Links 14/06/2022: GIMP 2.10.32 Released and FakeCoins Crash

Posted in News Roundup at 5:37 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

    • Kernel Space

      • LWNLinux 5.18.4
        I'm announcing the release of the 5.18.4 kernel.
        All users of the 5.18 kernel series must upgrade.
        The updated 5.18.y git tree can be found at:
        	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.18.y
        and can be browsed at the normal kernel.org git web browser:
        greg k-h
      • LWNLinux 5.17.15
      • LWNLinux 5.15.47
      • LWNLinux 5.10.122
      • LWNLinux 5.4.198
      • LWNLinux 4.19.247
      • LWNLinux 4.14.283
      • LWNLinux 4.9.318
      • Linux Plumbers Conference (LPC)Registration Currently Sold Out, We’re Trying to Add More Places – Linux Plumbers Conference 2022

        Back in 2021 when we were planning this conference, everyone warned us that we’d still be doing social distancing and that in-person conferences were likely not to be as popular as they had been, so we lowered our headcount to fit within a socially distanced venue. Unfortunately the enthusiasm of the plumbers community didn’t follow this conventional wisdom so the available registrations sold out within days of being released. We’re now investigating how we might expand the venue capacity to accommodate some of the demand for in-person registration, so stay tuned for what we find out.

    • Instructionals/Technical

      • Tom’s HardwareHow to Use Nohup to Run Linux Scripts Unattended | Tom’s Hardware

        If you are building a robot, sensor platform, weather station then you don’t want the code to stop running when you disconnect from the terminal, and nohup is just the thing for you.In this how-to, we will learn how to use nohup via a series of examples

        There are times when you want to run a command, and leave it running even after you close a terminal window / SSH session. The simplest way is using nohup (no hangups) which will run any command or executable script long after we close the terminal.

      • Linux Made SimpleHow to install Intellij Idea 2022 Ultimate on a Chromebook

        Today we are looking at how to install Intellij Idea 2022 Ultimate on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • TechRepublicHow to manage SSH keys on Cockpit for remote SSH key authentication

        Cockpit is an outstanding web-based GUI for managing your Linux servers. Most RHEL-based servers ship with Cockpit installed and make it easy to do things like manage services, storage, networking, containers, updates, user accounts, logs, SELinux and more.

        Another less obvious feature found in Cockpit is the ability to manage SSH keys for remote SSH key authentication. Imagine this: You log into Cockpit on your AlmaLinux server, and you want to then use SSH to log in to yet another server with the built-in terminal feature. What do you do?

        If you want to work with SSH key authentication because it’s more secure, you’ll want to make sure the remote server has the public key of the Cockpit server added. You can do this all from the command line, but there’s an easier way – especially if you use multiple SSH keys – built right into Cockpit.

      • ID RootHow To Install WineHQ on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install WineHQ on Ubuntu 22.04 LTS. For those of you who didn’t know, Wine (“Wine Is Not an Emulator”) is free and open-source software that provides the ability to run Windows software on non-Windows systems. Instead of simulating internal Windows logic like a virtual machine or emulator, Wine translates Windows API calls into POSIX calls on the fly, eliminating the performance and memory penalties of other methods and allowing you to cleanly integrate Windows applications into your desktop.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the WineHQ on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.

      • eSecurity PlanetGetting Started With the Metasploit Framework: A Pentesting Tutorial | eSecurityPlanet

        The Metasploit project contains some of the best security tools available, including the open source Metasploit Framework. Both pen testers and hackers use it to find and exploit vulnerabilities as well as to set up reverse shells, develop malicious payloads, or generate reports.

      • How to Install VNC Server Ubuntu 22.04

        Virtual Network Computing (VNC) is a desktop sharing protocol that allows you to control a computer remotely using the VNC client software. In this tutorial, we will show you how to install and configure the VNC Server on the latest Ubuntu Server 22.04. This guide also covers how to securely connect to the VNC Server through SSh tunneling.

      • Make Use Of8 Classic Linux Commands and Their Modern Alternatives

        With the growth of Linux, powerful alternatives to standard Linux commands have been developed by the community. Here are some of them.

        When you’re learning Linux, you may begin with the basic commands that have existed since the days of Unix. However, developers created the standard commands long ago, and currently, these commands are simplified for ease of use.

        As an intermediate or expert user, it is good to learn powerful alternatives to these commands and master them. These alternatives to classic commands save up your time and provide detailed results.

    • Games

      • FuturismBest Retro Game Consoles in 2022

        Tapping into nostalgia for gamers of all eras is possible with the influx of retro game consoles. If your formative years were in the late ‘80s to late ‘90s, the mere mention of “Friday nights” inspires unmatched levels of nostalgia. ABC’s TGIF lineup was pretty solid, Pizza Hut’s Bigfoot pie could feed a family for a weekend, and visiting Blockbuster Video was a rush of excitement. But none of these Friday night experiences were half as good as picking up a controller and sitting in front of a CRT television with friends to play the latest hit video game. Tapping into this time warp is now possible, with some of the best retro game consoles available on the market.

      • 9to5LinuxValve Releases Proton 7.0-3 with Support for 19 Games to Play on Linux, More Improvements

        Arriving one and a half months after Proton 7.0-2, the Proton 7.0-3 release is here to add support for more Windows games that you can now play on your GNU/Linux distribution through Steam Play/Proton.

        These include Age of Chivalry, Beneath a Steel Sky, Chrono Cross: The Radical Dreamer Edition, Cities XXL, Cladun X2, Cursed Armor, Flanarion Tactics, Gary Grigsby’s War in the East, Gary Grigsby’s War in the West, Iragon: Prologue, MechWarrior Online, and many others.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • LiliputingKDE Plasma 5.25 brings new gestures, better support for 2-in-1 tablets, and more customization options

          The latest version of the KDE Plasma desktop environment for Linux and other open source operating system is here and, among other things, KDE Plasma 5.25 brings support for new touchscreen and touchpad gestures, a new way for multitaskers to view all of their apps and desktops at once, and a bunch of new customization options.

        • LinuxiacKDE Plasma 5.25 Comes with Another Dose of Customization Capabilities

          New touchpad gestures, syncing the accent color, and touch mode are some of the new features in the KDE Plasma 5.25 Desktop Environment.

          Regarding the desktop, the KDE Desktop Environment is one of the two hegemons in the Linux world. Adored by some and considered overcomplicated by others, it has a well-deserved top spot in the hearts of aesthetic connoisseurs over the years.

          Furthermore, its strong support over the years proves that KDE Plasma is a desktop environment on which any Linux user can rely.

          KDE Plasma, as we all know, is about the endless possibilities for personalization. And the just-released KDE Plasma 5.25 is no exception. Indeed, none of the fans of this desktop environment will be disappointed with another dose of enhancements and features it brings. So, let’s take a look at them.

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • IT Pro TodayBeware the ‘Secret Agent’ Cloud Middleware

      New open source database details the software that cloud service providers typically silently install on enterprises’ virtual machines — often unbeknownst to customers.

    • OSI BlogHigher Ed needs to step up to stay relevant as Open Source floods the IT world [Ed: So this is where Patrick Masson moved to after he quit OSI; Danese Cooper Cooper, who worked for famous criminal Bill Gates, is there too]

      Grant money is pouring in to support institutions of higher education that are taking a strong position in the adoption of Open Source technologies. 82% of enterprise IT leaders are choosing to work with Open Source vendors, and higher education is stepping up and following suit. In order to stay competitive, campuses must take a critical look at how they manage IT portfolios and seriously consider a larger commitment to their own Open Source strategy.

    • GNU Projects

      • GNU Image Manipulation Program (GIMP)GIMP 2.10.32 Released

        GIMP continues strengthening its bases as this new version 2.10.32 is quite heavy on bug fixes and improves our support for many image file formats.

        This news lists the most notable and visible changes. In particular, we do not list here the bug fixes. To get a more complete list of changes, you should refer to the NEWS file or look at the commit history.

      • 9to5LinuxGIMP 2.10.32 Released with Support for 8/16-bit CMYK(A) TIFF Files, BigTIFF

        GIMP 2.10.32 is here almost six months after GIMP 2.10.30 with a bunch of cool changes, starting with support for importing 8-bit and 16-bit CMYK(A) TIFF files, support for importing and exporting BigTIFF files, as well as built-in support for JPEG XL files (without the need of a third-party plugin).

    • Programming/Development

      • Make Use OfThe Ultimate Emacs Guide for Editing Files on Linux

        Emacs is one of the oldest text editors you can find today. It has been in development for over 40 years as of the year 2022.

        Emacs is cross-platform, open-source, and versatile. You can use it for a wide range of things, from editing configuration files to programming and document processing. Understanding how to use this powerful editor can greatly improve your productivity on Linux.

      • Frederic CambusAssembly instructions distribution | Frederic Cambus

        In my article about running FreeBSD on the Vortex86DX CPU, I mentioned using objdump to disassemble kernels in order to check whether they were using CMOV instructions or not.

        One thing leading to another, I thought it would be fun to calculate the distribution of assembly instructions in ELF binaries. It turns out it can be done rather easily with a bit of Shell foo.

        For the purpose of this article, I used SQLite 3.38.5 (2022-05-06) built with GCC 12.1.1 on Fedora 36 using the default optimization level (-O2) as a target binary to test instructions distribution against. It is a self-contained, full-featured SQL database engine as a single binary, making it an excellent choice for our experiment.

      • The 12 Habits of Highly Effective Python Developers • Python Land Blog

        I’ve worked with many software developers, some of them fresh out of college and others seasoned professionals. This article lists some of the traits these people seem to have in common, and I’m confident that there’s something to learn for everyone in here, no matter your track record!

      • RlangHopf torus, circle by circle

        Remember my first post on the Hopf torus? I constructed it circle by circle. Below are some animations of this construction. I save the image each time a circle is added. The rgl package automatically centers the plot, and this gives a nice effect.

  • Leftovers

    • my interview experience with hashicorp

      I don’t get why companies are so apprehensive to provide constructive feedback. Simply “we are looking at other, more qualified applicants” or “you are a react fanboi” would be sufficient. There was no reason provided and they were being a little secretive about it. Maybe it’s about liability or they don’t want any opportunity for the applicant to be confrontational? It was nice to get a rejection phone call even though an email would be sufficient since it was pretty clear that they wanted to cut off all further communication.

    • Science

      • uni TorontoFramebuffer consoles have been around before on Unix workstations

        The early Unix machines were what we would today call ‘servers’, and generally used serial terminals as their system console (well, they used serial ttys for pretty much everyone, but one of them was special). But then Unix workstations came along, which is to say small Unix machines with graphical displays. In theory these machines could have been designed to boot with their system console as a serial terminal (and often you could reconfigure them that way), but in practice that would have been rather awkward, so the graphics hardware and the graphical display were used as the system console. Which is to say that these machines had a framebuffer console, much like how modern Linux kernels work on x86 hardware. And just like modern Linux machines, these Unix workstations generally had surprisingly slow text output on their framebuffer consoles.

        (For example, you can watch the somewhat leisurely text output of the kernel boot messages in this video of a Sun 3/60 booting.)

        There generally were three reasons for this. First, these machines were just slow in general (by modern standards). Second, the machines were often using simple unaccelerated graphics to render their console text; using sophisticated code and hardware acceleration was generally something only the display server did (and there wasn’t always hardware acceleration). Among other things, this kept the complexity of the kernel framebuffer driver down. And third, they were generally rendering text on the entire screen, often with large fonts. This would be like the difference between a normal 80×24 terminal window with normal sized text and a full screen terminal window with big text, although today’s hardware often has fast enough text rendering that you might not notice much speed difference.

      • GizmodoNew Milky Way Visualizations Show the Dance of Millions of Stars in Incredible Detail

        ESA’s Gaia detected unusual ‘starquakes’ during its third survey of the galaxy.

      • FuturismThe Transcripts of an AI That a Google Engineer Claims Is Sentient Are Pretty Wild

        The story drew widespread media attention, stoking the fires of a familiar debate. Are contemporary language models really capable of gaining consciousness — or did Lemoine just see the image of his own humanity reflected back to him?

    • Security

      • LWNThe “Hertzbleed” vulnerability [LWN.net]

        Today’s branded, logo-equipped vulnerability is known as Hertzbleed; it affects x86 processors (at least) and can be exploited in some situations to extract cryptographic keys from a remote server.

      • USCERTMicrosoft Releases June 2022 Security Updates [Ed: Microsoft has loads of unpatched and actively-exploited security holes, Microsoft-sponsored media obsesses over "Linux"]

        Microsoft has released updates to address multiple vulnerabilities in Microsoft software. An attacker can exploit some of these vulnerabilities to take control of an affected system.

        CISA encourages users and administrators to review Microsoft’s June 2022 Security Update Summary and Deployment Information and apply the necessary updates.

      • TechRepublicNew botnet and cryptominer Panchan attacking Linux servers [Ed: This is not an issue with Linux itself, but this Microsoft-funded site wants to shift attention away from actively-exploited and unpatched Microsoft flaws; it also spreads FUD about Go for merely being used to develop some malware]

        Panchan is written in the Go programming language and utilizes Go’s concurrency features to maximize its spread and execute payloads.

      • TechRadarThis new Linux rootkit malware is already targeting victims [Ed: Again, this is not an issue with Linux itself; it's some malware that can sometimes be installed on Linux, but that helps distract from deliberate back doors in Windows]
      • Security WeekWindows Updates Patch Actively Exploited ‘Follina’ Vulnerability [Ed: Microsoft should be banned from technology procurement over this]

        Microsoft has fixed roughly 50 vulnerabilities with its June 2022 Patch Tuesday updates, including the actively exploited flaw known as Follina and CVE-2022-30190.

      • Security WeekAvast: New Linux Rootkit and Backdoor Align Perfectly [Ed: Misportraying and conflating malware that gets installed on Linux with Linux itself]

        Malware hunters at Avast have analyzed a newly discovered rootkit and backdoor that target Linux and appear designed to function in synergy with each other.

      • The Cyber WireStealthy Linux malware. Aoqin Dragon targets Southeast Asia and Australia. Iranian spearphishing campaign. BlackCat RaaS described. [Ed: The issue is the malware, not Linux; Linux can be patched fully, but someone installing malware would still be a problem.]
      • USCERTCISA Adds One Known Exploited Vulnerability to Catalog [Ed: Notice how CISA refrains from naming Windows even though this is 100% about Windows and nothing but Windows; does CISA help Microsoft cover up another security scandal?]

        CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.

    • Defence/Aggression

      • Modern DiplomacyCrumbling CBM Frameworks and the Risk of Inadvertent Escalation

        In 1962, the world witnessed the most precarious event in ages. The USA and USSR were engaged in a perilous standoff over the deployment of Soviet missiles in Cuba and a small error or miscalculation could have reverted humanity into the Stone Age.

      • HRWRwanda: Jailed Critic Denounces Torture in Prison | Human Rights Watch

        Click to expand Image Aimable Karasira (left) and Dieudonné Niyonsenga (right). © Private
        (Nairobi) – A prominent Rwandan YouTube commentator has accused prison authorities of beating him and other jailed critics, Human Rights Watch said today. In a statement at a court hearing in Kigali on May 30, 2022, Aimable Karasira, held in Nyarugenge prison, also said prison authorities were intercepting and withholding privileged communications from his lawyer.

        Ahead of the Commonwealth Heads of Government Meeting (CHOGM), scheduled to begin on June 20, 2022, in Rwanda, Commonwealth leaders should urgently call for the government to immediately and unconditionally release all those jailed for exercising their right to freedom of expression. Commonwealth leaders should also press the government to open credible investigations into allegations of torture and fair trial rights violations, and to initiate substantive reforms to tackle abusive provisions in Rwanda’s legal framework.

      • France24Ivory Coast’s Blé Goudé on his upcoming return home after ICC acquittal

        After being definitively acquitted of crimes against humanity by the International Criminal Court last year, Charles Blé Goudé, the former right-hand man of ex-Ivorian president Laurent Gbagbo, is expected to soon return to Ivory Coast after more than a decade in exile. On May 30, Blé Goudé received an Ivorian passport via the current president, Alassane Ouattara. In an interview with FRANCE 24, Blé Goudé discussed his upcoming return home, as well as his political ambitions.

      • New York TimesRussian Control of Luhansk and Donbas Could Hinge on Sievierodonetsk
    • Environment

      • Energy

        • ViceThe Bitcoin Crash Is Taking El Salvador’s Big Bet With It

          The ongoing crypto crash has managed to wipe out over 50 percent of the value of El Salvador’s Bitcoin hoard.

          The Nayib Bukele tracker, named after the country’s Bitcoin-obsessed president, records each purchase the country announces, its cost basis, total reserves, and average cost basis of those reserves. Bukele has purchased 2,301 Bitcoins at an average cost of $45,908 and a total cost of $105.6 million. Today, with the price of Bitcoin hovering around $22,000, El Salvador’s reserves have shed 51 percent of their value and are worth $51.6 million.

          El Salvador’s embrace of Bitcoin has been bombastic, and widely lambasted by critics inside the country and out. Shortly before its most recent purchase on May 9, rating agency Moody’s downgraded the country’s debt. Before that, in January, the IMF recommended that El Salvador liquidate its Bitcoin holdings and abandon the cryptocurrency as legal tender, resulting in an angry rebuke from the government: Treasury Minister Alejandro Zelaya saying on local television that “no international organization is going to make us do anything, anything at all.”

        • RE: RE: The useful part of cryprocurrency

          My fault. I should have make it clear in my post. I mean “secure” by cryptographically secure, not “secure” as in “you won’t loose money because market or scams” secure. “Not your keys, not your Crypto” would be a good way to put it. Signing Bitcoin transactions using your key is secure because <insert course on cryptography>. Just like you can’t sign your emails with RMS’ digital signacutre without his actual key. Your Bitcoin won’t magically disappear witout you (or be accurate, someone with your private key, which hopefully is only you alone) signing the transaction. In contrast with credit cards, knowing the card number and CVC is enough to initiate a transaction. Or a rogue bank manager can sign you up for a credit card without your actual consent. Breaking ECDSA is much, much harder than faking your (hand) signature.


          I do agree with his other points. It’s too volatile to be any good use for transaction. Too inefficent using up power and caused the GPU price hike. Yeiks. Energy consumption can be solved by transition to PoS for forgo the entire blockchain structure. Lock-free decentralized 0-trust consistant avaliable anonymous transaction is really hard. Yet, these are solvable with more engineering (and less hype). I don’t think gas fee is much of a problem. For the use cases I presented, overseans transaction. Typically it’s around 3% using banks. And more if an intermediary is involved. If I were to buy a $5000 server from Supermicro, the fee lands around $150. But with XMR the worst case is around 0.7USD and average of $0.02 2 weeks ago. ETH is at ~20USD few weeks back. That’s a bargain. Furthermore, the transaction fee of XMR is comparable with a credit card for anything > $6.00. And the ~2min transaction time is good enough for online shopping.

        • CBCWhen stocks, houses and crypto fall, where does all that money go? | CBC News

          Seven months ago, there was a celebratory mood in the air for crypto traders as the two best-known cryptocurrencies, bitcoin and ethereum, shot to new highs.

          Advocates said “told you so,” as financial journalists reported that the value of the global crypto market had soared to a stunning new record of about $3 trillion US.

          A trillion — a million millions, or a one followed by 12 zeros — is one of those numbers so big it is hard to grasp in comparison to our daily lives. A trillion dollars would buy more than 1.3 million Canadian homes. If you kept it in cash, it would give you $1 million a day in spending money for 3,000 years.

    • Censorship/Free Speech

      • RFAChina sets information blockade after 6.0 magnitude earthquake hits Tibetan county — Radio Free Asia

        The Chinese government is imposing an information lockdown after a series of earthquakes in a Tibetan county in Sichuan province displaced more than 25,000 residents, RFA has learned.

        The initial quake, measuring 6.0 on the Richter scale, hit Barkam (Maerkang in Chinese), a county-level city in the Ngawa (Aba) Tibetan and Qiang Autonomous Prefecture, at 1:28 a.m. June 10, Beijing time, the China Earthquake Networks Center (CENC) reported.

        According to a state-run media report, the quake injured at least one person and 1,314 rescuers were dispatched to the area. An estimated 25,790 residents of the area were transferred and resettled.

        “Most of the houses [in affected areas] are destroyed and many have sustained extensive damage,” a source told RFA’s Tibetan Service Friday on condition of anonymity for security reasons. “Many people have been left injured, but I haven’t heard any death reports so far.”

    • Freedom of Information / Freedom of the Press

      • France24Brazilian police deny bodies found in search for UK journalist, indigenous expert

        Brazilian authorities say they have found a backpack and personal effects of a British journalist and an Indigenous expert who disappeared in the Amazon last week, with the Briton’s mother-in-law saying she has lost hope that they will emerge alive.

      • RFAVietnam state media trained to protect government policies — Radio Free Asia

        Reporters and editors employed by state media outlets in Vietnam are being trained to uphold the views of the ruling Communist Party on human rights, freedom of expression and other politically sensitive topics, sources in the country say.

        Vietnam’s government appears especially sensitive to foreign criticism on human rights issues, frequently attacking allegations of abuse or the suppression of free speech as the work of hostile forces, according to rights groups and other activists.

        Trainings are now held each year to ensure that those working in Vietnam’s state-owned media work within limits set by the government and ruling party, Nguyen Ngoc Vinh — former managing editor of the country’s popular Tuoi Tre (Youth) newspaper — told RFA in an interview.

      • ANF NewsANF | 837 journalists and 62 institutions: We stand by our colleagues detained in Amed

        837 journalists and 62 institutions issued a joint statement in solidarity with colleagues detained in Amed.

        The statement said: “We, the undersigned professional press organizations and journalists, condemn the ruthless detention of Kurdish journalists and press workers by police raids on Wednesday, June 8th.

        We invite everyone, especially the opposition, which has claims about law, justice, equality, freedom and democracy, and who intend to prepare for the Turkey of the future, to stand in solidarity with our colleagues in detention and take a stand against the violence of the government.”

      • HRWAfghanistan’s Taliban Crack Down on Vloggers | Human Rights Watch

        Click to expand Image Ajmal Haqiqi (center) and two colleagues after their arrest, Kabul, June 7, 2021. Source: General Directorate of Intelligence, Twitter, June 7, 2022 https://twitter.com/GDI1415/status/1534212175488864256
        On June 7, Afghan vlogger Ajmal Haqiqi – well known for his YouTube channel and modeling shows – appeared in a very different kind of broadcast. Taliban officials arrested Haqiqi and his three colleagues and released a video showing the men, with bruised faces and clearly under duress, apologizing for encouraging “prostitution” and “insulting verses of the Quran.”

        On May 28, the four had posted a YouTube video in which they recited Quranic verses in Arabic in a comical tone. Within a week, the Taliban’s General Directorate of Intelligence (GDI) had detained them.

    • Civil Rights/Policing

    • Internet Policy/Net Neutrality

      • Daniel MiesslerWhy Everyone Needs a Blog

        In this post I’m going to convince you why everyone needs a blog. Even you.


        People used to be defined by where they work, and now they’re defined by their knowledge, capabilities, and opinions.

        Everyone in the 1950s had a resume; it was unthinkable not to have one. Why is that?

        The reason is that the primary communication of value and worth was from the person to a company you wanted to work at. Your value was what you could provide to a company, not what you could provide to other humans outside your circle. The only people who had ideas worth sharing with the world were authors, and they were considered super-human.

Like Batka, Like Son

Posted in Europe, Patents at 3:41 pm by Dr. Roy Schestowitz

Wait, it's not what it looks like!

Summary: As reported this week, the EPO‘s António Campinos acts a lot like Alyaksandr Lukashenka (to whom he and Benoît Battistelli have been funneling the money of EPO users)

[Meme] EPO ‘Democracy’: Friend Brings Friends

Posted in Europe, Patents at 2:18 pm by Dr. Roy Schestowitz

Benoît Battistelli and António Campinos have turned the EPO into a laughing stock; even the examiners’ morale is affected by this corruption (it’s like a monarchy without elections, making up by kinship and nepotism)

EPO 'oversight'

Summary: The EPO should quit pretending to be a patent office rather than a family or circle of friends who plunder the institution by illicitly selling Europe-wide monopolies to very large corporations, most of which aren’t even European

EPO: Privatising Everything and Passing Capital to Corrupt Executives’ Pockets (or Monetising the Abolition of the EPC)

Posted in Europe, Patents at 2:05 pm by Dr. Roy Schestowitz

Video download link | md5sum a2e64cc9877a1cc3aada2e553a359a0f
Important Month That Can Make or Break EPO
Creative Commons Attribution-No Derivative Works 4.0

Summary: The Administrative Council of the European Patent Organisation may make an important decision by month's end, but we predict that the corrupt cabal will stay, deepening a growing EPO crisis which spills over to the EU and other institutions

THE EPO has an important decision to make this month. Will António Campinos be tentatively shown the door? He clearly wants to stay, but he is breaking the rules of the Office and almost nobody in the Office trusts him.

The video above covers this this latest inane puff piece (warning: epo.org link) and then discusses what’s next for the Office. It seems a little too late to restore calm and legality at the EPO; too many self-serving, corrupt individuals helped themselves to the cookie jar; the lack of oversight emboldened such behaviour.

Links 14/06/2022: EuroLinux 9.0 and Kdenlive 22.04.2

Posted in News Roundup at 1:49 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Linux LinksLinux Around The World: USA – California – LinuxLinks

      California is a state in the Western United States. California borders Oregon to the north, Nevada and Arizona to the east, the Mexican state of Baja California to the south; and has a coastline along the Pacific Ocean to the west.

    • Audiocasts/Shows

    • Kernel Space

      • 9to5LinuxLinux Kernel 5.17 Reaches End of Life, Users Urged to Upgrade to Linux 5.18

        Linux kernel 5.17 was released on March 20th, 2022, and it appears to be the shortest-lived kernel series to date. After only fifteen maintenance releases, Linux kernel 5.17 has now reached its end of life, which means that no further security updates will be provided for this branch in the future.

        Therefore, all GNU/Linux distribution maintainers and users who like to compile their own kernels or install the newest from third-party repositories are now urged to upgrade their systems to the latest and greatest Linux 5.18 kernel series, which was also updated today to version 5.18.4.

    • Applications

    • Instructionals/Technical

      • Make Use OfHow to Set Up a Postfix Mail Server on Debian

        E-mail is one of the most basic messaging methods used since the development of the internet. This has led to the development of many messaging tools and protocols. There are protocols for the compatible operation of systems with different architectures.

        E-mail servers perform tasks such as not losing user e-mails, and assisting users in accessing their e-mails when they’re online. The tools that provide e-mail transmission on local intranets and the internet are called Mail Transfer Agents (MTA).

      • ByteXDHow To Exclude Matches, Directories Or Files with Grep – ByteXD

        In this article we’ll learn about with a wide range of features to exclude directories, skipping files and selecting non-matching results while searching files with grep.

      • ZDNetHow to use the scp command in Linux | ZDNet

        When you want to transfer a file from one Linux computer to another, you have several options, some of which are GUI tools and some that are not. One of the most popular methods of transferring files also happens to be one of the more secure. That method is by way of the scp command.

        Scp stands for Secure Copy and is part of the SSH tool, which nearly every Linux distribution includes out of the box. That means you don’t have to install any extra software to get this done.

      • TecAdminHow to Create SFTP User in Ubuntu 22.04 (No Shell Access) – TecAdmin

        SFTP is a protocol that allows for the secure transfer of files over a network. It is often used by businesses and individuals to transfer sensitive data. SFTP is similar to FTP but uses a different protocol for communication. SFTP is more secure than FTP and is often used in conjunction with SSH (Secure Shell) to provide an even higher level of security.

        In this tutorial, we will help you to set up an SFTP server and create an SFTP-only user on Ubuntu 22.04 systems. That account can connect over SFTP but is not able to connect over SSH. Also, this will restrict (chroot) the SFTP user to a specific directory only.

      • ID RootHow To Install Cockpit on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install Cockpit on Ubuntu 22.04 LTS. For those of you who didn’t know, The cockpit is a free and open-source web-based graphical interface for servers. It helps advance users in quickly updating, enabling services, restarting the system, accessing Docker containers, Network, storage management, and all above the web-based terminal to issue commands remotely on a server.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Cockpit web-based graphical interface for servers on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

      • Ubuntu HandbookHow to Import Your Photos Easily from iPhone to Ubuntu 22.04 | UbuntuHandbook

        It’s easy to make backup of your iPhone’s photos, since Ubuntu now has out-of-the-box support for accessing iOS files.

        To make life easy, the gThumb image organizer can even pop-up the photo import dialog automatically once your iPhone is plugged in via USB port.

      • UbuntubuzzHow To Edit Ubuntu Bootloader Menu Made Simple

        Do you want to change Ubuntu’s GNU GRUB menu at startup time? Either it is disabling it completely or just editing the text to suit your needs, you can do it all. Here’s the tutorial for you made simple.

      • TechtownHow to check the MySQL version on Linux – Techtown

        Having a MySQL instance is quite normal in a server or workstation where you work with database connections with this program. The problem arises when we do not know the version of MySQL that the system has. And this can cause some compatibility issues with applications. The solution? Read this post, where you will learn how to check the MySQL version on Linux.

        I don’t know if it is the most popular, but MySQL is for sure one of the most important database managers that you can use, even if it has MariaDB as a competitor. For this very reason, many applications use it as their trusted data manager.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • DebugPointKDE Plasma 5.25: Top New Features and Release Details

          KDE Plasma 5.25 is the 27th version of KDE Plasma desktop, not an LTS release. This release is followed by the prior 5.24 LTS, released in February. KDE Plasma 5.25 brings several exciting updates on the desktop UI, polished applets, widgets, a good set of gesture updates for touch-based devices and a massive list of bug fixes. Plasma 5.25 is based on Qt 5.15.2 and KDE Frameworks 5.94.

        • DebugPointKDE Plasma 5.25 Released with Dynamic Accent Colour, Floating Panel

          KDE team announced today the general availability of the KDE Plasma 5.25 desktop environment for download.

          The 27th release of KDE Plasma desktop – KDE Plasma 5.25 is here, followed by the prior 5.24 LTS release. Coming after almost five months, this release is significant because for the first time, you get the dynamic accent colour which changes based on the wallpaper. In addition, you can also take advantage of the floating panel, more gesture support for touch-based devices, a massive list of bug fixes and many under-the-hood changes.

        • LWNPlasma 5.25.0 released [LWN.net]

          Version 5.25.0 of the KDE-based Plasma desktop has been released. New features include support for touchpad and touchscreen gestures, an “overview” mode for navigating between windows, additional color configuration options, and more.

        • Plasma 5.25: Amazement Guaranteed – Kockatoo Tube

          Plasma 5.25 brings new features and concepts to the desktop environment. Check out how you can now handle your desktop through gestures on your touchpad or touchscreen, the advanced and easy to use customization features, an improved and very useful Overview, and much, much more.

        • Kdenlive 22.04.2 Released – Kdenlive

          The polishing and stability effort of this release cycle continues with the release Kdenlive 22.04.2 which comes with bug fixes to the AppImage and Mac packages, render widget, same track transitions, subtitles and project loading issues.

  • Distributions and Operating Systems

    • New Releases

      • EuroLinux 9.0 released

        On June 13, 2022, we released version 9.0 of the EuroLinux operating system. It is compatible with the latest upstream release. This release focuses on providing improved default cryptographic policies, a 5.14 kernel, a graphical management interface via a web panel, and improvements related to cloud, virtualization and containerization. “Nine” also introduces a major update in the form of the GNOME 40 desktop environment (with modern GTK 4). An important change for those who want to use EuroLinux on x86_64 architecture, is the need to have a processor supporting x86_64-v2 microarchitecture (also on virtual machines)

    • Fedora Family / IBM

      • CentOSCentOS Community Newsletter, June 2022

        CentOS is hosting an online Dojo this Friday, June 17, from 14:00 to 20:00 UTC. CentOS Dojos are free miniconferences with talks on a variety of topics from CentOS and the wider Enterprise Linux ecosystem. This Dojo features seven talks, along with an informal chat with the CentOS Board of Directors.

      • Red Hat OfficialSave time and money with Red Hat Insights Compliance reporting

        Organizations across the globe continue to focus on managing security and risk compliance as the threat landscape evolves. Funding for IT security remains the top priority for many enterprises, as reported in the 2022 Global Tech Outlook report, published by Red Hat earlier this year.

        When it comes to managing security and regulatory compliance risks, enterprises face an increasing number of challenges. One of these is managing the regulatory compliance of IT infrastructure to various cybersecurity policies (e.g. PCI, HIPAA, CIS, etc.). This is an ongoing, constantly-evolving need. As an enterprise, managing the regulatory compliance of your infrastructure without any disruption to the business has become a critical exercise.

    • Debian Family

      • Dashamir Hoxha & Debian harassment

        Thanks to the WIPO legal dossier, we now have more evidence of the source of harassment in Debian.

        We previously reported on a Google Summer of Code (GSoC) intern from Bhopal, India, who was not paid the full stipend.

        It raises numerous questions: the intern who failed, Deepanshu Gajbhiye, had done more technical work than the Albanian woman who received $6,000 for Outreachy in 2019.

        Today we release another fact: Deepanshu’s mentor was an Albanian, Dashamir Hoxha. Deepanshu had sent a written complaint about the mentor. The complaint was escalated to the Debian anti-harassment team and they did nothing. We feel the Debian anti-harassment team has protected the Albanians because the Albanians bring pretty young female interns to conferences.

  • Free, Libre, and Open Source Software

    • Web Browsers

      • Mozilla

        • MozillaFirefox Rolls Out Total Cookie Protection By Default To All Users

          Starting today, Firefox is rolling out Total Cookie Protection by default to all Firefox users worldwide, making Firefox the most private and secure major browser available across Windows and Mac. Total Cookie Protection is Firefox’s strongest privacy protection to date, confining cookies to the site where they were created, thus preventing tracking companies from using these cookies to track your browsing from site to site.

          Whether it’s applying for a student loan, seeking treatment or advice through a health site, or browsing an online dating app, massive amounts of your personal information is online — and this data is leaking all over the web. The hyper-specific-to-you ads you so often see online are made possible by cookies that are used to track your behavior across sites and build an extremely sophisticated profile of who you are.

          Recent stories (including an excellent Last Week Tonight episode) have shown how robust, yet under-the-radar, the data selling economy is and how easy it is for anyone to buy your data, combine it with more data about you and use it for a variety of purposes, even beyond advertising.

        • LWN“Total cookie protection” from Firefox [LWN.net]

          Mozilla has announced the enabling of its “total cookie protection” feature in all versions of the Firefox browser.

        • FOSSLifeThunderbird on Android Plans Announced

          Open source, cross-platform email client Thunderbird has announced plans to provide Thunderbird on Android and iOS devices.

          According to Jason Evangelho in the announcement, K-9 Mail has officially joined the Thunderbird family and will ultimately transform into Thunderbird on Android. Additionally, K-9 Mail’s project maintainer, Christian Ketterer, has joined the Thunderbird staff.

          “This move allows Thunderbird users to have a powerful, privacy-respecting email experience today on Android. Plus, it lets the community help shape the transition of K-9 Mail into a fully featured mobile Thunderbird experience,” Evangelho says.

        • Tiny Bookmark Tab WebExtension

          I’ve been using a custom Firefox web extension for my homepage for nearly a year now. It’s just a tree-list of my browser’s bookmarks. It’s built for speed; no extra features already provided by the browser (like bookmark organization).

    • Content Management Systems (CMS)

      • MedevelWackoWiki is a New Open-source Wiki Engine

        WackoWiki is a free, open-source light and easy to install multilingual Wiki-engine. Supports WYTIWYG-editing, page rights (ACLs), design themes (skins), file upload, email notification and much more. Compatible with PHP 7.3 – 8.1 and MariaDB / MySQL.

    • Programming/Development

      • Jussi PakkanenNibble Stew: Attempting to create an aesthetic global line breaking algorithm

        As you can easily tell, line breaks made at the beginning of the chapter affect the potential line breaks you can do later. Sometimes it is worth it to make a locally non-optimal choice at the beginning to get a better line break possibility much later. Evaluating a global metric like this can be potentially slow, which is why interactive programs like LibreOffice do not use this method.

        The classical way of solving this problem is to use dynamic programming. It has the requirement that the problem must conform to a requirement called the Bellman optimality condition (or, if you are into rocketry, the Pontryagin maximum principle). This is perhaps best illustrated with an example: suppose you are in Paris and want to drive to Venice. This requires picking some path to drive that is “optimal” for your requirements. Now suppose we know that Zürich is along the path of this optimal route. The requirement basically says, then, that the optimal route you take from Paris to Zürich does not in any way affect the optimal route from Zürich to Venice. That is, the two paths can be routed independently of each other. This is true for the basic form of Knuth-Plass line breaking.

        It is not true for line breaking in practice.

      • Rust

        • MozillaEverything Is Broken: Shipping rust-minidump at Mozilla – Part 1 – Mozilla Hacks – the Web developer blog

          For the last year I’ve been leading the development of rust-minidump, a pure-Rust replacement for the minidump-processing half of google-breakpad.

          Well actually in some sense I finished that work, because Mozilla already deployed it as the crash processing backend for Firefox 6 months ago, it runs in half the time, and seems to be more reliable. (And you know, isn’t a terrifying ball of C++ that parses and evaluates arbitrary input from the internet. We did our best to isolate Breakpad, but still… yikes.)

          This is a pretty fantastic result, but there’s always more work to do because Minidumps are an inky abyss that grows deeper the further you delve… wait no I’m getting ahead of myself. First the light, then the abyss. Yes. Light first.

          What I can say is that we have a very solid implementation of the core functionality of minidump parsing+analysis for the biggest platforms (x86, x64, ARM, ARM64; Windows, MacOS, Linux, Android). But if you want to read minidumps generated on a PlayStation 3 or process a Full Memory dump, you won’t be served quite as well.

  • Leftovers

    • Genre vs Literature

      There are a lot of beloved-by-me stories in that first category, like Snow Crash on the heels of the Sprawl Trilogy, or From A Buick 8 in the tradition of Chambers or Bierce, but I can still see why people sometimes wanna make this division as some sort of litmus test or indicator when they look for Great Literature—not a perfect test by any means because there are both false positives and false negatives, but still somewhat useful as one kind of data point.

      Where they lose me, though, and what I can’t get behind, is when they take the presence of anything supernatural, fantastic, otherworldly, technological, speculative—in short, anything fantastic—as a reason to dismiss a book as “genre”.

      Then they lose their collective proverbials and awe at the sight of Marquez and his “magical realism”.

    • samoświadomość: ucieczki cel ostateczny / self-awareness: the ultimate goal of the escape

      First, what kind of escape am I talking about. A strategic retreat? An escape to save higher goals? Nope. On the other side of the spectrum, is it about simple procrastination, creative procrastination that I have control over and can stop when I want to

    • Proprietary

      • MozillaHow to set Firefox as your default browser on Windows [Ed: Delete Windows. Microsoft cannot be trusted with users' preferences.]

        During a software update, your settings can sometimes change or revert back to their original state. For example, if your computer has multiple browsers installed, you may end up with a different default browser than Firefox. That’s easy to fix so that Firefox is there for you when you expect it, like when you click on web links in email and other apps.

        With Firefox set as your default Windows browser, you’ll be automatically guarded from invasive tracking methods like fingerprinting and cryptomining, thanks to Firefox’s technology that blocks more than 10,000,000,000 trackers every day including Total Cookie Protection. (See what Firefox has blocked for you.) Your bookmarks, history, open tabs, form information and passwords are accessible wherever you’re logged into Firefox, from your PC to your phone to your tablet.

    • Security

      • Hertzbleed Attack

        Hertzbleed is a new family of side-channel attacks: frequency side channels. In the worst case, these attacks can allow an attacker to extract cryptographic keys from remote servers that were previously believed to be secure.

      • GoogleProject Zero: An Autopsy on a Zombie In-the-Wild 0-day

        Whenever there’s a new in-the-wild 0-day disclosed, I’m very interested in understanding the root cause of the bug. This allows us to then understand if it was fully fixed, look for variants, and brainstorm new mitigations. This blog is the story of a “zombie” Safari 0-day and how it came back from the dead to be disclosed as exploited in-the-wild in 2022. CVE-2022-22620 was initially fixed in 2013, reintroduced in 2016, and then disclosed as exploited in-the-wild in 2022. If you’re interested in the full root cause analysis for CVE-2022-22620, we’ve published it here.

        In the 2020 Year in Review of 0-days exploited in the wild, I wrote how 25% of all 0-days detected and disclosed as exploited in-the-wild in 2020 were variants of previously disclosed vulnerabilities. Almost halfway through 2022 and it seems like we’re seeing a similar trend. Attackers don’t need novel bugs to effectively exploit users with 0-days, but instead can use vulnerabilities closely related to previously disclosed ones. This blog focuses on just one example from this year because it’s a little bit different from other variants that we’ve discussed before. Most variants we’ve discussed previously exist due to incomplete patching. But in this case, the variant was completely patched when the vulnerability was initially reported in 2013. However, the variant was reintroduced 3 years later during large refactoring efforts. The vulnerability then continued to exist for 5 years until it was fixed as an in-the-wild 0-day in January 2022.

      • LWNSecurity updates for Tuesday [LWN.net]

        Security updates have been issued by Fedora (golang-github-docker-libnetwork and moby-engine), Mageia (apache, docker-containerd, kernel, kernel-linus, nats-server, and php-smarty), Slackware (php), SUSE (gimp, grub2, thunderbird, u-boot, and xen), and Ubuntu (firefox, liblouis, ncurses, and rsync).

      • InfoWorldDetect cloud native security threats with Tracee | InfoWorld

        Open source Tracee uses Linux eBPF technology to trace system and applications at runtime, and analyzes collected events to detect suspicious behavioral patterns.

      • LinuxSecurityThe Three Best Tools You Need to Scan Your Linux System for Malware

        While Linux Servers are already extremely secure by default, there are extra steps you can and should take if you do have a Linux Server instance running. As with any system, vulnerabilities still exist and can wreak havoc if proper prevention and security best practices are not implemented. Of course, the most well known and most basic security tip people will tell you is to keep up to date with updates and security patches. (As we all should!) However, this will only do so much. Linux being amongst one of the most widely implemented and deployed operating systems makes it an attractive target for cybercriminals trying to steal your information, install malicious files on your system, and even try to run malicious scripts to take control of your system.

      • Fear, Uncertainty,

      • Privacy/Surveillance

        • AccessNowStop the deal: U.S. defense contractor to buy NSO Group – Access Now

          According to reports, U.S. defense contractor L3Harris Tech plans to acquire sanctioned spyware maker NSO Group.

          NSO Group has been in the international spotlight for their facilitation of human rights abuses around the world, from Palestine to El Salvador to Poland. The spyware was also used to target U.S. diplomats’ phones. These ongoing revelations have led to the U.S. government and other stakeholders taking a number of actions against the company.

          Notably, the Biden administration added NSO to its blocked Entity List for violating U.S. national security. This move was so consequential that it reportedly pushed NSO to the brink of financial collapse, leading the firm to consider shutting down Pegasus and selling the company in its entirety. Earlier this year, U.S. venture capital firm Integrity Partners was in its final stage of negotiations to purchase NSO.

    • Environment

      • Energy

        • Re: The useful part of cryptocurrency

          Let’s imagine that you’re concerned about climate change. You’ve decided to leave the city and move to a place where you can grow your own food (or at least some of it). You settle on a part of the country where continued access to fresh water is fairly likely and summer heatwaves won’t become too bad — in the US and Canada this might be near the Great Lakes. This feels like a wise thing to do.

          You go to landwatch.com and find an old farm for sale. Compared to property in your city, it’s pretty cheap. You reason that the profitability of the land has been steadily declining for conventional farmers — they need to pour more money into fertilizers, pesticides, and the patented seed that can withstand those, and their margins have become unbearably tight. “Okay,” you reason, “I’m going to spend the next few years building the soil back up and not producing much food — but that’s fine — I will be a responsible steward for this land so it will be healthy and able to feed people when things get dire.” That’s what you’re worried about anyway.

    • Censorship/Free Speech

      • The Art that Broke the Mold

        I ended up really liking both seasons of Anita’s feminist video game show that she did with McIntosh. I was watching the episodes as they were released and they helped me get back into gaming with her encouragement to both enjoy and criticize media, which helped me to enjoy the good parts of these these disturbing games.

        I was surprised that I liked them as much since I had thought (I wasn’t a crowdfunding backer); her first show (about tropes generally, not just games) was basic and overly 101 and “doesn’t everyone know this?” (Gamergate showed how very, very wrong I was about that, and now I think that show was good since those “101” basic points was not was universally agreed-upon and known as I believed.)

Links 14/06/2022: KDE Plasma 5.25 and FreeCAD 0.20

Posted in News Roundup at 10:26 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

    • Applications

    • Instructionals/Technical

      • DebugPointHow to Upgrade to KDE Plasma 5.25 from 5.24

        A beginner’s guide to upgrade to KDE Plasma 5.25 from Plasma 5.24 desktop environment via terminal and GUI method.

      • ID RootHow To Install VidCutter on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install VidCutter on Ubuntu 22.04 LTS. For those of you who didn’t know, VidCutter is a simple video editing cross-platform program for Linux, Windows, and Mac. It is built on Python and Qt5, using FFmpeg as back-end decoding and encoding. It has tools for cutting all sorts of media, but it’s not a full-blown video editor instead, its focus lies solely on slicing up videos into clips you could then upload onto your website.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the VidCutter on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

      • OSNoteHow to Install and Use Podman on Rocky Linux 8 – OSNote

        Podman is a free and open-source daemonless container engine that was developed by RedHat. It exists to help developers manage and deploy their applications in a Linux environment. Similar to the Kubernetes platform, Podman works with pods.
        Podman seeks to be the alternative to the Docker engine which is also a containerization platform. Podman improves on Docker by decentralizing the components needed for container management. Podman has a few distinguishing differences, the main one being its architecture. It runs on a daemonless architecture.
        This article will guide you on how to install and use podman on Rocky Linux 8

      • TecMintHow to Install AlmaLinux 9.0 Step by Step

        AlmaLinux is a free and open-source community-driven operating system developed as a perfect alternative to CentOS 8 which RedHat discontinued in favor of CentOS Stream. It is 1:1 binary compatible with RHEL and is built to support enterprise and production-grade workloads.

        AlmaLinux first graced the Linux community on 30th, March 2021 with AlmaLinux 8.4 as the first release. AlmaLinux 9 was released on 26, May 2022. Codenamed Emerald Puma, AlmaLinux 9 provides an array of new features and enhancements to improve user experience and functionality.

        In this guide, we will walk you through the installation of AlmaLinux 9.0.

      • ByteXDHow to Install and Upgrade Nvidia Drivers on Ubuntu – ByteXD

        This tutorial will take you through different methods that you can apply to update your Nvidia GPU drivers to their latest version.

        Nvidia cards use an open-source Nouveau driver by default but this driver does not harness the full power of this GPU and can underperform.

        The proprietary Nvidia drivers are required if you want your GPU to perform to its fullest.

        You can update your drivers using several methods and we will go through each technique one by one so that you can choose the one you prefer the most. The different ways you can update your Nvidia drivers on Ubuntu are listed below and after going through them you will be able to perform these tasks yourself.

      • Red Hat OfficialHow to interrupt the Linux boot process | Enable Sysadmin

        During a computer’s boot process, you must transition from a firmware (UEFI or BIOS) process to loading a kernel and then finally to the user environment. When booting a POSIX system, you can choose to interrupt the boot process to adjust settings or even to log in using a chroot environment.

        This is a useful troubleshooting and maintenance technique, but it’s also the reason it’s so important to utilize full disk encryption when installing your operating system. When a drive is encrypted, nothing on the drive is accessible without your passphrase, even from a preboot environment. As long as you have the passphrase to decrypt your drive, you can interrupt a Linux system’s boot process and access the drive without booting into a full operating system (OS).

      • Trend OceansHow to Change Nginx 80 Port in Linux – TREND OCEANS

        Nginx is an open-source lightweight web server alternative to apache to handle high-traffic websites.

        With all its due features, it can easily manage to load balance and reverse proxy for your site or can be used as a mail server proxy as a POP and IMAP.

        By default, Nginx runs on port 80 to handle web traffic requests, which can be changed to something else by editing the configuration files.
        Today, you will learn how to change the Nginx port in Linux in a few simple steps.

    • WINE or Emulation

      • WINE Project (Official)Gitlab experiment wrapup
        Here's a summary of the Gitlab experiment discussion, with some
        additional comments. Thanks to everybody who sent their feedback!
        * Things that people like:
        - Fetching commits directly with git instead of applying patches from
          emails (Huw, Jacek, Paul, Zeb). Indeed that's a major help for me as
        - Better tracker, easy to see the list of pending reviews (Huw).
        - Possibility to host more Wine projects, as well as private Wine trees
          to share WIP patches (Jacek). Indeed it would be nice to have all Wine
          projects in one place instead of the current mix of
        - Potential for automation (Jacek). Gitlab offers many services that we
          will be able to take advantage of, the most obvious being CI for the
          testbot. Having all the data in a proper database instead of free-form
          emails should make it possible to do other interesting things as well.
        * Some other things I like:
        - Updating status doesn't need to go through me, people can assign
          reviewers, supersede patches, etc. directly. That reduces my workload
          and improves the bus factor. Once we have figured out how to make
          testbot results reliable, we could also have maintainers merge commits
        - The full discussion thread for a given MR is readily accessible, it
          doesn't require hunting down the multiple revisions of a patch and
          associated threads in the mailman archive.
        * Things that could be improved:
        - Signoffs are a bit cumbersome (Rémi). We should change the
          requirements to something better adapted to Gitlab.
        - It's only possible to approve the whole MR, not individual commits
          (Huw, Zeb). I think that's an acceptable trade-off, but we could
          imagine other approaches.
        - The mailing list gateway creates too much noise; mixing comments from
          Gitlab and mailing list isn't very clean (Jacek, Rémi, Alex).  We can
          make some tweaks, or use a separate list, or even rethink the approach
          of the mail gateway.
        - Gitlab threading support is limited, nested comment threads are not
          supported (Zeb). That's true, but looking through the past few months
          of patch reviews, it seems that we almost never use nested threads, so
          I think we can live with that limitation.
        - Reviewers can push fixups to commits, but that requires the author to
          grant explicit permission (Jacek). Hopefully we can tweak access
          rights to allow this by default.
        * Conclusion
        I think Gitlab is working well for us, and most people seem generally
        happy with it. So my plan is to go forward and make Gitlab the main
        development platform for Wine.
        I'll start working on the transition, and on the improvements mentioned
        above. Any help will be welcome! I'll be posting a roadmap shortly.
    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Plasma 5.25

          Plasma 5.25 brings new features and concepts to the desktop environment.

        • 9to5LinuxKDE Plasma 5.25 Desktop Environment Is Out Now, This Is What’s New

          Four months in the making, the KDE Plasma 5.25 desktop environment series is here to introduce exciting new features like full control of the Tablet Mode from both Wayland and X11 sessions, new finger-following (1:1) touchpad gestures for touch-friendly devices, a configuration window for KRunner, as well as a new floating mode for the panel that detaches it from the bottom of the screen to look more like a dock.

        • Its FOSSKDE Plasma 5.25 Release is All About Color, Theme, and Other Improvements – It’s FOSS News

          KDE Plasma 5.25 has been one of the most anticipated releases, considering its recent focus on visual refinements and workflow improvements.

          For instance, you got an updated Breeze theme and a new overview effect to improve the workflow with KDE Plasma 5.24 LTS.

          Finally, KDE Plasma 5.25 has landed with more upgrades!

        • OMG Ubuntu5 New Features in KDE Plasma 5.25 – OMG! Ubuntu!

          This week sees the release of KDE Plasma 5.25, the latest version of the hugely popular free and open source desktop environment.

          KDE Plasma 5.25 serves as the follow-up to KDE Plasma 5.24 LTS, last year’s sizeable and well-received long-term support update. Although the new update isn’t an LTS it does boast over 400 bug fixes and a number of interesting new features that users will be keen to try.

          So without any further waffle, let’s look at 5 of the best new features in KDE Plasma 5.25.

        • Carl SchwanKalendar Contact Book – Current Progress

          During my long train trip to the Linux App Summit 2022, I started working on a contact book feature in Kalendar. There was already a small contact integration in the event editor to select attendees for an event and I wanted to extend it with a simple contact info viewer and editor.

          When I started it, I was full of hope that this would be a simple task and would be easy to finish. Unfortunately more than one month later, it’s not finished but there is a lot of progress that I can already show off.

        • Adriaan de GrootKate + Building in Docker | [bobulate]

          Have I said nice things about Kate recently? Not enough, so let me gush a little about Kate as an “IDE” and using it, with the Build Plugin, as a tool for editing locally and building remotely.

          I work on a codebase that has very specific platform requirements. These requirements are difficult to reproduce in a normal host – or, if you have some modern rolling distro like openSUSE, well-nigh-impossible. That’s the situation where Docker shows up, since a Docker container can be whatever specific platform is needed.

          So I have a Docker, with the special compilation environment over here, and the host machine, running a recent version of Kate over there. How can I make them work together?

        • GSoC Post 0: Introduction

          Hello, reader! I am Suhaas Joshi, a 20-year-old 3rd-year student at CHRIST University, India. I have been selected to GSoC 2022 as a mentee in KDE. This blog will track my KDE development work during, and after, GSoC coding period.

  • Distributions and Operating Systems

    • LinuxiacBest Approaches to Choosing Your First Linux Distro (Beginner’s Guide)

      Are you a newcomer to Linux? Not sure which Linux distribution to choose to begin your Linux journey? This article is for you!

      For the average PC user who has been using the established desktop operating systems such as Microsoft Windows and macOS, Linux can be somewhat confusing. Furthermore, the perception that Linux is mainly used by “pro” users and is “very complex” plays against it.

      Of course, neither of the preceding two statements is true. Linux is a complex operating system, just like any other. And, as always, it all depends on the individual.

    • Its FOSSTry Multiple Linux Distributions via the Terminal

      Distrobox is a software tool that allows you to run any Linux distribution inside the terminal.

      It aims to let you run a variety of software on top of host distribution without any hassle.

      For instance, — is there anything that is available only in the AUR and you want to access it from your Ubuntu system? Distrobox can give you that comfort.

    • Barry KaulerUpdate no longer using rsync

      EasyOS has an “update” icon on the desktop, that checks if a later version online, and if so offers to download and update the local installation.

      The problem we have been having is that it uses rsync, which reduces the size of the download by only downloading the difference between current and latest version; however, it disconnects, seemingly randomly. Perhaps it is a problem with ibiblio.org getting too busy, as the problem does seem dependent on the time-of-day.

    • New Releases

      • Kaisen Linux Rolling 2.1

        Lots of improvements on the design. New cloud and tech tools. Improvements of the packages and confs.

        Codename: Rolling

        After 6 months of intensive work, here is the 2.1 version of Kaisen Linux. This release marks above all the arrival of a new official wallpaper, after more than 2 years of improvements on the first one!
        Big graphic improvements on logos, menus and plymouth theme have been done.

      • NuTyX 22.06.1 available with cards 2.5.0

        The NuTyX team is happy to announce the new version of NuTyX 22.06.1 and cards 2.5.0.

        New toolchain gcc 12.1.0, glibc 2.35 and binutils 2.38.

        The xorg-server graphics server version 21.1.3, the Mesa 3D library in 22.1.1, Gtk4 4.6.5 and Qt 6.3.0.

        The python interpreters are en 3.10.5 et 2.7.18.

        The XFCE desktop environment is updated to version 4.16.0.

        The MATE desktop environment is a 1.26.0 version .

        The GNOME desktop environment is also updated to version 42.2

        The KDE desktop environment is available in Plasma 5.24.5, Framework 5.94.0 and applications in 22.04.2.

        Available browsers are: Firefox 101.0.1, Chromium 102.0.5005.115, Epiphany 42.2, etc

        Many desktop applications have been updated as well like Telegram-desktop 3.7.3, Thunderbird 91.10.0, Scribus 1.5.8, Libreoffice, Gimp 2.10.32, etc.

        Core NuTyX ships with Long Term Support (LTS) kernels: 4.14.282, 4.19.246, 5.4.197, 5.10.121 and 5.15.46 and the latest stable version 5.18.3 .

    • Fedora Family / IBM

      • How many Flathub apps reuse other package formats? – Will Thompson

        When this article was discussed in the Flatpak Matrix channel, several people noted that while this often said, they are sceptical that it’s really such a big number. Let’s find out!

        The specific examples given in the article are of apps which reuse a .deb (to which I will add .rpm), AppImage, Snap package, or binary .tar.gz archive. It’s not so easy to distinguish a binary tarball from a source tarball, so as a substitute I will look for apps which use the extra-data to download external sources at install time rather than at build time.

        I have cloned every repo from the Flathub GitHub organisation with this script I had lying around. There are 2,220 such repositories. This is a bigger number than the 1,518 apps cited in the blog post, because it includes many thing which are not apps, such as 258 GTK themes and 60 digital audio workstation plugins. I also believe that the 1,518 number does not include end-of-lifed apps, whereas my methodology does. This post will also ignore the existence of OBS Studio and Firefox, where those projects build the Flatpak from source on their own infrastructure and push the result into Flathub.

      • Enterprisers Project10 ways DevOps can help reduce technical debt

        Technical debt is unavoidable. And if it is not addressed, it can hamper your development process and product quality. While it costs time and money to fix accrued technical debt, prevention is better than cure. According to Gartner, infrastructure and operations leaders who can actively manage and reduce technical debt will achieve 50 percent faster delivery times.

        DevOps has emerged as the solution to many challenges in the IT industry. It can also address the technical debt challenge. Here are ten ways DevOps can help your business manage and reduce technical debt.

      • Enterprisers ProjectHow to manage disruption during digital transformation | The Enterprisers Project

        If you go into a digital transformation initiative unprepared to manage change, you may well face a mutiny. Digital transformation may sound exciting, but it inevitably involves considerable disruption for individuals as well as the entire organization. Affected team members often feel a loss of control and connectedness.

        Your goal as an IT leader should be not only to avoid backlash but to turn the change into an opportunity to deepen engagement among those affected. It is critical that teams gain more control as part of the transformation. Transformation should not happen to them; rather, team members should help make transformation happen.

        Individuals need to have a say on changes, whether these involve new architectures and models, new algorithms, or decision-making and supervisory processes. Team members should be significant contributors to your final digital transformation.

      • Red Hat4 tips for achieving better security on Kubernetes

        When security is ignored, organizations are putting at risk the core benefit of faster application development and releases. But security and agility do not have to be in contention.

        A recent Red Hat survey with more than 300 respondents, covered in our 2022 State of Kubernetes security report, identified the most pressing security needs and offered suggestions for putting your organization on track to protect security in Kubernetes environments.

        Our findings show that what happens in the build and deploy stages has a significant impact on security, as revealed by the prevalence of misconfigurations and vulnerabilities across organizations. Security, therefore, must shift left, embedded imperceptibly into DevOps workflows instead of being “bolted on” when the application is about to be deployed into production.

      • RHEL 9 and PyPI RPMs · Blog | Tomáš Tomeček

        My colleague, @FrostyX, recently shared a Red Hat Developer article, Thousands of PyPI and RubyGems RPMs now available for RHEL 9, with us.

        TL;DR access thousands of RPMs automatically generated from PyPI and RubyGems on RHEL 9.

        Sounds intriguing, I wanted to give it a shot.

    • Debian Family

      • TecMintParrot Security OS: What You Need to Know

        Parrot (popularly/formerly known as Parrot Security OS or Parrot OS) is a free and open-source Linux distribution derived from the well-known Debian Linux.

        Designed for security, privacy, and development, Parrot ships with an assortment of IT security and digital forensics tools, utilities, and libraries; development and programming tools; as well as privacy protection tools.

        It comes by default with MATE Desktop Environment (DE), however, users can install other DEs.

    • Canonical/Ubuntu Family

      • UbuntuComposable infrastructure, sustainable computing and more: OIS 2022 highlights | Ubuntu

        OIS 2022 is over, but the OpenInfra community stays tuned for the next OpenInfra Summit, taking place in Vancouver in 2023! This year’s summit in Berlin offered a lot of insightful keynotes and technical sessions. Speakers discussed the most recent trends in the industry, including composable infrastructure and sustainable computing, and set the pace for the next releases of the OpenInfra-hosted project, including OpenStack. It was a great opportunity to reconnect in person after the pandemic.


        During my keynote on Day 1, I discussed the fact that OpenStack has just entered the Slope of Enlightenment phase of its Hype Cycle. Most organisations have realised that OpenStack and Kubernetes are in fact complementary technologies rather than competing ones. Canonical happens to be well-positioned, as Ubuntu is a platform that integrates OpenStack, Kubernetes and applications very well.

    • Open Hardware/Modding

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • Medevel18 Best Open-source Free UPnP and DLNA Media Servers for building Home Entertainment System

      If you want to view certain media files, such as photos and videos from your computer, or mobile on your TV, then you need to have enabled UPnP and DLNA-compliant devices, as well as, to set up a media server.

      In this article we will give brief explanations about DLNA, and UPnP devices, streamers, and servers.

      Here also you can find a rich list of free, and open-source DLNA and UPnP servers, and streamers which you can use freely to set up your own home entertainment system.

    • Web Browsers

      • Mozilla

        • 9to5LinuxMozilla Enables Firefox’s “Total Cookie Protection” Privacy Feature by Default on Desktop

          One of Firefox’s strongest privacy features, Total Cookie Protection was first introduced with the Firefox 86 release of the open-source web browser, was extended to the Private Browsing mode with the Firefox 89 release, and further improved in Firefox 91 to prevent data leaks. If you haven’t heard, Total Cookie Protection protects your privacy by confining cookies to the website where they’re created. This prevents tracking companies from using the said cookies to track your browsing activity as you navigate across multiple websites.

    • Content Management Systems (CMS)

      • Kiwi TCMS – Meet Kiwi TCMS at Collision 2022 in Toronto

        At the exhibition stand you will have the opportunity to perform some real black-box testing, learn about Salience bias, Peltzman effect and Wason’s experiments and take a photo with our lovely mascot.

        The Kiwi TCMS team will be there to answer all of your questions regarding open source, community, support, various integrations and the differences between Self-Support, SaaS and Enterprise subscriptions!

    • Programming/Development

      • QtQt 6.3.1 Released

        We have released the Qt 6.3.1 today.

      • QtSquish 7.0.1 released

        The Squish team is happy to announce the release of the Squish GUI Tester version 7.0.1, the software quality assurance tool for cross-platform GUI application test automation.

        The first maintenance release in Squish 7.0 series is coming out 3 months after the major feature release version 7.0.0, and is now available for download.

      • Perl / Raku

        • Rakulang2022.24 Conference 2022 – Rakudo Weekly News

          Andrew Shitov has announced the second Raku Conference (Twitter feed) to be held online on 13-14 August 2022. The submission deadline for presentations is 1 August 2022! But of course, you can already submit a talk proposal! And order your free ticket (although a donation would be really appreciated)!

        • PerlPerl IDE Hackathon 2022 | dean [blogs.perl.org]

          On Tuesday 21st June there will be a Perl IDE Hackathon in the Hackathon room at The Perl and Raku Conference. You can also participate in this event remotely.

          Our goal is to enhance IDE and Editor support for Perl 5 which is typically via plugins, with an an emphasis on helping people make their first every contribution. It’s not even required that you use the IDE/Editor that you are helping out with.

  • Leftovers

    • Call your girlfriend

      Robyn has this song “Call your girlfriend” and it’s such a beautiful melody. It’s easy to understand why it’s such a widely-covered and well-beloved song.

    • Hardware

      • CNX SoftwareNXP unveils MCX general-purpose Arm MCU family with 30x faster machine learning performance – CNX Software

        NXP has announced a new MCX general-purpose Arm Cortex-M MCU family designed for advanced industrial and IoT edge computing and integrating an NXP neural processing unit (NPU) capable of delivering over 30 times higher performance than running the AI inference tasks on an Arm Cortex-M33 core alone.

        The new MCX portfolio builds upon the earlier NXP LPC and Kinetis microcontroller families, but does not replace these, and aims to improve machine learning performance and security for a variety of applications including machine learning, wireless, voice, motor control, analog, and more.

    • Security

      • Gone in 130 seconds: New Tesla hack gives thieves their own personal key | Ars Technica

        Last year, Tesla issued an update that made its vehicles easier to start after being unlocked with their NFC key cards. Now, a researcher has shown how the feature can be exploited to steal cars.

        For years, drivers who used their Tesla NFC key card to unlock their cars had to place the card on the center console to begin driving. Following the update, which was reported here last August, drivers could operate their cars immediately after unlocking them with the card. The NFC card is one of three means for unlocking a Tesla; a key fob and a phone app are the other two.

      • Fear, Uncertainty,

        • ZDNetThis new Linux malware has a sneaky way of staying hidden [Ed: Microsoft boosters are very eager this year to constantly name Linux as a security threat while the real issue, constantly, is Windows; Microsoft is not even patching actively-exploited holes]

          A newly discovered stealthy piece of Linux malware called Syslogk delivers a backdoor that remains hidden on targeted machine until its controller, from anywhere on the internet, transmits so-called ‘magic packets’.

    • Finance

      • Michael West MediaQantas Smiles: shareholders and executives grin, customers and staff grit their teeth – Michael West

        While Qantas services sank and 9000 lost their jobs, chief executive Alan Joyce engineered the biggest transfer from the public money to a corporation in Australia’s history. This was the non-bailout bailout. Time for a rethink on corporate welfare, writes Michael West.
        Scott Morrison and Josh Frydenberg, no doubt with the counsel of Qantas chief executive Alan Joyce, repelled calls for a Qantas “bail-out” in early April 2020.
        Yet, just as the pandemic gripped, they promptly began bailing it out. Virgin too, an airline 90% owned by foreign airlines and tax refugee Sir Richard Branson, a resident not only of the notorious tax haven, British Virgin Islands, but with his very own British Virgin island.

    • AstroTurf/Lobbying/Politics

      • Ruben SchadeRubenerd: The Queen’s Birthday, and the Whitlam dismissal

        For overseas readers, the “Liberals” here are the nominally right-of-centre party which govern in coalition with the Count-ry/Nationals. They also tend to be the most enthusiastic about the monarchy, whereas the Labor and Greens parties lean towards republicanism.

    • Civil Rights/Policing

      • Robert HeatonSoon he’ll be three and soon he’ll be twenty-one

        I woke up and said good morning to Oscar. “Go away daddy, I don’t love you.” I went downstairs. “Daddy can’t eat breakfast with me, he is not fun and he makes me sad.” I loaded Oscar onto my bike to go to pre-school. “Mummy I love you so much but I don’t love daddy at all.” Apparently normal, but starting to get to me. What if he was old enough to mean it?

        I don’t worry that my relationship with Oscar is ruined before it’s even begun. He’s two and is civil to me sometimes, especially when we’re on our own. When I went away for a few days he sent me a video saying “I want you to come back soon, I love you daddy,” although he wouldn’t talk to me on the phone. But when he’s browbeating me I do question the point of me being there if I’m just going to be ignored and abused. I wonder if I’m being over-sensitive. Aren’t children meant to crave the approval of their parents, not the other way round? But Gaby says that if he was like that to her then she’d be devastated. She also says that when I’m not there he tries to call me to tell me that he loves me but his phone is made of wood and he doesn’t know my number.

        Gaby thinks that he might like her more because she’s more attentive to his needs, but I don’t think that’s fair or likely, or even necessarily a good thing. The internet says that his hostility shows that he feels strongly bonded to me and knows that my love is unconditional. I think that’s a little too self-serving. This is surely just one of those things that toddlers do for reasons beyond our jurisdiction.

    • Internet Policy/Net Neutrality

      • Internet Freedom FoundationTake 2: MeitY’s attempts at data governance continue to fall short

        The Ministry of Electronics & Information Technology (MeitY) published the Draft National Data Governance Framework Policy (National Data Governance Policy) for public consultation on May 27, 2022. The policy, which seeks to improve “governance through a whole-of(-)government approach towards data-led governance”, fails to adequately address resultant concerns regarding data privacy and citizen rights. In this post, we provide a brief overview of the comments we submitted to MeitY as part of this consultation process. Read our complete comments here.

    • Monopolies

      • MozillaCalling for Antitrust Reform

        It’s time for governments to address the reality that five tech companies—not everyday consumers—control our online experiences today. Updated competition laws are essential for the internet to be private, secure, interoperable, open, accessible, transparent, and a balance between commercial profit and public benefit. This is Mozilla’s vision for the internet. For a number of years, we have shared our views supporting government competition efforts globally to achieve it.

        One such proposal now under discussion in the US Congress is the American Innovation and Choice Online Act (AICOA). This bill is an important step in correcting two decades of digital centralization by creating a level playing field for smaller, independent software companies to compete. We support this bipartisan effort led by Senators Amy Klobuchar and Chuck Grassley and Representatives David Cicilline and Ken Buck.

        We believe that AICOA will facilitate innovation and consumer choice by ensuring that big tech companies cannot give preference to their own products and services over the rich diversity of competitive options offered by others. Mozilla—and many other independent companies—cannot effectively compete without this antitrust law. We are disadvantaged by the fact that current and future Firefox users, many of whom are privacy and security focused, cannot easily install and keep Firefox as their preferred browser because of confusing operating system messages and settings. We are further challenged by app store rules designed to keep out Gecko, our independent browser engine that powers Firefox, Tor and other browsers. We are stuck when big tech companies do not offer us and other developers open APIs and other functionality needed for true interoperability.

        A fair playing field is vital to ensure that Mozilla and other independent companies can continue to act as a counterweight to big tech and shape the future of the internet to be more private and more secure. We understand that the bill sponsors intend AICOA to regulate only gatekeeper companies and their controlled products. It is not intended to regulate or impact the agreements or product offerings of non-regulated independent companies like Mozilla that partner with gatekeepers for critical services. Nor does it require trading off privacy and security in order to enhance competition.

Links 14/06/2022: Microsoft Getting Desperate, Stinging Windows Users

Posted in News Roundup at 5:31 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • GamingOnLinuxInitial thoughts on the HP Dev One laptop with Pop!_OS [Ed: HP appears to have bribed vloggers and bloggers with laptops in exchange for “reviews”. It’ll get hard to know if these products are any good because those reviewing [sic] them first are paid to do that.]]

        HP and System76 teamed up for the HP Dev One, and for a little while now I’ve been using it as my main machine for everything possible for GamingOnLinux related and otherwise. Here’s my initial thoughts, with more to come when I’ve had more time.

    • Applications

    • Instructionals/Technical

      • Kev QuirkSegregating Email With Sub-Domains

        I like to segregate my email by using unique addresses for many services. This makes things more secure, but it isn’t perfect…

      • Yarmo MachenbachHow not to use a password manager

        Both the author and a friend of theirs have found themselves in the predicament of not being able to reset their forgotten password because they also forgot the email address they used to sign up for the service in question.

      • VituxHow to Install Cockpit on Rocky Linux 8

        Cockpit is one of the best web-based server management dashboards because of its ease of use and installation. It also offers a great dashboard by which you can catch the server-related information in real-time. It also gives access to CPU load, a variety of processes, filesystem statistics, and other data. This server management tool provides great flexibility in managing the Linux servers remotely and locally. With Cockpit, you can manage the network problem quickly. It also provides the superuser control, such as remote reboot or shutdown of the server. Cockpit is a GUI-web-based tool that includes the following features:Storage administration and journal inspection options.Configuration options for the network interface and SELinux.User accounts management.Monitor and manage system services.System subscription management and software update options.Multiple diagnostic reports creation.

        Hence, it is good to have Cockpit in the system to handle servers in Linux. The following guide will explain the complete method to install and use Cockpit on Rocky Linux.

      • RoseHostingInstall Vsftpd with SSL/TLS on Ubuntu 20.04

        Vsftpd ( Very Secure File Transfer Protocol Daemon ) is the default FTP server for Ubuntu, CentOS, Fedora, and RHEL Linux distributions. Vsftpd is a stable, fast, and secure FTP server used for file transfers from the client to remote servers and vice versa.

      • Linux Shell TipsHow to Set JAVA_HOME Variable Path on Ubuntu

        Basically, the JAVA_HOME Environment path points to the installation location of JDK (Java Development Kit) on your Ubuntu system.

        As you develop or run Java-based applications, the associated applications sometimes need to know/reference the JAVA_HOME Environment path to execute/compile without any issues.

        Before addressing this Java environment path issue, we need to revise the steps that might/have led us to this article’s objective. We need to start with understanding Java, and its installation, and finally addressing the JAVA_HOME path issue.

      • Trend OceansWhat will happens if I run “sudo rm -rf /” on Linux? – TREND OCEANS

        No, executing “sudo rm -rf /” will not wipe out your complete system unless you do *. Read the full article to find out.

        Linux file system works differently than the windows system. Unlike Windows, which stores files and configurations inside C:, D:, or E: Drive, Linux stores everything inside the root (/).

      • H2S MediaHow to Install Ntopng on Ubuntu 22.04 LTS Jammy – Linux Shout

        Get the simply explained steps to install Ntopng on Ubuntu 22.04 LTS Jammy Jellyfish to monitor the network data traffic with graphs.

        Ntopng is an open-source tool and successor of the popular network monitoring software Ntop. It is a high-speed web-based traffic analysis and flow collection software. The software monitors the data traffic in the network and provides statistical evaluations. Traffic can be output with the Ntopng sorted according to criteria such as IP address, port, L7 protocol, and throughput. In addition, the active hosts and traffic can be viewed in real-time and long-term reports can be generated.

      • Linux HandbookHow to Undo and Redo in Nano Editor?

        You are feeling the best productive self and in the hurry, you make a typo while typing in GNU nano.

      • OpenSource.comShare your Linux terminal with tmate | Opensource.com

        As a member of the Fedora Linux QA team, I sometimes find myself executing a bunch of commands that I want to broadcast to other developers. If you’ve ever used a terminal multiplexer like tmux or GNU Screen, you might think that that’s a relatively easy task. But not all of the people I want to see my demonstration are connecting to my terminal session from a laptop or desktop. Some might have casually opened it from their phone browser—which they can readily do because I use tmate.

      • HowTo ForgeHow to connect ONLYOFFICE Docs and Strapi CMS

        ONLYOFFICE Docs is an open-source office suite and Strapi is an open-source collaborative CMS built on Node.js. In this tutorial, we’ll learn how to connect the instances of ONLYOFFICE Docs and Strapi using an integration plugin (connector).

      • How to Configuring an SSH Login without Password on Ubuntu 22 – LinuxWizardry

        In this article, we describe how to set up an SSH login that does not use passwords on Ubuntu 22. Having a login without a passsword is an easy and convienevt way to SSH into a computer without have to remember any password as well as the added layer of security.

        SSH is ideal for managing remote systems because of its password-less option that uses public/private keys instead of passwords, keeping system passwords safe.

        This article uses ssh-copy-id, a utility that greatly simplifies the procedure by copying the local host’s public key to the remote host’s authorized keys file and by verifying file permissions and ownership.

      • How to Open or Convert iOS HEIC Photos to JPEG and PNG in Ubuntu 20.04 | 22.04 – LinuxWizardry

        As you might already know, the HEIF was adopted by Apple in 2017 with the introduction of iOS 11. This image format doesn’t always work when you want to upload it to many websites or open on your Ubuntu Desktop.

      • ID RootHow To Install CMake on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install CMake on Ubuntu 22.04 LTS. For those of you who didn’t know, CMake is an open-source, cross-platform family of tools designed to build, test, and package software. CMake is popular due to its cross-platform so that developers using the build system work the way they’re used to. The suite of CMake tools was created by Kitware in response to the need for a powerful, cross-platform build environment for open-source projects such as ITK and VTK.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the CMake on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.

      • UNIX CopHow to install Scala CentOS 9 stream

        Hello, friends. In this post, you will learn how to install Scala on CentOS 9. This programming language runs on the Java JVM, so they share many things.

      • Linux HintKerberos Installation

        Kerberos is an Open Authentication System created by MIT. Numerous big data systems use Kerberos for the server-to-server correspondences in network security. The Kerberos protocol has strong cryptographic authentication over devices, allowing clients and servers to develop trusted communication. The protocol aims to address common network security issues.

        It deals with a ticket-based framework to prevent intrusion from external attackers. Thus, it prevents any possibilities of secret phrase sniffing or secret password thefts.

      • Linux HintScreen blanking on Raspberry Pi – How to disable it?

        Screen Blanking occurs when you are inactive on your Raspberry Pi for a longer time. This problem is very common in Raspberry Pi devices and it must not be very pleasant for someone who doesn’t want to put his system into sleep mode.
        If you are looking for a way to disable Screen Blanking on Raspberry Pi, you should follow this article that will guide you in overcoming this issue on your device.

    • Games

      • Linux Links10 Fun Free and Open Source Card Games

        A card game is a game that uses playing cards as the main way the game is played. The cards can be a standard deck of 52 French playing cards with 4 suits of Spades, Hearts, Diamonds, and Clubs. Or the cards can be game-specific. There is a plethora of card games available, with families of related games.

        Card games offer many positive attributes. They can improve mental skills, memory and logic. They can test your patience, help you focus, and are popular for all ages. Having a good memory is essential to a person’s overall well-being. A good way to improve memory is playing fun games. Whether it’s a board game or a deck of cards, putting your brain to work definitely has its advantages. The earlier a person who has a poor working memory can begin to strengthen it, the more successful they’ll be in life.

        Many of the biggest computer games concentrate on explosion-filled genres. But there’s still strong demand for good quality card games. It’s a neglected genre in the mainstream. Here are our picks of the best card games. We only advocate open source games here. And we give preference to games that run on multiple operating systems.

      • HackadayUpscaling The Sierras

        If you played many games back in the mid-80s to 90s, you might remember the iconic graphics from Sierra’s Online Adventure Games. They were brightly colored (16 colors) and dynamic with some depth. To pay homage, [eviltrout] worked to upscale the images. Despite being rendered at 160×200 at 16 colors and then stretched, storing all those bitmaps even at only 4 bits per pixel would take all the storage available on the floppy disk. The engineers on the game decided instead to take a vector approach to a raster problem.

      • GamingOnLinuxSteam Next Fest: June 2022 is live

        A celebration of upcoming games, Steam Next Fest: June 2022 is now live for you to smash that download button on various demos to see what you think. Much like previous events, there will also be various livestreams on the official event page and on pages for individual games for you to speak to developers and see some footage.

      • GamingOnLinuxTechland ends support for Dying Light, 7 years after release

        Techland are moving on from the original Dying Light, after giving it 7 years of free updates and expansions. Not many developers support their games for that long, if they’re not some sort of live-service thing. Techland certainly did well overall with it.

      • GamingOnLinuxSystem Shock remake gets a brand new flashy trailer

        The upcoming System Shock from Nightdive Studios is still coming, and a brand new trailer was recently shown off during the PC Gaming Show 2022. We don’t know when it will release though.

      • GamingOnLinuxARK: Survival Evolved free to own on Steam, new free DLC map out

        Here’s your tip of the day: you can go a claim a free to keep copy of ARK: Survival Evolved on Steam right now. It has a Native Linux version, although we just recommend you use Proton with it as they never really supported it and it does work quite well with Proton.

      • GamingOnLinuxPhasmophobia gets new Voice Recognition to work on Steam Deck and Linux

        Have you been itching to play Phasmophobia? Well, you no longer have to wait for Wine and Proton to be upgraded as the developers have ripped out the Windows-specific stuff.

      • GamingOnLinuxPlaying OXOGO could land you a big real-life prize that increases with its sales

        The developers of OXOGO are hoping to entice some people to play their retro-styled adventure, with the added excitement of the possibility to earn a real-life prize.

      • GamingOnLinuxUsagi Shima is an idle bunny collecting game that I simply need

        Usagi Shima, from developer pank0 (aka Jess Yu), is an upcoming idle bunny collecting game I’ve been following for quite some time and the first-ever short gameplay trailer just went up. Shown off as part of the recent Wholesome Direct 2022, it’s nice to finally see more than screenshots and tiny gifs on their popular Twitter account.

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • OpenSource.comBuilding the metaverse with open source

      As with all emerging technologies, it’s critical to consider the use case and impact to the humans who use it. Immersive virtual and augmented reality devices have unprecedented capabilities to capture, process, store, and utilize data about an individual, including their physical movement patterns, cognitive state, and attention. Additionally, virtual worlds themselves significantly amplify the benefits and problems of today’s social media, and require careful implementation of trust and safety systems, moderation techniques, and appropriate access permissions to ensure that users have a positive experience when they venture into these spaces.

      As the web evolves and encompasses immersive content and spatial computing devices, it’s important to think critically and carefully about the experiences being created, and interoperability across different applications. Ensuring that these virtual worlds are open, accessible, and safe to all is paramount. The prospect of the metaverse is an exciting one, and one that can only be realized through collaborative open source software movements.

  • Leftovers

    • The NationThe Zen Playboy

      Stewart Brand is not a scientist. He’s not an artist, an engineer, or a programmer. Nor is he much of a writer or editor, though as the creator of the Whole Earth Catalog, that’s what he’s best known for. Brand, 83, is a huckster—one of the great hucksters in a time and place full of them. Over the course of his long life, Brand’s salesmanship has been so outstanding that scholars of the American 20th century have secured his place as a historical figure, picking out the blond son of Stanford from among his peers and seating him with inventors, activists, and politicians at the table of men to be remembered. But remembered for what, exactly?

    • The NationYoung People in Georgia Can Change Our Future

      How old do you have to be to work for change in your community?

    • Meduza‘Live in the past!’: Street artist Timofey Radya’s eerie new piece in Yekaterinburg

      Street artist Timofey Radya has published a video and photos of his newest installation: the words “Live in the past!” in large block letters on top of the roofs of two apartment buildings on Kosmonavtov Prospekt in Yekaterinburg.

    • The Remarkable Case of Davidson’s Eyes

      The transitory mental aberration of Sidney Davidson, remarkable enough in itself, is still more remarkable if Wade’s explanation is to be credited. It sets one dreaming of the oddest possibilities of intercommunication in the future, of spending an intercalary five minutes on the other side of the world, or being watched in our most secret operations by unsuspected eyes. It happened that I was the immediate witness of Davidson’s seizure, and so it falls naturally to me to put the story upon paper.

    • Summer Doldrums

      The past weeks have zipped by without an opportunity to work on any of my fun coding projects.

      After a short vacation, we’ve decided to do some serious house cleaning before the new baby is born. Who knew there can be so much old and useless crap hidden in closets around the house? Truly a case of “out of sight, out of mind”. On the upside, my office room is now much better organized. The desk is more appropriately shaped and positioned and my three PCs fit under it neatly. Even the bookshelf looks more presentable, which is nice for video calls.

    • Science

      • Pro PublicaOne in Five Americans Struggles to Read. We Want to Understand Why.

        One in five American adults struggles to read English at a basic level. Some have a hard time with everyday tasks like taking a driver’s test or voting. Some cannot read at all.

        These 48 million people — many of whom are native English speakers who left school without the necessary reading skills — are often resourceful, finding ways to navigate a world designed for readers. But they face barriers to getting jobs, accessing social services and finding medical care. This is not just an individual hardship — it’s a collective crisis. Some police departments are having trouble recruiting people who can take entrance tests. Throughout history, American institutions have used literacy tests to exclude people from fully participating in society, including at the polls. We are reporting on similar barriers still in place.

      • HackadayHelium Recovery System Saves Costs

        Helium is the most common element in the universe besides hydrogen, but despite this universal abundance it is surprisingly difficult to come across on Earth. Part of the problem is that it is non-renewable, so unless it is specifically captured during mining its low density means that it simply escapes the atmosphere. For that reason [Meow] maintains a helium recovery system for a lab which is detailed in this build.

    • Hardware

      • HackadayAnother Rubik’s Cube Robot Is Simple But Slow

        [AndreaFavero] says that the CuboTino emphasizes simplicity and cost-savings over speed. However, solving the puzzle in about 90 seconds is still better than we can do. The plucky solver uses a Pi and a camera to understand what the cube looks like and then runs it through a solver to determine how to move.

      • HackadayBluetooth Speaker Domesticated Through Firmware Mod

        This might sound like a familiar problem – you get a Bluetooth speaker, and it sounds nice, but it also emits all kinds of weird sounds every now and then. [Oleg Kutkov] got himself a Sven PS460 speaker with FM radio functionality, but didn’t like that the “power on” sound was persistently loud with no respect for the volume setting, and the low battery notification sounds were bothersome. So, he disassembled the speaker, located a flash chip next to the processor, and started hacking.

      • Hackaday3D Printering: Today’s Resins Can Meet Your Needs

        Filament-based 3D printers spent a long time at the developmental forefront for hobbyists, but resin-based printers have absolutely done a lot of catching up, and so have the resins they use. It used to be broadly true that resin prints looked great but were brittle, but that’s really not the case anymore.

      • HackadayOdd Inputs And Peculiar Peripherals: Touch This Macro Pad

        The need to provide custom controls for complex software packages has been satisfied in many ways, the most usual of which is to have a configurable keypad. It’s a challenge [Meir Michanie] has taken up in a slightly different way, by creating a custom touch-screen macro pad. Unlike the buttons, this allows entirely custom layouts with different shaped keys in any configuration.

    • Health/Nutrition/Agriculture

      • The Hill‘Forever chemicals’ linked to high blood pressure in middle-aged women: study

        Middle-aged women who have greater blood concentrations of toxic “forever chemicals” may be at greater risk of developing high blood pressure, a new study has found.

        These women were more likely to become hypertensive than those who had lower levels of the compounds, also called per- and polyfluoroalkyl substances (PFAS), according to a study published on Monday in the American Heart Association journal Hypertension.

      • The Nation“Eventually, Does the Whole World Go Away?”

        The following is a diary of the first three months of 2020. During that time, the coronavirus pandemic overtook all our attention. I abandoned my nascent climate activism to homeschool my children under quarantine, even as I understood that the two crises—climate change and Covid-19—weren’t in competition. The only action I could maintain was writing down what people in my network said about what they were losing, or stood to lose, from both threats. Excerpted from THE WORLD AS WE KNEW IT: Dispatches from a Changing Climate, edited by Amy Brady and Tajja Isen. Published with permission of Catapult. Copyright © 2022

      • OracWhen new school antivaxxer Steve Kirsch met old school antivaxxer Andrew Wakefield

        Recently, I’ve been writing about the “new school” antivaccine movement that arose during the COVID-19 pandemic to oppose COVID-19 vaccines is becoming increasingly indistinguishable from “old school” antivaxxers, the ones who falsely claimed that vaccines cause autism, autoimmune diseases, the “sickest generation” of children, and even death. In particular, I saw this confluence at the Better Way Conference held in Bath, England last month, where new school antivaxxers like Robert Malone were echoing old school antivaxxer Del Bigtree‘s attacks on the children’s immunization schedule, which included hoary old antivax tropes, such as “too many too soon.”

      • Common DreamsOpinion | GOP Lawmakers Blaming ‘Mental Illness’ Are Same Ones Who Refuse to Expand Medicaid
      • Common DreamsOpinion | 5 Reasons We Need a National Organization to Energize the Fight for Single Payer

        Now is the time.

      • Counter PunchThe Food Shortage in Your Own Backyard

        Jim Gale, founder of Food Forest Abundance, pointed out in a recent interview with Del Bigtree that in the United States there are 40 million acres of lawn. Lawns are the most destructive monoculture on the planet, absorbing more resources and pesticides than any other crop, without providing any yield. If we were to turn 30% of that lawn into permaculture-based food gardens, says Gale, we could be food self-sufficient without relying on imports or chemicals.

        Permaculture is a gardening technique that “uses the inherent qualities of plants and animals combined with the natural characteristics of landscapes and structures to produce a life-supporting system for city and country, using the smallest practical area.”

    • Proprietary

      • NeowinWindows users quietly receiving Microsoft Bing Service 2.0 update that won’t uninstall [Ed: Windows is technically malware]

        On various forums online (1, 2, 3), Windows users are reporting of a new and mysterious update that is being pushed via Windows Update. Classified as a Quality Update, the new update is dubbed “Microsoft Bing Service 2.0″. Users on both Windows 11 and Windows 10 are receiving it so it isn’t exclusively meant for Windows 11 22H2 Insiders or something.

    • Security

      • IT WireiTWire – Tenable boss accuses Microsoft of putting Azure customer safety at risk

        Microsoft has been accused of a lack of transparency in its vulnerability practices, with the security outfit Tenable claiming these practices put the software giant’s customers at risk.

        Tenable chairman and chief executive Amit Yoran said in a blog post that his company had discovered two flaws, one of which it considered critical, in Microsoft’s Azure platform, both in the Synapse Analytics part of Azure.

        Synapse Analytics is used for machine learning, data aggregation and similar computational tasks.

        One of these flaws was a privilege escalation flaw with the context of a Spark VM. The second allowed the poisoning of the hosts file on all nodes in a Spark pool.

        Yoran wrote that Microsoft decided to silently patch the privilege escalation flaw, while downplaying the risk. “It was only after being told that we were going to go public, that their story changed… 89 days after the initial vulnerability notification… when they privately acknowledged the severity of the security issue. To date, Microsoft customers have not been notified,” he added.

      • India TimesApple not ‘worried’ about the latest security attack on the M1 chip

        A team of security researchers from MIT’s Computer Science and Artificial Intelligence Laboratory (MIT CSAIL) managed to defeat M1’s security measures, breaching the chip’s last line of security, the PAC (pointer authentication codes). The researchers developed a novel attack combining memory corruption and speculative execution, bypassing M1’s security. They found that the chip’s last line of security, often known as PAC (pointer authentication codes), can be breached through a hardware attack allowing attackers to gain access to the Mac.

      • MITResearchers discover a new hardware vulnerability in the Apple M1 chip

        The M1 chip uses a feature called “Pointer Authentication,” which acts as a last line of defense against typical software vulnerabilities. With Pointer Authentication enabled, bugs that normally could compromise a system or leak private information are stopped dead in their tracks. Now, researchers from MIT’s Computer Science and Artificial Intelligence Laboratory have found a crack: their novel hardware attack, called “PACMAN” shows that Pointer Authentication can be defeated without even leaving a trace. Moreover, PACMAN utilizes a hardware mechanism, so no software patch can ever fix it.

      • MacworldMIT researchers warn of ‘PACMAN’ M1 flaw that can’t be patched

        According to MIT CSAIL, since its PACMAN attack involves a hardware device, a software patch won’t fix the problem. The issue is a wider problem with Arm processors that use Pointer Authentication, not just Apple’s M1. “Future CPU designers should take care to consider this attack when building the secure systems of tomorrow,” Ravichandran wrote. “Developers should take care to not solely rely on pointer authentication to protect their software.” As a technological demonstration, PACMAN shows that pointer authentication isn’t completely foolproof and developers shouldn’t completely rely on it.

      • Tom’s HardwareMIT Finds Apple M1 Vulnerability, Demos PACMAN Attack (Update)

        The researchers say the PACMAN attack works across privilege levels, “implying the feasibility of attacking a PA-enabled operating system kernel.”

        When asked about the data exfiltration rate (i.e., how fast data can be stolen), the team tells Tom’s Hardware, “It’s hard to say since data exfiltration with this attack will be very dependent on the exact gadget used. Our proof of concept exploit takes 2.69 milliseconds per PAC guess (so worst-case 2.94 minutes per pointer). This may be longer in a fully integrated end-to-end attack.”

      • Privacy/Surveillance

        • TechdirtFormer Employees Say ID.me Grew Too Fast, Got Too Careless With Users And Their Data

          ID.me hasn’t always been a government contractor powerhouse. For more than a decade, it wasn’t really on anybody’s radar. The personal identification software began as a Craigslist for military personnel before morphing into an ID service designed to combat fraud and ensure military members could access the many government programs available to them.

        • EFFEFF’s Flagship Jewel v. NSA Dragnet Spying Case Rejected by the Supreme Court

          But today the U.S. Supreme Court slammed the courthouse door on our flagship NSA surveillance lawsuit, Jewel v. NSA, effectively validating the government’s claims that something known and debated across the world—the NSA’s mass surveillance—is somehow too secret to be challenged in open court by ordinary members of the public whose communications were caught in the net.

          The Supreme Court this week allowed our case to be dismissed because it’s a “secret” that the mass spying programs that everyone has known about since at least the Snowden documents came to light in 2013 (and disclosed in the national news long before that) involved the nation’s two largest telecommunications carriers.  Yes, you read that right: something we all know is a still officially a “secret” and so cannot be the subject to litigation. Specifically, the Court refused to take on and reconsider a Ninth Circuit decision (and an underlying district court ruling) that held that the state secrets privilege blocked our clients’ efforts to prove that their data was intercepted such that they had standing to sue.

          The central fact that these courts found to be “secret” is that AT&T and Verizon participated in the mass spying, even though we had submitted ample public evidence to support that finding. The Ninth Circuit decision was so cursory that the court didn’t even review the lower court’s sealed opinion addressing the government’s actual evidence of the spying, despite the fact that the District Court specifically required the government to present that evidence in secret.

        • EFFHow the Federal Government Buys Our Cell Phone Location Data

          Weather apps, navigation apps, coupon apps, and “family safety” apps often request location access in order to enable key features. But once an app has location access, it typically has free rein to share that access with just about anyone.

          That’s where the location data broker industry comes in. Data brokers entice app developers with cash-for-data deals, often paying per user for direct access to their device. Developers can add bits of code called “software development kits,” or SDKs, from location brokers into their apps. Once installed, a broker’s SDK is able to gather data whenever the app itself has access to it: sometimes, that means access to location data whenever the app is open. In other cases, it means “background” access to data whenever the phone is on, even if the app is closed.

    • Defence/Aggression

      • SalonFox News viewers have no clue: Network blocks nearly all critical coverage of Donald Trump

        Rupert Murdoch himself was said to be guiding decisions to remove anyone who wasn’t deemed hysterical and shrill enough to entice the disappointed Trumpers back into the fold, marginalizing the few more or less straight news people and giving carte blanche to their “opinion” personalities to follow their bliss into the right-wing fever swamps. The result is Tucker Carlson and his Great Replacement Hour.

      • [Old] Media MattersFox News is a loaded gun aimed at American democracy

        Fox is a primary source of information for the party’s voters and a key Republican power base. That would make the network crucial to the future success of an antidemocratic GOP plot, just as it was when Trump tried to overturn the election in 2020. And Fox’s propagandists appear eager to try again in 2024, relentlessly casting doubt on the 2020 results while helping to push out Republicans who refuse to support the party’s authoritarian turn.

        They are positioning the country on the brink of the abyss. Next time, political conditions may prove favorable enough to end the American experiment in electoral democracy.

      • The NationWhere the January 6 Insurrection Hearings Go Next

        Never forget: An outgoing American president riled up a mob to attack Congress. That remains an open wound on the polity, one that can’t be healed until justice is served on those responsible for it. The guilty include not just the rioters who have already been charged for their individual offenses but also the masterminds who instigated the failed subversion of democracy.

        In the key sentence of the first day of hearings, Cheney said, “You will also hear about plots to commit seditious conspiracy on January 6th, a crime defined in our laws as conspiring to overthrow, put down, or destroy by force the government of the United States or to oppose by force the authority thereof.”

        If we take these words seriously, the hearings are going to be much more than a fact-finding mission. They are a prosecutorial brief that will lay out a criminal case against Trump and his accomplices.

      • Teen VogueThe January 6 Hearings Are Fighting for Your Attention

        Yes, people have been following the actions of the January 6 committee for nearly 10 months—on Twitter, on cable, via news sites. But the Thursday night broadcast felt different. The committee brought in a former ABC news executive to produce the hearings and make them look less like a C-SPAN live feed. They aim, according to Maryland representative Jamie Raskin, to “tell the story of a conspiracy to overturn the 2020 presidential election and block the transfer of power” from Donald Trump to Joe Biden. In terms of televised politics, it’s on par with the Watergate hearings.

        In other words, must-see TV. That’s what the committee wanted, to give their findings to the court of public opinion. At a time of misinformation, the goal is to train the eyes of the electorate to see clearly what has happened to democracy in the US. But the hearing surely didn’t get all of them. During the broadcast, Fox ran Tucker Carlson’s show without commercials. And amidst all of it, attention was split between the TV and the smaller screen. Arguing about politics is one of the social internet’s many enshrined pastimes, but it can often feel like there’s more talking and analysis than actual observation

      • NBCIdaho officers getting death threats after arresting 31 Patriot Front white nationalists near Pride event

        “And the other 50 percent — who are completely anonymous, who want nothing more than to scream and yell at us and use some really choice words — offer death threats against myself and other members of the police department merely for doing our jobs,” White said. “Those people obviously remain anonymous.”

        Officers have also received threats of doxxing, a practice in which someone publishes personal information such as phone numbers or addresses online, White said. The majority of the threats being made appear to be from outside the Coeur d’Alene community, according to the chief.

        A 911 caller reported seeing a “little army” of people in masks and with shields in a U-Haul truck on Saturday. Responding officers stopped the vehicle about 10 minutes later and 31 people in “similar attire” were arrested, White previously said.

      • The Gray ZoneLeaked emails expose Paul Mason’s collusion with senior British intelligence agent
      • Counter PunchA Country Armed to the Teeth

        I was packing it illegally, but I knew that a white man in a suit and tie was unlikely to be stopped by the police and frisked, even in a city with some of the strictest gun laws in the country — laws that may soon be swept away if the Supreme Court continues what seems to be its holy war on democracy. In fact, its justices are expected to rule this month in a case that challenges New York’s constitutional right to deny anyone a permit to carry a firearm. That state’s current licensing process allows only those who can prove a “special need for self-protection distinguishable from that of the general community.” That means you can’t pack heat just because you want to feel stronger and braver than you are or because you feel threatened by people who look different from you.

        It also means that you can’t enjoy the privileges of the past. In his history of gun rights in this country, Armed in America, Patrick Charles quotes this from a piece in a 1912 issue of the magazine Sports Afield: “Perfect freedom from annoyance by petty lawbreakers is found in a country where every man carries his own sheriff, judge, and executioner swung on his hip.”

      • Common DreamsOpinion | The United States: Armed to the Teeth and Strutting Toward the Apocalypse

        The gun I carried on the streets of New York City in the late 1960s was a Beretta, similar to the pistol James Bond packed in the early Ian Fleming novels. It was a small, dark beauty that filled me with bravado. I was never afraid when I had it in my pocket, which is why I’m so very afraid now.

      • ScheerpostRobert Lipsyte: Please Take My Gun

        Robert Lipsyte offers a little inside information from his own past on what it feels like to be a young man in this country packing a weapon, while your emotions and sense of manliness run wild.

      • ScheerpostWhy the Spirit of June 12, 1982, Matters

        Time for a new movement to stop the nuclear arms race.

      • Common Dreams‘Worrying Trend’: Global Nuclear Stockpile Set to Grow for First Time Since Cold War

        The world’s stockpile of nuclear warheads is expected to expand in the coming years for the first time since the 1980s and the catastrophic threat of those weapons being used is escalating, a leading arms watchdog said Monday.

        “If the nuclear-armed states take no immediate and concrete action on disarmament, then the global inventory of nuclear warheads could soon begin to increase for the first time since the Cold War,” Matt Korda, an associate researcher with the Weapons of Mass Destruction Program at the Stockholm International Peace Research Institute, said in a statement released alongside SIPRI’s annual report.

      • Meduza‘No one feels sorry for them’ The long road to dismantling Kyiv’s Soviet monument to friendship with Russia

        At the end of April, the city of Kyiv dismantled a Soviet-era statue that was meant to symbolize friendship between Russia and Ukraine. The sculpture was part of a complex in the city center that includes the Peoples’ Friendship Arch — a massive rainbow-shaped structure that was recently renamed the Arch of Freedom of the Ukrainian people. Writing for Meduza, architectural journalist Asya Zolnikova digs into this monument’s controversial history — and future.

      • Meduza‘Those who unleashed aggression won’t be in heaven’: St. Petersburg priest faces criminal charges for condemning Russia’s war against Ukraine

        Former priest and doctor of theology Ioann Kurmoyarov has been jailed for two months pending trial on felony charges of spreading “false information” about the Russian military. St. Petersburg’s Kalininsky District Court remanded Kurmoyarov in custody on Saturday, June 11. 

      • Common Dreams‘War Crimes’: Amnesty Probe Details Hundreds Killed by Russia’s Indiscriminate Bombing of Kharkiv

        Russia’s repeated attacks on Ukraine using cluster munitions “constitute war crimes,” Amnesty International said in a new report released Monday, highlighting several bombings in the northeastern city of Kharkiv, where more than 600 civilians have been killed since Russia invaded Ukraine in February.

        The report, titled Anyone Can Die at Any Time, was compiled from interviews with 160 people, including survivors of strikes, witnesses, and medical professionals who treated victims.

      • Common Dreams‘People Over Pentagon’ Proposal Would Take $100 Billion From Pentagon to Fund Social Programs

        Progressive advocacy groups across the United States on Monday welcomed a new legislative proposal that would cut Pentagon spending for the next fiscal year by $100 billion and reallocate it toward top threats facing the nation that “are not military in nature.”

        “How come when it comes to funding the Pentagon, no one asks how are we going to pay for it, but when it comes to funding healthcare, suddenly the government is poor?”

      • Site36Europol warning: Right-wingers equip themselves with 3D printed weapons

        A radical right-winger has been arrested in Slovakia for using self-printed weapons and explosives. Investigators on the phenomenon met in The Hague three weeks ago.

      • Common Dreams‘The Children Scream From the Hunger at Night’: Afghans Suffer After Biden Seizes Funds

        New reporting from The Washington Post on Monday laid out the increasingly dire conditions across Afghanistan amid drought and in the wake of the Taliban takeover and disastrous U.S. withdrawal last year following nearly two decades of war.

        “Sometimes all we have is donated stale bread and tea.”

      • TruthOutOcasio-Cortez Raises Concern Over Criminalization Provisions in Senate Gun Bill
      • TruthOutHundreds of Civilians Killed by Russia’s Bombing of Kharkiv, Report Says
      • Telex (Hungary)Hungarian state cancels support for charity concert for Ukraine in Budapest

        Ukrainian president Volodimir Zelensky’s former actor colleagues will be among the artists appearing at the charity concert which is to be held later this week, on 16 June at Bakáts tér in Budapest. The event was supposed to have taken place at the prestigious Várkert Bazár, but after weeks of organizing, the Hungarian state canceled its support of the event, which is why the 9th district of Budapest stepped in as host.

      • Meduza‘In Moscow, we’re the majority’: Opposition politician Ilya Yashin is still in Russia and still speaking out. So far, he’s stayed out of prison.

        Russia has effectively been under martial law for three months now. Anti-war protests are illegal, independent media outlets have been blocked, and anyone who spreads “fake news” about the Russian army (such as reports of war crimes) can face up to 15 years in prison. Naturally, a huge number of journalists, activists, and opposition politicians have left the country. Ilya Yashin is a rare figure: he’s chosen to stay in Russia, but he also openly refers to the war as a war (which violates Russian law). Four administrative offense reports have been filed against him as a result. Meduza special correspondent Svetlana Reiter spoke with Yashin about what’s changed in Moscow since February 24 — and why he’s chosen to stay in Russia.

      • Counter PunchTurkey’s Assault on Syrian Kurds: a Secondary Crises of the Ukraine War?

        But some of the worst consequences of the war outside Ukraine remain beneath the media radar, notably Turkey’s announcement in the last few weeks that it is planning an offensive to seize Kurdish-controlled enclaves in northern Syria. Going by previous Turkish incursions over the last five years this attack will mean the ethnic cleansing of Kurds left with no choice but to flee to other parts of Syria.

        Displacement, destruction, death

      • ScheerpostHedges: Society of Spectacle

        Opinion column: The Select Committee to Investigate the January 6th Attack on the U.S. Capitol, whose first of six televised hearings began last Thursday, is spectacle replacing politics. There is nothing substantially new in the accusations.

      • Common DreamsOpinion | January 6th Spectacle Won’t Save Democracy

        The televised hearings on the events of January 6, 2021 detailing the alleged insurrection at the Capitol after the 2020 election illustrates the sclerotic state of American politics and news media. It occurs at a time when democracies are weakening and disappearing. Regardless of one’s party affiliation or ideology, questions about a violent attempt to disrupt or ignore the democratic process are as serious as they are consequential. On the surface the hearing is a powerful example of democracy in action, but what happened on January 6th and what it means for democracy is hindered by the establishment news media and political classes’ fixation on Donald Trump. Indeed, they are addicted to the benefits of focusing on Trump all the time—so is Trump himself. Meanwhile, the public remains in the unenviable position of being inundated with propaganda while lacking a background in critical media literacy education.

      • Counter PunchPlaying Fiddle While the Nation Burns

        Eventually some “insurrectionists” may be charged and held to account but for the most part they will most likely simply supply great amounts of entertainment, entertainment in the form of ammunition for the Democratic hounds who love to hate and condemn the Republican party as the Republican hounds love hating the Democrats. Unless Trump himself is brought to account and is treated in the same manner as any citizen the hearings, like the impeachment hearings, will accomplish little to nothing. Even so, the hearings will do nothing to stop or better the Republican Party or the Democratic Party or the nation as a whole and all this just before the mid-terms!

        These hearings, however entertaining, will not solve the problems that lie at the root or heart of the United States, a country which is in obvious and statistically verifiable decline and these hearings, as sometimes reported, sure as hell won’t save our democracy. Likewise, convicting those citizens who were caught up in the passion of their political beliefs, as twisted as some of those beliefs may have been, will not play out in a just and righteous manner, bringing in the leaders that is and delivering sentences fairly handed down. They will if anything, only drive the wedge deeper into the heart of the nation while the real problems that affect us every day and the real criminals that hoodwink us without mercy and helped to bring on, either directly or indirectly, the fury of that crowd, go on unaddressed, untried and for the most part, unnoticed.

      • Counter PunchA January 6th Spectacle Won’t Save Democracy

        Americans are not media literate. For the most part, their schools do not mandate critical media literacy education. Writers have long warned that having a media illiterate citizenry threatens a democracy’s viability because voters are unable to discern fact from fiction, entertainment from reality. Indeed, numerous scholars and journalists have argued that it was these conditions that enabled Trump to become president of the United States. A long time media figure and reality television personality, Trump engaged in delivering sensationalistic content that the news media could not avoid. For four years, the news media enjoyed a massive increase in their audience size for covering every aspect of Trump’s life.  Some later issued a mea culpa, but all suffered from a huge reduction of their audience once Trump’s presidency concluded by nearly half in some cases.

        The Democratic Party engaged in what was known as a pied piper strategy to make Trump the 2016 nominee because they thought he was the best opponent to ensure Hillary Clinton’s victory. As evidenced by the 2020 election, antipathy for Trump drives Democratic Party voter participation like abortion and immigration animate Republicans. That Democrats rely on the “we’re not Trump” strategy has them facing dismal prospects for 2022 voter participation.

      • TruthOutSchiff Says There’s Plenty of Evidence DOJ Could Use to Charge Trump
      • TruthOutKey Jan. 6 Witness Backs Out of Public Hearings Due to Family Emergency
      • Common DreamsOpinion | January 6 Hearings: Examin­ing the Elec­tion Sabot­age and Ongoing Damage to Democracy
    • Common DreamsJan. 6 Hearing Offers Yet More Proof That ‘Trump Lied’ and ‘He Knew He Lied’

      Donald Trump’s incessant and frequently outlandish lies about the 2020 election were in the spotlight Monday as a special House committee laid out its case that the former president’s falsehoods about widespread voter fraud were pivotal in catalyzing the violent attack on the U.S. Capitol on January 6, 2021.

      Monday’s hearing, the second in a series of six, featured videotaped testimony from Trump administration insiders—including former Attorney General William Barr—and campaign officials who told House investigators that they informed their boss his claims about the 2020 election were unfounded, but he nevertheless made them on the night of the November contest and in subsequent weeks, ginning up his right-wing base and raking in massive sums in donations from supporters.

    • Common DreamsJan. 6 Committee Confirms ‘Big Lie’ Was Also a ‘Big Ripoff’ of Trump Donors

      The House Select Committee investigating the January 6 insurrection on Monday detailed how the Trump campaign blatantly deceived the former president’s supporters by using the “Big Lie” of a stolen election to bilk hundreds of millions out of them in massive fundraising blitz.

      “Not only was there that big lie, there was the big rip-off.”

    • Common DreamsWATCH: Second Jan. 6 Hearing Aims to Prove Trump’s Willful Lies Drove Violent Insurrection


      The House January 6 committee announced that Bill Stepien, former President Donald Trump’s 2020 campaign manager, will no longer be testifying at Monday’s hearing due to an unspecified “family emergency.”

    • TruthOutOcasio-Cortez Calls on GOP January 6 Pardon-Seekers to Reveal Themselves
    • The NationWhere the January 6 Insurrection Hearings Go Next

      The art of whipping up anticipation is usually better understood in Hollywood than in Washington. Grabbing hold of an audience requires first offering some enticement (in the form of a trailer that craftily hints at the story) before the main feature. The first day of the congressional hearings on the aborted coup of January 2021, however, offer an indication that at least some politicians have a talent for shaping narrative suspense. The team of Democratic Representative Bennie Thompson, chairman of the committee, and Republican Representative Liz Cheney, the vice chairman, presented a masterful overview. They unfolded a plausible narrative for the events leading up to the storming of the Capitol and summarized the forensic case for former President Donald Trump’s culpability in the attempted insurrection. Video clips from the riot offered a vivid reminder of the orchestrated violence that Trump stirred up.

    • TruthOutTorture Memo Lawyer John Yoo Devises Theory for Stealing Presidential Elections
  • Environment

    • Energy

      • Common DreamsOpinion | Setting the Precedent for a Peace Industrial Policy

        Last week, Biden invoked the Defense Production Act (DPA) to speed up the production of domestic clean energy infrastructure. This Act, originally passed in 1950 as a response to the Korean War, provides support for domestic production of materials deemed essential to national defense. As invoked last week, the DPA now provides investments in the domestic manufacturing of five green energy technologies (solar energy, heat pumps, insulation for buildings, hydrogen, and grid components) and waives solar tariffs. This move is an important milestone not only for federal U.S. support for a transition to green energy, but also in harnessing the precedent set by defense industrial policy to invest in peace, sustainability, and human needs instead of war.

      • The HillWarning signs flash for [cryptocurency] industry

        The latest cryptocurrency selloff reveals signs of trouble for the crypto industry, which was already facing layoffs and hiring freezes amid a global economic downturn.

        Bitcoin plunged nearly 23 percent from Friday to Monday, hitting its lowest mark since late last year. Ethereum, the second most popular cryptocurrency, dropped 32 percent over the same period. The total [cryptocurrency] market cap dropped below $1 trillion for the first time since January as investors unloaded their digital coins.

    • Wildlife/Nature

  • Finance

    • Counter PunchSoaring Food and Energy Prices Drive Inflation Higher in May

      Rents are still rising rapidly. The Fed’s rate hikes have likely already slowed or reversed the rise in sale prices, but it will be a while before any effect can be seen in rents.

      It is disappointing that new and used vehicle prices rose sharply. The latter was inconsistent with the Manheim Used Vehicle index, which showed a much smaller rise.

    • Counter PunchThe ‘Secret’ That Gets CEOs Rich: Keep Workers Poor
    • TruthOutStacey Abrams Unveils New Plan to Raise Base Teacher Salary to $50k
    • TechdirtRon DeSantis Continues To Waste Taxpayer Funds To Pay For His Unconstitutional Culture Wars

      Remember when Republicans pretended they were the party of fiscal responsibility, not wasting taxpayer money, and limited government? Sure, sure, you say, that was all just sloganeering, and never actually true in practice, but it’s really starkly on display in Florida, where governor (and wannabe 2024 Presidential candidate) Ron DeSantis has taken this all to new levels. Sure, sometimes he still makes statements with those old GOP slogans and tag lines, but he’s taken big, intrusive government to new levels, stripping rights away from those he dislikes, and having no problem wasting taxpayer funds so long as it helps him wage a culture war that gets him headlines and sycophantic adoration from a new bevy of brainwashed fans.

    • 180s

      I went from thinking that “cryptocurrency looks pretty nifty and good, I should get into that” into “ugh it sucks I really dodged a bullet“ within like three seconds of joining Fedi. Like, less than three years ago!

    • All Human Relationships are Built on Trust

      The idea of trustless money is ludicrous, because there’s no such thing as a trustless social relationship. This applies for business relationships or personal relationships. Without trust, that dog won’t hunt. Trust, violence, or the threat of violence is what backs any currency. I include the latter two things, because the US dollar is backed both by faith in the US government and fear of the US military.

      So what backs a currency pegged to a precious metal like gold or silver? Trust that we won’t find a new and ready source of the metal. Trust in the status quo. See why gold is beloved by conservatives? When bloodthirsty men looted the Americas in the 1500s and shipped incredible amounts of gold home to mother Europe, gold lost its value. Goldbugs don’t talk about the inflation in Spain during the 16th century. they don’t want to admit that their “eternal store of value” is in fact built on nothing more and nothing less than faith, just like any other currency.

  • AstroTurf/Lobbying/Politics

    • BBCMusk to hold first meeting with Twitter staff this week

      The event was announced by Twitter’s chief executive Parag Agrawal in an email to staff on Monday.

      Mr Agrawal told employees they could submit questions to Mr Musk in advance of the meeting.

    • SalonJan. 6 committee makes the case clear for Merrick Garland: Failure to prosecute Trump is political

      Few Republican voters will even allow themselves to take in this information. Instead, they will turn to propaganda outlets like Fox News to be told comforting lies. But the problem may be even bigger than that. Waking Republican voters up with the truth only works if “truth” is something Republican voters care about. Unfortunately, there’s little reason to believe it is.

      Republicans know full well that Trump is just making up his claims of a “stolen” election and they simply don’t care. They weren’t duped by the Big Lie —they think they’re in on it.

      As I’ve argued before, the Big Lie is less of a literal belief for Trump supporters, and more a myth embraced because it speaks to their deeper belief: That they’re entitled to rule, no matter what. They don’t believe the 2020 election was a “fraud” because of any actual evidence. It’s far more that they just think that people who voted for President Joe Biden shouldn’t have a right to vote in the first place. By repeating the Big Lie, they are participating, along with Trump, in spinning a narrative that they are using, just like Trump, as a pretext to justify this deeper and more fundamental belief. It’s just that they know that there’s no way to argue out loud that only conservative white Christians should have the vote, so they use these conspiracy theories to perpetuate this ugly belief without stating it out loud.

    • Counter PunchThe Junior President from the State of Delaware

      The best Senators, the ones we need to listen to, can rise to a watershed moment putting their convictions ahead of individual or party gain, vendetta or transient popular favor. For example, in 1964 two otherwise unremarkable Democrats, Wayne Morse (D-OR) and Ernest Greuning (D-AK), were the only Senators to vote against President Lyndon Johnson’s fraudulent assertions that North Vietnam was provoking war off its coast. By a vote of 88 to 2, the Senate passed the notorious Gulf of Tonkin Resolution to authorize ten years of American war-making in Indochina. Similarly, early in the Watergate scandals, two Republicans, Edward Brooke (R-MA) and Lowell Weicker (R-CT), attacked the Nixon Administration for its lying. Subsequent events proved all four right – morally and on the facts — and yet they never achieved the popular adulation that latecomers grabbed.

      The higher functioning party hacks raise themselves through the Senate pushing party or ideological agendas but little else. Nothing is more important than winning some advantage – no matter how minor — while making sure the detested “other” gets no gain. An early example I observed was Senator Jesse Helms (R-NC) who exerted himself to undo not just Democrats but Republicans who didn’t toe his line. A repellent personality to many of his own colleagues, Helms never achieved high party office, but he did achieve wide spread national standing among hard core right wingers seeking to purge the Republican party of nonbelievers. (They were very successful.) A contemporary highly functioning party hack is the Republican Minority Leader Mitch McConnell (R-KY), who has pretzeled his position on the filibuster, Supreme Court appointments and more depending on what advantages his party’s power. Should he become the Majority Leader after the 2022 elections, watch as he reverses himself on the filibuster for a third time when the tactical situation makes it advantageous.

    • Counter PunchThe Unjustified Criticism of High Commissioner Michelle Bachelet’s Visit To China

      As former UN rapporteurs we are committed to the promotion and protection of human rights in all corners of the world, including China.  Progress can only be achieved on the basis on good faith implementation of the UN Charter and UN human rights treaties, and requires patience, perseverance, and international solidarity.

      An artificial atmosphere of hostility, sustained by geopolitical agendas, double standards, fake news and skewed narratives has made it difficult to tackle specific human rights problems and advance on the progressive enjoyment of human rights in larger freedom. Human rights allegations were being selectively deployed as a geopolitical tool, above all to stoke the embers of confrontation that was high on the agenda of both the Trump and Biden presidencies.

    • The NationThe Conservatives on the Supreme Court Have Officially Become Homicidal

      The basic definition of a homicide is the death of one human because of the actions of another. By that definition, Clarence Thomas attempted homicide via the majority opinion he wrote in the Supreme Court case Shinn v. Ramirez on May 23. I do not say that merely because Thomas denied the appeal of two people on death row. Supreme Court justices deny final appeals from people condemned to die all the time, and while those denials have the effect of killing people, I wouldn’t call every denial a homicide. I call Thomas’s opinion a homicide because his reason for denying the appeal was so twisted and evil that his intent to kill was discernible through the legal jargon. He even added a footnote wherein he callously explained that he had the discretion to save these lives, but was choosing not to use it.

    • Counter PunchConservative Supreme Court Justices Disagree About How to Read the Law

      As a political scientist who has published several books on law and politics, I know it’s true that the political affiliation of the president who appointed a justice is a powerful indicator of how that justice will vote.

      But ideology does not explain everything. Not all cases divide neatly along partisan lines, and, what’s equally important, Supreme Court decisions consist of more than votes. They also set forth judicial reasoning, which offers vital clues to differences in how justices read the law and how they might rule in future cases.

    • FAIR‘Calibrated’ Dishonesty: Western Media Coverage of Venezuela Sanctions

      US sanctions, even by outdated estimates, have killed tens of thousands of Venezuelans. The unilateral policies have been widely condemned by multilateral bodies and human rights experts for their deadly impact, as well as for violating international law (Venezuelanalysis, 9/18/21, 9/15/21, 3/25/21, 1/31/19).

    • Telex (Hungary)The case of the mysterious small aircraft which violated Hungarian airspace

      We spoke with retired pilot and accident examiner György Háy regarding the Lithuanian airplane which flew across Hungarian airspace illegally last week. He said that there is not much that can be done with an airplane flying in the air. At the most – if it is acting dangerously – it can be shot down.

    • Democracy NowHarvest of Empire: Juan González on His Landmark Book, Immigration & Consequences of U.S. Imperialism

      As the Summit of the Americas wrapped up in Los Angeles with President Biden announcing a plan to address migration in the Western Hemisphere that includes a series of so-called bold actions, we spend the hour with Democracy Now! co-host, professor, longtime journalist and author Juan González, who has just released the newly revised edition of his landmark 2000 book, “Harvest of Empire: A History of Latinos in America.” González’s best-seller has been expanded to include more contemporary Lantix history, such as U.S. immigration policy under Presidents Trump and Biden, the overpolicing of non-U.S. citizens and how it connects to a history of Western colonialism in the region. While European colonization caused Latin America to be “the incubator of the American empire,” the millennial immigration apparatus has become fixated on “kicking out Latin Americans, and no one is doing anything about it,” says González. He also examines the culture and history of Latinos and discusses the history of U.S. involvement and imperialism in countries like the Dominican Republic, where many of the immigrants here in New York City hail from, and the conditions of Guatemala’s Indigenous peoples under the brutal U.S.-backed government that drove many of them to leave their country and head north in search of safety.

    • The NationWhat the French Really Owe Haiti

      Last month, The New York Times made headlines with its front-page series about the billions (in today’s dollars) that France forced Haiti to pay following centuries of slavery. Despite the terrors and tortures of French colonialism, the Haitian revolutionaries won their independence from France in 1804 to become the first modern nation to permanently abolish slavery. Yet, in 1825, the French returned to Haitian shores to demand 150 million francs in exchange for recognition of Haitian independence—21 years after the fact—and to compensate enslavers for their lost “property.”

    • TechdirtThe Evidence Just Doesn’t Support Any Of The Narratives About The Harms Of Social Media

      A whole bunch of people over the last month have sent me Jonathan Haidt’s essay in The Atlantic, “Why the Past 10 Years of American Life Have Been Uniquely Stupid,” and asked for my thoughts. Haidt’s basic premise is that the problem is social media. It’s more complex and nuanced than that, and there are some important points in the complexities and the nuances, but the takeaway remains that social media is the problem. I’ve written about half of three different responses to it, but am still working on a more complete article explaining what I think it gets wrong. So this article is not that. However, this article is about an excellent piece in The New Yorker by Gideon Lewis-Kraus that is, itself, something of a response to Haidt, with the title: “How Harmful is Social Media?“

    • TruthOutAndrew Giuliani Can’t Attend GOP Gubernatorial Debate Due to Being Unvaccinated
    • The NationTrump’s Coup Plot Relied on Giuliani’s Inebriated Lies

      “The mayor was definitely intoxicated,” declared Jason Miller, a veteran fixer for Donald Trump who was in the White House on the night of the November 3, 2020, presidential election.

    • The NationDriven. Crazy.
  • Freedom of Information / Freedom of the Press

    • Telex (Hungary)Telex will belong to the Telex team: the publisher of Telex becomes employee-owned
    • Common DreamsDoctors to Top UK Officials: ‘Do Not Extradite Julian Assange; Free Him’

      With the U.K. home secretary expected to decide this week whether to approve Julian Assange’s extradition to the United States to face prosecution for publishing classified information, a group of more than 300 medical professionals elevated its call Monday for the British government to immediately free the WikiLeaks founder or be complicit in his “slow-motion execution.”

      “Under conditions in which the U.K. legal system has failed to take Mr. Assange’s current health status into account, no valid decision regarding his extradition may be made, by yourself or anyone else,” Doctors for Assange, a coalition of representing physicians and other medical professionals from 35 countries, wrote in a letter to U.K. Home Secretary Priti Patel and Prime Minister Boris Johnson.

    • ScheerpostDoctor’s Orders: ‘Do Not Extradite Assange’

      More than 300 Doctors For Assange have written to Home Secretary Priti Patel to not make the U.K. “complicit in the slow-motion execution” of Julian Assange.

    • The DissenterPatel Responsible For Assange’s ‘Slow-Motion Execution’ If Extradited, Doctors Warn

      A coalition of over 300 doctors warned UK Home Secretary Priti Patel that she may be responsible for the “slow-motion execution” of WikiLeaks founder Julian Assange if her office approves the United States government’s extradition request.Patel has until June 19, which is ten years after Assange entered Ecuador’s embassy in London and sought political asylum, to decide whether to approve the extradition.Assange faces 18 charges brought against him by the US Justice Department, 17 of which are under the Espionage Act. All the charges relate to documents WikiLeaks released in 2010 and 2011, which were provided by US Army whistleblower Chelsea Manning.Doctors for Assange” is an international coalition of medical doctors, psychiatrists, and psychologists who have spoken up for Assange because of the toll the US government’s prosecution has taken on his health. Many of the doctors are from the UK and Australia, which is Assange’s home country.

      The doctors sent a letter to Patel on June 10, 2022, ahead of the Home Office’s extradition decision.“Should [Assange] come to harm in the US,” the group contends Patel “will be left holding the responsibility for that negligent outcome.” They add, “The extradition of a person with such compromised health, moreover, is medically and ethically unacceptable.”

  • Civil Rights/Policing

    • The HillAs the Taliban try to silence women, the international community must do more

      But a new report from the Association of Wartime Allies (AWA), a member-based organization focused on saving the lives of Afghan and Iraqi applicants for Special Immigrant Visas (SIV), has taken a giant step in the right direction — one that we hope other organizations will follow. The AWA survey is one of the first to document the human rights abuses and gender-specific experiences of female SIV applicants left behind in Afghanistan.

      Women are too often forgotten in policy discussions about Afghan evacuees because they form less than 10 percent of the at-risk Afghan community that gets most of the attention: those with Special Immigrant Visas. SIVs are a special visa program for Afghans and Iraqis who worked with the U.S. government during military operations there.

    • CBCPhone won’t stop buzzing after work? How right-to-disconnect policies might help — and might not

      “The legislation is quite toothless,” said Matthew Fisher, a partner at Lecker & Associates Law who specializes in employment law. “What it really does is it requires employers of a certain size in certain circumstances to make a policy,” he added.

      “The problem is they are relying on the good faith of employers…. There is nothing in the legislation that requires the policy to be reasonable.”

    • NBC13-year-old killed by San Antonio police was not a threat to officers, attorney says

      Attorney Lee Merritt said there was “a clear civil rights violation” based on the police videos he watched, which included two police dashcam videos and footage from the bodycam of officer Stephen Ramos, who has been identified as the officer who shot Andre Hernandez Jr. The videos, Merritt said, contradict the narrative put forth by officers.

    • Counter PunchThe Mayoral Elections in LA Are About Knowledge

      Democracy, Demos Kratos, power to the people as we all know, is what is being politicked in LA. In a deeply individualistic culture, in a city with a receding public life, voters are being called to decide on the future of one of the most important cities in the world. Though charisma, persona, experience, conviction, and leadership are what are on the ballot, LA residents are truly being called to the polls to further define California democracy, a complex entity that must be improved in order to achieve peace, justice, and a more humane city.

      In houselessness, or homelessness, a crisis in Los Angeles? A crisis is a concept with a very specific definition. A crisis is a time of “intense difficulty”, when a “decision needs to be made”, is what google tells us, which we will settle with. In other words, a crisis is a point in which actors, aided by a public and by spectators (let’s just say the reading public) are placed on a hot seat and must make the right decision. This decision can redress the situation. The Bhagavad Gita is one of the great texts that explores the concept of a crisis. In it Arjuna, a prince, cannot decide to fight because fighting will harm his relatives that stand opposed to him on the battlefield. Krishna explains to him that it is his dharma to fight, and that he must fight in order for certain things to happen.

    • ScheerpostCritics Say Starbucks CEO Just Declared ‘Permanent War’ Against Union

      Billionaire Howard Schultz’s vow to never negotiate in good faith with Starbucks Workers United may violate federal labor law.

    • Counter PunchTime to Launch “Dads Demand Action to Raise Healthy Boys”

      There’ll be time enough for backyard barbeques once fathers take the lead in establishing “Dads Demand Action to Raise Healthy Boys,” following in the footsteps—a decade late—after “Moms Demand Action for Gun Sense,” launched the day following the mass murders at Sandy Hook.

      In recent years, a growing number of men have been questioning conventional definitions of manhood and masculinity, so it’s an apt moment—with the scourge of male mass shootings fresh in our minds—for fathers and other men to reinvent Father’s Day. A day more about raising healthy boys and girls than about flipping ‘burgers and ‘dogs on the grill, as fun as that may be.

    • Counter PunchMia Couto and the African Guilt Slavery

      And more from the writer: “The simplification of the continent may have helped when it was necessary to claim that Africa had culture and history-we Africans ourselves spoke of one Africa. But then we built differentiated identities and voices, we have been plural since forever.”

      Here again we can note that it is possible to speak big lies with partial truths. Remember an anthological Washington Olivetto ad, which reconstructed a terrible figure with flattering references?  The video of the ad spoke with images in dots on the screen: “This man took a destroyed nation. He restored its economy and restored pride to its people. In his first four years in office, the number of unemployed fell from six million to nine hundred thousand people. This man made the Gross Domestic Product grow 102% and the per capita income double. This man loved music and painting. And as a young man, he imagined pursuing a career in the arts.” Then the points were reduced and the image of Hitler came up, to conclude: “You can tell a pack of lies by telling only the truth.” Here’s the video clip:

    • Common DreamsPolice and Indigenous Group Deny Bodies Found in Search for Dom Phillips and Bruno Pereira

      Brazilian police and a local Indigenous association are denying reporting Monday that a pair of bodies were found in the Amazon in the search for Dom Phillips and Bruno Pereira.

    • TruthOutPatriot Front Members Arrived in Riot Gear to Terrorize Idaho Pride Event
    • Pro PublicaCivil Rights Lawsuit Accuses Police of Unlawfully Arresting a High Schooler in the Early Days of the Pandemic

      Police in a Texas border town used stay-at-home orders in the early days of the COVID-19 pandemic to unlawfully stop and arrest a high school senior driving to his mother’s house, according to a civil rights lawsuit that has its first hearing this week.

      Socrates Shawn, then 18, was commuting between his divorced parents’ homes when he was pulled over in April 2020 by a police officer in Progreso, a town of about 4,800 residents in the Rio Grande Valley.

    • TechdirtReport Shows Kansas Law Enforcement Seized $21 Million From People, Most Of Whom Were Never Charged With Crimes

      A new report on asset forfeiture arrives at the same conclusions every other report on the subject has: forfeiture makes money for cops, does almost nothing to stop illegal activity, and rarely, if ever, results in criminal convictions. (via CJ Ciaramella at Reason)

    • Common DreamsProtests Erupt After UK Court Greenlights Plan to Deport Asylum-Seekers to Rwanda

      Progressives demonstrated outside the United Kingdom Home Office in London after judges on Monday greenlit right-wing Prime Minister Boris Johnson’s widely condemned plan to expel some asylum-seekers to Rwanda.

      “Deporting refugees to Rwanda has nothing to do with tackling people-trafficking and everything to do with whipping up hate and stoking division.”

  • Internet Policy/Net Neutrality

    • TechdirtU.S. Broadband Maps Remain Unfinished As Billions In COVID Broadband Funding Starts To Flow

      We’ve noted a few times how there’s an absolutely historic amount of money being thrown at the “digital divide” this year. The broadband infrastructure bill alone designates $42 billion to expanding broadband access. Billions more in COVID relief money started flowing this week courtesy of the Treasury Department.

    • CoryDoctorowPodcasting “Regulatory Capture”

      Net Neutrality is a very simple proposition: it’s the idea that your ISP should send you the bits you request when you click links as quickly and efficiently as it can. The opposite of neutrality is net discrimination, which is when your ISP demands bribes from the services you want to use, and punishes the companies that refuse to pay by slowing down their connections to you.

      No one wants this, for fairly obvious reasons, which left Pai with a dilemma: as a matter of law, he couldn’t just kill off Net Neutrality; first, he had to seek public comment on the proposal, and the public didn’t want Net Neutrality dead. When John Oliver did an episode about this, 1.5m people commented in the docket, melting the FCC’s servers.

  • Monopolies

    • Patents

      • TruthOutWTO Draft Text Has Abandoned COVID Patent Waiver, Critics Say
      • Common DreamsAs WTO Ministerial Opens, Civil Society Slams Rich Nations for Acting as Big Pharma ‘Henchmen’

        The 12th Ministerial Conference of the World Trade Organization kicked off in Geneva on Sunday amid mounting protests against rich nations’ refusal to support a patent waiver for coronavirus vaccines and therapeutics, obstruction that has left billions of people around the world without access as Covid-19 continues to spread and take lives.

        While WTO Director-General Ngozi Okonjo-Iweala voiced “cautious optimism” that member countries will ultimately reach an agreement on patents and other key items on the body’s agenda, civil society groups warned that the intellectual property text currently on the table represents such a departure from South Africa and India’s original proposal that it can’t even be called a waiver.

    • Copyrights

      • Torrent FreakThe U.S. ‘Small’ Copyright Claims Board Goes Live this Week

        The US “Copyright Claims Board” starts accepting its first claims this week. The tribunal, which is part of the Copyright Office, allows parties to resolve “small” copyright disputes relatively cheaply outside of the federal court system. Damages available under these claims are capped at $30,000 and the entire process takes place online, without the need to hire an attorney.

      • Torrent FreakIPTV Pirates Who Lost $90m Lawsuit Lose Another Worth $130m

        Former operators of pirate IPTV service SetTV were previously ordered to pay $90 million in damages after losing a DISH Network piracy lawsuit. A second lawsuit ensued when DISH discovered that the men had violated an injunction by launching a new pirate platform called ExpediteTV. That lawsuit has now concluded with a second injunction attached to a $130 million damages award.

      • TechdirtCopyright Being Used To Stifle Attempts To Preserve A Dying Language

        One of deep-seated problems with copyright is that its supporters believe everything created should be “owned” by someone and protected from being “stolen” by others. We’ve already written about how that’s a bad fit for writing music, and NBC News has a fascinating story about how the same issue is plaguing a very different world – that of indigenous languages (pointed out by D. J. Mary on Twitter). It concerns the Lakota language, one of many native American languages that are at risk of extinction because so few people speak them fluently. In recent years, there have been increasing efforts to create language resources from the surviving speakers, to prevent the language and its culture being lost, and to produce learning materials. The long and interesting article discusses the details of the dispute between the Lakota Language Consortium and some Lakota language speakers, like Ray Taken Alive:

      • Times Higher EducationLet’s end the rocky marriage between academia and commercial publishers

        Third, publishers have resisted repeated attempts to make their contracts with universities more transparent. A 2014 analysis showed that the University of Michigan, Ann Arbor paid Elsevier $2.16 million (£1.77 million) for the exact same package of journals sold to the University of Wisconsin, Madison for $1.22 million. Yale, with about 12,500 students, paid Springer $711,564 for the same package that the University of Texas, Austin, with more than 50,000 students, purchased for $481,932.

        Scientific publications need to get back to their original goal of distributing the best scientific information to the largest audience at the lowest cost. To replace the expensive, dysfunctional system, we need a national or global digital library that will edit and post peer-reviewed scientific papers.

        This will require multi-institutional consortia and a substantial expansion of university libraries and professional librarians. Oversight will also be needed – and could be provided by a distinguished non-profit entity, similar to the national academies. Subcommittees representing the interests of each academic discipline should define the content of the new electronic publications and appoint their editors and editorial boards.

IRC Proceedings: Monday, June 13, 2022

Posted in IRC Logs at 2:18 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 QmNy2QDZxcVG4Z1QmVrKF9f6MnKViysaiU5VNp1RhHEErv IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmQpLyfbEEjbzFc5RRanrA7E2UneMj9ubhczYNEVMwtDL4 IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmYZZzz7JhBqnXz59LdFZXGjMq4ms3SBRp6hLN1Ziu15kY IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmY5fajM2urojJ6CaWMV7CFKfkQw2ryL7NbyKAbuvFoWPT IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmSb6T6aYAECeKAetWG1hCQVoSZmcLrrCnZ8tUa5P9eZB4 IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmYdPKePPs4mzvVjbSkb7vJk4gmqd2GU6XNpCWH4ZXPDog IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmbCTs2XbD1M3YYRwHm62ufv1QWLxmUCUFSiGLhiLthZqF IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmXJ3eTYKY5kbbQcSPeVZegh2sRD1uqbr53kYftdSWHrDJ IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): Qmc67a9x4HD9qupu8co3a69zDZgiGqMajmKGqJk9ktCMEL

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts