[Meme] Standing Together for Peace in Europe

Posted in Europe, Patents at 10:59 pm by Dr. Roy Schestowitz



Summary: The profoundly ludicrous statement from the EPO distracts from its own wrongdoing and crimes

Links 10/3/2022: Blender 3.1 and Mesa 22.0.0

Posted in News Roundup at 9:34 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • OMG Ubuntu’Solaar’ Lets You Manage Logitech’s Unifying Receiver on Linux

        Logitech’s penny-sized USB dongles lets users connect up-to six compatible Logitech wireless devices to their computer via a single dongle.

        You can tell if a dongle uses this technology as it’ll have a little sunburst icon on it, as pictured in the product photo on the right.

        Being a slim, low-profile and discrete size, Logitech say there’s “no need to unplug it when you move around”. This is a far cry from the days when using a “wireless” device meant having to stay within (what felt like) a 20cm square box and in clear view of a huge blinking infrared receiver!

    • Audiocasts/Shows

      • VideoStormOS Is A Beginner Friendly Arch Based Distro – Invidious

        StormOS is a beginner friendly distribution based on Arch Linux, which offers an easy installation process, a full suite of software, and a few custom shell scripts to help new Arch users. StormOS offers two desktop editions: Xfce and KDE. Today, I’m taking a first look at their Xfce edition.

      • FLOSS Weekly 671: WordPress Evolutions – Matt Mullenweg, WordPress

        Matt Mullenweg, founder, CEO and president of Automattic, talks to Doc Searls and Jonathan Bennett about how WordPress—their main product and open source project—is the “dark matter of the Web.” He also tells us what’s up with Tumblr, Openverse, WooCommerce, the Gutenberg block editor, and other projects among the many the company is up to.

      • Jupiter BroadcastingLinux CEO | Coder Radio 456

        We revisit one of the core theses of the show and expand on it in a new way, leading us to ponder just what a wild ride the next eight years are going to be.

    • Kernel Space

      • Barry KaulerUpdated firmware for 5.15 kernel

        EasyOS has a script /usr/local/firmware/extract-fw-all, that I use to create a PET with latest firmware required for the current running kernel. Basically, you put all the firmware that can be found, into /lib/firmware, then run the script. The script will create a folder ‘fnd-firmware’, and file ‘missing-firmware’ listing all firmware that cannot be found.

      • Graphics Stack

        • 9to5LinuxMesa 22.0 Officially Released, Brings Vulkan 1.3 and Improves Support for Many Games

          Featuring Vulkan 1.3 support the RADV (Radeon Vulkan) and ANV (Intel Vulkan) drivers, the Mesa 22.0 graphics stack is here to introduce KHR_dynamic_rendering for Lavapipe, RADV, and ANV drivers, the VK_KHR_synchronization2 and EXT_image_view_min_lod extensions for RADV, as well as the ARB_sparse_texture, ARB_sparse_texture2, and ARB_sparse_texture_clamp extension for the RadeonSI and Zink drivers.

        • mesa 22.0.0
          Hi list!
          Due to getting sick, and then trying to catch up with the CI, we're a
          couple of weeks late, but I'd like to announce Mesa 22.0 is now
          available for general consumption.
          There's lot's of good stuff here, including Vulkan 1.3 support for most
          of your favorite drivers.
          Alyssa Rosenzweig (11):
                pan/bi: Avoid *FADD.v2f16 hazard in optimizer
                pan/bi: Avoid *FADD.v2f16 hazard in scheduler
                pan/bi: Lower swizzles on CSEL.i32/MUX.i32
                panvk: Use more reliable assert for UBO pushing
                pan/bi: Specialize IDVS in NIR
                panfrost: Fix FD resource_get_handle
                panfrost: Fix set_sampler_views for big GL
                panfrost: Handle NULL sampler views
                panfrost: Handle NULL samplers
                panfrost: Flush resources when shadowing
                panfrost: Push twice as many uniforms
          Bas Nieuwenhuizen (1):
                radv: Fix preamble argument order.
          Charmaine Lee (1):
                mesa: fix misaligned pointer returned by dlist_alloc
          Connor Abbott (4):
                ir3/spill: Fix simplify_phi_nodes with multiple loop nesting
                ir3: Use CAN_REORDER instead of NON_WRITEABLE
                ir3: Don't always set bindless_tex with readonly images
                ir3/nir: Fix 1d array readonly images
          Daniel Stone (1):
                egl/wayland: Reset buffer age when destroying buffers
          Danylo Piliaiev (3):
                turnip: Unconditionaly remove descriptor set from pool's list on free
                ir3: Limit the maximum imm offset in nir_opt_offset for shared vars
                turnip: Use LATE_Z when there might be depth/stencil feedback loop
          Dave Airlie (8):
                crocus: find correct relocation target for the bo.
                crocus: fix leak on gen4/5 stencil fallback blit path.
                draw/so: don't use pre clip pos if we have a tes either.
                lavapipe: fix sampler + sampler view leaks.
                lavapipe: reference gallium fences correctly.
                vulkan/wsi: handle queue families properly for non-concurrent sharing mode.
                crocus: change the line width workaround for gfx4/5
                gallivm/nir: extract a valid texture index according to exec_mask.
          Dylan Baker (25):
                VERSION: bump for 22.0.0-rc1 release
                .pick_status.json: Update to 0447a2303fb06d6ad1f64e5f079a74bf2cf540da
                .pick_status.json: Update to 8335fdfeafbe1fd14cb65f9088bbba15d9eb00dc
                .pick_status.json: Update to 5e9df85b1a4504c5b4162e77e139056dc80accc6
                VERSION: bump version for 22.0.0-rc2
                .pick_status.json: Update to 7955df28a6660d8dff77c79c345aa28aa7fa859c
                .pick_status.json: Update to 22fc53493092a7507c1e2db47b0c8763158d7b2d
                .pick_status.json: Update to 108e6eaa83eed3eb356f3cce835c5f5e3a836b8e
                .pick_status.json: Mark b07372312d7053f2ef5c858ceb1fbf9ade5e7c52 as denominated
                .pick_status.json: Update to 3759a16d8a883355effa435f46867951ce712dbe
                .pick_status.json: Mark a8418abd748e8e761dda9c3594e29e560833d9ff as denominated
                .pick_status.json: Update to 22efeec399fb55dcb364dabd65afab137d6f3fc3
                .pick_status.json: Update to f030b75b7d2c359b90c18ee4ed83fa05265c12e0
                .pick_status.json: Update to fd3451babd6cded6794561d74c8919576ba1f97d
                llvmpipe: remove test that passes on 22.0 for some reason from the fail list
                .pick_status.json: Update to b21e7e1ef7ba2c2cf97f073a8a01d6bc43835622
                d3d12: mark incorrectly passing tests as expected failures
                VERSION: bump for 22.0.0-rc3
                .pick_status.json: Update to 48b3ef625e1909c1be31fbe10adb53734af38eb4
                .pick_status.json: Update to 48b3ef625e1909c1be31fbe10adb53734af38eb4
                ci/zink: mark tests fixed by previous commit as fixed
                ci/zink: mark more expected passes as such
                Revert "panfrost: Fix set_sampler_views for big GL"
                .pick_status.json: Update to 342e6f83321a91816358dee82178809b2a8aeeaa
                VERSION: bump for 22.0.0 release
          Emma Anholt (1):
                i915g: Initialize the rest of the "from_nir" temporary VS struct.
          Erico Nunes (3):
                lima/gpir: avoid invalid write in regalloc
                lima/ppir: initialize slots array for dummy/undef
                lima/ppir: refactor bitcopy to use unsigned char
          Erik Faye-Lund (1):
                docs: remove incorrect drivers from extension
          Iago Toral Quiroga (1):
                broadcom/compiler: fix offset alignment for ldunifa when skipping
          Ian Romanick (9):
                gallivm/nir: Call nir_lower_bool_to_int32 after nir_opt_algebraic_late
                nir: All set-on-comparison opcodes can take all float types
                intel/fs: Don't optimize out 1.0*x and -1.0*x
                spriv: Produce correct result for GLSLstd450Step with NaN
                spirv: Produce correct result for GLSLstd450Modf with Inf
                spirv: Produce correct result for GLSLstd450Tanh with NaN
                nir: Properly handle various exceptional values in frexp
                nir: Produce correct results for atan with NaN
                nir: Add missing dependency on nir_opcodes.py
          Icecream95 (9):
                pan/bi: Add interference between destinations
                pan/bi: Check dependencies of both destinations of instructions
                panfrost: Set dirty state in set_shader_buffers
                panfrost: Re-emit descriptors after resource shadowing
                pan/bi: Make disassembler build reproducibly
                panfrost: Fix ubo_mask calculation
                pan/bi: Skip psuedo sources in ISA.xml
                pan/bi: Don't assign slots for the blend second source
          Iván Briano (3):
                anv: make the pointer valid before we assign stuff into it
                anv: only advertise 64b atomic floats if 64b floats are supported
                intel/compiler: make CLUSTER_BROADCAST always deal with integers
          Jason Ekstrand (2):
                anv: Call vk_command_buffer_finish if create fails
                anv: Don't assume depth/stencil attachments have depth
          Jesse Natalie (3):
                microsoft/compiler: Only prep phis for the current function
                microsoft/compiler: Only treat tess level location as special if it's a patch constant
                tc: CPU storage needs to be freed with align_free
          Jonathan Gray (6):
                util: unbreak non-linux mips64 build
                util: fix util_cpu_detect_once() build on OpenBSD
                radv: use MAJOR_IN_SYSMACROS for sysmacros.h include
                util/u_atomic: fix build on clang archs without 64-bit atomics
                util: fix build with clang 10 on mips64
                util: use correct type in sysctl argument
          Jordan Justen (3):
                intel/fs: Assert that old pull-const code is not used if devinfo->has_lsc
                anv: Align GENERAL_STATE_POOL_MIN_ADDRESS to 2MiB
                anv: Align state pools to 2MiB on XeHP
          Kenneth Graunke (2):
                iris: Make an iris_foreach_batch macro that skips unsupported batches
                blorp: Add blorp_measure hooks to the blitter codepaths
          Lionel Landwerlin (7):
                intel/fs: don't set allow_sample_mask for CS intrinsics
                intel/nir: fix shader call lowering
                anv: fix conditional render for vkCmdDrawIndirectByteCountEXT
                nir: fix lower_memcpy
                anv/genxml/intel/fs: fix binding shader record entry
                anv: fix fast clear type value with external images
                intel/fs: fix total_scratch computation
          Marcin Ślusarz (3):
                intel/compiler: fix array & struct IO lowering in mesh shaders
                anv: don't set color state when input state was requested
                intel/compiler: ignore per-primitive attrs when calculating flat input mask
          Marek Olšák (5):
                winsys/radeon: fix a hang due to introducing spi_cu_en
                amd: add a workaround for an SQ perf counter bug
                ac/surface: add more elements to meta equations because HTILE can use them
                radeonsi: fix register shadowing after the pm4 state size was decreased
                radeonsi: fix an assertion failure with register shadowing
          Michel Zou (1):
                vulkan/wsi: drop unused wsi_create_win32_image
          Mike Blumenkrantz (26):
                zink: disable PIPE_SHADER_CAP_FP16_CONST_BUFFERS
                llvmpipe: disable PIPE_SHADER_CAP_FP16_CONST_BUFFERS
                zink: add VK_BUFFER_USAGE_CONDITIONAL_RENDERING_BIT_EXT for query binds
                zink: use scanout obj when returning resource param info
                zink: fix PIPE_CAP_TGSI_BALLOT export conditional
                zink: reject invalid draws
                zink: min/max blit region in coverage functions
                aux/draw: fix llvm tcs lane vec generation
                lavapipe: use util_pack_color_union() for generating clear colors
                zink: ci updates
                lavapipe: ci updates
                zink: always set VkPipelineMultisampleStateCreateInfo::pSampleMask
                zink: always invalidate streamout counter buffer if not resuming
                zink: ci updates
                zink: fix cached descriptor set invalidation for array bindings
                zink: free push descriptor pools on deinit
                zink: don't free non-fbfetch dsl structs when switching to fbfetch
                gallivm: avoid division by zero when computing cube face
                zink: always update shader variants when rebinding a gfx program
                zink: use a fence for pipeline cache update jobs
                zink: wait on program cache fences before destroying programs
                zink: fix descriptor cache pointer array allocation
                zink: mark fbfetch push sets as non-cached
                zink: stop leaking descriptor sets
                zink: invalidate non-punted recycled descriptor sets that are not valid
                zink: set shader key size to 0 for non-generated tcs
          Nanley Chery (4):
                iris: Don't fast clear with the view format
                Revert "anv: Require the local heap for CCS on XeHP"
                anv: Refactor anv_image_init_from_create_info
                anv: Disable aux if the explicit modifier lacks it
          Neha Bhende (1):
                svga: store shared_mem_size in svga_compute_shader instead of svga_context
          Paulo Zanoni (2):
                iris: handle IRIS_MEMZONE_BINDER with a real vma_heap like the others
                iris: fix register spilling on compute shaders on XeHP
          Pavel Ondračka (1):
                r300: fix transformation of abs modifiers with negate
          Pierre-Eric Pelloux-Prayer (2):
                radeonsi: limit loop unrolling for LLVM < 13
                radeonsi: change rounding mode to round to even
          Qiang Yu (3):
                radeonsi: workaround Specviewperf13 Catia hang on GFX9
                radeonsi: fix depth stencil multi sample texture blit
                glx: fix pbuffer refcount init
          Rhys Perry (4):
                aco: don't encode src2 for v_writelane_b32_e64
                radv: fix R_02881C_PA_CL_VS_OUT_CNTL with mixed cull/clip distances
                anv: Enable nir_opt_access
                radv: include disable_aniso_single_level and adjust_frag_coord_z in key
          Samuel Pitoiset (3):
                Revert "radv: re-apply "Do not access set layout during vkCmdBindDescriptorSets.""
                radv/winsys: fix initializing debug/perftest options if multiple instances
                radv: enable radv_disable_aniso_single_level for The Evil Within 1&2
          Tapani Pälli (5):
                intel/genxml: add PIPE_CONTROL field for L3 read only cache invalidation
                anv: invalidate L3 read only cache when VF cache is invalidated
                iris: invalidate L3 read only cache when VF cache is invalidated
                iris: fix a leak on surface states
                mesa/st: always use DXT5 when transcoding ASTC format
          Thierry Reding (2):
                tegra: Use private reference count for sampler views
                tegra: Use private reference count for resources
          Thong Thai (1):
                radeonsi: add check for graphics to si_try_normal_clear
          Timur Kristóf (2):
                radv: Disable IB2 on compute queues.
                ac/nir/ngg: Fix mixed up primitive ID after culling.
          Xiaohui Gu (1):
                iris: Mark a dirty update when vs_needs_sgvs_element value changed
          Yiwei Zhang (1):
                venus: properly destroy deferred ahb image before real image creation
          git tag: mesa-22.0.0
    • Applications

      • Introducing Blender 3.1. Create anything, faster.
      • OMG UbuntuBlender 3.1 Released with “Major Leap in Performance”

        Blender 3.1 is performance-packed follow up to the incredibly well-received Blender 3.0 release that squeaked out at the end of last year.

        As I’m not someone who knows how to use Blender —boy do I wish I was that talented— I’m not the best person to walk you through what’s changed. But do you know who is? The Blender team themselves.

      • LWNBlender 3.1 released [LWN.net]

        Version 3.1 of the Blender artistic suite is out. The list of changes is long and can be seen in the video-heavy announcement page; it includes Apple Metal support, a new “point cloud” object, and much more.

      • Make Use OfThe 5 Best GUI Tools to Free Up Disk Space on Ubuntu

        Running out of space on Ubuntu? Use one of these top cleaners to free up disk space on your Linux computer.

        Operating systems require adequate storage space to function correctly. We all think the same initially, but unnecessary files accumulate and slow down the system with time. No matter if you are a Windows or a Linux user, you should clean up the junk files taking up disk space.

        There are multiple tools by which a user can free up the space of the system. However, the variety of tools makes it difficult to select the best out of them. If you also have confusion regarding the same, don’t worry. This guide will help you go through the top GUI tools to free up disk space on Ubuntu.

      • Network WorldUsing ClamAV to detect viruses on Linux | Network World

        One popular and easy-to-use tool for detecting virus infections on Linux systems is ClamAV. It’s open source and free, and runs on many Linux systems, Ubuntu and Fedora included. In this post, we’ll take a look at how to install and use the tool on Ubuntu, Linux Mint, and related systems.

      • Ubuntu HandbookYmuse – A Cantata Alternative MPD Client for Ubuntu / Fedora Linux | UbuntuHandbook

        Cantata has discontinued. If you’re looking for another app for Music Player Daemon, then Ymuse is a good choice for GNOME, Xfce or other GTK based desktops.

        Ymuse is a free open-source GTK front-end for Music Player Daemon, written in Go programming language. It can be used as either a player for local music playback or a client to control remote MPD, while using few resource.

      • Select Colors in Terminal with RGB-TUI

        There are several online services and places where you can select colors either RGB or Hexadecimal, or even using GIMP or any other similar software. However, having this service in terminal is really notorious!

        rgb-tui is a color picker written in C++ that is easy to install and use.

    • Instructionals/Technical

      • jmtd → log → Broken webcam aspect ratio

        I’m planning to automate the loading (and unloading) of the module and starting the ffmpeg process in response to the real camera device being plugged or unplugged, using systemd events and services. (I don’t leave the camera plugged in all the time due to some bad USB behaviour I’ve experienced if I do so.) If I get that working, I will write a follow-up.

      • Linux JournalCreating a Modern Website with Ghost | Linux Journal

        Ghost is free and open-source web server software that you can use to host a website. It’s a unique and elegant web publishing platform. Ghost provides a modern and sleek interface where you can publish articles, newsletters, and subscription-based content. It offers advanced features for monetizing your content. So, with Ghost, you can charge your subscribers a monthly fee similar to Patreon.

      • VideoHow to install the Vivaldi browser on Zorin OS 16 – Invidious
      • How to create User & add Role in MongoDB | FOSS Linux

        MongoDB is a cross-platform document-oriented database that makes data storage and retrieval fast and easy. The database uses a JSON-like structure for the documents, primarily familiar to modern applications.

        MongoDB uses collections and manuscripts whereby documents consist of key-value pairs, the basic unit of data in MongoDB. In contrast, collections contain functions and documents equivalent to relational database tables.

      • MakeTech EasierHow to Compress a Video on Android

        Sending an hour-long video to someone through your phone can take up to a few hours, depending on the file size. Not only will it cost you time, but it also eats up a chunk of your Internet plan. Luckily, you can easily compress these videos on your Android phone using a video compressor app. We show you two of these apps below.

      • Trend OceansHow to Install the latest qBittorrent on Linux – TREND OCEANS

        qBittorrent is an open-source peer-to-peer Bittorrent client which is available for all platforms: Windows, Linux, macOS, FreeBSD, and OS/2. You can use this as an alternative to µTorrent.

        In addition, it is based on the Qt toolkit and the libtorrent-rasterbar library.

        In this article, you will see multiple ways to install qBittorrent on your Linux machine. On the qBittorrent homepage, they say, “Go ahead and try qBittorrent, you won’t regret it!”

      • UNIX CopHow to install php-oci8 on Ubuntu

        OCI functions allows access to Oracle databases, but, at least in Ubuntu, aren’t included in the default PHP installation. This article will show you how to install php-oci8 on Ubuntu LTS. From the PHP manual:

        «They support SQL and PL/SQL statements. Basic features include transaction control, binding of PHP variables to Oracle placeholders, and support for large object (LOB) types and collections. Oracle’s scalability features such as Database Resident Connection Pooling (DRCP) and result caching are also supported.»

      • Linux Made SimpleHow to install Netbeans 13 on a Chromebook

        Today we are looking at how to install Netbeans 13 on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • How to Install Gatsby on Ubuntu 20.04 – RoseHosting

        Gatsby is a fast modern site generator for React. It is an open-source framework that combines the functionality from React, GraphQL, and Webpack for building static websites and applications.

        Gatsby is more than just a static site generator, it allows the web developers to build websites using React and work with any data source (CMSs, Markdown, etc) of their choice. In this tutorial, we will show you how to install Gatsby on Ubuntu 20.04.

      • VideoHow to install Archman 2022.03 – Invidious

        In this video, I am going to show how to install Archman 2022.03.

      • ID RootHow To Install Atom Text Editor on AlmaLinux 8 [Ed: Aren't there more than enough decent editors that aren't controlled by Microsoft to promote proprietary software?]

        In this tutorial, we will show you how to install Atom Text Editor on AlmaLinux 8. For those of you who didn’t know, Atom is a free, cross-platform, and open-source graphical software that has been designed for programmer’s editor application that helps the developer to write code without too much hassle. The Atom text editor supports almost all operating distributions such as Linux, Windows, and macOS.

      • LinuxiacHow to Install and Secure MariaDB on Debian 11

        In this tutorial, you will learn how to install MariaDB on Debian 11 “Bullseye” from the official Debian repository. The article also shows you how to secure MariaDB, add an admin user, and connect to the database management system from the command line.

        MariaDB is an open-source RDBMS (Relational Database Management System), backward compatible, binary drop-in replacement of MySQL. It is being developed by several of MySQL’s original developers as well as a large number of community members.

        Compared to MySQL, MariaDB provides improved performance with faster replication speeds, tighter security measures, and additional storage engines.

      • Install Erlang on Debian 11/Debian 10 – kifarunix.com

        This tutorial provides a step-by-step guide on how to install Erlang on Debian 11/Debian 10. According to erlang.org, Erlang is a programming language used to build massively scalable soft real-time systems with requirements on high availability. Some of its uses are in telecoms, banking, e-commerce, computer telephony and instant messaging. Erlang’s runtime system has built-in support for concurrency, distribution and fault tolerance.

      • How To Backup Ext2, Ext3, Or Ext4 File Systems In Linux [Updated] | Itsubuntu.com

        In this tutorial, we will show you the steps to take backup of Ext2, Ext3, or Ext4 file systems in Linux-based operating systems. You should be cautious while taking the backup of the Ext2, Ext3, or Ext4 file systems in Linux as the operating system that you are currently using is mounted on the file system on Linux which you won’t be able to copy in active mode. In this post, we will see how to backup Ext2, Ext3, or Ext4 file systems in Linux.

      • How to Set the Time Zone in Linux

        Time zones can get complicated, especially if you and your Linux server are located in different zones.

        Intended to help people keep daytime and evening hours straight anywhere in the world, time zones don’t really matter to a computer. It’s usually best to set your Linux time zone to match yours or the one most of your users observe.

        Fortunately, it’s easy to configure the time zone on Linux even after installation. Here’s how.

      • TechRepublicHow to quickly deploy a Linux distribution with GUI applications via a container | TechRepublic

        If you need to spin up a quick Linux desktop for development or testing purposes, one of the easiest is with a new tool called Distrobox. Jack Wallen shows you how.

      • TechRepublicHow to migrate the HOME directory on Linux | TechRepublic

        I’ve had a few instances in which relocating the HOME directory on either a Linux desktop or server was necessary. This could be because of space or security issues. Either way, it might seem like a rather daunting task to migrate the directory containing all user files and directories from one drive to another. Although it is a bit of a lengthy process, it’s not all that difficult.

    • Games

      • The VergeGoogle hints at Windows games running on Stadia – The Verge

        Google appears to have built its own solution for running Windows games on Stadia. Google is planning to detail its Windows “emulator” for Linux next week at the company’s Google for Games Developer Summit on March 15th. Reddit users have spotted a session at the summit that will detail “how to write a Windows emulator for Linux from scratch.”

        The session will be led by Marcin Undak, on Google’s Stadia porting platform team, and promises a “detailed overview of the technology behind Google’s solution for running unmodified Windows games on Stadia.” It appears that Google has built its own Windows emulator for Linux to help developers port games to the service without having to modify titles for Linux.

      • Tom’s GuideStadia’s not dead — and this one idea could shape the future of gaming | Tom’s Guide

        Google Stadia has had a rough life cycle so far. After debuting to middling reviews, it had to suffer through a slowly growing library, a limited user base and the shuttering of its first-party studios. But Stadia is still alive and kicking, and Google intends to prove it next week. The company plans to host five Stadia panels for developers and publishers, and one of them could have huge implications for PC gaming as a whole.

      • GamingOnLinuxThere’s already over 1,200 titles either Verified or Playable for Steam Deck | GamingOnLinux

        While there are issues with the Deck Verified system, Valve continues on noting down more titles as being either Deck Verified or Playable.

        As of publishing time there’s now 1,214 going by Valve’s own list, which is a huge number for a gaming device that has only just recently released. With 660 Verified and 554 Playable. One of the biggest titles to appear recently of course was Apex Legends, the massively popular Battle Royale.

        Remember though: not being Verified or Playable doesn’t mean it won’t work, it just means it hasn’t been through Valve’s formal certification yet.

      • HowTo GeekApex Legends Is Coming to Linux Thanks to the Steam Deck

        If you’ve been worried about whether you’d be able to play Apex Legends on your Steam Deck, you no longer need to worry, as the game has officially been verified to work on Valve’s Linux-based handheld gaming PC.

      • PerlThe benefits of change, from an amateur’s objective perspective. | Saif [blogs.perl.org]

        As a bystander in the evolution of Object-Oriented Programming in Perl, and someone who is really only just starting to get the hang of Perl modules and packages (still not any good at it), I get really quite overwhelmed by ideologies. There is considerable debate about the right way to program things, the right style, the right direction that Perl should go. It is Vim vs Emacs, Atari ST vs Amiga, Mods vs Punks. Really one needs a language to do what one needs it to do, simply, quickly and consistently. For an amateur, Perl has been able to do exactly that for me. I code rubbishly, but hey, who’s looking?

        But when you look at the clever people in the Perl community, you wonder. You wonder whether you are missing out by not being engaged in the evolutionary process. It is bewildering. I confess I understand a mere fraction of the terms, the rationale, the higher order coding discussions. I have read about Corinna, marvelled at Moose’s capabilities, gazed admiringly at Leonerd’s prowess, but do not dip my coding toes into the water. You see, I cant swim.


        Pong was developed, a game with Sprites. The sprites contained position and motion data and the info required to draw the sprite, all contained in a hashRef, which could be passed to subroutines for processing. e.g my $sprite={x=>10….};. This was a deliberate precursor for later conversion into a blessed object e.g. my $sprite=Sprite->new(x=>10,…);, all in all a seemingly painless transformation. The sprite modules that were created from that were initially classic Packages, then eventually as classes using Object::Pad. If I can figure it out I will also use Moo. For the moment the code versions remain monolithic until we have tested it/extended it enough.

    • Desktop Environments/WMs

    • Distributions

      • Bryan Lundukeelementary OS is imploding

        elementary OS, a Linux distribution that is currently ranked as one of the top 10 distros (according to DistroWatch.com), appears to be in the process of completely imploding on itself.

        The Short Version: The company behind elementary OS has been losing money for quite some time. Two co-founders are not pleased with each other and are attempting to part ways… and it is getting messy.

        Below is the full text, as posted to Twitter by elementary founder Daniel Foré. Some portions are bolded by me for emphasis.

      • LWNLunduke: elementary OS is imploding [LWN.net]

        Users of the elementary OS distribution may want to be aware of the turmoil in its parent company, as reported by Brian Lunduke. “The Short Version: The company behind elementary OS has been losing money for quite some time. Two co-founders are not pleased with each other and are attempting to part ways… and it is getting messy”.

      • BSD

        • NetBSDMaking RockPro64 a NetBSD Server

          The time has come to upgrade my SunBlade 2500s to something more power friendly and faster. I’d already removed one CPU and thus half the ram from two of these systems to reduce their power consumption, but it’s still much higher than it could be.

          After much searching, I’ve decided on Pine64′s RockPro64 4GiB ram model (technically, only 3.875GiB ram.) Pine64 make SBCs, laptops, phones, and various other mostly ARM gadgets, and the RockPro64 has the fastest CPU they ship (Rockchip RK3399), and can use a small “NAS Case”, that is sufficient to house 2 HDDs and, at a stretch, upto 6 SSDs (cooling would become quite an issue at this point.)

          In my SATA setup, I have 3 SSDs with a JMicron 585 card in the PCIe slot, two SSDs in the NAS case SSD region, and the third is in the HDD region with an adapter. I have used two SATA power splitters to convert the NAS case’s 2 SATA power ports into 4, with the 4th one also powering a Noctua case fan. The cabling is not great with this, with enough SATA power cabling for 6 devices to lay. Probably a bespoke power cable to connect to the RockPro64 would make this nicer and probably improve cooling slightly, but I’m just using off-the-shelf components for now.

      • IBM/Red Hat/Fedora

        • Red Hat OfficialBuilding containers by hand using namespaces: The net namespace | Enable Sysadmin

          Learn how to use the net namespace to configure point-to-point namespaces, isolate processes, and control which applications can access a VPN.

        • Red Hat OfficialRed Hat Satellite 6.10.3 has been released

          We are pleased to announce that Red Hat Satellite 6.10.3 is generally available as of March 9, 2022.

          Red Hat Satellite is part of the Red Hat Smart Management subscription that makes it easier for enterprises to manage patching, provisioning, and subscription management of Red Hat Enterprise Linux infrastructure.

        • IBM DeveloperUse our browser-based, no-code/low-code developer sandbox to try new technologies – IBM Developer

          As a developer, you need to be able to try and test new software and tools, but the process can be tedious. You often need to download the source code and reconfigure your entire local environment to deploy it. The process is a bit like being asked to assemble a car before giving it a test drive.

          The IBM Developer Technology Sandbox is a turnkey solution for you to test drive software. The browser-based, no-code/low-code sandbox enables developers to try new technologies, whether you are trying to extend your application stack or build new skills.

          Explore the pre-built applications and use the step-by-step instructions to run them with the click of a button. These applications are built on a combination of various IBM and IBM partner technologies, including APIs, cloud services, and more.

        • Secure Boot Statements [Ed: Secure [sic] is not about security but about control over computer users]

          I have said some things about secure boot and my involvement here.
          I will try to say the same things monthly from here on out. The current plan is for them to appear dated in this folder.
          That said, I am human and will probably forget sometimes. So while I encourage keeping an eye out for them, it’s probably best to reach out if I miss one and not worry too much unless several get missed.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Web Browsers

        • Mozilla

          • Jean-François Fortin TamJean-François Fortin Tam: Please adapt Mozilla’s code so that PDF readers on Linux can handle XFA forms!

            Well, in Q4 2021, Mozilla’s PDF.js landed support for XFA PDF forms, so Firefox is now able to deal with them, which is huge deal, as we have been increasingly encountering such documents over the years, and still will be for a long time, especially given how slow-moving governments can be when it comes to their digital practices.

            It would be fantastic to see these code insights put to use in Poppler, the library that Evince, Okular and other applications use… so if someone feels like fixing one of the few biggest issues with reading/filling PDFs under Linux, please use this code (see also: all the XFA-related pull requests) as inspiration to contribute a fix to this and that issue in Poppler!

          • MozillaData@Mozilla: Documenting outages to seek transparency and accountability [Ed: Mozilla proudly spying on Firefox users, then looking for ways to justify that]

            The internet doesn’t just have a simple on/off switch — rather, there are endless ways connectivity can be ruptured or impaired, both intentionally (cyber attacks) and unintentionally (weather events). While a difficult task, knowing more about how connectivity is affected and where can help us better understand the outages of today, as well as who (or what) is behind them to prevent them in the future.


            “Mozilla is excited to make our relevant telemetry data available to researchers around the world to aid efforts toward transparency and accountability. Internet outages can be hard to measure and it is very fortunate that there is a dedicated international community that is focused on this crucial task. We look forward to interesting ways in which the community will use this anonymous dataset to help keep the internet an open, global public resource,” says Daniel McKinley, VP, Data Science and Analytics at Mozilla.

          • Firefox Add-on Reviews: The pandemic changed everything — even the way we use browser extensions

            On March 11, 2020 the World Health Organization declared COVID-19 a global pandemic. Within days, practically the entire planet was on lockdown. We went indoors and online.

            So how did the sudden mass migration online impact browser extension usage? Pretty dramatically, it turns out. On this two-year mark of the start of the pandemic we looked back at Firefox extension installs and usage data to discover several compelling trends.

      • Programming/Development

        • Rust

          • Lang team March update

            Two weeks ago, the lang team held its March planning meeting (minutes). We hold these meetings on the first Wednesday of every month and we use them to schedule design meetings for the remainder of the month.

        • Java

          • The Register UKApache Software Foundation releases NetBeans 13 • The Register

            The Apache Software Foundation has released version 13 of its NetBeans open-source IDE for Java, PHP, Javascript and other languages.

            The new version also upgrades support for two of the main build-automation tools out there: Apache’s own Maven, and the Gradle tool used for Android development.

            Additionally, the updated IDE builds in the nb-javac compiler, its fork of the standard Java Development Kit’s javac compiler. The release notes claim that this will make the “startup experience simpler and smoother”.

            It also defaults to the new FlatLaf theme’s Light mode by default. (Yes, there’s a Dark mode, too.) FlatLaf is a fashionably Flat Look and feel for Swing apps, inspired by the look of the rival IntelliJ IDEA IDE – and also able to import third-party IDEA themes. FlatLaf can also scale to support HiDPI displays.

  • Leftovers

    • Science

      • TediumFluorescent Multilayer Disc History: Innovation You Could See Through

        We don’t talk enough about vaporware over here, so let’s discuss two attempts to make optical discs fluorescent … both of which went absolutely nowhere.

        When it comes to technology, it’s easy to get hyped up about something that sounds cool, but turns out to be a bunch of hooey. Theranos, currently the subject of a Hulu miniseries, is the most famous recent example of this, but there are plenty of others out there where an idea seems to briefly draw in the attention of lots of people, only for the idea to look a lot less awesome close-up. That’s often when it becomes vaporware—and it happens even to established companies. The once-prominent Wang Laboratories, for example, once announced 14 products in a single day, but failed to release most of them, reflecting broader challenges facing the company. In this spirit, I’d like to consider a couple of unusual attempts to take the optical disc far beyond the limitations that we think of it having today. For at least one company, it looked like, at least for a brief moment, it had something as good as the tiny vial of blood Theranos was pitching—a disc that promised an insane amount of storage, despite the medium itself being transparent. (And it wasn’t the only one!) Today’s Tedium takes a look at two turn-of-the-century efforts to make optical discs fluorescent. Just like the discs themselves, you couldn’t see the finished products in the end.

    • Integrity/Availability

      • Proprietary

        • Security

          • LWNSecurity updates for Wednesday

            Security updates have been issued by Debian (kernel, linux-4.19, spip, and thunderbird), Fedora (cyrus-sasl and libxml2), Mageia (firefox and thunderbird), openSUSE (buildah and tcpdump), Red Hat (cyrus-sasl, kernel, kernel-rt, and kpatch-patch), Slackware (kernel), SUSE (buildah, kernel, libcaca, and tcpdump), and Ubuntu (linux, linux-aws, linux-aws-5.13, linux-azure, linux-azure-5.13, linux-gcp, linux-gcp-5.13, linux-hwe-5.13, linux-kvm, linux-oem-5.14, linux-oracle, linux-oracle-5.13, linux-raspi, linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4, linux-azure-fde, linux-bluefield, linux-gcp, linux-gcp-5.4, linux-gke, linux-gke-5.4, linux-gkeop, linux-gkeop-5.4, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4, and linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-dell300x, linux-gcp, linux-gcp-4.15, linux-hwe, linux-kvm, ilinux-lts-xenial, linux-oracle, linux-raspi2, linux-snapdragon).

          • USCERTUpdated: Conti Ransomware [Ed: Microsoft Windows TCO]

            CISA, the Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and the United States Secret Service (USSS) have re-released an advisory on Conti ransomware. Conti cyber threat actors remain active and reported Conti ransomware attacks against U.S. and international organizations have risen to more than 1,000.

            CISA, the FBI, NSA, and the USSS encourage organizations to review AA21-265A: Conti Ransomware, which includes new indicators of compromise, for more information. See Shields Up and StopRansomware.gov for ways to respond against disruptive cyber activity.

          • ISTIO-SECURITY-2022-004

            The Istio control plane, istiod, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted or oversized message, to crash the control plane process. This can be exploited when the Kubernetes validating or mutating webhook service is exposed publicly. This endpoint is served over TLS port 15017, but does not require any authentication from an attacker.

          • Announcing Istio 1.13.2
          • Announcing Istio 1.12.5
          • Announcing Istio 1.11.8
          • LWN2 New Mozilla Firefox 0-Day Bugs Under Active Attack (The Hacker News) [LWN.net]

            According to this report on The Hacker News, there are a couple of recent Firefox vulnerabilities that are currently being exploited.

          • Hacker News2 New Mozilla Firefox 0-Day Bugs Under Active Attack — Patch Your Browser ASAP!

            Mozilla has pushed out-of-band software updates to its Firefox web browser to contain two high-impact security vulnerabilities, both of which it says are being actively exploited in the wild.

          • LWNToday’s Spectre variant: branch history injection

            A few days prior to the expected 5.17 release, the mainline kernel has just received a series of Spectre mitigations for the x86 and ARM architectures. The vulnerability this time is called “branch history injection”; it has been deemed CVE-2022-0001 and CVE-2022-0002.

          • Fear, Uncertainty, Doubt/Fear-mongering/Dramatisation

            • ‘Dirty Pipe’ Linux Vulnerability Allows Overwriting Data In Arbitrary Read-Only Files [Ed: Spamnil’s site joins the FUD club]

              Security researchers detailed a Linux vulnerability allowing an attacker to overwrite data in arbitrary read-only files. The vulnerability, known as CVE-2022-0847 or “Dirty Pipe” leads to privilege escalation as unprivileged processes can inject code into root processes. According to security researcher Max Kellermann, it is similar to CVE-2016-5195 “Dirty Cow” but is easier to exploit. Dirty Pipe has been a vulnerability in Linux Kernel since 5.8 and has been fixed in Linux 5.16.11, 5.15.25 and 5.10.102.

            • Video“Dirty Pipe” Is The Worst Linux Exploit In Years – Invidious [Ed: Spreading falsehoods for the anti-Linux media operatives]

              There are some crazy Linux exploits and this is certainly Dirty Pipe is certainly high up there, this exploit is similiar to an earlier exploit called Dirty Cow and allows you to almost complete bypass system permissions.

            • IT World CACyber Security Today, March 9, 2022 – Warnings to Linux and HP device administrators, Samsung confirms data theft and more | IT World Canada News [Ed: How to hype up local privilege escalation]

              Linux administrators and developers are urged to update to the latest version of the kernel or their Linux distribution after the discovery of a major vulnerability. The problem is in Linux kernels going back to version 5.8. It allows an attacker to overwrite supposedly read-only files. That could lead to an escalation of data access privileges because an attacker could inject malware into root processes. The vulnerability has been disclosed to the Linux kernel security team and the Android security team. The bug has to be patched in Android.

          • Privacy/Surveillance

            • AccessNowNew guide: surveillance technology investors face significant risks if human rights are ignored – Access Now

              A new guide launched today on effective due diligence will help shareholders with investments in the surveillance technology ecosystem identify, assess, prevent, and mitigate increasing human rights and other material risks. The intrusive and pervasive nature of these emerging technologies has led to invasions of privacy, violence, and discrimination, frequently against marginalised communities. However, for those investing in this rapidly developing industry there is still a long way to go to fully recognise the significant threats involved – and their critical role in preventing and mitigating them.

              Investors have a responsibility to ensure their portfolio companies are respecting human rights and are not unnecessarily exposed to legal, reputational, and financial risks. Navigating the Surveillance Technology Ecosystem: A human rights due diligence guide for investors provides shareholders with a deeper understanding of the potential human rights issues going unnoticed in their portfolio companies’ value chains and a framework for making rights-respecting investment decisions. Based on consultations with digital rights advocates, due diligence modeling experts and investors, the Guide is ultimately designed to help investors advance corporate accountability throughout the surveillance technology ecosystem.

            • Some discouraging anecdotes on how services handle account deletions

              The General Data Protection Regulation (GDPR) came into force in May 2018. It gave European Union (EU) and European Economic Area (EEA) citizens many new rights, including Article 17: [the] Right to erasure. Article 17 gives citizens the right to have companies delete their personal data.

              In late May 2021, I decided to clean my password manager vault of unused accounts and services. I had 421 entries in my password manager and managed to get it down to 297. It took 5 hours and 10 minutes to go through the 124 unwanted entries and figure out how to request their deletion. I also spent at least as much time over the following weeks just following up on deletion requests.

              The experience was a mixed bag. I gathered some statistics along the way, and I’ll share some highlights in this article. I won’t name and shame any companies, sorry.

              Many services have self-service account deletion tools, but often hide them so well that I failed to locate them without deferring to their customer support. On average, it took 24 interactions (menu clicks, password entries, etc.) after an initial login to request and confirm a deletion request.

    • Finance

      • Walmart closes the stores at night because the prices go up so fast and they don’t want you to see them do it. – BaronHK’s Rants

        Walmart closes the stores at night because the prices go up so fast and they don’t want you to see them do it.

        Inflation in the United States is now so bad that in the last month, groceries have gone up in price more than they have in the last 8 years before that.


        Since 2020, Walmart has raised the price of Coca Cola by 35%.

        My spouse, who is from the Philippines and is not used to living in a “normal” country with “real money” says “this just happens, even in the Philippines”. It’s not normal for prices to go up this fast in America. In fact, it hasn’t happened in my lifetime. You read about it happening in the 1970s, but things were different then. Wages kept up with it. Everyone was furious, but wages kept up.

    • Civil Rights/Policing

      • Public KnowledgeShould Algorithms Be Regulated? Part 2: Cataloging the Harms of Algorithmic Decision Making – Public Knowledge

        This is the second in a series of blog posts from Public Knowledge examining the public policy implications of algorithmic decision-making. We are responding in part to a series of legislative proposals over the past year or so targeted at the advertising-based business model that motivates platforms to use algorithms to distribute content based primarily on a profit motive rather than the public interest (e.g., Algorithmic Justice and Online Platform Transparency Act, the Ban Surveillance Ads Act, the Algorithmic Accountability Act, and the Social Media Nudge Act). In order to create appropriate policy solutions, we have to understand the nature of the harms that can arise from algorithmic decision-making about content, including ​​ad targeting and delivery, content moderation, and content ranking and recommendation systems. This blog post catalogs what we have learned about algorithmic harms from these systems in three broad categories: (1) harms to safety and well-being; (2) harms to economic justice; and (3) harms to democratic participation. One important theme that unites all the harms across these categories is that their impact is too often concentrated on historically disadvantaged communities.

        We acknowledge at the outset that there are other, and in some cases more virulent, harms associated with algorithmic decision-making that are not focused on content distribution, including harms that arise from facial recognition, deepfake technologies, law enforcement access to social media, technologies used in criminal justice laws, employment, rental housing and real estate buying, credit and lending, and health care, to name a few. We also don’t mean to suggest that the harms we will catalog arise exclusively from algorithmic decision-making. In fact, we hope algorithmic decision-making could one day mitigate cultural biases and disparate outcomes that arise from human decision-making (predicated on adequate reform of systemic inequities).

        Additionally, our catalog of harms associated with platforms’ content distribution is by no means exhaustive, or mutually exclusive. There are complicated intersections and relationships among them and policy solutions, which we will discuss in later posts, need to reflect those intertwined complications and relationships. And lastly, any proposal we support will be consistent with the First Amendment, which gives full protection to a wide range of “harmful” speech. At Public Knowledge, we are not proposing to ban any kind of legally-protected speech. However, we encourage platforms to create policies and digital tools to minimize harms. We also recognize that social media companies, advocates, and government stakeholders disagree about what constitutes “harmful” speech, based on different personal and community values, and perspectives.

    • Internet Policy/Net Neutrality

      • T-Mobile Google Play problems: Part 3 – BaronHK’s Rants

        This evening I called T-Mobile support and eventually got fielded around to someone who knows what’s going on.

        He confirmed that the Google Play problems are related to their tower upgrades and shutting down the last of the Sprint network.

        Internally, T-Mobile uses a VPN to route certain traffic, including the Play Store, even if you’re not using one of their devices, and something in that setup got messed up. They said they are aware of it and it should eventually go away, but to “keep using the VPN app” to get Google Play to work until it’s fixed.

        By using NordVPN, it forces it to tunnel over the internet instead of internally at T-Mobile, through NordVPN’s server, and reach the Google Play store over the Internet, through NordVPN.

    • Monopolies

      • Patents

        • MondaqUK: Inventive Step At The EPO – Plausibility And Post-Published Evidence (G2/21)
        • Cereno Scientific : solidifies CS1′s patent protection with new European patent
        • USPTO rules Broad owns CRISPR animal cell editing patents

          Patents core to the breakthrough gene-editing technology CRISPR belong to the University of Harvard and the Massachusetts Institute of Technology’s Broad Institute, the US Patent and Trademark Office (USPTO) has ruled.

        • Understanding Relief of Patent Novelty Loss In Japan.

          Loosing novelty regarding patents is a vital issue globally. It should be well understood in order to avoid the potential business and value loss than it can entail.

          In Japan, when an invention is disclosed to the public before a patent filing, such as if the product is posted on the web, published in a newspaper or magazine, and / or an explanation is given so that the invention can be understood, the novelty is lost “by the inventor’s own actions”. However, if an application is filed within one year from the date of said loss of novelty, the Japan patent Office (JPO) examination will be concluded as “not losing novelty” (Article 30 of the Japanese Patent Law). This is called an “exception for loss of novelty.” This treatment is similar in the United States, although with even broader exceptions there than in Japan (US Patent Law, Article 102).

          On the other hand, the European EPO (European Patent Office) is very strict in this regard: there are very few allowable reasons for relief from loss of novelty, and such relief will be typically be denied at the EPO. China is equally strict as it uses the EPC (European Patent Law) as a model to create Chinese Patent Law. Therefore, when Japanese applicants apply for the exception of loss of novelty outside of Japan, it is a very critical situation and you need to be careful.

        • European Patent Office Halts Work With Russia, Belarus

          The European Patent Office on Tuesday said it will end its cooperation with Russia and Belarus’ patent offices following Russian President Vladimir Putin’s invasion of Ukraine.

          The EPO said it stands “in solidarity with all those suffering from the appalling violence in Ukraine and all refugees seeking safety in other countries,” and that it had decided to pause its cooperation with the Russian and Belarusian patent agencies, as well as the Eurasian Patent Organization.

          The Munich-based agency said it will consider further actions and “consequences” ahead of its next administrative council meeting on March 22.

          “Our office was founded in the spirit of European and international cooperation,” the EPO said. “We stand for peace, progress and prosperity, with staff drawn from across the 38 contracting states of the European Patent Convention.”

        • EPO cuts ties with Russia
        • USPTO Cuts Ties With Russia Following Ukraine Attacks

          The U.S. Patent and Trademark Office announced Friday that it has severed ties with its Russian equivalent over the invasion of Ukraine, mirroring a similar move by the European Patent Office earlier this week.

          The USPTO said in a statement on its website that it suspended communication with Russia’s federal patent and trademark agency, known as Rospatent, as well as the Eurasian Patent Organization, a Russia-based international patent agency.

          According to the USPTO, the move is a reflection of guidance handed down by the U.S. Department of State regarding the Russian invasion.

        • BloombergU.S. Patent Office Won’t Engage Russia, Eurasian Patent Group

          The U.S. Patent and Trademark Office has stopped engagement with officials from Rospatent, Russia’s agency in charge of intellectual property, following the military invasion of Ukraine, the USPTO said.

        • MondaqEPO And UKIPO Make Statements On Ukraine

          The EPO has issued a statement on its website entitled “Standing together for peace in Europe”, announcing that it has frozen co-operation activities with the Federation of Russia and of Belarus. The EPO will assess and debate other possible measures and consequences with the 38 Member States, extension states and observers in preparation of the next Administrative Council meeting on 22 March. Ukraine itself is not one of the 38 Member States of the European Patent Organisation, nor an extension state. However, Ukraine has been a PCT contracting state since 1991.

      • Trademarks

      • Copyrights

‘Influencers’ Gaming the Web of Videos (GulagTube)

Posted in Deception, DRM, GNU/Linux, Videos at 3:39 pm by Dr. Roy Schestowitz

Video download link | md5sum 74edc4f1f314192a30dd535a8be1b086
Gaming YouTube for Fun and Profit
Creative Commons Attribution-No Derivative Works 4.0

Summary: Charlatans with channels in GulagTube (YouTube) are selling their audiences and discarding their principles in the process; the net effect is misinformation, usually with no disclosure added anywhere inside videos or near videos

LAST month we showed that "YouTube is Becoming Mostly SPAM" and we recently mentioned ways to bypass Google's ads/spying. That does not compensate for the underlying videos however. Many of them are spammy (like webspam with video as medium of choice), typically without any disclosure/s, and they’re gaming the video-centric search results (akin to SEO).

It is very important if not crucial to properly understand what the Web has become and is still becoming (it only gets worse over time).

I have a million subscribers, according to GoogleIt gets even worse when it comes to the so-called ‘Linux’ Foundation, e.g. Spamnil claiming to have 20,000 subscribers in YouTube while he can barely get 20 views on his videos [1, 2] (too difficult to overlook this anomaly).

Fake “social” “media” like Twitter lets people literally purchase fake “followers” and in YouTube companies buy ads disguised as news, or marketing spam disguised as honest information from “dormitory bros”. Fakes are also OK with them. They just need to make themselves seem popular. The “unlike” button was removed, so gaming of reviews is far too easy. It’s like AstroTurfing.

It’s not entirely unknown that many of the so-called self-labeled ‘influencers’ are corporate spam, shilling products and selling audiences to them. In the video above I focus on one particular example, to which I devoted about 15 minutes. There are many more examples like it, sometimes resulting in bans. The self-labeled ‘influencers’ jump to each other’s defence, trying to protect the practice. At whose expense do they do their ‘influencing’?

As one person has just put it in our IRC network, “they’re pawns for the highest bidders, ready to shill at command. GulagTube turned from a hobby to a “job” where you strive to earn the most money even if it means selling out.”

The Latest EPO Greenwashing Spin is Truly a Hoot

Posted in Deception, Europe, Patents at 2:05 pm by Dr. Roy Schestowitz

Video download link | md5sum 9832b7a044c4d189e0853bea9e430b26
EPO Lowers the Bar, Compensates With Greenwashing
Creative Commons Attribution-No Derivative Works 4.0

Summary: The EPO is making the services worse (whilst increasing the fees); to compensate for the removal of traditional processes that don't require a computer or electric sockets the EPO resorts to Public Relations and doublespeak

Greenwashing is a frequently-practised ritual of the EPO‘s management. They casually drop terms like “sustainability” or “renewable” to cover up the EPO’s misconduct. The practice is so frequent that we’ve quit covering the issue as often as it turns up, again and again and again

Green vehiclesThis latest example of it (warning: epo.org link), which is only hours old, did merit a comment. The EPO keeps presenting itself as a champion of the environment, usually for granting monopolies on things that can save the planet (hence limiting the availability of certain technologies).

The EPO is generally full of patent examiners with a scientific background, so these puff pieces with lots of euphemisms inside them probably don’t fool the examiners. But the target audience of these puff pieces isn’t the examiners. The managers cannot manipulate minds that aren’t gullible. They just try to keep politicians and regulators off their backs.

Green parking
A parking slot reserved for cars that send their emissions to the power plants

Credit to MinceR for those photos (original source unknown)

Links 9/3/2022: Dedoimedo Dumping Windows and Plasma 5.24.3 Comes to Kubuntu 21.10

Posted in News Roundup at 1:54 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • DedoimedoMoving away from Windows – the software checklist

        There you go. A very early, rudimentary plan for what I have in mind. Now, if I look at my computer usage over the past 10-15 years, it has changed quite a bit. Less Windows and significant fewer Windows-based software, more Linux and more serious Linux cases. I have, in a way, started this migration a long time ago, only now I’ve realized that it needs to be finished.

        I am not happy that this is what I must do. But hey. Using Windows has become onerous. Even in Windows 10 Pro, I have to deal with low-IQ nonsense that simply has no place in a professional system I’ve paid for. Not in the mood to be the padding for the bonus for some marketing person somewhere. Treat me with respect, and we will have common ground. I’ve spend thousands of dollars on Microsoft products over the years, including several Windows Phones and whatnot. Not anymore. No settings headerbar rewards, no Edge begging to be default browser, no advertising ID, no cloud this or that, none of that nonsense.

    • Applications

      • Linux LinksBest Free and Open Source Alternatives to Corel PaintShop Pro

        Corel Corporation is a Canadian software company specializing in graphics processing. They are best known for developing CorelDRAW, a vector graphics editor. They are also notable for purchasing and developing AfterShot Pro, PaintShop Pro, Painter, Video Studio, MindManager, and WordPerfect.

        Corel has dabbled with Linux over the years. For example they produced Corel Linux, a Debian-based distribution which bundled Corel WordPerfect Office for Linux. While Corel effectively abandoned its Linux business in 2001 they are not completely Linux-phobic. For example, AfterShot Pro has an up to date Linux version albeit its proprietary software.

      • Its FOSSPiwigo: An Open-Source Google Photos Alternative

        Google Photos is one of the most popular options to back up your photos and videos.

        Considering that it is the default choice for most Android phones, it is a seamless experience managing photos/videos using Google Photos.

        But, what if you want to move away from it for something open-source and more privacy-friendly? Not just from Google Photos, from proprietary photo hosting platforms overall.

      • 9to5LinuxBlender 3.1 Released with Lots of Performance Improvements, Other Changes

        Coming two months after Blender 3.0, the Blender 3.1 update is all about performance and speed to make Blender faster and more reliable. For example, it brings performance improvements to Mesh Vertex and Face Normals, as well as to Blender’s procedural system, which also received 19 new nodes, mesh modeling tools, advanced Fields control, access to time, and much more.

        Blender 3.1 also adds support for the new Point Cloud object to be rendered directly with Cycles when creating sand, water splashes, particles, or motion graphics, support for Pixar OpenSubDiv for modeling, rendering, as well as Alembic and USD import and export, and faster workflow by dragging sockets to get a list of automatically filtered nodes.

    • Instructionals/Technical

      • Linux CapableHow to Install Neofetch on Linux Mint 20 – LinuxCapable

        Neofetch is a free, open-source command-line system information tool written in bash 3.2+. Neofetch displays system information in a beautiful aesthetic way, such as system, software, memory resources, kernel version, and much more.

        In the following tutorial, you will learn how to install Neofetch on Linux Mint 20 using the command line terminal with examples on how to maintain and remove the application with bonus command examples.

      • Linux CapableHow to Install MyPaint on Linux Mint 20 – LinuxCapable

        MyPaint is a free, open-source digital painting program that you can edit your artwork. It has many features for easy to create backgrounds and figures on canvas or paper! For users migrating from Windows and using the native paint program, this feels similar to it but has much more features.

        In the following tutorial, you will learn how to install MyPaint on Linux Mint 20 using two different methods, which are APT and Flatpak and how to maintain remove in the future using the command line terminal.

      • How to Use SharedPreferences to Store App Settings With Flutter – CloudSavvy IT

        SharedPreferences is a module bringing the functionality of Android’s eponymous API to your cross-platform Flutter apps. It uses Apple’s similar NSUserDefaults API when running on iOS and macOS. Implementations are also included for Linux and Windows so it’ll run everywhere Flutter apps can.

        In this guide, we’ll show how you can use SharedPreferences to persist simple settings within your app. The module is best used for small pieces of non-essential state such as user preferences, saved bookmarks, and cached config values sent by a server.

      • How to Add, Replace, and Remove Docker Image Tags – CloudSavvy IT

        Docker uses tags to identify distinct versions of an image. In common with the broader container community, tags should be used to mark each release so users can select between different versions.

        Tags may also be used to describe other characteristics of an image such as the identity of a key dependency when multiple options are offered.

      • HowTo ForgeGetting Started with Podman (Docker Alternative) on Rocky Linux

        Podman is a Linux-native tool for deploying applications using Open Container Initiative (OCI) containers and container images. It supports multiple container image formats, including Docker images and OCI container images. Also, Podman supports managing pods, groups of containers.
        Podman is a daemon-less tool, running as a single binary command-line without a service. It provides a command-line similar to Docker, you can use an alias such as ‘alias docker=podman’.

        To run containers and manage container images, Podman relies on libpod and OCI container runtimes such as runc, crun, and runv.

      • Working with the ip Command in Linux with Examples

        When working in a Linux terminal, we often use various commands. We typically use the ifconfig command to perform network configuration.

        However, another command, ip, can be used for network configuration, which is considered a replacement for the ifconfig command. It has much more capabilities than the ifconfig command.

        Using the ip command, we can perform various tasks, such as changing the network configuration by modifying its interface and assigning or checking the IP address on a network interface.

        We can also enable or disable a network interface. This is not an exhaustive list but some of the activities we can perform with the ip command.

      • Systemctl Command Examples | Itsubuntu.com

        In this tutorial, we will go through the basics of systemctl command and examples. You can also get a basic idea regarding the usage of Systemctl. It is the tool to manage the init system. With these tools, you can manage services, check statuses, work with the configuration files, and do a similar job. Systemd is a critical part of Linux,

      • How To Compile And Install Kernel On Ubuntu [2022] | Itsubuntu.com

        Linux Kernel is the backbone of the Linux-based operating system. No matter which Linux you are using, Linux Kernel will be the same and will remain the crucial section of your operating systems. Linux Kernel is the heart of the operating system.

        Before installing or updating Kernel, you have to make sure that you have a backup of the system and other important files so that you can restore it in case of any emergency.

      • ID RootHow To Install Android Studio on Debian 11 – idroot

        In this tutorial, we will show you how to install Android Studio on Debian 11. For those of you who didn’t know, Android Studio is the official Integrated Development Environment (IDE) for Android app development, based on IntelliJ IDEA. Android Studio is developed by Google and it can run on different operating environments like Windows, macOS, and Linux.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the Android Studio on a Debian 11 (Bullseye).

      • Pragmatic LinuxHow to link a shared library with GCC and CMake

        Interested in using a shared library in your C or C++ application? Not sure how to build your application with the GCC compiler, such that it properly links the shared library? This article explains how to link a shared library to your application, built with the GCC toolchain. It covers three scenarios: (1) Calling GCC directly from the terminal, building with a Makefile and auto-generating the build environment with CMake.

      • How to Install and Use Python-Mistune on Linux

        The Python Mistune package is a fast and robust Python3 markdown parser that provides renderers and plugins. The Python mistune package is tested and proven in Python 2.7, Python 3.5+, and PyPy.

        It is the fastest in all the Python markdown parsers and provides a bunch of useful features such as footnotes, fenced code, auto-links. Table etc.

      • Ubuntu 22.04 VLC installation

        In this tutorial, you will learn how to install VLC on Ubuntu 22.04 Jammy Jellyfish Linux Desktop.

        VLC is a free and open-source multimedia player available for Ubuntu 22.04. It supports a wide range of multimedia formats such as MKV, MP4, MPEG, MPEG-2, MPEG-4, DivX, MOV, WMV, QuickTime, WebM, FLAC, MP3, Ogg/Vorbis files, BluRays, DVDs, VCDs, podcasts, and multimedia streams from various network sources.

      • How to Install Fonts on Ubuntu 22.04 Jammy Jellyfish Linux

        In this tutorial, we will be showing you how to install fonts on your Ubuntu 22.04 Jammy Jellyfish Linux system. This is relatively easy to do, whether with a font manager application or installing the fonts manually. Whatever your preference, we’ve got you covered with both methods in this article.

      • How to install Telegram on Ubuntu 22.04 Jammy Jellyfish Linux

        In this short guide, we will be installing Telegram on Ubuntu 22.04 Jammy Jellyfish Linux. Telegram is a messaging and voice over IP application available on various Linux distributions of your choice and, in particular, Ubuntu 22.04. As a user of Telegram you will be able to send messages, photos, videos or other files over this service.

      • Change system language on Ubuntu 22.04 from command line

        The purpose of this tutorial is to show how to change the system language from command line on Ubuntu 22.04 Jammy Jellyfish. This configuration is especially applicable for Ubuntu 22.04 servers, where there is no GUI to change your system language, although this also works fine on desktop systems.

      • How to autostart applications on Ubuntu 22.04 Jammy Jellyfish Linux

        The purpose of this tutorial is to show how to configure one or more applications to start up automatically upon system boot in Ubuntu 22.04 Jammy Jellyfish, specifically on the GNOME desktop environment. Follow our step by step instructions below as we set an application to autostart.

      • Bash Script: Flags usage with arguments examples

        If you have any experience on the Linux command line, then you should have run into command flags, which help us modify the behavior of a command that we are executing.

        For example, if we execute the ls -l command, the -l part of the command is a flag that we are passing as an argument to ls. This same functionality can be used in a Bash script, allowing us to pass some input to the script through flags when we are executing the script.

        Modifying a Bash script’s behavior via runtime options, just like we normally do with command line programs, can be very useful. The Bash shell provides the getopts builtin command, a standard way to achieve this. In this tutorial, you will see how to use flags as arguments when executing a Bash script, through use of the getopts builtin.

    • Games

      • Boiling Steam1220 Games On The Steam Deck After a Major Bump, including Apex Legends as Verified – Boiling Steam

        I was just doing my daily refresh and wow! What a surprise. There are now more than 1220 games working on the Steam Deck – the real number if 1223 at the time of writing…

      • Boiling SteamStadia To Introduce Its Own Solution to Run Windows Games on Linux – Boiling Steam

        When we expected the year of Linux Gaming in 2022, most of us were thinking about the Steam Deck. Turns out it may not be the biggest story yet. There’s a Google for Games Developer Summit planned for March 15 and Stadia will introduce some kind of Windows emulator to run Windows games on Linux.

      • VideoYou’re not going to be able to buy a Steam Deck off the shelf for a while… – Invidious

        A fresh episode of Steam Deck news is live right now.

      • UNIX CopTOP 6 Linux Distro for Gaming

        How can Linux compete with Windows for gamers’ attention? This can be a difficult question to answer. Why don’t we look at each option one by one and see which one is the most suitable? Wisely speaking, Linux is or was a first choice for Gamers. But The OS is not so bad though for the players. Depending on the choice available for Linux distro, it could be the trend breaker.

        Accepting the fact that limited options are available here, but still Linux cannot be neglected for Gaming niece. In this article, I tried to list top 6 Linux distributions that can be a good choice. I am offering this suggestion based on my own personal experiences, and audience opinion may differ. Let’s get started.

      • GamingOnLinuxSteam had a massive year in 2021 with 132 million monthly players | GamingOnLinux

        With competition everywhere, Valve still manages to keep on growing at a rapid pace with the new yearly review up. Going over what happen through 2021 and a little of 2022, it’s clear that Valve are doing well.

      • GamingOnLinuxCore Keeper is a great blending of Minecraft, Terraria and more | GamingOnLinux

        Swapping from Deck to my main Linux PC was also without hassle thanks to Steam Cloud integration, where it also works beautifully.

      • Its FOSSGood News! Apex Legends Now Officially Works on Steam Deck and Linux – It’s FOSS News

        We have all been eagerly waiting for Apex Legends to work on Linux, considering it is one of the most popular multiplayer titles.

        Especially, after the announcement of official support for Easy Anti-Cheat and BattleEye for Linux.

        However, the official support for the game wasn’t announced anywhere, until now.

      • GamingOnLinuxFactory building sim shapez.io got mod support recently | GamingOnLinux

        shapez.io is a game about building an ever-expanding factory, that cuts up various shapes to make other shapes. It’s gloriously engrossing and time consuming and now there’s modding involved too.

        You could already easily put tons of hours into it, now maybe even more so. This is not using the Steam Workshop though, instead they’re using the standalone cross-platform mod.io platform. It does involve downloading files manually for now, with an in-game browser to come later.

      • GamingOnLinuxHorror-mystery novel Scarlet Hollow has Episode 3 out now | GamingOnLinux

        With 7 episodes planned in total, episode 3 for the well-reviewed Scarlet Hollow from Black Tabby Games is out now.

        Even as someone who doesn’t usually like playing through Visual Novel styled games, I can safely tell you this is one that manages to push through. It’s genuinely interesting, with some pretty great writing and surprising events that will hook you right in. You can try it free too, since the first episode has no price attached. Pretty great artwork too overall.

      • GamingOnLinuxSteam Deck software updated with lots of controller configuration fixes | GamingOnLinux

        Valve continue working quickly to fix up issues that are flowing in against the Steam Deck software, with a new update out now and ready to download onto your Deck.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Plasma 5.24.3 available on Kubuntu 21.10

          We are pleased to announce that Plasma 5.24.3 is now available in our backports PPA for Kubuntu 21.10 (Impish Indri).

          The release announcement detailing the new features and improvements in Plasma 5.24.3 can be found here.

    • Distributions

      • Canonical/Ubuntu Family

        • OMG UbuntuUse Snaps? You’ll Dig This Nifty GNOME Extension – OMG! Ubuntu!

          Snap app fans will want to check out an extension for GNOME Shell that makes it easier to manage, update, and configure software installed using the packaging format.

          It’s called Snap Manager and while it’s not an official Snapcraft/Canonical add-on (it’s made by a third-party) it does boast a neat front-end for many of the snapd engine’s command-line actions.

          For example, instead of open a terminal and running snap list or snap refresh you can just click the options in the Snap Manager menu.

        • Yahoo NewscPanel & WHM® expands collaboration with Ubuntu to bring full support for Ubuntu LTS in V102
        • UbuntucPanel & WHM® expands collaboration with Ubuntu to bring full support for Ubuntu LTS in V102

          cPanel® L.L.C., the Hosting Platform of Choice, a WebPros® portfolio company, is expanding its collaboration with Ubuntu to provide full support for Ubuntu LTS 20.04 with cPanel & WHM version 102.

          In the winter of 2020, CentOS 8 announced that it would be reaching its end-of-life in December of 2021. This news was somewhat unexpected in the open-source and web hosting worlds. In response, cPanel has been working towards providing solutions that will benefit our partners and customers and expand options as we move forward together.

        • PhoronixcPanel 102 Is Ready With Full Ubuntu LTS Support – Phoronix

          As part of diversifying their supported range of Linux distributions since it was announced CentOS 8 would be going end-of-life, the popular cPanel commercial software package for easing the administration of Linux web server has added support for AlmaLinux and wit cPanel v102 is full support for Ubuntu 20.04 LTS.

        • UbuntuEnable FIPS on Google Cloud | Ubuntu

          Cyber attacks present an imminent threat to our digital assets. And they come in a variety of ways, including computer viruses, Denial-of-service (DoS), hacking, ransomware, memcached. In February 2022, White House deputy national security adviser for cyber and emerging technology Anne Neuberger claimed that the Russian hackers conducted a DDoS attack on the Ukrainian banks and Ministry of Defense before their military attacks. To defend against those threats, people relentlessly develop new Cyber Security technologies, such as AI & Deep Learning that add additional layers of authentication, Behavioral Analytics that helps determine patterns of cyber threats, Embedded Hardware Authentication like Intel’s Sixth-generation vPro Chips, and Zero-Trust Models that assume a network is already compromised. For all cyber security technologies, encryption is considered an essential technology to protect sensitive data. Encryption is a technology that attempts to make the information unreadable by anyone other than the intended recipients. People normally grant their audience access to encrypted data via passwords or decryption keys. On the Internet, encryption technologies include Encryption in transit, such as Virtual Private Network (VPN); and Encryption at rest, such as Encrypted Storage; and Encryption in use, such as Confidential Computing.

    • Free, Libre, and Open Source Software

      • Web Browsers

        • Ubuntu PitBrave vs. Chrome: Which One is the Best Browser?

          About 60% to 80% of users are using Google Chrome as the regular browser. But besides Mozilla Firefox and Google Chrome, there are a lot of browsers available in the market. Brave is one of the newest ones that come with all sorts of advanced technology. Eventually, it started competing with Google Chrome already. People who are updated about the technology news are so being confused about which one to try. Indeed, many of you already have asked about the fact between Brave vs. Chrome.

          There is no way we can take the battle between Chrome and Brave lightly. So, we have found out the major facts, where they are different from one another. If you are confused about which browser to try, we suggest you check out the facts properly. But first, I would like to give you a proper introduction to Brave and Chrome browser.

      • FSFE

        • The right to install Free Software +++ 60 books to libraries +++ Berlin workshop

          Installing and uninstalling software as we wish on any device is a right that comes with an extra benefit: we can fix our devices and keep using them longer, avoiding the environmental impact of a new device. So what is keeping us from fixing existing devices by installing Free Software? Unfortunately, legal and technical barriers are often intentionally imposed on users so that they cannot change the operating system on their devices. 2022 offers a unique opportunity to improve the situation in Europe. The EU is about to redraft its ecodesign criteria of products with the Sustainable Products Initiative, the Circular Electronics Initiative, the Right to Repair, and other directives.

          This is our chance to claim the right to install any operating system on any device. The FSFE started to advise the European Commission as early as possible on this. But a positive outcome is far from certain; counter-lobbying is there. If the role of software freedom is not considered as essential to the longevity and re-usability of our devices, the throw-away culture will continue. We will advocate for the necessary changes in the upcoming legislation. Manufacturers must not be allowed to create artificial restrictions preventing users from installing Free Software operating systems.

          Help us push for the universal right to install Free Software. Become a supporter.

      • Programming/Development

        • GitHub vs GitLab: The key differences [Ed: SJVN false dichotomy on display, with proprietary or proprietary (Microsoft)]

          Many people ask me: “Which distributed version control system should I use for my programming project, GitHub or GitLab?” It’s not that simple a question. Let’s break it down, shall we?

        • QtTechnical Artist – Tools and Software for Embedded Device Development [Ed: This is what proprietary Qt is becoming focused on, along with ads inside software]

          Technical Artists play an important role in bridging UI design and software development of embedded devices. Their core task is to implement the UI vision to a functional user experience. They do so by composing the UI from 2D and 3D UI assets, creating visual effects, and optimizing the rendering performance for the target hardware. So, how are they doing it?

  • Leftovers

    • Integrity/Availability

      • Proprietary

        • Security

          • Privacy/Surveillance

            • ReutersPandemic surveillance: is tracing tech here to stay?

              The two-year fight against COVID-19 has turned technology into a weapon of choice to defeat the virus but experts now worry that tech will outlive the pandemic and normalise mass surveillance.

              From contact tracing apps to facial recognition, technology has become part of the arsenal used to protect public health.

              While this might have helped save lives, rights advocates say intrusive solutions could already be so entrenched that personal privacy is the long-term price many people may yet pay.

    • Internet Policy/Net Neutrality

      • Putin’s war in Ukraine shatters Silicon Valley’s neutrality myth

        Authoritarian Tech is a weekly newsletter tracking how people in power are abusing technology and what it means for the rest of us. Also in this edition: Kenya’s controversial digital ID scheme; and Chinese social media censors respond to Ukraine

      • VOA NewsTo Fight Its War, Russia Closing Digital DoorsTo Fight Its War, Russia Closing Digital Doors

        Russia’s blocking of Facebook is a symptom of its broader effort to cut itself off from sources of information that could imperil its internationally condemned invasion of Ukraine, experts say.

        The often-criticized social network is part of a web of information sources that can challenge the Kremlin’s preferred perspective that its assault on Ukraine is righteous and necessary.

        Blocking of Facebook and restricting of Twitter on Friday came the same day Moscow backed the imposition of jail terms on media publishing “false information” about the military.

        Russia’s motivation “is to suppress political challenges at a very fraught moment for (Vladimir) Putin, and the regime, when it comes to those asking very tough questions about why Russia is continuing to prosecute this war,” said Steven Feldstein, a senior fellow at the Carnegie Endowment for International Peace.

      • NBCSometimes maligned, Telegram becomes essential during Ukraine invasion

        As Russian forces shelled cities across Ukraine on Thursday, unidentified hackers took control of the website for the local government in the western province of Volyn, putting up a fake notice that government officials there had agreed to surrender.

        The Security Service of Ukraine, or SBU, had prepared for such a scenario. It had been warning for days on social media, especially on Telegram, its most-followed social media channel, that Russia would try such a tactic. It quickly alerted its nearly 800,000 followers that the surrender claim was a fake, and that Volyn was still in Ukrainian hands.

        But SBU’s Telegram channel doesn’t just counter Russian propaganda. Taking advantage of the fact that Telegram, unlike Facebook and Twitter, is almost entirely unmoderated, it publishes plenty of its own. Its feed is full of videos of despondent, apologetic and sometimes bloodied Russians who are allegedly prisoners of war, which some experts have argued violates the Geneva Conventions.

      • T-Mobile customer “service” feigns ignorance of the ongoing Google Play blockade in Chicago as many customers take notice.

        As the T-Mobile blockade of the Google Play Store in the Chicago region of the US, and apparently others now, continues for the second week for some people….T-Mobile “support” pretends not to know anything about it.

[Meme] When ‘The West’ Emulates Vladimir Putin

Posted in Deception at 10:55 am by Dr. Roy Schestowitz

When Our Own ‘Free’ Press Preaches Internet Autocracy

Kim Jung Un and the Internet: Even the New York Times says Internet censorship is necessary

They say VPNs are needed to dodge autocratic regimes, so I need a VPN and I'm in the United States

Summary: In the name of “protecting us” our governments are universally cracking down on speech online

“The illusion of freedom will continue as long as it’s profitable to continue the illusion. At the point where the illusion becomes too expensive to maintain, they will just take down the scenery, they will pull back the curtains, they will move the tables and chairs out of the way and you will see the brick wall at the back of the theater.” ― Frank Zappa

The Internet is Breaking and We Need Contingencies

Posted in Deception, Free/Libre Software, Standard at 10:33 am by Dr. Roy Schestowitz

Video download link | md5sum 6a84c3a45403cd4467e8f79cf7fb51ae
Internet is Under Attack, Governments Say They Protect You
Creative Commons Attribution-No Derivative Works 4.0

Summary: A lot of the Internet (connectivity over UDP/TCP) and stuff built on top of it seems to be rotting and/or ebbing away, not just in Russia and China (among other Internet villains/scapegoats, notorious for extensive censorship/blocking); This scope of sabotage and obstruction goes further and further, extending far beyond the corporate Web, so that necessitates a rapid change in online behaviour (failing that, offline fallbacks)

THE national news sites have been warped into government propaganda sites, corporate media is selling war, and Twitter profits from conflict.

Where are we heading?

“Our self-hosted IRC network is a lot better anyway.”Well, surely enough alternatives will be sought. I quit social control media (all of it) 5 days ago and so far I’m loving it. Our self-hosted IRC network is a lot better anyway. It’s very diverse in all sorts of ways and it allows rapid response (native software has better interfaces than Web interfaces), it’s quicker to type in it, and there’s no time delays for responses (rather than wait for notifications people speak almost in real time).

The video explains rather bizarre things we’ve seen on the Internet lately, especially US-based ISPs (blocking things that they really ought not block), and then reminds people that we’ve invested a lot of time and effort improving the Gemini capsule. It’s not that it’s robust to censorship, not inherently anyway, but it’s ‘off the radar’ for the most part. Sanctions, for example, don’t impact Gemini capsules. The same is true when it comes to IRC, especially with many networks coming online all the time. Setting up an IRC network is vastly simpler than running and maintaining social control media platforms.

“Principles of the cornerstones of the Net aren’t being tolerated anymore.”With rotting economies (the full effect of soaring corporate and residential energy prices — with their knock-on effect on travel, food etc. — is yet to be seen) and an unstable world at risk of nuclear confrontation the governments will likely resort to unprecedented measures. Adapting when things already escalate is adapting too late.

Self-hosting has never seemed so attractive. Third parties cannot be relied upon as many shut down (due to government, corporate, or financial pressures), the censorious tendencies aside. 2022 is going to be a very interesting year for the Internet because we’re seeing it stress-tested on many levels. Principles of the cornerstones of the Net aren’t being tolerated anymore.

Links 9/3/2022: Nitrux 2.0 Reviewed, Tor Browser 11.0.7 is Out

Posted in News Roundup at 8:25 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Kernel Space

    • Instructionals/Technical

      • How to install MicroweberCMS on Debian 11

        A CMS is a web application capable of managing the content on a website. This makes it possible for us to deploy blogs and websites quickly. Today, you will learn how to install MicroweberCMS on Debian 11.

      • Linux CapableHow to Install LibreWolf Browser on Linux Mint 20 – LinuxCapable

        LibreWolf is a Firefox fork that focuses on privacy and security by eliminating telemetry, which can be invasive to your personal information, along with increased protection against tracking and fingerprinting techniques, while also including a few security improvements.

        In the following tutorial, you will learn how to install LibreWolf Browser on Linux Mint 20 release series. The tutorial will go over importing the official repository and gpg key and updating and removing the browser.

      • Linux CapableHow to Install Brasero on Linux Mint 20 – LinuxCapable

        Brasero is a free and open-source disc-burning program for Unix-like systems that comes with various features for burning your data, audio, or video discs. Brasero serves as a graphical front-end to cdrtools, cdrskin, growisofs, and libburn and is efficient and straightforward for users to use by keeping things simple.

        In the following tutorial, you will learn how to install Brasero on Linux Mint 20 series release and update and remove the disc-burning utility software using the APT package manager.

      • How to Install Kubernetes (k8s) Cluster on RHEL 8

        Also known as k8s, Kubernetes is an opensource, and portable container orchestration platform for automating the deployment and management of containerized applications. Kubernetes was originally created by Google in the Go programming language. Currently, it is maintained by Cloud Native Computing Foundation.

        In this guide, we will walk you step-by-step on how you can install a Kubernetes cluster on RHEL 8. We will demonstrate this using one Master one and one worker node which we will add to our cluster.

      • How To Install Vim On Ubuntu 22.04 LTS | Itsubuntu.com

        Vim is a highly configurable and popular text editor. It is an improved version of the vi editor. In this tutorial post, we are going to show you the steps to install Vim on Ubuntu 22.04 LTS. In Ubuntu, you can find Nano as a default editor.

      • Linux CapableHow to Install Showfoto on Linux Mint 20 – LinuxCapable

        Showfoto is an Image Editor that has powerful tools for editing photographs. You can view your photos and improve them using this program’s standalone image editor from the digiKam project! One of the features that similar tools like is its versatility with tools dedicated to import and export contents to remote web services, like Flickr, GPhoto, Imgur, Facebook, etc.

        In the following tutorial, you will learn how to install Showfoto on Linux Mint 20 series release and update and remove the image editing software using the APT package manager.

      • Linux CapableHow to Install Scrot on Linux Mint 20 – LinuxCapable

        Scrot is a minimalist command-line screen capturing application that uses imlib2 to grab and save images. It also allows substantial flexibility by specifying parameters on the command line terminal such as thumbnail generation, delay timers, quality of output, and much more.

        In the following tutorial, you will learn how to install Scrot on Linux Mint 20 using the command line terminal, along with how to update remove the screenshot software and basic common commands to use with scrot in the terminal.

      • Linux CapableHow to Install Etcher on Linux Mint 20 – LinuxCapable

        balenaEtcher is a free and open-source flashing utility tool famous for writing image files such as .iso and .img files and zipped folders onto storage media to create live SD cards and USB flash drives. balenaEtcher has cross-platform support on Linux, BSD, macOS, and Windows and is developed by balena and licensed under Apache License 2.0.

        In the following tutorial, you will learn how to install baelnaEtcher on Linux Mint 20 by downloading and executing the official bash script to install the latest stable version on your system using the APT package manager along with how to update and remove the software later on if you so wish using the command line terminal.

      • Linux CapableHow to Install Krita on Linux Mint 20 – LinuxCapable

        Krita is a free and open-source graphics editing program designed for digital painting, 2D animation, or general image manipulation. It runs on Windows, macOS (both Intel 64bit), Linux hits Android & Chrome OS, and is one of the more popular paint applications for users that deal with digital photos.

        In the following tutorial, you will learn how to install Krita on Linux Mint 20 using the official LaunchPAD PPA to import then install the paint software along with additional steps to update and, if need be, remove the software using the command line terminal.

      • Linux CapableHow to Install VidCutter on Linux Mint 20 – LinuxCapable

        VidCutter is a free, open-source application that can cut video and audio files. It has tools for cutting all sorts of media, but it’s not a full-blown video editor. Instead, its focus lies solely on slicing up videos into clips you could then upload onto your website (or send someone).

        In the following tutorial, you will learn how to install VidCutter on Linux Mint 20 using two different methods: APT and Flatpak, along with how to maintain and remove the software using the command line terminal.

      • H2S MediaHow To Install Cacti monitoring Debian 11 Bullseye – Linux Shout

        Have a look at the quick steps given in the tutorial to install Cacti on Debian 11 Bullseye server for monitoring network devices.

        Cacti is an open-source tool for monitoring hosts in larger networks using SNMP (Simple Network Management Protocol). It comes with numerous ready-made scripts and data templates. Cacti is just as suitable for a server running under Linux that queries the remotely maintainable network switch as it is for recording and visualizing any other measurement data that occurs on a regular basis. It offers itself as a framework that can be easily configured via a browser. Cacti uses the MySQL database to save its settings and the Apache webserver for interactive configuration and display of the graphics.

        Cacti manage templates for graphics, hosts, and data sources that can be created using a browser. You save a lot of work if the same values ​​have to be monitored on several hosts. The visualization tool comes with ready-made templates for many systems (Linux/Unix computers, various router models).

      • How to Install WordPress on RHEL 8 with Apache

        WordPress is an immensely popular CMS (Content Management System) that accounts for nearly 43% of all the websites according to W3techs.com.

        From powering high-traffic sites such as eCommerce, and news websites to simple blogs, WordPress has remained on top of the perch among its competitors such as Joomla, Shopify, and Wix.

        WordPress is open source, and free to use. It provides tons of customizations to help you build anything you want. It allows you to build high-performance, SEO-friendly sites which are mobile responsive and easy to customize.

        In this guide, we will demonstrate how to install WordPress on RHEL 8 with an Apache webserver.

      • Using a Streamzap remote control with MythTV on Debian Bullseye

        After upgrading my MythTV machine to Debian Bullseye and MythTV 31, my Streamzap remote control stopped working correctly: the up and down buttons were working, but the OK button wasn’t.

        Here’s the complete solution that made it work with the built-in kernel support (i.e. without LIRC).

      • LibreOffice Calc Basics III: PROPER, UPPER, LOWER

        In this third tutorial, we will learn about the next Calc formulas namely PROPER, UPPER and LOWER. These are useful formulas often used to change text quickly between typing cases, in bulk, mostly for people’s names. Finally, if you haven’t followed this LibreOffice Calc series, read the first and second parts here. Let’s start.

      • UNIX CopHow to install NestaCMS on Ubuntu or Debian Server

        NestaCMS is an open-source, markdown content management system. It’s developed on Ruby and based on Sinatra Web Framework. It makes easier to develop static design websites. It does not require a database every content is stored in text files. The posts are or content is processed and converted into static HTML Files.

      • UNIX CopGraphite for Apache Centos/RHEL 8

        Graphite is an enterprise-ready monitoring tool that runs equally well on cheap hardware or Cloud infrastructure. Teams use Graphite to track the performance of their websites, applications, business services, and networked servers. In addition, it observed the start of a new generation of monitoring tools, making it easier than ever to store, retrieve, share, and visualize time-series data.

        So, Graphite was initially designed and authored by Chris Davis at Orbitz in 2006 as a side task that eventually grew to be their foundational monitoring tool. In 2008, Orbitz allowed Graphite to be released under the open-source Apache 2.0 license. As a result, numerous prominent companies have deployed Graphite to production where it helps them monitor their production e-commerce services and plan for growth.

      • UNIX CopHow To Disable ETag in NGINXs

        Hello, friends. We continue with this little round of Nginx tutorials and tricks. This time, we will explain how to disable ETag in Nginx. As in previous posts, it will be a simple post, but that can help us a lot on a server.

      • UNIX CopHow to install Apache OpenMeetings on Ubuntu/Debian Servers

        In this post, you will learn How to install Apache OpenMeetings on Ubuntu/Debian Servers

        OpenMeetings is free, open-source web-based, cross-platform conferencing application that can be used for training, presenting, Video conferencing, white board and messaging etc. It is developed in Java and based on Red5 Media Server. Moreover the app supports multiple Database servers, Also it allows you record sessions. It includes many features like, Advanced File Explorer, User Management, Room Management, Polls, Backups etc.

    • Games

      • GamingOnLinuxApex Legends gets Steam Deck Verified | GamingOnLinux

        The day we’ve all been waiting for right? Apex Legends from Respawn and EA has now been officially Steam Deck Verified.

        Absolutely huge news for both Linux desktop gaming with Proton and for the Steam Deck, to have one of the biggest and easily best battle royale games now fully Verified. It’s hard to properly express just how big this is — simply massive. Just on Steam it’s constantly in the top 10 most played, with a peak player count today alone of 281,993 people.

    • Distributions

      • HaikuOSHaiku Activity & Contract Report: February 2022

        Just like last month, the usual Activity Report is hereby combined with my Contract Report.

        This report covers hrev55836 to hrev55916.

        The biggest news this month, though, deserves to be mentioned right up front: [...]

      • Reviews

      • IBM/Red Hat/Fedora

        • IndiaRussia-Ukraine War: IBM Halts All Operations In Russia Amid Ongoing War In Ukraine

          As the Russia-Ukraine war has escalated over the days, American multinational technology corporation, International Business Machines (IBM) has halted all its operations in Russia, CEO Arvind Krishna said. In a statement released on Monday by the company, IBM CEO said, “I have heard from many of you in response to last week’s announcement regarding the war in Ukraine, and I appreciate your feedback. First, let me be very clear — we have suspended all business in Russia.”

          Krishna went on to say that a couple of the initiatives are underway to assist IBM’s colleagues in that region. The firm also stated that it is giving crucial assistance to the areas that have been hit the worst in the war.

          Furthermore, the CEO has praised the support of IBMers in assisting Ukrainian refugees in neighbouring countries. Providing an example of their support, he added that a recently developed and utilised IBMer ‘Resource Finder Map’ links Ukrainian IBMers as well as IBM contractors escaping their nation “with IBM colleagues in the immediate CEE region who can offer assistance, including lodging, transportation, food and supplies, for them and their families,” as per the statement. Krishna highlighted that nearly hundreds of CEE workers have already joined up as volunteers in less than 24 hours.

        • Fedora MagazaineUsing Homebrew Package Manager on Fedora Linux – Fedora Magazine [Ed: While Planet Fedora becomes a bunch of Apple fans as the community flees this is what Fedora Magazine is promoting]

          Homebrew is a package manager for macOS to install UNIX tools on macOS. But, it can be used on Linux (and Windows WSL) as well. It is written in Ruby and provides software packages that might not be provided by the host system (macOS or Linux), so it offers an auxiliary package manager besides the OS package manager. In addition, it installs packages only to its prefix (either /home/linuxbrew/.linuxbrew or ~/.linuxbrew as a non-root user, without polluting system paths. This package manager works on Fedora Linux too. In this article, I will try to show you how Homebrew is different from Fedora Linux package manager dnf , why you might want to install and use it on Fedora Linux, and how.

        • Manage Linux users’ home directories with systemd-homed [Ed: Red Hat promotes more of its own vendor lock-in]

          The entire systemd concept and implementation have introduced many changes since it began to replace the old SystemV startup and init tools. Over time, systemd has been extended into many other segments of the Linux environment.

          One relatively new service, systemd-homed, extends the reach of systemd into the management of users’ home directories. The feature enforces human user access only and restricts system users in the User ID (UID) range between 0 and 999. I support the systemd plan to take over the world, but I wondered if this was a bit excessive. Then I did some research.

        • Test GitHub projects with GitHub Actions and Testing Farm [Ed: Red Hat boycotts Russia, boycotts Belarus too, but promotes Microsoft, promotes proprietary software and vendors lock-in of Microsoft. What an awful company direction...]
        • Enterprisers ProjectDigital transformation: 3 common mistakes to avoid

          Consumers embrace new things quickly. If companies don’t innovate fast enough, they’ll lose customers. This puts a very high demand on enterprises, whose business-to-end-consumer chain is long and complicated.

          On any given day, you might need to respond within hours to a surging demand caused by a viral social media post – or perhaps you need to incubate a new product within days to catch up with the latest trends for your customers. The goal of digital transformation is to truly transform your business and enable the agility needed to keep up with business demands.

        • Enterprisers ProjectIT retention: 5 strategies for becoming a talent magnet [Ed: Why would you take advice from IBM/Red Hat on this? A lot of the company, even the management, is quitting in droves]

          Just how competitive is today’s market for tech talent? Some companies have resorted to buying up other firms to get their employees.

          That trend is fueling an increase in M&A deals, but it isn’t necessarily going to solve the problem at hand – especially if the leadership doesn’t know how to hold on to people once they’ve “acquired” them.

          While these companies may be viewing M&A through the lens of talent acquisition, people aren’t things you can just buy up and deploy like assets. As “The Great Resignation” has made abundantly clear, if you want to keep great people and get the full benefits of their talents and skills, you need to inspire, engage, and develop them.

      • Canonical/Ubuntu Family

        • 9to5LinuxCanonical Patches “Dirty Pipe” Vulnerability in Ubuntu 21.10 and 20.04 LTS, Update Now

          This is a small security update coming just two weeks after the previous security update and it patches the so-called “Dirty Pipe” security vulnerability (CVE-2022-0847) discovered by Max Kellermann. This vulnerability only affects Ubuntu 21.10 and Ubuntu 20.04 LTS systems running the Linux 5.13 kernel and could allow a local attacker to modify any file that could be opened for reading.

    • Devices/Embedded

      • Open Hardware/Modding

        • The VergeThe future of computers is only $4 away, with Raspberry Pi CEO Eben Upton

          Today I’m talking to Eben Upton, the CEO of Raspberry Pi, a fascinating company that makes beloved tiny hackable computers that are extremely inexpensive: the cheapest Raspberry Pi is just $4, the most popular model is about $35, and the most expensive model that comes with a keyboard is $70. They run Linux, and you can do just about anything with them: people build robots, they learn to code, they run media servers. There are Raspberry Pis on the international space station running experiments. I have one in my house that just connects a bunch of smart home gear together. These things are a phenomenon, and a underappreciated part of the computing world we live in today.

        • TalospaceTonight’s Game On OpenPOWER: Aleph One And The Marathon Series

          Aleph One runs all three official installments, plus a number of total conversions, hobby scenarios and even a port of the Wolfenstein-esque Pathways into Darkness, Bungie’s banner 3D game prior to Marathon and arguably in the same universe. (It was also one of the first games to run native on the then-new Power Macintosh, so it’s special to us here in OpenPOWER land.) Strangely, one game it doesn’t run is ZPC, which is a bummer because it’s truly one of a kind. However, I think Marathon 2 is (again) the best Aleph One game as it has the fullest selection of high-resolution textures from the Xbox Live Arcade remaster; the other two games don’t look nearly as good.

        • ArduinoReimagining the lamp with an intelligent, floating bulb | Arduino Blog

          The humble lamp can come in many different forms, but nearly all of them feature a singular bulb that is uninspired and only responds to a light switch or potentially an app. YouTuber Tom Ouwerkerk, on the other hand, has designed a creative light accessory that is entirely 3D-printed and includes an intelligent central bulb that “magically” levitates above the base, defying gravity.

          For the base of the lamp, Ouwerkerk printed a simple ring with a cutout on its side for plugging in a DC barrel jack. From there, he added an Arduino Nano Every that is responsible for controlling a strip of four WS2812B RGB LEDs and sensing if the bulb has been placed into its off position. When the bulb isn’t resting on top of the base, its top magnet gets attracted to the other magnet, which faces down from the top of the lamp and helps pull it upwards for the floating effect.

    • Free, Libre, and Open Source Software

      • LibreBootSuppliers page re-added, with new Libreboot seller listed

        The suppliers page lists companies that sell commercial products and services related to Libreboot; this includes the sale of laptops with Libreboot pre-installed.

      • uni TorontoThe convenience of multi-purpose monitoring (in Prometheus)

        Recently I mentioned to someone that our TLS certificate expiry alerting is very convenient in that we mostly don’t have to specifically do something to monitor TLS certificate expiry. Instead, we get it for free when we start monitoring a service that uses TLS. For example, if we add a check for a new HTTPS website here being up properly, that automatically adds TLS certificate expiry monitoring.

      • Web Browsers

        • RachelA sysadmin’s rant about feed readers and crawlers

          If a web site makes an RSS or Atom feed available, it’s not a bad idea to poll it from time to time. Actually doing that poll like a good netizen (remember that concept?) takes a little attention to detail.

        • Chromium

          • Jim NielsenFamily IT Support Turned Blog Post Turned Anecdote in The Wall Street Journal

            I recently opened my inbox to find an email from Nicole Nguyen, a personal technology columnist at The Wall Street Journal.

            She mentioned reading my blog post about my Mom who had trouble volunteering in her local community because she couldn’t access the reservation system online (spoiler: because someone shipped the optional chaining operator in their production JavaScript and she was on an old version of Chrome).

        • Mozilla

      • Programming/Development

        • FinnstatsHow to Calculate a Cumulative Average in R

          Cumulative Average in R, The average of a series of values up to a certain point is given by a cumulative average.

          In R, you can calculate the cumulative average of values using the following methods. [...]

        • Dirk EddelbuettelDirk Eddelbuettel: RcppRedis 0.2.0: Major Updates

          A new major release of RcppRedis arrived on CRAN today. RcppRedis is one of several packages connecting R to the fabulous Redis in-memory datastructure store (and much more). RcppRedis does not pretend to be feature complete, but it may do some things faster than the other interfaces, and also offers an optional coupling with MessagePack binary (de)serialization via RcppMsgPack. The package has carried production loads for several years now.

          This release integrates support for pub/sub, a popular messaging pattern in which one or more clients can subscribe to one or more ‘channels’. Whenever a client instances publishes, the Redis server immediately updates all clients listening on the given channel. This pattern is fairly common to transmit data to listeners. A there is a bit more to explain about this, I also added a brand-new vignette describing pub/sub with RcppRedis, along with another introductory vignette about Redis itself. We blogged about this exciting new feature and its particular use for market monitoring in R4 #36 recently too.

        • Julia EvansSome tiny personal programs I’ve written

          I was talking to a friend last summer about what resources might be helpful for folks learning to program. My friend said they thought some people might benefit from a list of small and fun programming projects – the kind of thing you can do in an evening or weekend.

  • Leftovers

    • The NationAgents of Malaise

      Why do we even have art museums? This was a question that Alexander Dorner began asking in the 1920s. He can’t have been the first to pose such a question, but as director of the Provincial Museum in Hanover, Germany, he was in a position to do something about it. In 1927, he commissioned Russian artist El Lissitzky to upend the conventional style of displaying art at the time by installing an “abstract cabinet”—a modular space that was flexibly responsive to the art on display but that also challenged the art with its own striped patterns and color. Dorner and Lissitzky’s experimental structure was provocative enough in the 1920s. But when the Nazis came to power in 1933, such ideas became heresy: The abstract cabinet was dismantled, and Dorner was forced to emigrate to the United States.1

    • The NationWhat Is to Be Done

      When asked Why here? Mao said We didn’t pick it

      Here is a slab of If Here is a set of appropriate roles; armed in cinema

    • The NationThe Falling Man

      The story is missing, so I fill it in— it’s what a thinking person does to cope. Without the details, only Death can win.

      And so, the panic invariably set in, the fires on lower floors extinguishing hope. The story is missing, so I fill it in.

    • Science

    • Hardware

      • HackadayExtreme Espresso, Part 2: An Inductive Water Level Sensor

        [Mark Smith] must really, really like his coffee, at least judging by how much effort he’s put into tricking out his espresso machine.

      • HackadayThe Light Guide Hiding In Your Extrusion

        There should be a line of jokes that start “A physicist and an engineer walk into a bar…”. In my case I’m an engineer and my housemate is a physicist, so random conversations sometimes take interesting turns. Take the other day for example, as one does when talking she picked up a piece of aluminium extrusion that was sitting on our coffee table and turned it over in her hands. It has a hole down its centre and it’s natural to peer down it, at which point her attention was caught by the appearance of a series of concentric rings of light. Our conversation turned to the mechanism which might be causing this, and along the way took us into cameras, waveguides, and optical fibres.

      • HackadayModern CPUs Are Smarter Than You Might Realize

        When it comes to programming, most of us write code at a level of abstraction that could be for a computer from the 1960s. Input comes in, you process it, and you produce output. Sure, a call to strcpy might work better on a modern CPU than on an older one, but your basic algorithms are the same. But what if there were ways to define your programs that would work better on modern hardware? That’s what a pre-print book from [Sergey Slotin] answers.

      • HackadayThere’s More In A Cardboard Box Than What Goes In The Cardboard Box

        The cardboard box is ubiquitous in our society. We all know what makes up a cardboard box: corrugated paper products, glue, and some work. Of course cardboard boxes didn’t just show up one day, delivered out of nowhere by an overworked and underpaid driver. In the video below the break, [New Mind] does a deep dive into the history of the cardboard box and much more.

      • HackadayThe Hunt For The Voice Of Utah’s Arches

        In the 1990 movie The Hunt For Red October, a stealth submarine is located by what a computer thinks are seismic sounds, but when sped up, they are clearly mechanical. We won’t spoil it further on the off chance that you haven’t seen. We can’t help but wonder if [Prof. Jeff Moore] and his team at the University of Utah were inspired by the movie. Why so? Because they have taken the seismic vibrations of the beautiful arches in Utah, US and sped them up 25 times, placing them right in the range of human hearing on their Red Rock Tones website. Go have a quick listen. We’ll be right here.

      • HackadayDaft Punk Word Clock Goes Stronger And Faster

        What would you call a word clock that doesn’t tell time? The concept of a word clock is that all the words needed to be used are already there and then just selected. [Ben Combee] realized there were only 18 unique words to make up the song “Harder Faster Better Stronger” and with an extra PyBadge from Supercon 2021 on hand, it seems obvious to make a musical word clock of sorts.

    • Health/Nutrition/Agriculture

      • Common Dreams‘Can’t Fool Us’: 250+ Groups Reject Biden Rebrand of Trump’s Medicare Privatization Ploy

        More than 250 advocacy groups representing seniors, people with disabilities, doctors, and other constituencies made clear Tuesday that they’re not remotely satisfied with the Biden administration’s rebrand of a Trump-era pilot program that allows private industry to gain a foothold in traditional Medicare.

        “HHS gave Direct Contracting a fresh coat of paint, but we can see right through it.”

    • Integrity/Availability

      • Proprietary

        • The Wall Street JournalBefore You Buy a Chromebook, Check the Expiration Date

          Like food and medication, our gadgets are only good for so long. Unfortunately, in the ever-expanding universe of online retail, many devices are sold past their “best by” dates.

          Chromebooks—the Google-powered laptops from popular PC brands which gained popularity during the pandemic, when lockdowns created unprecedented demand for computers at home—can lose critical functionality.

        • Security WeekSwedish Security Solutions Provider Axis Hit by Cyberattack [iophk: Windows TCO]

          Axis informed customers about an “IT-related intrusion” on February 21, one day after its cybersecurity systems detected the breach. Public-facing services were shut down globally to limit potential impact.

          In an update shared on Sunday, the company said the attack involved social engineering and account takeovers, with the attackers managing to bypass multi-factor authentication. The attacker also used “advanced methods” to elevate their access and compromise internal directory services.

        • Security WeekRansomware gang Conti has already bounced back from damage caused by chat leaks, experts say [iophk: Windows TCO]

          Experts say the notorious ransomware gang has pivoted all too easily, replacing much of the infrastructure that was exposed in the leaks while moving quickly to hit new targets with ransom demands. According to Vitali Kremez, CEO of the cybersecurity firm AdvIntel, by Monday morning Conti had successfully completed two new data breaches at U.S.-based companies.

        • Computer WorldGoogle buys cybersecurity company Mandiant for $5.4B

          The company recently announced a new Ransomware Defense Validation service for its SaaS-based XDR (extended detection and response) platform, Mandiant Advantage, to help enterprises gauge the ability of their security systems to guard against ransomware attacks.

        • IT WireGoogle pips Microsoft to the post, picks up Mandiant for US$5.4b

          Search giant Google has announced it will acquire the security firm Mandiant for US$5.4 billion (A$7.4 billion) in an all-cash transaction, adding that the firm will join Google Cloud after the acquisition is complete.

        • India TimesBeefing up its cybersecurity, Google buys Mandiant for $5.4B

          Google is fortifying its cloud services with a $5.4 billion acquisition of the cyber security firm Mandiant, the companies announced Tuesday.

          The acquisition is the first of many that analysts foresee in the cyber security sector following Russia’s invasion of Ukraine. Analysts and government officials have said they expect a wave of cyberattacks from Russia and others as geopolitical tensions rise.

        • India TimesDoes vendor lock-in really affect your cloud journey?

          Though building cloud-native applications bring higher cost savings and faster deployment, over-dependence on the cloud vendor service stack makes it very difficult for organizations to move across different cloud vendors, according to Rishabh Garg, CTO, U GRO Capital. “A steep increase in prices while scaling, technological & legal challenges can create a vendor lock-in scenario while this is not explicitly stated.”

        • AdafruitA GitHub repository was public-viewable

          We’ve recently become aware of an inadvertent private-to-public viewable GitHub repository that could have enabled unauthorized access to information about certain user accounts on or before 2019.

          The inadvertent disclosure involved an auditing data set used for employee training becoming public, on a GitHub repository associated with an inactive former employee’s account who was learning data analysis (The data set was unintentionally made public during an employee exit procedure handoff). The repository contained some names, email addresses, shipping/billing addresses and/or whether orders were placed successfully via credit card processor and/or PayPal, as well as details for some orders. There were no user passwords or financial information such as credit cards in the data analysis set.

        • Security

          • Help Net SecurityWidely used UPS devices can be hijacked and destroyed remotely – Help Net Security

            Three vulnerabilities in ubiquitous APC Smart-UPS (uninterruptible power supply) devices could allow remote attackers to use them as an attack vector, disable or completely destroy them, Armis researchers have discovered.

            The vulnerable devices, developed by Schneider Electric subsidiary APC, are used all around the globe to provide emergency backup power for critical physical infrastructure (industrial facilities, hospitals, energy suppliers, data centers, etc.)

          • Help Net SecurityMozilla fixes Firefox zero-days exploited in the wild (CVE-2022-26485, CVE-2022-26486)

            Mozilla has released an out-of-band security update for Firefox, Firefox Focus, and Thunderbird, fixing two critical vulnerabilities (CVE-2022-26485, CVE-2022-26486) exploited by attackers in the wild.

          • CISAAdobe Releases Security Updates for Multiple Products | CISA

            Adobe has released security updates to address vulnerabilities in multiple products. An attacker could exploit some of these vulnerabilities to take control of an affected system.

          • Fear, Uncertainty, Doubt/Fear-mongering/Dramatisation

            • The Dirty Pipe Vulnerability

              This is the story of CVE-2022-0847, a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation because unprivileged processes can inject code into root processes.

              It is similar to CVE-2016-5195 “Dirty Cow” but is easier to exploit.

              The vulnerability was fixed in Linux 5.16.11, 5.15.25 and 5.10.102.

            • IT WireSerious flaw in Linux kernel patched, exploits released

              esearcher Max Kellermann of Ionos, the parent company of CM4all, a website builder, said in a detailed advisory issued on Monday that he had found the vulnerability after starting an investigation into file corruption reported by a customer.

              The flaw was introduced in kernel version 5.8 and has been patched in all recent stable releases: 5.16.11, 5.15.25 and 5.10.102. The Android mobile operating system is also vulnerable to this bug.

            • [Exaggeration] Help Net SecurityEasily exploitable Linux bug gives root access to attackers (CVE-2022-0847) [Ed: Well, attackers that already have full machine access]

              An easily exploitable vulnerability (CVE-2022-0847) in the Linux kernel can be used by local unprivileged users to gain root privileges on vulnerable systems by taking advantage of already public exploits.

              Discovered by security researcher Max Kellermann, the flaw – which he dubbed Dirty Pipe, due to its similarity to the Dirty Cow flaw – has already been patched in the Linux kernel and the Android kernel. Affected Linux distributions are in the process of pushing out security updates with the patch.

            • The New StackDirty Pipeline Is an Awful Linux Mess [Ed: Steven J. Vaughan-Nichols has just joined this Linux FUD fest]

              As I write this, there’s already a nasty exploit out there using the latest Linux kernel vulnerability, Dirty Pipeline, for any J. Random Luser to overwrite root’s password field in /etc/passwd. The experts at LWN.net called it a “disconcerting kernel vulnerability.” I call it a “shoot me now” security problem.

              But let’s not do that, shall we? Here’s the 411 on Dirty Pipeline, aka CVE-2022-0847. Web host sysadmin and programmer Max Kellermann found the security hole back in 2021, but he wasn’t at first sure what was going on. After a lot of blood, sweat, tears, and research Kellermann tracked down the problem to changes in the Linux kernel that became critical in Linux 5.8. With this update, Kellermann wrote, “it became possible to overwrite data in the page cache, simply by writing new data into the pipe prepared in a special way.”

            • Naked Security“Dirty Pipe” Linux kernel bug lets anyone write to any file [Ed: Now the insecurity firms rush to spread FUD and panic]

              Max Kellermann, a coder and security researcher for German content management software creators CM4all, has just published a fascinating report about a Linux kernel bug that was patched recently.

              He called the vulnerability Dirty Pipe, because it involves insecure interaction between a true Linux file (one that’s saved permanently on disk) and a Linux pipe, which is a memory-only data buffer that can be used like a file.

              Very greatly simplified, if you have a pipe that you are allowed to write to and a file that you aren’t…

              …then, sometimes, writing into the pipe’s memory buffer may inadvertently also modify the kernel’s temporary in-memory copies – the so-called cache pages – of various parts of the disk file.

            • Threat PostBug in the Linux Kernel Allows Privilege Escalation, Container Escape | Threatpost

              A missing check allows unprivileged attackers to escape containers and execute arbitrary commands in the kernel.

              To go along with the “Dirty Pipe” Linux security bug coming to light, two researchers from Huawei – Yiqi Sun and Kevin Wang – have discovered a vulnerability in the “control groups” feature of the Linux kernel which allows attackers to escape containers, escalate privileges and execute arbitrary commands on a host machine.

              The bug (CVE-2022-0492) exists in the Linux kernel’s “cgroup_release_agent_write” feature, which is found in the “kernel/cgroup/cgroup-v1.c” function.

            • 9to5GoogleDirty Pipe: What you need to know about the major exploit affecting Pixel 6 and Galaxy S22 devices

              The security world has been abuzz this week about a new Linux exploit called “Dirty Pipe,” which also affects Android 12 devices like Galaxy S22 and Pixel 6. Here’s everything you need to know about “Dirty Pipe,” which devices it affects, and how best to avoid it.

            • Android PoliceLinux Dirty Pipe kernel bug exposes Android to potential malware vector

              If Android were a car engine, and you popped the hood and poked around a bit, you’d find the label “Linux” etched on the engine block. The open-source operating system provides the starting point that Android’s built on top of, but sharing code also means sharing vulnerabilities. Now a newly discovered Linux kernel bug is raising concerns for the security of Android devices, as it leaves a door open for malware intrusion.

        • Privacy/Surveillance

          • TechdirtCongressmen Ask FBI For More Details About Agency’s Brief Flirtation With NSO Group Malware

            Shortly after it was becoming clear Israeli malware manufacturer NSO Group was a troubling company selling to troubling governments (but before its odiousness hit critical mass last summer), the FBI took a meeting with NSO and test drove a bespoke exploit. It was a variant of NSO’s uber-powerful Pegasus malware — one that bypassed NSO’s internal restrictions on targeting US-based phone numbers.

          • TechdirtNever Mind The Israelis: Nebraska Company Is Selling Wiretap-Esque Access To Social Media Accounts, Third Party Data

            While our attention is focused on a handful of Israeli malware purveyors that have the capability to turn phones into state witnesses, plenty of others are operating under the radar. Israel doesn’t have a monopoly on powerful phone exploits. It’s a crowded market and everybody — from totalitarian states to the FBI — wants some. The market is there. It just needs companies to fill it. And they have been.

  • Defence/Aggression

    • Common DreamsEx-Diplomats, Aid Workers Demand US/EU End ‘Reprehensible’ Seizure of Afghan Funds

      With Afghanistan’s economy teetering on the brink of collapse amid a nationwide humanitarian crisis, dozens of former diplomats, aid workers, and rights advocates demanded Tuesday that the United States and European countries immediately release the $9.1 billion in Afghan central bank assets that they froze after the Taliban retook power last year.

      “This totally avoidable, and manufactured, man-made disaster does not have to persist.”

    • Common DreamsOpinion | The Geopolitics of Hell

      Russia’s invasion of Ukraine has been widely described as the beginning of a new cold war, much like the old one in both its cast of characters and ideological nature. “In the contest between democracy and autocracy, between sovereignty and subjugation, make no mistake—freedom will prevail,” President Biden asserted in a televised address to the nation the day Russian tanks rolled into Ukraine. But while Russia and the West disagree on many issues of principle, this is not a replay of the Cold War. It’s an all-too-geopolitical twenty-first-century struggle for advantage on a highly contested global chessboard. If comparisons are in order, think of this moment as more akin to the situation Europe confronted prior to World War I than in the aftermath of World War II.

    • Counter PunchThe American Empire Self-Destructs, But Nobody Thought That It Would Happen This Fast

      The basic assumption of economic and diplomatic forecasting is that every country will act in its own self-interest. Such reasoning is of no help in today’s world. Observers across the political spectrum are using phrases like “shooting themselves in their own foot” to describe U.S. diplomatic confrontation with Russia and allies alike. But nobody thought that The American Empire would self-destruct this fast.

      For more than a generation the most prominent U.S. diplomats have warned about what they thought would represent the ultimate external threat: an alliance of Russia and China dominating Eurasia. America’s economic sanctions and military confrontation have driven these two countries  together, and are driving other countries into their emerging Eurasian orbit.

    • Counter PunchSweden’s Military Transfers to Ukraine for Beginners

      Sweden has transferred (or is the process of transferring) 5,000 anti-tank weapons to Ukraine. As a student of Swedish arms exports, I found this development interesting and potentially troubling. In order to put this transfer into the proper context, we need to review the scale of this transfer, some key elements of Swedish history, how some on the “left” respond, and the implications of arms transfers (and related moves) for Swedish security. Some will argue that Sweden needs to defend Ukrainian democracy against an aggressive, Russian state militarist invasion which has been linked to war crimes. Others may argue that Sweden’s incremental moves away from neutrality and non-alignment are dangerous, immoral and counter-productive. Whatever you believe, it is still necessary to present a larger context for deliberating on this question. There is no doubt that Russia’s cruel invasion should be opposed, the question for Swedes is whether transferring weapons is the best way to do so. Sweden has gradually, but increasingly quickly, moved closer and closer to NATO, part of a decades long movement in which military leaders from Sweden cooperate with NATO and the U.S. military.

      The Swedish Prime Minister Magdalena Andersson argued in a press conference on February 27, 2022 that the Swedish government supported weapons transfers to Ukraine because Putin had upset the European security order (by attacking a democracy in a mass military attack), because Ukraine received mass support from the Swedish people, and because she deemed that this decision was in the best interests of Sweden’s security. The weapons transfers involve five thousand antitank weapons, a similar number of helmets and life jackets as well as freeze-dried food for soldiers.

    • Counter PunchBedfellows Still: Robert Gates and the Washington Post

      There is a particular danger in exaggerating the threat that China and Russia represent, although their quasi-alliance needs greater and more sophisticated attention than the Biden national security team has applied.  Russia is having great difficulty in Ukraine; its economy will suffer greatly in the near term, and its military in the long term.  Moreover, the sanctions against Russia will have a deterrent effect on any Chinese ambitions regarding Taiwan.  Unlike Russia, China benefits from an export economy and severe sanctions would undermine its prosperity.

      In any event, the emphasis on a two-front war is spectacularly wrong-headed.  With the exception of Desert Storm in 1991, the United States and its vaunted military haven’t won a war in fifty years.  And the United States and NATO refuse to challenge Russia directly in spite of having superior military capability.  The restraining factor here is the possession of nuclear weapons.

    • Counter PunchBarrett Brown on Fascist Billionaires, Private Intelligence Firms and the Bankrupt Corporate Press
    • Counter PunchIf the US or NATO Put Fighters in the Air Over Ukraine We’d Have World War

      — Sen. Tom Wicker, (R-Miss), Senate Armed Services Committee

      “Declare a  no-fly zone over Ukraine at the invitation of their sovereign government.  Disrupt Russia’s air ops to give the heroic Ukrainians a fair fight. It’s now, or later.”

    • Counter PunchWhy Don’t We Treat All Refugees as Though They Were Ukrainian?

      Poland offers the most egregious example of national racism. Its government, whose nation borders Ukraine, has warmly welcomed traumatized Ukrainians, just months after turning away Afghans. If these optics weren’t bad enough, Polish nationalists have sought out people of color who are among the refugees fleeing Ukraine and violently attacked them. According to the Guardian, “three Indians were beaten up by a group of five men, leaving one of them hospitalized.” African nationals studying in Ukraine joined the exodus after Russia’s invasion, and have been stopped at the Polish border. Poland might as well erect a giant sign on its border declaring, “whites only.”

      In elevating such disparate skin-tone-dependent attitudes toward refugees, Europe is giving its colonialist heritage a new lease on life. We see echoes today of the dehumanization that enabled European colonization of the Global South and the enslavement of generations.

    • Counter PunchThe “Just War” Rationale: How Do Putin’s Claims Stack Up?

      Philosophers, theologians, politicians and military leaders have wrestled with this question for millennia. And to a large degree, they’ve come to some basic agreements about what makes a war morally defensible: a set of ideas known as the “just war tradition.”

      That’s not to say that they always agree on how to apply just war principles to an actual conflict. Given the Kremlin’s attempts to justify its invasion of Ukraine, including its groundless accusations of genocide, it’s worth analyzing Russia’s position through the lens of the just war tradition – the focus of my work as a political scientist who studies the ethics of conflict.

    • Counter Punch“Give Me Back the Berlin Wall…”

      In the above-linked commentary, drawn from a 4 minute passage—beginning at the 3:45 min. mark—of a profound (what we used to call “heavy”) conversational interview Mr. Cohen had with Norwegian reporter Helle Vaagland at the kitchen table of his Montreal flat in 2006 the late great singer-songwriter hinted at how he was able to (seemingly uncannily) predict “The Future.” “Canadians…grow up, you know, on the edge of America,” adding wryly, “and we watch America the way that women watch men: very very carefully.”

    • Counter PunchRussia is Ready To Replace France in West Africa

      France’s decision to end its military presence in Mali – carried out in two major military operations, Operation Serval and Operation Barkhane – was communicated by French President, Emmanuel Macron. “Victory against terror is not possible if it’s not supported by the state itself,” Macron said on February 16.

      The French President called the Malian leadership “out of control” and rationalized his decision as a necessary move, since “European, French and international forces are seeing measures that are restricting them.”

    • Common DreamsOpinion | On the Worthiness and Unworthiness of War Victims

      Rulers divide the world into worthy and unworthy victims, those we are allowed to pity, such as Ukrainians enduring the hell of modern warfare, and those whose suffering is minimized, dismissed, or ignored. The terror we and our allies carry out against Iraqi, Palestinian, Syrian, Libyan, Somali and Yemeni civilians is part of the regrettable cost of war. We, echoing the empty promises from Moscow, claim we do not target civilians. Rulers always paint their militaries as humane, there to serve and protect. Collateral damage happens, but it is regrettable. 

    • Common DreamsOpinion | To Truly Understand Ukraine War, Look to Our Future—Not the Past

      In recent days, experts have begun laying out the potential hardships the Russian invasion of Ukraine might inflict here in the United States, thousands and thousands of miles from the battle zone. As former White House national security official Richard Clarke bluntly put it, “Russia will bring the war to our homeland.” He pointed to potential damage in two particular realms, possible Russian cyberattacks and disinformation meant to unsettle our domestic politics. Similarly, economists and financial firms are predicting what an ongoing war in Ukraine could mean in terms of rising prices for wheat, vegetable oil, and oil and gas, among other commodities.

    • Counter PunchLet’s Not Forget

      Since the Russian Ukraine war started, I’ve been thinking about wars that were launched on Iraq and other counties in the Middle East. During the first Gulf war in the early nineties I was a new immigrant to Canada. I watched my beloved country burning hence Wolf Blitzer the reporter from CNN described the sky of Baghdad as a Xmas tree. For more than a month I didn’t know who survived the continuous bombing on Baghdad where my family resided.

      I thought of the sanction that was imposed on Iraq for thirteen years and the other wars the Americans launched along with their allies on Iraq.

    • Counter PunchA Few Provisional Thoughts on Putin as a Historical Figure

      2) Putin was keen for Russia to join the imperialist club as an equal and respected member of NATO. The US denied this desire on the part of Putin and the Russian political and economic elite.

      Instead, the US has promoted the expansion of NATO with nuclear missiles aimed at Moscow and St Petersburg in a number of countries bordering on Russia.

    • Counter PunchThe Frailty of Peace in the Midst of War

      “Our world has become so interdependent that violent conflict between two countries inevitably impacts the rest of the world. War is outdated — nonviolence is the only way. We need to develop a sense of the oneness of humanity by considering other human beings as brothers and sisters. This is how we will build a more peaceful world.”

      Too simple? Yada yada?

    • Common DreamsZelenskyy Says ‘We Have the Possible Resolution’ for Russian Demands

      Ukrainian President Voldomyr Zelenskyy said Monday that bringing an end to Moscow’s deadly assault on his country is within reach—but only if Russian President Vladimir Putin stops offering ultimatums and agrees to negotiate the terms of a peaceful settlement.

      During an exclusive interview set to air in full on Monday night, ABC World News Tonight host David Muir asked Zelenskyy if he has rejected the Kremlin’s “three conditions to end the war—that you must give up on joining NATO, recognize Crimea as part of Russia, and recognize the independence of those two separatist regions in the east.”

    • The NationThe Heart of Ukraine Is Under Attack
    • The NationCelebrating Zapatista and Kurdish Women’s Struggles, on International Women’s Day

      In 2021, 500 years after the Spanish conquest of the Indigenous communities in what is today Mexico, the Zapatistas launched an “invasion” in reverse, sailing across the Atlantic to Europe. This was not your usual invasion. The Zapatista delegation landed to discover the “other” Europe—in their words, the Europe of “those who fight, resist, and rebel,” as a way to share and learn from each other’s struggles, successes, and failures. Given the centrality of women in the Zapatista struggle, it is not surprising that one of the delegation’s encounters was with members of the Kurdish women’s movement, active in Europe. Kurdish and Zapatista women share more than just long-standing solidarity with each other. They share deeply resonant histories of developing women’s struggles within liberation movements.

    • Democracy NowIlhan Omar on Ending War, Global Refugees, Russia Sanctions & Why More Saudi Oil Is Not the Answer

      As the U.S. considers a ban on importing Russian oil as part of sanctions for its invasion of Ukraine, senior advisers to President Biden are reportedly planning to visit Saudi Arabia to secure more oil to make up the shortfall. We speak to Minnesota Congressmember Ilhan Omar about Saudi Arabia’s devastating war in Yemen, which has caused the worst humanitarian crisis in the world. “If our issue is that we don’t want to buy oil from a powerful country that is conducting a devastating war on its weaker neighbor, I just don’t see Saudi Arabia hardly being a principled solution,” says Omar. She also discusses the need to institute policies so all refugees of war can be treated with the same level of hospitality as Ukrainians, the need to ban members of Congress from trading stocks and more.

    • TruthOutUkrainian Activist: War Brings Rise in Sexual Violence and Anti-Trans Oppression
    • TruthOutNoam Chomsky: A No-Fly Zone Over Ukraine Could Unleash Untold Violence
    • Common DreamsPoland OKs Fighter Jets to Germany So US Can Give Them to Ukraine


      The Biden administration on Tuesday rejected the Polish government’s plan to send fighter jets to Ukraine via a U.S. air base in Germany, with a Pentagon spokesperson saying the proposal is not “tenable.”

    • Common DreamsUN Human Rights Chief Condemns Detention of Thousands of Russian Anti-War Protesters

      The United Nations High Commissioner for Human Rights Michelle Bachelet on Tuesday condemned the arrests of more than 12,000 anti-war protesters across Russia reported over recent weeks and denounced President Vladimir Putin’s “repressive” crackdown on dissent.

      Including about 4,300 people who were arrested in 56 cities across Russia over the weekend, according to independent protest monitor OVD-Info, an estimated 12,700 demonstrators have been detained since February 24, with many of those opposed to Putin’s invasion of Ukraine subjected to new anti-protest laws adopted last week.

    • Counter PunchPutin, Manhood, and Mad Coward Disease

      Some Kremlin watchers say he is “no longer in his right mind”—isolated, irrational, stubbornly fantasizing about a return to the gory days of the Soviet Union. That suggests there was a time when he wasn’t suffering from Mad Coward disease, a condition primarily found in men, characterized by acute insecurity, anger interfering with the ability to access vulnerability, and an aortic defect that presents as extreme cold-heartedness.

      Putin has likely long suffered from the condition, probably from childhood, where he was the youngest of three boys (both older brothers died young), and including his days preening bare chested on horseback. The condition is now acute: witness this “man’s man” sitting alone at one end of a 50-foot long table.

    • Common DreamsPentagon Rejects Polish Plan to Send Ukraine Fighter Jets Via US Air Base

      The Pentagon on Tuesday rejected the Polish government’s proposal to send its MiG-29 jets to a U.S. air base in Germany so the United States could transfer the aircraft to Ukrainian forces battling Russian invaders.

      Poland’s plan had followed skepticism about how members of the North Atlantic Treaty Organization (NATO) could deliver Soviet-era planes to Ukraine without being seen as engaging in the military campaign against Russia.

    • TechdirtThe Video Game Blockade Against Russia Begins With Volunteer Companies

      When it comes to Russia’s aggressive war in Ukraine and the world’s response to it, timelines obviously get quite compressed. I’ll admit to being somewhat surprised at how much relative unity there has been in the West’s response to Putin’s attempt to destroy European peace with its invasion of a neighboring country. This isn’t to say that more couldn’t be done, of course, but the cohesive response has been nearly as admirable as the fight the Ukrainian people are putting up against a formidable enemy. On the list of ways the world has responded, it perhaps seems something of a lesser thing that Ukraine called on the video game companies of the world to essentially blockade Russia from its activities. Lesser or not, however, the call was heard and several major players in the video game industry have done as asked.

    • Counter PunchThe Opera Singer and the Sanctions
    • Counter PunchWar in Ukraine is a Test for Peace and Unity

      The fact that wars are costly and unsustainable is not reassuring while casualties continue to grow. The organizations that normally monitor and document the impacts of violence and war as well as possible war crimes are facing conditions so grim, they have left the country. Indeed, many questions will be hard, if not impossible, to answer. Hundreds of civilians including many children are already among the dead. Why?

      After the end of World War I there was great resolve to see that the horrors would not be repeated. The League of Nations surfaced as a global body to enforce war prevention, but they failed. World War II renewed the necessity of peace and showcased the failures of the League.

    • Counter PunchOrdinary Russians are Already Feeling the Pain of Sanctions

      As a scholar of Russia’s political economy, I was surprised by the speed and severity of the Western economic response to the invasion of Ukraine. Whereas the sanctions that the West imposed after the annexation of Crimea in 2014 were generally quite ineffective – at best slowing Russian gross domestic product growth by 1% a year – this time they appear to be having an immediate impact. Just days into the conflict, we are seeing images of long lines of Russians attempting to get cash out of bank ATMs.

      In the past few days, the U.S. has frozen the assets of the Russian central bank in Western jurisdictions – an unexpected move – and excluded most Russian banks from the SWIFT bank clearing system, which processes trillions of dollars’ worth of transactions every day.

    • Counter PunchSanctions are Blunt Instruments Which Punish Entire Populations But Hurt Leaders Least

      The countries imposing sanctions on Russia since its invasion of Ukraine face the same problems as besiegers in the Middle Ages. Sieges take months or even years to succeed, but the crisis in Ukraine is deteriorating by the hour and the day – as demonstrated by the fighting around the Zaporizhzhia nuclear plant. As at Fukushima, there is the risk that the electric power needed to cool the reactors will be cut off with disastrous consequences.

      Yet the weakness of sanctions is not only that they work slowly, but that they give a false sense of achievement which is largely illusory. This has been demonstrated again and again in the last 30 years, ever since stringent UN sanctions were imposed on Iraq in response to its invasion of Kuwait in 1990.

    • Counter PunchIn the Ukraine War, We Can Make Oligarchs — Everywhere — the Big Losers
    • DeSmogAmidst Ukraine Crisis, Canada Is Quietly Trying To Boost Gas Exports to EU, Documents Show

      Senior Canadian officials are working with an Alberta company to open up new markets for natural gas in Germany, according to documents seen by DeSmog, contradicting a federal minister who says the Ukraine crisis can’t be solved by exporting more fossil fuels.

      Alfred Sorensen, the President and CEO of Calgary-based Pieridae Energy, pitched the idea of exporting gas from Canada’s east coast to Europe during a recent meeting whose participants included officials in Germany’s Federal Ministry of Economics and Technology.

    • The DissenterArms Flood Into Ukraine As US, NATO Pursue Proxy War Over Peace

      In the wake of Russia’s invasion of Ukraine, the country has been flooded with weapons and military hardware from Europe and North America. An exclusive report published on March 5 by the Washington Post quoted anonymous sources, who claimed the U.S. and its overseas allies were “quietly” prepared to support a Ukrainian government-in-exile. This expatriated administration would “direct guerrilla operations against Russian occupiers” over the course of a “long insurgency” following Moscow’s takeover of Kiev.While opposed to the establishment of a no-fly zone, the U.S. increasingly appears to be directly involved in the conflict against nuclear-armed Russia, which would make U.S. forces legitimate military targets or “co-combatants.”As Russia presses on with their military operation, Western countries are increasingly determined to fuel a counter-offensive in Kiev. There is little consideration or concern for the potentially catastrophic blowback that may result for Ukrainians and the world.

    • HungaryGalina used to live in Donetsk and speaks Russian, and Volodimir is a Ukrainian from Kyiv – they arrived in Hungary together
    • HungaryUkrainian ambassador to Hungary: Putin is not bombing you – yet
    • The Gray ZoneVictoria Nuland declares US is protecting ‘biological research facilities’ in Ukraine
    • RTLPutin nuclear threats ‘extremely dangerous’, ‘blackmail’: ICAN

      The 40-year-old Swede, who has spearheaded the group’s global efforts to ban the weapons of mass destruction since 2013, said she had never in her lifetime seen the nuclear threat level so high.

    • The NationUkrainians Fleeing War Fight to Survive on the Rails

      When refugees were lucky enough to board a train, the scenes inside the train cars were not much better than the ones on the platforms. On my train from Khmelnytskyi to Lviv, there were 10 people in my sleeper cabin designed for four. The corridor was lined with 20 refugees, sleeping upright on their luggage or lying on the floor. It was a perverse game of human Tetris. Despair was on the faces of everyone fleeing their homes, perhaps never to return. In my cabin, a man escorted his pregnant wife to the border, though he was unable to leave the country himself.

    • VOA NewsIranian President Says Iran Won’t Back Down on ‘Red Lines’ in Nuclear Talks

      Iran will not back down on its red lines in nuclear talks with major powers, President Ebrahim Raisi said on Tuesday, after the European Union said the time had come for Washington and Tehran to take political decisions needed to reach an accord.

      Eleven months of negotiations to revive the 2015 nuclear deal which lifted sanctions on Iran in return for curbs on its nuclear program have reached their final stages.

      Iran has sought to remove all sanctions and it wants guarantees from the United States that it will not abandon the deal once more, after then-U.S. President Donald Trump walked out of the deal in 2018 and reimposed sanctions.

    • ABCProud Boys leader charged in connection with Jan. 6 Capitol attack

      The leader of the Proud Boys, Enrique Tarrio, has been charged with conspiracy related to the Jan. 6 attack on the U.S. Capitol, as part of the FBI’s ongoing investigation into the attack.

      According to an indictment unsealed in federal court on Tuesday, Tarrio — though he wasn’t present at the Capitol on Jan. 6 — was instrumental in planning the [insurrection].

    • Common DreamsFormer ‘Proud Boys’ Leader Indicted on Conspiracy Charges Over Capitol Riot

      The former leader of the Proud Boys, a right-wing extremist group, was arrested in Miami on Tuesday for his role in the January 6, 2021 attack on the U.S. Capitol.

      Enrique Tarrio was indicted on one count each of conspiracy to obstruct an official proceeding and obstruction of an official proceeding. He was also indicted on two counts each of assaulting, resisting, or impeding certain officers and destruction of government property.

  • Environment

    • Common Dreams‘EPA Must Stop This Experiment’: Billions of Genetically Engineered Mosquitoes Set for Release

      Environmental and public health advocates responded with alarm after the Biden administration on Monday gave a British biotechnology company a green light to unleash billions of genetically engineered mosquitoes in the United States.

      “GE mosquitoes could result in far more health and environmental problems than they would solve.”

    • Science AlertPredators Have Evolved to Not Overexploit Their Resources. Can Humans Do The Same?

      However, in a recent study published in Ecology Letters, my colleagues and I show – using complex predator-prey models – how this delicate equilibrium between predator and prey could have evolved.

      Prudent predation means that a predator species has evolved to avoid consuming as much and as aggressively as its own physical limits permit. Effectively – though not knowingly – prudent predators are restraining themselves for the benefit of other members of their species, as well as for future generations.

    • RTLAbout 150 cases of water pollution reported in 2021

      In previous years, only about 100 such cases of water pollution were reported on average.

    • The Telegraph UKFracking back on the agenda as Boris Johnson blocks imports of Russian oil

      This newspaper understands ministers now back England’s only two viable shale gas wells being handed to the British Geological Survey rather than sealed up with concrete, in a sign of the softening position. It means they could be reopened at a later date.

    • Common DreamsClimate Coalition Urges Big Banks to Pull Plug on US Gas Exports

      A coalition of 120 progressive advocacy groups on Tuesday urged the six largest U.S. banks to stop financing new and expanded gas export facilities in the Gulf Coast region, emphasizing that supporting the continued extraction and burning of fossil fuels is a bad investment that endangers working people, biodiverse habitats, and the planet at large.

      “When banks finance fracked gas projects, they’re funding the creation of sacrifice zones,” John Beard, founder and president of Port Arthur Community Action Network, said in a statement. “The fossil fuel industry in Southeast Texas has swallowed up our local economies, poisoned our air and water, and contributed to the increased frequency and intensity of hurricanes that we’re still recovering from.”

    • Common DreamsOpinion | Government Climate Crisis Response: Deny, Delay, and Do Nothing

      While more than a half century ago the Twist was the craze in dance halls globally, today the Climate Change Shuffle is the craze in government halls and conference sites worldwide as officials dance around the dangers of climate change.

    • Energy

      • Common DreamsOpinion | Ukraine War Makes the Case for Renewable, Decentralized Energy

        As Putin’s war of choice against Ukraine tears that nation apart, his army is in the process of seizing a second nuclear power generating station, which will allow him to cut off power—and thus communications, heat, and water—to large chunks of that nation.

      • DeSmogAnti-Net Zero MP Steve Baker Took £5k From Chair of Climate Science Denial Group

        A Tory MP leading a backbench revolt against climate action recently received £5,000 from the chair of the UK’s most prominent climate science denial group.

        Steve Baker, a former Brexit minister, insists that his Net Zero Scrutiny Group (NZSG) of MPs accepts climate science and is only concerned about the cost and efficacy of the UK’s 2050 net zero target. 

      • Common DreamsUS Import Ban on Russian Oil a ‘Blow to Putin’s War Machine,’ Says Biden

        The Biden administration on Tuesday imposed a ban on U.S. imports of Russian fossil fuels in response to Moscow’s deadly assault on Ukraine.

        Speaking from the White House, President Joe Biden announced that Russian oil, liquefied natural gas, and coal will no longer be accepted at U.S. ports. “Targeting the main artery of Russia’s economy,” he said, will “deal another powerful blow to Putin’s war machine.”

      • NYPostBiden to issue executive order on cryptocurrency

        President Biden is expected to sign an executive order on cryptocurrency this week that will mark the first step toward regulating how digital currency is traded.

        The move comes as administration officials have raised concerns in recent weeks about Russia’s use of cryptocurrency to evade the impact of crushing sanctions in response to its invasion of Ukraine. The sanctions have sent the ruble to historic lows and have closed the country’s stock market.

        Two people familiar with the process said the executive order on cryptocurrency was expected to be issued this week and it had been in the works long before the war. Both people spoke on condition of anonymity to preview the order.

      • Mental Floss15 of the World’s Most Bike-Friendly Cities

        Biking is a great way to stay active and reduce your carbon footprint. Here are some cities that are actively encouraging this green mode of transportation.

      • ElectrekThe country where one in three adults rides an electric bicycle

        In the Netherlands, figures point to a clear demographic trend among electric bike owners. They tend to skew older, usually above 50, and are also of average or above average income. That tracks, as e-bikes are often used as a way for riders to return to cycling after they no longer have the stamina or range of motion for traditional pedal bicycles.

      • uni MichiganMoving beyond Gold-Level: Ann Arbor cyclists want better biking infrastructure

        When Nate Phipps, the co-founder of Bike Alliance of Washtenaw and managing director of the Center for Education Design, Evaluation and Research at the University of Michigan, first moved to Ann Arbor from Boston in 2014, he said he felt disappointed by the comparative lack of biking infrastructure. Since then, Phipps decided to get involved in community organizing to make Ann Arbor more bike-friendly.

      • NYPostIf the Ukraine war hasn’t scared the West straight on energy, nothing will

        In light of all this, Europe still choose to subjugate itself to an anti-Western authoritarian, and even as Russian opera stars are getting canceled, it is hesitant to stop purchases of Russian oil and gas.

        Some perspective is called for. While climate change may indeed prove a serious long-term challenge, it is not reducing parts of European cities to rubble or a threat to use as a tactical weapon.

        If this horrifying episode hasn’t scared the West straight on energy, nothing will.

  • Finance

    • Common DreamsOpinion | Now Let’s Do the American Oligarchs

      From President Biden’s State of the Union:

    • Common DreamsOpinion | The Post-Pandemic Recovery Will Be Green and Feminist or It Won’t Be

      I say this with a smile, because this is a phrase I never thought I would utter, and it gives me great satisfaction: as International Women’s Day arrives today let’s look at Chile. In this country where I grew up, notable for its conservatism and extreme neoliberalism, the winds of hope are blowing, largely thanks to the feminist movement.

    • Counter PunchYet More on Inflation

      Was the decision to go big with the Biden stimulus worth the cost in the form of higher inflation?

      We can certainly look at the Biden stimulus and point to areas where we spent more than necessary. I would put the high reach of the $1,400 pandemic payments top on that list. If we had a phase out beginning at say, $50,000 a person, they would still reach the overwhelming majority of people who were hurt financially by the pandemic.

    • TechdirtWorld’s ‘First NFT Vending Machine’ Didn’t Work And Neither Did The NFTs

      It’s difficult to overstate the amount of scammy bullshit that permeates the NFT space at the moment. On any given day my inbox is absolutely inundated with PR pitches for NFT-related products that are either pushing something that isn’t really new, don’t actually work, aren’t actually innovative if you eliminate the NFTs (the world’s first NFT-based escape room!) or are just outright scams.The latest case in point: one company recently unveiled what it declared was the world’s first “NFT vending machine” in Manhattan. The company issues a press release heralding the amazing innovation of the idea:

  • AstroTurf/Lobbying/Politics

    • Common Dreams‘Signed. Sealed. Delivered.’ Senate Sends USPS Reform Bill to Biden’s Desk

      Postal reform advocates on Tuesday welcomed the U.S. Senate’s passage of House-approved bipartisan legislation that was held up last month by GOP Sen. Rick Scott of Florida.

      A day after overcoming a filibuster, the Postal Service Reform Act passed the evenly split Senate in a 79-19 vote, with several Republicans joining Democrats to send the bill to President Joe Biden’s desk.

    • Common DreamsPetition Calls on Biden to Go Beyond Reversing Trump Policies to ‘Save Life on Earth’

      The Center for Biological Diversity on Tuesday laid out a comprehensive case for the Biden administration to go far beyond simply mending the damage done by President Donald Trump to the Endangered Species Act, calling on officials to strengthen the law “to save life on Earth from the extinction crisis.”

      In a legal petition, the organization made the case that the U.S. Fish and Wildlife Service and the National Marine Fisheries Service must not only fully implement the Endangered Species Act (ESA) but also add new provisions to the law to counter “years of overt political and industry pressure designed to weaken the Act.”

    • Common Dreams‘This Is Evil’: McConnell Blocking Extension of Free School Lunch Waivers

      Federal waivers that have given U.S. schools the flexibility to offer universal free lunches throughout the pandemic are at risk of ending as Senate Republicans—led by Mitch McConnell—stonewall a proposed extension of the relief measures, potentially depriving millions of children of no-cost meals in the coming months.

      Politico reported Monday that McConnell, the Senate minority leader, is “forcefully opposing” a provision to extend the federal school lunch waivers as part of an omnibus government funding package that Congress must pass by midnight Friday to avert a shutdown.

    • The NationMitch McConnell and Ketanji Brown Jackson

      If Mitch controlled the Senate, how would he Explain why Jackson’s hearings weren’t to be? No hearings while the French election nears? No hearings held in even-numbered years?

    • The NationThe Unknown Oligarch Fighting for an Endless Korean War

      “To President Moon Jae In and the US Congress: True peace Can Only Come from True Freedom,” flashed the three-story-high digital advertisement in Times Square. “Hold the North Korean Regime Accountable & Free the North Korean People.” Rolling across the screen, the text continued, “H.R. 3446 and H.R. 826 Benefit North Korea and China. If Passed, the Bill Will Ultimately Dismantle the UN Command and Remove US Troops from S. Korea,” before ending next to the photo of a mushroom cloud.1This article was copublished by The Nation and Responsible Statecraft.

      Connecting the two House bills to such apocalyptic imagery last September was decidedly hyperbolic. HR 3446, the Peace on the Korean Peninsula Act, merely calls for the US secretary of state to “pursue serious, urgent diplomatic engagement with North Korea and South Korea in pursuit of a binding peace agreement constituting a formal and final end to the state of war between North Korea, South Korea, and the United States.” HR 826, the Divided Family Reunification Act, would require the US government to prioritize reuniting Korean Americans with family members separated after the signing of the armistice agreement in 1953, including through potential video reunions.2

    • TruthOutThe GOP May Be Split by Trump, But Both Halves Are Exceedingly Dangerous
    • TruthOutStarbucks Loses Bid to Delay Union Election Count Again as It Cuts Worker Hours
    • The NationIs Manchin Duping Democrats Again?

      It’s hard to know how to respond to Senator Joe Manchin’s wildly erratic and self-centered maneuverings around President Biden’s ill-starred “Build Back Better” plan. We know you’re not supposed to negotiate with terrorists—of course, I’m not calling him a terrorist—but it’s fairly routine to negotiate with hostage-takers. And Manchin has taken most of Biden’s signature agenda hostage. First he cut it in half, and then he reneged on what colleagues, and even Biden, considered firm agreements, walking away from the whole thing just before Christmas, claiming it was time to deal with the federal deficit instead.

    • The NationMinneapolis Educators Strike for the Common Good

      Thousands of educators are on strike in Minneapolis, two years into a pandemic that has pushed public education to a breaking point across the country. With the future of education in unprecedented limbo, the stakes are high—and not just in the Twin Cities.

    • TruthOutDark Money Groups Fighting Biden’s Supreme Court Pick Funded Trump’s Big Lie
    • TruthOutMitch McConnell Leads Effort to Deny Millions of Children Free School Lunches
    • The NationDon’t Forget the Refugee Crisis After the Fighting Stops

      In the week following Russia’s indefensible invasion of Ukraine, more than 1 million people have fled the country. The lines of refugees at the Ukraine-Poland border stretch for miles. Children cry in the freezing cold as wait times reach 60 hours. Refugees discuss the relatives they had been forced to leave behind—sometimes without knowing whether their loved ones are alive or dead. And the United Nations predicts that these refugees could be followed by millions more—potentially resulting in “the biggest refugee crisis this century.”

    • TheGrugqCyber in the raw

      Russia’s opening cyber salvo was clearly tied to their war planning. They seem to have used wipers to go after gov, mil and comms systems to degrade Ukraine’s defense capacity. And the attack on KA-SAT was related to Ukrainian military capacity as well.

      These sorts of attacks are very much in line with the traditional model of cyberwar. They were targeted, tactical strikes with immediate effect and exploitation. Ukraine’s cyber response has been …full spectrum. The most obvious is the call for a global civilian hacker army.

    • CBC[Blockade] protest organizer Tamara Lich released from jail

      A judge has ruled one of the main organizers of the so-called Freedom Convoy can be released from jail, on the condition she leave Ottawa, reversing a decision made last month.

      Tamara Lich, 49, was behind a now-halted GoFundMe campaign that raised more than $10 million to support the protest in Ottawa, which became a weeks-long occupation.

    • Daniel MiesslerThe Anti-Putin Narrative Could Have Gone Very Differently

      There’s one thing that’s going well in this Ukraine situation, and that’s the general consensus—China notwithstanding—that Putin is an illegitimate aggressor.

      This is something we should celebrate and avoid taking as a given.

    • NewYorkTimesTikTok suspends livestreaming and new uploads from Russia.

      TikTok said on Sunday that it would suspend livestreaming and new content being uploaded from Russia, becoming the latest tech company to pull back from the country.

      TikTok, which is owned by the Chinese company ByteDance, said it was taking the actions as it reviews Russia’s new law on “fake news.” The law appears to target media outlets that don’t hew to the Kremlin’s line on the invasion of Ukraine.

  • Misinformation/Disinformation

    • NBCRussian propaganda targeting Spanish-language users proliferates on social media

      Russia and its allies have been using their media platforms to target Spanish speakers with propaganda that is inaccurate or an incomplete picture of the invasion of Ukraine, worrying some about the impact it can have on U.S. Latinos and across Latin America.

      While the outlets broadcast in Latin America, their reach on social media platforms like Twitter and YouTube is more extensive.

  • Censorship/Free Speech

    • TechdirtAs UK Government Is Still Interested In Banning Tor, BBC Uses Tor To Get Around Russian Information Blockade

      As Russia increasingly looks to cut itself off from the internet to avoid having any bit of reality reach its citizenry, others are working to get around the information blockade. The BBC on Friday reminded people that BBC News is available on the dark web in Ukrainian and Russian via Tor. As the BBC explained when it first launched its dark web version in 2019, it did this to make sure it could get news to people in places where the BBC News was blocked or restricted around the globe.

    • Krebs On SecurityInternet Backbone Giant Lumen Shuns .RU

      Lumen Technologies, an American company that operates one of the largest Internet backbones and carries a significant percentage of the world’s Internet traffic, said today it will stop routing traffic for organizations based in Russia. Lumen’s decision comes just days after a similar exit by backbone provider Cogent, and amid a news media crackdown in Russia that has already left millions of Russians in the dark about what is really going on with their president’s war in Ukraine.

    • Pro PublicaIn the Ukraine Conflict, Fake Fact-Checks Are Being Used to Spread Disinformation

      On March 3, Daniil Bezsonov, an official with the pro-Russian separatist region of Ukraine that styles itself as the Donetsk People’s Republic, tweeted a video that he said revealed “How Ukrainian fakes are made.”

      The clip showed two juxtaposed videos of a huge explosion in an urban area. Russian-language captions claimed that one video had been circulated by Ukrainian propagandists who said it showed a Russian missile strike in Kharkiv, the country’s second-largest city.

    • Hungary“Please, don’t report about this at all! Thanks!” – How the state news agency withholds news which are unpleasant for the government

      Direkt36 received a collection of documents showing that for years, one of the most important parts of the public news service, the Hungarian Telegraph Office (MTI) has been clearly serving the government’s political interests by manipulating or withholding important news. The documents contain extensive collections of internal emails and news reports which were never published. Translation by Andrea Horváth Kávai

    • VOA NewsChina Dictates Messaging About What’s Happening in Ukraine

      The state-run mass media and state-monitored social media are restricting war coverage as part of China’s effort at making peace and backing Russia’s right to defend its interests, observers say. They are using Russia’s label for the war, “special military operation,” instead of the term “invasion,” which is common in the West. Analysts say domestic media have been given specific orders about how to portray the conflict.

    • NewYorkTimesRussia, Blocked From the Global Internet, Plunges Into Digital Isolation

      The actions have turned Russia into a walled-off digital state akin to China and Iran, which tightly control the internet and censor foreign websites and dissent. China’s internet and the Western [Internet] have become almost completely separate over the years, with few overlapping services and little direct communication. In Iran, the authorities have used internet blackouts during protests.

      Russia’s cleaving off is a defeat for the once-held Western belief that the [Internet] is a tool for democracy that would lead authoritarian countries to open.

      “The vision of a free and open [Internet] that runs all over the world doesn’t really exist anymore,” said Brian Fishman, a senior fellow at the New America think tank and former director of counterterrorism policy at Facebook. “Now the [Internet] is lumpy. It has choke points.”

  • Freedom of Information/Freedom of the Press

    • Don’t Extradite AssangeEU Free Assange Rally Brussels

      In collaboration with DEA Campaign, the EU Free Assange campaign are hosting a promotional event where speakers invited can give a taster of the main event & encourage people to attend #FreeAssange Brussels rally.

    • Patrick BreyerNew media law: Russia tightens internet and press censorship

      The Russian regime is tightening [Internet] and press censorship in the country. On Friday, a law to ban the spread of “fake news” was passed. Journalists, bloggers and media creators who, according to the Russian government, publish false information about the war and the Russian armed forces face heavy fines and up to 15 years in prison. Terms such as “invasion”, “attack”, “war” or “declaration of war” may no longer be freely used (Moscow calls the war a military “special operation”). In addition, the Russian media regulator is blocking more and more websites of international media, such as the website of Deutsche Welle and the BBC, as well as Facebook and Twitter. Following this massive restriction of freedom of the press and information, more and more Western media are stopping reporting from Moscow, including ARD and ZDF.

    • VOA News‘We are Under a Suffocating Siege,’ Reporter Trapped Near Kyiv Says

      The Alaraby TV journalists were trying to leave Irpin, a town some 17 miles (28 km) northwest of Kyiv, on Saturday when Russian fire forced them back.

    • Rolling StoneKim Wall’s Life Was Overshadowed by Her Killer. A New Doc Hopes to Set Things Straight

      In her new two-part documentary, Carr (Mommy Dead and Dearest; Britney v. Spears) tells the story of the crime and trial that captivated an international audience, while continually focusing on the importance of Wall’s life and career and what’s been lost in their being cut short. She interviews police who investigated the crime, members of the Navy who helped search Madsen’s submarine and recover Wall’s remains, and journalists who covered the trial. Although Wall’s family declined to participate in the documentary, several of her friends share anecdotes that reveal her enthusiasm for exploration and her tenacity as a reporter.

  • Civil Rights/Policing

    • Common DreamsUber, Lyft, DoorDash Panned for New Lobby Group to Fight Worker Rights

      An app-based worker advocacy group on Tuesday decried companies including Uber, Lyft, and DoorDash for launching a new lobby group to fight federal and state-level efforts to protect workers and reclassify them as employees instead of independent contractors.

      “There’s nothing about working on an app, or having some flexibility in your work schedule that means people need to forfeit basic workers’ rights.”

    • Common DreamsOpinion | Anniversary of Selma Should Remind Americans How Democracy Is Defended

      Politicians for both parties loudly praise the courage of Ukrainians defending their democracy from the Russian invasion. Yet, bipartisan defense of democracy disappears when the question is democracy at home. Mar. 7 marked the 57th anniversary of “Bloody Sunday” in 1965, when the police attack of a peaceful march of Blacks seeking the right to vote in Selma, Alabama, stirred the outrage that led to passage of the Voting Rights Act.

    • Common DreamsIn ‘Momentous’ Ruling, Supreme Court Rejects GOP Voting Maps

      Voting rights advocates in North Carolina and Pennsylvania celebrated a victory late Monday after the U.S. Supreme Court rejected district maps that had been approved by Republican-led state legislatures and that critics said would give the GOP an unfair advantage in the midterm elections.

      “Today’s move by the court reinforces that legislatures do not have a ‘free pass’ to violate protections against partisan gerrymandering when drawing districts that undeniably hurt voters.”

    • Common DreamsUS Lawmakers Slammed for Double Standard on Russian, Israeli Crimes

      Rights advocates this week accused U.S. lawmakers of hypocrisy for backing severe sanctions to punish Russian aggression in Ukraine while unconditionally supporting Israel and condemning efforts to hold it accountable for violating international law in Palestine.

      “Members of Congress have shown their hypocrisy on this issue by supporting anti-BDS legislation when it comes to demanding accountability for Israel’s human rights violations.”

    • Counter PunchRestaurant Workers Need a Bill of Rights
    • The NationFree Brittney Griner

      The problem is not just what happened to Brittney Griner. The problem is that we don’t know what is happening to Brittney Griner now. The WNBA superstar was allegedly caught with hashish oil in her luggage at a Russian airport and has been in custody for several weeks. For those first couple of weeks, it was as if no one noticed she was missing, no small feat for an athlete who is six foot nine and one of the most recognizable players in the history of the game. She also is also well-known in Russia, where she plays for UMMC Ekaterinburg in the WNBA off season. In 2021 she helped the Russian team win its fifth EuroLeague Women’s championship. (Many WNBA players hoop in Russia during the off-season, as they need to supplement their income, an injustice in and of itself.)

    • The NationIt’s Time for American Feminists to Learn From Latin America’s Abortion-Rights Movement

      “You guys left the streets,” Mexican feminist Verónica Cruz told me last September.

    • Democracy NowThe Silencing of Dissent: Russia’s Memorial Human Rights Center Faces Closure Amid Putin’s Crackdown

      Russia’s crackdown on civil society has extended to antiwar protesters, independent news media and human rights organizations, silencing dissent and sources of information amid the war in Ukraine. Under Russia’s foreign agents law, nongovernmental organizations receiving funding from another country experience increased scrutiny and risk of liquidation. We speak with Anna Dobrovolskaya, executive director of the Memorial Human Rights Center, one of Russia’s oldest human rights organizations, which monitors human rights violations and provides legal assistance to asylum seekers. Russian courts ordered it dissolved in December 2021. “It’s the approach of the Russian government to widely and silently put some limitations on people who are just willing to speak openly,” says Dobrovolskaya. “The government is just trying to close everything down.”

    • Democracy NowOn International Women’s Day, Ukrainian LGBTQI Activist Describes Russian Siege as Millions Flee

      Ukrainian President Volodymyr Zelensky released a video on Monday to admonish Russia for breaking promises to let Ukrainian citizens evacuate safely through “humanitarian corridors,” as Russian forces have continued to lay siege to civilian centers. We go to western Ukraine to speak with Olena Shevchenko, Ukrainian human rights and LGBTI activist who recently fled the Russian military assault on Kyiv with her parents and has been helping to evacuate others. Vulnerable communities such as disabled and transgender people have a more difficult time fleeing to safety, says Shevchenko.

    • TruthOutOn a Grim and Bloody International Women’s Day, Let’s Build Feminist Solidarity
    • The Sunday Times UKRahaf Mohammed: my escape from Saudi Arabia to freedom

      She had escaped in the dead of night while on a family holiday in Kuwait City, catching a flight to Thailand in the hope of travelling on to Australia. Trapped in Bangkok airport while the authorities threatened to send her back to her family, the student became a global sensation, the face of female oppression. Her plight was covered by TV channels around the world. Just three months after the violent death of journalist Jamal Khashoggi at the consulate

    • NewYorkTimesNewly Published, From a Nixon Insider to Margaret Atwood

      REBEL: My Escape From Saudi Arabia to Freedom, by Rahaf Mohammed. (Ecco, $27.99.) In this memoir, a young woman tells the story of escaping her abusive family in Saudi Arabia, nearly being forced back to an almost certain death after being detained in Thailand and the Twitter followers who saved her life by helping her seek asylum in the West.

    • RSFSaudi blogger Raif Badawi still held after completing 10-year jail term

      Badawi ran an online forum called Free Saudi Liberals in which he discussed religious and societal issues with exceptional openness. After his arrest in 2012, he was eventually convicted of insulting Islam and was sentenced to 10 years in prison, 1,000 lashes, a fine of 1 million riyals and a 10-year ban on leaving the country after completing his jail term.

    • Saudi Arabia: Blogger Raif Badawi, arbitrarily detained beyond his sentence, must be immediately released

      Over the last few years, the Saudi Arabian authorities have invested heavily in PR stunts to rebrand their image and attempt to deflect attention from their brutal crackdown on activists and human rights defenders. Although there was a brief lull in executions and prosecutions of activists during Saudi Arabia’s presidency of the G20 summit, that ended immediately after the event when the authorities ramped up their repression once again.

    • Montreal GazetteAfter 10 years in Saudi jail, Raif Badawi’s family have hopes of imminent release

      The jailed dissident was sentenced to a 10-year prison term and 1,000 lashes in 2012 for writings that Saudi authorities perceived as promoting liberal values. His official sentence was up on Feb. 28, raising expectations he could soon be freed.

    • France24Amnesty urges release of Saudi blogger after sentence expires

      The 38-year-old, who was sentenced to 1,000 lashes and a decade in prison, was “arbitrarily detained solely for freely expressing his opinions”, a statement said on Friday.

    • Middle East EyeSaudi Arabia: Amnesty urges release of blogger after sentence expires

      The winner of the Reporters Without Borders prize for press freedom was arrested and detained in Saudi Arabia in 2012 on charges of “insulting Islam” and at the end of 2014 was sentenced to 10 years in prison.

      His wife, Ensaf Haidar, fled to Canada in 2013 and lives with their three children in Quebec, while continuing to press for her husband’s release, AFP reported.

  • Internet Policy/Net Neutrality

    • TechdirtClarence Thomas Is Doing That Thing Again Where He Muses Ignorantly About Section 230 For No Damn Reason

      Supreme Court Justice Clarence Thomas is at it again. Over the last few years, he’s taken to using the Supreme Court’s denial of cert in various cases as his own personal blog, to randomly muse on legal issues without any briefing. He’s done it to attack long standing defamation/1st Amendment precedent, and has used it to attack Section 230, which he’s done multiple times. Each time he’s done this, it’s with a weird and nonsensical personal interpretation of Section 230, without any briefing at all on the underlying issues. He seems to have taken a very weird misinterpretation of Section 230 — one supported by no courts and no authors of Section 230 — and insisted it must be right based on… his own personal feelings?

  • Monopolies

    • TechdirtAT&T/DirecTV Implosion Could Give Apple NFL Sunday Ticket

      It’s really hard to overstate what a colossal failure AT&T’s $200 billion acquisition of Time Warner and DirecTV was. And if you’re an AT&T executive with a bruised ego in the wake of the implosion, the hits just keep on coming. The megadeals were supposed to cement AT&T as a powerhouse in media and video advertising with HBO and the NFL as cornerstones. Instead, terrible leadership and hubris resulted in more than 50,000 layoffs, the closure of numerous loved brands (Mad Magazine, DC’s Vertigo imprint), the loss of millions of TV subscribers, and a mountain of debt AT&T’s still trying to climb its way out of.Paying off that debt involved offloading a lot of acquired assets for a song. It has also involved AT&T spinning off DirecTV in a new partnership with private equity firm TPG Capital. One of DirecTV’s flagship properties has been the exclusive deal to distribute out of market NFL games via NFL Sunday Ticket.

    • Patents

      • Ukrpatent Continues Normal Operations Despite Russian Aggression [Ed: The nihilism surrounding the patent system]

        On Tuesday, the Ukrainian Institute of Intellectual Property (Ukrpatent) issued a statement declaring “that during this extremely difficult time for the country, during the military aggression of the Russian Federation against Ukraine, which became the reason for the imposition of martial law . . . the State Enterprise ‘Ukrainian Institute of Intellectual Property’ (Ukrpatent) continues to operate on a full-time basis providing all the necessary functions and continuous operation of the state system of legal protection of intellectual property.” The statement by Ukrpatent Director General Andrew Kudin noted that Ukrpatent’s continued operations were due in large part to its employees, which the Director General indicated have been “mak[ing] significant efforts for securing the stability in operation of the enterprise.” The Ukrpatent announcement concluded by stating:

      • USPTO severs ties with counterparts in Russia [Ed: As if the military cares about patents...]

        The US Patent and Trademark Office (USPTO) has terminated engagement with the Russian IP office Rospatent, as well as the Eurasia Patent Organisation, in response to the escalating conflict in Ukraine.

      • Considerations For Applicants and Practitioners Due to Recent EPC Guidelines Regarding Description Amendment Requirements [Ed: Well, EPO guidlines aren't compatible with the EPC and have not been for ages]

        Article 84 of the European Patent Convention (EPC) requires that the claims of a European patent application “shall define the matter for which protection is sought” and “shall be clear and concise and be supported by the description.”[i] To assist practitioners and patent examiners, the European Patent Office (EPO) provides patent examination guidelines interpreting the EPC. Recently, the EPO updated these guidelines, including Guideline F-IV 4.3, which interprets the requirements of EPC Article 84. New Guideline F-IV 4.3 provides strict description (i.e., specification and drawings) amendment requirements by providing that “[a]ny inconsistency between the description and the claims must be avoided if it could throw doubt on the subject-matter for which protection is sought and therefore render the claim unclear or unsupported under Art. 84,” such as where “[p]art of the description and/or drawings is inconsistent with the subject-matter for which protection is sought.”[ii] This may occur where parts of the description are not encompassed by the wording of the claims or are inconsistent therewith, such as may reasonably result from making amendments to the claims that are narrower than the full scope of the original description. In such situations, Guideline F-IV 4.3 specifically instructs that “[t]he applicant must remove any inconsistencies by amending the description either by deleting the inconsistent embodiments or marking them as not falling within the subject-matter for which protection is sought.”[iii]

      • Lexology(Non-)uniqueness of closest prior art [Ed: EPO clearly violating the EPC here]

        The method applied by the European Patent Office to assess the presence of an inventive step is based on the “problem-solution” approach. This approach has three main steps: determining the closest prior art; establishing the objective technical problem to be solved; and examining whether the claimed invention, starting from the closest prior art and the objective technical problem, would have been obvious to the person skilled in the art. This article focuses on the first step of the problem-solution approach.

      • Common DreamsAdvocates Say Biden’s New Vaccine Production Project Must Be Publicly Owned

        Instead of fully handing the production of taxpayer-funded coronavirus vaccines over to private companies motivated by profit—an approach that experts say has failed disastrously thus far—the Biden administration should keep all new domestic manufacturing capacity under government ownership to ensure that public health needs are prioritized over corporate interests.

        “A public facility would give the government freedom to make decisions regarding supply, price, and global cooperation.”

      • Common Dreams‘Appalling’: Moderna Rebuked Over Latest Covid-19 Vaccine Patent Strategy

        Vaccine equity campaigners on Tuesday accused Moderna of continuing its stranglehold over lifesaving technology in response to the biotechnology company’s announcement that includes a vow to never enforce Covid-19 patents in some lower-income countries.

        “Everyone should have access to this lifesaving technology, which is why governments need to waive intellectual property rules and break vaccine monopolies.”

      • Software Patents

    • Copyrights

      • Hollywood ReporterDua Lipa Hit With Another Copyright Lawsuit Over “Levitating”

        Dua Lipa is facing a second copyright lawsuit over her smash hit song “Levitating,” this time claiming she lifted material from a pair of decades-old disco tracks.

        In a complaint filed Friday in Manhattan federal court, songwriters L. Russell Brown and Sandy Linzer accused Lipa of copying their 1979 song “Wiggle and Giggle All Night” and 1980 song “Don Diablo.” They said the opening melody to “Levitating” was a “duplicate” of the melody to their songs.

      • Torrent FreakPirate IPTV ‘Nitro TV’ Fails to Pay Own Lawyer, ACE & MPA Move In For The Kill

        The ruination of those behind pirate IPTV service Nitro TV now seems almost inevitable. A lawsuit filed by DISH Network could result in a $100m judgment and in another, filed by members of the Alliance for Creativity, the only defendant to appear has now failed to pay his lawyer. That leaves the possibility of another judgment, potentially in excess of $250 million.

      • Torrent FreakYoutube-dl’s Hosting Provider Fights Record Labels’ Lawsuit

        Hosting provider Uberspace has asked a German court to dismiss the copyright infringement lawsuit Sony, Warner and Universal filed a few weeks ago. The case revolves around the open-source youtube-dl software for which Uberspace hosts the website; not the actual software. According to the hosting company, the overbroad lawsuit threatens the freedom of information.

      • Torrent FreakNetflix Continues to Expand its Global Anti-Piracy Team

        Netflix wants to expand its global anti-piracy team. To keep up with growth, the streaming giant has created a new position that brings together many facets of the company’s content protection work under one lead. Among other things, the ideal candidate will be required to support research on pirate streaming sites, cyberlockers, and other pirate platforms.

      • Creative CommonsCC stands in solidarity with Ukraine and supports those safeguarding public collections, educational resources, and cultural heritage sites

        Alongside the humanitarian crisis, the war is also causing irreversible damage to the arts, cultural, education, information, and media sectors. Creative Commons stands in solidarity with Ukraine and supports the brave and selfless individuals, working hard to preserve, safeguard, protect, and share the knowledge and cultural heritage of the Ukrainian people. 

« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts