05.18.22

Links 18/05/2022: Qt Company Loses Chief; OpenSUSE Leap Micro 5.2 and RHEL 9 Final

Posted in News Roundup at 1:32 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

      • Jupiter BroadcastingLuxury Emotional Manipulation | Coder Radio 466

        Why Mike feels like Heroku is in a failed state, what drove us crazy about Google I/O this year, how Chris botched something super important, and some serious Python love sprinkled throughout.

    • Applications

      • MedevelLufi is an open-source E2E encrypted file sharing software

        Looking for a simple web-based file sharing software, with a strong encryption? Then Lufi may be your answer.

        Lufi is a self-hosted drop file sharing solution that comes with E2E encryption. It also tested and proven great on Firefox, Google Chrome, Internet Explorer 11, Microsoft Edge, Safari and mobile browsers as iOS, and Android.

        It is an open-source, free alternative to Sharedrop.io, and jetdrop.net, but it puts you in control of your data.

        Lufi is an ideal solution for designers, creative teams, freelancers, and UI/ UX experts.

      • Linux LinksBest Free and Open Source Alternatives to Google Drawings

        Google has a firm grip on the desktop. Their products and services are ubiquitous. Don’t get us wrong, we’re long-standing admirers of many of Google’s products and services. They are often high quality, easy to use, and ‘free’, but there can be downsides of over-reliance on a specific company. For example, there are concerns about their privacy policies, business practices, and an almost insatiable desire to control all of our data, all of the time.

        What if you are looking to move away from Google and embark on a new world of online freedom, where you are not constantly tracked, monetised and attached to Google’s ecosystem.

        In this series we explore how you can migrate from Google without missing out on anything. We recommend open source solutions.

      • Ubuntu PitTop 5 Best Open Source Passive OS Fingerprinting Tools in 2022

        In the world of ethical hacking, OS fingerprinting is a very popular method to get an idea about the potential victim’s operating system. The hacker sends some packets and commands over the network to the target system to get the exact guess about the target’s operating system, architecture, and security details. In this way, the hacker can make his plan more efficient and more powerful. There are two types of fingerprinting which are; passive and active. Most expert hackers and network admins use passive OS fingerprinting tools to provide real-time results with a higher accuracy value.

        As I have already mentioned that OS fingerprinting is divided into two domains, which are passive and active. Most frequently, we talk so much about the passive method; in passive fingerprinting, the hacker or the attacker can hide his own identity from the victim.

        This method is more perfect and appropriate for hacking. Though passive fingerprinting is more secure and convenient, it is a bit slower than the active method. The active fingerprinting works as a handshake.

      • MedevelFilestash is an open-source web file manager and Dropbox alternative

        Filestash is a self-hosted open-source Dropbox alternative that supports multiple user collaboration and a dozen of storage modules.

        With Filestash, you can connect to Amazon S3, Dropbox, Google Drive, FTPS and add more storage modules.

      • MedevelPapermerge is a new Document Manager solution for enterprise

        Papermerge is an open source document management system (DMS) primarily designed for archiving and retrieving your digital documents. Instead of having piles of paper documents all over your desk, office or drawers – you can quickly scan them and configure your scanner to directly upload to Papermerge DMS.

        Papermerge DMS on its turn will OCR the document and index it. You will be able to quickly find any (scanned!) document using full text search capabilities.

      • Ubuntu HandbookWarp – Modern New GTK4 File Transfer App for both Local & Internet Networks | UbuntuHandbook

        Looking for a peer to peer file transfer app that works outside the local network? Warp is the stupid simple application to do the trick for Linux.

        There are a few applications for LAN file transferring, such as Warpinator and Dukto. For sending date all over the world, Warp is a new GTK4 app for transferring any arbitrary-sized files and directories without struggling with Linux command or using a cloud service.

        The app provides a stupid simple interface with 2 tabs: Send and Receive. Simply click on the “send file” (or folder) button and select your data, it will generate a transmit code.

    • Instructionals/Technical

      • HowTo GeekHow to List Users in Linux

        Linux is a multiuser operating system, so creating numerous user accounts is easy. Over time, it’s easy to lose track of which accounts are required. Listing user accounts helps you manage them.

      • How to manage Vim plugins natively

        Vim is definitely one of the most venerated text editors in the Unix world. Although its learning curve can be pretty steep when accustomed to more traditional text editors, its usage can dramatically improve productivity. A lot of plugins are available for the editor; almost always their source code is hosted on Github or similar platforms based on Git. To manage such plugins, several third-party plugin managers were developed in time, such as Pathogen or Vim-Plug, but since version 8 of the editor, a native way to manage plugins was introduced.

      • ByteXDHow to Install Jupyter Notebook on Ubuntu – ByteXD

        Jupyter Notebook is a Python package that lets you host an interactive computing platform.

        You can access that platform via a web browser where you can edit notes, run code and it shows you the output of your code.

        Jupyter is mainly developed to be used as a data science and scientific computing tool. Not only can you use Jupyter to write python programs, Jupyter actually supports many programming languages.

        Also you can write blocks of text in your notebooks using markdown format, as well as writing mathematics. Lastly you can also add plots, photos and rich media.

        Jupyter isn’t supported under old versions of Python, it is supported under Python 3.3 (or greater), or Python2.7 (or greater). There are two methods to install Jupyter in Ubuntu or, for that matter, any other OS that runs Python, and this article will show you how to install it in Ubuntu.

      • Wanted: How to set up a Gemini server, for complete idiots.

        I’ve never sys-admined or ran a public-facing server — well, not in the last 30 years, anyway. So I have a healthy fear of forgetting to do something obvious and getting pawned immediately by some script-kiddie. Beyond my router, monsters roam, waiting for a crack in the fence.

      • Gemini Beginner Selfhosting Guide

        Stacksmith recently wanted a simple Gemini self hosting tutorial, so here I go.

        The guide contains everything from installing, to hardening with a Systemd service.

      • HowTo ForgeHow to use Screen Command on Linux [Ed: It's a GNU program, not "command on Linux"]
      • ByteXDOpenSSL Command Cheatsheet & Real World Examples – ByteXD

        OpenSSL is a set of crypto and hash tools that can be used to encrypt data and verify signatures. It’s a command line tool that can be used to generate keys, encrypt and decrypt data, sign and verify signatures, and generate and verify CSRs.

        In this tutorial we’ll cover some of the most common OpenSSL commands and how to use them. We’ll also discuss important terms and concepts related to encryption and digital signatures.

      • OpenSource.comA guide to Pipy, a programmable network proxy for cloud

        Pipy is an open source, cloud-native, network stream processor. It is modular by design and can create a high-performance network proxy. It’s written in C++ and is built on top of the Asio asynchronous I/O library. Pipy is ideal for a variety of use cases ranging from edge routers, load balancers, proxy solutions, API gateways, static HTTP servers, service mesh sidecars, and more.

        Pipy also comes with built-in JavaScript support through PipyJS. PipyJS is highly customizable and predictable in performance, with no garbage collection overhead. Currently, PipyJS is part of the Pipy code base, but it has no dependency on it and in the future it may be moved to a standalone package.

      • How To Install Ubuntu 22.04 LTS with Dualboot, UEFI, and External Drive Methods

        This tutorial explains in step by step how you can install Ubuntu 22.04 LTS “Jammy Jellyfish” into your computer or laptop. We will use a USB flash disk drive storage instead of hard disk. By practicing, you will be able to adapt this tutorial to install Ubuntu into hard disk, external HDD, and also SSD. Please note that this will help you making dualboot with Windows, no matter if your computer features BIOS Legacy or UEFI. Start everything with the preparations below and now let’s go. Happy installing!

      • Reset Sudo Password In Ubuntu 22.04 LTS – OSTechNix

        This brief guide explains how to reset sudo password in Ubuntu 22.04 and 20.04 LTS desktop and server editions from rescue mode.

      • Its FOSSInstall Specific Package Version With Apt Command in Ubuntu – It’s FOSS
      • HowTo ForgeHow to Install ONLYOFFICE Docs on Ubuntu for ARM

        ONLYOFFICE Docs is an open-source office suite distributed under GNU AGPL v3.0. It comprises web-based viewers and collaborative editors for text documents, spreadsheets, presentations, and forms compatible with OOXML formats.

      • OSNoteHow to Install Webfs Web Server on Ubuntu – OSNote

        Webfs is a nice small web server that helps users to host static content immediately. The web server when installed is capable of hosting static websites and media. It is a better alternative to heavy-duty web servers that are more CPU hungry. You will see how to install Webfs on an Ubuntu server in the next steps, this guide is compatible with Ubuntu 20.04 to Ubuntu 22.04.

    • Games

      • Boiling Steam2900 Games On The Steam Deck with Chrono Cross and Star Wars Squadron Verified

        Valve and their partners are progressing well, with a steady pace now when it comes to validating games for the Steam Deck, with more than 2900 games validated. There are now 2902 games at the time of writing working on the Steam Deck – in two categories as usual…

      • Godot EngineGodot Engine – Release candidate: Godot 3.5 RC 1

        The upcoming Godot 3.5 is now considered feature complete, and has received a lot of bugfixes and improvements over the past weeks thanks to all the testers and developers who reported and fixed issues. It’s now time to move to the Release Candidate stage so that we can release 3.5-stable for all users.

        At this stage we need people to test this release (and potential follow-up RCs) on as many codebases as possible, to make sure that we catch non-obvious regressions that might have gone unnoticed until now. If you run into any issue, please make sure to report it on GitHub so that we can know about it and fix it!

  • Distributions and Operating Systems

    • New Releases

      • Proxmox Backup Server 2.2 available

        We are excited to announce version 2.2 of our Proxmox Backup Server! It’s based on Debian 11.3 (codename “Bullseye”), but using the newer Linux kernel 5.15, and including ZFS 2.1.4.

        We have a new namespace feature which allows you to simplify backup management from multiple sources on-premises, remotely, and in the cloud, by organizing backups into “namespaces” within a single datastore.

        The new “read-only” and “offline” maintenance modes allow for safer maintenance work on a datastore.

        Countless bugfixes and smaller improvements are included as well, see the full release notes for details.

        A big THANK YOU to our community! We are really grateful for all the support and feedback, testing, bug reporting and patch submitting.

    • SUSE/OpenSUSE

      • LWNopenSUSE Leap Micro 5.2 released

        Let me remind users that the main documentation source for Leap Micro is SLE Micro documentation referenced bellow. The same applies to Leap itself.

        We recommend to try our self-install image for VM and host deployments (see demo on download page).

        For security reasons images have no root password set so you’ll have to use *ignition or combustion to set it up (unless you use the Offline installer).

        People who are interested in k3s use case should have a look at the recent *work of Atilla. the combustion should work on both SLE/Leap Micro and MicroOS. I would like to consider offering recommended combustion scripts as part of the image download/experience on get-o-o.

        Big thanks to all that participated!

    • Fedora Family / IBM

      • 9to5LinuxRed Hat Enterprise Linux 9 Is Finally Here, This Is What’s New

        This major release also introduces the ability to build both Red Hat Enterprise Linux 9 and Red Hat Enterprise Linux 8 images via a single build node, better support for customized file systems, and bare-metal deployments, Smart Card Authentication support via Web Console, new security profiles, support for IMA (Integrity Measurement Architecture) digital hashes and signatures, detailed SSSD login, OpenSSL 3 integration, and disablement of SSH root password login by default for better security.

      • Red Hat OfficialWhat’s new in Red Hat Enterprise Linux 9 for edge computing

        Each release of Red Hat Enterprise Linux (RHEL) is an exciting time and establishes a ten-plus year foundation for the industry to build upon. RHEL 9 marks the next milestone and offers improvements across the board in areas of stability, performance, upgrades and security capabilities. With edge computing being a strategic target for many of our customers, this post takes an in-depth look at the most significant features targeted to remote deployments.

      • Red Hat OfficialHot Off the Presses: Red Hat Enterprise Linux 9

        We are excited to announce the availability of Red Hat Enterprise Linux 9 (RHEL 9), the latest release of the world’s leading enterprise Linux platform. RHEL 9 provides a more flexible and stable foundation to support hybrid cloud innovation and a faster, more consistent experience for deploying applications and critical workloads across physical, virtual, private and public cloud and edge deployments.

      • Red HatWhat’s new in Red Hat Enterprise Linux 9

        Red Hat Enterprise Linux (RHEL) 9 is now generally available (GA). This release is designed to meet the needs of the hybrid cloud environment, and is ready for you to develop and deploy from the edge to the cloud. It can run your code efficiently whether deployed on physical infrastructure, in a virtual machine, or in containers built from Red Hat Universal Base Images (UBIs).

      • ByteXDWhat is Rocky Linux – Key Information and Overview

        Rocky Linux is a Linux distribution that is a 100% compatible rebuild of Red Hat Enterprise Linux (RHEL). Rocky Linux is maintained by the Rocky Linux Foundation.

        The Foundation and distribution are led by Gregory M. Kurtzer, one of CentOS’s original founders.
        Rocky Linux is now very popular both with individuals and large organizations and considered an unofficial successor of CentOS Linux.

        In this article, we’ll try to give you an overview of Rocky Linux and what you need to know about it.

      • Fedora ProjectBackwards-incompatible changes in Bodhi

        The 6.0 release of Bodhi — Fedora’s update gating system — will be published in a few days. We will deploy it to production a couple weeks after the Fedora release. It includes backwards-incompatible changes. Here’s what you need to know.

        [...]

        We reorganized the Bodhi source code to drop the hacks used in setup.py to support sub-projects. Instead, bodhi-server, bodhi-client and bodhi-messages are now actual Python package directories in the repo. The import path has not changed.

    • Debian Family

      • Linux MagazineTitan Linux is a New KDE Linux Based on Debian Stable

        Titan Linux is a new Debian-based Linux distribution that features the KDE Plasma desktop with a focus on usability and performance.

        With a foundation built on the Debian Stable Branch, Titan Linux takes a functional, yet a minimal approach to KDE Plasma to create an operating system that is as functional as it is performant. Titan Linux features a minimal KDE Plasma desktop, the stable LTS kernel, a wide range of hardware support, a large independent community of supporters, and a brand new management system, called the Titan Toolbox that makes it possible to manage the operating system with a single click.

