Bonum Certa Men Certa

Links 03/05/2023: New Fedora 38 ISOs, U.S. Solicitor General Meddling for Software Patents



  • GNU/Linux

    • The Register UKWhen it comes to Linux distros, one person's molehill is another's mountain

      For as long as there have been Linux distributions, there has been Linux distro advocacy – which in FOSS circles tends to mean people shouting at each other that they're wrong. Computer advocacy goes way back before Linux, though; flame wars over which editor is best have a long and ignoble history. Maybe it's Vi, maybe it's Emacs.

      Recently, a consistent theme, including in comments here on The Reg, is that Canonical has somehow gone astray with Ubuntu, and Snap is horribly broken, but people are seldom willing to give detailed specifics of what is broken and how. So when this vulture came across a detailed blog post, "Switching to Fedora from Ubuntu", which itself links to a "giant list of bugs" in Snap, he was instantly hooked. (The post, incidentally, has provoked lively discussions in several techie forums already, which seem roughly equally split between strong agreement and fervent denial. Which is exactly how it should be, of course.)

    • Ars TechnicaI used System76’s Pangolin for weeks, and Linux was not the biggest problem

      After using System76’s Pangolin as my primary work laptop for nearly six weeks, I can tell you this: If you need a 15-inch Linux-focused laptop, this is the one to get.

      The Pangolin is a solid device, designed more for dependability and convenience than ultrabook portability or cutting-edge parts, but it still has reasonably modern hardware (especially its 144 Hz screen). The Pangolin and its native Pop!_OS are a showcase for how remarkably normal Linux can feel as a daily driver in 2023. Normal, and with lots of ports.

      It’s hard to do a nuts-and-bolts comparison of the Pangolin to most other laptops, due largely to benchmark comparability between Linux and most laptops running Windows or macOS. But it’s also not entirely necessary. There’s only one real version of the Pangolin available—one processor, one amount of RAM, then variable, user-expandable storage.

      We’ll show you how the Pangolin did on a couple tests. But how this laptop works for you is much more about what you’re bringing to it and what you're willing to put into customizing it to your liking. I came to the Pangolin as someone who has made a few attempts at using Linux as a daily driver. I know enough command line, vim, and Unix-based architecture to be conversant, and I have two Raspberry Pis that are constantly being improved. Still, I'm more hobbyist than practitioner.

    • Linux Magazine

      • Linux MagazineRotate, scale, and convert complete image series with Converseen

        If you have an extensive collection of photos, you will hardly want to edit each photo individually. Converseen lets you rotate, scale, and convert a large number of images in a single run.

      • Linux MagazineMonitor and secure your home IoT appliances

        Many IoT devices are so poorly protected against attacks that it is easy for an intruder to slip inside. With the right tools and best practices, you can bar the door.

      • Linux MagazineFOSSPicks

        This month Graham looks at Godot 4, PostRunner, LeanCreator, lurk, Cubic, SuperStarfighter, and more!

      • Linux MagazineMap projection on a two-dimensional terminal with Go

        While searching for a method to draw geodata right into the terminal, Mike Schilli discovers the wondrous world of map projections.

      • Linux MagazineFinding hidden processes with unhide

        The unhide forensics tool scans your system for inconsistencies to uncover hidden processes.

      • Linux MagazineSafer Coding

        How long have we been told that cybersecurity starts with the programmer? And what does that mean exactly? What can we do about it?

      • Linux MagazineLinux Club Organization

        Fostering an after-school Linux Club by encouraging participation.

      • Linux MagazineWatching your pets with a Raspberry Pi and a mesh VPN

        A Raspberry Pi, a Pi-compatible camera, and a mesh VPN are all you need to watch your pets from afar.

      • Linux MagazineOn the DVD

        SystemRescue 10.0 and Linux Lite 6.4

      • Linux MagazineMX Linux

        A look at the user-friendly, vertically integrated community distro.

      • Linux MagazineFlat-file content management systems

        Not everyone needs a conventional database content management system. For beginners and smaller websites, a flat-file content management system offers ease of use, while eliminating attack vectors.

      • Linux MagazineNEWS

        In the news: NuTyX with Cards 2.6.3; System76 Teases In-House Built Laptop; Ubuntu 23.04 Beta; OpenMandriva Lx 23.03 Rolling Release; carbonOS: A New Linux Distro; Ubuntu Flatpak Remix Adds Flatpak Support Preinstalled; and LPI Announces IT Security Essentials Certification.

      • Linux MagazineControl your smart home with RaspBee II and your Raspberry Pi

        The RaspBee II module turns your Raspberry Pi into a smart control center for Zigbee devices.

      • Linux MagazineRolling your own RSS aggregator

        Create the perfect mix of news with an RSS aggregator. Linux supports several open source aggregators, or, if you're looking for the perfect fit, you can even create your own.

      • Linux MagazineAdding Internet data to your home automation dashboard

        You can use one line of Bash code to scrape a web page and show the data you're tracking in Home Assistant or Node-RED.

      • Linux MagazineIntroduction

        This month in Linux Voice and Elvie.

      • Linux MagazineEasy tools for archiving your datasets

        Linux supports a number of easy graphical tools for saving data to compressed archives.

      • Linux MagazineDesigning field-programmable gate arrays

        Learn what FPGAs are, how they work, and how to design FPGA integrated circuits on Linux.

      • Linux MagazineTracking the energy use of household appliances

        Want to bring down your electric bill? Investigate your favorite household appliances with a consumption meter and a Raspberry Pi.

      • Linux MagazineAll-around system maintenance tool

        No other operating system offers as many free tools for system maintenance and data recovery as Linux. Snal Linux combines these tools to create a compact Live distribution.

    • Server

      • Peter 'CzP' CzanikPeter Czanik: Getting syslog-ng 4

        Version 4 of syslog-ng was released last December. Quite a few people use it already in production. How can you install it for a test drive? It might be already available in your Linux distribution. There are also several unofficial repositories with the latest syslog-ng.

        From this blog, you can learn how to check your syslog-ng version, where to check if it is not yet installed, and a few additional resources, if you want to install the latest version from unofficial repositories.

    • Applications

      • It's FOSS8 Best Remote Desktop Tools for Linux

        Remotely connecting to a computer has several advantages. Maybe you want to help troubleshoot an issue on your friend's desktop, or maybe you want to use another desktop session remotely for work.

        Whatever your use case is, remote desktop tools on Linux allow you to connect easily. Of course, every tool is built differently. So, you can pick the one that suits your personal or professional requirements.

    • Instructionals/Technical

      • University of TorontoThe types of TLS seen on our external MX (as of April 2023)

        Today I feel like providing some statistics on that, partly for my own interest. All of these are over the past full nine days, which means that they mostly cover the end of April 2023 (plus May 1st).

      • OSTechNixHow To Install And Use Terminator Terminal Emulator In Linux

        When I first switched to linux I was looking for a terminal to replace the gnome default terminal mainly due to the tiling feature. I tested a few terminal emulators and the Terminator seems to be a perfect fit for me. In this detailed tutorial, we will learn what is Terminator, Terminator features, and how to install and use the terminator tiling terminal emulator in Linux.

      • OSTechNixHow To Launch Web Browsers In Kiosk Mode (Full Screen) From CLI In Linux

        Some times you might want to run an application (especially a web application) 24/7 in full-screen mode. In this guide, we will see how to launch web browsers in kiosk mode (full screen) from command line in Linux.

    • Games

  • Distributions and Operating Systems

    • OS/2 MuseumTracking Down a Bug

      Somehow I ended up in a situation where running vi immediately after starting a certain DOS VM would trigger the hang, maybe 80% of the time. I decided to pounce. Once again, I couldn’t tell much from the hung state. So I decided to roll out the big gun. I ran the VirtualBox VM in a debug build with software instruction emulation and partial instruction logging—that is, logging every instruction, partially decoded, without logging the register state. This is a compromise that is already slow and produces huge log files, but not as horribly slow verbose as full register state logging. Since the problem was runaway code, I hoped the log would tell me something.

  • Free, Libre, and Open Source Software

    • Unicorn MediaMastodon Introduces Easier Onboarding, With More Improvements on the Way

      Big changes are happening at Mastodon, the user-supported and advertising-free decentralized social networking platform that many are seeing as a Twitter replacement. The platform announced on Monday that it’s made it much easier for non-tech-savvy users to open an account in minutes, with other changes “coming soon.”

      The easier onboarding experience comes not a minute too soon. Another decentralized social platform that’s currently in beta, Bluesky Social, is betting that easy onboarding will help it grab enough of the people who have been turned off by the difficulty of signing up for Mastodon to turn momentum its way when it’s ready for primetime. Yesterday morning it looked as though Bluesky was going to win that bet; today it looks like maybe not.



      [...]

      New users of the social networking platform Mastodon no longer need to choose an instance before opening an account. The platform says that other new improvements are "coming soon."

    • Social media and LibreOffice: TDF’s Annual Report 2022
    • The Register UKCERN celebrates 30 years since releasing the web to the public domain

      On April 30, 1993, CERN signed off on a decision that the World Wide Web – a client, server, and library of code created under its roof – belonged to humanity (the letter was duly stamped on May 3).

      "CERN relinquishes all intellectual [sic] property [sic] rights to this code, both source and binary form, and permission is granted for anyone to use, duplicate, modify and redistribute it" states a letter signed on that day by Walter Hoogland and Helmut Weber – at the time respectively CERN's director of research and director of administration.

    • OpenSource.comTips for running virtual, in-person, and hybrid events

      Over the past few years, virtual events have thrived. In-person events are back now, but it's important to keep in mind that virtual events didn't just come out of nowhere. Many of us were actually doing a lot of different online events even before they became popular. Many communities held hackathons, bug and issue triaging, webinars, and so on, as virtual events. They brought community members together for collaboration and education. Virtual events have improved since then, largely out of necessity, and I think we've all learned a lot. In this article, I consider how virtual and physical events can co-exist to render an improved event experience for everyone.

    • MozillaFakespot becomes part of Mozilla, bringing trustworthy shopping tools to Firefox

      For close to thirty years, commerce has been at the core of how people use the Internet. Convenience and ease have multiplied over the years as people have benefited from the unprecedented economies of scale emerging from the digital marketplace. This global ecommerce scale-up has also created new challenges for consumers, such as how to make decisions like where to shop, which products to buy for a given need, and which vendor within a store to buy from.



      [...]

      I couldn’t be more thrilled to have Saoud and the Fakespot team onboard. Mozilla is planning to increase the investment in Fakespot, and I’m excited about the work we’ll do together with Saoud and the team to enhance the ecommerce experience for millions of people. This is just the beginning. We’ll be introducing Fakespot functionality to Firefox over time, and would love to hear your thoughts once it’s launched.€ 

    • Web Browsers/Web Servers

      • Chromium

        • GoogleAn Update on the Lock Icon [Ed: Fake security from NSA collaborator, imposing centralisation on the Web]

          Editor’s note: based on industry research (from Chrome and others), and the ubiquity of HTTPS, we will be replacing the lock icon in Chrome’s address bar with a new “tune” icon – both to emphasize that security should be the default state, and to make site settings more accessible. Read on to learn about this multi-year journey.

    • SaaS/Back End/Databases

      • EarthlyLoad Testing Backend Services Using K6

        A load test is one form of performance testing implemented to ensure your application works properly under an expected number of users’ requests. Let’s say you have a shopping application that allows users to buy clothes. On the launching day, you expect about one thousand customers to sign up for new accounts on the app every minute. To ensure the application can handle these user requests, you must write tests that simulate one thousand users signing up to the app every minute. These tests are called load tests.

    • Education

      • ButtondownSome of my workshop teaching tricks

        I make most of my money off teaching workshops, and that means I put a lot of time into thinking about how to teach them better. Most of that goes to lesson planning, topic order, pedagogical improvements, etc. But I also regularly write assistive programs. See, there’s two sources of complexity in workshops: [...]

      • Raspberry PiIntegrating primary computing and literacy through multimodal storytelling

        Practical insights from research to integrate programming and writing in the primary classroom, which makes computing more relevant for learners.

    • FSF

      • FSFAnnouncing the FSF's board candidates

        We are pleased to announce the list of candidates who have proceeded to the next step in the FSF's process to finding new board members. Nominees confirmed their interest by filling out a questionnaire that helps introduce themselves and their backgrounds to the FSF voting members. The FSF voting members thank everyone who nominated a candidate and the nominees who responded to the questionnaire.

    • GNU Projects

      • GNUGNU€ Guix: The Full-Source Bootstrap: Building from source all the way down

        We are delighted and somewhat relieved to announce that the third reduction of the Guix bootstrap binaries has now been merged in the main branch of Guix! If you run guix pull today, you get a package graph of more than 22,000 nodes rooted in a 357-byte program—something that had never been achieved, to our knowledge, since the birth of Unix.

        We refer to this as the Full-Source Bootstrap. In this post, we explain what this means concretely. This is a major milestone—if not the major milestone—in our quest for building everything from source, all the way down.

        How did we get there, and why? In two previous blog posts, we elaborated on why this reduction and bootstrappability in general is so important.

        One reason is to properly address supply chain security concerns. The Bitcoin community was one of the first to recognize its importance well enough to put the idea into practice. At the Breaking Bitcoin conference 2020, Carl Dong gave a fun and remarkably gentle introduction.

      • LWNThe Guix (almost) full-source bootstrap

        The Guix project (""a transactional package manager and an advanced distribution of the GNU system"") has announced a milestone toward its goal of bootstrapping an entire distribution from source...

      • LWNValgrind-3.21.0 released
        We are pleased to announce a new release of Valgrind, version 3.21.0,
        available from https://valgrind.org/downloads/current.html.
        
        

        See the release notes below for details of changes.

        Our thanks to all those who contribute to Valgrind's development. This release represents a great deal of time, energy and effort on the part of many people.

        Happy and productive debugging and profiling,

        -- The Valgrind Developers
    • Programming/Development

      • Tim BradshawNirvana

        None of this is the answer. None of this is close to the answer. To find the answer ask why did these things arise in Lisp first? What is the property of Lisp which is in fact unique to Lisp and which defines Lisp in strict sense that if any other language had this property it would be a Lisp? To see answer to this you must understand Bradshaw’s law and my corollary to it: [...]

      • Alexandru NedelcuManaging Database Migrations in Kotlin

        The database schema should be described as code, in your repository. And you should be able to semi-automatically update your database schema on new deployments. Now in Kotlin, with Gradle and Flyway.

      • Anders BorchFrom "It Works" To "It Scales"

        I recently got to a point where combine.social started running out of memory. What that meant for users was that at some peak hours, they may not have gotten updates for remote replies in their timelines.

        This was not ideal, obviously, so something had to happen. Luckily, I had anticipated that this time would come from the onset of the project. My chosen solution was a mono-repo structure where I could split some of the functionality out of the API service into shared packages, and some of the functionality into separate apps.

      • March/April in KDE PIM

        Here's our bi-monthly update from KDE's personal information management applications team, covering progress made in the months of March and April 2023.

        Since the last report, 38 people contributed approximately 1700 code changes, focusing on bugfixes and improvements for the 23.04 release, as well as preparing for the transition to Qt 6.

        KDE PIM Sprint

        On the first weekend of April, a few of us met in Toulouse for the first post-pandemic KDE PIM Sprint. Kevin has published a report with details on everything we did.

        Transition to Qt 6/KDE Frameworks 6

        Shortly after the KDE PIM sprint in Toulouse, the switch to Qt 6 and KF6 entered its final phase with the creation of the kf6 porting branches in the KDE PIM repositories. The aim is to publish a first release based on that towards the end of the year. See the corresponding blog post for more details.

        .
      • Andy Wingo: structure and interpretation of ark

        Hello, dear readers! Today's article describes Ark, a new JavaScript-based mobile development platform. If you haven't read them yet, you might want to start by having a look at my past articles on Capacitor, React NativeScript, Flutter; having a common understanding of the design space will help us understand where Ark is similar and where it differs.

        Ark, what it is

        If I had to bet, I would guess that you have not heard of Ark. (I certainly hadn't either, when commissioned to do this research series.) To a first approximation, Ark—or rather, what I am calling Ark; I don't actually know the name for the whole architecture—is a loosely Flutter-like UI library implemented on top of a dialect of JavaScript, with build-time compilation to bytecode (like Hermes) but also with support for just-in-time and ahead-of-time compilation of bytecode to native code. It is made by Huawei.

        At this point if you are already interested in this research series, I am sure this description raises more questions than it answers. Flutter-like? A dialect? Native compilation? Targetting what platforms? From Huawei? We'll get to all of these, but I think we need to start with the last question.

      • Barry KaulerPC Architecture & Assembly Language book

        Wow, this has brought back memories! A couple of weeks ago, I received a message on the Puppy Forum from Colin. Here it is:

        Hi Barry,

        This message has been on my list for a long time, but for some reason I've never got around to sending.
        I was a student in your Microprocessors class at Edith Cowan back in 1993, and it genuinely was my favourite during my undergrad degree (which ironically was not a science or IT major) and was absolutely the fuel that elevated my interest in computing beyond hobbyist. While I spent the better part of 20yrs in law enforcement, I eventually left government and transitioned to cyber security, making use of the fundamentals I learned in your class, and even referring to your book again when starting to dabble in malware analysis.
        After almost 10 years abroad doing a variety of digital forensic work, when I returned to Australia last year and unpacked some boxes I again discovered your Assembly book among the few that I kept. It sits proudly on my bookcase as a reminder that a strong technical base goes a long way.
        Thank you for your course, your enthusiasm as a teacher and for the spark that took to me down a different path and a mentally stimulating career living and working in places I never expected.
        I hope that you are well, and from your site it appears you are enjoying pursuing both new and old interests.
        Regards,

    • Standards/Consortia

      • Bruce SchneierNIST Draft Document on Post-Quantum Cryptography Guidance

        NIST has release a draft of Special Publication1800-38A: Migration to Post-Quantum Cryptography: Preparation for Considering the Implementation and Adoption of Quantum Safe Cryptography.” It’s only four pages long, and it doesn’t have a lot of detail—more “volumes” are coming, with more information—but it’s well worth reading.

      • NextgovNIST Releases Draft Post-Quantum Encryption Document

        A new draft document previews—and solicits public commentary on—NIST’s current post-quantum cryptography guidance.

        Current goals outlined in the working draft include helping entities locate where and how public key algorithms are utilized in encryption schemes, developing a strategy to migrate these algorithms to quantum-resilient substitutes and performing interoperability and performance testing.

  • Leftovers

    • India TimesTinder-owner Match Group swipes left on Russia, will exit by June 30

      Tinder owner Match Group has said it will quit Russia by June 30, citing the need to protect human rights, one of many Western firms to leave since Moscow sent troops into Ukraine last year.

    • HackadayFET: Fun Endeavors Together

      Last time, we’ve looked over FET basics, details, nuances and caveats. Basics aren’t all there is to FETs, however – let’s go through real-world uses, in all their wonderful variety! I want to show you a bunch of cool circuits where a friendly FET, specifically a MOSFET, can help you – and, along the way, I’d also like to introduce you to a few FETs that I feel like you all could have a good long-term friendship with. If you don’t already know them, that is!

    • Michael West MediaThrowing fuel on the fire
    • Neil Williams: Carrying Grief

      This isn't a book review, although the reason that I am typing this now is because of a book, You Are Not Alone: from the creator and host of Griefcast, Cariad Lloyd, ISBN: 978-1526621870 and I include a handful of quotes from Cariad where there is really no better way of describing things.

      Many people experience death for the first time as a child, often relating to a family pet. Death is universal but every experience of death is unique. One of the myths of grief is the idea of the Five Stages but this is a misinterpretation. Denial, Anger, Bargaining, Depression and Acceptance represent the five stage model of death and have nothing to do with grief. The five stages were developed from studying those who are terminally ill, the dying, not those who then grieve for the dead person and have to go on living without them. Grief is for those who loved the person who has died and it varies between each of those people just as people vary in how they love someone. The Five Stages end at the moment of death, grief is what comes next and most people do not grieve in stages, it can be more like a tangled knot.

    • The NationCamille Dungy on the Bewildering Wonder of Rewilding

      In Camille Dungy’s new book, Soil: The Story of a Black Mother’s Garden (Simon & Schuster), she chronicles the years she and her family spent transforming their home in Fort Collins, Colo., into “rewilded” prairie. She draws connections between the process of fostering indigenous flora and fauna, and broader cultural strains around notions of unruliness and acceptability when it comes to race, gender, land and water rights, community, time, labor, and motherhood. Her previous book, Guidebook to Relative Strangers: Journeys into Race, Motherhood, and History (Norton 2017), was a National Book Critics Circle Award Finalist. Among her many honors are an Academy of American Poets Fellowship, a Guggenheim Fellowship, an American Book Award, two NAACP Image Award nominations, and fellowships from the National Endowment for the Arts in both prose and poetry. She is currently the poetry editor of Orion, and a university distinguished professor at Colorado State University. The Nation spoke with Dungy about how unexpected encounters and events fundamentally shaped both the form and content of Soil, as well as how the process of writing the book has changed her perspective on herself as an artist, teacher, community member, and mother.

    • Michael West MediaAlan Joyce to depart. Is it time for Qantas to retire Jetstar too?

      Retiring Qantas chief Alan Joyce ran down the airline during his 15 year tenure; his depletion of the fleet and brutal cost cutting sapped customer service and staff morale. Michael Sainsbury reports on the changing of the guard and whether the inevitable corporate makeover may consign low-cost carrier Jetstar to aviation history.

      Is it time to retire Jetstar along with Alan Joyce?

    • Science

      • HackadayNASA’s Curiosity Mars Rover Gets A Major Software Upgrade

        Although the Curiosity rover has been well out of the reach of human hands since it touched down on Mars’ surface in 2012, this doesn’t mean that it isn’t getting constant upgrades. Via its communication link with Earth it receives regular firmware updates, with the most recent one being the largest one since 2016. In addition to code clean-up and small tweaks to message formats, this new change should make Curiosity both smarter and have its wheels last longer.

    • Education

    • Hardware

      • [Old] CNN1965: The promise of packet switching

        Two men, two very different projects. But Baran and Davies reached strikingly similar conclusions. Independently, both developed the concept of what we now know as "packet switching," a term Davies coined in 1965. Baran's term was "distributed adaptive message block switching." As he put it, "Davies chose a wonderful name."

        Packet switching breaks big chunks of data into smaller units, called packets. The packets are transmitted individually using the fastest route available on the network. Each packet holds information about its origin and destination. Oncce all the packets arrive at the destination, they're recompiled into the original message.

      • Ruben SchadeResearching if Commodore’s PCs were profitable

        Commodore, better known for their legendary PET, C64, and Amiga computers, also made PC clones during the 1980s. While largely unremarkable in a crowded market dominated by the likes of Compaq and Tandy, their mere existence on the retrocomputing timeline fascinates me. Learning of them a few years ago was like discovering DEC also made Intel-based workstations. It just… it doesn’t compute.

      • HackadayOp Amp Challenge: An Ultra-Cheap PH Sensor Amplifier

        It’s rare in 2023 for an instrument to be entirely analog, instead it’s more normal for a front-end to feed the analog-to-digital converter (ADC) in a microcontroller. Typically the front-end will do the job of transforming whatever the output range of the sensor is, and present it to the microcontroller in whatever range it accepts. [David] had exactly this problem with a pH sensor, and rather than buy an expensive module to do the job he designed his own.

      • HackadayElectroosmotic Haptics For More Tactile Touch Devices

        If you’re like us, one of the appeals of retro tech is the tactile feedback you get from real buttons. Researchers at Carnegie Mellon have developed a new method for bringing haptic feedback to touchscreen devices.

      • HackadayIBM PC Runs BASIC With Motorola 68000 CPU Upgrade

        Although ARM CPUs have been making headway in several areas of computing over the last decade or so, the vast majority of desktop, laptop and server CPUs are still based on the x86 architecture. How that came to be is no secret, of course: IBM chose the Intel 8088 to power its model 5150 PC back in the early 1980s, and since it became the dominant PC platform, everyone else followed suit. But what if IBM’s purchasing department had got a good deal at Motorola instead? [Ted Fried] has been experimenting with that scenario, by equipping an IBM PC with a 68000 CPU.

      • Gunnar WolfGunnar Wolf: Scanning heaps of 8mm movies

        After my father passed away, I brought home most of the personal items he had, both at home and at his office. Among many, many (many, many, many) other things, I brought two of his personal treasures: His photo collection and a box with the 8mm movies he shot approximately between 1956 and 1989, when he was forced into modernity and got a portable videocassette recorder.

    • Health/Nutrition/Agriculture

      • International Business TimesSnapping, Chatting and Cyberbullying: How social media makes us all anxious and depressed

        In 2020, the National Library of Medicine carried out a qualitative and quantitative study to analyse the effect that social media can have on mental health. The study involved systematically searching for multiple research papers with relevance to the question of whether or not social media impacted mental health; this was based on time spent online, frequent activity and social media addiction. Eventually, peers of the Library selected only sixteen papers out of thousands, and they discovered that anxiety and depression were the most commonly measured outcome of using social media.

      • International Business TimesUK imposes up to €£1,000 fine for walking dogs on beaches

        Among the authorities to have banned dog walking at their coastline is the Sunderland City Council. It has banned pets at Roker Beach and part of Seaburn Beach from May 1 to Sept. 30, reported BBC. The council said that the measures are being taken to help tackle dog fouling and anti-social behaviour.

      • Jacobin MagazineWe Don’t Just Need Medicare for All — We Need a National Health System

        The founders of Physicians for a National Health Program put single-payer health care on the map. Now, discussing the next phase of the movement, they say even single-payer won’t be enough to fix the problems caused by continued privatization.

      • ABCFentanyl overdose deaths surged 279% sin

        The rate of overdose deaths involving fentanyl spiked by 279% between 2016 and 2021 from 5.7 per 100,000 to 21.6 per 100,000, according to a report published early Wednesday by the National Center for Health Statistics' National Vital Statistics System -- which looked at death certificate records.s

      • Common DreamsDeadly Dust Storm in Illinois Blamed on Short-Sighted Industrial Farming Methods

        Agricultural policy experts on Tuesday said the deadly dust storm that led to "zero visibility" for highway drivers this week in Illinois should be a "wake-up call" for lawmakers as advocates fight against industrial farming practices.

    • Proprietary

      • Computer WorldGenerative AI is about to destroy your company. Will you stop it?

        If coders lied as often as ChatGPT, they would be fired immediately. Stunningly, some enterprise execs seem to be just fine with that — as long as AI continues to code quickly and for so little money.

      • 37signals LLCCloud exit pays off in performance too

        Last week, we successfully pulled off our biggest cloud exit yet for Basecamp Classic. This is the original app that started it all for us from way back in 2004. And now, after a couple of years running on AWS, it's back on our own hardware, using MRSK, and holy smokes is it fast! Just look at these charts: [...]

      • Android HeadlinesNest Hub 2nd Gen gets Fuchsia OS update from Google

        The Fuchsia rollout for the Nest Hub 2nd Gen began earlier today, 9to5Google reports. The company told the publication that the OS switch for the 2021 smart display, which comes with a Soli radar sensor for sleep tracking, will take place slowly. Like in the past, it will begin with a small percentage of users enrolled in the Preview Program in the Google Home app. Google will likely use those devices for public testing. Once it confirms that everything’s fine, the update should reach everyone around the world.

      • CNNNorth America’s largest transportation network suspends use of Twitter for service alerts

        North America’s largest transportation network suspended the use of Twitter for service alerts Thursday, saying the “reliability of the platform can no longer be guaranteed.”

        The Metropolitan Transportation Authority, which serves 15.3 million passengers across a 5,000 square-mile area surrounding New York City, Long Island, New York State and Connecticut, also said their access to Twitter through its Application Programming Interface (API) was involuntarily interrupted twice over the last two weeks.

      • The Wall Street JournalUnity Conducts Its Third and Largest Round of Layoffs in a Year [Ed: Microsoft Mono boosters]

        Unity is conducting its third and largest round of layoffs in the past year, according to people familiar with the matter, joining other companies in tech and beyond in trimming their workforces as recession fears mount.

        San Francisco-based Unity is slashing roughly 600 jobs, about 8% of its workforce, the people said. The company, which will be left with around 7,000 employees after the layoffs, is also planning to reduce its global network of offices over the next few years to fewer than 30 from 58 today, they said.

        The job cuts come after Unity let go more than 500 employees in two rounds of layoffs, one this January and another last June, in response to negative economic trends.

        The January layoffs also reflected a need to deal with a duplication of roles resulting from its $4.4 billion acquisition last year of ironSource, an Israeli ad-tech company.

    • Security

      • LWNSecurity updates for Tuesday [LWN.net]

        Security updates have been issued by Debian (libdatetime-timezone-perl and tzdata), Fedora (chromium), Red Hat (emacs and libwebp), Slackware (netatalk), and Ubuntu (php7.0).

      • Dark ReadingNorth Korean APT Gets Around Macro-Blocking With LNK Switch-Up

        APT37 is among a growing list of threat actors that have switched to Windows shortcut files after Microsoft blocked macros last year.

      • Gray Media GroupRansomware cyberattack continues at Bluefield University [iophk: Windows TCO]

        There are new developments on the cybersecurity attack that has crippled internet services at Bluefield University. We’ve learned through “RamAlert” texts sent to students, faculty and staff that the cyber attackers are now directly communicating with everyone on the alert system. They have identified themselves as “AvosLocker” and are demanding payment in return for not leaking students’ private information. The FBI considers AvosLocker to be ransomware. In March 2022, they released an advisory on it. They said avoslocker has “Targeted victims across multiple critical infrastructure sectors in the U.S. Including…The financial services, critical manufacturing, and government facilities sectors.”

      • Fierce PharmaMerck entitled to $1.4B in cyberattack case after court rejects insurers' 'warlike action' claim

        Merck may finally be entitled to a hefty insurance payout from the high-profile NotPetya cyberattack—if an appeals court ruling stands.

        A New Jersey appellate court on Monday ruled that a group of insurers can’t use war as an argument to deny Merck coverage from the notorious cyberattack that afflicted the company and others back in 2017.

        Upholding a prior ruling, the appeals court said in an opinion (PDF) that the “hostile/warlike action” exclusion clause shouldn’t be applied to a cyberattack on a non-military company—even if it originated from a government or sovereign power. In this case, the hack was tied to Russia as part of its aggression against Ukraine, according to U.S. officials.

        The Superior Court of New Jersey previously granted Merck a $1.4 billion payout after the pharma company sued its insurers who had denied coverage for the NotPetya attack. In appeal, eight insurers disputed nearly $700 million in coverage, or about 40% of the total Merck had in its property insurance program at the time.

      • Europol288 dark web vendors arrested in major marketplace seizure

        In an operation coordinated by Europol and involving nine countries, law enforcement have seized the illegal dark web marketplace “Monopoly Market” and arrested 288 suspects involved in buying or selling drugs on the dark web. More than EUR 50.8 million (USD 53.4 million) in cash and virtual currencies, 850 kg of drugs, and 117 firearms were seized. The seized drugs include over 258 kg of amphetamines, 43 kg of cocaine, 43 kg of MDMA and over 10 kg of LSD and ecstasy pills.

      • Wichita State restoring systems after cyber attack

        Over the weekend, Wichita State University took proactive measures and disconnected several University systems to isolate an unauthorized attempt by a third party to access the University’s systems, according to a statement of the school's website.

        Most of the University system access has been restored and there has been no indication that any of the University’s secure data or information has been compromised. The University will continue to engage its security protocols in restoring full availability of all networks and systems, prioritizing student needs.

      • Data BreachesPENNCREST School District dealing with ransomware attack

        Over the weekend, the PENNCREST School District became aware of a situation, believed to be a ransomware event, which has disrupted certain aspects of our operations. We quickly took steps to implement our Cybersecurity Incident Response Plan. Following our plan, we shut down and disconnected the entire network and technology infrastructure. We are now working diligently with external cybersecurity specialists to conduct a thorough forensic investigation into the nature and scope of the event and to securely restore operations. At this time, we have not identified evidence of any data loss, data access, or data theft as a result of this event.

      • Data BreachesMontana State University update on “cyberattack” doesn’t disclose it’s ransomware

        Threat and Risk Intelligence Services pointed out to DataBreaches that the university’s update does not mention that this is a ransomware attack by Royal that has been listed on Royal’s leak site (but without data as yet).

      • WiredThe Untold Story of the Boldest Supply-Chain Hack Ever

        It was late 2019, and Adair, the president of the security firm Volexity, was investigating a digital security breach at an American think tank. The intrusion was nothing special. Adair figured he and his team would rout the attackers quickly and be done with the case—until they noticed something strange. A second group of hackers was active in the think tank’s network. They were going after email, making copies and sending them to an outside server. These intruders were much more skilled, and they were returning to the network several times a week to siphon correspondence from specific executives, policy wonks, and IT staff.

      • Suffolk, without€ a cyberattack recovery plan, hires chief to create one - Newsday

        Kenneth Brancik will oversee development and enforcement of programs intended to protect the county's data, systems and technology, Suffolk County officials said.

      • The Register UKBitmarck shuts down systems, services after cyberattack ● The Register [iophk: Windows TCO]

        German IT services provider Bitmarck has shut down all of its customer and internal systems, including entire datacenters in some cases, following a cyberattack.

        The company, one of the largest service providers for German health insurers, said no customer, patient, or insured individuals' data had been accessed in the security breach — at least not according to "the current state of knowledge," according to an April 30 update posted on its temporary website.

      • Bleeping ComputerT-Mobile discloses second data breach since the start of 2023

        T-Mobile disclosed the second data breach of 2023 after discovering that attackers had access to the personal information of hundreds of customers for more than a month, starting late February 2023.

        Compared to previous data breaches reported by T-Mobile, the latest of which impacted 37 million people, this incident affected only 836 customers. Still, the amount of exposed information is highly extensive and exposes affected individuals to identity theft and phishing attacks.

      • 2023-04-27 [Older] Enterprise Linux Security Episode 64 - FIPS
      • CISA2023-04-21 [Older] Cisco Releases Security Advisories for Multiple Products
      • CISA2023-04-21 [Older] Drupal Releases Security Advisory to Address Vulnerability in Drupal Core
      • CISA2023-04-21 [Older] Oracle Releases Security Updates
      • CISA2023-04-21 [Older] VMware Releases Security Update for Aria Operations for Logs
      • IT Wire84% of Australian organisations predict successful cyber attacks in the coming year [iophk: Windows TCO]

        According to Mick McCluney, Trend Micro’s technical director for the region, “We saw the Australian cyber-risk index (CRI) improve from -0.54 in 1H 2022 to -0.12 in 2H 2022. It means that organisations may be taking steps to improve their cyber-preparedness. There is still much to be done, as employees remain a source of risk. The first step to managing this is to gain complete and continuous attack surface visibility and control.”

      • Red Hat OfficialConfidential computing primer [Ed: Outsourcing false advertised as privacy (it's not)]

        This article is the first in a six-part series in which we present various usage models for confidential computing, a set of technologies designed to protect data in use—for example by using memory encryption—and the requirements to get the expected security and trust benefits from t​​he technology.

        In the series, we will focus on four primary use cases: confidential virtual machines, confidential workloads, confidential containers and finally confidential clusters. In all use cases, we will see that establishing a solid chain of trust uses similar, if subtly different, attestation methods, which make it possible for a confidential platform to attest to some of its properties. We will discuss various implementations of this idea, as well as alternatives that were considered.



      • Integrity/Availability/Authenticity

        • Wladimir PalantA way forward for PfP: Pain-free Passwords

          A month ago I announced the end of PfP: Pain-free Passwords. But I’m allowed to change my mind, right? Yes, PfP will be developed further after all. However, it’s so different that I’m publishing it as a new browser extension, not an update to the existing extension.

          Rather than using its own data format, PfP 3.x reads and writes KeePass database files. In order for the extension to access these files, users have to install a PfP Native Host application. This application provides access to the configured database files only.

          Also, PfP 3.x no longer generates passwords on the fly. All passwords are stored inside the database, and generating passwords randomly happens when passwords are added. While this makes recovery more complicated, elsewhere it simplifies things a lot.

      • Privacy/Surveillance

        • Mullvad VPNUpdate: The Swedish authorities answered our protocol request

          We have now received a response from the Swedish Prosecution Authority and the prosecutor in charge of the operation, who told us that the search warrant was a decision made in international legal cooperation with Germany. However, the Swedish Prosecution Authority does not want to give any more details and we were not given any protocols with reference to confidentiality.

          See the letter from the prosecution office in its entirety below: [...]

        • Vice Media GroupNew Tool Shows if Your Car Might Be Tracking You, Selling Your Data

          A new tool that is free to use for consumers aims to better inform people about the types of data their particular car manufacturer might be collecting and sharing about their identity and driving patterns.

          The Vehicle Privacy Report tool, made by automotive privacy company Privacy4Cars, is based on a manual and automatic analysis of car manufacturers’ data collection policies. Users enter their vehicle identification number (VIN), and the tool provides information based on those policies.

        • HackadayHackaday Prize 2023: Eye Tracking On A Budget

          There is a lot to be learned from the experience of building something functional, and even better if doing so doesn’t break the bank. [Sergej Stoetzer]’s 20€ DIY-Eyetracker aims to be an educational process that covers everything from hardware to functional software in an accessible way.

        • Common Dreams132 Rights Groups Warn EARN IT Act Threatens Online Privacy and Free Speech

          As U.S. lawmakers renew efforts to pass a bipartisan bill intended to combat sexual exploitation of children online, 11 dozen advocacy groups argued Tuesday that the federal legislation would actually not only fall short in its mission but also endanger digital privacy and free expression.

        • TechdirtBipartisan Panic: 26 Senators Support Terrible, Dangerous, Unconstitutional ‘KOSA Act’

          Passing blatantly unconstitutional dangerous laws “to protect the children” based on totally unsubstantiated moral panics appears to be part of a bipartisan mass hysteria these days. The Kids Online Safety Act, or KOSA, is officially back. And, with it, the recognition that over a quarter of the Senate has bought into this dangerous, unconstitutional nonsense:

        • EFFThe Kids Online Safety Act is Still A Huge Danger to Our Rights Online

          Online child safety is a complex issue, but KOSA attempts to boil it down to a single solution. The bill holds platforms liable if their designs and services do not “prevent and mitigate” a list of societal ills: anxiety, depression, eating disorders, substance use disorders, physical violence, online bullying and harassment, sexual exploitation and abuse, and suicidal behaviors. Additionally, platforms would be responsible for patterns of use that indicate or encourage addiction-like behaviors.€ 

        • EFFEFF to Congress: Oppose the EARN IT Act and the STOP CSAM Act

          On Thursday, May 4, 2023, the committee will consider S. 1207, the Eliminating Abusive and Rampant Neglect of Interactive Technologies Act of 2023 (EARN IT Act), and S. 1199, the Strengthening Transparency and Obligation to Protect Children Suffering from Abuse and Mistreatment Act of 2023 (STOP CSAM Act).€ 

      • Confidentiality

        • The HillSamsung bans employee use of ChatGPT after reported data leak: report

          Bloomberg reported Tuesday that some Samsung staff members uploaded sensitive code information to ChatGPT, raising concerns that information uploaded to the AI software could be exposed to other users. A memo obtained by Bloomberg News informed employees that they were prohibited from using AI programs like ChatGPT due to cyber security, noting that the data uploaded could also be difficult to retrieve and delete.

        • Krebs On SecurityPromising Jobs at the U.S. Postal Service, ‘US Job Services’ Leaks Customer Data

          A sprawling online company based in Georgia that has made tens of millions of dollars purporting to sell access to jobs at the United States Postal Service (USPS) has exposed its internal IT operations and database of nearly 900,000 customers. The leaked records indicate the network’s chief technology officer in Pakistan has been hacked for the past year, and that the entire operation was created by the principals of a Tennessee-based telemarketing firm that has promoted USPS employment websites since 2016.

    • Defence/Aggression

    • Environment

      • Common DreamsThe Return of May '68: Students Launch Occupations for Climate Justice

        Sleeping bags, backpacks, shoes, and dishes from last night's dinner are scattered around the halls. It has been three days since students at Liceu Camões, a high school in central Lisbon, began their occupation, using time away from class to educate each other on what really matters in a planet on fire: climate justice, revolutionary politics, and movement strategy. Grassroots teach-ins are interwoven with drums and chants that interrupt those remaining in class. "Pelo clima. Unidos. Ocupamos. Resistimos!" (For the climate. United. We occupy. We resist!) they shouted.

      • DeSmogProtesters Blockade White House Correspondents Dinner Over Biden’s Broken Climate Promises

        The White House Correspondents Dinner has been an annual tradition since 1921. The gathering for media and political elites has the reputation for being the toughest ticket to get in Washington, D.C. This past weekend, the newly formed Climate Defiance group made it a bit harder to get in.€ 

        Climate Defiance is a self-described youth-run collective that has been using direct action to disrupt events that lawmakers and newsmakers attend in order to draw attention to insufficient action on the climate crisis. Just last week, the collective interrupted a speech by Biden advisor John Podesta, chanting phrases such as “Keep your promise. No new drilling.”€ 

      • Telex (Hungary)The latest from Arte Weekly: Climate change protests sweep across Europe
      • Energy/Transportation

        • DeSmogTelegraph Columnist Allison Pearson Becomes Director of Climate Science Denial Group

          The Daily Telegraph’s chief interviewer and columnist Allison Pearson has joined the Global Warming Policy Foundation (GWPF), one of the UK’s principal climate science denial groups.€ 

          This appointment adds to the influence of the GWPF in the press and potentially the amount of sway that it holds over the Conservative Party.€ 

        • Interesting EngineeringCalifornia issues world’s first mandate to end combustion truck sales by 2035

          Transportation is responsible for the largest portion of California's greenhouse gas emissions, with heavy-duty trucks accounting for a significant portion. According to data by CARB, even though trucks only account for 6% of the total vehicles on state roads, their emissions result in 35% of California's transportation-generated nitrogen oxide emissions and 25% of on-road greenhouse gas emissions.

        • Common DreamsHundreds of Students Launch May of Occupations to End Fossil Fuels

          Hundreds of students occupied their schools and universities on Tuesday as part of a global movement to disrupt educational institutions this May and push for an end to the fossil fuel economy.

        • HackadayE-Bike Battery Tapped For Off-Grid Laptop Power

          If you’ve travelling via bike, you’ll know there’s a certain advantage to packing light. But what if you need to take your beefy desktop-replacement laptop with you on one of these trips? These power hungry machines can’t go far without their chargers (or a place to plug them in), which generally makes them poor traveling companions.

        • Common Dreams'Big Win': New York to Build Publicly Owned Clean Energy, Electrify New Buildings

          Climate campaigners in New York were credited on Tuesday with pushing Democratic Gov. Kathy Hochul and the state Legislature to include in the state budget "historic" provisions that will build publicly owned renewable energy and end the use of fossil fuels in new buildings—without a loophole allowing municipalities to opt out of the requirement.

      • Wildlife/Nature

    • Finance

    • AstroTurf/Lobbying/Politics

      • CNNJack Dorsey no longer thinks Elon Musk is the right person to run Twitter

        Dorsey added that Musk “should have walked away” from acquiring Twitter for $44 billion, and faulted Twitter’s board in hindsight for trying to compel Musk to follow through with the deal despite Musk’s attempts to back out of the purchase last year.

      • The Register UKPornhub walls off Utah in age-verification law protest

        In that safe-for-work video, shown to all Pornhub visitors with a Utah IP address, Cherie DeVille – an adult performer, natch, and member of the Adult Performer Advocacy Committee – apologizes for the blockade but insists access to the world's 13th most popular website has to be restricted as a result of legislation about to kick in.

      • Off GuardianThe Great Divide

        That isn’t going to happen, of course. The global-capitalist ruling classes are never going to let him near the Oval Office. They learned their lesson back in 2016. There are not going to be any more unauthorized presidents. The folks at GloboCap are done playing grab-ass, and they want us to know that they are done playing grab-ass. That’s what the last six years have been about.

      • India TimesGoogle, Microsoft CEOs called to AI meeting at White House

        The chief executives of Alphabet Inc's Google, Microsoft, OpenAI and Anthropic will meet with Vice President Kamala Harris and top administration officials to discuss key artificial intelligence (AI) issues on Thursday, said a White House official.

      • ScheerpostLula is Right — The UN Security Council Can’t Resolve Major Conflicts

        Brazilian President Luiz Inácio Lula da Silva made a state visit to Portugal and Spain last week. He was primarily seeking trade agreements, and especially wished to prepare the way for agreement this summer on a huge European Union – Latin American free trade […]

      • Common DreamsUS House Members Unveil Stock Trading Ban: Bipartisan Restoring Faith in Government Act

        Four members of the U.S. House of Representatives from across the political spectrum came together on Tuesday to introduce the Bipartisan Restoring Faith in Government Act, which would ban federal lawmakers and their immediate relatives from owning and trading stocks.

      • Common DreamsFeinstein Inflicting 'Great Harm on the Judiciary' and Should Resign, Says Ocasio-Cortez

        U.S. Rep. Alexandria Ocasio-Cortez on Monday night rejected claims that Sen. Dianne Feinstein is being targeted by "anti-feminist" attacks as calls mount for the 89-year-old lawmaker's retirement.

      • Common DreamsThomas' Citizens United Vote Enabled Billionaire Benefactor to Boost Political Power

        A report published Monday highlights potential connections between the political influence of Harlan Crow's family and the billionaire GOP megadonor's yearslong endeavor to shower U.S. Supreme Court Justice Clarence Thomas with lavish vacations and other undisclosed gifts.

      • Telex (Hungary)A hollowed out National Assembly, a year on
      • The NationThe Price We Pay
      • Telex (Hungary)EU Budget Commissioner in Budapest, blocked EU funds may also be on agenda
      • New YorkerA Trailblazer of Trauma Studies Asks What Victims Really Want

        Judith Herman’s seminal book “Trauma and Recovery” created a template for her field. Three decades later, she’s published a follow-up to explain how survivors’ needs are still misunderstood.

      • Misinformation/Disinformation/Propaganda

        • The NationA New Form of Propaganda Has Targeted the Central African Republic

          In the early days after the Internet became a common domestic utility, there was broad optimism that interconnectedness would ultimately be for the greater good. Today, that picture is tarnished, particularly as the Internet is dominated and shaped by a handful of private companies. Platforms don’t simply provide us with a service. Their real goal is often to track our interactions even outside their own sites in order to monetize every millisecond of our lives. We are under constant surveillance, because these platforms want to sell us things. The hope of a free and open Internet endures, but evidence is mounting that, without some guardrails, those who seek to harm will take advantage of the platforms’ drive for profit to deepen their own power.

        • New York TimesGoogle Promised to Defund Climate Lies, but the Ads Keep Coming

          These are not aberrations, according to a coalition of environmental organizations and the Center for Countering Digital Hate. In a report released on Tuesday, researchers from the organizations accused YouTube of continuing to profit from videos that portrayed the changing climate as a hoax or exaggeration.

        • RFERLBelarusian Social-Media Pages Get A Suspiciously Russian Makeover

          "The page had an owner and he sold it," a former administrator of the group told RFE/RL's Belarus Service on condition of anonymity. "The new owner fired all the editors and administrators. Now he is either doing everything himself or has brought in his own people."

          Similar stories have been developing in many of Belarus's largest cities. Popular local-news groups in Vitsebsk, Mahilyou, Zhlobin, Orsha, and other cities have similarly been relaunched under the banner of The Main Thing! Their online histories show they were created in various years dating back to 2012, but all of them took their new names around the middle of March.

        • The Register UKMisinformation tracker warns 'new generation' of AI-scribed content farms on the rise

          "In April 2023, NewsGuard identified 49 websites spanning seven languages — Chinese, Czech, English, French, Portuguese, Tagalog, and Thai — that appear to be entirely or mostly generated by artificial intelligence language models designed to mimic human communication — here in the form of what appear to be typical news websites," NewsGuard claimed.

          NewsGuard journalists and analysts worked to spot telltale signs a website is AI-generated.

        • TechdirtMontana’s Governor’s Changes To TikTok Ban Bill Would Ban All Social Media Entirely

          We’ve already talked about Montana’s extraordinarily unconstitutional “ban TikTok” bill that raises a huge number of constitutional issues. Lots of individuals and organizations pointed this out to governor Greg Gianforte (who came to office as a former tech exec of an internet company, and was supposed to be someone who understand the internet).

        • ScheerpostMatt Taibbi: America, the Single-Opinion Cult

          Narrowing permitted ideas on both left and right, one unsuitable voice at a time.

    • Censorship/Free Speech

      • New York Times2023-04-27 [Older] China Detains Taiwan-Based Publisher in National Security Investigation
      • CPJ2023-04-26 [Older] Chinese authorities detain Taiwan-based publisher and radio host Li Yanhe on national security charge
      • NPRA Florida principal who was fired after showing students 'David' is welcomed in Italy

        Three parents were upset, according to Carrasquilla. Two parents said they wished they were notified about the lesson beforehand, while one parent complained more specifically about the nudity, equating it to pornographic material.

        The school later sent out an apology to parents of the sixth grade class about the oversight. Despite the measure, Carrasquilla said she was given the option to resign or be terminated without cause by the school board chair.

      • Digital Music NewsTikTok Owner ByteDance is Actively Suppressing a Vast Number of ‘Sensitive Words’

        Posts about the Chinese government, U.S.-China trade, former president Donald Trump, persecuted minority group Uyghurs, and even TikTok competitors like YouTube are subject to monitoring and, in many cases, suppression by ByteDance.

      • ForbesTikTok Parent ByteDance’s ‘Sensitive Words’ Tool Monitors Discussion Of China, Trump, Uyghurs

        Records show the moderation tools and other internal programs also collect data on the “hit rate” of sensitive words, including information about U.S. users posting them. One document mentioning TikTok and other ByteDance products describes a recent upgrade that integrated the moderation system with “a new text detection service,” making it easier to track and analyze “hit records of sensitive words” in real-time. (At least one of the people running that project was an engineer in Beijing.) Favazza, the TikTok spokesperson, said that tracking data on hits of sensitive or prohibited words “simply helps us understand performance” and that “access is restricted.”

        The Chinese government has used social media to target people in the U.S. who’ve spoken out online against the Chinese Communist Party, including by commemorating the Tiananmen Square massacre in Beijing. The Justice Department in April charged dozens of police officers tied to the Chinese government with doing just that.

      • uni MichiganCensorship: the villains, victors and victims

        Lawmakers, particularly Republicans, continue to push legislation that silences people in communities that they choose not to understand or listen to, a decision that directly impacts the sanctity of democracy. In using censorship as a political tool, such politicians are able to elevate their power over communities that are already systemically underprivileged, underrepresented and undervalued.

        No one wins in that system. It doesn’t help anyone to create a society that is afraid to step outside of the box set up by those in positions of privilege and power. No one wins when people are afraid to fully express themselves. The censorship of marginalized communities, histories and livelihoods encourages rhetoric that is close-minded and breeds a population of people that are unwilling to experience societal change.

      • IndiaSilencing the voice of a nation: The alarming reality of government censorship on online platforms in India

        This arrangement is now coming under stress due to the rise in hate speech and misinformation on social media. Both governments and civil society believe that social media companies have not done enough to keep the internet safe for people. For example, parliamentary panels have summoned social media companies and are evaluating their role in inciting violence in India. Governments are calling for the companies to do more, including threats to remove the legal immunity and ‘safe harbour’ that they have hitherto enjoyed. These issues culminated in new rules framed for online intermediaries in February 2021.

        The new rules augmented existing government control over online platforms. Social media companies, a term left vague and expansive, need to take down content within 36 hours of receiving a government notice. They also need to appoint a nodal person for 24×7 coordination with law enforcement officials and hand over any data that they are asked for within 72 hours. The rules, however, go far beyond just social media. The central government can ask ‘curated content platforms’ such as Netflix and Hulu to take down or modify content. Ditto for digital news platforms. Through these rules, the government is empowered not only to restrict fake or hateful content but also regulate almost all kinds of content that are shared online.

      • TechdirtPornhub Says No More Porn For Folks In Utah (Unless They Know How To Use A VPN)

        On May 3, a new law restricting porn access in Utah will go Into effect. The response is going to be epically controversial as angry porn consumers in the state will soon lose access to much more than a few household adult entertainment industry brand names like Pornhub.€ 

    • Freedom of Information / Freedom of the Press

      • Michael West MediaWorld Press Freedom Day! But for Julian Assange, David McBride, where is the freedom?

        If only the media would cover the persecution of Julian Assange with the same the same zeal as the wedding of shock-jock Kyle Sandilands; and the controversial attendance of Albo. At this time, when Jackie-O turned up late to the wedding, Michael West reports on World Press Freedom Day.

        If you had remarked 20 years ago, before the invasion of Iraq, that an Australian citizen, a whistleblower, would expose the grotesque war crimes of another nation, but rather than being hailed as a hero, had been forced into hiding and then imprisoned for 4 years without a trial, without charges, you would have been called barking mad.

      • France24Press freedoms shrink, journalists targeted: UN and media

        Speaking ahead of World Press Freedom Day on Wednesday, UN Secretary-General Antonio Guterres issued a rallying cry for journalists and media worldwide.

        "All our freedom depends on press freedom," he said in a video message, calling it the "foundation of democracy and justice" and the "lifeblood of human rights."

        "But in every corner of the world, freedom of the press is under attack," Guterres added, addressing a conference held at UN headquarters in New York.

      • Vanity Fair“Get Him Out of Here”: Donald Trump Tossed NBC Reporter’s Phones During Tirade Aboard Campaign Plane

        The incident occurred a few days before Trump would be indicted by a Manhattan grand jury for his role in hush-money payments made to Stormy Daniels. Some of Trump’s comments on the plane have been previously reported, such as when he responded to reporters’ questions about Bragg’s probe by attacking it as a “fake case” that “they’ve already dropped.” The Guardian noted how Trump lashed out at Hillyard when the NBC News reporter asked whether he was frustrated by the investigation. Trump denied the notion, insisting, “We did nothing wrong,” and saying, “This is fake news, and NBC is one of the worst. Don’t ask me any more questions.” Hillyard himself said Trump avoided specifics and called the press “fake news.” But the full scope of Trump’s tirade, including his throwing the reporter’s phones, has not been previously reported. Hillyard declined to comment.

      • France24Press freedom "under attack" in every corner of the globe, says UN

        Speaking ahead of World Press Freedom Day on Wednesday, UN Secretary-General Antonio Guterres issued a rallying cry for journalists and media worldwide.

        "All our freedom depends on press freedom," he said in a video message, calling it the "foundation of democracy and justice" and the "lifeblood of human rights."

        "But in every corner of the world, freedom of the press is under attack," Guterres added, addressing a conference held at UN headquarters in New York.

      • RFAReleased citizen journalist who reported on COVID bounced between Beijing and Wuhan

        After his release, he was turned around and sent right back again by Beijing police as the authorities stepped up "stability maintenance" measures aimed at getting rid of other politically sensitive figures who have made their homes in the capital.

      • India TimesIT Rules amendment for government fact-checking unit threatens press freedom, say rights organisations

        “India’s new IT Rules amendment effectively empowers the government to be the judge and the jury on online content pertaining to itself. Fake, false and misleading are subjective terms with no legal definition. They can be used to arbitrarily demand removal of online content such as editorials, investigative journalism, satire, and more,” Namrata Maheshwari, Asia Pacific Policy Counsel at Access Now said in the statement issued on Tuesday.

      • YLEAssociation of Editors: Defamation case filed against Yle in Monaco "worrying"

        A defamation case filed by a Russian businessman in Monaco against the Finnish Broadcasting Company Yle is "worrying" from the perspective of both domestic media and journalistic freedom, according to a statement by Finland's Association of Editors (abbreviated as PTY in Finnish).

      • RTL59 journalists killed in 2022, fake news "overwhelms our information ecosystem"

        "When the free press erodes, democratic erosion almost always follows."

        The secretary general of Amnesty International, Agnes Callamard, said censorship has also become more common.

      • Deutsche WellePress freedom: 'Sooner or later, you have to leave Russia'

        The story of taiga.info could have ended last year, when it was blocked by the central media regulator Roskomnadzor. Since then, it can only be accessed in encrypted form via so-called VPN apps. However, Chistyakov is pleased to report that this hasn't deterred critically-minded readers. On the contrary: "We now receive more donations from our readers than from companies, as we used to." Overall, though, their revenue has collapsed, and it can no longer be described as a business, he says. His work is now a mission.

      • TechdirtCourt Grants Restraining Order Against Journalist For Performing Acts Of Journalism On A Politician

        Some politicians get elected and think they’re heading up the musical equivalent of vaporware. Just a heads up: you may have more power than you’re used to but it’s constrained by the Constitution: both the one ratified by the nascent US federal government and the one adopted by individual states, which are required to use the federal version for a baseline, rather than a high bar they should never feel compelled to clear.

    • Civil Rights/Policing

      • Deutsche Welle2023-04-25 [Older] Southeast Asia: How to combat a human trafficking crisis
      • ScheerpostIn Largest May Day Turnout Since Pandemic, Workers Around the World March for Better Conditions

        Marches from South Korea to Italy called for higher wages and targeted anti-worker policies.

      • ScheerpostWe Must Not Dance, Harry Belafonte Understood, to a Billionaire Beat

        This epochal artist helped us see that justice for all requires a just distribution of wealth.

      • Atlantic CouncilSchoolgirl poisonings are persisting in Iran. So should the international reaction to them.

        After weeks of denial, the deputy health minister acknowledged in an interview that the attacks on girls’ schools were intentional, and blamed extremist groups who seek to dissuade girls from pursuing education by increasing its cost (he later retracted these statements under pressure from conservative groups). Initially, the public did not find this claim credible, since the right to education for girls has never been a point of contention in Iran’s political and public sphere after the 1979 revolution, despite the numerous limitations imposed on women. However, as the range of attacks expanded and a few clerics and politicians hinted at the possible involvement of extremist groups, this theory has gained greater traction.

      • RFERLRallies In Tehran Again Call For Change Of Leadership As City Enforces Hijab Law

        Demonstrations erupted in various parts of the Iranian capital of Tehran as the city steps up enforcement of the mandatory hijab rule, angering residents who for months have protested over what they see as the government's intrusion into their daily lives.

      • ANF NewsSwedish intellectuals: We fear that the new law will affect the Kurds

        After the doll hanging and Koran burning, he has again used aggressive rhetoric against Sweden. The number of people he wants extradited from Sweden to Turkey has now increased again - from 33 to 130.

        And despite the fact that Sweden has a well-functioning terrorism law, the government now even wants to restrict Swedish freedom of association.

      • The NationIowa Starbucks Workers Want a Nice Hot Cup of Union Power

        A line of 25 people, mostly college students, snaked from the counter to the front door at the Starbucks in downtown Iowa City, Iowa, on April 21. A dozen “mobile orders” of lattes and cappuccinos sat waiting near the tip jar, which on this day was stuffed with bills.

      • Democracy NowHollywood Writers Strike: Abbott Elementary’s Brittani Nichols Decries “Gig Economy” in Streaming Era

        Thousands of screenwriters behind Hollywood movies and TV shows are on strike as of midnight on Tuesday. The Writers Guild of America says its members are struggling to make a living, as rates have fallen and writers have less job security — even as the streaming era has led to an explosion in TV and film production. The strike is set to bring most TV production to a halt immediately, with some films also likely to be delayed if the impasse continues. The WGA previously went on strike in 2007-’08, which lasted 100 days and had a significant impact on the entertainment industry. “We are demanding that this industry be one that can sustain a career,” says Brittani Nichols, captain for Writers Guild of America West and a writer on Abbott Elementary. “The studios have devalued our contributions. They have shifted the industry to prioritize streaming while not … making sure that our pay reflects those changes.”

      • NPRWriters Guild of America goes on strike

        "You're getting checks for $3, $7, $10. It's not enough to put together any sort of consistent lifestyle," she told NPR. "It can really be a real shock. ... sometimes you get a stack of checks for $0.07."

        Writers in Hollywood are basically gig workers with a union, constantly looking for their next job.

        And TV writers say that streaming translates to less work and less money, with studios asking for series to last eight to 10 episodes a season, rather than the traditional 22 episode seasons on network TV.

      • Common Dreams'No Other Choice': TV & Film Writers Strike to Fight Hollywood Greed

        Unionized film and television writers are on strike Tuesday after a midnight deadline came without a deal with executives of the major producers and streaming giants in Hollywood.

      • Security WeekGlobal Operation Takes Down Dark Web Drug Marketplace

        Law enforcement agencies around the world seized an online marketplace and arrested nearly 300 people allegedly involved in buying and selling drugs.

      • Scoop News GroupNearly 300 arrested in sprawling international dark web drug market takedown

        In total, 288 people were arrested, including 153 in the U.S., according to the statement. “A number of investigations to identify additional individuals behind dark web accounts are still ongoing,” the agency noted. “As law enforcement authorities gained access to the vendors’ extensive buyer lists, thousands of customers across the globe are now at risk of prosecution as well.”

      • Democracy Now60 Years Ago Today: Police Attack Children’s Crusade with Dogs & Water Cannons in Birmingham, Alabama

        Sixty years ago today is known as “D-Day” in Birmingham, Alabama, when thousands of children began a 10-week-long series of protests against segregation that became known as the Children’s Crusade. Hundreds were arrested. The next day, “Double D-Day,” the local head of the police, Bull Connor, ordered his white police force to begin using high-pressure fire hoses and dogs to attack the children. One photograph captured the moment when a white police officer allowed a large German shepherd dog to attack a young Black boy. Four months after the protests began, the Ku Klux Klan bombed a Black Birmingham church, killing four young girls — Addie Mae Collins, Carole Robertson, Cynthia Wesley and Denise McNair. We revisit the history of the Children’s Crusade with two guests: civil rights activist Janice Kelsey, who joined the Children’s Crusade as a 16-year-old in 1963, and author Paul Kix.

      • ErdoÄŸan accuses rival of PKK ties, says 'my nation will not hand over power to you if you're elected'

        Last week, the interior minister described the elections called by his government "a coup attempt by the West."

      • The NationThe Political Aftershock of Turkey’s Devastating Earthquake

        Istanbul—At just after 4:17 am on February 6, nature made a lethal intervention in Turkish history.1

      • The NationExit Tucker Carlson

        The Great Replacement Theory was his shtick. Untroubled by the fact that it is based On racist doctrines, Carlson carried on. And then, ironically, he got replaced.

      • Common DreamsMigrant Defenders Slam Biden for 'Reckless' Deployment of 1,500 Troops to Southern Border

        Human rights defenders on Tuesday condemned the Defense Department's plan to deploy 1,500 active duty soldiers to the southern border for "non-law enforcement duties," with numerous activists urging the Biden administration to instead address the root causes of migration and improve the process for people seeking asylum in the United States.

      • ScheerpostDiscrimination Against Moms Is Still Rampant in Most Workplaces

        Moms are still often laid off while on parental leave, pushed out of workplaces and subjected to stereotypes about their competency. But with few legal protections, attorneys say most cases go unreported.

      • The NationLiberalism’s Two Sides

        Fifty years ago, William F. Buckley Jr. vowed not to read another book about liberalism until his mother wrote one. Liberalism was riding high then, and Buckley was probably annoyed by its champions’ triumphalist tone. Over the past four decades, things have changed: You can hardly walk around the block today without tripping over a critique of liberalism. There are critiques by wild-eyed Randians, free-market libertarians, neoclassical economists, neo-Burkean conservatives, Catholic integralists, critical race theorists, postmodernists, and, of course, Marxists.1

      • The NationEmptying Guantánamo Is Not the Same as Closing Guantánamo

        Few of us are paying attention to Guantánamo Bay right now. But a recent United Nations report reveals that the post-9/11 forever prison is shifting into a macabre new phase: providing end-of-life care for its aging captives with its characteristic brutality. It’s a grim testament to how normalized Guantánamo is in 21st-century America.

      • The NationThis Could Be the Most Important Democratic Primary of 2023

        The partisan divide on reproductive rights has grown so wide that it is easy to forget that there are still some pro-choice Republicans and, yes, some anti-abortion Democrats. That reality is only rarely reflected in national debates. But it has real consequences at the state level—since, in the wake of the Supreme Court’s Dobbs decision overturning federal protections for abortion rights, that is where the fight for reproductive freedom is now playing out on a daily basis.

      • The NationA Texas Prison Guard Punishes a Woman for Talking About Abortion

        Kwaneta Harris typically keeps National Public Radio playing through her headphones. It’s the only way she can block out the incessant noise.

    • Digital Restrictions (DRM)

      • Tom's HardwareMicrosoft Reportedly Making New CPU for Windows 12

        The SQ series Arm processors, which are custom designed for Surface portable devices, are collaboratively designed with Qualcomm doing most of the heavy lifting. These chips are based on contemporary Snapdragon 8CX designs, so when the Nuvia chips arrive, Microsoft might have a parallel SQ model taking advantage of the newer cores. The first Snapdragon with Nuvia cores is expected to be the Snapdragon 8cx Gen 4 Processor, and should emerge near year-end.

      • TechdirtNetflix Loses A Million Subscribers In Spain After Greedy Password Sharing Crackdown

        We’ve noted repeatedly how Netflix’s password sharing crackdown is a stupid cash grab that alienates and annoys loyal customers, duplicates existing efforts to restrict “freeloaders,” won’t give the company the financial windfall it thinks, and just generally represents how the company has inevitably shifted from innovative disruptor to the kind of tone deaf cable giants it used to criticize.

    • Monopolies

      • The Register UKMicrosoft pushes users to the Edge in Outlook, Teams

        Microsoft plans to make web links in the Outlook for Windows app and Teams open by default in its Edge browser, regardless of the default browser chosen in Windows Settings.

        In accordance with Redmond's declaration in March that customers should "be able to control their default applications such as their default browser through consistent, clear and trustworthy Windows provided system dialogs and settings," Outlook users will "have the opportunity to choose [their] preferred browser for opening links from Outlook the first time [they] launch in Edge."

      • Patents

        • Dennis Crouch/Patently-OThe Supreme Court and Patent Protection for Medical Diagnostics: A Closer Look at CareDx and Stanford U v. Eurofins

          The recently filed petition for certiorari in CareDx and Stanford University v. Eurofins Viracor, Inc. (Supreme Court 2023) offers an opportunity to examine the patent eligibility doctrine in the context of an important health diagnostics innovation. The inventions at issue relate to early detection of organ transplant failure, which obviously hold significant potential to save lives and reduce reliance on invasive exploratory surgical procedures. The detection method involves identifying DNA fragments from the transplant within the bloodstream, a challenge that had stumped scientists for over a decade.

        • Kluwer Patent BlogPatent case: Driessen v. Best Buy Co., Inc., USA

          The Patent Trial and Appeal Board (PTAB) did not err by declining to consider a patentee’s claim construction arguments raised for the first time at oral argument.

      • Software Patents

        • EFFWhy Is the U.S. Solicitor General Trying To Change The Law To Benefit Patent Trolls?

          Government officials should be working to reduce, not increase, the burden that low-quality patent lawsuits impose on innovators. So we’re concerned and dismayed by recent briefs filed by the U.S. Solicitor General, asking the Supreme Court to reexamine and throw out the best legal defenses regular people have against “patent trolls”—companies that don’t make products or provide services, but simply use patents to sue and threaten others.

          To truly stop patent trolls, we’ll need wholesale reform, including legislative change. But the current framework of rules governing Section 101 of the U.S. patent laws, including the Supreme Court’s 2014 CLS Bank v. Alice decision, were important victories for common-sense patent reform.

          The Alice decision made clear that you can’t simply add generic computer language to basic ideas and get a patent. The ruling has been consistently applied to get the worst-of-the-worst software patents kicked out of the system. For the most part, it allows courts to state, clearly and correctly, that these patents are a form of abstract idea, and should be thrown out at an early stage of litigation. A win under the Alice rules spares the targets of patent trolls not just from an unjust trial, but from an invasive and expensive discovery process, fueled by a patent that never should have been issued in the first place.€ 

      • Copyrights

        • Torrent FreakISP Must Forward Warning Notice to eBook Pirate, Dutch Appeals Court Rules

          Dutch anti-piracy group BREIN is eager to send warnings to persistent pirates but doing so isn't straightforward in the Netherlands. The issue has been at the center of several lawsuits and a mass notice-forwarding scheme was shelved recently over privacy concerns. In a win for BREIN, a court of appeal today ruled that in specific cases, ISPs can be required to forward copyright warnings to online pirates.

        • Torrent FreakPirate IPTV: 24 MEPs Demand Action From EC President Ursula von der Leyen

          This week the European Commission is expected to publish its recommendation for combating live sports piracy in the European Union. A draft leaked to the media last month revealed that despite rightsholders' calls for urgency, the EC envisions a three-year review period. In a letter sent to EC President Ursula von der Leyen, 24 Members of the European Parliament demand more urgency and a commitment towards legislation.



Recent Techrights' Posts

Technology: rights or responsibilities? - Part VII
By Dr. Andy Farnell
 
Gemini Links 19/11/2024: Rain Music, ClockworkPi DevTerm, and More
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, November 18, 2024
IRC logs for Monday, November 18, 2024
Links 18/11/2024: Science News and War Escalations in Ukraine
Links for the day
Gemini Links 18/11/2024: Degrowth and OpenBSD Fatigue
Links for the day
BetaNews is Still 'Shitposting' About Trump and Porn (Two Analysers Say This 'Shitposting' Comes From LLMs)
Probably some SEO garbage, prompted with words like "porn" and "trump" to stitch together other people's words
Market Share of Vista 11 Said to be Going Down in Europe
one plausible explanation is that gs.statcounter.com is actually misreporting the share of Vista 11, claiming that it's higher than it really is
Fourth Estate or Missing Fourth Pillar
"The term Fourth Estate or fourth power refers to the press and news media in explicit capacity of reporting the News" -Wikipedia on Fourth Estate
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, November 17, 2024
IRC logs for Sunday, November 17, 2024
LLMs Are Not a Form of Intelligence (They Never Will Be)
Butterflies are smarter than "chatGPT"
Business Software Alliance (BSA), Microsoft, and AstroTurfing Online (Also in the Trump Administration Groomed by BSA and Microsoft)
Has Washington become openWashington? Where the emphasis is openwashing rather than Open(Source)Washington?
Windows at 1%
Quit throwing taxpayers' money at Microsoft, especially when it fails to fulfil basic needs and instead facilitates espionage by foreign and very hostile nations
Links 17/11/2024: Pakistan Broke, Tyson 'Crashes' or Knocks Over Netflix
Links for the day
Gemini Links 17/11/2024: Nachtigall Planned, Exodus at Twitter
Links for the day
Links 17/11/2024: China's Diplomacy and Gazprom Setback
Links for the day
Sudan Has Reached a State of Android Domination (93% Market Share, All-Time High According to statCounter)
countries at war buy fewer laptops?
[Meme] Just Do It?
'FSF' Europe (Microsoft) and FSF
Microsoft Front Groups Against the FSF, Home of GPL, GNU, and Free Software
Much of the money (not all of it) comes from the criminals at Redmond
Centralisation is Dooming the Web, RSS is One Workaround (But Not "Planets")
At least Gemini Protocol rejects centralisation
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, November 16, 2024
IRC logs for Saturday, November 16, 2024
Links 17/11/2024: Wars, Bailouts, and Censorship
Links for the day
Gemini Links 17/11/2024: Changing Interests and HamsterCMS
Links for the day