01.05.23

Google/YouTube Censors Expert for Linking to and Explaining New and Soon-Peer-Reviewed Paper, Published a Week Before Boxing Day

Posted in Deception, Google at 9:41 pm by Dr. Roy Schestowitz

Summary: Google is playing ‘truth cop’ again; let this be a cautionary tale

This is the paper in question:

Effectiveness of the Coronavirus Disease 2019 (COVID-19) Bivalent Vaccine

See start of this new video:

This refers to this video. Description of video can be found there, along with the facts as they were presented in the now-censored video.

This is why we do not use YouTube and will never use Youtube. It’s a political and corporate censorship machine, it’s not free hosting for videos.

Links 05/01/2023: KDE Gear 22.12.1 and Debian Conflict of Interest Register

Posted in News Roundup at 9:24 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Server

      • Unix MenTighten the Security of Linux Servers

        The simple and straightforward meaning of Linux is the operating system used to build a connection between the software resources and the hardware resource of any computer, mobile device, server, etc. An Open source Operating System allows easy management of hardware resources like CPU, storage, and memory.

        With the help of this operating system, you can have direct access to the design and its various configurations. It is one of the market’s most powerful and wonderfully designed operating systems. It has an approximately 2.77 % market share. This operating system can be used in computers, servers, mobile phones, etc. Hence, we shall see into the ways of protecting your Linux server. Linux server is nothing but the server using the Linux operating system for its efficient working.

      • “People do NOT want to run their own servers” | Stop at Zona-M

        At the beginning of 2023, nobody really agrees what web3 actually even is.

        [Therefore] it might be more useful to think about what web3 could be? Do we even need to move on from web2? What is web3 solving?

    • Audiocasts/Shows

    • Instructionals/Technical

      • Using iwd for WiFi in Fedora – nullr0ute’s blog

        Fedora uses NetworkManager as the default for managing all the various different types of network. Underneath NetworkManager uses wpa_supplicant to connect to 802.11 based, AKA WiFi, wireless networks. There is an alternative called iwd which in a number of use cases works better, it also has the advantage that it offloads a bunch of things like crypto to the kernel interfaces which makes it smaller, and it’s under active development. iwd has a nice straight forward interface as well as being supported as an alternative NetworkManager so it just works in Fedora whether via nmcli or your chosen desktop environment.

      • ByteXDHow to Install Apache Web Server on Linux – ByteXD

        Apache Web Server is one of the most popular web servers available and is used by many of the world’s largest websites. A web server is a computer application that can process requests for web pages, download files, and serve up content over a network connection.

        Apache is compatible with multiple operating systems, including Windows, Mac OS X, Linux, and Unix. It can be modified and used for both commercial and noncommercial purposes.

        Apache is very customizable and can host both static and dynamic content. It’s typically used to host websites but can also be used for other applications such as streaming media, mail services, and more. Additionally, it is reliable, safe, and very mature, making it one of the best choices for web hosting.

        This tutorial shows you how to install the Apache web server and use it to create a website. Section 1 takes you through Apache installation.

        Section 2 shows you how to use the web server with and without PHP and MySQL.

      • VideoHow to install Steam on KDE Neon – Invidious

        In this video, we are looking at how to install Steam on KDE Neon.

      • OMG UbuntuHow to Highlight Mouse Cursor in Ubuntu – OMG! Ubuntu!

        If you record screencasts, make online tutorials, or stream your Ubuntu desktop when gaming you may find it useful to highlight your mouse cursor on screen.

        Using some kind of highlight effect on your mouse cursor helps you (or anyone watching you) see where the mouse pointer is (cursors are typically small and hard to spot), and draws attention to what’s underneath your pointer (useful in tutorials or during a presentation).

      • Ubuntu HandbookHow to Compile & Install Pinta 2.1 from Source in Ubuntu 22.04 |22.10 | UbuntuHandbook

        For Pinta users who do NOT like the Snap and Flatpak packages that run in sandbox. Here’s how to build the 2.1 release from source tarball in Ubuntu 22.04 & 22.10.

        Pinta has switch to .NET 6.0 framework since version 2.0. Which however needs internet connection to fetch something for the first time during the build time. And, most Linux so far still has Pinta v1.x in their system repositories.

        Thankfully, building Pinta 2.1 from source is not hard. And, here’s the step by step guide show you how!

        1. Firstly, press Ctrl+Alt+T on keyboard to open terminal. When it opens, run command to install .NET 6 as well as dev libraries for building the package.

      • Make Tech EasierHow to Enable Passwordless SSH Logins on Linux – Make Tech Easier

        It’s an excellent idea to sign in to your SSH server without a password. Seriously, get rid of it. There’s no need to use a password on one of the most attacked services on Linux servers, right? Securing an SSH server using standard password-based authentication is a bad idea. Attackers can easily brute force passwords, and when they’re the only thing standing between a bad actor and your server, you should definitely be nervous.

      • Linux Made SimpleHow to install Universal Pokemon Randomizer ZX v4.5.1 on a Chromebook

        Today we are looking at how to install Universal Pokemon Randomizer ZX v4.5.1 on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • Linux Made SimpleHow to install MetaTrader 4 with the FxPro Broker on a Chromebook

        Today we are looking at how to install MetaTrader 4 with the FxPro Broker on a Chromebook.

      • ByteXDInstall TeamViewer in Ubuntu 22.04 – ByteXD

        TeamViewer is a widely used remote access program that can remotely connect to desktops and mobile devices…

      • Make Use OfHow to Install Microsoft Office on Linux

        The most widely used office productivity suite in the world is Microsoft Office. It doesn’t matter if your PC runs Windows 10 or macOS, it’s likely that you’re using Microsoft Office. If you’re not, you have a colleague who is.

      • TechRepublicHow to configure an SMTP server in a self-hosted instance Passbolt

        With the self-hosted Passbolt password manager, you must configure an SMTP server to use the collaboration features. Learn how to do it.

      • ZDNetHow to make creating new documents in Linux easier with templates | ZDNET

        The Linux desktop has a lot of tricks up its sleeve to help make your experience more efficient. One such trick lies in the Templates folder. Find out what this is for and how it’s used.

      • TecAdminHow to Install and Use Flask on Debian 11/10 – TecAdmin

        Flask is a microweb framework written in Python that is widely used for building web applications. It is a lightweight framework that does not require particular tools or libraries to be installed. Flask provides developers with the ability to add functionality to their applications through the use of libraries and modules.

        In this tutorial, we will show you how to install Flask on Debian 11. Debian 11, also known as “Bullseye,” is the latest stable release of the Debian operating system. It is a free and open-source operating system that is widely used on servers and other systems.

      • OMG! LinuxHow to Install Google Chrome in Manjaro Linux – OMG! Linux

        I was left scratching my head trying to to install Google Chrome on Manjaro. When I go to the Chrome website to download it, it only offers me DEB and RPM installers.

        Those don’t work on Manjaro (not without effort, at least).

        Thankfully, I wasn’t stumped for long.

        Turns out, it’s actually pretty easy to install Chrome in Manjaro. You can do it from the command line, or using the Add & Remove software tool Manjaro comes with.

        Whichever method you use is down to you, your skill-set, and whether you have any particular packaging preferences. The end result is the same: Google’s famous web browser, ready for you to use.

        Let’s take a look at how.

      • ZDNetWhat are Firefox Container Tabs and how do you use them? | ZDNET

        If you’re looking to add even more security to the Firefox browser, you might consider using the Containers feature, with its Container Tabs. Find out what these do and how to use them.

      • DebugPointShare Folder Between Host and Guest System in VirtualBox [Complete Guide]

        If you are a heavy user of virtual machines, especially with VirtualBox, it’s essential to know how to share a folder for data transfer between guest and host systems. You may want to access some documents and pictures from the guest system, which is present in your host system.

        It’s possible with a little trick. Here’s how.

    • Games

      • Boiling SteamNew Steam Games with Native Linux Clients – 2023-01-05 Edition – Boiling Steam

        Between 2022-12-29 and 2023-01-05 there were 8 New Steam games released with Native Linux clients. For reference, during the same time, there were 123 games released for Windows on Steam, so the Linux versions represent about 6.5 % of total released titles.

      • Valve is bringing HDR to Linux gaming – OnMSFT.com

        Valve is apparently working toward bringing HDR implementation to Linux systems. This is according to Valve coder Pierre-Loup Griffais, so the info is pretty reliable. Griffais announced on Twitter that the feature is in active development and already working for some games on Linux, including Halo Infinite, Deep Rock Galactic and Death Stranding Director’s Cut.

        [...]

        Valve’s Steam Deck can only display SDR despite the Steam OS being Linux-based. However, it’s not hard to imagine that once HDR on Linux become fully-fledged, an OLED Steam Deck might not be far behind.

      • Make Tech EasierSeven Coding Games to Help You Build Your Programming Chops – Make Tech Easier

        Coding is all about using the tools available to you to solve problems (then solving the problems that resulted from your solution to the previous problems, of course). That also happens to be the basic idea behind most video games, so the two combine naturally. These coding games cover plenty of languages, age ranges, and skill levels, so whether you’re a complete beginner or looking for something on the next level, there’s a game to help you learn coding the best way: by doing it.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • 9to5LinuxKDE Gear 22.12.1 Brings Improvements to Dolphin, Konsole, Kdenlive, and Other Apps

          KDE Gear 22.12.1 is a bugfix update that improves many of the default KDE apps, including the Dolphin file manager, whose “Delete permanently” button regained keyboard focus by default when permanently deleting a file.

          The Konsole terminal emulator received a bunch of bug fixes as well, bringing back the ability to save new profiles, glitch-free fractional scaling on X11, support for Shift+Arrows+Alt/Ctrl keyboard shortcuts for applications, support for Ctrl and Alt keys in mouse tracking mode, and more.

        • KDEKDE Gear 22.12.1 – KDE Community

          Over 120 individual programs plus dozens of programmer libraries and feature plugins are released simultaneously as part of KDE Gear.

      • GNOME Desktop/GTK

        • Hari RanaOn the GNOME Project and “My Way or the Highway” | TheEvilSkeleton

          This mindset stems from wanting to fulfill a vision or goal, while complying with a philosophy. If a person proposes an idea that is incompatible with the philosophy of a project, then that project will simply reject it.

          The GNOME Project has a vision that it wants to push and perfect. Their philosophy, simply put, is “stay out of my way”. The goal is for the user to be able to do their job without being distracted, and to be encouraged to keep everything organized. To achieve this, they put everything away until the user needs something.

          GNOME is designed to avoid overwhelming the user with information overload as much as possible, which is a really important topic for usability for the average computer user. Therefore, it does not follow the traditional desktop paradigm, where there is a taskbar, desktop icons, and others – everything is put away until the user needs them. Likewise, applications also implement hamburger menus to put everything away.

          This means, if one proposes the GNOME Project to implement a taskbar with an application menu, a menu bar, or any addition or change that encourages GNOME to resemble something that it isn’t supposed to be, then the GNOME Project will reject it. However, if one proposes something that improves and builds upon the GNOME Project philosophy, then it will be taken into consideration.

          This type of behavior is consistent with numerous projects, including Firefox, the Linux kernel, KDE and many, many others. Even much smaller projects, like Sway, have a vision that they’d want to perfect. These projects have a scope in which they’d accept proposals and contributions. They have rules and standards that people must adhere to contribute to that project.

  • Distributions and Operating Systems

    • ZDNetVanilla OS offers a new take on security for the Linux desktop | ZDNET

      I’ve used every flavor of Linux you can possibly imagine — from the overly simple to the masterfully complex. I’ve seen just about every gimmick and trick you could throw at an operating system. Finally, there’s a new take on Linux that is equal parts heightened security and user-friendly. If that sounds like the combination you’ve been looking for, read on, my friend.

      The first official release of Vanilla OS was recently made available to the masses. I’ve tested this Linux distribution before and found it to be quite intriguing. So, when the developers announced the full release was ready, you can bet I was anxious to kick the tires.

  • Free, Libre, and Open Source Software

    • Patrick Cloke: Matrix Read Receipts & Notifications

      Push notifications receive either the number of unread messages (across all rooms) or the number of rooms with unread messages (depending on the value of push.group_unread_count_by_room in the Synapse configuration). Unread messages are any messages where the push rules resulted in an action of notify.

    • Web Browsers/Web Servers

    • Programming/Development

      • VideoToxic Community Kills Another Open Source Project – Invidious

        In this video I discussed how the emulation community annoyed the developer of AetherSX2 so much he gave up on the project.

      • Kubernetes BlogKubernetes 1.26: Eviction policy for unhealthy pods guarded by PodDisruptionBudgets | Kubernetes

        Ensuring the disruptions to your applications do not affect its availability isn’t a simple task. Last month’s release of Kubernetes v1.26 lets you specify an unhealthy pod eviction policy for PodDisruptionBudgets (PDBs) to help you maintain that availability during node management operations. In this article, we will dive deeper into what modifications were introduced for PDBs to give application owners greater flexibility in managing disruptions.

      • _FORTIFY_SOURCE=3 performance

        So early last year I finished implemented everything needed for a fully working _FORTIFY_SOURCE=3 so that disrtributions can use it out of the box. OpenSUSE adopted it almost immediately and Gentoo started the work of adding it to their hardened profile. I proposed to make it the default for Fedora 38 after some tests but people quoted to me this blog post that some guy wrote, telling me that there’s a performance issue. Since my explanations and clarifications in the Fedora wiki or on the Fedora devel list is not sufficient (the feature was approved but the “_FORTIFY_SOURCE=3 has performance overhead” claims don’t seem to stop), here’s a blog post for a blog post, stating conclusively that the performance issue is theoretical and overstated, the guy didn’t know what he was talking about when he wrote it.

      • 2022 ClangBuiltLinux Retrospective [Ed: More like an attack on the GPL and promoting of Microsoft's proprietary GitHub, with NSA lurking in the build system]

        I have been contracting for the Linux Foundation for two years now, going onto the third, and it dawned on me that I have never done a retrospective or yearly report. This is useful for looking back on the year’s worth of accomplishments, both to understand how much I have evolved and to look for areas that I would like to improve upon going forward. I have struggled with imposter syndrome for as long as I have been involved with the kernel community, so looking back to give credit where credit is due for particular solutions is a good way to try and combat that.

  • Leftovers

    • Major HaydenRed flags · Major Hayden

      As I advance in my career, there’s one activity I consistently enjoy: mentoring.
      I love helping other people discover their hidden potential and work through obstacles. Mentoring involves lots of listening and asking questions. My mentees ask some great questions as well, and some of them are difficult to answer.
      One that I’ve had a lot recently is:
      When do I know it’s time to move on from my current project or even my company?

      [...]

      He suggested making a list of two to three changes within the company that would reduce my faith in the company. These things would sew doubt about company leadership, products, or the approach to the customer experience. He explained that every change should be looked at with full context of the situation and that no single item should cause someone to make a rash decision.
      There was one rule he was clear about: You must come up with your list of red flags when you aren’t under duress.
      These red flags must be in place before the ship starts to sink. Why? All kinds of cognitive bias set in when you’re under frustrated or frightened. Once the body’s fight or flight system kicks in, all bets are off. It’s difficult to make sound judgments at that point.

      [...]

      Survival in almost any company requires you to believe that your contributions create value for someone somewhere. You also need a belief that your chance for further opportunities in the company should improve as the product improves.

      [...]

      When red flags start to appear, talk to your manager about them as soon as possible!
      Don’t let them fester and get worse while you’re silently becoming more and more upset and stressed. Try to bring them up with your manager in the context of your experience with them.

    • p6steve: The Laws of Job Hunting

      You are the salesperson, you are the product. This is a conflict of interest. You must objectify and promote yourself (since everyone else is).

      The people who select you are judging you on the basis of a piece of paper, or a zoom call, or a short interview, They don’t know you. They are working to a brief. They are predisposed. They don’t care.

      [...]

      You should be prepared to work a full 40 hour week to prepare and submit all your various applications. Since job seeking is a rather lonely and soul challenging activity, this is not easy.

    • Hardware

      • The Next PlatformAMD Teases Details On Future MI300 Hybrid Compute Engines

        We were under the distinct impression that AMD was not going to talk much about its datacenter compute engines at the Consumer Electronics Show, having just launched its “Genoa” Epyc 9004 server CPUs in November with much fanfare.

    • Security and Downtime

      • OrBit malware: analysis of a threat to Linux | Stormshield [Ed: The important question is, how does such malware get installed in the first place? Therein lies the problem. Maybe not Linux-related.]

        Orbit is a two-stage malware that appeared in July 2022, discovered by Intezer lab. Acting as a stealer and backdoor on 64-bit Linux systems, it consists of an executable acting as a dropper and a dynamic library.

      • TechRepublicCloud email services bolster encryption against hackers [Ed: People who use Outlook/Exchange already assume all their mail is compromised, leaked, lost]

        End-to-end encryption for email and other cloud services is growing in popularity. Given that email is one of the top two cyberattack vectors, this is no surprise.

        According to Verizon’s annual 2022 Data Breach Investigations Report, mail servers accounted for 28% of all affected hardware, and 35% of ransomware activities involved email. The EU Agency for Cybersecurity’s 2022 report noted that ransomware accounts for 10 terabytes of data stolen per month with 60% of companies likely to have paid a ransom. A 2021 Gartner study, updated for 2022, reported that about 40% of ransomware attacks start with email.

        To address these challenges, Google, Microsoft and Proton, whose Proton Mail service was a first-mover in secure email, both moved to expand end-to-end encryption offerings.

      • CISACISA Releases Three Industrial Systems Control Advisories | CISA

        CISA released three Industrial Control Systems (ICS) advisories on January 5 2023. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.

      • Group Policy on Linux – David Mulder

        The purpose of the book is to provide detailed instructions to get folks up and running using Samba’s client Group Policy. I’ve received numerous requests for help on the mailing lists, and many of the questions are simple ones. Previously none of this information was documented well anywhere.

      • Post-mortem: Downtime on January 5, 2023 – Open Build Service

        Our reference server was offline for around 2 hours. The application responded with a maintenance message or with a 503 HTTP error (Service Unavailable). No one was able to work with the API or web interface during that time.

    • Digital Restrictions (DRM)

      • The VergeNew York breaks the right to repair bill as it’s signed into law

        New York governor Kathy Hochul signed the Digital Fair Repair Act on December 28th, 2022, and the law will go into effect on July 1st, 2023 — a full year after it was originally passed by the NY State legislature. The bill establishes that consumers and independent repair providers have a right to obtain manuals, diagrams, diagnostics and parts from original equipment manufacturers (OEMs) in order to repair their own devices. However, the bill was meaningfully compromised at the last minute by amendments that give OEMs some convenient exceptions and loopholes to get out of obligations that many right to repair advocates had been hoping for.

    • Monopolies

      • Copyrights

        • Public Domain ReviewThe Book of Bread (1903) – The Public Domain Review

          “A little knowledge is a dangerous thing”, writes Owen Simmons at the outset of The Book of Bread (1903), a work he hopes will definitively establish “the link between the bakery and the laboratory” and speak to “the needs of the baker and of the miller”. And the text, at times, does indeed read like a lab manual for commercial bakeries: Simmons was a breadmaker’s breadmaker, co-founder of the National School of Bakery in London and frequent contributor to The British Baker. The book contains equations for the conversion of starch into alcohol (by way of maltose, dextrin, and glucose), chemical explanations for why viscoelasticity is “injurious to the proper manufacture of several kinds of biscuits”, and intricate discussions of nitrogenic proteids, which, once transformed into peptones, “nourish the yeast by percolating its cellulose”.
          In addition to its scientific learning, the preface notes two unique aspects that set The Book of Bread apart from competitors: a tabulated appendix, featuring the results of more than 360 baking experiments, and its “most expensive illustrations”, which will force readers “to admit that never before have they seen such a complete collection of prize loaves illustrated in such an excellent manner”. An early entry in Martin Parr and Gerry Badger’s history of the photobook, the attention lent to loaves left the writers in awe: “Here, at the beginning of the twentieth century, one of the humblest, yet most essential of objects is catalogued as precisely, rigorously and objectively as any work by a 1980s Conceptual artist.” Kenneth Josephson’s later photographic experiment, The Bread Book (1973), seems to directly reference Simmons’ work.

  • Gemini* and Gopher

    • Personal

      • Morals

        Morals have been developed throughout the centuries in order for humans to survive together. They’re also what makes humans, well, human. The following are a few disjointed ideas about adjacent subjects related to morals.

        Those that are not on common moral grounds, for example they kill a fellow human, often get shunned upon. What happens if we remove morals altogether? A person that at anytime pursues their own selfish interests with full disregard about others. Now, it could be argumented that one pursues his interests anyways, such as self-preservation, even if subconscious, and that’s true to a degree. For example, there’s a difference between “I make friendships in order to
        fulfill my social needs and make the other person feel good too, build a strong social network etc.” and “I make friendships in order to entertain myself, if I think that person is no longer of value or entertaining I disregard them”.

    • Technical

      • The power of “why?”

        Questioning itself is a very damaging concept to the consumerist society of today, if we would question every purchase, we probably wouldn’t buy so much. For example, most people that buy expensive smartphones, clothing etc., do so in order to belong, or they’re insecure about their own worth, which obviously isn’t defined by the material wealth they posses.

      • The OGL Mess

        I think there was a poison pill in the OGL 1.0a license because it says: “You may use any authorized version of this License to copy, modify and distribute any Open Game Content originally distributed under any version of this License.” So if you’re offering a work for download that includes Open Gaming Content, every time somebody makes a copy, you’re “distributing” it, and you are only allowed to do that using an authorized version of the license.

      • The JBanana Password Law 🔒

        Ordinarily I use a password manager, but at work I have to remember my password. I also have to change it regularly, and there are complexity requirements.

      • Internet/Gemini

        • Gemlog responses – bacardi55′s concept without CGI

          Gemlog discussions are frequently happening, which is a good sign for an active community. Due to the simplistic nature of the gemini protocol these discussions happen with much less automation and more handwork than in the world wide web. The usual way is to publish a reply with the link to the original gemlog and inform the original author via email about the reply.

        • Moving Gemini Client Certificates Between Deedum and Kristall

          I use Deedum to browse Gemini on Android and Kristall to browse Gemini on PC. On my PlanetComputers Gemini PDA (which runs Debian) I use Lagrange, as the build tools for Kristall are unavailable in PlanetComputer’s repos. I have a client certificate I wanted to use on all my Gemini clients, but the cert export formats between Kristall and Deedum are incompatible with each other. I’m writing this post to explain how I worked around this limitation.


* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

Links 05/01/2023: Krita 5.1.5 Released and NVIDIA 525.78.01 Graphics Driver Ready

Posted in News Roundup at 11:59 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Make Use Of12 Free Alternatives to Windows Operating Systems

      Does Windows cost too much? Here are several free alternative operating systems. Linux is just the beginning!

      Need a new operating system that doesn’t cost a penny? You might have heard about Linux, the free and open-source alternative to Windows. However, there are many other free operating systems for laptops and desktop PCs.

      Capable of performing standard computing tasks, these free operating systems are strong alternatives to Windows.

    • Desktop/Laptop

      • Joe BrockmeierMacBook Pro 2015 update: The winner is Pop!_OS : Dissociated Press

        After a few tries to put Fedora on the MacBook Pro 2015, I auditioned a number of other Linux distros and wound up going with Pop!_OS.

        I gave Chrome OS Flex a brief spin, but it wasn’t quite my jam. If you like Chrome OS and have an old PC or Mac you’d like to give a little more life to, I give it a thumbs up. I was able to install some regular Linux apps on it as well as the standard Chrome apps, but found Firefox to be sluggish and generally just didn’t click with Chrome OS.

        Tried installing Ubuntu but a disk configuration stage during install the dialog just didn’t accept input. Not sure what was up with that so I decided to try something else.

        A little research suggested that Pop!_OS might not support WiFi on the MacBook Pro, but I decided to throw the live USB at it and see whether wireless worked or not. Turns out, it did without a fuss and the install was quick and painless.

      • Screen Rant10 Harsh Realities Of Using Linux [Ed: "Hibernation Isn’t Available" isn't a reality; this seems like recycled old FUD, designed to discouraged the adoption of a solid platform. Jom Elauria (Screen Rant) possibly just lacks experience with GNU/Linux and blames this lack of experience on that which he does not understand.]
      • Unicorn MediaTime to Vote in Our Best Linux Distro 2022 Poll!

        [Editor’s note: Don’t forget, if you select “other” in our poll, you should scroll down past the ads at the bottom of the article and post a comment with the name of the distro that would have received your vote if it were there. That way, it can be included in the second round of voting next week and will have a chance to win.]

    • Audiocasts/Shows

    • Kernel Space

      • Systemd Free2023: Linux rusting away into non-FOSS territory – Build rnote and you will see | systemd-free linux community

        Linux 6.2-rc2 kernel is out as the last commit in kernel.org at the start of the 2023 year. RUST is here, the initial code-base is included in the kernel. At least Arch seems to be disabling it for now, at the beta level at least, we shall see.

        Rust is not just a language, as people commonly think, it is much more. It is a building environment, system, and a mode change of the philosophy of building packages from source. Rust incorporates its own git system in pulling code in from 2nd and 3rd parties. So if you have never gotten into the real FOSS practice of auditing code before you build, try and audit this stuff. If building in C you thought was a practice similar to building sand castles, by comparison, this is like building sand castles with quick-sand ON QUICK SAND.

        Rnote is a crappy little gui similar to the old MS paintbrush, like a childrens’ sketching pad. No, it is worse, it doesn’t even save in popular image formats but only its own. Autosave is on. You get the picture? This is gtk4 only “crap”! Not only that, you can’t find a configuration file for it anywhere in your user’s home, and for preferences to be changed and be saved, dbus should be running. Why does a kids’ sketching pad program need dbus to save its own preferences/choices/settings?

        But this crappy little gui is built with rust. Before you start building you may have no clue what dependencies it is going to need, or the initial building source provides little clues of configurations for the build and where is it pulling code from. ONE of the sources is Google, among other favorite FOSS contributors that happen to be multinational conglomerates out to make trillions for shareholders. We are talking about many GBs of endless source being pulled in. Rust stores this code in cargo, like trashcans of it full of crap. How do I know if I restart the process 2′ later the source of the dependencies hasn’t changed? Aahhh… some excited RUST-fan will point out you can save those tons of trash code into those tin-cans.. so you can assure “reproducibility”. If for a tiny little gui we have 80GB of 3rd party code that needs to be stored for reproducibility, imagine what your building machine will look like for a minimal distro full of rust packages.

      • LWNWrapping up 2022 [LWN.net]

        Yet another year is coming to a close; that can only mean that the time has come to indulge in a longstanding LWN tradition: looking back at the predictions we made in January and giving them the mocking that they richly deserve. Read on to see how those predictions went, what was missed, and a look back at the year in general.

      • LWN6.2 Merge window, part 1 [LWN.net]

        Once upon a time, Linus Torvalds would try to set a pace of about 1,000 changesets pulled into the mainline each day during the early part of the merge window. For 6.2, though, the situation is different; no less than 9,278 non-merge changesets were pulled during the first two days. Needless to say, these commits affect the kernel in numerous ways, even though there are fewer fundamental changes than were seen in 6.1.

      • LWNEnabling non-executable memfds [LWN.net]

        The memfd interface is a bit of a strange and Linux-specific beast; it was initially created to support the secure passing of data between cooperating processes on a single system. It has since gained other roles, but it may still come as a surprise to some to learn that memory regions created for memfds, unlike almost any other data area, have the execute permission bit set. That can facilitate attacks; this patch set from Jeff Xu proposes an addition to the memfd API to close that hole.

        A memfd is created with a call to memfd_create(), which will return a file descriptor referring to the region. That descriptor can be treated as an ordinary file, in that it can be written to or read from; it can also be mapped into a process’s address space. Normally the first step will be to call ftruncate() to set the size of the region; after that it can be populated with data and passed to another process. One interesting characteristic of memfds is that they can be “sealed” with a call to fcntl(), an operation that disallows any further changes to the stored data. Sealing allows a recipient to know that the contents of a memfd will not change in unexpected ways in the middle of an operation.

      • LWNThe intersection of shadow stacks and CRIU [LWN.net]

        Shadow stacks are one of the methods employed to enforce control-flow integrity and thwart attackers; they are a mechanism for fine-grained, backward-edge protection. Most of the time, applications are not even aware that shadow stacks are in use. As is so often the case, though, life gets more complicated when the Checkpoint/Restore in Userspace (CRIU) mechanism is in use. Not breaking CRIU turns out to be one of the big challenges facing developers working to get user-space shadow-stack support into the kernel.

        The idea behind shadow stacks is simple: in addition to the normal program stack (which holds return addresses, local variables, and more) there is a special memory area, called the “shadow stack”, that stores only return addresses. Whenever a CALL instruction is executed, the return address is pushed onto both the normal and the shadow stacks. When, later, a function ends with a RET instruction, the return address that’s popped from the normal stack is compared to that on the shadow stack. If they match, the execution continues; if they don’t, a violation of control-flow integrity has just been detected.

        Recent x86 processor models implement shadow stacks in hardware, meaning that no instrumentation is required for a program to get the protection that shadow stacks provide and that the cost of using a shadow stack is negligible. Once the feature is enabled, the CPU takes care of pushing and popping the return address on the shadow stack and comparing the return addresses. If the return addresses do not match, the CPU generates a control protection exception. To support shadow stacks, the x86 architecture has been extended with a model-specific register (MSR) that controls the use of the shadow stack and its features. There are also shadow-stack pointer MSRs (one for each possible privilege level) and a set of instructions for manipulating shadow-stack contents.

        The discussion about how kernel should support shadow stacks for user space started a long time ago, but it has still not concluded. One of the difficulties in enabling this feature is the possibility that some applications will be broken by shadow stacks because they use non-standard ways to change their control flow. The list of problematic applications includes GDB, various JIT engines, and, of course, CRIU.

      • Nikhil MaratheNuphy Air75 Wireless Receiver does not work on Linux

        Any way, there is probably some complicated way to nicely ask the kernel to load hid-apple based on some USB vendor ID or something, but I’m not planning to dig into this further. I am just using it in wired or Bluetooth mode. I’m just writing this down because I couldn’t find anyone even describing the problem on the Interwebs. There are a lot of answers about using fnmode when using wired or Bluetooth. Nobody seems to have asked about the wireless receiver. Another fun tidbit is that all these new wave low-profile mechanical keyboards (Nuphy, Keychron, possibly others) seem to just identify themselves as an Apple Magic Keyboard when in their “Mac” mode.

    • Graphics Stack

      • 9to5LinuxNVIDIA 525.78.01 Graphics Driver Released with Better Support for Vulkan X11 Apps

        NVIDIA 525.78.01 is here to improve support for Vulkan X11 applications by addressing a regression that prevented the G-SYNC/G-SYNC Compatible Visual Indicator from being displayed and by fixing bug that could cause apps to crash with Xid 32 errors when using the VK_KHR_present_id Vulkan extension.

        It also fixes a crash with the nvidia-settings control panel that occurred when using a newer control panel with an older version of the NVIDIA graphics driver, as well as a bug resulting in excess CPU usage in hybrid graphics configurations where an external monitor is connected to a discrete NVIDIA graphics card and configured as a PRIME Display Offload sink.

      • Simon SerSimon Ser: Status update, December 2022

        Following last month’s wlroots release, we’ve started the Sway release candidate cycle. Kenny Levinsen and Ronan Pigott have helped fixing the bugs and regressions that popped up, and I hope we’ll be able to ship the final release next week. I also plan to release wlroots 0.16.1 with the fixes we’ve accumulated.

        In other wlroots news, Manuel Stoeckl and I have continued to work on the Vulkan renderer. A lot more pixel formats are now supported for textures, and the buffer synchronization issues should all be sorted out. Next we’d like to add support for rendering to high bit depth buffers for color management purposes. This is a bit more involved since there is no shader stage which runs after blending, so I’d like to experiment with compute shaders to see if they’re better suited for us. That ties in with the renderer API redesign I’ve been planning for a while: the new rendering API should make it easier to use compute shaders, and already shows a nice perf boost for the Pixman renderer.

        I’ve been debugging some issues with USB-C docks where outputs wouldn’t turn back on after a plug-unplug-replug cycle. The result is an i915 patch which fixes some of issues, but it seems there are more where that came from. Ultimately this class of bugs should get fixed when we add support for atomically turning off multiple outputs at once in wlroots, but this will require a lot more work.

        Alexander Orzechowski and I have been pushing surface-invalidation, a new Wayland protocol to help with GPU resets. GPU resets destroy the whole GL/Vulkan state on the compositor side, so compositors which can recover from resets are left with nothing to draw. The protocol allows compositors to request a new buffer from clients.

      • Mike Blumenkrantz: Right Out The Gate

        While the blog was on break, some of you might have noticed that VK_EXT_descriptor_buffer was released with my greasy fingerprints on it.

        You might also have noticed that Zink didn’t have a day-one MR.

        The thing about Schrödinger’s Specification is that it only remains constant while you’re directly observing it. As soon as you look away, it becomes an amorphous entity changing in unknown and confusing ways.

    • Applications

      • OMG UbuntuMonitorets is a Cute System Monitor Widget for Linux – OMG! Ubuntu!

        Like, not everything made for Linux needs to plug an existential hole, break down boundaries, revolutionise computing as we know it™, etc. It’s fine for things to exist just because they’re nice to look at — and hey: if my site’s been a champion of anything these past 13 years, it’s of borderline useless tat to litter our desktops with).

        I’m saying all of this upfront — hi, btw 👋 — because I know that the thing I’m spotlighting below is going to leave a few of you reading this scratching your chins in bemusement.

        And I want you to know that I get why.

      • It’s FOSSPinta 2.1 Release Introduces WebP Support. But You Can’t Use It Yet Unfortunately

        Pinta is a free and open-source drawing app for Linux that offers a ton of features in a relatively small package.

        It is one of the best Linux tools for digital artists available.

        Its last major release was in January 2022, introducing improved Hi DPI support, GTK 3 port, and more.

        Marking 2023′s first release, Pinta 2.1 promises to offer even further refinements.

        Notice the new Pinta icon in the image above? Well, that’s one of the changes.

      • DebugPointPinta 2.1 Release Brings WebP Support, Screenshot Feature on Wayland

        A new release of Pinta 2.1 is here, bringing a year’s worth of updates.

      • Medevel9 Open Source Free SIP and Softphone clients

        SIP client apps enables the user to make internet telephony calls without extensive setup. Many companies have SIP server and VoIP infrastructure ready for employees and customers.
        SIP client are also called soft-phone, as it looks similar to basic phones with similar functionalities.
        In this post, we list the best open source and free SIP/ VoIP clients to use without fear of being tracked.

      • OpenSource.comWhat’s your favorite Mastodon app

        Mastodon is an open source social networking platform for microblogging. While it has a web-based interface, many users prefer to use a client to access Mastodon. Clients are programs or applications that allow users to access and interact with the Mastodon platform from a variety of devices, including computers, tablets, and phones.

        I moved to Mastodon from Twitter back in 2019, and I’ve been experimenting with a number of different clients ever since. This is a list of my favorite Mastodon clients so far.

      • TecMint30 Best File Managers and Explorers [GUI + CLI] for Linux [Ed: Updated today]

        In Linux file and directory management is so important that users always want to have a simple and easy-to-use file manager or file browser.

        But sometimes having a feature-rich and highly configurable file manager for performing both simple tasks such as searching, copying, moving, creating, and deleting files, and complex operations such as remote access of files and SSH connections is very vital.

      • TecMint9 Best Free UPnP and DLNA Media Servers for Linux

        The acronym UPnP stands for ‘Universal plug and play‘. It’s a service that enables devices on the LAN to seamlessly discover and communicate with each other, the goal being to allow video streaming, data sharing, and gaming across devices without manual setup.

        DLNA (Digital Living Network Alliance) is a set of guidelines that define how digital media is shared across devices on a local network. DLNA leverages uPnP for interconnectivity and allows devices on a home network to find each other and share media files.

    • Instructionals/Technical

      • Make Use OfHow to Install darktable on Ubuntu

        Alternative to Adobe Lightroom, darktable is a free and open-source photography workflow application and raw developer preferred by many professional photographers for image editing.

        darktable comes packed with many powerful features and is easily available on all major Linux distributions. You can install darktable on Ubuntu via the command line using either APT or Flatpak. The tool is easy to use and learn on any Linux distribution.

      • ZDNetHow to password-protect a document with LibreOffice | ZDNET

        If LibreOffice is your office suite of choice, and you need to protect a document with a password, you’re in luck, as the feature is built in and simple to use.

      • HowTo ForgeHow to Install a Teleport Cluster on Debian 11

        Teleport is an open-source that can be used as an access plane for your global infrastructure.

      • ByteXDWhat Do ‘sudo apt update’ and ‘sudo apt upgrade’ Do?

        Linux has an advanced package management tool called Advanced Package Tool, commonly referred to as APT (apt).

      • ByteXDHow to Show Progress During File Transfer with Rsync – ByteXD

        The (capital) -P option lets you show the progress during file transfer with Rsync.

      • DebugPoint2 Methods to Connect WiFi Using Terminal in Arch Linux and Other Distros

        This quick guide explains the steps you need to set up and connect to WiFi using a terminal in Arch Linux and other distros.

        This guide is ideal for those scenarios where you are stuck with a terminal without any GUI and no other wired internet connectivity is available. These steps help you to manually detect the wireless card and device and connect to the WiFi hotspot with password authentication via the terminal.

        This guide uses iwd (Net Wireless Daemon) and nmcli to connect to WiFi via a terminal.

      • OSTechNixSelf-host Your Own Internet Archive With ArchiveBox – OSTechNix

        This tutorial explains what is ArchiveBox and how to install ArchiveBox in Linux, and finally how to self-host your own personal Internet Archive with ArchiveBox.

      • HowTo ForgeHow to Install and Configure Varnish with Apache on Ubuntu 22.04

        Varnish Cache is a high-performance HTTP accelerator designed for high-traffic dynamic websites.

      • HowTo ForgeHow to Install NetBox Network Documentation and Management Tool on Ubuntu 22.04

        NetBox is an open-source IP address (IPAM) and datacentre infrastructure management (DCIM) web application used to manage and document…

      • ID RootHow To Install Lighttpd on Ubuntu 22.04 LTS – idroot

        In this tutorial, we will show you how to install Lighttpd on Ubuntu 22.04 LTS. For those of you who didn’t know, Lighttpd is a lightweight and open-source web server that is designed to be fast and efficient. It is well-suited for use on systems with limited resources or for handling a large number of concurrent connections.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Lighttpd web server on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

      • RoseHostingHow to Install phpPgAdmin on Ubuntu 22.04 – RoseHosting

        In this tutorial, we are going to show you how to install phpPgAdmin on Ubuntu 22.04 OS.

        phpPgAdmin is a web-based software used for managing the PostgreSQL database. PostgreSQL is an object-relational database management system. PostgreSQL can be managed through the command line, but for novice users, the better option is phpPgAdmin web-based GUI. In this blog post, we will install the PostgreSQL server first, then the phpPgAdmin. Also, we are going to use the Apache Web server so that you can access phpPgAdmin via the domain name.

        For this installation, we will need around 20 minutes. Let’s get started!

      • Red Hat OfficialHow to sudo in Kubernetes | Enable Sysadmin

        Kubernetes provides two options to escalate permissions temporarily: impersonation headings and the impersonate verb.

      • Own HowToHow to install Cloudron on Ubuntu 22.04

        In this tutorial you will learn how to Install Cloudron on Ubuntu 22.04

        Cloudron is a self-hosting solution that allows you to host apps on your server. Cloudron comes handy when you need to host more than one app on your server, for example: hosting a blog content management system such as wordpress and an email client.

      • Learn UbuntuInstall Sqlite3 on Ubuntu

        Being one of the least complex database engines, the sqlite3 is preferred by beginners as well as advanced users.

        Unlike most database systems, sqlite3 doesn’t require a server and can be embedded into the end program.

        This makes sqlite3 stand out as a lightweight, user-friendly, and portable solution.

        So in this tutorial, I will show you how you can install sqlite3 and how to create a simple table in Ubuntu

      • Manuel MatuzovicDay 73: size container features

        In my previous posts about size container features I’ve only used the min-width feature, but there’s actually more you can query.

        container-type: inline-size establishes size containment only on the inline axis. There is no block-size option because it wasn’t possible for browsers to implement, but there is a size option, which establishes size containment on both dimensions of the container. According to Miriam Suzanne, you should be careful using this option because I may cause side effects, but it allows you to query more than just the width/inline-size.

      • Manuel MatuzovicDay 72: the masonry-auto-flow property

        If you’re creating a masonry layout, the packing algorithm puts items into the column with the most space by default. This can cause accessibility issues. The masonry-auto-flow property gives us control over the automatic placement of items in a masonry layout.

      • Manuel MatuzovicDay 71: the masonry keyword

        The masonry keyword allows you to create masonry grid layouts.

      • Jim NielsenThinking Systematically

        This got me ruminating on design systems work, but also system abstractions in general.

        Thinking systematically, you begin to see abstractions in the one-offs which helps you translate the execution of a specific design to traits of a generalized one.

        What am I talking about? Take color, for example.

      • RachelWhy I still have an old-school cert on my https site

        People sometimes ask me why I don’t use Let’s Encrypt, and it’s a long story. It has a lot to do with just how damn evil the protocol is. It looks like it was created by people who had been drinking FAR too much of the web kool-aid, since it’s chock full of terrible things. It should be a small amount of drama to start a process, receive a magic string, sock it away somewhere at a magic path, then poke the validator and say “go for it”. Then you just check back and see whether it worked or not.

      • Terence EdenKonami Code Domain Name

        Yup, copy and paste that into your browser and it will resolve.

      • Daniel LemireEmojis in domain names, punycode and performance

        Punycode is a tricky format. Thankfully, domain names are made of labels (e.g., in microsoft.com, microsoft is a label) and each label can use at most 63 bytes. In total, a domain name cannot exceed 255 bytes, and that is after encoding it to punycode if necessary.

        Some time ago, Colm MacCárthaigh suggested that I look at the performance impact of punycode. To answer the question, I quickly implemented a function that does the job. It is a single function without much fanfare. It is roughly derived from the code in the standard, but it looks simpler to me. Importantly, I do not claim that my implementation is particularly fast.

      • Data SwampBooting Gentoo on a BTRFS from multiple LUKS devices

        This is mostly a reminder for myself. I installed Gentoo on a machine, but I reused the same BTRFS filesystem where NixOS is already installed, the trick is the BTRFS filesystem is composed of two partitions (a bit like raid 0) but they are from two different LUKS partitions.

        It wasn’t straightforward to unlock that thing at boot.

      • Sean ConnerThoughts on an implementation of Gemini mentions

        I also did a second implemenation that addresses all these points (and the code for this version is very similar to the other one). I guess I’ll see which one becomes more popular.

      • Kev QuirkDoes a Blog Need to Integrate?

        Having RSS integration on your site is hugely important.

      • Linux CapableHow to Install Google Chrome on Manjaro Linux

        Google’s Chrome browser is the most popular worldwide and is known for being fast, reliable, and secure and has a vast ecosystem of extensions and apps. By default, it is not installed on Manjaro Linux but is available from the AUR, which is short for Arch Linux user repository. The following tutorial will demonstrate using the terminal cli how to install all three builds of Google Chrome stable, beta, and developer (unstable) on Manjaro Linux using the command line terminal.

      • Linux CapableHow to Install DeaDBeeF on Manjaro Linux

        DeaDBeeF is a free, open-source music player for Linux, Android, and other UNIX-like that supports various audio formats, including MP3, Ogg Vorbis, FLAC, and WAV. The following tutorial will show you how to install the audio player on Manjaro using the Arch Linux user repository and command line terminal.

      • DebugPointInstall Latest MS Paint Alternative Pinta in Ubuntu and Other Linux [Ed: Well, better to avoid, it is Microsoft Mono.
      • Matthew GarrettChanging firmware config that doesn’t want to be changed [Ed: Microsofter moans about "an irritating restriction" while encouraging the adoption of of irritating restrictions]
      • TecMint9 Useful “mv” Command in Linux with Examples

        In this beginner’s guide, we will discuss some practical examples of the mv command. After following this guide, Linux newbies will be able to rename and move files and directories easily from the command line interface.

        Files and directories are the building blocks of the operating system. As regular users, we interact with the files and directories on a daily basis. Often times we rename or move files from one location to another for better organization. Definitely, we can perform this operation using the Graphical User Interface (GUI). However, most Linux users prefer to use the mv command due to its rich functionality.

        In this easy-to-understand guide, we will learn the basics of the mv command. As the name suggests, the mv command is used to rename or move files and directories.

        In this guide, we will learn about the mv command using practical examples. Beginners can use these examples on a day-to-day basis while working with Linux systems.

      • Trend OceansThe Quickest Way to Append Text at the Beginning of a File in Linux – TREND OCEANS

        There are no specific commands or operators for these tasks, but don’t worry. We’ve figured out how to add text to the beginning of a file in Linux, and we’ll show you how.

      • Understanding the Role of /dev/sda in Linux

        When a Windows user encounters a Linux system for the first time, their first thought is: where are the “C:/“, “D:/“, or “E:/” drives?

        So, my innocent Linux newbies, you must know that Linux doesn’t have any concept of local disk like in Windows; here, each and everything represents a file.

        Before you understand exactly what “/dev/sda” is (primary object of this article), you must first know about what files are and the different types of files in Linux.

      • TechRepublicOTRS Guide: How to create groups and add permissions

        OTRS is a very powerful open-source ticketing help desk solution that any business would be smart to consider. I recently walked you through the installation of OTRS and now it’s time to dive in and start getting the system ready for work.

      • UNIX CopHow to list dependencies of a RPM package using DNF

        If you would like to learn how to list the dependencies of an RPM package using DNF, then you have to read this post. So, when you are going to install an RPM package, you will know exactly what it requires from the system.

        As we all know, RPM is a package format for Red Hat or SUSE Linux derivatives. Like DEB format packages, RPMs contain instructions and binaries about applications to be installed on Linux.

        However, an RPM package might need other packages to be installed, and today we will find out what they are in a quick and easy way thanks to DNF

      • Linux Made SimpleHow to install Gacha Nox on a Chromebook

        Today we are looking at how to install Gacha Nox on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

      • Make Use OfYour Ubuntu Linux PC Won’t Boot? 5 Common Issues and Fixes

        You’ve switched on your computer, preparing to do some work, edit a document, mix a composition, or just play a game… but something goes wrong. Ubuntu won’t boot.

        Sadly, as reliable as Linux is in general and as popular as Ubuntu is, sometimes it runs into problems, just like Windows 11 or macOS. In most cases, you’ll be able to work around this.

        Whether you’re using Ubuntu Desktop or Ubuntu Server, here’s what to do if Ubuntu doesn’t boot.

      • Red Hat OfficialTroubleshooting Linux, analyzing processes, and more tips for sysadmins | Enable Sysadmin

        Check out Enable Sysadmin’s top 10 articles from December 2022.

      • ByteXDSystemd Tutorial – Learn How to Use Systemd to Manage Your Linux System

        The secret to controlling services on your Linux system lies in understanding how to use systemd effectively.

      • ByteXDSystemd Unit Files Everything You Need to Know – ByteXD

        systemd is the mother of daemons. Daemons are services running in the background without user interaction.

      • LinuxiacInstalling Caddy and PHP 8.1 on Ubuntu 22.04 with Ease

        This guide provides step-by-step instructions for installing Caddy and PHP 8.1 on Ubuntu 22.04 and obtaining a free SSL certificate.

        Caddy is a free, security-focused, HTTP/2-enabled web server written in Go, designed to be simple, efficient, and portable. In addition, it offers modern capabilities such as virtual host support, reverses proxy functionality, and so on. Still, Caddy is the first web server to automatically obtain and renew SSL/TLS certificates using Let’s Encrypt.

        Yes, Nginx has reigned supreme as the preferred choice for web servers in recent years due to its lightning-fast performance and many features. However, despite being a relatively new project, Caddy’s popularity has skyrocketed due to undeniable characteristics like the ease of use, speed, and native SSL support. So, it is quickly becoming the web server of choice for many developers and system administrators.

      • Major HaydenAutomatic container updates with watchtower – Major Hayden

        Watchtower keeps an eye on your running containers and updates them when new containers appear upstream.

    • Games

      • ScummVMHail, traveler. Welcome to Farr.

        Most new visitors don’t know about Mrs. Riddenbutter’s, but you should do yourself a favor and enjoy some of her hospitality and a tankard or two of her ale. Double-click on her door to open it, and step inside. Riddenbutter works the bar, and the smart traveler should speak with her. Drop an idea on her to get her chatting. Like most people, she likes to talk about this and that and the other thing, and she’ll also frequently respond with information that’s more local in nature.

      • GamingOnLinuxIndie game character filled platform-battler ‘Fraymakers’ arrives January 18th

        After a successful Kickstarter back in 2020, Fraymakers is getting set to hit Early Access on January 18th. Developed by McLeodGaming, who also made Super Smash Flash 2, a very popular Smash Bros fangame.

      • HackadayAn Epic Quest To Build The Ultimate Game Boy

        If you didn’t grow up clutching Nintendo’s original DMG-01 Game Boy, it might difficult to see the appeal in 2023. It had the ergonomics of a brick, the system’s unlit LCD screen utilized a somewhat nauseating green color palette, and when compared to its contemporary competition like the Sega Game Gear or Atari Lynx, it would certainly appear to be the inferior platform. But despite its faults there was just something magical about the machine, and those who have a soft spot for the iconic handheld are always eager to relive those glory days.

    • Desktop Environments/WMs

      • Linux Links9 Best Free and Open Source Tiling Window Managers

        A window manager is software that manages the windows that applications bring up. For example, when you start an application, there will be a window manager running in the background, responsible for the placement and appearance of windows.

        It is important not to confuse a window manager with a desktop environment. A desktop environment typically consists of icons, windows, toolbars, folders, wallpapers, and desktop widgets. They provide a collection of libraries and applications made to operate cohesively together. A desktop environment contains its own window manager.

      • K Desktop Environment/KDE SC/Qt

        • TSDgeos’ blog: The KDE Qt5 Patch Collection has been rebased on top of Qt 5.15.8

          The Commercial Qt 5.15.8 release introduced two bugs that have later been fixed. Thanks to that, our Patchset Collection has been able to incorporate the the fix for one of the issues [1] and revert for the other [2] and the Free Software users will never be affected by it!

        • KritaKrita 5.1.5 Released

          We’re releasing today a new bugfix release. This is mainly important for Android and ChromeOS users where sometimes Krita would be very slow opening or creating a new image, or loading an image.

  • Distributions and Operating Systems

  • Free, Libre, and Open Source Software

    • LWNBeyond microblogging with ActivityPub [LWN.net]

      ActivityPub-enabled microblogs are gaining popularity as a replacement for Twitter, but ActivityPub is for more than just microblogging. Many other popular services also have open-source alternatives that speak ActivityPub. Proprietary services operated by commercial interests usually deliberately limit interoperability, but users of any ActivityPub-enabled service should be able to communicate with each other, even if they are using different services. This promise of interoperability is often limited in practice, though; while ActivityPub specifies how multiple types of content can be published, the kinds of content that can be displayed or interacted with vary from project to project.

      The ActivityPub protocol describes how servers can exchange Activity Streams. Microblogs mostly emit activities related to status updates (which is called a “Note” in ActivityPub parlance), but there are many other types of objects that can be described in these streams. ActivityPub projects that aren’t microblogs mostly specialize in publishing activities related to one or more of these other types of objects; instead of notes, they publish pages, images, or videos. All types of objects are allowed to contain some common fields, including a name and a URL; software that doesn’t understand a particular type of object may fall back to using these fields to display a link to the object on its original server instead, or may simply choose not display the object at all.

      Unless otherwise noted, all of the projects mentioned in this article are released under the terms of the AGPL 3.0.

    • SaaS/Back End/Databases

      • Lætitia AvrotDon’t do this: creating useless indexes

        Indexes are not bad, but can really harm your workload if not used the proper way. Defining a great indexing policy is an everyday job as the application queries, the data and the data model will change. Also, remember Postgres creates btree indexes by default but there are a lot more than mono column btree indexes in Postgres. Read chapter 11 of the Postgres Documentation to find out more about indexes in Postgres!

    • Licensing / Legal

      • Ziff DavisMicrosoft, GitHub and OpenAI Accused of Software Piracy, Sued for $9B in Damages

        GitHub Copilot was designed to streamline software development by enabling developers with relevant artificial intelligence-generated code suggestions as and when they type the code. Meanwhile, the code it is trained on is licensed under the MIT license, GPL, Boost Software License (BSL-1.0), BSL 2, Eclipse Public License, Mozilla Public License 2.0, the Apache license and others.

        Litigants claim that Microsoft, GitHub, and OpenAI ingested and distributed licensed materials (i.e., the training code) without appropriate attribution, copyright notice, or adherence to licensing terms.

    • Programming/Development

      • Linux JournalFault-Tolerant SFTP scripting – Retry Failed Transfers Automatically | Linux Journal

        The whole of modern networking is built upon an unreliable medium. Routing equipment has free license to discard, corrupt, reorder, or duplicate data which it forwards. The understanding of the IP layer in TCP/IP is that there are no guarantees of accuracy. No IP network can claim to be 100% reliable.

        The TCP layer acts as a guardian atop IP, ensuring data that it produces is correct. This is achieved with a number of techniques that sometimes purposely lose data in order to determine network limits. As most might know, TCP provides a connection-based network with guaranteed delivery atop an IP connectionless network that can and does discard traffic at will.

        How curious it is that our file transfer tools are not similarly robust in the face of broken TCP connections. The SFTP protocol resembles both its ancestors and peers in that no effort is made to recover from TCP errors that cause connection closure. There are tools to address failed transfers (reget and reput), but these are not triggered automatically in a regenerated TCP session (those requiring this property might normally turn to NFS, but this requires both privilege and architectural configuration). Users and network administrators alike might be rapt with joy should such tools suddenly become pervasive.

      • Rebuild mozc with Mozc UT Dictionary – ひとりしずかに。

        When rebuilding mozc with Mozc UT Dictionary, it may be better to build in docker container because you don’t want install unused IM development packages.

      • TecAdminGit Change Remote URL to SSH (from HTTPS) – TecAdmin

        Git is a distributed version control system that is widely used for tracking changes in source code during software development. It allows developers to collaborate on projects and keep track of their changes without the need for a central repository.

        One way to access a Git repository is via SSH (Secure Shell). SSH is a network protocol that provides a secure way to communicate with a remote computer over an unsecured network. Using SSH can be more secure and efficient than other methods, such as HTTP or HTTPS, for accessing Git repositories.

      • QtQt 6.4.2 Released

        I am happy to announce that we have released Qt 6.4.2 today.

        As a patch release, Qt 6.4.2 does not introduce any new features but contains ~ 150 bug fixes, security updates, and other improvements to the top of the Qt 6.4.1 release. See more information about the most important changes and bug fixes from Qt 6.4.2 release note.

      • ButtondownWhy Modeling Finds Bugs (Without Model-Checking)

        The main impetus for these changes is that I’ve left Twitter. While it will assuredly improve my mental well-being, it’s not a great change for my professional prospects. I’ve leaving behind a large audience, a reliable source of client connections, and a medium to share unrefined software thoughts.

      • Yoshua WuytsState Machines III: Type States

        I’ve been writing a bit about state machines recently. In my last post I explained how we could potentially leverage arbitrary self-types and anonymous enums to support type-level state machines as a first-class construct. Which is cool, but it had some readers asking: “How does this improve on the existing type state pattern?” Which is fair!

        Well, to start off by answering that question: it’s only after authoring that post that I learned that “type states” have a name! I was familiar with the pattern, but I didn’t realize it had a name. If you’d like to learn more about them, Will Chrichton gave an excellent presentation about API design which also covers type states.

      • Matt Might26 programming languages in 25 days, Part 1: Strategy, tactics and logistics

        In the end:

        on 12 days, I had to learn a new programming language from scratch, and then use it to solve that day’s puzzle;

        on 4 days, I used languages where I had very little experience; and

        on the other 9 days, I used languages I had known well at some point.

        Ultimately, I used 26 languages, because I combined two on Day 21 (sed and bc), turning the experience into a rapid-fire “breadth-first search” of programming language space.

      • Matt Might26 programming languages in 25 days, Part 2: Reflections on language design

        Here are my two high-level reflections from the experience:

        Good design in the first part of each puzzle – especially more functional techniques and abstractions – tended to make the second part easier. So, in general, functional languages seemed to have the advantage in the puzzles.

        Using better algorithms and data structures was far more important than having a “faster” programming language. There was never a time where rewriting in another language felt like the right way to get better performance.

        Read on for more specific reflections on language design.

      • Niall MurphyOn OKRs

        I’m solidly in favour of a planning architecture of some kind for any team-size collection of people greater than about 5. (Hell, arguably above 2, but let’s keep overheads down.)

        I’ve had the opportunity to try OKRs across a number of teams and companies, and I’ve found them useful overall. Those of us who’ve been in large companies or planning-focused small companies will have encountered a number of approaches to planning before. OKRs take their place amongst this number, I think; neither clearly the best (but absolutely not the worst), they are great for certain kinds of things but not for others.

        Let me be more precise.

      • Programming Language DataBaseA Programming Language DataBase – 2022 recap and roadmap for 2023

        2022 was a breakout year for a Programming Language DataBase (PLDB). We are now used by over ten thousand people in a slow week and probably were used by over a million people on the year (I can’t be too exact since our stuff is public domain and we don’t do much tracking). Some of the world’s top software people got in touch with us and we now provide analysis on how to make their companies’ languages better. Not bad for a research effort started by a kid from Brockton without a PhD! I am 100% convinced that someone can (and will) revolutionize research in any and every domain simply by copying our tech and creating a high-quality public domain CSV file for their domain.

      • Nicholas Tietz-SokolskyA confusing lifetime error related to Rust’s lifetime elision

        Earlier this week, I ran into a confusing situation with lifetimes and the borrow checker while working on my Lox interpreter. It took me a little while to figure out, and it’s an instructive situation.

        Here’s a reduced-down version of what I was working on. It’s an interpreter, so there is a scanner which produces tokens. Ideally these tokens are references back into the underlying original string so that you can avoid any more memory allocation.

      • OpenSource.com6 tips for building an effective DevOps culture

        Why would you want to build a DevOps culture? There are many benefits to the streamlined collaboration of the development and operations teams. A major goal is efficiency: Increasing the speed of new software deployments and reducing idle time for workers. Fostering trust between colleagues can improve employee satisfaction, produce new innovations, and positively impact profitability.

        DevOps is a broad philosophy with a range of interpretations. In other words, you can visit 40 companies and find 40,000 different ideas about using DevOps effectively in the workplace. This diversity of opinion is actually a good thing–so many perspectives are useful for building stronger teams. This guide will look at the top tips for encouraging better collaboration between colleagues within a DevOps culture.

        Each section offers a different aspect of DevOps culture and looks at ways to introduce it into your workforce.

      • AdafruitBoston students win 2022 NASA Space Apps global championship
      • AdafruitQuick Start: Pico W with WipperSnapper [Ed: AdafruitNew guide]
      • Python

        • peppe8oMQTT and Raspberry PI Pico W: Start with Mosquitto (MicroPython)

          Raspberry PI Pico W brings connectivity to your projects. Mosquitto is one of the most reliable, simple and fast communications for IoT projects.

        • AdafruitThe Python on hardware news for this week!
        • University of TorontoFinding people’s use of /usr/bin/python with the Linux audit framework

          Our Ubuntu systems have had a /usr/bin/python that was Python 2 for more or less as long as we’ve had Ubuntu systems, which by now is more than fifteen years. Over that time, our users have written a certain amount of Python 2 programs that use ‘#!/usr/bin/python’ to get Python 2, because that’s been the standard way to do it for a relatively long time. However, Python 2 is going away on Ubuntu since it has on Debian, and as part of that we’re probably going to stop having a /usr/bin/python in our future 24.04 LTS servers. It would be nice to find out which of our users are still using ‘/usr/bin/python’ so that we can contact them in advance and get them either to move their programs to Python 3 or at the very least start using ‘#!/usr/bin/python2′. One way to do this is to use the Linux kernel’s audit framework. Or, really, two ways, the broad general way and the narrow specific way. Unfortunately neither of these are ideal.

      • Shell/Bash/Zsh/Ksh

        • Björn WärmedalProgram Picker With Zenity

          Zenity is a small utility program for building simple graphical widgets and menus. I’ve never had use for it before, but a few days ago I ran into a situation that it just so happened to be perfect for.

      • Rust

    • Standards/Consortia

      • Barry HessCDs Like Baseball Cards

        So I suggested CDs. To this younger set, they are still interesting. They are still physical. They still have artwork and liner notes. As an object, vinyl still beats CDs, I think, but they can always progress there if they’d like. Oh, and playing a CD is a much more straightforward process.

  • Leftovers

    • Gregory HammondPersonal Blogging was Never Dead, It Has Changed

      It would first help to know the definition of personal blogging, I would define it having your own website to write and publish the content that you want. Some may say that having your own website means paying for a domain, but I’m not going to gate keep what a personal blog is.

      There are always people raving about how personal blogging should come back, and more people should do it. While there will be people who are motivated by that and will blog. There are also many generations who won’t, for many the definition of blogging has changed.

    • [Old] Matt MightHOWTO: Avoid temptation — why avoiding temptation is harder than you think

      As a result, three regions emerge around every temptation:

      1. the akratic zone, where willpower alone can’t save you anymore;

      2. the danger zone, where willpower will eventually falter if you stay too long; and

      3. the safe zone, where willpower is stable enough to resist indefinitely.

    • MWLThe Terminal Brag Shelf

      Unfortunately, seeing everything neatly arranged here with lots of room for more books, more room than I can possibly write to fill, my first thought was: I must overflow this bastard.

    • HackadaySomething’s Rotating In The State Of Denmark: A Clock

      If you visit the Copenhagen City Hall, you’ll see an ornate mechanical clock. By itself, this is unremarkable, of course. There are plenty of ornate clocks in city halls around the world, but this one has a fascinating backstory that starts with a locksmith named Jan Jens Olsen. Unfortunately, Jens didn’t actually complete the clock before his death. It would take 12 years to put together the 15,448 individual parts. However, he did manage to see most of the clock that he had been designing for 50 years put together.

    • Counter PunchHollywood Jazz Trio

      We lived around the corner from a Shakey’s pizza joint off Sunset Boulevard in West Hollywood. I’d just got discharged from the VA after a short stint in the Air Force, where I crazed out the first night at Lackland AFB boot camp, and was sent to the base hospital dissociating and ending up answering the psychiatrist’s questions with what he later termed “bizarre metaphysical overtones,” which got me honorably discharged a few months later, sans any GI Bill. Mark, a friend of mine from back East, who’d just flown West and moved in with his brother, who was then living in Hollywood, told me to join out there. Fresh start. So, out I went to La-La Land.  And here I was standing at the counter to pick up our pepperoni pizzas. I came in twice a week for happy hour specials that featured ridiculous amounts of pizza and pitchers of beer. A Dixieland band played widely as I paid the tab, grabbed my pies, and left.

      Coming into my apartment building a Latino guy named Manuel (pronounced like the artist Buñuel’s, but without the tilde). He was in his 40s I guessed, quiet, nervous, always smoking. He looked a little like James Dean, from the way he dressed and groomed, but one who’d been beaten half to death a few times. He didn’t look you in the eye right away. He sometimes hung around the front steps, stirring.

    • [Old] Suicide, 3D printed and AI-monitored | Stop at Zona-M

      As far as I understand this pod, called Sarco, would circumvent restrictions on assisted suicide and “demedicalises death” because it can be only operated from the inside. The person who needs it sits inside, closes the pod and pushes a button all by himself, without any need to convince anyone else, medic or not, to “assist” in any way. I have no expertise or intention to comment on this in any way, so let’s look at the rest.

      [...]

      Yeah, right. The Sarco design files are special files that cannot be copied, are hosted on servers that nobody will ever succeed to crack, and will be only downloaded by users with equally unbreakable computers. Sure. Or, by the time I am writing this, those files have already been copied on God knows how many unhautorized computers.

    • Science

      • HackadayMachine Learning Makes Sure Your LOLs Are Genuine

        There was a time not too long ago when “LOL” actually meant something online. If someone went through the trouble of putting LOL into an email or text, you could be sure they were actually LOL-ing while they were typing — it was part of the social compact that made the Internet such a wholesome and inviting place. But no more — LOL has been reduced to a mere punctuation mark, with no guarantee that the sender was actually laughing, chuckling, chortling, or even snickering. What have we become?

      • IBM Old TimerIrving Wladawsky-Berger: Why Are Enterprises Struggling with Blockchain?

        “Blockchain, the technology underpinning bitcoin and other cryptocurrencies, for years has been viewed by some companies as a way to drive industry-transforming projects, among them the tracking of assets through complex supply chains,” according to a recent article in the Wall Street Journal, “Blockchain Fails to Gain Traction in the Enterprise.”

        “So far that hasn’t happened.”

        Blockchain technologies first came to light in 2008 as the architecture underpinning bitcoin, the best known, most valuable, and most widely held cryptocurrency. Over the years, blockchain has evolved in two major directions. One continues to focus on blockchain as the underlying platform for bitcoin, as well as for the large number of cryptocurrencies, digital tokens, and other crypto assets that have since been created. The other focuses on blockchain as a distributed data platform for collaborative applications involving multiple institutions, such as supply chains, financial services and healthcare systems.

    • Hardware

      • HackadayStewart Platform Keeps Its Eye On The Ball

        Although billed as a balancing robot, [Aaed Musa’s] robot doesn’t balance itself. It balances a ball on a platform. You might recognize this as something called a Stewart platform, and they are great fun at parties if you happen to party with a bunch of automation-loving hackers, that is. Take a look at the video below to see the device in action.

      • HackadayThe Flight Of The Dremel

        A few months ago we featured a model aircraft whose power plant came courtesy of an angle grinder. It was the work of [Peter Sripol], and it seems he was eseiged by suggestions afterwards that he might follow it up with a helicopter built using a Dremel rotary tool. Which he duly did, and the results can be seen in the video below the break.

      • HackadayZen And Glowing Air Bubble Displays

        When you work in a medium for long enough, and you learn how it works more and more deeply, you eventually become its master. [Yukio Shinoda] is probably master of the LED bubble display.

      • HackadayA White-Light Laser, On The Cheap

        Lasers are known for the monochromatic nature of their light, so much so that you might never have thought there could be such a thing as a white laser. But in the weird world of physics, a lot of things that seem impossible aren’t really, as demonstrated by this dirt-cheap supercontinuum laser.

      • AdafruitMaking a Sci-Fi Soldier’s Helmet from Harbor Freight Parts – Adafruit Industries – Makers, hackers, artists, designers and engineers!

        On this episode of CreateSciFi, Tony decides to go to a Harbor Freight with no idea what he’s going to make.

        He decides to let the products he encounters inspire the idea. He ends up finding a safety helmet and a face shield and from there he decides to create a helmet for a sci-fi soldier.

      • CNX SoftwareNXP i.MX 95 processor features Cortex-A55, Cortex-M33, and Cortex-M7 cores, eIQ Neutron NPU – CNX Software

        NXP i.MX 95 is an upcoming Arm processor family for automotive, industrial, and IoT applications with up to six Cortex-A55 application cores, a Cortex-M33 safety core, a Cortex-M7 real-time core, and NXP eIQ Neutron Neural Network Accelerator (NPU).

        We’re just only starting to see NXP i.MX 93 modules from companies like iWave Systems and Forlinx, but NXP is already working on its second i.MX 9 processor family with the i.MX 95 application processor family equipped with a higher number of Cortex-A55 cores, an Arm Mali 3D GPU, NXP SafeAssure functional safety, 10GbE, support for TSN, and the company’s eIQ Neutron Neural Processing Unit (NPU) to enable machine learning applications.

      • The immense stupidity of uselessly wireless tools | Stop at Zona-M

        When I took that screenshot of their website, that huge hardware store had a handful of wired drills, mostly really expensive ones, but literally 10 or 15 times more wireless drills. All this for a customer base that is 90% people like me, that is occasional hobbysts, for whom wired or wireless would make zero to very little practical difference.

    • Health/Nutrition/Agriculture

      • GannettA record number of America’s kids were injured or killed by gunfire in 2022

        In the year since, more than 6,000 children and teens were injured or killed in shootings, according to the nonprofit Gun Violence Archive. That’s the most in a single year since the database began tracking nine years ago.

        As the epidemic of gun violence continues to wreak havoc on the nation, here’s how shootings affected America’s children in 2022.

      • TruthOutFDA Rules That Retail Pharmacies Can Offer Abortion Medication
      • Counter PunchAn Entire Decade of Benefits Denial for Vets After Toxic Chemical Exposure?

        Camp Lejeune, a military base in Jacksonville, North Carolina, was established in 1942 to train future Marines for World War II. While it is known as the home of “Expeditionary Forces in Readiness,” the facility also has a long history of contamination with toxic chemicals such as perchloroethylene, vinyl chloride, trichloroethylene, and benzene. In 1982, volatile organic compounds—gasses released by these solvents—were found at Camp Lejeune.

        Furthermore, since 1966, military firefighters and trainees have been using the fire suppressant known as Aqueous Film Forming Foam (AFFF) to extinguish jet fuel and petroleum fires, which only worsened pollution. This firefighting foam contains PFAS, a group of over 5,000 dangerous substances often dubbed “forever chemicals,” in a concentration of up to 98 percent. With each use, AFFF contaminates the environment with these chemicals. Some take over a thousand years to break down, hence their nickname.

      • Counter PunchThe NFL: America’s Billion Dollar Blood Sport

        American football has always been a blood sport.

        It needs to change or die.

      • Common Dreams‘Will Save Lives’: Warnock Hails Start of $35 Insulin Copay Cap for Medicare Recipients

        A provision capping Medicare recipients’ insulin copayments at $35 a month took effect on the first day of the new year, a change that Democratic Sen. Raphael Warnock applauded Tuesday as a crucial victory that lawmakers must work to extend to all people who need the lifesaving medicine.

      • Common DreamsAs US Moves On From Pandemic, Demand for Covid Vaccines Wanes in Global South

        Four months after U.S. President Joe Biden said in a television interview that “the pandemic is over,” global immunization experts are warning that “pandemic fatigue” may be contributing to declining demand for Covid-19 vaccines in developing countries, even as vaccination rates in the Global South are far below the World Health Organization’s target.

    • Proprietary

      • The HillFour cyber concerns looming in the new year [iophk: Windows TCO]

        Cyberattacks have surged in recent years, with the health care system and other critical sectors increasingly coming under digital assault as the threat of malware like ransomware and foreign spyware continues to evolve.

        Last year in particular saw officials and lawmakers renew their focus on cybersecurity and seek to secure the country’s critical sectors from rising cyber threats. The issue is expected to continue to take center stage in the coming year, as many of those threats are still escalating while the cyber sector is confronting an ongoing workforce shortage in its efforts to bolster the U.S.’s digital defenses.

        Here are four cyber concerns expected to take priority in 2023.

    • Security

      • Integrity/Availability/Authenticity

        • Filippo ValsordaGO 1.20 Cryptography

          The first second release candidate of Go 1.20 is out![1] This is the first release I participated in as an independent maintainer, after leaving Google to become a professional Open Source maintainer. (By the way, that’s going great, and I’m going to write more about it here soon!)

          I’m pretty happy with the work that’s landing in it. There are both exciting new APIs, and invisible deep backend improvements that are going to make code more maintainable and secure in the long run. All the main work mentioned in the planning post got done, and then some (but not the “stretch goals”). The whole release is pretty exciting, too, and you should check out the release notes (although the cryptography parts might not be complete yet).

        • Xe’s BlogHow to move away from RSA for SSH keys

          For a while cryptographers have feared that RSA is vulnerable to a quantum computing algorithm known as Shor’s Algorithm. I won’t pretend to understand it in this article, but the main reason why it’s not deployed is that the hardware required to attack RSA keys in the wild literally doesn’t exist yet (think literally tens of generations more advanced than current quantum computers).

          A group of researchers have just published a paper that posits that it’s likely you can break 2048-bit RSA (the most widely deployed keysize) with a quantum computer that only uses 372 qubits of computational power. The IBM Osprey has 433 qubits.

      • Privacy/Surveillance

        • RachelNot quite a successful prediction about tracking Apple stuff

          Just a hair over 10 years ago, I wrote a post lamenting the fact that my WiFi-only original iPad (which was new at the time) was probably a mistake. After all, if I took it outside my house and away from the one wireless network it knew, it was now cut off from the Internet. If someone stole it or if I left it behind somewhere, there would be no way to track it down or wipe it.

        • SalonNew Louisiana law requires digital ID to access online porn, raising ques

          Called House Bill 142, the new law requires websites containing 33.3% or more pornographic content to verify viewers’ age using a government-issued form of identification, a process known as “reasonable age verification.” The law was officially set into motion on Jan. 1 after it was introduced last year by Rep. Laurie Schlegel (R-LA) — who was inspired by musician Billie Eilish’s comments on the harmful effects of watching porn — and approved in June by Gov. John Bel Edwards.

        • Site36German federal state to train hundreds of police drone pilots

          North Rhine-Westphalia is a nationwide pioneer in aerial surveillance

        • Biometric UpdateKenyan Telco urged to delete biometric data collected for SIM registration

          Global human rights watchdog Access Now has called on a mobile telecommunications company in Kenya, Safaricom, to delete all face biometrics data collected from citizens between November 2021 and April 2022 within the framework of an ongoing SIM card registration process in the East African country.

          In an open letter, the rights organization accused the telco of unlawfully collecting facial images of Kenyan citizens for the SIM registration exercise in violation of multiple laws in Kenya.
          The laws, according to the watchdog, include the Kenya Information and Communications (Registration of SIM cards) Regulations 2015; the Data Protection Act 2019; the General Data Protection Regulations 2021, the Kenya Information and Communication (Consumer Protection) Regulation 2010, and the Consumer Protection Act.

        • Egypt’s new high-tech capital: Smart city or surveillance trap? | Context

          The gleaming tower blocks and high-tech facilities of President Abdel Fattah al-Sisi’s flagship new capital are a far cry from Cairo’s congested streets and crumbling facades.

          In the New Administrative Capital that is taking shape in the desert, lampposts double up as WiFi hotspots, keycards grant access to buildings, and more than 6,000 surveillance cameras keep watch over the first of its 6.5 million residents.

          A single mobile app allows the city’s inhabitants to make utility payments, access public services and register complaints with the authorities.

        • Parenting tech is booming, watch out | Stop at Zona-M

          Thinking with their OWN brain has never been more important for parents.

          Nesta just announced a new report about “what’s next for parenting tech”.

    • Defence/Aggression

      • FAIR‘There Is More Than One Solution Needed to the Problem of an Insurrection’

        Janine Jackson interviewed Public Citizen’s Lisa Gilbert about the January 6 report for the December 23, 2022, episode of CounterSpin. This is a lightly edited transcript.

      • Telex (Hungary)Opposition politician sends bailiffs to Ministry of Foreign Affairs
      • MeduzaIn the wake of a black swan In trying to predict the effects of sanctions, economists in Russia and abroad failed to realize that 2022 had no economic precedents — Meduza

        Shortly after launching the invasion of Ukraine, Russia topped the global list of sanctioned countries, incurring three times more cumulative sanctions than Iran. As Russia lost half of its foreign assets, the U.S. dollar exchange rate spiked to 130 rubles. Responding to the Central Bank’s monthly survey, Russian economists projected an eight-percent shrinkage of the country’s GDP and a 20-percent annual inflation rate, while also predicting that the dollar conversion rate would hover around 110 rubles. But none of those forecasts materialized, thanks to the fossil fuel exports that generated a trade surplus, and to fiscal policies that helped cushion the ruble. Meduza’s special correspondent Margarita Lyutova explains how the Russian economy managed to survive 2022, and what challenges might be awaiting it in 2023.

      • MeduzaKirill Romanovsky, correspondent for RIA FAN, has died — Meduza

        War correspondent for the pro-Kremlin news outlet RIA FAN (Federal News Agency) has died, reports his friend and RIA FAN author Abbas Juma, on his personal Telegram channel.

      • Site36„I can’t breathe!“, a man who picked up his father at a German police station had to shout

        Officers in southern Hesse overwrite incriminating video after police violence

      • MeduzaOccupying authorities in Zaporizhzhia report five dead and 15 wounded in a strike in Vasylivka — Meduza

        Five people were killed, and 15 received injuries of varying severity, following an attack on the city of Vasylivka, in the Russian-controlled part of Ukraine’s Zaporizhzhia, says acting governor of the occupied territories, Yevgeny Balitsky.

      • MeduzaThe true war of attrition begins Meduza sums up what happened on the battlefield in 2022 — and what it portends for the year ahead — Meduza

        Late in 2022, the war in Ukraine reached a new turning point. Russia conducted its “first wave” of mobilization and partially eliminated the personnel deficit that contributed to its numerous military defeats in the fall. Now, the Russian army might face a shortage of a different resource: artillery ammunition. Meanwhile, Ukraine is experiencing a shell shortage of its own. Overcoming the deficiency won’t be easy: the West, which is assisting Ukraine with supplies, has largely exhausted its available stockpiles. It is against this backdrop that Russia and Ukraine are fighting a protracted artillery battle around the cities of Soledar and Bakhmut, which is rapidly eating away at the remaining ammunition on both sides. Increasingly, it seems the true “war of attrition” — as many began referring to the war in Ukraine almost as soon as its hot stage began — will take place in 2023. The outcome of this stage will hinge primarily on which side is better able to adapt to its worsening ammunition shortage.

      • ScheerpostPatrick Lawrence: The Sino-Russian Summit You Didn’t Read About

        The New York Times coverage of the recent summit between Vladimir Putin and Xi Jinping misses some of its most important details, writes Patrick Lawrence.

      • Counter PunchThe Threat Business: Russia or China?

        For those in charge of US national security, the central challenge is identifying threats and determining how to counter them. The Biden administration has cast China and Russia, in that order, as the major threats to US security.

      • Counter PunchCall for Solidarity Actions with Anti-war Activists in Russia

        This is a call for solidarity with Russian anti-war activists by Ilya Budraitskis on behalf of The Russian Socialist Movement.

        For over a decade, Russian antifascists have commemorated January 19 as their day of solidarity. This is the date when in 2009, in the center of Moscow, the human rights and leftist activist Stanislav Markelov and the journalist and anarchist Anastasia Baburova were gunned down by neo-Nazis.

      • Counter PunchCan NATO and the Pentagon Find a Diplomatic Off-Ramp From the Ukraine War?

        NATO Secretary General Jens Stoltenberg, known for his staunch support for Ukraine, recently revealed his greatest fear for this winter to a TV interviewer in his native Norway: that the fighting in Ukraine could spin out of control and become a major war between NATO and Russia. “If things go wrong,” he cautioned solemnly, “they can go horribly wrong.”

        It was a rare admission from someone so involved in the war, and reflects the dichotomy in recent statements between U.S. and NATO political leaders on one hand and military officials on the other. Civilian leaders still appear committed to waging a long, open-ended war in Ukraine, while military leaders, such as the U.S. Chair of the Joint Chiefs of Staff General Mark Milley, have spoken out and urged Ukraine to “seize the moment” for peace talks.

    • Transparency/Investigative Reporting

    • Environment

      • Saudi ArabiaAfghanistan’s Taliban administration in oil extraction deal with Chinese company

        Afghanistan’s Taliban-led administration is to sign a contract with a Chinese company to extract oil from the Amu Darya basin in the country’s north, the acting mining minister said on Thursday.

        The contract would be signed with Xinjiang Central Asia Petroleum and Gas Co (CAPEIC), officials told a news conference in Kabul.

      • CNNChina and Philippines agree to ‘manage differences’ on South China Sea

        Chinese leader Xi Jinping and his Philippine counterpart Ferdinand Marcos Jr. have agreed to strengthen economic ties and resume talks on oil exploration, as they look to revive their economies amid the pandemic downturn and friction over contested areas of the South China Sea.

      • Common DreamsClimate Devastation Continues in California as Megastorm Sparks Fresh Fears

        Hot on the heels of a major winter storm that inundated Northern California with torrential rains and deadly flooding, residents of the Golden State braced Wednesday for what’s expected to be an even more devastating storm—the latest climate chaos to wreak havoc in the U.S. West amid a worsening planetary emergency.

      • Common DreamsWill New CEO Tim Sweeney Clean Up Liberty Mutual’s Climate and Human Rights Record?

        You have likely never heard of him, but Tim Sweeney just became a critical decision maker when it comes to the fate of the fossil fuel industry’s global expansion plans. As of January 1, 2023, Sweeney is the new CEO of Boston-based insurance giant Liberty Mutual, which is one of the biggest coal, oil, and gas insurers in the world.

      • Energy/Transportation

        • The EconomistSam Bankman-Fried pleads not guilty

          In addition, the complaints against Ms Ellison suggest that Mr Bankman-Fried instructed his business partner (and former romantic partner) to prop up the price of the ftt token. Mr Bankman-Fried had created this cryptocurrency himself, and given it to Alameda free of charge, so that the hedge fund could use it to borrow even more money from other crypto institutions. Having set up numerous ways for Alameda to borrow as much as possible Mr Bankman-Fried then used the firm as his “personal piggy-bank”, according to the sec—disbursing political donations, buying property and making venture investments. Ms Ellison and Mr Wang appear willing to corroborate that these events took place.

    • Finance

      • Seth Michael Larsonurllib3 in 2022

        In total urllib3 received $26,615 USD in financial support and distributed $18,622 USD to maintainers and community contributors. We’re thankful for the financial support we receive from our sponsors. Without funding our team wouldn’t be able to compensate maintainers to continuously lead, upkeep, and secure urllib3. Without funding, we couldn’t reward contributions from our team and the community and larger project like urllib3 v2.0 would either never be finished or take even longer than the year+ it’s taken already to ship. Let’s dive into our sources of financial support in 2022 and how the money was spent: [...]

      • Common DreamsGOP House Speaker Drama Sparks Fears About Debt Ceiling Fight

        The refusal by U.S. House Republicans to collectively get behind a speaker candidate in six rounds of voting so far this week has renewed concerns about the coming fight over raising the debt ceiling to prevent an unprecedented government default.

      • Counter PunchThe Cartel Economy & the Telecom Cartel

        The U.S. economy is consolidating with ever-larger conglomerates gaining ever-more power.  In July 2021, the White House issued “Fact Sheet: “Executive Order on Promoting Competition in the American Economy” that stated:

        Much has been said about “Big Tech” companies – i.e., Alphabet (Google), Amazon, Apple, Meta (Facebook) and Microsoft.  And there is also Big Phama (i.e., Johnson & Johnson, Roche Holding, Pfizer, Novo Nordisk and Eli Lilly), Big Oil (Shell, ExxonMobil, BP, Chevron, and ConocoPhillips) and Big Tobacco (i.e., Altria, Philip Morris International and British American Tobacco).

      • Counter PunchWhy Must Americans Walk Life’s Tightrope Without a Safety Net?

        Republicans are about to seize control of the US House of Representatives, where the Constitution says all taxation and spending must originate. And the result won’t be difficult to predict.

        This Spring will be the 20th anniversary of my radio program. During that entire time, I’ve run a contest for anybody who can name even one single piece of legislation from the past 40 years (since Reagan) that was:

    • AstroTurf/Lobbying/Politics

      • TechdirtTwitter’s ‘Cost Cutting By Not Paying Bills’ Now Going To Increase Legal Fees

        It’s no secret that Elon Musk is desperately trying to cut costs at Twitter, the company he overpaid for and saddled with approximately an extra billion dollars a year in interest payments by leveraging the buyout. He’s cut staff somewhere around 75% and we still keep hearing rumors of further cuts. He’s turning off data centers as well. Though, as part of all this, he’s also driven away a huge percentage of Twitter’s revenue, as well as any sort of momentum towards growth.

      • TechdirtJournalists (And Others) Should Leave Twitter. Here’s How They Can Get Started

        Summary: Elon Musk has demonstrated contempt for free speech in general, and journalism in particular, with his behavior at Twitter. He is also demonstrating why it is foolhardy for anyone to rely on centralized platforms to create and distribute vital information. Journalists — among many information providers and users — should move to decentralized systems where they have control of what they say and how they distribute it. And philanthropic organizations have a major role to play. Here is a way forward.

      • NBCAmazon says it will cut over 18,000 jobs, more than initially planned

        Tech companies are picking up in 2023 where they left off last year, preparing for an extended economic downturn. Salesforce said on Wednesday it would reduce headcount by 10%, impacting over 7,000 employees. Both Amazon and Salesforce admitted that they hired too rapidly during the pandemic.

      • VOA NewsAmazon CEO Says Layoff to Exceed 18,000 Jobs

        Amazon has more than 1.5 million workers including warehouse staff, making it America’s second-largest private employer after Walmart. It has braced for likely slower growth as soaring inflation encouraged businesses and consumers to cut back spending and its share price has halved in the past year.

      • VarietyAmazon Will Lay Off 18,000 Employees, CEO Andy Jassy Says

        Amazon will eliminate “just over 18,000 roles” at the company, CEO Andy Jassy wrote in a memo to staffers Wednesday, well more than previously expected by the ecommerce giant.

        The layoffs will occur across “several teams” but the majority of job cuts are in the Amazon Stores group and its People, Experience and Technology (PXT) organization, Jassy said in the memo, which the company posted on its blog site.

      • RTLAmazon to cut more than 18,000 jobs, CEO says

        Some of the layoffs would be in Europe, Jassy said, adding that the impacted workers would be informed starting on January 18.

      • VarietyMeta Fined More Than $400 Million After Regulator Rules

        At issue is Meta Ireland’s change in May 2018 — when GDPR went into effect — to its terms of service requiring Facebook and Instagram users to accept a contractual legal basis for processing their data for the purposes of behaviorally targeted ads. A pair of complaints lodged at the time by European users argued that the change amounted to “forced consent,” because they would be prevented from using Facebook or Instagram if they declined to agree to the new terms. The DPC ruling, announced Wednesday, found that Meta Ireland provided users “insufficient clarity as to what processing operations were being carried out on their personal data” and that the company is “not entitled to rely on the ‘contract’ legal basis” in connection with behavioral-based advertising for Facebook and Instagram.

      • Raw StoryKari Lake refers to herself as the ‘real’ and ‘duly-elected governor’ of Arizona in interview

        In an interview on the far-right Real America’s Voice, 2022 Arizona gubernatorial candidate Kari Lake referred to herself as the “real” and “duly-elected governor” of Arizona — despite having lost the election, lost the court cases challenging the election, and despite her opponent having been sworn in as governor this week.

        She went so far as to claim that the election against her was rigged “in broad daylight,” without any actual evidence of this having happened, and called for removing key local officials who oversaw the election in Phoenix, including Republicans.

      • The NationWe Need to Talk About Kevin

        It’s a paradox worthy of a Zen koan: How does one gain leadership of a party that’s ideologically opposed to governing? The one animating principle of Kevin McCarthy’s immaculately unprincipled career has been the pursuit of maximal congressional power—but power in today’s Trumpified House GOP caucus is almost entirely a function of self-dramatizing grievance. In a political conclave made up of Twitter main characters, there’s no room for an aspiring content moderator—even one as cheerfully invertebrate as McCarthy.

      • TruthOutRetired Congressman Fred Upton Being Considered for House Speakership
      • TruthOutDid McCarthy Open the Door for MAGA Republicans to Block His Speaker Bid?
      • TruthOutDay 1 of GOP-Led House Shows Party Disunity as McCarthy Fails to Win Speaker
      • Common DreamsHouse GOP’s Top Priority If They Ever Get a Speaker? Protect Wealthy Tax Dodgers

        Republicans began their control of the 118th Congress Tuesday with a narrow majority that failed six times to elect a speaker but had in hand “hit-the-ground-running” plans to pass legislation that critics say will “protect wealthy and corporate tax cheats” by rescinding tens of billions of dollars in new Internal Revenue Service funding in the Inflation Reduction Act.

      • TruthOutNoam Chomsky: Another World Is Possible. Let’s Bring It to Reality.
      • Common DreamsEvery Day of the Year: Point Your Compass Toward the Occupation

        In the occupied West Bank, the New Year began like the old one ended – with Israelis killing Palestinians. Adam Ayyad, 15, became 2023′s first child victim when he was shot by soldiers raiding his refugee camp. 2022 was the deadliest year in two decades for Palestinians living under the Occupation: Aged 12 to 80, they were shot in the head, eye, back, running away. Adam’s will lamented all “I wished I could do” if not living “in a country where realizing your dreams is impossible” – and where 15-year-olds make wills.

      • Common Dreams‘Congress Must Stop Funding Apartheid,’ Tlaib Says as Israel Razes West Bank Homes

        As chaos continued in the U.S. House of Representatives on Wednesday, the first Palestinian-American woman ever elected to the chamber took aim at Israel’s new far-right government for its plans to forcibly displace over 1,000 Palestinians in the Masafer Yatta region of the illegally occupied West Bank.

      • ScheerpostWill the International Court of Justice Finally Condemn Israel’s Illegal Squatting in Palestine?

        Juan Cole writes on the United Nations General Assembly request that the court to weigh in on Israel’s occupation of Palestinian territories.

      • Counter PunchCulture of Hope: 2022 and the Margins of Victory in Palestine

        Another critical year for Palestine has folded. While 2022 has wrought much of the same in terms of Israeli military occupation and increasing violence, it also introduced new variables to the Palestinian struggle – nationally, regionally and internationally.

        Palestine, the War and the Arabs

      • Counter PunchAmerican Politics is Designed to Minimize “Reckonings”

        “The question,” Bonnie Kristian writes at The Daily Beast, “isn’t whether we want a Republican reckoning or not. It’s whether we want the dream of mass public repentance for bringing Trump to power or the reality of Trump remaining out of power.”

      • Counter PunchKeeping Montana Montana

        Unlike in normal years, the 2023 Legislature finds itself wallowing in a fiscal surplus caused by massive infusions of money from the federal government so many of the incoming legislators continually denigrate. But of course they’re not giving the federal money back. Instead, the incoming Republican supermajority leans toward massive development and urbanization of our state. This year the challenge won’t be trying to find the fiscal resources to meet our state’s many very real needs, but simply trying to keep Montana Montana — and not New Jersey, Maryland, Colorado, Utah, or Texas.

        Granted, there are many versions of what “Montana” means. That’s no surprise given the vast diversity of Montana’s enormous landscapes. If you live in the western side of the state your concept of Montana is likely shaped by the snow-capped, sky-piercing mountains on the skyline. Here huge expanses of forested lands flow down to wide valleys with beautiful rivers and streams internationally famous for their abundant wild trout that remain capable of natural reproduction instead of being dumped from a hatchery truck.

      • Common Dreams26 Dems in Congress Urge DOJ to Continue Moratorium on Federal Executions

        Arguing that “the death penalty is cruel, racist, and fundamentally unjust,” U.S. Rep. Ayanna Pressley on Tuesday led over two dozen congressional Democrats in calling on the Biden administration to continue its 18-month pause on federal executions.

      • Misinformation/Disinformation/Propaganda

    • Censorship/Free Speech

      • CS MonitorIranian actor jailed for supporting protests has been released

        At least 516 protesters have been killed and over 19,000 people have been arrested, according to Human Rights Activists in Iran, a group that has closely monitored the unrest. Iranian authorities have not provided an official count of those killed or detained.

        The protests began in mid-September, when 22-year-old Mahsa Amini died after being arrested by Iran’s morality police for allegedly violating the Islamic Republic’s strict dress code. Women have played a leading role in the protests, with many publicly stripping off the compulsory Islamic headscarf, known as the hijab.

    • Freedom of Information / Freedom of the Press

      • VOA NewsNate Thayer, Journalist who Interviewed Pol Pot, Dead at 62

        “He had a lot of ailments, he was seriously ill for many months,” the brother told AFP.

        Nate Thayer spent years reporting on Cambodia politics and society, including the Khmer Rouge, the brutal communist regime that left more than one million people dead between 1975 and 1979.

        Beginning in 1989, he worked for The Associated Press, and then publications like the Phnom Penh Post and the Far Eastern Economic Review, building contacts in the dangerous jungle border region of Thailand and Cambodia.

      • Counter PunchLiberty for Julian Assange

        WikiLeaks founder Julian Assange’s vindication seems– maybe, perhaps, imaginably—achievable. It’s enough for me to publish my singular New Year resolution– not a wish, but a firm resolution– to more actively contribute to growing pressure to free Julian Assange, the mistreated, vilified and imprisoned, brave and brilliant founder of WikiLeaks.

        It’s a finite issue, unlike negotiations to end a raging war or a global agreement on climate controls. Yet freeing Assange had appeared almost insurmountable not long ago. Whereas, given the painstaking pursuit to free Assange by a pitifully small coterie of determined supporters, some success may be at hand.

    • Civil Rights/Policing

      • Counter Punch‘They Shot Them Down Like Animals’: Massacre at Peru’s Ayacucho

        On December 15, 2022, while helicopters flew overhead, members of Peru’s national army shot down civilians with live bullets in the outskirts of the city of Ayacucho. This action was in response to a national strike and mobilization to protest the coup d’état that deposed President Pedro Castillo on December 7.

        On December 15, hundreds of university students, shopkeepers, street vendors, agricultural workers, and activists gathered at the center of Ayacucho to express their discontent over the removal of Castillo and continued their mobilization toward the airport. Similar action was witnessed in several other cities across the southern Andean region of the country.

      • Counter PunchMetaphors of Belligerence: Wars by and Against Nature

        It all seemed familiar.  Anthropomorphised Mother Nature in vengeful mood; humans wondering if they might meet a frozen demise in trapped vehicles; the planners taking stock as to how best to cope with grim circumstances.  The New York State governor Kathy Hochul was happy to stick her head out in declaring the latest lethal winter storm in Buffalo to be nothing less than a “war with Mother Nature, and she has been hitting us with everything she has.”

        Having found her less than imaginative metaphor, the governor ran with it, suggesting that Mother Nature had laid waste to the region around Buffalo.  “It is [like] giong to a war zone, and the vehicles along the sides of the roads are shocking.”

      • The problem with some Artificial Intelligence is NOT discrimination | Stop at Zona-M

        This has two consequences. One is that, if algorithmic decision is unsuited to certain tasks to begin with, finding when it discriminates is certainly possible, as discussed in this paper, but at best it only makes the algorithms FAIL… more fairly than before.

        The other obvious consequence is that there is little, possibly very little substance in the belief that human oversight may significantly correct and improve algorithmic decision-making, once it has been implemented. Assuming all the stakeholders know that it was implemented, of course, which too often is NOT the case.

      • TechdirtTSA’s Opt-In Facial Recognition Program Doesn’t Seem All That Optional In Real Life

        Nearly a half-decade ago, the DHS began rolling out biometric scanning at international airports. The early efforts targeted foreign travelers, but it was always clear the DHS (and its underling, the TSA) ultimately desired facial recognition tech to be the status quo in US airports.

      • TechdirtGrab A US Military Device Full Of Biometric Data For Only $68 At Ebay! [Sponsored]

        The War on Terror will never end. It’s a multi-billion dollar boondoggle that ensures we will always live in fear, even if we realistically have nothing to fear. The war we waged for the hearts and minds of Afghanistan residents lasted long enough that soldiers participating in another US losing effort weren’t even born when the war began.

      • TruthOutMore Women Are Being Incarcerated as Jail Populations Near Pre-COVID Levels
    • Internet Policy/Net Neutrality

      • Common DreamsRe-Nominated by Biden, Senate Urged to Confirm ‘Public Interest Champion’ to FCC

        Digital and consumer rights advocates on Wednesday called on the U.S. Senate to swiftly confirm longtime public advocate Gigi Sohn to the Federal Communications Commission after President Joe Biden announced her nomination for a second time, more than a year after the telecom industry launched a spending blitz to keep Sohn from joining the regulatory panel.

      • How 3 African activists are combating internet shutdowns

        Authoritarian governments are increasingly turning to internet shutdowns to silence dissidents and curb protests. Devex spoke to three African activists about their experience and how they are working to protect the human rights that depend on the internet.

    • Monopolies

      • Copyrights

        • Torrent FreakTwitter Hit With $228.9m Copyright Infringement / Repeat Infringer Lawsuit

          Celebrity photo agency Backgrid has filed a $228.9m copyright infringement lawsuit against Twitter after thousands of its photographs were uploaded by users of the social media site. Ordinarily, Twitter would enjoy ‘safe harbor’ protection but according to Backgrid, Twitter failed to take action in response to DMCA takedown notices, and failed to terminate ‘repeat infringers’

        • TechdirtCapcom Kneecaps Fan Remakes Of ‘Resident Evil’ Games The Company Isn’t Planning To Remake

          You might think that perusing Techdirt posts on the topic of fan-made video games using the IP of others would yield you only one kind of story in which threats and lawsuits abound. Fortunately, that’s something of a misconception. While there are indeed plenty of stories of that nature, there are also examples of studios and publishers that have figured out a way to embrace their biggest fans. Paradox built an affiliate program to allow its fans to create “official” games, such that there would be no threats of litigation for doing so. Sega has likewise been lenient with fan-games, even going so far as to poke fun at its competition for doing otherwise. Even Blizzard got into this act with at least one fan-made game.

  • Gemini* and Gopher

    • Personal

      • D&D’s Trope Overlay
      • 🔤SpellBinding: DGHNOUT Wordo: BRATS
      • Racoon Toilet

        As I get ready for bed, most of me is hoping that the racoons stay away tonight so I can finally sleep, but a decent chunk of me misses their silly, serious faces and hopes that they will try to make their pilgrimage to my roof in order to take a dump.

        Racoons, as I found out, like a quiet, out-of-the-way places to defecate safely. Once they find a good place, they will go back there, and the pile will grow. It is not particulary gross but can be a breeding ground for a few parasites and diseases. My roof is, apparently, a perfect place, and the three juvenile racoons make their way up the fire escape to their chosen toilet at night.

      • A Question on Spelling

        The English language, being a amalgamation of several predecessors, has many strange spelling rules. Some of these rules, however, vary from one dialect of English to another. A well-known example of this is the spelling of words that end with an “e” and an “r”: in America English, the common spellings are “meter”, “liter” and “center”, while other forms of English use the spellings “metre”, “litre” and “centre”.

    • Technical

      • RocketFeed: Gemfeed to Atom Converter

        I’m not sure how many people out there on gemini are subscribing to atom feeds vs plain old gemini feeds, but I spent part of today writing a quick program to get an atom feed from a gemfeed. I’m now using it to generate the atom feed of my posts from my log index page.


* Gemini (Primer) links can be opened using Gemini software. It’s like the World Wide Web but a lot lighter.

[Meme] The Only Language EPO Management Can Understand

Posted in Europe, Patents at 6:36 am by Dr. Roy Schestowitz

epo-strike-meme

Summary: If EPO management cracks down on the most vulnerable people (who deserve sympathy) maybe it’s time to reduce “productivity” some more. This isn’t like nurses and GPs going on strike. Remember that fewer patents don’t mean lack of progress. In fact, more patents only impair availability of things like life-saving medicine.

The EPO is Cruel to Patent Examiners Because Corporations, Not Even European Ones, Always Come First

Posted in Europe, Law, Patents at 6:30 am by Dr. Roy Schestowitz

Sickness interferes with corporate profits! STOP GETTING SICK AND GO BACK TO WORK!

Video download link | md5sum 04336bf5d084c5b630f63884b4a8a367
EPO is a Sick Employer
Creative Commons Attribution-No Derivative Works 4.0

Summary: Sickness-related rights of staff are being weakened or abolished and staff representatives caution national representatives to prevent that from exacerbating even further

The Central Staff Committee (CSC) of the EPO has circulated this recent letter with many annexes added underneath. [PDF] (No metadata in it that contains names)

The document (letter and a lot more, even E-mails) concerns sickness/illness. In times of pandemic not only do many people get ill; some suffer long-lasting agony (e.g. “long COVID”) and deserve sympathy from their employer. Myself and my wife worked (a combined) 21 years for the same employer without ever taking any sick leave, yet the employer treated us very badly. Imagine how much worse if would be if we asked for a day off due to bad health.

In the EPO, the situation is further complicated because when rights of staff are weakened that necessarily translates into an inability to recruit high-calibre people who can properly judge patent applications. As the video above notes, everyone in Europe will suffer from that as corporations will receive more fake patents (some large stakeholders already complain out in the open about the collapse of patent quality at the EPO).

Here’s a communication to staff, dated yesterday, about the document above:

Letter to AC delegations: Detrimental adjustment to the health services (CA/85/22)

Dear colleagues,

The President tabled a reform of the health services (CA/85/22) for the meeting of the Administrative Council on 13-14 December 2022, which will further restrict the rights of sick staff.

In this open letter, we explain to the heads of delegation how the upcoming reform will supplement the 2015 reform and further harm the most vulnerable category of staff, sick staff, and urge them not to adopt document CA/85/22.

The key part is the letter, not the annexes, so we’re reproducing it below as HTML, GemText, and plain text:

European Patent Office | 80298 MUNICH | GERMANY

Heads of Delegation
in the Administrative Council
By email

OPEN LETTER

centralSTCOM@epo.org
Reference: sc22147cl
Date: 09/12/2022

Detrimental adjustment to the health services (CA/85/22)

Dear Heads of Delegation,

The President has tabled a reform of the health services (CA/85/22) for the upcoming meeting of the Administrative Council which will further restrict the rights of sick staff.

The 2015 reform of sick leave and invalidity had already negatively affected staff and is currently under legal challenge:

− the computation of sick leave, where any part-time absence on a working day is counted as a full day of sick leave, is prejudicial to staff entering or in extended sick leave or (partial) incapacity because it resulted in them suffering salary deductions, unlike other staff (e.g. in the case of Covid-19 infections).

− the abolition of the invalidity lump sum insurance has violated the legitimate expectations of EPO staff who had been contributing to the insurance for many years. The Office did not follow the unanimous opinion of the Appeals Committee in favour of staff, leaving them no other option than to challenge the decision before the Tribunal right in the middle of the pandemic.

− the abolition of a medical committee, which previously had a balanced composition, paved the way for an unbalanced procedure fully empowering the medical practitioner (medical advisor) chosen by the President of the Office alone for the purpose of issuing medical opinions on incapacity.


The Health Services should not be merged

The Health Services are currently organised in two separate teams:

1) an Occupational Health Service (OHS) responsible for staff on sick leave (less than 125 days in 18 consecutive months) and providing advice and support to staff members,

2) a Medical Advisory Unit (MAU) responsible for staff on sick leave for more than 125 days in 18 consecutive months and issuing opinions for the President for the purpose of taking potentially adverse administrative decisions (e.g. salary deductions, forced return to work…).

The proposed reform pretends to introduce “a seamless sick leave process” by merging the two teams. In our view, a sick staff member cannot build trust with the practitioner supposed to support them if this same practitioner is also actively involved in making potentially adverse decisions. Moreover, independence is at risk as the practitioner will find himself in an inherent conflict of interest. Such a reform would even be illegal in our major host country, Germany, as confirmed by the Mercer Marsh Benefits report.

Data protection issues

As a consequence of the reform, the two separate medical case management systems of OHS and MAU would be merged. It was an inherent strength of the system that medical data was accessed by different persons for different purposes: one to support staff, the other one (only if required) to be involved in making adverse decisions. The merge would increase the number of “health professionals” and administrative support staff who have access to the medical data of all staff, without asking the staff member for their consent.

In addition, the Staff Committee was never informed about how the Data Protection Officer has been involved.

Amendments in the Service Regulations outside the scope of the Working Group and not discussed

The document presents amendments to the Service Regulations allegedly to support implementation of “a seamless sick leave process”. None of the amendments were necessary for this purpose. Nor were they within the scope of the Working Group set up to discuss the reorganisation of the health services and were not discussed.


In particular:

− allowing the EPO medical practitioner to contact the employee’s doctor without their consent is a violation of the employee’s right to privacy and a blank check for violation of medical secrecy,

- the use of personal medical data for other purposes without the employee’s consent breaches data protection,

- the employee’s right to access medical data is now restricted,

- the establishment of new conditions for disregarding evidence voluntarily submitted by the employee deprives them of the possibility of handling their own medical situation in front of the employer,

- the employee’s access to the arbitration procedure in case of disagreement with a medical opinion is now restricted.

More details can be found in our opinion in the General Consultative Committee of 22 November 2022, which is annexed to this letter.

Conclusion

The proposed reform is detrimental to staff, endangers the independence of the “health professionals”, endangers medical secrecy and risks creating an atmosphere of mistrust. It would be illegal in our major host country, Germany. Furthermore, the reform introduces, after the 2015 reform, further restrictions on the rights of sick staff, raising the question of whether the health and well-being of staff is the priority for the EPO.

For the sake of sick staff, we urge the Council not to approve document CA/85/22.

Yours sincerely,

Alain Dumont
Chairman of the Central Staff Committee

Annex: Opinion of the CSC members of the GCC on GCC/DOC 27/2022: Adjustments to health services (CA/85/22)

Based on constitutions and international conventions (on human rights), some staff protections are not negotiable. But the EPO believes that because it is in “no-man’s land” it is free to violate people’s fundamental rights as if there’s no consequence to be feared.

Patent examiners at the EPO are besieged by corrupt management, appointed and supported by rogue law firms and monopolies. Many of these aren’t even European, so they actively work to undermine Europe’s interests and the triumph of scientific advancement (they want profit, not progress). This imperils the world, not only Europe.

Sirius Management Has Run Out of Feet to Shoot (It Keeps Getting Worse With Each Redundant Letter Sent to Former Staff)

Posted in Deception, Free/Libre Software at 5:37 am by Dr. Roy Schestowitz

Video download link | md5sum a87bb1a1ffd145a6151f04466f516790
Sirius Against Freedom of Thought
Creative Commons Attribution-No Derivative Works 4.0

Summary: Sirius ‘Open Source’ was either lying to us or trying to bribe us after we had left the company; just 10 days after writing about these affairs two nearly-identical letters were fired off with astounding chutzpah and yet more lies (one of the main reasons we left the company)

We have only just mentioned how Microsoft gags former staff. Sirius ‘Open Source’ has no NDAs and non-disparagement clauses in separation contracts, so — to paraphrase an associate — Sirius cannot really “suppress public knowledge of what is really going on there in the hive.” It’s still trying anyway.

“There are cases of hypocrisy and double-standards all over it, aside from gaslighting and pathological lying.”In the coming days we shall show managers hiding under the table while asserting others do not enjoy the same rights. One manager struggled to explain why he was digging for low-grade ‘dirt’ in the first place, looking to start a self-defeating witch-hunt, then boasting about “privacy” (while violating the privacy of others). As it turned out, he had lied. The usual. There are cases of hypocrisy and double-standards all over it, aside from gaslighting and pathological lying.

Enough. We’re out!

As noted in the video above, they still try to gag us and remove what we wrote, but in the coming few days I’ll show how the witch-hunt basically blew the face of the stalker, who had very different and unrealistic expectations of how it would pan out.

Far More Microsoft Layoffs and Spending Cuts Than the Mainstream/Corporate/Tech Media Reports on

Posted in Deception, Microsoft at 5:13 am by Dr. Roy Schestowitz

Video download link | md5sum e02713269b5ffa294bbab32156403006
Microsoft Layoffs This Year and Last Year
Creative Commons Attribution-No Derivative Works 4.0

Summary: Microsoft is a shrinking company and the media is failing to do its work (by investigating and reporting on the layoffs; instead it parrots whatever Microsoft says)

BASED on Gemini statistics (publicly available, unlike logs that get deleted), for a number of weeks already the hottest topic in this site was Microsoft layoffs, so we assume Microsoft staff knows something and is obsessively checking something, having heard the rumours that go back a month.

“Microsoft will probably still be around in 10 years, but the capacity of the company will be vastly smaller. It has no rebound strategy except graft.”Based on contacts of mine, Microsoft had made deep cuts and staff could certainly feel the difference. There’s a lot of impact, even if the “tech” media refuses to talk about it (Microsoft paid many of the major publications to relay Microsoft’s lies and PR instead). In the video above I explain why Microsoft is in trouble (the growth is faked; it is meant to mislead shareholders) and is currently relying a lot on de facto bailouts from the US taxpayers.

Microsoft will probably still be around in 10 years, but the capacity of the company will be vastly smaller. It has no rebound strategy except graft.

The information needs to be out there, but people are afraid to speak out. As an associate explained this morning: “There’s also the matter of the NDAs and non-disparagement clauses in separation contracts which further suppress public knowledge of what is really going on there in the hive. So until a court rules on the legality of such clauses “former” Microsofters are unlikely talk even if they wanted to. Unfortunately too few will want to, due to the cult-like nature of the business and the cult-like devotion required even in the earliest stages of their hiring process.”

IRC Proceedings: Wednesday, January 04, 2023

Posted in IRC Logs at 2:46 am by Needs Sunlight

Also available via the Gemini protocol at:

Over HTTP:

HTML5 logs

HTML5 logs

#techrights log as HTML5

#boycottnovell log as HTML5

HTML5 logs

HTML5 logs

#boycottnovell-social log as HTML5

#techbytes log as HTML5

text logs

text logs

#techrights log as text

#boycottnovell log as text

text logs

text logs

#boycottnovell-social log as text

#techbytes log as text

Enter the IRC channels now


IPFS Mirrors

CID Description Object type
 QmYvFHhRPdC3oReAXWHse8ghTneNz6oE4vjKm1cGZkfwPS IRC log for #boycottnovell
(full IRC log as HTML)
HTML5 logs
 QmYzisReMWqj5T9xuCnbgyRGBu74E9o8mWRkN4VFnZZLR8 IRC log for #boycottnovell
(full IRC log as plain/ASCII text)
text logs
 QmYnYzj4uQ5exkUJ9kCpy35k4qByCr3T4epqcFoLrY4QM2 IRC log for #boycottnovell-social
(full IRC log as HTML)
HTML5 logs
 QmRMJZi1tvtffS5AG72jeyNhF2rHK4hkTNMaVNBHFgimy5 IRC log for #boycottnovell-social
(full IRC log as plain/ASCII text)
text logs
 QmUE7X7NoVG1toUJCJvZ3FAba8ComDJNDhBG8WGwfsnEpx IRC log for #techbytes
(full IRC log as HTML)
HTML5 logs
 QmZMHBwAyHGCdaNrkqpzNjAQKQAgM8fYc7yp4Y74UzB2jJ IRC log for #techbytes
(full IRC log as plain/ASCII text)
text logs
 QmZ7D6kGgiJ1LqRwrYXyxRDN6jaXNgvWHTWfA8r2tfCE7P IRC log for #techrights
(full IRC log as HTML)
HTML5 logs
 QmNTat6RYSXPchQw3anf4erRmQk4XSWUSPxSp3GSW5vRa2 IRC log for #techrights
(full IRC log as plain/ASCII text)
text logs

IPFS logo

Bulletin for Yesterday

Local copy | CID (IPFS): QmesnmZC36VoBa2cbiPr4WTsugVzAno8XpmHxv5Mdg3EEz

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts