Bonum Certa Men Certa

Links 24/08/2022: Kubernetes 1.25, Firefox 105 Beta, and Techdirt Turns 25



  • GNU/Linux

    • Desktop/Laptop

      • Its FOSSIt's Massive! InfinityBook Pro 14 is a Lightweight Linux Laptop With a HUGE 99Wh Battery Offering

        TUXEDO Computers are one of the few manufacturers that provide fine-tuned Linux experiences out of the box.

        You can expect Ubuntu/TUXEDO OS as your default options with any of their devices, but they also support more Linux distributions.

        Now, they have come up with a refreshed product lineup, i.e., InfinityBook Pro 14 (Gen 7). And, it happens to be one of their flagship offerings!

    • Server

      • Kubernetes BlogKubernetes v1.25: Combiner | Kubernetes

        Announcing the release of Kubernetes v1.25!

        This release includes a total of 40 enhancements. Fifteen of those enhancements are entering Alpha, ten are graduating to Beta, and thirteen are graduating to Stable. We also have two features being deprecated or removed.

      • Kubernetes BlogPodSecurityPolicy: The Historical Context | Kubernetes

        The PodSecurityPolicy (PSP) admission controller has been removed, as of Kubernetes v1.25. Its deprecation was announced and detailed in the blog post PodSecurityPolicy Deprecation: Past, Present, and Future, published for the Kubernetes v1.21 release.

        This article aims to provide historical context on the birth and evolution of PSP, explain why the feature never made it to stable, and show why it was removed and replaced by Pod Security admission control.

        PodSecurityPolicy, like other specialized admission control plugins, provided fine-grained permissions on specific fields concerning the pod security settings as a built-in policy API. It acknowledged that cluster administrators and cluster users are usually not the same people, and that creating workloads in the form of a Pod or any resource that will create a Pod should not equal being "root on the cluster". It could also encourage best practices by configuring more secure defaults through mutation and decoupling low-level Linux security decisions from the deployment process.

    • Applications

      • OpenSource.com7 sudo myths debunked | Opensource.com

        Whether attending conferences or reading blogs, I often hear several misconceptions about sudo. Most of these misconceptions focus on security, flexibility, and central management. In this article, I will debunk some of these myths.

        Many misconceptions likely arise because users know only the basic functionality of sudo. The sudoers file, by default, has only two rules: The root user, and members of the administrative wheel group, can do practically anything using sudo. There are barely any limits, and optional features are not enabled at all. Even this setup is better than sharing the root password, as you can usually follow who did what on your systems using the logs. However, learning some of the lesser-known old and new features gives you much more control and visibility on your systems.

        [...]

        I hope my article helped to resolve some of the myths surrounding sudo.

    • Instructionals/Technical

      • AddictiveTipsHow to Install Discord on Kali Linux

        Discord is quickly becoming one of the main ways computer users communicate. It’s easy to see why with its ease of use and multiplatform support. If you’re a Kali Linux user and need to get the latest Discord to communicate with colleges, we can help. Here’s how to install Discord on Kali Linux.

      • Linux Made SimpleHow to install 3Dash on a Chromebook - a Geometry Dash alternative

        Today we are looking at how to install 3Dash, a Geometry Dash alternative, on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • Install Dozzle Real-Time Log Viewer for Docker Containers on Ubuntu

        This tutorial will take you through how to install Dozzle real-time log viewer for docker containers on Ubuntu. Dozzle is a simple docker based application that has been created to enable you to viewer docker containers logs in real-time. Note that, Dozzle doesn’t store any logs.

      • UNIX CopHow to install Podman on Ubuntu 22.04 | Linux Mint 21

        In this post, you will learn how to install Podman on Ubuntu 22.04 and Linux Mint 21. This is the main alternative to Docker that is supported by RHEL.

      • Linux HintHow to Run Multiple Commands in the Same Cron Job

        Manually executing tasks is tiring and, in some cases, inapplicable. However, cron utility allows a user to schedule various jobs at various times. You can schedule your server to create a backup weekly or any other task you deem necessary. There is a way better way of running multiple commands in one cron job. You can schedule all the tasks in one cron job. Want to learn how to do that? Read on to find out.

      • Linux HintHow to Schedule a Cron Job to Run on the Last Day of Every Month

        The cron utility is a helpful tool for automating tasks to run for a specific date and time. For instance, you can automate a job to run every last day of the month at a given time. Automating tasks is something you can’t forego, especially as an administrator. It may be a backup that you need to create for run various scripts. To avoid forgetting to run scripts, the best option is to modify the crontab file and schedule cron jobs, which will run without your intervention.

        This guide presents how you can create a cron job, particularly one that executes on the last day of each month.

      • Linux HintRaspberry Pi Music Station with MPD

        Linux has a lot of great desktop music players like Cementine, Amarok, and Rhythm Box. MPD (Music Player Deamon) is a music player that can be controlled remotely or from the command line. MPD is not a media streamer. It is only for playback on the server’s hardware. MPD can be configured per user or system-wide. We will set this up as a stand-alone music system with MPD running as a system-wide service. A Raspberry Pi with USB-attached storage is perfect for this.

      • ID RootHow To Install GIMP on Linux Mint 21 - idroot

        In this tutorial, we will show you how to install GIMP on Linux Mint 21. For those of you who didn’t know, GIMP (GNU Image Manipulation Program) is an open-source piece of software used for image manipulation. It offers advanced tools for graphic designers, photographers, graphical illustrators as well as scientists for high-quality image manipulation. GIMP is available for the Linux, macOS, and Windows operating systems.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of a GIMP image editor on Linux Mint 21 (Vanessa).

      • OpenSource.comYour guide to DistSQL's cluster governance capability | Opensource.com

        Apache ShardingSphere 5.0.0-Beta version with DistSQL made the project even more beloved by developers and ops teams for its advantages, such as dynamic effects, no restart, and elegant syntax close to standard SQL. With upgrades to 5.0.0 and 5.1.0, the ShardingSphere community has once again added abundant syntax to DistSQL, bringing more practical features.

        In this article, the community co-authors will share the latest functions of DistSQL from the perspective of cluster governance.

      • Red HatMove from apt to dnf package management | Red Hat Developer

        A package manager makes it simple to install GNU/Linux applications on a local computer. Before package management became commonplace, installing applications was a tedious, error-prone undertaking. The ease a package manager brings to installing an application on a Linux computer has been a major factor contributing to the widespread adoption of Linux as a mainstream operating system for both business and home users.

    • WINE or Emulation

      • Its FOSSCrossOver 22.0 Gets a UI Makeover and Adds Initial DirectX 12 Support on Linux

        Looking to run Microsoft Windows software on Linux/macOS?

        CrossOver (affiliate link) is a popular paid tool for the job.

        It is not a FOSS product, but it incorporates open-source components to make things work. Furthermore, with every license you purchase, you get to support the development of WINE and Proton projects.

    • Games

    • Desktop Environments/WMs

      • Its FOSSBlackbox is an Aesthetically Pleasing Terminal for Minimalists Linux Users



        Blackbox is a terminal emulator which supports GTK4. The developer created this project so that he could use a decent-looking terminal app on Linux.

        So, don’t expect it to have ton of features. It is just a terminal emulator that utilizes GTK4 toolkit and has support for themes.

        In other words, it is more about the looks than the features.

      • K Desktop Environment/KDE SC/Qt

        • Norbert PreiningKDE/Plasma for Debian – Update 2022/8

          I have packaged KDE Gears 22.08 as well as the latest frameworks, and Plasma got a point release. The status is as follows (all for Debian/stable, testing, unstable...

          I repeat (and update) instructions for all here, updated to use deb822 format (thanks to various comments on the blog here)...

      • GNOME Desktop/GTK

        • Sriram Ramkrishna: GUADEC 2022 – GUADALAJARA

          Last month, I was fortunate enough to be able to attend GUADEC in Guadalajara. It was thrilling to see everyone in person after a two-year absence. Even better, after many attempts we finally were able to have GUADEC in Mexico!!

          For those who don’t know, the genesis of all that came from these chain of events 2016. At the time, I was working at Intel, and one of the kernel developers at Guadalajara, who just happened to be the keynote speaker at GUADEC, connected me to Manuel Haro – he had a conference called CISOL that he was running and needed a keynote speaker.

          It so happened that Neil McGovern had recently became the Executive Director of GNOME just a few weeks ago. I told Manuel that Neil would be the better option but he ended up wanting both of us to speak. So we both ended up in Zacatecas, MX. Incidentally, that was when I first met Neil and this sparked the beginning of a beautiful friendship!! So, really it seems quite fitting that his GNOME adventure began and ended in Mexico!!!

          The conference itself was great, I enjoyed a number of the talks especially the ones by Endless folks. I missed some that I’m grateful to be able to go back and watch.

        • Post Collapse Computing Part 1: The Crisis is Here – Space and Meaning

          The climate crisis is no longer a thing future generations will one day have to deal with, like we were told as kids. It’s here, affecting all of us today, including in the global north. Some of the people travelling to this year’s Berlin Mini GUADEC were delayed by the massive heatwave, because train tracks on the way could not handle the heat.

          There are already a number of unavoidable horrible consequences on the horizon. These include areas around the equator where the combination of temperature and humidity is deadly for humans for parts of the year, crop failures causing ever larger famines, conflicts around resources such as water, and general infrastructure breakdown caused by a combination of ever more extreme weather events and decreasing capacity to deal with them.

          Second-order consequences will include billions of people having to flee to less affected areas, which in turn will have almost unimaginable political consequences – If 5 million refugees from the Syrian civil war caused a Europe-wide resurgence in proto-fascist parties, what will 100 million or more do?

          And that’s not the worst of it.

  • Distributions and Operating Systems

    • eSecurity PlanetBest Open-Source Distributions for Pentesting and Forensics | eSecurityPlanet

      Linux has an extensive range of open-source distributions that pentesters, ethical hackers and network defenders can use in their work, whether for pentesting, digital forensics or other cybersecurity uses.

      Also known as “distros,” these distributions are variations of Linux that include the Linux kernel and usually a specific package manager.

      For example, Kali Linux, one of the most popular pentesting OSs, is Debian-based, which means it’s based on the Debian Project. Ubuntu, a famous Linux distro you may already know, is also Debian-derived.

      Here are eight of the best Linux distros for cybersecurity use cases, for beginners through advanced users, along with some issues to consider as you select a Linux security distro.

      [...]

      If you’re an absolute beginner, I would not recommend using a pentesting distro. Most pentesting distros have two major drawbacks: they can be overwhelming, and they require advanced knowledge.

    • Canonical/Ubuntu Family

      • UbuntuCanonical on MWC Las Vegas 2022 | Ubuntu

        You can meet with the Canonical telecom team virtually or on-site in US and pick our technical experts’ brains about your particular telco use case. Telecommunications is a key area of Canonical’s focus, and we are fully committed to providing a best-in-class experience of using open source software to enable mobile operators, network function developers and network equipment providers to scale and innovate efficiently.

    • Open Hardware/Modding

      • CNX SoftwareWiCAN ESP32-C3 CAN Bus platform is available in USB-CAN and OBD-II form factors (Crowdfunding) - CNX Software

        WiCAN is an ESP32-C3 CAN bus adapter that works over USB, Wi-Fi, and Bluetooth LE, and designed for car hacking and general CAN bus development.

        The device is available in USB-CAN and OBD-II form factors and comes with firmware that works with RealDash to create nice-looking dashboards with the data.

      • ArduinoNew display technology features magnetic pixels | Arduino Blog

        Display technology, from cathode-ray tubes to LCD screens, exists to convey information to humans visually and it does that very well. But the lack of physical presence makes visual displays useless for almost everything else. The blind can’t feel pixels and computers need resource-intensive algorithms to make sense of the images we feed them. That’s why engineers from MIT CSAIL and the University of Calgary have developed a new type of display technology that relies on magnetic pixels called “mixels.”

        In this context, “mixels” are individual elements that form a magnetic picture. A SnapMaker CNC machine modified with an Arduino Nano-controlled electromagnetic head can set each mixel to a magnetic north polarity, south polarity, or demagnetized state. A Hall effect sensor on the head lets the Arduino detect the polarity of each mixel so it can scan the image. Like a raster image made up of traditional visual pixels, these mixel images can be complex. A mixel image could, for instance, represent a QR code in order to store data. Each mixel is a single bit that is readable with a low-cost Hall effect sensor.

      • ArduinoAn Arduino controls this strange two-wheel steering e-bike | Arduino Blog

        James Bruton loves to experiment with unusual vehicle drive systems and configurations to find out how they perform under the dynamic conditions of real-world use. Internal combustion engines and driveshafts don’t tend to fit in those vehicles, so Bruton often utilizes electric motors. He usually turns to Arduino to control the motors and read the sensors in his contraptions. That remains true for his newest project: a strange two-wheel steering e-bike.

        Imagine a bicycle, but with a rear wheel that also steers, and you’ve got a pretty good idea of the concept. But it would be really hard to steer both wheels at the same time, so Bruton came up with a unique control scheme. The front wheel has free steering, like a typical bicycle. The back wheel has active motor-driven steering. An encoder monitors the angle of the front steering so the back steering can rotate in response. There are three modes: one that locks the rear wheel to mimic a standard bike, one that matches the rear steering to the front, and one that mirrors the rear steering relative to the front.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • Web Browsers

      • Mozilla

        • 9to5LinuxFirefox 105 Beta Brings Memory Fixes, Two-Finger Swipe Back/Forward Gesture on Linux

          Yes, that’s right, Firefox 105 is now ready for public beta testing, and guess what? It brings back the long-anticipated two-finger swipe horizontal gesture on Linux for navigating back and forward on a website without having to hold down the Alt key.

          While this feature was delayed over and over, and we really hoped that it would land in Firefox 104, it does appear to finally be ready for the masses with the next Firefox release, Firefox 105. It looks like the feature is working very well and there are no blocker bugs this time, so fingers crossed.

    • SaaS/Back End/Databases

    • Education

    • Programming/Development

      • Mike Blumenkrantz: Continuous

        As of this moment, Mesa is now using the Mold linker in CI for faster build times.

        If you haven’t tried Mold yet, you’re just pointlessly wasting your own time.

      • Python

        • Linux HintInheritance in Python

          When we create new classes, we can inherit methods and attributes from previously developed classes. These attributes are found in data structures that have been specified, as well as in the procedures that may be used to accomplish different functions. As the codebase becomes more modular, this encourages code reuse, which is regarded as one of the most significant industrial coding techniques. Newer classes in Python can inherit older classes. Without altering the older or previous class’s syntax, the new class or classes replicate all of its properties and functions into themselves. The term “base class” refers to the original classes and “derived classes” refers to the new classes.

          The term “inheritance” is frequently used to refer to the passing of some essential functions from one generation to the next. Like parent classes, there are child and base classes. We create classes through inheritance by deriving them from other pre-existing classes. The parent/base classes, by which the child classes acquire their methods and attributes, are the already existent classes.

        • Linux HintTkinter Listbox

          The default GUI toolkit for Python is called Tkinter. The combination of Python with Tkinter makes it quick and simple to develop the GUI apps. An effective object-oriented gateway for the Tk GUI toolkit is provided by Tkinter. It’s simple to build a Gui interface employing the Tkinter. Within this guide, we will show you the use of the Tkinter library to create a Tkinter GUI and add a Listbox widget to it.

          Getting started with the Ubuntu 20.04 system, we update our system using some commands in the terminal shell. We launch the terminal application with the Ctrl+Alt+T and add the apt “update” instruction on it. The execution requires the password of the logged-in user and it updates the whole system after the addition of a password.

        • Linux HintTkinter ComboBox

          The ttk package, a unique modification of Python Tkinter, introduces this additional component. The Python Tkinter ComboBox exhibits each choice from a drop-down menu 1 at a moment. It has a contemporary appearance, making it suitable for locations where exposure is crucial. The gadget Entry is a class ability of the Python ComboBox. As a result, it adds some additional choices and functions while also inheriting several from the Entry class.

          A crucial widget that may be seen in several programs is the ComboBox. The user is given a list of alternatives to choose from. It has several values, and only ever displays one at a moment. Today’s tutorial will cover how to use the ComboBox in Linux using Tkinter.

        • Linux HintTkinter CheckBox

          To create applications using Graphical User Interfaces (GUIs), Python offers a variety of libraries. The industry-standard GUI package, Tkinter, offers a quick and simple approach to developing GUI programs. This GUI toolkit for TCL (Tool Command Language) is unique. The simplicity of Tkinter is one of its greatest advantages. It comes with a large range of necessary widgets practically to everyday operations.

          The Checkbutton widget is employed to present a user with a range of substitutes as toggle switches. By hitting the button beside each choice, the viewer can then choose one or more of them. Within this article, we will take a look at the Python’s Tkinter library to create the checkboxes in a graphical user interface. Getting started with this article, we have to make sure that the “Tkinter” utility of Python is already configured at our end. If not, try the following instruction in the console application query area.

      • C++

        • Linux HintC++ std::mutex/

          By using the Mutex keyword, we may lock our variable from being accessed by several threads at once. Mutex is utilized to provide synchronization in C++, meaning only one thread can receive the object at once. Threads cannot access the locked piece of code once the lock has been established. The code has been locked using mutexes. So, even if thread 2 is scheduled while thread 1 is still consuming the shared resource, thread 2 will not be able to access that part of the code. As a result, synchronized access to shared resources in the code is ensured.

        • Linux HintC++ ofstream Functions

          Data is stored locally on computers through file handling. We may insert the content in secondary memory by managing files.

        • Linux HintC++ Pair Functions

          In this guide, we’ll examine pair containers in C++ and their applications. In C++ Programming language, a pair container works similarly to a tuple. However, a pair could only contain two elements, whereas a tuple can contain many elements. The two components could have multiple data types or similar data types like a tuple. Pair is a container that is given by the <utility> module and is declared in C++ Programming language by utilizing the term ‘pair’. So, in essence, a pair is utilized to combine two components or integers within one. This enables the storage of heterogeneous elements or multiple data kinds as a single entity.

        • Linux HintC++ std::thread Functions

          A process’s single sequence stream can be termed a thread. Threads are frequently referred to as “lightweight processes” since they have some characteristics with processes. A class is to represent distinct execution threads. A single thread of execution is represented by the class thread. Multiple functions can run at once because of threads. When a thread object is created, it instantly starts to execute (subject to any OS scheduling delays) starting at the highest function specified as a function constructor. The method’s defined value is disregarded and std::terminate is invoked if it exits by raising an error.

        • Linux HintC++ New Operator

          We will cover how to efficiently manage allocation in C++ utilizing the ‘new’ function through the use of practical examples.

          In C++, the term “dynamic memory deployment” refers to the manual allotment of storage by a programmer. Heap is where distributed shared memory is deployed, while Stack is where non-static and local variables acquire memory resources.

        • Linux HintC++ istream Functions

          The term “stream” in C++ describes the flow of characters between the program thread and i/o. C++ stream classes are needed to input and output actions on IO devices and files. These classes are designed to manage the program’s input and output and they have particular functionality.

      • Java

        • Linux HintHow to Check if a Character is a Number in Java

          Java comprises a class named Character, which belongs to java.lang package. The object of the Character class contains a single field “char” that is a primitive datatype in Java. A Java char has a 16-bit size, with a range of 0 to 65,536 characters. The data type char belongs to the characters group, a character set representing symbols such as alphabets and numerals.

          This guide will discuss the method of checking if the specified character is a number or not.

        • Linux HintDifferent Ways to Call a Method in Java

          In Java, a method is a combination of logical statements utilized to perform specific operations. Methods are commonly used because their added code can be reused as often as needed. Each method in Java is called using its name, and when the Java compiler reads it, the mentioned method is invoked, and the added operational code gets executed.

          This tutorial will illustrate different ways of calling methods in a Java program.

      • TeX

        • Linux HintHow To Create A Bold Text in LaTeX

          Bolding a text helps highlight specific content for readers. The bold option makes a text thicker than others to emphasize it. In any article, research paper, technical and non-technical document, you can use bold text to draw attention to the relevant information.

          Using bold text in a document is good, but LaTeX doesn’t offer a simple way to bold a text since it requires the correct source code. Read this guide if you are interested in learning how to create bold text in LaTeX.

        • Linux HintHow To Use the Perpendicular Symbol in LaTeX

          The ⊥ symbol indicates two perpendicular lines. Suppose m and n are two traces dividing by 90, then perpendicular to each other and represented as m ⊥ n. In the concept of perpendicular, a point of intersection of both lines is called the foot of the vertical.

          You can use the perpendicular symbol in the document processor like LaTeX. However, it requires a correct source code. So, in this tutorial, we will explain different source codes you can use to use perpendicular symbols in LaTeX.

        • Linux HintHow To Use Prime Symbols in LaTeX

          A prime symbol (‘) denotes a specific operation at a particular variable. This symbol is used as a standard quotation mark to indicate a specific value as well. In Mathematics, a prime symbol represents feet or arc minutes. Similarly, the double prime symbol (“) shows the inches and arcsecs.

          Prime symbols are also used to describe the derivative of a function f(x). So, these symbols have an essential role in Mathematics. That’s why LaTeX also offers a way to use prime symbols. If you also want to learn how to write and use a prime symbol in LaTeX, read this tutorial for more information and examples.

        • Linux HintHow To Use Landscape Page in LaTeX

          A landscape mode on any document processor is essential in efficiently representing large images, tables, and texts. Portrait mode has a few limitations, such as being unable to fit wide photos. Technical documents like research papers require large tables and diagrams to provide in-depth information. That’s why document processors, like LaTeX, provide methods to turn your pages from portrait to landscape.

          Read this tutorial if you are also interested in learning how to use a landscape page in LaTeX. This tutorial will explain creating and using a landscape page in LaTeX.

        • Linux HintHow To Use a Sigma Symbol in LaTeX

            In Algebra, the sigma symbol (Σ) indicates the summation operator. The symbol, Σ, offers the simplest form of writing the sum of components in a series. In mathematics, the sigma symbol is used to indicate a sum. The simple (Σ) and double (ΣΣ) are two sigma symbols you can use in Algebra.

          The simple sigma symbol is used to express a sum of multiple values, while the double sigma symbol is used as the double sum in a specific situation. Hence, it is essential to write the sigma symbol when you are writing a research paper or a document. This tutorial will demonstrate how to write and use sigma symbols in LaTeX.

        • Linux HintHow To Use a Congruent Symbol LaTeX

          The congruent symbol in mathematics is used to show similarities between triangles. The symbol (≅) is a combination of the equal (=) and tilde (~) symbols. A congruent symbol is one of geometry’s most commonly used symbols, representing the relation between the triangles.

          This symbol may look simple, but many users occasionally become confused while writing it to the document processor. You may already know LaTeX (document processor) requires source code to create a congruent symbol. So, in this tutorial, we will explain a simple way to write and use a congruent symbol in LaTeX.

        • Linux HintHow To Create an Italic Text in LaTeX

          In articles, italic text is mainly used to emphasize a particular segment to draw a reader’s attention. Text editors, like MS Word and Google Docs, provide the simplest way to italicize text. You only have to press CTRL and I to italicize a text. However, the document processor doesn’t contain the same way as it requires a proper source code formation.

          That’s why many users don’t know how to italicize a text in a document processor like LaTeX. If you also face the same issue, then please read this tutorial. This tutorial teaches you how to write italic text in LaTeX.

  • Leftovers

    • Techdirt25 Years Ago Today… Techdirt Got Started!

      On August 23rd, 1997, I sent out this emailed newsletter — which was then called Up-To-Date — to various business school colleagues. That was exactly 25 years ago, and that began dragging me down the path of what became Techdirt early the following year (when I realized it might be nice to have a website to post the copies of the newsletter on, rather than just sending them out over email).

    • Education

      • ScheerpostShould We Let Scam-Artists ‘Educate’ Our Young People?
      • The VergeUniversity can’t scan students’ rooms during remote tests, judge rules

        Ogletree sued the university on the grounds that the practice violated his rights under the Fourth Amendment, which protects US citizens against “unreasonable searches and seizures”. The university, in defense, argues that “room scans are ‘standard industry wide practice’”, and that “students frequently acquiesce in their use.”

        Federal Judge J. Philip Calabrese sided with Ogletree yesterday, determining that the university’s room scan did constitute an unreasonable search. “Mr. Ogletree’s subjective expectation of privacy at issue is one that society views as reasonable and that lies at the core of the Fourth Amendment’s protections against governmental intrusion,” Calabrese wrote in the decision.

    • Health/Nutrition/Agriculture

      • Eesti RahvusringhäälingRegulatory amendment to allow farmers to grow higher THC cannabis crops

        The Ministry of Social Affairs is drawing up a regulatory amendment that will allow for varieties of Cannabis sativa with a higher tetrahydrocannabinol (THC) content to be grown in Estonia. The change will significantly increase the number of varieties hemp farmers can choose from to grow.

    • Proprietary

      • The VergeHere’s how much Apple charges for every part to fix your own MacBook

        Yesterday, Apple revealed it would expand its Self Service Repair program to let you fix your own MacBooks, and today the program is here. You can now download full repair manuals for your 2021 14-inch and 16-inch MacBook Pros and the 2020 13-inch M1 MacBook Pro and M1 MacBook Air — and shop for parts you might need.

    • Security

      • Privacy/Surveillance

        • India TimesOver 3 in 10 people wish to delete their Internet footprint amid privacy thefts

          According to a report by virtual private network (VPN) service provider NordVPN, 45 per cent respondents said there is no reason for their name to be on the internet, while 42 per cent said they feel used because companies collect their data and use it to their advantage.

          While 34 per cent of the people surveyed said they feel that someone will eventually hack their devices, 31 per cent do not trust the Internet.

    • Defence/Aggression

      • ScheerpostWhose Rules? Our Rules! in the Rules-Based International Order

        How the US leads by helping other people kill each other.

      • The EconomistThe head of GCHQ says Vladimir Putin is losing the information war in Ukraine

        Six months after Russia’s invasion, it is becoming clear how differing physical and virtual approaches have shaped the conflict. Just as with its land invasion, Russia’s initial online plans appear to have fallen short. The country’s use of offensive cyber tools has been irresponsible and indiscriminate.

        Their information operations have proven clumsy and have been challenged by the release of intelligence. And Russian military attempts to destroy the digital infrastructure of Ukraine and to sow discord using cyber capabilities have been met with staunch, professional and effective Ukrainian cyber defence.

      • Eesti RahvusringhäälingSanna Marin: The Baltics should have been heeded over Russia

        Finnish Prime Minister Sanna Marin said on Tuesday that Finland should have listened more to the Baltics when it came to Russia, adding that Finland's NATO accession is bound to lead to closer relations.

      • The Telegraph UKMigrant Channel crossings may have hit record number this year

        If confirmed by the Ministry of Defence (MoD) on Tuesday, it will smash the record so far this year of 696 on August 1 and could come close to the highest daily total of 1,185 who reached the UK in 33 boats in November last year.

        It would make August a record month for this year with around 6,000 migrants crossing the Channel. It raises the prospect that August could beat the all-time monthly highest total of 6,878 in November last year.

        It means that some 22,500 migrants have crossed the Channel so far this year, double the rate at the same point last year. The total did not pass 20,000 until November in 2021.

      • NPR2 men are found guilty of conspiring to kidnap Gov. Gretchen Whitmer

        "But that wasn't the defendants' ultimate goal," Kessler said. "They wanted to set off a second American civil war, a second American Revolution, something that they call the boogaloo. And they wanted to do it for a long time before they settled on Gov. Whitmer."

      • The Telegraph UKAlbanian gangs offer migrants free minibus rides to Channel crossing points

        Ads posted on TikTok by people-smugglers to take refugees to French coast are described as ‘unacceptable’

      • FAIRWSJ Sells Lithium Neocolonialism as Climate Necessity

        True to its name, the Wall Street Journal never fails to lay bare its corporate sympathies. In a recent feature headlined “The Place With the Most Lithium is Blowing the Electric-Car Revolution” (8/10/22), the Journal warps anti-neoliberal and Indigenous resistance to ecological destruction and resource plundering into pesky obstacles to green capitalist innovation.

    • Environment

      • Energy

        • Broadband BreakfastIBM Exec Touts Blockchain Technology as Economy Accelerator

          Jerry Cuomo described blockchain as an “odd duck” type of database with a few defining features, explaining that each blockchain has several administrators, that each transaction must be vetted by the administrators before being recorded to the digital “ledger,” and that transactions, once recorded to the ledger, are essentially impossible to change or delete. Cuomo also explained that each data point – or “block” – in each blockchain is heavily encrypted, which creates high levels of security and user trust.

    • Finance

    • AstroTurf/Lobbying/Politics

      • TechdirtTwitter’s Former Security Boss Drops Stunning Whistleblower Report

        Both CNN and the Washington Post are running stories today about Peiter Zatko, better known as Mudge, filing whistleblower reports on Twitter’s security practices, including a few shocking claims. Twitter is denying many of the claims and, frankly, at this point it’s difficult to tell who’s correct. However, I will note that Mudge is widely respected in security circles, and much of his initial claim to fame was about finding security vulnerabilities — and part of the reason Jack Dorsey brought him in to Twitter was this history of doing whatever necessary to fix security holes. That said, Twitter is insisting that Mudge didn’t understand how its systems worked, and is misrepresenting things. Of course, there’s also the Elon Musk aspect of this that complicates matters as well.

      • ABCWhistleblower alleges Twitter deceived regulators on security and spam, Twitter says it's a 'false narrative'

        In response, Twitter blasted Zatko, who worked at the company from November 2020 to January 2022, saying he was spreading a "false narrative about Twitter" and was fired for "ineffective leadership and poor performance." The company also said Zatko's public remarks are "riddled with inconsistencies and inaccuracies and lacks important context."

      • The VergeSecurity pros are rallying to defend the Twitter whistleblower

        Zatko first gained prominence as part of the L0pht, a Boston-based hacker collective known as an influential computer security research group in the 1990s. Notably, while the L0pht released software, the group also advised on policy, even giving testimony before the Senate on internet security in 1998. In his earlier hacking days, Zatko was also a member of the notorious hacker group Cult of the Dead Cow, which also counted former presidential candidate (and current Texas gubernatorial candidate) Beto O’Rourke as a member.

        As his profile grew, Zatko took on roles with Defense Advanced Research Projects Agency (DARPA) and Google’s Advanced Technologies and Projects research group. He was hired by Twitter in 2020 in the months after a major security incident that saw hackers take over some of the platform’s most-followed celebrity accounts. But he stayed only just over a year, being fired by incoming CEO Agrawal in January 2022.

      • The VergeTwitter’s former security chief says company lied about bots and safety

        Twitter has hidden negligent security practices, misled federal regulators about its safety, and failed to properly estimate the number of bots on its platform, according to testimony from the company’s former head of security, the legendary hacker-turned-cybersecurity-expert Peiter “Mudge” Zatko. The explosive allegations could have huge consequences, including federal fines and the potential unraveling of Tesla CEO Elon Musk’s bid to buy Twitter.

      • The VergeSorry, Elon, but Jack Dorsey is still Twitter’s main character

        Well, yes, Musk could have asked, but Dorsey, historically, is known for his indecision and inability to make good calls in a timely fashion. This was the heart of Elliott Management’s problems with him! It’s part of why he got fired the first time! If I’m Musk’s lawyers, I figure Dorsey’s interference is part of what caused this whole mess. And Dorsey being Dorsey — remember he loves being a cult leader and hates taking any blame whatsoever — is not going to defend the company he ran or even admit fault.

      • The VergeCongress is investigating Twitter whistleblower claims

        This morning, The Washington Post and CNN published dual reports into alarming new safety and security allegations raised against Twitter by Peiter “Mudge” Zatko, who was fired as the company’s head of security earlier this year. Zatko alleges that Twitter makes little effort to fight spam accounts and has shockingly insufficient cybersecurity defenses.

      • CNNEx-Twitter exec blows the whistle, alleging reckless and negligent cybersecurity policies

        The whistleblower, who has agreed to be publicly identified, is Peiter "Mudge" Zatko, who was previously the company's head of security, reporting directly to the CEO. Zatko further alleges that Twitter's leadership has misled its own board and government regulators about its security vulnerabilities, including some that could allegedly open the door to foreign spying or manipulation, hacking and disinformation campaigns. The whistleblower also alleges Twitter does not reliably delete users' data after they cancel their accounts, in some cases because the company has lost track of the information, and that it has misled regulators about whether it deletes the data as it is required to do. The whistleblower also says Twitter executives don't have the resources to fully understand the true number of bots on the platform, and were not motivated to. Bots have recently become central to Elon Musk's attempts to back out of a $44 billion deal to buy the company (although Twitter denies Musk's claims).

      • The Washington PostNew whistleblower allegations could factor into Twitter vs. Musk trial

        On Tuesday, The Washington Post reported that Twitter’s former head of security, Peiter Zatko, had filed a whistleblower complaint with federal regulators, including the Securities and Exchange Commission, accusing Twitter of “Lying about Bots to Elon Musk.” Zatko, a well-known figure in the security community, alleges that Twitter is not incentivized to tally the true number of bots and spammy accounts on the service, which counts 238 million daily users.

        Zatko also alleges that Twitter deceived regulators regarding its defenses against hackers, a claim that could provide support to Musk's charge that Twitter has been untruthful in its reports to shareholders.

      • AxiosWhistleblower complaint alleges Twitter deceived regulators

        Zatko alleged that he warned colleagues about out-of-date and vulnerable software on the company's servers, adding that executives withheld important data about the number of breaches and insufficient protection for user data, per the Post.

      • The Washington PostTwitter whistleblower won hacker acclaim for exposing software flaws

        But according to Zatko’s complaint, after Dorsey stepped down as CEO in November 2021, and Zatko informed members of Twitter’s board that protections for sensitive user data were weaker than they had been told, new CEO Parag Agrawal fired him.

      • The Washington PostFormer security chief claims Twitter buried ‘egregious deficiencies’

        The complaint from former head of security Peiter Zatko, a widely admired hacker known as “Mudge,” depicts Twitter as a chaotic and rudderless company beset by infighting, unable to properly protect its 238 million daily users including government agencies, heads of state and other influential public figures.

        Among the most serious accusations in the complaint, a copy of which was obtained by The Washington Post, is that Twitter violated the terms of an 11-year-old settlement with the Federal Trade Commission by falsely claiming that it had a solid security plan. Zatko’s complaint alleges he had warned colleagues that half the company’s servers were running out-of-date and vulnerable software and that executives withheld dire facts about the number of breaches and lack of protection for user data, instead presenting directors with rosy charts measuring unimportant changes.

      • Eesti RahvusringhäälingRussia justifies pact between Soviet Union and Nazi Germany on Twitter

        The Russian Foreign Ministry shared a video justifying the signing of the Molotov-Ribbentrop Pact between the Soviet Union and Nazi Germany back in 1939 to mark its anniversary. The video makes no mention of the MRP secret protocols used to divide Europe into spheres of influence.

      • YLEReuters: Russia's Rosatom seeking billions in compensation from Fennovoima

        Fennovoima has meanwhile initiated several arbitrations and other proceedings against various Rosatom entities, with claims amounting close to two billion euros.

      • Digitizing 55,000 pages of civic meetings

        The first tool is the Council Data Project. CDP is a truly incredible effort and tool, run by some fantastic people (Hi, Eva!). I’m not going to talk much about it, other than to say you should check out the Alameda and Oakland instances.

        The second tool is something I’ve been working on recently: SQL-backed full text search of city meeting minutes. You can see this working for the cities of Alameda and Oakland right now. That’s 18,746 pages of city minutes for Alameda, and 37,172 pages of city minutes for Oakland, now fully searchable by anyone.

        So let’s talk about how I did this, and how you can do this for your city, possibly with my help!

      • [Old] ReutersU.S. House speaker Pelosi discloses trades in Apple and Microsoft
      • [Old] NYPostNancy Pelosi’s husband bought up to $2.1M worth of Apple, Microsoft shares

        House Speaker Nancy Pelosi’s husband bought up to $1.5 million worth of Apple stock as well as up to $600,000 in Microsoft shares, according to recent financial disclosures submitted by the powerful Democratic lawmaker.

      • [Old] Business InsiderNancy Pelosi's husband just purchased up to $2.1 million worth of Apple and Microsoft stock options

        Paul Pelosi's stock option trades come in the midst of a roiling debate on Capitol Hill over whether lawmakers and their spouses should be allowed to trade stocks at all.

      • [Old] NasdaqNancy Pelosi Discloses Trades in Apple and Microsoft

        She also disclosed the purchase of Microsoft ($MSFT, NASDAQ) call options at a $180 strike price with an expiration date also on 6/16/2023.

      • Telex (Hungary)Gulyás: the fireworks were the last straw – an unexpected government briefing
      • Telex (Hungary)Dismissed meteorologist: I first heard about my incompetence at the government briefing

        Gyula Horváth, the Deputy Chairman of the National Meteorological Service, who was dismissed along with the Head of the Service on August 21st was on a 3-week holiday and did not even work on preparing the forecast for the fireworks. Many believe that he was sacked because the weather forecast submitted by the service for August 20th was not correct. He received no official reason for his dismissal. The deputy told Telex that he first heard about his supposed pre-existing “lack of competence” which was given as a reason for their dismissal at Tuesday’s government briefing.

      • Telex (Hungary)Hungary's top weather experts fired after wrong forecast on national holiday

        The chiefs of the National Meteorological Service have been fired after – according to the government – they made the wrong weather forecast and the fireworks planned for Statehood Day had to be postponed. A day later, the sixteen department heads of the Service issued a statement about strong political pressure.

      • The NationRon Johnson Now Admits He Was Part of the Fake-Elector Scheme

        Senator Ron Johnson says he doesn’t need to testify before the House Select Committee to Investigate the January 6th Attack on the U.S. Capitol because he was only briefly involved with plotting to overturn the results of the 2020 election.

      • Misinformation/Disinformation

        • Dallas NewsWill Southlake approve using book by grandson of slave in school bearing his name?

          Social media posts circulating this week suggested it was banned from the middle school that holds his name.

          But Brandie Egan, a district communications coordinator, said in a statement that the book had not been banned nor under reconsideration as part of the district’s challenge process.

        • ScheerpostThe Instinctive Distrust of Big Media

          Anyone in journalism who wants to regain that trust would do well to read American Dispatches and internalize the lessons that Robert Parry offers, writes Nat Parry.

    • Censorship/Free Speech

      • EFFIndonesia’s New Draft Criminal Code Restrains Political Dissent

        No Criminalization of Defamation€ 

      • QuilletteRushdie’s Moral Heroism

        Iran’s religious leaders, however, are a good deal less interested in the requirements of international diplomacy, and have been remarkably forthright in saying so to anyone who cared to listen. Khomeini’s successor, Ayatollah Ali Khamenei, has repeatedly stated that the fatwa will not—indeed, cannot—be lifted, even if Rushdie “repents and becomes the most pious Muslim on Earth.” Just three years ago, the Supreme Leader’s Twitter account was briefly locked after it posted the following tweet: [...]

      • RTLUK spies accused over arrest of Sikh blogger in India

        "Evidence has now been uncovered that the British intelligence agencies, MI5 and MI6, may have contributed to Jagtar's detention and torture by sharing intelligence with the Indian authorities," the NGOs said.

      • Techdirt‘Free Speech Absolutist’ Elon Musk Pens Column For Chinese Censorship Agency

        So, look, I’ve been pretty clear that for as much as Elon Musk refers to himself as a “free speech absolutist,” his actions suggest otherwise. He has regularly punished people for their speech, he recently embraced the EU’s highly censorial plans for social media regulation, and his filings in the Twitter case suggest that he is quite upset that the company is fighting for free speech in India. Indeed, all of the actual evidence suggests Musk is actively opposed to free speech, not supportive of it.

    • Freedom of Information / Freedom of the Press

      • The NationGuatemala’s War on Truth

        “Since I started as a journalist in 1989, I’ve denounced that we live in a narco-klepto-dictatorship that has us kidnapped and cowered,” Zamora said as he was being escorted by security forces to the tribunal building after his arrest. A couple of days later, the Guatemalan government temporarily froze elPeriódico’s bank accounts. Last week, police raided the home of elPeriódico’s director of finance, Flora Silva. She’s currently hospitalized and facing detention, Godoy said. This isn’t the first time the government has targeted elPeriódico or Zamora in retaliation for their work.

      • VOA NewsJournalist Killed in Mexico, 15th to Die So Far This Year

        2022 has been one of the deadliest ever for journalists in Mexico, which is now considered the most dangerous country for reporters outside a war zone.

      • SalonBad to worse for news biz: Gannett chain turns to union busting, layoffs, stock buybacks

        What's gotten less attention from the corporate news media is how publicly traded corporations like Amazon and Starbucks are doubling down on illegal or dubious strategies to defeat these organizing efforts, often in ways that are not in the long-term interest of workers, the nation, their brands or even their investors, but actually serve only to personally enrich the C-suite.

        Such is evidently the case with the Gannett newspaper chain, which owns more than 250 newspapers across the country including USA Today. In my home state of New Jersey, Gannett now controls a long list of the Garden State's most trusted legacy local papers: the Asbury Park Press, The Bergen Record, the Courier News, The Courier Post, the Daily Record, the Home News Tribune, the Daily Journal, the New Jersey Herald and the Burlington County Times.

    • Civil Rights/Policing

      • Rolling StoneCapitol Records Drops Its First Virtual Rapper After Just Over a Week

        The virtual rapper — who describes himself as a robot in a the afromentioned “interview” and across his TikTok and Instagram pages — is pretty human-looking, save for a golden left hand and chin plate below his glowing green pupils. Though Meka is obviously not a person in storyline nor reality, he mostly looks it — and he doesn’t immediately look Black. This racial ambiguity, tied together with songs in which Meka raps the N-word, had drawn intense ire across the [Internet].

      • The HillCapitol Records walks away from AI rapper project, offers ‘deepest apologies to the Black community’

        FN Meka, a virtual rapper powered by AI, was first created by Factory New in 2019, according to The New York Times. The virtual rapper has amassed more than 10 million followers on its TikTok profile.

      • [Old] BloombergChina’s Gen Z Is Dejected, Underemployed and Slowing the Economy

        A perfect storm of factors has propelled unemployment among 16- to 24-year-old urbanites to a record 19.3%, more than twice the comparable rate in the US. The government’s hardline coronavirus strategy has led to layoffs, while its regulatory crackdown on real estate and education companies has hit the private sector. At the same time, a record number of college and vocational school graduates—some 12 million—are entering the job market this summer. This highly educated cohort has intensified a mismatch between available roles and jobseekers’ expectations.

      • News AUSurprising origin of ‘quiet quitting’ trend sweeping through Aussie offices

        So it may shock many that the concept of “quiet quitting” is actually derived from a movement that began sweeping through China last year known as “lying flat” or tang ping.

      • Leeds bowlers set a trap for nuisance teenagers after "unprecedented" levels of theft and vandalism

        "Police arrived 30 minutes later, followed our instructions as to not have them able to run off and therefore able to be spoken to and dealt with – some being the same as on CCTV from the day before.”

      • Mirror UKPolice slam bowls club for filming kids without permission using anti-vandal CCTV

        "We literally did their job for them, instructed them how to apprehend them, yet protecting them because of their age, the law is not on our side when it comes to youths.

      • TruthOutSouth Carolina Shows Abortion Rights Activists Can Make Progress in Red States
      • TruthOutLegal Experts Scratch Their Heads at Trump’s “Very Strange” New DOJ Lawsuit
      • The NationCan Dennis Rodman Secure Brittney Griner’s Freedom?

        It sounds absurd: Dennis Rodman has plans to travel to Russia to speak with Vladimir Putin about freeing Brittney Griner from prison. The NBA Hall of Famer, as famous for his flamboyance as for his rebounding, thinks he can succeed where the Antony Blinken State Department has failed and find a way to get WNBA superstar Griner out of a Russian cell. I can’t bring myself to mock Rodman like so many in the sports world seem content to do—and not just because some news outlets have spent more time discussing Rodman’s gambit in one week than they have spent raising the name of Brittney Griner over the last eight months. My reasons for not scoffing come down to two words: “Why not?” The State Department has so far failed to free Griner, and we’ve seen celebrity diplomacy work in the past, albeit with figures more esteemed than Rodman. Even if Rodman lacks the gravitas of a Muhammad Ali, he shares Ali’s currency of fame and that, in dealing with dictators, can be priceless.

    • Monopolies

      • Copyrights

        • The VergeGeorge Lopez is the latest comedian to sue Pandora for copyright infringement

          Lopez filed suit on Tuesday, claiming that Pandora streamed two of his comedy albums, Right Now Right Now and Team Leader, without paying him royalties or obtaining the proper licenses from him. “[Pandora] decided it would infringe now to ensure it had this very valuable intellectual property on its platform to remain competitive, and deal with the consequences later,” the filing said. “Later is now.” A representative for Pandora’s parent company, SiriusXM, did not immediately respond to request for comment.

        • Torrent FreakYouTube Fires Back in Content ID Lawsuit Haunted By Fraud Allegations

          A lawsuit accusing YouTube of operating a two-tier copyright enforcement system is seen by some as a beacon of hope for smaller artists. YouTube's failure to have the case dismissed was recently publicized in entertainment media, but few outlets addressed the allegations of fraud that have dogged the case from the start. Google's latest filing offers a comprehensive reminder.

  • Gemini* and Gopher

    • Personal

      • Snow Crash by Neal Stephenson

        It can be fun to go back and revisit old cyberpunk novels. They were basically predictions of what the authors thought the era we’re living in now might be. Most of it was speculative fiction, but when Neal Stephenson came along in the early 90s with Snow Crash, one of his main goals was actually parody. The book was intended to poke quite a lot of fun at the sub-genre, as it was kind of getting driven into the ground after a decade or so of popularity. That isn’t to say he didn’t come up with any potential future technologies that our world in the here and now is exploring (the metaverse says hi). On the whole, the book was more tongue and cheek than anything else. People who are familiar with cyberpunk will get a lot more chuckles while reading Snow Crash, but even those not so clued in on the sub-genre can still enjoy it.

        The story takes place in the near future, although it could be argued that the time period is right around now, but it was a good three decades away when Stephenson was writing the book. Most countries have collapsed and corporate franchises have taken their place. It would be like some neighbourhoods being owned by Amazon, another down the road owned by McDonald’s, maybe another by Tencent, and so forth. Each franchise is considered sovereign with their own sets of laws within their borders.

      • Do what you love and love what you do

        Do what you love and love what you do and success will automatically follow. Don't work for success but for love.

    • Politics

      • Off-grid in suburbia

        Energy costs have gone absolutely off the rails in the UK. The geopolitics of it are known, of course, but that doesn't change the domestic impact.

        [...]

        The main shortage is with gas, but the UK burns a lot of gas in turbines to generate electricity, so electricity prices are affected too. This house is expected to get through ~3MWh of electricity per year, and ~9MWh of gas. From Feb-Aug, we've managed to get through around 5.5MWh combined, so it's not a bad estimate.

        [...]

        A lot of people simply don't have a choice about paying - if you're on minimum wage, rent is â…“rd of your income (optimistically) and energy is €½, you're left with â…™th - €£2,000/yr, €£166/mo - for everything else: food, transport, toiletries. Let's not forget that food price inflation is very much a thing right now as well.

      • Swedish Block Politics

        What’s good about block politics is that it fixes the mathematical problem with single-vote. You get the best of multi-party systems (you can get nuanced representation) and of two-party systems (you have the highest possible chance of avoiding the most disastrous outcomes, of voting out the worst of the fachos—assuming that the party you hate the most is in the opposite block).

        In Sweden the parties on the nominal left hate block politics and each other (and for good reason because they’ve treated each other horribly). They don’t wanna govern together, which means that a vote for them is not a reliable vote against the far right.

        Unfortunately, there’s no alternative except to vote for one of them and hope that they can sober up for three seconds and that it’ll be enough to keep the brownshirts off the throne for four more years. That’s unlikely since they’ve spent more of the campaign trail time pulling each other’s hair and breaking each other’s hearts than finding common ground.

    • Technical

      • Programming

        • Arna alkierios :: How to create gemini feed

          I've created this capsule in gemini space but I'm still not known to others. I'm not in threads and searching engines. How to spread message about my capsule? How to create acceptable feed?

        • Arna alkierios :: lqs

          The main inspiration was `tig` - super druper console app for git. I'd like to have something similar for sql.


* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.



Recent Techrights' Posts

[Video] Time to Acknowledge Debian Has a Real Problem and This Problem Needs to be Solved
it would make sense to try to resolve conflicts and issues, not exacerbate these
Daniel Pocock elected on ANZAC Day and anniversary of Easter Rising (FSFE Fellowship)
Reprinted with permission from Daniel Pocock
Ulrike Uhlig & Debian, the $200,000 woman who quit
Reprinted with permission from disguised.work
 
CISA Has a Microsoft Conflict of Interest Problem (CISA Cannot Achieve Its Goals, It Protects the Worst Culprit)
people from Microsoft "speaking for" "Open Source" and for "security"
Links 25/04/2024: South Korean Military to Ban iPhone, Armenian Remembrance Day
Links for the day
Gemini Links 25/04/2024: SFTP, VoIP, Streaming, Full-Content Web Feeds, and Gemini Thoughts
Links for the day
Audiocasts/Shows: FLOSS Weekly and mintCast
the latest pair of episodes
[Meme] Arvind Krishna's Business Machines
He is harming Red Hat in a number of ways (he doesn't understand it) and Fedora users are running out of patience (many volunteers quit years ago)
[Video] Debian's Newfound Love of Censorship Has Become a Threat to the Entire Internet
SPI/Debian might end up with rotten tomatoes in the face
Joerg (Ganneff) Jaspert, Dalbergschule Fulda & Debian Death threats
Reprinted with permission from disguised.work
Amber Heard, Junior Female Developers & Debian Embezzlement
Reprinted with permission from disguised.work
[Video] IBM's Poor Results Reinforce the Idea of Mass Layoffs on the Way (Just Like at Microsoft)
it seems likely Red Hat layoffs are in the making
IRC Proceedings: Wednesday, April 24, 2024
IRC logs for Wednesday, April 24, 2024
Over at Tux Machines...
GNU/Linux news for the past day
Links 24/04/2024: Layoffs and Shutdowns at Microsoft, Apple Sales in China Have Collapsed
Links for the day
Sexism processing travel reimbursement
Reprinted with permission from disguised.work
Girlfriends, Sex, Prostitution & Debian at DebConf22, Prizren, Kosovo
Reprinted with permission from disguised.work
Microsoft is Shutting Down Offices and Studios (Microsoft Layoffs Every Month This Year, Media Barely Mentions These)
Microsoft shutting down more offices (there have been layoffs every month this year)
Balkan women & Debian sexism, WeBoob leaks
Reprinted with permission from disguised.work
Martina Ferrari & Debian, DebConf room list: who sleeps with who?
Reprinted with permission from Daniel Pocock
Links 24/04/2024: Advances in TikTok Ban, Microsoft Lacks Security Incentives (It Profits From Breaches)
Links for the day
Gemini Links 24/04/2024: People Returning to Gemlogs, Stateless Workstations
Links for the day
Meike Reichle & Debian Dating
Reprinted with permission from disguised.work
Europe Won't be Safe From Russia Until the Last Windows PC is Turned Off (or Switched to BSDs and GNU/Linux)
Lives are at stake
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, April 23, 2024
IRC logs for Tuesday, April 23, 2024
[Meme] EPO: Breaking the Law as a Business Model
Total disregard for the EPO to sell more monopolies in Europe (to companies that are seldom European and in need of monopoly)
The EPO's Central Staff Committee (CSC) on New Ways of Working (NWoW) and “Bringing Teams Together” (BTT)
The latest publication from the Central Staff Committee (CSC)
Volunteers wanted: Unknown Suspects team
Reprinted with permission from Daniel Pocock
Debian trademark: where does the value come from?
Reprinted with permission from Daniel Pocock
Detecting suspicious transactions in the Wikimedia grants process
Reprinted with permission from Daniel Pocock
Links 23/04/2024: US Doubles Down on Patent Obviousness, North Korea Practices Nuclear Conflict
Links for the day
Stardust Nightclub Tragedy, Unlawful killing, Censorship & Debian Scapegoating
Reprinted with permission from Daniel Pocock
Gunnar Wolf & Debian Modern Slavery punishments
Reprinted with permission from Daniel Pocock
On DebConf and Debian 'Bedroom Nepotism' (Connected to Canonical, Red Hat, and Google)
Why the public must know suppressed facts (which women themselves are voicing concerns about; some men muzzle them to save face)
Several Years After Vista 11 Came Out Few People in Africa Use It, Its Relative Share Declines (People Delete It and Move to BSD/GNU/Linux?)
These trends are worth discussing
Canonical, Ubuntu & Debian DebConf19 Diversity Girls email
Reprinted with permission from disguised.work
Links 23/04/2024: Escalations Around Poland, Microsoft Shares Dumped
Links for the day
Gemini Links 23/04/2024: Offline PSP Media Player and OpenBSD on ThinkPad
Links for the day
Amaya Rodrigo Sastre, Holger Levsen & Debian DebConf6 fight
Reprinted with permission from disguised.work
DebConf8: who slept with who? Rooming list leaked
Reprinted with permission from disguised.work
Bruce Perens & Debian: swiping the Open Source trademark
Reprinted with permission from disguised.work
Ean Schuessler & Debian SPI OSI trademark disputes
Reprinted with permission from disguised.work
Windows in Sudan: From 99.15% to 2.12%
With conflict in Sudan, plus the occasional escalation/s, buying a laptop with Vista 11 isn't a high priority
Anatomy of a Cancel Mob Campaign
how they go about
[Meme] The 'Cancel Culture' and Its 'Hit List'
organisers are being contacted by the 'cancel mob'
Richard Stallman's Next Public Talk is on Friday, 17:30 in Córdoba (Spain), FSF Cannot Mention It
Any attempt to marginalise founders isn't unprecedented as a strategy
IRC Proceedings: Monday, April 22, 2024
IRC logs for Monday, April 22, 2024
Over at Tux Machines...
GNU/Linux news for the past day
Don't trust me. Trust the voters.
Reprinted with permission from Daniel Pocock
Chris Lamb & Debian demanded Ubuntu censor my blog
Reprinted with permission from disguised.work
Ean Schuessler, Branden Robinson & Debian SPI accounting crisis
Reprinted with permission from disguised.work
William Lee Irwin III, Michael Schultheiss & Debian, Oracle, Russian kernel scandal
Reprinted with permission from disguised.work