Twitter is Not as Important as the Media Wants Us to Believe

Posted in Deception at 6:10 pm by Dr. Roy Schestowitz

Video download link | md5sum d2751d25bbc2d054f419c66e7e8585e1
Twitter is Faking Reach
Creative Commons Attribution-No Derivative Works 4.0

Summary: Twitter tells me that more than a month after I left entirely the number of so-called ‘impressions’ suddenly quadrupled (or more); this might suggest doctoring by Twitter (which wants to inflate its perceived value) as valuations are now discussed, more so amid a potential takeover — a reportedly hostile acquisition assured to doom the platform (millions of people won’t invest time in one-man cults)

THE social control media platform known as Twitter is overhyped and unhealthy (by design). It’s unhealthy to any functioning society because it seeks to increase polarity. That’s just how Twitter drives up engagement (their word) and sells advertisements.

Twitter has over the years turned a blind eye to a lot of abuse; not abuse in the speech sense but gaming of the platform (like selling fake “followers” to people). Twitter benefits from a false perception of scale. Facebook did the same thing and they both got sued for it (Twitter even settled and paid out a lot of money).

In the video above I wanted to share something that I noticed last week. Amid talks about the somewhat remote possibility of Twitter becoming just “Musk Social” it seems like Twitter is inflating so-called ‘impression’ counts. It did this years ago, so why not again?

“We reckon that the social control media bubble will burst faster than anyone has ever imagined.”As I stressed earlier this year and last year, Twitter grew increasingly irrelevant for a number of years. Like Facebook, they’ve long abstained from admitting it. Twitter now boosts (promotes tweets of) celebrities and politicians. Like Gulag with GulagTube, Twitter reckons it can make more money by imitating mainstream media and broadcast television. This won’t end well; sooner or later users realise they’re being conned and this is why there’s currently a lot of dissent among longtime GulagTubers. They’ve turned to shilling ("influencing") and some are being banned for it. See, only “authorised” celebrities and brands are permitted to do this.

We reckon that the social control media bubble will burst faster than anyone has ever imagined. This bubble is based on the false assumption that one must participate in social control media to get noticed (or get canceled!) and this delusion will evaporate faster than anyone thought possible. Watch what happened to Spotify earlier this year.

You Probably Don’t Want ‘Modern’ Cars

Posted in Free/Libre Software at 5:34 pm by Dr. Roy Schestowitz

Video download link | md5sum ed82e3c1a3e5eee859f92bf66da076ce
When Smart People Avoid Modern Stuff
Creative Commons Attribution-No Derivative Works 4.0

Summary: Today’s cars aren’t made to last long or respect the will of drivers/owners/buyers; this is a very big deal!

THIS past Christmas we did a series about computerised cars. They’re a menace to drivers’ freedom and they present or pose all sorts of other threats/issues. They’re expensive to maintain, they give away far too much control… or hand over control over drivers (the buyer hardly gets to control the “product”), and more people nowadays ‘hunt’ for older cars.

“Gone are the days when you can use and maintain a car for up to 30 years.”A few weeks ago Ryan got a used car and he’s starting to find out what even cars made nearly 15 years ago sadly lead to [1, 2, 3]. They’re ‘too modern’ already and we’ve heard other (very similar) stories of borderline remorse. Gone are the days when you can use and maintain a car for up to 30 years.

The quality of the sound (in the video above) is poor, but we’ve sorted out the microphone’s quality since then (applicable starting tomorrow).

Links 16/04/2022: EasyOS 3.4.6 and LXQt 1.1.0

Posted in News Roundup at 2:12 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • 9to5LinuxLambda Launches World’s Most Powerful Ubuntu Linux Laptop for Deep Learning

        Meet Razer x Lambda Tensorbook, the world’s most powerful Ubuntu Linux laptop designed for deep learning. Powered by an Intel i7-11800 Octo-Core processor featuring up to 4.6GHz clock speeds and an NVIDIA GeForce RTX 3080 Max-Q graphics card with 16GB VRAM, the Tensorbook laptop provides ML engineers an all-in-one deep learning solution for all their needs.

        For that, the Tensorbook laptop comes with the Lambda GPU Cloud service and the full Lambda Stack, and runs Ubuntu Linux 20.04 LTS.

      • Razer X Lambda Tensorbook Powered By Ubuntu – Full Specifications & Price | Itsubuntu.com

        Razer x Lambda Tensorbook Powered By Ubuntu – Full Specifications & Price

        TENSORBOOK is a deep learning laptop from Lambda. Powered by an Intel i7-11800 Octo-Core processor, Tensorbook is the world’s most powerful Linux laptop that is powered by Ubuntu Linux. Tensorbook is an effort of Razer and Lambda to build the most powerful Linux laptop. The Razer x Lambda TensorBook is already up for sale at a starting price of $3,499. Tensorbook is 10x faster than Google Colab and 4x faster than Apple M1 Max.

      • Duncan LockUsing Windows after 15 years on Linux · duncanlock.net

        Windows is such a mess! It’s sort of shocking how much of a mess it is. Desktop Linux is often criticized for this, but Windows is much worse, somehow! It’s really inconsistent. Half of it is “new” UI and half of it is old Win32/GDI type UI – just as bad as KDE/GTK – except worse, because you can’t configure them to use the same theme. Also, when you install a Linux distribution, it’ll start off either all KDE or all GTK, or whatever – but with Windows you’re stuck with a random mix of both right from the start.

        Thankfully, there is a dark theme available – but only for “new” UI things, naturally. So as soon as you randomly stumble into some old non-themed UI, suddenly BRIGHT WHITE!

      • OS NewsUsing Windows after 15 years on Linux – OSnews

        Hint: not well.

    • Audiocasts/Shows

    • Kernel Space

      • Huawei Nova 8 SE 4G grabbing HarmonyOS software update [Ed: They don't talk about it, but it is based on Linux apparently]

        Huawei has pushed a new software update for the Nova 8 SE 4G that comes with HarmonyOS 2.0 version in China. The new information reveals that the latest update brings March 2022 HarmonyOS security improvements for better system security.

      • GSM ArenaHarmonyOS 3.0 coming in September, first betas to roll out next month [Ed: Apparently Linux based as it's Android/AOSP]

        The third major version of Huawei’s Harmony OS was announced in October of last year with the first Developer Preview coming out a few weeks later. However, development seems to have hit a bit of a snag, so the rollout schedule had to be pushed back.

      • 9to5GoogleOnePlus 10 Pro kernel source code publicly released – 9to5Google

        After a delayed release, the OnePlus 10 Pro is now available in global markets for eager fans to snap up. For third-party ROM developers and tinkerers, we have good news with the release of the OnePlus 10 Pro kernel source code — which is now publicly available.

      • XDAOnePlus 10 Pro kernel source code is now available

        OnePlus finally took the wraps off the global variant of the OnePlus 10 Pro, but the company slacked off a bit and did not give us the kernel sources right after the launch. If you have already managed to score one for yourself for the sake of tinkering, we have good news for you. To facilitate custom development, the Chinese OEM has now released the kernel sources for the OnePlus 10 Pro.

      • Brendan GreggNetflix End of Series 1 [Ed: Brendan Gregg quits Netflix]

        Last time I quit a job, I wanted to share publicly the reasons why I left, but I ultimately did not. I’ve since been asked many times why I resigned that job (not unlike The Prisoner) along with much speculation (none true).

    • Applications

      • Linux Links6 Best Free and Open Source GUI Emoji Pickers

        The internet has rapidly transformed the way we communicate. Since body language and verbal tone are not conveyed in text messages or e-mails, we’ve developed alternate ways to convey nuanced meaning. The most prominent change to our online style has been the addition of two new-age hieroglyphic languages: emoticons and emoji.

        Emoji originated from the smiley, which first evolved into emoticons, followed by emoji and stickers in recent years. Smiley first appeared in the 1960s and is regarded as the first expression symbols. Smiley is a yellow face with two dots for eyes and a wide grin which is printed on buttons, brooches, and t-shirts.

        An emoji is a pictogram, logogram, ideogram or smiley embedded in text and used in electronic messages and web pages. The main function of emoji is to provide emotional cues otherwise missing from typed conversation.

        Here’s our verdict captured in a legendary LinuxLinks chart. We only feature open source software here.

    • Instructionals/Technical

      • CitizixHow to install and set up Kafdrop – Kafka Web UI

        Kafdrop is a web UI for viewing Kafka topics and browsing consumer groups. The tool displays information such as brokers, topics, partitions, consumers, and lets you view messages.

        Apache Kafka is an open-source platform. Kafka was originally developed by Linkedin and was later incubated as the Apache Project. It can process over 1 million messages per second.

        Kafka is an amazing platform for processing a huge number of messages very quickly. However, Kafka has one disadvantage that it does not come with an inbuilt User Interface where the users can see the information related to Kafka.

      • H2S Media4 ways to Install Remmina on Ubuntu 22.04 LTS Jammy JellyFish

        Remmina is a well-documented remote desktop control software, here we see the command to install Remmina on Ubuntu 22.04 LTS Jammy JellyFish using the terminal.

      • H2S MediaHow to install MATLAB in Ubuntu 22.04

        Use MATLAB on Ubuntu 22.04, a technical and scientific software from Mathworks for powerful numerical calculations and professional visualization of data and results. It is a platform-independent software for solving mathematical problems and graphically displaying the results. The software package is best-known for tools for calculating and simulating complex mathematical and technical problems.

        The name MATLAB has derived from the terms MATrix LABoratory. It is software from The MathWorks for solving mathematical problems. The commercial software can be used platform-independently. Results of the numerical calculations can be displayed graphically. MATLAB’s calculations are based on matrices.

      • What is Ansible – The Ultimate Guide

        Ansible is the most widely used DevOps tool for managing changes across your cloud or data center infrastructure. In this article, you will get an overview of how Ansible works and how you can get started with it.

      • Make Use OfHow to Type Faster and Increase Your Productivity Using Espanso

        If you’re a writer, coder, or you respond to lots of emails in a day, a text expander is an indispensable program on your computer. It’s essentially a productivity tool that expands or replaces your typed text with its longer equivalent to help you type faster.

        Generally speaking, you’ll find text expansion tools of all kinds. However, Espanso proves to be one of the most promising ones of the lot, since it’s free to use and offers plenty of customization options.

      • Linux CapableHow to Install MariaDB 10.5 on Ubuntu 20.04 LTS

        MariaDB is one of the most popular open-source databases next to its originator MySQL. The original creators of MySQL developed MariaDB in response to fears that MySQL would suddenly become a paid service due to Oracle acquiring it in 2010. With its history of doing similar tactics, the developers behind MariaDB have promised to keep it open source and free from such fears as what has happened to MySQL.

        MariaDB has become just as popular as MySQL with developers, with advanced clustering with Galera Cluster 4, faster cache/indexes, storage engines, and features/extensions that you won’t find in MySQL.

        In the following tutorial, you will learn how to install MariaDB 10.5 on Ubuntu 20.04 LTS Focal Fossa using the official repository from MariaDB to give you the latest supported version of the LTS release of the database software using the command line terminal.

      • Linux CapableHow to Install Avidemux on Ubuntu 22.04 LTS

        Avidemux is a free and open-source software application for non-linear video editing and transcoding multimedia files. It is trendy as it allows a user to cut, join, split, rotate videos, adds filters, and support many file types, including AVI, DVD compatible MPEG files, MP4, and ASF, using a variety of codecs.

        In the following tutorial, you will learn how to Install the latest Avidemux on Ubuntu 22.04 LTS Jammy Jellyfish using the command line terminal and the LaunchPAD PPA by the XtraDEB team to install the latest possible version.

      • Fix Cannot Find A Valid Baseurl For Repo Base/7/x86_64 Error | Itsubuntu.com

        How To Fix “ how to fix “cannot find a valid baseurl for repo” error in CentOS

        This is the tutorial to fix “cannot find a valid baseurl for repo” error in CentOS. If you are going through the error ‘ how to fix “cannot find a valid baseurl for repo” error in CentOS Linux distribution’ while using YUM package manager then we have a solution for you.

    • Games

      • Android PoliceSteam on Chrome OS explainer dashes hopes of easy modding

        One of the most interesting things about covering Google’s technologies and products is how communicative the company can be when explaining how things work. It recently kicked off the first part of a planned series illuminating how it finagled Steam on Chromebooks. In this first high-level overview of the technologies involved, one key fact has already been detailed: Modifying games (even just to tweak configuration files) might be pretty hard, if not impossible.

      • Protocol‘You can’t really gamify compassion’: Jenova Chen on building ethical free-to-play games [Ed: If it's not free as in free software, can it still be ethical rather than monopoly?]

        Hello, and welcome to Protocol Entertainment, your guide to the business of the gaming and media industries. This Tuesday, we’re chatting with Thatgamecompany co-founder Jenova Chen about ethical game design on mobile, as well as taking a closer look at Epic’s new $2 billion funding round and its metaverse ambitions with The Lego Group.

      • Teardown: Valve Steam Deck

        The Steam Deck is not the first attempt at a handheld for PC gaming, but it does come with a pedigree and a market-friendly price.

        Since 1996, Valve has evolved from game developer (the Half-Life franchise) into being a major online market for PC games, into offering an open-hardware platform (Steam Engine) and now, fully into the console market after a flirtation with peripherals.

    • Desktop Environments/WMs

    • Distributions

      • New Releases

        • Barry KaulerEasyOS 3.4.6 released

          Easy 3.4.6 has focused on refining the user interface; in particular, there is a return of an old theme, “EasyBlue”. Some bugs fixed, otherwise mostly the same as 3.4.5, except Firefox bumped to 99.0.1 and new ‘awf’ package.

      • BSD

        • The Register UKOpenSSH takes aim at ‘capture now, decrypt later’ quantum attacks

          OpenSSH 9 is here, with updates aimed at dealing with cryptographically challenging quantum computers.

          The popular open-source SSH implementation aims to provide secure communication in a potentially unsecure network environments. While version 9 is ostensibly focused on bug-fixing, there are some substantial changes lurking within that could catch the unwary, most notably, the switch from the legacy SCP/RCP protocol to SFTP by default.

          The OpenSSH group warned the change was coming earlier this year, with a deprecation notice in February’s version 8.9 release. Experimental support for transfers using the SFTP protocol as a replacement for the SCP/RCP protocol turned up in version 8.7 in August 2021 with the warning: “It is intended for SFTP to become the default transfer mode in the near future.”

          The future, it appears, has arrived (at least as far as OpenSSH is concerned) with the defaulting to SFTP, which introduces some potential incompatibilities: gone is the requirement for the “finicky and brittle quoting” used by the legacy SCP/RCP “and attempts to use it may cause transfers to fail,” according to the OpenSSH group, which added there was no intention to introduce bug-compatibility for legacy SCP/RCP when using the SFTP protocol (although the -O flag can be used to force scp to use the legacy protocol.)

        • IT WireiTWire – New OpenSSH version uses stronger key-exchange mechanism by default

          A new version of OpenSSH, an implementation of the secure shell protocol, includes a switch to a new key-exchange mechanism by default, among other changes.

          An advisory from developer Damien Miller said the new release, OpenSSH 9.0, switched scp, the secure copy tool which is part of the app, from using the legacy scp/rcp protocol to using the SFTP protocol by default.

          OpenSSH is run by the OpenBSD project which is headed by Theo de Raadt. SSH or secure shell is a program used to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another.

          It provides strong authentication and secure communications over insecure channels. OpenSSH is a free implementation of the program.

      • IBM/Red Hat/Fedora

        • Red Hat Summit to address the open hybrid cloud ecosystem

          Recently, Red Hat’s president and CEO, Paul Cormier spoke at length about the CIO’s paradox. On one hand, they’re expected to keep track of the latest trends in technology, but it’s another matter when it comes to actually evaluating and implementing technologies for their organisations.

      • Debian Family

        • Computer WeeklyRaspberry Pi Foundation ditches default username policy

          The Raspberry Pi Foundation, the organisation behind the wildly popular eponymous computing platform, is rolling out a small but impactful security policy update, eliminating default usernames to cut off a potential avenue for malicious actors to conduct brute-force cyber attacks.

          A brute-force attack, simply put, is a trial-and-error method of cyber attack by which a malicious actor tries all possible username and password combinations to access a system – usually using some kind of automated tool – until they hit on the right one.

        • Petter Reinholdtsen: Playing and encoding AV1 in Debian Bullseye

          Inspired by the recent news of AV1 hardware encoding support from Intel, I decided to look into the state of AV1 on Linux today. AV1 is a free and open standard as defined by Digistan without any royalty payment requirement, unlike its much used competitor encoding H.264. While looking, I came across an 5 year old question on askubuntu.com which in turn inspired me to check out how things are in Debian Stable regarding AV1. The test file listed in the question (askubuntu_test_aom.mp4) did not exist any more, so I tracked down a different set of test files on av1.webmfiles.org to test them with the various video tools I had installed on my machine.

      • Canonical/Ubuntu Family

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • PR NewswireStamus Networks Announces Availability of SELKS 7

        SELKS is a Stamus Networks contribution to the open-source community and is released, at no cost, under the GNU GPLv3 license as ISO images, Docker package, or as source code.

      • InfoQKubernetes Crosses the Chasm, and Other Lessons from the 2021 CNCF Survey
      • PR NewswireOpenMetal Joins the Open Infrastructure Foundation

        Open source software and community advocate, OpenMetal, is increasing its commitment to open source, building upon an Open Infrastructure Foundation (OIF) membership.

      • PR WebVuFind® Joins the Open Library Foundation

        By joining the Open Library Foundation, VuFind will benefit from infrastructure support including legal, operational, administrative, and financial resources. The foundation is also able to ensure that VuFind is owned by the VuFind community and is able to expand beyond the interests of any single entity.

      • Market ScreenerJD com : Explore Academy’s Qiling Framework Accepted in GSoC 2022

        The Qiling framework developed by the Shepherd Lab of JD Explore Academy has been accepted in GSoC (Google Summer of Code) 2022 after recommendation by The Honeynet Project.

        Starting from 2005, GSoC has been devoted to helping contributors find open source projects. More than 18,000 students from 112 countries, who get help from 17,000 mentors of 746 open source organizations, have written more than 40M lines of code in fields they love.

      • I ProgrammerIdentifying Europe’s Critical Open Source Software – FOSSEPS

        FOSSEPS stands for Free and Open Source Solutions for European Public Services and is an initative by the EU Commission to identify the most critical open source software used by European Public Services.

        Open Source Software powers everything, from modern servers, to IoT, to the desktops at work and is at the heart of the European Union systems too. It is so important that the European Commission’s Open Source Programme Office has decided to offer bug bounties on popular open source software as described in “European Union Will Pay For Finding Bugs In Open Source Software”.

        The issue with the bug bounty was which apps were going to be labeled as critical or important in order to allocate resources to them. This is the same problem faced by the Open Source Security Foundation in its effort to make open source software sustainable and for which the Criticality Score Project was set up. This has already led to critical OSS projects being identified, most recently with the publication of “Census II of Free and Open Source Software – Application Libraries”, as we reported last month.

      • FSF

        • GNU Projects

          • LWNGNU coreutils 9.1 released

            Version 9.1 of the GNU coreutils package has been released with lots of small tweaks and improvements. “ls no longer colors files with capabilities by default, as file-based capabilities are very rarely used, and lookup increases processing per file by about 30%. It’s best to use getcap [-r] to identify files with capabilities.”

        • Licensing/Legal

          • The HinduUnderstanding software copyright and licences

            A copyright gives a creator the legal right to own, distribute and profit from his or her creative work. Software, like any other technology has all shades of licences facilitating its use. On one end of the spectrum, there is proprietary software which is to be purchased as a one-time transaction or as yearly licences. A popular example is Microsoft Windows which is purchased along with the computer or Microsoft Office which typically has a yearly licence that has to be renewed upon payment.

            On the other hand, there are different kinds of software licences that allow free use of software. There is the Creative Commons licence (CC) which is public domain: any software or work that is in CC can be used and distributed free of cost. For example, Wikipedia is under CC and hence its contents can be used freely with the condition that attribution is made to Wikipedia (this is called ‘Creative Commons – Attribution-ShareAlike).

      • Programming/Development

  • Leftovers

    • ‘The Eagle Has Landed’ author Jack Higgins dead at 92
    • Digital PS3 Games Mysteriously Expiring – PlayStation LifeStyle

      As users are scrambling to make sense of what’s happening and why, Kotaku has found one plausible explanation: Unix epoch, which is an arbitrary date picked by early Unix engineers. A bug on the PSN backend is likely setting license expiration dates to December 31, 1969, making the games unplayable after midnight UTC on January 1, 1970.

    • Genre Awareness

      One thing I really like about The Walking Dead is that they never refer to zombie media; they instead act as if the phenomenon is wholly new. That’s an approach I’d love to see more of. The opposite is so weird in books like Kick-Ass where they are constantly reading comics. I’m reading a Stephen King book now where one of the characters is saying that The Shining isn’t a good movie.

      Sure, the self-referentiality is weird, but what bugs me more is the common trope of “This story is real, unlike all these other stories I’m gonna name now”. Not into it. Like, a Marvel hero and someone in the comic says “Oh, like Batman from the comics?“ and they reply “But unlike him I’m real” and I’m like… you guys are on the same level, quit it with this faux-Calvino nonsense, you’re only devaluing yourself by calling attention to the frame, the page, the ink.

    • Science

    • Lousy Hardware

      • Anthony Buick in Gurnee says Batteries Plus sold me a junk car key. Nothing wrong with the car. – BaronHK’s Rants

        Anthony Buick in Gurnee says Batteries Plus sold me a junk car key. Nothing wrong with the car.

        Well, that settles it.

        They’re back there cutting a real Buick key instead of this cheap Chinese nonsense that’s going on at Batteries Plus.

        Bhushan Chouhan at Batteries Plus brought the chargeback I filed on himself for selling crap and then just refusing to give me a refund and taking his garbage back.

        I’m sure the Buick dealership has something a little more sophisticated to work on my vehicle computer with than a ~$200ish cheap Windows 10 laptop with some aftermarket programming software that’s probably based on a reverse understanding of real Buick software. If that makes you nervous like it made me nervous, it should. Engine computers can be thousands of dollars if they get damaged in parts and labor, and some guy plugging the most malware-riddled PC operating system on the planet into a sophisticated machine is frightening in and of itself.

      • Vehicle security systems almost invariably annoy the owner of a car. – BaronHK’s Rants

        Yesterday, I wrote about my experience with Batteries Plus Bulbs in Gurnee, Illinois.

        The guy who runs that store is a real jerk and managed to produce a spare car key that triggers the vehicle anti-theft system and won’t start the car.

        He started it a couple of times while I was there and his laptop was plugged into the Buick, so I thought nothing of it for a few days…..good that I tried using the spare keys yesterday or I may not have known there was any trouble with them until after it was too late to file a chargeback after the owner of the store become increasingly unreasonable and then threatened to call the cops if I didn’t stay out of his store because I asked for a refund.

        While he was poking around yesterday, he managed to deauthorize my remote and now that won’t work either, so I get to call Buick today and just pay them whatever they want so that I have a spare set of keys.

        On the 2003 Impala, if you need to program a remote, you don’t need some asshole to do it for $100, and if you need a key you just use the $2 machine at Walmart and you have a car key…..or if you don’t, then at least you’re only out $2 and not $200 (key, remote, programming), and trying to get an intransigent asshole to stand behind his work.

        You can actually get a remote for the Impala for about $10. It’s all from China so you don’t need anything really special.


        And as cars get more expensive to buy new, and fewer and fewer of the old ones still run right because Boomers don’t take care of any of their stuff, people are going to find themselves painted into a corner because of all of the computer-controlled crap on a modern car.

        I’m writing this while sitting here on my phone at the Buick dealership waiting for new keys. On the way down, the car started squealing at me, which is probably a drive pulley, so I’m waiting to hear about them from that too. It doesn’t help that that crook at Batteries Plus essentially tried ripping me off of over $200 and I’m waiting on the credit card people to process a dispute.

        The upside with the dispute is that it pokes crooked merchants in the eye whether you win or lose.

    • Health/Nutrition/Agriculture

      • NatureExperimental evidence challenges the presumed defensive function of a “slow toxin” in cycads

        \(\beta\)-methylamino-L-alanine (BMAA) is a neurotoxic non-protein amino acid found in the tissues of cycad plants. The demonstrated toxicity of BMAA to diverse organisms, including humans, is widely assumed to imply a defensive function of BMAA against herbivores; however, this hypothesis has not previously been tested in an ecologically relevant system. We investigated the effects of dietary BMAA, across a range of dosages matching and exceeding levels typically present in cycad leaves, on the feeding preferences and performance of a generalist lepidopteran herbivore (Spodoptera littoralis).We observed no effects of dietary BMAA on the survival or development of S. littoralis larvae, nor any larval preference between BMAA-laced and control diets. These findings suggest that BMAA in cycad tissues does not deter feeding by insect herbivores, raising questions about other potential physiological or ecological functions of this compound.

      • Adherence to Oral Targeted Anti-Lung Cancer Therapy: A Qualitative Interview Study
    • Integrity/Availability

      • Proprietary

        • Paul ThurrottReport: More PCs Running Windows XP, 7, and 8 Than Windows 11 [Ed: Microsoft boosters are alarmed by the failure that is Vista 11]
        • Pseudo-Open Source

          • Openwashing

            • NAB 2022: TAG Integrates Redis Within Realtime Media Performance Platform [Ed: And why a dash in "open-source"? Because it's misleading...]

              Redis serves as a pipeline that connects the levels of TAG’s platform, a 100% IP 100% software open-source solution that monitors, aggregates, manages and utilizes data-driven viewer analytics. The foundation of the RMP is TAG’s Multi-Channel Monitoring (MCM) system, that monitors every type of signal from live production through OTT delivery, providing deep monitoring for critical analysis into signal health.

            • The New StackElon Musk, Twitter, and the Weaponization of Open Source

              When we talk about “open sourcing” something, that’s a big part of it, right? We want to be able to run it ourselves. We want to be able to take the code and adapt it and tweak it to our needs, on our own servers. We want to collectively help out, fixing bugs and contributing to that codebase.

        • Security

          • ZDNetEnemybot: a new Mirai, Gafgyt hybrid botnet joins the scene | ZDNet

            A new botnet is targeting routers, Internet of Things (IoT) devices, and an array of server architectures.

          • The Register UKSpring4Shell under active exploit by Mirai botnet herders • The Register

            There has been a land rush of sorts among threat groups trying to use the vulnerability discovered in the open-source Spring Framework last month, and now researchers at Trend Micro are saying it’s being actively exploited to run the Mirai botnet.

            Mirai is a long-running threat that has been around since 2016 and is used to pull smaller networked and Internet of Things (IoT) devices, such as IP cameras and routers, into a botnet that can then be used in such campaigns as distributed denial-of-service (DDoS) and phishing attacks.

            The Trend Micro researchers wrote in a post that they observed the bad actors weaponizing and run Mirai malware on vulnerable servers in the Singapore region via the Spring4Shell vulnerability, tracked as CVE-2022-22965.

          • Best Ethical Hacking Tools & Software 2022 | IT Business Edge

            Hacking is the use of any tools or technology to obtain unauthorized access to or circumvent security measures of a computer system or network.

            An ethical hacker is an independent security tester who checks computer systems, networks, and programs, looking for potential vulnerabilities that an attacker could exploit. Ethical hackers use the same tools and techniques as malicious hackers; however, they do it to improve system security and uphold privacy policies and standards instead of causing damage or stealing information. Examples include penetration testing and vulnerability scanning.

          • Silcon RepublicCareer progression often lies ‘beyond your comfort zone’

            Throughout this week, we’ve heard from a variety of infosec professionals about what first drew them to security, from PwC’s Katherine Cancelado starting to learn RedHat and Debian Linux at age 12 to Nitro’s David Lenoe getting to grips with new tech during a third-party security review.

            Elly Stritch studied business information systems at University College Cork and it was here that her interest in cybersecurity began.

          • Silcon Republic‘Not everything in cybersecurity is hacking’

            Katherine Cancelado’s interest in cybersecurity was sparked when she was about 12 years old and she started learning RedHat and Debian Linux. This led her to a variety of tech communities where she learned more and shared her knowledge, and started engaging with cybersecurity without even realising it.

            “I learned so much about how to create secure and optimal configurations for different systems and applications, and this was what caused me to move towards cybersecurity as a way to make things better and not to simply make things work,” she told SiliconRepublic.com.

          • The Wall Street JournalUkraine Thwarts Cyberattack on Electric Grid, Officials Say

            Customized malware targeted not only Microsoft Corp. Windows-based systems, but also those running on common Unix platforms Linux or Solaris, Mr. Boutin said.

          • PS5 Firmware 5.02 & PS4 Firmware 9.51 released, in context of FreeBSD heap buffer overflow vulnerability. Do not update – Wololo.net

            PlayStation pushed PS5 Firmware 22.01-05.02.00 (PS5 5.02) and PS4 Firmware 9.51 yesterday. Those are your typical “improves system performance” updates, but as always, we (and several prominent members of the hacking scene) recommend you do not update your console, if you can, and if you’re expecting to Jailbreak it eventually.

          • The RecordExperts warn of concerns around Microsoft RPC bug

            Cybersecurity experts and researchers have raised alarms around a vulnerability disclosed by Microsoft Tuesday concerning Windows hosts running the Remote Procedure Call Runtime (RPC).

          • eSecurity PlanetCritical Infrastructure, ICS/SCADA Systems Under Attack by Advanced Threat Groups

            Such lateral movements are often used to escalate privileges, for example, in Active Directory.

          • Hacker NewsIs API Security on Your Radar?

            Cybercriminals are targeting APIs more aggressively than ever before, and businesses must take a proactive approach to API security to combat this new aggression.

          • CNET6 Browser Extensions to Protect You From Cyberattacks – CNET

            The first three browser extensions in this list — HTTPS Everywhere, Privacy Badger and uBlock Origin — have enjoyed some long-standing recommendations from CNET reviewers.

            The HTTPS Everywhere extension is available through a partnership between the Electronic Frontier Foundation and the TOR Project. Many websites use secure connections already, but some don’t, leaving their visitors vulnerable to threats, like having malware delivered to their device. If you’re visiting an unprotected website, HTTPS Everywhere checks to see if it offers a secure connection. If one is available, the add-on forces the site to use that connection.

          • The Register UKBackup frustration brought this CTO to forefront of ransomware protection [Ed: Ransomware is primarily a Microsoft Windows problem]

            INTERVIEW As CTO of The New York Times two decades ago, Andres Rodriguez became frustrated with the time-consuming and unreliable process of backing up massive amounts of data that was only tested when it failed.

          • IT WebArcserve enhances key ransomware defence solution
          • Pentera Labs finds new vulnerability in vCenter VMWare impacting over 500K appliances [Ed: While VMWare run viciously anti-Linux PR campaigns its own proprietary software was being breached without patches available]

            New patch issued by VMware for Information Disclosure vulnerability CVE-2022-22948 discovered by Pentera Labs’ Yuval Lazar, Senior Security Researcher.

          • The Register UKMicrosoft’s huge Patch Tuesday includes fix for bug under attack [Ed: Not just by NSA anymore?]

            Microsoft’s massive April Patch Tuesday includes one bug that has already been exploited in the wild and a second that has been publicly disclosed.

            In total, the Redmond giant patched over 100 bugs today, including 10 critical remote code execution (RCE) vulnerabilities.

          • Privacy/Surveillance

            • CPO MagFBI Investing Heavily in Social Media Tracking: “Predictive” Surveillance Software Raises Civil Liberties Concerns – CPO Magazine

              A recent contract between the Federal Bureau of Investigation (FBI) and the Babel X software firm is raising some privacy and mass surveillance concerns. The software is used for keyword-based social media tracking and advertises a “predictive analytics” feature, leading to natural questions about its potential use for profiling and the monitoring of Americans not under suspicion or investigation of a crime.

            • ProtocolTop House lawmakers want ID.me to turn over government business records [Ed: Microsoft does worse surveillance and even commits incredible crimes, which some whistleblowers report; why does the US government let Microsoft get away with it? Bribes, infiltration, and top-level corruption?]

              Two top Democratic House lawmakers want ID.me to produce extensive records about its government business and accuracy following outrage about the IRS’ use of the company’s facial-recognition systems.

              Rep. Carolyn Maloney, who chairs the Oversight Committee, issued the extensive requests in a letter with Rep. Jim Clyburn, who chairs a subcommittee on COVID-19 and is the No. 3 Democrat in the House. The letter said the two lawmakers’ panels had “serious concerns about the efficacy, privacy, and security of ID.me’s technology … being used to verify the identities of millions of Americans seeking to access essential government services.”

            • TribGrowth in surveillance technology pits law enforcement against privacy concerns | TribLIVE.com

              When Greensburg police charged two men with a downtown shooting outside The Rialto bar, in which a bystander was wounded in late January, video footage helped investigators identify one of the suspects.

              “Without the surveillance video, that may not have been the outcome,” police Chief Shawn Denning said. “With the surveillance cameras outside the courthouse and The Rialto, we were able to get that whole shooting on video.”

              Greensburg doesn’t have a dedicated system of surveillance cameras, but the Westmoreland County Housing Authority recently provided the city access to cameras at Eastmont Estates apartments.

              “There are several high-quality cameras there,” Denning said. “We did have a (previous) shooting up there, so those cameras would have been extremely beneficial for us to have.

            • ProtocolFight for the Future urges Zoom to ditch controversial emotion AI [Ed: "HEY HI" as euphemism for surveillance]

              The advocacy group wants Zoom to halt its consideration of controversial “emotion AI” technology in its services, which was first reported by Protocol.

    • Defence/Aggression

      • New York TimesOpinion | Free Advice for Putin: ‘Make Peace, You Fool’
      • foss – vanitasvitae’s blog: Peace at any cost?

        Peace is universally a good thing. War on the other hand is universally bad.

        At least that was my idealistic view for my entire life. For that reason I was under the impression, that being part of the peace-movement was obvious. Of course I am for peace and against war!

        Therefore it was shocking to me that today I did not feel comfortable attending the “Ostermarsch” in Münster. The Ostermarsch is a traditional peace-protest all across Germany. Many people protest for peace and against war.

        But this time it was different. A woman handed me a paper on which some party was demanding immediate stop of weapon deliveries to the Ukraine. The paper also called for and end of the sanctions against Russia and the acknowledgement of Luhansk, Donezk and the Krim regions as independent states.

    • Finance

      • The Register UKWiki community votes to stop accepting crypto donations • The Register

        The wiki community held a vote as to whether the Wikimedia Foundation should continue to accept cryptocurrency donations, the result of which was a resounding “no”.

        The proposal was made by Wikipedia administrator, checkuser and oversighter GorillaWarfare based on three points: it could be seen as an endorsement of cryptocurrency by the organization; the tech is not environmentally sustainable; and, last of all, accepting crypto could damage the reputation of the foundation.

    • AstroTurf/Lobbying/Politics

      • Free speech, vs itself

        Paludan isn’t just burning some paper. He is advocating that every one whose parents were born outside of a country that neighbors Denmark should be forcefully deported. (That would include me and many of my friends.)

        “We should consider incitement to intolerance and persecution as criminal”, Popper says. Maybe there’s something to that.

        When Rushdie was being persecuted, people rightfully recognized that the death decrees issued on him was not protected speech. So obviously there are speech acts that aren’t tolerated. But as soon as it’s Rasmus Paludan or Flemming Rose, it’s “just go ahead, boys, this is what a democracy is all about”. I’m not onboard with that.

    • Civil Rights/Policing

    • Internet/Gemini

      • DataCenter DynamicsUS Treasury exempts Internet communication providers from Russia sanctions

        The US Treasury has exempted the provision of Internet communication services from US sanctions against Russia.

        The move was welcomed by human rights and open access groups.

      • Re: Stepping away from Gemini

        Atom feeds are a good analogy. I currently read most of my favorite writers (like the wonderful Web3 is going great) through Atom, or through epub, but that doesn’t mean that I should’ve put my Atom feed on hold back when I went through a patch of not reading Atom as much.

        Gemini is just another format and I might as well keep it up. I’m lucky, since I’ve set up my system so that I can easily make gem-only posts (like this one♥), web-only posts, and posts that are on both.

        Now, this “it’a just another format” view is sort of a vindication of my perspective that Gemini didn’t simplify the web, it just added another protocol and format on top of the already huge pile of specs; it made the web more complex, not less. Drew concedes (for now) that he still uses https.

      • Stepping away from Gemini

        I’m going to wind down my gemlog. I’m not going to take it offline, but I am going to stop writing content for it.

        I have enjoyed writing on my gemlog, especially about things which aren’t necessarily a good fit for my HTTP blog. I definitely got over the idea of dual-publishing; I prefer to keep the two mediums mostly separate now. Things like short stories, anime reviews, and other off-color content have been a good fit for my Gemini posts. It’s nice to have a space for that, and I will miss it.


        I may return as Gemini continues to grow and a greater variety of content is available to peruse.

      • Thanks for your commitment to Gemini, Drew!

        Thanks Drew for spreading the word, creating magnificient tools, content, and offering hosting! Hope to see you around another day. Cheers!

Links 16/04/2022: Sparky 2022.04 and Tails 5.0 Beta

Posted in News Roundup at 6:52 am by Dr. Roy Schestowitz

  • GNU/Linux

    • LiliputingStar Labs Byte is a Linux mini PC with Ryzen 7 5800U – Liliputing

      Linux PC maker Star Labs is now taking pre-orders for its first mini desktop computer powered by an AMD Ryzen processor.

      The Star Labs Byte is a 4.9″ x 4.4″ x 2″ computer with an AMD Ryzen 7 5800U processor, at least 8GB of RAM and 240GB of storage and plenty of upgrade options. It’s expected to begin shipping in late June, 2022 when the little computer will sell for $793 and up. But folks who pre-order can score a 5% discount that brings the starting price down to $753.

    • Audiocasts/Shows

      • HackadayHackaday Podcast 164: Vintage NASA Soldering, Mouse Bites, ATTiny85 Graphics, And PVC Pontoons

        Join Hackaday Editor-in-Chief Elliot Williams and Managing Editor Tom Nardi as they review the most interesting hacks and stories of the previous week. This time we’ll start things off by talking about the return of in-person events, and go over several major conventions and festivals that you should add to your calendar now. Then we’ll look at a NASA training film from the Space Race, an interesting radio-controlled quirk that Tesla has built into their cars for some reason, a very promising autonomous boat platform, and some high performance visuals generated by an ATtiny85. Stick around to find out what happens with an interplanetary probe looses its ride to space, and why the best new enclosure for your Raspberry Pi 4 might be a surveillance camera.

    • Kernel Space

      • WCCF TechIntel Raptor Lake-P Graphics Driver support being added to Linux 5.19

        Recently, Linux 5.19 kernel received an addition to its varying support for the open-source operating system. One such addition was Raptor Lake-S graphics driver support in the kernel’s PCI ID section. Now, Raptor Lake-P support has been added to version 5.19 too.

      • Monitoring the kernel.org Transparency Log for a year

        Clearly we can do more and improve things.

        I noted in the beginning that git is not a transparency log, sadly the kernel.org transparency log is a git repository. It’s not a true transparency log and trying to prove the that a commit is present on the log needs one to replay the entire log before comparing the state of the main log and the monitor. This isn’t ideal.

        A big improvement would be to move this over to an actual transparency log. Sigstore attempts to be a general purpose transparency log for build artifacts. I did start working on a patch to include git-push certificates in Rekor, their transparency log implementation. But this has stalled because I lack the time and I think it would need a bit of code on the remote end to function properly.

        If you are into OpenSSF projects, the SLSA project lists several requirements to protect a supply chain. A Transparency Log for git-push certificates neatly fits into the B Threat, “Compromise source control platform”. However mitigations like transparency logs are not widely cited as being possible mitigation to this threat. One can speculate why this is the case, but I think the lack of support in Git forges is the main issue.

        Gitlab supports server hooks and I think you could implement a git-push monitor with a bit of manual maintenance. Github does not support this, and I think that is something Github should improve on. Generally these sort of server-side configurations are not very accessible but very much needed. I’d love to have my own

        Another improvement on the monitor would be to look more into the code the Trillian team at Google has been doing. Currently they have written a few concepts for a standardized Witness protocol for different transparency logs, and I think it would be neat to provide the same interface for the kernel.org log. This would make it easier to have standardized clients across different logs to validate entries.

    • Applications

      • TechRepublicPrometheus vs Zabbix | Network Monitoring Tools Comparison

        Prometheus and Zabbix are network service monitoring and alerting tools for devices and systems. These network monitoring solutions provide scalable, reliable monitoring services, but the products differ in technology, tools, integrations and ease of use.


        Zabbix is an enterprise-level open source monitoring solution that can monitor anything from small environments to large, distributed systems. Scalable and accessible, Zabbix can monitor millions of metrics with ease. Zabbix has been around longer than Prometheus and provides broader community documentation and support.

    • Instructionals/Technical

      • How to Switch PHP Version

        I recently discussed a variety of subjects relating the configuration of various web servers and the operation of PHP applications such as WordPress. Web servers, such as OpenLiteSpeed, allow you to change the version using the WebAdmin Console, but if you’re using Apache, here’s how to switch the PHP version on Linux.

      • How to use Google Drive on Linux

        Google Drive is the most popular cloud storage service, offering 15GB of free cloud storage. However, despite being such a popular cloud storage service, there is no official Google Drive client for Linux. There were even rumours that Google was planning to release an official Google Drive client for Linux, but nothing came to fruition.

        Due to the lack of an official Google Drive client for Linux, FOSS developers created outstanding unofficial solutions for managing Google Drive from Linux. In this article, I will not only demonstrate how to use Google Drive on Linux, but I will also cover potential alternatives to Google Drive.

      • ID RootHow To Install Brasero on Ubuntu 20.04 LTS – idroot

        In this tutorial, we will show you how to install Brasero on Ubuntu 20.04 LTS. For those of you who didn’t know, Brasero is a free and open-source lightweight disk-burning application software for Linux. It has some unique features which enable users to create discs easily and quickly, also it serves as a graphical front-end for backend tools like cdrtools, cdrskin, and growisofs.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Brasero Disc Burner on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.

      • Linux CapableHow to Install FrostWire on Ubuntu 22.04 LTS – LinuxCapable

        FrostWire is an open-source BitTorrent client first released in September 2004 that was initially very similar to Lime Wire. Over time, developers added more features, including support for the protocol known as “BitTorrent.” In version 5 of this software, it dropped its Gnutella network integration and became only available through BitTorrent. Another benefit for users that use FrostWire is that it can also act as a Media Player.

      • Linux CapableHow to Install Fotoxx on Ubuntu 22.04 LTS – LinuxCapable
      • Linux Shell TipsHow to Rename MySQL Database Name in Linux

        Renaming/altering the name of a MySQL database was a no-brainer in the past as all it took was a simple command prefix for the database name to be successfully changed. You just needed to execute the command:

      • Linux Shell TipsHow to Get CPU Usage of One Single Process in Linux

        Living in the Linux operating system world gives you the computing power and exposure to achieve computing perfection either as a superuser or a Linux administrator. One aspect of Linux operating system administration and computation that we must all strive to conquer is resource management.

        Resource management in Linux operating systems irrevocably intertwines with process management. When we run/install application packages in a Linux OS environment, resources such as CPU cores for computation and memory are assigned to that running application via system/application processes.

        Therefore, it is often important to know which running process is using which resource and for how long. This article will take a closer look at two Linux commands (ps and top) that are sufficient enough in retrieving the CPU usage per system process either instantaneously or periodically.

      • Linux Shell TipsHow to Get the Number of Processors/Cores in Linux

        It is a no-brainer that the various Linux operating system distributions that provide irreplaceable performance prowess in a development or production environment will lose their performance identity in the absence of processors/cores.

        These processors/cores are hardware entities of a computer system responsible for computing how fast the Linux operating system and its hosted programs complete user/system assigned tasks.

        The evolution/innovation of various computer hardware infrastructures has led to the production of modern CPUs whose processors/cores embrace features like hyper-threading and multiple cores.

      • How to Install LogSeq on Debian 11 Edition Using AppImage

        LogSeq is a gem of an application that is becoming more and more important on Linux. Of course, we can also install it on Debian 11. However, today we will show you how to install LogSeq on Debian 11 using AppImage. It’s easy. Let’s go for it.

      • How to Install Microsoft Powershell on Manjaro Linux [Ed: Better just to migrate to something like Bash]

        Who would have thought that Microsoft is now developing its applications for Linux! Let’s be honest, this was unthinkable a few years ago but fortunately for our system, we have a paradigm shift in large companies towards Linux. That’s why today you will learn how to install Microsoft PowerShell on Manjaro.

      • KlaraImproving Replication Security With OpenZFS Delegation

        Delegation is an OpenZFS feature which allows the system administrator to grant the permission to perform various ZFS operations to unprivileged (read: non-root) users. This sounds more complicated than it really is—in a nutshell, we’re talking about filesystem-like permissions, but applied at the underlying ZFS level.

        There are as many use cases for OpenZFS delegation as there are for the direct filesystem permissions we’re all familiar with—for example, you could allow a user to snapshot their own home directory, but not the home directories of other users.

        But rather than indulge in an academic treatise on every possible use of delegation, we’re going to focus on one in particular: unprivileged ZFS replication between machines.

      • Jeff Geerling2.5 Gigabit homelab upgrade – with a PoE+ WiFi 6 AP

        For the past year, I’ve slowly upgraded parts of my network to 10 Gigabit. But 10 Gigabit switches, NICs, and even cabling is a bit more expensive and sometimes annoying to deal with than the very-cheap 1 Gbps equipment most homelabbers are used to.

        I dipped my toes into the 2.5 Gbps waters once I got a NAS with 2.5G ports—you can use standard USB NICs that cost less than $50, or PCIe cards for even less. And cabling is easier, since 2.5G works fine over Cat5e (which I already have run to most of my house).

      • Completely Switching to RSS Feeds

        Really Simple Syndication – portable, extensible, light on network resources. Also, I’ve blocked the regular HTML+JS sites in my browser – more on that later.

        Currently my newsboat feed is populated with indie sites, blogs, wiki pages, updates to documentation & new software releases, podcasts, YouTube channels, WordPress sites, Telegram Channels, Odysee / LBRY channels, SoundCloud , Bandcamp, Pixelfed, Mastodon & other Fediverse feeds. Unlike most people I don’t use email for newsletters or follow people on social media just for the sake of it, or have notifications in my browser.

      • Troy HuntBreach Disclosure Blow-by-Blow: Here’s Why It’s so Hard

        For many years now, I’ve lamented about how much of my time is spent attempting to disclose data breaches to impacted companies. It’s by far the single most time-consuming activity in processing breaches for Have I Been Pwned (HIBP) and frankly, it’s about the most thankless task I can imagine. Finding contact details is hard. Getting responses is hard. Not having an organisation just automatically assume you’re trying to shake them down for cash is hard. So hard, in fact, I thought I’d record the process end-to-end and share it publicly to help demonstrate just how painful the process is.

      • How to Install Magento 2.4.4 on Debian 11 – LinuxTuto

        Magento is a open source e-commerce platform written in PHP and uses the Zend Framework. It is highly popular ecommerce platform and it is owned and managed by Adobe Inc. The platform is flexible and has a large variety of features to build an online store.

        In this tutorial we will show you how to install the Open Source version of Magento 2.4.4 on Debian 11.

      • Linux Made SimpleHow to install Puzzle Pirates on a Chromebook

        Today we are looking at how to install Puzzle Pirates on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • ID RootHow To Install Adminer on AlmaLinux 8 – idroot

        In this tutorial, we will show you how to install Adminer on AlmaLinux 8. For those of you who didn’t know, Adminer (formerly known as phpMinAdmin) is an open-source and free web-based database management tool. You can use Adminer with MySQL, MariaDB, PostgreSQL, SQLite, MS SQL, Oracle, Elasticsearch, MongoDB, and others. It is simple, lightweight, and designed with strong security and user experience in mind.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Adminer Database Management Tool on an AlmaLinux 8. You can follow the same instructions for Fedora, RHEL, CentOS, and Rocky Linux distributions.

      • How to report someone on Discord | FOSS Linux

        Discord is a substantial way to interact via voice and text chat with your gaming allies for free. While using Discord, you will encounter circumstances whereby someone says something offensive against you. In such instances, you will require to report these people for action to be taken against them.

        The reporting process is not as straightforward as you might think, but in this article guide, we shall show you simple steps to report someone who violates Discord’s code of conduct.

        If you are a regular internet user, it is easy to ram into issues with others, especially when in groups such as Discord. You might receive offensive messages that might force you to take action. Therefore, depending on the message’s severity, you may report the user directly to Discord for disciplinary action against them.

        Alternatively, if you don’t intend to directly report the violator to Discord, you can involve a moderator. A moderator in a Discord server is someone responsible for managing different aspects of the server they operate. Therefore, you can report issues to a moderator to help you get a solution. This is because server moderators are familiar with the users in question and can, in turn, mediate disputes.

      • How to install GNOME on Kali Linux | FOSS Linux

        GNOME is a free and open-source desktop environment. It was first developed and released back in 1999. The name GNOME is an acronym for GNU Network Object Model Environment. The project aimed to build a free desktop environment to be able to develop different applications on it. In this article, we shall see how to install GNOME DE on Kali Linux. But, before heading to that, let’s take a quick look at why GNOME?

      • Make Use OfHow to Install and Set Up Red Hat Enterprise Linux (RHEL)

        RHEL or Red Hat Enterprise Linux is more than just an operating system or server solution. It is rather an ecosystem built for and around enterprises. From conglomerates to critical infrastructures such as banks and government bodies, all rest their faith in the Red Hat system.

        Though it may purely be enterprise-grade software, it doesn’t mean one can’t get a taste of it without belonging to a corporation. You can download a free copy of Red Hat Enterprise Linux with a no-cost subscription and give it a shot today!

        This guide will walk you through how to download and install Red Hat Enterprise Linux.

    • Games

      • FOSSBytesWhat Is Valve Proton? Why Is It Important For Linux?

        Gaming on Linux has taken a massive leap forward over the past few years. With more games being added to the “supported games” list each day, some of which are working better on Linux than on Windows, over 80% of top AAA games in the Steam library are playable.

      • CubicleNateDirextX 11 Steam Games on openSUSE Solved – CubicleNate’s Techpad

        I recently ran into an issue where some Steam games wouldn’t launch and reported the error that the game would not run without DirectX 11. I was befuddled and could not find a solution. I chatted with people, search through forums and didn’t find a solution. I was left with the belief that the hardware was just too old for the newer games and would have to be demoted to the role of “work only”, which was an overall disappointment to the kids and me.

      • Godot EngineGodot Engine – Dev snapshot: Godot 3.5 beta 4

        We’re getting closer to the Godot 3.5 stable release with a fourth beta snapshot! Like with 4.0 alpha builds, we’re trying to release 3.5 beta builds every other week to ensure that new features can be tested, bugs can be reported and bugfixes can be validated.

        This beta 4 is a small update with just 83 commits excluding merges, focusing on fixing bugs to stabilize the current feature set for 3.5 stable.

        The previous beta 3 introduced a brand new Android editor port! In this build, we also built it for 32-bit platforms (armv7 and x86) as there was some demand for it, so you’ll find the APK is a bit heavier.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Second month of KDE SoK 2022 | My very cool KDE blog

          Within SoK 2022 project, I worked on an in-app alert queueing system for KDE Connect iOS

          Since my previous blog post I’ve been working on migrating all alerts to the new system, iOS 14 support and modernization of manual IP input screen.

      • GNOME Desktop/GTK

    • Distributions

      • Void Repo

        I quite like Void! It uses a rolling release model, but the packages tend to track stable releases and lag behind a bit compared to say Arch. There’s a few novel things such as using runit as the init system (instead of systemd) and having a musl libc version which can be used instead of glibc. I’m running glibc at the moment though as I still play video games sometimes.

      • SUSE/OpenSUSE

      • IBM/Red Hat/Fedora

        • Deprecate Legacy BIOS

          Make UEFI a hardware requirement for new Fedora installations on platforms that support it (x86_64). Legacy BIOS support is not removed, but new non-UEFI installation is not supported on those platforms. This is a first step toward eventually removing legacy BIOS support entirely.

        • Linux HandbookHow to Get Red Hat Enterprise Linux for Free?

          In January 2021, Red Hat announced a new — free of cost — subscription that was aimed at individuals wanting to use RHEL.

          Before that, it was necessary to have a paid subscription to use RHEL.

          Now that this has changed, let’s see how to get RHEL for free.

          I’ll also go over how to register and attach your system to an active subscription.

      • Debian Family

        • Sparky 2022.04 – SparkyLinux

          New iso images of Sparky 2022.04 of the (semi-)rolling released.

          Changes between Sparky 2022.03 and 2022.04:
          – fixed an issue of wrong DNS configuration; even the live system of Sparky 2022.03 is configured ok, but the DNS is not set properly after installing the 2022.03 on a hard drive; so works fine now;
          – as usually, all packages upgraded from Debian and Sparky testing repos, as of April 14, 2022;
          – Firefox (latest) has been replaced by Firefox Mozilla Build (‘firefox-sparky’ package).

          No reinstallation is required if you have Sparky rolling installed, simply keep it up to date.

        • Tails 5.0 Beta (1) is Now Available for Testing, Based on Debian 11

          The Tails team announced that the upcoming Tails 5.0 Beta (1) is now available and is ready for testing.

      • Canonical/Ubuntu Family

        • The Call for Participation is now open for Ubuntu 22.04 Release Party – Ubuntu MM

          To celebrate the new release of the popular free and open source GNU/Linux distribution Ubuntu 22.04, we are going to hold a release party. The event will take place on the 1st of May. Due to continued COVID uncertainties, the event will be held in a live virtual format with moderated Q&A.

          The Call for Participation is now open for Ubuntu 22.04 Release Party.

          There will be 2 session types this year, General session and Workshop session. For the general session each speaker will be allowed 30 minutes to speak on the topic and a 15 minutes discussion and Q&A. For the workshop session each speaker will be allowed 45 minutes for the topic and to do hands-on with the participants together and a 15 minutes discussion and Q&A.

        • Don’t wait any longer and try the new Ubuntu 22.04 LTS right now – LinuxStoney

          Many of you will know first-hand that in this case we find one of the most used and popular distros out there. Precisely for all this there are many users who are constantly waiting for the news and improvements that are coming to this open source operating system. This is the case that concerns us right now and that we want to talk about in these lines. Specifically, we want to focus on the possibility of testing the new Ubuntu 22.04 LTS right away if you wish.

          We are telling you all this because the developer of the aforementioned software, Canonical, has already announced the availability of Ubuntu 22.04 LTS in its Beta version . As you can imagine and mainly due to the fact that it is not a final version, it may still contain some bugs. However, this Beta version is very close to the definitive one and will help us to test in the first instance everything that will come to us in Ubuntu 22.04 LTS. Moreover, the company itself urges us to notify you of the possible errors that we find in this release that has just been made public.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Education

        • [Old] What do you understand when you hear the word hack?

          As cringy as those phrases sound like, no one’s to blame, words keep evolving. Hacking can mean many different things, there’s no real definition. A quick Google search returns news articles often associating hacking with ‘security breaching’ or ‘stealing’. I beg to differ hacking isn’t about security breaking; when I use the word hacking or say I’m a hacker ~ I mean hacker as in a hacksmith

          A hacksmith, a toolsmith?, a person who has total control over their tools. A musician is a hacker, your mother who cooks for you is a hacker, a painter, a mechanic, anyone can be a hacker. Someone who does it for the fun of it, not for money or other worldly needs.

      • FSF

        • GNU Projects

          • GNUGNU Core Utilities – News: coreutils-9.1 released [stable] [Savannah]
            This is to announce coreutils-9.1, a stable release.
            See the NEWS below for details.
            Thanks to everyone who has contributed!
            There have been 210 commits by 10 people in the 29 weeks since 9.0
              Bernhard Voelker (3)            Max Filippov (1)
              Bruno Haible (1)                Paul Eggert (136)
              Christian Hesse (1)             Pádraig Brady (64)
              Daniel Knittl-Frank (1)         Rohan Sable (1)
              Jim Meyering (4)                Ville Skyttä (1)
            Pádraig [on behalf of the coreutils maintainers]
            Here is the GNU coreutils home page:
            For a summary of changes and contributors, see:
            or run this command from a git-cloned coreutils directory:
                git shortlog v9.0..v9.1
            To summarize the 259 gnulib-related changes, run these commands
            from a git-cloned coreutils directory:
                git checkout v9.1
                git submodule summary v9.0
            Here are the compressed sources:
              https://ftp.gnu.org/gnu/coreutils/coreutils-9.1.tar.gz   (14MB)
              https://ftp.gnu.org/gnu/coreutils/coreutils-9.1.tar.xz   (5.5MB)
            Here are the GPG detached signatures[*]:
            Use a mirror for higher download bandwidth:
            Here are the SHA1 and SHA256 checksums:
            cab498ddc655fd3c7da553d80436d28bc9b17283  coreutils-9.1.tar.gz
            YFXfkmhgPoI5pcnB1kyyW5qZJTDfZuM7jXimYO2zezU  coreutils-9.1.tar.gz
            aa7bf0be95eef29d98eb5c76d4455698b3b705b3  coreutils-9.1.tar.xz
            YaH0ENeLp+fzelpPUObRMgrKMzdUhKMlXt3xejhYBCM  coreutils-9.1.tar.xz
            The SHA256 checksum is base64 encoded, instead of the
            hexadecimal encoding that most checksum tools default to.
            [*] Use a .sig file to verify that the corresponding file (without the
            .sig suffix) is intact.  First, be sure to download both the .sig file
            and the corresponding tarball.  Then, run a command like this:
              gpg --verify coreutils-9.1.tar.gz.sig
            If that command fails because you don't have the required public key,
            or that public key has expired, try the following commands to update
            or refresh it, and then rerun the 'gpg --verify' command.
              gpg --locate-external-key P@draigBrady.com
              gpg --recv-keys DF6FD971306037D9
              wget -q -O- 'https://savannah.gnu.org/project/release-gpgkeys.php?group=coreutils&download=1' | gpg --import -
            This release was bootstrapped with the following tools:
              Autoconf 2.71
              Automake 1.16.4
              Gnulib v0.1-5194-g58c597d13
              Bison 3.7.4
            * Noteworthy changes in release 9.1 (2022-04-15) [stable]
            ** Bug fixes
              chmod -R no longer exits with error status when encountering symlinks.
              All files would be processed correctly, but the exit status was incorrect.
              [bug introduced in coreutils-9.0]
              If 'cp -Z A B' checks B's status and some other process then removes B,
              cp no longer creates B with a too-generous SELinux security context
              before adjusting it to the correct value.
              [bug introduced in coreutils-8.17]
              'cp --preserve=ownership A B' no longer ignores the umask when creating B.
              Also, 'cp --preserve-xattr A B' is less likely to temporarily chmod u+w B.
              [bug introduced in coreutils-6.7]
              On macOS, 'cp A B' no longer miscopies when A is in an APFS file system
              and B is in some other file system.
              [bug introduced in coreutils-9.0]
              On macOS, fmt no longer corrupts multi-byte characters
              by misdetecting their component bytes as spaces.
              [This bug was present in "the beginning".]
              'id xyz' now uses the name 'xyz' to determine groups, instead of xyz's uid.
              [bug introduced in coreutils-8.22]
              'ls -v' and 'sort -V' no longer mishandle corner cases like "a..a" vs "a.+"
              or lines containing NULs.  Their behavior now matches the documentation
              for file names like ".m4" that consist entirely of an extension,
              and the documentation has been clarified for unusual cases.
              [bug introduced in coreutils-7.0]
              On macOS, 'mv A B' no longer fails with "Operation not supported"
              when A and B are in the same tmpfs file system.
              [bug introduced in coreutils-9.0]
              'mv -T --backup=numbered A B/' no longer miscalculates the backup number
              for B when A is a directory, possibly inflooping.
              [bug introduced in coreutils-6.3]
            ** Changes in behavior
              cat now uses the copy_file_range syscall if available, when doing
              simple copies between regular files.  This may be more efficient, by avoiding
              user space copies, and possibly employing copy offloading or reflinking.
              chown and chroot now warn about usages like "chown root.root f",
              which have the nonstandard and long-obsolete "." separator that
              causes problems on platforms where user names contain ".".
              Applications should use ":" instead of ".".
              cksum no longer allows abbreviated algorithm names,
              so that forward compatibility and robustness is improved.
              date +'%-N' now suppresses excess trailing digits, instead of always
              padding them with zeros to 9 digits.  It uses clock_getres and
              clock_gettime to infer the clock resolution.
              dd conv=fsync now synchronizes output even after a write error,
              and similarly for dd conv=fdatasync.
              dd now counts bytes instead of blocks if a block count ends in "B".
              For example, 'dd count=100KiB' now copies 100 KiB of data, not
              102,400 blocks of data.  The flags count_bytes, skip_bytes and
              seek_bytes are therefore obsolescent and are no longer documented,
              though they still work.
              ls no longer colors files with capabilities by default, as file-based
              capabilties are very rarely used, and lookup increases processing per file by
              about 30%.  It's best to use getcap [-r] to identify files with capabilities.
              ls no longer tries to automount files, reverting to the behavior
              before the statx() call was introduced in coreutils-8.32.
              stat no longer tries to automount files by default, reverting to the
              behavior before the statx() call was introduced in coreutils-8.32.
              Only `stat --cached=never` will continue to automount files.
              timeout --foreground --kill-after=... will now exit with status 137
              if the kill signal was sent, which is consistent with the behavior
              when the --foreground option is not specified.  This allows users to
              distinguish if the command was more forcefully terminated.
            ** New Features
              dd now supports the aliases iseek=N for skip=N, and oseek=N for seek=N,
              like FreeBSD and other operating systems.
              dircolors takes a new --print-ls-colors option to display LS_COLORS
              entries, on separate lines, colored according to the entry color code.
              dircolors will now also match COLORTERM in addition to TERM environment
              variables.  The default config will apply colors with any COLORTERM set.
            ** Improvements
              cp, mv, and install now use openat-like syscalls when copying to a directory.
              This avoids some race conditions and should be more efficient.
              On macOS, cp creates a copy-on-write clone if source and destination
              are regular files on the same APFS file system, the destination does
              not already exist, and cp is preserving mode and timestamps (e.g.,
              'cp -p', 'cp -a').
              The new 'date' option --resolution outputs the timestamp resolution.
              With conv=fdatasync or conv=fsync, dd status=progress now reports
              any extra final progress just before synchronizing output data,
              since synchronizing can take a long time.
              printf now supports printing the numeric value of multi-byte characters.
              sort --debug now diagnoses issues with --field-separator characters
              that conflict with characters possibly used in numbers.
              'tail -f file | filter' now exits on Solaris when filter exits.
              root invoked coreutils, that are built and run in single binary mode,
              now adjust /proc/$pid/cmdline to be more specific to the utility
              being run, rather than using the general "coreutils" binary name.
            ** Build-related
              AIX builds no longer fail because some library functions are not found.
              [bug introduced in coreutils-8.32]
        • Licensing/Legal

          • Computers Are Badunlicensed radio

            I had a strong feeling that I had written a post at some point in the past that touched on license-free radio services and bands. I can’t find it now, so maybe it was all a dream. I wanted to expand on the topic, so here we are either way.

            As a general principle, radio licensing in the United States started out being based on the operator. As an individual or organization, you could obtain a license that entitled you to transmit within certain specifications. You could use whatever equipment you wanted, something that was particularly important since early on most radio equipment was at least semi-custom.

      • Openness/Sharing/Collaboration

        • Open Access/Content

          • Jeff HuangComputer Science Open Data

            This is data I wish I had when I was applying for Ph.D. programs. My students and I have slowly put the source data together over time, so that it’s now a compilation of computer science data:

            professors [source]

            rankings [source]

            best papers [source]

            stipends [source]

            The writing on this page is not advice. Rather, I’ve described on this page what I find most provocative in the data, but you are encourage to review the data yourself. We have spent hundreds of hours of work putting together the source data, subscribe here for updates.

      • Programming/Development

        • Matt RickardAccidentally Turing Complete

          In layman’s terms, a system is Turing-complete if that system can compute as much as any general-purpose computer or computer language. It means that you can model things like conditional logic (if/else), arithmetic, state, transitions, looping and recursion, input and output.

          Most computer languages are intentionally Turing-complete – Java, C++, JavaScript are designed so that they can run arbitrary programs. But some systems are surprisingly Turing complete. Through some feature or escape hatch, they can be made to run any program (of course, there’s no guarantee that they will run them in a reasonable time). Here are some accidentally Turing-complete systems.

        • [Old] Passing runtime data to AWK

          Shell script and AWK are very complementary languages. AWK was designed from its very beginnings at Bell Labs as a pattern-action language for short programs, ideally one or two lines long. It was intended to be used on the Unix shell interactive command line, or in shell scripts. Its feature set filled out some functionality that shell script at the time lacked, and often still lacks, as is the case with floating point numbers; it thereby (indirectly) brings much of the C language’s expressive power to the shell.

        • Daniel LemireFloats have 15-digit accuracy in their normal range

          In programming languages like JavaScript or Python, numbers are typically represented using 64-bit IEEE number types (binary64). For these numbers, we have 15 digits of accuracy. It means that you can pick a 15-digit number, such as 1.23456789012345e100 and it can be represented exactly: there exists a floating-point number that has exactly these 15-most significant digits. In this particular case, it is the number 6355009312518497 * 2280. Having 15-digit of accuracy is excellent: few engineering processes can ever exceed this accuracy.

        • Jaakko KeränenIn the Land of Columns and Characters

          One thing that really interests me in the Lagrange project is exploring the boundaries of native cross-platform programming, because I fundamentally dislike the notion that modern cross-platform apps need to be based on a web browser for things to make sense. With the major desktop and mobile platforms now supported by the app — at least in Beta form — I’m setting sights on more exotic frontiers, and the terminal is a logical next step.

          Porting a GUI toolkit to a text-based terminal isn’t as outlandish as it may initially seem, because the terminal is feature-rich enough to support “pseudo-graphical” rendering: one can hide the blinking cursor, use traditional box-drawing and Unicode characters, and change the foreground and background colors to create the illusion of complicated visual elements. Some terminals can even support mouse pointer input. If the GUI design is not overly complex, rendering it with text characters yields a perfectly usable result with only minor tweaks here and there.

        • PurismHow to be Upstream-First – Purism

          One of the things I’m most proud of about my work on the Librem 5 team is the productive collaborations we have with upstream free software projects, and the contributions to the broader ecosystem we’ve been able to make as a result.

          Over the past four years the Librem 5 software team has worked on dozens of upstream GNOME modules, resulting in many cool new features and improvements for people using GNOME across all devices, not just on mobile. These include helping to modernize apps such as Software, Contacts, Calculator, or Geary, adding and improving Settings panels, and of course the massive leap in consistency and developer experience that came with Libhandy/Libadwaita.

        • Shell/Bash/Zsh/Ksh

          • EarthlyUsing Conditionals in Bash

            Bash (bourne again shell) has been around since 1989 and owes its longevity to its usefulness and flexibility. While it’s the default login and command shell for most Linux distros, its value extends beyond that.

            Bash can be used as a fully-fledged programming language and as a tool to automate repetitive and complex computational tasks. However, as with any other programming language, you need to understand how to manage Bash’s control flow to truly get the most out of it.

  • Leftovers

    • Counter PunchOur Long Memories

      The poet Allen Ginsburg said “poets are damned… but see with the eyes of angels.” I’d argue organizers fighting the rich and powerful are equally damned with the sight of seeing not only what is happening, but where we want to go and being stuck in damage control of these crises.

      Confronting Joe Manchin is a prime example of damage control in these strange and troubling times. While elected by 300,000 West Virginians he wields power over the other 329 million of us. He’s literally shut down the Biden administration’s Build Back Better (BBB) agenda in December.

    • Counter PunchThe Neo-Liberal World Order May Be Over

      But who?  Who is going to not only make the rules, “the liberal world order,” and who is going to “enforce” them?  Sadly, Applebaum doesn’t answer these questions.

      However, Applebaum hints at answers to the questions.  She argues:

    • The NationMusk Oil
    • HackadayJavascript Is Everywhere. Even MSDOS

      Although pundits have joked that Java’s “write once, run everywhere” slogan might be better expressed as “write once, debug everywhere,” a relative of Java — JavaScript — has delivered on both promises better than its namesake. Thanks to its proliferation in browsers, JavaScript is a veritable lingua franca of computer languages which has led to entire applications being written in it using tools like Node.js and Electron, and not just browsers. But what if you are still using MSDOS or Windows 98? We know some of you do, at least on retro machines. Don’t feel left out, the DOjS project has jSH, a JavaScript engine for DOS and related operating systems.

    • The NationJackie Robinson, Pioneer of BDS

      Seventy-five years ago today (April 15), Jackie Robinson became the first African American player in the modern era to play for a Major League Baseball team. Every player and coach today will wear number 42 on their backs in honor of Robinson. Since 2004, “Jackie Robinson Day” has served as an opportunity to celebrate Jackie Robinson’s pathbreaking career and, more recently, his contributions to the American civil rights movement.

    • Technology and Agency

      F(x)tec announced yesterday that mass manufacturing of the Pro1 X has finally begun. The first batch is expected to ship before the end of May.

      One of the key factors in my decision to buy the Pro1 X is its support for Ubuntu Touch and Sailfish OS, as well as LineageOS and stock Android. This excites me greatly: the former two operating systems are much more customizable and give the user greater control over low-level functions than the latter two, and thus operate more like a full Linux desktop computer with a mobile-oriented interface.

      The lack of access to low-level functionality is my biggest problem with smartphones as they exist today. Manufacturers, cellular service providers, app makers, content providers, and “valued business partners” are all interested in pulling as much of my attention (and my money) as they possibly can. To facilitate that goal, they need to have sweeping control over what I do with my device, how, and when, so that I can be steadily guided to their ends. My data is regularly extracted and collated. Apps are locked down to only use proprietary, company-controlled APIs. I cannot control what network requests my apps make.

      Often the mechanisms to enforce this free-flow of corporate traffic is handled by system-level apps. In the name of “security”, I am blocked from gaining root or administrative access to the OS, barring me from being able to remove these subversive apps. The majority of the time, the goal of this pervasive data gathering and backdooring is to serve me advertisements.

    • TediumHow Quotations Took Over the Internet (In a Bad Way)

      You ever read an issue of this newsletter, spot an interesting quote, and think to yourself, “Man, it’d sure be great if there were more quotes in this newsletter?” Odds are, you represent a relative rarity among our readership. But the truth of the matter is, we do a lot with quotes to break up our many issues, but we’ve never delivered a piece that was based around quotes. And because I like setting precedents, here’s a pretty new precedent: a newsletter about quotations. Is the newsletter going to be nothing but quotes? Well, you’ll have to keep reading to find out. Today’s Tedium takes on the quotation.

    • Science

      • Trail Of BitsThe Frozen Heart vulnerability in Girault’s proof of knowledge

        In part 1 of this series, we disclosed critical vulnerabilities that break the soundness of multiple implementations of zero-knowledge proof systems. This class of vulnerability, which we dubbed Frozen Heart, is caused by insecure implementations of the Fiat-Shamir transformation that allow malicious users to forge proofs for random statements. The vulnerability is general and can be applied to any proof system that implements the Fiat-Shamir transformation insecurely. In this post, I will show how to exploit a Frozen Heart vulnerability in Girault’s proof of knowledge.

      • Trail Of BitsCoordinated disclosure of vulnerabilities affecting Girault, Bulletproofs, and PlonK

        Trail of Bits is publicly disclosing critical vulnerabilities that break the soundness of multiple implementations of zero-knowledge proof systems, including PlonK and Bulletproofs. These vulnerabilities are caused by insecure implementations of the Fiat-Shamir transformation that allow malicious users to forge proofs for random statements.

    • Education

      • QuilletteWhy Did Harvard University Go After One of Its Best Black Professors?

        Roland Fryer Jr.’s life is a movie script: A man abandoned by his mom and raised by an alcoholic dad became the youngest black professor to ever secure tenure at Harvard University.

        After ascending to the academic elite, Fryer didn’t resign himself to irrelevant technical puzzles; he put his genius to work investigating the most hotly contested issues of race in America, and translating his findings into concrete programs that dramatically improved the lives of poor black kids. He’s been praised as a genius, winning a MacArthur prize, a Time 100 listing, and the John Bates Clark Medal, awarded to the best under-40 economist in the world.

        And then, all of a sudden, his career was derailed by an opaque sexual-harassment investigation. And no one seemed to want to say anything about it. Until now.

        Drawing on previously unreported documents and interviews with his colleagues and friends, my new documentary makes the argument that Professor Fryer was targeted for ideological reasons. Despite the best efforts of some of the university’s elite, Fryer is still at Harvard, but with severely downgraded status, denied the resources he once had, and marked with a sexual-harassment stigma.

      • RTLLuxembourgish online learning platform to be launched in September

        It is evident that more and more people want to learn the language, with Meisch pointing out that over the past ten years, the number of people enrolling in classes has “practically doubled”. The figure the Minister refers to accounts for both classes offered by the INL and those offered by the Department of Adult Education, the latter of which are available across the country.

    • Hardware

      • HackadayCalculating Pi On The 4004 CPU, Intel’s First Microprocessor

        These days we are blessed with multicore 64-bit monster CPUs that can calculate an entire moon mission’s worth of instructions in the blink of an eye. Once upon a time, though, the state of the art was much less capable; Intel’s first microprocessor, the 4004, was built on a humble 4-bit architecture with limited instructions. [Mark] decided calculating pi on this platform would be a good challenge. 

      • HackadayMulticolor Drawbot Highlights Importance Of Limit Switches

        Plotters and drawing robots are fun projects that let you create art with all the precision and perfection that computer numerical control can deliver. [TUENHIDIY] demonstrates that ably with the Multicolor DrawBot.

      • WhichUKHow to recycle your router

        But routers are WEEE (waste from electrical and electronic equipment) which cannot be disposed of in household waste. Luckily, broadband providers have schemes in place so they can reuse and recycle on your behalf.

    • Health/Nutrition/Agriculture

      • FAIR‘Once the Federal Government Legalizes, Many More States Would Follow Through’

        Janine Jackson interviewed the Enact Group’s Mike Liszewski about marijuana justice for the April 8, 2022, episode of CounterSpin. This is a lightly edited transcript.

      • Counter PunchUnsafe At Any Exposure

        About five months ago, I had an event that resulted in a hospital admission. I’m going to avoid some details, in the interest of brevity.

      • OracThe “spiritual child” of the Great Barrington Declaration goes antivax

        I must admit that I’m getting a little tired of writing about the Great Barrington Declaration (GBD) and its “spiritual child,” the Brownstone Institute, which was founded by Jeffery Tucker, former editorial director of the American Institute for Economic Research (AIER), the right wing think tank that brought together the authors of the GBD together. (I did, after all, just write about the GBD and one of its authors Jay Bhattacharya on Wednesday.) Unfortunately, however, the GBD, its authors, its supporters, and its “spiritual child” just keep providing me such a “target-rich” environment for a blogger that I can’t ignore them, whether they’re parroting antivax tropes like fantasizing about a “Nuremberg 2.0” in which “lockdowners” and supporters of vaccine mandates and other public health interventions will be called to account for their “crimes”; likening public health interventions to slow the spread of COVID-19 to slavery, religion, or a Communist dictatorship; or just plain spreading pure, unadulterated antivax misinformation.

    • Integrity/Availability

      • Proprietary

        • TheGrugqPutin’s cyber blind spot [iophk: Windows TCO]

          So, why hasn’t Putin sent his ransomware hounds swarming over European and American networks in an unbridled orgy of encryption, chaos and crypto? An important first step to answering this question is to understand where ransomware fits within the Russian state’s cyber arsenal. And here is where I think we have collectively misjudged the dynamics of ransomware and the state. I am guilty of this myself. We have overestimated the control, underestimated the greed/financial motivation for the hackers, and we have misconstrued Putin’s understanding of his strategic cyber assets.

        • Security

          • Help Net SecurityPotential threats to uninterruptible power supply (UPS) devices

            In this video for Help Net Security, Chris Westphal, Cybersecurity Evangelist at Ordr, talks about an alert that came out recently from CISA and the Department of Energy (DOE), about potential threats to uninterruptible power supply (UPS) devices that are connected to the internet.

            UPS devices are used to provide emergency power, they’re usually connected to critical infrastructure. They’re basically batteries that provide temporary power when the power goes out and until a generator kicks in to provide longer term temporary power.

          • EFFLet’s Encrypt Wins Levchin Prize For Work On Internet Security

            Let’s Encrypt is part of the effort to encrypt the entire internet as a means of maximizing privacy and security online. In 2013, 28 percent of page loads happened with HTTPS protection; today, at least 80 percent are protected—a significant cultural shift away from the outmoded belief that only banks and password-access sites need encryption.

            EFF participates in the Let’s Encrypt project by maintaining and improving Certbot, the most popular software for getting and installing security certificates, designed to help people who run their own websites. EFF also works alongside Let’s Encrypt staff to develop Boulder, the software that runs Let’s Encrypt.

            “Receiving the Levchin Prize was an honor and great recognition for Let’s Encrypt and the work we’ve done to improve the internet,” said Josh Aas, Executive Director of ISRG and Let’s Encrypt. “We’re grateful to longtime collaborators like EFF for helping us get here!”

          • Privacy/Surveillance

            • EDRI“Privacy Shield 2.0”? – First Reaction by Max Schrems

              There is only a political announcement, not a text that can be analyzed. As far as noyb is informed, such a text does not exist yet and will take a couple of months to be drafted.

            • AxiosTrouble for workers who turn cameras off

              Stunning stat: 92% of executives at medium to large firms think workers who turn cameras off during meetings don’t have long-term futures at the company, according to a new survey from Vyopta, a software company.

    • Defence/Aggression

      • Meduza‘We know what it’s like to be a pariah’: What Russia’s war in Ukraine looks like from Serbia

        Serbia remains one of the few countries that haven’t passed sanctions against Russia. President Alexander Vučić, who voters re-elected on April 3, has been complaining for over a month that the West is trying to force him to disown his “brother nation.” Russia’s not the only thing preventing him from doing this — a large portion of Serbian people themselves support Russia’s war against Ukraine. Meanwhile, since the beginning of March, more and more emigrants have been coming to Serbia from Russia to escape Russia’s collapsing economy and political repression. Journalist Ilya Azar went to Belgrade to speak to Serbs about Russia — and to Russians about Serbia.

      • Counter PunchLetter From Crimea: Solzhenitsyn and Putin

        With the Jewish museum closing, I decided to see if I could find the literary museum now located in the former Moscow apartment of Aleksandr Solzhenitsyn, just off Tverskaya, one of the principal boulevards that leads to the Kremlin and Red Square.

        I thought it might speak to the world of Soviet dissidence in Putin’s Russia.

      • Counter PunchPalestine’s Widening Geography of Resistance: Why Israel Cannot Defeat the Palestinians

        Indeed, on April 9, the Israeli army has stormed the Jenin refugee camp, killing a Palestinian and wounding ten others. However, Israel’s problem is much bigger than Jenin.

        If we examine the events starting with the March 22 stabbing attack in the southern city of Beersheba (Bir Al Saba’) – which resulted in the death of four – and ending with the killing of three Israelis in Tel Aviv – including two army officers – we will reach an obvious conclusion: these attacks must have been, to some extent, coordinated.

      • Counter PunchThe Venezuelan Coup: 20 Years Later
      • Counter PunchThe Astronomical Price of Media Propaganda: An Electorate of Morons

        Hours in front of their screens, hearing former spies compare Putin to Hitler, has had a most unfortunate effect on U.S. viewers: It has rendered millions of Americans incapable of comprehending the most elementary and obvious truths, so that they actually support policies that would lead at once to their fiery incineration. How do we know this would happen? Multiple statements from Moscow over decades that Ukraine joining NATO is an existential threat that would lead to war and that if NATO involved itself in that war, Russians would go out in a global nuclear holocaust, “like martyrs.” But most Americans know nothing of this, which has been carefully kept from them, and so they support their own and indeed the human species’ suicide. It’s doubtful that at any time in human history, the population of a world empire ever degenerated into such a parlous, brainless state. And you don’t have to look far to see who’s to blame: our media in concert with our politicos, in this case, because they hold the white house and congress – primarily the Democrats.

        You doubt our government and media lie to us? Then consider this NBC news story from April 6. It cites President Biden’s proclamation that Russia would use chemical weapons in Ukraine. Later, however, “three U.S. officials told NBC News this week there is no evidence Russia has brought any chemical weapons near Ukraine.” They explained that the U.S. lied “to deter Russia from using banned munitions.” The article then reveals this was one “of a string of examples” of such deceit “as part of an information war against Russia. To keep Russian President Vladimir Putin off balance.” So our media now treat us like kindergarteners, openly disseminating CIA black propaganda. And barely a week later, on April 12, new claims surfaced that Russia deployed chemical weapons, amid musings about how the U.S. should respond. But this time we’re supposed to believe them?

      • TruthOutUkraine and Yemen Wars Highlight US’s Role as Biggest Arms Dealer in the World
      • Democracy NowVijay Prashad on the War in Ukraine & the West’s “Open, Rank Hypocrisy” in Condemning War Crimes

        As the Russian invasion in Ukraine enters its 50th day, we look at the war’s impact around the world with Vijay Prashad, author and director of the Tricontinental: Institute for Social Research. “When food prices go up, the political crisis is almost immediate,” says Prashad, who calls the U.S. pressure on Global South countries to cut off essential imports from Russia after a 30-year globalization campaign a double standard. He says if the U.S. encourages greater global division in order to isolate Russia and China, they will implicitly plunge developing countries “into even greater catastrophe.” He also says the West — led by the Biden administration — is pursuing a “casual weaponization of human rights and the word genocide.”

      • Counter PunchIn History’s Blind Spot Is Where You Can See From

        I wonder, do people still read The Captive Mind, Czeslaw Milosz’s dissection of totalitarianism? I wasn’t sure, when I picked up our yellowed 1981 Vintage Books paperback copy, a reprint from the 1951 original, if the work wasn’t dated. It was, after all, a Cold War indictment of Stalinist or Communist totalitarianism long since gone with glasnost. But dated it is not! For us who must now wonder if it’s possible to free liberal minds from our captivity in neoliberal totalitarian reality, even my crumbling 42-year-old copy fairly sang with relevance.

        After weeks of front page photos in the NY Times of dead bodies and bombed out structures in Ukraine, we learn – not to great surprise – that many lefties view the war in Ukraine as “just” – that is justified. (Ron Jacobs, “Supporting Militarism will not Bring Justice, Only Death” CP, 4/6/22). What hope can be left that people – liberals in particular – will remember there is no good war, that we can stop being led around by the NY Times, Washington Post, NPR, et al, as if our wanting them to report the truth were the same as their doing so? Once again, the media constructs, with invaluable help from Russian atrocities, a plausible evil side such that there can be a good side (for us white hats to be on) to which armaments may be righteously sold. ka-ching ka-ching.

      • Counter PunchAsian Fault Lines Emerge Over Great War Conflict

        From Kazakhstan to Myanmar, from the Solomon Islands to the Kuril Islands, from North Korea to Cambodia, from China to India, Pakistan and Afghanistan, the fault lines are appearing in different parts of Asia.

        To be sure, extra-regional powers had a hand in the failed color revolution recently to overthrow the established government in Kazakhstan, a hotly contested geopolitical landmass bordering China and Russia, both of whom are Washington’s sworn adversaries. Thanks to swift Russian intervention, supported by China, a regime change was averted in Kazakhstan.

      • Counter PunchHead to Your Local Gas Station or Supermarket to End the US Proxy War in Ukraine

        “Harris Tells Americans They Will Have to Pay More for Gas To Punish Russia,” proclaimed the New York Times headline recently.   So spoke no less an authority on economics than the Vice President of the United States.  Harris was on a visit to Poland to reassure a nervous NATO member and to egg on the war in Ukraine at the cost of ever more Ukrainian and Russian lives and higher inflation in the US and the world.

        Inflation, Already Bad, is Worsened by the War in Ukraine and US Sanctions.

      • Counter PunchPutin and the American Far Right

        – George Santayana, 1922

        Russia methodically is destroying a neighboring independent democratic country and is accused of committing mass atrocities, war crimes that include evidence of executions of hundreds of civilians. Yet American far-right radicals applaud Russian President Vladimir Putin. At the same time, the Russians, defeated by stiff Ukrainian resistance in their unsuccessful siege of the capital of Kyiv, switched tactics and are massing armor, aircraft and thousands of infantry for an assault against the eastern Donbas region that has been occupied by pro-Kremlin forces. It borders Russia, which makes resupply easy.

      • Democracy Now“Trigger Points”: Author Mark Follman on How the U.S. Can Prevent More Mass Shootings

        As the United States reels from an epidemic of mass shootings in schools, trains and other public places, we speak with Mark Follman, national affairs editor at Mother Jones, where he covers gun violence. Follman says mass shootings are typically planned over a period of time and follow a “robust trail of behavioral warning signs” that offer opportunities in community-based violence prevention to stop the crime before it happens. His new piece, “Horror on the NYC Subway — and How to Prevent the Next Attack,” draws on insights from his new book, “Trigger Points: Inside the Mission to Stop Mass Shootings in America.”

      • Democracy NowRussia Warns U.S. About Arms Sales to Ukraine as Weapon Makers Reap “Bonanza” from War

        This week the Pentagon met with leading U.S. weapons manufacturers as Russia warned the Biden administration to stop arming Ukraine, claiming it was “adding fuel” to the conflict. This comes as a Russian warship sank in the Black Sea hours after Ukraine claimed to have attacked it with cruise missiles, and as Sweden and Finland say they may join NATO, which would require more weapons spending. We speak with William Hartung, national security and foreign policy expert at the Quincy Institute, author of “Prophets of War: Lockheed Martin and the Making of the Military-Industrial Complex.”

      • Common DreamsPatrick Lyoya’s Family Demands Charges Against Officer Who Killed Him

        The family of Patrick Lyoya, the 26-year-old Black man who was fatally shot by a police officer in Grand Rapids, Michigan on April 4, expressed shock that their son was killed in the United States in a press conference on Thursday as they called for the officer to face prosecution.

        “There can be no justice, but there must be accountability.”

      • Common DreamsOpinion | Zelensky Calls Paying for Russian Oil ‘Blood Money’—the Same Is True for All Oil Purchases

        The BBC reports that Ukraine President Volodymyr Zelensky, during an interview, accused Germany and Hungary of paying “blood money” for Russian petroleum.

      • TruthOutMore Than 150 Palestinians Injured in Israeli Raid on Al Aqsa Mosque
      • HungaryRubles for gas, a shift in MTVA (?), job seeking refugees, pro-Putin demo

        The payment in rubles for Russian gas is not a violation of EU sanctions, government spokesman Zoltán Kovács said on Saturday.

        “The EU so far has no common procurement of gas and oil for European countries. So as we speak, we still go by alongside those contracts we have with Russians regarding gas and oil, and according to those contracts, it is a technical issue, in what currency we have to pay,” Kovács said, in an interview given to CNN.

      • The Gray ZoneUS, EU sacrificing Ukraine to ‘weaken Russia’: fmr. NATO adviser
      • TechdirtMinneapolis Limits No-Knock Warrants As Prosecutors Decide Cop Can’t Be Charged For Killing Amir Locke During A No-Knock Raid

        On February 2, 2022, Minneapolis PD officers executed a no-knock raid on an apartment. Officer Mark Hanneman then summarily executed Amir Locke within seconds of his entry into the apartment.

      • TechdirtCops Lie: Falsifying Traffic Stops Edition

        Cops lie. It’s a statement more factual than statements cops — the people given the biggest benefit of a doubt in “your word against mine” courtroom showdowns — tend to make when testifying or filling out reports.

      • Counter PunchThe Blitzkrieg Failed. What’s Next?

        The outbreak of hostilities was a fatal step that irreversibly changed the situation, but not in the way that the Kremlin expected. It was a gamble that only could have worked if Ukraine had been defeated in 96 hours, which, apparently, they were counting on.  But, Ukraine is no longer the same as it was 8 years ago. There was clearly no plan B. They did not prepare for a prolonged armed struggle in hostile territory.

        Even if the occupation of the neighboring country was successful, it would be impossible to hold on to. In Germany, at the end of World War II, the Allied and Soviet forces had a ratio of approximately 90 soldiers per 1,000 local residents. In the case of Ukraine, the Russians have no more than 4 soldiers per 1,000 local residents. In order to effectively occupy Ukraine, this must be increased at least 20 times! The Russian army does not have such forces.

      • Counter PunchReflections on Ukraine and the Broke-Brain “Left”

        It’s about a racial double standard but it’s also about an imperial single standard whereby the West recognizes “worthy victims” only on the US/Western and pro-US/Western side of the global political and moral divide defined by Washington and the mass consent-manufacturing US war and empire media. Victims (including white Serbians and Russians killed by US/NATO weapons and US-led Western sanctions) of the American Empire and its allies, agents, and clients are officially “unworthy” in dominant Western media-politics culture.

        The United States wants Putin tried for war crimes but exempts its own leaders from indictment for such epic US transgressions as the arch-criminal US-imperialist invasion of Iraq (which killed more than a million Iraqis), the US-led destruction of Libya, thousands of US drone strikes that have killed thousands of innocents (including children) in Muslim nations, and countless barbarian acts of torture conducted by US military and intelligence personnel around the world.

      • Counter PunchClinton’s Revisionism on NATO Expansion

        Bill Clinton was whip smart when it came to domestic politics.  In the run-up to his 1996 campaign for re-election, he determined that the Republican candidate would be Senator Robert Dole (R-KS), who would exploit the fact that in the mid-1990s the Clinton administration was shying away from NATO expansion.  One of the keys to the success of the Democratic Party over the years had been the support of East European ethnic communities in such important states in the mid-West as Illinois, Michigan, Ohio, and Wisconsin.  Various ethnic delegations began arriving in Washington to lobby the Congress and the White House to overlook the opposition to expansion from European experts at the Department of State as well as such influential senators as Sam Nunn (D-GE).  For domestic political reasons, particularly the 1996 election, Clinton decided to ignore this opposition and to satisfy the East European ethnic demands for NATO membership.  In so doing, Clinton moved to expand a Cold War alliance that many believed had outlived its mission.

        Clinton believed that he could appease Moscow by offering the Russians a special consultative voice in NATO.  Six months before the election, Clinton and Russian President Boris Yeltsin signed the Russia-NATO Founding Act on Mutual Relations to share knowledge and intelligence, particularly on military weaponry.  The Founding Act failed to lead to the promised consultation, cooperation, and coordination, let alone joint decision making, and there was increased Russian opposition to Yeltsin himself.  This was predictable in view of the high-level opposition to Yeltsin’s predecessor, Mikhail Gorbachev, for “allowing” the reunification of Germany and its entry into NATO.

      • Counter PunchDurban’s Latest Rain Bomb Kills More Than 300 and Unveils State Climate Sloth

        The toll in lost human life exceeds Durban’s prior record of 64 deaths from the “Rain Bomb” of April 2019, when 168 millimeters fell in 24 hours, doing at least $75 million in damage. In October 2017, 108 mm fell in one day, killing 11.

        Going back further, in 2011 Durban hosted the annual United Nations COP17 climate summit, generally considered a global policy failure (though not according to U.S. State Department negotiator Todd Stern who celebrated to Hillary Clinton what he termed a “significant success for the United States”). Still, city officials appeared numb to the imminent threat, not bothering to make basic infrastructure repairs after 2017 even in high-profile sites like the violence-afflicted Glebelands migrant labor hostel whose roof was not repaired two years later.

      • Counter PunchRoaming Charges: The Windfalls of War

        + White phosphorus munitions, like those reportedly deployed by Russia in Mariupol, have been repeatedly used by the IDF in Gaza and the Saudis in Yemen with ghastly consequences. I don’t recall any objections from the US State Department. But now that the US is “woke” to the dangers of white phosphorus, they might track down those in Pentagon who ordered its use in Fallujah.

        + The US is trying to amend the Security Council veto process at the UN. The changes would  automatically convene a meeting of the General Assembly after a veto has been cast in the Security Council. This could easily backfire on some US client states. The US has used the veto to block Israel from UN censures at least 42 times since 1972.

      • Common DreamsIsraeli Forces Accused of ‘Barbaric Premeditated Attack’ on Palestinian Worshipers

        Israeli forces on Friday launched a raid on the Al-Aqsa mosque compound in occupied East Jerusalem, injuring more than 150 Palestinians as they gathered to worship on the second week of Ramadan.

        Sheikh Omar al-Kiswani, the director of the Al-Aqsa Mosque—one of Islam’s holiest sites—told Middle East Eye that “what happened today is an attack on all peaceful worshipers.”

      • Common DreamsOpinion | American Militarism, a Persistent Malady

        I recently participated in a commemoration of Martin Luther King’s address “Beyond Vietnam—A Time to Break Silence,” originally delivered on April 2, 1967, at New York City’s Riverside Church. King used the occasion to announce his opposition to the ongoing war in Vietnam. Although a long time coming in the eyes of some in the antiwar movement, his decision was one for which he was roundly criticized, even by supporters of the Civil Rights Movement.  He was straying out of his prescribed lane, they charged, and needed to get back where he belonged.

      • Common DreamsHead of World Food Program Warns ‘People Being Starved to Death’ in Mariupol

        David Beasley, executive director of the United Nations World Food Program, is sounding the alarm about people being “starved to death” in Mariupol, a city in southeastern Ukraine surrounded by Russian troops.

        “We will not give up on the people of Mariupol and other people that we cannot reach.”

      • Common DreamsChomsky on Global Response to Biden Calling Putin a War Criminal: ‘Takes One to Know One’

        World-renowned dissident and linguist Noam Chomsky highlighted the hypocrisy of U.S. government leaders denouncing and demanding accountability for war crimes allegedly committed by Russian forces waging war on Ukraine during an interview published Thursday.

        For just over an hour, Chomsky spoke with The Intercept’s Jeremy Scahill about Russian President Vladimir Putin’s February invasion of Ukraine, media coverage of the war, how governments around the world have responded, and the need to move toward “a diplomatic settlement.”

      • ABCWhat Can Happen When An Election Official Believes The Big Lie

        These days, Peters is back in Mesa County. She has to be. She can’t leave the state after being recently indicted by a grand jury on 10 counts, including seven felony charges, for allegedly using a false identity and lying to state employees while allowing an unauthorized individual to make copies of the election equipment hard drive. When I visited last month, I found her at the Hilton DoubleTree in Grand Junction — the county seat — where she was attending the county GOP Assembly to campaign for her spot on the primary ballot. She’s now running for secretary of state. There, sitting on a patio with her bright white bob sparkling in the sun, she told me that her decision to copy the election equipment hard drives was not only allowed but required. And she believes those copies have revealed serious vulnerabilities in the county’s election equipment.

      • BBCSalah Abdeslam: Accused Paris attacker apologises to victims

        Prosecutors say Salah Abdeslam, 32, is the only surviving member of the so-called Islamic State cell that targeted Paris that night, killing 130 people.

      • Foreign PolicyRussia Flounders in Ukraine but Doubles Down in Mali

        Despite the Kremlin calling back an international network of national and foreign mercenaries to fight in Ukraine, some of whom are leaving battlefields in Syria and Africa to do so, Russia has largely maintained its presence in Mali, where a force of about 1,000 Russian officials and instructors from the Russian mercenary outfit, popularly known as the Wagner Group, is deployed, according to United Nations-based diplomats. Some 200 Malian service members and nine police officers are currently receiving training in Russia, a Russian diplomat recently told the U.N. Security Council.

    • Environment

      • NBCBiden administration to resume leasing for oil and gas drilling on federal lands

        The Biden administration said it will resume selling leases to drill for oil and gas on federal lands starting next week, but with a major reduction in the number of acres offered and an increase in the royalties companies must pay to drill.

        The Interior Department announced that on Monday it will release a sale notice for leases to drill on 144,000 acres of government land — 80 percent less than what was initially being evaluated for potential leasing.

      • Common DreamsAfter Progressive Pick Forced Out, Biden Taps Crypto-Linked Michael Barr for Top Bank Regulator Job

        A month after climate campaigners condemned Sen. Joe Manchin for refusing to support the nomination of Sarah Bloom Raskin to a top Federal Reserve post, government watchdogs are warning that the president’s choice of a replacement nominee, Michael Barr, has close ties to industries that could be responsible for “the next financial crisis.”

        “When it comes to the cryptocurrency and fintech industries, which some believe could be responsible for the next crash, concerns about the revolving door have too often been waved away.”

      • Common DreamsOfficial With Oil Ties Next in Line as Biden Climate Adviser Reportedly Plans to Quit

        President Joe Biden’s top domestic climate adviser is reportedly planning to resign in the coming weeks as much of the White House’s green energy agenda remains stalled in the Senate—and as the administration moves to boost U.S. oil production and gas exports in response to Russia’s war on Ukraine.

        According to the New York Times, White House climate adviser Gina McCarthy “has told confidants that she has been frustrated by the slow pace of climate progress.” Reuters cites one unnamed source as claiming that McCarthy—who served as head of the Environmental Protection Agency during the Obama presidency—intends to leave her position “as soon as next month,” a timeline the White House denies.

      • Common DreamsOpinion | Fossil Fuel Funding Is a Disastrous Investment

        The Intergovernmental Panel on Climate Change’s Sixth Assessment shows the world is unnecessarily headed toward climate catastrophe, and all it would take to resolve the crisis is decisive global action. That means no new fossil fuel development or infrastructure.

      • Common DreamsDenied Bail, Scientist Emma Smart Goes on Hunger Strike After Arrest at Climate Protest

        Scientist Emma Smart went on a hunger strike Thursday after she was denied bail by London authorities while awaiting a court hearing on charges of “criminal damage,” which were filed after Smart and others glued scientific papers and themselves to a U.K. government building to protest destructive climate policies.

        “Emma knows what’s at stake if we don’t stop fossil fuel investments and she is taking a stand.”

      • Common DreamsOpinion | Nature-Based Agroecology Is Gaining Momentum as a Key Climate Solution

        The satellite imagery is staggering: an Antarctic ice shelf roughly the size of New York City collapsing into the ocean. Its demise, captured and reported by NASA scientists in mid-March, was only the latest startling news from a region where temperatures have soared up to 40° Celsius (72° Fahrenheit) above average.

      • Common DreamsActivists Decry Biden’s ‘Reckless’ Resumption of Fossil Fuel Leases on Public Lands

        Activists condemned Friday’s announcement by the Biden administration that the U.S. Bureau of Land Management will resume oil and gas lease sales on public lands as yet another betrayal of President Joe Biden’s promises to reduce greenhouse gas emissions and tackle the climate emergency.

        “Biden is choosing to stand with polluters over people at the expense of frontline communities and the future of the planet.”

      • Counter PunchAn Earth Day Technology Worth Investing In

        This April, scientists observed a record annual increase in methane levels in the atmosphere for the second year in a row. It’s the largest increase since record-keeping began.

        Methane is a greenhouse gas that’s over 80 times more potent than carbon dioxide. It’s a major contributor to global warming.

      • Energy

        • The NationBlue State Activists Are Working to Decarbonize Trillions

          Republican state leaders are on the warpath against BlackRock, the largest financial asset manager in the nation.

        • Common Dreams‘No Choice But to Disrupt’: Climate Activists Block 4 London Bridges

          Climate campaigners on Friday shut down four major bridges in London as part of a wave of actions across the United Kingdom to demand an end to fossil fuels.

          The U.K. arm of Extinction Rebellion (XR) confirmed members of the group blocked the Blackfriars, Lambeth, Waterloo, and Westminster bridges.

        • David RosenthalEthereum Has Issues

          I first wrote about the problem of bots front-running transactions a year and a half ago in The Order Flow, citing Dan Robinson and Georgios Konstantopoulos’ Ethereum is a Dark Forest from August 2020 and samczsun’s Escaping the Dark Forest. But I should have paid more attention. It turns out that front-running is the tip of an iceberg of fundamental problems that Ethereum and similar systems suffer. In replicating the functions of Wall Street they have replicated, and in some ways enhanced, its pathologies, Below the fold I survey these and related issues.

        • [Old] PC Gamer’50% of transactions were fraudulent’ when Steam accepted Bitcoin for payments, says Gabe Newell

          “The problem is that a lot of the actors who are in that space are not people you want interacting with your customers,” Newell said. “We had problems when we started accepting cryptocurrencies as a payment option. 50% of those transactions were fraudulent, which is a mind-boggling number. These were customers we didn’t want to have.”

          Newell reiterated that Bitcoin’s fluctuations were “a complete nightmare”—people weren’t happy when a game could cost $10 one day and $100 the next.

        • [Old] [Cryptocurrency] Throws the Coal Industry a Lifeline

          But while the process may solve one issue, it creates another. Waste coal is the dirtiest coal because of its high levels of mercury, sulfur, chromium, and lead. In a circulating fluidized bed, more refuse is needed to produce the same amount of energy as regular coal, so the toxic byproducts are multiplied.

          Stronghold used a loophole for Scrubgrass—classifying it as a mining operation—to survive Obama-era emissions restrictions that would have shut down the plant and similar refuse-burning enterprises. During the Trump administration, those EPA rules were loosened, meaning the crypto miners can continue generating immense amounts of power “behind the meter” without much restriction or oversight. And even if removing and burning coal refuse does help stem water-quality problems and prevent inextinguishable underground blazes, the waste piles aren’t an unlimited resource, raising the question of what will happen when they’re gone.

        • ForbesWhy Does Bitcoin Use So Much Energy?

          If Bitcoin were a country, it would rank in the top 30 worldwide for energy use. That’s roughly enough electricity to power countries with populations in the tens of millions, with an environmental burden of an estimated 34 megatons of carbon emissions or more, according to Digiconomist’s Bitcoin Energy Consumption Index.

          Of course, Bitcoin isn’t unique among cryptocurrencies in terms of its environmental burden, but its high profile and uniquely inefficient transaction approval system make it an easy scapegoat. The blockchain technology that underlies it, meanwhile, could be the key to a greener future.

        • India TimesAmazon CEO says not adding cryptocurrency as payment option anytime soon

          Amazon.com Inc Chief Executive Officer Andy Jassy said the e-commerce giant is not close to adding cryptocurrency as a payment option to its retail business, in an interview with CNBC on Thursday.

      • Wildlife/Nature

        • The RevelatorUnearthing the Story of North America’s Lost Giant Bear
        • Weird-eyed strawberry squid spotted in ‘twilight zone’ off California’s coast

          On a recent deep dive into the twilight zone, a submersible hundreds of feet underwater filmed an unusual fruit-colored creature: a bright-red strawberry squid with eerie eyes — one small and black and the other large, bulbous and yellow.

          Oblivious to the video camera, the strawberry squid (Histioteuthis heteropsis) cruised through its dark ocean home, occasionally twisting and curling its eight arms and two tentacles as its ghostly white fins rippled.

          The sighting, which happened last month, wasn’t totally unexpected, but it was still a pleasant surprise. “We see them often (maybe one dive in four), but they are far from abundant,” Bruce Robison, a senior scientist with Monterey Bay Aquarium Research Institute (MBARI), told Live Science in an email. Robison, who wasn’t part of the expedition that spotted this squid, leads the midwater ecology group at MBARI.

      • Overpopulation

        • Climate Change 2022: Mitigation of Climate Change

          The Working Group III report provides an updated global assessment of climate change mitigation progress and pledges, and examines the sources of global emissions. It explains developments in emission reduction and mitigation efforts, assessing the impact of national climate pledges in relation to long-term emissions goals.

    • Finance

    • AstroTurf/Lobbying/Politics

      • #SocialMediaComplianceWatch: analysis of Social Media Compliance Reports for the month of February 2022

        Google (including YouTube), Koo, Meta (Facebook and Instagram), ShareChat, Snap, Twitter and WhatsApp have released their reports in compliance with Rule 4(1)(d) of the IT Rules 2021 for the month of February, 2022. The latest of these was published by WhatsApp and was published on April 1, 2022. The reports contain similar shortcomings, which exhibit lack of effort on the part of the social media intermediaries and the government to further transparency and accountability in platform governance. The intermediaries have yet again, not reported on government requests, used misleading metrics and have not disclosed how they use algorithms for proactive monitoring. You can read our analysis of the previous reports here.

      • TruthOutBlack Florida Lawmakers Say DeSantis’s Gerrymandered Maps are “Overtly Racist”
      • TruthOutAs Republicans Push Far Right Agenda, Stakes for Midterms Couldn’t Be Higher
      • TruthOutJudge Denies Stacey Abrams the Ability to Raise Funds the Way Brian Kemp Can
      • Counter PunchGreen Ex-Marine: Matthew Hoh is a Different Kind of “Service Candidate”

        Two years ago, the Democratic Senatorial Campaign Committee (DSCC) bet heavily on four ex- military officers running for US Senate seats against right-wing Republicans in Arizona, Texas, Kentucky, and North Carolina. Despite much Super-PAC spending on their behalf, only one of them, former astronaut Mark Kelly, actually got elected.

        In North Carolina, nearly $300 million was raised and spent either by incumbent Senator Thom Tillis, his challenger, Cal Cunningham, or outside groups backing them. A lawyer and former state legislator, Cunningham was commissioned in the Army Reserve, Judge Advocate General’s Corps, after Al-Qaeda’s 9/11 attacks. He then served on active duty in Iraq and Afghanistan, reaching the rank of lieutenant colonel and earning a Bronze Star. As the New York Times reported, the Democratic nominee “leaned heavily on his character and biography, playing up his military service and presenting himself as an inoffensive moderate.”

      • Counter PunchDisarmament For Development

        If we were a truly democratic country, we would be asked whether we would like to spend the budget on war or on education, whether we would like to give the priority to disarmament and peace negotiations rather than to attend to the arms race.  We would be able to vote on specific aspects of the budget.  We would not rely on our system of so-called “representative democracy”, which in reality does not represent us.  The reality is that we have a “dysfunctional” democracy, which allows us only to vote for candidate A or candidate B, both of whom are committed to the military-industrial complex, both of whom want huge military budgets, both of whom prefer sabre-rattling and military adventures over dialogue, tension over détente, predator competition over international cooperation.

        In a world threatened by pandemics, climate change, earthquakes, tsunamis and other natural disasters, it is time to practice international solidarity to solve global problems.  Our governments should begin by respecting the sovereignty of other states, refrain from interfering in their international affairs as stipulated in General Assembly Resolutions 2131, 2625, 3314, stop provocations, silence the drums of war, stop the enormously costly arms race and observe article 2(3) of the UN Charter, which commits all member states to solve their differences by negotiation, peaceful means, and in good faith.

      • Counter PunchThe Woke Saviors of the DSA

        Allison-Natale seems to be the kind of earnest young professional we are all familiar with: an East coast educated lawyer who toils for do-gooder nonprofit law firms like The Bronx Defenders, and is extremely concerned about everyone’s feelings.

        In other words, he would fit extremely well in the liberal wing of today’s Democratic Party. But Allison-Natale considers himself a proud socialist, therefore—and I am basing this on the treatment Sen. Bernie Sanders has received—he is not really welcome in today’s Democratic Party.

      • Counter PunchAbout that $900 You Gave Military Contractors

        You’ve probably heard a lot about corporations not paying taxes. Last year, individuals like you contributed six times more in income tax than corporations did.

        But have you heard about how many of your tax dollars then end up in corporate pockets? It’s a lot — especially for corporations that contract with the Pentagon. They collect nearly half of all military spending.

      • Counter PunchImpacts of Racism on White Americans in the Age of Trump

        The most racist of Trump’s base constitute whites whose racism backfires on them, in ways they never, and still don’t, anticipate or understand.

        The United States residents seem to be proud of what they call their ‘rugged individuality’, and don’t want any help from the government. They seem to overlook the public school system, roads, Social Security and a myriad of other entitlements provided ostensibly for all residents. But many of them seem to have a horror of anyone who is not white receiving any benefits. So they oppose such things as government-provided health care (something that I have in Canada), food stamps, aid to dependent children and other related benefits, believing that they are all going to non-whites who just want handouts. They don’t seem to recognize that by depriving non-whites of these benefits, they deny themselves as well.

      • Counter PunchHow Putin Changed the Subject

        This year’s 55th anniversary event, also held in Riverside Church’s magnificent sanctuary, featured inspiring Christian music and a thoughtful discussion of King’s remarks. Most powerful of all, however, was a public reading of the address itself.  “Beyond Vietnam” contains many famously moving passages.  King, for example, cited “the cruel irony of watching Negro and white boys on TV screens as they kill and die together for a nation that has been unable to seat them together in the same schools” and would not allow them to live “on the same block in Chicago.”  And he reflected on the incongruity of young Black men being sent “eight thousand miles away to guarantee liberties in Southeast Asia which they had not found in southwest Georgia and East Harlem.”

        For me, at least, what that commemorative moment brought into sharp focus was his lacerating critique of American freedom. And there, to my mind, lies its lasting value.

      • Counter PunchStop the Geopolitical War Now

        To its credit the Biden presidency has so far resisted pressure to escalate this geopolitical war by fusing its prosecution with that of Ukrainian resistance forces through such steps as establishing a no-fly-zone in Ukraine, supplying offensive weaponry, and deploying NATO forces and weaponry. This is not enough because its tendency is to prolong the war at the expense not only of the Ukrainian people, but of millions on non-Ukrainians already suffering from the spillover effects of the war and sanctions on food and energy supplies and prices, and worse will come to Ukraine and internationally, the longer the ground war goes on.

        A diplomatic path to conflict resolution is completely absent, in effect negated, given the political language of demonization relied upon by Biden from the outset of the Russian aggression on February 24th. To accuse Russian and its leaders of war crimes that should be prosecuted by the International Criminal Court in The Hague is both awkwardly hypocritical given the past U.S. repudiation of the tribunal’s authority and an inflammatory attempt to politicize a fragile international institution struggling for legitimacy since it was established more than 20 years ago. To suggest, even to demand, regime change in Moscow, as Biden has done, is something the West wisely refrained from doing even with respect to Stalin and Stalinism at the height of the Cold War. Such a statement unless attributed to an emotional outburst that a nuclear armed world can ill afford, must be regarded as calculated to enrage Putin and his entourage, and thus inhibit any willingness to explore prospects for ending the violence now.

      • The NationToast!
      • Counter PunchUS’s Flaunting of Diplomatic Immunity Challenged in Court: Imprisoned Venezuelan Diplomat Contests Extraterritorial Judicial Abuse

        At issue at the April 6 hearing was Saab’s claim to diplomatic immunity under the Vienna Convention on Diplomat Relations. This international law, to which the US is a signatory, affords accredited diplomats absolute protection from arrest and prosecution even in time of war. Referring to the war in Ukraine, Saab’s attorney reminded the court that the principle at stake is “vital to the effective functioning of diplomacy for all states…[which] is all the more imperative these days.”

        Charges against Alex Saab

      • Counter PunchNeoliberalism is Not a Noun

        However, humans are still the primary agents of history, despite the matrix of machinery, computers and the sheer momentum of events that can easily overwhelm us in this modern world. Whether those agents are those with billions of dollars worth of wealth, unparalleled armies and weapons of war or just us common folk, humans remain important in the ongoing narrative of human history. Indeed, not a day goes by that even a casual but cognizant observer would fail to acknowledge this.

        Author Gary Gerstle reflects on all of these in his newly-published history The Rise and Fall of the Neoliberal Order. Unlike many other books on the neolibral period of capitalism, Gerstle’s work spends most of its time examining the politics, the political movement and the politicians who made neoliberalism the political order of the later twentieth and early twenty-first century. By political order, Gerstle means something that has the “ability to organize the core ideas of political life.” It is his contention that the New Deal defined the political order of the mid-twentieth century and it was its failure to sustain its promise that ushered in the neoliberal order. Of course, as noted above, this transition was not pre-ordained, but was instead the result of political and eocnomic pressures by monied interests and those politicians that served them that bought this change about. Although many of those political pressures were of the domestic variety, Gerstle argues that the most important element in the last one hundred years was the Russian revolution and its aftermath—all the way to the disintegration of the Soviet Union in 1991.

      • Counter PunchHow Movements can Maintain Their Radical Vision While Winning Practical Reforms
      • FAIR‘There Is Plenty of Evidence to Request the Arrest of Trump’

        Janine Jackson interviewed legal expert Marjorie Cohn for the April 8, 2022, episode of CounterSpin about prosecuting Donald Trump. This is a lightly edited transcript.

      • The NationDonald Trump’s Continued Liberty Is an Affront to the Rule of Law

        The evidence that Donald Trump committed crimes is all around us. We have evidence that the Trump Organization manipulated financial disclosures to inflate or deflate his assets as needed, because his former “fixer,” Michael Cohen, testified to that scheme. We have evidence that his company engaged in financial crimes, because his company’s chief financial officer, Allen Weisselberg, has been indicted on those charges. We have evidence that he tried to tamper with a federal election, because Trump is on tape asking Georgia Secretary of State Brad Raffensperger to “find” the votes to put him over the top. We have evidence that he engaged in a conspiracy to obstruct Congress on January 6, 2021, because he urged people to do so on live television and spent weeks beforehand trying to overturn the results of the presidential election. We have evidence that Trump knew what he did was wrong, because he and his lawyers ordered his collaborators to not cooperate with congressional investigators.

      • FAIRLayla A. Jones on ‘Lights. Camera. Crime’
      • Counter PunchA Le Pen Presidency Was Not a Possibility Before. It is Now.

        On the face of it, Sunday’s results look like a carbon copy of 2017. Emmanuel Macron, the incumbent president, came first with 28%, followed by Marine Le Pen for the far-Right Rassemblement National (23%), then Jean-Luc Mélenchon for the radical Left France Insoumise (22%). Just like in 2017, Le Pen defeated Mélenchon by a whisker, denying the latter a place in the second round.

        In reality, these results are surprising and even unsettling. Abstention was high: at 26%, it came close to the record 28% set in 2002. In French democracy, large numbers of young, poor and racialised people now permanently abstain from voting.

      • The Nation“He Just Shat All over Us”: Why Macron’s “Republican Front” Is Fraying

        Noisy-le-Sec, France—Fatima, 44, works in sales. She doesn’t follow politics much and didn’t vote in the first round of France’s presidential election, but she knows there’s an important choice to make on April 24. President Emmanuel Macron is facing reelection against far-right challenger Marine Le Pen—and it’s a much tighter race than in 2017, when he trounced her by 32 percentage points. Current polls show him leading by just about six points.

      • The NationShould NATO Exist?

        Before Russia’s criminal invasion of Ukraine in February, the argument that NATO expansion over the previous 30 years had been a policy failure and a provocation was neither new nor partisan. It had been put forward by right-leaning realists in the US foreign policy mainstream, including George Kennan, William Burns, Fiona Hill, and John Mearsheimer, and it was also a common position among doves on the left, including me. Among Russia experts, it’s become conventional wisdom that President George W. Bush erred in 2008 when he insisted on an open-ended commitment to someday bring Ukraine and Georgia into NATO, likely triggering Russia’s war with Georgia a few months later and eventually its conflict with Ukraine, which began in 2014 and escalated this year. And among left-wing critics of US foreign policy, it’s conventional wisdom that NATO is a Cold War relic—a defense industry boondoggle that sucks up resources that could be invested in the social safety net.1

      • The NationThe Deadly Side of the American Dream
      • Common DreamsZelenskyy Says World Should ‘Be Ready’ for Putin to Use Nuclear Weapons

        Ukrainian President Volodymyr Zelenskyy on Friday warned that the world should prepare for Russia to use nuclear weapons as part of its ongoing assault.

        When asked if he is worried that Russian President Vladimir Putin might use a so-called tactical nuclear weapon on Ukraine, Zelenskyy told CNN’s Jake Tapper: “Not only me—I think all of the world, all the countries, have to be worried because… it can be not real information, but it can be truth.”

      • Common DreamsOpinion | November 2022: The Anti-Democracy Coalition

        In former President Donald Trump’s ongoing effort to dismantle democracy, his people gave Jim Marchant an important assignment. Marchant embraced it.

      • Common Dreams‘I Am Not for Sale,’ Says Nina Turner as Billionaire-Funded Super PAC Backs Opponent

        Congressional candidate Nina Turner declared Friday that she is “not for sale” and suggested her primary opponent, Democratic Rep. Shontel Brown, is after federal filings revealed that a billionaire-funded super PAC has spent more than $1 million in support of the incumbent in Ohio’s 11th District.

        “Let’s be clear, those corporate interests don’t make donations, they make investments.”

      • The Wall Street JournalElon Musk Is No Longer Twitter’s Largest Shareholder

        Vanguard disclosed on April 8 that it now owns 82.4 million shares of Twitter, or 10.3% of the company, according to the most recent publicly available filings with the U.S. Securities and Exchange Commission.

        The asset-manager increased its stake in the company at some point during the first quarter, according to the filings. Vanguard’s holdings are now worth $3.78 billion, based on Twitter stock’s closing price on Wednesday.

      • Billionaires and Taxes: Some Visualisation on Taxes by Rich

        How much do the super rich really pay? Until now, the answer was unknown — thanks to privacy laws. Recently, tax returns of the super rich was leaked to ProPublica. I thought of exploring the billionaires and their tax rates.

      • New York TimesElon Musk Knows Exactly What He’s Doing

        The suit could become an example of a powerful way to claw back some of the power of Section 230, a target on both sides of the aisle, by noting that it does not protect unfettered speech in every instance and that there is a responsibility not to encourage possible falsehoods. This is one to keep an eye on.

      • New York TimesRussian Tech Industry Faces ‘Brain Drain’ as Workers Flee

        By March 22, a Russian tech industry trade group estimated that between 50,000 and 70,000 tech workers had left the country and that an additional 70,000 to 100,000 would soon follow. They are part of a much larger exodus of workers from Russia, but their departure could have an even more lasting impact on the country’s economy.

        The exodus will fundamentally change the Russian tech industry, according to interviews with more than two dozen people who are part of the tightknit community of Russian tech workers around the world, including many who left the country in recent weeks. An industry once seen as a rising force in the Russian economy is losing vast swaths of its workers. It is losing many of the bright young minds building companies for the future.

      • The EconomistXi Jinping’s bold plan for China’s next phase of innovation

        Now, however, its officials talk as if it were a tech hub. Hundreds of artificial-intelligence (AI), robotics and data companies have sprung up in the past year. Local planning documents reflect the exuberance of a boomtown in the making, something Zhuzhou could only watch from afar in the 1990s as eastern ports became rich.

        The documents refer to “great changes not seen in 100 years”, a phrase that has been used by Xi Jinping, China’s president, to signify the start of a new era. He believes China is on the verge of a revolution in which dozens of cities will begin producing breakthroughs in robotics, cloud computing and automation. Zhuzhou’s officials also believe they are poised to reap the rewards of Mr Xi’s “common prosperity” campaign—a plan to redistribute wealth from richer regions to poorer ones, and from the dominant [Internet] platforms to consumers and workers.

    • Misinformation/Disinformation

      • VOA NewsDisinformation Campaigns Skewing Young People’s View of War in Ukraine

        As the world focuses on Russia’s war on Ukraine, another conflict is raging — on people’s phones.

        In the information war, TikTok has become a battlefield. Popular among younger audiences, the platform known for dance videos has, for some, become an information source on the war in Ukraine.

        With new, unverified content appearing on TikTok by the second, some analysts worry that the platform often serves to mislead its users, numbering 1 billion worldwide.

    • Censorship/Free Speech

      • TechdirtElon Musk Demonstrates How Little He Understands About Content Moderation

        Lots of talk yesterday as Elon Musk made a hostile takeover bid for all of Twitter. This was always a possibility, and one that we discussed before in looking at how little Musk seemed to understand about free speech. But soon after the bid was made public, Musk went on stage at TED to be interviewed by Chris Anderson and spoke more about his thoughts on Twitter and content moderation.

      • Michael GeistSpiking Op-Eds: How the Government’s Online News Act is Already Leading to Media Self-Censorship

        First, the bill increases dependence on the Internet companies, both in terms of reliance on the new revenues and by virtue of the fact that the Internet companies – not Canadian media – effectively dictate how the new revenues will be spent. This is the inevitable result of a system in which the Internet companies must prove to the CRTC that their deals with Canadian media will allocate a significant portion of the compensation to support local production of news content.

        Second, press independence is threatened by the self-censorship that Canadian media companies supportive of the bill are likely to pursue. I raised this concern last week, noting:

        I know of cases where opinion pieces have been spiked by mainstream media outlets because they criticized the previous Heritage Minister at a time when he was being actively lobbied on a potential media bill. Those decisions come on top of blank front pages and advertorials designed to curry support for the measures. The blurring of editorial and financial may be a fact of life, but it ultimately diminishes the credibility of the media.

    • Freedom of Information/Freedom of the Press

      • CPJAfter Russian withdrawal, Ukrainian journalists found killed in Bucha and Yahidne

        Ukrainian authorities should thoroughly investigate the deaths of journalists Roman Nezhyborets and Zoreslav Zamoysky, determine if they were targeted for their work, and hold those responsible to account, the Committee to Protect Journalists said Wednesday.

      • Times Higher EducationRussian student reporters track campus oppression despite arrests

        “I was working as editor in Doxa before the war, doing the usual stuff editors do, but after the war, it became very dangerous. All of Russian media was censored into stopping publishing – the minority of publications that continue to exist manage because all their journalists left Russia. Many Russians feel like we’re on the brink of a full totalitarian nightmare.”

        Doxa, which Mr Aramyan is no longer allowed to edit, is keeping track of the nightmare as it unfolds, reporting on student arrests and violations of their rights. Its newly launched initiative, “Z-Rating” – named in a nod to the infamous letter painted on Russian tanks, which has since become a symbol of the war – tracks instances of oppression by Russian universities, including efforts to silence students and public positions supporting the Kremlin.

    • Civil Rights/Policing

      • The NationJackie Robinson’s Last Fight

        Seventy-five years ago, a World War II veteran named Jack Roosevelt Robinson smashed baseball’s color line and officially desegregated America’s pastime. A near full decade before the Montgomery Bus Boycotts, Jackie Robinson was a one-man cvil rights movement, a living symbol in 1947 against racism, segregation, and white supremacy wherever his Brooklyn Dodgers played ball. This is why Dr. Martin Luther King Jr. would come to famously call Robinson “a sit-inner before sit-ins. A freedom rider before freedom rides.”

      • TruthOutAmazon Lashes Back in Staten Island Warehouses
      • Counter PunchPrison and Fines in this Year’s Benefit Package

        Many of these types of jobs are becoming not only more poorly paid considering the rampant inflation, but also a path to criminal conviction and financial ruin. Those that were termed heroes during early covid, individuals like teachers, nurses, and others keeping people fed have now entered a new decidedly non-heroic phase. They are entering the let’s try to convict them phase. It’s not an accident that many of these professions have disproportionate numbers of women. The far-right sure loves seeing a woman being punished. Always have, always will.

        Just ask RaDonda Vaught. She’s a nurse who admittedly screwed up about as bad as you can–a medication error killed someone when she was floated to an unfamiliar area at Vanderbilt where she worked. She administered the wrong medication after a truly breathtaking number of errors. She lost her nursing license, which truly seems appropriate in this case, but something extra was placed upon her–that being a conviction for negligent homicide. Her error was colossal, but nobody involved seems to be advancing that she had any intent to harm. The level of stress and demand for speed make errors of the most unimaginable type likely and nursing is in a particularly dark place right now. Work conditions are not good. The fact that she had no intent to harm whatsoever and admitted to the mistake…..that didn’t stop her conviction in a cultural landscape of authoritarians largely not paying for the intentional cruelties they inflict upon vulnerable populations daily. We are back to the accepted narrative, that being the cops, the soldiers and the powerful have a blank check on intentionally destructive behavior while the nurses, the teachers, and the librarians just keep paying, working and serving others.

      • Common Dreams‘Organizing Works!’ Declare Campaigners After Biden Protects Cameroonian Immigrants

        Human rights activists on Friday applauded the Biden administration’s decision to allow tens of thousands of immigrants from war-torn Cameroon to temporarily live and work in the United States as a victory won by years of Black-led organizing.

        “We rejoice and celebrate with our Cameroonian siblings who after a long-fought battle can finally breathe a sigh of relief.”

      • The NationThe Amazon Labor Union’s Historic Victory Was the First Step

        In the objections it filed with the NLRB, Amazon requested additional time to gather evidence—remarkable for a business that surveils its workers more than Orwell could ever have imagined. Amazon alleges what employers always allege: that the union intimidated workers to vote yes. Given the massive fearmongering campaign that Amazon has conducted inside JFK8, those claims are a joke. But there’s nothing funny about the salvo Jeff Bezos has launched.

      • Teen VogueGen-Z for Change Coders Create Fake Applications for Starbucks, Krogers Jobs

        Sean Wiggs, 21, decided to learn to code after a high school teacher told him coding would be the future. He says he taught himself through a combination of free online resources like Harvard’s Computer Science Introduction course, learning the coding languages Python and Javascript, and mastering his first project, a simple “hello world” code.

        But Wiggs found his projects expanding as the world contracted with the pandemic. As he took to TikTok to discuss social issues like systemic racism and police brutality, he made contact with a mutual, Victoria Hammett, who asked if he could help with a project. After Texas instituted a near-total ban on abortions, Texas Right to Life created a “whistleblower” site allowing Texans to report neighbors or relatives they suspected might be trying to access the procedure. So the plan was to create a bot to spam the site with fake tips. At that point, Wiggs had been coding for only three years, but he gave it a shot — and the code worked, leaving the abortion site flooded with fake tips. With that success, Wiggs became a fixture in the TikTok world as the coder who could help Gen-Z troll their enemies.

      • Stay clear of Batteries Plus Bulbs in Gurnee, Illinois. The guy is incompetent and there’s something really wrong with his car key machine.

        If there’s anything I don’t respect, it’s being rude and pushy with a customer that paid you his hard earned money for a product and then doesn’t stand behind their work and makes you wait because he has customers that probably also are getting ripped off with inferior craftsmanship. You may just want to save your money and go to the dealer so at least it works right.

        Then he managed to screw up my remote that he sold me so that doesn’t work right either now. Now he hangs up on me and refuses to refund my money, so I am filing a credit card dispute with the company to get my money back. Just now, Bhushan called and threatened me that he would call the police!

        What a lousy and crooked store. It’s one thing to mess something up a little, but it’s something else completely to not stand behind your work, blame the customer, yell at the customer, hang up on the customer, then refuse to refund them even though you’re obviously too incompetent to make the transaction right, and then get mad when you see that there’s a credit card dispute over your shoddy workmanship and threaten them with the police. Over what? Me asking him to fix this or give me my money back? This is harassment!

        To make things even worse, the dealer doesn’t charge much more than Batteries Plus and I’m pretty sure their merchandise actually works. Now I get to go there anyway and pay for all of this all over again while the dispute is sorted out with the card company over this clown. We’ll just see about “Sorry, no refunds!” when the bank gets finished with this joker.

    • Internet Policy/Net Neutrality

      • My half of year on Gemini

        If you are browsing from HTTP. You really should get youself a Gemini Browser and browse this on Gemini. I recommend Lagrange. Or feel free to keep using HTTP.

    • Monopolies

      • TechdirtAntitrust Reformers Debate Partnering With Bigots To Take On ‘Big Tech’

        While the press and some policy circles have made a large stink the last few years about massive new “bipartisan support for antitrust reform,” we’ve noted that the push isn’t quite what’s being advertised. While some of the bills being proposed might help correct some competitive imbalances online, the push in general is bizarrely narrow and only targets some tech companies under some circumstances.

      • Copyrights

        • New York TimesHow Barnes & Noble Went From Villain to Hero

          In the past, the book-selling empire, with 600 outposts across all 50 states, was seen by many readers, writers and book lovers as strong-arming publishers and gobbling up independent stores in its quest for market share.

          Today, virtually the entire publishing industry is rooting for Barnes & Noble — including most independent booksellers. Its unique role in the book ecosystem, where it helps readers discover new titles and publishers stay invested in physical stores, makes it an essential anchor in a world upended by online sales and a much larger player: Amazon.

        • Torrent FreakYouTube Rejects Movie Piracy Claims and Content ID Critique

          YouTube has responded to the piracy lawsuit filed last year by movie tycoon Carlos Vasallo. The streaming platform denies all copyright infringement allegations and sees the case as an attempt to get special Content ID treatment. YouTube also warns that its copyright management tool should not fall into the wrong hands since that could lead to misuse and censorship.

        • Torrent FreakDuckDuckGo Removes Pirate Sites and YouTube-DL from Its Search Results

          Privacy-centered search engine DuckDuckGo has completely removed the search results for many popular pirates sites including The Pirate Bay, 1337x, and Fmovies. Several YouTube ripping services have disappeared, too and even the homepage of the open-source software youtube-mp3 is unfindable.

        • TechdirtDisney Gets Fans Who Made Their Own ‘Club Penguin’ Online Game Arrested Over Copyright

          In the pantheon of aggressive intellectual property bullies, Disney certainly would be one of the companies that would be competing to be Zeus. Disney has simply never seen an opportunity for IP enforcement that it hasn’t acted upon, be it copyright, trademark, or anywhere in between. More to the point for this post, Disney also has this fun mindset that even if it isn’t going to use an IP it owns, it doesn’t like it if anyone else does, either. On the topic of copyright specifically, this would represent a full departure from the purpose of copyright law: to encourage the creation and release of content in exchange for a temporary monopoly on that content.

        • TechdirtBehold The Invading Force That Is US Law Enforcement

          Last week, federal agents took down two alleged baddies for doing the thing: impersonating federal agents.

        • TechdirtMicrosoft Tried To Cozy Up To Newspaper Publishers… Who Are Now Claiming Microsoft Is Trying To Stiff Them

          A few months after the snippet tax was agreed to as part of the EU Copyright Directive, Australia indicated it wanted to take the same route. The government there planned to make Internet companies pay newspapers for sending the latter extra traffic, by imposing something called the News Media Bargaining Code. In a blog post from December 2020, Mel Silva, VP, Google Australia & New Zealand, gave a good analysis of why Australia’s proposed Code was antithetical to the way the Web worked, including the following:

IRC Proceedings: Friday, April 15, 2022

Posted in IRC Logs at 2:51 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 QmW4VXTLNgmEjwB1asyr23zZpFZbW6TFnARsnK4yYTBR9x IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmZMTWRQqka2HxxeyKKugzYBNpoejvX5Trzb3wXEyyc2go IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmWcnyEXi8LRzFjseGpCg9dUstrredXxepGL6BrEo8xmz3 IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmVvYXaaZaWtz6QPHz7avaJBR5aSWyBTBupewUuw8Grzzj IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmWAd3JdnGGmH97bFDoZck74VsbP72HRitFcYK5mFAhxXL IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmTbFXF4ZqcbigcBdFBzXygTY2UK8Xn8GZUA1LpX6Q8BFL IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmUx5oJ27nyQ3xXkLkWUrbL5vHn5mMKwjJA94LH49tcvr6 IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 Qmb2JBDx1qMaCD8JmFA2VyYWUk5YCmicGrrTS2ii8mXJ5G IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmRs89gRxwqpNCWmw7xF1MAkZPkzf4k6rsBPQAXGRV1ib5

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts