Bonum Certa Men Certa

Links 30/05/2022: WordPress Turns 19



  • GNU/Linux

    • Linux Made SimpleLinux Weekly Roundup #184

      Welcome to this week's Linux Weekly Roundup.

      We had another wonderful week in the world of Linux releases with Bluestar Linux 5.17.9, Pearl Linux OS 11, and LXLE Focal.

    • Audiocasts/Shows

    • Applications

      • Ubuntu PitTop 15 Best Google Drive Clients for Linux System in 2022 | UbuntuPIT

        Google Drive is one of the best Cloud Storage options in the market. It offers sufficient storage for free to fulfill our primary requirements, including storing photos, Gmail, or various documents. The popularity of Google drive increasing day by day, and we can assume that cloud storage will take the throne from physical storage shortly. So it’s always better to adapt ourselves to changing technology. But Google doesn’t offer any official Google Drive client for Linux.

        You must be aware of the importance of a Google Drive client if you are a Linux user. And so, you must be looking for one to use. If so, I am sure you are on the right track because this content will lead you to the best 15 Google Drive clients for Linux users.

      • Adriaan de GrootCalamares Handoff | [bobulate]

        I’ve wrapped up the Calamares 3.2 branch today. It is now in bug-fix-only mode, or LTS. The main development branch, calamares, is now for a future 3.3 release. The new release will drop a bunch of legacy support, dating back to Debian 8. This cleans up a bunch of #ifdefs and means we can target just one Qt version. The release wraps up my paid involvement with Calamares – call 3.1 and 3.2 the “era of [ade]” if you will – and for now, hands the project over to the community.

        I’m sure there will be another maintainer at some point. The project itself is Free Software, it isn’t going to go away, be co-opted, or destroyed.

      • Barry KaulerContainers now have top-level zram

        Early on, I was thinking that to support top-level zram for containers, each container would need its own zram device. However, yesterday I realised the obvious; the main layered filesystem and the layered filesystems of the containers, could all use the same zram. It is simply a matter of having a sub-folder in the zram for each aufs layer.

      • Beta NewsSurfshark VPN for Linux gets proper GUI

        What makes Surfshark one of the best paid VPN services on the market? Well, besides being extremely affordable, it has no device limit and is very easy to use on many platforms, including Windows, macOS, Android, iOS, and iPadOS. Not to mention, the developers are constantly adding new features -- they don't rest on their laurels. I highly recommend the service.

        A desktop Linux version of Surfshark has been available for a while now, but sadly, it did not have a graphical user interface (GUI) -- you had to configure and run it from the terminal. While this technically worked, it was clunky and annoying, making Surfshark on Linux inferior to versions for other operating systems.

    • Instructionals/Technical

      • A decade of dotfiles

        My first commit to my dotfiles repository was ten years ago. Here are a few things I’ve learned about maintaining a system configuration in that time.

      • John GoerzenJohn Goerzen: Fast, Ordered Unixy Queues over NNCP and Syncthing with Filespooler

        It seems that lately I’ve written several shell implementations of a simple queue that enforces ordered execution of jobs that may arrive out of order. After writing this for the nth time in bash, I decided it was time to do it properly. But first, a word on the why of it all.

      • Linux CapableHow to Install PHP 8.1 on AlmaLinux 9
      • Linux Shell TipsHow to Delete All Files in a Directory Except Few

        File deletion is an important yet sensitive aspect of Linux administration. The Linux commands behind file deletion operations help us get rid of files we do not need.

        There is usually a high chance that the files we wish to delete reside in a single folder or directory. If we did not need all these files; once we navigate to that directory, it would be easier to get rid of them with a simple rm command implementation.

      • How to Install Psensor Temperature Monitoring Application on Ubuntu 20.04

        Having control of your system also means knowing what the temperature of your computer is at any given moment. Although this may sound difficult, the reality is that it is not and it helps to prevent errors and hardware damage. Therefore, we have prepared the following post for you to learn how to Install Psensor Temperature Monitoring Application on Ubuntu 20.04.

      • UNIX CopInstalling Nginx on OpenBSD 7.1

        Nginx is a web server created with a focus on performance, high concurrency and low resource usage. It serves the majority of the top websites. Whilst this is mostly due to its performance, it’s also relatively easy to get started with.

        By default, Nginx deals with web requests asynchronously i.e. a single nginx process can serve multiple requests concurrently. However, because of this design Nginx, as compared to web servers like Apache, can’t embed server side programming languages like PHP into its own process. This means those tasks are to be handled by completely separate processes and then reverse proxied back to the clients via Nginx. Therefore, at its core, Nginx is actually just a reverse proxy.

        In this article, we’re going to go through the process of compiling and installing Nginx through source. While installation through the package manager is fairly easy, we do not get as much control over the Nginx binary as we get by compiling from source. I have chosen OpenBSD for it serves very well as a secure server operating system.

      • UNIX CopHow To Install RPM Fusion on Fedora 34/35/36

        RPM Fusion is a software repository, providing add-on packages for Fedora Linux. It was born as a merge of the older repositories Livna, Dribble and Freshrpms. They distributed software that Fedora will not, either because it does not meet Fedora’s definition of free software, or because distribution of that software may violate US law.

        The RPM Fusion repository comes in two variants, Free and Non-Free. The free repository contains a free version of the software that is open source and non-free, which have mostly almost all free software but are closed source and mainly proprietary.

      • UNIX CopHow To Install Bareos Backup Solution on Fedora 36

        In this article, we will show you how to install Bareos backup solution on Fedora 36

        Bareos (Backup Archiving Recovery Open Sourced) is a backup software, originally forked from the Bacula project. It is network-based, multi-client and very flexible with an architecture oriented towards scalability. Thus the learning curve might be considered somewhat steep. The project is backed by the commercial company Bareos GmbH & Co. KG, based in Germany.

      • UNIX CopHow to speed Up dnf Package Manager In Fedora, RHEL and CentOS

        DNF or Dandified YUM is the next-generation version of the Yellowdog Updater, Modified (yum), a package manager for .rpm-based Linux distributions. DNF was introduced in Fedora 18 in 2013, it has been the default package manager since Fedora 22 in 2015, Red Hat Enterprise Linux 8 , and OpenMandriva; and also an alternative package manager for Mageia.

        Perceived deficiencies of yum (which DNF is intended to address) include poor performance, high memory usage, and the slowness of its iterative dependency resolution. DNF uses libsolv, an external dependency resolver.

      • H2S MediaHow to install Signal Messenger on Ubuntu 22.04 LTS Jammy

        Learn the steps to install the Signal Private Messenger app on Ubuntu 22.04 LTS Jammy JellyFish using the command terminal.

        Signal is one of the popular open-source messaging apps that has been known for several years for its end-to-end encryption and its independent structure as a non-profit organization operated by a foundation — not a large tech company. It is a handy tool for communication among activists and other people who are particularly concerned about their privacy.

        End-to-End communication in Signal is encrypted. This means that only those people who are involved in the conversation can read the content of messages any other user who is not the part of the chat, not even the company itself – are unable to do so. Signal is particularly serious about privacy, even sticker packages have their own encryption. In addition, Signal has developed the encryption protocol that other services such as Skype and Whatsapp use.

      • Install LibreNMS on Ubuntu 22.04/Ubuntu 20.04 - kifarunix.com

        Follow through this tutorial to learn how to install LibreNMS on Ubuntu 22.04/Ubuntu 20.04. LibreNMS is a fully featured MySQL/PHP and SNMP based network monitoring system.

      • VideoHow to install ONLYOFFICE on Debian 11 - Invidious

        In this video, we are looking at how to install ONLYOFFICE on Debian 11. Enjoy!

      • Linux Made SimpleHow to install Mine-imator 1.2.9 on a Chromebook

        Today we are looking at how to install Mine-imator 1.2.9 on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • How to Show Hidden Files in Ubuntu 22.04 LTS (and hide them)

        Hiding a file or folder is a feature that helps you increase your device’s privacy and security. You wouldn’t want a 5-year-old child to mess up your most essential documents. And how would you feel if someone deleted your hours of work just as a prank?

        The easiest way to tackle such ‘accidents’ is to keep your files hidden and later unhide them when needed. If you don’t know how to hide and unhide files on Ubuntu, then good news for you. Because that’s exactly what we will cover here.

      • How To Change Linux Hostname (Ubuntu, CentOS & more)

        A Linux hostname is a unique name that identifies a computer on a network. When working on multiple computers on the same network, you may get confused because of duplicate hostnames. So the need to change your hostname arises.

        In this article, we cover the best methods (including terminal and GUI) on how to change Linux hostname in some of the major Linux distributions. Let’s get started.

      • Download A Collection of Passwords & Wordlists for Kali Linux (2022)

        Today you'll be able to download a collection of passwords and wordlist dictionaries for cracking in Kali Linux.

        A wordlist or a password dictionary is a collection of passwords stored in plain text. It's basically a text file with a bunch of random passwords in it.

      • Best WiFi Adapters For Kali Linux in 2022 (That Supports Packet Injection)

        Today you will learn which are the best wifi adapters that are most commonly used for hacking in Kali Linux.

        If you're new to Kali Linux or wifi hacking, the most important hardware you need besides a computer with Kali Linux installed, is a USB wireless network adapter with a wifi card (chipset) that supports packet injection and monitor mode.

      • Linux Tech Tips to Become a Better College Student

        Are you a college student struggling to make your way up to progress? Are you seeking a competitive advantage? If yes, then first, you need to remember that being a good student is not merely only about good grades. It is your study time and dedication to education that will help you become a better student. Hence, for that, you should switch to Linux.

        Linux is the greatest operating system, perfect for students because it comes with a variety of features and unique tools that can assist you very well in your study.

  • Distributions and Operating Systems

    • Reviews

      • Distro WatchReview: Tails 5.0

        In the past I've felt as though Tails was one of the better distributions available for people who wanted to communicate anonymously or visit websites without giving away their location. It was a solid tool, if somewhat held back by two issues. One was that some of the included software was either geared more toward technically experienced users or hadn't yet matured. Early versions of OnionShare come to mind as software which still had some problems when it was first introduced in Tails. The other issue was performance. GNOME is one of the heaviest open source desktop environments and early versions of GNOME 3 were particularly cumbersome, especially when run on lower-end hardware.

        What I have appreciated about Tails 5 is it feels like a polished, evolutionary step forward without (as far as I can tell) any regressions from the 4.x series. GNOME 38 still isn't as responsive and smooth as later versions of GNOME (40 and newer) have been for me, but it feels a little better than past releases.

        I really like the new Kleopatra tool which acts as a one-stop application for all our encryption key management, file signing, and encryption needs. Kleopatra is another tool I feel has become more polished in recent years and I enjoyed having it in Tails 5.

        Both Tor Browser and OnionShare worked beautifully for me. I think Tor Browser has always been a solid experience and it continues to be good. OnionShare was a good idea in the past, but I sometimes encountered stability issues with it. The current version feels easier to use and entirely stable.

        I like the initial configuration screen Tails displays when the distribution starts. The default settings lock down the system (using MAC randomization, locking the Unsafe Browser option, and locking admin functions). However, we can toggle these features if we wish to give more flexibility. This walks a careful line between being secure by default while allowing users latitude to perform more actions.

        Last, but not least, I appreciate the detail and honesty of the Tails documentation. There are a lot of tips and guidelines on the project's website. I especially appreciate the project is transparent about both the features Tails offers and the limitations. Some projects boast they will prevent all viruses or will keep people safe on-line, or will keep you anonymous. Tails doesn't make wild marketing claims. The developers explain how their tools work and how they help, but also warn there are limits and nothing is guaranteed. I appreciate this balanced approach to keeping users informed.

        In short, if you need to browse the web or want to share files without giving away your location, then Tails is probably one of the most secure and easiest to use distribution to do this.

    • BSD

      • Matthias SchmidtTime Machine like Backups on OpenBSD

        Time Machine is a backup software by Apple, part of macOS allowing easy and foolproof backups. In a nutshell, it creates incremental backups on a storage medium of your choice and you can access the data either with a graphical client or directly via file system tools. I especially like that you only have to plug in an external USB drive which is immediately recognized, the backup starts and the drive is unmounted as soon as the backup is done. Since Time Machine is Apple only and I use OpenBSD on all my personal machines, I decided to write my own Time Machine like solution.

    • PCLinuxOS/OpenMandriva Family

      • PCLOS OfficialSubtitler 1.5.5

        Subtitler is a free Desktop application to search and download right subtitle blazingly fast. Now available in the software repository.

      • PCLOS OfficialCatalyst Web Browser 3.1.0

        Catalyst browser is an amazing and elegant Electron/Chromium based web browser. Now available in the software repository.

      • PCLOS OfficialFifo Web Browser 1.1.0

        Fifo browser is a privacy orientated browser based on modern frameworks. Experience a modern browser based on new frameworks. Easily integrate your day with Fifo. Since Fifo is so modern, you don’t need to worry about change, you can just enjoy the experience.

      • OpenMandriva New LXQt ISOs for Rock & Rolling

        For Rock and Rolling users OpenMandriva Community has made ISOs using the LXQt desktop.

    • Canonical/Ubuntu Family

    • Devices/Embedded

      • Linux GizmosAvnet introduces RZBoard V2L which packs Renesas RZ/V2L SoC and comes in Raspberry Pi 4 form-factor

        The RZBoard V2L from Avnet, is a Single Board Computer (SBC) that shares a similar design to the Raspberry Pi 4 model B. One of the main differences between these SBCs is that the RZBoard V2L is powered€  by the powerful RZ/V2L System on Chip (SoC) from Renesas Electronics. Avnet also has these SBCs in stock and they are available for $147.

        The RZ/V2L processor combines a dual core Arm Cortex-A55 CPU (up to 1.2GHz), an ARM Cortex-M33, a Mali GT31 3D-GPU and an AI accelerator (DRP-AI). In addition, there is a H.264 video (1920/1080) encode/decode function implemented in silicon.€ 

      • Raspberry Pi Power

        In the referenced entry, OP (me) makes a curious statement about the Raspberry Pi power usage: "Uses too much power"...

        [...]

        It took me too long to figure it out - I had a USB power supply that worked just well enough most of the time that it was always a mystery.

        Actually, the micro-USB connector and the USB standard call for power supplies that do not provide adequate power. The cable is rated for 500mA, not 2A, so even if you have an overpowered supply, a cheap cable can cause a voltage drop rendering the Pi useless.

      • CNX SoftwareNanoPi R5S Rockchip RK3568 mini router launched for $59 and up

         The Rockchip RK3568-powered NanoPi R5S SBC with two 2.5GbE ports, one Gigabit Ethernet port, and M.2 NVMe storage is now available for $59, or $75 with a metal enclosure.

        As previously mentioned, the mini router board is equipped with 2GB RAM, 8GB eMMC flash, two USB 3.0 ports, as well as an HDMI output for people wanting to make use of the Rockchip RK3568 processor’s multimedia capabilities, or simply have a user interface on a monitor.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • MedevelLodestone is an open-source free document search engine

      Lodestone is designed to be the modern and digital equivalent of a home filing cabinet. If you've gone searching for something similar in the past, you might be familiar with terms like Electronic Document Management System (EDMS), Document Management System (DMS) or Personal Archival.

      [...]

      Lodestone is released under the GPL-3.0 license.

    • Content Management Systems (CMS)

      • WordPressWordPress Turns 19 – WP Tavern

        Today marks 19 years since 19-year old Matt Mullenweg partnered with Mike Little to release the first version of WordPress based on the b2/cafelog software. The blog where he shared his thoughts on life and tech was starting to get more traffic and he wanted to ensure its future after the b2/cafelog’s main developer disappeared.

        Mullenweg had the vision for what WordPress should be, even before it had a name.

    • GNU Projects

    • Licensing / Legal

      • WordPressSoftware Freedom Conservancy Receives Court Ruling Affirming GPL as Both Copyright License and Contractual Agreement

        The Software Freedom Conservancy (SFC), a non-profit that provides infrastructure support for free and open source software projects, has received a favorable ruling in its right-to-repair lawsuit against Vizio, an American TV manufacturer. The SFC alleges that Vizio has demonstrated “repeated failures to fulfill even the basic requirements of the General Public License (GPL),” after the company refused to provide the source code for software with copyleft licenses that it bundles with its products.

        Vizio had filed a request to “remove” the case from California State Court into U.S. Federal Court. After hearing oral arguments from both sides, the court has granted SFC’s motion to remand the case back to California State Court.

    • Programming/Development

      • Weekend lack of focus

        I feel like doing an experiment with HTTP Basic Authentication. What if instead of just sending the user:password encoded I provide a session token during the login (using regular post via HTTPS) and from this point on use user:token? And why not encrypt with SHA instead of just encoding?

        I was reading about OAuth2 because of my job and was thinking about using it in my personal project but wow... what an over-complicated solution for something simple as my project!

      • The New StackWhat Made GoLang So Popular? The Language’s Creators Look Back – The New Stack

        Since the day it was open sourced in 2009, the Go programming language has consistently grown in popularity. Now the five Google software engineers behind its original creation are taking a look back at what fueled that growth.

        Writing in Communications of the ACM, Go’s five original creators stress that even their earliest work “benefited greatly from advice and help from many colleagues at Google.” And the paper’s second sentence emphasizes that it’s now a public project “with contributions from thousands of individuals and dozens of companies.”

    • Standards/Consortia

      • [Old] What's in a Name?

        Any solution in this area needs to recognize that one size does not fit all. For some applications a single "name=[string]" will be sufficient and it would be seriously counter-productive to force those folks to engage in detailed encoding. Another barrier to detailed encoding is that few people have knowledge to encode the universe of name forms at a detailed level. Requiring metadata creators to make distinctions outside of their understanding would only result in error-ridden metadata. Better a blind single string than mis-coded details. Yet there will be applications and their metadata communities that can or must make use of the subtleties of name details that are not of interest to others.

        Because of both the great variety of name forms and the variability of applications that make use of names, I recommend a metadata vocabulary that follows the principle of minimum semantic commitment. This means a vocabulary that includes broad classes and properties that can be used as is where detailed coding is not needed or desired, but which can be extended to accommodate many different contexts.

        The trick then is to define broad classes that aid in defining semantics but do little restriction. Classes for things like "Agent", with subclasses for "Person", "Groups of Persons", and perhaps "Non-persons". Properties could begin with "name" which could be subdivided into any definable part of a name that people find useful. Further specificity can be provided by application profiles that define such requirements as cardinality or value types for the various properties. Applications themselves could contain rules for the displays that are needed for their use cases.

        The challenge now is to find a standards group that is interested to take this on.

  • Leftovers

    • Counter PunchAnimal Factory

      Even then farming for them was a hobby, an avocation, a link to a way of life that was slipping away. My grandfather, who was born on that farm in 1906, graduated from Purdue University and became a master electrician, who helped design RCA’s first color TV. My grandmother, the only child of an unwed mother, came to the US at the age of 13 from the industrial city of Sheffield, England. When she married my grandfather she’d never seen a cow, a few days after the honeymoon she was milking one. She ran the local drugstore for nearly 50 years. In their so-called spare time, they farmed.

      My parent’s house was in a sterile and treeless subdivision about five miles away, but I largely grew up on that farm: feeding the cattle and horses, baling hay, bushhogging pastures, weeding the garden, gleaning corn from the harvested field, fishing for catfish in the creek that divided the fields and pastures from the small copse of woods, learning to identify the songs of birds, a lifelong obsession.

    • The apps I use to read and write for this blog

      Because I’ve been asked a couple times recently:

      I keep up with 345 websites and newsletters using an app called NetNewsWire. It’s free and I have it on my Mac, iPhone, and iPad. It’s a type of app called a newsreader.

    • critique of everyday life by henri lefebvre (3)

      more broadly, lefebvre is trying to develop a 'theory of needs' (299) that illuminates the relationship between nature and culture in everyday life. he does so by suggesting that we think dialectically about need and desire: 'there is a transfer from need to desire which crosses the social and society in its entirety' (305). this quote should make it clear that he's not arguing for a naive account of nature or essence, since 'the circuit from need to desire and from desire to need is constantly being interrupted or distorted' (305).

    • Historical or Cultural Bindings

      Drone Day proceeds glowingly. I place my headphones over my ears to hear and the combination of Purpll + Draume delights. Is anyone else listening? That relates to a topic I'll address later in this meandering essay (I laughingly call it an *essay*). The short answer is that Flavigula's Drone Day broadcast has had at this moment of writing a peak of 29 simultaneous listeners. How does that make me feel? It doesn't, really. More on this later in the *essay*. For now - back to Purpll + Draume! A lovely combination! Perhaps one to win universal acclaim! I guffaw. Soon Draume will be in other hands. I sold it to attain a more gentle yet more controllable reverb - Red Panda Context. Honestly, though, it may house hidden madness like its cousins 2.7182818 times removed, Tensor and Raster. Draume has one timbrel quality I will miss. At least I have the unique *overdriven reverb* that spews from its innards encased in stone, never to be struck from the earth. Not that the earth will be around for much longer - or so I hear. Fuck um.

    • My Fourth Basket

      I recently took up basketry as a hobby. Each basket has been a bit better, as one would expect, but this one -- my fourth -- is the first one I'm truly happy with. It's the first one that I've stained and sealed with a wood oil and I think it really completes what otherwise looks like a half-finished product.

    • Little Problems



      But it sure does feel like the last few years have been a string of problems strung together.

      Some of them are big (family members dying, lockdowns, depression, lockdown depression), but most of them are small (see aforementioned noisy neighbour).

    • HackadayAutonomous Inflatable Canoe

      With the summer months nearly upon us, many are dreaming of warm afternoons spent floating on a quiet lake. Unless you’re [Kolins] anyway. Apparently his idea of a good time is controlling a full-sized inflatable canoe not from onboard with a pair of oars, but from the shore with a RC transmitter.

    • Education

      • My students cheated... A lot

        I’m debating right now whether or not to write my account of what happened. Leaning toward writing this. And, then I’ll debate myself later on whether or not to share it…Debated…going to share. No names, or any other identifying information. Overall my students are really great. This could be a fiction. There was a lot of cheating, so the story is long. I mean this could be a podcast. It ends well too, for the most part.

        One more side note. Why tell this story? Since this whole thing happened I’ve told the story a bunch of times, and sometimes I get requests to tell it. This is also a story for my future students about what not to do. So, here is a long form version. I’m not interested in outing my students, or casting shade on them. There were many fantastic students in my course while the cheating completely overwhelmed everything like a metastasizing slime mold. People cheat in college for lots of reasons. I don’t condone the behavior. I teach my courses because I’m interested in engaging students in the material. When cheating happens, it can reflect on me as an instructor and whether or not the course merits engagement. So, this is a story about cheating, but also about how I tried to turn things around and get students to engage in my course. Anyway, without further ado:

        [...]

        I had nothing better to do so I wrote an R program to help me fill out the forms. Who knew I could automate pdf text entry from R. You learn something new everyday.

    • Hardware

      • HackadayRackmount Hardware Placement Issues? IKEA LACK To The Rescue!

        [hackbyte] reminds us about a classic hack that, even though we’ve seen floating around for over a decade, has somehow never quite graced our pages before. Many of us keep small home labs and even, at times, collections of servers that we’d be comfortable be calling mini-datacenters. However, if you use the ever-abundant 19″ switches, servers and other hardware, keeping these mounted and out of the way can be a thorny experience. Which leads us to, undoubtedly, unintentional – but exceptionally handy – compatibility between IKEA LACK table series and 19″ rackmount hardware.

      • HackadayAdjustable Workholding For Honeycomb Tables, With A Bit Of DIY

        Honeycomb tables are often found on laser cutters, where they provide a way for work material to be laid flat while not interfering with things like airflow. This leads to a cleaner laser cut and a nicer finish, but if one’s work depends on precise positioning and placement, they leave something to be desired because there’s no good way to attach rails, jigs, or anything of the sort in an easy and stable fashion.

      • HackadayLaser Driver Design Keeps Safety First

        [Les] from [Les’ Lab] has designed a driver for laser diodes up to 10 watts, and decided to show us how it operates, tells us what we should keep in mind when designing such a driver, and talks about laser safety in general. This design is an adjustable current regulator based on the LM350A, able to provide up to 10 watts of power at about 2 volts – which is what his diode needs. Such obscure requirements aren’t easily fulfilled by commonly available PSUs, which is why a custom design was called for.

      • HackadayBetter Robots Through Gallium

        In the movie Terminator 2, the T-1000 robot was made of some kind of liquid metal that could change shape among other interesting things. According to a chemical engineer at North Carolina State University, there may be something to the idea. [Michael Dickey] has been experimenting with gallium, a liquid metal, that scientists think may unlock a new generation of flexible devices.

      • HackadayRelax And Enjoy This Simple Drone Synthesizer

        You’d think that a synthesizer that makes as much noise and sports as many knobs as this one would have more than a dozen transistors on board. Surely the circuit behind the panel is complex, and there must be at least a couple of 555 timers back there, right?

    • Health/Nutrition/Agriculture

    • Security

      • Privacy/Surveillance

        • [Old] Lowering the cost of anonymization

          The objective of this thesis is to make it easier to understand, use, and deploy strong anonymization practices. We make progress towards this goal in three ways.

          First, we make it easier to understand what anonymization means, and lower the cost of entry for new practitioners. After a historical tour of a number of possible definitions, we introduce differential privacy, a central concept studied throughout this thesis. We then systematize and organize the existing literature on variants and extensions of differential privacy: we categorize them in seven dimensions, compare them with each other, and list some of their main properties.

          Second, we consider a natural class of weaker variants of differential privacy: definitions that assume that the attacker only has partial knowledge over the original data. We raise some fundamental issues with existing definitions, and we establish strong theoretical foundations to solve these issues and clearly delineate between distinct attack models. We use these foundations to improve existing results on the privacy of common aggregations and draw links between our notions and older syntactic definitions of privacy. Then, we provide strong negative results for cardinality estimators, a class of algorithms that cannot be made private even under very weak assumptions.

          Third, we focus on practical applications. We present novel algorithms to detect reidentifiability and joinability risks of large datasets, and we describe the design of a differentially private query engine designed to be usable to non-experts. We propose multiple possible improvements to this query engine, and discuss a number of trade-offs between privacy, utility, usability, and extensibility; we then discuss operational challenges arising when rolling out anonymization at scale, from choosing parameters to providing appropriate education and guidance to engineers working on anonymization pipelines.

        • Site36Prüm II: EU Committee criticises planned obligation for facial recognition

          All EU member states are to network their police facial images and investigation files across Europe. This puts pressure on some governments without such systems.

        • Joint letter to the National Commission for Safai Karamcharis against the increasing surveillance of Safai Karamcharis in the country

          In the past two years, we have come across multiple news reports related to Safai Karamcharis across the country being made to wear tracking devices in order to enable their surveillance by the authorities. Concerned by the human rights violations that such actions will trigger, IFF is releasing a joint letter initiated by the All India Lawyers Association For Justice (AILAJ) to express our concerns over these ongoing violations to the National Commission for Safai Karamcharis.

    • Defence/Aggression

    • Environment

    • Finance

      • The ConversationWho really owns the oil industry’s future stranded assets? If you own investment funds or expect a pension, it might be you

        When an oil company invests in an expensive new drilling project today, it’s taking a gamble. Even if the new well is a success, future government policies designed to slow climate change could make the project unprofitable or force it to shut down years earlier than planned.

        When that happens, the well and the oil become what’s known as stranded assets. That might sound like the oil company’s problem, but the company isn’t the only one taking that risk.

        In a study published May 26, 2022, in the journal Nature Climate Change, we traced the ownership of over 43,000 oil and gas assets to reveal who ultimately loses from misguided investments that become stranded.

        It turns out, private individuals own over half the assets at risk, and ordinary people with pensions and savings that are invested in managed funds shoulder a surprisingly large part, which could exceed a quarter of all losses.

      • NatureStranded fossil-fuel assets translate to major losses for investors in advanced economies

        The distribution of ownership of transition risk associated with stranded fossil-fuel assets remains poorly understood. We calculate that global stranded assets as present value of future lost profits in the upstream oil and gas sector exceed US$1 trillion under plausible changes in expectations about the effects of climate policy. We trace the equity risk ownership from 43,439 oil and gas production assets through a global equity network of 1.8 million companies to their ultimate owners. Most of the market risk falls on private investors, overwhelmingly in OECD countries, including substantial exposure through pension funds and financial markets. The ownership distribution reveals an international net transfer of more than 15% of global stranded asset risk to OECD-based investors. Rich country stakeholders therefore have a major stake in how the transition in oil and gas production is managed, as ongoing supporters of the fossil-fuel economy and potentially exposed owners of stranded assets.

        [...]

        The code of the network model, for imputing missing financial information and for generating figures, are available at ref. 45. The code that generates the network inputs from the E3ME-FTT-GENIE scenarios and from the company database is available from the authors on reasonable request. The code used by E3ME-FTT-GENIE to generate the underlying scenarios is available from the authors on reasonable request. The model is described in detail in ref. 13.

      • SBP expands scope of data collection to curtail digital banking frauds [Ed: They always find some 'compelling' excuses for more surveillance]

        May 27, 2022: The State Bank of Pakistan (SBP) on Friday directed all scheduled banks as well as microfinance banks to submit data of all digital frauds and scams on a monthly basis while the purview of reporting is also expanded from fake calls by Fraudsters to other digital channels including the mobile app, E-Commerce Transactions, ATMs and POS.

      • Web3 in Japan

        As it is custom, whatever trend appears in America becomes mainstream in Japan after it has completely lost its cool. This time the government and a billionaire think what the Japanese people really should care about is some jpgs.

      • Common DreamsOpinion | Are We Headed for Mass Revolts to Upturn the Global Economic Model?

        While it has long been blatantly obvious that the global economic model is not working for all, the rate of accumulation of wealth by a small minority is now breathtaking – if not totally obscene.

      • Common DreamsOpinion | As World's Mega Rich Geared Up for Davos, Central Bankers Went Rogue — and Rational

        We had quite a show up in the Alps last week, the first in-person gathering of the world’s mega rich since Covid hit. The occasion? The annual World Economic Forum at the Swiss resort of Davos, an ever-so-sober gathering that has an assortment of global deep thinkers sharing their wisdom with deep pockets ever eager for policy ideas that don’t involve sharing their wealth.

    • AstroTurf/Lobbying/Politics

      • ScheerpostHappy Memorial Day

        "Happy Memorial Day," a new original cartoon by the inimitable Mr. Fish, considers the service of our past soldiers and the reprehensibility of ventriloquizing their ultimate sacrifice.

      • Frontpage MagazineIslamophobia and Islamoignorance

        In short, it’s perfectly legitimate to criticize and even reject an ideology if that ideology poses a serious threat to one’s society. It would be irrational to pretend that Nazism was a force for peace and justice.

      • RFERLIranian Religious Song Seen As Attempt To Indoctrinate Children

        In the song, the children pledge allegiance to Supreme Leader Ayatollah Ali Khamenei -- the “commander.” Khamenei's followers have tried to elevate his status by bestowing him the title of imam, the highest title in Shi'ite Islam.

      • Why Everyone Should Use Adguard

        I hate ads. I think anyone who knows me can attest to the fact that I hate ads. For most of my ad-blocking needs, I use uBlock Origin on my desktop browser, and that seems to work fine most of the time.

        But there are situations where uBlock Origin does not cut it. For instance, I couldn't find a way to block ads in mobile apps on my iOS device. (I know you're saying "just buy the ad-free version and support the developer!" but there's no way in hell I'm going to pay a weather app $12/mo just to get ad-free access)

      • TruthOutSome Republicans Fume at Michigan GOP for Defending Candidates Busted for Fraud
      • Misinformation/Disinformation

        • [Old] Fact Checking the 1619 Project and Its Critics

          The New York Times’ 1619 Project entered a new phase of historical assessment when the paper published a scathing criticism by five well-known historians of the American Revolution and Civil War eras. The group included previous critics James McPherson, Gordon Wood, Victoria Bynum, and James Oakes, along with a new signature from Sean Wilentz. The newspaper’s editor-in-chief Jake Silverstein then responded with a point-by-point rebuttal of the historians, defending the project.

          Each deserve to be taken seriously, as they form part of a larger debate on the merits of the 1619 Project as a work of history and its intended use in the K-12 classroom curriculum. While the project itself spans some four centuries, devoting substantial attention to racial discrimination against African-Americans in the present day, the historians’ criticism focuses almost entirely on the two articles that are most directly pertinent to their own areas of expertise. The first is the lengthy introductory essay by Nikole Hannah-Jones, the Times journalist who edited the project. The second is a contentious essay on the relationship between slavery and American capitalism by Princeton University sociologist Matthew Desmond.

          How should readers assess the competing claims of each group, seeing as they appear to be at bitter odds? That question is subject to a multitude of interpretive issues raised by the project’s stated political aims, as well as the historians’ own objectives as eminent figures – some might say gatekeepers – in the academic end of the profession.

          But the debate may also be scored on its many disputed factual claims. To advance that discussion, I accordingly offer an assessment for each of the main points of contention as raised by the historians’ letter and Silverstein’s response.

    • Censorship/Free Speech

      • Catholic World ReportLarge US companies rated on respect for free speech, religious freedom

        With some American companies able to have a profound impact on the exercise of free speech and religious freedom, Alliance Defending Freedom and Inspire Investing have launched a Business Index to rate their commitment to these values.

        “CEOs and business leaders have positions of considerable power. They shouldn’t weaponize their influence or the companies they run to divide Americans or engage in speech censorship or anti-religious bigotry,” ADF Senior Vice President for Corporate Engagement Jeremy Tedesco said in a May 26 statement.

      • NasdaqHow The Federal Government Showed Me The Importance Of Bitcoin

        The feds seized my website JeromeBaker.com during Operation Pipe Dreams, which was a federal effort to bring those of us selling bongs and pipes across state lines to justice. It was 2003. There were not a lot of website seizures going on. The internet didn’t really start in earnest until 1996. There wasn’t a lot of regulation out there at first. Porn was big on the internet. And then, buying and selling drug paraphernalia caught on.

    • Civil Rights/Policing

    • Monopolies

      • Copyrights

        • Digitization Wars, Redux

          We now have another question about book digitization: can books be digitized for the purpose of substituting remote lending in the place of the lending of a physical copy? This has been referred to as “Controlled Digital Lending (CDL),” a term developed by the Internet Archive for its online book lending services. The Archive has considerable experience with both digitization and providing online access to materials in various formats, and its Open Library site has been providing digital downloads of out of copyright books for more than a decade. Controlled digital lending applies solely to works that are presumed to be in copyright.

        • [Old] Review of: Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity.

          This is the third book by Stanford law professor Larry Lessig, and the third now in which he furthers his basic theme: that the ancien regime of intellectual property owners is locked in a battle with the capabilities of new technology. Lessig used his first book, Code and Other Laws of Cyberspace (Basic Books, 1999), to explain that the notion of cyberspace as free, open, and anarchic is simply a myth, and a dangerous one at that: the very architecture of our computers and how they communicate determine what one can and cannot do within that environment. If you can get control of that architecture, say by mandating filters on content, you can get substantial control over the culture of that communication space. In his second book, The Future of Ideas: the Fate of the Commons in a Connected World (Random House, 2001), Lessig describes how the change from real property to virtual property actually means more opportunity for control, not less. The theme that he takes up in Free Culture is his concern that certain powerful interests in our society (read: Hollywood) are using copyright law to lock down the very stuff of creativity: mainly, past creativity.

          Lessig himself admits in his Preface that his is not a new or unique argument. He cites Richard Stallman's writings in the mid-1980's that became the basis for the Free Software movement as containing many of the same concepts that Lessig argues in his book. In this case, it serves as a kind of proof of concept (that new ideas build on past ideas) rather than a criticism of lack of originality. Stallman's work is not, however, a substitute for Lessig's; not only does Lessig address popular culture where Stallman addresses only computer code, but Lessig has one key thing in his favor: he is a master story-teller and a darned good writer, not something one usually expects in an academic and an expert in constitutional law. His book opens with the first flight of the Wright brothers and the death of a farmer's chickens, followed by Buster Keaton's film Steamboat Bill and Disney's famous mouse. The next chapter has the history of photography and how the law once considered that snapping a picture could require prior permission from the owners of any property caught in the viewfinder. Later he tells how an improvement to a search engine led one college student to "owe" the RIAA $15,000,000. Throughout the book Lessig illustrates copyright through the lives of real people and uses history, science and the arts to make this law come to life for the reader.

        • Torrent Freak6,500 IPTV Pirates Identified After Accessing Police-Controlled Service

          Police in Italy have revealed details of an operation against pirate IPTV services and subscribers. In addition to targeting around 500 'pirate' sites, servers, and Telegram channels, police say IT specialists were able to identify 6,500 people who accessed a pirate IPTV platform under police control.



Recent Techrights' Posts

Girlfriends, Sex, Prostitution & Debian at DebConf22, Prizren, Kosovo
Reprinted with permission from disguised.work
Martina Ferrari & Debian, DebConf room list: who sleeps with who?
Reprinted with permission from Daniel Pocock
Europe Won't be Safe From Russia Until the Last Windows PC is Turned Off (or Switched to BSDs and GNU/Linux)
Lives are at stake
Links 23/04/2024: US Doubles Down on Patent Obviousness, North Korea Practices Nuclear Conflict
Links for the day
Stardust Nightclub Tragedy, Unlawful killing, Censorship & Debian Scapegoating
Reprinted with permission from Daniel Pocock
 
Links 24/04/2024: Layoffs and Shutdowns at Microsoft, Apple Sales in China Have Collapsed
Links for the day
Sexism processing travel reimbursement
Reprinted with permission from disguised.work
Microsoft is Shutting Down Offices and Studios (Microsoft Layoffs Every Month This Year, Media Barely Mentions These)
Microsoft shutting down more offices (there have been layoffs every month this year)
Balkan women & Debian sexism, WeBoob leaks
Reprinted with permission from disguised.work
Links 24/04/2024: Advances in TikTok Ban, Microsoft Lacks Security Incentives (It Profits From Breaches)
Links for the day
Gemini Links 24/04/2024: People Returning to Gemlogs, Stateless Workstations
Links for the day
Meike Reichle & Debian Dating
Reprinted with permission from disguised.work
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, April 23, 2024
IRC logs for Tuesday, April 23, 2024
[Meme] EPO: Breaking the Law as a Business Model
Total disregard for the EPO to sell more monopolies in Europe (to companies that are seldom European and in need of monopoly)
The EPO's Central Staff Committee (CSC) on New Ways of Working (NWoW) and “Bringing Teams Together” (BTT)
The latest publication from the Central Staff Committee (CSC)
Volunteers wanted: Unknown Suspects team
Reprinted with permission from Daniel Pocock
Debian trademark: where does the value come from?
Reprinted with permission from Daniel Pocock
Detecting suspicious transactions in the Wikimedia grants process
Reprinted with permission from Daniel Pocock
Gunnar Wolf & Debian Modern Slavery punishments
Reprinted with permission from Daniel Pocock
On DebConf and Debian 'Bedroom Nepotism' (Connected to Canonical, Red Hat, and Google)
Why the public must know suppressed facts (which women themselves are voicing concerns about; some men muzzle them to save face)
Several Years After Vista 11 Came Out Few People in Africa Use It, Its Relative Share Declines (People Delete It and Move to BSD/GNU/Linux?)
These trends are worth discussing
Canonical, Ubuntu & Debian DebConf19 Diversity Girls email
Reprinted with permission from disguised.work
Links 23/04/2024: Escalations Around Poland, Microsoft Shares Dumped
Links for the day
Gemini Links 23/04/2024: Offline PSP Media Player and OpenBSD on ThinkPad
Links for the day
Amaya Rodrigo Sastre, Holger Levsen & Debian DebConf6 fight
Reprinted with permission from disguised.work
DebConf8: who slept with who? Rooming list leaked
Reprinted with permission from disguised.work
Bruce Perens & Debian: swiping the Open Source trademark
Reprinted with permission from disguised.work
Ean Schuessler & Debian SPI OSI trademark disputes
Reprinted with permission from disguised.work
Windows in Sudan: From 99.15% to 2.12%
With conflict in Sudan, plus the occasional escalation/s, buying a laptop with Vista 11 isn't a high priority
Anatomy of a Cancel Mob Campaign
how they go about
[Meme] The 'Cancel Culture' and Its 'Hit List'
organisers are being contacted by the 'cancel mob'
Richard Stallman's Next Public Talk is on Friday, 17:30 in Córdoba (Spain), FSF Cannot Mention It
Any attempt to marginalise founders isn't unprecedented as a strategy
IRC Proceedings: Monday, April 22, 2024
IRC logs for Monday, April 22, 2024
Over at Tux Machines...
GNU/Linux news for the past day
Don't trust me. Trust the voters.
Reprinted with permission from Daniel Pocock
Chris Lamb & Debian demanded Ubuntu censor my blog
Reprinted with permission from disguised.work
Ean Schuessler, Branden Robinson & Debian SPI accounting crisis
Reprinted with permission from disguised.work
William Lee Irwin III, Michael Schultheiss & Debian, Oracle, Russian kernel scandal
Reprinted with permission from disguised.work
Microsoft's Windows Down to 8% in Afghanistan According to statCounter Data
in Vietnam Windows is at 8%, in Iraq 4.9%, Syria 3.7%, and Yemen 2.2%
[Meme] Only Criminals Would Want to Use Printers?
The EPO's war on paper
EPO: We and Microsoft Will Spy on Everything (No Physical Copies)
The letter is dated last Thursday
Links 22/04/2024: Windows Getting Worse, Oligarch-Owned Media Attacking Assange Again
Links for the day
Links 21/04/2024: LINUX Unplugged and 'Screen Time' as the New Tobacco
Links for the day
Gemini Links 22/04/2024: Health Issues and Online Documentation
Links for the day
What Fake News or Botspew From Microsoft Looks Like... (Also: Techrights to Invest 500 Billion in Datacentres by 2050!)
Sededin Dedovic (if that's a real name) does Microsoft stenography
Stefano Maffulli's (and Microsoft's) Openwashing Slant Initiative (OSI) Report Was Finalised a Few Months Ago, Revealing Only 3% of the Money Comes From Members/People
Microsoft's role remains prominent (for OSI to help the attack on the GPL and constantly engage in promotion of proprietary GitHub)
[Meme] Master Engineer, But Only They Can Say It
One can conclude that "inclusive language" is a community-hostile trolling campaign
[Meme] It Takes Three to Grant a Monopoly, Or... Injunction Against Staff Representatives
Quality control
[Video] EPO's "Heart of Staff Rep" Has a Heartless New Rant
The wordplay is just for fun
An Unfortunate Miscalculation Of Capital
Reprinted with permission from Andy Farnell
[Video] Online Brigade Demands That the Person Who Started GNU/Linux is Denied Public Speaking (and Why FSF Cannot Mention His Speeches)
So basically the attack on RMS did not stop; even when he's ill with cancer the cancel culture will try to cancel him, preventing him from talking (or be heard) about what he started in 1983
Online Brigade Demands That the Person Who Made Nix Leaves Nix for Not Censoring People 'Enough'
Trying to 'nix' the founder over alleged "safety" of so-called 'minorities'
[Video] Inauthentic Sites and Our Upcoming Publications
In the future, at least in the short term, we'll continue to highlight Debian issues
List of Debian Suicides & Accidents
Reprinted with permission from disguised.work
Jens Schmalzing & Debian: rooftop fall, inaccurately described as accident
Reprinted with permission from disguised.work
[Teaser] EPO Leaks About EPO Leaks
Yo dawg!
On Wednesday IBM Announces 'Results' (Partial; Bad Parts Offloaded Later) and Red Hat Has Layoffs Anniversary
There's still expectation that Red Hat will make more staff cuts
IBM: We Are No Longer Pro-Nazi (Not Anymore)
Historically, IBM has had a nazi problem
Bad faith: attacking a volunteer at a time of grief, disrespect for the sanctity of human life
Reprinted with permission from Daniel Pocock
Bad faith: how many Debian Developers really committed suicide?
Reprinted with permission from Daniel Pocock
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, April 21, 2024
IRC logs for Sunday, April 21, 2024
A History of Frivolous Filings and Heavy Drug Use
So the militant was psychotic due to copious amounts of marijuana
Bad faith: suicide, stigma and tarnishing
Reprinted with permission from Daniel Pocock
UDRP Legitimate interests: EU whistleblower directive, workplace health & safety concerns
Reprinted with permission from Daniel Pocock