everyone who participated and notified TR about the Raspberry Spy espionage. TR has been robbed of credit they deserved in the early days of news coverage. The following links go over some of the news coverage from TR:

• Raspberry Pi (at Least Raspbian GNU/Linux and/or Raspberry Pi Foundation) Appears to Have Been Infiltrated by Microsoft and There Are Severe Consequences

• Raspberry Pi Foundation is Trying to Cover Up Its Deal With the Devil by Censoring Its Own Customers

• Raspberry Pi Foundation Owes Customers an Apology

• Holding the Raspberry Pi Foundation Accountable by Explaining What Happened (and Providing Evidence)

• Raspberry Pied in the Face — Part I: What is Known About the Relationship Between Microsoft and the Raspberry Pi Foundation

• Raspberry Pi OS Adds Microsoft Repository Without User Permission

• Raspberry Pied in the Face — Part II: Raspberry Pi Foundation in Violation of GNU/Linux Rules (Because of Microsoft)

• Raspberry Pied in the Face — Part III: Eben Upton’s Response and Its Significance

• Raspberry Pied in the Face — Part IV: Poor Crisis Management by the Raspberry Pi Foundation

• Raspberry Pied in the Face — Part V: Raspberry Bye? The Lost of Trust is Pervasive and the (Un)Official Response Unhelpful

• What Microsoft Did to the Raspberry Pi Foundation is Part of a Broader Anti-GNU/Linux Strategy

• More Than a Fortnight After Installing Microsoft Surveillance and Keys on Millions of Computers Without Users’ Consent the Spin Comes From the Raspberry Pi Company (via Microsoft)

• Raspberry Pi Reaffirms Its Commitment to Microsoft (as Trojan Horse Inside Classrooms) and Abandons the Free Software Community

• Microsoft Inside — Part II: Microsoft Has Plans for the Raspberry Pi or Linux SBCs in General (and It Hides Its Role in That)

I tried to keep things in chronological order, but you should just check out the TR site archives from Febuary 2021 onwards for coverage on this treachery from the Raspberry Spy Foundation.

A big thanks also to the founder of Everything Wrong With Free Software (EWWFS); EWWFS did a great piece on the Raspberry Spy that is worth reading:

• maybe-dont-buy-a-raspberry-spy

I originally got the inspiration for this paper from the creator of EWWFS. Much support and encouragement was provided during the research and development of this paper from EWWFS.

I saw the freedom-crushing propaganda machine in full action after the story first broke. Every single forum post that was censored, every single person in chat rooms that had been blocked or called a “basher”, and every single person who boycotts or called for a boycott of the Raspberry Spy, all give us hope that the fight for freedom is still alive.

It is my hope this document helps you advance your freedoms, learn a few new things, and have fun in the process. Let’s get hacking!

German Decision on Unitary Patent/UPC Will Take Years (and It Doesn’t Matter Because the Whole Thing is Dead Already)

Posted in Deception, Europe, Law, Patents at 12:26 pm by Dr. Roy Schestowitz

Video download link

Summary: Kluwer Patent Blog’s Dr. Bausch explains why the UPC is pretty much doomed, as it cannot be ratified any time soon and probably will never be ratified either (for a multitude of reasons, including Brexit)

THIS afternoon we saw this article by Thorsten Bausch (Hoffmann Eitle), showing and explaining why the FCC (Germany’s constitutional court) won’t be deciding on the two constitutional complaints (against UPCA) any time soon.

“All they have left now is paid-for lies. Don’t listen to them.”We’ve decided to respond in a one-hour video, which includes a bit of background information. Dr. Bausch has long protested against EPO injustices and UPC lies. And just like us, he predicted it wouldn’t get started. He now says (and includes a screenshot that shows) “the FCC has just published its annual overview, i.e. a list of proceedings that it intends to decide in the course of 2021. It traditionally publishes this list in February of each year, and equally traditionally it is incapable of deciding even half of these cases by end of the same year. This has led to the unofficial name of this list, i.e. “Lügenliste” (Liar’s List), which may be a bit harsh, but sometimes jokes are like this. Nonetheless, while the list is not necessarily indicative of the cases that will be decided in the year to come, it is of value for the cases that will not be decided, i.e. those cases that we know have been filed but do not (yet) appear on this list. For example, the two constitutional appeals on the *new* UPCA ratification law. Thus, if I may dare making any recommendation to the stakeholders and judges that have been preparing for the imminent enactment of the UPCA for years, it is: relax and look to other plans for the near to mid-term future. While I have already won my unofficial bet that the new Berlin airport will open before the UPCA will enter into force, my second bet that UPCA will come before Stuttgart 21 (currently predicted for 2026) is still running, and it is possible that I will lose this one. This will not be over any time soon, all the more so since the Case Load of the responsible 3rd Department of the FCC, even to the extent shown on the list, is pretty crazy: A constitutional complaint against the marketing approval of a generic veterinary medicament, two disputes in regard to the government’s obligations to inform the Bundestag about its plans to act against human traffickers in the mediterranean, a dispute in regard to a state law of Bremen prohibiting the turnover of nuclear fuels in its ports, various constitutional complaints against CETA, another constitutional complaint against a decision of the FCJ and CJEU declaring an arbitration clause in an investment protection agreement between Slovakia and the Netherlands inapplicable under EU Law, several referrals of courts and the Parliament in regard to the “Mietendeckel” of Berlin (rent cap) – and five more constitutional complaints, of which at least four have appeared on the “annual overview” for years.

In short, don’t expect the UPC to have any news associated with it. Bristows’ UPC blog has been inactive for months, it’s composed by individuals who work for Europe’s most notorious patent trolls, and there’s virtually no press coverage on the matter. Well, there’s nothing to report. This morning we saw Bristows spreading some more UPC lies in a paid placement. All they have left now is paid-for lies. Don’t listen to them.

Techrights in Australia (IPFS and Gemini)

Posted in Site News at 7:14 am by Dr. Roy Schestowitz

Video download link

Summary: Allies in Australia will help Techrights serve material from another server; we’re still bettering ourselves for an era of oppressive World Wide Web

THIS site turns 15 later this year. Over the past year we’ve put our eggs in more baskets, notably IPFS, Gemini and text files (which can be opened and read directly in a text editor, e.g. IRC logs and daily bulletins).

“Just remember that sites which expose corruption never have an easy time…”Yesterday we set up au.techrights.org (still work in progress) and we have some important work on the way. Preparation and expansion in the logistical sense is very important for us, seeing how a lot of people now recognise the harms of monopolists and social control media. The backlash against YouTube is huge right now (probably exceeding that of Twitter and Facebook backlash). People call for boycotts and the basis of the complaints is typically either censorship or money-related (Google paying a lot less or completely ‘demonetising’ those who create 100% of that site’s “content”, at their own personal expense).

Wikileaks Threatens CNN With Defamation Lawsuit After Assange Called ‘Pedophile’ on Live TVThe exploitation and/or abuse is being realised by a growing number of people and as we've just noted, Google pays professional trolls to ‘cancel’ people and to promote fake 'security' (back doors).

The video above generally speaks and also shows how a site like ours can expand outside the World Wide Web, with text files being passed around, shared in a P2P-like fashion (IPFS), and also in Gemini space (it’s easier to set up a Gemini capsule than it is to set up a Web site; it just takes a little practice).

We’ll hopefully return to covering EPO corruption as soon as this weekend. The Battistelli/Campinos cabal is still blocking our Web site because almost all EPO staff likes to read the site (the workers of the EPO want to understand the crimes of their bosses).

Just remember that sites which expose corruption never have an easy time; if the subject of criticism cannot block or silence — sometimes intimidate — those who pose a risk by reporting (real threat that the crooked will end up in prison, being held criminally accountable) proxies and ‘useful idiots’ (or professional trolls) will be recruited and/or paid.

Professional Troll Matthew Garrett Spreads Libel, Defamation and Slander About the Free Software Community to Entertain Microsoft and Friends

Posted in Deception, Google, Microsoft at 6:49 am by Dr. Roy Schestowitz

Video download link

Summary: After months of parking in our IRC channels to provoke and troll people (and try to collect ‘dirt’ from responses) the professional troll Matthew Garrett has been for many years shows his true colours again

TWITTER is an epidemic. It’s also censoring people who write about the pandemic, but that’s another subject. I left Twitter a year ago (my account became write-only) because of this 'cancel culture' nonsense (people lying about one’s position and then going ‘viral’ with their lies).

“These trolls try to muzzle their critics by any means possible while pocketing millions of dollars from monopolists that sponsor the trolling.”For a while now I’ve warned that a Google-sponsored professional troll (with a track record) was looking for 'dirt' on us and was already libelling myself and the site in Twitter. It’s reminiscent of what a similar mob (professionally-employed trolls) did to Richard Stallman in 2019.

The distortion of facts is not just incredible; it’s also intentional, which is why the title of this post says “Libel, Defamation and Slander”. We’ve notice for a while that Phoronix and Michael Larabel were targeted by a similar smear campaign, trying to hold people and sites accountable for views that aren’t theirs or even the sites’.

Matthew Garrett a professional trollBut good news, everyone! Are you an Internet troll? Google is hiring. Salesforce is hiring. Monopolies want your help in their fight against communities and against anything grassroots which remains in Free software. No stone will be left unturned; they even tell us that Linus Torvalds, who lashes out at men most of the time, is somehow sexist (though he's married only with girls, one of whom a notable feminist).

People like these have long lost the technical argument (UEFI ‘secure’ boot has once again caused a very major security mess), so they turn to something else. These trolls try to muzzle their critics by any means possible while pocketing millions of dollars from monopolists that sponsor the trolling.

“Our world is not divided by race, color, gender, or religion. Our world is divided into wise people and fools. And fools divide themselves by race, color, gender, or religion.”

Mohamad Safa

Links 5/3/2021: Linux 5.12-rc2 Imminent, Linux Lite 5.4 RC1 in Review

Posted in News Roundup at 4:06 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

      • Installation And First Look At Mageia 8

        Mageia is a GNU/Linux distribution that is a community project begin life as Mandrake, which then became Mandriva, which then became Mageia. This is a rpm-based distro that uses a static release model and is known for stability.

      • OpenShot: Windows Movie Maker Of Linux – YouTube

        OpenShot is one of those video editors that everyone tries at least once, and I feel like it should stay at only once. While it’s not unusable you could get some work done with it, it has some serious limitations as a video editor that take all the fun out of making videos.

    • Kernel Space

      • A warning about 5.12-rc1
        Hey peeps - some of you may have already noticed that in my public git
        tree, the "v5.12-rc1" tag has magically been renamed to
        "v5.12-rc1-dontuse". It's still the same object, it still says
        "v5.12-rc1" internally, and it is still is signed by me, but the
        user-visible name of the tag has changed.
        The reason is fairly straightforward: this merge window, we had a very
        innocuous code cleanup and simplification that raised no red flags at
        all, but had a subtle and very nasty bug in it: swap files stopped
        working right.  And they stopped working in a particularly bad way:
        the offset of the start of the swap file was lost.
        Swapping still happened, but it happened to the wrong part of the
        filesystem, with the obvious catastrophic end results.
        Now, the good news is even if you do use swap (and hey, that's nowhere
        near as common as it used to be), most people don't use a swap *file*,
        but a separate swap *partition*. And the bug in question really only
        happens for when you have a regular filesystem, and put a file on it
        as a swap.
        And, as far as I know, all the normal distributions set things up with
        swap partitions, not files, because honestly, swapfiles tend to be
        slower and have various other complexity issues.
        The bad news is that the reason we support swapfiles in the first
        place is that they do end up having some flexibility advantages, and
        so some people do use them for that reason. If so, do not use rc1.
        Thus the renaming of the tag.
        Yes, this is very unfortunate, but it really wasn't a very obvious
        bug, and it didn't even show up in normal testing, exactly because
        swapfiles just aren't normal. So I'm not blaming the developers in
        question, and it also wasn't due to the odd timing of the merge
        window, it was just simply an unusually nasty bug that did get caught
        and is fixed in the current tree.
        But I want everybody to be aware of because _if_ it bites you, it
        bites you hard, and you can end up with a filesystem that is
        essentially overwritten by random swap data. This is what we in the
        industry call "double ungood".
        Now, there's a couple of additional reasons for me writing this note
        other than just "don't run 5.12-rc1 if you use a swapfile". Because
        it's more than just "ok, we all know the merge window is when all the
        new scary code gets merged, and rc1 can be a bit scary and not work
        for everybody". Yes, rc1 tends to be buggier than later rc's, we are
        all used to that, but honestly, most of the time the bugs are much
        smaller annoyances than this time.
        And in fact, most of our rc1 releases have been so solid over the
        years that people may have forgotten that "yeah, this is all the new
        code that can have nasty bugs in it".
        One additional reason for this note is that I want to not just warn
        people to not run this if you have a swapfile - even if you are
        personally not impacted (like I am, and probably most people are -
        swap partitions all around) - I want to make sure that nobody starts
        new topic branches using that 5.12-rc1 tag. I know a few developers
        tend to go "Ok, rc1 is out, I got all my development work into this
        merge window, I will now fast-forward to rc1 and use that as a base
        for the next release". Don't do it this time. It may work perfectly
        well for you because you have the common partition setup, but it can
        end up being a horrible base for anybody else that might end up
        bisecting into that area.
        And the *final* reason I want to just note this is a purely git
        process one: if you already pulled my git tree, you will have that
        "v5.12-rc1" tag, and the fact that it no longer exists in my public
        tree under that name changes nothing at all for you. Git is
        distributed, and me removing that tag and replacing it with another
        name doesn't magically remove it from other copies unless you have
        special mirroring code.
        So if you have a kernel git tree (and I'm here assuming "origin"
        points to my trees), and you do
             git fetch --tags origin
        you _will_ now see the new "v5.12-rc1-dontuse" tag. But git won't
        remove the old v5.12-rc1 tag, because while git will see that it is
        not upstream, git will just assume that that simply means that it's
        your own local tag. Tags, unlike branch names, are a global namespace
        in git.
        So you should additionally do a "git tag -d v5.12-rc1" to actually get
        rid of the original tag name.
        Of course, having the old tag doesn't really do anything bad, so this
        git process thing is entirely up to you. As long as you don't _use_
        v5.12-rc1 for anything, having the tag around won't really matter, and
        having both 'v5.12-rc1' _and_ 'v5.12-rc1-dontuse' doesn't hurt
        anything either, and seeing both is hopefully already sufficient
        warning of "let's not use that then".
        Sorry for this mess,
      • A warning about 5.12-rc1

        Linus Torvalds has sent out a note telling people not to install the recent 5.12-rc1 development kernel; this is especially true for anybody running with swap files. “But I want everybody to be aware of because _if_ it bites you, it bites you hard, and you can end up with a filesystem that is essentially overwritten by random swap data. This is what we in the industry call ‘double ungood’.” Additionally, he is asking maintainers to not start branches from 5.12-rc1 to avoid future situations where people land in the buggy code while bisecting problems.

      • Linux 5.12-rc2 Likely Coming Early Due To That Nasty File-System Corruption Bug

        Linus Torvalds has now warned developers over using Linux 5.12-rc1 as a basis for their future branches and is looking to release 5.12-rc2 ahead of schedule as a result of that problematic file-system corruption bug stemming from a swap file bug.

      • New features, changes & improvements to KernelCI’s UI

        KernelCI has been driving continuous integration for the Linux kernel with hundreds of commits every day since its creation in 2012 and as a Linux Foundation project since 2019. The platform has the ability to help you attempt to find and fix several problems, including regressions, build failures and merge conflicts from your patches with others.

        Today, KernelCI is the most complete automated testing and continuous integration tool for the Linux kernel. It can test your code on many platforms performing automatic builds in kernel trees. Builds, tests information and more can be found on the KernelCI dashboard, that is, the main web interface used by the project.

      • Apple M1 Patches For The Linux Kernel Sent Out A Third Time

        Hector Martin, who has been working on the crowd-funded effort to bring Linux up on the Apple M1 SoC and the modern Apple devices using that in-house silicon, has sent out the third iteration of his kernel patches.

        With the “v3″ patches sent out today the focus remains on getting the Apple M1 SoC brought up under the Linux kernel with interrupt handling, SMP support, UART, a SimpleFB-based frame-buffer, and the DeviceTree needed for the Mac Mini and other new Macs using the M1 chip. There still is much work ahead to make the Apple M1 and the modern Macs usable on a day-to-day basis, especially if wanting accelerated graphics and making use of other capabilities of this complex ARM-based chip.

      • Graphics Stack

        • Even In 2021, Intel Squeezes Some Very Nice Performance Gains Out Of Their OpenGL Driver – Phoronix

          While it’s 2021 and many modern Linux gaming and other workloads are focusing on the Vulkan API, Intel isn’t letting up in their aggressive optimizations to their open-source “Iris” OpenGL Gallium3D driver for Linux systems. With the latest Mesa 21.1 code today there is a set of patches providing up to 17% better performance in some games while other OpenGL software is generally a few percent faster at least. In some micro-benchmarks it can be more than 50% faster.

          Longtime Intel open-source Linux graphics driver developer Kenneth Graunke – who has also been the lead Iris Gallium3D developer over the past three years – merged his work on threaded context support.

        • waylandmar21

          While struggling with Pfizer second dose side effects yesterday, with little ability to do anything serious – so surreal to have a fever yet also certainty you’re not actually ill[1] – I thought I’d try building the branch of Emacs with native Wayland support, and try starting up Sway instead of i3. I recently upgraded my laptop to Debian bullseye, as I usually do at this stage of our pre-release freeze, and was wondering whether bullseye would be the release which would enable me to switch to Wayland.

          Why might I want to do this? I don’t care about screen tearing and don’t have any fancy monitors with absurd numbers of pixels. Previously, I had been hoping to cling on to my X11 setup for as long as possible, and switch to Wayland only once things I want to use started working worse on X11, because all the developers of those things have stopped using X11. But then after upgrading to bullseye, I found I had to forward-port an old patch to xfce4-session to prevent it from resetting SSH_AUTH_SOCK to the wrong value, and I thought to myself, maybe I could cut out some of the layers here, and maybe it’ll be a bit less annoying. I have a pile of little scripts trying to glue together xfce4 and i3 to get all the functionality I need, but since there have been people who use their computers for similar purposes to me trying to make Sway useful for quite some time now, maybe there are more integrated solutions available.

          I have also been getting tired of things which have only ever half-worked under X, like toggling autolock off when there isn’t fullscreen video playing (when I’m video conferencing on another device, I often want to prevent my laptop’s screen from locking, and it works most of the time, but sometimes still locks, sigh). I have a “normalise desktop” keybinding which tries to fix recurrent issues by doing things like restarting ibus, and it would be nice to drop something so hackish.

    • Applications

      • Veracrypt – An Open Source Cross-Platform Disk Encryption Tool

        Filesystem/Volume encryption has become paramount to the masses in the IT industry due to the varying advantages it presents including protection of sensitive data, military-grade encryption standards, password keys to prevent unwanted access, and an encrypted file/drive only the encryption software can access among others.

        Veracrypt is a cross-platform and open-sources on-the-fly encryption tool that was originally based on Truecrypt’s 7.1a codebase back in June 2013 but has since then matured greatly to become a singular encryption solution that is now dissimilar and incompatible with volumes encrypted with Truecrypt.

        Veracrypt is essentially your go-to option for an encryption tool if you’re looking to replace Truecrypt.

    • Instructionals/Technical

      • How To Install VNC Server on Debian 10 – TecAdmin

        VNC (Virtual Network Computing) allowed to remotely control desktop systems. We can say VNC is a graphical desktop-sharing system that uses the Remote Frame Buffer protocol (RFB). There are multiple software services provides VNC service to access Linux based desktop remotely including, TigerVNC, TightVNC, Vino, vnc4server and more.

        The TigerVNC is a free, open-source and high-performance VNC server used to control or access Linux based desktop remotely. It is a client/server application that allows you to interact with graphical applications on remote machines.

        This tutorial help you to how to install and configure VNC server on Debian 10 Buster Linux system using the TigerVNC server.

      • How to Enable 2-Factor Authentication on Ubuntu – LinuxH2O

        In this quick guide, you will see, how to enable the 2-Factor authentication on Ubuntu. This guide can also be used on its derivatives.

        Before going straight, let’s see what is 2-Factor authentication?

        Simply put, it’s an extra layer of protection that you can be put on things that have passwords so that you are required to provide a time-based token for authentication addition to the password.

        Now, let’s set it up on Ubuntu.

      • How to Install Nvidia Drivers on Linux Mint [Beginner's Guide] – It’s FOSS

        Linux Mint is a fantastic Ubuntu-based Linux distribution that aims to make it easy for newbies to experience Linux by minimizing the learning curve.

        Not just limited to being one of the best beginner-friendly Linux distros, it also does a few things better than Ubuntu. Of course, if you’re using Linux Mint like I do, you’re probably already aware of it.

        We have many beginner-focused Mint tutorials on It’s FOSS. Recently some readers requested help with Nvidia drivers with Linux Mint and hence I came up with this article.

        I have tried to mention different methods with a bit of explaining what’s going on and what you are doing in these steps.

      • How to Install Software from Source in Linux

        The most widely used Linux distributions, for example, Debian, Ubuntu, RedHat, Fedora, and many more, have a packaging system for distribution software. Binaries and configuration files of software are bundled in a package, which is nothing but an archive file, from which the package managers install the software.

        However, advanced Linux users, developers, and those who are more on the geeky side of things often install software directly from the source code; i.e., manual compilation and installation.

        As almost all software in GNU/Linux systems is free and open-source software, the source code is publicly available, usually in a version control system repository or even in the standard repositories in some distributions.

      • Steve Litt’s No Bullshit Guide to LAN-Peer Qemu VMs

        To prevent confusion and ambiguity, this document repeatedly and redundantly describes each element as being either on the host or the VM guest. The host is the physical computer (metal computer) on which the VM guest is run. The VM guest is a Virtual Machine running on the host. The downfall of most online Qemu documentation is they rarely make this distinction, which can confuse the daylights out of someone not already knowing Virtual Machine technology extremely well.

        The examples in this document use a physical host that is running Void Linux. The VM guest runs Devuan Linux. This document’s examples all use a LAN using the network (subnet, actually), with a physical cable modem connection to the Internet at, the host at, a printer with HTML interface at, and a different Linux computer at These four machines are all physical. On the LAN, the default route is the cable modem at, which also serves as a DHCP server, firewall, and router.

        A LAN-peer is a VM guest that can interact with all the computers and devices on the host’s LAN. Also, all the computers and devices on that LAN can interact with the VM guest. A LAN-peer VM guest is, from a networking standpoint, exactly like a physical computer on the LAN.

        If parts of this document seem redundant and excessive, I’ve done this so that there’s absolutely no confusion for anybody, regardless of their Virtual Machine or Qemu knowledge.

      • Using NetworkManager in Gentoo Linux | Fitzcarraldo’s Blog

        My current two laptops running Gentoo Linux (both with OpenRC, elogind, eudev and wpa_supplicant) use NetworkManager rather than Netifrc. (Actually, my desktop machines also use NetworkManager even though they are always connected to the same network.) NetworkManager has worked with wired and wireless networking on these laptops without any issues for over five years now. This post summarises how it is installed and configured.

      • Debian Disable ipv6 on Interface – Linux Hint

        When you run Debian 10, the IPv6 network connections are enabled by default. But, in most situations, you need to disable the default setting of IPV6. However, we will give you a complete demo on how to disable the IPV6 interface on Debian 10 system.

        To execute all commands, you must have the privileges to run the system administrative commands.

      • How To Install and Use Git On Linux for Beginners – Linux Hint

        As developers, we are no strangers to managing and saving various copies of code before joining it to the main code.

        Let’s discuss a better and efficient way to manage various code versions and merge them with the main code after testing.

      • How To Mount And Use NFS Shares On Linux Sharing Files Easily Using NSF – Linux Hint

        Developed by Sun Microsystems in 1984, NFS or Network File Shares is a file system protocol used for accessing files over a network similar to a local storage device.

        NFS Shares are powerful and popular as they allow users to share files and directories over a local network and the internet. However, it is better to limit NFS shares to local and trusted networks as files don’t get encrypted on the machines. However, the problem was addressed and fixed on a recent version of the NFS protocol. You may need to set up complex authentication methods such as Kerberos.

      • How to Configure OpenVPN in Kali Linux – Linux Hint

        OpenVPN is a free and open-source VPN application that allows you to encrypt and send your network data via secure tunnels from one device to another not located on the same network. OpenVPN uses OpenSSL to encrypt network traffic to and from your devices.

        Once connected to an OpenVPN server, your network traffic gets routed through the server, keeping your data secure. In turn, this helps protect you from network attacks, especially when connected to public networks.

      • How to Enable Kali Linux Undercover Mode – Linux Hint

        Penetration testers and Black Hat hackers value discretion and anonymity above all else. A distribution such as Kali Linux, a tool preferred by is Security Researchers and Penetration testers, may not provide these all the time, especially in public locations where running code and having multiple terminals open can easily call unnecessary attention to yourself.

        Offensive Security took note of this and included a mode known called undercover mode in Kali Linux 2019.4.

      • How to Install Linux Headers on Kali Linux – Linux Hint

        Welcome to this concise article discussing how to install Linux headers on Kali Linux.

        Linux header files are used in interface definition between various components of the kernel. They are also used to define interfaces between the kernel and userspace. A typical case where Linux headers are required is running a Hypervisor because the tools require modules that interact with the kernel.

        By default, Kali Linux does not ship with Linux headers installed; you will have to do it manually.

      • How to Install and Configure OpenVAS on Kali Linux – Linux Hint

        OpenVAS or Open Vulnerability Assessment System is a Pen-testing framework whose collection of tools allow you to scan and test systems for known vulnerabilities. OpenVAS uses a database containing a collection of known exploits and vulnerabilities.

      • How to Install and Configure WireGuard on Kali Linux – Linux Hint

        WireGuard is a simple and fast open-source VPN tunneling service built with high-end cryptographic technologies. It is very easy to set up and use, and many consider it better than OpenVPN or IPSec. WireGuard is also cross-platform and supports embedded devices.

        WireGuard works by setting up virtual network interfaces such as wlan0 or eth0 that can be managed and controlled like normal network interfaces, helping configure and manage the WireGuard easily using net-tools and other network managing tools.

        This guide will show you how to set up a WireGuard client and server on a Kali Linux system.

        Let us start by installing WireGuard on the system.

      • How to Resize and Format Disk with PartedMagic – Linux Hint

        PartedMagic is a Linux distribution used for partitioning, data recovery, and other data-related forensics operations. It mainly comes packaged as an ISO tool you can burn to a CD/DVD or USB flash drive and booted live without installing it.
        Its primary use is on GNU Gparted and PartitionMagic packages, although PartedMagic is a commercial Software. It’s essential for data.

        This tutorial will walk you through PartedMagic operations like creating bootable media, booting up, partitioning, data recovery, etc.

      • How to Setup Virtualization on Synology NAS? – Linux Hint

        Synology has official support for virtualization on its NAS products. You can create and run Windows or Linux virtual machines on your Synology NAS really well and turn your Synology NAS into a software development environment.
        To run virtual machines on your Synology NAS, you need to have at least 8 GB or 16 GB (or more) memory installed, depending on your requirements. Then, you can install and use the official Virtual Machine Manager app to create and manage your virtual machines from the Synology Web GUI.

        In this article, I will show you how to set up virtualization on your Synology NAS and create a Windows 10 and an Ubuntu 20.04 LTS virtual machine on your Synology NAS. I will be using the Synology NAS model DS1821+ for the demonstrations. So, let’s get started!

      • How to install and add pCloud drive to startup on Manjaro | FOSS Linux

        PCloud is a cloud service offering 10BG free storage space for saving personal files on a secure cloud. It is available for Linux and other operating systems. pCloud also puts privacy first using its advanced encryption technology. Further, the pCloud storage drive is accessible via a desktop client in Linux or via your web browser.

        This guide will go through installing pCloud, opening your pCloud Drive, and adding pCloud Drive to startup on your Linux Manjaro distribution.

      • Introduction to Apache Solr. Part 2: Querying Solr – Linux Hint

        Apache Solr [1] is a search engine framework written in Java and based on the Lucene search library [6]. In the previous article, we set up Apache Solr on the soon-to-be-released Debian GNU/Linux 11, initiated a single data core, uploaded example data, and demonstrated how to do a basic search within the data set using a simple query.
        This is a follow-up article to the previous one. We will cover how to refine the query, formulate more complex search criteria with different parameters, and understand the Apache Solr query page’s different web forms. Also, we will discuss how to post-process the search result using different output formats such as XML, CSV, and JSON.

      • How to install Enlightenment Desktop in Fedora 30 Workstation – Linux Hint

        Enlightenment is a desktop environment like GNOME, KDE, MATE, Cinnamon, and others. The first release appeared in early 1997. It is a graphical desktop environment maintained by the Enlightenment project. It has a typical UNIX/X11-based desktop style.
        It has a rather elegant desktop interface and a different central philosophy of design.

        Enlightenment desktop can manage windows and files. It can do compositing. It can also start applications as well as handle UI and manipulate system settings. In fact, Enlightenment was the first Window Manager to bring themes into the X11 window system.

        Enlightenment is in existence before GNOME and is hardly younger than KDE. Its first release was version 0.1 in the first part of 1997. Initially, it was launched as a simple window manager. Despite the limited capability of computers to handle a user interface’s complex functionality, it proved to be very flexible in terms of behavior and visuals features.

        Enlightenment has too many features along with too much flexibility. One can configure it to be a simple GUI desktop or make it more dazzling with various activity options.

      • How to enable Blue Light Filter on Linux Mint? – Linux Hint

        The human eyes can filter the ultraviolet and many other harmful radiations of the sun. However, the eyes cannot filter the blue light. The excessiveness of blue light puts the strain on the eyes. Moreover, blue light passes the signal to the mind that it is daytime even if you are using blue light in the nighttime. Overall, blue light is harmful to humans because it interrupts the regular sleep-wake system, which ultimately damages our immune system.

        Filtering the blue light is a very important activity to perform on your system. Redshift is free and open-source software that automatically adjusts the color of the screen based on temperature, your current location, and daytime.

        In this article, we will learn to install Redshift on Linux Mint for enabling the blue light filter.

        We are using Linux Mint 20 for executing the commands and preparing this guide. Redshift can be installed on Linux Mint from the Software Manager and Linux Mint 20 standard repositories.

      • How to Setup a Kali Linux Mirror – Linux Hint

        Using the easy-to-follow steps provided in this guide, you can set up a Kali Linux mirror that can host Kali’s main repositories and images. A Kali Linux mirror is handy.
        Let us get started.

      • How to Build A Simple Blog With Hexo Static Site Generator – Linux Hint

        In the modern age, websites are the building blocks of information. From enterprise, eCommerce, social websites to simple blogs, websites allow people to share ideas and thoughts.
        This tutorial will show you how you can set up a simple blog using a static site generator that is very fast and easy to use.

      • How To Rebuild a Source Package In Kali Linux – Linux Hint

        Even though it’s customized explicitly for penetration testing, Kali Linux is a flexible and highly customizable Linux distro. It allows you to customize things like the Desktop environment, packages, and even the kernel as long as you know what you are doing,

        Let’s discuss how we can modify installed packages and rebuild them from the source.

      • How to find duplicate files in Linux? Help is here with the fdupes command! – Webleit.info

        Fdupes is a command line tool that allows you to find all duplicate files through the console. The advantage over using graphical tools like fslint is of course the speed. At the end of the day, there is nothing faster and more convenient than the Linux console.

        Why should we look for duplicate files in Linux?

        No matter what operating system you use sooner or later, your computer will contain many files of different sizes, and if you’re not careful enough, repeating them can cost you disk space that you need. For example, you inadvertently downloaded the same ultra HD movie with 40 giga bytes twice.

      • How to Install Moodle with Nginx and Let’s Encrypt SSL on Ubuntu 20.04

        Moodle is a free and open-source Learning Management System written in PHP. It provides a way for tutors and instructors to create courses for their students or learners. Moodle provides a robust and secure integrated system and comes with a custom dashboard that helps users to access current, past or future courses, as well as review pending work. It is used by many schools, universities, and organizations across the globe and provides a better learning experience. It provides a rich set of features including, wiki, grading, assignment submission, online quizzes, discussion boards, and more.

        In this tutorial, we will show you how to install Moodle with Nginx web server and Let’s Encrypt SSL on Ubuntu 20.04.

      • Install WordPress Automatically on Ubuntu 20.04 using WordOps

        WordOps is a simple tool that provides the ability to deploy WordPress sites from the command line using an optimized LEMP stack.

        The LEMP software stack consists of a group of software that describes a Linux Operating System, an Nginx web server (pronounced engine-x), a MySQL database with the dynamic processing being handled by PHP. LEMP is an acronym for Linux, Engine-x (Nginx), MySQL and PHP.

        WordOps simplifies so much of the process of installing and configuring all the packages from the LEMP stack needed to deploy a site while taking care of creating virtual hosts in Nginx, installing WordPress, and even gets you a SSL certificate.

        It also installs some components that allow you to see statistics about the server’s workload.

        In this tutorial we’ll use WordOps to quickly and easily install WordPress on an Ubuntu 20.04 machine, and we’ll check out and explain some of the extra features that WordOps offers.

      • How to Find Out When a Webpage Was Published – Make Tech Easier

        When you’re doing research on a topic, it’s vital to ensure your sources are up to date. If you’re writing an academic paper, dates of publication are often required in the citations.

        The majority of the time, getting the date is easy: simply look on the site and find the published date to find how recent it was. Things get a little more complicated when there is no date listed on the webpage. When this happens, how do you know when a webpage was published?

      • How to install Wireshark 3.4.3 on a Chromebook

        Today we are looking at how to install Wireshark 3.4.3 on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • Another Piece For The Home Network Puzzle – A Return To Cisco IOS! – Jon’s FOSS Blog

        I’ve missed the good old days of configuring and setting up good quality switching hardware (like the big, huge Cisco switches and routers I used to experiment on with their IOS command line interface). I recently ordered this newer, smaller Cisco switch which can also provide power to a new “prosumer” WiFi AP (no power cables needed).

      • Making environment variables accessible in front-end containers – Red Hat Developer

        When building a container for a single-page application using any modern JavaScript framework (such as Angular, React, or Vue.js), you might find that the configuration settings are different depending on where the container will run. A typical case would be the base URL for your API, which will differ depending on whether you are testing the application or deploying it into production. Developers usually solve this problem using environment variables.

        Environment variables typically work on the backend because that is where code runs. But what if your application lives in the user’s browser? There are many ways around this limitation. In some cases, you might build a server whose endpoint holds the necessary parameters. Another workaround is to use PHP to inject the environment variables as globals in the JavaScript code. Both of these options work, but it would be ideal to inject the environment variables as part of the container build process. That way, you don’t have to change the codebase, and you can still deliver the application content using a static web server like NGINX.

        This article shows you how to inject environment variables directly into your codebase as you build your container.

      • The Strange Case of How We Escaped the Docker Default Container

        TL;DR During an internal container-based Red Team engagement, the Docker default container spontaneously and silently changed cgroups overnight, which allowed us to escalate privileges and gain…

      • How to copy and paste between host and VM
    • Games

      • Godot Showcase – Primal Light developer interview

        Welcome to the fourth developer interview following the introduction of the Godot Showcase page! This week, we are interviewing the studio Fat Gem about their first game Primal Light.

      • Valve gives up on Artifact setting it free with Artifact Classic and Artifact Foundry | GamingOnLinux

        Valve’s Dota themed card game Artifact has now well and truly failed, as they’ve now stopped the 2.0 redevelopment which is now named Artifact Foundry with the original as Artifact Classic and both now free to play.

        In a post titled “The Future of Artifact”, Valve mentioned how the player count fell off dramatically and it was pretty much dead shortly after being released. Even though the big 2.0 revamp was far along in development, they’ve now formally and totally shelved it as they “haven’t managed to get the active player numbers to a level that justifies further development at this time”.

      • Loop Hero is out now and I’m going to need help to tear myself away from it | GamingOnLinux

        Loop Hero, probably the only titles I’ve pre-ordered in the last few years is officially out now and I really will need some help to pull myself away from running just one more loop.

        It’s such a strange and beautifully intoxicating mix of genres. For each loop through you’re placed into a world full of nothing but a path and it’s up to you to build up the world each time. You do this through your deck of cards, while the hero automatically loops around the path and fights enemies along the way without your input. Even though you don’t have direct control, there’s quite a lot of strategy involved in it.

      • Dark low-fantasy tactical survival RPG ‘Urtuk: The Desolation’ is out now | GamingOnLinux

        Urtuk: The Desolation from David Kaleta presents you with a dark world in a low-fantasy settings where you guide a team of survivors through a ruined world. Note: key provided by the developer.

        Hitting nearly one thousand user reviews and a Very Positive rating on Steam overall, Urtuk: The Desolation seems to have managed to hit a sweet spot. Giving you tough turn-based combat, with a character progression system that sees you extracting skills and traits from fallen enemies. It’s a bit of a gross world and the main character, Urtuk, is an escaped subject of experimentation with a severe mutation and worsening health. The idea is to eventually find a cure but getting there will be tough.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

    • Distributions

      • Top 10 Most Secure Linux Distros for Personal Use

        It is no secret that everyone looks for a secure operating system that offers top-notch privacy. If you are using a system that is not secure enough, anyone can access your system and exploit your data, such as photos, videos, files, and sensitive financial information. Linux systems offer fantastic privacy and security as compared to other OS, like Windows or Mac. So, it is best to go for a Linux system for better security. But, there is an extensive list of secure Linux distros, and it can be difficult to choose one.

      • Debian Server vs. Ubuntu Server Comparison

        When setting up a new server, a major concern that users may have is which OS to use. Many choices come into mind when it comes to the operating system to use, so selecting just one OS can be a tough choice. It is necessary for a user to compare different server types to select one that fits his or her requirements. In this article, we will compare and contrast Debian and Ubuntu servers.

        Debian and Ubuntu servers are considered quite similar in many respects. Let us dig deep into a comparison of the two servers…

      • Top 9 Best Ubuntu-Based Linux Distros

        In recent years, Ubuntu has become the default operating system of personal and professional users alike. Due to the popularity of the Ubuntu distribution, many Ubuntu-based Linux distros are now available on the Internet, each developed to fulfill special needs. In fact, there are so many unique Ubuntu distributions that it is impossible to count an exact number.

        One major reason behind the popularity of Ubuntu-based distros is that these distributions are easy to work with even for novice users. Ubuntu is also backed by a large community of open-source developers who actively work to keep Ubuntu up-to-date and bug-free.

      • BSD

        • OpenBSD/loongson on the Lemote Fuloong

          This machine uses the same CPU than the Yeeloong, a Loongson 2F which is a single-core MIPS-III 64-bit processor running at 800/900 MHz.

          As hinted in my previous article, contrarily to the Yeeloong, the Fuloong is less strict with the type of RAM it accepts, and my device is happily running with a Kingston 2GB DDR2 SO-DIMM module (ASU256X64D2S800C6), replacing the original 512MB module.

      • Screenshots/Screencasts

        • Linux Lite 5.4 RC1

          Today we are looking at Linux Lite 5.4 RC1. It comes with Linux Kernel 5.4, XFCE 4.14, based on Ubuntu 20.04, and uses about 400MB of ram when idling. Enjoy!

        • Linux Lite 5.4 RC1 Run Through

          In this video, we are looking at Linux Lite 5.4 RC1.

      • PCLinuxOS/Mageia/Mandriva/OpenMandriva Family

        • A Week with Mageia 8: Two Success Stories

          Mageia 8 was released not long ago and I installed it as soon as it was out. However, I took a week to work with it and see how it plays with the other distros in my laptop.

          I have a multi-boot system in which I always keep 4+ distros. Before this new install, I had PCLinuxOS, OpenMandriva Lx 4.2 (my latest install), Elive 3, MX Linux (Patio Feo), and Mageia 7. I logically wanted to upgrade Mageia 7 to 8.

          Historically, this set up has meant several grub 2- related headaches: if I installed OpenMandriva after Mageia, Mageia would boot very slowly. If, on the other hand, Mageia controlled the grub post installation, OpenMandriva would get a kernel panic. As I lack technical knowledge, I could never fix those problems myself.

          This time, I passed on the live version and decided to install the complete release, which I nostalgically call the PowerPack. If I recall correctly, one cannot upgrade from a live version, so I chose “install” instead of “upgrade,” which wipes out the root partition. Still, I kept /home intact. With this distro image, the install takes more time, but it was not bad. A plus is that the process has remained pretty much consistent all these years and this makes the installation a familiar path.

          When everything was done, I rebooted and Mageia 8 took over grub control. I booted this new release and all was working great: internet connection, desktop effects, sound, and screen edges. My personal settings were preserved, so I installed my preferred programs and the system was ready. Even Steam games were kept and working.

        • OpenMandriva build infrastructure switches to ARM servers

          As you may have noticed, the ABF build system has moved to a new server and is now fully operational.

          What you probably have not noticed is that it is now running on an ARM (aarch64) server.

          When looking for a new host, we decided to go with the aarch64 option – aarch64 support in OpenMandriva 4.2 is stable, the workloads on abf are perfect for a heavily multithreaded system, and reducing power consumption definitely can’t hurt.

      • IBM/Red Hat/Fedora

        • Is your Cloud infrastructure securely configured?

          The trend toward deploying security as part of the DevOps process has been shifting left the security and compliance processes. The DevSecOps practices have introduced processes to inspect application-code, Docker, and Kubernetes. These practices have allowed teams to detect and fix security issues faster and provide high-quality and compliant code.

          Still, many admins of Cloud accounts are securing account configuration by configuring an account via a UI, running a configuration assessment scan, and then fixing any issues found. While this might lead eventually to a securely configured account, they are essentially experimenting with an account until it becomes secure.

        • Delivering more flexible and tailored cloud-native management with the latest version of Red Hat Advanced Cluster Management for Kubernetes

          Today, we’re pleased to announce the general availability of Red Hat Advanced Cluster Management for Kubernetes 2.2, which delivers even greater integration and customization to how enterprises manage cloud-native workloads and environments. This latest release simplifies and streamlines operations and captures additional performance metrics to ensure optimization of Red Hat OpenShift clusters.

          Introduced in the summer of 2020, Advanced Cluster Management for Kubernetes enables organizations to manage multiple Kubernetes clusters and automate multi-cluster application deployments across the hybrid cloud. As the industry’s leading enterprise Kubernetes platform, Red Hat OpenShift is a crucial component in how organizations build a more agile hybrid cloud, and Advanced Cluster Management for Kubernetes helps these enterprises get the most out of these deployments by extending and scaling Red Hat OpenShift clusters.

      • Debian Family

        • Google works with a Debian developer to make COVID-19 research easier on Linux

          Medical research surrounding COVID-19 isn’t over though, as scientists still have plenty of work to do. Olek Wojnar, a developer of the Linux-based Debian operating system, has been working to help these scientists by packaging some software for easy installation on Linux. One of those packages was Google’s build software Bazel. Upon finding out about Wojnar’s efforts, Google offered to help with the process.

          “The Bazel team jumped in to help Olek and the COVID-19 research community. Yun Peng, Software Engineer at Google with Olek Wojnar led the team of Bazel and Debian volunteers to move the project forward. The joint effort between Debian and Google has produced some great results, including packaging the Bazel bootstrap variant in 6 months time (Debian 11 — released in Late 2021; Ubuntu 21.04 — 22 April 2021),” explains Google.

          The search giant further says, “Bazel is now available as an easy to install package distributed on Debian and Ubuntu. The extended Google team continues to work with Debian towards the next step of packaging and distributing Tensorflow on Debian and other Linux distributions.”

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • hipSYCL Sees Work-In-Progress Support For Intel oneAPI Level Zero Backend

        hipSYCL, the innovative implementation of Khronos’ SYCL for targeting CPUs and GPUs by integrating with existing toolchains, is seeing work on supporting Intel oneAPI Level Zero for running directly off Intel graphics hardware.

        The open-source hipSYCL project already supports SYCL CPU-based execution via OpenMP, targeting NVIDIA GPUs using CUDA, and targeting AMD Radeon graphics using HIP/ROCm. Now with a new work-in-progress back-end is support for Intel graphics using Level Zero. The hipSYCL project is one of several SYCL implementations aiming to support various CPUs and GPUs/accelerators while so far it’s been one of the most diverse. The hipSYCL project supports most of SYCL 2020 at present.

      • The Apache News Round-up: week ending 5 March 2021 : The Apache Software Foundation Blog

        Welcome, March! We’ve had a great week within the Apache community.

      • Web Browsers

        • Chromium

          • How to ‘un-google’ your Chromium browser experience

            On March 15th 2021, Google is going to block non-Google chromium-based browsers from accessing certain “private Google Chrome web services” by unilaterally revoking agreements made with 3rd parties in the past.
            Meaning, every Chromium based product not officially distributed by Google will be limited to the use of only a few public Google Chrome web services.
            The most important service that remains open is “safe browsing”. The safe browsing feature identifies unsafe websites across the Internet and notifies browser users about the potential harm such websites can cause.

            The most prominent feature which will be blocked after March 15th is the “Chrome Sync”. This Chrome Sync capability in Chromium based browsers allows you to login to Google’s Sync cloud servers and save your passwords, browsing history and bookmarks/favorites to your personal encrypted cloud vault inside Google’s infrastructure.
            Extremely convenient for people who access the Internet using multiple devices (like me: Chrome on a few Windows desktops, Chromium on several Slackware desktops and laptop and Chrome Mobile on my Android smartphone) and who want a unified user experience in Chrome/chromium across all these platforms.

          • Speeding up Chrome’s release cycle

            For more than a decade, Chrome has shipped a new milestone every 6 weeks, delivering security, stability, speed and simplicity to our users and the web. As we have improved our testing and release processes for Chrome, and deployed bi-weekly security updates to improve our patch gap, it became clear that we could shorten our release cycle and deliver new features more quickly. Because of this, we are excited to announce that Chrome is planning to move to releasing a new milestone every 4 weeks, starting with Chrome 94 in Q3 of 2021.
            Additionally, we will add a new Extended Stable option, with milestone updates every 8 weeks. Extended Stable will be available to enterprise administrators and Chromium embedders who need additional time to manage updates. Security updates on Extended Stable will be released every two weeks to fix important issues, but those updates won’t contain new features or all security fixes that the 4 week option will receive.

          • Chrome Moving To A 4-Week Release Cycle

            Google has been delivering new Chrome milestone releases on a six week cycle for more than one decade while moving ahead they are shifting to a four-week cycle.

            It was at the end of 2019 that Mozilla began shifting Firefox to a 4-week cycle and starting later this year Chrome will be doing the same.

          • Google Patches Actively-Exploited Flaw in Chrome Browser

            A flaw (CVE-2021-21166) in the Audio component of Google Chrome is fixed in a new update being pushed out to Windows, Mac and Linux users.

            Google has fixed a high-severity vulnerability in its Chrome browser and is warning Chrome users that an exploit exists in the wild for the flaw.

            The vulnerability is one of 47 security fixes that the tech giant rolled out on Tuesday in Chrome 89.0.4389.72, including patches for eight high-severity flaws.

          • GOGGLES: Democracy dies in darkness, and so does the Web

            This paper proposes an open and collaborative system by which a community, or a single user, can create sets of rules and filters,called Goggles, to define the space which a search engine can pull results from. Instead of a single ranking algorithm, we could have as many as needed, overcoming the biases that a single actor (the search engine) embeds into the results. Transparency and openness, all desirable qualities, will become accessible through the deep re-ranking capabilities Goggles would enable. Such system would be made possible by the availability of a host search engine, providing the index and infrastructure, which are unlikely to be replicated without major development and infrastructure costs. Besides the system proposal and the definition of the Goggle language, we also provide an extensive evaluation of the performance to demonstrate the feasibility of the approach. Last but not the least, we commit the upcoming Brave search engine to this effort and encourage other xsearch engine providers to join the proposal.

        • Mozilla

          • Robert Kaiser: Mozilla History Talk @ FOSDEM

            The FOSDEM conference in Brussels has become a bit of a ritual for me. Ever since 2002, there has only been a single year of the conference that I missed, and any time I was there, I did take part in the Mozilla devroom – most years also with a talk, as you can see on my slides page.

            This year, things were a bit different as for obvious reasons the conference couldn’t bring together thousands of developers in Brussels but almost a month ago, in its usual spot, the conference took place in a virtual setting instead. The team did an incredibly good job of hosting this huge conference in a setting completely run on Free and Open Source Software, backed by Matrix (as explained in a great talk by Matthew Hodgson) and Jitsi (see talk by Saúl Ibarra Corretgé).

          • An Introduction to WebAssembly

            WebAssembly, also called Wasm, is a Web-optimized code format and API (Application Programming Interface) that can greatly improve the performances and capabilities of websites. Version 1.0 of WebAssembly, was released in 2017, and became an official W3C standard in 2019.

            The standard is actively supported by all major browser suppliers, for obvious reasons: the official list of “inside the browser” use cases mentions, among other things, video editing, 3D games, virtual and augmented reality, p2p services, and scientific simulations. Besides making browsers much more powerful than JavaScript could, this standard may even extend the lifespan of websites: for example, it is WebAssembly that powers the continued support of Flash animations and games at the Internet Archive.

            WebAssembly isn’t just for browsers though; it is currently being used in mobile and edge based environments with such products as Cloudflare Workers.


            There are more and more programming language communities that are supporting compiling to Wasm directly, we recommend looking at the introductory guides from webassembly.org as a starting point depending what language you work with. Note that not all programming languages have the same level of Wasm support, so your mileage may vary.

      • SaaS/Back End/Databases

        • MySQL Drop a Column From Existing Table – Linux Hint

          MySQL Database Infrastructure is indeed a completely managed database service to build cloud-native apps. There are different cases where we perform different queries or commands to alter the database. Depending on the case, the ALTER expression is often included for the ‘ADD’, ‘Delete/DROP’ and ‘MODIFY’ commands. This tutorial guide will learn precisely how to remove a column from an existing table utilizing the MySQL DROP COLUMN clause.

        • MySQL Find Duplicate Values in Table – Linux Hint

          Redundant data can be kept in the table by the database program, influencing the database’s output in MySQL. Data replication, though, happens for different purposes, and it is an important job to identify the duplicate values in the table when dealing with a MySQL database. Broadly speaking, it is smart to use clear restrictions on a table often to store information that prevents redundant rows. Sometimes, in a MySQL database, you might like to calculate the number of repeated values. We addressed this question in this topic, in which you will learn about how to locate duplicate values through different ways and how to count duplicate values.

          To get started, you must have MySQL installed on your system with its utilities: MySQL workbench and command-line client shell. After that, you should have some data or values in your database tables as duplicates. Let’s explore this with some examples. First of all, open your command-line client shell from your desktop taskbar and type your MySQL password upon asked.

        • Open-source relational database startup Yugabyte raises $48M

          Open-source relational database startup Yugabyte Inc. said today it has raised $48 million in new funding to accelerate the launch of its fully managed Yugabyte Cloud offering.

          The Series C round was led by Lightspeed Venture Partners and included Greenspring Associates, Dell Technologies Capital, Wipro Ventures and 8VC. Including the new funding, Yugabyte has raised $103 million to date.

      • Productivity Software/LibreOffice/Calligra

        • 5 surprising things you can do with LibreOffice from the command line

          LibreOffice has all the productivity features you’d want from an office software suite, making it a popular open source alternative to Microsoft Office or Google Suite. One of LibreOffice’s powers is the ability to operate from the command line. For example, Seth Kenlon recently explained how he uses a global command-line option to convert multiple files from DOCX to EPUB with LibreOffice. His article inspired me to share some other LibreOffice command-line tips and tricks.

          Before we look at some hidden features of LibreOffice commands, you need to understand how to use options with applications. Not all applications accept options (aside from the basics like the –help option, which works in most Linux applications).

      • Programming/Development

        • PHP version 7.4.16 and 8.0.3 – Remi’s RPM repository – Blog

          RPMs of PHP version 8.0.3 are available in remi-php80 repository for Fedora 31-33 and Enterprise Linux (RHEL, CentOS).

          RPMs of PHP version 7.4.16 are available in remi repository for Fedora 32-33 and remi-php74 repository for Fedora 31 and Enterprise Linux (RHEL, CentOS).

        • Deno 1.8: Node.js alternative gets ‘out of the box GPU accelerated machine learning’ [Ed: Microsoft Tim is now promoting Deno, as Deno supports Microsoft monopoly on many levels. The Register is not what it once was…]

          The Deno project has released version 1.8, including experimental support for the WebGPU API enabling “out-of-the-box GPU accelerated machine learning.”


          There is also a new language server, used to support smart features in code editors, that works with both Visual Studio Code and other editors. The TypeScript version in Deno 1.8 has been upgraded to the latest 4.2.

        • Perl/Raku

          • Monthly Report – February

            Apology for the delay in monthly report, usually I get it released on first day of the month.

            Last month was the shortest month of the year as you all know, so getting things done became relatively harder.

            What is in store this time?

            Well, there were two things that took away all the attentions.

        • Python

          • How to Use bulk_create() in Django? – Linux Hint

            Django framework can be used to create a web application with a database by writing script in models.py and views.py files of the Django app. The data can be inserted into the database tables by using Django Administration Dashboard or by writing a script in the views.py file. Django Administration Dashboard requires a login for an authenticated user to access the tables of the database. Single or multiple records can be inserted into the database tables by writing a script. bulk_create() method is one of the ways to insert multiple records in the database table. How the bulk_create() method is used to insert the multiple data in a Django database table will be shown in this tutorial.

          • How to Use Django Channel – Linux Hint

            Django is a popular Python framework used to develop web apps using the WGSI (Web Server Gateway Interface) and ASGI (Asynchronous Server Gateway Interface) server specifications. WGSI is used for developing synchronous Python apps, and AGSI is used for developing asynchronous and synchronous web apps. Channel is a useful feature of Django that is used to handle WebSocket, chat protocol, etc. alongside the HTTP protocol. Channel is built on the ASGI server specifications. A two-way interactive communication session between the user’s browser and the server can be opened using a WebSocket. The client initiates the WebSocket connection and the server responds with an accept or close message. The WebSocket messages are pushed into the channel using producers and sent to the consumers that are listening on the channel. This tutorial shows you how to use channels to handle WebSocket messages.

          • Python range() Explained: What It Is and How to Use It – Make Tech Easier

            One aspect of programming that many tutorials don’t tell you upfront is the amount of looping and counting you’ll have to do. As such, any programming language worth its salt will offer ways to enumerate numbers in a repeated way. The Python range sequence type is one of those methods.

        • Rust

          • Planning the Rust 2021 Edition

            The Rust 2021 Edition working group is happy to announce that the next edition of Rust, Rust 2021, is scheduled for release later this year. While the RFC formally introducing this edition is still open, we expect it to be merged soon. Planning and preparation have already begun, and we’re on schedule!

            If you’re curious what features Rust 2021 will introduce or what the timeline for getting the edition released on stable is, keep reading!

  • Leftovers

    • Kids, remember to talk to your parents about [Internet] safety!

      By now, a vast number of scientific studies confirm that this particular distraction can quickly evolve into something much more problematic, namely an addiction: “Internet addiction is described as an impulse control disorder and is very similar to pathological gambling” (Stefaniuk 65). Outside of the academic sphere, this striking comparison was recently also highlighted in the documentary The Social Dilemma, where the “Pull-to-refresh” smartphone feature is likened to the mechanism of a slot machine. A basic function that can trigger a seemingly endless chain of programmed volatility, every swipe being a new chance for reward, as long as the price keeps being paid. Which is? Undivided attention?

      A little further down in the above-mentioned study, not too far after the gambling simile, the following conclusion is drawn: “The problem of Internet addiction is especially hazardous when it comes to children and teenagers, for – due to their immaturity – they become addicted much faster than adults do” (66). While I certainly agree that children and young adults should be informed about the dangers of internet addiction, they are not the first age group that comes to my mind when I hear of gambling-like addictions.

    • Science

      • [Old] Disagreeing takes up a lot of brain real estate

        In discord, she said, two brains engage many emotional and cognitive resources “like a symphony orchestra playing different music.” In agreement, there “is less cognitive engagement and more social interaction between brains of the talkers, similar to a musical duet.”

        The lead investigator of the paper is Alex Salama-Manteau, a former graduate student of economics at Yale and now a data scientist at Airbnb. Mark Tiede, a research scientist at the Haskins Laboratory at Yale, is second author of the paper.

      • [Old] Interpersonal Agreement and Disagreement During Face-to-Face Dialogue: An fNIRS Investigation

        Verbal face-to-face communication is central to everyday transactions between humans throughout the entire lifespan. The foundational nature of live and interactive social functions is in contrast to the nascent development of neurocognitive theories to explain them which have been limited by lack of data from live and natural social interactions. Here we have addressed this knowledge gap by recording neural responses and speech concurrently during live face-to-face discussions of topics where the interlocutors were either in agreement or disagreement, a common feature characteristic of verbal exchanges between two individuals. The dialectical misattunement hypothesis (Bolis et al., 2017) proposes that disturbances in the reciprocal unfolding of an interaction result in a change of the dyadic state, thus predicting a behavioral and neural difference between the two conditions employed in this study. Findings in this investigation are consistent with this prediction. A theoretical neural framework for the effects observed in this investigation remain nascent but contribute to an emerging neuroscience of social interactions that may serve to coordinate activities of multiple component systems often investigated alone such as face processing, language production, and theory of mind. In so doing, this paradigm provides a template for developing methods and models to access neural processes that are responsive to spontaneous, rapid, and multimodal components of live interactions.

    • Hardware

      • NXP i.MX 9 processors to integrate Arm Ethos U-65 microNPU, EdgeLock secure enclave

        NXP i.MX 6 and i.MX 8 processors are widely used in industrial boards and systems-on-module, and the company has now teased a new family with i.MX 9 processors integrating Arm Ethos-U65 1 TOPS microNPU, as well as the company’s EdgeLock secure enclave for increased security.

        The company did not provide that many technical details, so we still don’t know which CPU cores, GPU, and exact peripherals will be found in the processor. But we do know the i.MX 9 processors will be manufactured with a 16/12nm FinFET class of process technology optimized for low power, and features the “Energy Flex” architecture that combines “heterogeneous domain processing (independent applications processor and real-time domains with a separate low-power multi-media domain), design techniques, and process technology to maximize performance efficiency”. That means most blocks of the processor can be turned off for low power audio or CAN networking use cases, and other industrial applications requiring fast boot, defined as sub-100 milliseconds boot time.

    • Health/Nutrition

      • EU starts review of Russia’s ‘Sputnik V’ coronavirus vaccine

        The European Medicines Agency (EMA) has started its review of the “Sputnik V” vaccine developed by Russia’s Gamaleya Research Institute. The vaccine will undergo a “rolling review” based on the results of laboratory and clinical studies in adults. This was announced in press releases from both the EMA and the Russian Direct Investment Fund (RDIF), which has overseen the drug’s development.

      • Are patents the cause of—or solution to—COVID-19 vaccine innovation problems? (No!)

        As we discussed in an earlier post, relative to the number of people needing (and wanting) to get vaccinated, there’s a vaccine shortage. The shortage has exacerbated structural inequalities: distribution of the existing vaccine supply has reflected stark racial disparities within the United States and even more pronounced global disparities. This shortage is not a surprise: it was clear from the earliest stages of COVID-19 vaccine development that short-term demand would far outstrip supply for any successful vaccine, which is why the federal government should have invested more—and earlier—in building at-risk manufacturing capacity for all the leading vaccine candidates. But now, the scale of the problem has become widely apparent. For some, weakening patent rights may look like a solution.

        Under the conventional account, the patent system reflects a fundamental tradeoff between innovation incentives and access: patents incentivize innovation by allowing patent owners to charge supra-competitive prices, and for a static demand curve, this means that fewer consumers will purchase the patented product. Thus, as Ken Shadlen explains, “[i]t’s become common wisdom in the ‘access to medicines’ community that the way to increase access to pharmaceutical products is to reduce the legal barriers to market entry that patents impose, thereby increasing competition among multiple suppliers.” This strategy was among the tools used to increase global access to HIV/AIDS treatments. But there are many ways to avoid the incentives/access tradeoff without eliminating patents, and removing patents doesn’t make sense as a near-term access strategy for COVID-19 vaccines. If all relevant vaccine patents were suddenly invalidated, it would not lead to more firms manufacturing these vaccines anytime soon, for at least five reasons.

    • Integrity/Availability

      • Proprietary

        • Wipro to acquire UK-based IT consultancy Capco for $1.45 billion

          The acquisition is subject to customary closing conditions and regulatory approvals and is expected to close in the quarter ending June 30, 2021.

        • Development on Windows is Painful

          Overall, I think I can at least tolerate this development experience. It’s not really the most ideal setup, but it does work and I can get things done with it. It makes me miss NixOS though. NixOS really does ruin your expectations of what a desktop operating system should be. It leaves you with kind of impossible standards, and it can be a bit hard to unlearn them.

          A lot of the software I use is closed source proprietary software. I’ve tried to fight that battle before. I’ve given up. When it works, Linux on the desktop is a fantastic experience. Everything works together there. The system is a lot more cohesive compared to the “download random programs and hope for the best” strategy that you end up taking with Windows systems. It’s hard to do the “download random programs and hope for the best” strategy with Linux on the desktop because there really isn’t one Linux platform to target. There’s 20 or something. This is an advantage sometimes, but is a huge pain other times.

          The conclusion here is that there is no conclusion.

        • Malicious Code Bombs Target Amazon, Lyft, Slack, Zillow

          Researchers have spotted malicious packages targeting internal applications for Amazon, Lyft, Slack and Zillow (among others) inside the npm public code repository — all of which exfiltrate sensitive information.

          The packages weaponize a proof-of-concept (PoC) code dependency-confusion exploit that was recently devised by security researcher Alex Birsan to inject rogue code into developer projects.

          Internal developer projects typically use standard, trusted code dependencies that are housed in private repositories. Birsan decided to see what would happen if he created “copycat” packages to be housed instead in public repositories like npm, with the same names as the private legitimate code dependencies.

        • Ryuk ransomware develops worm-like capabilities, France warns

          A new sample of Ryuk ransomware appears to have worm-like capabilities, according to an analysis from the French National Agency for the Security of Information Systems (ANSSI), France’s national cybersecurity agency.

        • FireEye finds evidence Chinese [crackers] exploited Microsoft email app flaw since January [iophk: Windows TCO]

          Cybersecurity group FireEye on Thursday night announced it had found evidence that [crackers] had exploited a flaw in a popular Microsoft email application since as early as January to target groups across a variety of sectors.


          Since then, FireEye found evidence that the hackers had gone after an array of victims, including “US-based retailers, local governments, a university, and an engineering firm,” along with a Southeast Asian government and a Central Asian telecom.

        • Security

    • Defence/Aggression

      • CPAC 2021: A school for indoctrinating and radicalizing right-wing extremists

        Today’s Republican Party is now a de facto terrorist organization. Donald Trump, the twice-impeached president whom Senate Republicans twice acquitted for his crimes, is its leader.

        Trump, a president who attempted a coup against American democracy that included a lethal assault on the Capitol, has not been broken, and is not behaving as if he had been defeated. At CPAC, he spoke in his role as leader of a violent right-wing insurgency, one which law enforcement and counterterrorism experts warn is continuing to gain momentum.

        The danger from right-wing terrorists is now so great that the House of Representatives will not convene on Thursday this week because of credible reports that Trump supporters and QAnon cultists may be planning an attack.

      • Indian Official Claims Huge Blackout May Have Been [an attack]

        The October power outage left millions without electricity, brought public transit to a halt, and shut down communication networks for up to 12 hours in some parts of the city, according to Reuters.

        The day before Deshmukh’s announcement, The New York Times published a report suggesting that the cyberattack was a warning shot of sorts over ongoing conflicts between the two countries, though the Chinese Embassy dismissed it as speculation.

      • Facebook Shuts Down Account Of International Union Of Muslim Scholars (IUMS), Which Frequently Calls For Terror And Jihad

        On January 5, 2021, Facebook shut down the account of the International Union Of Muslim Scholars (IUMS), which is based in Doha and has been supported since its establishment by the Qatari and Turkish regimes.[1] The IUMS was founded in 2004 by Sheikh Yousuf Al-Qaradhawi, a major ideologue of the Muslim Brotherhood who lives in Qatar and has been sponsored by its regime for years. Al-Qaradhawi also headed the organization until 2018, when he was succeeded by Dr. Ahmad Al-Raissouni.

        Neither Facebook nor the IUMS reported the exact reason for the closure of the account, but Arab media that support the IUMS stated that the reason was a fatwa posted two days earlier, on January 3, signed by the organization’s president Al-Raissouni and its secretary-general ‘Ali Al-Qaradaghi. The fatwa called for an economic boycott of Israel in response to the normalization agreements recently signed with it by several Arab states.[2] However, the closure was likely prompted not by the fatwa’s call to boycott Israel, but by its explicit call to wage jihad against it by any means. Similar materials supporting jihad and terrorism have been published by the IUMS for many years.

      • Médecins Sans Frontières worker killed in Syrian refugee camp

        It is home to more than 65,000 people, four fifths of them women and children but also some adult men. All were displaced by the final assault by US-backed forces who drove back Isis between 2014-2019, and they include many Isis wives and children.

      • Knife attack in Sweden leaves at least eight injured, three critically

        All eight victims were hospitalised and three had life-threatening injuries, the Jonkoping regional council said on its website.

        Police said the suspect attacked at least five different locations in Vetlanda.

      • Sweden: Police probe ax attack as possible ‘terror crime’

        According to Swedish newspaper the Aftonblade, police spokesperson Angelica Israelsson Silfver said: ”Some are seriously injured and some are slightly injured, but no one is dead.”

        Regional police chief Malena Grann confirmed at a news conference that a suspect had been arrested after ”police opened fire.”

      • UPDATE: Terror Attack in Sweden – Afghani Migrant Stabs Eight in Vetlanda (Video)

        Update: According to Swedish New Agency, Expressen the attacker is a 22-year-old Afghan citizen who has previously been convicted of drug offenses. The terrorist is said to have received regular visits from social services at home and has been suffering from “mental problems” for some time.

        In virtually every instance of jihad attacks in Sweden, politicians & media hide the identity of the attackers. In rare instances when the identity of an attacked is leaked, the suspect is presented as possibly suffering from mental health issues.

      • ISIS and Al-Qaeda’s Sub-Saharan Affiliates Are Poised for Growth in 2021

        Once considered a backwater for jihadists, sub-Saharan Africa is now at the forefront of the counterterrorism landscape. With core ISIS and al-Qaeda reeling from sustained Western counterterrorism campaigns, attention has shifted from former jihadist bases in the Middle East and south Asia, respectively, to the Sahel and Nigeria, the Horn of Africa, and, most recently, the continent’s southeastern Swahili coast. ISIS and al-Qaeda affiliates throughout sub-Saharan Africa are well-positioned to expand their influence, garner new recruits, spread propaganda, and in some cases, capture territory.

        As weak states give way to weak regions, overmatched security forces are being upstaged by well-armed jihadists capable of mounting complex and coordinated operations that increasingly resemble those of core ISIS and al-Qaeda themselves. These terrorists have taken advantage of porous borders throughout Africa and, in opportunistic fashion, have capitalized on fraught political transitions and lack of security sector accountability in countries like Mali and Mozambique, working to further destabilize already fragile states.

      • Muslims in Switzerland speak out against proposed ‘burka ban’

        According to reports by Al Jazeera, the “burka ban”, as it has come to be known, was initiated by the Egerkinger Komitee, which is a group belonging to the right-wing Swiss People’s Party (SVP). The political grouping said it organises “resistance against the claims to power of political Islam in Switzerland”.

        The Swiss are expected to vote in a referendum about the “burka ban” on March 7.

    • Transparency/Investigative Reporting

      • Far-right misinformation on Facebook outranks real news

        Overall, misinformation authors on the far right received 65% more engagement per follower than other pages, according to the research.

        Real news was more popular than misinformation in every other partisan news category examined, according to the study — for the slightly right, center, slightly left and far left, real news outranked misinformation on Facebook. Misinformation outranked real news only on the far right, according to the research.

    • AstroTurf/Lobbying/Politics

      • YouTube CEO Says Trump Channel Will Stay Suspended Over Violence Risk

        The Google-owned platform will lift the suspension when it determines the risk of violence has decreased, but if the former U.S. president violates the rules, the channel will be removed again.

      • Amend H.R. 1 To Protect Voting Rights, Not Big Donors

        The “For the People Act” (H.R.1/S.1) is voting rights legislation now pending in Congress. Civil rights organizations are urgently supporting this bill in order to secure voting rights against over 250 voter suppression bills introduced by Republicans this year in 43 state legislatures.

        As a GOP lawyer bluntly told the U.S. Supreme Court on March 2 in an Arizona voting rights case when asked why the Republican Party opposed removing a voting restriction, “Because it puts us at a competitive disadvantage relative to Democrats.” The voting rights sections of H.R.1 are important federal measures to enact at a time when the Republican Party seeks to restrict voting rights at the state level.

        However, buried in the middle of H.R.1 is a campaign finance reform section that will only further entrench the domination of campaign financing by the super-rich and moneyed special interests. Among major problems with H.R. 1’s campaign finance provisions are that it effectively excludes third party candidates. The qualifying threshold to receive presidential primary matching funds is increased five times. This higher threshold puts public funding beyond the reach of third-party candidates.

        As a Green Party candidate for president, I was the only candidate in any party to apply for matching funds in 2020. The major party candidates eschewed the program because a condition of receiving matching funds is a cap on the amount of private spending, which was $51.8 million in 2020. That was too low for the major party candidates who could raise so much more from private sources. H.R. 1 eliminates the existing cap on private campaign spending by publicly funded presidential candidates. It simply adds public funding to unlimited private funding.

    • Censorship/Free Speech

    • Freedom of Information/Freedom of the Press

      • Why charge Saudi crown prince MBS in Germany?

        The brutal murder of the journalist Jamal Khashoggi at the Saudi consulate in Istanbul in 2018 is just one of the more extreme examples in a country where the persecution of journalists is reported to be systematic.

        RSF’s complaint cites the arbitrary detention of 34 journalists, including the blogger Raif Badawi, who had criticized the role of religion in Saudi Arabia and ultimately received a sentence of 10 years in prison and 1,000 lashes. In 2015, DW awarded him its Freedom of Speech Award.

      • Myanmar: Reporter placed in chokehold as 6 journalists charged

        In the AP video, Thein Zaw appears to be photographing security forces running at protesters on Saturday in Myanmar’s largest city Yangon.

        Thein Zaw tries to escape as seven people place him in a chokehold and handcuffs.

        A policeman then pulls him with the handcuffs.

    • Civil Rights/Policing

      • Hong Kong Court Orders 47 Pro-Democracy Activists Held

        After a four-day hearing, a Hong Kong court ruled Thursday that 47 pro-democracy advocates accused of subversion under a national security law must remain in custody.

        The West Kowloon Magistrates Court denied bail to 31 of the activists, while another identified as law professor Benny Tai withdrew his bail petition because he was being held in another case.

      • We Need to Talk About the Male Victims of ‘Honour-Based’ Violence

        More needs to be done to help the men who are victims of so-called honour-based violence (HBV) in the UK, researchers have told VICE World News.


        2,024 cases of HBV were reported in England and Wales in 2019-2020, according to official Home Office statistics, but the true figure is likely to be much higher, due to a reluctance by victims to come forward. 80 percent of HBV victims are women, but a significant number of men are suffering in silence.

      • Where is a Black Lives Matter when it comes to enslaved African girls?

        They are kidnapped by gangs of criminals with ties to jihadist groups in the north-east of the country.

        Young women are often forced to marry the kidnappers when they fail to make money on ransom demands. They are often sold for 2,000 naire, the Nigerian currency (equivalent to 12 dollars). The NGO Free the Slaves estimates a profit of $ 1.6 billion (an amount greater than the GDP of eight African countries) from African slavery each year.

        According to the bishops, “Nigeria is on the verge of collapse” and is in danger of breaking apart.

        Unfortunately, the West feeds on Third Worldism and says “Black Lives Matter” but does not care about this slavery, on the contrary it often collaborates with it.

    • Monopolies

      • Patents

        • The EU SEPs Expert Group Report – Transparency Issues

          In an ideal world we would be able to rely on objective declarations of essentiality. However, the world we live in is far from ideal – there is a distinct lack of transparency in the context of the SEP licensing frameworks managed by Standard-Setting Organisations (SSOs). This lack of transparency has negative consequences. As noted in the European Commission’s Communication of 29 November 2017, several studies on important technologies demonstrate that, when strictly assessed, only between 10% and 50% of declared patents are really essential (see Régibeau et al., Transparency, Predictability, and Efficiency of SSO-based Standardization and SEP Licensing, A Report for the European Commission (2016), p. 62). Are there ways to improve access to reliable information on the scale of exposure to SEPs? Improved transparency would benefit the users of standards, especially small and medium-sized enterprises, that have little experience of licensing practices when they enter the relevant markets looking for connectivity.

          This concern over transparency is noted by the Expert Group in its report, which states that some SSOs’ declarations disclose little to no data in relation to specific SEPs. Other SSOs including the European Telecommunications Standards Institute (ETSI) are more demanding as they ask for detailed declarations – yet, such declarations are not updated regularly so as to show the public modifications within the SEP landscape. The life-cycle of patents and patent applications often sees changes to ownership (patentee) and property boundaries (scope). Applications may be refused; patent claims may be narrowed. Patents may be revoked for lack of novelty or inventive step, or simply expire. They could also be deprived of their essential nature if the relevant standards are amended or supplemented, potentially making existing declarations incorrect and unreliable. Moreover, generally this info, on ownership of patents and changes in scope, falls within the data managed not by SSOs but by the European Patent Office (EPO).


          This proposal echoes a similar one recently put forward in the final report produced by a consortium including the Eindhoven University of Technology (TU/e) and the Technical University of Munich (TUM), and commissioned by the European Commission’s Joint Research Centre (JRC). That report, discussed in an earlier post, suggests to identify a supervisory body aimed at devising the assessment procedures and to bear responsibility for their quality and performance. More specifically, it recommends that assessment tasks be outsourced to already existing entities, particularly organisations and individuals who already perform analogous tasks, including patent offices and patent attorneys. An important role – that report reminded – should be played by the EPO and national patent offices in Europe, which are likely to be the most appropriate organisations to perform high quality essentiality checks, as they can rely on experts with enhanced skills and guarantee impartiality and objectivity.

          The Expert Group also suggests that costs for the essentiality checks are kept at a fair and equitable level. Likewise, procedures to appeal decisions on essentiality of approved SEPs should be fast and cheap. To adequately inform all stakeholders, some members of the Expert Group urge that approved SEPs, namely those SEPs which have been checked by independent assessors and confirmed as real SEPs, are included in SSOs’ databases. Also, incentives should be given to SEP owners to submit their declared SEPs for essentiality confirmation as rapidly as possible after the adoption of the standard.

        • Paper C 2021 blog will open after the end of the exam, 5 March 2021 16:15

          All candidates, as well as tutors who helped candidates prepare for EQE 2021, are invited to contribute to the discussions on our EQE blogs! You can post your comments in English, French or German. You are invited to post your comments under your real name, but it is also possible to use a nickname if you wish to hide your identify.

        • PTAB Sets Preliminary Motions in CVC v. ToolGen Interference

          On March 1st, the U.S. Patent and Trademark Office Patent Trial and Appeal Board (PTAB) issued its Order on the Preliminary Motions Lists submitted by Junior Party University of California/Berkeley, University of Vienna, and Emmanuelle Charpentier (collectively, “CVC”) and Senior Party ToolGen Inc. in Interference No. 106,127. (Somewhat curiously, the Board did not issue an Order in Interference No. 106,126 between The Broad Institute, Harvard University, and the Massachusetts Institute of Technology (collectively, “Broad”) and Senior Party Toolgen on similar interfering subject matter.)

          CVC had requested permission to file six proposed motions (one of which is Motion No. 6 under 37 C.F.R. § 41.208(a)(4), which seeks judgment based on priority, which was routinely deferred to the Priority Phase of the interference).

        • Federal Circuit on TM Licensing: We’re going to Enforce the Terms

          Authentic makes branded apparel, and had a non-exclusive license from the US Army to make Army branded items. (Signed back in Aug 2010). One line of clothing was going to feature The Rock (Duane Johnson) with Army-Style clothing. (Seriously though, tie those shoes).

          The license included a requirement that any sale/distribution must first receive the Army’s “advance written approval” subject to the Army’s “sole and absolute discretion.”

          The Army refused an expansion of The Rock line of clothing; rejected other proposal; and also allegedly delayed in approving other initiatives. Eventually Authentic sued the Army for Breach in the Court of Federal Claims (CFC).


          Who is the source of goods: One reason that the Army did not approve various advertisements was that the Army did not want to be recognized as the source of the licensed goods. Authentic argued that source identification is the key function of trademark law and is implicit in its license to use the Army mark “for trademark purposes.”

        • EPC changes regarding inventors [Ed: As if the EPC is still being followed; the EPO violates everything is importance in the EPC. Every day.]

          A minor change is being made to the EPC regarding inventors (Rule 19 EPC and 143 EPC); in particular, the changes concern the notifications of inventors relating to the provision and use of inventor addresses.

          The changes to Rule 19 EPC relate to paragraphs 3 and 4. From 01 April 2021, inventors will no longer be notified by the EPO that they have been designated as an inventor in a European patent application. In addition, since notifications will no longer be made, the requirement for inventor addresses to be provided is also being removed. Instead, a country and place of residence (for example, city and postal code if available) will be required.

        • EU Study Reveals Positive Links Between Intellectual Property Ownership and Economic Performance [Ed: More of that same old propaganda conflating the protectionism for the rich with the false correlation, alleging it's that protectionism that begets collective wealth (rather than concentration of capital)]

          “By effectively protecting their intellectual property, innovative companies can secure financing, grow, collaborate, and create value, but how does owning intellectual property rights impact a company’s performance?” That was the question guiding a recent study carried out by the European Union Intellectual Property Office (“EUIPO”) and the European Patent Office (“EPO”). In an effort to compare “the economic performance of firms that maintain intellectual property rights with those that do not,” the two IP bodies uncovered an interesting (although unsurprising) link between intellectual property rights and business performance.

        • Intellectual property rights – a key for stimulating economic growth [Ed: Repeating EPO lies. EPO, corrupted by litigation lobbies and run by crooks who rob the institution, wants us to think that because the rich guard their monopolies it's thus good for the economy]

          According to a recent study published by the European Intellectual Property Office (“EUIPO”), companies that own and protect their intellectual property rights (“IP”) generate 20% higher revenue per employee when compared to non-IP owning companies. The report further found that these firms (the ones with IP) pay on average 19% higher remuneration to their employees, and revenue per employee for IP owning companies average a staggering 55% higher.

        • Software Patents

          • KOL323 | World Crypto Network: Announcing the Open Crypto Alliance to Protect Bitcoin, Blockchain and Crypto

            Kinsella on Liberty Podcast, Episode 323. Jed Grant and I appeared on the World Crypto Network channel with host Thomas Hunt to discuss the looming patent threat to bitcoin.

          • Overview of the revised EPO Guidelines for Examination [Ed: Corrupt EPO make yet more illegal changes to open the gates to software patent in spite of the lack of legal approval (it's a rogue institution at this point)]

            There has been clarification concerning exclusions to user interfaces (G-II, 3.7.1): in particular, if technical considerations are involved to implement the linguistic model on a computer, such as those relating to the internal functioning of a computer, then a technical effect may arise.

            There has also been clarification concerning exclusions to data retrieval, forms and structures (G-II, 3.6.3): a data structure only contributes to technical character of the invention if it produces a technical effect and cognitive data does not contribute to producing a technical effect.

            There is a new section relating to database management systems and information retrieval (G-II, 3.6.4), which states that distinctions are made between executing structured queries by database management system, and information retrieval, and clarification regarding method steps defining additional devices (F-IV, 3.9.2). If not all features of the method claim are reflected in claims in other categories referring to said method, said claims in other categories have to be construed and examined separately, and if a step carried out by specific technical means cannot be carried out by generic data processing means an objection under Art. 84 EPC will normally be raised.

      • Trademarks

        • Twitter Opposes ‘Tweet’ Trademark Application For Bird Food Company

          Way back in the simpler time of 2010, Mike wrote up an interesting piece on Twitter’s trademark enforcement policies and how it handles third parties that interact with Twitter using Twitter-related terms. In short, Twitter built a reputation for itself in freely licensing these terms for use by third parties, believing that tools that made Twitter more useful were good for the platform overall. It was a smart, productive way of looking at protecting trademarks so as not to lose them to genericide.

      • Copyrights

        • LiquidVPN Sued for Encouraging Piracy By Touting “Anonymous” Streaming

          Can a VPN provider be held liable when its users illegally stream films and TV series? What if that provider markets itself as a way to avoid “threats and jail time” for illegal viewing? Those are the issues posed to a Florida federal judge in a suit involving the piracy of films starring Amy Schumer, Gary Oldman and Woody Harrelson.

          Voltage Holdings, Millennium Funding and Hunter Killer productions on Thursday sued 1707 Management and its owner Charles Muszynski arguing they’re liable for users’ infringement of I Feel Pretty, Shock and Awe, Automata, Survivor, and Hunter Killer.

          The rights owners argue LiquidVPN, which they allege to be owned by Muszynski and 1707, is purposely friendly to copyright infringers — noting its practice of assigning anonymous IP addresses and marketing that touts how it makes piracy easier.

        • Yout v RIAA: Use of Technical Protection Measure Does Not Equal Abuse

          Last October the company behind YouTube-ripping platform ‘Yout’ sued the RIAA for sending “abusive” DMCA anti-circumvention notices to Google. The RIAA responded by insisting that YouTube’s rolling cipher is indeed an “effective technological measure.” Yout has now fired back, stating that mere ‘use’ of a protection measure cannot be extrapolated into a circumvention violation.

        • Movie Companies Sue VPN Provider for ‘Encouraging’ and ‘Facilitating’ Piracy (Updated)

          The makers of popular films including “Hunter Killer,” “Automata,” and “I Feel Pretty,” accuse LiquidVPN’s former and current owner of promoting and facilitating piracy. In addition to damages, the companies want the defendants, who are linked to a hosting company, to close common BitTorrent ports, terminate repeat infringers, and block several pirate websites.

IRC Proceedings: Thursday, March 04, 2021

Posted in IRC Logs at 2:53 am by Needs Sunlight

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 QmbTSYcLqfRFuLWwSrV8rt1m5Wvqgyv3V2AcRfQX3oVzdc IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmeKXgZWRxBv2T3kTkHWg4bv1hwGDNwJ86YxE9uCPXXXDT IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmWBR12TBM7wA6wrKoZSgmffymc3NiXkcdgjREN3FUhRNg IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmcYtJFf1UGF1b7HPuLEK8TBvdVosr1npuBY8S24dMCqsD IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmX2EG8365A6h19987pEJpuXfiBDSpD5masYucnRzBVJEi IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmcCFhjbDySyGSy6jnpyJb2yCYkT14dxqadQAxhsyvSBNs IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmQwwtog7EXeTvpYG5qLWPsU6eKhLDw36nFp2sFeqecuFy IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmYvuMB753qoK1CCMVZWHcpSdfLs5mpDPcdSFysMRRGmKK IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmWJmmXoWSvDVv1GXCBeefymKQ4ous4fqKHL8U96jvMRWM

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts