Bonum Certa Men Certa

Links 11/11/2021: Mesa 21.3 RC5 Release

  • GNU/Linux

    • Audiocasts/Shows

      • BSD Now 428: Cult of BSD

        OpenBSD Part 1: How it all started, Explaining top(1) on FreeBSD, Measuring power efficiency of a CPU frequency scheduler on OpenBSD, CultBSD, a whole lot of BSD bits, and more.

      • The Linux Link Tech Show Episode 930

        3d printing, joel gets callled out, what tech gifts

      • You had ONE JOB, Linus! | Reacting to the Daily Driver Challenge - Invidious

        LinusTechTips, if you're not aware, is one of the most popular tech YouTube channels out there... yet somehow, Linus has never daily-driven Linux. Never even tried to! With the advent of the Steam Deck, though, Linus has come around to the idea of "Linux Gaming" and challenged his friend Luke to use Linux on their home rigs. Somehow Linus had a pretty rough go of it but ultimately they were (mostly) able to complete the first task of their challenge.

    • Kernel Space

      • Adding package information to ELF objects

        While it is often relatively straightforward to determine what package provided a binary that is misbehaving—crashing for instance—on Fedora and other Linux distributions, there are situations where it may be harder to do so. A feature recently proposed for Fedora 36—currently scheduled for the end of April 2022—would embed information into the binaries themselves to show where they came from. It is part of a multi-distribution effort to standardize how this information is stored in the binaries (and the libraries they use) to assist crash-reporting and other tools.

        On October 25, Fedora program manager Ben Cotton posted the proposal to the Fedora devel mailing list; it is also available on the wiki. The basic idea is that each ELF object that gets created for an RPM package will get a .note.package ELF section added to it. That section will contain a JSON-formatted description of exactly which RPM it was distributed with. So those binaries will contain information that can tie them directly to the package, even in the absence of RPM metadata on the system.

        The facility would be used by the systemd-coredump utility to log package versions when crashes occur. For regular Fedora systems, which normally have the RPM metadata available, there is no large advantage. But for other situations where Fedora-created binaries might be run—and crash—this mechanism would allow administrators and tools to recognize where exactly the binary came from.

      • Some 5.15 development statistics

        The 5.15 kernel was released on October 31, with the code name appropriately changed to "Trick or Treat". By that time, 12,377 non-merge changesets had been merged into the mainline, adding a net total of 332,000 lines of code. Read on for a look at where the contributions to the 5.15 kernel came from.

      • Linux 5.16 Introducing Ability For A Driver To Probe Hardware While Powered Off - Phoronix

        Last week saw the main set of ACPI and power management changes for Linux 5.16 while merged on Wednesday were a secondary set of updates. Notable on the ACPI side are some changes in preparing for allowing Linux drivers to "probe" hardware while being powered off.

        This Intel-contributed change to the Linux kernel is about allowing certain devices to be probed by a kernel module without changing their power states / being powered up. It's a bit of a corner case with normally not being able to properly probe the hardware and load the driver without the component being initialized and ensuring it can successfully light up and work. This won't magically work for all drivers/hardware but depends upon necessary ACPI support being advertised.

      • Graphics Stack

        • [Mesa-dev] [ANNOUNCE] mesa 21.3.0-rc5
          Hello everyone,
          
          

          The fifth release candidate is now available, containing about equal amounts of Zink, AMD, and Intel fixes.

          Once again, this could have been the final release of 21.3.0, but there are blocking issues on Intel's side still left, so we're having another round of release candidate. Hopefully this will be the last one, but we'll see.

          Please test it and report any issue here: https://gitlab.freedesktop.org/mesa/mesa/-/issues/new

          Issues that should block the release of 21.3.0 should be added to the corresponding milestone: https://gitlab.freedesktop.org/mesa/mesa/-/milestones/27

          Cheers, Eric
        • Mesa 21.3-rc5 Released With Numerous Intel / AMD / Zink Fixes - Phoronix

          The Mesa 21.3 development cycle continues dragging on due to blocker bugs affecting the Intel code, so instead it's another week with a new release candidate.

          Mesa 21.3-rc5 is out with a random assortment of mostly fixes to Intel, AMD Radeon, and Zink OpenGL-on-Vulkan driver code. The blocker bugs holding up the release include Piglit test failures and dEQP failures on Intel graphics hardware. It's possible other blocker bugs may come up, but traditionally they tend to be Intel-oriented simply due to Intel having better and more robust test coverage of Mesa on their hardware. Hopefully the few blocker bugs will get resolved in the next week or so to allow Mesa 21.3.0 to roll-out.

    • Applications

      • 7 Linux commands to use just for fun

        The Linux command line can be the home of power users and sysadmins. However, Linux is more than just a lot of hard work. Linux was developed by fun-loving people who created an array of comical commands. Try playing around with these yourself when you want a smile.

        Be sure to consult the man pages of all these commands to explore all the possibilities and iterations. What are your favorite silly commands, and do they have real-world uses as well? Share your favorites in the comments

    • Instructionals/Technical

      • How to Manage SSH Keys for Linux Machines

        SSH keys grant users access to critical systems such as cloud and on-premise servers and network devices. Typically, these are systems that should only be accessed by authorized users, and no one else. Proper management of these keys is therefore essential to ensure that the SSH keys are in the right hands and used in accordance with the best security practices.

      • The Hive (Security Incident Response Platform) - Unixcop the Unix / Linux the admins deams

        This page is a step by step installation and configuration guide to get an TheHive 4 instance up and running. This guide is illustrated with examples for Debian packages based systems and for installation from binary packages.

      • Setup X-pack Security on Elasticsearch and Kibana - Unixcop the Unix / Linux the admins deams

        X-Pack is an Elastic Stack extension that provides security, alerting, monitoring, reporting, machine learning, and many other capabilities. By default, when you install Elasticsearch, X-Pack is installed.

        The growing popularity of Elasticsearch has made both Elasticsearch and Kibana targets for hackers and ransomware, so it is important never to leave your Elasticsearch cluster unprotected.

        From Elasticsearch Version 6.8 and onwards, X Pack Basic License (free) includes security in the standard Elasticsearch version, while prior to that it was a paid for feature.

      • What are ephemeral certificates?

        This article is a short followup to my last article about cosign. I received many questions for my last article. The most common one was:

        “But wait! If the certificates are only valid for 30 minutes, how are my users supposed to validate my artifacts?”

        This is very common misconception and to be honest: I ran into the same trap at first. The terms “ephemeral” or “short-lived” do not refer to the signature validation. Instead, these terms refer to the certificate generation itself. The goal of short-lived certificates is to elimate the possible risks of private key leaks. Just imagine, we have a traditional long-lived certificate and a private key stored on one of our servers. If one attacker manages to steal this certificate and private key, maybe even years after the signature creation, the attacker will be able to craft a valid signature for their own malware with this certificate and key. With a short-lived certificate this would not be possible, because even if the attacker has access to both (private key and certificate) the attacker will not be able to craft a valid signature for the artifact, because the certificate has expired. The users are still able to validate the originally signed artifact, because the signature of this artifact has been created in the valid time frame of the certificate.

      • Ncat Linux command

        Hello friends. Knowing the Linux terminal and its commands is a basic task of any sysadmin or DevOps. Therefore it is always good from time to time to know new commands and their utilities. This will allow us to have new functions that can solve a problem at any time. So, in this post, you will learn about the ncat command.

      • How To Increase Disk Storage Size In VirtualBox Or VMware

        VirtualBox makes it simple to create virtual machines. When you create a virtual machine in VirtualBox or VMware, you must specify the size of the storage that will be used to install the operating system. I frequently allot a disc size that I later need to increase. In this article, we’ll learn to increase the Disk storage size of any Virtual machine in VirtualBox and VMware.

      • How get the best performance from the Nginx Server - Unixcop the Unix / Linux the admins deams

        You can tune almost any setting, but this post concentrates on the few settings for which tuning benefits the most users. There are settings that we recommend you change only if you have a deep understanding of NGINX and Linux. So, you will know How get the best performance from the Nginx Server

        HI Guys !, In this post we basically see the NGINX tuning using it’s configuration file which is situated at /etc/nginx/nginx.conf

        NGINX is well known as a high‑performance load balancer, cache, and web server, powering over 40% of the busiest websites in the world. For most use cases, default NGINX and Linux settings work well, but achieving optimal performance sometimes requires a bit of tuning. This blog post discusses some of the NGINX and Linux settings to consider when tuning a system.

      • How to Upgrade to AlmaLinux 8.5 - LinuxCapable

        AlmaLinux 8.5 is finally here and is codenamed Arctic Sphynx. The new version of the incoming AlmaLinux 8.5 is filled with many improvements such as Nginx 1.20, Node.js 16, Ruby 3.0, PHP 7.4.19, and many more new module streams and enhancements. Also included are an enhanced Cockpit web console and support for the recently released OpenJDK 17.

        Currently, this is in beta status and should not be installed or upgraded on production servers/systems or critical working environments. However, if you are game enough to try the new release, it is worth checking out.

        In the following tutorial, you will get a step-by-step walkthrough of how to upgrade an existing AlmaLinux 8.0 system to 8.5.

    • Games

      • 'SteamWorld Dig 2' GOG, Steam Free Download: Get Game Now Before 24-Hour Time Limit! | iTech Post

        Swedish game developer Thunderful Games has announced on Twitter that "SteamWorld Dig 2" is now available to download for free and players will be able to keep it permanently. Unfortunately, only PC users will benefit from the said free download.

      • Forza Horizon 5 on Linux? There's a Good Chance That You Can Play it Already - It's FOSS News

        Forza Horizon 5 is a new racing video game developed by Playground Games and published by Xbox Game Studios.

        Before its official launch, it already had ~1 million players via the premium edition, which enabled early access to the game.

        While the game is breathtaking with its visuals and optimization for older hardware, it is yet another Windows-only game.

      • Shadow Tactics: Blades of the Shogun - Aiko's Choice releases in December | GamingOnLinux

        Shadow Tactics: Blades of the Shogun - Aiko's Choice from Mimimi Games is going to be releasing in December and they have a new trailer ready.

        This is the standalone addon that takes place after the original Shadow Tactics. Set in Japan around the Edo period, you take control of kunoichi adept Aiko and her deadly assassin friends to hunt down the ghosts of her past. The new trailer goes over the story so far up to the point where the story of Aiko's Choice will set off. So keep in mind it's probably a bit spoilery if you've not played the original game.

      • Valve’s hotly anticipated Steam Deck handheld gets delayed until 2022

        If you’re worried about losing your pre-existing reservation, don’t sweat it. Valve claims that existing reservation holders will keep their place in line. As for the timeframe of those reservation dates, that information will be coming shortly.

      • Valve Steam Deck delay ruins Christmas for countless Linux gaming nerds

        Do you hear that horrible sound? That's the combined screams and howls of countless Linux gaming nerds learning the devastating news -- the release of the Steam Deck video game console has been pushed to next year. In other words, anyone hoping to get the console under the Christmas tree this year will be left disappointed.

        If you aren't familiar, the Steam Deck is a portable PC/gaming console hybrid that runs the Arch Linux-based "SteamOS" operating system which uses KDE Plasma. Similar to a Nintendo Switch Lite in design (but much bigger, heavier, and more powerful) it lets you play PC games in the palm of your hand. You can check out the specifications here.

        "The launch of Steam Deck will be delayed by two months. We're sorry about this -- we did our best to work around the global supply chain issues, but due to material shortages, components aren't reaching our manufacturing facilities in time for us to meet our initial launch dates," says Valve.

      • Supply chain shortages push Steam Deck out to February 2022

        Valve has said in a blog post that the first shipments of Steam Deck are now set to begin in February next year.

        "The launch of Steam Deck will be delayed by two months. We're sorry about this -- we did our best to work around the global supply chain issues, but due to material shortages, components aren't reaching our manufacturing facilities in time for us to meet our initial launch dates," the company said.

        Valve said customers would keep their place in the reservation queue, but the window will shift back two months.

        Announced in July, the Steam Deck is a portable, handheld PC that uses AMD silicon to run SteamOS 3.0, a new version of its OS based on Arch Linux, with KDE Plasma used for desktop mode. The Linux system will use its Proton compatibility layer to run games designed for Windows.

    • Desktop Environments/WMs

      • GNOME Desktop/GTK

        • Ole Aamot: Record Live Multiple-Location Audio immediately in GNOME Gingerblue 2.0.1

          GNOME Gingerblue 2.0.1 is available and builds/runs on GNOME 41 systems such as Fedora Core 35.

          It supports immediate, live audio recording in compressed Xiph.org Ogg Vorbis encoded audio files stored in the private $HOME/Music/ directory from the microphone/input line on a computer or remote audio cards through USB connection through PipeWire (www.pipewire.org) with GStreamer (gstreamer.freedesktop.org) on Fedora Core 34 (getfedora.org) as well as XSPF 1.0 playlist stored in the private $HOME/Music/GNOME.xspf playlist of the previous, latest recording.

          See the GNOME Gingerblue project (www.gingerblue.org) for screenshots, Fedora Core 35 x86_64 RPM package and GNU autoconf installation package (https://download.gnome.org/sources/gingerblue/2.0/gingerblue-2.0.1.tar.xz) for GNOME 41 systems and https://gitlab.gnome.org/ole/gingerblue.git for the GPLv3 source code in my GNOME Git repository.

    • Distributions

      • IBM/Red Hat/Fedora

        • Fedora considers removing NIS support

          For all of you youngsters out there, the Internet has always been omnipresent, computers are something you carry in your pocket, the Unix wars are about as relevant as the War of 1812, and the term "NIS" doesn't ring a bell. But, for a certain class of Unix old-timer, NIS has a distinct place in history — and, perhaps, in still-deployed systems. So the suggestion that Fedora might drop support for NIS has proved to be a bit of a wakeup call for some.

          NIS ("Network Information Service") was initially born in the depths of Sun Microsystems as "Yellow Pages". It came about in those heady times when Unix workstations were beginning to pop up in offices — and were being connected to just-installed 10Mb/s Ethernet networks via a (suitably named for the Halloween season) vampire tap. Having a network made it possible to copy around various administrative files like /etc/passwd and create an early sort of single-sign-on regime on the local network. We were all quite proud of ourselves for setting such things up.

          As the number of systems grew, though, all of that copying became a little cumbersome and machines easily went out of sync. Yellow Pages was Sun's way of automating this work within a simple, centralized service. Getting a network running with it was a quick process, and adding new clients was even faster. There were occasional problems, of course, leading to the system being renamed "Yellow Plague" by some users, but as a whole, it worked quite well. That is for a value of "quite well" that discounts its total lack of access control, encryption, or defenses against malicious hosts masquerading as servers, but that was a more innocent age.

          Sun eventually ran into trademark problems with the Yellow Pages name; being a Unix company, Sun had a deep understanding of the folly of getting into legal battles with telecommunications companies, so it wisely changed the name to NIS. The later NIS+ release added some security and reliability features but looked similar in many ways. Eventually, though, Sun lost interest in NIS (and just about everything else) and the system fell from its nearly dominant position in Unix shops into obscurity. It would be surprising indeed to see a new deployment adopt it now.

        • Red Hat Extends Foundation for Multicloud Transformation and Hybrid Innovation with Latest Version of Red Hat Enterprise Linux

          Red Hat, Inc., the world's leading provider of open source solutions, today announced the general availability of Red Hat Enterprise Linux 8.5, the latest version of the world’s leading enterprise Linux platform. Red Hat Enterprise Linux offers a common, open operating system that extends across clouds, traditional datacenter operations and out to the edge. The platform enables IT teams to lean on existing skills while they use new and expanded capabilities to build the transformative applications and services required by their business, regardless of where these workloads may ultimately live.

        • Distribution Release: Red Hat Enterprise Linux 8.5
        • Red Hat Enterprise Linux 8.5 Officially Released, This Is What’s New

          Coming more than five months after Red Hat Enterprise Linux 8.4, Red Hat Enterprise Linux 8.5 is the fifth maintenance update to Red Hat Enterprise Linux 8 and brings various new features to RHEL’s web console, such as live kernel patching without using the command line tooling and enhanced performance metrics to help you identify and prevent performance issues.

        • Red Hat Enterprise Linux 8.5 Update Available to Download - itsfoss.net

          Red Hat Enterprise Linux 8.5 Update Available to Download, Red Hat has announced the availability of Red Hat Enterprise Linux (RHEL) 8.5, the lates update of the company’s commercial, enterprise-class Linux distribution with bundled customer support: “Red Hat Enterprise Linux (RHEL) 8.5 is now generally available. It brings new features and improvements to help streamline deployments, optimize performance and help mitigate risk in your environments.

        • How leaders can help teams fight fatigue: 7 practical tips

          We’ve all realized by now that burnout has played a major role in workplaces in 2021: The pandemic has been unrelenting. Burnout rose by almost 9 percent between April and July 2021, according to the Glint Employee Well-Being Report, a 12 percent increase from the prior July. In large part, this is due to the “always-on” work culture that many companies reinforced in 2020.

          While this topic has certainly been explored thoroughly, many leaders remain hungry for next-level advice with regard to preventing, recognizing, and dealing with burnout.

          Additionally, more employers are now taking responsibility for their role in helping individuals manage burnout - and trying fresh approaches. Maybe you gave advice at the start of the pandemic that rang true, or, possibly, turned out to be bad? What would you as a leader change about the advice you previously gave and what would you keep the same? Did you ask specific questions to assess burnout on an individual or team basis? Did you go beyond encouraging people to take PTO to ensure it was being taken? What was the outside-of-the-box solution that worked for your team?

      • Debian Family

        • Debian's which hunt

          This long-present tool is often used at the command line to locate the binary for a program; scripts also use it for similar purposes, or to determine whether a given program is available at all. For many users, which has long been baked into muscle memory and is used reflexively at need.

          For all that, which is not a standardized component on Unix-like systems; POSIX does not acknowledge its existence. For that reason, among others, there are a number of implementations of which, each differing in its own special ways. Many distributions ship the GNU version of which, for example, with its characteristic long list of options. FreeBSD has its own version. Some shells also implement which as a built-in command. Debian ships yet another version, in the form of the aforementioned one-page shell script; it is part of the debianutils package.

          In August 2020, Erik Gustafsson noted that the FreeBSD version of which supports a -s flag that suppresses the printed output and sets the exit status based on the existence of the queried program. He thought that feature would be useful in Debian, and helpfully provided a patch adding that feature. Thus began the discussion of the value of which and whether Debian's version should gain more features; at one point Clint Adams, the co-maintainer of debianutils, opined that which should be removed from that package.

          Fast-forward to one year later, and Boyuan Yang observed that the which command in the Debian unstable distribution now prints a deprecation warning saying that which is going away. This resulted in a fair amount of consternation (and requests for a reversion of the change) for a number of reasons, starting with the fact that many users simply expect to have which available to them. It turns out that a number of build scripts for Debian packages use which as well; as an extra annoyance, the printed deprecation warning breaks the build process for some packages. The amount of pressure applied to Adams to restore which began to increase.

      • Canonical/Ubuntu Family

        • XBrowserSync, A Free Bookmark Sync for Ubuntu Users

          Do you work with multiple Ubuntu computers? You might want to unify or sync all your browsers' bookmarks into one, when you bookmarked something in one, all other browsers got the same and vice versa. You can do that freely and safely with XBrowserSync, a Firefox addon, with a secure service behind. To use XBrowserSync, follow the procedures below.

          XBrowserSync is a free software Firefox web browser addon, licensed under GNU GPL, as well as a bookmark synchronization service. It is available for Firefox and Chrome. Its official website is located at https://www.xbrowsersync.org.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • WebFileSys: A Web-based file Manager for your docs, photos, and videos

        WebFileSys is a web-based system that aims to aid users to manage their files, events, photos, videos, calendars, file sharing, GPS tracking, and more.

        The system is created by Frank Hoehnel a software developer from Germany who released it as an open-source project.

        WebFileSys has been around since early 2000s, it is still getting updates ever since.

        [...]

        WebFileSys is released under GNU General Public License v3.0.

      • Web Browsers

        • Mozilla

          • SFS loading precautions in initrd

            A user may manually place SFS files under /mnt/wkg/sfs and may also delete them. If the firefox*.sfs file is deleted, for whatever reason, it means that if it was loaded in a container, that container is no longer valid. Yet, the "firefox" icon (with the lock symbol on it) was still on the desktop, and entry still in the menu. I have fixed that, invalid icons and menu entries removed. Same thing if an SFS is loaded on the main desktop. If the SFS no longer exists, then it can no longer be loaded at bootup, and menu entry must be removed. And, as in the case of firefox, /home/firefox will have to be deleted.

      • Programming/Development

        • Top 8 Programming Tools for Kids - LinuxLinks

          The Raspberry Pi created a lot of interest in the press for its low cost and credit-card size. The main reason for the creation of the Raspberry Pi was to see it used by kids all across the globe to learn programming. Computer classes in the UK have been constrained by the national curriculum for ICT, with students having to limit their computing activities to learning applications such as Word and PowerPoint, and using the internet to help with their school work. However, learning how to use Microsoft Office is often of little or no interest to students. Students are motivated by interactive activities such as programming, as they like to make things to find out how they work.

          The art of programming is often perceived as being a difficult activity. This is, in part, because coding can be quite unforgiving with lots of information to remember. It is not a simple activity such as surfing the net, or formatting paragraph text.

          Fortunately, there is a growing range of software, often open source, that helps students learn how to code. Stripping away the complexity, the programming languages and associated tools featured in this article aim to create new ways of helping students create projects that appeal to younger minds.

          To provide an insight into the quality of software that is available, we have compiled a list of 8 high quality programming tools that provide an ideal introduction to programming. Hopefully, there will be something of interest here for teachers and students alike.

        • Perl/Raku

          • My Favorite (?) Warnings - Ex-Warnings

            Warning categories have proliferated since the warnings pragma was first introduced in Perl 5.6: from 50 in Perl 5.6.2 to 79 in Perl 5.35.5 (the latest as of this writing). But warnings have been removed as well as added. This post documents these -- mostly for historical interest on my part.

        • Rust

    • Standards/Consortia

      • The Monstrosity Email Has Become

        Email had become a monstrosity beyond reasonable comprehension while still having inherent flaws such as plain text sending. Every email out there is sent and stored in plaintext (we can easily agree that PGP/GPG use is anecdotical) and, through HTML and inline pictures, most of them are trying to track you to know when you open the email.

        The whole ecosystem is becoming even more and more centralised with some modern mail providers not offering the ability to get your mail out of the service at all, arguing, with reason, that IMAP sucks and does not permit some features (the hipsterish Hey! or the privacy-oriented Tutanota only provide you access to your email through their own proprietary webmail). You can’t even read your mail offline by design and nobody blink an eye.

  • Leftovers

    • Beacon on the Hill or the Heart and Soul of Darkness?

      Things started looking up one Christmas, when I received a much beloved Johnny 7 multiple fuck-with plastic gun. There were woods nearby and I would frolic for hours, pretending to be horseback, in search of baddies, who often looked like my foster father, a man who watched Lawrence Welk religiously and was quick to take off his belt and chase for smallest infractions of tongue. After he caught me, and beat me, he would put me up in the attic bedroom to weep myself to sleep. A drawer next to the bed held a cache of silver dollars, which went toward my recess funds that year. Looking back, I do now see capitalism in there somewhere; certainly my boy buns were colonized by a brute force.

      Why am I telling you all this?€  Well, I’m an old fart, and a sentimentalist to boot (remember how that ends for Bogie in Casablanca? Gotta watch a surplus of the syrup if you want to keep your Ideal Feminine.) and I found myself (pats himself to be sure he’s still here) listening to an old John F. Kennedy speech. No, not the fuckin’ do ‘unto your country before it has a chance to do unto you’ speech that so many libertarians feed their resentment with. Nor the men on the moon by the end of the decade€  “because we can” speech. But one far more important to our time now than any of the other speeches folks wrote for him back then (I lived with a Groton family whose Head wrote speeches for JFK). This speech or, as he referred to it, “remarks,” was titled “The President and the Press,” and runs about 20 minutes long.

    • Protest Song Of The Week: ‘Rising Seas’ By Midnight Oil

      No strangers to socially conscious music, veteran Australian rock band Midnight Oil speaks out against climate change with their latest single and video “Rising Seas.”The tune was released just in time for the United Nations Climate Change Conference (COP26).Doing what the band does best, the song is an urgent plea for real change. Politicians can’t just offer lip service; they need to take concrete action, as highlighted by the lyric: “Let’s confess we did not act with serious urgency. So, open up the floodgates to the rising seas.”

    • Science

      • An Astronomer Cancels His Own Research—Because the Results Weren’t Popular

        Of course, statistical analyses of real-world human data are always subject to the possibility that systematic biases can inappropriately skew the claimed results. And I would never suggest that Kormendy’s work is beyond criticism. But the traditional scientific manner of engaging in such criticism is that other scientists present alternative proposals, and explore other data sets, to search for possible flaws in the original analysis. That is how science should be done. Those who claim in advance, without new analysis or data, that someone else’s research results are “harmful” or threatening, without challenging its accuracy, should consider another profession.

        [...]

        It is hard to know what specifically induced this kind of Maoist mea culpa. But Kormendy (or someone with authority over him) presumably was swayed by the online tempest. And an unfortunate effect will be that anyone observing how this played out will be warned off making their own inquiries in this field, for fear that they will meet the same fate. This is one reason why scientific articles should never be retracted simply because they might cause offense. Truth can hurt, but too bad.

    • Education

      • Prime minister: Remote learning effects cannot be compensated for in cash

        Tallinn has sent municipal school students in grades 4-8 to remote learning, extending the period by another two weeks from Tuesday. Kallas said the decision to send students on remote learning must take into account that it can have devastating effects on children. "That is what the [government's] scientific council has also said - children should be sent to remote learning only as the last option," the prime minister said.

    • Hardware

      • 8″ Floppy On Your PC? | Hackaday

        We should probably have a new metric for measuring mass storage performance: bytes per pound. An old IBM tape drive from the S/360 days, for example, could hold almost 6 megabytes of data. It also weighed more than a typical refrigerator. Today, a tiny postage-stamp-sized card can hold gigabytes of data and weighs — at most — a few ounces. Somewhere in the middle is the old 8 inch floppy drive. At its peak, you could cram about 1.2 megabytes on it, but even with the drive you could lift it all in one hand. These disks and their descendants ruled the computing world for a while. [Adrian asks the question: can you use an 8″ floppy drive on a PC? The answer is in the video below.

        He didn’t do it on a lark. [Adrian] is getting ready to restore a TRS-80 Model II so he wanted to create some 8″test floppies. But how do you marry a 40-something-year-old drive to a modern computer? He had a few drives of unknown condition so there was nothing to do but try to get them working.

    • Health/Nutrition/Agriculture

      • Does Reversal of Historic Opioid Ruling in Oklahoma Spell Trouble for Climate Liability Suits?

        The Oklahoma Supreme Court on Tuesday threw out a landmark 2019 ruling that required Johnson & Johnson to pay the state nearly half a billion dollars to help address the opioid epidemic, and according to some critics, it may have paved the way for judges elsewhere to invalidate similar lawsuits as well as those seeking to hold the fossil fuel industry accountable for propelling the climate crisis.

        "Are these two outlier opinions or are they trendsetters?"

      • 'Historic and Momentous Day' as Judge OKs $626 Million Flint Water Crisis Settlement

        While stressing that no amount of money could fully compensate for the irreparably damaged health of thousands of Flint, Michigan residents who suffered lead poisoning due to cost-cutting measures by an unelected city manager, advocates hailed a federal judge's final approval on Wednesday of a $626 million settlement as a crucial step toward "justice served."

        "None of this would have been possible without the tireless advocacy from residents, who never gave up the fight."

      • Flint water crisis: $626m settlement reached for lead poisoning victims

        Most of the money will go to the city's children exposed to drinking poisoned water, affected adults, business owners and anyone who paid water bills.

        At least 12 people died after Flint switched its water supply to the Flint river in 2014 without treating the corrosive water to save money.

        As a result, lead in some old pipes broke off and flowed through taps.

        An outbreak of Legionnaires' disease followed, and nearly 100,000 residents were left without safe tap water.

      • "Drinking through a lead straw" — $15B approved to fix dangerous water pipes

        No one knows exactly how many lead pipes deliver water to homes, schools and businesses throughout America — or even where they all are. The Environmental Protection Agency estimates at least 6 million lead service lines exist. Environmental groups say it's probably many more.

        What is known is that with every pot of boiling sweet potatoes, bottle of reconstituted baby formula or sip of tap water delivered through lead pipes, millions of Americans risk ingesting lead, a powerful neurotoxin long known to cause irreversible organ and cognitive damage in children and adults.

      • Pre-existing polymerase-specific T cells expand in abortive seronegative SARS-CoV-2

        Individuals with potential exposure to SARS-CoV-2 do not necessarily develop PCR or antibody positivity, suggesting some may clear sub-clinical infection before seroconversion. T-cells can contribute to the rapid clearance of SARS-CoV-2 and other coronavirus infections1–3. We hypothesised that pre-existing memory T-cell responses, with cross-protective potential against SARS-CoV-24–11, would expand in vivo to support rapid viral control, aborting infection. We measured SARS-CoV-2-reactive T-cells, including those against the early transcribed replication transcription complex (RTC)12,13, in intensively monitored healthcare workers (HCW) remaining repeatedly negative by PCR, antibody binding, and neutralisation (seronegative HCW, SN-HCW). SN-HCW had stronger, more multispecific memory T-cells than an unexposed pre-pandemic cohort, and more frequently directed against the RTC than the structural protein-dominated responses seen post-detectable infection (matched concurrent cohort). SN-HCW with the strongest RTC-specific T-cells had an increase in IFI27, a robust early innate signature of SARS-CoV-214, suggesting abortive infection. RNA-polymerase within RTC was the largest region of high sequence conservation across human seasonal coronaviruses (HCoV) and SARS-CoV-2 clades. RNA-polymerase was preferentially targeted (amongst regions tested) by T-cells from pre-pandemic cohorts and SN-HCW. RTC epitope-specific T-cells cross-recognising HCoV variants were identified in SN-HCW. Enriched pre-existing RNA-polymerase-specific T-cells expanded in vivo to preferentially accumulate in the memory response after putative abortive compared to overt SARS-CoV-2 infection. Our data highlight RTC-specific T-cells as targets for vaccines against endemic and emerging Coronaviridae.

    • Integrity/Availability

      • The Surreal Horror of PAM

        Et voila! C’est le PAM! Turns out someone else a long time ago had the same problems and somehow got legal to sign off on making it open source! PAM is a modular system for making authentication and authorization work.

        For reference, authentication and authorization are being split up into two concepts here (like they are in a lot of the industry). We’re gonna take a page out of the white hat’s guide to security here and call these concepts authentication (who you are and how we know who you are) and authorization (can you really take all the money out of the bank account?). It is a solid 90’s solution to a 70’s problem and good god it shows.

        PAM was made in the 90’s by this little startup nobody here has heard of called Sun Microsystems. They had a problem where they had a bunch of machines to apply complicated authentication rules to (all thanks to those pesky enterprise contracts) and no way to really do it. Money won this valiant fight between engineering and sales, so we ended up with PAM.

      • Proprietary

        • [Old] The AARD Code

          Some programs and drivers in some pre-release builds of Windows 3.1 include code that tests for execution on MS-DOS and displays a disingenuous error message if Windows is run on some other type of DOS. The message tells of a “Non-fatal error” and advises the user to “contact Windows 3.1 beta support”. Some programs in the released build include the code and the error message, and even execute the code, performing the same tests, but without acting on the result to display the error message.

          The code in question has become known widely as the AARD code, named after initials that are found within. Although the AARD code dates from the start of the 1990s, it returned to controversy at the end of the 1990s due to its appearance in a suit at law between Caldera and Microsoft. Caldera was by then the owner, after Digital Research and Novell, of what had been DR DOS. It has ever since been treated as a smoking gun in analyses of anti-competitive practices by Microsoft.

          It is not my intention here to comment on the rights or wrongs that I may or may not perceive in the AARD code’s existence. However, I must declare a financial interest: in 1999 when this note was first published, I was engaged indirectly by Caldera to assist with their understanding of MS-DOS and Microsoft Windows for the suit just mentioned.

          What I do intend here is to put on the public record a few points of history.

        • [Old] The AARD Code and DR DOS

          Not until 30th May 1993 did I learn that the error message had hit DR DOS specifically. This was from Andrew Schulman, who had himself learnt only weeks before: see FTC MOVES TO FOCUS MICROSOFT ANTITRUST CASE by Wendy Goldman Rohm from the Chicago Tribune on 10th May 1993. There then came quickly Andrew’s article Examining the Windows AARD Detection Code in Dr. Dobb’s Journal, September 1993, and repeated discussion in Undocumented DOS, Second Edition, ISBN 0-201-63287-X, co-authored by Andrew for Addison-Wesley in 1994. By the late 1990s, the AARD code had no small role in a court case, Caldera, Inc. v. Microsoft Corp., 72 F. Supp.2d.1295 (D. Utah 1999), which Caldera, who was by then the owner of DR DOS after Digital Research and Novell, brought against Microsoft “for damages and injunctive relief under the antitrust laws of the United States, and for damages in tort”.

          The AARD code has ever since been for many some sort of pin-up for anti-competitive practices by Microsoft.

        • Pseudo-Open Source

        • Security

          • SMS About Bank Fraud as a Pretext for Voice Phishing

            Most of us have probably heard the term “smishing” — which is a portmanteau for traditional phishing scams sent through SMS text messages. Smishing messages usually include a link to a site that spoofs a popular bank and tries to siphon personal information. But increasingly, phishers are turning to a hybrid form of smishing — blasting out linkless text messages about suspicious bank transfers as a pretext for immediately calling and scamming anyone who responds via text.

          • Dependency Combobulator: Open source toolkit to combat dependency confusion attacks

            Dependency confusion compromises the open source software ecosystem by tricking end-users, developers and automation-systems into installing a malicious dependency instead of the correct one they intended to install, resulting in the compromise of their software.

          • 8 dangerous vulnerabilities fixed in Samba

            Published corrective releases package Samba 4.15.2, 4.14.10 and 4.13.14 with the elimination of 8 vulnerabilities, most of which can lead to a complete compromise of the Active Directory domain. It is noteworthy that one of the problems were corrected in 2016, and five – from 2020, though one correction led to the inability to run winbindd in the presence settings “allow trusted domains = no” (the developers intend to promptly publish another update to fix). The release of package updates in distributions can be tracked on the pages: Debian , Ubuntu , RHEL , SUSE , Fedora , Arch ,FreeBSD .

          • Fear, Uncertainty, Doubt/Fear-mongering/Dramatisation

            • Trojan Source: tricks (no treats) with Unicode

              A new security vulnerability that was disclosed on November 1 has some interesting properties. "Trojan Source", as it has been dubbed, is effectively an attack on human perceptions, especially as they are filtered through the tools used for source-code review. While the specifics of the flaw are new, this kind of trickery is not completely novel, but Trojan Source finds another way to confuse the humans who are in the loop.

              The Trojan Source paper by Nicholas Boucher and Ross Anderson of the University of Cambridge describes the vulnerability, its impact, and the process of coordinating its disclosure in detail. In part, the flaw exploits Unicode code points that are used to switch between left-to-right and right-to-left display of bidirectional text in ways that will cause various tools to show the code in a different order than it will be processed by compilers and interpreters. That has the effect of showing code to reviewers that looks perfectly reasonable, while feeding something dangerous to language-parsing tools.

          • Privacy/Surveillance

            • Seven Years After Discovering Rogue Stingray Devices In DC, The Federal Gov't Still Doesn't Have Any Idea What To Do About It

              Seven years ago, wardriving security researchers discovered rogue cell tower simulators being operated near sensitive locations in Washington, DC, presumably by foreign governments.

            • Blacklisting the Merchants of Spyware

              Russian company Positive Technologies and the Singapore-based Computer Security Initiative Consultancy also made the list “based on a determination that they traffic in cyber tools used to gain unauthorized access to information systems, threatening the privacy and security of individuals and organizations worldwide.”

              The move had a measure of approval in Congress. “The entity listing signals that the US government is ready to take strong action to stop US exports and investors from engaging with such companies,” came the approving remarks in a joint statement from Democrat House Representatives Tom Malinowski, Anna Eshoo and Joaquin Castro.

            • Ninth Circuit: Surveillance Company Not Immune from International Lawsuit

              The court rightfully determined that, because€  the NSO Group is a private company, it is not immune from the lawsuit even though it serves foreign government clients.

              Almost a year after EFF attorneys filed a brief with the Ninth Circuit in support of WhatsApp’s lawsuit against the notorious Israeli spyware company NSO Group, the court issued a ruling that the company is not immune from the lawsuit alleging NSO helped its client governments target members of civil society, including Rwandan political dissidents and a journalist critical of Saudi Arabia.

              The court rightfully determined that, because the NSO Group is a private company, it is not immune from the lawsuit even though it serves foreign government clients. The court addressed an open question in the case law. It has been clear that the Foreign Sovereign Immunities Act (FSIA) by its terms only applies to corporate entities owned by foreign governments. But there was an open question as to whether private corporations, whose clients are foreign governments, may invoke immunity based in common law, the rules described by court opinions rather than enacted by Congress. The Ninth Circuit said no. It held that Congress intended the statute to comprehensively address the foreign sovereign immunity of corporations, and thus the FSIA forecloses applications of immunity to corporations via common law.

            • Data Broker Veraset Gave Bulk Device-Level GPS Data to DC Government

              The officials accepted the offer, according to public records obtained by EFF. Over the next six months, Veraset provided the District with regular updates about the movement of hundreds of thousands of people—cell phones in hand or tucked away in backpacks or pockets—as they moved about their daily lives. The DC Office of the Chief Technology Officer (OCTO) and The Lab @ DC, a division of the Office of the City Administrator, accepted the data and uploaded it to the District’s “Data Lake,” a unified system for storing and sharing data across DC government organizations. The dataset was only authorized for uses related to COVID research, and there’s no evidence that it has been misused. But it's unclear to what extent the policies in place bind the use or sharing of the data within the DC government.

              This is far from the only instance of data sharing between private location data brokers and government agencies. Reports at the beginning of the pandemic indicated that governments around the world began working with data brokers, and in the documents we obtained, Veraset said that it was already working with “a few different agencies.” But to our knowledge,€ these documents are the first to detail how Veraset shared raw, individually-identifiable GPS data with a government agency. They highlight the scope and sensitivity of highly-invasive location data widely available on the open market. They also demonstrate the risk of “COVID-washing,” in which data brokers might try to earn goodwill by giving away their hazardous product to public health officials during a health crisis.

              When asked to comment on the relationship, Sam Quinney, director of The Lab @ DC, gave the following statement:

            • German Police: Interventions more than doubled after exchange of passenger data

              The EU PNR Directive is leading to more and more interventions by the German authorities. An extension to rail, bus and ship travel is not yet off the table, but before that the Court of Justice in Luxembourg will rule on the legality of the law. Similar agreements with Canada and Japan are apparently no longer coming into being.

            • ‘We see everything’: Movie theater worker reveals how employees know when you are doing ‘the nasty’ in the theater

              Based on her orange-rimmed hat, it appears that the TikToker is an employee at a Vue theater location. The video appears to be filmed from an employee-only space, where @.no1headache sits eyeballing a screen displaying multiple views from a range of security cameras. The cameras appear to show the seating area of every theater in the cinema.

            • Project Panoptic has partnered with Amnesty International & Article 19 to launch #BanTheScan in India

              On November 10, 2021, Project Panoptic, partnering with Amnesty International and Article 19 launched the India edition of their global #BanTheScan campaign for Hyderabad. The city - one of the most surveilled cities in the world - has begun construction of an ominous ‘Command and Control Centre’ (CCC), intended to connect the state's vast facial recognition-capable CCTV infrastructure in real time. In addition, Project Panoptic has found that Telangana state has the highest number of facial recognition technology (FRT) projects in India.

              “Hyderabad is on the brink of becoming a total surveillance city. It is almost impossible to walk down the street without risking exposure to facial recognition” said Matt Mahmoudi, Amnesty International’s AI and Big Data researcher. “In addition to CCTV, we are concerned that law enforcement’s practice of using tablets to stop, search and photograph civilians without charge could be used for facial recognition.”

              “Facial recognition technology can track who you are, where you go, what you do, and who you know. It threatens human rights including the right to privacy, and puts some of the most vulnerable in society at risk. The construction of the CCC has chilling consequences for the right to freedom of expression and assembly.” said Quinn McKew, Executive Director at ARTICLE 19.

    • Defence/Aggression

      • 'The World Is Waiting': Biden Urged to Reverse Trump Landmine Policy, Join Global Treaty

        As a benchmark report on worldwide landmine casualties showed a 21% increase in deaths and injuries in 2020, one of the paper's editors on Wednesday renewed calls for the Biden administration to reverse a Trump-era policy allowing the U.S. to use anti-personnel mines and join 164 nations in adopting the historic Mine Ban Treaty.

        "To help prevent further landmine casualties, the United States should join the Mine Ban Treaty without delay."

      • The US is Set to Make Nuclear War More Likely

        What this means, as explained in a€ new article in Popular Mechanics, is that the€ world’s most costly weapons program (at $1.7 trillion), a fifth-generation fighter, supposedly “invisible”€ € to radar (that actually cannot fight and is not invisible to advanced radars), now has a new mission to justify its existence and continued production:€ € dropping dial-able “tactical” nuclear weapons that can be as small as 0.3 kilotons or up to 50 kilotons in explosive power.

        Now 0.3 kilotons is “just” the equivalent of 300 tons of dynamite, which supposedly makes them “useable,” meaning not holocaust-causing (that is assuming that some country backing the targeted country doesn’t decide to respond in kind and we go up the escalation ladder quickly to ever bigger bombs. Meanwhile,€ € \ dialed up to its maximum 50-kiloton power each F35A bomb would be significantly more than twice as powerful as the nuclear bomb that leveled Nagasaki.

      • Reining in the Pentagon: Can It Really be Done?

        After all, in its consideration of the bill that authorizes such budget levels for next year, the Democratic-controlled House of Representatives recently voted to add $25 billion to the already staggering $750 billion the Biden administration requested for the Pentagon and related work on nuclear weapons at the Department of Energy. By any measure, that’s an astonishing figure, given that the request itself was already far higher than spending at the peaks of the Korean and Vietnam Wars or President Ronald Reagan’s military buildup of the 1980s.

        In any reasonable world, such a military budget should be considered both unaffordable and deeply unsuitable when it comes to addressing the true threats to this country’s “defense,” including cyberattacks, pandemics, and the devastationalready being wrought by climate change. Worst of all, providing a blank check to the military-industrial-congressional complex ensures the continued production of troubled weapon systems like Lockheed Martin’s exorbitantly expensive F-35 Joint Strike Fighter, which is typically behind schedule, far above projected costs, and still not considered effective in combat.

      • Belarus migrants: What routes do they use to reach Minsk?

        A recent BBC investigation found that a network of travel firms and smugglers, often using social media, are able to organise flights and visas for Belarus as part of a package deal.

      • How Britain Aids Saudi Massacres in Yemen, with Phil Miller
      • Ilhan Omar Is Working to Stop 'Unacceptable' $650 Million Weapons Sale to Saudi Arabia

        Congresswoman Ilhan Omar said Wednesday that she is working on legislation to stop a $650 million missile sale to Saudi Arabia that the U.S. State Department announced last week.

        Criticism of the weapons sale has mounted since the State Department notified Congress that it approved the deal, with anti-war activists and other progressives accusing the Biden administration of breaking promises and exacerbating the Saudi-led war in Yemen.

    • Transparency/Investigative Reporting

      • Digital Transparency: A Right to Information Report for October 2021

        Since our last report for the month of September, IFF has filed 49 RTI requests. Here, we give you an overview of the requests filed and an analysis of the responses we have received from the different public authorities. This report highlights why demanding transparency and accountability from government authorities is one of the key elements in our fight to protect digital rights.

      • IFF files a Writ Petition against MHA’s refusal to provide information on electronic surveillance orders issued under the IT Act

        We filed six RTI applications in December 2018 seeking information about Electronic Surveillance orders passed under Section 69 of the IT Act. The information was, at first, denied on the grounds of national security. Thereafter, on appeal, when the matter was remanded back, the information was denied on the new ground that records pertaining to the information sought were destroyed as per ‘extant’ provisions (without providing the provision). When we, further, appealed against this order in August 2021 before the Chief Information Commissioner (‘CIC’), we did not get any date for hearing which we understand is due to the huge case pendency and unfilled vacancies in the CIC, owing to which the matters are only being listed after two years of filing. Three years have passed since the filing of the RTI applications, and we apprehend that the information sought is being continuously destroyed during the pendency of the RTI proceedings. Therefore, we have approached the Delhi High Court to expedite the process and to seek information on Electronic Surveillance, which impacts the fundamental rights of all citizens of the country.

    • Environment

      • Campaigners Rip New COP26 Draft as a 'Polite Request' for Climate Action Amid Existential Crisis

        A new COP26 draft decision text unveiled Wednesday was roundly panned by climate campaigners as badly inadequate to the task of slashing global greenhouse gas emissions, which are pushing the planet toward a catastrophic 2.4€°C of warming by the end of the century.

        "Negotiators shouldn't even think about leaving this city until they've agreed to a deal that meets the moment."

      • A Political Campaign Tool Adapted to Recruit Enviro Activists

        Local volunteer environmental groups, of all sizes from both the east and west coasts, developed a way to persuade their inactive members to become active volunteers.€  The approach is a variation of the method political organizers use in most state and federal political campaigns to generate crowds at rallies, recruit teams to knock on doors and staff phone banks. Wilderness activists, who were also experienced political campaign managers, developed the procedure for environmental campaigns. In political campaigns, organizers recruit volunteers from lists of the party’s most motivated registered voters, but local environmental groups recruit them from their own membership lists.

        The secret is hidden in every organization’s membership list

      • “Nice” Isn’t Going to Save the Planet

        The reality is that climate activists spent decades politely asking for the world’s leaders to please act on this thing that is going to kill millions. They held respectful dialogue in respectable forums. They produced charts and came up with a plethora of acceptable solutions that, had they been enacted on a reasonable timescale, would not have posed a dramatic threat to the status quo. Over and over again, they met bad faith actors in good faith. And in response they were lied to, and saw little meaningful action. Is political corruption civil? Is it polite for a senator to risk dooming the planet before sailing off on the yacht he bought with the half a million dollars he earns every year from the fossil fuel industry?

      • “Nice” Isn’t Going to Save the Planet

        This column is part of Covering Climate Now, a global journalism collaboration cofounded by Columbia Journalism Review and The Nation to strengthen coverage of the climate story.

      • ‘We’re Several Days Late and Many Dollars Short in Getting Ahead of Climate Catastrophe’

        Janine Jackson interviewed Michael K. Dorsey about the climate summit for the November 5, 2021, episode of CounterSpin. This is a lightly edited transcript.

      • “A Process of Violence”: Indian Author Amitav Ghosh on How Colonialism Fueled the Climate Crisis

        As talks at the Glasgow U.N. climate summit accelerate, we look at how the roots of the climate crisis date back to Western colonialism with award-winning Indian author Amitav Ghosh, who examines the violent exploitation of human life and the natural environment in his new book, “The Nutmeg’s Curse: Parables for a Planet in Crisis.” Ghosh speaks about the political significance of fossil fuels in global politics, saying that “if fossil fuels were to be completely substituted at scale, what you would have is the complete inversion of the world’s geopolitical order.” Ghosh’s previous books include “The Great Derangement: Climate Change and the Unthinkable” and the novel “Gun Island.”

      • COP26 Paralysis: Climate Shame

        It is now sold as a luxury to see Antarctica, where passengers can walk offshore “on the sea ice to watch penguin chicks hatch, see the arrival of seal pups and humpback whales”, on cruises probably affordable because of offshore tax havens.

        The “Antarctica in Depth” Scenic Eclipse cruise starts from earlybird $19,701, and the Antarctica, South Georgia and Falkland Island earlybird $28,855. The “truly all-inclusive” provides each guest with private butler service, “immersive dining” and “private dégustation”, “separate sleep zone”, indulgent 5,920 sq ft Senses Spa, Scandinavian inspired outdoor vitality pools, and more.

      • The Global Climate Wall: Wealthy Nations Prioritize Militarizing Borders Over Climate Action

        The world’s richest countries have responded by militarizing their borders and treating the humanitarian crisis as a security issue. NATO Secretary General Jens Stoltenberg attended this year’s U.N. climate summit, marking the first time a top alliance leader came to the climate talks since they began. On Tuesday, U.S. House Speaker Nancy Pelosi at COP26 raised the issue of security during a press conference. “The richest countries are building a climate wall against the consequences of climate change rather than dealing with the causes and rather than providing the money that would enable people to stay,” says Nick Buxton, with the Transnational Institute and co-author of their new report, “Global Climate Wall: How the world’s wealthiest nations prioritise borders over climate action.” We also speak with Santra Denis, executive director of the Miami Workers Center, about the focus of the It Takes Roots grassroots delegation at COP26. She says that in order to protect frontline communities and workers, the U.S. should focus on investing in low-carbon and adaptation industries instead of border control.

      • This Will Set Africa on Fire: Nnimmo Bassey of Nigeria Blasts Progress of Talks at U.N. Climate Summit

        Today a draft agreement at COP26 was released, calling on nations to accelerate the phasing out of coal and fossil fuel subsidies and make pledges to cut emissions by the end of 2022. The draft also urges wealthy nations to “urgently scale-up” financial support for developing countries to help them adapt to the climate crisis. This comes as a new report by the group Climate Action Tracker estimates world temperatures are on track to rise by 2.4 degrees Celsius above preindustrial levels based on current pledges to cut emissions — far higher than the 1.5 degree goal set in the 2015 Paris Agreement. To discuss the latest developments at COP26, we speak with Nigerian environmental activist and poet Nnimmo Bassey. “There’s no force behind what’s being proposed,” says Bassey, who adds that the current trajectory of negotiations will have devastating effects on Africa. “That means setting the continent on fire. It is just sacrificing the continent.” Bassey also discusses the role of China in Africa and the impact of the climate crisis on the continent. He has attended climate summits for years but says this may be his last one.

      • As Average Temperatures Rise, Workers Will Finally Get Protection From Extreme Heat

        When Maria Pineda, who goes by Letty, arrived in Florida from El Salvador in 1994, she wasn’t documented and didn’t speak the language, so she didn’t have many employment options. She started working in agriculture, harvesting ferns to be sold to florists. She was paid by the piece, not by the hour. She needed the money. “No trabajas, no comes,” she said: You don’t work, you don’t eat. She made just enough to cover rent and her necessities.

      • Opinion | Beware the 'Climate-Stupid Agriculture' of Bill Gates and His Allies

        As world leaders wrap up the UN Climate Summit in Glasgow, new scientific research shows that there is still a great deal of magical thinking about the contribution of fertilizer to global warming.

      • Opinion | Who Is the World's Greatest Climate Champion? (Hint: Not the United States)

        This story is part of Covering Climate Now, a global journalism collaboration strengthening coverage of the climate story.

      • Chinese Fossil Fuel Investments in Africa

        Many African governments seek Chinese assistance through the Belt and Road Initiative (BRI) to bridge the continent’s infrastructure gap, while China in turn seeks access to a number of key strategic resources, including fossil fuels, minerals, and also access largely untapped markets. In addition to being rich in natural resources, some African countries attract Chinese interest because of relatively cheap labor, poor governance, and lax environmental standards. In 2017, McKinsey reported that more than 10,000 Chinese companies are likely operating throughout Africa.

        The amount of money involved is staggering. According to a 2021 report from the Shanghai University of International Business and Economics, China has since 2000 invested a total of $47 billion throughout Africa (in 52 out of 54 countries), with new investments adding up to $2.96 billion in 2020 (an increase of over $200 million from the previous year). The vast majority of Chinese investment—87 percent—has been concentrated in four sectors: energy, transport, metals, and real estate. China’s Export-Import Bank provides much of the financing for infrastructure projects in Africa, but a number of commercial banks have also established branches throughout the continent.

      • Climate Coalition Demands Biden Halt 'Outrageous' Offshore Drilling Auction—Largest in US History

        As the Biden administration prepares to auction off more than 80 million acres in the Gulf of Mexico for fossil fuel extraction, over 250 advocacy groups published an open letter on Wednesday imploring U.S. President Joe Biden to cancel the sale and fulfill his promises of bold climate action.

        "Aside from breaking a campaign promise to ban new oil and gas leasing on public lands and waters, the Biden administration also violated federal law in deciding to open more of the Gulf to offshore drilling."

      • Opinion | For Rich Countries to Honor Their Climate Debt, We Must Better Tax Multinationals

        For once, most of the debtors are not in Africa, but in the North. I am not talking money, but about climate debt, as natural disasters are multiplying and the fight against climate change has become an existential issue. Since industrialized countries have used the available atmospheric space to develop and get rich by exploiting fossil fuels, the United Nations Climate Change Conference (COP26)—that is coming to end in Glasgow right now—must be an opportunity to recognize this climate debt to Africa, and to developing countries in general, and to honor it.

      • Petition From 14 Youth Leaders Says UN Must 'Declare a Systemwide Climate Emergency'

        A group of 14 youth climate leaders including Swedish activist Greta Thunberg filed a legal petition on Wednesday imploring the United Nations to "declare a systemwide climate emergency," a push that came amid growing anger over the milquetoast pledges emerging from the COP26 summit.

        "The United Nations connects the entire world together, and we need global action on the climate crisis."

      • In COP26 Speech, Climate Justice Leader Vows Global Movement 'Will Change History'

        Declaring that "it is ordinary people who change history," climate and social justice campaigner Asad Rehman on Wednesday gave a brief but searing indictment of rich nations that are "deliberately sacrificing the poor for profit."

        Rehman, executive director of anti-poverty group War on Want and a spokesperson for the climate justice COP26 Coalition, delivered the remarks at a high-level segment of the United Nations Climate Change Conference underway in Glasgow, Scotland.

      • 'A Welcome Step Forward': Climate Groups Cautiously Greet New US-China Pledge

        Campaigners at global advocacy groups on Wednesday welcomed a surprise joint statement from the U.S. and Chinese governments about "enhancing climate action in the 2020s" while also calling on both countries to actually deliver on their promises.

        "It's always welcome news when the world's two biggest emitters cooperate on climate change."

      • Energy

        • Climate Denial Campaigner Attempts to Discredit COP26 With False Diesel Power Claims

          The head of policy at the UK’s principal climate science denial group has been criticised for spreading false rumours about the use of diesel-powered generators at COP26, with environmental experts branding his viral tweet “desperate”.

          Harry Wilkinson, one of several climate science deniers at the Glasgow summit, suggested that the conference was relying on polluting diesel generators in an effort to highlight the supposed hypocrisy of the event.

        • [Cryptocurrency] criminals are blackmailing Instagram users into swindling friends

          The technique is chronicled in a report by Motherboard. There are a few variations, but it essentially boils down to three steps. First, a malefactor gets ahold of an Instagram user’s account information, either via sending a phishing link with a fake login page or by finding a reused password from one of the near-constant security breaches already available. Then the thief contacts the account holder and forces them to record a video of themselves, recommending their followers invest money with “a friend.” The video claims that you can quickly triple your investment via Bitcoin or other get-rich-quick schemes. The criminal promises to return control of the account to its rightful owner upon completion. The victim posts the coerced video with a payment link, their followers are swindled out of huge sums of money via cryptocurrency or purchases or simple money transfers, and the criminal disappears — generally without returning the Instagram account.

        • Hostage-Style Bitcoin Scam Videos Are Spreading Across Instagram

          The news follows Motherboard reporting last week on how a scammer forced one victim to film a video with the promise of getting their money back after sending the fraudster Bitcoin. After filming the video, however, the scammer broke into the victim’s Instagram account and sent the video to their friends and posted it from their profile to try and scam others. After we published the story, more Instagram users got in touch with Motherboard saying they’ve been [cracked] and forced to shoot similar videos, indicating the issue appears to be more widespread on the social network with victims describing personal, professional, reputational, and financial damage. Multiple victims also complained about the troublesome Instagram account recovery process and the lack of direct communication from the company.

      • Wildlife/Nature

    • Finance

      • Predators With Badges

        Undeniably, the blowback from COVID-19 lockdowns and mandates continues to reverberate around the country, impacting the nation’s struggling workplaces, choking the economy and justifying all manner of authoritarian tyrannies being inflicted on the populace by state and federal governments.

        Yet while it is easy to be distracted by political theater, distressed by the COVID-19 pandemic, and divided over authoritarian lockdowns and mandates, there are still darker forces afoot that cannot—should not—must not be ignored.

      • The Latest Version Of Congress's Anti-Algorithm Bill Is Based On Two Separate Debunked Myths & A Misunderstanding Of How Things Work

        It's kind of crazy how many regulatory proposals we see appear to be based on myths and moral panics. The latest, just introduced is the House version of the Filter Bubble Transparency Act, which is the companion bill to the Senate bill of the same name. Both bills are "bipartisan," which makes it worse, not better. The Senate version was introduced by Senator John Thune, and co-sponsored by a bevy of anti-tech grandstanding Senators: Richard Blumenthal, Jerry Moran, Marsha Blackburn, Brian Schatz, and Mark Warner. The House version was introduced by Ken Buck, and co-sponsored by David Cicilline, Lori Trahan, and Burgess Owens.

      • CBO's Exclusion of IRS Boost Could Help Right-Wing Dems Tank Biden Agenda

        The Build Back Better Act includes increased funding for Internal Revenue Service enforcement, which the Biden administration has taken into account when saying that the legislation will raise enough money to fully offset spending, but the Congressional Budget Office is expected to omit the projected boost in tax collection from its forthcoming estimate of the fiscal impact of the 10-year, $1.75 trillion social infrastructure and climate package.

        The exclusion could be significant because the more transformative part of President Joe Biden's legislative agenda€ has been put in jeopardy by five right-wing House Democrats who last week made their support for the Build Back Better (BBB) Act contingent on receiving fiscal information from the CBO that matches existing estimates provided by the White House.

      • GOP Billionaire to Hold Fundraiser for 'Great American' Joe Manchin

        "When billionaires take over our elections, we get a country that bends to their will."

      • What’s Really Driving Inflation? Corporate Power

        If markets were competitive, companies would seek to keep their prices down in order to maintain customer loyalty and demand. When the prices of their supplies rose, they’d cut their profits before they raised prices to their customers, for fear that otherwise a competitor would grab those customers away. € 

      • Green Jobs Shouldn’t Leave Black and Brown Workers Behind

        The climate crisis is here—the historic wildfires that swept the West and New York City’s deadly flooding are just some of the weather disasters that hit nearly one in three Americans over the summer. Though the federal government finally seems on the verge of partially confronting climate change through Congress’s infrastructure and reconciliation bills, these solutions are incomplete.

      • News Alert: Dads Have a Role to Play in the Paid-Leave Fight, Too

        There is a perception that paid parental leave is a “women’s” issue. We see that perception from Republicans when they ridicule Transportation Secretary Pete Buttigieg for taking time off to welcome his new babies, but we also see it from Democrats when they scramble to put paid leave back into their spending bill (which never should have been taken out in the first place) only after advocates go ballistic and their party gets curb-stomped by white women in Virginia. The conventional wisdom is that paid parental leave (which is still simply called “maternity leave” by people who take pride in not learning new words) is primarily a social benefit to women.

    • AstroTurf/Lobbying/Politics

      • Give Capital What It Wants…or Else

        Two seemingly separate news stories are darkly and intimately related to each other in ways that you will not see intelligently discussed on “Meet the Press” or “Washington Week.”

        The first story is the fascist ogre Donald Trump continuing to run free and menace the nation even after having been impeached twice during a white-supremacist presidency that included:

      • Who Is Really Surprised the Democrats Got Their Ass Kicked?

        The Democrats took the U.S. Presidency, Senate, and House in 2020 (with HUGE support for the National AFL-CIO) largely promising to move forward an expansive, progressive, pro-Union agenda. They, as a Party, claimed to support the PRO Act, livable wages, paid family medical leave, free public college, student loan forgiveness, protection of voting rights, tax increases on the rich (not working people), and major environmental action. And, now, a year later, what have we achieved? The answer, beyond the temporary child tax credit, is VERY LITTLE.

        And here, lets be honest…The PRO Act (which is a transformational pro-Labor bill that seeks to right the power imbalance between workers and bosses) is DEAD. Comprehensive voting rights looks dead. The 6 trillion social spending bill has been eviscerated down to under two trillion and now amounts to a universal pre-K bill (with a few good but limited other priorities tucked in), and even this modest bill’s fate still seems in question. And, while the infrastructure bill (also greatly reduced from its original scope) will likely pass (eventually), in isolation, it’s far too little too late. And, if this infrastructure bill is all that passes, it will be impossible to argue that the first year of Democratic Party rule has been anything other than an abject failure and disappointment for Unions, working-class people, progressives, and those National AFL-CIO officers who put all our eggs in the basket of the Democratic Party.

      • Opinion | Putting India Walton's Campaign for Mayor of Buffalo in Context

        India Walton—the progressive, working class, 39-year-old, Black mother-of-four who stunned Buffalo's Democratic establishment with her June 2021 upset win in the Mayoral Primary Election—appears to have lost her bid to become the city's Chief Executive. As of this writing, she's received 41% of the General Election vote, with unnamed write-in candidates (but, presumably, Primary loser and 16-year-incumbent, Byron Brown) winning the remaining 59% of ballots cast.€ 

      • GOP Strategy: Tell Bigger and Crazier Lies to energize voter turnout

        Many moderate democrats were also on board with placing the blame on the W-word. “What went wrong is just stupid wokeness,” said political strategist James Carvell.

        But progressives weren’t so sure wokeness was to blame. Rep. Alexandria Ocasio-Cortez suggested the results show the limits of trying to run a super moderate campaign that does not “excite, speak to or energize a progressive base.”

      • 'Tip of the Iceberg': Report Warns Michigan GOP Ploy Could Shutter 20% of Polling Places

        If successful, a Republican-backed petition initiative in Michigan could result in the closure of one in five polling locations across the crucial battleground state, potentially creating harmful new barriers to ballot access and disenfranchising voters.

        That's according to a report published Wednesday by the local advocacy group Progress Michigan, which warned that the election law changes proposed by the Secure MI Vote initiative would "make it harder for Michiganders to vote and make the job of administering elections more difficult for local clerks."

      • Succession’s Repetition Compulsion

        HBO’s Succession is a show about four siblings trying to decide whether or not to kill their dad. Justly celebrated for its savvy casting, evocative score, clever writing, luxurious (if claustrophobic) set design, and crafty (if rarely beautiful) cinematography, Succession—which returned for a third season this fall—has nonetheless been fueled primarily by this perpetual oedipal edging: Will they? Won’t they? Can they?

      • Destroy Filibuster to Lift Up ‘Your Limp Democracy': Spoof Ad Demands End to Electile Dysfunction
      • Opinion | Democrats Must Evolve Their Voter Communications Strategy

        "I got a call from Bill Clinton!" my grandmother informed me one day many years ago, thrilled that the president of the United States had taken time out of his busy schedule to call her. But he hadn't. Instead, it was her first encounter with an exciting new technology—robocalls—which were used to remind voters to get out and cast a ballot. Wow, did she kvell about this experience and tell all her friends to go vote for her friend Bill.€ 

      • Opinion | Found in Translation: New York Times Says Democrats Shouldn't Challenge Oligarchy

        A few days after the Nov. 2 election, the New York Times published a vehement editorial calling for the Democratic Party to adopt “moderate” positions and avoid seeking “progressive policies at the expense of bipartisan ideas.” It was a statement by the Times editorial board, which the newspaper describes as “a group of opinion journalists whose views are informed by expertise, research, debate and certain longstanding values.”

      • Here’s How the Democrats Can Win Back Rural Voters

        No matter how much you try to dress it up, last week’s election results make it clear that Democrats have a rural problem. The failure to even seriously contest—let alone win—statehouses and congressional seats over so much of the electoral map leaves the party perpetually behind. Our party has relied on suburban moms and black women to save the day repeatedly. They have capes—don’t get me wrong—but they also need a coalition of voters to step up to save democracy alongside them.

      • Howie was on The Public Press on 11/9/21.

        Today I am joined by lifelong activist and 2020 presidential candidate from the Green Party, Howie Hawkins, to discuss important topics from ways we can go about strengthening our democracy and its relevance towards passing a pro-worker agenda, to Biden and the Democrats failing the working people of this country in favor of serving their wealthy donors. Additionally, any comments made from our audience during the livestream may be considered in the program’s conversation.

      • Former top officials warn democracy in 'jeopardy' without Congressional action on election security

        A bipartisan group of almost 100 former national security officials is urging Congress to take steps to secure elections ahead of next year, warning that without action, the nation's democratic institutions are in “severe jeopardy.”

        “We write to express our alarm at ongoing efforts to destabilize and subvert our elections, both through active disinformation campaigns and the related efforts to inject partisan interference into our professionally administered election process,” the officials wrote in an open letter published Tuesday. “We believe these efforts are profoundly damaging to our national security, including by making our elections more vulnerable to foreign interference and possible manipulation.”

        “We call on Congress to confront these threats and safeguard our democratic process as we look ahead to the 2022 elections and beyond,” they wrote.

      • Civil liability – adapting liability rules to the digital age and artificial intelligence

        Section I of this consultation concerns the Product Liability Directive. Since 1985, this Directive has provided a harmonised system for compensating consumers who suffer damage from defective products. The Directive applies to all movable products regardless of the technology they use, and therefore also applies to AI-driven products.

        However, the evaluation found that it was difficult to apply the Directive to products in the digital and circular economy because of its outdated concepts. It also found that it was difficult for consumers to get compensation, especially when it comes to proving that complex products were defective and caused the damage.

        Section II of this consultation specifically concerns AI. The Commission’s objective is to encourage the development and roll-out of safe AI systems and build trust amongst potential users. In order to address risks to safety and fundamental rights, the Commission has proposed harmonised rules for the development, placing on the market and use of certain AI systems (AI Act) and further changes to safety legislation (e.g. proposal for a Machinery Products Regulation). As a next step, the Product Liability Directive and national liability rules may also need to be adapted. In the second part of this consultation, the problems linked to certain types of AI – which make it difficult to identify the potentially liable person, to prove that person’s fault or to prove the defect of a product and the causal link with the damage – are explored further.

    • Misinformation/Disinformation

      • Cyber agency beefing up disinformation, misinformation team

        Easterly noted that earlier this week she had a meeting with “six of the nation’s experts” in the disinformation and misinformation space. She stressed her concerns around this being a top threat for CISA, which is charged with securing critical infrastructure, to confront.

        “One could argue we’re in the business of critical infrastructure, and the most critical infrastructure is our cognitive infrastructure, so building that resilience to misinformation and disinformation, I think, is incredibly important,” Easterly said.

    • Censorship/Free Speech

      • Content Moderation Case Study: Electric Truck Company Uses Copyright Claims To Hide Criticism (2020)

        Summary:€ There are many content moderation challenges that companies face, but complications arise when users or companies try to make use of copyright law as a tool to block criticism. In the US, the laws around content that allegedly infringes on a copyright holder’s rights are different than most other types of content, and that creates some interesting challenges in the content moderation space.

      • John Cleese Pulls Out of Cambridge Union Talk Over ‘Woke Rules,’ ‘Monty Python’ Hitler Impersonation

        Celebrated “Monty Python” and “A Fish Called Wanda” actor and writer John Cleese has pulled out of an upcoming talk at the Cambridge Union on Friday, citing concerns over “woke rules” and an Adolf Hitler impersonation he had famously done on the “Fawlty Towers” series decades ago.

        Cleese, who is a Cambridge alumnus, was responding to a decision by the Union, which is a debating society, to blacklist art historian Andrew Graham-Dixon. The historian had performed a mock impression of Hitler ranting, during a debate last week on art and good taste at the Union. Subsequently, Union president Keir Bradwell informed members that Graham-Dixon was banned from speaking there.

    • Freedom of Information/Freedom of the Press

      • What happens when the news desert is in your own backyard?

        Apologies for a little extra localism here at Nieman Lab dot org today. But our hometown of Cambridge, Mass., has become a noteworthy example of a phenomenon happening nationwide: the hollowing out of local news.

        Cambridge is home to the oldest weekly newspaper in the United States, the Cambridge Chronicle. It’s been the running record of the city since 1846. But that record has gotten sparser and sparser as the Chronicle’s staff has dwindled. For the past few years, there’s been only one journalist working there: editor Amy Saltzman. And now she’s gone too.

    • Civil Rights/Policing

      • Senate Democrats Call On Biden to Pardon All Federal Nonviolent Marijuana Offenders

        Blasting "over a century of failed and racist cannabis policies," a trio of progressive U.S. senators on Tuesday urged President Joe Biden to use his executive authority to issue a blanket pardon for all nonviolent federal marijuana offenses.

        Along with laying out how "America's cannabis policies have punished Black and Brown communities for too long," the letter from Sens. Elizabeth Warren (D-Mass.), Ed Markey (D-Mass.), and Jeff Merkley (D-Ore.) highlights that such laws "are increasingly out of step" with public opinion.

      • Human Rights Coalition Petitions UN to Probe Discriminatory Vaccine Hoarding by Rich Nations

        A global coalition is accusing nations including the U.S. and U.K. of violating international human rights law through actions contributing to a discriminatory Covid-19 vaccine rollout and has filed an appeal at the United Nations to ensure human lives have priority over corporations' intellectual property protections.

        "Governments must fulfill their international obligations and help prioritize people over profits by ensuring vaccine equity for all."

      • “The Worst Prison in New York State”

        Conditions in New York City jails have reached a boiling point, prompting day-long hearings, national media attention, and renewed calls for the Rikers Island jail complex to be shuttered. The jails have seen spikes in violence, deaths, suicides, and suicide attempts, heat waves without adequate cooling, and reduced access to basic services including medical and mental health care. This story was published in partnership with New York Focus, an independent, investigative news site covering New York state and city politics. Sign up for their newsletter€ here.

      • Xenophobic Attitudes in France, Sweden, Germany, and Poland

        As so often in our culture, the concept of Xenophobia pre-dates those dim Germans sitting in their equally dim forests when Romans appeared. Xenophobia originates in Greek ξένος or xénos. It indicates strange, foreign, and alien and is combined with phóbos or fear.

        It is the fear and hatred of that which is perceived to be foreign and strange. Right-wing xenophobia thrives on setting the in-group against the out-group. In that, xenophobia is highly suitable when conjuring up a fear of losing national and racial identity. German Neo-Nazis will never stop engineering xenophobia because it supports the ideology of pure race found in their hallucination of an antisemitic Volksgemeinschaft.

      • It’s in the Air
      • Missouri Admits It Fucked Up In Exposing Teacher Data, Offers Apology To Teachers -- But Not To Journalists It Falsely Accused Of Hacking

        As you'll recall, last month, journalists for the St. Louis Post-Dispatch revealed that the state's Department of Elementary and Secondary Education (DESE) website was exposing teacher and administrator social security numbers in the HTML source code. This came years after state auditors had highlighted that DESE was already collecting information it should not have been collecting. Bizarrely, DESE and Missouri governor Mike Parson, rather than thanking these journalists for helping to protect the teachers, accused them of being hackers and promising to prosecute them. After people mocked him, he doubled down on the claim and a PAC closely connected to Parson put out a bizarre add playing up the evil "hacking" by the "fake news" media, along with ridiculous talk about "decoding the HTML source code."

      • Senators Call for Federal Investigation Into Liberty University’s Handling of Sexual Assaults. School Promises Independent Probe.

        Citing possible violations of federal law, three senators, including the two from Virginia, are pressing the U.S. Department of Education to investigate Liberty University’s handling of sexual assault claims.

        Liberty’s board also voted Friday to open an “independent and comprehensive review” of the school office tasked with handling discrimination and abuse.

      • Remembering Elliot Harmon, 1981-2021
      • Uber discriminates against people with disabilities, new DOJ lawsuit alleges

        According to the Justice Department, Uber instituted a wait time fee in a number of cities starting in April 2016, eventually expanding the policy nationwide. Passengers would incur the fee two minutes after their Uber car arrives at their pickup location and were charged until the car begins its trip. Passengers with disabilities, such as those who use a wheelchair or a walker, often need more time to get into the car than passengers without disabilities.

      • Uber sued by Justice Department for overcharging disabled people

        It is not the first time that Uber has found itself in hot water over disability issues.

      • Wolt’s couriers are employees, rules authority; Wolt to defy ruling

        Wolt said the ruling was expected, announcing its intent to appeal against it. It pointed out that more than 70 per cent of its couriers value the freedom of entrepreneurship over the security of a formal employment relationship, estimating that it would only be able to have slightly over 2,000 of its almost 5,000 couriers on its payroll if employment contracts were required to perform the work.

      • DoorDash shares surge on news it is buying Finnish food-delivery company Wolt in $8 billion deal

        During the company's third-quarter earnings call Tuesday, DoorDash Chief Executive Tony Xu said Wolt, which has more than 4,000 employees, has built "a remarkable business" that has become a leading local commerce-delivery platform across 23 countries, 22 of which would be new to DoorDash. Wolt delivers from restaurants and 14 other categories, including grocery.

      • DoorDash to charge up growth with $8 billion deal for Europe's Wolt

        Nearly two-thirds of Wolt's gross order value, a metric totaling value of all orders and subscription fees, brings in positive contribution profit, DoorDash said, adding it would not share further details.

    • Internet Policy/Net Neutrality

      • Infrastructure Bill Is Great For Broadband, But Still Ignores The Real Problem (Monopolies & Corruption)

        After months of intense wrangling, the Biden administration's infrastructure bill has finally made it through Congress, delivering a massive injection of much-needed funds to an absurdly overlooked part of the economy. You might recall the broadband component of the bill saw its overall price tag cut from $100 billion to $65 billion. There were several other changes made at the request of the telecom lobby, such as a slower speed definition standard and the elimination of language to help community broadband. But it's still the biggest U.S. broadband investment on record, and filled with a lot of great things.

    • Digital Restrictions (DRM)

      • Apple Faces Yet More 'Right To Repair' Backlash Over iPhone 13 Screen

        Apple has never looked too kindly upon users actually repairing their own devices. The company's ham-fisted efforts to shut down, sue, or otherwise imperil third-party repair shops are legendary. As are the company's efforts to force recycling shops to shred Apple products (so they can't be refurbished and re-used), and Apple's often comical attacks on "right to repair" legislation, a push that only sprung up after companies like Apple, Microsoft, Sony, John Deere, and others created a grass-roots counter-movement via their attempts to monopolize repair.

    • Monopolies

      • [Old] CONSOLIDATED STATEMENT OF FACTS IN SUPPORT OF ITS RESPONSES TO MOTIONS FOR SUMMARY JUDGMENT BY MICROSOFT CORPORATION

        "Bill Gates ordered to all application business units to include checking routines of operating environments and if it is Microsoft DOS, nothing will happen. But if it is non MS-DOS (such as DR-DOS), application will display messages saying that 'This application has been developed and tested for Microsoft MS-DOS. Since you use different environment, this application may not work correctly . . .' "

      • Patents

        • $2,000 for Jeffrey M. Gross entity Onscreen Dynamics prior art

          On October 4, 2021, Unified Patents added a new PATROLL contest, with a $2,000 cash prize, seeking prior art on at least claim 1 of U.S. Patent 9,645,663. The patent is owned by Onscreen Dynamics LLC, a Jeffrey M. Gross entity. The '663 patent relates to an electronic device with a touchscreen display comprising of an active touchscreen region and a virtual bezel area. The patent has been asserted against Tesla, BMW, Mercedes, Volvo, Pioneer, Partner Tech, Getac Technology, EMBROSS, Sharp, AsusTek, Samsung, and LG.

        • Software Patents

          • B# On Demand patent held invalid

            On November 10, 2021, the Patent Trial and Appeal Board (PTAB) issued a final written decision in Unified Patents, LLC v. B# On Demand, LLC holding all challenged claims of U.S. Patent 9,553,880 invalid. Owned and asserted by B# On Demand, LLC, an NPE, the ’880 patent discloses a system that transmits a catalog of electronic files to a requesting user, sets up customer accounts, processes payments from customers to establish file access authorizations, and enables transmission of user-selected files to customers. It had been asserted against Spotify.

      • Trademarks

        • Basmati rice’s EU trade mark application raises questions about Brexit and oppositions on the basis of UK law

          A few weeks back, this Kat wrote an article about a case which relied on the UK law of passing off in a UK trade mark infringement claim. This time, we have a look at a case which relied on UK passing off to oppose an EU trade mark application under Article 8(4) EUTMR. With the case revolving around basmati rice, and a bit of Brexit to sweeten the deal, let’s see what happened.

          [..]

          The relevant UK provision (section 5(4) of the Trade Mark Act 1994) provides that a trade mark shall not be registered where its use can be prevented by virtue of any law (in particular, the law of passing off) that protects a non-registered trade mark or other sign used in the course of trade. The applicant relied upon the ‘extended’ form of passing off (referred to in Chocosuisse Union des fabricants suisses de chocolat & Ors v Cadbury Ltd. [1999] EWCA Civ 856), which enables several traders to have rights over a sign which has acquired a reputation on the market (and whereby - as per the UK law of passing off - such notional use by another has constituted a misrepresentation, and damage was caused).

          The BoA had previously found that, whilst there was reputation giving rise to goodwill, a likelihood of misrepresentation could not be established on the basis of the contested goods and use of the mark applied for could not cause direct loss to the applicant as it was not likely to cause a direct loss of sales.

      • Copyrights

        • Gasp! YouTube Shutters Account For Person Committing DMCA Takedown Fraud!

          It should come as no surprise to regular Techdirt readers that the DMCA takedown process is not only wide open to fraud and abuse, but that those avenues are regularly used in real life for just those purposes. Takedowns to silence criticism, takedowns to try to steal traffic from others, or takedowns or monetization claims just to get some paltry amounts of streaming revenue: the point is that this shit happens all the time. What absolutely does not happen with any frequency is the folks behind these bogus actions getting punished in any way for their behavior.

        • Criminal Copyright Complaint Filed Against BitTorrent Seedbox Provider

          Three seedbox providers have announced that they will block their users from sharing on at least three named trackers. While one appears to have decided to act voluntarily, TorrentFreak is informed that a company operating under two brands is now being investigated for criminal copyright infringement.

        • The Pirate Bay Story Will Be Turned Into a TV Series

          The Pirate Bay's turbulent history will be turned into a six-part TV drama. The Swedish production is scheduled to start filming next year and will be aired by public broadcaster SVT. The makers will base their story on input from various insiders but the site's founders are not part of the crew. Instead, Pirate Bay co-founder Peter Sunde informs us that he's working on his own film project about the site.



Recent Techrights' Posts

Giving back to the community
Reprinted with permission from Daniel Pocock
SoylentNews Grows Up, Registers as a Business, Site Traffic Reportedly Grows
More people realise that social control media may in fact be a passing fad
Links 28/03/2024: Sega, Nintendo, and Bell Layoffs
Links for the day
Open letter to the ACM regarding Codes of Conduct impersonating the Code of Ethics
Reprinted with permission from Daniel Pocock
With 9 Mentions of Azure In Its Latest Blog Post, Canonical is Again Promoting Microsoft and Intel Vendor Lock-in, Surveillance, Back Doors, Considerable Power Waste, and Defects That Cannot be Fixed
Microsoft did not even have to buy Canonical (for Canonical to act like it happened)
Links 28/03/2024: GAFAM Replacing Full-Time Workers With Interns Now
Links for the day
Consent & Debian's illegitimate constitution
Reprinted with permission from Daniel Pocock
The Time Our Server Host Died in a Car Accident
If Debian has internal problems, then they need to be illuminated and then tackled, at the very least in order to ensure we do not end up with "Deadian"
China's New 'IT' Rules Are a Massive Headache for Microsoft
On the issue of China we're neutral except when it comes to human rights issues
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, March 27, 2024
IRC logs for Wednesday, March 27, 2024
WeMakeFedora.org: harassment decision, victory for volunteers and Fedora Foundations
Reprinted with permission from Daniel Pocock
Links 27/03/2024: Terrorism Grows in Africa, Unemployment in Finland Rose Sharply in a Year, Chinese Aggression Escalates
Links for the day
Links 27/03/2024: Ericsson and Tencent Layoffs
Links for the day
Amid Online Reports of XBox Sales Collapsing, Mass Layoffs in More Teams, and Windows Making Things Worse (Admission of Losses, Rumours About XBox Canceled as a Hardware Unit)...
Windows has loads of issues, also as a gaming platform
Links 27/03/2024: BBC Resorts to CG Cruft, Akamai Blocking Blunders in Piracy Shield
Links for the day
Android Approaches 90% of the Operating Systems Market in Chad (Windows Down From 99.5% 15 Years Ago to Just 2.5% Right Now)
Windows is down to about 2% on the Web-connected client side as measured by statCounter
Sainsbury's: Let Them Eat Yoghurts (and Microsoft Downtimes When They Need Proper Food)
a social control media 'scandal' this week
IRC Proceedings: Tuesday, March 26, 2024
IRC logs for Tuesday, March 26, 2024
Over at Tux Machines...
GNU/Linux news for the past day
Windows/Client at Microsoft Falling Sharply (Well Over 10% Decline Every Quarter), So For His Next Trick the Ponzi in Chief Merges Units, Spices Everything Up With "AI"
Hiding the steep decline of Windows/Client at Microsoft?
Free technology in housing and construction
Reprinted with permission from Daniel Pocock
We Need Open Standards With Free Software Implementations, Not "Interoperability" Alone
Sadly we're confronting misguided managers and a bunch of clowns trying to herd us all - sometimes without consent - into "clown computing"
Microsoft's Collapse in the Web Server Space Continued This Month
Microsoft is the "2%", just like Windows in some countries