    • Canonical/Ubuntu Family

      • UbuntuBring your multi-platform apps to Linux desktop with Flutter 3 | Ubuntu

        Google I/O 2022 took place last week and brought with it a host of exciting news from the world of Google, including the announcement of Flutter 3 with long-awaited Linux Desktop support!

        Flutter 3 is the next big step in Flutter’s journey to enable multi-platform application development across what is now six platforms: iOS, Android, Web, Windows, macOS and Linux. It features improved performance and additional profiling in Flutter DevTools, support for Material 3, Apple silicon, accessibility services and web app life-cycles on top of the snazzy new Flutter Casual Games Toolkit and much more

      • UbuntuCanonical at AWS Summit Washington 2022 | Ubuntu

        Our collaboration wth AWS has started in 2012 making 2022 the 10th year of working together to deliver premium open source solutions in the cloud. With Public Sector designation, our goal is to continue supporting AWS providing security and compliance for Government agencies and contractors on AWS Govcloud as and all AWS regions.

    • Devices/Embedded

      • CNX Software$349 AMD Kria KR260 Robotics Starter Kit takes on NVIDIA Jetson AGX Xavier devkit – CNX Software

        AMD Xilinx Kria KR260 Robotics Starter Kit features the Kria K26 Zynq UltraScale+ XCK26 FPGA MPSoC system-on-module (SoM) introduced last year together with the Kria KV260 Vision AI Starter Kit.

        Designed as a development platform for robotics and industrial applications, the KR260 is said to deliver nearly 5x productivity gain, up to 8x better performance per watt and 3.5x lower latency compared to Nvidia Jetson AGX Xavier or Jetson Nano kits. We’ll have a better look at the details below.

      • 128 Cores for AI Vision Projects, the reComputer Jetson-10 – The DIY Life

        The reComputer Jetson-10 is a new product by Seeed Studios, that consists of a palm-sized aluminium case that houses a passively cooled NVIDIA Jetson module. The module runs on their custom carrier board that is designed for AI application development and deployment. They have sent me their H0 model which runs a Jetson Nano module with 128 NVIDA CUDA cores that can deliver up to 0.5 TFLOPS of computing performance. It’s also got a Quad-core ARM A57 CPU running at 1.43 GHz, 4GBs of LPDDR4 RAM and 16GB of EMMC storage.

    • Open Hardware/Modding

      • CNX SoftwareExo Sense RP – A Raspberry Pi RP2040-based multi sensor module – CNX Software

        Sfera Labs Exo Sense RP is a multi-sensor module with a Raspberry Pi RP2040 microcontroller and various sensors to report temperature, humidity, air quality (VOC), light intensity, audio, and motion.

        The module can work as a standalone unit but can also communicate with a host through RS485 and USB interfaces, and supports expansion via surge-protected digital inputs and outputs. The Exo Sense RP is designed for indoor residential and commercial applications such as environmental monitoring and data logging, people and assets tracking, room management, access control, and more.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • Events

      • The Register UKPercona launches open-source database management system • The Register

        Open-source database services biz Percona has confirmed general availability of a database management platform initially targeted at PostgreSQL, MySQL, and MongoDB.

        Dubbed Percona Platform, the company’s first product will be available as a subscription service aiming to bring together the management of three open-source databases under a single system.

    • Web Browsers

      • Linux MagazineNot So Brave New World

        The Brave browser promises speed and privacy, but its quest for profit compromises security at every turn.

        I had thought that for-profit web browsers had died with the 20th century. Long since, I imagined, the web browser had become such an essential part of modern computing that there was no profit left in it. Brave Software, however, disagrees. Since 2016, the company has been developing its open source browser (Figure 1), attempting to fund it with a restricted marketplace for ads — an idea compelling enough to convince venture capitalists to invest over seven million dollars. However, those with minimal knowledge of privacy and security are likely to think to otherwise. Based on Chromium and compatible with Chrome extensions, the Brave browser itself is functional enough, with an array of tools designed to appeal to modern users, especially those who want to dabble in cryptocurrencies. Yet again and again, Brave reveals itself as a battleground where privacy and security are at odds with the quest for profit.

      • Mozilla

        • MozillaManifest v3 in Firefox: Recap & Next Steps | Mozilla Add-ons Community Blog

          It’s been about a year since our last update regarding Manifest v3. A lot has changed since then, not least of which has been the formation of a community group under the W3C to advance cross-browser WebExtensions (WECG).

          In our previous update, we announced that we would be supporting MV3 and mentioned Service Workers as a replacement for background pages. Since then, it became apparent that numerous use cases would be at risk if this were to proceed as is, so we went back to the drawing board. We proposed Event Pages in the WECG, which has been welcomed by the community and supported by Apple in Safari.

          Today, we’re kicking off our Developer Preview program to gather feedback on our implementation of MV3. To set the stage, we want to outline the choices we’ve made in adopting MV3 in Firefox, some of the improvements we’re most excited about, and then talk about the ways we’ve chosen to diverge from the model Chrome originally proposed.

    • Productivity Software/LibreOffice/Calligra

      • Its FOSSONLYOFFICE 7.1 Release Adds ARM Compatibility, a New PDF Viewer, and More Features

        ONLYOFFICE, one of the best open-source Microsoft Office alternatives, has just released its new upgrade, i.e., version 7.1.

        If you didn’t know, you can use ONLYOFFICE with online integration on your self-hosted server (like Nextcloud) or the desktop.

        This release brings exciting new changes, notably initial support for ARM-based devices like the Raspberry Pi.

    • Content Management Systems (CMS)

    • Programming/Development

      • New Chief Maintainer

        As I’ve said in my other email, I am resigning from my position at The Qt Company to join a small startup in Norway that is working with things unrelated to Qt.

      • Leaving The Qt Company

        Hi all,
        Let’s take the big news first. I’ve resigned from my position at The Qt Company. More on that and what it means for the Qt Project further below.

        But as I’ve spent almost exactly 25 years in the Qt ecosystem, 22 of those working for the various companies owning Qt, I hope it’s ok if this gets a bit longer and I spend some paragraphs looking back into history.
        As said, it’s been almost exactly 25 years, since I first heard about Qt. At that time, I read an article in the German C’t computer magazine about a new Desktop project for Linux called KDE. The underlying technology being used was Qt. As a person that used Linux extensively during his studies, I immediately got interested and it didn’t take long until I started my first steps learning Qt.
        As some of you might know I got involved rather deeply about a year or two later, when I started the KHTML project to create a new HTML engine for KDE in 1998/1999. That project was later forked by Apple to form the basis for their WebKit project, the Safari browser and Google’s Chrome browser. It’s cool to think that the browser engine(s) that most people use today started off as a Qt based project all those years ago.
        I remember getting to know some of the people working for Trolltech back then at KDE conferences. In the winter of 2000, they invited me over to Oslo to have a look at Qt. The company was at that time still tiny with 11 or 12 employees. I got a great tour of Oslo including the ski jumping tournament at Holmenkollen and signed up for the job.
        I was originally expecting to spend 2-3 years at Trolltech and then at some point move back to Germany. As you all can see, that’s not how it went though. I ended up staying in Norway and have been working with and for Qt ever since.
        Starting with Qt 1.0, Trolltech released the source code to Qt (at that time only for Linux/Unix), and the Open Source nature of Qt played a big part in its success. I’m very happy that we could continue on that path, by over time making all platforms Qt supports available as Open Source as well as moving over to more standard and freer licensing (first GPL, later LGPL).
        At the end of the Trolltech years, we started looking into how to make it easier for the community to contribute to Qt, and first had a model where our users could submit patches to us. That never really worked very well, and I’m really happy that we moved over to our current governance model in 2011. Since then Qt has truly been an Open Source project.
        When Qt got sold by Nokia in 2012, many people considered it a dead technology. But I and many of you believed in the technology, and together we’ve managed to turn this into a great success.
        As you all know, Qt is a dual licensed technology. That Qt has the backing of a commercial business behind it, is what made the required investments possible to keep the technology competitive.
        I’m extremely proud of what we achieved with Qt over the last 10 years. It happened because everybody on this list put in a lot of work into making Qt one of the best development frameworks on this planet.
        Qt is something that I care deeply about. I’ve been with it all the way and through all the ups and downs from when Trolltech got its first larger investment to now. But seeing what you all are doing, I know it’s in very good hands moving forward.

        Leaving The Qt Company and in the future spending most of my time outside the Qt ecosystem has been a difficult decision. But in the end, after those 25 years, it does feel very much like the right decision for me. I want to try out something else.
        So I will be joining a small Norwegian startup with one of the founders of Trolltech. While still in Software, it’ll be something rather different, not related to C++ or developer tools.

  • Leftovers

    • TediumCheapTickets.com History: A Failed Aviation Exec’s Hail-Mary Pass

      If you read up on the history of major startup air-based services like Federal Express or Southwest Airlines, you generally are aware of the story arc—at some point early in the airline’s life, before regulators got out of the way and allowed these businesses to soar, executives had to get creative to ensure that they were able to continue service with limited budgets and equipment. In the case of Southwest, it involved utilizing a “10-minute turn” to allow three planes to be used instead of four; with FedEx, founder Fred Smith literally gambled the last $5,000 the company had in Las Vegas to keep the company afloat. In both these cases, I naturally wonder—well, was there anyone else who won the airline deregulation lottery? And that led me to the story of an online travel website you’ve probably used many times, but had no idea it had roots in the analog age. Today’s Tedium tells the story of Cheap Tickets, and the unusual state of affairs that led to its existence.

    • Linux Foundation

      • Linux Foundation’s Site/BlogAnnouncing the World of Open Source: 2022 Europe Spotlight Survey [Ed: No, Linux Foundation (LF) does not speak for “Open Source” and for “Linux”. It speaks for Facebook, VMware, Microsoft etc. Linux Foundation (LF) is fast becoming little more than a pest and leech borrowed — by money — by enemies of Linux to discredit, badmouth, undermine Linux. Linux Foundation is a big bunch of overpaid buzzword slingers bossing and misrepresenting actual geeks.]

        Open source is a global phenomenon impacting all industries in all parts of the world. To better understand the regional dynamics of open source, Linux Foundation Research is conducting a series of new research projects under the World of Open Source umbrella to explore the state of open source, beginning with a European perspective, focusing on government, enterprise, and non-profit initiatives.

      • Techstrong GroupPrometheus Associate Certification will Demonstrate Ability to Monitor Infrastructure [Ed: The ‘Linux’ Foundation is pushing outright spam into Web sites for its ‘diploma mills’ (see bottom); Linux Foundation emulates Microsoft, including the calling of marketing “research” (because it sounds more professional)]
    • Security

      • LWNSecurity updates for Wednesday [LWN.net]

        Security updates have been issued by Debian (elog, needrestart, openssl, and waitress), Fedora (curl, libxml2, slurm, and vim), Scientific Linux (zlib), SUSE (e2fsprogs, nodejs10, php72, and thunderbird), and Ubuntu (apport, clamav, needrestart, and pcre3).

      • Bruce SchneieriPhone Malware that Operates Even When the Phone Is Turned Off

        The research is fascinating, but the attack isn’t really feasible. It requires a jailbroken phone, which is hard to pull off in an adversarial setting.

      • USCERTThreat Actors Exploiting F5 BIG IP CVE-2022-1388

        CISA and the Multi-State Information Sharing and Analysis Center (MS-ISAC) have released the joint Cybersecurity Advisory Threat Actors Exploiting F5 BIG-IP CVE-2022-1388 in response to active exploitation of CVE-2022-1388, which affects F5 Networks BIG-IP devices. The vulnerability allows an unauthenticated actor to gain control of affected systems via the management port or self-IP addresses.

      • Surfshark Launches Linux App With Graphical User Interface

        And it isn’t all bad news: there are lots of other features including access to Surfshark’s list of MultiHop routes, WireGuard, DNS leak protection and CleanWeb (an ad-blocker).

        There’s also a tray menu with a quick-connect option and a list of three servers.

      • Naked SecurityPwn2Own hacking schedule released – Windows and Linux are top targets

        The 2022 edition of the famous (or infamous, depending on your viewpoint) Pwn2Own competition kicks off later today in Vancouver, British Columbia.

      • How to Spot the Warning Signs of Ransomware Attacks [Ed: Predominantly a Windows problem, based on the data]

        Learning the early signs of ransomware infection can help you detect an attack in the early stages. Here’s what to look out for on your IT systems.

      • Privacy/Surveillance

        • AccessNowHuman rights leaders at Davos 2022: spyware is a weapon — PRESS CONFERENCE – Access Now

          Surveillance technology is being weaponized to commit gross human rights violations across the globe. Scaling up their operations in the dark, developers like NSO Group (the company behind Pegasus) make their fortunes supplying this dangerous tech to governments seeking to intimidate and silence dissenting voices, undermine trust in digital systems, and expand their arsenal for digital authoritarianism.

    • Civil Rights/Policing

      • AccessNowCongratulations, Fanny Hidvégi! Access Now’s Europe Policy and Advocacy Director a POLITICO Europe tech Visionary [Ed: POLITICO is oligarchy owned. Is this a badge of honour?]

        Access Now congratulates Fanny Hidvégi, Europe Policy and Advocacy Director, who was today included in POLITICO Europe’s annual ranking of the 28 power players behind Europe’s tech revolution. The long-term advocate for human rights in the digital age was named a Visionary — a title hard fought for, and very much deserved.

        “Access Now is delighted to see Fanny Hidvégi being recognised by POLITICO Europe and others as the tech changemaker — Visionary — she is,” said Brett Solomon, Executive Director at Access Now. “Fanny and the whole team have spearheaded the fight for digital rights across Europe, laying the foundations for a safer, more open, and fairer future.”

        [...]

        Fanny has previously taken part in the Obama Foundation’s Europe Leaders program, was a member of the European Commission’s High Level Expert Group on Artificial Intelligence, and is a board member of the Hungarian Civil Liberties Union.

      • PoliticoFanny Hidvégi

        Since taking charge of Access Now in 2016, Fanny Hidvegi has honed the NGO into one of the most effective digital rights outfits in town. Despite being a relative newcomer — Access Now was founded in 2009 — the advocacy group enjoys the same kind of access as its more storied civil society brethren. Indeed, its relative youth has perhaps been to its advantage: As tech behemoths have come to dominate the digital policymaking narrative in Brussels, the startup NGO with roots on the U.S. West Coast has perhaps been well-placed to do battle with companies that promise to “move fast and break things.”

      • Al JazeeraActivist Alaa Abdel Fattah’s health worsens in Egyptian prison

        Egypt’s human rights body calls for the activist’s transfer to a better facility, as Abdel Fattah’s family calls for his release.

    • Internet Policy/Net Neutrality

      • A Hypothetical Capitalist Invasion of Geminispace

        Y’know, Geminispace probably won’t be free of ads forever. Assuming we don’t abolish capitalism within the next few years, eventually someone is gonna pay someone else to shill their stuff on their gemlog. It’s just gonna happen.

        Gemini does, however, seem like it’ll be uniquely resistant to capitalist invasion. Off the top of my head, here are a few possible ways it might go.

      • Scrawlspace

        Is having deeper and meaningful internet friendships the best use of your time, compared to deepening other relationships that might be available to you?

      • Re: I kind or resent blogs

        is it? there isn’t really a built-in mechanism through which you would be made aware whether your work is being noticed or not, and that’s by design. I don’t know how common this is, but I don’t find it to require much effort to keep up with everything that shows up on the main CAPCOM/spacewalk instances so I keep up with it regularly.

    • Digital Restrictions (DRM)

Jim Zemlin’s Wife is Funded by Puppies (Microsoft)

Posted in Deception, GNU/Linux, Microsoft at 5:58 am by Dr. Roy Schestowitz

2011 quote:

'I think we just don't care that much [about Microsoft] anymore ... They used to be our big rival, but now it's kind of like kicking a puppy.'  - Jim Zemlin

It pays off to shine the shoes of moneyed interests (no need to code anything or actually use Linux):

salaries-lf

Summary: Jim Zemlin — like his wife — is bagging millions from Microsoft, but that’s clearly a conflict of interest for the Linux Foundation

Links 18/05/2022: More Defections From WordPress to Gemini

Posted in News Roundup at 5:24 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Instructionals/Technical

      • Lawrence TrattUsing a “Proper” Camera as a Webcam

        Fortunately there is a solution: you can use a “proper” camera, of the sort you associate with earnest tourists, as a webcam. In particular, most modern mirrorless cameras from the last few years can do an excellent job if you know what you’re doing.

        To give you an idea of the difference, here’s the output of the most widely used webcam, the Logitech C920, and the Fujifilm X-S10 I use as a webcam: [...]

      • uni TorontoThe idea of hierarchical filesystems doesn’t feel like an API to me

        If you say that the filesystem is an API, I feel that you’re saying about as much as if you said that the web (as an idea and a general thing) is an API (which is true but in a very broad, architecture astronaut way). The filesystem being an API is pretty much the idea that you can use a commonly agreed on hierarchical namespace to communicate between programs, and between people and programs.

        One place where this matters is if people aspire for other, more concrete APIs to become as broadly adopted and available as the filesystem “API”. I feel that that would require people transforming those more concrete APIs into something more or less as broad, encompassing, and general as the idea of filesystems. For many things that people want to be broad APIs, I tend to not see any obvious path for that to happen because there doesn’t seem to be a level between a broad idea and a concrete API.

      • Geshan10 useful Docker commands to get things done with a real-life example

        Docker packages software applications into containers making them easy to build, test, and ship (deploy). In this post we will look into some useful docker commands you should know about with real-life examples. Let’s get rolling!

      • How to create a Linux Mint USB drive with persistence | FOSS Linux

        A Live USB is a Linux USB with no persistent storage typically used to replace the previous operating system on the hard disk (either Linux or Windows) with a newer version of the Linux operating system. With a Live USB, you may boot up a computer and do tasks such as installing programs, storing data, and changing settings. However, if you restart your computer, all the changes you made using the Live USB will be lost.

        What if you need to continue working and pick up where you left off on a Linux Mint Live USB drive? Introducing the Linux Mint Live USB with persistent storage.

      • Linux Shell TipsHow to Find Network MAC Address in Linux System

        The term MAC Address is a derived abbreviation for Media Access Control Address. The network interface controller (NIC) uses the MAC address as its assigned unique identifier within an existing network segment.

        To practically relate to or understand what a MAC address is, think of it as the postal or physical address to a house. The house in this case is the network interface controller (NIC).

      • How to Install Graylog Log Management Tool on RHEL Systems

        Graylog is an industry-leading opensource log management solution for collecting, storing, indexing, and analyzing real-time data from applications and a myriad of devices in IT infrastructures such as servers, routers, and firewalls.

        Graylog helps you gain more insights into the data collected by combining multiple searches for detailed analysis and reporting. It also detects threats and possible nefarious activity by conducting a deep analysis of the logs from remote sources.

      • Boot Into Rescue Mode Or Emergency Mode In Ubuntu – OSTechNix

        This tutorial explains how to boot into rescue mode or emergency mode in Ubuntu 22.04, 20.04 and 18.04 LTS editions.

        As you might already know, Runlevels are replaced with Systemd targets in many Linux distributions such as RHEL 7 / RHEL 8 and Ubuntu 16.04 LTS and newer versions. For more details about runlevels and systemd target, refer to this guide.

        This guide is specifically written for Ubuntu, however the steps given below should work on most Linux distributions that use Systemd as the default service manager.

        Before getting into the topic, let us have a brief understanding about what is rescue mode and emergency mode and what is the purpose of these both modes.

      • ID RootHow To Install Mate Desktop on Manjaro 21 – idroot

        In this tutorial, we will show you how to install Mate Desktop on Manjaro 21. For those of you who didn’t know, MATE is a free and open-source desktop environment that is compatible with a variety of Linux distributions. It provides an intuitive and attractive desktop environment using traditional metaphors for Linux and other Unix-like operating systems. MATE is a successor to GNOME 2 and an alternative to GNOME 3 shell.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Mate desktop environment on a Manjaro 21.

      • Red Hat OfficialHow to find and interpret system log files on Linux | Enable Sysadmin

        Log files and journals are important to a system administrator’s work. They reveal a great deal of information about a system and are instrumental during troubleshooting and auditing.

        Log files contain events and messages generated by the kernel, applications, and users that log into the system.

    • Games

      • Core Keeper

        Recently I started playing the game Core Keeper on my laptop, which is an early access game on Steam. As a testament to how good of a game it is, I ended up playing it a lot more than I was expecting to, so now who knows how much time I’ve wasted on it.

  • Distributions and Operating Systems

    • BSD

      • TuMFatigOpenBSD on Partaker H2 I5 1135G7

        The Partaker H2 is a kind of Protectli FW6D clone on steroids ; at least when it comes to the 11th Gen Intel CPU. The overall systems are quite similar according to the sheet specs. And the Partaker runs OpenBSD really nicely.

    • Open Hardware/Modding

      • Ken ShirriffTalking with the Moon: Inside Apollo’s premodulation processor

        The Apollo missions to the Moon required complex hardware to communicate between Earth and the spacecraft, sending radio signals over hundreds of thousands of miles. The premodulation processor was a key component of this system, combining voice, scientific data, TV, and telemetry for transmission to Earth.1 It was built from components that were welded together and tightly packed into a 14.5-pound box.2 In this blog post, I look inside the premodulation processor, examine its construction, and describe how each module worked.

      • TalospaceAOSC For Old And New POWER

        Another choice in OpenPOWER distros, but with another choice for old-school 32-bit PowerPC, too. AOSC/OS (short for “Anthon Open Source Community”) is an Debian (formerly OpenSUSE) derivative claiming to have a wide variety of packages and good port parity at the cost of larger space and a generally manual installation process. The desktop experience is KDE, though a server version is also available. Support for POWER8 and up is listed as “experimental” but is available for download, and most packages appear available to ppc64le.

  • Free, Libre, and Open Source Software

    • Web Browsers

      • James GDistributed polls on your personal website

        While I like the idea of a third-party service offering this logic, I am more interested in seeing how I could do it on my website.

      • Andre Alves GarziaOld-school blogging, retro computers, and decentralisation

        I don’t believe that the Web is the best solution for having feed readers and blogging clients everywhere. It is for sure the easiest, as long as the device you’re using has modern web browser, you’re good to go. I’ve never used a Web interface that was better than a good native interface. Of course there are crap native apps that compare poorly to well-crafted Web applications, I’m not saying that all native apps are better than Web apps, I’m saying that given both a very good Web interface and a very good native interface, that I usually prefer the native one.

      • Zach FlowerHow To Completely Disable Your Favicon

        So, we can’t omit the favicon, and we can’t use an arbitrary character… what can we do?

        After a little bit of digging, I came across a concept that most web developers are fairly familiar with: Data URLs.

      • Michael Stapelberg25 Gbit/s HTTP and HTTPS download speeds

        Now that I recently upgraded my internet connection to 25 Gbit/s, I was curious how hard or easy it is to download files via HTTP and HTTPS over a 25 Gbit/s link. I don’t have another 25 Gbit/s connected machine other than my router, so I decided to build a little lab for tests like these 🧑‍🔬

    • SaaS/Back End/Databases

      • Red HatA SaaS architectural checklist for Kubernetes

        This is the first in a series of articles about building and deploying software as a service (SaaS) applications, which will focus on software and deployment architectures. The topics the series will cover can be used as the basis for a checklist for SaaS architecture.

        [...]

        From the end users’ perspective, the defining characteristic of a SaaS application is that it’s on-demand software typically delivered through the web, so the users only need a browser or mobile device to access it. The provider of the SaaS application manages all the software and infrastructure needed to deliver the application service to the consumers of the application.

        SaaS applications are economically attractive because the development, infrastructure, and support costs are shared by multiple customers of the service. Consumers can start using the application without capital expenditures or waiting for the software to be installed. Subscription-based pricing lowers the risk for consumers, which results in shortened sales cycles for SaaS providers. The recurring revenue stream from subscriptions can be invested into the application to grow market share.

      • Matt RickardSQLite Renaissance

        It seems like SQLite has shown up in more places everywhere you look.

        SQLite is an implementation of a SQL database engine as a C-language library. That means SQLite can be embedded into binaries, run in the browser, on edge devices, or anywhere else.

    • GNU Projects

      • GNUThe History of GNU

        It was at this conference that Richard Stallman first publicly and explicitly stated the idea that all software should be free, and makes it clear that “free” refers to freedom, not price, by saying that software should be freely accessible to everyone. This was probably the first time he made that distinction to the public.

        Stallman continues by explaining why it is wrong to agree to accept a program on condition of not sharing it with others. So what can one say about a business based on developing nonfree software and luring others into accepting that condition? Such things are bad for society and shouldn’t be done at all. (In later years he used stronger condemnation.)

    • Programming/Development

      • Monzo Bank LimitedHow we deploy to production over 100 times a day

        Our success relies on us rapidly shipping new features to customers. This tight feedback loop helps us quickly validate our ideas. We can double down on the ideas that are working, and fail fast if we need to.

        To achieve this rapid release cadence, we’ve optimised our engineering culture, tooling, and architecture to make the path from idea to production as frictionless as possible, all without sacrificing safety. We believe our approach gets us the best of both worlds: less friction encourages smaller changes, and smaller changes are less risky.

      • RlangSemantic HTML and Shiny Applications

        A couple of weeks ago I was looking around for different CSS frameworks to play around with, and came across Semantic HTML (not to be confused with Semantic UI) and I’m hooked! There are several “classless CSS frameworks” that are implemented under the ideology of Semantic HTML: styling of elements (e.g. height and colour) is applied to the HTML tags rather than classes, meaning that the HTML is less of a sea of

        and tags with 6 or 7 classes, and more of a wider range of HTML tags that better explain what is contained in the web page.

      • Matt RickardThe Problem of Sharing Code

        Programs today are often a Frankenstein combination of different open-source libraries. I’ve spent a lot of time thinking about how to manage all of the dependencies (see Reflections on 10,000 Hours of Programming). How code gets used and reused should be important for developer productivity optimizers.

        Some layers I think about when thinking about sharing code.

      • Nikita ProkopovIdeas for Clojure Network Eval API

        Since I am also a tool maintainer AND my tool works with nREPL, I thought I share my ideas here.

      • ButtondownCodebases as communication

        Conventionally we communicate programming ideas with talks, papers, and blog posts. But we can also communicate ideas with entire codebases. If someone finds a security exploit, she’ll sometimes publish a proof of concept to prove the exploit isn’t just theoretical.

        Now let’s say the exploit PoC comes with a ton of command-line flags: verbose mode, configuration options, output formats, the whole works. Now the writer is communicating something subtly different: not just that the exploit exists, but she wants you to experiment with it. She’s making it as easy as possible for you to play with the exploit yourself and come up with variations and consequences.

        This makes codebases like any other kind of communication medium. There are different styles you can use to say subtly different things. There are also different “genres”, or overt things you use the codebase to say. Some examples: [...]

      • Ted Unangstparallel tree running

        We want to walk a tree in parallel. We don’t know how big or deep it is. We will discover new nodes of unknown branchiness as we go. As we progress, we will end up performing two types of work. Sometimes we find a directory and recurse deeper. Sometimes we find a file and have to count the lines.

      • Geeks For GeeksMaximum Path sum in a N-ary Tree

        Given an undirected tree with N nodes numbered from 1 to N and an array A[] where A[i] denotes the value assigned to (i+1)th node. The connections between the nodes are provided in a 2-dimensional array edges[]. The task is to find the maximum path sum between any two nodes. (Both the nodes can be the same also).

      • EarthlyGrpc, AWS Lambdas and GoLang

        The reason why none of this works, is that although you can make an HTTP/2 connection with AWS’s API Gateway, the API Gateway won’t call the lambda over HTTP/2, it will use HTTP/1.1. It seems like this should be easy to overcome, but my understanding is that GRPC is heavily integrated with HTTP/2.

        What you’d need is a different wire protocol than GRPC if you wanted to work over HTTP/1.1 and this protocol does exists. It’s called GRPC-Web. Unfortunately, the GRPC-Web clients seems to be limited to JavaScript and TypeScript. There is a Golang client but the “IMPLEMENTATION IS LACKING”. So, unless I missed something, its not possible to run a GRPC service on an AWS Lambda. GRPCWeb is a good compromise if you clients are going to written in JavaScript or if more GRPCWeb clients start appearing. Otherwise you’re probably going to end up with REST or not using Lambdas.

      • Eric BaileyThe optics of pair programming

        If you are not familiar, pair programming (pairing) is the practice of collaborating directly with another person to work on a problem. You’ll often hear it in development contexts, but I’ve also encountered it with design.

        In the Before Times, we paired by walking over to a coworker’s computer, sitting next to them, and talking through the problem as they worked on it. Nowadays, it is (hopefully) remote screen sharing.

      • Tim BrayGolang Diaries: Generics

        Why generics? · Quamina is all about building and running finite automata. To do this you need a table-like data structure that represents states and the transitions between them. Quamina uses both deterministic and non-deterministic finite automata, DFAs and NFAs for short. The only real difference is that a transition from a DFA state is always to one other state; in an NFA you can have transitions to multiple others, in practice to a list of states.

      • Trail Of BitsInteractive decompilation with rellic-xref

        Rellic is a framework for analyzing and decompiling LLVM modules into C code, implementing the concepts described in the original paper presenting the Dream decompiler and its successor, Dream++. It recently made an appearance on this blog when I presented rellic-headergen, a tool for extracting debug metadata from LLVM modules and turning them into compilable C header files. In this post, I am presenting a tool I developed for exploring the relationship between the original LLVM module and its decompiled C version: rellic-xref.

      • Enterprisers ProjectHow to evolve a developer’s role to address DevSecOps

        As more organizations rely on a cloud-native approach, they need to take the appropriate steps to secure the software delivery lifecycle. DevSecOps creates a culture of security across the entire organization to better address security vulnerabilities – and there’s no better time to adopt this approach than now. In the first quarter of 2022, data breaches increased 14 percent compared to the first quarter of 2021.

      • Python

        • uni TorontoPython programs as wrappers versus filters of other Unix programs

          One reason I reach for the filter approach is if I have a certain amount of logic that’s most easily expressed in a shell script, for example selecting what disks to report SMART data on and then iterating over them. Shell scripts make expanding file name glob patterns very easy; Python requires more work for this. I have to admit that how the idea evolved also plays a role; if I started out thinking I had a simple job of reformatting output that could be done entirely in a shell script, I’m most likely to write the Python as a filter that drops into it, rather than throw the shell script away and write a Python wrapper. Things that start out clearly complex from the start are more likely to be a Python wrapper instead of a filter used by a shell script.

  • Leftovers

    • Counter PunchThe Height of Folly: Safeboxes in the Sky
    • Jim NielsenPrinciples of Color? Going Beyond sRGB

      There’s a revolution happening in color. Craig wrote about its coming years ago on the Iconfactory blog. He pointed out how, thanks to innovations like the Retina Display, screens could no longer improve by getting denser. Our biology as humans became the limiting factor because pixel density beyond a certain point can’t be perceived by our eyes and therefore provides no additional value. Therefore the only way for display makers to improve screens (and gain a competitive advantage) is to make them “deeper” by showing a wider range of color. Enter the new color gamuts we’re seeing like Display P3. Here’s Craig: [...]

    • Gustaf EriksonPSA: unmaintained project channels on Freenode automatically redirect to #freenode

      If the channel is not maintained, try checking the project’s homepage for their IRC presence. It’s usually under the “Community” section.

    • HackadayWhen Hams Helped Polar Researchers Come In From The Cold

      We always enjoy [The History Guy] videos, although many of them aren’t much about technology. However, when he does cover tech topics, he does it well and his recent video on how ham radio operators assisted in operation Deep Freeze is a great example. You can watch the video, below.

    • Science

      • HackadayNanovolt Meter Requires Careful Design For Accuracy’s Sake

        Measuring voltages is fairly straightforward most of the time. Simply grab any old cheap multimeter, hook up the probes, and read off the answer. If, however, you need to measure very tiny voltages, the problem gets more complex. [Jaromir-Sukuba] designed a nanovoltmeter specifically to deal with this difficult case.

      • HackadayBook Teaches Gaming Math

        If we knew how much math goes into writing a video game, we might have paid more attention in math class. If you need a refresher, [Fletcher Dunn] and [Ian Parbery] have their book “3D Math Primer for Graphics and Game Development” available free online. The book was originally a paper book from 2011 with a 2002 first edition but those are out of print now. However, math is math, so regardless of the age of the book, it is worth a look. For now, the online version is a bunch of web pages, but we hear a PDF or E-reader version is forthcoming.

    • Education

      • Zach FlowerMy Favorite Coding Interview Exercise

        In this session, you pair up an engineer with a candidate for an hour and a half and give them a project to work on together. This isn’t an exercise where the candidate is forced to write code on a whiteboard while the engineer evaluates them, but instead one where they actually work on the solution together on a real live computer.

      • Thorsten BallProfessional Programming: The First 10 Years

        The following is a loose, unordered collection of thoughts that come up when I look back on the past 10 years. Things I’ve learned, things I’ve unlearned, things I’ve changed my opinion on, things I never thought I’d believe in and now do.

    • Hardware

      • HackadayLED Backlight Brings Vibrant Colors To Classic Palm PDAs

        Back in the days before the widespread adoption of smartphones, Palm was the market leader in PDAs. If you had one of those you’ll probably remember taking notes by writing those funky “Graffiti” characters and tapping your stylus onto, usually, a green monochrome screen. Some models even came with a battery-hungry backlight, but for the ultimate display experience you had to buy the Palm IIIc that came with a backlit full-colour display.

      • HackadayFalling Down The Labyrinth With Wooden Microphone Design

        It used to be that when we featured one of [Frank Olson]’s DIY ribbon microphone builds, it was natural to focus on the fact that he was building them almost exclusively from wood. But despite how counterintuitive it may seem, and for as many comments as we get that his microphones shouldn’t work without metal in the ribbon motors, microphones like this wooden RCA Model 77 reproduction both look and sound great.

    • Health/Nutrition/Agriculture

      • The NationThe Pandemic Revealed America’s Deeper Sickness

        Last month, not long after Florida federal judge Kathryn Kimball Mizelle ruled that the transportation mask mandate was illegal, I flew from New York City to Miami. Videos of airplane passengers in midflight ripping off their masks and cheering with joy had already gone viral following the judge’s ruling.

      • Digital Hygiene

        Lately I’ve grown concerned with how social media affects me. In particular, modern social media, where the content you see is determined algorithmically, has become worrisome to me. I’ve come to believe it’s a drag on my mental, emotional, and intellectual health…

    • Proprietary

      • Kev QuirkAirPods Pro – 1 Week Later

        Yep, that’s right. I got rid of them after 24 hours. After jotting down my first impressions, I was on the fence about them, especially since they cost nearly £200.

        They seemed okay overall, but for £200, I was expecting more.

      • [Old] VaronisHive Ransomware Analysis [iophk: Windows TCO]

        First observed in June 2021, Hive is an affiliate-based ransomware variant used by cybercriminals to conduct ransomware attacks against healthcare facilities, nonprofits, retailers, energy providers, and other sectors worldwide. Hive is built for distribution in a Ransomware-as-a-service model that enables affiliates to utilize it as desired.

      • [Old] Heimdal SecurityMicrosoft Exchange Servers Targeted by Hive Ransomware: The Attack Explained. [iophk: Windows TCO]

        A Hive ransomware affiliate has been deploying multiple backdoors, including the Cobalt Strike beacon, on Microsoft Exchange servers that are vulnerable to ProxyShell security issues.

      • Bank of ZambiaPress Statement: Disruption of IT Service to the Public [PDF]
    • Security

      • Privacy/Surveillance

        • IdiomdrottningWhen the EU wanted to own all computers

          The only way to prevent FOSS e2ee like Matrix or PGP or OMEMO is to own everyone’s uid zero.

          Owning everyone’s uid zero is not OK for a hundred ripple effects. Passwords, finance, love letters, computational resources…

        • New York TimesYour Bosses Could Have a File on You, and They May Misinterpret It

          But corporations are moving forward with their own software-enhanced surveillance. While private-sector workers may not be subjected to the rigors of a 136-page clearance form, private companies help build these “continuous vetting” technologies for the federal government, said Lindy Kyzer of ClearanceJobs. Then, she adds, “Any solution would have private-sector applications.”

        • Counter PunchCrime Begets Crime, ICE Edition

          The part you should find disturbing: “ICE [Immigration and Customs Enforcement]  has created a surveillance infrastructure that enables it to pull detailed dossiers on nearly anyone, seemingly at any time. In its efforts to arrest and deport, ICE has — without any judicial, legislative or public oversight — reached into datasets containing personal information about the vast majority of people living in the U.S.”

          The part you shouldn’t find surprising: “ICE has created a surveillance infrastructure that enables it to pull detailed dossiers on nearly anyone, seemingly at any time. In its efforts to arrest and deport, ICE has — without any judicial, legislative or public oversight — reached into datasets containing personal information about the vast majority of people living in the U.S.”

        • Counter PunchRogues and Spyware: Pegasus Strikes Again

          Pegasus spyware, the fiendishly effective creation of Israel’s unscrupulous NSO Group, has become something of a regular in the news cycles on cyber security.  Created in 2010, it was the brainchild of three engineers who had cut their teeth working for the cyber outfit Unit 8200 of the Israeli Defence Forces: Niv Carmi, Shalev Hulio and Omri Lavie.

          NSO found itself at the vanguard of an Israeli charm offensive, regularly hosting officials from Mossad at its headquarters in Herzliya in the company of delegations from African and Arab countries.  Cyber capabilities would be one way of getting into their good books.

    • Defence/Aggression

      • ProtothemaNew provocation at Hagia Sophia – Muslim students recite Quran passages

        At a ceremony, 35 students of a religious school dressed in white recited the Quran at the UNESCO World Heritage Site which was converted into an Islamic Mosque.

      • MedforthSwitzerland: Despite conviction for plotting attacks and despite deportation, an Iraqi Islamist gives Koran lessons to children in a mosque

        The teacher was arrested in 2014. Among other things, he was accused of planning attacks, spreading propaganda and being a member of IS. In 2016, the Federal Criminal Court sentenced him to 4 years and 8 months in prison for membership of a criminal organisation. The Federal Police ordered his deportation, combined with an indefinite ban on entering Switzerland. Nevertheless, this Iraqi remains in Switzerland, as he could face torture and death in his home country. […]

      • Counter PunchDouble-Standards at the UN Human Rights Council

        Back in 2006 the Commission on Human Rights, which had been established in 1946, adopted the Universal Declaration of Human Rights and numerous human rights treaties, and established the system of rapporteurs, was abolished. At the time I was surprised by rationale of the General Assembly, because the reason adduced was the “politicization” of the Commission. The US unsuccessfully lobbied for the creation of a smaller commission composed only of countries that observed human rights and could pass judgment over the rest.  As it turned out, the GA established a new body of 47 member States, the Human Rights Council, which, as any observer will confirm, iseven more politicized and less objective than its maligned predecessor.

        The special session of the HR Council held in Geneva on 12 May on the Ukraine war was a particularly painful event, marred by xenophobic statements in violation of article 20 of the International Covenant on Civil and Political Rights (ICCPR). Speakers employed a mean tone in demonizing Russia and Putin, while ignoring the war crimes committed by Ukraine since 2014, the Odessa massacre, the 8 year Ukrainian bombardment on the civilian population of Donetsk and Lugansk, etc..

      • Counter PunchCongress Approves 40 Billion Dollar Ukraine War Bill

        Rand Paul has never thought clearly about economics, and the relation between his morality and his partisan politics is not the subject of this column. No one needs a reminder that Rand Paul is an Ayn Randian “libertarian.” That is deadbeat and misses the crucial point in this timeline of events. Entirely. The brute fact remains that Rand at least raised the question of public accounting of a vast war budget. When there was a bipartisan stampede to approve the recent 40 billion dollar Ukraine war budget, his dissent was crucial in delaying automatic approval.

        The more pointed and timely question is why Bernie Sanders went AWOL, along with the entire Progressive Caucus in Congress. Whether any of them belong in any school of Marxism whatsoever is a side issue. What matters most is whether they pursue a practical policy of peace. Do they raise the ground floor of social democracy across public policies such as health care, housing, and education? Bipartisan war budgets that expand from year to year have the sure consequence of strip-mining public funds away from basic social goods and services.

      • The NationThe US Needs a Better Gun Policy. Democrats Can Make It Happen.

        The ongoing, seemingly inescapable gun violence crisis in the United States, most recently manifested in Saturday’s horrific massacre in Buffalo, poses a dire threat to our fragile democracy. And our government’s lack of response to it constitutes a major crisis in itself.

      • The NationThe “Brutal Solidarity” Between Buffalo and Palestine

        So we have been repeatedly faced with the cruel irony of watching Negro and white boys on TV screens as they kill and die together for a nation that has been unable to seat them together in the same schools. So we watch them in brutal solidarity burning the huts of a poor village, but we realize that they would never live on the same block in Detroit.

      • HungaryAccommodating Ukrainian refugees is as much work as running an Airbnb

        Taking refugees into one’s home is indeed a noble act, but there’s still rent to pay, laundry to wash, shopping to do, and cleaning to keep up with. Some individuals have started fundraising campaigns to finance the long-term housing of refugees because their expenses have skyrocketed. Meanwhile, in the UK, Poland, and Slovakia, state aid is available for those who are taking in Ukrainian refugees.

      • Counter PunchNo Victory Day: Dealing With Stalemates Across the Board

        France is in possession of the ball when something strange happens. A sudden fog descends upon the play. The fans stand up to see what’s happening on the court. They try to clear away the fog with their hands, but to no avail.

        When the fog finally clears a few frustrating minutes later, the game appears to be over. Players from both sides lie on the court, injured, some of them badly.

    • Environment

      • New York TimesCan You Even Call Deadly Heat ‘Extreme’ Anymore?

        Mercifully, according to the young science of “heat death,” air moisture is as important as temperature for triggering human mortality, and when thermometers hit 115 degrees Fahrenheit in India and 120 in Pakistan in April, the humidity was quite low. But even so, in parts of India, humidity was still high enough that if the day’s peak moisture had coincided with its peak heat, the combination would have produced “wet-bulb temperatures” — which integrate measures of both into a single figure — already at or past the limit for human survivability. Birds fell dead from the sky.

      • [Old] IPMG-SDGJust 100 companies responsible for 71% of global emissions, study says

        A relatively small number of fossil fuel producers and their investors could hold the key to tackling climate change

        Just 100 companies have been the source of more than 70% of the world’s greenhouse gas emissions since 1988, according to a new report.

      • [Old] Acciona S A100 companies are responsible for 71% of GHG emissions

        Just 100 of all the hundreds of thousands of companies in the world have been responsible for 71% of the global GHG emissions that cause global warming since 1998, according to The Carbon Majors Database, a report recently published by the Carbon Disclosure Project (CDP), throwing light on the role companies and investors play in tackling climate change.

        CDP is a non-profit organization dedicated to global disclosure of information to aid governments, companies and investors with managing their environmental impact. According to the study, since 1988, the year in which the Intergovernmental Panel on Climate Change (IPCC) was formed, over half of the world’s industrial emissions can be traced back to just 25 state companies and entities.

      • [Old] uni MassachusettsGreenhouse 100 Polluters Index (2021 Report, Based on 2019 Data)

        This edition of the Greenhouse 100 ranks companies by C02-equivalent greenhouse gas emissions (including CO2, methane, nitrous oxide, and fluorinated gases, but not biogenic CO2) directly released by large facilities in the US in 2019.

      • [Old] Fast CompanyIf 100 companies are responsible for 70% of emissions, what can you do?

        This is why the individual-versus-the-system action question is a false binary. We don’t need to do everything perfectly now. Many experts say to not let perfect be the enemy of good when it comes to climate action, or to obsess over their “environmental sins.” But system change and individual change do go hand in hand. “In the end, this is going to require decisions and changes in behavior of all of us, at every level of society,” Leiserowitz says. “Not just individuals—they can’t do it by themselves—but it’s also not just at the system level because, in the end, this is still a free society where people get to choose how they’re going to spend their money and their lives.”

      • [Old] AAASJust 90 companies are to blame for most climate change, this ‘carbon accountant’ says

        The results showed that nearly two-thirds of the major industrial greenhouse gas emissions (from fossil fuel use, methane leaks, and cement manufacture) originated in just 90 companies around the world, which either emitted the carbon themselves or supplied carbon ultimately released by consumers and industry. As Heede told The Guardian newspaper, you could take all the decision-makers and CEOs of these companies and fit them on a couple Greyhound buses.

      • The NationBiden’s Potential Next Climate Adviser Has Ties to Big Oil

        White House National Climate Advisor Gina McCarthy is reportedly preparing to step down from her position coordinating the Biden’s administration’s climate agenda sometime in the coming months. President Joe Biden tapped McCarthy, a former Environmental Protection Agency administrator, to serve in the cabinet-level position in 2020, hoping that his pick for the first-ever national climate adviser would reflect the urgency of the climate crisis. Though no official decision has been made, McCarthy’s deputy, Ali Zaidi, is widely expected to replace her.

      • The NationThe Many Moods

        Rachel Carson was a passionate and poetic writer, but she was not a particularly subtle one. When she set out to write a book, it did not end until the mountains had crumpled into the sea, all organisms dead or alive had vanished therein, and the form of life itself on Earth had been radically altered. Before Carson wrote her most influential book, Silent Spring, she wrote three thrilling books on the ocean’s creative power over all of life’s forms, each of them ending just this way.

      • Energy

        • HungarySzijjártó on the oil embargo: it’s either 15-18 billion euros or a green light for piped oil, otherwise our veto remains

          Hungary’s Foreign Minister Péter Szijjártó finally named the price of Hungary’s approval of the EU’s sixth sanctions package against Russia (which includes the ban of Russian oil and gas imports): 15-18 billion Euros. What is this sum about and what does it cover?

        • New York TimesCrashing Crypto: Is This Time Different?

          As it is, cryptocurrencies play almost no role in economic transactions other than speculation in crypto markets themselves. And if your answer is “give it time,” you should bear in mind that Bitcoin has been around since 2009, which makes it ancient by tech standards; Apple introduced the iPad in 2010. If crypto was going to replace conventional money as a medium of exchange — a means of payment — surely we should have seen some signs of that happening by now. Just try paying for your groceries or other everyday goods using Bitcoin. It’s nearly impossible.

        • [Old] uni YaleFossil Fuels Received $5.9 Trillion In Subsidies in 2020, Report Finds

          Coal, oil, and natural gas received $5.9 trillion in subsidies in 2020 — or roughly $11 million every minute — according to a new analysis from the International Monetary Fund.

          Explicit subsidies accounted for only 8 percent of the total. The remaining 92 percent were implicit subsidies, which took the form of tax breaks or, to a much larger degree, health and environmental damages that were not priced into the cost of fossil fuels, according to the analysis.

    • Finance

      • The NationCurrency Communion

        the first time i ever read the word God was on a piece of money

      • Counter PunchThe New Corporate Dictators – Super-Rich & Super-Immune

        John D. Rockefeller ruled the Standard Oil Company monopoly until the trust busters from Washington broke up its giant price-fixing and predatory practices into several companies.

        Andrew Carnegie was the ruler of the giant Carnegie Steel Company (which became U.S. Steel Corporation). Carnegie violently broke up strikes, such as the 1892 Homestead strike, before he left the company to be a major philanthropist building libraries and universities.

    • AstroTurf/Lobbying/Politics

      • uni StanfordThe End of Roe Will Bring About a Sea Change in the Encryption Debate

        The only reason there’s still any “debate” over encryption is because law enforcement refuses to let it drop. For over a quarter of a century, they’ve constantly insisted on the primacy of their interests. They demand to be centered in every discussion about encryption. They frame encryption as a danger to public safety and position themselves as having a monopoly on protecting public safety. They’ve insisted that all other considerations – cybersecurity, privacy, free expression, personal safety – must be made subordinate to their priorities. They expect everyone else to make trade-offs in the name of their interests but refuse to make trade-offs themselves. Nothing trumps the investigation of crime.

      • MITStrategic and Sequential Links between: Campaign Donations and Lobbying

        [...] We find that donations result in an 8 to 11 percentage point increase in the probability that the targeted politician engages in legislative activities related to the bills lobbied by the donating firm. The estimated effects are large, increase over time, and are particularly pronounced for committee-related activities.

      • CoryDoctorowAmy’s Kitchen, a case-study in the problems with consumerism

        But voting with your dollars has some obvious deficits. The first one is that you can’t shop your way out of monopoly capitalism. If you don’t like how Walmart’s predatory pricing and fat tax breaks let it drive every business in town out of business, you’re stuck. After all, every other business in town went bust, and you still need stuff.

        The next one is that dollars are not evenly distributed. In a country where most Americans can’t afford a $400 medical emergency, the flow of dollars to a business is no marker of democratic legitimacy. A million normies can boycott a business but if a billionaire shops there, their “votes” are washed away.

        There’s another defect, though, that’s a little less obvious. When you stop voting with your ballots and start voting with your dollars, then the companies that get your dollars can capture your political representatives (this is even easier if the company has a monopoly). Once the political system is on the company’s side, you lose the ability to vote with your dollars, too.

      • New York TimesElon Musk says Twitter deal ‘cannot move forward’ without more information.

        Mr. Musk, the world’s richest man, continued creating confusion around his $44 billion acquisition of Twitter on Tuesday, even as the social media company tried to keep the deal on course. Early in the morning, the billionaire tweeted that “this deal cannot move forward” until he got more details about the volume of spam and fake accounts on the platform.

      • Counter PunchWhat Russian Folklore Can Tell Us About Russia

        The extreme barbarism of the Russian invasion has led to greater Western military support for Ukraine as well as decreased focus on ending the fighting, enforcing a cease-fire, and arranging security guarantees for Russian and Ukraine. The international community is increasingly convinced that the United States is more interested in inflicting long-term damage on Russia than in securing a diplomatic resolution to the war.  While the Russian Army is preoccupied with tactical operations against a courageous Ukrainian military, Putin has had to deal with the prospect of war with the West, stemming from a Russian-American proxy war.

        The prospect of an expanded war demands greater caution on the part of Russian and American decision makers.  Before the North Atlantic Treaty Organization agrees to admit two additional members—Sweden and Finland—perhaps NATO should consider the long-term consequences of such a decision.  One way to get a handle on traditional Russian thinking is to examine Russian parables over the years, which point to Russian feelings of victimhood and a willingness to make sacrifices to defend the interests of the motherland.  The U.S. campaign of sanctions against Russia has seemingly had no impact on Putin’s thinking because he knows that Russians will respond valiantly and make sacrifices when faced with challenges.

      • Counter PunchIs Vladimir Putin Part of the Solution?

        But what if we choose to view him through a different prism? What if we said that the war cannot end without Putin’s participation in some solution? What if we envision some form of negotiation with him, remembering how International Committee of the Red Cross President Peter Maurer was criticized for meeting with and publicly shaking hands with Russian Foreign Secretary Sergei Lavrov in Moscow as if the Russian diplomat was a Covid-19 superspreader.

        Maurer was doing his job as the head of a neutral, independent organization. He must talk to all sides in a conflict; that’s his humanitarian role

      • Counter PunchTurkey Pushing Russia Out of Syria & Kazakhstan

        The latest developments, including: – Turkey moves to normalize with Assad government in Syria – Why Turkey needs Syria – The Kurdish question and the US – Turkey selling drones to Kazakhstan – The Russia-China-Turkey dynamic in Kazakhstan – Erdogan the opportunist – Turkey offers to evacuate wounded Ukrainian soldiers from Mariupol

      • Counter PunchThe Tripwire of Irish Borders

        He was referring to real physical trip wires attached to giant roadside bombs which made South Armagh the most dangerous place for British soldiers in the whole of Northern Ireland. This era has long gone and the 300-mile-long land border that snakes between the North and the Republic has ceased over the past 20 years to be a place of bombs and fortifications.

        But issues relating to the Irish border, the partition of Ireland, the Irish Sea trade border so disliked by unionists, are still political trip wires capable of detonating a small or large crises. Yet Conservative Party politicians have been extraordinarily cavalier about the way they deal with the Irish border, careless when Brexit in 2016 reopened the question of Irish Partition and uncaring again when Boris Johnson persuaded a credulous Democratic Unionist Party (DUP) that he would never allow a new sea border in the Irish Sea.

      • The NationThe Supreme Court Just Streamlined the Process for Bribing Senators

        Bribing members of Congress is generally thought of as a bad thing. That’s why there was widespread support for the Bipartisan Campaign Reform Act of 2002, which contained a provision specifically designed to crack down on corruption. The act set a cap on the amount of money a member of Congress can collect from special-interest donors to pay off personal debates that were accumulated while running for office.

      • The NationPortraits of Cowardice: SCOTUS Poised to Overturn Roe v. Wade
      • The NationTo the Hypocrite Go the Spoils

        McConnell managed to provide The votes to toss old Roe aside. Yes, Mitch knows how to play the game. It helps a lot to have no shame.

      • TechdirtPlayStation Boss Addresses Abortion Concerns From Staff With Jaunty Email About His Cats

        In the wake of the SCOTUS draft leak of a decision that would overturn Roe v. Wade, plenty of tech companies have begun scrambling to get public and internal messaging out. We recently discussed how game studio Bungie had put out a statement disagreeing with the draft ruling and committing to its own staff to give them the support it can on these matters of health. This approach is being mirrored all over the tech industry, and elsewhere, but it’s notable that Bungie is set to become a subsidiary of Sony’s in the very near future as a result of an acquisition. The reason that’s notable is because PlayStation chief Jim Ryan recently addressed his own internal staff on the SCOTUS leak and it’s… a something.

    • Censorship/Free Speech

      • MedforthAfter protest by Muslims: German school authority bans subject of forced marriage

        The reaction followed immediately – in the form of a series of apologies: Both the school management, the North-Rhine Westphalia Ministry of Education and the Cornelsen publishing house, publisher of the textbook, apologised for the “violation of freedom from discrimination”. The textbook publisher promised that the offensive task would no longer appear like this in the new edition. The Ministry of Education of North Rhine-Westphalia agreed to a proposal by the publisher in which the topic of forced marriage would no longer appear at all. But the authors of the book resisted and saw the open discourse about very real conflicts existing in society in danger.

      • Sahara ReportersBREAKING: Jihadists In Borno Plot To Kill Another Young Woman For Alleged Blasphemy, Post Death Threats On Facebook

        In the Borno episode, SaharaReporters learnt that the police had taken Naomi Goni into custody over the death threats by the Jihadists.

        Writing partly in Hausa, Tanko Izge said, “A message to Government of Borno State. Akwai wata yarinya me suna Naomi Goni wanda tayi batanci ga manzo Allah wanda hakan a musulunci kisa ne hukunci Ko da soho ne koda musulmi ne ya kafurta. Dan haka muna kira ga gwamnatin Borno tayi gaggawan daukan mataki inhar ba haka ba kuma mu musulmai baza muyi bacci ba kuma zamu dauka da kanmu (There is a girl named Naomi Goni who insulted the Messenger of Allah (saw) and in Islam it is a death sentence even if it is a Muslim. We therefore call on the Borno State Government to take immediate action or else we Muslims will not sleep and we will take action).”

        He made the post on his Facebook as seen by SaharaReporters.

      • Sahara ReportersThe Killing of Nigerian Christian Student Has Everything to Do With Religion By Leo Igwe

        The brutal killing of Ms. Yakubu is not an isolated incident. Many Muslims and non-Muslims adjudged to have insulted Islam or its prophet have suffered a similar fate in the region. In 2007, some Muslim students in Gombe lynched their female Christian teacher for desecrating the Quran. There have been other violent attacks and murders of alleged blasphemers in Muslim-dominated areas in Kano, Niger, and other parts of Islamic Northern Nigeria. Persons accused of blasphemy have been sentenced to death by sharia courts in Kano. Others like Nigerian Humanist, Mubarak Bala, have been given long prison sentences. Muslim clerics and state officials have openly and publicly endorsed the execution of blasphemers.

      • TechdirtTechdirt Podcast Episode 320: Elon Musk Doesn’t Understand Twitter

        It’s no secret that Elon Musk’s statements about his plans for Twitter have been confused to say the least. It has become abundantly clear that he doesn’t know much at all about how a service like Twitter operates, especially when it comes to content moderation, and doesn’t seem to have much interest in learning. On this week’s episode, we’re joined by Renee DiResta from the Stanford Internet Observatory to discuss just how little Elon Musk understands the platform he’s supposedly planning to buy.

      • Counter PunchAd Hoc Book Bans, a Shortcut to Civic Illiteracy

        Of these 1,568 challenges, 282 were submitted in February 2022 by a couple whose child attends an elementary school in McKinney Independent School District (ISD) in Texas. For each of the books they were challenging, the parents recorded the same exact complaint: “Contains 1 or more of the following: Marxism, incest, sexual explicit material—in written form and/or visual pictures, pornography, CRT, immoral activities, rebelliousness against parents, and the material contradicts the ISD’s student handbook.” Copy and paste. Two hundred and eighty-two times. Hit send.

        The parents reported that they found all the books they challenged in the “Krause List.” The mother claimed that they read them all. She described it as being an “unpleasant task” yet they were willing to do it to protect their child, as well as the 23,000 kids in McKinney ISD.

      • TechdirtNew Hampshire’s Top Court Says Section 230 Shields Retweeters From Defamation Lawsuit

        Section 230 isn’t just some unearned privilege enjoyed by tech companies to shield them from angry, incoherent lawsuits filed by banned white nationalists. It’s also for the little people, as Eric Goldman points out while bringing us this recent decision by the New Hampshire Supreme Court.

      • TechdirtFormer eBay Exec Last To Plead Guilty To Bizarre Pig Fetus Journalist Harassment Campaign

        Several years ago you might recall that a bunch of eBay executives were busted waging a bizarre harassment campaign against a blogging couple who had been critical of the company.

      • TechdirtAuthor Of Texas’ Social Media Law Admits That He Meant The Law To Exempt Any Moderation Decisions Protected By Section 230 (That’s Everything)

        Well, this is awkward. Yesterday I wrote about how there was a strong argument that Twitch’s removal of the mass murderer in Buffalo’s livestream of his murder spree violated Texas’s ridiculous social media law. The main saving grace for Twitch would be that it was possible (though it’s unclear) its userbase was just under the 50 million US average monthly users required to trigger the law. However, even if the law didn’t reach Twitch, it definitely reaches Facebook and Twitter, two other platforms that have been trying (and not always succeeding) to remove the video.

      • Frank Conversations

        I was was reading the recent discussion on deep conversation in Gemini Space. This reminded me of something I noted recently on my last trip to the US. I hadn’t been to the US in over five years while I was living in Iran. For the past decade or so the general attitude I held was the the United States seems to lack some kind of cohesion has a society, that in some way rather than living in a society were were just a bunch of people that happened to be living in the same location, but the basis of our lives was not human connection, but rather our jobs or something like that. (Material possessions, and so on.)

        [...]

        Judging by this aspect alone, it’s tempting to come to the conclusion that maybe the US is socially healthier than the other places I lived, but I have enough experience to know that this is clearly not the case. I don’t have an explanation for why Americans seem so open or eager to connect with other people. Is it actually a sign of some deeper societal dysfunction? Are Americans too lonely? Are these interpersonal interactions limited to the realm of superficiality and are a symptom of a lack of meaningful or satisfying relationships in one’s private life? I don’t know.

      • [Repeat] Re: More thoughts on sincere conversation

        i myself don’t seek the _elimination_ of all smalltalk, and i’m certainly willing to continue make the effort to engage in it for prosocial reasons, but given that i find it gets in the way of _really_ connecting with people, i prefer to minimise its presence in my life.

    • Civil Rights/Policing

      • TechdirtNew York Court Says Denying Access To A Lawyer Somehow Isn’t A Constitutional Violation

        If a shackled suspect asks to speak to a lawyer and this request is ignored, is that a violation of their rights? Cops — especially the ones in this case — would likely say “No.” Cops don’t consider themselves legal experts because having any legal expertise makes it more difficult to hassle people over imagined criminal acts.

      • [Old] GrantaViolence in Blue

        Americans are afraid of many threats to their lives – serial killers, crazed gunmen, gang bangers, and above all terrorists – but these threats are surprisingly unlikely.[1] Approximately three-quarters of all homicide victims in America are killed by someone they know.[2] And the real threat from strangers is quite different from what most fear: one-third of all Americans killed by strangers are killed by police.

      • GannetWhy this Montclair teacher has kept an empty chair in his classroom for 52 years

        When Daniel Gill was 9 years old, he was invited to a birthday party in his apartment building in Manhattan’s Washington Heights. He brought his best friend, Archie, and they rang the bell, holding wrapped presents.

        The mom opened the door, and her gaze fell on Archie, who is Black.

        “We have no more chairs,” she said.

      • France24‘I will not wear the burqa’: Some Afghan women defy Taliban edict

        The Taliban earlier this month issued a decree urging women to stay home and ordering those who have to go out to cover their faces with a burqa. But a few brave Afghan women have vowed to defy the restrictive edict.

    • Gemini

      • My site is a Gemini capsule now

        I have replaced my WordPress site, pretty as it was, with a Gemini capsule.

        If you’re reading this on a standard web browser through HTTPS, you’re actually seeing my Gemini capsule. The server I chose, twins, automatically serves HTTPS on the same port it accepts Gemini requests. Then I just have to direct nginx as a proxy, and bam. Static website for free with my capsule.

      • Gemini is Magick

        The Tech Learning Collective offers a series of excellent free foundation courses/lessons in basic Linux sysadminning. The very first lesson is a magickal ritual designed to enchant your device with a vision of a better technological future.

      • I’m a Scrub

        Today I tried to add Titan support to the Gemini server I’m using, Twins. It seemed like a great project to pick up. “Oh,” I said to myself, “Oh the protocols for Gemini and Titan are so siiimple! I can totally do this without too much trouble, and maybe even learn something along the way.”

    • Digital Restrictions (DRM)

      • HackadayKindle, EPUB, And Amazon’s Love Of Reinventing Wheels

        Last last month, a post from the relatively obscure Good e-Reader claimed that Amazon would finally allow the Kindle to read EPUB files. The story was picked up by all the major tech sites, and for a time, there was much rejoicing. After all, it was a feature that owners have been asking for since the Kindle was first released in 2007. But rather than supporting the open eBook format, Amazon had always insisted in coming up with their own proprietary formats to use on their readers. Accordingly, many users have turned to third party programs which can reliably convert their personal libraries over to whatever Amazon format their particular Kindle is most compatible with.

    • Monopolies

      • Copyrights

        • [Old] Rick FalkvingeCynicism Redefined: Why The Copyright Lobby Loves Child Porn

          “Child pornography is great,” the man said enthusiastically. “Politicians do not understand file sharing, but they understand child pornography, and they want to filter that to score points with the public. Once we get them to filter child pornography, we can get them to extend the block to file sharing.”

Links 18/05/2022: PikaScript and cURL’s Annual User Survey

Posted in News Roundup at 2:16 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • ByteXD13 Compelling Reasons Why People Use Linux – ByteXD

        Linux is an operating system that has gained more and more space in the datacenters of companies of all sizes and in the home of desktop users.

        There are many advantages to using Linux, besides being a low-cost solution, the platform stands out for being a highly stable and secure solution and for having a large community of developers who work to make it even more reliable.
        Using Linux on the desktop has become a real alternative to using Windows or macOS computers.

        The desktop environments that can be installed in a desktop Linux computer are polished and stable enough to be used as the primary or sole computer.

      • Razer pivots from gaming with Tensorbook Linux laptop for AI research – GadgetGuy

        Razer has made a name for itself by making high-end gaming products, including powerful laptops and peripherals, but the company’s latest laptop, dubbed Tensorbook, is aimed at machine learning researchers needing serious computing power.

        The laptop is a collaboration between Razer and deep learning company Lambda intended for laboratory use by those researching machine learning and artificial intelligence. It’s essentially a revised version of 2021’s Razer Blade 15 Advanced laptop running on Linux OS Ubuntu 20.04.

    • Server

      • cloud insanity

        the cloud promise is flexibility, reduced costs, less maintenance, less overhead, easier everything. whether it can live up to those promises is highly dependent on factors. maybe it’s comparable to the agile promise “oh if you do it right, it definitely works” and when it doesn’t, you probably haven’t done it right!

      • Kubernetes 1.24: Prevent unauthorised volume mode conversion

        Kubernetes v1.24 introduces a new alpha-level feature that prevents unauthorised users from modifying the volume mode of a PersistentVolumeClaim created from an existing VolumeSnapshot in the Kubernetes cluster.

    • Audiocasts/Shows

      • VideoNPM, Cargo & PyPi Are Broken By Design – Invidious

        Once again another malicious package is discovered is cargo, and this just goes on the massive and ever growing list of times this has been discovered is repos that don’t have 3rd party over sight, like NPM, Cargo, PyPi and more.

    • Applications

    • Instructionals/Technical

      • How to Fix Playback was terminated abnormallly. Reason: unrecognized format on Celluloid

        If you are getting the error ” Playback was terminated abnormally. Reason: unrecognized format” on Celluloid when trying to add an playlist file of a .pls format type, there’s a work around this issue without having to reinstall celluloid or doing anything else.

      • Linux Made SimpleHow to install WPS Office 2019 on a Chromebook in 2022

        Today we are looking at how to install WPS Office 2019 on a Chromebook and some core fonts like Arial and New Times Roman. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • HowTo ForgeLinux Administration: Ubuntu Linux Tutorial for Beginners
      • Adam Young: Errors running Keystone pep8

        The command to run the formatting tests for the keystone project is…

      • How to check for updates at login on Debian | FOSS Linux

        Due to increased security risks and ensuring you are running the latest software packages, you might want your system to always check for updates and upgrades on login. This post will guide you on configuring your Debian system to automatically check for updates at login.

      • ID RootHow To Install Vim Editor on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install Vim Editor on Ubuntu 22.04 LTS, as well as some extra required packages by Vim

      • How to install themes on Manjaro Linux

        Manjaro is an eye-catching Linux distro based on Arch Linux. It comes in 3 flavors, including KDE, GNOME, and the lightest XFCE. One of the advantages of being a Manjaro user is that you are not limited to how your desktop appears and functions. This offers you the flexibility to customize your desktop according to your requirements and preferences.

        This distro also supports an extensive range of desktop and icon themes that you can utilize to boost your system’s look and feel. Into the bargain, these themes are pretty simple to set up on any Linux-based system like Manjaro that we will focus on in this article.

        This guide will, in detail, demonstrate how to install themes on the Manjaro system. for illustration purposes, we shall use the Mac OS X theme.

      • How to run a shell script on Linux

        One of the most powerful utilities you can use when working with Linux systems is the terminal. Here, you can execute any commands to perform any tasks you might think of – launching an application, installing/ uninstalling applications, creating and deleting files/ directories, etc. However, most users well versed with Linux systems utilize the Terminal to carry out one more task – writing and running shell scripts.

      • 10 things to do after installing Debian

        There are many reasons to select Debian over other Linux distributions out there. First of all, it’s free and open-source, software updates and upgrades can be done smoothly on the terminal, the packages are very secure to download, and it comes with LTS(Long Term Support). In case of glitches, they can be solved by the readily available community of Devs out there.

        Finally, Debian offers a variety of flavors known as distributions or distros in the geek world for one to choose from; variety gives a user the liberty to choose the distro that one feels most comfortable with. We have Ubuntu, Kali, Arch, etc. For a detailed list, check Debian-based Linux distributions, and for more info on Debian, check out their official website.

      • How to Install Python on Ubuntu 22.04 LTS
      • Umount Command in Linux

        Learn about umount command in Linux to unmount Filesystem. It detaches a filesystem from the file system hierarchy of Linux.

      • PS Command in Linux
      • apt search rss – what’s in the repo?
      • LinuxiacHow to Use YUM/DNF Command with a Proxy Server

        This guide will show you how to set a proxy for the YUM/DNF package manager so that you may be able to install and update packages from remote repositories.

        Direct internet access is not permitted in the majority of corporate networks. So, if we need to get something from the internet, we must go through some proxy servers.

      • VideoHow to install the Brave browser on Debian 11 – Invidious

        In this video, we are looking at how to install the Brave browser on Debian 11.

      • Install WordPress LEMP with Let’s Encrypt SSL on Ubuntu 22.04 | Mark Ai Code

        WordPress is a free and open-source content management system that is mostly used to publish blogs on the internet. Those who don’t know how to code can use it. WordPress makes it easy to make websites and blogs and keep them up to date. Because WordPress is so popular, it now runs more than a third of all websites. It was written in PHP, and MariaDB and MySQL were used as back-end databases.

        In this guide, we’ll show you how to install WordPress LEMP with a free Let’s Encrypt SSL certificate on Ubuntu 22.04.

    • Games

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Make Use OfHow to Connect Your iPhone to Your Linux PC Using KDE Connect

          KDE Connect is an app that lets you connect your Android smartphone to your Linux PC. It’s been available on the Play Store for many years and has become a valuable tool for Android and Linux users.

          However, if you’ve been on the other end of the spectrum—iOS—you couldn’t use KDE Connect until now and had to resort to other apps to sync your iPhone to your Linux computer. But this finally changes now with the launch of the KDE Connect app on the App Store.

          Here’s how to pair your iPhone with your Linux machine and perform various operations using KDE Connect.

  • Distributions and Operating Systems

    • Open Hardware/Modding

      • CNX SoftwarePikaScript – A lightweight Python implementation that runs on STM32 and other low-end MCUs – CNX Software

        PikaScript is an ultra-lightweight Python engine that can run on microcontrollers with as little as 4KB of RAM and 32KB of Flash, while the more popular MicroPython requires at least 256kB of code space and 16kB of RAM.

        PikaScript was initially developed to run on STM32G030C8 and STM32F103C8 MCUs, meaning, for example, it works on the BluePill board, but it has also been ported to other platforms like WCH CH582 RISC-V MCU, WinnerMicro W806 C-Sky microcontroller, as well as other like Raspberry Pi RP2040, ESP32-C3, etc… but those are not quite as well supported with some features missing.

      • ArduinoContinuously measure wind speed and direction with this EMT conduit-mounted station | Arduino Blog

        It seems like DIY weather stations are everywhere, and while most can perform the basic functions of measuring temperature, humidity, and air pressure, the majority are still unable to determine wind speed and direction. In response, Austin Allen from Elation Sports Technologies LLC created his own system that uses an anemometer and weathervane to measure the wind.

        Both the wind direction sensor and wind speed sensor were secured to sections of EMT conduit with 3D-printed mounts. The speed sensor utilizes a series of internal photo interrupters which get blocked by small plastic tabs whenever the disc spins. By reading the resulting analog voltage output, the connected Arduino Nano can map the value to a speed. The directions sensor uses a single Hall effect sensor combined with a polarized magnet in order to determine the orientation of the resulting magnetic field.

  • Free, Libre, and Open Source Software

    • Daniel Stenbergcurl annual user survey 2022 | daniel.haxx.se

      This is the best and frankly the only way the curl project has to get real feedback from people as to what features that are used and which are not used as well as other details in the project that can help us navigate our future and what to do next. And what not to do next.

    • Licensing / Legal

      • The Register UKGPL legal battle: Vizio told by judge it will have to answer breach-of-contract claims

        The Software Freedom Conservancy (SFC) has won a significant legal victory in its ongoing effort to force Vizio to publish the source code of its SmartCast TV software, which is said to contain GPLv2 and LGPLv2.1 copyleft-licensed components.

        SFC sued Vizio, claiming it was in breach of contract by failing to obey the terms of the GPLv2 and LGPLv2.1 licenses that require source code to be made public when certain conditions are met, and sought declaratory relief on behalf of Vizio TV owners. SFC wanted its breach-of-contract arguments to be heard by the Orange County Superior Court in California, though Vizio kicked the matter up to the district court level in central California where it hoped to avoid the contract issue and defend its corner using just federal copyright law.

        On Friday, Federal District Judge Josephine Staton sided with SFC and granted its motion to send its lawsuit back to superior court. To do so, Judge Staton had to decide whether or not the federal Copyright Act preempted the SFC’s breach-of-contract allegations; in the end, she decided it didn’t.

        “Vizio ‘removed’ the case to federal court by claiming that the GPL operates as only a copyright license, and never as a contract,” said Bradley Kuhn, policy fellow at the Software Freedom Conservancy, in an email to The Register. “We have countered that it operates as both, and that the source code provision specifically gives third parties (ie, downstream users) a contractual right to demand complete, corresponding source code (as defined in the GPL).”

  • Leftovers

    • Common DreamsOpinion | It’s Tough Times, But Here Are 10 Reasons We Should Have Hope

      In a comment on this past Saturday’s post, Paula OH said: “It’s a very tough time. We need a hope machine! Anyone know how to build one?”

    • Counter PunchThe Case Against Parking Minimums

      Here in LA County, we have approximately 19 Million parking spaces, almost double our 10 Million residents and over five times our total housing units. We can assume that the vast majority of these are vacant at any given time. A study in King County, Washington, found that almost one-third of parking spaces in apartment complexes sit empty overnight, to say nothing of the overnight vacant parking in commercial zones.

      Now, many people’s first reaction to dropping parking requirements is skepticism, given the importance of cars as a symbol of individual freedom to move throughout our city. Cars genuinely can be a crucial step in people’s pathway to economic opportunity, and being able to park a car is a valued convenience.

    • Hardware

      • HackadayHow The IBM PC Went 8-Bit

        If you were around when the IBM PC rolled out, two things probably caught you by surprise. One is that the company that made the Selectric put that ridiculous keyboard on it. The other was that it had an 8-bit CPU onboard.  It was actually even stranger than that. The PC sported an 8088 which was a 16-bit 8086 stripped down to an 8 bit external bus. You have to wonder what caused that, and [Steven Leibson] has a great post that explains what went down all those years ago.

    • Health/Nutrition/Agriculture

      • Common DreamsDecarbonizing US Energy System Would Save 50,000 Lives and $600 Billion a Year: Study

        A new study adds to the case for urgent decarbonization of the U.S. energy system, finding that slashing air pollution emissions from energy-related sources would bring near-term public health gains including preventing over 50,000 premature deaths and save $608 billion in associated benefits annually.

        “The sooner the U.S. acts to reduce emissions, the more preventable death and disease from energy-related air pollution can be avoided.”

      • Pro PublicaDocuments Reveal Ties Between Opioid Makers and Doctors

        Twelve years ago, ProPublica set out to build a first-of-its-kind tool that would allow users, with a single search, to see whether their doctors were receiving money from an array of pharmaceutical companies.

        Dollars for Docs generated a huge rush of interest. Readers searched the database tens of millions of times to see if their doctors had financial ties to the companies that made the drugs they prescribed. Law enforcement officials used it to investigate drug company marketing, drug companies looked up their competitors and doctors searched for themselves.

    • Security

      • Krebs On SecurityWhen Your Smart ID Card Reader Comes With Malware

        Millions of U.S. government employees and contractors have been issued a secure smart ID card that enables physical access to buildings and controlled spaces, and provides access to government computer networks and systems at the cardholder’s appropriate security level. But many government employees aren’t issued an approved card reader device that lets them use these cards at home or remotely, and so turn to low-cost readers they find online. What could go wrong? Here’s one example.

      • The Register UKHardening in the enterprise: SUSE releases Rancher 2.6.5 and NeuVector 5.0

        SUSE acquisition Rancher is growing up, with a decidedly enterprise-friendly 2.6.5 release and version 5.0 of NeuVector.

        SUSE appears to be increasingly becoming the container company, and used this year’s EU Kubecon event to make its first release of NeuVector since it open-sourced the container security platform earlier this year.

        Dubbed a “Full Lifecycle Container Security Platform”, NeuVector turning up with Rancher is further evidence of an increased folding in of security and scanning into container solutions.

      • Privacy/Surveillance

        • Counter PunchUsing Early Warning Data to Create Communities of Peace

          The great puzzle pieces are how do we address the divisions that are spurring the tensions, and can we create communities where people feel safe and respected?

          What if we could see concerning developments related to organized hate crimes and violence and predict where they might occur? Going a step further, would an early warning system allow us to address the issues before they bubble and rise to ugliness, dividing communities?

    • Defence/Aggression

      • TruthOut“Innocent” White People Are Also Complicit in the Anti-Black Murders in Buffalo
      • TruthOutAlicia Garza: “The Shooter Wrote a Manifesto, and My Name Was Included In It”
      • Democracy NowDo Online Forums Act as “Radicalization Machines” for White Supremacists & Mainstream GOP?

        Before embarking on a murderous rampage in a majority-Black neighborhood, the Buffalo shooter posted a white supremacist manifesto online that fixated on white dominance, white fertility and the survival of the white race. These are all sentiments shared by the Republican Party and its media arms, says author and extremism researcher Talia Lavin, who spent nearly a year impersonating right-wing white supremacists online, assuming false identities to infiltrate their groups, as she worked on her book, “Culture Warlords: My Journey into the Dark Web of White Supremacy.” She adds that online chat platforms such as 4chan and Telegram are essentially “perpetual motion radicalization machines” where “people who are already radicalized or in the process of being radicalized can imbibe propaganda.” Her recent article for Rolling Stone is headlined “The Buffalo Shooter Isn’t a ‘Lone Wolf.’ He’s a Mainstream Republican.”

      • Democracy NowBuffalo Massacre & Racist Manifesto Fuel Push to Regulate Social Media Platforms Where Hate Flourishes

        Calls are growing for heavier restrictions on social media platforms after a white supremacist live-streamed his shooting spree in Buffalo, New York, on Saturday, resulting in 10 deaths and three wounded. While the video was removed from Twitch within minutes, platforms such as Twitter and Facebook allowed it to circulate for days and gain over a million views. The 18-year-old shooter was radicalized through online forums such as 4chan, according to a racist screed he authored. “What we are dealing with is the backend business models that are creating a structure where certain things are being able to be profited from, certain things travel differently, and hate-filled content has more of a space to be engaged with,” says Rashad Robinson, president of Color of Change. Color of Change has called for social media platforms to institute changes to their terms of service and urged Twitch to conduct a racial equity audit.

      • Common DreamsOpinion | Buffalo Shows We Must Confront the Right’s Racist Propaganda

        When Payton Gendron, an 18-year-old white teenager, allegedly opened fire on shoppers in the Tops supermarket in Buffalo, New York, he knew exactly who he was aiming at: African Americans. Of the 10 people who were murdered and three wounded in the attack, 11 were Black.

      • Common DreamsOpinion | Steps to Encourage Peace in Ukraine

        Chimps engage in war. Humans have likely engaged in war, at least intermittently, since the beginning of our life as a species. But wars vary dramatically in their conduct, scope, and effects.  I am more afraid of this war in Ukraine than I have been of any war in my life, and I’m 72. This war could devolve into a nuclear war which could destroy civilization. We need to be creative, thoughtful, and move forward with humility, knowing that we all have areas of ignorance and that we need one another.

      • Counter PunchTo End the Horror in Ukraine, Go Big, and Go Broad

        NATO expansion eastward toward Russia’s borders and US/Western post-Cold War triumphalism was and is a problem. It was a strategic mistake to treat Russia, with its justifiably proud history and culture, as a miserable, groveling loser that had no choice but to swallow Western supremacy in Eurasia and the world after the collapse of the Soviet Union. But none of that excuses Russian President Vladimir Putin’s illegal invasion. Moreover, it has backfired horribly, as Finland and Sweden are now likely to join NATO.

        Ukraine has the right to defend itself, and US and Western arms manufacturers and politicians are glad to oblige with military aid and weapons transfers, but the risk of escalation, up to and including threats of using nuclear weapons, needs to be taken seriously.

      • Common DreamsOpinion | Ukraine and the Anti-War Dilemma

        I’ve been watching this country at war for many years now and, after 9/11, began spending time with American veterans who came to disdain and actively oppose the very conflicts they were sent to fight. The paths they followed to get there and the courage it took to turn their backs on all they had once embraced intrigued and impressed me, so I wrote a book about them. While doing so, I was often struck by a strange reality in that era of American war-making: in a land where there was no longer a draft, most Americans were paying remarkably little attention to our ongoing wars thousands of miles away. I find it even stranger today—and please note that this takes nothing away from the misery of the Ukrainian people or the ruthlessness of Vladimir Putin’s invasion—that the public seems vastly more engaged in a war its country is not officially fighting than in the ones we did fight so brutally and unsuccessfully over the past two decades.

      • TruthOutKremlin Spokesman Says Russia Now Considers US, European Allies “Hostile States”
      • Common DreamsKremlin Says Russia Now Considers US, European Allies ‘Hostile States’

        Kremlin spokesman Dmitry Peskov said Tuesday that Moscow now considers the United States and its European allies “hostile states” as Western governments continue to pour heavy weaponry into Ukraine, which is attempting to beat back Russia’s deadly invasion.

        The West has also put in place an unprecedented regime of sanctions with the goal of hampering Russia’s economy and undermining the country’s war machine.

      • Common DreamsAs Senators Try to Expand War Crimes Jurisdiction, Critics Ask if US War Criminals Count

        Critics of U.S. foreign policy on Tuesday reacted to a report that the United States Senate is advancing a draft bill that would grant domestic courts universal jurisdiction to prosecute alleged war criminals by questioning whether the measure would also apply to Americans—who are rarely if ever brought to justice after committing war crimes.

        “Lo and behold, the U.S. has discovered universal jurisdiction.”

      • Meduza‘We’re flying blind now’ Kremlin infighting and the war in Ukraine will determine if Putin cancels Russia’s elections in September, sources tell Meduza

        On May 17, lawmakers in the State Duma discussed the possibility of cancelling both gubernatorial and regional and municipal elections scheduled for September 11, 2022. The stated reason is the need to support the president unanimously during Russia’s “special military operation” in Ukraine. Meduza special correspondent Andrey Pertsev learned that Vladimir Putin has yet to reach a final decision about postponing the elections, but the Federal Security Service and National Security Council are lobbying hard to convince him that it’s crucial.

      • Meduza‘Apparently our guys have been forgotten’: Parents of Russian conscripts who disappeared aboard the Moskva still seeking answers one month later

        A month has passed since a Ukrainian missile strike sank the Russian warship Moskva. In total, there were around 500 people aboard the vessel, which was the Black Sea Fleet’s flagship. The Russian Defense Ministry has only acknowledged that one sailor was killed, while claiming that another 27 are missing. On condition of anonymity, the mother of a conscripted sailor who disappeared aboard the Moskva told Meduza about her month-long battle with the Russian authorities for information about her son.

    • Transparency/Investigative Reporting

    • Environment

      • TruthOutStudy Warns Many Fossil Fuel Sites Must Be Shut Down to Avert Climate Disaster
      • Common DreamsEarth’s Atmospheric CO2 Hasn’t Been This High In Millions of Years

        Climate scientists and concerned citizens are sounding the alarm as daily, weekly, and monthly records for atmospheric carbon dioxide levels continue to be shattered while the fossil fuel-powered capitalist economic system responsible for skyrocketing greenhouse gas pollution plows ahead.

        New data from the National Oceanic and Atmospheric Administration (NOAA) shows that the weekly average CO² concentration at the Mauna Loa Observatory in Hawaii reached 421.13 parts per million (ppm) from May 8 to May 14—the highest in recorded history and up from 418.34 ppm one year ago and 397.38 ppm one decade ago.

      • Energy

        • Common DreamsClimate Campaigners Demand Oxford, Cambridge Stop Taking Fossil Fuel Money

          Arguing that accepting tens of millions of dollars from fossil fuel giants creates a “fundamental conflict of interest” for researchers trying to help solve the climate crisis, academics and students at the Universities of Oxford and Cambridge in the United Kingdom on Tuesday held a direct action demanding the schools officially reject such funding.

          Led by the Fossil Free Research Campaign, more than 50 campaigners held simultaneous actions at Cambridge’s BP Institute, a research center funded by oil giant BP, and at Oxford’s Saïd Business school, which received £1.37 million ($1.7 million) from the fossil fuel industry between 2020 and 2021.

        • Common DreamsStudy Finds Many Existing Oil and Gas Sites Must Be Shut Down to Avert Climate Disaster

          A new study published Tuesday in the journal Environmental Research Letters shows that keeping global warming below the key 1.5°C threshold by the end of the century will require not just halting the construction of new fossil fuel infrastructure, but also shutting down many existing sites.

          “Some existing fossil fuel licenses and production will need to be revoked and phased out early.”

    • Finance

      • ScheerpostEllen Brown: Only a People’s Monetary Reset Can Prevent a Feudalistic Technocracy

        Ellen Brown explores the alternatives to the World Economic Forum’s “Great Reset” plan.

      • ScheerpostRalph Nader: The New Corporate Dictators

        Ralph Nader points out that today’s corporate dictators are like no others.

      • Scheerpost‘A Shameful Distinction’: US Ranked World’s Biggest Perpetrator of Financial Secrecy

        A global index published Tuesday ranks the United States as the world’s leading perpetrator of financial secrecy, citing the country’s refusal to share key information with the tax authorities of other nations and its status as a generous tax haven for foreign oligarchs, rich executives, and other elites.

      • Common Dreams‘A Shameful Distinction’: US Ranked World’s Biggest Perpetrator of Financial Secrecy

        A global index published Tuesday ranks the United States as the world’s leading perpetrator of financial secrecy, citing the country’s refusal to share key information with the tax authorities of other nations and its status as a generous tax haven for foreign oligarchs, rich executives, and other elites.

        The ranking comes despite U.S. President Joe Biden’s campaign-trail pledge to “bring transparency to the global financial system, go after illicit tax havens, seize stolen assets, and make it more difficult for leaders who steal from their people to hide behind anonymous front companies.”

      • MeduzaDeal or no deal? Yandex is looking to sell Russian assets, sources tell Meduza. The company says otherwise.

        Internet giant Yandex is looking for buyers for its Russian assets Yandex Search, Yandex.Mail, and the movie database Kinopoisk, a source close to the company’s co-founder Arkady Volozh told Meduza. This was corroborated by another source close to the company’s management. 

      • Walmart online delivery is turning into a major disaster thanks to Doordash.

        Walmart online delivery is turning into a major disaster thanks to Doordash.

        Today I had a $10 Gillette Mach 3 razor starter kit go missing. I should have just done store pickup since my spouse works there anyway.

        But “Justine” “delivered” my order. And by delivered, I mean what normally happens with Walmart+ deliveries that go through Doordash instead of some real delivery company. I opened the door, looked everywhere in the apartment building and in all of the mail rooms, and couldn’t find it.

        And when it said “Click here for picture.” it didn’t show me a picture, it just showed me the order, saying it was “delivered today”.

        You never know what Walmart will decide to ship through FedEx or DoorDash, and so part of my order (the refill razor blades) are supposedly arriving on Thursday via FedEx.

    • AstroTurf/Lobbying/Politics

      • TruthOutIt’s Primary Night in Pennsylvania, and All Hell Is Set to Break Loose
      • TruthOutSanders Tells DNC to Reject Super PAC Spending Against Progressives in Primaries
      • Common DreamsOpinion | For Biden’s Summit of the Americas, Obama’s Handshake With Raúl Castro Shows the Way

        On May 16, the Biden administration announced new measures to “increase support for the Cuban people.” They included easing travel restrictions and helping Cuban-Americans support and connect with their families. They mark a step forward but a baby step, given that most U.S. sanctions on Cuba remain in place. Also in place is a ridiculous Biden administration policy of trying to isolate Cuba, as well as Nicaragua and Venezuela, from the rest of the hemisphere by excluding them from the upcoming Summit of the Americas that will take place in June in Los Angeles.

      • Common DreamsOpinion | This Is Not the Culmination of the Right-Wing Legal Movement—It’s the Dawn of It.

        The reactionary, right-wing legal movement powered by dark money appears to be on the brink of achieving a nearly 50-year goal of reversing Roe v. Wade.

      • Common DreamsAIPAC’s Super PAC Spends Millions to Defeat Summer Lee, Other Progressives

        Intent on keeping the influence of the growing pro-Palestinian rights movement in the U.S. to a minimum in Congress, the powerful American Israel Public Affairs Committee is pulling out all the stops to defeat progressive candidates including state Rep. Summer Lee in Pennsylvania’s 12th District, where voters are going to the polls Tuesday.

        “The reason that they’re aligning with certain candidates is because they are more aligned with their more hawkish positions on Israel.”

      • Common DreamsWith 5 States Holding Primaries Today, Here’s a Rundown of Progressives on the Ballot

        The ideological direction of the Democratic Party is on the ballot in Tuesday’s primary contests as voters in Kentucky, North Carolina, Oregon, and Pennsylvania have a chance to elect progressive candidates to challenge Republicans in the pivotal November midterms.

        Voters in Idaho also head to the polls on Tuesday, but progressives are not expected to fare well in the GOP-dominated state. Below are key races featuring left-leaning candidates who could help shift the balance of power in the House and Senate.

      • Common DreamsKentucky Progressive Charles Booker Wins Democratic US Senate Primary

        Charles Booker—the progressive former Kentucky state lawmaker with a plan to tackle rampant inequality—cruised to victory in Tuesday’s U.S. Senate Democratic primary, setting up a November contest against two-term Republican incumbent Rand Paul in which the challenger is vowing to “make history.”

        “I’m fighting for issues regardless of party because at the end of the day, putting food on the table, keeping your lights on—doesn’t matter what your party is.”

      • Common Dreams‘Dark Money Is Dark Money’: Sanders Calls on DNC to Ban Super PAC Cash in Primaries

        Sen. Bernie Sanders on Tuesday urged the Democratic National Committee to ban super PAC money from the party’s primary process as special interest groups and billionaires pour money into elections in the hopes of defeating progressive candidates across the U.S., including Summer Lee in Pennsylvania and Nida Allam in North Carolina.

        “The continuation of super PAC money in Democratic primaries will demoralize the Democratic base.”

    • Censorship/Free Speech

      • EFFEFF to Supreme Court: Put Texas Social Media Law Back on Hold

        SCOTUS Docket for NetChoice v. Paxton

      • [Old] Chronicle Of Higher EducationWhy Are Scholars Such Snitches?

        When I read about the downfall of the University of Michigan’s president, Mark Schlissel, fired after an anonymous complaint about his consensual though “inappropriate” relationship with a subordinate, my first thought was “What kind of idiot uses his work email for an affair?” Then I recalled that I myself am the kind of idiot who persists in using my university email account for everything, despite pledging at least once a year to tear myself away from this self-destructive habit. Schlissel, c’est moi. The next time I get in trouble, will my employer emulate the classy behavior of the Michigan Board of Regents and release troves of my own embarrassing emails for my enemies to savor and mock?

        My next thought: Who was the snitch? I knew none of the players, but my inner Hercule Poirot went right to work, assembling likely suspects in the drawing room of my imagination (betrayed spouse, disappointed paramour, assorted foes and rivals, maligned underlings), cleverly disarming them with my continental charm until the culprit was exposed — most likely by the irrepressible look of creepy satisfaction playing across his or her face. To bring down an apparently much loathed and vastly overpaid university president, even for the stupidest of reasons: what ecstasy!
        Among the questions prompted by Schlissel’s termination is whether higher education has, on the whole, become a hotbed of craven snitches. From everything I’ve heard and experienced, the answer is yes.

        First let us pause to consider our terms: Was Schlissel’s narc a “snitch” or a “whistle-blower”? Whistle-blowers are generally attempting to topple or thwart the powerful, and Schlissel was certainly powerful. But the reported offense was, in the words of a lawyer I spoke with, “a nothingburger.” Let us provisionally define snitching as turning someone in anonymously, for either minor or nonexistent offenses, or pretextually. Also: using institutional mechanisms to kneecap rivals, harass enemies, settle scores and grudges, or advantage oneself. Not to mention squealing on someone for social-media posts and joining online mobs to protest exercises of academic and intellectual freedom.

        This last is a variant of the “social-justice snitch,” a burgeoning category composed of those who want to defund the police and reform the criminal-justice system but are nevertheless happy to feed the maws of a frequently unprocedural and (many say) racist campus-justice system. There are, to be sure, right-wing students and organizations dedicated to harassing professors whose politics they object to, but that’s to be expected. What’s not is the so-called campus left failing to notice the degree to which the “carceral turn” in American higher ed — the prosecutorial ethos, the resources reallocated to regulation and punishment — shares a certain cultural logic with the rise of mass incarceration and over-policing in off-campus America. Or that the zeal for policing intellectual borders has certain resonances with the signature tactics of Trumpian America, for which unpoliced borders are equally intolerable. But what care social-justice types about fostering the carceral university if those with suspect politics can be flattened, even — fingers crossed! — expelled, or left unemployed and penurious?

    • Freedom of Information / Freedom of the Press

    • Civil Rights/Policing

    • Internet Policy/Net Neutrality

      • Adventures in Spartan-land

        I am a big proponent of the Spartan Protocol. Now that Lagrange supports it directly, it is a real thing. A whole new unpopulated part of the galaxy to explore and fill with your stuff!

      • More thoughts on sincere conversation

        Grab any 19th century novel, and you’ll see displays of vapidness or people bemoaning the increase of vapidness in society. Many have blamed this on technology — TV, and before that radio, and before that yellow journalism newspapers, and before that the printing press, and before that you had Plato saying that writing itself weakened the mind.

        I do not think there ever existed some halcyon age where strangers (or even friends) had Deep and Meaningful conversations more than they had vapid smalltalk. Perhaps what everyone remembers as better days of conversation are simply days of youth, when the vulnerability entailed by sincerity could do little to materially harm you.

      • Re: More thoughts on sincere conversation

        i myself don’t seek the _elimination_ of all smalltalk, and i’m certainly willing to continue make the effort to engage in it for prosocial reasons, but given that i find it gets in the way of _really_ connecting with people, i prefer to minimise its presence in my life.

      • Rajasthan HC issued notice in a petition by Industry Bodies against repeated internet suspensions in Rajasthan

        No state suspends internet services more than Rajasthan. These suspensions violate fundamental rights of the residents of Rajasthan and cause irreparable economic damage. Udaipur Chambers of Commerce and Industry (‘UCCI’), and Hotel Association, Udaipur have approached the Rajasthan High Court pointing out that the Government of Rajasthan has been consistently violating applicable law and also the directions of the Supreme Court in Anuradha Bhasin v. Union of India by…

    • Digital Restrictions (DRM)

      • Torrent FreakSoftware Downloads Netflix & Disney+ Videos to Make DRM-Free Copies

        Software available right now from the Microsoft Store claims to allow Netflix, Amazon Prime, HBO, Disney+ subscribers and more to download movies and TV shows to their own machines, as a permanent DRM-free copy. In itself this raises legal issues but buried away in the software’s fine print is something that all prospective users should know about.

    • Monopolies

      • Democracy NowDavid Dayen on the Baby Formula Shortage & Monopolies in the Age of Corporate Power

        House lawmakers have raised alarm over a nationwide baby formula shortage after a manufacturer in Michigan shut down over health concerns and was linked to the deaths of two infants. Advocates are calling for greater accountability and investigation into the manufacturer, Abbott Laboratories, even as the Food and Drug Administration is in talks to allow the plant to reopen. We look at how Abbott’s grip on the market for baby formula, amounting to about 20% of all formula distributed in the U.S., contributed to the crisis. An overhaul to the system where the government subsidizes only a few formula brands can help combat the monopolization that has caused this crisis, says David Dayen, executive editor of The American Prospect.

      • TruthOutBaby Formula Shortage Reveals Corporate Monopolies’ Grip on Market
      • Copyrights

        • Torrent FreakIs it Illegal to Use Pirate Streaming Sites?

          Downloading pirated movies and TV shows is against the law in the United States. The same is true for those who operate a pirate streaming site. However, people who use these streaming sites to consume pirated content may not be copyright infringers. Law professor James Gibson explains why.

        • Creative CommonsVirtual Workshop Recap: Towards Better Sharing of Cultural Heritage

          This paper calls for policies that support better sharing of cultural heritage in the public interest. And that’s exactly what we are planning to do. We are developing our first ever CC Open Culture Guide for Policymakers to address the copyright barriers to universal access and reuse of knowledge and culture faced by GLAMs. To initiate this process, we held an interactive virtual workshop for policy experts and open culture enthusiasts to explore key policy issues and gather insights into how to effectively engage policy makers in our work. 

IRC Proceedings: Tuesday, May 17, 2022

Posted in IRC Logs at 2:10 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now


IPFS Mirrors

CID Description Object type
 QmSAJnstxarau4Yg7Nc8VE9qeayb2N4dxe5xA72Amxd5iQ IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmWhSDGo8s4HLBuqRZ24Ms4NYhzv48DXZjeCsqSFw9MAjc IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmNeb8nyjcJeqFgL26ao1Lnnm7AfWqbH55gBrjacQ3twRW IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmUPo3k8LQZ8RMBXRPs7JZq2eUZrfq8qTixMwCB7edR7AN IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmWjXbCyuZ5Qqr6h3HSLdU8Tu4b1zLCs8hV7tangDithVi IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmdVXrbGyRaF6iwfVwMKAHUGXTvwZS9QeSp2gmL151jSHx IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmSymnxgbvAB16k9DgmYvXppYmpvUh7h5mQUxkrjNaTxWJ IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmXKsxPmhnEC69cEV9ViWvgd8ibmuYCvDaXu67skJDsqCz IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmXwe8jeZh6Do5S8g1LTRjAN8HWyTrQYN5F55Z6MpCv1VJ

Phoronix: Microsoft and Phoronix Sponsor (and Close Microsoft Partner) AMD All Over the Place

Posted in Hardware, Marketing, Microsoft at 1:04 am by Dr. Roy Schestowitz

Yesterday in Phoronix (as noted throughout the day in IRC):

Microsoft and Phoronix
So eager to alienate its own core audience? The comments on Microsoft (30% of yesterday’s articles) are largely negative and AMD is dominant (40% of yesterday’s articles despite the relatively small size of the company; headcount is 3 times smaller than Qualcomm’s and about 8 times smaller than Intel’s)

Summary: When you’re taking massive 'gifts' from AMD (and also some from Microsoft) maybe it’s not surprising that editorial decisions change somewhat

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts