Nathan Proctor: Right to Repair and the DMCA

Posted in DRM, Hardware at 9:26 pm by Dr. Roy Schestowitz

Video download link

LibrePlanet 2019 video. Original here. Slides here.

[Meme] Calle Calling…

Posted in Europe, Patents at 8:18 pm by Dr. Roy Schestowitz

Calle anarchy: “Legal Anarchy”... “My lovely boss”

Summary: The values of the Habermasian EPO judge depend on who’s paying the salary

The EPO’s War on Justice and Assault on the Law — Part 6: The Habermasian Who Warned About “Legal Anarchy”

Posted in Europe, Patents at 8:07 pm by Dr. Roy Schestowitz

Previously in this series:

Josefsson tweets
Some tweets from “Calle” Josefsson warning about the dangers of “legal anarchy” in Hungary and Poland.

Summary: The political orientation of a Benoît Battistelli-appointed EPO judge who has the audacity to talk about legal anarchy and bemoan abuse of the law; the António Campinos administration extended his term until (at least) 2027

Following his appointment as a Senior Judge at the Svea Court of Appeal in March 2013, Carl Josefsson started to operate a Twitter account under the username “JosefssonCalle”.

“Calle” is a diminutive form of “Carl” which is commonly used in Sweden.

Josefsson’s Twitter account was active between July 2013 and September 2016.

His contributions as a member of the Swedish “Twitterati” consisted mostly of comments on current affairs.

“In his contributions to the debates in the SvJT, Josefsson liked to buttress his arguments with references to the theories of the German philosopher and sociologist, Jürgen Habermas.”Josefsson was particularly fond of re-tweeting Swedish newspaper articles about attacks on the independence of the judiciary in eastern European countries such as Hungary and Poland.

In addition to this, he posted a number of tweets on the subject of Brexit – or “Borexit” as he liked to call it – including a reference to an article by his favourite philosopher, Jürgen Habermas.

During this time, Josefsson also contributed occasional articles on legal affairs to the Swedish daily newspapers such as the Svenska Dagbladet.

Another forum to which he made regular contributions was the Svensk Juristtidning (SvJT), a specialist legal journal primarily aimed at lawyers. One of his favourite hobby horses here was the role of the courts and the judiciary in a democratic constitutional “rule of law” system.

In his contributions to the debates in the SvJT, Josefsson liked to buttress his arguments with references to the theories of the German philosopher and sociologist, Jürgen Habermas.

“During the Nazi era, Habermas himself was a Jungvolkführer, a leader of the German Jungvolk, which was a section of the Hitler Youth.”Habermas who was born in Düsseldorf in 1929 was the son of the executive director of the Cologne Chamber of Industry and Commerce. He later described his father as a “passive sympathiser” with the Nazis and admitted that, as a youth, he had shared that mindset.

During the Nazi era, Habermas himself was a Jungvolkführer, a leader of the German Jungvolk, which was a section of the Hitler Youth.

After the war, Habermas studied philosophy and sociology under the critical theorists Max Horkheimer and Theodor W. Adorno of the “Frankfurt School”. He finished his postgraduate studies in political science at the University of Marburg under the Marxist Wolfgang Abendroth.

Habermas became one of the most influential members of the “Frankfurt School” and he enjoyed significant prominence as a public intellectual in the post-war Federal Republic of Germany.

He attempted to develop a revised form of Marxist social theory which was eclectic and able to draw on insights coming from other directions, including Kantian ethics. As an advocate of “networking” and dialogue and a proponent of a robust and transparent civil society, his ideas about democracy and rational decision-making have been influential in many social movements, particularly in left-wing circles in Germany and elsewhere.

“Carl Josefsson’s acquaintance with the work of Habermas appears to date from the time of his postgraduate studies in Germany which led to the award of a Master of Laws degree (LL.M) from the Johann Wolfgang Goethe-Universität in Frankfurt in 1995.”Habermas proposes a deliberative concept of democracy that focuses on the procedures that exist, or should exist, whereby the ideas and ideals that inform public discourse as well as the decisions that are taken in democratic regimes remain open to debate.

Carl Josefsson’s acquaintance with the work of Habermas appears to date from the time of his postgraduate studies in Germany which led to the award of a Master of Laws degree (LL.M) from the Johann Wolfgang Goethe-Universität in Frankfurt in 1995.

In the next part we shall see how the erstwhile critic of “legal anarchy” ended up changing his tune and accommodating himself to the legal “no-man’s land” of the EPO.

Paid-for Plugs and Coordinated Marketing Fluff (PR Campaigns) Are Ruining ‘Linux’ Sites

Posted in Deception, GNU/Linux at 7:23 pm by Dr. Roy Schestowitz

Video download link

Summary: Junk ‘articles’ (just marketing disguised as ‘news’) spoil the World Wide Web; companies repeat the same sales pitch over and over again, sometimes leveraging what they perceive to be avenues read by geeks

The Web is an awful place, not just because of bloat and surveillance but also the “content” in it. Tons of that “content” is garbage or spam or marketing. It’s really, really bad. It’s getting worse.

The video above discusses one new example, citing a lesser worrying PR campaign with an example from several hours ago, one among very many (with time-limited embargo).

Why should 30% to 50% (that number increases over time) of the so-called ‘news’ in sites that call themselves ‘Linux’ be PR junk instead of actual news? Sales and marketing are not news/journalism, they’re the antithesis of that. We’ve long rejected the idea of reprinting promotional cruft.

What became a catalyst for this rant is the shift from promoting hardware which is OS-agnostic to actually promoting Windows laptops inside ‘Linux’ sites, much like the whole "Edge" noisepart of a worrying pattern on the Web.

Sites that call themselves “Linux” something but promote Microsoft vendor lock-in are digging their own graves. They spoon-feed readers with stuff those readers do not and should not want.

Links 15/5/2021: GCC 8.5, Fedora Community Revamp

Posted in News Roundup at 6:48 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • System76’s Configurable Mechanical Keyboard is a Dream Come True for Open Source Enthusiasts

      System76 is popularly known for its Pop!_OS Linux distribution and its laptops/desktop offerings tailored for Linux.

      While we already had some of the details when System76 teased its open-source ‘Launch’ keyboard, it has been finally unveiled to the world.

      This is System76’s first accessory offering, along with the laptops/desktops available. I’m sure that the new open source mechanical keyboard is just the start. And it is going to be a treat for open-source enthusiasts!

      Here, let me briefly share the key highlights of this open-source configurable keyboard and what I think about it.

    • Linux Release Roundup #21.20: Bodhi Linux 6.0, KDE Plasma 5.22, DragonFly BSD 6, and More New Releases

      In the Linux Release Roundup series, we summarize the new application and distribution versions release in the last few days. This keeps you informed with the latest developments in the Linux world.

    • Desktop/Laptop

      • Huawei Launches Linux Laptop—But Things Aren’t As They Seem

        As above, before you get your hopes up regarding a Huawei developed and manufactured Linux laptop, the Huawei Qingyun L410 is only available to the Chinese market.

        Whether that situation will change in the future is anyone’s guess, but collaboration and sales from US companies to Huawei remained banned since former-President Trump’s May 2019 order.

        As first reported by IT Home, the Qingyun L410 is likely only for government and enterprise customers, and it comes with a fairly substantial price tag of around $1,400 (around 9,000 yuan).

        Regarding specs, the Qingyun L410 launches with one of Huawei’s Kirin 990 processors, 8GB RAM, 256GB storage, and a tidy 14-inch screen. One of the coolest features is the integrated push camera, which remains flush to the screen bevel until you want to use it, protecting your privacy while not in use.

        The IT Home report indicates that the Qingyun L410 is launching with Unity OS, a Linux distro initially developed as part of a Chinese government initiative aiming to reduce Chinese tech companies’ reliance on US-based software developers and platforms such as Windows.

    • Audiocasts/Shows

      • The AUR Removed My Packages, So I Created My Own Repo

        Yesterday, I woke up to find that several of my packages in the Arch User Repository (AUR) had been removed. The person deleting them claimed my packages were being deleted because they were “for one person”, which clearly isn’t the case. I know many of you guys use my packages, so it would have been unfair to you guys to not find a solution. So I created my own Arch repository on GitLab.

    • Applications

      • Digitize Your Music Collection including Tagging

        Spring cleaning is the practice of thoroughly cleaning a house in the springtime. It’s somewhat a ritual in my house. But it’s never previously extended to my CD collection.

        Your collection of CDs may be just gathering dust like mine if you’ve converted to music streaming services. While I listen to my CDs, I decided to remove them from my shelves. But many of the CDs still hold special memories. The practical solution is to rip the CDs, tag them, store them on my network drive, and pack them all away in the attic.

        While ripping the CDs is legal in my country, that’s not true everywhere. For example, UK copyright law was amended in 2014 to make it legal to make personal backups. But the change in law never happened as the decision was overturned in 2015. It’s important to verify the legal position in your country before you start ripping.

      • Best Night Light Apps for Linux

        This article will cover a list of useful applications that allow you to use a software based, customizable color filter on your monitor’s screen. You can use these applications to set color temperature for your display and choose warmer colors to reduce eye strain by filtering out blue light. These applications are also popularly known as “night light” apps.

        GNOME Shell Night Light

        GNOME Shell features a dedicated night light option which can be enabled and customized from system settings. If you are using any GNOME Shell based Linux distribution that got a new release of GNOME Shell in the last couple of years, your Linux distribution should have a night light feature built-in. GNOME Shell Night Light has all the features you would expect from a screen filter app. You can use it to set your desired color temperature and then either manually activate the overlay or schedule it. Its scheduling feature allows you to pick up a custom time frame or you can schedule it to automatically activate at sunrise and sunset timings based on your current location.

    • Instructionals/Technical

      • How to Clean Up Disk Space on Linux Mint Distro – Linux Hint

        It is no secret that junk files from installing new programs and updates can cause an operating system to slow down. These junk files can affect the performance and slow down the speed. Besides that, it can also seriously affect the performance of a system if there are unnecessary system files.

      • How to use git reset – Linux Hint

        The changes of the git repository are done on the current working directory, and the changes can be stage into an index from which the git user can select the next commit. Sometimes the git users need to undo the changes done in the repository for the project purpose. `git reset` command is used to do this task. This command resets the current state of the HEAD to a specific state, and it can work on all commit tasks or an individual file level. Different types of reset mode options can be used with this command. The purpose of each reset option and how some of the reset options can be applied with the `git reset` command for the local git repository have been explained in this tutorial.

      • How to switch branch in Git – Linux Hint

        Git users use branches in the git repository to keep the project work separate, and the users can test any task without affecting the main project by doing the task in a new branch. The users need to switch between the branches based on the project work. `git checkout` command is used to switch between the branches before. This command is used to switch between the branches and perform different types of tasks such as restore files, undo changes, etc. Another command, `git switch,` is added to switch between the branches in the new version of git. It is simpler than the `git checkout` command, and it is used for creating and switching branches only. How these two commands can be used to switch between the branches have shown in this example.

      • How do I make Ubuntu pretty? – Linux Hint

        The default appearance of Ubuntu can admittedly be quite vanilla and boring for a lot of users. It features a plain desktop, vapid icon design, and the theme is far from exciting. Many Linux beginners have wondered how they can make their Ubuntu pretty and dashing, which brings us to this guide. We will be showing you how you can customize Ubuntu to make it look shinier, prettier, and, frankly, better.

      • How To Use Linux KVM To Optimize Your Windows 10 Virtual Machine – Front Page Linux

        This tutorial will demonstrate that KVM and virt-manager are great tools not only to virtualize servers on headless hosts, but also for everyday desktop use. My job duties often require me to have a Windows 10 computer, in order to manage Microsoft specific tasks or software that runs only on Windows. However, I did not want install Windows on any of my hardware so the solution I came up with was to have a Windows 10 Virtual Machine that I can run on my main operating system. This Windows VM allows me to easily move it around differenct computers since I can just a copy-paste the VM files. With a virtual machine, I can also easily create snapshots or backups before testing any new software making it possible to very quickly recover if anything goes wrong.

      • How to use Git Force Pull – Linux Hint

        Git files and folders of any git project can be shared by multiple git users who are work on a team. When multiple users try to work on the same file or folder, then conflict arises. Suppose, when the two users are working on the same file of a repository, and if one user modifies the file after the modification done by another user, then the modification done by the first user will be lost by the last update. This problem can be solved manually. The user has to git force pull for overwriting the changes in the local repository without affecting the changes done in the local repository that are not pushed. `git pull` command is not able to solve this problem. The way to use git force pull by `git fetch` and `git reset` commands have shown in this tutorial.

      • Bash Test Command

        In bash shell, the test command compares one element against another and returns true or false. In bash scripting, the test command is an integral part of the conditional statements that control logic and program flow.

        This guide demonstrates how to use the bash test command.

      • How to Pull Content from a Remote Repository – Linux Hint

        When any content of the remote repository is updated, and the git user requires to pull the updated content from the remote repository to the local repository, then the `git pull` command is used. This command is used to fetch and download the required content from the remote repository and update the local repository to keep the repository up-to-date with the remote repository. `git pull` command performs the functions of the other two commands of git. These are `git fetch` and `git merge`. At first, the `git pull` command downloads the required content from the remote repository like `git fetch,` and next merges the downloaded content with the local repository like `git merge`.

      • Manjaro Live Usage and Password – Linux Hint

        Manjaro is the most user-specific, independently developed cutting-edge Arch-based distribution. Its distinguishing features make it stand out among all other Linux distributions. Manjaro provides an intuitive user interface for beginners to experience the essence of Arch Linux. Hence, it offers beginning Linux users Arch experience with a lot of stability, control, and excellent performance.

        To begin the Manjaro learning experience, it is unnecessary to install it directly on the hard drive. Majaro, like all other Linux distributions, can work like a typical OS system without making any permanent changes to the system hardware. The concept is known as live booting.

        In this article, we will learn to run a live Manjaro session from a USB flash drive. Moreover, we will also learn how persistent storage works and how to make a USB with persistent storage.

      • How to Pull Changes From One Branch to Another in Git

        A git repository contains one or more branches to manage the code efficiently. Sometimes, the git users need to work with the multiple branches simultaneously and require to switch from one branch to another branch with the changes made in the previous branch to the current branch before commit.

      • Setting Proper .ssh/config Permissions – Linux Hint

        The SSH protocol is a secure protocol that is usually used to connect to remote devices such as servers and network devices, including routers and switches. It works in a client-server setup and, by default, listens on port 22 ( although this can be changed when needed ). SSH employs different encryption and hashing techniques to ensure the communication between the client and the remote host is encrypted and safe from eavesdropping.

        SSH files are stored in the .ssh folder. This is a hidden folder that resides in the home directory. The .ssh directory is not created by default; it is created when you initiate a connection with a remote host or use the ssh-keygen command to generate the private and public authentication keys as when you want to set up passwordless ssh authentication.

      • How to Install Kubernetes on Ubuntu Single Node – Linux Hint

        Containers, Kubernetes, and IoT/edge applications are playing an extremely important role in enterprise digital transformation. They are especially important for DevOps teams working to accelerate software releases and improve IT operations through integration and optimization. The majority of cloud-native software is user-friendly, allowing many developers to contribute and customize the relevant software. This has resulted in simplified Kubernetes versions with small footprints that are ideal for IoT/edge tasks.

        MicroK8s creates a certified Kubernetes cluster from a single node in minutes. Canonical’s Microk8s Kubernetes distribution is small, versatile, and lightweight It’s an uncluttered distribution with an emphasis on improving performance and usability. Microk8s can usually be configured in IoT and edge devices due to their small size.

        MicroK8s is designed to run on any Linux distribution. It’s thin and compact, deploying all Kubernetes services on Ubuntu while also including all of the necessary libraries. Because of its tiny footprint, it’s ideal for tablets, desktops, CI pipelines, IoT cameras, and small edge clouds.

      • How to remove untracked files – Linux Hint

        Git user works with three types of files in the git repository. These are tracked files, untracked files, and ignore files. The files which have been added and committed in the repository are called tracked files. The other files of the repository that are not ignored files are called untracked files. Suppose the untracked files are not necessary for the repository. In that case, it is better to remove the unnecessary untracked file and make the working directory clean. `git clean` command is used to remove the untracked file from the current working directory. After executing this command, the removed file can’t be recovered. So, it is better to keep the backup of the repository before executing `git clean` to prevent the accidental deletion of the necessary files. The ways to remove the untracked files from the repository using the `git clean` command as shown in this tutorial.

      • How to add tag specific commit in git – Linux Hint

        Tag is a useful feature of the git. The specific point of the repository can be identified by defining the tag for that point. It is mainly used to keep the release version of the repository, and the user will be able to move in the earlier version of the repository by using the tag. The tag can be created for a specific commit of the git history. To create this type of tag, the commit SHA will be required at the time of creating the tag. It is better to know how to create the tag for the repository before adding a tag for a specific commit. The ways to create the simple tag and a tag for the specific commit have explained in this tutorial.

      • How to check for merge conflict in Git – Linux Hint

        Multiple users may work with multiple branches in any git repository to keep track of their project tasks. Sometimes it requires merging the content of one branch to another branch. This task can be done very easily by using the `git merge` command. But the merge conflict arises when two or more git users of the same project are working on the same file and doing the different tasks on that file, such as one user is adding content to the file and another user is deleting content from the file then it is not possible for the Git to select the correct file for the update. The merge conflict may also appear where the user modifies a local repository file in multiple branches. Git will mark the file as merge conflict, and the git users have to solve this issue before continuing the work. The ways to check the merge conflict for a local repository and solve this issue have been explained in this tutorial.

      • How to Install and Play Tetris on Ubuntu?

        Tetris – a strategic tile-matching video game, has caught enormous traction in the gaming industry over the years. The game found its way on various platforms ranging from DOS and Gameboy to modern gaming consoles like PlayStation and Xbox.

        The game was released during the turbulent times nearing the end of the Cold War era by Alexey Pajitnov, an enthusiastic Russian software engineer. The game is so addictive that psychologists studying its addictive nature couldn’t get enough of it as it started interfering with their work hours.

        People from every age group find themselves beguiled by the genius of the game and the entertainment associated with it, so it’s no big surprise that the game is well sought-after even after more than thirty-five years since its inception. This is evident from the fact that the game has sold more than 170 million units to date.

        But what really is Tetris, and how has it garnered an audience of such a colossal magnitude? Let’s find out!

      • How to Setup Synology NAS as VMware Datastore – Linux Hint

        You can mount your Synology NAS shared folders on your VMware ESXi servers. Once you’ve mounted a Synology NAS shared folder on your VMware ESXi server, you can use it as a VMware datastore. You can also store virtual machine data on that datastore as usual.
        In this article, I will show you how to create a Synology NAS shared folder and mount it as a datastore on a VMware ESXi server. So, let’s get started.

      • How to use Emoji’s on Ubuntu?

        Emoji are icons that find their application in signifying everything from casual emotions during an online chat to symbolic filenames. The online emoji fad is certainly not a passing one, as they have been around for decades, and it is established that they are here to stay.

        However, Linux users are often confused about using emoji on their native operating system since there is no clear way to do so. It may not be apparent right off the bat, but there is a way for sure. This guide will demonstrate how you can brighten up your conversations with emoji on Ubuntu.

      • How To Get The Numpad Embedded Into The Touchpad Of Some ASUS Laptops To Work On Linux

        Some ASUS laptops come with a numpad (numeric keypad) embedded in the touchpad. You can toggle between the touchpad and numpad using a button placed in the top right-hand side corner of the touchpad.

        That is, after you follow the instructions below, because this feature is not available by default on Linux.

        You can get this numpad embedded into the touchpad to work on some ASUS Zenbook models by using this Python service / driver. This driver has been tested and should work with models like UX433, M433IA, UX525EA, UX525JA, UX431F, UX363EA, UX333FA, X412DA, and more. See the complete list of supported ASUS models here.

      • How To Install Apache CouchDB on Linux Mint 20 – idroot

        In this tutorial, we will show you how to install Apache CouchDB on Linux Mint 20. For those of you who didn’t know, Apache CouchDB (CouchDB) is a NoSQL document database that collects and stores data in JSON-formatted documents. CouchDB is a perfect choice for operation teams and businesses looking for a high-performance NoSQL database solution. Apache CouchDB integrates seamlessly with almost all modern web applications, including those built for mobile devices, making it an excellent tool for reading, producing, editing, and changing database documents.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Apache CouchDB on a Linux Mint 20 (Ulyana).

      • How to Install CTparental Parental Control Software on Debian 10

        CTparental is a free and open-source parental control tool used to control computer usage or internet browsing. It comes with a simple and easy-to-use web interface powered by a Lighttpd web server. The idea of CTparental tool comes from other tools such as, iptables, dnsmasq, and inguardian privoxy.

      • How to Install Chrony NTP Server on CentOS 8

        Chrony is the default Network Time Protocol (NTP) server in CentOS 8 operating system. It is a replacement for the old Ntpd used in the older version of the Linux operating system. It is used to synchronize the system clock with remote internet time servers. Setting up accurate time is very important for any application to work correctly.

        It is made from two components chronyc and chronyd. chronyd is a daemon started at system boot time. chronyc is a command-line interface used to monitor chronyd performance.

        In this tutorial, I will show you how to install and use Chrony on CentOS 8 server.

      • How to Install Drupal 9 on Fedora 34

        Drupal is an open-source content management system (cms) that is very flexible for building websites and applications. About 2.5 percent of the websites in the world are using Drupal. It is in use by many industries like Retail, Ecommerce, Healthcare etc.

      • How to install Ubuntu MATE 21.04

        In this video, I am going to show how to install MATE 21.04

      • How to set up a hex editor on Kali Linux

        If you use Kali Linux, you may need to edit hexadecimal files at times. Thankfully, there are a few options for hex editing on Kali Linux. In this guide, we’ll go over these options and how to set them up.

      • [Older] Invoking commands when they require permissions

        Running as root is dangerous, although sometimes convenient—especially when you are new to Linux and password prompts seem to be a hassle. So far, as a Linux user, you may have seen the sudo command or the su command. These commands can allow a user to change users on the system at the console or execute commands momentarily with higher permissions (if the user has sudo permissions). Sudo, or substitute user do, enables a regular user to escalate (raise) their user permissions to a more privileged level for a SINGLE command.

        Alternatively, the substitute user command, or su, allows you to also run commands that are privileged and to even change shells (for example, to become a root user). Sudo doesn’t activate a root shell or allow you access to other user accounts, which is unlike the su command.

      • Fix VirtualBox Shared Folder Is Locked / Unable to Open in Ubuntu 21.04 | UbuntuHandbook

        Running Ubuntu as virtual machine via VirtualBox? You may encounter permission issue to access the shared folder between host and guest.

        Shared Folders is an useful feature for file sync between Virtualbox host and guest OSes. However, after you created one, the shared folder is marked with cross and lock icons.

      • Manage AWS SNS Topics using aws-cli

        It is very easy to create SNS topics, subscriptions and perform other operations on SNS topics from the terminal using the aw-cli utility. In this article, I will show you the commands to create an SNS Topic, Subscription, confirm, and delete the Subscription using aws-cli. It is assumed that you are already familiar with AWS SNS Service.

        To know about the operations that can be performed on SNS topics using command line utility aws-cli, visit the official documentation here.

      • What is Ingress Controller and how to deploy Nginx Ingress Controller in Kubernetes Cluster on AWS using Helm

        Before we proceed with the installation of the Nginx Ingress Controller, let’s see in short what Ingress and Ingress Controller is. The focus of this article is on the setup, it is assumed that you are familiar with all the prerequisites for setting up Nginx Ingress Controller in the Kubernetes Cluster.

      • Disable Auto Lock Screen In Ubuntu [ Quick Trick ]

        Are you tired of typing your password every five minutes when you are gone from the computer? Do you need a desktop with not that modern automatic lock? The good news is that in Ubuntu there is a way to lock the screen when you decide and stop that automatic five minute lock.

        Now we know and advice you to always keep you computer locked when you are not around, but like in home in a more calm environment there is no need for a five minute lock, so lets dive right in to how to disable the five minute lock screen on Ubuntu Linux.

        A lock screen is a computer user interface element used by various operating systems. They regulate immediate access to a device by requiring that the user perform a certain action in order to receive access, such as entering a password, using a certain button combination, or performing a certain gesture using a device’s touchscreen. There are various authentication methods to get past the lock screen, with the most popular and common ones being personal identification numbers (PINs), the Android pattern lock, and biometrics

      • Manage Users and Groups in Ubuntu via The Classic Graphical Tool

        Looking a graphical tool to manage users and groups in Ubuntu Desktop? Try the classic Gnome user settings tool.

        A user is anyone who uses a computer, and users may be grouped together into a “group”. Users and groups are used to control access to the system’s files, directories, and peripherals.

        For those hate Linux commands, the classic GUI tool, which was default in Ubuntu when it was Gnome 2, allows to add, remove, edit users and groups.

      • Manage AWS VPC using aws-cli

        Managing a VPC and other resources like Subnet, Route Table, Internet Gateway from the terminal using aws-cli can be a bit confusing if you are not good at VPC. In this article, we will create a VPC with 2 Subnets, Route Table, and Internet Gateway, these subnets will be public subnets. After the VPC is created, we will try to connect to the EC2 instance created in this VPC. The aim of this article is to introduce you to the commands used to manage VPC from the terminal.

        It is advised to first understand the VPC very well, the focus of this article is not on explaining the VPC. To know operations that can be performed on VPC, visit the official documentation here.

      • ls* Commands Are Even More Useful Than You May Have Thought

        Everything is a file under Linux and ls* and friends can help you to dig out more information from the system than you originally thought. These Linux tips may come in handy when you need to find out information quickly without going through /proc or sysfs.

      • Creating a single control-plane Kubernetes cluster with kubeadm – Unixcop

        Kubernetes is a cluster and orchestration engine for Docker containers. In other words Kubernetes is an open source software or tool which is used to orchestrate and manage Docker containers in cluster environment. Kubernetes is also known as k8s and it was developed by Google and donated to “Cloud Native Computing foundation”

      • Error handling in Bash scripts | Enable Sysadmin

        Scripting is one of the key tools for a sysadmin to manage a set of day-to-day activities such as running backups, adding users/groups, installing/updating packages, etc. While writing a script, error handling is one of the crucial things to manage.

        This article shows some basic/intermediate techniques of dealing with error handling in Bash scripting. I discuss how to obtain the error codes, get verbose output while executing the script, deal with the debug function, and standard error redirection. Using these techniques, sysadmins can make their daily work easy.

    • Games

      • Free first-person strategy shooter ‘Unvanquished’ releases version 0.52 Beta

        After a long time of waiting with the last proper release in 2018, the Unvanquished team have managed to do it! The next version 0.52 Beta is officially out now and waiting to be played.

        What is it? A free and open source first-person shooter with strategy elements, that puts humans vs aliens. It’s a fork of the classic Tremulous, think of it like the well-known Natural Selection series with both sides providing very different gameplay overall.

      • An Interview with the Developer of GamerOS

        We got a chance to sit down with alkazar79, the main developer behind the beloved console-like distribution GamerOS. Just a tad less than a year ago, we had reviewed this distro, and we liked it so much we wanted to get in touch with the developer and get a behind-the-scenes look as to why GamerOS was made, what sets it apart from other distributions, what the dev’s plans are for the future, among many other questions that we had asked him. Without further ado, let’s get right into it!

    • Distributions

      • BSD

        • DragonFlyBSD 6.0 Performance Is Looking Great – Initial Benchmarks

          I am currently testing DragonFlyBSD 6.0 on multiple systems and will in turn compare DragonFlyBSD 6.0 against the recent FreeBSD 13.0 (the recent FreeBSD 13.0 also brings its own performance improvements) and various Linux distributions. Upon early testing though of DragonFlyBSD 5.8.3 as the prior stable release against the new DragonFlyBSD 6.0, there is nice uplift in many benchmarks.

          Today’s tests are on an Intel Core i9 10980XE workstation and the uplift found from DragonFlyBSD 6.0 even with still using the same GCC 8.3 compiler release and HAMMER2 on both releases is looking quite good.

      • SUSE/OpenSUSE

        • Mesa, KDE Frameworks, GlusterFS Update in Tumbleweed

          There were three openSUSE Tumbleweed snapshots released so far this week.

          The snapshots updated Mozilla Thunderbird, Mozilla Firefox, Mesa, KDE Frameworks, glusterfs, php and several other packages.

          The most recently released snapshot, 20210511, updated a little more than a handful of packages. There was one package update from KDE Frameworks 5.82.0 with plotting framework kplotting. The 5.12.2 Linux Kernel updated in the snapshot and brought a thermal sensor correction to the x86 thinkpad_acpi module and some fixes for Advanced Linux Sound Architecture USB audio. Another package update in the snapshot was hivex 1.3.20, which is a system for extracting the contents of the Windows Registry; the hivex version fixed a Common Vulnerabilities and Exposures that would allow an attacker to read memory beyond normal bounds or cause the program to crash.

        • openSUSE Tumbleweed – Review of the week 2021/19

          Dear Tumbleweed users and hackers,

          First, I want to apologize to our Steam users for making their life harder this week than needed. I misjudged an openQA-reported issue as being a Steam packaging bug instead of realizing that it was in fact a Mesa packaging bug. This in turn made some of you receive scary messages from zypper. A bug for this had been filed in Bugzilla of course: https://bugzilla.opensuse.org/show_bug.cgi?id=1185933. A fixed Mesa package will be part of Snapshot 0514.

      • IBM/Red Hat/Fedora

        • Proposed Objective: Fedora Websites & Apps Community Revamp

          The effort to revamp the Fedora Websites Team to Fedora Websites & Apps Team was initiated in March 2021. Co-leads Akashdeep Dhar and Ramya Parimi, collectively started working on preparing the ground work for this effort, with guidance from Mathew Miller, Marie Nordin, and Justin W. Flory. Currently, Jon Trossbach from Red Hat’s Open Source Program Office (OSPO) and Vipul Siddharth from Community Platform Engineering (CPE) are supporting the team’s progress as well. The team has been meeting weekly to develop outcomes. It quickly became evident that the revamp would take massive effort involving a lot of contributors, coordination and hours to implement successfully.

        • Friday’s Fedora Facts: 2021-19

          Here’s your weekly Fedora report. Read what happened this week and what’s coming up. Your contributions are welcome (see the end of the post)! Fedora Linux 32 will reach end of life on Tuesday 25 May.

          I have weekly office hours on Wednesdays in the morning and afternoon (US/Eastern time) in #fedora-meeting-1. Drop by if you have any questions or comments about the schedule, Changes, elections, or anything else. See the upcoming meetings for more information.

        • Red Hat Breaks Down Barriers to Building Applications for Kubernetes Environments with Developer Sandbox for Red Hat OpenShift

          Red Hat, Inc., the world’s leading provider of open source solutions, today unveiled its Developer Sandbox for Red Hat OpenShift, an OpenShift-based development environment designed to enable organizations to accelerate the path from code to production for Kubernetes-based applications. The OpenShift sandbox gives developers a simpler, no-cost way to start building their applications using the same infrastructure and tools they will run in their production environments—without having to worry about setup or configuration.

        • A tip of the hat to IBM’s Red Hat strategy – building a worthy competitor to VMware and Microsoft

          The network edge is the new battleground for IT product vendors and service providers as the nexus of ubiquitous connectivity, particularly low-latency 5G wireless and smart, connected devices and sensors are moving IT’s center of gravity away from consolidated data centers. The resulting explosion of locally-generated data promises to redistribute enterprise infrastructure after years of centralization in private data centers and hyperscale cloud environments.

          The availability of computing hardware and analytical software capable of processing data in situ on compact, power-efficient systems at edge locations like retail stores, manufacturing facilities, distribution centers and wireless base stations promises to extract previously untapped value from the myriad smart sensors, connected machines and mobile devices spewing data at unprecedented rates. The changing architectural zeitgeist has also created a new competitive front in the war among IT product vendors and cloud service providers to capture enterprise spending for modern application infrastructure and development platforms.

        • Red Hat, IBM Launch Konveyor to Aggregate Kubernetes Tools

          At the online KubeCon + CloudNativeCon Europe 2021 event today Red Hat and IBM Research announced they are teaming up to create a Konveyor to advance adoption of a collection of tools for optimizing Kubernetes environments.

          At the same time, Red Hat announced it is forming a StackRox.io community to invite contributors to participate in the ongoing development of the container security software it gained via its acquisition of StackRox earlier this year. Red Hat offers that platform now as Red Hat Advanced Cluster Security for Kubernetes.

          James Labocki, senior director of product management for Red Hat, says the goal of the Konveyor project is to make it easier for contributors outside of Red Hat and IBM to participate in initiatives that might ultimately be donated to the Cloud Native Computing Foundation (CNCF) that oversees the development of Kubernetes.

        • Boehringer Ingelheim Achieves Up to Five Times Faster Delivery to Market with Red Hat OpenShift

          Red Hat, Inc., the world’s leading provider of open source solutions, today announced that Boehringer Ingelheim has used Red Hat OpenShift to accelerate the development of its digital healthcare portfolio and enable the continuous delivery of new applications and services. With Red Hat OpenShift, Boehringer Ingelheim has increased productivity, streamlined compliance and achieved up to five times faster delivery to market of new services through automated scaling and management processes.

        • Ben Williams: F34-20210514 updated LIVE isos released

          The Fedora Respins SIG is pleased to announce the latest release of Updated F34-20210514-Live ISOs, carrying the 5.11.19-300 kernel.

          This set of updated isos will save considerable amounts of updates after install. ((for new installs.)(New installs of Workstation have about 695MB+ of updates savings )). In cooperation with the Fedora i3 Sig, we are including a i3 spin in this release.

        • The Red Hat Ceph Storage life cycle: upgrade scenarios and long-lived deployments

          Different industries have varying requirements for the software systems on which their respective businesses rely. Some operators choose to quickly embrace the latest and greatest release when facing change and integration updates. Others defer upgrades for as long as possible, trying to continue on a tried-and-true combination of software components until end-of-support (or security patching) forces a change.

          The distinction is somewhat artificial, as most operators really adopt a combination of the two strategies for different parts of their infrastructure. The Red Hat Ceph Storage life cycle aims to address both faster and slower movers. In this post, we’ll share how we’re helping customers stay current while also providing longer life cycle options where needed.

        • Why is Business Intelligence (BI) important?

          BI also fits with digital transformation efforts across many industries, as E.G. Nadhan, Red Hat Chief Architect and Strategist, North America, recently told us. “Business Intelligence is poised to yield more value going forward with more data sharing between enterprises,” Nadhan says. “The digital ecosystem is one that can grow in an open, collaborative environment, yielding more meaningful insights for the end consumer. This can be the patient in the healthcare ecosystem, the consumer walking into the retail store, the human with their device of choice, or the passenger in their transport of choice, etc. Culture is more often the barrier to the advancement of such collaboration than technology. The prevailing mindset of the data stewards across the extended enterprise will determine the value that Business Intelligence can provide going forward.”

        • What Is Rocky Linux and Should You Consider It?

          For a long time, CentOS was a reliable choice for a Linux distro, especially for servers, because it was effectively a free version of Red Hat Enterprise Linux. But shakeups have rocked the CentOS community, which led to one of its original developers creating a fork called Rocky Linux.

          After several months of development, a pre-release version of Rocky Linux has emerged. Should you consider switching to Rocky Linux? We’ll find out in this post.

      • Debian Family

        • Deepin 20.2.1 Integrates Debian 10.9 by Default, Brings Minor Updates

          Based on Deepin 20.2, Deepin 20.2.1 upgrades the underlying repository to Debian 10.9 and mainly fix security issues and some serious problems.

          Deepin (developed in China by Wuhan Deepin Technology) is a rising star among Linux distributions, thanks to its combination of an elegant desktop environment with the stability and reliability of Debian. It is popular among users who want a gorgeous Linux desktop while being stable.

          Deepin ships with a unified design style and a redesigned desktop environment. As a result its brand look more consistent across its updated preinstalled applications.

        • TagSpaces

          There is a new application available for Sparkers: TagSpaces


          TagSpaces is a free, non-locking, open source application for organizing and managing your local files with the help of tags. It features note taking and some to-do app capabilities. The application is available for Windows, Linux, Mac OS and Android. We provide a web clipper extension for Firefox and Chrome for easy collecting of online content as local files.

      • Canonical/Ubuntu Family

        • Every Ubuntu Default Wallpaper So Far

          Each Ubuntu release is different from the other releases in various ways. Each release has a different code name and a different version number. I have explained the logic behind Ubuntu version and codenames so I am not going to bore you with those details again.

          Each Ubuntu release also comes with a different set of wallpapers. There is one default background that you’ll see while installing Ubuntu or when you first log in to it.

          And then it also has a set of 10-15 wallpapers in each release that you can select from or make them change automatically.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Kafka users detail real-time data benefits

        Kafka event streaming technology is helping automakers produce fast cars and motorcycles.

        At the Kafka Summit Europe virtual conference on May 12, several major corporations outlined how they are using Kafka, as new options emerge to make it easier to operate and deploy the technology.

        Open source Apache Kafka provides data streaming capabilities that help organizations use real-time data.


        BMW Group isn’t the only automobile manufacturer that has embraced Kafka. In a user session, Sridhar Mamella, platform manager, data streaming platforms at Porsche AG, explained how the high-end car maker is using real-time data with Kafka.

        “At Porsche, it’s all about speed — and fast cars equals fast data,” Mamella said. “Porsche is on route to becoming a real-time company.”

        Mamella said Porsche has deployed Kafka on applications such as those delivering notifications to different areas of the manufacturing process.

      • Zstd 1.5 Released With Big Performance Improvements

        Zstd has already been enjoying phenomenal growth throughout the open-source software ecosystem thanks to its feature set and impressive performance, but can it get even better? Yes, with Zstd 1.5 that is out today there are some more mighty impressive performance improvements.

      • Apache

      • Web Browsers

        • Chromium

          • Chrome Devs Bring ‘Back Forward Cache’ to Desktop for Instantaneous Page Loads

            Google Chrome for desktop is about to get a major speed boost, and hurrah — this one will benefit desktop Linux users too.

            As spotted by the eagle-eyed hawks at Windows Latest, the browser’s dev plan to add something called “back-forward cache” to desktop builds of the browser. You may have already heard of the feature as it was enabled on Android last year.

            Back-forward caches provides instantaneous page loading when navigating backward or forward. Devs want to experimentally introduce the feature on all of Chrome’s desktop platforms, i.e. Windows, macOS and Linux, in the upcoming Google Chrome 92 release.

        • Mozilla

      • Programming/Development

        • GCC 8.5 Released As The Last GCC 8 Compiler

          For those of you still relying on a GCC 8 compiler, it’s time to upgrade beyond that considering GCC 11 debuted just several weeks back, but if you are on the 2018 era compiler for enterprise/legacy reasons, GCC 8.5 is out as one last hurrah.

        • GCC 8.5

          The GNU project and the GCC developers are pleased to announce the release of GCC 8.5.

          This release is a bug-fix release, containing fixes for regressions in GCC 8.4 relative to previous releases of GCC.

        • Ognibuild

          The Debian Janitor is an automated system that commits fixes for (minor) issues in Debian packages that can be fixed by software. It gradually started proposing merges in early December. The first set of changes sent out ran lintian-brush on sid packages maintained in Git. This post is part of a series about the progress of the Janitor.

          The FOSS world uses a wide variety of different build tools; given a git repository or tarball, it can be hard to figure out how to build and install a piece of software.

          Humans will generally know what build tool a project is using when they check out a project from git, or they can read the README. And even then, the answer may not always be straightforward to everybody. For automation, there is no obvious place to figure out how to build or install a project.

        • Ubuntu 21.10 Begins Transition To PHP 8.0 By Default – Phoronix

          While PHP 8.0 was released at the end of last year, it wasn’t added to Ubuntu 21.04 given all the changes at play over PHP 7.4. But now for Ubuntu 21.10, that transition to PHP 8 is now happening to ensure it’s in good enough shape for the Ubuntu 22.04 LTS cycle.

          With several months having passed since PHP 8.0′s release to allow for more testing and a few point releases with bug fixes, Ubuntu developers are working to transition now from PHP 7.4 to PHP 8.0 by default for Ubuntu 21.10. This extra time has also allowed PHP developers to address any PHP code incompatibilities with PHP 8.

        • Difference Between Flutter 1 and Flutter 2

          A couple of days ago, it was the Flutter Engage, the reference online conference for the Flutter community, something like the WWDC or the Google IO for iOS and Android.

          This was a long-awaited moment, as there were several technologies that could reach “stable” status, after a long time purging under the “beta” label. Among them, Flutter 2.0, the new version of Dart, which we expected to be called Dart 3.0, but it was in 2.12 as well as Flutter for other platforms (not mobile), such as web and desktop.

        • Python

    • Standards/Consortia

      • Bryan Quigley: Let’s keep time like it is in the summer

        If you are in the USA – Please use my new site KeepSummerTime.com to write to your congresspeople asking for summer time all year long.

        The USA has an active bill in congress to keep us from changing the clocks and stay on time like it is in the summer year round (also called permanent DST). Changing the clocks has not been shown to have substantial benefits and the harms have been well documented.

  • Leftovers

    • Integrity/Availability

      • Proprietary

        • Remote Access Provider RemotePC Adds New Features For Linux Remote Access

          Linux Remote Sound – enables users to listen to audio files from the remote machine on their local device

          Linux Headless Server Remote Access Support – users can access a Linux server without any monitor connected to it

          Raspberry Pi as host – users can access Raspberry Pi devices with the RemotePC application

        • Pseudo-Open Source

          • Privatisation/Privateering

            • Linux Foundation

              • KrakenD joins the Linux Foundation as the Lura Project

                According to the foundation, Lura is a framework for building API gateways. It acts as an aggregator for microservices and is a declarative tool for creating endpoints.

                “By being hosted at the Linux Foundation, the Lura Project will extend the legacy of the KrakenD open source framework and be better poised to support its massive adoption among more than one million servers every month,” said Albert Lombarte, CEO of KrakenD. “The Foundation’s open governance model will accelerate development and community support for this amazing success.”

        • Security

          • Linux and open-source communities rise to Biden’s cybersecurity challenge

            Anyone who thought computer security problems were some abstract trouble that had little to do with their daily life was rudely awakened recently. The Colonial Pipeline ransomware attack saw gas and oil deliveries shut down throughout the southeast. Cybersecurity failures had already become a major problem with the SolarWinds software supply chain attack and the FBI having to step in to fix broken Microsoft Exchange servers. So, on May 12th President Joe Biden signed an executive order to boost the federal government cyber defense and to warn all of America that technology security must be job one now. The Linux Foundation and its related organizations are stepping up to better Linux and open-source security.

          • How LF communities enable security measures required by the US Executive Order on Cybersecurity

            The US White House recently released its Executive Order (EO) on Improving the Nation’s Cybersecurity (along with a press call) to counter “persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American people’s security and privacy.”

            In this post, we’ll show what the Linux Foundation’s communities have already built that support this EO and note some other ways to assist in the future. But first, let’s put things in context.

          • Using Dynamic Admission Control to Secure Your Kubernetes’ Supply Chain

            Kubernetes adoption is up, but many organizations are suffering security incidents in their container and Kubernetes environments. In the fall edition of the “State of Container and Kubernetes Security” report, for instance, 91% of respondents told StackRox that they had adopted the container orchestration platform. That’s about the same proportion (90%) of survey participants that admitted to having suffered a security incident in their Kubernetes and container environments over the preceding 12 months. Two-thirds of those security incidents consisted of a misconfiguration issue. Those events were followed by a vulnerability incident (22%), a runtime incident (17%) and a failed audit (16%). Nearly half (44%) of respondents said that they ultimately delayed moving an application into production as a result of their security concerns.

          • Reproducible Builds (diffoscope): diffoscope 175 released

            The diffoscope maintainers are pleased to announce the release of diffoscope version 175. This version includes the following changes:

            * Use the actual filesystem path name (instead of diffoscope's concept of the
              source name) to correct APK filename filtering when an APK file is in
              another container -- we need to filter the auto-generated "1.apk" instead
              of "original-filename.apk". (Closes: reproducible-builds/diffoscope#255)
            * Don't call os.path.basename twice.
            * Correct grammar in a fsimage.py debug message.
            * Add a comment about stripping filenames.
          • Your clipboard is only as secure as your device

            The system clipboard is part of every modern operating system. It lets us copy and paste text, images, files, and data between different applications. Like everything else these days, it’s increasingly getting tied up with other people’s servers (“the cloud.”) So, what does that mean for your clipboard privacy?

            The clipboard was invented in 1973, and it was never designed to be secure. It’s a shared area of computer memory used to quickly duplicate information from one app — one data silo — to another. Traditionally, every running process on our computers has had full access to everything that lands on the clipboard. Yet, we copy and move about personal information, passwords, company secrets, and a whole lot more using the same old clipboard without blinking an eye.

            New features like cross-device synchronization and clipboard history can be very useful. However, they also make the interactions more complicated and the behavior more unpredictable. It can even expose our passwords and personal data to new avenues of attack from malicious software running on your other devices.

          • DarkSide Ransomware Gang Quits After Servers, Bitcoin Stash Seized [Ed: Blame shifting. Or how to blame those who exploit Microsoft holes, instead of Microsoft itself.]

            The DarkSide ransomware affiliate program responsible for the six-day outage at Colonial Pipeline this week that led to fuel shortages and price spikes across the country is running for the hills. The crime gang announced it was closing up shop after its servers were seized and someone drained the cryptocurrency from an account the group uses to pay affiliates.

            “Servers were seized (country not named), money of advertisers and founders was transferred to an unknown account,” reads a message from a cybercrime forum reposted to the Russian OSINT Telegram channel.

          • What is DARKSIDE, the cybercriminal ransomware group that has the world on alert? [Ed: Shifting away attention from Microsoft, which enables these attacks]

            On May 7, 2021, a ransomware attack violated Colonial Pipeline, one of the most important oil pipeline companies in the United States, causing the interruption of the supply of naphtha, diesel and other refined products for a section of approximately 8,850 kilometers. According to the FBI, the person responsible for this attack is theDARKSIDE ransomware .

          • The ransomware economy and disruption of commerce. Third-party risk. Robocalls and a widespread vishing campaign. [Ed: Why is Microsoft on this thing as "Expert" when Microsoft was the cause of the Colonial Pipeline meltdown?]
          • Intel Seeks More Comments From Developers On Key Locker Implementation For Linux [Ed: Posing from Intel, pretending to value security while making defective chips with back doors in them]

            Last December was the Key Locker kernel patch series initially sent out as a request for comments. Intel Key Locker allows encrypting/decrypting data without the raw AES key but instead making use of a key handle that is in place until revoked by the system. The key when loaded is effectively sealed and then accessed by new Intel Key Locker instructions (AESENC128KL, AESENCWIDE128KL, AESDEC128KL, AESDECWIDE128KL, AESENC256KL, AESENCWIDE256KL, AESDEC256KL, and AESDECWIDE256KL) to reference the handle to a particular AES key. Intel Key Locker aims to protect AES keys by keeping the raw keys exposed for a minimal amount of time to reduce the chances they are compromised by rogue attackers. The Linux support for Key Locker is being implemented as a new “aeskl-intel” driver for the kernel’s crypto subsystem.

Links 14/5/2021: FreeBSD on the Pine H6, Red Hat Hiring

Posted in News Roundup at 12:48 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

      • “Linux Community.” [Ed: Also here. The so-called ‘Linux’ Foundation (which rejects Linux) has detached any real meaning from the term “Linux”. Linux is not a community. Join GNU for a more community-like experience.]

        I don’t know… it really feels like a community. Maybe that’s just my idealism talking, but in this video I lay out exactly why I think Linux users have organically built a community and my own experiences within it.

      • S14E10 – Stars Grew Firmly | Ubuntu Podcast

        This week we’ve been playing with RISC-V. We discuss the future of Ubuntu releases, bring you some command line love and go over all your wonderful feedback.

        It’s Season 14 Episode 10 of the Ubuntu Podcast! Alan Pope, Mark Johnson and Martin Wimpress are connected and speaking to your brain.

    • Kernel Space

      • Confidential Computing Microconference Accepted into 2021 Linux Plumbers Conference [Ed: Surveillance disguised as “confidential” by the LF on behalf of spying firms that pay LF to do this. What’s “confidential computing”? In simple terms, it’s something like, Facebook and Google or Microsoft/NSA stealing your data and then saying, “we don’t want anybody else stealing the data we stole from you…” (and that’s “confidential” computing as promoted by the lobbying front group and PR agency ‘Linux’ Foundation). If the ‘Linux’ Foundation used a name like the “Spying Alliance” to promote this nonsense they call “confidential” computing, then fine, at least we’d know what they stand for. But they’re grossly abusing (milking to death) the brand “Linux”.]

        The Linux kernel recently gained support for SEV-ES and support for Intel TDX is upcoming. AMD SEV will be further enhanced by Secure Nested Paging (SNP). Support for these technologies requires intrusive changes to the Linux kernel for memory integrity and secure interrupt delivery to virtual machines. Designing these changes in a way that works for different confidential computing technologies is one goal of this microconference.

      • Systemd Service Strengthening

        In an age where hacker attacks are a daily occurrence, it is of fundamental importance to minimize the attack surface. Containerization is probably the best way to isolate a service provided for the public, but this is not always possible for several reasons. For example, think of a legacy system application developed on systemd. This could make the most of the capabilities provided by a systemd-based operative system and it could be managed via a systemd unit, or it could automatically pull updates using a systemd timer, and so on.

        For this reason, we are going to explain how to improve the security of a systemd service. But first, we need to step back for a moment. With the latest releases systemd has implemented some interesting features relating to security, especially sandboxing. In this article we are going to show step-by-step how to strengthen services using specific directives, and how to check them with the provided systemd suite.

      • Linux 5.12.4

        I’m announcing the release of the 5.12.4 kernel.

        All users of the 5.12 kernel series must upgrade.

        The updated 5.12.y git tree can be found at:
        git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.12.y
        and can be browsed at the normal kernel.org git web browser:



        greg k-h

      • Linux 5.11.21
      • Linux 5.10.37
      • Linux 5.4.119
      • Graphics Stack

        • Fedora Magazine: PipeWire: the new audio and video daemon in Fedora Linux 34

          Wim Taymans has a long track record in the Linux community. He was one of the two original developers of the GStreamer multimedia framework and he was the principal maintainer for most of the project’s initial existence. He joined Red Hat in 2013 and has helped maintain GStreamer and PulseAudio for Red Hat since. In 2015 he started working on PipeWire: a project that has come to full fruition in Fedora Workstation 34, where it handles both audio and video. In addition to that, it also merges the world of pro-audio with mainstream Linux. In this interview we will talk about where PipeWire came from, where it is at and where Wim sees it going from here.

        • Intel Posts Latest Linux Patches For Reporting Per-Client GPU/Media Engine Utilization

          For two years now Intel open-source engineers have floated patches for reporting per-client engine utilization for showing on an application level how much it’s leveraging the Intel graphics render/3D, blitter, and video/multimedia engines. This can be used for some nifty system information reporting like a GPU top or other system monitoring functionality. The latest version of these patches were sent out this week.

          The benefit of these patches for Intel graphics hardware on Linux is being able to report on a per-process level how the Intel GPU is being utilized and by what software. This “per-client engine busyness” information is exposed to user-space via sysfs so any interested application can make use of the information.

        • NVIDIA released another small update to their Vulkan Beta Driver

          After releasing upgrading their stable drivers with version 460.80 following the release of the the RTX 3050 and RTX 3050 Ti for laptops – a new Vulkan Beta Driver is out now.

    • Instructionals/Technical

      • How to benchmark your websites with the open source Apache Bench tool

        Every business depends on data. It’s how they evolve, improve, pivot, market and grow. The lure of data isn’t limited to marketing and suit-type staff. IT also requires data to not only make decisions, but to improve the technology used to make business happen.

        That’s why you need all the tools to collect information about your systems—every system. One crucial service you need to know about is your web servers. After all, those web servers are how you sell your products and interact with the public.

        How do you collect data about your websites? One way is to use the Apache Bench tool. Apache Bench is a tool used to load test websites and APIs. I’m going to show you how to install and use this handy tool, so you’ll have all the data you require about how your websites are performing.

      • Reynaldo Verdejo: Short tutorial: Digital Television with GStreamer (ATSC setup)

        GStreamer support for Digital Television (DTV) is still working. If you follow a few very simple steps you can get DTV signals tuned-to, captured, decoded and displayed with your computer and a few accessories.

        This short article presents basic instructions for a working DTV setup. I’m going to use ATSC in the US as an example, but these instructions should work equally well for other terrestrial delivery systems and other countries.

        What hardware do you need?

        Beyond a computer, you will need an antenna and a capture device. I recently tested a Hauppauge WinTV-dualHD (ATSC/QAM) USB dongle with a 5-years old Amazon basics flat indoor antenna (that looks pretty much like this one) and it worked quite well at roughly 60km from the repeater station.


        The hardware setup is simple. Install the antenna pointing to your repeater station and as high as you can. Your local telecommunications and/or broadcasting association should have data about repeaters near you. You can get this information by ZIP code from the Federal Communications Commission (FCC) if you are in the US.

      • Using Finalizers to Control Deletion | Kubernetes

        Deleting objects in Kubernetes can be challenging. You may think you’ve deleted something, only to find it still persists. While issuing a kubectl delete command and hoping for the best might work for day-to-day operations, understanding how Kubernetes delete commands operate will help you understand why some objects linger after deletion.

      • How to Control Vagrant Box Using Vagrant commands

        In the previous article, we have seen how to spin up a virtual machine using vagrant. In this article, we will focus on customizing the vagrant file according to our requirements and see important commands to work with the vagrant.

      • How To Install Ruby On Rails In Linux – OSTechNix

        This guide gives you a brief introduction to Ruby on Rails and then walks you through the steps to install Ruby on Rails in Linux.

      • How to install Essential Multimedia Codecs in Linux

        By default, the Linux system cannot play most video files that are in encrypted formats (proprietary media formats) if you do not have the required Media Codecs installed on your system.

        It contains lots of packages like flash plugin, gstreamer, mp4, libavcodec, etc (especially decoder), which are not open source and some of them involve copyright patent or legal issues. Hence, these are not installed by default nor shipped with official repository.

        If you try to play proprietary media formats without installing media codecs, you will see the following error message “Unable to play the file”.

        In this brief tutorial, we’ll show you how to install Media Codes on Ubuntu, Fedora and openSUSE systems.

      • Ubuntu Install Buku Bookmark Manager From The Terminal

        Buku is a powerful bookmark manager written in Python3 and SQLite3. It’s a flexible command-line solution with a private, portable, merge-able database along with seamless GUI integration.

        It can auto-import bookmarks from your browser(s) or fetch the title and description of a bookmarked URL from the web. You can use your favourite editor to compose and update bookmarks. With multiple search options, including regex and a deep scan mode (particularly for URLs), it can find any bookmark instantly. Buku can look up the latest snapshot of a broken link on the Wayback Machine. There’s an Easter egg to revisit random forgotten bookmarks too! Buku is too busy to track you: no hidden history, obsolete records, usage analytics or homing.

      • 1 Click Google Chrome Install On Ubuntu [ Simple and Easy ]

        As of March 2021, StatCounter estimates that Chrome has a 66% worldwide browser market share (after peaking at 72.38% in November 2018) on personal computers (PC), is also dominant on mobile, and has caught up with Safari on tablets (or about a percent-point below at 42.33%), and at 63.59% across all platforms combined. Because of this success, Google has expanded the “Chrome” brand name to other products: Chrome OS, Chromecast, Chromebook, Chromebit, Chromebox, and Chromebase.

      • RPM Commands – Unixcop

        RPM (Red Hat Package Manager) is an default open source and package management utility for Red Hat systems like (RHEL, CentOS and Fedora).

        The tool allows you install, update, uninstall, query, verify and manage system software packages in Unix/Linux operating systems. The RPM known as .rpm file, that includes compiled software programs and libraries needed by the packages. This utility only works with packages that built on .rpm format.

      • How to install the Opera Browser on Deepin 20.2

        Today we are going to look at how to install the Opera Browser on Deepin 20.2. As seen in the video, a person downloads Opera, from the official site, and then installs it with the built-in installer. Enjoy!

      • How to use df command in Linux / Unix {with examples} – nixCraft

        We use the df command to find total disk space and available space on a Linux / Unix file system. Let us see how to use the df command to view the amount of free space left on your Linux, macOS, *BSD and Unix file system. We will also explain how to automate disk space monitoring and send an email alert or push notification to your mobile device.

        The df is an essential tool for a developer as it reports the amount of disk space used and available on file Linux or Unix filesystem.

      • 10 Tips on mastering Sublime Text Editor | FOSS Linux

        Investing in quality development tools will make you more productive and significantly increase code quality. One such tool is Sublime Text 3, and you might be surprised by the many cool things in Sublime Text Editor.

        Sublime Text 3 is a sophisticated text editor for markup, code, and prose. Sublime Text Editor is loved by web developers, engineers, and programmers alike. Sublime Text 3 is built from custom components, a cross-platform UI toolkit, with an unmatched syntax highlighting engine. Sublime Text Editor is very responsive, giving developers excellent performance. It is free for download and is available for Mac, Windows, and Linux.

        This article will highlight tips, shortcuts, and tricks of getting the most from Sublime Text 3. The article will highlight the must-have packages and project-specific preference settings and tweaks.

      • How to install Growtopia on a Chromebook

        Today we are looking at how to install Growtopia on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

        This tutorial will only work on Chromebooks with an Intel or AMD CPU (with Linux Apps Support) and not those with an ARM64 architecture CPU.

      • LFCA – Useful Tips for Securing Data and Linux – Part 18

        Since its release in the early nineties, Linux has won the admiration of the technology community thanks to its stability, versatility, customizability, and a large community of open-source developers who work round-the-clock to provide bug fixes and improvements to the operating system. By and large, Linux is the operating system of choice for public cloud, servers, and supercomputers, and close to 75% of internet-facing production servers run on Linux.

      • VIM Editor

        Vim is an advanced and highly configurable text editor built to enable efficient text editing. Vim text editor is developed by Bram Moolenaar. It supports most file types and vim editor is also known as a programmer’s editor. We can use with its plugin based on our needs.

        Also vim, short for Vi Improved is a command-line text editor. In this vim tutorial, you are going to learn useful tips in using the vim text editor. Without much ado, let’s jump right in.

    • Games

      • Viscerafest is a sci-fi fantasy FPS with lots of punching entering Early Access on May 20

        Ready for more retro-infused first-person shooting action? Viscerafest is now confirmed to be launching on May 20 into Early Access on Steam following a successful Beta. The developer, Acid Man Games / Fire Plant Games have been regularly putting out Beta builds on their Discord which have shown a lot of promise.

        “Viscerafest is a Sci-Fi Fantasy Singleplayer Arena FPS with minor Collectathon elements. Fight through hordes of aliens and eldritch monstrosities wielding a slew of powerful weapons, juggling your resources, and exploring over 26 intricately designed hand crafted levels.”


        The Linux version we tested before release has been running exceptionally well, we think this is one you’re going to like a lot if you love arena-styled fast-paced shooters.

      • Google says Stadia is very much ‘alive and well’ according to a new interview

        Despite everywhere you look there’s always someone pointing to the Google Graveyard, the game streaming service Stadia is still soldiering on in the face of overwhelming competition.

        In a new interview with GamesIndustry.biz, Stadia’s developer marketing lead Nate Ahearn says the service is actually “alive and well” and went on to mention how they have over 100 new titles launching for Stadia through 2021. They’re also continuing to grow their Stadia Makers program where they help Unity developers port to Stadia (with another 20 coming from that) along with continuing partnerships with many AAA studios like Capcom, EA, Square Enix, Ubisoft and others.

      • itch.io Creator Day gives 100% of the sales to developers today for 24 hours

        Right now game store itch.io is hosting their first official itch.io Creator Day, where the store gives 100% of the sales back to developers instead of taking a cut. This is not the first time itch.io has done this, as they did so for Black Friday in 2020. Now though, they’ve confirmed that this is going to be a more regular thing which is why they’ve slapped an actual name on it.

        Developers don’t have to do anything, as it’s all automatic. Taking a cut from developers has always been a very open point for itch, as developers set the cut they give to itch themselves – there’s no forced 30% or 12% or anything here. Note: developers don’t entirely get 100% exactly, as there’s still taxes and payment processor fees but you get the point.

      • Steam Still Can’t Seem To Keep Its Hands Off Some ‘Sex Games’ Despite Hands Off Policy

        It’s been three or so years since Valve announced a new “hands off” approach towards approvals for games on its dominant Steam storefront. This new “policy” was unfortunately rolled out in an extremely Steam-like manner: vague and largely indecipherable, full of holes, and all with a caveat baked in that Steam could still do basically whatever it wants. Later, the company clarified that the chief goal with all of this was to allow for more adult-oriented games while still giving Steam the ability to disallow “troll games”, as though that actually clarified anything. Predictably, this new policy set off confusion all over the place, and even years into the change its application appears to be aggressively inconsistent.

      • Proton GE gets some big updates but you may need to remove old Wine prefixes

        Proton GE (GloriousEggroll) is a community-built version of the Proton compatibility layer for running Windows games on Linux through Steam Play. You could compare Proton GE to the Valve-official Proton Experimental, where lots of extra features and fixes go in that haven’t seen as much testing – but both may get you into newer Windows games quicker on Linux.

        If you’re not clear on what Proton and Steam Play are, be sure to check out our constantly updated dedicated page. It’s a special compatibility layer for running Windows games and apps from Steam on Linux.

        Over the last month or two, Proton GE has seen multiple big new releases (the latest being Proton-6.8-GE-1) based on Wine 6.5 and it also sees big bumps in versions for the likes of DXVK, VKD3D, OpenXR patches, Media Foundation fixes for getting more games video working and the list of changes goes on for some time.

      • Unvanquished 0.52 Beta Released For Open-Source, First-Person RTS Game

        Following this week’s id Tech 3 based Daemon engine update, the open-source first person shooter / real-time strategy game Unvanquished has just issued its long overdue v0.52 beta release.

        Unvanquished has been a very promising open-source game project succeeding the former Tremulous project. As part of Unvanquished, Daemon Engine as their downstream and much improved version of the open-source id Tech 3 has continued advancing.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • KDE Plasma 5.22 Beta Arrives with ‘Hugely Improved’ Wayland Support

          KDE developers have just released the first beta of KDE Plasma 5.22.

          This beta arrives ahead of the planned stable release of KDE Plasma 5.22 on June 8, 2021.

          What have developers who work on for the open-source desktop environment (and its associated technologies) been tending to this time around? Well, there’s been a large focus on patching up paper-cuts within the Plasma experience, and making smaller (but no less important) tweaks to improve the overall quality of the desktop environment.

        • KDE Plasma 5.22 Beta Ready For Testing With Much Better Wayland Experience

          KDE developers this week have issued the much anticipated Plasma 5.22 beta for testing, which is exciting this time around largely for bringing its Wayland support up to par for daily use with quite a lot of polishing and optimizations.

          Plasma 5.22 has quite well-rounded Wayland support now and should deliver a good experience especially for Linux gamers with finally adding direct scan-out support, FreeSync / Adaptive-Sync plumbing, and much more.

      • GNOME Desktop/GTK

        • First Cut at a GTK4 Port of LibreOffice

          Early days yet, but here’s some screenshots of an experimental port of LibreOffice to GTK4 I’ve commited upstream during the week. It starts without crashing, renders, accepts user keystrokes and mouse events, basic Input Method support also works.

          Standard GTK file dialog functionality works.

    • Distributions

      • BSD

        • FreeBSD on the Pine H6

          Pine makes a bunch of different bits of hardware. The Pine64 was a bit of a breakthrough in single-board-computing (SBC) – very different from the Raspberry Pi, and a lot more open-source. We could argue about just how open it is, but it did spawn the Pinebook and the Pinebook Pro. I hear the latter is really nice, and runs OpenBSD and FreeBSD too. Somewhat forgotten amongst all these is the Pine H6.

          When the A64 came out originally (was that 2018?), closely followed by the H6, the H6 was clearly a more-capable board: more memory, even if you can’t access all 4GiB that is soldered on, eMMC, barrel power-connection. The Pine64-LTS remedied a lot of that, and the H6 was then also surpassed in compute-power by the Rock64 and RockPro. By that time, though, I had ordered a couple.

      • IBM/Red Hat/Fedora

        • Red Hat exec: 500 new jobs to focus on expanding its cloud computing punch

          Red Hat’s hiring spree announced this week is designed to to bolster cloud computing efforts and is seeking employees at each stage of the product development process.

          So says Mike McGrath, vice president of Software Engineering at Red Hat, in an interview with WRAL TechWire.

          The new talent can help the company develop products to meet emerging edge computing needs as requested by current and prospective clients, he added. The cloud and Red Hat’s expertise were the big reasons IBM acquired Raleigh-based Red Hat two years ago for a whopping $34 billion.

        • Red Hat to hire hundreds in Raleigh as IBM’s $34B bet continues to pay off

          IBM is continuing its bet on Red Hat, with plans to add more than 200 Red Hatters to its Triangle operation.

          In an interview, Tim Cramer, senior vice president of software engineering at Red Hat, said the investment is a continuation of the bet IBMm (NYSE: IBM) made on the firm when it purchased it in 2019 for $34 billion.

          “We’re definitely performing,” he said. “We’re doing well, and clearly the open hybrid cloud bet is the one we want to continue on.

      • Canonical/Ubuntu Family

        • Ubuntu on High Resolution

          Don’t have great displays? Here you can see Ubuntu displayed in high resolutions by 1400′s and better as well as get a way to test them even without buying a monitor device. I tried to collect how it looks starting with normal desktop, menu, and Activities overview, to system tray, calendar tray, Settings, LibreOffice Writer and Ubuntu Software. You will find here multiple aspect ratios by 4:3, 16:9, and 16:10. Lastly, because Ubuntu is based on GNOME desktop environment, this article applies to GNOME as well no matter what other GNU/Linux distro you are using. Now let’s have a look!

        • Every Ubuntu Default Wallpaper So Far

          Each Ubuntu release is different from the other releases in various ways. Each release has a different code name and a different version number. I have explained the logic behind Ubuntu version and codenames so I am not going to bore you with those details again.

          Each Ubuntu release also comes with a different set of wallpapers. There is one default background that you’ll see while installing Ubuntu or when you first log in to it.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Tor Is Released

        Tor is the actual network software for the Tor network. It is not the same as the Tor Browser bundle end-users use to access the Tor network, Tor is just a daemon you run to create a small part of the Tor network. The Tor Browser bundle is a bundle with web browser based on Mozilla Firefox and the Tor daemon configured to run in client mode.

        The latest Tor release is a bit of a yawn. It has a tweak in Tor’s support for the Linux kernels seccomp sandbox that lets Tor use seccomp correctly with Glibc 2.33 (bug 40382) and a tweak that makes GNU Authconf 2.70+ create the build script correctly (bug 40335)

      • Dreaming At Dusk
      • Programming/Development

        • Drop Autotools for CMake | Opensource.com

          In my introduction to Autotools, I demonstrated how to manage building and packaging code with GNU Autotools. It’s a robust and common platform that integrates easily into many packaging systems, including RPM, APT, pkgsrc, and more. Its syntax and structure can be confusing, but luckily there are alternatives, including the open source CMake framework.

          CMake is a cross-platform suite for building, testing, and packaging software. It uses simple and clearly documented syntax, so it’s easy to start using even if you’ve never used a build system before.

        • Qt Safe Renderer 1.2 released

          We are happy to announce the new version 1.2 of the Qt Safe Renderer is now available.

        • Erlang/OTP 24 Highlights

          Finally Erlang/OTP 24 is here! A release that for me has been about 10 years in the making. As is tradition by now, this blog post will go through the additions to Erlang/OTP that I am most excited about!

        • Speedbuilding LLVM/Clang in 5 minutes

          This post is a spiritual successor to my “Building LLVM on OpenBSD/loongson” article, in which I retraced my attempts to build LLVM 3.7.1 on MIPS64 in a RAM constrained environment.

          After reading the excellent “Make LLVM fast again”, I wanted to revisit the topic, and see how fast I could build a recent version of LLVM and Clang on modern x86 server hardware.

          The system I’m using for this experiment is a CCX62 instance from Hetzner, which has 48 dedicated vCPUs and 192 GB of RAM. This is the fastest machine available in their cloud offering at the moment.

          The system is running Fedora 34 with up-to-date packages and kernel.

  • Leftovers

    • The Mundane and Alienated Life of a Freelancer

      I do not, generally speaking, enjoy reading novels whose protagonists both live and think like I do. I’m already doomed to a lifetime in my own head. When I read fiction, I want to visit minds that operate differently from my own. As a result, I was initially put off by how swiftly I saw myself in the unnamed protagonist of the Australian writer Kavita Bedford’s debut novel, Friends and Dark Shapes, and yet I kept reading. Not until several chapters into the novel did I realize that I was reacting to a very specific point of connection between her fictional life and my real one—she’s a freelance writer.

    • Opinion | All You Nations Sleeping
    • The IOC Is Now Daring Olympic Athletes to Protest

      At the 1968 Mexico City Olympics, sprinters John Carlos and Tommie Smith were told before their 200-meter race that any protest would be met with severe consequences. If they made it to the winner’s podium, they were to stand in silence and do nothing else. The messenger of this ominous warning was none other than 1936 Olympic legend Jesse Owens, bringing the word directly from imperious International Olympic Committee President Avery Brundage. Carlos and Smith were fed up with both the racism in what Brundage termed “the Olympic Movement” and oppression in the broader society. So they dared to raise their fists after coming in first and third, creating a moment that has stood the test of time.

    • Sky Studios Names Cecile Frot-Coutaz CEO

      Comcast-owned European pay TV giant Sky has named Cécile Frot-Coutaz, former CEO of Fremantle and currently head of YouTube in Europe, the CEO of its production arm Sky Studios, starting in September.

      Current Sky Studios CEO Gary Davey, who launched the business in 2019, remains with the company to ensure a smooth transition before retiring later this year.

    • Health/Nutrition

      • My Medical Records

        This is very difficult for me to do, as I am perhaps guilty of too much pride.

      • Report Debunks Big Pharma’s ‘Dangerous Narrative’ on Vaccine Supplies

        “We need urgent public manufacturing and technology sharing to meet global need and end the pandemic.”

      • Opinion | There Is Something Wrong With the Herd

        The United States won’t achieve herd immunity because a significant portion of the herd is suffering from mad cow disease.

      • Opinion | The Media Is Causing Harm by Reporting Official Covid-19 Figures From Poorer Countries

        The media needs to stop misreporting Covid-19 numbers now, and desist from minimizing the hardships in the parts of the world that are facing the worst—economically, socially, and health wise—aspects of this pandemic.

      • Opinion | Viruses Don’t Recognize Borders and Neither Should Vaccines

        As an Indian American, my family has experienced the worst of this pandemic in two countries. For any of us to be safe, we all need vaccine equity.

      • Study Showing 100% of Breast Milk Samples With ‘Forever Chemicals’ Bolsters Call for PFAS Ban

        “Moms work hard to protect their babies, but big corporations are putting these, and other toxic chemicals that can contaminate breast milk, in products when safer options are available.”

      • Mismanagement of the COVID-19 Crisis Increases Food Insecurity in India and Brazil

        In one of Asia’s largest slums, Dharavi, Mumbai, putting food on the table is proving to be a pressing challenge for the population of about 1,000,000 living in one of the most densely populated areas in the world. “Hunger is a major problem,” says Nawneet Ranjan, founder of the nonprofit Dharavi Diary (Gyanodaya Foundation), who has been working in Dharavi for the last several years. “In the last six or seven years that I have worked here, I have never seen anything like this,” he says, referring to the helplessness being felt by the marginalized sections of India’s societies who have been facing increasing food insecurity, especially during the second wave. “Food is a bigger priority than sickness,” he explains. He has recently started a crowdfunding effort to provide the residents of Dharavi with food supplies, especially the most vulnerable sections like single mothers, the elderly and the transgender population.

        During the second week of May, India recorded more than 400,000 daily infections and more than 4,000 deaths, surpassing earlier records, and has overtaken Brazil as having the second-largest number of COVID-19 cases in the world (after the United States of America).

    • Integrity/Availability

      • Proprietary

        • FAQ: DarkSide Ransomware Group and Colonial Pipeline

          Ransomware is a combination word of “ransom”—holding stolen property to extort money for its return or release; and “malware”—malicious software installed on a machine. The principle is simple: the malware encrypts the victim’s files so that they can no longer use them and demands payment from the victim before decrypting them.

          Most often, ransomware uses a vulnerability to infect a system or network and encrypt files to deny the owner access to those files. The key to decrypt the files is possessed by a third party—the extortionist—who then (usually through a piece of text left on the desktop or other obvious means) communicates instructions to the victim on how to pay them in exchange for the decryption key or program.

          Most modern ransomware uses a combination of public-key encryption and symmetric encryption in order to lock out the victim from their files. Since the decryption and encryption key are separate in public-key encryption, the extortionist can guarantee that the decryption key is never (not even briefly, during the execution of the ransomware code) transmitted to the victim before payment.

        • RemotePC adds new features for Linux remote access

          Users can connect to their remote Linux machines directly from any web browser via RemotePC Viewer Lite, without the hassle of any additional software installation.

          RemotePC offers many features that make it the perfect solution for Linux remote access. It is platform independent, so remote computers and servers can be accessed from any PC, Mac, or Linux machine, as well as iOS and Android devices. The software also allows users to perform remote access functions such as lock screen, blank host screen, adjust the screen of the remote computer, and block remote input during a session.

        • Who’s in charge here? Colonial Pipeline [crack] exposes huge holes in U.S. cyber defenses, say experts

          The weaknesses have been known for years: Eighty-five percent of American critical infrastructure is owned by private companies, and few regulations govern how those companies must protect their computer networks. Criminal [attackers] like the ones the FBI says attacked Colonial Pipeline are given overseas sanctuary by hostile foreign governments, out of reach of American law enforcement. The vast majority of ransomware attacks originate abroad, many of them from Russia, experts say.

        • Colonial Pipeline reportedly paid the [cracker]s nearly $5 million, despite suggestions to contrary

          The news is also a little worrying because of how a successful ransom might encourage [attackers] in future. Over the years, we’ve heard reports of smaller companies and local government entities paying ransoms to regain access to their computers, but this is perhaps one of the most high-profile examples of ransomware yet, and the news might inspire copycats.

        • EnergyColonial Pipeline has no plan to pay ransom to [crackers] -sources

          Officials so far have found no significant connection to the Russian government, instead concluding that the pipeline company delivering 45% of the U.S. East Coast’s oil was crippled by ransomware attack.

          DarkSide lets “affiliates” [crack] into targets elsewhere, then handles the ransom negotiation and data release.

        • Colonial Pipeline did pay ransom to [crackers], sources now say

          The group, previously identified as DarkSide, demanded nearly $5 million, two other sources familiar with the incident said. The sources CNN spoke to Thursday did not say how much the company paid. Bloomberg first reported the ransom payment.

          CNN was previously told by multiple sources that Colonial Pipeline had not yet paid the ransom, but two sources said on Thursday that the company did pay as it sought to retrieve the stolen information. It is not clear when the payment was made.

        • The Microsoft Surface Duo Fire Sale Is Here, and It’s Still Not Worth Buying
        • Microsoft Outlook update actually crashed the whole system

          A recent change to the component responsible for displaying text in Microsoft Outlook is preventing users from creating and viewing emails in the desktop version of the email client.

          The bug in Outlook Build 13929.20372 (version 2104) was spotted and reported by several users from all over the world, and has now been confirmed by Microsoft as well.

          The issue causes emails inside the affected Outlook version to appear blank. Users have also reported all kinds of graphical anomalies including blank screens shortly after using the client to send and receive emails.

        • Windows 10 KB5003173 update fails with error 0x800f0922, how to fix [Ed: Even Microsoft boosters like Lawrence Abrams know that Windows is "DA BEST!"]

          The Windows 10 KB5003173 cumulative update may fail to install with an error 0x800f0922 if Microsoft Edge has been previously uninstalled.

        • Security

          • Colonial reportedly paid nearly $5 million ransom to bring pipeline computers back online [Ed: Microsoft Windows TCO]
          • Some health service disruption after HSE cyber attack [Ed: Microsoft Windows TCO with lives on the line]
          • Security updates for Friday [LWN.net]

            Security updates have been issued by Debian (jetty9, libgetdata, and postgresql-11), openSUSE (java-11-openjdk), SUSE (dtc, ibsim, ibutils, ipvsadm, and kernel), and Ubuntu (awstats and glibc).

          • Surveillance

            • Americans Willing To Pay More For Privacy On Social Media And Smartphones, Researcher Finds

              A study by a marketing expert found Americans are willing to pay more for full data privacy on social media and their smartphones, which he said could pave the way for a new class of companies that could fulfil those privacy needs.

              In an interview with Broadband Breakfast, Ajit Ghuman, who runs marketing at customer engagement platform Narvar, sat down to discuss why Americans are willing to pay extra for privacy when it comes to their smartphone uses, and why men are particularly willing to pay more than double than women for full privacy on social media.

              The definition of full privacy in this study means customer data cannot be sold to advertisers and is not kept by the company.

            • Anthropologists say smartphones are now “the place where we live”: what does that mean for privacy?

              The smartphone is amazing not just for the computing power it packs into its pocketable format. It has become a universal digital tool: a typical model today includes phone, pager, computer, still and video camera, calculator, diary, multimedia player, radio, TV, clock, maps, GPS, voice recorder, e-book reader, translator, weather station, authenticator, gaming device, WiFi hotspot, and flashlight. No wonder, then, that a group of anthropologists at University College, London, found that the smartphone now occupies a special place in many people’s lives:

            • Dartmouth’s Insane Paranoia Over ‘Cheating’ Leads To Ridiculous Surveillance Scandal

              The NY Times had an incredible story a few days ago about an apparent “cheating scandal” at Dartmouth’s medical school. The problem was, it doesn’t seem like there was any actual cheating. Instead, it looks like a ton of insane paranoia and an overreliance on surveillance technology by an administration which shouldn’t be in the business of educating kindergarteners, let alone med students. We’ve had a few posts about the rise of surveillance technology in schools, and its many downsides — and those really ramped up during the pandemic, as students were often taking exams from home.

    • Defence/Aggression

      • Video Showing GA Congressman Lying About Jan 6 Events Goes Viral on Social Media
      • Time for Mutiny Over Turkey’s Bounties on Kurdish Leaders

        On April 20, the State Department renewed multimillion-dollar bounties on three senior leaders of the Kurdistan Workers’ Party (PKK): Cemil Bayık, Duran Kalkan, and Murat Karayılan. Bayık and Karayılan are founding members of the PKK and Kalkan is a senior commander.

      • Why the Pentagon’s Budget Never Goes Down

        And indeed, as far as, say, infrastructure or pandemic vaccination goals, Biden has delivered in a major way. Blindly funding the Pentagon and its priorities in the stratospheric fashion that’s become the essence of Washington has, however, proven another matter entirely. One-hundred days later and it’s remarkable how little has changed when it comes to pouring money into this country’s vast military infrastructure and the wars, ongoing or imagined, that accompany it.

        For the past decade, debate about the Pentagon budget was governed, in part, by the Budget Control Act, which placed at least nominal caps on spending levels for both defense and non-defense agencies. In reality, though, unlike so many other government agencies, the Pentagon was never restrained by such a cap. Congress continued to raise its limits as military budgets only grew and, no less important, defense spending had a release valve that allowed staggering sums of money to flow without serious accounting into an off-budget fund meant especially for its wars and labelled “the overseas contingency operations account.” The Congressional Research Service has estimated that such supplemental spending from September 11, 2001, to fiscal year 2019 totaled an astonishing $2 trillion above and beyond the congressionally agreed upon Pentagon budget.

      • Palestinian Solidarity Demonstrations Erupt Worldwide as Israeli Violence Intensifies

        “It’s up to us to keep demonstrating and keep hammering home that people will not sit back and tolerate Israel’s system of apartheid.”

      • AOC Says Biden’s Refusal to Condemn Israeli Attacks on Palestinians ‘Takes a Side—the Side of Occupation’

        The New York Democrat criticized Biden for failing to acknowledge “what precipitated this cycle of violence—namely, the expulsions of Palestinians and attacks on Al-Aqsa.”

      • Muna is Palestine, Yakub is Israel: The Untold Story of Sheikh Jarrah

        The obvious story is that of the nightly raids and violence meted out by Israeli police and Jewish extremists against Palestinians in the devastated East Jerusalem neighborhood.

        For weeks, thousands of Jewish extremists have targeted Palestinian communities in Jerusalem’s Old City. Their objective is the removal of Palestinian families from their homes in the Sheikh Jarrah neighborhood. They are not acting alone. Their riots and rampages are directed by a well-coordinated leadership composed of extremist Zionist and Jewish groups, such as the Otzma Yehudit party and the Lehava Movement. Their unfounded claims, violent actions and abhorrent chant “Death to the Arabs” are validated by Israeli politicians, such as Knesset member Itamar Ben-Gvir and the Deputy Mayor of Jerusalem, Arieh King.

      • A Nightmare of Terror Across the Landscape of Palestine

        I have been trying to think of a moment since 1948 when so broad a range of Palestinians have been exposed to as great a level of Israeli violence as they have been these last few days—and I don’t think I can.

      • Trump’s Obsessive Attacks Won’t Silence Ilhan Omar’s Defense of Palestinian Human Rights

        On Monday evening, Representative Mark Pocan, a Wisconsin Democrat who is the former cochair of the Congressional Progressive Caucus, responded to news reports of surging violence in Israel and Palestine. Referencing the deaths of Palestinians following Israeli air strikes on targets in the Gaza Strip—including those of a number of young children—the representative declared, “We cannot just condemn rockets fired by Hamas and ignore Israel’s state-sanctioned police violence against Palestinians—including unlawful evictions, violent attacks on protestors and the murder of Palestinian children. U.S. aid should not be funding this violence.”

      • Nathan Thrall on the Historic Palestinian Uprising Against Israeli Control from the River to the Sea

        We look at the crisis unfolding in Israel-Palestine with Nathan Thrall, former director of the Arab-Israeli Project at the International Crisis Group and writer now based in Jerusalem, who says despite a buildup of Israeli troops on the Gaza border, Israel wants to avoid a ground invasion of the besieged territory and return to the status quo that existed before the latest round of violence. “Israel’s preference and its policy is to have Hamas remain in control of its little island of Gaza after this is finished,” Thrall says.

      • ‘It Must End’: House Dems Blast Israel’s Assault of Gaza, Decades of Occupation Enabled by US

        “Palestinians aren’t going anywhere,” said Rep. Rashida Tlaib, “no matter how much money you send to Israel’s apartheid government.”

      • Palestinians Face Mob Attacks Inside Israel as Assault on Gaza Escalates
      • “Lynch Mobs”: Palestinians Face Brutal Attacks Inside Israel as Assault on Gaza Escalates

        Televised images of Israeli mobs attacking Palestinians have been widely denounced by Israeli media and public figures, but Palestinian writer Budour Hassan says the selective outrage ignores decades of occupation that have led to this point. “There is some mention of these lynch mobs that are attacking Palestinians in mixed cities. What is not mentioned is who emboldened these lynch mobs. We’re talking about state-sponsored, decades-long discrimination, isolation and erasure that emboldened these groups,” says Hassan, legal researcher for the Jerusalem Center for Legal Aid and Human Rights, who joins us from Nazareth.

      • Opinion | If Biden Is Serious About Ending Forever Wars, the US Needs to End Support for Israel

        Cutting military aid to a state that oppresses its Palestinian population would show that the U.S. is serious about human rights.

      • Israeli Defense Minister Threatens ‘Gaza Will Burn’ as IDF Readies Plans for Ground Invasion

        Benny Gantz’s comments “should be entered directly as evidence of war crimes to the International Criminal Court,” said one critic.

      • Poet Mohammed El-Kurd Detained in Sheikh Jarrah After Condemning Israeli Apartheid on U.S. TV

        On Monday, we spoke to writer and poet Mohammed El-Kurd, whose family is facing forceful eviction from the Sheikh Jarrah neighborhood of Jerusalem. He also spoke on CNN and MSNBC. After these interviews, Israeli forces arrested him and forcibly removed him from Sheikh Jarrah. It was captured in a dramatic video shared widely on social media. “They just threw me in the street and told me that I couldn’t come back into the neighborhood,” El-Kurd says. “They’ve done this many times to us, many of my family members, many of my neighbors. They do this routinely.” El-Kurd has been one of the most prominent Palestinian voices in recent weeks describing what is happening in Jerusalem’s Sheikh Jarrah neighborhood, where Israeli authorities’ planned evictions of several Palestinian families to give their homes to Jewish settlers has been widely described as “ethnic cleansing.”

      • “The Scene Is Horrific”: Gazans Trapped as Israel Escalates Bombing, Killing Dozens in the Territory

        The death toll in Gaza has reached at least 83, including 17 children, and hundreds of people have been injured, as Israel’s aerial bombardment of the besieged territory continues. Israel is now sending troops to the Gaza border for a possible ground invasion as many Palestinians are celebrating Eid al-Fitr, marking the end of the holy month of Ramadan. The Biden administration on Wednesday gave Israel a green light to continue its assault, and Israel has reportedly rejected calls for an immediate ceasefire, despite growing international condemnation. Issam Adwan, Gaza project manager for We Are Not Numbers, a youth-led initiative to share Palestinian stories with the wider world, says many international observers make the mistake of viewing the latest violence in isolation. “They think this war is the only violation of human rights Israel is doing to the people of Gaza. Over the past 15 years, we have witnessed three brutal wars, and this is a fourth one,” says Adwan.

      • The US Must Finally Acknowledge That Israel Is an Apartheid State
      • Israeli Ground Troops Attack Gaza as Palestinian Death Toll Tops 100

        “We will continue to do what we’re doing with great intensity,” said Israeli Prime Minister Benjamin Netanyahu after Defense Minister Benny Gantz vowed that “Gaza will burn.” 

      • ‘We need to get these people out’: Lawmakers warn Pentagon of impending bloodbath for Afghan partners

        Two lawmakers who are veterans of the war in Afghanistan warned a Pentagon official on Wednesday that Afghans who had worked for the U.S. government would be hunted down by the Taliban unless the Biden administration organized an emergency evacuation before American troops withdraw in four months.

      • Lampedusa: Italy’s gateway to Europe struggles with migrant influx

        She tells me she paid smugglers 8,000 Libyan dinars (£1,300; $1,800) for the three-day boat crossing to Lampedusa. Italian intelligence reportedly estimate that 50-70,000 people may be on Libya’s shores waiting to take a similar journey.

      • Yes, Mitch McConnell, Republicans Are Trying to Restrict Voting

        The recently passed restrictive voting law in Georgia reduces time to request absentee ballots, reduces voting hours, limits the number of ballot dropboxes and bans giving water to voters waiting in line at a polling place. According to Anderson, that bill contained “eight key provisions that Heritage recommended.” She also bragged about meeting with Georgia’s Republican governor, Brian Kemp, just days ahead of him signing the bill. Another bill, similar to Georgia’s, is making its way through the Texas legislature and has “19 provisions” from Heritage, Anderson said.

        Anderson went on to say that sometimes Heritage actually “draft[s] the bill” for the legislators, or if there is a lawmaker who may not be open to hearing from groups like Heritage, they simply have someone else deliver their message. “We have a sentinel on our behalf give them the model legislation so it has that grassroots, from-the-bottom-up type of vibe,” she said.

    • Environment

      • [Old] Cell phones thrown in the trash are exploding, causing 5-alarm fires in garbage trucks

        Last year, 65% of waste facilities fires in California began with lithium-ion batteries. And when one goes, others can, too.

        “If there are multiple batteries there, you will have not just a fire, you will have explosions,” said Carl Smith, CEO and president of Call2Recycle, a national recycling program funded by battery manufacturers.

      • Antarctica’s Doomsday Glacier: How Doomed Are We?

        Last week, two new papers were published simultaneously in the science journal Nature that offer radically different visions of the Doomsday glacier, as well as radically different visions of how climate models work and what they can tell us about the future. But they agree on one thing: “Both papers make it very clear that human decisions are important, and that limiting warming can limit sea level rise,” says Richard Alley, a glaciologist at Penn State and one of the most respected ice scientists in the world. But beyond that, the two papers may as well be describing life on different planets.

      • Progressive Groups Demand Biden Appoint Chair Who Will End Fed’s Funding of ‘Climate Destruction’

        “If the Fed did not begin moving aggressively on Day One of the Biden administration (if not long before that), then the Fed is contributing to the climate crisis.”

      • EPA Data Kept Secret Under Trump Shows Climate Crisis Becoming ‘More Evident, Stronger, and Extreme’

        “Combating climate change—it’s not optional. It’s essential,” said EPA Administrator Michael Regan.

      • Why I Am Not a Climate Doomist

        Despite all that, I am not a doomist, and believe we still have possibilities to leave our children and their generations with a world with which they can cope.  After many years working on climate, that is how I express my climate mission.  There is no doubt that humanity will be adapting to the consequences of our fossil-fueled bacchanal for generations, if not millennia. We will learning to live with far less water in certain regions, and too much in others.  We will be dealing with dustbowls where there were breadbaskets, and retreating from coastal cities. Storms will be ravaging, and wildfires widespread. But we will be coping, and will have eliminated the root causes of climate chaos, fossil fuel pollution and deforestation.

        We will do it because we have to.  Because the story will changed, we will realize what we face, and as humans can do in the face of disasters, pull together in a common response. Facing the most challenging crises in human history, we will rise to the better angels of our nature, and leave the children of the future with a world in which they have possibilities other than coping with collapse.

      • Redefining the Anthropocene

        Many scientists and conservationists argue that we should do our utmost to prevent artificially-caused extinctions, which collectively are causing a Sixth Mass Extinction far more rapid than previous ones from the fossil record, with human failures as the cause. Other researchers contend that we can do more good by protecting healthy ecosystems, rather than focusing on individual species. The reality is that individual species protection, and broader habitat protection, are two equally necessary sides of the same conservation coin. Doing one in no way precludes pursuing the other; in fact, if you’re doing it intelligently, there is synergy in pursuing both at the same time. That’s what E.O. Wilson was driving at when he advocated for saving half the Earth in a natural state, to solve (or at least slow) the Biodiversity Crisis. Saving ecosystems is absolutely necessary to provide habitats required by individual species, and saving species is essential for maintaining healthy and functioning ecosystems, which fall apart in unpredictable ways when their component parts are removed. Single-species and ecosystem-based conservation methods aren’t contradictory; they’re two essential sides of the same coin.

        The more fundamental schism lies between those who see value in conserving and restoring wild, self-willed nature, and those who are bent on human domination and control. Only the former can legitimately call themselves conservationists, but the latter don’t even deserve to be called pseudo-conservationists. They are dominionists, and their guiding principle is that humanity ought to control everything, including natural processes.

      • Drastic methane cuts are both urgent and possible

        It’s a very potent greenhouse gas, and very short-lived. So drastic methane cuts should be a priority for rapid action.

      • Energy

      • Wildlife/Nature

        • Bridger-Teton National Forest Proposal Threatens Grazing Allotment Retirements

          Grazing on public lands is a privilege, not a right. Nevertheless, the political power of the livestock industry makes it nearly impossible to remove domestic animals even where there is apparent damage to public values like water quality, wildlife habitat, and wildlife.

          A potential solution has been the Voluntary Grazing Allotment Permit Buyout. The way it works is an agreement is reached between a rancher and some funding source, typically a private foundation or conservation organization, to close the allotment in exchange for a mutually agreeable fee. Usually, the managing agency, whether the Bureau of Land Management, Forest Service, or National Park Service, often agrees to close the allotment to future livestock use.

        • The Natural Brightness of the Night Sky: Analyzing 44 of the Darkest Places in the World

          A recent study analyses data collected at 44 of the darkest places in the world, including the Canary Island Observatories, to develop the first complete reference method to measure the natural brightness of the night sky using low-cost photometers.

          Of the 44 photometers in the survey, the Roque de los Muchachos Observatory (Garafía, La Palma, Canary Islands) stands out at the darkest of all the skies analyzed.

    • Finance

    • AstroTurf/Lobbying/Politics

      • The FBI Investigates Rudy Giuliani
      • Emergency Federal Protections Sought for Imperiled Joshua Tree

        Guardians submitted these petitions to list the Joshua tree on an emergency basis under the ESA, while simultaneously challenging the Service’s 2019 decision under the Trump administration to deny Joshua trees protected status as a “threatened” species in federal court—a listing decision that was prompted by a previous petition submitted by Guardians in 2015.

        Guardians’ emergency petitions were submitted in advance of what is expected to be yet another severe fire season in Southern California. Last summer, the Mojave Desert reached a record-breaking 130 degrees while enormous wildfires like the Dome Fire also decimated thousands of acres of Joshua tree habitat, destroying an estimated 1.3 million Joshua trees.

      • Political Rashomon: The Latest NYC Sex Scandal

        Compounding the election shuffle, the City is introducing what is known as “ranked-choice voting” by which voters can vote for multiple candidates in order of preference.  A voter indicates their first to fifth pick in order of preference and the one that receives a majority (50% plus 1) is the winner.

        While the mayoral race has drawn eight very different Democrats into the primary, the most controversy has erupted over an alleged incident of sexual misconduct by Scott Stringer, the City Controller.  His accuser, Jean Kim, a 41-year-old lobbyist, declared in a statement released by her attorney on April 28th: “One evening, shortly before the [2001] primary, I was talking to Stringer about the primary when without warning, and without my consent, he kissed me using his tongue, put his hand down my pants and groped me inside my underpants.” She added, “I pulled away and tried to avoid him.” The Gothamist, a city website owned by WNYC, a local public radio station, reported that she said he asked her on more than one occasion, “Why won’t you fuck me?”

      • Trump Extradition Orders Could Be Blocked or Delayed by DeSantis
      • Sanders Urges Labor Secretary to Protect Jobless Benefits as GOP Governors Race to Cut Them Off

        The Vermont senator warned that many workers “will be forced into poverty” if Republican leaders are permitted to end emergency unemployment benefits.

      • South Dakota Court Says Government Doesn’t Need To Pay For Home Cops Destroyed To Find A Fugitive Who Wasn’t There

        Destroying houses appears to be a cop hobby. Somehow searching for suspects involves punching larger-than-man-size holes in walls, shattering every pane of glass that separates cops from perps, and forcibly removing every door that would otherwise open as designed if officers attempted to use the handles.

      • In Ousting Cheney, Republicans Reinforce the Big Lie

        They may be following him over a cliff, hopefully.

        House Republicans led by their leader, Kevin McCarthy of California, followed through on their threats and ousted three-term Rep. Liz Cheney of Wyoming from the party’s No. 3 position as conference chair for repeatedly condemning Trump for his Big Lie about a “rigged” election that was “stolen” from him.

      • Republicans Would Back a Stinkbug If It Made the Base Wave Their Flags
      • The Blemishes of John Stuart Mill’s Liberalism

        However, Mill’s vision was deeply contradictory. Mill was an integral member of the Radical Liberals, who lamented the miserly electoral gains from the 1832 Reform Act. Yet he remained committed to Classical Liberalism (in spite of his musings on socialism) to the end. Undoubtedly his self-submersion and attachment to the rigors of Classical Political Economy contributed mightily to his faith. He retained a purist commitment to ‘free trade’ and ‘competition’ in the abstract. For example, competition was even an undiluted vehicle for good for wage labour, a ‘source not of low but of high wages’.

        In some of Mill’s most quoted works there is minimal acknowledgement and account of the convulsions of his time. Those mentioned in his Autobiography are mostly external to Britain, as in 1830 and 1848 France, Ireland (with English culpability ignored) and the 1865 Jamaican Morant Bay massacre.

      • Opinion | Liz Cheney: And Thus, the Revolution Devours Its Children

        At some point, the GOP will use bullets rather than ballots.

      • Major Corporations Are Backing Politicians’ Anti-Voting, Anti-Protest Efforts Around the Country

        Since the start of the year, conservative lawmakers have promoted and enacted legislation in state capitols that seek to make it harder to vote. At the same time, state legislatures are passing laws to impose harsh punishments on public protests.

        The dual efforts, aimed at subverting democracy, are also targeted to constrain the growing campaigns for racial and climate justice, and they have been aided by prominent corporations, according to a new report from Greenpeace.

    • Censorship/Free Speech

      • Foreign IT firms must open offices in Russia under new draft law: Lawmaker

        Foreign technology companies will be forced to open offices in Russia or face penalties such as advertising bans under draft legislation, a senior lawmaker said on Thursday, in a fresh move by Moscow to exert greater control over Big Tech.

        Russia is keen to strengthen control of the internet and reduce its dependence on foreign companies and countries. It has imposed a punitive slowdown on social network Twitter over its failure to delete content Moscow says is illegal.

    • Freedom of Information/Freedom of the Press

      • Moscow court sends 140 fines against RFE/RL’s Russian Service for re-examination

        Moscow’s Tverskoy District Court has overturned a decision from a magistrate’s court to impose 140 fines on RFE/RL’s Russian Service and its director Andrey Shary. The Tverskoy Court sent the proceedings for re-examination.

      • How China Used Foreign Media to Reset Image During Pandemic

        In the early days of the coronavirus outbreak, China sought to block news of the rapidly spreading virus, detaining those who tried to speak out. But in the months that followed, as the pandemic ravaged families and economies worldwide, Beijing sought to reset its public image through foreign media, research published Wednesday by the International Federation of Journalists (IFJ) shows.

        A survey of 54 journalist unions in 50 countries found a rise in the number of countries reporting a visible Chinese presence in their media, from 64% to 76% in a year. In countries where China has offered support and training to local media, a higher percentage said coverage of Beijing was more favorable, the IFJ report found.

      • Conviction of Blogger Casts Chill Over Uzbek Media

        He and dozens of bloggers and media watched on May 10 as a judge in the Surkhandarya region convicted their colleague, Otabek Sattoriy, of extortion and slander.

        The prosecutor asked for 11 years, accusing Sattoriy of blackmailing and defaming local officials for personal benefit. The judge threw out some accusations but sentenced Sattoriy to 6½ years in prison.

    • Civil Rights/Policing

      • New York County Jails May Close Their Doors to ICE

        On the campaign trail, President Joe Biden vowed to end the federal government’s use of private prisons for any detention, including the detention of undocumented immigrants. Shortly after entering office, Biden delivered on one aspect of his promise, issuing an executive order to end the use of private facilities by the Department of Justice. But he still hasn’t issued a corresponding order addressing for-profit detention centers operated by Immigration and Customs Enforcement.

      • The ‘ICE Kids’

        On a cold, rainy night last November, Bastian Rodriguez spent the first hours of his 18th birthday inside an Immigration and Customs Enforcement van. Rodriguez was aging out of the Cowlitz County Youth Services Center, a juvenile jail in Longview, Wash., and was on his way to the Northwest ICE Processing Center, a privately run immigration detention facility for adults in Tacoma. He had already spent more than two years in ICE custody. This piece was published in partnership with the ACLU.

      • Indigenous Rights Defenders Condemn Government Probe Into Critics of Bolsonaro’s Covid Response

        A federal judge denounced an investigation into two Indigenous leaders as “an illegal embarrassment.”

      • Border Policy Is Getting More and More Convoluted. That’s Creating False Hope for Migrants.

        No matter how hard he tried, Jonatan Garcia said, he couldn’t find steady work in Guatemala. He dabbled in construction, and on some days picked beans, after losing his sales job at a TV station a few weeks after the pandemic shuttered businesses and further stifled employment in his country.

        Desperation quickly mounted for Garcia. He struggled to make enough money to provide food for his wife and two small children, and they faced eviction from the three-room house they rented in the mostly indigenous and impoverished rural state of Baja Verapaz.

      • The Decline of Freedom

        This commitment to freedom emerged from bitter experience with tyranny and the invention of democracy.

        Democracy and freedom

      • Opinion | Mother’s Day Tears and the Fierce Prophetic Vision of Poor Women

        This past year-plus has laid bare the pressures, burdens, and violence that women, especially poor women and women of color, face every day.

      • I Went Down to the Demonstration to Get My Fair Share of Abuse

        Although the movement against the US war on the Vietnamese was not in the newspapers as much as it had been up to a year earlier when weeks of antiwar protests culminated in an attempted shutdown of Washington, DC, it regathered its forces. Protests may have been smaller in numbers in some cities and campuses, but on others they were better attended than at any time since the student strike in May 1970 after the invasion of Cambodia. The politics were certainly more clearly anti-imperialist in nature and the protesters seemed to be more militant overall. People were tired of the war and the system it maintained. The death of the hated FBI Director J. Edgar Hoover at the beginning of the month was already forgotten as police and protesters battled across the nation. Highways were taken over in several cities, riots took place in several campus towns, including Rochester, NY., Davis, CA., Berkeley, College Park, MD., and near the University of Minnesota in Minneapolis. Police fired into crowds near the Albuquerque campus of the University of New Mexico, wounding at least two people. Protesters in other cities reported the use of live ammo by police, as well.

        I vividly recall attending at least two protests that May. One was a rally at the Opernplatz in Frankfurt am Main in what was then called West Germany. There were several thousand in attendance. The speakers were from different antiwar student groups, the German communist party, and a member of the international wing of the Black Panthers. The latter two organizations had previously sponsored a very successful fundraising rally with Fania Davis as part of the international campaign to free her sister Angela. After the rally we marched towards the headquarters of the US Army’s V Corps, located in the IG Farben building which Eisenhower had appropriated from the Nazis after their defeat in World War Two. The police, who were set up at different intersections along the route and carrying automatic weapons, prevented the march from getting too close to the building. A big reason for the show of force was the bombing of the US Officer’s Club by the Rote Armee Fraktion on May 11, 1972. The bombing was but one of several that month aimed at the US military presence in Germany and the complicity of the West German government in the US Empire.

      • Alexey Navalny files another lawsuit against Russian prison officials

        Opposition politician Alexey Navalny has filed a lawsuit against the staff of the prison where he is being held for allegedly preventing his lawyers from bringing cell phones and laptop computers to their meetings. Navalny has been in custody in Correctional Facility No. 3 (IK-3) in Vladimir since his transfer to a prisoners’ hospital there in mid-April.

      • Team Navalny to refrain from announcing new protests in advance

        Alexey Navalny’s chief of staff, Leonid Volkov, has announced that his team plans to abandon its tactic of organizing street protests and notifying their supporters about new rallies in advance, reports Voice of America.

      • Who needs owners with sales like these? BBC obtains records further corroborating Alexey Navalny’s investigation into ‘Putin’s Palace’

        The BBC Russian Service obtained a new trove of documents corroborating much of what Alexey Navalny reported earlier this year about the schemes used to obfuscate who really owns a massive residence and network of vineyards near Gelendzhik, known colloquially as “Putin’s Palace.” The records leaked to the BBC go up until the early 2010s, focusing mostly on early 2011, when longtime Putin ally Nikolai Shamalov sold away the rights to the properties for a pittance to the billionaire Alexander Ponomarenko. Meduza summarizes Andrey Zakharov’s report for the BBC (available in both text and video formats).

      • This 38-Year-Old Man Will Spend Life in Prison Over 1.5 Ounces of Marijuana

        The U.S. Supreme Court “has held that a particular sentence is unconstitutional in a case that is not materially distinguishable from the case in front of us,” the dissenting judges noted, meaning the Mississippi Appeals Court is “obliged to apply the Supreme Court’s decision and vacate the sentence.”

      • Court To Cops: Waiting Sixteen Months To Search A Seized Phone Violates The Fourth Amendment

        A recent case handled by an Illinois Appeals Court has some interesting things to say about cellphones and searches. It also contains some rather interesting assertions by law enforcement, which apparently didn’t feel all that compelled to search a seized phone for more than a year after it was seized. (via FourthAmendment.com)

    • Internet Policy/Net Neutrality

      • Heritage Minister Steven Guilbeault Signals Canadian Government Abandoning Support for Net Neutrality

        Altering the presentation content to support Canadian content is precisely what Guilbeault and the government have in mind in Bill C-10. As he signals in his comments to the Toronto Star, the government is abandoning its longstanding commitment to net neutrality. In fact, with plans to introduce website blocking, mandated content takedowns, and the creation of a new social media regulator, the future of net neutrality in Canada is very much in doubt.

      • Why Is Wired So Focused On Misrepresenting Section 230?

        We’ve already highlighted our concerns with Wired’s big cover story on Section 230 (twice!). The very same day that came out, Wired UK published a piece by Prof. Danielle Citron entitled Fix Section 230 and hold tech companies to account. Citron’s proposal was already highlighted in the cover story and now gets this separate venue. For what it’s worth, Citron also spent a lot of energy insisting that the Wired cover story was the “definitive” article on 230 despite all of its flaws, and cheered on and liked tweets by people who mocked my arguments for why the article is just not very accurate.

      • Cable Lobby Working Hard To Ensure Biden Broadband Plan Doesn’t Encourage Real Competition

        While the Biden administration’s $2 trillion American Jobs Plan set aside $100 billion for broadband infrastructure, the details of how that money is to actually be spent remains murky. Enter cable industry lobbyists, who are hard at work attempting to dictate who gets access to those funds, while also trying to make sure the funds aren’t used for anything that could threaten their regional monopolies. They’re particularly worried about the Biden administration’s promise that a big focus of the effort will be on giving aid to locally owned and operated broadband networks, as detailed in this good piece by Issie Lapowsky at Protocol:

      • EFF to Ninth Circuit: Don’t Block California’s Pathbreaking Net Neutrality Law

        For those who haven’t been following this issue: after the Federal Communications Commission rolled back net neutrality protections in 2017, California stepped up and passed a bill that does what the FCC wouldn’t: bar ISPs from blocking and throttling internet content and imposing paid prioritization schemes. The major ISPs promptly ran to court, claiming that California’s law is preempted– meaning, the FCC’s choice to abdicate binds everyone else – and asking the court to halt enforcement until the question was resolved. On February 23, 2021, Judge John Mendez said no, making it pretty clear that he did not think the ISP’s challenge would succeed on the merits.  As expected, the parties then headed to the Ninth Circuit.

        Our brief supporting the district court’s decision explains some of the stakes of SB 822, particularly for communities that are already as a disadvantage. Without legal protections, low-income Californians who rely on mobile devices for internet access and can’t pay for more expensive content may face limits on that access which is critical for distance learning, maintaining small businesses, and staying connected. Schools and libraries are also justifiably concerned that without net neutrality protections, paid prioritization schemes will degrade access to material that students and public need in order to learn. SB 822 addresses that by ensuring that large ISPs do not take advantage of their stranglehold on Californians’ internet access to slow or otherwise manipulate internet traffic. The large ISPs also have a vested interest in shaping internet use to favor their own subsidiaries and business partners, at the expense of diverse voices and innovation. Absent meaningful competition, ISPs can leverage their last-mile monopolies to customers’ homes and bypass competition for a range of online services. That would mean less choice, lower quality, and higher prices for users—and new barriers to entry for innovators.

        We hope the court recognizes how important SB 822 is, and upholds Judge Mendez’s ruling.

    • Digital Restrictions (DRM)

      • Bipartisan FTC Study Confirms Everything ‘Right to Repair’ Advocates Have Been Saying For Years

        For years, “right to repair” advocates have been warning about the problems with efforts to monopolize repair. Whether it’s Apple’s efforts to bully small repair shops, Sony and Microsoft’s efforts to monopolize repair of game consoles, or John Deere’s implementation of DRM and repair restrictions so onerous customers have to drive a thousand miles and pay a small fortune to repair their own tractors, the impact is rather obvious. And the impact has only been more pronounced during Covid, as hospitals complain about the difficulty in obtaining the documentation and parts necessary to repair ventilators in a timely fashion.

    • Monopolies

Protecting Freenode is Protecting the Free Software Movement

Posted in Free/Libre Software at 4:58 am by Dr. Roy Schestowitz

Video download link

Summary: Freenode may seem like a negligible corner of the Internet, which media never bothers mentioning at all; but Freenode, which many have come to take for granted, is core infrastructure for many Free software projects and protecting the network is essential for the Free Software Movement

The video above was spontaneously recorded following this morning's article, which seemed urgent to make. In it, I explain how and why we rely on Freenode. I explain that the success of Free software partly depends on Freenode and therefore the stewardship of the network is a mission-critical aspect. We don’t intend to abandon IRC (I’ve used it since around or before puberty and Techrights has used Freenode heavily since 2008; we have gigabytes of IRC logs to show for it!) and we don’t wish to be abandoned, either.

“Remember that GNU and FSF also use Freenode and they have no plans/intentions to abandon it in favour of “shiny toys” like Matrix “apps” or other bloat.”We kindly (maybe even amicably) call upon Mr. Lee to communicate with key people and seek a peaceful resolution. It is definitely doable and the Free Software Movement would benefit greatly from such a state of peace. Remember that GNU and FSF also use Freenode and they have no plans/intentions to abandon it in favour of “shiny toys” like Matrix “apps” or other bloat.

The video veers off somewhat, ending with a rant about what Microsoft did to security and to the privacy of billions of people who use E-mail, even if they never used anything Microsoft.

EPO Justice

Posted in Europe, Law, Patents at 4:18 am by Dr. Roy Schestowitz

Bad Pun Judge Judy: Wait at the door; You stepped on the floor? EPC you should ignore

Judge Judy v Lawyer: Why are you here? Are you ready to hear? You smell like a beer; But I'm vaccinated, my dear

Judge Judy: No time for hearings; Just Webcams and readings; Oh, sorry! I fell asleep on my sofa!

Judge Judy Gangsta: Don't you tell anybody!

The Judge: Hearings resume; My guilt you assume; I just see some jerk on Zoom; Can we please talk in a room?

Summary: Justice in Europe’s second-largest institution, where the law itself is a second-class citizen

Wait at the door

You stepped on the floor?
EPC you should ignore

Why are you here?
Are you ready to hear?
You smell like a beer
But I’m vaccinated, my dear

No time for hearings
Just Webcams and readings
Oh, sorry! I fell asleep on my sofa!
Don’t you tell anybody!

Hearings resume
My guilt you assume
I just see some jerk on Zoom
Can we please talk in a room?

« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts