Bonum Certa Men Certa

Links 01/08/2022: Q4OS 4.10 and EasyOS 32-bit in Action



  • GNU/Linux

    • Desktop/Laptop

      • Barry KaulerEasyOS 32-bit works on old Aspire 3681WXMi laptop

        Today has been a pleasant experience. My old Acer Aspire 3681WXMi laptop has an Intel Celeron 32-bit CPU and only 512MB RAM. I bought it circa-2005. It has been in the closet for years.

        I booted EasyOS on a USB-stick, and got a desktop, but lots of things broken. What I discovered is that it couldn't handle the "top level zram". I disabled that, went back to the old method of direct writes to the drive (that you can do via a checkbox via "save" icon on desktop), and everything came good.

        Not enough RAM to juggle the extra requirement of the zram. The laptop has a swap-partition, which is required -- I checked and saw that it was being used.

        Audio works, wi-fi works. Connected to the Internet, Firefox works and is surprisingly snappy. LibreOffice works, also surprisingly snappy. Really, this has given this old laptop a new lease of life.

        Next up, I plan to put detection of RAM less than 1GB and automatically turn off "top level zram".

        So, what are the lower-end specs that will work? I don't know if Easy will work lower than 512MB RAM, so set that as the minimum. The CPU needs to be 32-bit i686 -- 486/586 CPU is no good. The expansion bus needs to be PCI -- the predecessor is the ISA bus, and the kernel will not work with that.

        I compiled the kernel, 5.15.57, for a single-core CPU, supporting 4GB RAM maximum. Also disabled EFI support in the kernel -- this is for BIOS computers only.

    • Server

      • SUSE's Corporate BlogALP Prototype is Evolving, Proof of Concept Expected in Fall | SUSE Communities

        The Adaptable Linux Platform (ALP) is switching from the UNIX-style centered, influenced structure of previous operating systems to a more workload and application-centric design. A flexible and secure platform with advancing concepts, as seen in both MicroOS and SLE Micro, along with the incorporation of other components, is evolving. This platform is designed to easily build, deploy and manage applications regardless of hardware or environment.

      • The Fathers of Kubernetes: Where Are They Now? - Container Journal

        Kubernetes, the open source project for container management, has taken the software development world by storm. The platform is used by countless organizations using containers due to its high scalability, elasticity and reliability. According to the CNCF Annual Survey 2021, 96% of organizations are either using or evaluating Kubernetes.

        Kubernetes is a de facto option for container orchestration and scheduling. But it wasn’t always that way. It took great minds to construct Kubernetes within Google and others to evangelize its use throughout the software industry. And nowadays, new leaders are emerging to carry the torch forward.

        Below, we’ll revisit the history of Kubernetes and check in with its original creators to see where they are today. We’ll also highlight several other prominent figures within the Kubernetes and open source cloud-native community to gauge where the inertia currently is.

    • Audiocasts/Shows

    • Kernel Space

      • GamingOnLinuxLinux 5.19 is out now, Torvalds released it using an Apple silicon MacBook [Ed: How to distract from Linux 5.19]

        The latest kernel release is out with Linux 5.19 and showing just how far Linux support for the newer Apple silicon MacBooks has come, Linus Torvalds did the release on one!

      • 9to5LinuxYou Can Now Install Linux Kernel 5.19 on Ubuntu and Ubuntu-Based Distributions

         If you’re using Ubuntu or an Ubuntu-based distribution you can now install Linux kernel 5.19 on your computer in case you need some of the new features or because your hardware is not fully supported by the default Linux kernel in your Ubuntu PC. But, if everything works well, you should stick to the default kernel. Whatever the case may be, installing Linux kernel 5.19 on Ubuntu or an Ubuntu-based distribution is quite easy with the Mainline tool.

      • 9to5LinuxGNU Linux-Libre 5.19 Kernel Arrives for Those Who Seek 100% Freedom for Their PCs

         Based on the recently released Linux 5.19 kernel series, the GNU Linux-libre 5.19 (codename Uhura in memory of Nichelle Nichols) kernel is here to clean up the pureLiFi X/XL/XC and TI AMx3 Wkup-M3 IPC drivers, adjust the cleanup logic for the AMDGPU, Qualcomm WCNSS PIL, Realtek Bluetooth, Mellanox Spectrum, Marvell WiFi-Ex, Silicon Labs WFX, as well as Intel AVS, IFS, and IPU3-ImgU drivers, and clean up the blobs requested by several new devicetree files for Qualcomm AArch64 SoCs.

      • AppleInsiderLinus Torvalds uses M2 MacBook Air to release Linux 5.19 | AppleInsider

        The latest release of Linux 5.19 has more of an Apple angle than usual, with Linus Torvalds releasing it using an M2 MacBook Air running a version of Linux ported to Apple Silicon.

        Linux, like other operating systems, receives updates periodically, with the open source software being no exception. Linus Torvalds, the driving force behind Linux, recently released version 5.19 of the operating system, enabling maintainers of the different Linux variants to incorporate the changes.

        Spotted by Asahi Linux, Torvalds has passed comment about the use of Apple products in an email to the Linux Kernel Mailing List. Posted on Sunday, Torvalds writes "the most interesting part here is that I did the release (and am writing this) on an arm64 laptop," referring to the use of Apple Silicon.

      • ZDNetLinus Torvalds says he's been waiting a 'loong time' for this Linux laptop option | ZDNet

        Linus Torvalds has announced Linux 5.19, and this time released a version of Linux from an Arm-based Apple MacBook running Asahi Linux.

        Torvalds says Linux 5.19 contains "nothing really interesting" and a "lot of random stuff".

    • Applications

      • Its FOSSPadloc: An Intuitive Open-Source Password Manager

         Exploring an open-source password manager with a pleasing user interface, available cross-platform.

        There are plenty of free and premium password managers for individuals and teams.

        However, when it comes to open-source solutions, it is often limited to a couple of good ones like Seahorse, KeePassXC, and Bitwarden.

        If you have read through our list of the best password managers for Linux, you might already know some of them.

        I stumbled upon another interesting open-source password manager that could make it to that list for its user experience, i.e., Padloc.

      • Make Use OfAPT vs. DNF vs. YUM: Linux Package Managers Compared

        APT, DNF, and YUM are the three package managers Linux newcomers are likely to run into. So which one is better in terms of usability and performance?

        Using the command line to add or remove programs on Linux isn't necessary, but it is faster than using a graphical application. Many people find that at some point in their Linux journey, they end up opening a terminal to install new apps or system updates.

        APT and DNF are two of the most popular package managers for the job. These two programs are very similar, but they do have some differences in how they function. Let's dive in.

    • Instructionals/Technical

      • Make Use OfHow to SSH Into a Raspberry Pi for Remote Access

        When running a project on a headless Raspberry Pi, it may not always be convenient to plug it into a monitor when you want to change something, but you don’t need to. You can access and control the Raspberry Pi remotely via SSH (Secure SHell) from another computer or even a smartphone on the same network. This guide will first show you how to enable SSH, then how to SSH into Raspberry Pi from another device.

      • FOSSLinuxHow to install AWS command line interface (CLI) on Ubuntu | FOSS Linux

        In recent years, Cloud computing has increased rapidly, with 94% of all enterprises using cloud services. Many platforms provide cloud services, such as AWS, Microsoft Azure, Google Cloud, etc.

        There are four cloud computing types: private clouds, public clouds, hybrid clouds, and multi-clouds. Ubuntu fully supports all these clouds, making it the most popular Linux distribution for cloud platforms. This article will discuss AWS and installing AWS CLI (AWS Command Line Interface) on Ubuntu.

      • MakeTech EasierHow to Secure Your Linux Servers With SELinux - Make Tech Easier

        SELinux can help you secure your server from malfunctioning processes or applications. Developed by the NSA (National Security Agency) to secure government devices from attackers, the security enhanced (SE) Linux architecture uses security protocols to restrict access to system resources. Find out how you can use it for your own server.

      • Ubuntu HandbookHow to Install Linux Kernel 5.19 in Ubuntu 22.04 LTS | UbuntuHandbook

        Linux Kernel 5.19 was released! Ubuntu Mainline PPA has made the packages for testing purpose.

      • ByteXDHow to Use Autojump Advanced Navigation in Linux - ByteXD

        In this article you will learn how to use autojump to navigate easily between directories without specifying their full path or executing numerous cd commands.

      • ByteXDHow To Extract Tar Files Into a Specific Directory - ByteXD

        tar is a very old command line utility from the seventies. tar stands for Tape ARchive, and it is used for creating and extracting archive files. Additionally, tar can be used to compress and decompress these archived files.

        In other words, the tar program packs many files and folders into a single logical file for easy and fast transmission (e.g. FTP), optionally compressed. This essential tool is implementing various compression algorithms such as gzip, xz, and bzip2.

        Tar comes with an enormous amount of options which are and can be confusing for even experienced Linux users.

        However this article will cover only the subject of how to extract tar archives using special tar options to specify the target directory; in addition, we will mention other necessary tar arguments.

      • How to use the sudo Command in Linux - Pi My Life Up

        The sudo command allows any user within the sudo group to run commands as another user. By default, sudo will run as root, but you can specify any user you want. If you plan on using a Linux operating system, you will likely use this command quite a bit.

        You will most likely use this command when you run a command requiring root or super user privileges. For example, many user administration commands will need the user to have root privileges to run. In less likely scenarios, you may need to use a different user to run a specific command.

    • WINE or Emulation

      • GamingOnLinuxWindows compatibility layer Wine version 7.14 is out now

        Windows compatibility on Linux continues to improve thanks to Wine, with the latest development release out now with Wine 7.14 available. This is the compatibility layer that allows you to run various Windows applications and games on Linux (and forms part of Steam Play Proton). Once a year or so, a new stable release is made but the development versions are usually fine to use.

    • Games

      • GamingOnLinuxSteam gets support for Nintendo Online classic controllers

        Valve recently released an update for the main Steam client, which amongst other things brings support in Steam Input for the Nintendo Online classic controllers. These are the special controllers Nintendo offers for playing their classics on Nintendo Switch, although Steam having support for them makes sure they have a whole lot more life.

      • GamingOnLinuxValve bans devs from adding review scores and awards on Steam store assets

        There's a lot of places where developers can have their game logo across Steam, and some developers have been going pretty overboard with noisy images filled with extras. Valve is putting a stop to it.

      • GamingOnLinuxLinux gaming overlay MangoHud version 0.6.8 out now

        MangoHud is probably one of my favourite open source projects giving Linux gamers a fancy HUD to display various performance metrics in a nice overlay. Version 0.6.8 is out now!

      • GamingOnLinuxOpenRazer new release adding support for more Razer hardware on Linux

        Razer make some pretty fancy hardware but, like a lot of vendors, don't exactly support Linux directly and so the OpenRazer project helps you out there. It's an open source driver and user-space daemon to control Razer lighting and other features on Linux, with version 3.4.0 officially out now.

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • Productivity Software/LibreOffice/Calligra

      • Help us to test LibreOffice 7.4 RC2! - LibreOffice QA Blog

        The LibreOffice Quality Assurance (QA) Team is happy to announce that LibreOffice 7.4 Release Candidate 2 (RC2) is available for testing!

        LibreOffice 7.4 will be released as final in mid August, 2022 (check the Release Plan for more information), with LibreOffice 7.4 RC2 being the fourth pre-release since the development of version 7.4 started at the end of November 2021. Since the previous release, LibreOffice 7.4 RC1, 99 commits have been submitted to the code repository and 56 issues got fixed. Check the release notes to find the new features included in this version of LibreOffice.

      • Document FoundationTDF Annual Report 2021 - The Document Foundation Blog

        The Annual Report of The Document Foundation for the year 2020 is now available in PDF format from TDF Nextcloud in two different versions: low resolution (12.2MB) and high resolution (31.6MB). The annual report is based on the German version presented to the authorities in April.

    • Programming/Development

      • Declaring a Variable with const in JavaScript

        The const keyword is one of the three ways you can declare a variable in the JavaScript language.

        What differentiates JavaScript’s const keyword from the others is that once a variable is declared, it cannot be assigned a new value.

        This is incredibly useful when you need to declare a value that should never be changed during runtime. In fact, as a general rule, you should declare a variable using “const” unless you expect the value to be changed.

        By the end of this guide, you should have a good understanding of how to declare a variable in JavaScript using const.

      • Sergio Talens-Oliag: Using Git Server Hooks on GitLab CE to Validate Tags

        Since a long time ago I’ve been a gitlab-ce user, in fact I’ve set it up on three of the last four companies I’ve worked for (initially I installed it using the omnibus packages on a debian server but on the last two places I moved to the docker based installation, as it is easy to maintain and we don’t need a big installation as the teams using it are small).

        On the company I work for now (kyso) we are using it to host all our internal repositories and to do all the CI/CD work (the automatic deployments are triggered by web hooks in some cases, but the rest is all done using gitlab-ci).

        The majority of projects are using nodejs as programming language and we have automated the publication of npm packages on our gitlab instance npm registry and even the publication into the npmjs registry.

        To publish the packages we have added rules to the gitlab-ci configuration of the relevant repositories and we publish them when a tag is created.

      • Perl / Raku

        • Rakulang2022.31 JustinTimeRelease – Rakudo Weekly News

          Justin DeVuyst was able to release the 2022.07 Rakudo Compiler Release just before the end of the month. Which added inode, dev and devtype methods to IO::Path, and a new .snip method (inspired by Haskell’s span). And many other improvements and fixes! Updated Linux packages are now also available on rakudo.pkg, thanks to Claudio Ramirez.

      • Rust

  • Leftovers

    • ScheerpostGovernment Supervised Times, Wartime Reporting, and More

      We talk to Patrick Lawrence about Ukraine by diving deeper into his recent articles written for ScheerPost.

    • HackadayIndustrial Robot Repurposed To Make S’Mores

      It’s summer time in the Northern Hemisphere, and that means campfires for cooking hot dogs, keeping the mosquitoes away, and of course, making s’mores. For our far-flung friends, that’s a fire roasted marshmallow and a square of chocolate smashed between two graham crackers. So called because when you’re done, you’ll want s’more. It’s an easy enough recipe that any child can tell you how to make it. But what if you’re not a child? What if you don’t even have hands, because you’re an€ industrial robot? This is the challenge that [Excessive Overkill] has taken on in the video below the break.

    • HackadayAdding Perlin Noise To 3D Printed Parts, With Python

      Want to add a bit of visual flair to 3D printed parts that goes maybe a little more than skin-deep? That’s exactly what [volzo] was after, which led him to create a Python script capable of generating a chunk of Perlin noise, rendered as an STL file. What does that look like? An unpredictably-random landscape of hills and valleys.

    • Counter PunchCallers say – “Can’t Get Through” – Callees say – “Don’t Want to Let Them Through”

      Imagine the days when you’d pick up your phone, dial and get through to a human being. You couldn’t be waylaid by the evasive robotic operator who gives you the “press one, or two, or three or four” drill. Unfortunately, when you select “one” you often get another automatic recording. At some point you get a€ voicemail€ opportunity which is really€ voicefail.

      Oh, say the younger people – what about trying email or text messaging? Clutter, filters, distractions and sheer overloads can’t adequately describe the ways Callees can keep you from getting through to a human. The more difficult it is, the more people repeat their attempts, and the more overload there is for the digital gatekeepers. Call this the Callees’ power plays.

    • Hardware

      • HackadayTrippy Bicycle Uses Multiple Partial Wheels

        Bicycles need at least two wheels to be rideable, but [The Q] realized you don’t necessarily need the wheels to be in one piece. As long as you have at least two points of rolling contact with the ground, you can spread the load across multiple partial wheels. He demonstrated this by splitting the rear wheel of his bike first in half and then thirds to create an absolute head turner.

      • HackadayHackaday Prize 2022: An Eastern Bloc NES Clone

        If Nintendo is known for anything outside of their characters and admittedly top-notch video games, it’s being merciless to fans when it comes to using their intellectual property. They take legal action against people just for showing non-Nintendo hardware emulating games of theirs, and have even attempted to shut down the competitive scene for games like Super Smash Bros. To get away from the prying eyes of the Nintendo legal team extreme measures need to be taken — like building your Nintendo console clone behind the Iron Curtain.

      • The Register UKWhy the end of Optane is bad news for all IT

        Intel is ending its Optane product line of persistent memory and that is more disastrous for the industry than is visible on the surface.

        The influence of ideas from the late 1960s and early 1970s is now so pervasive that almost nobody can imagine anything else, and the best ideas from the following generation are mostly forgotten.

        Optane presented a radical, transformative technology but because of this legacy view, this technical debt, few in the industry realized just how radical Optane was. And so it bombed.

        To get to the heart of this, let's step back for a long moment and ask, what is the primary function of a computer file?

        The first computers didn't have file systems. The giant machines of the 1940s and 1950s, built from tens of thousands of thermionic valves, only had a few words of memory. At first, programs were entered by physically wiring them into the computer by hand: only the data was in memory. The program ran, and printed out some results.

    • Health/Nutrition/Agriculture

      • Common DreamsOpinion | Commission's Report Shows Medicare for All Is Logical Next Step for California

        For years, the private insurance company lobby has falsely claimed that California can’t afford quality and universal healthcare. But a comprehensive new study shows we simply can’t afford not to adopt a universal healthcare system that will save California families and businesses over $100 billion per year.

      • Common DreamsOpinion | We Are Not 'In This Together': The Biden Adminstration's Covid-19 Policy Is Still Killing Vulnerable People

        I have multiple sclerosis, a disease in which the immune system attacks the central nervous system. The myelin sheath that surrounds the nerve endings hardens during these attacks, preventing nerve impulses from traveling where they should. These hardened nerve endings, or lesions, accumulate on the brains and spinal cords of people with MS. Because the central nervous system regulates the other bodily systems, MS lesions can cause an endless list of debilitating symptoms including fatigue, numbness, spasticity, pain, incontinence, blindness, cognitive dysfunction, paralysis, difficulty swallowing and breathing, and death. MS is unpredictable, progressive, and there is no cure. Frankly, it's terrifying.

      • Telex (Hungary)Mission: Impossible — Define goulash
    • Pseudo-Open Source

      • Openwashing

        • The Register UKUS DoD funds Google and SkyWater to enable open-source chips ● The Register

          Google has linked up with chip fabrication company, SkyWater Technology, on an open source chip technology program with funding from the US Department of Defense (DoD) to build a reliable source of components for defense applications.

          SkyWater announced it has received $15 million in funding from the DoD to develop open source design capabilities for its 90nm production process. To enable this, the company has turned to Google to provide the compute resources and other expertise to realize the project.

          It seems the pair have some history in this respect, with Google working with US-investor-owned SkyWater in 2020 to enable open source design of custom ASICs to be manufactured on its 130nm mixed-signal CMOS process.

    • Linux Events and Linux Foundation

      • Buildroot Summer 2022 Hackathon - Bootlin's blog

        Buildroot is an easy-to-use and popular embedded Linux build system, used by many as an alternative to Yocto/OpenEmbedded. Bootlin has expertise in both build systems, but as in particular been a long time contributor to the Buildroot project. Bootlin CEO’s Thomas Petazzoni is one of the co-maintainers of the project, to which he has contributed over 5000 patches.

        From July 23 to July 27, four members of the Buildroot community gathered in the sunny south of France for a 5-day long hackathon on Buildroot: Yann Morin, Romain Naour from Smile, Arnout Vandecappelle from Mind and Thomas Petazzoni from Bootlin.

        The main goal of this hackathon was to reduce the backlog of patches accumulated in the project’s patchwork, the tool used in the Buildroot community to record all contributed patches and make sure all of them are handled: reviewed, accepted, or potentially rejected.

      • LWNThe 2022 Linux Plumbers Conference schedule is out [LWN.net]

        The 2022 Linux Plumbers Conference (LPC) has announced its schedule. The conference will be held in Dublin, Ireland, September 12-14.

      • Business WireKIOXIA Introduces Sample PCIe NVMe Technology-Based Flash Hardware for the Linux Foundation's Software-Enabled Flash Community Project
    • Security

      • LWNSecurity updates for Monday [LWN.net]

        Security updates have been issued by Debian (booth, libpgjava, and thunderbird), Fedora (3mux, act, age, antlr4-project, apache-cloudstack-cloudmonkey, apptainer, aquatone, aron, asnip, assetfinder, astral, bettercap, buildah, butane, caddy, cadvisor, cheat, chisel, clash, clipman, commit-stream, containerd, cri-o, darkman, deepin-gir-generator, direnv, dnscrypt-proxy, dnsx, docker-distribution, doctl, douceur, duf, ffuf, fzf, geoipupdate, git-lfs, git-octopus, git-time-metric, glide, gmailctl, gnutls, go-bindata, goaltdns, gobuster, godep, godoctor, godotenv, gojq, golist, goloris, gomtree, google-guest-agent, gotags, gotun, grafana, gron, grpcurl, hakrevdns, hcloud, htmltest, httprobe, hulk, ignition, jid, kata-containers, kiln, kompose, kubernetes, libldb, manifest-tool, mass3, meg, meshbird, micro, mingw-harfbuzz, mingw-poppler, moby-engine, mqttcli, nats-server, nebula, netscanner, oci-seccomp-bpf-hook, ohmybackup, onionscan, open-policy-agent, origin, osbuild-composer, podman-tui, popub, powerline-go, reposurgeon, restic, runc, samba, shellz, shhgit, skopeo, snapd, snowcrash, source-to-image, subfinder, syncthing, sysutil, terrier, thunderbird, tiedot, toolbox, vgrep, vultr, vultr-cli, webanalyze, webkit2gtk3, weldr-client, wgctrl, xe-guest-utilities-latest, xen, xq, yggdrasil, yubihsm-connector, and a vast number of golang packages), Mageia (chromium-browser-stable, firefox, gdk-pixbuf2.0, python-ujson, and webmin), Red Hat (firefox and thunderbird), Slackware (gnutls), and SUSE (chromium, firefox, mozilla-nss, rubygem-tzinfo, samba, and xen).

      • UEFI – Terra Firma for Attackers

        In today’s computing environment, firmware can mean several things, ranging from an entire operating system in embedded devices to a small flash program in a hardware component that tells your operating system (OS) about that hardware’s capabilities. In this blog post, we will focus on the vulnerabilities in the latter type of firmware popularized by the Uniform Extensible Firmware Interface (UEFI). I will explore how these vulnerabilities are a lucrative target for high-profile attackers, such as nation-states that are seeking vulnerabilities in the less-visible portions of today’s computing environment.

        First, to get our footing, it is important to understand what UEFI really is. UEFI replaces the legacy Basic Input/Output System (BIOS), interfacing hardware to the OS and provides an extensible intersection between hardware and the OS itself. The UEFI standard also identifies reliable ways to update this firmware from the OS. In essence, in today’s computers, there is another layer of software that can help the OS understand and use available hardware. Of course, this essential layer of software faces all the challenges of today’s software: bugs, security issues, patching, and maintenance. It also lacks visibility, making it hard for defenders to protect this part of their computing environments from ever-increasing threats.

      • UbuntuIs Linux secure? | Ubuntu

        Meet Pal. Pal is a senior developer working at PalBank. For the next 6 months, Pal will be responsible for leading the development of the bank’s web application client, which will be used daily by millions of customers.

        Pal invests considerable effort into designing and implementing the most secure app reasonably achievable: tightly controlled and secure development, build and deployment pipelines, static code analysis, pentesting by external parties, multi-factor authentication to access the app and encrypting data at rest. And the list goes on!

        Pal’s the best, isn’t he? Unfortunately, while such efforts are essential, they are insufficient! And even if we assumed, for the sake of argument and humour, that the PalBank’s client web app is completely free of all known and unknown software vulnerabilities, the app’s security guarantees are bound to be threatened once consumers run it on their endpoint devices. They will be threatened by the millions of lines of code which comprise the platform’s privileged system software, if it becomes either malicious or compromised. Within this context, system software includes the operating system, virtual machine manager and all the platforms’ firmware embedded within.

        To put it differently, it matters little if a user chooses a perfectly strong unique password, when their operating system is infected with a keylogger leaking it to malicious third-parties. Similarly, it matters little if your code has no buffer overflows, if your operating system is backdoored and simply decides to leak all your customers’ data to malicious third parties.

        So why does the security of user-level applications depend on the security of its underlying system software? The reason is the hierarchical architecture of commodity devices: privileged system software gets unrestricted access to all the resources of unprivileged user-level applications, because it controls its execution, memory, and access to the underlying hardware. Indeed, it’s a feature, not a bug!

      • LinuxSecurityBest Practices for PHP Security

        Following these best practices will help you secure your PHP applications and protect them from attack. Remember to always keep your software up to date, properly configure your web server and your PHP, and be sure to perform regular security audits to identify any vulnerabilities that may have slipped through the cracks. We hope you found this article useful and we hope you check out our other articles that may help in keeping your systems secure!

      • Privacy/Surveillance

        • Amazon finally admits giving cops Ring doorbell data without user consent | Ars Technica

          More than 10 million people rely on Ring video doorbells to monitor what's happening directly outside the front doors of their homes. The popularity of the technology has raised a question that concerns privacy advocates: Should police have access to Ring video doorbell recordings without first gaining user consent?

        • Bruce SchneierRing Gives Videos to Police without a Warrant or User Consent

          Amazon has revealed that it gives police videos from its Ring doorbells without a warrant and without user consent.

        • Counter PunchThe Genetic Panopticon

          Whatever skeletons may be lurking on your family tree or in your closet, whatever crimes you may have committed, whatever associations you may have with those on the government’s most wanted lists: the police state is determined to ferret them out.

          In an age of overcriminalization, round-the-clock surveillance, and a police state eager to flex its muscles in a show of power, we are all guilty of some transgression or other.

        • HackadayRe-Creating The Unique Look Of Unobtainable Aerochrome Film

          Ever heard of Aerochrome? It’s a unique type of color infrared film, originally created for the US military and designed for surveillance planes. Photos taken with Aerochrome film show trees and other vegetation in vivid reds and pinks, creating images that aren’t quite like anything else.

    • Defence/Aggression

      • Common DreamsSanders Says GOP Shouldn't Have Funded Wars If It Didn't Want to Take Care of Vets

        Calling out Sen. Pat Toomey by name, Sen. Bernie Sanders on Sunday said Republicans blocking a bill aimed at providing care to veterans exposed to toxic chemicals overseas should not have voted to fund the wars that created the health nightmare for millions of people.

        "I say to Senator Toomey, if you don't believe we can afford to take care of our veterans suffering from toxic burn pit exposure, then you should not have approved funding to go to war," said Sanders (I-Vt.), who voted to authorize the U.S. war in Afghanistan but against the Iraq invasion.

      • ScheerpostWhat Are The CIA And Special Ops Doing In Ukraine?

        Katie Halper and Ben Norton discuss what exactly the CIA and Special Ops are doing on the ground in Ukraine.

      • Common DreamsOpinion | A CIA Whistleblower Reflects on the Persecution of Julian Assange

        It is difficult to talk about happenings in the world other than the continued, appalling Russian invasion of Ukraine and the recent mass shootings in Buffalo, Uvalde, Chicagoland, and elsewhere. Then, there is the Supreme Court which continues down a judicial road of eroding personal rights and towing the conservative party line. I don’t want to take attention away from those outrages. However, the shadow of one tragedy is not dispelled by the light of another.

      • PIAWhy Is July 30th National Whistleblower Day?
      • Counter PunchOkinawa (only) a War Zone?

        But of course: no one should be surprised by that.€  If the US bases and/or the Japan Self-Defense Force (JSDF) bases in Okinawa are used to launch attacks on the Chinese mainland or at Chinese ships at sea, China will have the right under international law to retaliate, transforming Okinawa into a war zone.

        “War zone” doesn’t simply mean, a place where war is going on.€  It means a place where war is legal.€  By this I don’t mean, “ought to be legal”, I mean “legal in fact”.€  Think: if somebody exploded a bomb inside a building full of people in Okinawa today that would be understood as a horrendous crime, and people would be arrested.€  But if Okinawa becomes a war zone,€  and a missile lands on a building full of people, someone might say “Oops, sorry”, but no one will be arrested.

      • Counter PunchFive Reasons Why Nancy Pelosi Should Postpone a Trip to Taiwan

        First, US-China tensions over Taiwan are running high. Both sides are responsible for that. President Biden has done his part by consistently misstating the US commitment to Taiwan—there is no security treaty, Mr. President—and by authorizing increased military assistance to Taiwan. To the Chinese, these steps look like a US effort to erode its official policy of “One China” and move closer to China’s red line: Taiwanese independence. Meantime, China’s air force patrols are more regularly intruding in Taiwan’s air defense zone, on occasion causing Taiwan’s air force to scramble. A military incident that could spark serious fighting becomes more likely with each passing week.

        Second, Xi Jinping is expected to be given another term as party leader at a national congress this fall. A high-level trip to Taiwan by a key US political figure in advance of that party congress could be seen as a personal provocation, particularly since Xi wants to be seen as the leader who will complete China’s national unification by “recovering” Taiwan. He may feel compelled to act.

      • Common DreamsOpinion | Nancy Pelosi Taiwan Visit Could Get Us All Killed

        The arrogance of power is especially ominous and despicable when a government leader risks huge numbers of lives in order to make a provocative move on the world's geopolitical chessboard. Nancy Pelosi's plan to visit Taiwan is in that category. Thanks to her, the chances of a military confrontation between China and the United States have spiked upward.

    • Environment

    • Finance

      • ScheerpostCan Biden’s New US $600B PGII Initiative “Replace” China’s Role in Africa?

        The launch of the Partnership for Global Infrastructure and Investment (PGII) at the recent G7 summit is another example of the Biden Administration's relentless push to try to undermine the Chinese-led Belt and Road Initiative (BRI).

      • Common DreamsWith Sinema Opposing Tax Hikes for Rich, Progressives Say Carried Interest Provision Must Stay in IRA

        Sen. Kyrsten Sinema has not said yet whether she will support the Inflation Reduction Act, the $739 billion package hammered out by Sen. Joe Manchin and Senate Majority Leader Chuck Schumer and announced last Thursday, but as she reviewed the 725-page bill over the weekend, reports suggested she is likely to object to a $14 billion provision taking aim at the preferential tax rates for wealthy investors—who make up a large portion of her donor base.

        "The new reconciliation bill will lower the cost of prescription drugs. Sen. Sinema is holding it up to try to protect ultra-rich hedge fund managers so they can pay a lower tax."

      • Common DreamsOpinion | Steps Biden Should Take to Rein in Excessive CEO Pay

        Working families are getting hammered by inflation while corporate leaders and politicians are calling for belt-tightening. But there's one group of Americans that's actually profited from increasing prices.

      • Counter PunchTo Reduce Inflation, Control Corporate Profits

        With all this concern over inflation, one wonders why so little heed has been paid to another “i” word: inequality.

        For€ decades, government officials, media pundits, mainstream economists, politicians, and others were content to allow and even enable money to flow upward, enriching the already wealthy. They paid little heed to increasing inequality, beyond shrugging their shoulders and lamenting the injustice of it all.

    • AstroTurf/Lobbying/Politics

    • Censorship/Free Speech

      • NYPostMan arrested with AK-47 outside of dissident Iranian journalist’s Brooklyn home

        The plan to kidnap Alinejad in the US allegedly included hiring private investigators to conduct multiple days of surveillance during which she and members of her household were photographed and recorded on video at and around her Brooklyn home.

      • NBCMan With Loaded AK-47 Arrested Near NYC Home of Iranian Dissident: Feds

        Alinejad is a well-known Iranian writer and dissident who last year was the alleged target of a kidnapping plot by Iranian agents, the FBI said. Iran has denied wrongdoing, calling the past kidnapping allegations “baseless.”

      • Yonkers Man Arrested for Lurking with AK-47 Outside of Dissident Iranian Journalist’s NYC Home

        Last year, Federal prosecutors charged four foreign agents with attempting to kidnap Alinejad. The defendants live in Iran and were never apprehended. The plan, according to the indictment, was to lure Alinejad to another country where she would be kidnapped.

      • AccessNowThe continued blocking of Al-Manassa’s and dozens of news websites in Egypt must stop - Access Now

        The undersigned civil society organizations condemn the blocking by the Egyptian authorities of three links to access the Al-Manassa website within approximately 72 hours, starting from Thursday, 14 July. The blocking occurs as part of a series of continued restrictions on the website, which is one of the few independent news sites operating from inside Egypt. The undersigned organizations call on the authorities to lift the blocking of Al-Manassa, stop its repeated targeting, and bring to an end the censorship imposed on other news websites.

        Egyptian authorities blocked the Al-Manassa website on the evening of 14 July. First, they blocked the IP address of the hosting company responsible for the website’s domain. An alternative address was then blocked on the morning of 16 July, only three hours after it was launched. A third address was repeatedly blocked, bringing the total number of times access to the website has been blocked to 15.

      • AccessNowWarning: blocking online platforms in Kenya will spread election disinformation - Access Now

        Following a report highlighting Meta’s failure to remove hate speech from the Facebook platform, the National Cohesion and Integration Commission threatened to suspend Facebook for “contravening hate prevention guidelines.” Disinformation and hate speech around the election period is a very serious issue in Kenya, but preventing people from using major communications platforms is not a proportionate or effective way to stem it. Access Now and the #KeepItOn coalition commends the government of Kenya for once again committing not to shut down the internet and social media platforms.

        “Internet shutdowns are not a solution to preventing the spread of misinformation or disinformation,” said Felicia Anthonio, #KeepItOn Campaign Manager at Access Now. “The U.N. Office of the High Commissioner for Human Rights has underscored that blocking major communications platforms not only attacks the rights to free expression and access to information and exacerbates violence and unrest, but also contributes to the spread of disinformation and hate speech, because it instills uncertainty and doubt.”

        As the Kenya general elections draw closer, there is legitimate fear over whether major online platforms can successfully combat hate speech and disinformation. Investigators and civil society are raising the alarm about content on Twitter, Facebook, and TikTok. However, these reports should prompt additional investment and work by the platforms in question to ensure election “preparedness,”not serve as a justification to deprive Kenyans of vital pathways for communication. In Meta’s case, this should include direct communication with Kenyan civil society regarding the exploitative way in which it engages its content moderators in Africa, which directly conflicts with the company’s own human rights policy.

    • Freedom of Information / Freedom of the Press

      • Site36German Investigations dropped: Indymedia platform was not a criminal association

        The German linksunten.indymedia, founded in 2008, was banned under the Associations Act, and the entire technical infrastructure and funds of a left-wing center were confiscated. Seized storage devices apparently could not be decrypted.

      • Counter PunchPenal Assassination: The Gradual Effort to Kill Assange

        In the context of Assange, Britain has been a willing jailor from the start, guided by the good offices of Washington and none too keen in seeing this spiller of secrets released into the world.€  Bail has been repeatedly, and inexcusably, refused, despite the threats posed by COVID-19, the publisher’s own deteriorating health, and restrictions upon access, at regular intervals, to legal advice from his team.€  Just as some banks are deemed too large to fail, Assange is considered too large a target to escape.€  Let loose again, he might do what he does best: reveal government venalities in war and peace and prove the social contract a gross deception and mockery of our sensibilities.

        The UK legal system has been the ideal forum to execute the wishes of Washington.€  Each legal branch that has examined the extradition case has assiduously avoided the bigger picture: the attack on press freedom, exposing war crimes, illegal surveillance of a political asylee in an embassy compound, the breaches of privacy and legal confidentiality, the encroachments upon family life, the evidence on proposed abduction and assassination, the questionable conflicts of interest by some judicial members, the collusion of State authorities.

      • TruthOutBiden Should Grant Clemency to Drone Warfare Whistleblower Daniel Hale
    • Civil Rights/Policing

      • ScheerpostWomb Service

        "Womb Service," a new original cartoon by the inimitable Mr. Fish, looks at the future of women’s rights and sees the past.

      • TruthOutUnions Can Do Plenty to Help Defend Abortion Access
      • The DissenterRoger Waters' 'This Is Not A Drill' Show Is A Revolutionary Concert Experience

        Kevin Gosztola reviews Roger Waters' "This Is Not A Drill" show, which is touring North America from August to October. It is a revolutionary concert experience. The audience is in the round, which means they surround the stage where Roger and his band performs. Every song performed in the "This Is Not A Drill" show is packed with urgent messages that appeal to our humanity and plead with us to no longer be so comfortably numb. Two of the songs performed are featured in the video—"Déjà Vu" [19:35], which was on Roger's 2017 album "Is This The Life We Really Want?", and "Two Suns In the Sunset" [39:45], which is from Pink Floyd's 1983 album "Final Cut" and about a nuclear holocaust. Each song is about ten minutes.The performance of "Déjà Vu" is where Roger incorporated a clip from the "Collateral Murder" video released by Chelsea Manning to WikiLeaks and urged the audience to join him in demanding that WikiLeaks founder Julian Assange be freed from prison. You may also watch the full review of Roger Waters' "This Is Not A Drill" here.

      • Counter PunchWhy is “the Left” Red-Baiting Rise Up for Abortion Rights on the Eve of Fascist Destruction?

        Libelous Red Baiting and “Cult”-Charging

        Still, it’s bracing and a little bizarre in 2022 to see an anti-Communist jihad launched from “the left” (see below) against an organization that has been fighting to defend something commonly identified with mainstream liberalism: the right to an abortion.

      • TruthOutState of Alaska Recognizes 229 Tribes in Historic Bill
      • Public KnowledgePrivileged Conversations - Public Knowledge

        Public Knowledge has the pleasure of inviting you to a multifaceted program focused on training and developing the next generation of tech policy experts and public interest advocates that reflects the diversity of voices and experiences in our society.

        Please join us for our monthly Career Breakfast Series. This event is designed for students & recent graduates to learn about tech policy and public interest work, careers, and its community. This month you will have the opportunity of having a great conversation with Larry Irving.

        Larry Irving is the President of the Irving Group, a consulting firm providing strategic planning and consulting services to international telecommunications, media and technology companies, non-profit organizations, and philanthropies. Irving is also an operating partner and chief public policy, ESG, and DEI advisor to ZMC, a private equity firm.

    • Internet Policy/Net Neutrality

    • Monopolies

      • Copyrights

        • Torrent Freak"You Wouldn't Steal..." Research Shows Why Many Anti-Piracy Messages Fail

          You wouldn't steal a car, right? So why are you pirating? With this 2004 message, the movie industry hoped to turn illegal downloaders into paying customers. This campaign eventually turned into a meme and it's not the only anti-piracy advert to miss the mark. A new research paper identifies several behavioral insights that explain common mistakes made in these campaigns.

        • Torrent FreakIllegal Blocking of Copyrighted Content to Be Punished Under Russian Draft Law

          Every week copyright holders and their anti-piracy agents issue instructions for content to be removed or blocked. Most of these requests are made in good faith but malicious takedown requests are still a problem. A draft law tabled in Russia envisions financial compensation for those affected.

  • Gemini* and Gopher

    • Personal

      • SpellBinding: ABEWLVI Wordo: TREE
      • Week 29/30: Thoughts and Photos

        The amount of travel I engaged in during the month of July left me very little time to work on the chess service. As a result, I did not meet my target of having it back online by today. I have one more weekend trip coming up in the near future, but beyond that, my afternoons and evenings will now be free. My revised target date for having the chess service back online is 2022-08-15.

        One of the trips I took in July was to attend EAA's AirVenture aerospace show in Oshkosh, WI. Many key companies in the American aerospace industry had pavilions at the show, and I had the opportunity to meet several recruiters with those companies. My hope is to get a job in aerospace, an industry I'm very passionate about.

      • Why I’m not a doomer (anymore)

        I found the solution to “climate anxiety”, and today I want to share it with you.

        The key to overcoming climate anxiety is understanding that the climate apocalypse is not a looming threat that will soon be upon us. It’s here — you and I are living through it right now. People are dying in heat waves and storms who wouldn’t be dying if we had averted climate apocalypse. But we didn’t. So here we are: living through the apocalpyse.

        Look — I’m not going to sugar coat this. Things are bad, and because of the way that the climate works, things are going to get worse before they get better, no matter what. Once you pull this uncomfortable knowledge down, through your brain and into your heart, the anxiety will dissipate. You’ll probably feel sad and angry instead, at least sometimes. Cut yourself some slack because you are living through an apocalypse.

    • Technical

      • Internet/Gemini

        • smolZINE - Issue 31
        • You Can Get a Weird Domain Today

          When I set this site up I chose a logical, grown-up, and kind of boring domain name. If you're looking for logical, grown-up, and kind of boring domain names you'll find that a whole lot are taken. Either by someone with a good reason to have it or by some company that squats on it in the hopes that someone will pay them a lot for it.

          But if you're in the market for a silly, weird, and strange domain name I have a few for you that are still (as of writing this) up for grabs!

      • Programming

        • Misadventures with bash shell

          There is a Russian proverb that translates roughly as 'if you are a bad dancer, your own testicles will get in the way'. While gendered, and somewhat offensive, it describes my relationship with bash -- it feels like I get tangled up in my balls every time I use it.

          I am primarily a Common Lisp programmer, and bash makes zero sense to me.

          Bash has syntax (yuck) and it is really inconsistent - or at least, I can't figure out how or why things are done without looking up numerous examples. I don't know why I still use it - I guess every system I've used defaults to it... Why in the world does it exist?


* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.



Recent Techrights' Posts

Sven Luther, Lucy Wayland & Debian's toxic culture
Reprinted with permission from disguised.work
 
Chris Rutter, ARM Ltd IPO, Winchester College & Debian
Reprinted with permission from disguised.work
[Video] Microsoft Got Its Systems Cracked (Breached) Again, This Time by Russia, and It Uses Its Moles in the Press and So-called 'Linux' Foundation to Change the Subject
If they control the narrative (or buy the narrative), they can do anything
Links 19/04/2024: Israel Fires Back at Iran and Many Layoffs in the US
Links for the day
Russell Coker & Debian: September 11 Islamist sympathy
Reprinted with permission from disguised.work
Sven Luther, Thomas Bushnell & Debian's September 11 discussion
Reprinted with permission from disguised.work
G.A.I./Hey Hi (AI) Bubble Bursting With More Mass Layoffs
it's happening already
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, April 18, 2024
IRC logs for Thursday, April 18, 2024
Coroner's Report: Lucy Wayland & Debian Abuse Culture
Reprinted with permission from disguised.work
Links 18/04/2024: Misuse of COVID Stimulus Money, Governments Buying Your Data
Links for the day
Gemini Links 18/04/2024: GemText Pain and Web 1.0
Links for the day
Gemini Links 18/04/2024: Google Layoffs Again, ByteDance Scandals Return
Links for the day
Gemini Links 18/04/2024: Trying OpenBSD and War on Links Continues
Links for the day
IRC Proceedings: Wednesday, April 17, 2024
IRC logs for Wednesday, April 17, 2024
Over at Tux Machines...
GNU/Linux news for the past day
North America, Home of Microsoft and of Windows, is Moving to GNU/Linux
Can it top 5% by year's end?
[Meme] The Heart of Staff Rep
Rowan heartily grateful
Management-Friendly Staff Representatives at the EPO Voted Out (or Simply Did Not Run Anymore)
The good news is that they're no longer in a position of authority
Microsofters in 'Linux Foundation' Clothing Continue to Shift Security Scrutiny to 'Linux'
Pay closer attention to the latest Microsoft breach and security catastrophes
Links 17/04/2024: Free-Market Policies Wane, China Marks Economic Recovery
Links for the day
Gemini Links 17/04/2024: "Failure Is An Option", Profectus Alpha 0.5 From a Microsofter Trying to Dethrone Gemini
Links for the day
How does unpaid Debian work impact our families?
Reprinted with permission from Daniel Pocock
Microsoft's Windows Falls to All-Time Low and Layoffs Reported by Managers in the Windows Division
One manager probably broke an NDA or two when he spoke about it in social control media
When you give money to Debian, where does it go?
Reprinted with permission from Daniel Pocock
How do teams work in Debian?
Reprinted with permission from Daniel Pocock
Joint Authors & Debian Family Legitimate Interests
Reprinted with permission from Daniel Pocock
Bad faith: Debian logo and theme use authorized
Reprinted with permission from Daniel Pocock
Links 17/04/2024: TikTok Killing Youth, More Layoff Rounds
Links for the day
Jack Wallen Has Been Assigned by ZDNet to Write Fake (Sponsored) 'Reviews'
Wallen is selling out. Shilling for the corporations, not the community.
Links 17/04/2024: SAP, Kwalee, and Take-Two Layoffs
Links for the day
IRC Proceedings: Tuesday, April 16, 2024
IRC logs for Tuesday, April 16, 2024
Over at Tux Machines...
GNU/Linux news for the past day