Links 10/11/2022: AlmaLinux 8.7, PipeWire 0.3.60, and PostgreSQL 15.1

Posted in News Roundup at 4:27 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • LWNA pair of new LWN site features [Ed: A vastly better approach would be to make a Gemini capsule for LWN]

      We have finally added a set of dark mode defaults to the customization options for the site for those who prefer the dark side. Thanks to all the readers who have asked for this; apologies for taking so long to do it. The defaults seem good, but we are not dark-mode users, so please let us know if you have suggestions for improvements.

    • Desktop/Laptop

      • DedoimedoGoing Linux all the way on my hybrid-card laptop

        Roughly four years ago, I started my Linux-only adventure with the Slimbook machine, for which I’ve written some fourteen individual usability reports. Things are going quite well there. Now, we’re taking it up one notch. A “gaming” rig, with Nvidia graphics and even more common desktopy stuff. From this early test, I’m quite happy, and for me to be happy about technology takes quite some effort. I feel, for the first time ever, that it might be possible, even enjoyable, for me to leave the Windows desktop behind without any great suffering or major loss of functionality. On that bubbly note, let us bid each other farewell. The testing shall continue.

    • Server

      • ZDNetWith Linode, Akamai expands into edge cloud computing development [Ed: The typical buzzwords salad: "edge cloud computing"]
      • NetcraftNovember 2022 Web Server Survey | Netcraft News [Ed: Microsoft down, Microsoft down, and Microsoft not even listed anymore (going extinct on the Web)]

        In the November 2022 survey we received responses from 1,135,089,912 sites across 271,689,143 domains and 12,306,625 web-facing computers. This reflects a gain of 4.7 million sites, a loss of 194,480 domains, and a gain of 6,685 web-facing computers.

        The biggest growth this month comes from Cloudflare, with it gaining 8.3 million sites (+8.91%) and 490,000 domains (+1.94%). Cloudflare now accounts for 8.93% of all sites seen by Netcraft, up by 0.70pp since October.

        nginx saw significant losses in its number of sites and domains this month. It lost 8.5 million sites (-2.75%) and 490,000 domains (-0.66%). However, nginx still holds its strong lead as the most widely used web server software, with a market share of 26.51% sites. Apache has the second largest number of sites, with a market share of 21.40%.

        LiteSpeed continues its strong growth — this month it gained 720,000 sites (+1.28%) and 110,000 domains (+1.32%). This brings its market share of sites from 4.97% to 5.01% (+0.04pp).

        Following its web-wide trend, Cloudflare has also seen growth in the top million sites. Since October, it gained 1,733 of the top million sites, with its market share increasing from 20.83% to 21.00% (+0.17pp). Meanwhile, both Apache and nginx have lost market share in the top million sites, with Apache down from 21.72% to 21.66% (-0.06pp) and nginx down from 21.36% to 21.21% (-0.15pp).

    • Audiocasts/Shows

    • Kernel Space

      • LWNLinux 5.4.224
        I'm announcing the release of the 5.4.224 kernel.
        All users of the 5.4 kernel series must upgrade.
        The updated 5.4.y git tree can be found at:
                git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.4.y
        and can be browsed at the normal kernel.org git web browser:
        greg k-h
      • LWNLinux 4.19.265
      • LWNLinux 4.14.299
      • LWNLinux 4.9.333
      • V3D enablement in mailine kernel | Wen.onweb

        If you enjoy using upstream Linux kernel in your Raspberry Pi system or just want to give a try in the freshest kernel graphics drivers there, the good news is that now you can compile and boot the V3D driver from the mainline in your Raspberry Pi 4. Thanks to the work of Stefan, Peter and Nicolas [1] [2], the V3D enablement reached the Linux kernel mainline. That means hacking and using new features available in the upstream V3D driver directly from the source.

        However, even for those used to compiling and installing a custom kernel in the Raspberry Pi, there are some quirks to getting the mainline v3d module available in 32-bit and 64-bit systems. I’ve quickly summarized how to compile and install upstream kernel versions (>=6.0) in this short blog post.

    • Applications

      • PipeWire 0.3.60

        This is a bugfix release that is API and ABI compatible with previous 0.3.x releases.

      • Linux Links4 Best Free and Open Source GUI Image Compression Tools – LinuxLinks

        Data compression is the process of storing data in a format that uses less space than the original representation would use. Compressing data can be very useful particularly in the field of communications as it enables devices to transmit or store data in fewer bits. Besides reducing transmission bandwidth, compression increases the amount of information that can be stored on a hard disk drive or other storage device.

        There are 2 main types of compression. Lossy compression is a data encoding method which reduces a file by discarding certain information. When the file is uncompressed, not all of the original information will be recovered. Lossy compression is typically used to compress video, audio and images, as well as internet telephony. The fact that information is lost during compression will often be unnoticeable to most users. Lossy compression techniques are used in all DVDs, Blu-ray discs, and most multimedia available on the internet.

        Images take up massive amounts of internet bandwidth because they often have large file sizes. They are the most popular resource type on the web. According to the HTTP Archive, 60% of the data transferred to fetch a web page is images composed of JPEGs, PNGs and GIFs. 45% of the images seen on sites crawled by HTTP Archive are JPEGs.

    • Instructionals/Technical

      • Make Use OfHow to Enable or Disable Automatic Login on Linux Mint

        If you want to log in to your Linux desktop automatically after boot, consider enabling the auto-login feature on Linux Mint.

        It’s certainly annoying when you leave your Mint desktop idle for a couple of minutes only to be welcomed by a login screen asking you to enter your password again. What if you’re the only one using the computer and don’t want to type your lengthy and secure password every time you want to log in?

        Luckily, Linux Mint offers an easy, graphical way to enable or disable automatic login. We’ll show you how.

      • Linux HintHow to Run Ubuntu on Top of Android
      • DebugPointHow to Install LibreOffice Base Database in Ubuntu and Other Linux

        Here’s how to install the LibreOffice Base database module in Ubuntu and other Linux distributions.

      • Linux HintManage Virtual Box Remotely With RemoteBox – Install on Ubuntu 22.04
      • LinuxStansHow to Count the Number of Files in a Directory on Linux

        In this beginner-friendly tutorial, we’re going to show you how to count files in a directory on Linux.

        For this tutorial, you’ll need access to the Terminal (open it with CTRL + ALT + T) or SSH access to a server. This tutorial will only include instructions for the CLI. If you want to count the files in a directory via the GUI (Graphical User Interface) just right-click on the directory and click on Properties. You’ll get a window with stats about that directory, including the number of files.

      • KifarunixHow to Enable and Configure Cortex Analyzers – kifarunix.com
      • Real Linux UserHow to add RSS Feeds for your favorite YouTube channels to Thunderbird Mail – Real Linux User

        If you have a busy life, you have little time to manually go through all your favorite blogs, websites, and YouTube channels every day to see if there are any updates. If you want to organize your digital life more efficiently, you can do that by automating certain processes and bringing updates to you instead of collecting them yourself. That’s why I really like the benefits that RSS Feed functionality has to offer. For my articles for RealLinuxUser.com, I often get inspired by other websites, blogs, and also YouTube channels. And I know that many of us would like to be more efficiently informed about updates from our favorite YouTube channels, without actively going through all the channels ourselves. In this article, I will therefore explain how to add RSS Feeds for your favorite YouTube channels to Thunderbird Mail. But it works exactly the same for other RSS Feed applications if you want to use a dedicated RSS app.

      • Linux HintHow to Install Rust on Ubuntu 22.04
      • Linux CapableHow to Install Microsoft Edge on Fedora 37/36/35 [Ed: Edge is a password stealer. Nobody should install it and Microsoft should be fined. But the state commits the same crimes, so it won't hold Microsoft accountable for this.]

        Microsoft Edge is a popular browser choice for those who prefer fast browsers that are based on a chromium-based engine. Unlike Chrome, it disables third-party tracking by default, the same as Firefox does. Fedora desktop users can now install Microsoft Edge as an alternative browser to Firefox. The official RPM contains a stable, beta, and development (nightly) version of the browser. Microsoft Edge is a great choice for users who value privacy and speed. With the official RPM, Fedora users can easily install and use Microsoft Edge on their desktop computers.

      • H2S MediaHow to install Telegram on Fedora Linux 37/36/35

        Tutorial to install the Telegram messaging app on Fedora Linux such as 37/36/35 to start chatting and access media from various channel groups.

        Telegram is a free messenger for smartphones like WhatsApp. Users log in with their mobile numbers and can chat with each other and share pictures, videos, documents, and files or download them very easily. In addition, video and voice calls can be made, as well as surveys, groups, and channels can be created to network with each other. Especially because of the latter function, Telegram is particularly popular.

        Well, installing applications in Windows and macOS is quite simple but when it comes to Linux users, are not much familiar with how to do that. Therefore, for those who are using Fedora Linux and want the Telegram app, then the steps given here can be used.

      • ID RootHow To Install OpenMRS on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install OpenMRS on Ubuntu 22.04 LTS. For those of you who didn’t know, OpenMRS is an enterprise electronic medical record system framework that allows the exchange of patient data with other medical information systems. It is written in Java and provides a web interface to manage electronic medical records.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the OpenMRS on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

    • WINE or Emulation

      • 9to5LinuxDXVK 2.0 Released with Major Changes and Improved Support for Many Games

        DXVK, the popular open-source Vulkan-based translation layer for Direct3D 9, 10 and 11 that allows you to run 3D apps and games designed for Windows on GNU/Linux systems through Wine, has been updated today to version 2.0, a major release that introduces important changes and improvements.

        As expected from a new DXVK update, version 2.0 also brings improvements for numerous games including Alan Wake, Alice Madness Returns, Anomaly: Warzone Earth, Beyond Good and Evil, Dragon Age Origins, Empire: Total War, Final Fantasy XV, GTA IV, Heroes Of Annihilated Empires, Limit King Of Fighters XIII, Metal Gear Solid V: Ground Zeroes, SiN Episodes: Emergence, Sonic Generations, Spider-Man: Shattered Dimensions, The Ship, Warhammer Online, and Ys Seven.

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • Make Use OfYour Own Social Network: How to Set Up a Mastodon Instance on Linux

      Sick of Twitter? Fed up with Facebook? Online abuse and NSFW content getting you down? Just want to exchange ideas away from the glare of people who oppose you?

      Mastodon is the answer. And thanks to its open-source nature, it is possible to set up your own Mastodon instance, enabling conversation on any topic and giving your users some safety and privacy from trolls of all kinds.

    • Events

      • CollaboraFully charged for electronica 2022

        Making our grand debut, Collabora will be attending electronica next week in Munich for the first time! Diving into the world of electronics alongside the leading examples of the industry, we’re excited to partake on all fronts. Taking place from November 15 to 18 at the Trade Fair Center Messe München, we’ll have a booth to showcase our demos at B4.428.

        Drop by and our engineers will be delighted to walk you through one of our three demos. Highlighting different projects from our multimedia, machine learning and core teams, you’ll gain a behind-the-scenes look at different solutions we’ve developed.

      • BootlinUpcoming Yocto Project Summit 2022.11 – One talk from Bootlin – Bootlin’s blog

        As every six months for the last two years, a new virtual edition of the Yocto Project Summit is coming, and its schedule has been announced.

    • Web Browsers/Web Servers

      • Daniel StenbergAppend data to the URL query

        curl offered the -d / –data option already in its first release back in 1998. curl 4.0. A trusted old friend.

        curl also has some companion versions of this option that work slightly differently, but they all have the common feature that they append data to the the request body. Put simply: with these options users construct the body contents to POST. Very useful and powerful. Still today one of the most commonly used curl options, for apparent reasons.


        This new friend we call –url-query makes -G rather pointless, as this is a more powerful option that does everything -G ever did and a lot more. We will of course still keep -G supported and working. Because that is how we work.

        A boring fact of life is that new versions of curl trickle out into the world rather slowly to ordinary users. Because of this, we can be certain that scripts and users all over will need to keep using -G for yet another undefined period of time.

      • Mozilla

        • ThunderbirdMozilla Thunderbird: Important Message For Microsoft Office 365 Enterprise Users [Ed: Now Microsoft tells Mozilla how to do Thunderbird

          In a coming release of the Thunderbird 102.x series, we will be making some changes to the way we handle OAuth2 authorization with Microsoft accounts, and this may involve some extra work for users currently using Microsoft-hosted accounts through their employer or educational institution.

          In order to meet Microsoft’s requirements for publisher verification, it is necessary for us to switch to a new Azure application and application ID. However, some of these accounts are configured to require administrators to approve any applications accessing email.

        • MozillaThe Mozilla Blog: Over a quarter of parents believe their children don’t know how to protect their information online – Firefox can help with that

          Parenting has never been easy. But with a generation growing up with groundbreaking technology, families are facing new challenges along with opportunities as children interact with screens everywhere they go — while learning at school, playing with friends and for on-the-go entertainment.

          We are previewing a new Mozilla Firefox survey conducted in partnership with YouGov to better understand families’ needs in the United States, Canada, France, Germany and the United Kingdom that we will release fully in January 2023. We wanted to hear parents’ thoughts around online safety, as well as their biggest concerns and questions when their kids navigate through the sticky parts of the web before getting to the good stuff.

    • SaaS/Back End/Databases

      • PostgreSQLPostgreSQL: PostgreSQL 15.1, 14.6, 13.9, 12.13, 11.18, and 10.23 Released!

        The PostgreSQL Global Development Group has released an update to all supported versions of PostgreSQL, including 15.1, 14.6, 13.9, 12.13, 11.18, and 10.23. This release fixes 25 bugs reported over the last several months.

        This is the final release of PostgreSQL 10. PostgreSQL 10 will no longer receive security and bug fixes. If you are running PostgreSQL 10 in a production environment, we suggest that you make plans to upgrade.

    • Productivity Software/LibreOffice/Calligra

    • Funding

    • Programming/Development

      • KDABUnderstanding qAsConst and std::as_const – KDAB

        Every now and then, when I submit some code for a code review, people tell me that I forgot qAsConst.

        Now I have one more enemy, namely: Clazy! It has also started saying this, and I guess it’s about time for me to figure out what is going on. When do I need qAsConst and why do I need to know these things?

      • QtQt Creator 9 RC released

        We are happy to announce the release of Qt Creator 9 RC!

      • Red Hat OfficialHow to get started programming in Go | Enable Sysadmin

        Go is an open source programming language that combines a dynamic language’s ease of use with the reliability and performance of a statically typed, compiled language.

  • Leftovers

    • Health/Nutrition/Agriculture

    • Security

      • Privacy/Surveillance

        • The Washington PostTrustCor Systems verifies web addresses, but its address is a UPS Store – The Washington Post

          Google’s Chrome, Apple’s Safari, nonprofit Firefox and others allow the company, TrustCor Systems, to act as what’s known as a root certificate authority, a powerful spot in the internet’s infrastructure that guarantees websites are not fake, guiding users to them seamlessly.
          The company’s Panamanian registration records show that it has the identical slate of officers, agents and partners as a spyware maker identified this year as an affiliate of Arizona-based Packet Forensics, which public contracting records and company documents show has sold communication interception services to U.S. government agencies for more than a decade.
          One of those TrustCor partners has the same name as a holding company managed by Raymond Saulino, who was quoted in a 2010 Wired article as a spokesman for Packet Forensics.
          Saulino also surfaced in 2021 as a contact for another company, Global Resource Systems, that caused speculation in the tech world when it briefly activated and ran more than 100 million previously dormant IP addresses assigned decades earlier to the Pentagon. The Pentagon reclaimed the digital territory months later, and it remains unclear what the brief transfer was about, but researchers said the activation of those IP addresses could have given the military access to a huge amount of internet traffic without revealing that the government was receiving it.

        • Bruce SchneierAn Untrustworthy TLS Certificate in Browsers – Schneier on Security

          Cory Doctorow does a great job explaining the context and the general security issues.

        • CoryDoctorowDelegating trust is really, really, really hard (infosec edition)

          A previous version of this thread reported that Trustcor has the same officers as Packet Forensics; they do not; they have the same officers as Measurement Systems. I regret the error.

          I’ve got trust issues. We all do. Some infosec pros go so far as to say “trust no one,” a philosophy more formally known as “Zero Trust,” that holds that certain elements of your security should never be delegated to any third party.

          The problem is, it’s trust all the way down. Say you maintain your own cryptographic keys on your own device. How do you know the software you use to store those keys is trustworthy? Well, maybe you audit the source-code and compile it yourself.

          But how do you know your compiler is trustworthy? When Unix/C co-creator Ken Thompson received the Turing Prize, he either admitted or joked that he had hidden back doors in the compiler he’d written, which was used to compile all of the other compilers….

        • The Wall Street JournalSpyware Scandals Prompt Calls for Further Bans in Europe

          Draft European Parliament report proposes halt on use of surveillance software across 27-member bloc


          A Europe-wide moratorium on surveillance software such as NSO Group’s Pegasus and similar products is needed to clamp down on abuses, according to a draft report from European Union lawmakers published Tuesday.

          The report was authored by Sophie in ‘t Veld, a Dutch member of the European Parliament, who chairs a special committee that has been investigating the use of spyware in the 27 EU countries.

          “In a democracy, putting people under surveillance should be an exception and there should be rules,” Ms. in ‘t Veld said.


          NSO Group didn’t respond to a request for comment. In a European Parliament hearing this summer, a representative from the company said that it has sold the software to at least five EU member countries.

          Last year, the Biden administration placed NSO Group on an export prohibition list, preventing it from obtaining certain technology from the U.S. and making it more difficult for the company to seek international customers. The move followed investigations from a consortium of news outlets into NSO Group’s sale of Pegasus to dozens of government and law-enforcement customers around the world for spying on journalists, politicians and human rights activists.

          Researchers have pointed to governments outside Europe that use Pegasus to extract information from phones. Citizen Lab said in January that around 35 journalists and activists in El Salvador were targeted with the spyware, The Wall Street Journal reported at the time. Israeli police have said that they use various types of spyware including one developed by NSO Group.

    • Finance

      • IBM Old TimerThe Changing Structure of Global Supply Chains

        “The golden age of globalisation, in 1990-2010, was something to behold,” wrote The Economist in a January, 2019 article. “Commerce soared as the cost of shifting goods in ships and planes fell, phone calls got cheaper, tariffs were cut and the financial system liberalised.” The very nature of the global firm was transformed during these two decades, with The Globally Integrated Enterprise destined to become the corporate model of the future, said IBM CEO Sam Palmisano in a 2006 Foreign Affairs article.

        But, then global trade started slow down. “After the go-go 1990s and 2000s the pace of economic integration stalled in the 2010s, as firms grappled with the aftershocks of a financial crisis, a populist revolt against open borders and President Donald Trump’s trade war,” wrote The Economist in its June 18, 2022 lead article. “The flow of goods and capital stagnated. Many bosses postponed big decisions on investing abroad: just-in-time gave way to wait-and-see. No one knew if globalisation faced a blip or extinction.”

    • Censorship/Free Speech

      • AccessNowHuman rights organizations tell Libyan House of Representatives to immediately repeal Anti-Cybercrime Law

        The undersigned civil society organizations demand that the Libyan House of Representatives repeal the Anti-Cybercrime Law n°5/2022 issued on September 27th, 2022. We call for the law not to be applied, as it directly undermines human rights and fundamental rights, namely freedom of expression and opinion, and the rights to peaceful assembly, privacy, and personal data protection. The law also regularizes the Executive’s comprehensive, warrantless surveillance over the digital spaces and allows them to censor websites and content.

        Following its ratification on October 26, 2021, the Libyan House of Representatives decided to bring into force the Anti-Cybercrime Law by officially publishing it on September 27, 2022. This happened without prior notice and in complete disregard of demands from civil society organizations and four UN Special Rapporteurs for the law to be withdrawn. The law in question infringes on fundamental human rights principles, as well as Libya’s international commitments, as its drafting process did not include stakeholder dialogue and engagement.

        Libya’s House of Representatives did not publicly share the law until a few days after it came into force, when it was posted on its Facebook page. Before this it was only available as a leaked draft on social media. The following statement highlights our main concerns regarding the risks of this law.

    • Civil Rights/Policing

      • AccessNowWhy we need human rights impact assessments for AI – Access Now

        Around the world, governments and tech companies alike tout artificial intelligence (AI) and forms of automated decision-making (ADM) as cheap, convenient, and fast fixes for a range of societal challenges – from moderating illegal content on social media or scanning medical images for signs of diseases, to detecting fraud and tracking down tax evaders.

        Yet at the same time, scandals over the abuse and misuse of AI systems just keep piling up. Automated content moderation systems, which are constantly presented as the silver-bullet solution to the complex problems of illegal content online, have been shown to be flawed, limited, and prone to dangerous errors. But the dangers aren’t restricted to online spaces. In the Netherlands, tax authorities implemented an algorithm to detect benefits fraud, but in doing so, falsely accused and penalised thousands of people, many of whom were minorities or from low-income backgrounds. These examples beg the question: how can we ensure that uses of AI systems respect or even extend fundamental human rights?

        Fortunately, the conversation has shifted away from vague, non-binding ethical guidelines, and various governments are proposing concrete regulations, such as the EU’s proposed AI Act, instead. There is also growing recognition of the need for other human-rights based approaches to AI governance – including the use of human rights impact assessments (HRIAs). In our new report, we explore the role of HRIAs in AI governance, and offer recommendations for how they can be used to ensure that AI systems are developed and deployed in a rights-respecting manner.

      • AccessNow#ProofOfLife: stop the abuse, free Alaa now – Access Now

        Alaa Abd El-Fattah must be set free. Amid a total local blackout on his precarious health situation, Access Now and civil society from around the globe are incredibly alarmed by the news that the British-Egyptian activist is receiving medical intervention without authorities informing his family or lawyer as he languishes through a hunger and water strike in his prison cell. It is unclear if this means Alaa is being force-fed, a medically dangerous and violent act of torture.

        “Keeping Alaa alive with the intent to cement and prolong his torture is a depraved and inhumane act of vengeance by a regime hellbent on wiping out any trace of the 2011 revolution,” said Marwa Fatafta, MENA Policy and Advocacy Mananger at Access Now. “The UK government must immediately intervene to free Alaa and end this cruelty.”

        As the Egyptian government tightens ranks, Alaa’s family, and the whole world, need proof of life now. While information on Alaa’s current situation is sparse due to authorities blocking his visitation, his sister, Mona Seif, Tweeted about an interaction with prison staff, who reportedly stated, “Medical intervention has been taken with Alaa, with the knowledge of judicial entities.” Alaa’s lawyer reported today, November 10, that he had been granted a visit, but was subsequently denied access to the prison.

    • Internet Policy/Net Neutrality

      • RoseHostingHistory of the Internet – RoseHosting

        Take a step back and imagine the world without the Internet. No social media, websites, e-commerce stores, or online chat rooms. The world would be a little blank for many of us.

        Actually, people did live before the Internet came into existence. However, its presence revolutionized the globe and rapidly created immense opportunities.

        So, who invented the Internet? When was the Internet invented? What was the very first message transmitted over the network? All these questions come to our minds at least once.

    • Monopolies

      • Microsoft “irreparably damaging” EU’s cloud ecosystem, industry group claims | Ars Technica

        CISPE has filed a complaint, urging the European Commission to open a formal investigation into how Microsoft is allegedly “irreparably damaging the European cloud ecosystem and depriving European customers of choice in their cloud deployments.”

      • Public KnowledgePublic Knowledge Cheers FTC’s New Section 5 Statement To Increase Competition – Public Knowledge

        Today, the Federal Trade Commission issued a new policy statement outlining the agency’s powers to address “unfair methods of competition” under Section 5 of the FTC Act, clearing the way for new agency action to curb anti-competitive behavior in Big Tech and across the economy.

        The announcement follows the agency’s move last year to rescind its 2015 competition policy statement that had curtailed the FTC’s ability to create competition rules and limited the kinds of enforcement actions it could bring against dominant firms that engaged in anti-competitive practices. Public Knowledge previously applauded the decision to rescind that policy statement, suggesting that a new statement would prove an important next step. Now, we have that new statement.

  • Gemini* and Gopher

    • Personal

      • Language 🇫

        People in my office are fairly international. Today I happen to be sitting between two French people.

        Suddenly behind me I hear “Superbe!”

        Then the one on the other side comes back to his desk and makes a world-weary exclamation that I don’t *think* is actual words but sounds like “Eyeore!”

      • 🔤SpellBinding: ATHOPRD Wordo: INLAY
    • Technical

      • Envy

        I play an arcade music game by Konami called “Sound Voltex”, which I first picked up in 2015. The game’s song charts feature difficulty ratings that range from 1 to 20. Though I’ve now been playing the game for seven and a half years, I still haven’t managed to beat any level-20 charts yet.

        A close friend of mine began playing Sound Voltex, which is often shortened to SDVX, about three and a half years ago. He now regularly clears some of the highest-rated charts. This has bothered me a lot in the past. I’d get frustrated at my own inability to progress, and I’d feel jealous of his skills. What bothered me more, however, was that I was one of the only SDVX players in my area back in 2015, so people often came to me when they were curious about the game or wanted to share scores and tips. Now everyone talks to him instead.

      • Programming and More

        • Re: wayland or tmux

          I know I do a lot of Emacs proselytizing on this phlog, and I’m sure
          the vanishingly small number of people who read my stuff are sick of
          it, but I read this post on uninformative.de [1] and it struck such a
          chord of familiarity that I can’t hold myself back. :)

          The post describes how the author, frustrated with the declining
          support for X11, is hunting for new ways to continue remaining in
          control of their computer. Not control in the philosophical free
          software is freedom sense (although this is obviously of paramount
          importance!) but in the very practical but somewhat orthogonal sense
          of being _easily_ able to completely customize their interaction with
          their computer that was previously afforded by the relative ease of
          writing X11 window managers.

        • Maintainer’s thoughts: Twitter (but it’s actually about Nim)

          So, this is my first gemlog item on the English variant of my capsule. I’d like to tell you how I packaged Nitter for Gentoo.


          The problem was their package manager/build system, called Nimble. It didn’t work in network-sandboxed environments, didn’t have staged installation support and there was no way to tell if build/test stage could be run without invoking these commands.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Veiled Marketing in Phoronix

Posted in Hardware, Marketing at 4:03 pm by Dr. Roy Schestowitz

Minutes ago:

Phoronix AMD spam

Look ma, mo' gifts! It costs like a car

Summary: AMD’s scheduled marketing onslaught (like Phoronix publishing 3 ‘articles’ at the same time; other “sponsored” writers do the same) is a wake-up call about Phoronix, an AMD-funded site

Phoronix comment

Microsoft is Sued for Copyright Violations (Under Guise of ‘AI’) and Microsoft-Bribed Open Source Initiative Backs the Infringer, Microsoft

Posted in Courtroom, Free/Libre Software, Law, Microsoft, OSI at 12:13 pm by Dr. Roy Schestowitz

Stefano Maffulli defected. He is paid about $150,000 per year for this defection.

Focusing on legal aspects of AI

Summary: The Open Source Initiative (OSI) is so obscenely corrupt that it literally helps Microsoft violate the GPL and makes excuses for it, as part of a Microsoft-funded series; Stefano Maffulli is nothing but a Microsoft-funded shill, occupying a leadership position in an organisation that was supposed to call out Microsoft

Update: And if that’s not bad enough, they’ve just published another page about it:

Microsoft-funded hogwash

And then updated another:

More AI BS

It’s like the priority at OSI nowadays is Microsoft cover-up, shielding it from prosecution while it is attacking Free software.

Update #2: A few hours ago they did it a fourth time (in 2 days!). Notice the date. This was 3:55 GMT on 12/11/2022.

Want more AI? Try Mastodon!

OSI, funded by Microsoft, is constantly writing about “AI” to make it seem OK that Microsoft attacks Free/Open Source software under the banner of “AI”.

Links 10/11/2022: Lots of Post-Election Policial Coverage (US)

Posted in News Roundup at 11:16 am by Dr. Roy Schestowitz

  • GNU/Linux

    • XDANestbox hands-on: Run real Linux virtual machines on your Google Pixel phone

      If you’ve ever wanted to become a smartphone power user, then you’ve probably come across the likes of Termux. It’s an Android terminal emulator and Linux environment app, and some people have used it to develop Python scripts and even run Minecraft servers from their smartphones. Now you can take that a step further though with a rooted Pixel 6 or a regular Pixel 7, thanks to Nestbox by XDA Senior Member kdrag0n, available on his Patreon.

    • Applications

      • DebugPointLinux Mint Upgrade Tool – Here’s How it Works

        The Linux Mint team announced that they built a new utility to upgrade the Linux Mint’s significant versions. It’s called the “mintupgrade2”. Development is complete, and It is currently under the support and planning for upgrading to the major versions—for example, Linux Mint 20 to 21 and not the minor version upgrades.

        Although you can upgrade the versions using the standard apt commands, the Mint team believes significant version upgrades are tricky. It would be difficult for the new users to perform a seamless upgrade because it involves the terminal and a set of complex steps with commands.

        Moreover, the GUI is a wrapper with additional features to the mintupgrade program, which brings a set of pre-system checks and upgrade processes with a one-click Fix.

        In addition, the mintupgrade checks basic checks, whether you are connected to power, the system is up to date, disk space availability and many more features.

    • Instructionals/Technical

    • Games

      • HackadayTaking Pokémon On A Walk

        Emulating old computers or video game systems isn’t always about recreating childhood nostalgia or playing classics on hardware that doesn’t exist anymore. A lot of the time it can be an excellent way to learn about the mechanics of programming a video game. Plenty of older titles have available source code that anyone can pour over and modify, and one of those is Pokémon Emerald. This was the first Pokémon game that [Inkbox] played, and he added a few modern features to it with this custom ROM file.

      • GamingOnLinuxSoulstone Survivors might dethrone the likes of Vampire Survivors for me

        Soulstone Survivors is a new Early Access game that arrived with Native Linux support on November 7th, it’s also now already one of my favourite games. It works great out of the box too and it appears to be getting quite popular, with a Very Positive user rating and over 14,000 people playing it right now.

      • GamingOnLinuxRogue Legacy 2 had a major upgrade, and Native Linux support is coming

        Well this was unexpected. Rogue Legacy 2 from Cellar Door Games just had a massive upgrade and they’ve announced Native Linux and macOS versions are on the way.

      • GamingOnLinuxFSR 2.1 is a game-changer for Cyberpunk 2077 on Steam Deck

        Cyberpunk 2077 from CD PROJEKT RED recently had a big 1.61 patch out, and with it came support for AMD FidelityFX Super Resolution (FSR) 2.1.

      • GamingOnLinuxProton Hotfix gets Halo Infinite working again on Steam Deck and Linux desktop

        Having issues with the latest major update for Halo Infinite on Steam Deck or Linux desktop? Valve has already released a Proton Hotfix update to sort it.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • DebugPointKDE Plasma 5.27 Bringing Subtle Outline on Windows

          A recent merge request for the upcoming KDE Plasma 5.27 release (for 2023) shows how a nice, subtle window border can make a difference in the overall desktop look.

          Here’s how it looks.

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • uni TorontoSome thoughts on organizations running their own Fediverse instance

      One of the current ideas floating around the Fediverse is that (significant) organizations should be encouraged to run their own instances, in part to implicitly verify the identities of people posting from them (one writeup of this idea is here). If someone with the name of my MP posts from the official instance run by the Canadian (federal) Parliament, for example, I can be pretty sure of what I’m getting. In related news, MIT has stood up their own Fediverse instance. This got me thinking some thoughts over on the Fediverse, which I’ll repeat here in slightly edited form with some annotations.

    • Ali Reza HayatiHow does Fediverse work?

      But we don’t want to talk about the technical stuff behind the Fediverse. What do you want to talk about is simply how Fediverse and/or Mastodon work. Mastodon is just a part of Fediverse. Fediverse is a word built by mixing the two words of federation and universe.

    • Education

    • Licensing / Legal

      • Nicholas Tietz-SokolskyOpen source licenses as a reflection of values

        The first question is: Why do licenses exist and why do they matter? I’ll take a US-centric view here, because that’s what I’m most familiar with.

        In the US, all code is by default protected by copyright, both as the source code and in compiled form1. This means that other people don’t have the right to use your code (with some possible exceptions) without permission. Software is less useful without users (as are books without readers, etc.) so we want some way to let people use our software. That’s where copyright assignment and licenses come in.

    • Programming/Development

      • UndeadlyGame of Trees 0.79 released.

        Version 0.79 of Game of Trees has been released (and the port updated): [...]

      • Daniel LemireModern vector programming with masked loads and stores

        In general, the operating system and the processor do not care when your program reads and writes anywhere within the pages allocated to it. These pages are the ‘segment’ that the process owns. When you do access a forbidden page, one that was not allocated to your process, then you normally get a segmentation fault. Most of the time, it means that your program crashes.

      • Pairing on Open Source

        In addition to talking about pairing in the group, we had developers who organized together to pair for Hacktoberfest. One made their first-ever contribution after their first pairing session. Then she wrote her first ever English blog post about the experience.

      • [Old] My contribution and first remote pair programming for OSS

        This is my first blog post in English. Please don’t mind a light weight mistake but I’m happy if you tell me the better expression when there’s something terrible wrong or something unsuitable.

      • HackadayRetrotechtacular: Programming By Card

        The recent Supercon 6 badge, if you haven’t seen it, was an old-fashioned type computer with a blinky light front panel. It was reminiscent of an Altair 8800, a PDP-11, or DG Nova. However, even back in the day, only a few people really programmed a computer with switches. Typically, you might use the switches to toggle in a first-level bootloader that would then load a better bootloader from some kind of storage like magnetic or paper tape. Most people didn’t really use the switches.

      • Python

        • It’s FOSSBest Python IDEs for Linux

          Whether a coder or not, you must have heard about Python Programming language in some capacity. Python is used extensively in Artificial Intelligence and Machine Learning, some of the most popular buzzwords in computing.

          Being a popular programming language, you may already know or be interested in learning it.

          When someone learns a programming language, an IDE (Integrated Development Environment) comes in handy. It makes programming easy while giving you access to multiple utilities in a few clicks.

          Specifically, it provides features like Syntax Highlighting, Debugging, etc., in one place.

          If you are learning Python and want to use an IDE to test things, I have compiled a list of them to help you.

        • PyScript Updates: Bytecode Alliance, Pyodide, and MicroPython

          Earlier this year we unveiled PyScript to enable users to create Python applications in the browser. In order for PyScript to succeed, we at Anaconda must make strategic investments in both the project itself and its core technology dependencies, such as WebAssembly (Wasm) and the fantastic Pyodide open-source project (PyScript’s primary runtime). To that end, PyScript has been improving its technical foundations over the past few months, and today we have three special announcements to share: [...]

  • Leftovers

    • The NationGrowing Toward the Light
    • The NationKehua / I used to want to be the bait that caught Te Ika

      I lost my nerve for spirits when I was sixteen. Spent that whole spring playing chicken and betraying my grandparents’ liquor cabinets for homies who were too cool to say thank you but the slight acknowledgement, sunrise in their chin, suggesting warm and wicked days, eyes lighting up the colour of blunts, bark and honey, was enough to make me feel like Māui, full of confidence and concoctions, under pressure to slow the sun.

    • The NationTeju Cole’s Elegiac Criticism

      Late in May 1606, Michelangelo Merisi da Caravaggio, the prodigious and mercurial master painter, ran his sword through a man named Ranuccio Tomassoni. Caravaggio had placed a bet on their game of tennis and lost, and Tomassoni wanted to collect on his win. Their extra set became physical combat, Teju Cole writes in his 2020 essay “After Caravaggio.” Tomassoni died; Caravaggio ran. “After two days of hiding in Rome, he escaped the city, first to the estates of the Colonna family outside Rome, and then, near the end of the year, to Naples. He had become a fugitive. Caravaggio’s mature career can be divided in two: the Roman period, and everything that came after his murder of Tomassoni. The miracle is that he accomplished so much in that second act, on the run.”

    • Science

      • Quanta MagazineMathematicians Discover the Fibonacci Numbers Hiding in Strange Spaces

        Then earlier this year, McDuff uncovered another clue to this mystery. She and several others revealed not just infinitely more staircases, but intricate fractal structures. Their results are “not something that I remotely expected to see arising naturally in this kind of problem,” said Michael Usher, a professor at the University of Georgia.

        The work has revealed hidden patterns in seemingly unrelated areas of math — a reliable sign that something important is afoot.

    • Education

      • The NationAre Americans Bad at Reading?

        In 2018, the writer Elaine Castillo released her debut novel, America Is Not the Heart, which is set in the Philippines and in California, following generations of the island nation’s diaspora. It’s a sprawling, vivid book, sensual and political and abundantly affectionate toward its characters. Yet not all readers, Castillo discovered on her book tour, seemed willing to treat those characters—or, indeed, their creator—as if they were multidimensional people. Instead, white readers kept asking Castillo why she’d used untranslated Tagalog, Pangasinan, and Ilocano words in the text, or expected her to teach them the history of the Philippines, or told her that the novel “made them feel terrible about your country,” as she writes in her bracing essay collection How to Read Now.

    • Hardware

      • HackadayThis Wii Has An Apple M1 Inside

        The conveniently tiny logic board of the M1 Mac mini has lead to it giving the Mini ITX format a run for its money in case mods. The latest example of this is [Luke Miani]’s M1 Wii. (Youtube via 9to5Mac)

      • HackadayDIY SpaceNavigator Brings The Freedom

        [Pepijn de Vos] wanted a 6DOF HID. You know, a 6 Degrees Of Freedom Hardware Interface Device. Those are the fancy controllers for navigating in 3D space, for uses like Computer Aided Design, or Kerbal Space Program. And while we can’t speak to [Pepijn]’s KSP addiction, we do know that the commercially available controllers are prohibitively expensive. It takes some serious CAD work to justify the expenditure. [Pepijn] falls somewhere in-between, and while he couldn’t justify the expense, he does have the chops to design and 3D print his own.

      • Hackaday$1 POV Display Goes Round And Round

        You don’t need much to do a persistence of vision display. A few LEDs and a processor is all it really takes. [B45i] made a simple PC board with five LEDs and an ATtiny CPU. There’s a battery and it connects to a fan to spin around.

      • HackadayOld 6809 Computer Lives Again On Breadboards

        Among old CPUs, the 6809 never got as much attention as some of its cousins. The Radio Shack CoCo used it and so did a construction article in Wireless World Magazine. Now [Dave] has reconstructed that computer on breadboards and it looks great. The files are on GitHub and there is even a series of videos about the machine. You can watch the first one below.

      • HackadayAutomatic Candy Dispenser Takes The Hard Work Out Of Halloween

        Halloween may be behind us, but we couldn’t resist showing you [Mellow]’s latest project: an automatic candy dispenser that takes the hard work out of serving trick-or-treaters. It’s a cool build that might serve as an inspiration for next year’s Halloween project, or perhaps for a different occasion altogether: think birthday parties or Valentine’s Day. After all, when’s a bad time to give sweet treats to someone you love?

    • Health/Nutrition/Agriculture

      • Pro PublicaHow the FCC Shields Wireless Providers From Safety Concerns

        The health complaints started rolling in within weeks of the activation of a new cellphone tower in August 2020 in Pittsfield, an old factory town in Massachusetts’ Berkshire Mountains. Seventeen residents reported headaches, dizziness, insomnia or confusion. A few children had to sleep with “vomit buckets” by their beds.

        Like many people, Bobbie Orsi had never paid close attention to questions about the health effects of cellphone technology. She mostly viewed it as an issue that had long ago been put to rest. But after becoming the chair of Pittsfield’s Board of Health as the complaints emerged, Orsi, a 66-year-old registered nurse who had spent much of her career in public health, decided to educate herself. She combed through a stack of research studies. She watched webinars. She grilled a dozen scientists and doctors.

      • Counter PunchCannabis Crop Report, 2022

        Notice please that he uses the word “honestly.” He doesn’t just give honesty lip service, though it’s challenging to speak honestly in an industry that’s like many others in which hardworking, dedicated individuals want to put a smile on their own faces and offer good news to a public that’s eager for positive, hopeful stories.

        In 2022 in the world of cannabis those stories are hard to come by, though more Americans than ever before believe that cannabis ought to be legalized by the federal government and that cannabis can be good medicine.

      • Common DreamsAnger as Biden EPA Backs ‘Dangerous and Unnecessary’ Oil Export Project on Texas Coast

        Environmental and climate campaigners on Wednesday expressed outrage after the Biden administration backed the approval of a massive new fossil fuel project on the Texas coast that one opponent calls “dangerous and unnecessary.” 

        “Y’all have a terrible spill record. You choose to run these pipes right up our ass. We are against this project.”

      • TruthOutVoters in Deep Red South Dakota Approve Medicaid Expansion
      • Common Dreams‘The Right Thing to Do’: Voters in Deep Red South Dakota Approve Medicaid Expansion

        Defying their right-wing political leaders, South Dakota voters on Tuesday approved a constitutional amendment to expand the state’s Medicaid program under the Affordable Care Act, a move that will extend public health insurance coverage to around 45,000 low-income people.

        With Tuesday’s vote, which currently sits at 56% in favor of the amendment and 44% against, South Dakota is set to become the seventh state to expand Medicaid through a ballot measure, keeping the undefeated streak for Medicaid initiatives intact.

      • TruthOutAbortion Rights Win in Several Statewide Ballot Initiative Contests
    • Security

      • Privacy/Surveillance

    • Defence/Aggression

      • Gatestone InstituteFrance Sliding toward Barbarity and Chaos

        Hundreds of thousands of immigrants enter Europe illegally each year. Many head for France and stay there. They have been benefiting, since 2000, from financial aid and free medical care to which even poor French citizens do not have access. If they are arrested, like Lola’s murderer, they are ordered to leave the country, but are not placed in a detention center so the order, never enforced, is not an order at all. In 2020, 107,500 orders to leave France were issued; fewer than 7% took place.

      • Hindu PostIslamist mob attacks Hindu procession in Mahottari: Nepal

        Dheeraj informed that the Muslim population in his district has risen to 15 per cent. He also accused the government and administration of favouring Muslims. Furthermore, he lamented that Hindu Samrat Sena (HSS) received no support from its own community members over the incident.

      • FAIR‘Intervention Is Actively Destabilizing the Situation’

        Janine Jackson interviewed CEPR’s Jake Johnston about US intervention in Haiti for the November 4, 2022, episode of CounterSpin. This is a lightly edited transcript.

      • The NationThe Perils of Fortress NATO, Gatekeepers to Europe’s Walled Garden

        Josep Borrell, the top diplomat of the European Union, has a brutal candor rare in his profession. On October 13, he addressed an audience of aspiring diplomats with a speech that contrasted Europe, which he described as a “garden,” with much of the rest of the world, which he condemned as a “jungle.” “Yes, Europe is a garden,” Borrell said. “We have built a garden. Everything works. It is the best combination of political freedom, economic prosperity, and social cohesion that humankind has been able to build—the three things together.” He added, “Most of the rest of the world is a jungle, and the jungle could invade the garden.” The purpose of diplomacy, by his account, is to defend the garden from the jungle. Borrell called on European diplomats to be “gardeners” who would “have to go to the jungle. Europeans have to be much more engaged with the rest of the world. Otherwise, the rest of the world will invade us, by different ways and means.”

      • The NationAfter the Attack on Paul Pelosi, the GOP Again Is the Party of No Shame

        Like every unhappy family, every political scandal is different. But the assassination attempt that targeted Nancy Pelosi and gravely injured her husband, Paul, offers some grim points of reflection for students of recent Republican politics. These lessons stand out in especially high relief when you cast your mind back to the last midterm cycle that brought an October surprise to the GOP faithful: the 2006 scandal involving Florida Representative Mark Foley, who sent a string of sexual e-mails and texts to adolescent boys who were working as pages for the House.

      • Counter PunchJapan’s Discomfort in the New Cold War

        Resolute Dragon 2022 followed the resumption in September of trilateral military drills by Japan, South Korea, and the United States off the Korean peninsula; these drills had been suspended as the former South Korean government attempted a policy of rapprochement with North Korea.

        These military maneuvers take place in the context of heightened tension between the United States and China, with the most recent U.S. National Security Strategy identifying China as the “only competitor” of the United States in the world and therefore in need of being constrained by the United States and its allies (which, in the region, are Japan and South Korea).

      • ScheerpostWill Our War-for-Profit System Lead to Nuclear Annihilation?

        The US continues to fan the flames of nuclear conflict with massive investments in the war department. How long can this last?

      • Meduza‘Here forever’ – or not Russian leadership announces retreat from Kherson. The latest. — Meduza

        Russian troops will retreat from Kherson. Russian Minister of Defense Sergey Shoigu ordered the withdrawal of military equipment and personnel from the right (western) bank of the Dnipro River, where Kherson is located. “Proceed with troop withdrawal and take all measures for the safe transfer of equipment, weapons, and personnel across the Dnipro,” said Shoigu.

      • MeduzaKherson collaborationist official Kirill Stremousov killed in car crash — Meduza

        Kirill Stremousov, the Russian-installed deputy head of the collaborationist administration in Ukraine’s partially-occupied Kherson region, was killed in a car accident on Thursday.

      • MeduzaA ‘military necessity’ and an ‘invitation to negotiate’ What’s behind Russia’s retreat from Kherson? — Meduza
      • MeduzaRussian leadership announces retreat from Kherson — Meduza

        Sergey Surovikin, the commander of Russia’s troops in Ukraine, suggested during a report to Russian Defense Minister Sergey Shoigu that Russia should leave the right bank-region (west of the Dnipro) of Kherson. Surovikin’s report was broadcast live on television channel Russia 24.

      • Common Dreams‘So Irresponsible’: US Condemned for Warning Australia Against Joining Anti-Nuclear Treaty

        Anti-nuclear weapons campaigners rebuked the Biden administration on Wednesday over its opposition to Australia’s newly announced voting position on the Treaty on the Prohibition of Nuclear Weapons, which could signal the country’s willingness to sign on to the agreement.

        “The TPNW offers the best chance for lasting global peace and security and a clear road map for nuclear disarmament.”

      • MeduzaUkraine reportedly retakes Snihurivka, important logistics hub for Russian troops on Dnipro River’s right bank — Meduza

        The Ukrainian Armed Forces have reportedly liberated the city of Snihurivka in the Mykolaiv region.

      • MeduzaGeneral Surovikin’s ‘difficult decision’ revealed What Russia’s retreat from Kherson means for the future of the war — Meduza
    • Transparency/Investigative Reporting

    • Environment

      • Common DreamsOpinion | Youth Are Demanding Loss and Damage Finance at COP27

        At the age of five, I was introduced to the climate crisis by way of a powerful rainstorm that destroyed the roof of my family’s home. This “natural hazard,” as it was framed in the local media, sparked my passion for learning about science, the world’s climate, and the overwhelming global crisis we’re facing. As I learned more during my university studies, I realized that those with the least culpability were shouldering a massive—and undeserved—punishment: The youth of my generation inherited a climate crisis that is gradually engulfing the world.

      • Common DreamsCritics Say US Carbon Offset Proposal ‘Poor Substitute’ for Real Climate Action

        The Biden administration faced sharp criticism from environmental justice champions on Wednesday after U.S. Special Presidential Envoy for Climate John Kerry unveiled a voluntary carbon offset scheme that he and philanthropic foundation partners say would unleash private investment to expedite a clean energy transition in low-income nations.

        “A voluntary carbon credit program won’t guarantee deep, real cuts in emissions.”

      • Common DreamsUS Mega-Banks Behind 1/3 of Climate-Destroying Oil and Gas Expansion: Report

        Wednesday is Finance Day at COP27, the United Nations climate summit in Sharm El-Sheikh, Egypt, and the advocacy group Rainforest Action Network published a report exposing how major U.S. banks are financing hundreds of billions of dollars worth of fossil fuel projects—even as they tout their purported commitment to a low-carbon future.

        “Global banks’ top fossil fuel clients amount to a rogues’ gallery of bad actors.”

      • Common DreamsTargeting ‘Big Oil Greed’ Helped Dems in Key Races, Say Climate Campaigners

        Election results are still rolling in and control of Congress has not yet been determined, but climate campaigners said Wednesday that one message proved to be a clear winner for Democrats in close races across the country: Big Oil is ripping off the American public.

        In a new memo, the Stop the Oil Profiteering (STOP) campaign points to key Democratic victories in Pennsylvania, New Hampshire, and Michigan to argue that a “focus on Big Oil greed”—and Republicans’ refusal to do anything about it—was a significant factor, particularly given voters’ overriding concerns about high gas prices and inflation overall.

      • Energy

        • BBCFTX: Cryptocurrency giant Binance walks away from bailout

          Binance, the world’s biggest cryptocurrency exchange, has walked away from a bailout deal of its smaller rival FTX.

        • New York TimesBinance Pulls Out of Deal to Acquire Rival [Cryptocurrency] Exchange FTX

          Over the last two years, Sam Bankman-Fried, a 30-year-old entrepreneur, built a [cryptocurrency] exchange called FTX into a $32 billion company. He spent hundreds of millions of dollars to prop up struggling [cryptocurrency] firms. And he became a major political donor to Joseph R. Biden Jr.’s presidential campaign as well as a frequent, welcome presence in the halls of Congress.

          Then, in a matter of days, it was suddenly Mr. Bankman-Fried who needed a bailout, thanks in large part to Twitter posts from a rival that questioned the stability of FTX’s business. The tweets sparked what was essentially a three-day bank run of an estimated $6 billion that sent FTX into crisis.

        • CointelegraphBreaking: FTX’s Binance rescue deal falls apart in less than 48 hours

          On Nov. 9, less than 48 hours after Binance CEO Changpeng “CZ” Zhao announced his intention to bail out troubled competitor FTX, Binance stated that it would not be pursuing the deal.

          A series of tweets by Binance confirmed that it would “not pursue the potential acquisition” of crypto exchange FTX citing “reports regarding mishandled customer funds and alleged US agency investigations.”

        • New York TimesIs This [Cryptocurrency]’s Lehman Moment?

          Indeed, FTX’s fall — including a failed attempt to sell itself to the rival crypto exchange Binance — may turn out to be the most gripping [cryptocurrency] narrative of the year, a “Succession”-level drama involving feuding billionaires, rumors of sabotage and high-stakes battles over the future of the industry. It’s a stunning, sudden fall from grace for one of the [cryptocurrency] world’s biggest celebrities. And it signals that the industry, already reeling from a brutal year of losses, may be in for even tougher times.

          Making sense of this deal, though, requires knowing some of the complicated back story that got us here. Here’s a rough outline: [...]

        • Counter PunchPoland Goes Nuclear

          With breathtaking myopia, the Polish government has signed a deal to partner with the US company, Westinghouse, in the construction of three nuclear reactors in Poland.

          Apparently, everyone concerned is happy to ignore the fact that Westinghouse was bankrupted by its disastrous nuclear projects in South Carolina and Georgia. The former was canceled mid-construction and the latter, at Plant Vogtle, is now years behind schedule and well beyond its originally predicted 2016 start-up date, with ever-ballooning cost over-runs that have now topped $30 billion.

        • Common DreamsOpinion | Poland’s Sad Love for These U.S. Nuclear Lemons

          Congratulations must go to Poland—and to US vice president, Kamala Harris, and US energy secretary, Jennifer Granholm for brokering the deal—for its commitment to purchase a triad of American nuclear lemons.

        • The NationClean Energy Is Booming. Now Here’s the Bad News.

          When it comes to building more clean energy, there’s good news all around. New wind and solar generation surged 22 percent this year, which is part of a longer-term trend. Environment America found that the United States generated three times as much power from wind and solar as it did in 2012. This shift is also global: A report analyzing data from dozens of countries finds that wind and solar account for most of the growth in new electricity generation.

    • Finance

      • New York TimesSmartphones Are Like Cars. So Why Don’t We Maintain Them?

        Another motivator may be doing the math. For about $70, you can replace your phone’s battery at a repair shop, which makes this a relatively cost-effective fix. Let’s say that in two years, you trade in your $800 phone for $300 in credit toward the new $800 model. That’s spending $500 on a phone every two years; over eight years, you will have spent $2,800 on phones. In contrast, if you hold on to an $800 phone and replace two batteries for $70 each, you will spend $940 in the same period. For many, especially families with multiple phones, that adds up to major savings.


        But the situation for phone repairs is improving. Last year, the Federal Trade Commission announced that it would crack down on companies that prevented people from fixing their products. And a New York state law that was passed in June, which would require tech companies to open access to electronics repair and diagnostics tools, awaits a signature from Gov. Kathy Hochul.

      • Counter PunchHow the Inflation Reduction Act May Transform the Corporate Income Tax

        There are two main reasons that this provision matters. The first is straightforward—while buybacks are often demonized for silly reasons, their current tax treatment is a very real issue. Share buybacks and dividend payouts are alternative mechanisms through which companies pay out profits to shareholders. Dividend payouts are directly taxed at the individual level. However, the money that companies pay out in buybacks, which gets to shareholders in the form of higher share prices, is not subject to tax.

        There is zero logic to this asymmetry. The government has no reason to prefer that companies pay out money as share buybacks rather than dividends, but the tax treatment gives them a clear incentive to do so. As a result, the share of after-tax profits paid out as dividends fell to less than 43% in the last decade from more than 56% in the 1960s, before the legality of buybacks had been established.

      • Counter PunchDeal Between Israel and Lebanon Could Usher in Additional Agreements

        I grew up in San Miguel de Tucumán, a city in northern Argentina. At the beginning of the 1900s, Tucumán received numerous immigrants from Arab countries, among them my father who emigrated from Lebanon. Tucumán was also home to a robust Jewish population that had fled persecution during WWII. It was in Tucumán where I witnessed, as an adolescent, a microcosm of peaceful co-existence and collaboration between Arabs and Jews. Dozens of businesses owned by Arabs and Jews lined the main street of the city’s business center. Many of these businesses continue to co-exist today.

        In many cases, Arab and Jewish business-owners collaborated with each other because of shared commercial interests. Hugo Japaze, an Argentinian physician whose father had a well-known store on that street, recently told me, “Both Arabs and Jews were immigrants in a new land, and they realized that they had much more to gain by working together on a friendly atmosphere than by reviving old animosities.”

      • Common DreamsTo Defend Social Security and Medicare, Dems Urged to Lift Debt Ceiling Before 2023

        With Democrats still at risk of losing control of one or both chambers of Congress after Tuesday’s midterm elections, calls mounted for federal lawmakers and President Joe Biden to raise the debt ceiling before the new year.

        As votes were still being counted in several states Wednesday, the advocacy group Social Security Works tweeted that Democrats, led by Biden, “focused heavily on Social Security during the campaign. They made sure voters knew about Republican threats to the program, and promised that Democrats would protect Social Security.”

      • ScheerpostMeta Hops on Layoff Bandwagon, Zuckerberg Says ‘I Got This Wrong’

        More than 11,000 Meta employees were laid off Wednesday morning issuing another blow to the big tech job market.

      • TruthOutDC Voters Overwhelmingly Pass Measure to End Tipped Minimum Wage – Truthout
      • Common Dreams‘Congress Needs to Get the Message’: Nebraskans Vote to Raise Minimum Wage to $15 an Hour

        Nebraskans voted Tuesday to incrementally raise the state’s minimum wage to $15 an hour by 2026 as corporate price hikes continue to eat into workers’ paychecks and the federal wage floor remains stuck at a paltry $7.25.

        The ballot measure, known as Initiative 433, succeeded by a vote of 58.2% to 41.8% despite opposition from influential corporate lobbying groups in the state, including the Nebraska Chamber of Commerce.

      • Common DreamsOpinion | Wall Street Is Gambling With Our Future. The Federal Reserve Must Act Now

        Hurricane Ian, slated to be one of the costliest storms in history, torpedoed through Cuba, Florida, and South Carolina, leaving entire neighbourhoods underwater and millions without electricity. The damages in Florida alone were catastrophic, potentially costing up to $70 billion, grinding the local economy to a halt. After a summer of crushing heat, drought, and raging wildfires, it’s clear that the physical impacts from climate change are mounting. By one estimate, climate change could cause up to $23 trillion in losses by 2050, far surpassing the 2008 financial crash. The climate crisis is pushing us into an era of profound economic instability.

    • AstroTurf/Lobbying/Politics

      • Aral BalkanIs the fediverse about to get Fryed? (Or, “Why every toot is also a potential denial of service attack”)

        In fact, this should be built right into the software. Mastodon instances should be limited from growing beyond a certain size. Instances that are already too large should have ways of encouraging people to migrate to smaller ones.

        As a community we should approach large instances as tumours: how do we break them up so they are no longer a threat to the organism?

      • NPRFacebook parent company Meta sheds 11,000 jobs in latest sign of tech slowdown

        Facebook parent company Meta announced extensive layoffs on Wednesday, shedding 11,000 jobs, or about 13% of its staff, amid an industrywide slowdown that has rattled Silicon Valley in recent months.

      • New York TimesMeta Lays Off More Than 11,000 Employees

        Since Mark Zuckerberg founded Facebook in 2004, the Silicon Valley company has steadily hired more employees. At the end of September it had amassed its largest-ever number of workers, totaling 87,314 people.

        But on Wednesday, the company — now renamed Meta — began cutting jobs, and deeply.

        Meta said it was laying off more than 11,000, or about 13 percent of its work force, in what amounted to the company’s most significant job cuts. The layoffs were made across departments, though some areas, like recruiting, were affected more than others.

      • The NationIn New York, Sean Patrick Maloney’s Out. Good.

        Sean Patrick Maloney didn’t deserve to win.

      • Democracy NowRobert Reich: Democrats Can No Longer Compromise with “Authoritarian” Republicans

        Former U.S. Labor Secretary Robert Reich says President Biden must “push back as hard as he can” if Republicans take control of even one chamber in Congress following Tuesday’s midterm elections. He says the administration needs to be clear there is no compromise on the debt ceiling, which he expects a Republican-controlled Congress would challenge, potentially triggering a repeat of the political crisis in 2011 under former President Obama.

      • TruthOutDid Gerrymandering Prevent Democrats From Winning Georgia and Ohio?
      • TruthOutSummer Lee, Others Score Decisive Wins in Triumphant Night for Progressives
      • Democracy NowDemocratic Socialist Summer Lee’s Victory in Penn. Gives Progressives a Boost in House

        Pittsburgh community organizer Summer Lee was elected the first Black woman to represent Pennsylvania in Congress after winning the state’s 12th Congressional District in Tuesday’s midterm elections. Lee, currently a state representative, faced off against Republican Mike Doyle — who happened to share the same name as the outgoing Democratic incumbent. We speak with Aimee Allison, president and founder of She the People, who explains how Lee successfully fended off a massive negative ad campaign funded by the pro-Israel lobbying group AIPAC. Allison also speaks about the mayoral race in Los Angeles, where progressive Karen Bass is in a tight race with billionaire Rick Caruso, as well as other races where strong progressive candidates fell short. “The heartbreaking loss of some of the nation’s best candidates demonstrates that the Democrats need to invest early and very, very strongly in these excellent candidates in order to protect and build up their capacity to turn out the votes,” says Allison.

      • The NationRed Tsunami? More Like a Red Ripple.

        In the middle of an election night when Democrats were supposed to lose just about everything, CNN chief congressional correspondent Manu Raju stood at the edge of the House Republican Caucus “victory party” and reviewed the results as of midnight on the East Coast. The news ticker at the bottom of the screen read, “McCarthy waits to address crowd as many races remain too close to call.”

      • The NationIn Georgia, Abrams Loses, While Warnock Hangs On

        The symbolism was tough to miss: The Stacey Abrams campaign’s election-night “watch party” sat adjacent to Senator Raphael Warnock’s, one hotel away, but in an entirely different world.

      • Counter PunchEvery Time Biden Defies Expectations, Trump’s Strength Weakens

        One result of the outcome of the midterms is that President Joe Biden will be more likely to stand for re-election in 2024 and former President Trump, who will soon announce if he will stand again for the presidency, has been weakened. Republican candidates who got his full and active support have generally fared poorly or failed to get a boost from his backing.

        The final outcome of the midterms will take time to emerge, particularly in closely fought Senate races in Georgia, Nevada and Arizona.

      • Counter PunchAfter Victory, What Will Lula’s Foreign Policy Look Like?

        But it also marked a radical turning point on a subject that receives little public attention in general: foreign policy. It’s not just that the Bolsonaro government has transformed Brazil, a giant in land area and population, into a kind of diplomatic dwarf. Nor is it just the fact that Bolsonaro turned the country’s back to Latin America and Africa. The most serious thing is that in his pursuit of aligning Brazil to the United States, Bolsonaro broke with a long tradition of Brazilian foreign policy: the respect for constitutional principles of national independence, self-determination of the peoples, non-intervention, equality between States, defense of peace, and peaceful solution of conflicts.

        Despite the different foreign policies adopted by Brazilian governments over the years, no president had ever so openly broken with these principles. Never had a Brazilian president expressed such open support for a candidate in a U.S. election, as Bolsonaro did to Trump and against Biden in 2020. Never had a president so openly despised Brazil’s main trading partner, as Bolsonaro did with China on different occasions. Never had a Brazilian president offended the wife of another president as Jair Bolsonaro, his Economy Minister Paulo Guedes, and his son Representative Eduardo Bolsonaro did in relation to Emmanuel Macron’s wife, Brigitte. And never, at least since re-democratization in the 1980s, has a president talked so openly about invading a neighboring country as Bolsonaro did toward Venezuela.

      • Counter PunchSowing Seeds of Economic Democracy

        But it’s an error to gaze only where the light shines most brightly. Important developments pertaining to our democracy, particularly to economic democracy, are unfolding in many places outside the spotlight. At first glance, the developments may seem modest. But they have far-reaching consequences for the well-being of working people and for civil society at large.

        In a northeast corner of Los Angeles, not far from where I live, there’s a neighborhood called Atwater Village, and in that neighborhood an enterprise called the Proof Bakery does a thriving business selling a wide range of pastries, cakes, sandwiches, coffees, and other popular items. Three years ago, its founder and owner, Na Young Ma, decided to relinquish ownership after running the business for almost 10 years. But instead of selling the bakery to an outside owner, with all the possible consequences that could accrue from such a sale (including the firing of employees), she took the more challenging, time-consuming path of initiating a transition to a worker-owned cooperative, inspired by the long-running, successful Cheese Board Collective and Arizmendi Bakeries in California’s Bay Area (Oakland, Berkeley, San Francisco, San Rafael, Emeryville)

      • ScheerpostJoe Biden Holds Red Wave to a Ripple in Surprising Midterms

        Juan Cole considers what the 2022 midterm election results (so far) mean for both Biden and his predecessor.

      • ScheerpostHow John Fetterman Defeated Dr. Oz, Flipping Key Senate Seat

        Jake Johnson reports on John Fetterman’s critical win for the Pennsylvania senate seat Democrats desperately need.

      • Common DreamsSummer Lee, Maxwell Frost Among New Progressive Champions Heading to US House

        A number of newly elected progressives from across the country are poised to join the “Squad” of left-wing champions in the U.S. House following Tuesday’s midterm elections, with Reps.-elect Summer Lee of Pennsylvania, Maxwell Frost of Florida, and others crediting their working people-focused campaigns for their victories.

        Voters “care about how much their basic needs cost,” Lee told WESA in Pittsburgh after winning in Pennsylvania’s 12th District. “Their groceries and their gas bills. They care about a living wage. These are things that truly connect us. And I believe that’s actually what makes progressives and our progressive messaging resonate.”

      • Common DreamsOpinion | Trump Falls Flat as Democrats Turn Red Wave Into a Puddle

        Over the past 40 years, midterm elections have typically quiet affairs in which only 38% to 40% of voters show up at the polls, and those who vote skew toward the older, wealthier and whiter spectrum of the electorate. In contrast, in presidential election years, the turnout tends to be between 58% and 66% (in 2020).

      • Common DreamsOpinion | Despite a Seemingly Calm Election, a Storm of Voter Suppression Is Still Brewing
      • Common Dreams‘Young People Saved This Election’ for Democrats, Say Progressives

        While control of Congress remained unclear as of Wednesday afternoon, young voters who turned out for Democrats on Tuesday played a key role in blocking a “red wave” that had been anticipated based on previous midterm elections and widely predicted by political pollsters and pundits.

        “Young people proved that Gen Z is a vital voting bloc that can and will be the bedrock of the Democratic Party.”

      • Common Dreams‘Seismic Win’: Michigan Voters Approve Constitutional Amendment to Protect Abortion Rights

        Michigan residents on Tuesday voted to enshrine abortion rights in the state’s constitution, a major victory in the wake of the U.S. Supreme Court’s deeply unpopular decision to overturn Roe v. Wade and amid a nationwide GOP assault on reproductive freedom.

        The initiative, one of several abortion-related measures on the ballot across the country Tuesday, currently leads by a margin of 55.6% to 44.4% with 84% of the votes counted.

      • Common DreamsOpinion | Did the Fascist Mantle Just Pass to Ron DeSantis?

        The elections appear to be a mixed bag, with young people and women, in particular, rejecting the rightwing Supreme Court Dobbs abortion decision. The early youth vote in Wisconsin, for example was 360% higher than in 2018 according to Ben Wikler, the chair of the Wisconsin Democratic Party.

      • Common Dreams‘Humiliating’: DCCC Chair Sean Patrick Maloney Concedes in New York

        U.S. Rep. Sean Patrick Maloney—a powerful Democrat running in a blue New York district—conceded Wednesday to his Republican opponent in what observers are calling a “humiliating” loss after an election night in which Democratic congressional candidates collectively outperformed expectations.

        Maloney, who chairs the Democratic Congressional Campaign Committee (DCCC), admitted defeat to freshman state Assemblyman Mike Lawler (R-97) in a stinging loss for a candidate who controversially decided to run in New York’s 17th Congressional District—currently represented by progressive Rep. Mondaire Jones—after a court-appointed special master redrew district maps earlier this year.

      • Common Dreams210+ GOP Candidates Who Spread Doubt and Lies About 2020 Election Won Their Races

        More than 210 Republicans who cast doubt on President Joe Biden’s 2020 victory won congressional seats and races for governor, secretary of state, and attorney general on Tuesday night, underscoring the extent to which right-wing election denialism has become entrenched in the GOP and threatens to remain a noxious force in U.S. politics for the foreseeable future.

        In a recent investigation of Republican candidates’ statements,The New York Times identified more than 370 so-called “election skeptics” who sowed doubt in some way about the 2020 contest. According to the newspaper’s Wednesday morning analysis, over half of them have won their midterm campaigns so far. It may take days or weeks for the final results to be tallied.

      • TechdirtSoft Corruption At Work: Guy Who Paid Millions To Create California’s Complex & Unworkable Privacy Regime Added To Board To Enforce It

        We’ve talked in the past about “soft corruption,” a term I first heard from Larry Lessig. Lots of people have a general sense of what actual corruption is, but less understanding of the specifics. But, in general, people feel uncomfortable with the ways in which money can influence politics, even when it’s legal. Lessig’s concept of “soft corruption” is the sort of thing that is legal, but feels corrupt to most people upon seeing it. Lessig’s point is that even if the actions around soft corruption are legal, they lead to a lot less trust in the government, because no matter how legal it is, it sure feels sketchy.

      • TechdirtElon’s Twitter: Classist Blue Check System… Reinvented As Even More Elitist Gray Checks, Goes Live, Then Elon Says He’s Killed It

        I keep pointing out that Twitter was already doing most of what Elon seems to want to do, but he (and his fans) has not quite realized that. Also, while Twitter was often slow in rolling stuff out, and not the best at explaining what it was doing, many of its features were created pretty thoughtfully and carefully, taking a variety of trade-offs and issues into account. I’ve also tried to get across some of the basic realities of content moderation that Elon seems to have had difficulty grasping, including how he totally misunderstood the purpose and intent of Twitter’s verification process.

      • Democracy NowGeorgia: Warnock-Walker Senate Race Could Head to Runoff; Gov. Kemp Defeats Abrams

        Georgia Democratic Senator Raphael Warnock and his opponent Republican Herschel Walker will likely head to a runoff if neither candidate wins 50% of the vote needed to win the election outright. Warnock was able to capture more white and rural votes than Stacey Abrams, who lost to Georgia’s incumbent Republican Governor Brian Kemp, explains ​​LaTosha Brown, co-founder of Black Voters Matter Fund. “Voter suppression has had an impact in this election,” says Brown, who joins us from Atlanta and notes how mail-in ballots in Georgia went down since 2018. We also continue our conversation with John Nichols, who describes the impact of gerrymandering in the tight House races and the Ohio Senate race, which he says was a “big loss for Democrats.”

      • Democracy NowToo Close to Call: Control of Senate Hinges on Races in Wisconsin, Georgia, Arizona & Nevada

        The balance of power in Congress is still up in the air after Democratic candidates outperformed expectations in much of the country in Tuesday’s midterm elections. Control of the Senate now rests on four states: Wisconsin, Georgia, Arizona and Nevada. We speak with The Nation’s John Nichols, who says Democratic Senate candidate Lieutenant Governor Mandela Barnes could still close the gap with Republican incumbent Ron Johnson in Wisconsin, who now has the advantage. He also says that while Republicans look favored to win the Senate seat in Nevada, the race has ended up closer than expected. “Nevada can surprise you at the end,” says Nichols.

      • Telex (Hungary)Hungarian press abuzz with resignation of minister overseeing energy – official government communication all about Uzbekistan
      • Telex (Hungary)Gulyás on new price caps and changes in public procurement law
      • TruthOutVoters Rebuked Trump’s Bid to Seed the US Political System With MAGA Loyalists
      • TruthOutYoung Voters Are Driving “Generational Shift” to the Left, Ocasio-Cortez Says
      • TruthOutThe Right Did Worse Than Expected, But That Shouldn’t Satisfy Progressives
      • TruthOutDon’t Let the “Red Ripple” Overshadow the Local-Level Progressive Victories
      • TruthOutExperts Say GOP House Takeover Would’ve Been Impossible Without Gerrymandering
      • Misinformation/Disinformation/Propaganda

        • CNN‘The Crown’ Season 5 takes dramatic liberties, but here’s where they lean into history

          Esteemed actress Dame Judi Dench cosigned in a letter to The Times, calling on Netflix add a disclaimer to the series.

          “No one is a greater believer in artistic freedom than I, but this cannot go unchallenged,” Dench wrote. “Despite this week stating publicly that The Crown has always been a “fictionalised drama” the programme makers have resisted all calls for them to carry a disclaimer at the start of each episode.”

        • What Truth Does The Crown Owe the Monarchy?

          The scene might as well be a metaphor for The Crown itself, and show creator Peter Morgan is smart enough to recognize it. The series is fictional, which means it should not be treated with the authority of biography. It’s a dramatization rooted in well-established fact, scandalous rumors, and historical accounts from hundreds of sources with differing ulterior motives, including those within Buckingham Palace’s walls. Not everything depicted on screen actually happened. Plenty of it did. Either way, like in all fiction, there is a truth Morgan is attempting to uncover as his characters re-trace the known footsteps of Queen Elizabeth II’s reign. There is a truth that the palace tried (and continues to try) to bury, whether out of duty, embarrassment, or a tepid brew of both.

        • The Guardian UKPrincess Anne actor says disclaimers on The Crown would ‘patronise’ viewers

          Adding disclaimers to The Crown would “patronise” its worldwide audience, claims the actor who plays Princess Anne in the fifth series of the hit Netflix miniseries.

          Claudia Harrison, 46, was responding to criticism of the drama after the Queen’s death, which included former prime ministers Sir John Major and Sir Tony Blair objecting to their depictions – while Dame Judi Dench called for a disclaimer to be added to each episode.

    • Censorship/Free Speech

    • Freedom of Information / Freedom of the Press

    • Civil Rights/Policing

      • The NationThe Story of Baby O—and the Case That Could Gut Native Sovereignty

        On November 9, the Supreme Court heard arguments in Haaland v. Brackeen. It is a sprawling case—one of the most important of the term—with potentially seismic implications for Indigenous nations in the United States. In addition to the Librettis, it hinges on the stories of two other pairs of non-Native foster parents, who collectively wanted to adopt four Native children: Chad and Jennifer Brackeen of Texas and Danielle and Jason Clifford of Minnesota. The plaintiffs are joined in trying to overturn the law by the State of Texas; defending ICWA are four federally recognized tribes (the Cherokee Nation, Oneida Nation, Quinault Indian Nation, and Morongo Band of Mission Indians) and the federal government.

        For the last three years, I have researched Brackeen, digging through the underlying custody cases along with my colleagues Amy Westervelt, Maddie Stone, and Anh Gray. In the process, I found persistent and troubling similarities. Two of these stories—those of the Brackeens and Cliffords—became the basis of the second season of This Land, a podcast I host. This is the first time I’m sharing the story of the Librettis.

      • BBCThe Kerala Story: Film on India women in Islamic State sparks row

        In the teaser – for an upcoming movie called The Kerala Story – an actress claims her character is one among 32,000 women from the state who were “converted” into Islamic terrorists.

        Some politicians from the state have called for the film to be banned.

        A journalist has written to the state’s chief minister seeking an inquiry.

      • FAIR‘This Case Was Never About Defending Asian Americans’

        Janine Jackson interviewed Coalition for a Diverse Harvard‘s Jeannie Park about affirmative action at Harvard University for the November 4, 2022, episode of CounterSpin. This is a lightly edited transcript.

      • EFFThe Rise of the Police-Advertiser

        All these stories have two things in common: One, they are all about the same brand of ALPRs, Flock Safety. And two, they’re all reminders of how surveillance technology companies are coaching police behind the scenes on how best to tout their products, right down to pre-writing press releases for the police.

        Flock Safety has distributed a Public Information Officer Toolkit, providing “resources and templates for public information officers.” A Flock draft press release states:

        This Mad Libs of a press release is an advertisement, and one Flock hopes your police departments will distribute so that they can sell more ALPRs.

      • EFFEFF Award Winner: Kyle Wiens

        The EFF Awards is a new ceremony dedicated to the growing digital rights communities whose technical, social, economic, and cultural contributions are changing the world. We can feel the impact of their work in diverse fields such as journalism, art, digital access, legislation, tech development, and law.

        All are invited to attend the EFF Awards ceremony! The celebration will begin at 6 pm. PT, Thursday, November 10 at The Regency Lodge, 1290 Van Ness Ave. in San Francisco. Register today to attend in person. At 7 pm PT, the awards ceremony will stream live and free on Twitch, YouTube, Facebook, and Twitter.

        We are honored to present our three winners of this year’s EFF Awards: Alaa Abd El-Fattah, Digital Defense Fund, and Kyle Wiens. But before the ceremony kick off, we want to take a closer look at each of our honorees. Up next, Kyle Wiens, EFF Award for Right to Repair Advocacy:

      • Common DreamsVoters in Four States Approve Bans on Forced Prison Labor

        Voters in Alabama, Tennessee, Oregon, and Vermont approved ballot measures Tuesday that would bar forced labor as punishment for those convicted of crimes in those states—an effort to close what some characterize as a “slavery loophole” contained in many state constitutions as well as within the U.S. Constitution’s 13th Amendment, which put an end to chattel slavery in 1865.

        “The idea that we as a state have said that no human being—regardless of their past—should be considered a slave or involuntary servant, how is that not exciting?”

      • The NationForced Prison Labor Was Also on the Ballot

        Terrancé Akins worked the entire seven years that he was incarcerated in the Hardeman Correctional Facility, a private prison contracted to imprison people in Tennessee.

      • Counter Punch‘Nothing Works’: Europe Must Stop Blaming Others for Its Own Crises

        Borrell’s recent comments that “Europe is a garden” and that “the rest of the world is a jungle” were duly condemned as ‘racist’ by many politicians around the world, but mostly in the Global South. Borrell’s remarks, however, must also be viewed as an expression of superiority, not only of Borell personally, but of Europe’s ruling classes as a whole.

        Particularly interesting about the EU top diplomat’s words are these inaccurate depictions of Europe and its relationship with the rest of the world: “We have built a garden”, “everything works” and “the jungle could invade the garden”.

      • Site36After years of EU funding: Maritime emergency centre in Libya „not operational“

        Since 2017, the EU has invested in one project alone at least €57 million to counter migration from Libya. The Brussels backers also are worried about their reputation.

      • MeduzaTomsk man prosecuted for using secure messaging app — Meduza

        A court in Tomsk has sentenced a 31-year-old man to three years of “restricted freedom” for “using a harmful program” on his computer.

      • Democracy Now“Abortion Rights Are Deeply Popular”: Voters Back Reproductive Freedom in State Ballot Initiatives

        Voters supported the right to abortion in at least four of the five states where reproductive rights were on the ballot in Tuesday’s midterm elections. “Abortion rights are deeply popular, and when you put the question before voters, they say yes,” said The Nation’s Amy Littlefield. She also discusses Vermont becoming the first state to enshrine abortion rights in its constitution, as well as the “historic win” in Kentucky, where voters defeated an anti-abortion ballot initiative.

    • Internet Policy/Net Neutrality

      • TechdirtAs Predicted, Starlink Launches Broadband Usage Caps, Overage Fees

        We’ve noted for a while that the laws of physics would prohibit Elon Musk’s satellite broadband service from being truly disruptive at any real scale. Analysts had been quietly noting for a while that Starlink lacked the capacity to handle its projected user load. That recently resulted in obvious slowdowns, raising the question of when the company would inevitably examine throttling and usage caps.

    • Digital Restrictions (DRM)

      • TechdirtAd-Based Netflix Arrives, But It’s A Bit Of A Mess

        After years of explosive growth, Netflix lost nearly a million subscribers between April and July of this year. In part due to new competition in streaming, but also because Netflix executives are stuck in this auto-cannibalism loop; sacrificing what’s popular about the service (affordability, no ads, few weird restrictions, decent content) to feed Wall Street’s insatiable need for quarterly growth.

    • Monopolies

      • Patents

        • TechdirtThe UK Wants A Trade Deal With India That Would Boost The Already Healthy Profits Of Big Pharma, And Cause Millions Of People To Sicken

          Although trade deals are nominally about, well, trade, Techdirt readers know that they have become an important way to force through changes in areas like copyright and patents without any meaningful democratic scrutiny. That’s because trade deals are negotiated in secret, and then presented as done and dusted once talks have been concluded. The argument typically rolled out is that it was “necessary” to make various concessions in the area of copyright and/or patents in order to obtain a deal, and that now the final text has been agreed, nothing can be done about it.

      • Copyrights

        • Torrent FreakOnce Branded Notorious Pirates, Sites Agree to Filter Out Pirated TV Shows

          Around a decade ago, when the RIAA informed the USTR that two Czech ‘cyberlockers’ were causing problems, their chances of survival seemed somewhat limited. Today, Hellspy and Hellshare are still going strong but after months of negotiations with local TV companies, significant change lies ahead. More serious problems with the music industry could derail everything.

        • Torrent FreakCourt Upholds Piracy Blocking Order Against Cloudflare’s DNS Resolver

          The Court of Rome has confirmed that Cloudflare must block three torrent sites through its public DNS resolver. The blockade was requested by several major record labels and arrives after Italy’s telecoms regulator ordered local ISPs to block the sites. Cloudflare is not pleased with the order and previously noted that such broad measures set a dangerous precedent.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Links 10/11/2022: Raspberry Pi Shortages

Posted in News Roundup at 6:29 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

    • Applications

      • Beebom8 Best Screen Recorders For Linux (2022) | Beebom

        If you are searching for how to record the screen in Ubuntu, we have already explained using the built-in screen recorder and third-party apps. However, for those using other Linux distros, we have compiled a list of the best screen recorders for Linux users. We are aware that users have different use cases. While some want to capture the screen with a webcam for recording tutorials, others simply want to make a short GIF with the screen recording. Keeping these points in mind, here are the 8 best screen recording software for Linux you should test out. From basic to advanced tools, we have added all the popular screen recorders to this list. So on that note, let’s dive right in.

    • Instructionals/Technical

      • Linux Shell TipsHow to Install Node.js and NPM on Rocky Linux

        This article guide will walk us through the installation of Node.js on the Rocky Linux 9 and Rocky Linux 8 distributions and also demonstrate its basic usage.

        Node.js is a JavaScript runtime that is free and open-source to the Linux community. As for its development, it’s built on Chrome’s V8 JavaScript engine.

        Node.js enables developers and users to build scalable and high-performance network applications. Its wide range of features makes it ideal for the development of distributed device applications as it attributes the apps as data-intensive and real-time.

      • H2S MediaInstall Microsoft SQL Server 2022 preview on Ubuntu 20.04 LTS [Ed: It's not only proprietary and controlled by Microsoft; it also doesn't really run on GNU/Linux or Ubuntu; it's just Drawbridge and should be avoided; there are better DBs]
      • Linux NightlyLinux Count Files in Directory – Linux Nightly

        Learn how to count the number of files in a directory by using ls and find commands on Linux.

      • Linux CapableHow to Install WoeUSB on Linux Mint 21/20

        WoeUSB is a free, open-source simple tool that enables you to create your own USB stick windows installer from an iso image or an actual DVD. I have used it myself to create bootable USB sticks for installing Windows from ISO images, and it has worked flawlessly every time. The interface is straightforward to use. Select the ISO image or DVD you want to use, select your USB drive, and click “Create.” The process is quick and painless, and the results are always perfect. If you need to install Windows from a bootable USB stick, WoeUSB is the ideal tool for the job.

        The following tutorial will teach you how to install WoeUSB on the Linux Mint desktop release series using a LaunchPAD APT PPA with the command line terminal. This installation method will allow you to run in CLI mode or use the graphical mode interface.

      • Linux CapableHow to Install Python 3.11 on Linux Mint 21/20

        Python 3.11 release promises up to 60% speed improvements in some instances, which is a significant jump from the 25% improvement in the standard benchmark suite. This will excite data scientists who often have to work with large datasets. Not only will their programs run faster, but they’ll also be able to get insights from their data more quickly. This will lead to better decision-making and, ultimately, better outcomes for their organizations. For the official Python 3.11 rundown notes, visit the official Python webpage What’s New in Python 3.11.

        In the following tutorial, you will learn how to install Python 3.11 on Linux Mint 21 and 20, given both are LTS releases based on Ubuntu using the command terminal, and how to download and compile as an alternative method.

      • Linux CapableHow to Install FreeOffice on Ubuntu 22.10 | 22.04 | 20.04

        FreeOffice is a free, open-source office suite with a word processor, spreadsheet application, and presentation program. The suite is compatible with Microsoft Office, making it an ideal choice for users who want an alternative to expensive proprietary software. FreeOffice offers all the features of a mainstream office suite, including support for complex documents, multimedia elements, and more. The suite also includes several unique features, such as opening and editing password-protected files. Whether you’re looking for an affordable alternative to Microsoft Office or a free and open-source option, FreeOffice is worth checking out.

        In the following tutorial, you will learn how to install FreeOffice on an Ubuntu desktop with the current significant releases supported and tested with the official SoftMaker APT repository using the command line terminal and instructions on how to update and remove the software in the future if required.

      • Linux CapableHow to Install Code Blocks on Fedora 37/36/35

        Code::Blocks is free and open-source software highly extensible Integrated Development Environment (IDE) for the C, C++, and Fortran programming languages. It features support for a wide range of compilers, parallel builds, and multi-target projects and also provides an interface with GNU GDB. The code editor in Code::Blocks features syntax highlighting, code folding, a tabbed interface, code completion, a class browser, and smart indenting.

        In the following tutorial, you will learn how to install Code::Blocks on Fedora 37 or 36 Linux desktop with either DNF or Flatpak package manager using the command line terminal and instructions on updating and removing the software in the future if required.

      • Linux NightlyHow to Install Foobar2000 on Ubuntu 22.04 – Linux Nightly

        Learn how to install Foobar2000 music player on Ubuntu using Snap package manager or manually with Wine.

      • LinuxTechiHow to Install Docker on openSUSE Leap 15

        Are you looking for an easy guide on how to install docker on openSUSE Linux?

        The instructions on this page will show you how to install docker on openSUSE Leap 15.4.

        Docker provides software platform where we can build, test and package application in a container image. Using the container image, we can quickly deploy application because that container image will have all the libraries, code, system tools and run time.

      • DebugPoint5 Ways to Fix Could not get lock /var/lib/dpkg/lock Error in Ubuntu

        We explain some steps and methods by which you can quickly fix the Could not get lock /var/lib/dpkg/lock error, which is common in Ubuntu Linux.

      • DebugPointHow to Upgrade to Linux Mint 21 from Mint 20.3 [Complete Guide]

        This guide gives you all the information you need to Upgrade to Linux Mint 21 (Vanessa) from Linux 20.3.

        Linux Mint 21 Vanessa was recently released with the latest Ubuntu 22.04 base and other additional features. If you are running the earlier Linux Mint 20.3, now it is possible to do a major version upgrade using the graphical tool by Linux Mint.

        But before you upgrade, you need to do some housekeeping because major version upgrades always come with a fair amount of risk.

        That said, make sure of the following before performing the upgrade.

  • Distributions and Operating Systems

    • BSD

      • TecMintGhostBSD – A Unix-like OS Based on FreeBSD with MATE Desktop

        GhostBSD is an open-source Unix-like desktop operating system created upon the most recent release version of FreeBSD. GhostBSD purpose is to make the experience of FreeBSD easy and obtainable for the regular computer user by providing MATE and XFCE as the default desktop environment, but as of now, MATE is the only official DE.

        GhostBSD comes with a graphical application to install software and updates, and most of the multimedia codes are pre-installed. The installer advantage OpenZFS makes it easy to install GhostBSD on ZFS with another operating system on the same disk and is appropriate for beginners who are new to FreeBSD.

        With modest hardware requirements, GhostBSD is excellent for modern workstations and 64-bit single-board computer hardware.

        Recently, the GhostBSD project has announced the availability of GhostBSD 22.06.18, which is the new release that comes with a number of new improved features, better Nvidia driver support, and a number of desktop utilities.

      • KlaraVirtualization showdown – FreeBSD’s bhyve vs. Linux’s KVM Virtualization   – Klara Inc.

        Not too long ago, we walked you through setting up bhyve on FreeBSD 13.1. Today, we’re going to take a look specifically at how bhyve stacks up against the Linux Kernel Virtual Machine—but before we can do that, we need to talk about the best performing configurations under bhyve itself.

        When we talk about configuration options that have a massive performance impact, we’re mostly talking about storage configuration—CPU configuration options tend to be fairly straightforward, but storage can be configured with different back-end formats and virtual controllers, which can have a massive impact on both throughput and latency.

        OpenZFS is the only back-end storage stack we’ll be testing today—its performance is generally excellent, and its feature set for virtual machine hosting is unparalleled.

    • Fedora and Red Hat

      • Fedora ProjectFedora Hatch Recap 2022 – Fedora Community Blog

        Fedora Hatches took place across the globe this summer! Take a look at what the attendees experienced at each Hatch.


        The Fedora Hatch in Pune India was a fun two-day event, organized by Akashdeep Dhar and Samyak Jain. The official meet-and-greet took place on day one on 7th July 2022 at the Red Hat office in Pune where people discussed many free and open-source technologies such as Wayland, X11, Pulse Audio etc. Cool swags like Fedora Hatch Pune India branded water bottles and Fedora Project hats were handed out. This was followed by the attendees enjoying a delicious lunch at Taco Bell, Seasons Mall, Pune.

      • Red HatImplement a RestAPI application with MongoDB using SBO

        This article concludes a two-part series about deploying a REST API application and binding it to a MongoDB using odo and a Service Binding Operator. Part 1, Setup Openshift cluster to deploy an application in odo CLI, explained the value of odo in managing a cluster and the applications in it. In that article, we installed both odo and the Service Binding Operator. Now you will learn how those tools easily create an instance of a database and a binding (connection) between the application and database.

      • Red HatSet up Openshift cluster to deploy an application in odo CLI

        Binding is the task of finding a backing service and connecting it to an application, such as a database. There are several ways to bind applications to cloud services in Kubernetes and Red Hat OpenShift. The odo command-line interface (CLI) consolidates steps that developers normally have to perform manually, and abstracts away Kubernetes and OpenShift background concepts.

        With odo, you can concentrate on creating applications instead of administering the cluster. The odo tool automates deployment configurations, build configurations, service routes, and other Kubernetes and OpenShift elements.

        The Service Binding Operator, employed by odo, makes the application developer’s life a lot easier by providing a consistent and declarative Service Binding method.

        This two-part series demonstrates how to use odo to create an application and a database service, bind the application to the database using the Service Binding Operator, and get access to the application’s REST API. This article prepares the environment with the necessary tools. In part 2, Implementation of RestAPI application with MongoDB using SBO, we will install MongoDB and the application, and bind them together.

      • Enterprisers Project5 Harvard Business Review articles that will resonate with CIOs right now

        Through our partnership with Harvard Business Review, we regularly refresh our resource library with five new HBR articles we believe CIOs and IT leaders will value highly.

      • Enterprisers ProjectDigital transformation: How to avoid team burnout

        Digital enablement has become a core tenet of every part of a business – and staying on top of rapidly evolving innovations in digital transformation has never been more stressful for tech teams.

    • Canonical/Ubuntu Family

      • The Register UKOpenPrinting keeps old printers working, even on Windows • The Register [Ed: Canonical is boosting Windows instead of Ubuntu]

        The OpenPrinting project – together with Windows Services for Linux – enables printers that Windows no longer supports to work on Windows 11.

        We know that some Reg readers still actually prefer Windows. Maybe it’s like those hardcore users of Vi and Emacs in the 21st century: some sort of software-induced Stockholm Syndrome. If you are one of them, it’s OK. The penguin is here for you. It can help and can aid Windows 11 users, in particular.

    • Open Hardware/Modding

      • ArduinoWoody brings class to the world of RPN calculators | Arduino Blog

        RPN (Reverse Polish notation) is a method for writing or entering mathematical calculations wherein operators come after operands. For instance, to calculate the product of 3 and 4, you would type: 3, enter, 4, enter, multiplication. This is unfamiliar to most of us, but was common for Hewlett-Packard’s early digital calculators and is still used in some programming languages, like Forth. Some people prefer RPN calculators and this one, called Woody, is the most beautiful of the bunch.

        Woody is a fairly simple RPN calculator, which was its entire purpose. Most of the RPN calculators available are complicated scientific or graphing calculators. Shiura wanted basic calculator functionality, but with RPN. It is also gorgeous. The enclosure is a solid chunk of walnut wood, which was milled on a CNC router. Other than a large power switch on the back, the only features are 19 keys and a dot-matrix style LCD screen.

      • Tom’s HardwareRaspberry Pi Shortages Could Last Another Year | Tom’s Hardware

        In a recent interview with Micro Center, Raspberry Pi CEO Eben Upton, Upton has talked about the ongoing Raspberry Pi shortage. It looks like we are set for a further year of Raspberry Pi shortages, and between 60 and 70% of boards going into the industrial market. Many thanks to LeePSPVideo for bringing this story to our attention.

      • Make Tech EasierHow to Control LED Brightness on a Raspberry Pi With PWM – Make Tech Easier

        If you had fun making LEDs blink on a Raspberry Pi, wait until you hear about controlling its brightness! In this guide, we work with a pair of buttons to adjust the led brightness on a Raspberry Pi.

  • Free, Libre, and Open Source Software

    • OpenSource.com4 key differences between Twitter and Mastodon | Opensource.com

      Social media is not always sociable, and sometimes we need a sufficient impetus to change what we do and what we read. I began using Twitter as a replacement for my RSS reader in 2008, which revolutionized how I read and learned up to that point. Tweets from educators and free and open source (FOSS) advocates worldwide kept me informed and engaged in a learning network that was without equal. That’s changed over the past half dozen years, and recently a change in ownership and the shaping of what I read was driven more by an algorithm than by my personal interests and choices. During a yearly meetup of correspondents and editors of Opensource.com a few years ago, Seth Kenlon suggested giving Mastodon a try. I joined Fosstodon in 2019. Fosstodon is a Mastodon instance for a community of like-minded people who enjoy free and open source software.

    • Why Mastodon instances are difficult to scale – Lukáš Zapletal

      Mastodon, the free, open-source social network server based on ActivityPub is written in Ruby on Rails and the network is experiencing influx of new users. Mastodon administrators are finding how difficult and costly is to scale Ruby on Rails applications the hard way. I’ve spent a deacde working on a large Ruby on Rails project, much larger than Mastodon. Let me quickly describe what is going on. Disclaimer: This post is solely based on my experience with scaling other Ruby on Rails applications, take this with a grain of salt. Also, I’d appreciate comments at @lukas@zapletalovi.com.

      People often think that Ruby on Rails is slow because Ruby is slow, according to various benchmarks and shootouts. Well, while Ruby is not fast at all, it is not the primary reason why that is. See, most web applications, including Mastodon, do not perform CPU-intensive tasks. Most of the time, CPU is actually waiting for data to be read or written from network (client, database, redis) or disk (cache). Even if you upgrade to the most recent Ruby 3.2, which is the fastest of all Ruby versions, it won’t help at all.

      Backend software these days need to respond to many of HTTP requests, when a service is under load we are speaking about hundreds or even thousands of requests per second. A single process (instance of software running on an operating system) with naive implementation can handle as much as one request. To be able to handle more, requests must be dealt concurrently, which is a very complex topic but let’s keep in simple. The solution is to create multiple execution threads that can run concurrently on the program level and ideally in parallel on the operating system level to utilize as much CPU resources available.

    • Web Browsers/Web Servers

      • Mozilla

        • Andrew’s Searchfox Roadmap 2022 | visophyte: shiny? shiny.

          Searchfox (source, config source) is Mozilla’s primary code searching tool for Firefox introduced by Bill McCloskey in 2016 which built upon prior work on DXR. This roadmap post is the second of two posts attempting to lay out where my personal efforts to enhance searchfox are headed and the decision making framework that guides them. The first post was a more abstract product vision document and can be found here.


          Bug 1799796: Do you really wish that you could issue a query like webidl:CacheStorage to search just our WebIDL files for “CacheStorage”? Does your team have terminology that’s specific to your team and it would be great to have special search terms/aliases but it would feel wrong to use up all the cool short prefixes for your team? The new query mechanism has plans for these situations!

          The new searchfox query endpoint looks like /mozilla-central/query/default. You’ll note that default looks like something that implies there are non-default options. And indeed, the plan is to allow files like this example “preset” dom.toml file to layer additional “terms” and “aliases” onto the base query_core.toml file as well as any other presets you want to build off of. You will need to add your preset to the mozsearch-mozilla repository for the tree in question, but the upside is that any query links you share will work for other people as well!

    • Education

      • MedevelSekoliko is An Open Source Free School Management System

        Sekoliko is a free self-hosted web-based school management system. It is built on top of PHP and Symphony framework.

        It offers a management layout for teachers to put their educational materials, online courses, reports, manage their classes, students, homework, and exams.

        The school admins can manage teachers, employees, and management tasks with their own panels.

    • Programming/Development

      • OpenSource.comAudit your sharding database algorithm | Opensource.com

        Thanks to the ShardingSphere community’s continuous review and feedback to develop features such as data sharding and read/write splitting, our team found that some users create many shards when using the data sharding feature.

        In such cases, there can be 1,000 physical tables corresponding to a sharding logical table, which disturbs users.

        For instance, a SELECT * FROM t_order statement will lead to a full-route, which is obviously not the case for OLTP. This SQL can be placed in another Proxy to avoid blocking other requests.

        However, if users are not familiar with Proxy or how to write a where condition and don’t know that sharding is not supported in this condition, a full-route is still required.

        A full-route can lower the performance of Proxy and even result in the failure of a reasonable request. Imagine that there are 1,000 shards in a physical database. If they are executed in parallel, 1,000 connections are needed, and if in serial, the request can lead to a timeout. For this reason, community users asked whether the unreasonable request could be intercepted directly.

        Our team considered the issue for a while. One option is to simply block the full-route operation. Doing so requires a check in the code and adding a switch to the configuration file. On the other hand, if the user later needs to set a table to read-only or requires the update operation to carry a limit, does that mean the code and configuration change again? This approach obviously goes against the pluggable logic of Proxy.

        In response to the above problems, the recently released Apache ShardingSphere 5.2.0 provides users with auditing for the SQL sharding function. The audit can either be an interception operation or a statistical operation. Similar to the sharding and unique key generation algorithms, the audit algorithm is plugin-oriented, user-defined, and configurable.

      • Shell/Bash/Zsh/Ksh

        • HowTo GeekHow to Get Your Public IP in a Linux Bash Script

          You’ll need your external IP address if you want to remotely connect to your computer. Finding it manually is easy, but here’s how to find your it from within a Linux script.

  • Leftovers

    • Hardware

      • CNX SoftwareMediaTek unveils Dimensity 9200 Octa-core Cortex-X3/A710/A510 5G mobile processor

        MediaTek has just launched the Dimensity 9200 octa-core flagship 5G mobile processor with one Cortex-X3 core, two Cortex-A710 cores, and four Cortex-A510 cores, as well as the latest Arm Immortalis-G715 GPU.


        The Dimensity 9200 notably offers 10% extra CPU performance switching from a Cortex-X2 to Cortex-X3 core, provides up to 30% power savings with AI-NR and 45% power savings with AI-SR in all visual applications, and the new 6th generation APU 690 delivers up to 35% faster performance in ETHZ5.0 benchmark (aka AI Benchmark) compared to the fifth generation APU found in the Dimensity 9000.

    • Linux Foundation

      • Silicon AngleThree insights you might have missed from KubeCon + CloudNativeCon [Ed: Sponsored junk]

        (* Disclosure: TheCUBE is a paid media partner for the KubeCon + CloudNativeCon NA event. Neither Red Hat, the main sponsor for theCUBE’s event coverage, nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)

      • TechTargetLooking back on KubeCon + CloudNativeCon 2022

        At the Cloud Native Computing Foundation’s flagship KubeCon + CloudNativeCon conference, held in Detroit from Oct. 24-28, 2022, the over 290 sponsors and almost 8,000 attendees who showed up in person said “yes.”

        CNCF executive director Priyanka Sharma kicked off the keynote with the new Humans of Cloud Native project. Highlights included the CNCF’s growth, with its 176,362 contributors, over 1,000 maintainers and 7 million developers. The growth included an increase of 172 end users and 835 members, according to Sharma.

      • Computer WeeklyKubernetes and the open-source maintainer question[Ed: Sponsored junk; same media outlet as the above]

        While much of last month’s KubeCon-CloudNativeCon North America was focused on specific software projects, case studies and tech challenges, there was a discernible undercurrent of concern. And it wasn’t just about specific projects, it was to do with keeping the open-source movement going as a whole.

        The key words here were ‘contributors’ and ‘maintainers’. These are the people who keep projects alive and well, the former by contributing ideas and code, and the latter by pulling it all together and managing the project.

    • Security

      • IT WireiTWire – Optus sets aside $140m for costs associated with data breach

        Telco Singtel Optus has set aside $140 million for costs associated with the catastrophic breach it announced in September, with the company announcing this as part of its half-year results on Thursday.

        The money is for paying for replacement of identity documents such as passports and driving licences and also recovery activities.

        In a statement, chief executive Kelly Bayer Rosmarin said: ““We recognise how painful the exposure of personal information from the cyber attack on Optus customers has been, and we are deeply sorry.

        “We have listened to our customers’ feedback and are committed to finding improvements and ensuring a safer future against cyber crime.

      • Hacker NewsNew UEFI Firmware Flaws Reported in Several Lenovo Notebook Models [Ed: UEFI is the opposite of security and can impose back doors]

        PC maker Lenovo has addressed yet another set of three shortcomings in the Unified Extensible Firmware Interface (UEFI) firmware affecting several Yoga, IdeaPad, and ThinkBook devices.

        “The vulnerabilities allow disabling UEFI Secure Boot or restoring factory default Secure Boot databases (incl. dbx): all simply from an OS,” Slovak cybersecurity firm ESET explained in a series of tweets.

        UEFI refers to software that acts as an interface between the operating system and the firmware embedded in the device’s hardware. Because UEFI is responsible for launching the operating system when a device is powered on, it has made the technology an attractive option for threat actors looking to drop malware that’s difficult to detect and remove.

      • Hacker NewsHigh-Severity Flaw Reported in Critical System Used in Oil and Gas Companies

        Cybersecurity researchers have disclosed details of a new vulnerability in a system used across oil and gas organizations that could be exploited by an attacker to inject and execute arbitrary code.

        The vulnerability, tracked as CVE-2022-0902 (CVSS score: 8.1), is a path-traversal vulnerability in ABB Totalflow flow computers and remote controllers.

        “Attackers can exploit this flaw to gain root access on an ABB flow computer, read and write files, and remotely execute code,” industrial security company Claroty said in a report shared with The Hacker News.


        “A successful exploit of this issue could impede a company’s ability to bill customers, forcing a disruption of services, similar to the consequences suffered by Colonial Pipeline following its 2021 [Microsoft Windows] ransomware attack,”

    • Defence/Aggression

      • Jacobin MagazineAustralia Is a Subimperial Enforcer of the US-led Order

        The foreign affairs establishment describes Australia as a “middle power” in the “rules-based global order.” They’re wrong — Australia should be understood as a subordinate beneficiary of US imperialism.

    • Environment

      • teleSURInternational Drought Resilience Alliance Launched at COP27 | News | teleSUR English

        The mission of the alliance is to give political impetus to make the land’s resilience to drought and climate change.

        On Monday, leaders from nearly 50 countries launched the International Drought Resilience Alliance at the 27th United Nations Conference on Climate Change (COP27) to help countries to be better prepared for future droughts.

    • Finance

      • IT WireiTWire – Exactly what is wrong with a soldier earning his keep abroad after retirement?

        Australia loves to raise fears over anything to do with countries that it considers, well, below its exalted status, a status that exists only in the world of fiction.

        The latest such reaction relates to defence personnel who have been allegedly approached to work with China’s army. The matter came to light in the wake of news that former UK defence officials are earning a goodly sum in the Middle Kingdom.

        According to the ABC, which often gets quite worked up about such issues, “Defence Minister Richard Marles has announced an urgent review into the existing rules and regulations, amid serious concerns Beijing is using lucrative contracts to try to lure former ADF personnel to train its military.”

        This smacks of hypocrisy given that Australia has no qualms over hiring ex-US Navy admirals who have potential conflicts of interest to advise on its submarine purchases.

      • CNNLayoffs could weaken Twitter in its biggest global growth markets
    • Censorship/Free Speech

      • Internet Freedom FoundationA public brief on the IT Amendment Rules, 2022 a.k.a ‘how the government is trying to moderate online speech’

        On October 28, 2022, the Ministry of Electronics and Information Technology (“MeitY”) notified the Amendments to the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 (“IT Rules, 2021”). The notified rules, i.e. the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Amendment Rules, 2022 (“IT Amendment Rules, 2022”) have introduced changes in Part I and II of the IT Rules, 2021. As a result of these amendments, the compliance burden on intermediaries, and as an extension the risk to their safe harbour protections, has increased. Further, MeitY has introduced an additional layer of censorship, wherein government-appointed committees will have a say in what content stays up on the internet, and what doesn’t. We are releasing our Public Brief on the IT Amendment Rules, 2022 in public interest as these rules affect the democratic and constitutional rights of each and every internet user.


        The IT Rules, 2021, whose legality is contentious, undermines the fundamental right to freedom of speech and expression and privacy for millions of internet users in India. The IT Rules, 2021 have been unequivocally criticised by experts, civil society, digital rights groups, industry bodies, technology companies, technical groups and members of the press. The Editors Guild of India in their statement on IT Rules, 2021 pointed out how they go beyond intermediaries to now even regulate publishers while stating they, “fundamentally alter how publishers of news operate over the internet and have the potential to seriously undermine media freedom in India”. They also stated that “various provisions in these rules place unreasonable restrictions on media at large”. Special Rapporteurs from the United Nations have called these rules incompatible with “international law and standards related to the right to privacy and to freedom of opinion and expression” and sought their withdrawal.

        We have, in the past, written to MeitY and published a detailed analysis listing our issues with the IT Rules, 2021. There are multiple court orders that record the legal deficiencies and constitutional injuries caused by the IT Rules, 2021. Here, IFF’s work includes strategic litigation where it has provided legal representation to LiveLaw Media Pvt. Ltd. before the Kerala High Court which by order dated March 10, 2021 has directed the Union Government to not take coercive action against LiveLaw Media Pvt. Ltd. under Part III of the IT Rules, 2021. IFF is also representing Mr. T.M. Krishna in proceedings before the Madras High Court where a Division Bench of Court has stayed Rules 9(1) and 9(3) of the IT Rules, 2021 while observing that the oversight mechanism in the Rules may “rob the media of its independence”.

        Hence, on the basis of the clear and sufficient existing evidence, it is clear that the IT Rules, 2021 cause injury to the constitutional and democratic rights of Indian internet users. They are contrary to the mandate of the Supreme Court in Shreya Singhal v. Union of India (2015, 5 SCC 1) and deserve a complete recall.

    • Freedom of Information / Freedom of the Press

      • Declassified UKSecret power: The war on WikiLeaks

        A new book by Italian investigative journalist Stefania Maurizi documents attempts to demonise and destroy Julian Assange and WikiLeaks

  • Gemini* and Gopher

    • Technical

      • Programming

        • Python string quoting

          If you were looking for a python equivalent of strconv.Quote or using json.dumps(str) to quote strings, then you are a clod – such as me. Another reminder that looking at the documentation of the standard library is very useful.

          It never occurred to me that codecs (str.encode) are used not only for converting between text encodings like utf-8 ↔️ cp1251, but also for all sorts of formats like base64, bzip (sic!) and uu. In particular, the set of standard codecs includes ‘unicode_escape’, which escapes all characters that make a string unrepresentable as a Python literal in source code.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

IRC Proceedings: Wednesday, November 09, 2022

Posted in IRC Logs at 2:13 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now

IPFS Mirrors

CID Description Object type
 QmdBHrQrC6UbCH93cWEcKxvQGAd56SjC8GvrMd5XLVrTgc IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmQA3bXfcSKQx4sr1URjAMjMeAxCnWfcaeW4yhFeagMM1x IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 Qmcfhj7UP6cWj4atz2N1GVonA5jHsbqPRfxPyEv7kUD5fE IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmTPcbkuLHGUiXSBEF6UGHsFrmMMNaTCkx4ebQLSuTigWA IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmYxpCqj7Q2N4DbjRcyDGTPPBHjAKKaENJcUWnvUgZHd3z IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmQ2wnjtAGfdy7ZSqFfqYjANwgiKaYjrzv5QoQeUVeucTt IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmS2tcPjz2BxnnfhWX222xr7aTxDpeGydQEDJg95As8KcS IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmbPC14bqn9y5NtSRUY1AGfT9pdpwBPCyLEGbaUVPqCNFW IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmQS4yFupXPo1svfrLiFxv6BB7gRHbYFynrvyydPucmB9q

Links 10/11/2022: Deepin 23 Alpha and Thunderbird Supernova Preview

Posted in News Roundup at 12:31 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Audiocasts/Shows

    • Kernel Space

      • FLOSS Weekly 706: Secrets of the Linux Kernel – Greg Kroah-Hartman and Linux Kernel Development

        If you care about Linux and what goes into maintaining the kernel, you know how important Greg Kroah-Hartman is to stable releases and much more. On this can’t-miss episode of FLOSS Weekly, Kroah-Hartman gives deep, knowing, and good-humored answers to questions from Doc Searls, Katherine Druckman, and Jonathan Bennett.

      • LWNStill waiting for stackable security modules [LWN.net]

        The Linux security module (LSM) mechanism was created as a result of the first Kernel Summit in 2001; it was designed to allow the development of multiple approaches to Linux security. That goal has been met; there are several security modules available with current kernels. The LSM subsystem was not designed, though, to allow multiple security modules to work together on the same system. Developers have been working to rectify that problem almost since the LSM subsystem was merged, but with limited success; some small security modules can be stacked on top of the “major” ones, but arbitrary stacking is not possible. Now, a full 20 years after security-module support went into the 2.5 development kernel series, it looks like a solution to the stacking problem may finally be getting closer.

      • LWNCopyright notices (or the lack thereof) in kernel code [LWN.net]

        The practice of requiring copyright assignments for contributions to free-software projects has been in decline for years; the GNU Binutils project may be the latest domino to fall in that regard. The Linux kernel project, unlike some others, has always allowed contributors to retain their copyrights, resulting in a code base that has widely distributed ownership. In such a project, who owns the copyright to a given piece of code is not always obvious. Some developers (or their employers) are insistent about the placement of copyright notices in the code to document their ownership of parts of the kernel. A series of recent discussions within the Btrfs subsystem, though, has made it clear that there is no project-wide policy on when these notices are warranted — or even acceptable.

        In early September, a patch series implementing fscrypt integration for the Btrfs filesystem included this patch adding, among other things, a one-line Facebook copyright notice.

      • LWNMoving past TCP in the data center, part 1 [LWN.net]

        At the recently concluded Netdev 0×16 conference, which was held both in Lisbon, Portugal and virtually, Stanford professor John Ousterhout gave his personal views on where networking in data centers needs to be headed. To solve the problems that he sees, he suggested some “fairly significant changes” to those environments, including leaving behind the venerable—ubiquitous—TCP transport protocol. While LWN was unable to attend the conference itself, due to scheduling and time-zone conflicts, we were able to view the video of Ousterhout’s keynote talk to bring you this report.

    • Graphics Stack

      • Free Desktop[ANNOUNCE] mesa 22.3.0-rc2
        Hello everyone,
        The second release candidate for 22.3.0 is now available.
        If you find any issues, please report them here:
        The next release candidate is expected in one week, on November 16th.
    • Applications

      • FOSS PostUpscayl is an Open Source Linux AI Image Upscaler

        AI tools have exploded in our times. Repetitive tasks that used to take countless hours before and a lot of people to finish, now take few minutes to complete. Thanks to the advancement in artificial intelligence and the related fields.

        Today we are introducing a nice tool for Linux users, called Upscayl. It is an open source AI image upscaler and enhancer that is mainly designed for Linux systems, but also works on Windows and macOS.

        You probably know that if you tried to increase the resolution or zoom in a PNG or JPG image, then you will lose some quality of the image while doing so. However, the benefit of this software is that it can do the upscaling you want, with very minor loss in quality, thanks to the AI algorithm it uses while doing the upsclaing.

        The AI algorithm, known as Real-ESRGAN, allows programs to “predict” the missing pixels while upscaling images, which enhances the quality of the output images. Upscayl is just a program that implements this AI algorithm for Linux desktop users.

        You can download the software by heading to its releases page on GitHub, and downloading the latest version suitable for the OS that you are currently using. Linux users for example are advised to download the .AppImage file (and right click it –> Allow executing as executable) in order to use the software without a hassle.

      • 9to5LinuxFwupd 1.8.7 Adds Support for More Star Labs Linux Laptops, Intel Discrete GPUs

        As with all new fwupd releases, version 1.8.7 is here to add support for more hardware, including more Linux laptops from Star Labs (probably the upcoming StarFighter laptop), fingerprint lenfy devices, ELAN haptic hardware, Goodix GF3258WNC, Anker Thunderbolt 4 Mini Hub, QSI Godzilla Creek Reference Hub, as well as experimental support for Intel discrete GPUs.

        Some new features are present as well in this release, such as support for xz-compressed metadata, which should reduce the bandwidth used to download firmware files by approximately 25 percent, a new HSI check for the leaked Lenovo ‘Key Manifest’ hashes, as well as the ability to measure system integrity when installing UEFI updates and record more host DMI data when submitting a report for DBX failures.

      • Linux LinksExcellent Utilities: AES Crypt – file encryption tool – LinuxLinks

        This series highlights best-of-breed utilities. We cover a wide range of utilities including tools that boost your productivity, help you manage your workflow, and lots more besides.

        AES Crypt is file encryption software that uses the industry standard Advanced Encryption Standard (AES) to easily and securely encrypt files.

        AES (also known as Rijindael) is a symmetric encryption algorithm. The algorithm was designed to be efficient in both hardware and software, and supports a block length of 128 bits and key lengths of 128, 192, and 256 bits.

      • Libre Arts Weekly-ish recap — 9 November 2022

        [GIMP] Version 2.99.14 is supposed to be released soon and whenever it comes, it will arrive with two more major changes.

        The most important one deals with the much hated floating selection that used to seriously annoy users. Now, whenever you paste something into GIMP, it becomes a layer rather than a floating selection.

      • Kiwi TCMS – Kiwi TCMS 11.6

        We’re happy to announce Kiwi TCMS version 11.6! This is our first release after the very positive reception we had at WebSummit 2022!

    • Instructionals/Technical

      • LinuxiacHow to Install Raspberry Pi OS on Raspberry Pi: A Complete Guide

        Got a new Raspberry Pi? This guide walks you through each step of installing Raspberry Pi OS on your Raspberry Pi device with ease.

        The Raspberry Pi is currently the most widely used single-board computer. Its uses are nearly unlimited; users use it to learn programming skills, build hardware projects, for server needs, do home automatons, or just as a desktop replacement.

      • Make Use OfHow to Add AppImages to Your System Menu on Linux

        With so many Linux distros and packaging methods available, it’s no wonder that developers often choose to distribute their programs in a format—like AppImage—that can be executed by any Linux system. But AppImages are painful to manage and don’t easily integrate with your system menu.

        Fortunately, there’s a solution that can help you use AppImages as if they were regular Linux apps.

      • Linux CapableHow to Enable Backports on Debian 11/10

        Debian is known amongst the Linux community for its gold standard in being stable, and a common drawback can be that the packages, especially after the new Debian release ages are that they are often years behind what is currently available as they only receive security and bug updates to keep packages stable. Now for most environments, this is acceptable. Still, it can be very frustrating for users needing specific packages to be upgraded to utilize the features or fix annoying non-critical or security-related bugs. However, the great thing about Linux and using repositories is that you can use what is known as backports or experimental repositories, which are packages taken from the next Debian release, which is nearly always the testing repository and adjusted recompiled for usage on Debian stable.

        The following tutorial will demonstrate how to enable the backports, along with an example of how to search and install a package with extra on the same practice with the experimental repository on your Debian desktop or server.

      • Linux CapableHow to Install Nvidia Drivers on Debian 11/10

        Debian users know that the releases mean stability, so instead of installing Nvidia Drivers by default and keeping them updated when new releases arrive, you will find the Nouveau open-source graphics device driver installed on your system for Nvidia video cards for desktop users. For the most part, this is acceptable; however, if you use your Linux system for graphical design or gaming, or maybe you require Cuda support for development or headless driver support, you may need better drivers.

        The following tutorial will teach you how to install Nvidia Graphic Drivers using Debian’s repositories and to install the drivers directly from Nvidia repositories, which have both open-source and property drivers available.

      • UNIX CopHow to install Python 3.11 on Ubuntu 22.04

        If you are a Python developer, then you know that it pays to have recent versions to take full advantage of the language. Today, you will learn how to install Python 3.11 on Ubuntu 22.04. In addition to this, you will be able to set one as the default on the system.

      • Linux Made SimpleHow to install MetaTrader 5 with the Deriv broker on a Chromebook

        Today we are looking at how to install MetaTrader 5 with the Deriv broker on a Chromebook.

        If you have any questions, please contact us via a YouTube comment and we would be happy to assist you!

      • VideoHow to install FreeCAD on Linux Mint 21 – Invidious

        In this video, we are looking at how to install FreeCAD on Linux Mint 21.

      • ID RootHow To Install TinyCP on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install TinyCP on Ubuntu 22.04 LTS. For those of you who didn’t know, TinyCP is a most popular lightweight control panel, that provides a wide range of features on a Linux system, which features include control domains, mailboxes, databases, VPN, FTP connections, etc. Currently, TinyCP is available for Ubuntu and Debian users only.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the TinyCP lightweight Linux control panel on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

      • Make Use OfHow to View Song Lyrics in the Linux Terminal

        Want to find the lyrics of a song you’re currently listening to? Check out lyrics-in-terminal, a command-line app to view song lyrics on Linux.

        Listening to music relieves us of stress and makes us more productive at the task at hand. Occasionally, you might want to sing along with the euphonious melody of your favorite song but may end up struggling to identify the correct verse instead.

        Luckily, you don’t need to leave the comfort of your /home and fire up a web browser to search for lyrics online. lyrics-in-terminal is a command-line app that displays song lyrics within the Linux terminal.

      • KifarunixInstall Cortex on Ubuntu 22.04/Ubuntu 20.04 – kifarunix.com

        In this tutorial, you will learn how to install Cortex on Ubuntu 22.04/Ubuntu 20.04.

      • ID RootHow To Install Gatsby.js Node Framework on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install Gatsby.js Node Framework on Ubuntu 22.04 LTS. For those of you who didn’t know, Gatsby is a React-based build time static site generator that uses Webpack and GraphQL. You can integrate different content, APIs, and services seamlessly into one web experience in real time.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Gatsby.js Node Framework on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

      • H2S MediaCommands to Install VirtualBox 7.0 on Ubuntu 22.04 or 20.04

        Learn how to install the recently launched version VirtualBox 7.0.x or upgrade the existing one on Ubuntu 22.04 Jammy or Ubuntu 20.04 Focal LTS using the command terminal.

        We already have the Virtualbox to install on Ubuntu 22.04 or 20.04 using their official repository. However, the version available through it will not be the latest one. Well, you would already know about this open-source platform. It is developed by Oracle to run virtual machines on Windows, Linux, and macOS using virtualization technology.

        The updated version of VirtualBox has many improvements some of them are: Virtual machines can be fully encrypted now; Improved theme support on all platforms; reworked the new VM wizard to integrate the unattended guest OS installation; Added a new utility similar to “top” or “resource monitor” and more. For a full list, one can visit the official change log page.

      • RoseHostingHow to Install Elasticsearch on Ubuntu 22.04 – RoseHosting

        In this tutorial, we are going to show you how to install and configure Elasticsearch on Ubuntu 22.04

        Elasticsearch is a search engine based on the Lucene library. It is distributed, scalable, and open-source software used to store the collected data. On a daily basis, the administrators use elasticsearch because it has many features such as high availability, various sets of APIs, support for more than one index, native Java API, and many more.

        Installing Elasticsearch on Ubuntu 22.04 is a straightforward process that can take up to 15 minutes. Let’s get started!

  • Distributions and Operating Systems

    • Linux MagazineNew Arch-based Linux Distribution Aims to be Beginner-Friendly

      CachyOS has been created to serve as a Linux distribution for everyone, even while being based on the more complex Arch Linux.

      CachyOS has one goal, to create a beginner-friendly Arch-based Linux operating system that can be used by anyone, regardless of how much experience they might have.

      One might think Arch wouldn’t be the best distribution to serve as a base for such an operating system, but the developers have opted to go that route. And with the help of KDE Plasma, which is installed by default, the distribution certainly shows promise that they’ll achieve their goal.

      Of course, if KDE Plasma isn’t your jam, you can go with Cutefish, i3, GNOME, Openbox, Wayfire, LXQT, bspwm, Kofuku, or XFCE.

      Like most Arch spinoffs, CachyOS has a GUI installer that is just as point-and-clicky as any user-friendly Linux distribution. Another thing you might find interesting about CachyOS is the developers include a custom version of Firefox, called Cachy Browser, which is focused on privacy, security, and freedom.

    • New Releases

      • Deepin v23 Alpha Official Released – Deepin Technology Community

        A new “world” is coming for you! Deepin 23 Alpha is officially released by the first root community of desktop OS in China — deepin community!

        Deepin 23 Alpha is the second version of Deepin 23. Based on the new “Flow Design” concept, deepin 23 presents you with fashion UI interfaces and considerate interactive experiences. In terms of functions, it actively responds to the feedback from deepin users, develops and integrates many practical functions to meet user requirements in different scenarios. What is more, it fixes a large number of usage issues, preinstalls some Linglong applications, and comprehensively improves system compatibility and smoothness. Welcome to try it!

    • Fedora Family / IBM

      • LWNModernizing Fedora’s C code [LWN.net]

        It is not often that you see a Fedora change proposal for a version of the distribution that will not be available for 18 months or so, but that is exactly what was recently posted to the mailing list. The change targets the C source code in the myriad of packages that the distribution ships; it would fix code that uses some ancient compatibility features that were removed by the C99 standard but are still supported by GCC. As might be guessed from the long runway proposed, there is quite a bit of work to do to get there.

        As usual with Fedora change proposals, this one was posted to the Fedora devel mailing list on behalf of its owner, Florian Weimer, by Fedora program manager Ben Cotton; it is also available in an updated form on the Fedora wiki. At the moment, Fedora 37 is imminent, but the proposal targets Fedora 40, which is currently slated for the northern-hemisphere Spring of 2024. The goal, as described by the title is “Porting Fedora to Modern C”.

      • LWNPackaging Rust for Fedora

        Linux distributions were, as a general rule, designed during an era when most software of interest was written in C; as a result, distributions are naturally able to efficiently package C applications and the libraries they depend on. Modern languages, though, tend to be built around their own package-management systems that are designed with different goals in mind. The result is that, for years, distributors have struggled to find the best ways to package and ship applications written in those languages. A recent discussion in the Fedora community on the packaging of Rust applications shows that the problems have not yet all been solved.

        The initial spark for the discussion was this Fedora 38 change proposal driven by Panu Matilainen. The RPM package manager has long carried its own internal OpenPGP parser for the management of keys and signatures for packages. This parser seemingly pleases nobody; the proposal describes it as “rather infamous for its limitations and flaws” and puts forward a plan to replace it with the Sequoia library, which is written in Rust (and which was covered here in 2020). The use of Rust provides the sort of safety net that is welcome in security-relevant code like this, but it can also be a red flag for developers who worry about how Rust fits into the distribution as a whole.

        Inevitably, there were complaints about this proposal. Kevin Kofler, for example, asked why a library written in C had not been chosen. According to Matilainen, efforts to find such a library have been underway for years without success. The most obvious alternative, GPGME, is unsuitable because it is built around communicating with an external GPG process, “which is a setup you do NOT want in the rpm context where chroots come and go etc.”. Neal Gompa agreed that the GPGME model creates pain in this context, and seemed to agree that there was no better alternative than Sequoia despite his own disagreements with the Rust community. “So here we are, in a subpar situation created by bad tools because nobody cares enough about security anyway”.

      • EIN PresswireAtempo Partners with CIQ to Complete Certification Process for Rocky Linux on All Atempo Offerings
      • PR WebAtempo Partners with CIQ to Complete Certification Process for Rocky Linux on All Atempo Offerings

        Atempo has partnered with CIQ to complete the certification of Rocky Linux for all of Atempo’s offerings. Atempo is one of Europe’s largest data protection and data management solutions providers. CIQ is the company building the next generation of software infrastructure for enterprises running data-intensive workloads atop the Rocky Linux enterprise Linux distribution. The certification means that customers can deploy Atempo solutions powered by Rocky Linux with confidence that the technology stacks are integrated for optimal performance with the Rocky Linux enterprise Linux distribution.

    • Devices/Embedded

    • Open Hardware/Modding

      • ArduinoComputer vision and project mapping enable AR PCB debugging bliss | Arduino Blog

        Imagine if you could identify a component and its schematic label by simply touching that component on your PCB. Imagine if you selected a pin in KiCAD and it started glowing on your real, physical PCB so you can find it easily. Imagine if you could see through your PCB’s solder mask to view the traces underneath. All of those things — and much more — are possible with this Augmented Reality Debugging Workbench (ARDW) system.

        ARDW pairs tracking camera computer vision with projection mapping for fantastic augmented reality examination of PCBs. Touch a component with the special probes and ARDW will project the component’s name and label onto the table next to your board. Select a component or a component’s pin in KicAD and ARDW will project a highlighted overlay on the physical board showing you where it is. ARDW can even guide you through automated debugging by highlighting probe points and checking your measurements as you take them.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • My take on self-hosting

      This is a write-up of my experience with self-hosting services. I hope it’s useful and encouraging to people that wishes to get started in this art.


      For some people, I’m a paranoid, I avoid social networks and use Linux.


      Armed with that motivation, a dusty Raspberry Pi 2 and 64GB SD Card, I set to adventure myself. First I had to decide which OS to install. Ubuntu, Debian or Raspbian didn’t appeal to me. Having previous good experience with Arch Linux ARM I thought why not. Despite claims out there that Arch is not reliable, I never had any serious trouble with it for the last 7 years as my main system or in 2 years of self-hosting.

      Once the OS was installed, another decision had to be made, how to manage services. Some people insist in using packages provided by the distribution. I knew this would have limited success, after all, I couldn’t depend solely on packagers and AUR. Some people really like to suffer more than necessary and use Kubernetes for home labs. If you have time, multiple boards and motivation to learn Kubernetes, go ahead, it is just not my case. There is also Portainer and Ansible, which I didn’t really consider. Finally, I settled on using Docker with compose files. This approach has been serving me well, there are alternatives, there are even distros (e.g. Umbrel) which automate the installation and maintenance of services (I’m not talking about packages and systemd services). For now I’m happy with the balance of control, simplicity and maintenance effort.

    • Taming Mastodons for a better web: Dissociated Press

      The surge of people joining Mastodon and the Fediverse the past few days has been inspiring. I’m optimistic about the potential for a better web, but experience keeps whispering in my ear.

      Right now, people are fired up and ready to try new things. They’re happy to sign up, post a few “toots” to Mastodon, and think about a better web where things are decentralized and users have more control of their destiny. You know, the standard “DIY is better” package. Like when everybody started baking their own bread at the start of the pandemic in 2020.

      More than two years later, there’s a lot less baking going on and I doubt that Fleischmann’s is having as much trouble keeping up with yeast demand.

      It’s cliche at this point to mention “the year of the Linux desktop,” but there’s a lot of similarity between adoption of Linux and achieving any kind of critical mass on federated social media.

    • Web Browsers/Web Servers

      • Mozilla

        • ThunderbirdThunderbird Supernova Preview: The New Calendar Design

          In 2023, Thunderbird will reinvent itself with the “Supernova” release, featuring a modernized interface and brand new features like Firefox Sync. One of the major improvements you can look forward to is an overhaul to our calendar UI (user interface). Today we’re excited to give you a preview of what it looks like!

          Since this is a work-in-progress, bear with us for a few disclaimers. The most important one is that these screenshots are mock-ups which guide the direction of the new calendar interface.

        • 9to5LinuxThunderbird’s “Supernova” Release Promises Revamped Calendar UI, Firefox Sync Support

          Thunderbird’s “Supernova” release will offer us a modern interface of the open-source email, calendar, chat, and news client that introduces a revamped Calendar UI with support for defining what your weekend is and visually collapse weekends to save space, fully customizable and more accessible toolbar, and redesigned search.

          As you can see from the mockup above, the Calendar’s event search feature will now be shown at a glance on the right side of the window, in a side pane, so you can more easily find future events and increase your productivity. The search view will also display keyboard shortcut hints for even faster access.

        • MozillaHow to talk to kids about social media

          Social media in particular can be scary to think about when it comes to my kids, but I know it can be great too. I’m a designer and business owner who has made amazing connections online, and it has allowed me to create my own community on the internet.

    • Productivity Software/LibreOffice/Calligra

      • Document FoundationLibreOffice ID at the Indonesian Linux Conference 2022

        LibreOffice’s Indonesian community collaborated with the Organizing Committee of the Indonesia Linux Conference 2022, to hold a short presentation, “Implementation of LibreOffice in the Ecosystem at a University”.

        This event was held on Friday, November 4, 2022 in the 2nd Campus Hall of Universitas Muhammadiyah Sidoarjo, Surabaya – and at the same time became a pre-event running up to the Indonesian Linux Conference 2022, which was held on November 5, 2022.

        Rania Amina, leader of the Indonesia Linux Conference committee, who is also an official member of The Document Foundation, said that the LibreOffice presentation was a request from the campus community, which felt the need to introduce a powerful open source office application that has active support from the community in Indonesia.

    • Programming/Development

      • Steinar H GundersonBidirectional Dijkstra

        While I’m waiting for pull requests to be processed, enjoy some visualizations of bidirectional Dijkstra (1, 2).

      • Barry KaulerGlobal_IP_TV_Panel bumped to MK8

        This is a creation by forum member ETP, to display streaming TV channels on the desktop. EasyOS currently has the MK5 release.

      • Dirk EddelbuettelDirk Eddelbuettel: RcppArmadillo on CRAN: Updates

        Armadillo is a powerful and expressive C++ template library for linear algebra and scientific computing. It aims towards a good balance between speed and ease of use, has a syntax deliberately close to Matlab, and is useful for algorithm development directly in C++, or quick conversion of research code into production environments. RcppArmadillo integrates this library with the R environment and language–and is widely used by (currently) 1027 packages other packages on CRAN, downloaded 26.9 million times (per the partial logs from the cloud mirrors of CRAN), and the CSDA paper (preprint / vignette) by Conrad and myself has been cited 503 times according to Google Scholar.

      • FOSSLifeWebAssembly: The Next Big Thing

        WebAssembly (or Wasm) seems to be everywhere lately, with adoption of this technology growing rapidly. So, what’s the buzz all about? In this article, we’ll provide a brief overview of Wasm and offer resources to help you learn more.

  • Leftovers

    • TediumHow the Billboard Hot 100 Lost Interest in the Key Change

      A few years ago, I decided that I was going to listen to every number one song in the history of the Billboard Hot 100. That’s 1143 songs released between 1958 and 2022. I decided I would listen to one song per day. Why would I spend years of my life doing this? Mostly because I’m a musician. I wanted to further educate myself on the past to improve my songwriting. But I have a strange perspective. I work on data analytics and personalization at Audiomack, a popular music streaming service. So while part of my musical education was driven by old-fashioned listening, another part of it was driven by a giant data set that I built about those 1,000+ songs. After crunching some numbers, one of the most shocking things I learned is that the groups of notes we choose to make number one hits with have changed dramatically over the last 60 years. In today’s Tedium, I break down the pop chart’s underlying key change.

    • Hardware

    • Security

      • Make Tech Easier5 Simple Tips to Secure Your Linux Server – Make Tech Easier

        Linux servers are the backbone of the modern Internet. Today, nearly every website and service that you can access through a web browser runs on a Linux distribution. Here we show you how you can secure your Linux server.

      • Make Use OfOpenSSL Issues Security Updates for Two Critical Vulnerabilities: CVE-2022-360 and CVE-2022-3786 [Ed: This headline is clueless misinformation; neither is critical]

        In the last week of October 2022, OpenSSL Project revealed two vulnerabilities found in the OpenSSL library. Both CVE-2022-360 and CVE-2022-3786 have been labeled “High” severity issues with a CVSS score of 8.8, only 0.2 points lower than what they’d need to be considered “Critical”.

        The issue lies in the verification process of certificates that OpenSSL performs for certificate-based authentication. The exploitation of the vulnerabilities could allow an attacker to launch a Denial of Service (DoS) or even a Remote Code Execution attack. Patches for the two weaknesses found in OpenSSL v3.0.0 to v3.06 have now been released.

      • LinuxSecurityAuthoritative Guide on Linux Disk Encryption | LinuxSecurity.com

        Digital security is getting stronger, so criminals and law enforcement alike may be more willing to physically take your laptop or storage device to gain access to your data. It’s possible, however, to protect yourself against this invasion of privacy thanks to encryption.

        This article will discuss disk encryption, its uses and types, and its advantages and disadvantages. We will also show you how to encrypt a Linux hard drive and the various Linux encryption methods at your disposal.

      • USCERTMicrosoft Releases November 2022 Security Updates | CISA

        Microsoft has released updates to address multiple vulnerabilities in Microsoft software. An attacker can exploit some of these vulnerabilities to take control of an affected system.

      • CISAVMware Releases Security Updates | CISA

        A remote attacker could exploit one of these vulnerabilities to take control of an affected system.

      • CISACitrix Releases Security Updates for ADC and Gateway | CISA

        A remote attacker could exploit one of these vulnerabilities to take control of an affected system.

      • Istio / ISTIO-SECURITY-2022-008

        User can impersonate any workload identity within the service mesh if they have localhost access to the Istiod control plane.

      • IT WireMedibank attackers seek US$9.7m ransom; ‘bid to manipulate public opinion’ [Ed: Microsoft Windows TCO]

        The ransomware group behind the Medibank Group attack claims it initially demanded US$10 million (A$15.55 million) as a ransom, but is willing to accept US$9.7 million instead – US$1 for each customer the company claims is at risk. Ransomware largely attacks Microsoft’s Windows operating system.

        “Society ask us about ransom, it’s a 10 millions usd. We can make discount 9.7m 1$=1 customer,” the attacker(s) said in a post on the dark web.

        “Medibanks CEO stated, that ransom amount is ‘irrelevant’. We want to inform the customers, that He refuses to pay for yours data more, like 1 USD per person. So, probably customers data and extra efforts don’t cost that.”

        The group’s site, which hosts a copy of the site formerly used by the REvil gang, has also released a file named abortions.csv. Security researcher Brett Callow described this action as “pure evil”.

    • Monopolies

      • IT WireiTWire – Facebook parent Meta announces it will sack 11,000 employees

        Meta, the parent organisation of social media behemoth Facebook, has announced it will sack more than 11,000 employees, about 13% of the total workforce.

        In a blog post on Thursday AEDT, Meta chief executive Mark Zuckerberg said the company was also adopting a number of measures “to become a leaner and more efficient company by cutting discretionary spending and extending our hiring freeze through Q1″.

        The company had 87,314 employees at the end of September and this is the first time it has resorted to mass layoffs in its 18 years of operation.

        Zuckerberg said the emergence of COVID-19 had seen a move towards more online work and a big revenue spike for Meta due to the spike in e-commerce.

      • IT WireEU complaint over Microsoft’s alleged anti-competitive cloud practices

        Microsoft has been accused of anti-competitive behaviour in its cloud computing licensing practices, with an European trade group making a complaint about this alleged behaviour to the European Commission, the executive arm of the European Union.

        The group, Cloud Infrastructure Service Providers in Europe, said in a statement that it was backing two of its members, OVHcloud and Aruba, in separate complaints and was filing its own complaint to take in what it described as “serious unresolved issues” that “represents the wider European cloud infrastructure sector”.

        The complaint was filed with the European Commission’s Directorate-General for Competition (DG Comp).

        The organisation said all the documentation published by Microsoft in a bid to prevent market probes had failed to provide the detail clarity or assurance needed to assure the market that it intended to “bring a swift end to its anti-competitive licensing practices”.

  • Gemini* and Gopher

    • Technical

      • Re: The Analog Guideline

        I can remember, when we got our phone land line. I can remember the first electronic calculator my dad bought: a thing with flourescent blue digits and a small thermal printer. I can remember the day, where the coax cable entered our house — even though there was no TV set at our place yet. And cable internet was unheard of. And I remember a moment, when I realized that the guy passing on his bicycle was talking to someone else on the phone! I used a type writer to write up Mom’s recipe for cheese cake. I still have and use this sheet of paper. And I did make real things. Turning wood into bowls or candle holders, sewing a bag from leather, drawings and water colour paintings, bird feeders, toys, furniture made from wood, kites and whatnot. Today I write programs and digital files, which imho do not qualify as “things”.

        Don’t get me wrong: there are a lot of wonders possible through the internet. And I don’t want to go back to the time, when internet was not accessible to me. But analog life still has big merits. Paper books work basically without electricity. Paper books will not just vanish from my cupboard. Pencils and pens can be used to write on paper. Analog film and cameras teach a different way of visually perceiving my environment. Watching slides requires electricity, sure, but the perception is different than looking at a computer screen. Photographs last for a long time without using electricity. Vinyl records and the corresponding equipment are not yet forgotten! Going to the theatre, cinema, or to a live concert is a very different experience from streaming it to your phones mini-screen and ear buds.

      • Serving a capsule with vger on Debian

        Here are some brief notes on how to set up the vger gemini server on Debian using openbsd-inted and stunnel. For security, vger is run with it’s own user.

      • Ansible

        I came up with a game based on old fantasy.

        In many books there was such a device – ansible – for instant communication over interstellar distances. It allowed to transmit about 6 bits per minute.

        It would be possible to try to do a la hackathon, when a socket is used by teams at a speed, let’s not be sadists, about 8 bits per second. On the other side of the socket sits an script language interpreter with access to some sort of data store.

        Participants need to find and upload some information through this socket faster than other teams.

      • Science

      • Internet/Gemini

        • Publishing songs to Mastodon

          This is a quick guide for musicians who want to publish their songs on Mastodon. Mastodon supports uploading media, and music files will be embedded so that followers can listen to it from their timeline. But there’s a small trick that greatly improves the experience: adding covert art!

        • Fedi Server Update

          It has been suggested that Pleroma has some image issues due to many of it’s instances being lax on moderation or just not sharing the values that most of the FediVerse seem to have in common. I should also note that what I have read about Pleroma vs Mastodon performance is that Pleroma loses it’s edge as the scale increases. I’m still evaluating Pleroma and have a test account on a certain instance, which I’m fairly positive about so far, but I am still looking at other alternatives as well.


          The one I’m a bit more excited about is GoToSocial. I’ve heard the name but silly me, I didn’t realize what it was until a certain person mentioned it and I looked it up. This one is a backend only, so a frontend must be provided, but it is known to work with Pinafore on the web and Tusky on mobile. It’s also written in Go and so potentially might be able to wring out a lot better performance once it’s past it’s current Alpha state. Beta is expected to be reached around the middle of next year at the current development pace. Like Bonfire there are features which allow some more granularity on how public your posts are, which is another plus.

      • Programming

        • Re: Ansible

          This immediately reminded me of this story about Lisp being used for remote debugging on the Deep Space 1 spacecraft; just a fantastic thing to imagine doing.

        • Re: Handling Optional Values in Rust macro_rules; in Which the Peanut Gallery Shows Off Implementations for Their Pet Language

          While I have a notable distaste for Rust in general, I’m actually quite a fan of its macros; although they’re not as good as Lisp’s macros (naturally, since one of Lisp’s defining features is homoiconicity which makes macros easy and powerful) they’re better than the awful text replacement macros used by really any other programming language, if the language has macros at all. IMO, macros (or ​*at least* some form of reflection) is essential to avoid otherwise unavoidable repetitive code—I’m in the miniscule minority but I sometimes end up using m4 in languages without macros instead of just biting the bullet and repeating boilerplate over and over.

* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Microsoft: Bug Doors Are Us, With Plenty of Choices Available

Posted in Microsoft, Security, Windows at 12:20 am by Dr. Roy Schestowitz

This is what all the constant 'trash-talking' (about Free software “supply chain” or about OpenSSL lately) possibly strives to distract from:


Install Latest Windows Update ASAP! Patches Issued for 6 Actively Exploited Zero-Days

Summary: This keeps happening (the majority of “KNOWN EXPLOITED VULNERABILITIES” just announced by CISA is Microsoft Windows). Will Bill Gates-funded media cover it? If so, how will that be covered? Microsoft knew about these flaws (and told the spy/state partners so they can exploit these). Microsoft did not patch until it was too late and these holes were actively exploited a lot (at least 4 such holes, based on CISA).

« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts