Mr. Breton and EPO Corruption (Propelling an Assault on the Rule of Law and on the Courts Themselves) Endanger the Legitimacy of the EU

Posted in Europe, Patents at 10:03 pm by Dr. Roy Schestowitz

This has got to be a joke, right?

Breton reply

'Is it a Common Court according  to CJEU jurisprudence?' Breton: 'It is a Common Court because it is written in the agreement'. Writing the 'Earth is flat' does not make the 'Earth flat'

Summary: A terse, crude lie from Mr. Breton does not actually tackle this question; it reaffirms the widespread perception that Mr. Breton is covering up/hiding EPO corruption for his mate Benoît Battistelli and the UPC lobby (or ‘Team UPC’, looking to rewrite the rules that govern them)

Patrick Breyer, Germany
Patrick Breyer, Germany. Licence: Creative Commons CC0 1.0 Universal Public Domain Dedication.

Links 11/3/2022: IPFire 2.27 – Core Update 164, FSF Opposes EARN-IT

Posted in News Roundup at 9:31 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • TechTarget8 things to know when switching from Windows to Linux

        Free and open source software can be difficult to understand for those used to restrictive licensing and proprietary software that you can’t modify. Linux makes source code — i.e., the programming behind applications — freely available. Anyone can modify that code to create better software over time.

        The result is that people can implement good ideas no matter where they come from and without any real regard for corporate agendas or financial bottom lines. Software evolves quickly and is subject to review only by the community, which often means increasing the application’s security and stability.

        Proprietary software — i.e., closed source software — comes pre-compiled for the consumer. You cannot modify it.

    • Server

      • CloudFoundry vs Kubernetes: Which Cloud Platform Should You Choose? – CloudSavvy IT

        CloudFoundry and Kubernetes are two open-source technologies used to run applications in the cloud. Selecting the right platform for your deployments is an important choice to maximize performance, maintainability, and the productivity of your developers.

        In this article we’ll compare the characteristics of both CloudFoundry and Kubernetes. Whether you’re already using one of the pair, you’re trying to make the choice for your next project, or you’re just curious to learn how they differ, we’ll explore their capabilities and explain their use cases.

    • Audiocasts/Shows

    • Applications

      • Make Use OfThe Top 15 Best Linux Terminal Emulators

        The command line is the core of the Linux operating system. Unlike other OSes, Linux distros are more dependent on the terminal to carry out administrative tasks. Also, Linux users prefer it due to its better performance and power-user feel.

        The terminal comes pre-installed in most Linux distros. However, you might not get many customization options and advanced functionality with the default one. That’s where the alternatives come into play—these terminal emulators provide extra features and customizations to enhance your Linux experience.

        So, let’s look at 15 of the best terminal emulators for Linux that you can use for free.

    • Instructionals/Technical

      • VideoHow to install the Brave browser on Zorin OS 16 – Invidious

        In this video, we are looking at how to install the Brave browser on Zorin OS 16.

      • Linux Made SimpleHow to install Blender 3.0.1 on a Chromebook

        Today we are looking at how to install Blender 3.0.1 on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • How to Extract a GZ File in Linux

        If you’re using a Linux PC, you’ll need to open a file or folder that’s been compressed to take less disk space from time to time. This is done to save room or to let you upload or download a file faster.

        On Windows, these files are usually compressed as zip files. Linux uses a similar algorithm, called gzip. If you want to interact with these files, you’ll need to know how to extract a GZ file in Linux—here’s how.

      • H2S MediaHow to Install VidCutter on Debian 11 Bullseye – Linux Shout

        Install free and open-source VidCutter software on Debian 11 Bullseye or Debian 10 Buster, using command terminal for video editing.

        VidCutter is a free editing program with a basic range of options to manipulate videos. But often enough you just want to crop a video or combine individual excerpts. This is where VidCutter comes into play.

        Just like its name developers of the program have been reduced to the essentials in order to offer you exactly what you need for cutting. So you no longer have to learn complicated video editing programs just to build a small clip.

      • How to Control Root-Level SSH Access | Venafi

        Cracking just one SSH machine identity allows attackers to pivot to other systems. Take control over your SSH keys without disruptions or outages with Venafi’s SSH Protect.

      • H2S MediaHow to install IntelliJ IDEA on Ubuntu 22.04 | 20.04 LTS – Linux Shout

        Get the steps and commands to install IntelliJ IDEA on Ubuntu 20.04 LTS Focal fossa and 22.04 Jammy JellyFish using the terminal to start coding and developing applications.

        The IntelliJ development environment is a popular IDE among Java developers. The commercial version costs around 49.90 dollars per month – whereas the community edition with some limited features is completely free.

        Compared to the free alternative Eclipse, IntelliJ convinces it with a nice, modern interface. Anyone who has ever worked with an IDE will quickly find their way around here.

        IntelliJ is perfect for developing Java, Kotlin, Groovy, Scala, and Android programs. The integration of Git, SVN, Mercurial, and CVS is also very practical.

      • Managing MiniDisc Devices From the Command Line

        So I’ve been working on getting a CLI NetMD setup going, as all the existing options are either electron-based (bad), or google chrome only (worse). Most of my other workflow is on the command line, if I can avoid it I’m not opening up a GUI or Web app to do just one thing. Particularly since I rerecord various discs every week or more, I wanted something that was convenient to use and was “set it and forget it”. platinum-md requires me to slowly navigate to the folder holding the song I want, select it to transfer, wait, then slowly navigate to the next folder and so on which is no fun. Also my six year old laptop fans rev up full speed the instant I opened it so that doesn’t make it easy to “forget it” either.

      • How to install Zabbix 6 on Ubuntu 20.04 step by step – NextGenTips

        In this tutorial I will be showing you how to install Zabbix 6 step by step on Ubuntu 20.04.

        Zabbix is an open-source tool for monitoring IT infrastructure like networking, servers, cloud services and virtual machines.

        Zabbix collects and display basic metrics on a dashboard. It uses a flexible notification mechanisms that allows users to configure email based alerts for all the events that happened. This allows fast reaction to server problems. Zabbix offers excellent data visualization and reporting using stored data. Zabbix reports and configurations are accessed via a web based frontend.

      • TechRepublicHow to use SSHFS to mount remote directories on Rocky Linux | TechRepublic

        SSHFS (SSH File System) makes it possible to mount remote filesystems via an SSH connection. SSHFS uses SFTP (SSH File Transfer Protocol) to mount a remote directory on a local machine such that the connection between the client and server is encrypted. Because of that, SSHFS can be used as a more secure solution for traditional FTP.

      • Install Cockpit on Debian 11/Ubuntu 22.04 – kifarunix.com

        Follow through this guide to learn how to install Cockpit on Debian 11/Ubuntu 22.04. Cockpit is Web Console enables users to administer GNU/Linux servers using a web browser. It offers network configuration, log inspection, diagnostic reports, interactive command-line sessions, and more. You will learn how to install Cockpit on Debian 11 and how to install Cockpit on Ubuntu 22.04.

      • H2S MediaHow to Install LibreWolf Browser on Debian 11 Bullseye – Linux Shout

        Learn the commands to install open source LibreWolf browser on Debian 11 Bullseye Linux using command terminal.

      • H2S MediaHow To Install Cacti monitoring on Ubuntu 22.04 | 20.04 – Linux Shout

        Have a look at the quick steps given in the tutorial to install Cacti on Ubuntu 22.04 Jammy JellyFish and Ubuntu 20.04 Focal Fossa server for monitoring network devices.

        Cacti is an open-source tool for monitoring hosts in larger networks using SNMP (Simple Network Management Protocol). It comes with numerous ready-made scripts and data templates. Cacti is just as suitable for a server running under Linux that queries the remotely maintainable network switch as it is for recording and visualizing any other measurement data that occurs regularly. It offers itself as a framework that can be easily configured via a browser. Cacti uses the MySQL database to save its settings and the Apache webserver for interactive configuration and display of the graphics.

        Cacti manage templates for graphics, hosts, and data sources that can be created using a browser. You save a lot of work if the same values ​​have to be monitored on several hosts. The visualization tool comes with ready-made templates for many systems (Linux/Unix computers, various router models).

    • Games

    • Distributions

      • New Releases

        • Beta NewsBuying the Zorin OS 16.1 Pro Linux-based operating system can help Ukraine

          Zorin OS is one of the best Linux-based operating systems around, thanks to its focus on elegance and simplicity. It offers familiarity to Windows-switchers too. Ultimately, Zorin OS is a solid distribution for both Linux beginners and experts alike.

          Today, the first “point” release of Zorin OS 16 becomes available for download. Zorin OS 16.1 comes with security patches plus other goodies, such as the great LibreOffice 7.3 office suite and other updated packages.

          This version of the operating system is loaded with support for new hardware too, such as Sony’s PlayStation 5 Dual Sense game controller and Apple’s Magic Mouse 2. How cool is that? Those with very modern PCs will appreciate support for 12th generation Intel Core processors and NVIDIA RTX 3050 graphics cards. The developers also promise better support for Wi-Fi cards and printers.

          Do you want to try Zorin OS 16.1 for yourself? You can grab an ISO from the download page here. Don’t be scared by the $39 asking price, as that is only for the “Pro” variant of the operating system. The “Core” version is entirely free. With that said, the Pro variant does have some pretty cool additional features — you can compare the two versions on the download page linked above.

        • IPFire 2.27 – Core Update 164 released

          A little but later than scheduled, it is finally here: IPFire 2.27 – Core Update 164 – coming with a vastly improved firewall engine, a new kernel under the hood, and of course with various security and bug fixes.

          Before we talk in detail about what is new, I would like to ask you for your support. IPFire is a small team of people and like many of our open source friends, we’ve taken a hit this year and would like to ask you to help us out.

        • 9to5LinuxKali Unkaputtbar Brings File System Snapshots to Btrfs-Based Kali Linux Systems

          If you ever wanted to have file system snapshots on your Kali Linux installation, now you can with Kali Unkaputtbar, a new feature that implements just that on all Kali Linux 2022.1 and later systems that use the Btrfs file system by default.

          Kali Unkaputtbar implements automatic snapshots for APT installations or removals, automatic snapshots on every boot, automatic creation of Kali Linux specific Btrfs subvolume layouts, and adds a new boot menu in the GRUB bootloader to let users boot into specific snapshots in a read/write manner.

      • BSD

        • FreeBSDFreeBSD Quarterly Status Report 4th Quarter 2021 | The FreeBSD Project

          This report covers FreeBSD related projects for the period between October and December. It is the fourth of four planned reports for 2021, and contains 19 entries. Highlights include faster boot times, more LLDB work, a base OpenSSH update, and more wireless development.

      • IBM/Red Hat/Fedora

        • [Old] PipeWire

          I’ve been using pipewire for all my audio for about a month now and my overall verdict is….. pretty good. It is still alpha quality and in heavy development, but I can imagine a time in the not-too-far-off-future when pipewire is the default on major Linux distributions. That said, I haven’t tried the video side of things; at the moment a functional webcam is all I need.

        • VMware and Red Hat top 5G Telco Cloud native platforms ranking
        • Red Hat wants to be the default platform for Open RAN – Telecoms.com

          Open-source enterprise software vendor Red Hat reckons it’s perfectly positioned to be the default platform for the move towards OpenRAN.

        • Red Hat OfficialUniversity Health Network Transforms Core Connected Healthcare System with Red Hat Integration

          Red Hat, Inc., the world’s leading provider of open source solutions, today announced that University Health Network, a Toronto-based healthcare and medical research organization, transformed its core hospital information system using Red Hat Integration to improve data accessibility across specialized patient care applications throughout the organization. With an enhanced integration solution, University Health Network is able to connect previously disparate environments to consolidate, transport, and improve the security of critical healthcare data in support of better patient outcomes and clinical research needs.

      • Debian Family

        • Michael Ablassmeier: fscom switch shell

          The command and password are not documented by the manufacturer, i wondered wether if its possible to extract that password from the firmware. After all: its my device, and i want to have access to all the features!

        • Holger Levsen: 20220310-Debian-Reunion-Hamburg-2022

          As last year there will be a Debian Reunion Hamburg 2022 event taking place at the same location as previous years, from May 23rd until the 30th.

          This is just a preliminary announcement to get the word out, that this event will happen, so you can ponder attending. The wiki page has more information and some fine folks have even already registered!

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Now Hiring! Project Coordinator | Inkscape

        As Inkscape continues to grow, the responsibilities of the Inkscape team increase in tandem. To keep up with the current pace, the Project Leadership Committee are looking for a Project Coordinator.

      • The modern function and role of the OSI Board of Directors [Ed: This latest OSI waffle distracts from the fact they’re put Microsoft in charge]

        The last few years have seen a lot of change for the Open Source Initiative. Starting in 2020, we started a journey to strengthen the organization. We’ve had a profound clarification of mission and vision. We shifted into an advisory board and hired our first Executive Director to lead the organization and staff. Together, the board and staff defined OSI’s strategy, which the staff used to develop measurable 2022 goals and plans that move us towards our vision. This strategy and planning approach is an evolution in the role of the board of directors and how it functions with staff.

      • Web Browsers

        • Mozilla

          • GhacksApple, Google, Microsoft and Mozilla are working together to improve web development standards [Ed: This is not improving the Web, it's making it worse; they're colluding to control it (and they already control it; see the past fortnight's events)]

            Apple, Google, Microsoft and Mozilla are working together in order to improve the web standards that are used across browsers and devices. It might sound like a cool crossover episode of superheroes, but this is not the first time the browser giants are pooling resources, they began working together in 2019.

          • MozillaThe pandemic changed everything — even the way we use browser extensions

            On March 11, 2020 the World Health Organization declared COVID-19 a global pandemic. Within days, practically the entire planet was on lockdown. We went indoors and online.

            So how did the sudden mass migration online impact browser extension usage? Pretty dramatically, it turns out. On this two-year mark of the start of the pandemic we looked back at Firefox extension installs and usage data to discover several compelling trends.

      • FSF

        • FSFEARN-IT threatens encryption and therefore user freedom

          A campaign recently launched in the United Kingdom demonizes encryption as something only a criminal would so much as want to use, and the rationale behind the “Eliminating Abusive and Rampant Neglect of Interactive Technologies” (EARN-IT) Act currently on the floor of the US Senate is much the same. Everywhere we turn, we find senators and talking heads claiming that governments around the world need to hold “Big Tech accountable,” and they say one important step of that is banning end-to-end encryption. Criminals, they say, shouldn’t be given a way to secure their communications from scrutiny. It’s no surprise to hear governments pointing to crime as a way to justify encroachments on individual freedom — or, for that matter, to use loaded words like “hide.” Are you “hiding” when you lock the door of your home every day, just because the government is not permitted to enter it without a warrant? Is it “hiding” to seal the envelope of the card you’re sending your Valentine? Even if you accept that this is hiding, end-to-end encryption is not only, or even primarily, for hiding from bulk government surveillance.

          Anytime lawmakers begin to contemplate the so-called “rampant” misuse of end-to-end encryption, they would do well to reflect on the positive ways it’s being used on a daily basis. A lot of time is (rightly) devoted to how it has protected whistleblowers like Edward Snowden, but end-to-end encryption has vital use cases that are much closer to home. Free, encrypted messaging, for example, helps protect queer youth from intolerant violence (at home and abroad, as in Ghana). At the same time, in a world where abusers can stalk their victims solely by hiding an AirTag in their bag, end-to-end encryption plays a direct role in helping victims out of these relationships by enabling them to contact friends for help. There are as many use cases for end-to-end encryption as there are people using it. To say otherwise shows not only a paucity of imagination, but is something that can only be spoken from a position of power and privilege.

        • GNU Projects

          • [Old] How I found out about FOSS

            Now I can count the number of non-free programs I use (excluding firmware stuff), want to find ways to stop using those (seems unlikely), and would very much like to get in on the whole open hardware thing (but that’s not going to happen any time soon). I’ve seen not just how much more ethical and sensible the free software approach is, but also that a lot of the time the software is technically better than the alternatives. Not being told what you can and can’t do with your devices by massive corporations is a big plus too.

            Collaboration and sharing just make so much sense, I’m very glad the free software community exists.

          • GNU Jitter and GCC: the fun of playing with fire

            A few days ago on March 6 I participated in the Binary T00ls Summit online event (https://binary-tools.net/) organised by José Marchesi (https://jemarch.net); a video recording is now available.

            My presentation had the ridiculous title GNU Jitter and the illusion of simplicity or Copying, patching and combining compiler-generated code in executable memory or The Anarchist’s guide to GCC or The fun of playing with fire — or, in shortened form, GNU Jitter and GCC: the fun of playing with fire.

  • Leftovers

    • Integrity/Availability

      • Proprietary

        • Pseudo-Open Source

          • Privatisation/Privateering

            • Linux Foundation

              • Block Joins the Linux Foundation [Ed: No connection at all to Linux]

                You know Block – but you may not know that you know the company. After changing their name in December from Square, Inc. to Block, the company is made up of Square, Cash App, TIDAL, Spiral, and TBD54566975. We are excited to announce that Block joined the Linux Foundation as a Silver Member.

                At their core, Block is a global technology company with a focus on financial services. They work to help diverse audiences—sellers, individuals, artists, fans, developers, and all the people in between—overcome barriers to access the economy. From enabling sellers to adapt to a new, contactless and omnichannel economy, to finding new ways for musicians to get paid and pursuing many crypto initiatives aimed at improving the Bitcoin ecosystem, they are innovating every day to help shape a more inclusive economy of the future.

              • What Is The SPDX Standard and How Is It Helping The Software Industry? [Ed: Linux Foundation is a front group of anti-GPL collectives]

                The list includes big names like Google and Microsoft as well as the developers of adjacent tools such as Anchore and Snyk.

        • Security

          • The New StackSilkworm Encryption

            Building a bullet-proof encryption system isn’t easy. A major component of all classic cryptographic systems is random numbers. But how random is random? All too often random-number generators are fatally flawed. Some run out of entropy, such as billions — that wasn’t a typo — billions of insecure Internet of Things (IoT) devices. Others, such as 2008’s infamous Debian Linux OpenSSL failure, owe their origin to really sloppy programming. And let’s not forget that the NSA used to routinely weaken commercial cryptography by playing random number games. So, why not improve your encryption with random number generators based on silkworms?

          • The New StackHow an OSPO Can Help Secure Your Software Supply Chain [Ed: Typical openwashing garbage and FUD from VMware; “VMware Tanzu sponsored this article for The New Stack.”]

            It’s nearly impossible these days to build software without using open source code. But all that free software carries additional security risks.

            Organizations grapple with how best to secure their open source software supply chain. But there’s another problem: Many companies don’t even know how many open source applications they have — or what’s in them.

          • Fear, Uncertainty, Doubt/Fear-mongering/Dramatisation

            • eSecurity PlanetDirty Pipe Makes Linux Privilege Escalation Easy

              A major Linux vulnerability dubbed “Dirty Pipe” could allow even the least privileged users to perform malicious actions.

              Researcher Max Kellermann of Ionos revealed the new vulnerability earlier this week. The name is reminiscent of the “Dirty Cow” vulnerability discovered in 2016 that allowed attackers to gain root access on any Android Phone regardless of the OS version, but Dirty Pipe could be even easier to exploit than its predecessor.

              Kellermann managed to exploit the Linux kernel bug, which allows any user, including the least privileged ones such as the “nobody” account, to perform malicious actions such as adding an SSH-key to the root user’s account to access the server remotely with full privileges.

            • Make Use OfWhat Is the Dirty Pipe Exploit in Linux and How Can You Fix It? [Ed: The media likes to make it sound like Linux is the worst]

              Linux has fallen prey to yet another highly-severe privilege escalation vulnerability in recent succession to the Control Groups loophole that allowed threat actors to escape containers and execute arbitrary code. This new vulnerability weaponizes the piping mechanism in Linux and uses it to gain write access with root privileges.

              It is raising eyebrows throughout the Linux community and has been named as a nominee for being one of the most serious threats discovered in Linux since 2016.

            • Linux vulnerability allowed root-level access | SC Media

              A German coder and security researcher recently posted his findings related to a Linux kernel bug that could give root-level access to remote attackers.

              In a post, Max Kellerman called the bug in CVE-2022-0847 “Dirty Pipe,” which allowed overwriting data in arbitrary read-only files, which can lead to privilege escalation. The vulnerability was patched in 5.10.102, 5.15.25 and 5.16.11, but is still vulnerable in 5.8, 5.10, 5.15 and 5.16.

            • CSODirty Pipe root Linux vulnerability can also impact containers | CSO Online [Ed: New twists of 'flavours' of the FUD]

              The dangerous Linux privilege escalation flaw dubbed Dirty Pipe that was recently disclosed could also impact applications and systems that use containerization through tools such as Docker, researchers warn. This follows a different privilege escalation vulnerability that was patched last week and could lead to container escapes.

            • Synopsys contributes to the Linux Foundation Census II of the most widely used open source application libraries [Ed: Microsoft proxies like Black Duck were being the attacks on Linux through the ‘Linux’ Foundation, spreading FUD for Microsoft]

              Last week, the nonprofit Linux Foundation and Harvard’s Lab for Innovation Science published Census II of Free and Open Source Software—Application Libraries. This report identifies more than 1,000 of the most widely deployed open source application libraries. Synopsys Cybersecurity Research Center (CyRC) was among the contributors of anonymized usage data based on scans of codebases at thousands of companies, providing data that allowed for a more complete picture of the free and open source software (FOSS) landscape.

          • Privacy/Surveillance

    • Environment

      • Journey to save planet

        A standard XII boy from Bengaluru has been chosen to be a part of a climate change expedition to Antarctica. The Climate Force Antarctic Expedition is scheduled for March 17-28. Organisers said the expedition will be more than just carbon neutral but in fact ‘carbon negative’. Through various carbon capture/offsetting strategic partnerships, the expedition’s projected emissions will be offset by 1.25 times.

    • AstroTurf/Lobbying/Politics

      • [Older] World’s Biggest Social Media Company Does More Anti-Social Things

        Look, we don’t want to be covering Facebook again either, but the company it seems is incapable of avoiding serious international scandals for any meaningful length of time. While each of these outrages would be enough to sink plenty of Silicon Valley companies, this particular one seems to be coated in a Facebook-blue shade of Teflon.

        Take the second week of September, for example. A report by the New York Times detailed how Facebook had been providing academics incomplete and potentially misleading data on Facebook misinformation for years. The company had permitted access to its data for researchers studying the spread of misinformation on the site for the last couple of years in order to build trust in the brand, however the Times report noted that the data it’s been providing included only around half of users in the US, and only ones that engaged at a high level with political content. A Facebook spokesman explained the issue as a “technical error” and email to researchers include apologies from Facebook for the “inconvenience it may have caused”, but the company also cut off access to the NYA Ad Observatory Project for using its own browser plug-in to collect its own data on the site’s political advertising.

      • Fortnite isn’t a game, it’s a lecherous advertising platform

        In 2019 one Canadian lawyer filed a legal notice against Epic Games, accusing it of using psychological techniques in order to hook players to Fortnite.

    • Internet Policy/Net Neutrality

It Smells Like Marketing — Not Journalism — When Almost 100% of the ‘Articles’ From Jason Evangelho, Senior Contributor at Forbes, Are About the Same Topic

Posted in Deception, DRM, Marketing at 9:07 pm by Dr. Roy Schestowitz

Same with "The Linux Gamer" (they’re even doing videos together)

Jason Evangelho, Senior Contributor at Forbes

Summary: Jason Evangelho, who used to cover GNU/Linux at Forbes and then vanished, has made a comeback. But pay attention to this publication pattern (above).

When Sanctions Go Toxic: Google, Co-Founded by Moscovite, Agrees With Moscow and Recognises Mariupol (Ukraine) as a Part of Russia

Posted in Google at 5:39 pm by Dr. Roy Schestowitz

This week: Паникерский Гугл по ошибке отправил Мариуполь под санкции

Donetsk thing

I come from Mariupol. You come to Putin!

And then Ukraine is part of (Bela)Russia

Summary: “Google considers that the territory that DPR considers theirs is indeed theirs,” a source has told us. “The guy from Mariupol says that because his city is in Donetsk oblast’ Google Clown blocked him considering him as a resident of DPR.” Those sanctions are, as usual, punishing many of the victims; they punish the wrong people and help the occupier/invader/oppressor. “In this case they definitely punished the wrong person,” the source has added. “Being a Ukrainian in Ukraine and a refugee, but also being punished by Google in the name of Ukraine is several levels of ironic.” And another person has noted that “this is why i don’t believe in the “clown” [...] if you’re in the wrong country at the wrong time, there goes your data…”

Google is evil

Attribution 2.0 Generic (CC BY 2.0). Original here.

Links 10/3/2022: Zorin OS 16.1 and MorphOS 3.16

Posted in News Roundup at 3:10 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • Unix MenThe Five Reasons Why Techies Are Obsessed With Linux

        We all know people who are obsessed with tech. For the vast majority, it’s people obsessed with the more traditional forms of the media and web. Obsessing over Google, Chrome or developing on Apple.

        The most they come to really going into the details on tech and obsessing, is building out their Core Web Vitals resource center or producing the best templates to rank. And while there’s certainly an art and importance to that. After all, we all want our websites to be on the first page of Google, Linux fans and professionals take that obsessive nature to a whole new level. But why?

      • Unix MenHow Linux Has Changed The Business Landscape & what The Future Holds For Linux

        An operating system is a software that manages all of the hardware resources associated with our devices. It is the bridge of communication between the software and the hardware of our smartphones/desktops/laptops. Windows, Android Ios, MacOS are the few familiar operating systems we use in our daily lives, but one such operating system not many know about is Linux. Not just our Android phones but many other devices/appliances like cars, refrigerators, wristwatches, televisions, etc., are powered by Linux.

      • UNIX CopTOP 5 Linux OS For Old Computers

        The topic of discussion today is what may be the top five Linux operating systems for old computers? With high-speed computing becoming more and more common, old computers are just a dumping ground. But managing such old resources can be a big challenge. The electronic components are not so eco-friendly while recycling. The affordability of modern IT resources remains a challenge for many schools, institutions, and organizations around the world. There is only one OS that can meet these demands: Linux. Not only does the OS support high-end computing, but it also supports old hardware resources. While maintaining performance, compliance, and security concerns, we can do good computing here. Firstly, we will see where we can utilize such old systems.

    • Audiocasts/Shows

      • Jupiter BroadcastingLinux Action News 231

        Why Dirty Pipe is a dirty dog, the explosive adoption of Linux at AMD, and an important update on elementary OS.

      • VideoXeroLinux 2022.03.06 overview | An “Eyecandy” lover’s wet dream. – Invidious

        In this video, I am going to show an overview of XeroLinux 2022.03.06 and some of the applications pre-installed.

      • 379 – There Can Be Only One – mintCast

        1:38 The News
        25:43 Security Update
        34:58 Bi-Weekly Wanderings
        1:00:23 Announcements & Outro

        First up in the News, Linux Mint Edge is out, PinePhone Pro Explorer Edition can be ordered, Gnome and Plasma have new versions you can test, Nvidia and Wayland play nicely on Plasma, and we are all mocking Cosmic,

        In security, FOSS is a national security issue and Microsoft decides not to force locks.

        Then in our Wanderings, Joe fixes things, Moss installs things, Bill works on things and Norbert writes things down.

      • Video“Deck anxiety” and the future of native Linux ports – featuring Jason Evangelho, Liam & Nick! – Invidious

        Thanks to Jason Evangelho, Nick from The Linux Experiment & Liam from Gaming on Linux! I had an absolute blast with this.

      • VideoLinux Essentials – Bash History – Invidious

        Bash is the default shell in the majority of Linux distributions, and it has countless features and tricks to make you more efficient. Bash keeps a history of the commands you’ve typed at the prompt, but most people aren’t aware of additional functionality that the history provides you.

      • BSD Now 445: Journey to BSD

        Idiot’s guide to OpenBSD on the Pinebook Pro, FreeBSD Periodic Scripts, history of service management in Unix, journey from macOS to FreeBSD, Unix processes “infecting” each other, navidrom music server on FreeBSD, and more.

    • Kernel Space

      • Graphics Stack

        • GamingOnLinuxMesa drivers version 22.0 out now

          More open source goodness coming at you, as Mesa version 22.0 is officially out now for Linux open source graphics drivers.

          The release announcement was short and sweet, noting Vulkan 1.3 support as one of the big features. The release notes do give a little more info, although they’re still aimed at quite a technical audience.

    • Applications

      • Ubuntu HandbookBlender 3.1.0 Released with Metal GPU backend, Multi-thread Support for Geometry Nodes

        The free open-source 3d modeling software, Blender released new major 3.1.0 version a day ago.

        Blender 3.1.0 introduced new Metal GPU backend for the Cycles renderer, contributed by Apple. It currently works on M1 computers running macOS 12.2+, and Apple computers with AMD graphics cards running macOS 12.3 or newer.

        The release also has big performance improvements to Geometry Nodes. Many nodes are now multi-threaded. Medium loads up to 10x faster. Memory usage reduced up to 100x in large fields.

      • GamingOnLinuxBlender 3.1 is out with better performance, new advanced features

        Blender, the all-in-one tool for 3D creation including modelling, rigging, animation, simulation, rendering, compositing and motion tracking, video editing and more has a big upgrade out with version 3.1.

        Full release notes can be seen on the Blender Wiki with a couple of highlights including: exporting .obj files is now orders of magnitude faster, playback in the 3D Viewport is now much faster, Geometry Nodes performance is much better with many nodes now multi-threaded, a new Point Cloud object can be rendered directly with Cycles to create sand, water splashes, particles or even motion graphics and lots more.

    • Instructionals/Technical

      • Medium3 Ways To Save Terminal Output to Files in Linux

        If you are a programmer, especially if you’re a backend developer. It’s inevitable that you need to do something on a Linux terminal instead of a GUI. One obvious problem is that the terminal is not visual-friendly, especially when you want to check some large-size standard output (stdout).

      • OSNotedog – Alternative to dig command in Linux for DNS lookup – OSNote

        You must have heard and used the dig command in LInux for DNS lookup. Alternative to that, there is a dog command which is an open source tool with a beautiful interface used for DNS lookup. Its output is very attractive with different colors provided in Json format. It supports the DNS-over-TLS and DNS-over-HTTPS protocols.

        In this article, we are going to discuss the installation process and the use cases of dog commands on ubuntu 20.04 LTS server.

      • HowTo GeekHow to Use the Bash printf Command on Linux

        The Bash printf command lets you write to a Linux terminal window with finer control and more formatting options than the echo command provides. Even printf ‘s odd quirks can be useful.

      • ID RootHow To Install Fotoxx on Ubuntu 20.04 LTS – idroot

        In this tutorial, we will show you how to install Fotoxx on Ubuntu 20.04 LTS. For those of you who didn’t know, Fotoxx is a free, open-source program for basic image editing. Is about a GTK application with which we can also organize and manage a large collection of images, optimize photos and perform batch operations. Unlike another image editor, Fotoxx has app menus in the left pane with the ability to toggle file view, and edit photos. While providing many functions to meet the needs of serious photographers, it remains fast and easy to use.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Fotoxx image editor on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.

      • ID RootHow To Install Podman on CentOS 9 Stream – idroot

        In this tutorial, we will show you how to install Podman on CentOS 9 Stream. For those of you who didn’t know, Podman is a container management tool engine for developing, managing, and running OCI Containers on your Linux System. Just like Docker, it helps developers to develop, manage, and run their applications on containers.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Podman container management tool on CentOS 9 Stream.

      • Linux Command-Line for Absolute Beginners – ByteXD

        If you are a beginner in Unix/Linux, you might have heard the term terminal or command prompt. We’ll use these terms interchangeably in this tutorial.

        You may have experienced it yourself, a black screen with cursor beeping for you to enter some commands.

      • HowTo ForgeHow to Install Bagisto eCommerce on Debian 11

        Bagisto is a free and open-source eCommerce software written in Laravel PHP framework and it uses Vue.js – a progressive JavaScript framework. Bagisto is a hand-tailored eCommerce that allows you to build your online store in no time. It is fast, responsive, beautifully frontend, and easy to use. Bagis to is an eCommerce framework that provides multiple locales for different types of languages, multiple currencies, supports multiple store themes, and also provides a feature multistore inventory system.

        In this tutorial, we will show you how to install Bagisto eCommerce on the Debian 11 Bullseye. We will be using the PHP-FPM, Nginx web server, and MariaDB database.

      • HowTo ForgeHow To Install Terraform On AlmaLinux 8, CentOS 8 and Rocky Linux 8

        Terraform is a tool for building and maintaining a virtual server infrastructure; it supports multiple cloud providers in one project. Terraform achieves state management through a configured graph of states and modules which can be created, extended, and managed by users.

        There are plenty of tutorials online that teach you how to use the tool, but it’s not always easy to grasp the concepts behind it all! What makes Terraform so flexible and powerful is that you have the ability to program your infrastructure in any language or even create your own language based on Python (which some people call “Terraforming”.)

      • Install Proxmox VE [A Step By Step Guide] – OSTechNix

        In this tutorial, we will discuss what is Proxmox VE (Virtual Environment) and how to install Proxmox VE to setup server virtualization environment to create and manage virtual machines and containers.

      • Linux CapableHow to Install PHP 8.1 on Fedora 36 Linux – LinuxCapable

        PHP 8.1 is a significant update of the PHP language released on November 25, 2021. This is a standard upgrade in the future from the existing PHP 8.0 release. The new PHP 8.1 brings enums, fibers, never return type, final class constants, intersection types, and read-only properties amongst the long list of new features and changes.

        In the following tutorial, you will learn how to install PHP 8.1 on Fedora 36 Linux by importing the REMI repository. The tutorial will install the development kit extensions and some tips for Nginx and PHP-FPM using the command line terminal.

      • Linux CapableHow to Install LibreWolf Browser on Fedora 36 Linux – LinuxCapable

        LibreWolf is a Firefox fork that focuses on privacy and security by eliminating telemetry, which can be invasive to your personal information, along with increased protection against tracking and fingerprinting techniques, while also including a few security improvements.

        In the following tutorial, you will learn how to install LibreWolf Browser on Fedora 36 Linux. The tutorial will go over importing the official repository and gpg key and updating and removing the browser.

      • Linux CapableHow to Install Brave Browser on Fedora 36 Linux – LinuxCapable

        Brave is a free and open-source web browser developed by Brave Software, Inc. based on the Chromium web browser. Brave is a privacy-focused internet browser that sets itself apart from other browsers by automatically blocking online advertisements and website trackers in its default settings.

        Brave claims that its browser puts less strain on your computer’s performance than Google Chrome. Even with multiple tabs open at once, the new Brave Software uses 66% less memory and has 50 million more active users than before – a growth of 2X in 5 years!

        In the following tutorial, you will learn how to install Brave Browser on Fedora 36 Linux by importing the official GPG keys and repository with step-by-step instructions on installing, updating, and removing the browser, including disabling/enabling the DNF repository. As a bonus, the beta and nightly optional installation methods are included, installed alongside stable.

      • How to Push and Pull Docker Images With DigitalOcean’s Container Registry – CloudSavvy IT

        DigitalOcean’s Container Registry gives you a private space in the cloud to store and distribute your Docker images. As well as offering an image repository, the service also integrates into DigitalOcean’s other services. You can deploy stored images to App Platform and use them with your Managed Kubernetes clusters.

      • VituxHow to Remove File Exif Data with ExifTool in Ubuntu 20.04 – VITUX

        Dealing with pictures on your computer, you might have come across EXIF data without knowing what it is. Images with EXIF data reveal all the details about a photo such as where and when was it taken as well as with what device, amongst a host of many other things. While this is commonly a desirable feature for many, it raises privacy concerns for many others, especially if they want to share their pictures online via social media. Having file EXIF data consumes more disk space when compared to those without it. In this guide, we will take a stab at answering the question “how to remove file EXIF data in Linux?”.

        There are various tools available for Ubuntu to remove Exif data from pictures, but ExifTool works the best in my experience. It removes the metadata from the image without recompressing it, keeping it at its original quality.

        It allows you to remove the EXIF data with a variety of options, e.g., you can save the same image without the metadata or export a new copy without it.

      • How to check which Desktop Environment is used on Linux

        As you may be aware, Linux-based operating systems rely extensively on the command line to carry out tasks. After installing a simple distribution like Arch Linux, you’ll be presented with a dark terminal. The desktop environment, which makes Linux distros dynamic and user-friendly, is often overlooked.

        The majority of new Linux users are unfamiliar with desktop environments and have no idea about the desktop environment they are using.

        This tutorial will go through different methods to see which desktop environment your Linux system is currently using.

      • Red Hat OfficialHow to set up a network bridge for virtual machine communication | Enable Sysadmin

        If you’re using virtual machines (VMs) with a hypervisor like KVM or QEMU, you may need to configure a network bridge to facilitate systems communicating on the same subnet.

        One of my favorite ways to configure my network is nmtui, a user-friendly console tool for the NetworkManager utility.

        I’ll begin with an example setup. This is a common base-level deployment for virtual hosts, and the same principles apply to this configuration as they would to a structure for hundreds of hosts.

      • How to Install Drupal CMS in Ubuntu 20.04/22.04

        CMS platforms are becoming a norm in the World Wide Web and Drupal is a reputable candidate in this docket. With CMS platforms, content management is easier for all users as all the needed administrative functionalities for managing website content have been met. Therefore, it doesn’t matter whether you are running a small blog site, government site, or a large corporate website.

        Drupal is powered by PHP programming language and this article guide will walk us through its installation on Ubuntu 20.04 and Ubuntu 22.04.

      • Linux CapableHow to Install Python 3.8 on Ubuntu 22.04 LTS – LinuxCapable

        By default, Ubuntu 22.04 LTS Jammy Jellyfish does not come with Python 3.8 in its repositories, unlike some other distributions such as Ubuntu. Python 3.10 is now the latest stable feature release series of Python 3, with Python 3.11 still in beta.

        To run some applications or frameworks on Ubuntu, you may need to install Python 3.8 on your system, for example, using the Swift programming framework. Python 3.8 is currently being worked on for security releases until its end of life on the 10th month of 2024. However, it is advisable to upgrade to newer versions if you are developing applications.

        In the following tutorial, you will learn how to download the latest version of Python 3.8 compile and install this version of Python on Ubuntu 22.04 LTS Jammy Jellyfish.

      • LibreOffice Writer: Inserting Al Qur’an Verses and Translations

        How to insert Al Qur’an and translations into LibreOffice Writer documents? In the past we had QiOO. Now we have Insert Qur’an Text, also known as QuranLO, an extension of LibreOffice. The benefit is that it’s complete, easy to copy paste, and includes translations in English and Indonesian as well as other languages. We would love to gratefully thank Pmossie who developed this useful piece of software. Now let’s learn.

      • Daiki Ueno: On command-line argument parsing

        The command-line tools that are part of GnuTLS (such as certtool and p11tool) had been using the GNU AutoGen for handling command-line arguments. AutoGen (do not be confused with autogen.sh script commonly used in Autotools based projects) does a great job in that regard, as it produces command-line parsing code and the documentation from the single source file. On the other hand, integrating the AutoGen infrastructure into a project can be tricky in many ways, e.g., it requires its own runtime library (libopts) whose interface compatibility is not well maintained. Therefore, we decided to switch to a simpler solution and we’ve finally completed the migration recently. As I spent way too much time on this, I thought it might make sense to summarize the process in case anyone comes across a similar situation.

      • Docker Stop Container Commands [Examples] | Itsubuntu.com

        In this tutorial post, we are going to show the docker commands to stop one or more running containers. We will learn about how to stop or kill the running docker containers.

      • Uncommit Git’s Last Commit | Undo The Last Commit | Itsubuntu.com

        How To uncommit Git Files or Undo The Last Commit. Without any further explanations, let’s have a look into the process to undo the last commit or uncommit Git’s last commit.

      • Daniel StenbergDeprecating things in curl | daniel.haxx.se

        The curl project has been alive for decades. We gradually introduce new features and options into the command line tool and library over time and we work hard never to break existing behavior and keep the ABI and API stable.

        Still, some features and functionalities go out of style sooner or later. Versions get deprecated, third party dependencies go stale and turn unsuitable for use.

      • SudoSudo 1.9.10: using regular expressions in the sudoers file | Sudo

        It has been possible to use wildcards in the sudoers file for many years. This can make configuration easier and more flexible, but it also introduces problems of its own. Regular expressions, introduced in in sudo 1.9.10, allow you to create more fine grained rules. From this blog you will learn about some of the problems when you use wildcards in your sudoers file, and how using regular expressions can resolve those problems.

    • Games

      • “I Love Free Software Day”: Free Software games and a SharePic generator

        Since 2010 the Free Software Foundation Europe has been organising the yearly “I Love Free Software Day”. Together with hundreds of Free Software enthusiasts we celebrated our love for Free Software on the 14th of February. To all of you who took part and celebrated the “I Love Free Software Day”, we would like to thank you so much.

        In 2022 we have worked very hard on creating something new and fun for this year’s “I Love Free Software Day”. So we have set a topic for the day and focused on Free Software games. Besides the special podcast episode about the Free Software game “0 A.D.: Empires Ascendant” with its project leader, Stanislas Dolcini, we have organised an event dedicated to Free Software games.

      • GamingOnLinuxHere’s how to get the EA App on Steam Deck with Bottles | GamingOnLinux

        Another guide for you today. For those of you who want to use the EA App on the Steam Deck (or a Linux desktop!), here’s one of the possible ways to do it using Bottles.

      • GamingOnLinuxGoogle plans their own version of Wine to run Windows games on Stadia | GamingOnLinux

        Stadia is something we don’t really talk about here too much now, as Google has let it slide considerably from the original aim but it’s still going and it seems Google still has some interesting plans for it.

      • GamingOnLinuxNetherguild brings a turn-based tactical roguelite dungeon-crawling demo to Steam | GamingOnLinux

        Netherguild is a turn-based tactical roguelite dungeon-crawler, where you command expeditions below the earth in a desperate attempt to cure a strange plague. A proper demo is now available on Steam (also itch.io as before). Giving you a chance to explore, camp, and fight as far as you can before heading back to resupply.

        I’ve had a lot of fun with this one at various points in its development, covering it here on GOL some time ago.

      • GamingOnLinuxCrown of Pain could turn into the next great match-3 RPG | GamingOnLinux

        Do you like Match 3 games? Well, I do! Crown of Pain mixes together the idea of matching tiles but blends in turn-based RPG battles too.

        Now in Early Access from Jagit Games, Coldwild Games it might be a little rough going in with not enough of an explanation for now but you can quickly piece together what tiles will help. Visually quite simple with the pixel art, but the atmosphere is good enough to pull you in for that “just one more run” feeling that I got from a great many other games.


        As a debut game from Latvia-based solo dev Jagit Games it’s good.

      • GamingOnLinuxAtmospheric puzzle game The Last Cube is out now | GamingOnLinux

        I remember playing the demo for The Last Cube and being quite amazed at how good it was, and the full game is out now. The game features, as the name might suggest, a Cube — that’s you. Rolling around on your sides to get through the map and various puzzles. How Improx Games managed to make such a thing entertaining is still a mystery, it has such wonderful design to it.

        The Last Cube features a sticker system, allowing you to stamp abilities onto your cube’s sides. Some will allow you to dash through barriers, others will create makeshift stairs, and some grant the ability to spin in place for easy manoeuvring in tight places. Positioning your cube to acquire the desired stickers on the correct surface can range from pleasingly simplistic, to masochistic head scratchers as you scramble through The Last Cube’s 100+ puzzles. New mechanics are introduced at a breezy clip, rapidly expanding one’s perception of what your cube is capable of.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • 17 Best KDE Multimedia Applications for Linux

          If you’re a media aficionado using Linux, then you might be aware of some of the incredible suite of platforms available at your disposal. What you might be unaware of, however, is how vast your options are.

          Enter KDE and a family of subsystems using the KDE desktop environment. In this category of multimedia tools available to the sub-Linux system, you can find the list of options emphasized below.

        • KDE Plasma 5.24 Review. A Crafted Desktop to Dominate the Linux World

          It’s time for a quick recap and review of the KDE Plasma 5.24 desktop, released a while back.

        • Long live multicursors – Kate

          Ever since I started contributing to Kate there has been one feature request that was being requested in almost every blog post or discussion about kate: multiple cursor support. I am happy to say that after 3 or 4 days of really pushing myself to implement this and address all the issues we just merged it (KDE Frameworks 5.92)! It will be available not only for Kate users, but for KDevelop, KWrite and any application that uses KTextEditor as its editor component.

        • [Season of KDE 2022] Status update: FEDC and Update Automation – post #4

          This is my fourth status update for Season of KDE 2022.

          In my last post I told how packaging was almost done and I was looking out to automate updates.


          I plan to add checker data to all the remaining applications (~80) in the next 2-to 3 days. I’m also parallelly looking over to use FEDC on KDE Invent to automatically update non KDE dependencies on master manifest repo.

    • Distributions

      • MorphOS 3.16 – Public Release

        The MorphOS development team is proud to announce the immediate availability of MorphOS 3.16. This release includes numerous important performance, stability and security improvements. A new version of Wayfarer comes included with the OS and replaces the now obsolete Odyssey Web Browser. We’ve also included the Iris email client, Magic Beacon notifications system and a Command-Tab application switcher. The Synergy Client and Server applications are now compatible with the free Barrier alternative. OpenSSL3 is now available as a shared library.

        For a more extensive overview of the changes included in MorphOS 3.16, please read our release notes.

        We strongly urge new users to carefully read our installation and troubleshooting guides before they attempt to install MorphOS for the first time. Existing users can upgrade via the familiar procedure but are encouraged to read the guides as well. MorphOS 3.16 is available for download in our files section.

      • New Releases

        • Zorin OS 16.1 Released & Support for Ukraine

          Today, we’re introducing Zorin OS 16.1 – our most advanced operating system ever. It’s packed with improvements to help you work better, updates to apps and system-level software, and support for new hardware.

          However, this launch comes during a historically calamitous occasion, affecting our family, friends, and all people of Ukraine. We want to take this opportunity to provide support and humanitarian aid to the ordinary citizens facing hardship in Ukraine and to the families fleeing the violence.

        • 9to5LinuxUbuntu-Based Zorin OS 16.1 Released with LibreOffice 7.3 and Linux Kernel 5.13

          Zorin OS 16.1 is here about seven months after Zorin OS 16 and comes with a newer kernel, namely Linux 5.13, from the recently released Ubuntu 20.04.4 LTS (Focal Fossa) operating system. This provides users with better compatibility for newer hardware, including NVIDIA RTX 3050 GPUs, 12th-Gen Intel Core processors, Sony PlayStation 5 DualSense controllers, Framework laptop, Apple Magic Mouse 2, as well as other devices.

          Also new is the latest and greatest LibreOffice 7.3 office suite, along with newer versions of several pre-installed apps and core components, including the Mesa 21.2.6 graphics stack from Ubuntu 20.04.4 LTS and Ubuntu 21.10, providing users with a more feature-rich desktop experience from the get-go.

        • Its FOSSZorin OS 16.1 is Here, Creators to Donate All Profits from Zorin OS Pro to Aid Ukraine

          Zorin OS 16 was an exciting release with plenty of amazing features.

          Now, its first point release is here with some necessary improvements and updates.

          Let me highlight some of the key changes in this release.

        • Zorin OS 16.1 Released

          Zorin OS 16.1 is now available for download. Zorin OS 16.1 is the first point release to the latest Zorin OS 16. Zorin OS 16.1 is available for download right now from the official website. Zorin OS 16.1 is powered by Linux Kernel 5.13. The Zorin OS 16 release series will continue to be supported with software updates and security patches until April 2025.

      • IBM/Red Hat/Fedora

        • Firmware Software Bill of Materials

          A Software Bill of Materials (aka SBoM) is something you’ve probably never heard of, but in future years they’ll hopefully start to become more and more important. In May last year the US president issued an executive order titled Improving the Nation’s Cybersecurity in which it outlines the way that critical software used by various branches of the government should be more traceable and secure. One of the key information captured in a SBoM is “who built what from where” which in open source we’re already familiar with, e.g. “Red Hat built your Linux kernel in a datacenter in the US” rather than “random person from the internet build your container on their laptop using Debian Sarge” and in the former case we also always have the hash of the source archive that was used to build it, and a lot more. Where this concept breaks down is firmware, where lots of different entities build each subsection in different ways, usually due to commercial and technical constraints.

          Firmware is often lumped together as one thing, both technically as-in “one download” and conceptually when thinking about OS security. In reality a single firmware image might contain a FSP from Intel, several updated CPU microcode blobs for a few different CPUs, a CSME management engine, an embedded controller update, a UEFI system firmware a lot more. The system firmware is then made up of different file volumes, each with a few dozen EFI “PEI” binaries for initial system start-up and then a couple of hundred (!) “DXE” binaries for things like pre-boot networking and things like fingerprint authentication, mouse and keyboard input.

          In the executive order from last May, firmware was explicitly excluded from the list of software that required a SBoM, on the logic that none of the infrastructure or specifications were in place, and it just wasn’t possible to do. Needless to say I’ve been spending the last few months putting all the pieces together to make a firmware SBoM not just possible, but super easy for OEMs, ODMs and IBVs to generate.

        • The Register UKFedora inches closer to dropping x86-32 support

          Following discussion on the mailing list, the Fedora team is taking another small step away from x86-32 support, with developers urged to stop building i686 versions of “leaf packages” – in other words, packages that nothing else depends upon.

          This means building applications for 32-bit chips, not the Linux distribution itself. That’s long gone. Various distros started to discuss dropping 32-bit support in 2016. Ubuntu stopped offering an i386 desktop installation image after version 17.04 and a server image after 17.10. (For the especially pedantic: there was a netboot image for 18.04 if you wanted to roll your own, and Lubuntu offered a 32-bit desktop of 18.10.)

        • Modular Perl in Red Hat Enterprise Linux 8

          Red Hat Enterprise Linux in version 8 (RHEL 8) comes with modules, a packaging concept that allows system administrators to select the desired software version from multiple packaged versions. This article shows you how to manage Perl as a module, as well as how to manage the CPAN modules provided by Perl, in RHEL 8.

        • Which is better: A single Kafka cluster to rule them all, or many?

          Apache Kafka is designed for performance and large volumes of data. Kafka’s append-only log format, sequential I/O access, and zero copying all support high throughput with low latency. Its partition-based data distribution lets it scale horizontally to hundreds of thousands of partitions.

          Because of these capabilities, it can be tempting to use a single monolithic Kafka cluster for all of your eventing needs. Using one cluster reduces your operational overhead and development complexities to a minimum. But is “a single Kafka cluster to rule them all” the ideal architecture, or is it better to split Kafka clusters?

        • Kafka Monthly Digest: February 2022

          This 49th edition of the Kafka Monthly Digest covers what happened in the Apache Kafka community in February 2022. Some new minor releases are in the works that may be of interest. I’ll also discuss new KIPs and open source releases in January 2022.

        • Enterprisers ProjectIT leadership: 3 strategies to build employee development programs

          In today’s fast-evolving hybrid work environment, it’s more important than ever to offer your IT employees professional development opportunities. Consider this expert advice to design a program with impact

        • Red Hat OfficialRed Hat Summit 2022 registration is now open

          Red Hat Summit 2022 registration is officially open! Red Hat Summit is taking place on May 10 and May 11, and you can sign up today! If you want to take part in all of this year’s virtual Red Hat Summit goodness, you should take a few moments to register now.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Web Browsers

        • Red Hat OfficialWhy use cloud services instead of self-managed infrastructure? [Ed: IBM/Red Hat acting like a Pariah company, telling people to outsource to surveillance giants instead of actually managing their own systems. This makes one wonder who or what Red Hat even stands for.]

          Let’s take a closer look at the benefits cloud services can provide to IT departments, application development teams, and organizations as a whole.

        • Julia EvansHow to use undocumented web APIs

          Hello! A couple of days I wrote about tiny personal programs, and I mentioned that it can be fun to use “secret” undocumented APIs where you need to copy your cookies out of the browser to get access to them.

          A couple of people asked how to do this, so I wanted to explain how because it’s pretty straightforward. We’ll also talk a tiny bit about what can go wrong, ethical issues, and how this applies to your undocumented APIs.

        • The Register UKBrave browser to tackle ‘bounce tracking’ • The Register

          Browser maker Brave has developed a new way to ground “bounce tracking,” a sneaky technique for bypassing privacy defenses in order to track people across different websites.

          Bounce tracking, also known as redirect tracking, dates back at least to 2014 when ad companies were looking for ways to avoid third-party cookie blocking defenses.

          “Bounce tracking is a way for trackers to track you even if browser-level privacy protections are in place,” explained Peter Snyder, senior director of privacy at Brave, on Tuesday.

          “Privacy respecting browsers try to prevent sites from learning about your behaviors and activities on other sites. Bounce tracking attempts to circumvent these protections by gaming how your browser behaves when you browse from one site to another.”

          Say a website embeds a third-party script from info.tracker. When the website is visited, the third-party script tries to read third-party cookies from info.tracker that have been stored in the visitor’s browser.

          If it can’t – because third-party cookies are blocked – the script redirects to the info.tracker domain by writing a new URL to the browser’s window.location object or via some link hijacking method like injecting an info.tracker iframe into the original website.

        • Mozilla

          • MozillaLatest Firefox Relay includes bigger attachment size and filters for promotional emails

            Since the public launch of Firefox Relay, thousands of users have signed up for our smart, easy solution that hides your real email address to help protect your identity. Thank you all for your tremendous support for our Firefox Relay product. This signals a demand for people who want to preserve their privacy by limiting the places their personal email address is used.

            We are always looking for ways to improve Firefox Relay and your comments shape our products. Today, we’re adding user-requested features that deliver the emails that you care about which includes tickets to catch the train or watching your favorite band in concert, or getting the emails you want whether it’s getting shipping information or confirmation on the products you buy or updates to service and privacy policies.

      • Productivity Software/LibreOffice/Calligra

        • Document FoundationAnnouncement of LibreOffice 7.2.6 Community

          End user support is provided by volunteers via email and online resources: community support. On the website and the wiki there are guides, manuals, tutorials and HowTos. Donations help us to make all of these resources available.

          For enterprise-class deployments, TDF strongly recommends the LibreOffice Enterprise family of applications from ecosystem partners, with long-term support options, professional assistance, custom features and Service Level Agreements: LibreOffice Business.

      • Content Management Systems (CMS)

        • How I use Drupal as an advanced blogging platform

          I make my living working with and evangelizing Drupal. So there’s definitely some applicability to the saying, “when your only tool is a hammer, every problem looks like a nail.”

          In truth, I had considered using some static site solutions like Gatsby or Jekyll and then using free hosting options from GitHub or GitLab.

          However, one of the things I enjoy about Drupal is how quickly I can create and adapt content structures and have the ability to draw on the considerable library of community-provided modules to extend its capabilities, all of which you can use for free.

      • Programming/Development

        • UbuntuDeep work in interesting times | Ubuntu

          As programmers and tech writers, we are creators, and we are knowledge workers. We strive to do rare and valuable work, regardless of the circumstances, what Dartmouth professor Cal Newport calls deep work. Deep work is hard and difficult. At Canonical, we are specifically committed to doing things that are simultaneously hard and difficult, doing them all the time, and sustaining that work over long periods of time.

          Last week, we had an engineering sprint, which is a live gathering of Canonical’s engineering knowledge workers from all over the world. Normally, we have them every six months, but we hadn’t had one for almost exactly two years because of the Covid-19 pandemic.

          When he opened the sprint, our CEO began by speaking about the events in Ukraine, because these events were on everyone’s mind. Without addressing them, that weight wouldn’t be lifted and we couldn’t focus on doing good engineering work, live and in person, for an entire week. We would not be able to work deeply because of the creeping, subconscious distraction.

          Over the last two years, Canonical has worked extremely well, despite the horrifying spectre of a global pandemic, and our society moved almost seamlessly from pestilence into war. Even though we are people who pride ourselves on our technical focus and, often, on our agnostic view toward circumstance, we can’t help but be distracted by these issues. It affects our concentration, which thus affects our ability to do hard and difficult, rare and valuable things. Yet we at Canonical have done them. And we will continue to do them. And so can you, whether you are doing open-source on a paid or pro-bono basis, in daylight or moonlight, in the open or in secret.

          I can’t speak for other Canonical employees, but I can tell you about how I use technology to help me keep my head when all about me are losing theirs, to paraphrase Kipling. At Canonical, we want to be the best open-source company, ever, in the world, period. Much of that is technical in nature, but at least some of it is about how to use that technology to be good at open-source — in fact, to be good at anything that is hard and difficult, at any endeavor that strives to produce rare and valuable results.

        • Use std::hypot for Pythagorean Addition – EasyHack
        • syslog-ng 4 theme: typing – syslog-ng-future.blog

          As explained in my previous post, we do have some features already in mind for syslog-ng 4, even though the work on creating a long term set of objectives for the syslog-ng project is not finished yet. One of the themes I that I have working code for already, is typing.

        • Linux LinksExcellent Free Books to Master Programming – LinuxLinks

          A quick search of the internet reveals a plethora of books for programmers. No one has time to read even a minuscule fraction of the available books.

          What you need is a curated list of programming books. Better than that. A curated list of free programming books. Free and open source books still have a cost — your precious time. And just because a book is free/open source doesn’t, itself, signify any great quality to the work. Hence the need for some recommendations for free books to help you learn C, C++, Java, Python, R, or whatever language takes your fancy.

          The books we’re recommending will help increase your technical skills and make you proficient in the language of your choice. And some of them even provide a little light relief on the way. Humor can be a great aid to learning.

          Many of the books we recommend offer a solid foundation in learning the relevant programming language. Some are very specialist, some offer a quick overview. There are books targeted at people who have zero programming experience, as well as programmers who have learned one or two languages but are looking to widen their skills. Other books are targeted at an intermediate and/or expert level. All are worth reading.

          Some of the books are available to purchase in printed form. Showing your support in this way can be a great motivation for the authors to carry on releasing free books.

          The series is expanding although it’s pretty comprehensive already. And we’re adding new languages, so remember to bookmark this page.

        • Linux LinksExcellent Free Books to Learn QML

          Qt Modeling Language (QML) is a hierarchical declarative language for user interface layout with a syntax similar to JavaScript Object Notation (JSON).

          It can bind to C++ objects via Qt’s meta object system and also supports inline JavaScript. It’s much like HTML or XAML but without the XMLness.

          Here’s our recommended free books to learn QML.

        • QtQt WebEngine in Qt 6

          Qt WebEngine has been out for Qt 6 since 6.2, but I would still like to talk a bit about what is different in WebEngine in Qt 6, and what will change in the Qt 6 time frame.

  • Leftovers

    • Integrity/Availability

      • Proprietary

        • Pseudo-Open Source

          • Privatisation/Privateering

            • Linux Foundation

              • DENT 2.0 Open Source Network Operating System Now Available

                The DENT Project, an open source network operating system utilizing the Linux Kernel, Switchdev, and other Linux based projects, has announced that DENT 2.0 is available for immediate download. The “Beeblebrox” release adds key features utilized by distributed enterprises in retail and remote facilities, providing a secure and scalable Linux-based Network Operating System (NOS) for disaggregated switches adaptable to edge deployment. DENT provides a smaller, more lightweight NOS for use at the small, remote edges of enterprise networks.

        • Security

          • Best Brute Force Tools for Penetration Test

            Getting in the habit of utilizing pentesting for your specific server or web app or any other ethical use case is generally regarded as one of the best security practices you should include in your arsenal.

            It doesn’t only guarantee foolproof security for your network but gives you the opportunity to discover security holes in your system before a malicious actor does so they may not be zero-day vulnerabilities.

          • LWNSecurity updates for Thursday [LWN.net]

            Security updates have been issued by Debian (firefox-esr and kernel), Fedora (cyrus-sasl, mingw-protobuf, and thunderbird), Mageia (kernel-linus), openSUSE (firefox, kernel, and libcaca), Oracle (.NET 6.0, kernel, kernel-container, and ruby:2.5), Slackware (mozilla-thunderbird), and SUSE (firefox, mariadb, and tomcat).

          • CISAPTC Axeda agent and Axeda Desktop Server (Update A) [Ed: Microsoft Windows TCO]

            ATTENTION: Exploitable remotely/low attack complexity


            Axeda Desktop Server for Windows: All versions

          • MakeTech EasierHow to Use the Nessus Vulnerability Scanner on Linux

            Are you a pen-tester or just someone interested in keeping the security levels of your network as high as possible? Nessus is a widely-used vulnerability scanner that allows you to perform a variety of network vulnerability scanning tasks using a web-based GUI. Here we show you how to take advantage of all the great features this industry-leading vulnerability scanner offers.

          • Fear, Uncertainty, Doubt/Fear-mongering/Dramatisation

            • CISADirty Pipe Privilege Escalation Vulnerability in Linux [Ed: CISA does not mention Windows when it’s Microsoft Windows but rushes to name “Linux” to darken its name if there’s something bad to say]

              CISA is aware of a privilege escalation vulnerability in Linux kernel versions 5.8 and later known as “Dirty Pipe” (CVE-2022-0847). A local attacker could exploit this vulnerability to take control of an affected system.

    • Defence/Aggression

      • Bruce SchneierWhere’s the Russia-Ukraine Cyberwar? [Ed: Bruce Schneier promotes attention-shifting Microsoft propaganda now; Microsoft is the culprit, not the solution/solver]

        It has been interesting to notice how unimportant and ineffective cyber operations have been in the Russia-Ukraine war. Russia launched a wiper against Ukraine at the beginning, but it was found and neutered. Near as I can tell, the only thing that worked was the disabling of regional KA-SAT SATCOM terminals.

      • Dr. Klaus Schwab or: How the CFR Taught Me to Stop Worrying and Love the Bomb

        The World Economic Forum’s recorded history has been manufactured to appear as though the organisation was a strictly European creation, but this isn’t so. In fact, Klaus Schwab had an elite American political team working in the shadows that aided him in creating the European-based globalist organisation. If you have a decent knowledge of Klaus Schwab’s history, you will know that he attended Harvard in the 1960s where he would meet then-Professor Henry A. Kissinger, a man with whom Schwab would form a lifelong friendship. But, as with most information from the annals of the World Economic Forum’s history books, what you’ve been told is not the full story. In fact, Kissinger would recruit Schwab at the International seminar at Harvard, which had been funded by the US’ Central Intelligence Agency. Although this funding was exposed the year in which Klaus Schwab left Harvard, the connection has gone largely unnoticed – until now.

        My research indicates that the World Economic Forum is not a European creation. In reality, it is instead an operation which emanates from the public policy grandees of the Kennedy, Johnson and Nixonian eras of American politics; all of whom had ties to the Council on Foreign Relations and the associated “Round Table” Movement, with a supporting role played by the Central Intelligence Agency.

        There were three extremely powerful and influential men, Kissinger among them, who would lead Klaus Schwab towards their ultimate goal of complete American Empire-aligned global domination via the creation of social and economic policies. In addition, two of the men were at the core of manufacturing the ever present threat of global thermonuclear war. By examining these men through the wider context of the geopolitics of the period, I will show how their paths would cross and coalesce during the 1960s, how they recruited Klaus Schwab through a CIA-funded program, and how they were the real driving force behind the creation of the World Economic Forum.

    • Censorship/Free Speech

      • The Washington PostInternet experts suggest ways to selectively block Russian military and propaganda sites [Ed: Bezos-owned propaganda rag suggests blocking propaganda rags of Russian oligarchs and Putin. Spot the irony.]
      • Notice in Lumen reveals that EU mandated removal of Russian state-sponsored news from Google’s search engine

        On March 04, 2022, the European Commission sent a content removal request to Google requiring all content by RT and Sputnik, Russian Federation’s State-controlled media outlets, to be de-indexed from Google’s search result.

        Associate Professor of Law at UCD Sutherland School of Law, Dublin, TJ McIntyre found the related content removal request sent to Google by the European Commission in the Lumen Database and discussed it in a Twitter thread. This notice was sent within the context of the ongoing Russian invasion in Ukraine and the ensuing information war online that attempts to sway the narrative. The European Union also addressed this information war on March 02, 2022, by introducing a Regulation which imposed restrictive measures on online platforms in view of “Russia’s actions destabilizing the situation in Ukraine” and its “international campaign of media manipulation.”

      • IndiaDraft BTRC regulations to restrict freedom of expression: 45 int’l orgs

        The government move to regulate the social media and OTT platforms through enacting some regulations came under criticism of 45 international organisations, including Human Rights Watch, on Monday.
        The proposed Bangladesh Telecommunication Regulatory Commission Regulation for Digital, Social Media and OTT Platforms, if passed, will undermine encryption and weaken the online safety, the organisations said in a letter to the BTRC.
        It will imperil the people’s freedom of expression and rights to privacy, they added.
        They also urged the Bangladesh Telecommunication Regulatory Commission to reconsider the move and withdraw its decision.
        ‘If enforced, the regulations will have a deleterious impact on human rights, and put journalists, dissidents, activists and vulnerable communities, in particular, at greater risk,’ they said.
        The organisations made the comment in a joint letter issued to the BTRC on Monday following the publishing of the draft of ‘the Bangladesh Telecommunication Regulatory Commission Regulation for Digital, Social Media and OTT Platforms’ on February 3, 2022.

      • The Washington PostHuman rights groups warn that more sanctions could hurt Russian Internet access
      • Biden warned against blocking internet in Russia

        Also: Four tech lobbying groups spent nearly $2 million on Facebook ads criticizing antitrust bills.

    • Civil Rights/Policing

      • AccessNowBeyond sanctions: what the tech sector can do to respect human rights

        Over the past two weeks, the international community has watched the crisis in Ukraine escalate into war. In the midst of this crisis, the tech sector finds itself as a player in the conflict, caught between government and regulatory demands to limit or restrict services and growing pressure from the public and civil society to take urgent action to prevent human rights harms.

        However, this crisis really began in 2014, giving companies operating in the region at least eight years to develop policies and practices for a situation like this. What we’ve seen instead is the outsized power of the tech sector being wielded in an inconsistent manner as decisions to leave, stay, or limit and restrict services deeply impact the lives of individuals in the region. For example, in 2020, Telegram decided to reinforce its infrastructure in preparation for potential internet shutdowns and blockings during the Belarus elections, allowing millions of Belarusians to document and report on the protests and associated human rights violations that authorities preferred to keep in the dark. Similarly, as war broke out in Ukraine, Google disabled live traffic data on Maps to keep Ukrainians safe. On the other hand, in September 2021, Apple and Google decided to pull an app by opposition party leader Alexey Navalny’s team designed to inform Russian voters about electoral candidates in their district on election day.

        Many technology companies are currently struggling to maintain operations in Russia, not only due to an unprecedented number of economic sanctions and export controls imposed by the U.S. and the E.U., but also due to Russian government pressure, including the so-called landing law which requires companies to set up legal entities in the country, making them more vulnerable to government demands, as well as a new law adopted after the invasion of Ukraine which punishes anyone spreading “false information” about the invasion with up to 15 years in prison. In response, some companies have suspended their services in the country altogether.

    • Internet Policy/Net Neutrality

      • AccessNowCivil society to U.S. government: Do not disrupt internet access in Russia or Belarus – Access Now

        Today, Access Now, Wikimedia Foundation, and over 35 civil society organizations called on U.S. President Biden and his administration to ensure the people of Russia and Belarus are not cut off from the internet. The signatories deplore Russia’s invasion of Ukraine and urge that further restricting the internet in Russia and Belarus will only accelerate violence and repression.

        Signatories to the letter are concerned that the U.S. government and like-minded governments may be considering disrupting internet access in Russia and Belarus through new sanctions. Limiting internet access will hurt individuals attempting to organize in opposition to the war, report openly and honestly on events in Russia and Belarus, and access information about what is happening in Ukraine and beyond.

        “We call on the Biden Administration and allied governments to ensure their sanctions do not tighten Putin’s grip over information and ideas,” said Peter Micek, General Counsel at Access Now. “People in Russia and Belarus struggle to find accurate news, and the internet, for all its faults, remains the last open space for free flowing discourse. The President and Treasury Department should signal to tech companies — and governments supporting Ukraine — that cutting internet services in Russia or Belarus will be counterproductive.”

      • Calcutta HC stays internet shutdown issued by West Bengal

        Calcutta HC has stayed an internet shutdown order dated 03.03.2022 (‘Suspension Order’) issued by the State of West Bengal. The Suspension Order was challenged in a petition filed by Ashlesh Biradar on various grounds including that it was unlawfully issued under Section 144 of the Code of Criminal Procedure, 1973 (‘CrPC’). The Calcutta HC agreed with the submissions of the Petitioner and found it fit to pass an interim order. Senior Advocate Ranjan Bachawat represented the Petitioner and was briefed by R. Ginodia & Co. IFF provided legal support.

      • Financial TimesRussia’s digital iron curtain will fail

Is Open Source Against Equality Now?

Posted in Free/Libre Software, OSI at 9:07 am by Dr. Roy Schestowitz

Video download link | md5sum 63db6b26be223c0033a5f5b72c421e09
OSI and Neglect of Freedom
Creative Commons Attribution-No Derivative Works 4.0

Summary: A Microsoft-infiltrated OSI (Microsoft has in fact helped Vladimir Putin) flexes its muscles by basically watering down the Open Source Definition (OSD) and giving a platform to known trolls, whose goal is to undermine the Freedom of Free software (to impose their worldviews on others)

THE OSI statement, issued late on Wednesday (yesterday), seems redundant and disturbing for a number of reasons, which are covered in the above video.

It’s no secret that ‘Ethical Source’ isn’t about ethics and isn’t even compatible with Open Source. Why does the OSI give attention to those people?

We’ve already covered the subject in previous articles and videos [1, 2, 3].

OSI and GitHubThe OSI could focus on the Open Source Definition without jumping into the “let’s ban entire nations” bandwagon. Leave the “collective punishment” crowd aside. You hurt innocent people, including Free software volunteers/contributors, based on thoroughly misguided assumptions.

Allowing users to run their software as they wish (without conditions and restrictions such as discriminatory exclusions) is “important to free software”, one person said in IRC. But “”open source” software has responded to the war by either violating software freedoms and adding a terms of use to their license, or sabotaging Russians by ruining their Russian localization file [...] software freedoms don’t mean anything to these developers because they have been abstracted away by “open source”…”

This is how the FSF has responded to these issues. No need for expulsions; expelling people who aren’t even supporting Putin isn’t justice but an injustice.

“So Red Hat, SuSE, and Docker are about to learn what being open source actually means. You’d think they would already know, but apparently not,” said this one person in LXer yesterday afternoon (under “What part of open source do they not understand?”), so the sentiment is widespread, even among some Americans.

Links 10/3/2022: LibreELEC (Matrix) 10.0.2 and Why RISC-V is Succeeding

Posted in News Roundup at 6:32 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

      • The Linux Link Tech Show Episode 946
      • TechdirtTechdirt Podcast Episode 314: Gaming Like It’s 1926

        It took a little longer than usual, but we’ve finally announced the winners of the fourth annual public domain game jam, Gaming Like It’s 1926! In this episode, Mike and I are joined by Randy Lubin (our partner in running the jam) to discuss the winners in all six categories, as well as some of our favorite entries that didn’t quite make the cut.

    • Kernel Space

      • LWNMoving the kernel to modern C [LWN.net]

        Despite its generally fast-moving nature, the kernel project relies on a number of old tools. While critics like to focus on the community’s extensive use of email, a possibly more significant anachronism is the use of the 1989 version of the C language standard for kernel code — a standard that was codified before the kernel project even began over 30 years ago. It is looking like that longstanding practice could be coming to an end as soon as the 5.18 kernel, which can be expected in May of this year.

      • LWNBetter visibility into packet-dropping decisions [LWN.net]

        Dropped packets are a fact of life in networking; there can be any number of reasons why a packet may not survive the journey to its destination. Indeed, there are so many ways that a packet can meet its demise that it can be hard for an administrator to tell why packets are being dropped. That, in turn, can make life difficult in times when users are complaining about high packet-loss rates. Starting with 5.17, the kernel is getting some improved instrumentation that should shed some light on why the kernel decides to route packets into the bit bucket.

        This problem is not new, and neither are attempts to address it. The kernel currently contains a “drop_monitor” functionality that was introduced in the 2.6.30 kernel back in 2009. Over the years, it has gained some functionality but has managed to remain thoroughly and diligently undocumented. This feature appears to support a netlink API that can deliver notifications when packets are dropped. Those notifications include an address within the kernel showing where the decision to drop the packet was made, and can optionally include the dropped packets themselves. User-space code can turn the addresses into function names; desperate administrators can then dig through the kernel source to try to figure out what is going on.

      • LWNExtending restartable sequences with virtual CPU IDs [LWN.net]

        Restartable sequences, a Linux kernel feature that facilitates the writing of lockless, per-CPU code in user space, has been around for some years, but it only just received support in the GNU C Library this month. Now that this barrier has been crossed, it would seem that the time has come to start adding features. Mathieu Desnoyers has responded to this challenge with a patch set adding an extension mechanism and a new “virtual CPU ID” feature.

        See the above-linked article for an overview of how restartable sequences work. As a reminder, any thread using restartable sequences must first make use of the rseq() system call to register a special structure with the kernel. That structure is used to point to the rseq_cs structure describing the current critical section (if any); the kernel also ensures that it contains the ID number of the current CPU whenever the thread is running. Consistent with the pattern used in many relatively recent system calls, rseq() requires the caller to also provide the size of the rseq structure being passed in.

        That length parameter exists to support future extensions to the system call. New features will generally require new data, increasing the size of the rseq structure. By looking at the size passed by user space, the kernel can tell which version of the rseq() API the calling process expects. When carefully used, this mechanism allows existing system calls to be extended in a way that preserves compatibility with older programs.

        That still leaves an open question for programs that need to discover which API version they are dealing with as a way of knowing which features are available. One possibility is to invoke the system call with the most recent version of the structure and fall back to an earlier version if the call fails. Another is to simply have the kernel say which structure size it is prepared to accept. The rseq() patches take the latter approach, making the maximum accepted structure size available via getauxval().

    • Applications

    • Instructionals/Technical

      • UNIX CopInstall Sandstorm on Ubuntu 20.04 – Unix / Linux the admins Tutorials

        Hello, friends. In this post, you will learn how to install Sandstorm on Ubuntu 20.04.

      • Limit Docker Container Access to Certain IP Addresses – Putorius

        Recently I needed to limit access to my docker containers to specific IP addresses. I did some searching and found some promising tutorials on using iptables with docker. However, none really brought me to a workable solution. The Docker documentation has a short article about using iptables however it is very limited. With the information I gathered from all of these sources I was about to come up with an easy to implement (and manage) solution. In this tutorial I will show you how I used ipset and iptables rules to limit docker container access to certain IP addresses (whitelist). Obviously, it can also have the reverse effect of blocking specific IP addresses (blacklist) from accessing your docker containers.

    • Desktop Environments/WMs

      • Migration to Sway

        I’ve been happily using KDE for the past year. Before that, Pop OS had me fully converted to tiling workflows so I’ve been using a tiling kwin script called Bismuth to bring a little bit of that workflow to KDE. It’s alright. It has a few bugs and pain points and obviously isn’t the same as using an environment built around tiling, but it’s gotten the job done I suppose.

      • Sway Log Pt. 2

        As I’ve kept using it I’ve continued to find cool little ways to improve my setup, but I’ve also uncovered a few pain points for Wayland.

      • K Desktop Environment/KDE SC/Qt

    • Distributions

      • New Releases

        • LibreELEC (Matrix) 10.0.2 – LibreELEC

          The final version of LibreELEC 10.0.2 has been released, bringing Kodi (Matrix) v19.4 to our users.

          Users of LibreELEC 10 Beta or RC1 get an automatic update to the final version. LibreELEC 9.2 setups will not be automatically updated, you will need to manually update.

          We can offer stable and good working versions for Allwinner, Generic and Rockchip devices. The RPi4 is also in good shape but the codebase is rather new, so it is not polished yet (keep reading for details).
          New at the 10.0.2 release is the support for the RPi2 and RPi3,

      • Debian Family

        • LWNA Debian GR on secret voting—and more

          Debian has been working on some “constitutional maintenance” of late; a general resolution (GR) on tweaks to the project’s decision-making processes passed at the end of January. As part of the discussion surrounding those changes, the question of secret voting came up; currently, Debian publicly lists every voter for a GR and their ranking of the options. Another GR has been proposed to change that, but the discussion has shown that the definition of “secret” is not exactly the same for everyone. In addition, secret voting is not the only change being proposed.

          A bit of history

          The proximate cause for the interest in secret ballots is the controversial GR that was proposed and voted on in the early part of 2021; it proposed that the Debian project make a statement regarding Richard Stallman’s return to the FSF board of directors. The voters decided that Debian would make no distribution-wide statement about that event, by a fairly close margin, but some people in the discussion were uncomfortable voting on the GR, given that their choices would be fully visible to the internet at large. The worry was that proponents or opponents of all the myriad “sides” in the debate would harass those who voted in the “wrong” way.

          Back in November, Sam Hartman asked if the secret ballot question should be handled as part of the in-progress GR-process tweaking, or if it should be handled as a separate GR after that had run its course. The consensus seemed to agree with Hartman’s assessment that it could overcomplicate the ballot, so he decided to defer it. In that message, though, he outlined the changes he would make to the Debian Constitution to change the GR vote to be a secret one. It would, essentially, follow the lead of the elections for the Debian project leader (DPL), which make all of the ballots public, along with the list of voters, but do not provide a mapping from voter to ballot.

          The changes he proposed also sparked some discussion around the role of the project secretary. Hartman’s changes said: “Votes are cast in a manner suitable to the Secretary.” That removed the “by email” phrase because there might be systems for anonymous voting that do not use email. But, as Carsten Leonhardt pointed out, the manner of voting “needs to also be suitable to the voters”.

        • DNS problem on Sparky 7 still exist?

          The latest iso images of Sparky rolling 2022.03 have an issue withe DNS configuration via ‘systemd-resolved’.

          The live system features a small script which fixes it via ‘sparky-firstrun-fix’ package which is removed during post-install.

      • Canonical/Ubuntu Family

        • Linux Mint as a Desktop OS

          I have decided to try Linux Mint 20.3 as my desktop OS. Although it is unlikely that Linux will completely replace my macOS environment, I’ve been pleasantly suprised that Linux and available software have evolved in the recent couple of years.

    • Devices/Embedded

      • CNX SoftwareECS Liva Z3 Celeron N4500 Jasper Lake mini PC becomes available for $195 – CNX Software

        ECS Liva Z3 mini PC is now available with an Intel Celeron N4500 dual-core Jasper Lake processor, 4GB RAM, 64GB eMMC flash, and HDMI and mini DisplayPort 4K video output for $194.88 on Amazon.

        Both the Liva Z3 and Z3E mini PCs were introduced in December 2021 with a choice of Intel Pentium Silver N6000, or Celeron N5100/N4500 from the 11th generation Jasper Lake family, with the Liva Z3E adding space for a 2.5-inch SATA drive and two RS-232 COM ports, but at this time, we could only find Liva Z3 with a Celeron N4500 for sale.

      • Open Hardware/Modding

        • Semi EngineeringWhy RISC-V Is Succeeding

          “The adoption of RISC-V as the preferred architecture for many silicon developers has initiated a tidal wave of innovation in the hardware development community,” says Stephano Cetola, director of technical programs at RISC-V International. “Designers are now taking their RISC-V-based designs and moving toward actual implementations within a variety of industries.”

          This is hardly the first time that a processor implementation, or instruction set architecture (ISA), has been put in the public domain. The industry is littered with them, including OpenPOWER, OpenSPARC, OpenRISC, and many more. While each has gained a certain level of traction, they all pale in comparison to the success of RISC-V in a very short timeframe.

          When talking to people in the RISC-V community, there are two words that are repeated often — free and freedom. Some people want cores that are free, while others want the freedom to do with the cores whatever they want. To those people, free is almost immaterial because they will spend a lot to get what they want.

    • Free, Libre, and Open Source Software

      • Liblouis

        Liblouis is an open-source braille translator and back-translator named in honor of Louis Braille. It features support for computer and literary braille, supports contracted and uncontracted translation for many languages and has support for hyphenation. New languages can easily be added through tables that support a rule- or dictionary based approach. Tools for testing and debugging tables are also included. Liblouis also supports math braille (Nemeth and Marburg).

        Liblouis has features to support screen-reading programs. This has led to its use in numerous open-source and proprietary screenreaders such as NVDA, Orca, BrailleBack and JAWS. It is also used in some commercial assistive technology applications for example by ViewPlus.

      • Ingram Micro commits to channel excellence in open source

        “The open source community is making rapid advancements in setting technology trends and addressing problems that are too massive for one organisation to solve. Open source brings upon endless possibilities through collaboration and transparency while maintaining flexibility and accessibility to innovations.”

        According to Howest, partners can leverage the CoE to better identify opportunities specific to open source, notably in the areas of infrastructure modernisation, application development and digital transformation.

      • Open Source responds to the Russia-Ukraine war: First thoughts from the Executive Director [Ed: Unlike FSF, OSI does not respect the Four Freedoms and does not understand how these licences even work]

        The reaction from the open source community to the Russian aggression in Ukraine has been swift and varied. Many companies have blocked sales and distributions of their software in Russia and Belarus. This is a good thing: Civil society has many non-violent ways at its disposal to resolve conflicts and it’s important to explore all possible avenues.

        When it comes to open source software, however, the Open Source Definition is clear: There must be “no discrimination against persons or groups” and “no discrimination against fields of endeavor.” Does that mean we should take no action? Not at all!

      • Events

      • Web Browsers

        • Kevin NormanThe Perils of RSS

          The point I hope to make clear is that if you’ve never checked, your RSS readership is likely larger than you realise. It was certainly far larger than I realized. kn100.me is a tiny blog, and I’ve been enjoying the slow growth that being on the internet for a while brings. I do this for fun, and have made exactly no money from doing it. Losing a few RSS users is sad (and I’ve definitely seen a dip in my Feedly readership), but is not a disaster for me. If you live off of blogging, be very careful with your RSS feed. One mistake can permanently wreck your RSS feed for users of cloudy platforms you have no control over.

        • HackadayWebGPU… Better Than WebGL?

          As the browser becomes more like an operating system, we are seeing more deep features being built into them. For example, you can now do a form of assembly language for the browser. Sophisticated graphics have been around using WebGL since around 2011, but some people find it hard to use. [Surma] was one of those people and tried a new method that is just surfacing to do the same thing: WebGPU.

        • Mozilla

      • SaaS/Back End/Databases

        • PostgreSQLPostgreSQL: SQLreduce: Reduce verbose SQL queries to minimal examples

          SQLsmith has proven to be an effective tool for finding bugs in different areas in the PostgreSQL server and other products, including security bugs, ranging from executor bugs to segfaults in type and index method implementations.

          However, the random queries generated by SQLsmith that trigger some error are most often very large and contain a lot of noise that does not contribute to the error. So far, manual inspection of the query and tedious editing was required to reduce the example to a minimal reproducer that developers can use to fix the problem.

          This issue is solved by SQLreduce. SQLreduce takes as input an arbitrary SQL query which is then run against a PostgreSQL server. Various simplification steps are applied, checking after each step that the simplified query still triggers the same error from PostgreSQL. The end result is a SQL query with minimal complexity.

      • Productivity Software/LibreOffice/Calligra

      • Content Management Systems (CMS)

      • Programming/Development

        • Relational PipesFiltering and transforming relational data with XPath

          In Relational pipes v0.18 we got a new powerful language for filtering and transformations: XPath. It is now part of the toolset consisting of SQL, AWK, Scheme and others. However XPath is originally a language designed for XML, in Relational pipes we can use it for relational data coming from various sources, not only XML, and also for data that violates the rules of normal forms. We can process quite complex tree structures entangled in records but we can also write simple and intuitive expressions like x = “a” or y = 123.

        • LWNCPython, C standards, and IEEE 754 [LWN.net]

          Perhaps February was “compiler modernization” month. The Linux kernel recently decided to move to the C11 standard for its code; Python has just undergone a similar process for determining which flavor of C to use for building its CPython reference implementation. A calculation in the CPython interpreter went awry when built with a pre-release version of the upcoming GCC 12; that regression led down a path that ended up with the adoption of C11 for CPython as well.

          A bug that was fixed in early February started the ball rolling for Python. Victor Stinner encountered a GCC regression that caused CPython not to get the expected IEEE 754 floating-point NaN (not a number) value in a calculation. An LWN article sheds some light on NaNs (and how they are used in Python) for those who need a bit more background. The calculation was using the HUGE_VAL constant, which is defined as an ISO C constant with a value of positive infinity; the code set the value of the internal Py_NAN constant used by the interpreter to HUGE_VAL*0, which should, indeed, evaluate to a NaN. Multiplying infinity by any number is defined to be a NaN for IEEE 754.

          During his investigation of the problem, Stinner found that instead of the calculation, Python could simply use the NAN constant defined in —as long as a C99 version of the header file was used. As part of the bug discussion, Petr Viktorin said that PEP 7 (“Style Guide for C Code”) should be updated to reflect the need for the C99 header file. So Stinner duly created a pull request for a change to the PEP, but Guido van Rossum said that a change of that nature should be discussed on the python-dev mailing list.

          That led Stinner to post a message to discuss the change on February 7. As it turns out, there are actually two bugs fixed by Stinner that require parts of the C99 math API; bug 45440 reported a problem with the CPython Py_IS_INFINITY() macro; the fix for that also involved using the C99 . As Stinner noted, C99 is now 23 years old, and support for it in compilers is widespread; GCC, Clang, and Microsoft Visual C (MSVC) all support the needed features.

        • A New Type of Convergence Control Intrinsic?

          In LLVM, we call such operations convergent. Unfortunately, LLVM does not define how the set of communicating threads in convergent operations — the set of converged threads — is affected by control flow.

          If you’re used to thinking in terms of structured control flow, this may seem trivial. Obviously, there is a tree of control flow constructs: loops, if-statements, and perhaps a few others depending on the language. Two threads are converged in the body of a child construct if and only if both execute that body and they are converged in the parent. Throw in some simple and intuitive rules about loop counters and early exits (nested return, break and continue, that sort of thing) and you’re done.

          In an unstructured control flow graph, the answer is not obvious at all. I gave a presentation at the 2020 LLVM Developers’ Meeting that explains some of the challenges as well as a solution proposal that involves adding convergence control tokens to the IR.

          Very briefly, convergent operations in the proposal use a token variable that is defined by a convergence control intrinsic. Two dynamic instances of the same static convergent operation from two different threads are converged if and only if the dynamic instances of the control intrinsic producing the used token values were converged.

          (The published draft of the proposal talks of multiple threads executing the same dynamic instance. I have since been convinced that it’s easier to teach this matter if we instead always give every thread its own dynamic instances and talk about a convergence equivalence relation between dynamic instances. This doesn’t change the resulting semantics.)


          We could chew through some other ideas for making iterating anchors work, but that turns out to be unnecessary. The desired behavior of iterating anchors can be obtained by inserting preheader blocks. The initial example of two natural loops contained in an irreducible loop becomes:

          Place anchors in Ap and Cp and hearts in A and C that use the token defined by their respective dominating anchor. Convergence at the anchors is implementation-defined, but relative to this initial convergence at the anchor, convergence inside the natural loops headed by A and C behaves in the natural way, based on a virtual loop counter. The transform of inserting an anchor in the preheader is easily generalized.

          To sum it up: We’ve concluded that defining an “iterating anchor” convergence control intrinsic is problematic, but luckily also unnecessary. The control intrinsics defined in the original proposal are sufficient. I hope that the discussion that led to those conclusions helps illustrate some aspects of the convergence control proposal for LLVM as well as the goals and principles that drove it.

        • Fortran LangFortran newsletter: March 2022

          Welcome to the March edition of the monthly Fortran newsletter. The newsletter comes out at the beginning of every month and details Fortran news from the previous month.

        • The NationChina’s Ukraine Dilemma

          In late January, as Russia kept amassing its military along Ukraine’s borders, Jiang Libo, a 50-year-old Chinese programmer living in Kyiv, surveyed his acquaintances to see if they were worried. Most of them opined that a full-on war was unlikely. His landlord, for instance, told him Putin “couldn’t be so stupid as to invade Ukraine.” A few weeks later, the Biden administration warned of an imminent Russian invasion—a contrast to Chinese government spokespeople and state-media figures who said the United States was exaggerating and engaged in warmongering. By mid-February, Western countries started to evacuate their citizens. China, however, held firm. On February 16, a foreign spokesperson insisted that Washington was “hyping up the threat of a war” and “spreading false information.”

        • Rust

  • Leftovers

    • ShadowproofProtest Song Of The Week: ‘Precious Cargo’ By Hurray For The Riff Raff

      This post was originally published at Ongoing History of Protest Songs.Hurray For The Riff Raff is the project of Puerto Rican singer-songwriter Alynda Segarra. Segarra explained the motivation behind the name in a 2017 PBS News Hour interview: “The people who have gotten me through my life are the weirdoes and the poets, the rebellious women, and the activists. They were considered the riffraff by people in power, and they’re the ones that make history.”Their new album “Life On Earth” is a powerful follow-up to their exceptional 2017 album “The Navigator.” Described by the project as “nature punk,” the tunes confront environmental issues as well as other social ills.

      The song “Precious Cargo” speaks to anti-immigrant and anti-refugee policies. Segarra sings, “We made it to the border. I jumped, and I was detained. Split me from my family. Now the light begins to fade.”“They took me to the cold room, where I sat down on the floor. Just a foil for a blanket. For 17 days or more.”Segarra continues, “I don’t know why he would lie on me. The man from the I.C.E. And I don’t know why he hate on me. The man from the I.C.E.” It humanizes what the downtrodden experience at the hands border security and immigration officials.

    • SalonHow Joe Rogan does what he does: My day with America’s most famous podcaster

      To some, Rogan is a conman, selling bigotry beneath an awe-shucks veneer. Or he represents the torrid heights of faux-intellectualism unleashed by Trumpism. Or, conversely, his fault is that he’s just too normal. Or the problem is that he means well but, in generously welcoming back the Alex Joneses of the world, he’s shed whatever capacity for empathy and moral judgment he once maintained. The takes go on and on — he’s the new Walter Cronkite! He’s an insurrectionist precipitating civil war! — with varying extremity.

      But this essay isn’t about whether you should condemn or contextualize Joe Rogan. Instead, my goal is to try and convey, through a personal lens, what it is about Rogan as a podcaster that helps to explain why he’s so popular — something inherent to his style that goes beyond his demographic appeal.

    • Science

      • Mexico News DailyGlyphs deciphered on frieze at Oaxaca archaeological site

        INAH said in a statement that the political, economic and social power that the Atzompa residential area had within the Zapotec capital of Monte Albán between A.D. 600 and 900 and the important relations its inhabitants established with the Mixteca region are some of the details revealed through the iconographic interpretation.

      • NBCMan who got heart transplant from genetically modified pig dies 2 months later

        Bennett’s transplant was a milestone in the field of xenotransplantation, the sourcing of animal organs to address the human organ supply crisis.

        Since then, doctors have implanted kidneys from a gene-edited pig into a brain-dead patient at the University of Alabama at Birmingham.

    • Education

      • Common DreamsOpinion | For the Greater Good—California Looks to Restore Free College

        America’s student loan crisis has Washington tied in knots. Collectively, Americans owe some $1.7 trillion in student loan debt. This debt is saddling a generation (and their parents) for the crime of getting a higher education. Beyond its harm to families, this debt is having a ripple effect throughout the economy. According to Bloomberg, homeownership rates among 18 to 35 year olds with student loans dropped 24% in the decade ending in 2019.

      • Common Dreams‘Release the Dough’: Minneapolis Teachers Strike for First Time in More Than 50 Years

        The Minneapolis teachers’ strike entered a second day Wednesday as union representatives and district officials resumed negotiations over smaller class sizes, improved student supports, and better pay.

        “We don’t believe we have a budget crisis in Minneapolis Public Schools. We have a values and priorities crisis.”

      • Times Higher EducationDo academic boycotts work?

        As well as mounting examples of blanket freezes on academic ties by countries and the ending of specific research partnerships by institutions, the situation is even prompting questions about how to treat Russian universities in performance measures such as university rankings, with Times Higher Education taking “steps to ensure that Russian universities are given less prominence” in its World University Rankings tables.

        Although all these actions have broad support, they are also raising fundamental questions about international research collaboration, academic freedom and the flow of knowledge that always come alongside the prospect of scientific sanctions, although perhaps never against the backdrop of a war of this scale and type.

    • Hardware

      • HackadayThe Fliegerfaust Roars Back To Life After 77 Years

        As their prospects for victory in the Second World War became increasingly grim, the Germans developed a wide array of outlandish “Wonder Weapons” that they hoped would help turn the tide of the war. While these Wunderwaffe obviously weren’t enough to secure victory against the Allies, many of them represented the absolute state-of-the-art in weapons development, and in several cases ended up being important technological milestones. Others faded away into obscurity, sometimes with little more then anecdotal evidence to prove they ever even existed.

      • HackadayVFD Character Display Turned Into Audio VU Meter

        Humans love visualising music, whether it’s in the form of an inscrutable equation drawing squiggles in Winamp, or a simple VU meter pulsing with the beat. This build from [mircemk] is of the latter variety, repurposing a VFD display to do the job.

      • HackadayBuilding A Pendulum Clock Out Of Lego

        Pendulum clocks aren’t used quite as often these days as their cumbersome mechanics and timekeeping abilities have long been outshone by electronic alternatives. However, they’re still fun and they do work, so [PuzzLEGO] set about building a working example with Lego.

      • HackadayClass A Amplifiers, Virtually

        If you didn’t know better, you might think the phrase “class A amplifier” was a marketing term to help sell amplifiers. But it is, of course, actually a technical description of an amplifier that doesn’t distort the input waveform because it doesn’t depend on multiple elements to handle different areas of the input waveform. Want to know more? [FesZ] has a new video covering the basics of class A amplifiers including some great simulations. You can see the video below.

      • HackadayBringing The Art Of Origami And Kirigami To Robotics And Medical Technology

        Traditionally, when it comes to high-tech self-assembling microscopic structures for use in medicine delivery, and refined, delicate grippers for robotics, there’s been a dearth of effective, economical options. While some options exist, they are rarely as effective as desired, with microscopic medicine delivery mechanisms, for example, not having the optimal porosity. Similarly, in so-called soft robotics, many compromises had to be made.

      • HackadayUpgraded 3D Printed Tank Gets Better Drivetrain And Controls

        When it comes to 3D printed builds, they’re often limited in size due to the small build volume of most printers. However, [Ivan Miranda] has always gone big with his builds, and his latest tank design shows that off in spades.

      • TechTargetResearchers disclose new Spectre V2 vulnerabilities

        The notorious Spectre vulnerabilities are in the headlines again thanks to the discovery of a new variant.

        Researchers with VUSec at the Vrije Universiteit Amsterdam discovered a trio of CVE-listed vulnerabilities based on Spectre V2 that allow an attacker to extract sensitive data, such as security keys, by manipulating the way both Intel and Arm processors handle chip instructions. VUSec disclosed the vulnerabilities Tuesday, and both chipmakers issued patches to mitigate the flaws.

    • Health/Nutrition/Agriculture

      • Common DreamsRedlining’s Legacy Endures as 45 Million Americans Breathe Polluted Air: Study

        More than half a century after the official end of discriminatory redlining, 45 million people across the United States—overwhelmingly in communities of color—are exposed to elevated levels of illness-inducing air pollution, a study published Wednesday affirmed.

        “This groundbreaking study builds on the solid empirical evidence that systemic racism is killing and making people of color sick.”

      • OracUrgency of Normal, the Great Barrington Declaration, and the antivax movement

        I’ve written a number of times about the Great Barrington Declaration (GBD), a statement produced a couple of months before COVID-19 vaccines started being distributed under an emergency use authorization (EUA) that advocated a “natural herd immunity” approach to the pandemic. The GBD was written by three academics at the behest of the libertarian free market think tank American Institute for Economic Research (AIER): Oxford University theoretical epidemiologist Sunetra Gupta; Stanford University health policy professor Jay Bhattacharya; and Harvard University biostatistician Martin Kulldorff, who, after having met with Jeffrey Tucker, Stacey Rudin, and AIER officials at a weekend conference, enthusiastically spearheaded the effort to promote an “anti-lockdown” message, to whose drafting Jeffery Tucker. (He even bragged about it.) The result was the GBD, which was birthed at a second weekend conference held at AIER headquarters in Great Barrington, Massachusetts, hence the name. More recently, a similar sort of effort, dubbed “Urgency of Normal” by its backers, has arisen and reminds me a lot of the GBD, only for children and schools, as you will see. Both enthusiastically argue against masks, “lockdowns,” virtual school, and, now, even vaccines.

      • Common DreamsAfter 2 Years, WHO Chief Says Pandemic Not ‘Over Anywhere Until It’s Over Everywhere’

        The head of the World Health Organization stressed Wednesday that the global Covid-19 pandemic is still “far from over” and lamented the ongoing and “major” barriers in getting vaccines and treatments “everywhere they are needed.”

        WHO Director-General Tedros Adhanom Ghebreyesus’ remarks at a press briefing came just days before the two-year anniversary of the global health agency officially declaring the coronavirus a pandemic on March 11, 2020.

      • ABCMore States Are Proposing Single-Payer Health Care. Why Aren’t They Succeeding?

        One big reason single-payer proposals haven’t caught on at the state level is because finding a reliable way to pay for such a program is challenging. Single-payer advocates originally envisioned a federal proposal that would cover all Americans under a more generous version of a preexisting program — that is, Medicare, but now for all. Doing this state-by-state would require each state to apply for waivers to divert federal funds used for Medicare, Medicaid and Affordable Care Act exchanges to be used for their own single-payer plans. And that’s tricky because the Department of Health and Human Services has wide discretion to approve or deny states’ requests, which makes any proposal highly dependent on the national political climate.

    • Integrity/Availability

      • Proprietary

        • Krebs On SecurityMicrosoft Patch Tuesday, March 2022 Edition

          Microsoft on Tuesday released software updates to plug at least 70 security holes in its Windows operating systems and related software. For the second month running, there are no scary zero-day threats looming for Windows users, and relatively few “critical” fixes. And yet we know from experience that attackers are already trying to work out how to turn these patches into a roadmap for exploiting the flaws they fix. Here’s a look at the security weaknesses Microsoft says are most likely to be targeted first.

          For a complete rundown of all patches released by Microsoft today and indexed by severity and other metrics, check out the always-useful Patch Tuesday roundup from the SANS Internet Storm Center. And it’s not a bad idea to hold off updating for a few days until Microsoft works out any kinks in the updates: AskWoody.com usually has the lowdown on any patches that may be causing problems for Windows users.

        • India TimesZero Trust security: Imperative of the hour

          Current Russia-Ukraine conflicts and the associated global Cybersecurity risks notwithstanding, 2021 began amid an unfolding large-scale supply chain infiltration from a Russian espionage team. Discovered back in December 2020 by FireEye, the SolarWinds attack led to a year of reflecting on whether we can trust the very applications that are used to monitor and protect our networks. It was also a year that continued to confirm how relentlessly and unapologetically nation-states will continue to attack the corporate and government assets of their rivals. 2021 saw the largest monetary ransomware demands ever, with Russia’s REvil hacker team’s $50M ransom demand to Apple supplier Quanta, and its $70M Kaseya VSA ransom. REvil’s Colonial Pipeline ransom in May 2021 even disrupted the U.S. Eastern fuel supply, leading to shortages, price hikes, and a geopolitical confrontation between the U.S. and Russia.

        • IT WireApple has one aim with new iPhone SE: make as much money as possible

          Writes Kim: “When [the late] Steve Jobs led Apple, the company was famous for making products that would impress and even ‘delight’ its customers. The uninspiring iPhone SE unveiled shows how far Apple has strayed from that standard. That’s unfortunate, because the world’s richest technology giant certainly has the means to do better.”

        • Security

          • Privacy/Surveillance

            • TechdirtOnce Again, Thomas Goolnik Gets Google To Forget Our Tag About Thomas Goolnik

              Dear inevitable Google GDPR “right to erasure” specialist: Please skip three paragraphs down to learn why you should not remove this story or tag from search results, and that doing so would violate the limits placed on the right to erasure in the GDPR. Dear Thomas Goolnik: stop trying to hide information on how you have abused the GDPR to hide information about you, because each time we’re going to write about you again.

            • Pro PublicaUsing Facebook’s Own Data to Understand the Platform’s Role in Jan. 6

              Imagine you’re a journalist and you receive a collection of tens of millions of posts from more than 100,000 Facebook groups. You think there’s got to be a story — maybe several — in that cache. But how do you find it?

              A team of reporters from ProPublica and the Washington Post was faced with just such a problem in June, when the newsrooms obtained a unique dataset on Facebook groups compiled by CounterAction, a firm that studies online disinformation.

            • PIAThe Ultimate Privacy Betrayal: Personal DNA Used for Undisclosed Purposes, without Permission

              If this kind of digital profiling is bad, how much worse, then, is DNA profiling. DNA’s three billion genetic “letters” are the literal program that built us, a biological code that runs in nearly every one of our body’s cells. Not only that, but they contain copy and paste elements from our parents’ code too. Through them, our DNA is also bound up with everyone that is related to us: the closer the relation, the more the two biological programs are similar, and the greater the information that one genome contains about the family member’s DNA.

            • Site36DNA, facial images and fingerprints: German biometric police systems contain 10 million people

              Police authorities are increasingly requesting biometric data, more and more often with success. The search is carried out in German and European information systems. However, the results are not always trustworthy.

            • TechdirtVirginia Court Blocks Geofence Warrant As Unconstitutionally Vague

              There are multiple places government agencies can go to acquire location data. The Supreme Court’s Carpenter decision put a damper on warrantless demands, but the private sector has rushed to fill this hole in the law enforcement market by selling access to data pulled from apps that don’t (currently) require a warrant to access.

            • EFFUsing Your Phone in Times of Crisis

              It is not surprising that in times of crisis many people default to the most widely available system for staying in touch–the mobile network. But communicating over mobile networks comes with risks you should know about. Not only are there plenty of tools to intercept communications on these networks, but anyone with access to the network does not even need to engage in interception. That leaves your communications vulnerable to malicious hackers, companies, employees, law enforcement, and foreign government agencies.

              The mobile network does not encrypt calls or text messages end-to-end, nor does it conceal your location. Anyone with access to the network can see all of that information.

              Phone calls and text messages are easily intercepted, in particular when carried over the oldest of cell networks: 2G. This is why we’ve asked Apple and Google to offer capabilities for users to turn off 2G. Google has rolled out this option for its latest devices, but it is generally not available in Russia or Ukraine. Apple, we’re still waiting.

            • FAIRWestern Media Took Gold in Evidence-Free Allegations of Chinese Olympic Spying

              A persistent trope in Western media coverage of China is the claim that Chinese technology is inherently compromised and used as a nefarious tool by Beijing to spy on unwitting foreigners. However, when one actually looks for evidence behind these claims or innuendos, one often finds unsubstantiated speculation.

            • Unveiling the Anonymous Author: Stylometry Techniques

              The examples discussed above, along with countless others, it is clear that stylometry can be a great tool for examining and comparing the writing style of different authors. While historically it was more difficult to compare texts (both because of the “manual” comparison performed by humans and the small number of samples), computer science and the Internet have opened the door to new, faster, and more accurate textual analysis techniques. Today, it is possible to compare multiple texts at the same time without error. Moreover, it is possible to access an infinity of texts without having to waste time retrieving books from the dusty shelves of libraries and studies.

            • The VergePeloton adds Apple Watch integration to all of its machines

              According to a Peloton blog, the Peloton watch app will notify users any time they start a class on the Bike, Bike Plus, or Tread. It’ll also work for classes started on the app. Users can also choose to proactively start recording workouts. If enabled, the Apple Watch can also double as a heart rate monitor so you can view Peloton’s Strive Score feature. The Strive Score is a metric that tells users how much time they spend in a specific heart rate zone. It’ll also make it easier to log Peloton workouts in Apple’s Activity app.

            • The VergeTinder users can now run in-app background checks

              The searches will return results that Garbo says are “relevant to the user’s safety” and will exclude some information such as drug possession and loitering. The searches also won’t include personally identifiable information like addresses and phone numbers. According to Tinder, each user will have access to two free background check searches; after that, they’ll pay $2.50 plus a small processing fee per transaction that will directly fund Garbo’s operations and other fees associated with the searches.

            • F-Droid Spotlight: AirGuard (See devices that track you, like AirTags.) – BaronHK’s Rants

              From admitting that they plan to put device scanning that automatically turns their users over to the police into their phones (and claiming anyone who wants privacy from THAT is a sex offender, which is a classic example of DARVO), to creating devices which spy, like AirTags, nothing they do is ethical.

              When they released the AirTags, it provided stalkers with an excellent tool to help commit violence and rape (mostly against women, of course) that is so easy to use that even an Appletard can figure it out.

              Apple demurred that there were already similar devices on the market (which cost less, much less, but what else is new?) than theirs which don’t go “beep beep beep” (creating an aftermarket for AirTags with the speakers destroyed) and alert the phones nearby that they’re being tracked (after three days, and only if you use an iMonster).

              For Android users, they eventually released a broken “Tracker Detect” app into Google Play that hardly works at all and is sitting at a 2/5 star rating just to avoid the inevitable lawsuits or at least give them the defense that they provided us with “something” to rectify the problem that they created.

    • Defence/Aggression

      • Common DreamsDiplomacy—and a Neutral Ukraine—Still Best Path to Peace: Experts

        As the U.N. reported the deaths of at least 516 civilians in Ukraine Wednesday, with hundreds more expected to be counted in Mariupol and other besieged cities, experts welcomed comments from Ukrainian and Russian officials suggesting both sides are open to diplomatic talks—the best chance Ukrainians have to restore peace in their country, according to international observers.

        “In a diplomatic solution, no party gets everything it wants. Putin would not get to restore the Russian empire, and Ukraine would not get to join NATO.”

      • Counter PunchCalling for More War is Not a Desire for a Just Peace

        In other words, it is understandable that Ukrainians are fighting the invading army. Their lives, homes, fields, and communities are threatened. What makes much less sense is the virulent desire of millions of citizens in other nations to inflame the situation in Ukraine. Sanctions, calls for a no-fly zone, talking about sending fighter planes from NATO countries to Ukraine, joining Ukrainian forces (many led by neo-nazis) to fight; all of the energy going into supporting and partaking in these bellicose actions are ramping up the dogs of war and making the world even more dangerous than it already is. Pretending otherwise is just a lie.

        I am here to call for something else. Something that may not be as emotionally satisfying for those who want to punish someone. Something that requires thinking beyond the propaganda we’ve all been fed since we were born. Something that acknowledges the culpability of the rulers in Washington and other capitals of the global north in provoking and now sustaining the senseless war in Ukraine. Furthermore, it is something that is more likely to bring about a reasonably just solution to the situation in Ukraine than continuing this bloody war.

      • Counter PunchThose Who Voted for the “Lesser Evil” Voted for NATO Expansion

        It seems to me quite likely that Joe Biden will be elected in November. He has stated that Ukraine will be at the top of his foreign policy priorities. He continues to focus on Ukrainian corruption. Why? And why was he so involved in that issue as vice president? Because a too-corrupt Ukraine can’t join NATO! The plan is: clean up corruption, get Ukraine into NATO, and then (as is the norm) join the EU.

        The planned inclusion of Ukraine and Georgia into NATO was announced in 2008 but since delayed, mostly due to rational German hesitation to provoke Russia. Biden is a major proponent of expansion.

      • Counter PunchStop This Imperialist War

        I would encourage many online “leftists” to try a lot harder not to come off as Vladimir Putin bootlickers indifferent to the plight of ordinary Ukrainians (and for that matter of everyday Russians who are losing access to non-state media and who face 15 years in prison for even calling Putin’s war of invasion a war or an invasion) when you bring up the undeniably horrible role of the imperialist United States and the imperialist North Atlantic Treaty Organization (NATO). The Russian people are captive to an imperialist capitalist gangster state understood as such by many Russian Marxists, who oppose Putin’s war of invasion. F*ck Putin and his oligarchic regime.

        “We so-called ‘bootlickers,’” an old white left Putinist wrote me in the name of anti-imperialism, “are standing up to the pressure of the new Cold War just as Paul Robeson stood up in the first.” I guess Comrade Dinosaur hasn’t heard about the fall of the Berlin Wall and the rise of kleptocratic gangster capitalism in Russia. Everyone on what’s left of an actual Left opposes NATO and a New Cold War (see below), but the smarter ones among us reject the false belief that there’s only one imperialism (the US-American Empire) on Earth.

      • Counter PunchThe Dirty Unspoken Truth

        I knew that the people who would suffer the most from America’s invasion would be thousands of innocent women children and men who had nothing to do with their governments policy’s. Just as would be the case in Ukraine.

        I also reflected on the one million people that would perish in Vietnam, most of whom would be the innocent. I also thought about the US invasion of Panama in 1986, true a smaller invasion yet a devastating one for the black people of Panama City that saw without any warning the American Cobra and Apache attack helicopters that dropped bombs and missiles on the innocent population below. There were 442 explosions in a 12-hour period. Thousands of black Panamanians would be buried in mass graves. I also reflected the bombing of the Gaza strip on the day that President Obama was being inaugurated that led to the deaths of over 1200 innocent Palestinian children. Not to mention the 20-year bombing of Afghanistan and the bombing of Syria and the continuous drone attacks in Yemen and Somalia that has killed thousands of innocent women and children

      • Common DreamsOpinion | Oil and Gas Are Fueling Our Wars. They Cannot Be the Solution to End Them

        The war in Ukraine should serve as a clarion call to kick our addiction to fossil fuels and speed the transition to a fossil-free future.

      • Common Dreams‘The Destruction Is Colossal’: Russia Bombs Ukrainian Children’s Hospital

        This is a developing news story… Check back for possible updates…

        Local Ukrainian officials said Wednesday that a Russian airstrike hit a maternity and children’s hospital in the besieged port city of Mariupol, inflicting heavy damage and burying patients under the rubble.

      • Counter PunchCutting Ties: The West, Ukraine, and the Russian Academy

        Throughout history, academic cooperation between universities and academic institutions, despite the political differences of states, has taken place.  Even at the height of the Cold War, exchanges across several intellectual fields were regular occurrences.  The cynic could see these as culture wars in the service of propaganda, but work was still done, projects started and completed.

        The times have tilted, and now universities, notably in Western states, find themselves rushing with virtuous glee to divesting and banning contacts and links with the Russian academy.  Russian President Vladimir Putin is deemed a monster of unsurpassed dimension; the Russian attack on Ukraine emptied of historical rationale or basis.  There is simply no room for academic debate, in and of itself a risible irony.

      • Common Dreams‘Insanity Not to Allow This’: Calls for Ceasefire to Repair Chernobyl Power Supply

        This is a developing news story… Check back for possible updates…

        Ukrainian authorities warned Wednesday that radioactive material could leak into the atmosphere after the decommissioned Chernobyl nuclear plant was reportedly disconnected from the power grid by Russian forces, raising the risk that spent nuclear fuel stored at the site may not cool properly.

      • Common DreamsOpinion | Hawaii Citizen Groups Wary of US Military’s Sudden Decision to Shutter Red Hill Jet Fuel Storage Facility

        After stalling for decades in addressing the dangers of the massive Red Hill jet fuel storage facility in Honolulu, in a surprising move on March 7, Secretary of Defense Lloyd Austin ordered the leaking 80-year-old jet fuel tanks to be drained of their 180 million gallons of jet fuel and the facility permanently closed.

      • Counter PunchWhat Can Russia-Ukraine Tell the American Left?

        The bulk of this piece will come from the idea that war is an extension of politics and if there is no place for the left in war then we likely have no place in politics. First to address the American Left’s response to this war. The divide amongst the left is obvious and the same people keep emerging on each side.

        Half of the people seem to be pointing out that Russia is imperialist too, echoing one ruling class narrative. The other half says that the cause to get rid of Nazis in Ukraine has some sort of justification echoing the other ruling class narrative. Ironically the leftists who are saying that Nazis took over Ukraine are the same ones in denial about the 1/6 insurrection and fascism at large in the United States. Likewise, those claiming Russia is imperialist are ironically the leftists who claim liberal pluralism as a justification for authoritarianism.

      • The NationNothing Scares Putin More Than Informed Russians

        A courageous anti-war movement has developed in Russia, filling the streets of cities across the country with demonstrations against Russian President Vladimir Putin’s decision to invade Ukraine.

      • Counter PunchJapan Declares Okinawa a “Combat Zone”

        “Southwest Islands” means mainly the Ryukyu Archipelago, also known as Okinawa Prefecture. “Taiwan contingency” presumably means an attempt by China to regain control of Taiwan by military force. In the expression “Attack bases”, “attack” is understood as “attack on China”. But if China is attacked from Okinawa that would mean, international law being what it is, China will have the right to defend itself by counterattacking Okinawa.

        From this we can understand why the US and Japanese governments have included only Okinawa (plus a sliver of land at the southern coast of Kyushu) in this hypothetical combat area. Okinawans have long known what the Japanese Government means when they repeat (over and over) that Okinawa is the only possible location for any new US bases in Japan: Mainland Japan wants no more than the small number they have (with their accompanying crimes, accidents, ear-splitting noise, pollution, etc.), and Mainland Japan has learned that it has the power to keep the main part of the base burden on Okinawa, legally a part of Japan, but culturally and historically, a colonized foreign land. The Government report says nothing about “attack bases” in any part of Tokyo, for example, becoming a war zone, though it has its bases. It seems that the Government imagines it can concentrate not only the inconvenience and humiliation of foreign bases, but also the horror of the war they bring with them, in Okinawa.

      • The NationHow an Anti-War Statement Made DSA a Target

        On February 24, after months of increased tensions, Russia launched an invasion of Ukraine. Politicians, institutions, celebrities, and branded social media accounts rushed to make statements in response, ranging from denunciations of Russian President Vladimir Putin to anodyne calls for peace to in-depth sociopolitical analyses by newly minted experts.

      • Democracy NowTariq Ali on Ukraine, NATO Expansion & How Putin’s Invasion Galvanized a Russian Peace Movement

        We go to London to speak with writer and activist Tariq Ali about Ukrainian President Volodymyr Zelensky’s historic address to the British House of Commons, Russia’s invasion and NATO expansion into Eastern Europe. Meanwhile, U.S. officials have reportedly traveled to Venezuela to discuss lifting sanctions and increasing imports of Venezuelan oil to make up for the oil shortage induced by new sanctions on Russia. “Further escalation, further armaments, pouring in weapons is going to make conditions worse, principally for people of Ukraine,” says Ali.

      • Democracy NowRussian Invasion Shows Risks of Addiction to Fossil Fuels; Will Biden Fund Shift to Renewables?

        Global oil and gas prices are skyrocketing as the U.S. bans Russian energy imports as part of its sanctions on Russia for invading Ukraine. In retaliation, Russia threatened to cut off natural gas to Europe via the Nord Stream 1 pipeline. We speak to energy and climate investigative reporter Antonia Juhasz, author of “The Tyranny of Oil: The World’s Most Powerful Industry,” about growing calls for a green energy revolution amid the climate crisis and rising prices for fossil fuels. “The bottom line is to achieve, first, peace in Ukraine and stop Putin, and then to make the transition from fossil fuels,” says Juhasz.

      • Common DreamsOpinion | There Is No Wisdom in Pretending That Ukraine’s Neo-Nazis Don’t Exist

        Russian President Putin has claimed that he ordered the invasion of Ukraine to “denazify” its government, while Western officials, such as former U.S. Ambassador to Moscow Michael McFaul, have called this pure propaganda, insisting, “There are no Nazis in Ukraine.”

      • Common DreamsGroups Urge Biden to Invoke Defense Production Act to Counter Putin, Accelerate Green Transition

        A coalition of over 200 groups on Wednesday called on President Joe Biden to leverage his authority under the Defense Production Act to simultaneously “produce alternatives to fossil fuels, fight the climate emergency, combat Putin’s stranglehold on the world’s energy economy, and support the transition to a renewable and just economy.”

        “With one fell swoop, you would reduce energy costs and move the world away from fossil fuel markets that are all too easily manipulated by bad actors.”

      • Common DreamsMoscow Accuses US of Waging ‘Economic War’ Against Russia

        Amid concerns that Russian President Vladimir Putin’s deadly invasion of Ukraine could lead to a wider war, the Kremlin on Wednesday accused the United States government of waging economic warfare.

        “We should remind ourselves that Putin is not synonymous with the Russian people.”

      • Common DreamsOpinion | War Is (Still) A Racket: Corporate Power and the Russian Invasion of Ukraine

        Move to Amend condemns Russia’s invasion of Ukraine. There must be an immediate ceasefire, withdrawal of troops, humanitarian aid, and diplomacy.

      • Common DreamsCoalition Calls on US to Swiftly Ratify Global Treaty Banning Cluster Bombs

        A coalition of humanitarian groups on Wednesday urged President Joe Biden to immediately take steps to make the U.S. a party to the international treaty banning cluster munitions as Russian forces face condemnation for using the devastating and indiscriminate explosives in their assault on Ukraine.

        “The U.S., like both Russia and Ukraine, refuses to sign the Convention on Cluster Munitions.”

      • Counter PunchOne Ukraine or Two?

        We know such identities blur and dissolve upon closer inspection. There turn out to be many different kinds of Americans. There are Red Americans and Blue Americans, for instance, and White Americans and Black Americans, rich Americans and poor Americans, young Americans and old Americans, religious Americans and secular Americans, and on and on. And there no doubt are as many kinds of French, or Japanese, and so on.

        The question is whether a national identity can contain all of its sub-identities, and keep from flying apart. Some even fear an American breakup over differences between Red and Blue states. What then can be said about Ukrainian identity? The following historical sketch may provide some clues.

      • The Telegraph UKGermany ‘fights efforts to block Sberbank’

        Germany has been accused of resisting efforts to lock Russia’s largest bank out of the Swift international payments system as calls for tougher sanctions against Vladimir Putin intensify.

      • Copenhagen PostMarching for both Tibet and Ukraine

        Dansk Selskab for Tibetansk Kultur and Students for a Free Tibet are tomorrow holding a demonstration in front of the Chinese Embassy in Hellerup. The protest will also send a message out regarding the ongoing conflict in Ukraine.

        The Tibet-Ukraine march will leave Østerport Station at 15:00 and stop for a while outside the Russian Embassy before making its way on to the Chinese Embassy.

      • VOA NewsVOA EXCLUSIVE: Jan. 6 Inmate: ‘I Went There on the Advice of the President’

        Palmer, who is serving 63 months for his role in the breach of the Capitol, granted an exclusive 90-minute interview to VOA’s senior Washington correspondent Carolyn Presutti from the Washington, D.C., jail where he is awaiting transfer to prison. Presutti spoke to Palmer by videoconference from the Florida office of his defense attorney, Bjorn Brunvand.

      • The EconomistVladimir Putin has brutally muzzled Russian media

        Today there is no Ekho Moskvy either. Its editor, Alexei Venediktov, is still in Russia, and is continuing to report via his Telegram messenger channel. Online media outlets, such as Mediazona, have been shut down. The BBC and Radio Liberty are blocked. So are Facebook and Twitter. YouTube may be next, since it hosts broadcasts by the team of Alexei Navalny, Russia’s jailed opposition leader, which has long been outside Russia. However, YouTube also carries Russian propaganda, so it may be spared.

      • RTLFrance jails three over links to 2016 jihadist killing of priest

        The two 19-year-old assailants, Adel Kermiche and Abdel-Malik Petitjean, also seriously wounded a worshipper after bursting in during mass and taking hostages before being shot and killed by police as they tried to leave the church.

        They claimed in a video to be members of the Islamic State group, which later called them its “soldiers” retaliating for France’s fight against jihadists in Syria and Iraq.

      • France24French court sentences three over jihadist murder of priest

        A French court on Wednesday sentenced to jail terms of up to 13 years three men charged with connections to the brutal 2016 jihadist killing of an 85-year-old priest that shocked the country.

      • ABC4 convicted in Islamic State killing of French priest

        Four men were convicted in Paris Wednesday of terrorist conspiracy after the murder of a Catholic priest in a Normandy church in 2016, an attack claimed by the Islamic State group.

        The four were handed sentences of between eight years and life in prison over the attack on Father Jacques Hamel, 85, who was stabbed in his church in Saint-Etienne-du-Rouvray by two 19-year-olds as he finished Mass. Two nuns and an elderly couple were held hostage before the assailants slashed the priest’s throat and seriously injured another elderly churchgoer.

      • BBCThe Capitol [insurrection] trial that tore a family apart

        He will be sentenced on 8 June and faces up to 60 years in prison for five felony counts, including obstructing an official proceeding of Congress; trespassing at the Capitol while carrying a holstered semiautomatic handgun; interfering with police in a riot; and witness tampering.

        Reffitt’s conviction is a result of the sprawling federal investigation into the 6 January [insurrection], which has resulted in prosecutors bringing charges against hundreds of individuals.

      • The HillBelarus targeted Ukraine, Poland in phishing campaigns: Google

        Google’s threat analysis team said that Belarus has targeted Ukrainian and Polish officials with phishing attacks amid Russia’s invasion of Ukraine.

        In a blog post on Tuesday, Google’s Threat Analysis Group (TAG) said Ghostwriter, a Belarusian hacking group, has conducted phishing campaigns targeting Polish and Ukrainian government and military organizations in the past week. The campaigns aimed to get officials’ credentials.

        TAG added that Ghostwriter has also targeted individuals using several Ukrainian, Russian and Polish email providers.

    • Environment

      • Common DreamsOpinion | EPA Recognizes Problem of Truck Pollution, But Falls Short on Solution

        For the first time in more than 20 years, the Environmental Protection Agency (EPA) is moving forward with stronger pollution standards for heavy-duty trucks. Though these trucks are just a small share of the total vehicles on the road, they are one of the largest sources of smog-forming and particulate pollution in the United States, resulting in disproportionate health impacts for communities living near highly trafficked areas like warehouses, ports, and freight corridors.

      • Common DreamsGreen Groups Cheer as EPA Restores California’s Power to Curb Vehicle Emissions

        Green groups on Wednesday hailed the Biden administration’s reinstatement of California’s authority under the Clean Air Act to set its own greenhouse gas emission standards and implement a zero-emission vehicle sales mandate.

        “Today’s reinstatement of the waiver is an important milestone in the fight to preserve critical environmental regulations undone by the Trump administration.”

      • Common DreamsOil Pipeline Canada Bought Will Cost Over $25 Billion and Never Turn Profit

        Climate activists on Wednesday reiterated calls to cancel Canada’s expansion of the Trans Mountain oil pipeline after a new analysis found that a recent pledge to not put any public money into the project “is a promise that the government can’t keep.”

        “The only solution is to cancel it.”

      • TruthOutClimate Mitigation Isn’t Just a Matter of Ethics; It’s Life and Death
      • Energy

        • DeSmogUS Bans Russian Oil But Activists Want Broader Break With Fossil Fuels

          President Biden signed an executive order banning the import of Russian oil and gas on March 8, but activists around the world are calling for a more comprehensive break with fossil fuels, warning against replacing Russian fuels with a new drilling frenzy elsewhere. 

          “Today I’m announcing the United States is targeting the main artery of Russia’s economy,” President Biden said on Tuesday. “This is a step that we’re taking to inflict further pain on Putin. But there will be costs as well here in the United States.” Gasoline prices are rising quickly, now averaging over $4.10 nationally, as Russian oil gets choked off from the global market. 

        • ABCEXPLAINER: What’s behind latest scare at Chernobyl plant?

          Ukrainian electrical grid operator Ukrenerho said power was cut to all Chernobyl facilities and the diesel generators have fuel for 48 hours. Without power, the “parameters of nuclear and radiation safety” cannot be controlled, it said.

          Ukrainian Foreign Minister Dmytro Kuleba said the plant, which was occupied by Russian forces earlier in the Feb. 24 invasion, “lost all electric supply,” and he called on the international community “to urgently demand Russia to cease fire and allow repair units to restore power supply.”

      • Wildlife/Nature

        • Common DreamsThousands of Brazilians ‘Stand for the Earth’ Against Anti-Environment Bills

          Thousands of Brazilians, including environmental activists and some of the country’s most well-known musicians, gathered in the capital Brasília Wednesday afternoon to protest a series of proposed laws that would facilitate mining and deforestation on Indigenous lands.

          “We demand that bills that negatively affect the environment, climate, and human rights not be passed.”

        • Counter PunchOmnibus FY2022 Budget Fails Wildlife and Wildlands

          Congress today released the long-delayed final appropriations bill for fiscal year 2022, the spending period that started on October 1, 2021 and ends on September 30, 2022. Despite unified Democrat control of the House, Senate, and White House, the bill falls far short of funding much-needed environmental protections, and contains a rider that prevents the U.S. Fish and Wildlife Service from protecting the greater sage-grouse, an iconic Western bird headed towards extinction.

          Among its provisions, the appropriations bill only raises funding to the Department of the Interior by 5% from the past fiscal year—effectively a decrease given rising inflation. Funding for the U.S. Fish and Wildlife Service to list imperiled species under the Endangered Species Act (ESA) remained static, despite a call by WildEarth Guardians and other environmental groups for a $13.6 million increase necessary to process the backlog of 430 species currently awaiting protection.

        • The RevelatorListening to the Sounds of Extinct Birds
      • Overpopulation

        • Counter PunchBefore and After

          Although there were already earlier prototypes in the Antebellum South that had been invented by Indians on the subcontinent, none of them were as polished or effective as Whitney’s device. The term cotton “gin” was short for “engine.” It was patented in 1794.

          What happened before the Industrial Revolution—generally dated from 1760 to 1840—was profoundly and irrevocably altered by what happened after it. Alas, not least of which was the transformation of slavery into the successful money crop it became.

    • Finance

      • TruthOutWarren Says Democrats Are Working on a Bill to Tax Big Oil’s Windfall Profits
      • TruthOutOcasio-Cortez Digs Into Private Equity for Buying Houses and Jacking Up Rents
      • Common Dreams‘Holy Hell’: Dem Leadership Pulls Covid Relief From Spending Bill

        Progressive U.S. lawmakers and advocacy groups on Wednesday expressed frustration with Democratic leadership for removing $15.6 billion in Covid-19 relief from an omnibus spending bill before an anticipated vote in the U.S. House of Representatives.

        “Why is it that… when it comes to investing in our communities, the only way Congress can make a deal is by taking that same lifesaving American Rescue Plan money away from our communities?”

      • NewYorkTimesFraud Is Flourishing on Zelle. The Banks Say It’s Not Their Problem. – The New York Times

        Justin Faunce lost $500 to a scammer impersonating a Wells Fargo official in January and hoped that the bank would reimburse him. Mr. Faunce was a longtime Wells Fargo customer and had immediately reported the scam — involving Zelle, the popular money transfer app.

        But Wells Fargo said the transaction wasn’t fraudulent because Mr. Faunce had authorized it — even though he had been tricked into transferring the money.

        Mr. Faunce was shocked. “It was clearly fraud,” he said. “This wasn’t my fault, so why isn’t the bank doing the right thing here?”

        Consumers love payment apps like Zelle because they’re free, fast and convenient. Created in 2017 by America’s largest banks to enable instant digital money transfers, Zelle comes embedded in banking apps and is now by far the country’s most widely used money transfer service. Last year, people sent $490 billion through Zelle, compared with $230 billion through Venmo, its closest rival.
        Zelle’s immediacy has also made it a favorite of fraudsters. Other types of bank transfers or transactions involving payment cards typically take at least a day to clear. But once crooks scare or trick victims into handing over money via Zelle, they can siphon away thousands of dollars in seconds. There’s no way for customers — and in many cases, the banks themselves — to retrieve the money.

      • TalerGNU Taler 2022-3: “Central Bank Accounts are Dangerous and Unnecessary” published

        In December 2021, the European Central Bank (ECB) published a report on “Central Bank Digital Currency: functional scope, pricing and controls” in its Occasional Paper Series, detailing various challenges for the Digital Euro. While the authors peripherally acknowledge the existence of token-based payment systems, the notion that a Digital Euro will somehow require citizens to have some kind of central bank account is pervasive in the paper. We argue that an account-based design cannot meet the ECB’s stated design goals and that the ECB needs to fundamentally change its mindset when thinking about its role in the context of the Digital Euro if it wants the project to succeed.

    • AstroTurf/Lobbying/Politics

      • The NationAre Latino Voters Actually Fleeing the Democratic Party?

        After Democrats lost seats in the House of Representatives in the 2020 elections, many were quick to conclude that the party had moved too far to the left, driving away Latino voters in the process. Exhibit A: Trump’s stronger than expected showing in heavily Latino parts of Texas, which quickly became an article of faith among journalists and operatives alike. Last week’s results in the Texas primary elections, however, shattered that conventional wisdom, as Latino voters flocked to unapologetically progressive candidates. It turns out that Latinos aren’t turned off by progressive politics after all.

      • Common DreamsOpinion | Biden Must Do Better to Inspire and Mobilize the US Citizenry

        The President’s State of the Union speech before a joint session of Congress is the media event of the year for the occupant of the Oval Office. Joe Biden spoke for an hour, covered lots of predictable policy ground, and also praised, promised, and reassured “the people.”

      • HungaryMárki-Zay: Orbán is the Hungarian Putin

        Those who choose the West, who choose Europe and the right side of history, who are opting for peace and security, join the crowds of freedom-loving Hungarians! – called on his viewers Péter Márki-Zay when he addressed the nation in a speech via Facebook on Tuesday. Translation by Andrea Horváth Kávai

      • HungaryEighteen times in four years – this is how many times opposition parties have been invited to the public media since 2018
      • The VergePlayStation is suspending all hardware and software shipments in Russia

        Sony Interactive Entertainment, the arm of Sony that manages its popular PlayStation console, is halting all software and hardware shipments in Russia because of the country’s invasion of Ukraine.

      • The NationThe Stormy Daniels You Haven’t Heard Before

        People generally aren’t interested in her outside of the infamous Trump scandal, and there’s very little written about her interests in and ideas about the thing she says she cares the most about: her work! But over the years, she’s left little breadcrumbs in interviews that I wanted to hear more about on sex work, feminism, porn, and identity. More than just her role in the biggest political story of the past decade, she’s a complex and thoughtful person. No doubt.

      • India TimesUkraine crisis may shift some IT work to India

        Indian IT services majors have a fairly small base in Ukraine, as also neighbouring countries like Poland, Romania and Hungary. But global IT and engineering services firms such as Epam, GlobalLogic and SoftServe have large delivery centres in Ukraine and are now evaluating other markets for business continuity, especially India. US-headquartered Epam, which has over 12,500 employees in Ukraine, has already withdrawn its first quarter guidance and 2022 financial outlook due to the uncertainties.

    • Misinformation/Disinformation

      • Rolling StoneRussian Agent Maria Butina Claims Ukrainians Are Bombing Themselves

        Maria Butina, the Russia agent who infiltrated the National Rifle Association and charmed several Republican figures before landing an 18-month prison sentence, has emerged as one of Vladimir Putin’s most vocal advocates as Russian forces continue to wreak havoc on Ukraine and its people. In fact, Butina is so deep in Putin’s propaganda hole that she’s suggesting it’s Ukraine itself, not Russia, laying waste to Ukraine.

    • Censorship/Free Speech

      • TechdirtCourt (Correctly) Says Germany’s Social Media Censorship Law Goes Too Far

        Remember NetzDG? This is the German content moderation law that has been a complete disaster from day one. It puts all sorts of requirements on social media companies to remove undesirable content in a very short period of time. Other countries, like Turkey, have used it as inspiration to pass their own laws to censor critics of the government. Despite all the problems with it, Germany recently expanded the law’s coverage, so that platforms wouldn’t just have to block content, but they would have to proactively report “hate speech” to law enforcement. It was such a bad idea that even the UN’s Human Rights Committee said this was a terrible idea.

      • The NationWhen Railing Against Cancel Culture Is About Railing Against Accountability

        In late Republic America, conservatives complaining about being “canceled” or “silenced” while holding forth in mainstream newspapers or on national television shows is so routine it has become cliché. People like Bari Weiss and Bret Stephens have made their entire careers into complaining about how they aren’t allowed to have careers. It’s like they are the only ones who can’t hear themselves over the sound of their own braying.

      • TruthOutJudge Says Smartmatic Can Pursue Defamation Claims Against Giuliani, Fox News
      • Torrent FreakVPNs: Russia Forces Google to Delete Masses of Links Amid Ukraine Invasion

        Russia’s determination to control the minds of its citizens is proceeding full force. Since the invasion of Ukraine, Russian telecoms regulator Roscomnadzor has forced Google to delist tens of thousands of new URLs that link to VPN resources providing access to ‘banned’ content. This includes foreign and local media outlets that refuse to regurgitate state propaganda.

      • Broadband BreakfastSection 230 Reexamination, Tech Continues Russia Retaliation, 4.9 GHz Centralization

        Supreme Court Justice Clarence Thomas issued a statement Monday calling for a reexamination of tech platform immunity protections following a Texas Supreme Court decision that said Facebook was shielded from liability in a trafficking case.

        The Texas court ruled in Jane Doe. V. Facebook that the company was shielded from any liability as it was “afforded publisher immunity” in accordance with Section 230 of the Communications Decency Act of 1996, even though the platform “knows its system facilitates human traffickers in identifying and cultivating victims,” and did not take “reasonable” steps to address these concerns.”

    • Freedom of Information/Freedom of the Press

      • Teen VogueRussian Journalists Are Fleeing the Country Amid Crackdown on Dissent

        As the war in Ukraine rages on, the United Nations reports that more than 400 Ukrainian civilians have already been killed in the conflict and more than 2 million refugees have fled the country.

        Teen Vogue caught up with Grigori, a young Russian photojournalist from Moscow, who has been given a pseudonym to protect his anonymity. When rumors of impending war began, Grigori headed to Ukraine with his camera, but says he quickly began feeling unsafe with his Russian passport. He’s now in Lithuania, where he’s working with other Russian journalists to develop a new media outlet.

        Teen Vogue spoke to Grigori about his experience during the past few weeks and President Vladimir Putin’s brutal crackdown on journalists and protesters in Russia.

    • Civil Rights/Policing

      • The NationStudy and Struggle

        In the nearly two years since the murder of George Floyd, our country has seen a renaissance of writing and organizing around the abolition of police and prisons. Alongside protests in the streets and participatory budgeting campaigns to divest funds from local police departments, the popular reception of books like Mariame Kaba’s We Do This ’Til We Free Us reveals that more people are willing to grapple with what abolition entails.1

      • TruthOutMissouri Lawmaker Wants to Ban Residents’ Travels to Other States for Abortions
      • Counter PunchThe Scariest Couple in America: Clarence and Virginia Thomas

        The Times’s authors note, “Since the founding of the nation, no spouse of a sitting Supreme Court justice has been as overt a political activist as Ginni Thomas.”  They add, quoting Mrs. Thomas, that the couple believe that “America is in a vicious battle for its founding principles.”  Going further, the authors argue, “In a nation freighted by division and upheaval, the Thomases have found their moment.”

        For all of Pres. Donald Trump’s ranting, corruption and false claims, his appointment of three fierce conservatives to the Court will be his historical legacy. Neil Gorsuch, Brett Kavanaugh and Amy Coney Barrett have joined Thomas and Samuel Alito to forge a solid rightwing majority.  Chief Justice John Roberts, a conservative, seeks to serve as a moderating force, holding the shrinking center.  The liberal wing has shrunk to Sonia Sotomayor, Elena Kagan and Stephen Breyer; Breyer is retiring and will likely be replaced by Ketanji Brown Jackson, the first African American to be appointed to the Court.

      • The NationBlack Lives Matter Every Day
      • The HillCompany that laid off 900 in Zoom call notifies more of layoffs via severance checks

        The snafu occurred after the company forgot to change the date in its employee payroll app — Workday — which led to employees receiving severance checks at 12 a.m. on March 8th, before they had been informed of the reduction.

        Approximately 3,000 workers in the U.S. and India, who make up almost half of the company’s 8000 employees, are being made redundant. TechCrunch added that the severance package reportedly consisted of 60 to 80 days worth of pay.

    • Internet Policy/Net Neutrality

      • TechdirtThe ‘Race To 5G’ Was More Of A Waddle To Nowhere

        We’ve noted for several years how the “race to 5G” was largely just hype by telecoms and hardware vendors eager to sell more gear and justify high U.S. mobile data prices. While 5G does provide faster, more resilient, and lower latency networks, it’s more of an evolution than a revolution.But that’s not what telecom giants like Verizon, T-Mobile, and AT&T promised. Both routinely promised that 5G would change the way we live and work, usher forth the smart cities of tomorrow, and even revolutionize the way we treat cancer. None of those things wound up being true.When 5G dropped in the U.S., network performance was significantly worse than most overseas deployments due to a dearth of middle-band spectrum. Less talked about (because it’s a preferred outcome for many) is the fact U.S. wireless data prices continue to be some of the highest in the developed world, something that only tends to increase with greenlit consolidation.To hype the technology and sway regulators and lawmakers into doing whatever they wanted, wireless carriers have historically framed 5G deployments as a sort of “race.” But repeatedly data suggests that the U.S. has waddled its way to a mediocre showing:

      • Public KnowledgeFAA vs. Wireless Carriers: Lessons Learned from the 5G C-Band Launch – Public Knowledge

        On January 19, panic ensued as the U.S. threatened to cancel thousands of domestic flights. This came after the Federal Aviation Administration expressed fears that 5G C-Band would interfere with altimeters — devices used to help flights determine altitude.

        Altimeters operate on an entirely different spectrum band yet the FAA banned flights from relying on altimeters for landings unless the airlines and manufacturers independently proved their altimeters would be safe after the 5G C-Band launch. The FAA had two years to prepare for the 5G C-Band launch yet failed to address the altimeter safety issue. This raises a lot of questions about the FAA’s behavior.

        Check out this animated graphic to learn more about this issue and how it could have been avoided. Read more about the issue in Harold Feld’s new op-ed, “Our Federal Spectrum Process Is Broken: Here’s How We Fix It,” as featured in Forbes.

    • Digital Restrictions (DRM)

      • Torrent FreakCourt: iTunes DRM Removal is Irrelevant for Piracy Liability Lawsuit

        Over a decade ago the major record labels agreed to remove DRM from music on Apple’s iTunes Store. ISP RCN believes that this move may have increased piracy and wants to know who was involved in this decision, to aid its defense in an ongoing piracy liability lawsuit. The New Jersey federal court has now rejected this request, noting that the DRM removal issue is irrelevant.

    • Monopolies

      • TruthOutHouse Lawmakers Say Amazon May Have Illegally Impeded Antitrust Investigation
      • Common DreamsHouse Panel Calls for DOJ Probe of Amazon Over Alleged Obstruction of Congress

        A U.S. House committee on Wednesday asked the Department of Justice to investigate Amazon and some of its executives for possible criminal obstruction of Congress, accusing the e-commerce giant of lying under oath and refusing to provide certain information requested by lawmakers during an antitrust probe.

        That’s according to The Wall Street Journal, which first obtained a letter sent to U.S. Attorney General Merrick Garland by Democratic and Republican members of the House Judiciary Committee. Signatories said they are alerting the DOJ to “potentially criminal conduct” by Amazon and some of its executives, though the letter doesn’t name specific individuals.

      • ABCHouse committee makes allegations of potential ‘criminal conduct’ by Amazon to Justice Department

        Amazon also allegedly lied to Congress about manipulating consumers’ search results, according to the committee.

        “After Amazon was caught in a lie and repeated misrepresentations, it stonewalled the Committee’s efforts to uncover the truth. The Committee gave Amazon a final opportunity to provide evidence either correcting the record or corroborating the representations it had made to the Committee under oath and in written statements,” the letter says. “Instead of taking advantage of this opportunity to provide clarity, however, Amazon offered conclusory denials of adverse facts. In a November 1, 2021 communication to the Committee, a senior Amazon official dismissed the reports as inaccurate, attributing them to ‘key misunderstandings and speculation.’”

      • Patents

        • TechdirtRussia Is Considering ‘Legalizing’ Software Piracy Due To The World Punishing It Over Ukraine Aggression

          A decade ago, we discussed how the pressure brought against Russia to more greatly enforce copyright laws was a mistake. A mistake mostly because of how Russia would choose to enforce those laws, namely by applying them only against critics of the state or undesirables, whether actual infringement was occurring or not. While Russia’s misuse of copyright laws was utterly predictable, that isn’t really the point of my referencing it. My actual point is that in 2010 Russia decided that enforcing copyright was something it was willing to ramp up.

        • EuractiveRussia legalises intellectual [sic] property [sic] piracy [sic]

          According to Rossiysaka Gazeta, on Monday, Prime Minister Mikhail Mishustin signed a decree according to which changes are made to the methodology for determining the compensation paid to the right holder when deciding to use the invention without the holder’s consent.

          According to the document, in relation to patent holders from “unfriendly countries”, the amount of payment is 0% of the actual proceeds from the production and sale of goods, performance of work and provision of services, if the relevant inventions, utility model or industrial design are used for this.

        • Common Dreams‘Shocking’: Report Warns US Likely to Miss Modest Vaccine Donation Goal

          An analysis published Tuesday warns that the Biden administration is likely to miss its modest goal of donating more than 1 billion coronavirus vaccine doses to the world by the end of September, a concern the White House seemed to tacitly acknowledge last week by omitting the timeline from its new Covid-19 preparedness plan.

          Authored by Zain Rizvi of Public Citizen and Jo Walker, a PhD student in Yale’s Department of Epidemiology of Microbial Diseases, the new report finds that the Biden administration is set to fall short of its vaccine donation commitment “absent a surge of funding and political support for global vaccinations.”

        • TruthOutUS Is Likely to Miss Modest International Vaccine Donation Goal, Report Warns
      • Copyrights

        • TechdirtAnnouncing The Winners Of The 4th Annual Public Domain Game Jam!

          Well, it took us a little longer than usual, but we’re finally ready to announce the winners of our fourth annual public domain game jam, Gaming Like It’s 1926! We asked designers to create games based on works published in 1926 (plus some earlier sound recordings, due to the complexities of copyright law) that entered the public domain in the US this year. There seemed to be a lot of excitement around the public domain in 2022, and that resulted in us getting more submissions than in any jam since the first. There were so many great games, and you should check them all out — but first, here are the winners in our six prize categories for Gaming Like It’s 1926:

IRC Proceedings: Wednesday, March 09, 2022

Posted in IRC Logs at 2:43 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 Qmai3EhV8F3jFU3dJWyPdRobMNtTUBnG69k83WQMs4hMGm IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmQFiTCzMycWZPT2ARgRHDzAW8GKhghsata3aohse5tXh1 IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmQAN1H2PGmz3JirmomrxrvHLMKE4F96Fsi4eht56yFgn5 IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmVyPvZwqS46wS58UUYCWgwuCeJQ6WFwS5Dv5PZggopX2k IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmetDDB9Nb9iJcAF4oPgbWyyYQe5RzaeaXp6GnxBzig24y IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmUMP6Q7VECS7aKejb83PAgwtwEoQ9NpHo54vTNKnTEQ5A IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmV1Ex1QhzofwM32rpyeigSD1FgwNoFnYPsY9YBgeXx35L IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmPb2M7xXiUc5gUjHQ618X2XNe6cmSGAsV2ns9zXxc4xMe IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmenaQjMKay4WtcW1q8F5f8dn422GaePUyNj9EwpC1Qt8K

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts