EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS


Links 29/1/2020: MPV 0.32, Qt Offering Changes, Thunderbird Gets New Home

Posted in News Roundup at 12:02 am by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • Still On Windows 7? Canonical Says It’s Time To Switch To Linux

        Windows 7 reached its end of support deadline quite recently. It clearly means that Windows 7 devices are no longer eligible for technical support and security updates. If you are one of those loyal Windows 7 fans who haven’t upgraded yet, your production machine is prone to serious potential risks.

        However, Microsoft recommends its users that they should upgrade to the latest version of Windows as soon as possible. Notably, there are two ways to switch to Windows 10. You can either clean install the operating system or purchase a new system with pre-installed Windows 10 OS.

        Speaking of Windows 10, we can not deny the fact that thousands of users are still hesitant to upgrade to Windows 10. Their hesitation is pretty much obvious because of the series of bugs that come along with each update.

        This is one of the reasons many people are now looking for a Linux-based operating system. But many of them don’t have any idea about the upgrade process. They are concerned about the hardware incompatibility issues and more.

      • Ubuntu Invites Windows 7 Users With Linux Switch Guides

        Canonical today published the first part of a tutorial series designed to help Windows 7 users migrate to Ubuntu Linux after Microsoft’s decade-old OS reached end of support this month and stopped receiving security and bug fixes.

        “We will provide a series of detailed, step-by-step tutorials that should help less tech-savvy Windows 7 users migrate from their old operating system to Ubuntu,” Canonical developer advocate Igor Ljubuncic said.

        Today’s post covers the steps before the actual migration and the data backup stage, and it will be followed by other tutorials detailing the installation steps as well as the post-install configuration and desktop environment setup process.

        While Windows 7 refugees also have the option to upgrade to Windows 10 or to buy a new computer with an operating system under active support such as macOS or Windows 10, Canonical would gladly have them switch to its free Ubuntu Linux distribution.

      • Official how to switch from Windows 7 to Ubuntu Linux tutorial now available

        If you are still using Windows 7 on your computer, you are making a huge mistake. Running an unsupported operating system is pure foolishness — there will be countless exploits in the future for which you simply won’t receive patches. In other words, your data and overall online safety is now at major risk. If you insist on sticking with Microsoft’s operating system, you might as well upgrade to Windows 10 — either by installing the operating system onyour current computer or buying a new PC with the OS pre-loaded.

        Understandably, many people are scared of Windows 10 — Microsoft’s data collection through extreme telemetry can make it feel like your own computer is spying on you. In that case, a Linux-based operating system should be considered. Today, Canonical releases an official guide for those thinking of switching to Ubuntu from Windows 7. Not only does the guide address potential hardware incompatibilities, but it provides a handy list of popular Windows software and its comparable Linux alternatives.

      • How to upgrade from Windows 7 to Ubuntu – Hardware and software considerations

        A few days ago, Rhys Davies wrote a timely article, titled Why you should upgrade to Ubuntu. In it, he outlined a high-level overview of what the end of support of Windows 7 signifies for the typical user, the consideration – and advantages – of migrating to Ubuntu as an alternative, and the basic steps one should undertake to achieve this.

        We’d like to expand on this idea. We will provide a series of detailed, step-by-step tutorials that should help less tech-savvy Windows 7 users migrate from their old operating system to Ubuntu. We will start with considerations for the move, with emphasis on applications and data backup. Then, we will follow up with the installation of the new operating system, and finally cover the Ubuntu desktop tour, post-install configuration and setup.

      • MintBox 3 debuts with 9th Gen Core CPUs, NVMe and Mint 19.3

        CompuLab and the Linux Mint project have launched a “MintBox 3” version of CompuLab’s fanless Airtop3” mini-tower loaded with Linux Mint 19.3 and a choice of Intel 9th Gen CPUs: a hexa-core i5-9500 for $1,399 and an octa-core i9-9900K with GeForce GTX 1660 graphics for $2,499.

        For years, the Linux Mint project and CompuLab have collaborated on CompuLab mini-PCs pre-loaded with the Mint distro, most recently with its $299-and-up, MintBox Mini 2 based on an Apollo Lake based Fitlet2 mini-PC. Back in 2013 there was a $599-and-up MintBox 2 built around an Intense PC driven by a 3rd Gen Ivy Bridge Core processor. Now, the partners have teamed up on a much more powerful — and expensive — MintBox3 that showcases CompuLab’s recent Airtop3 mini-tower based on Intel’s 9th Gen Core “Coffee Lake Refresh” processors.

      • Chrome OS 81 to allow Linux username selection for Crostini

        I’m not judging but apparently, some Chromebook users have some strange email addresses. And by strange, I mean they don’t allow you to set up the default user when installing Linux in Chrome OS.

        I’m joking a little here. However, this is a real issue for certain Gmail addresses because it’s that account that’s used to create the default user.


        Based on the current code merge, when starting the Linux installation process, users will be prompted to supply a username, which is then applied to the Linux container system settings.

      • Linux on Chrome OS: Disk resizing and custom username now working in Canary Channel

        A couple of weeks ago, we unearthed work being done that will give users the ability to set a custom size for the allotted amount of disk space used by Crostini Linux on Chrome OS. Still disabled via a flag, the resizing feature was still just a placeholder at that time. Today, after an update to the Canary Channel, it looks like the resizing function is now live. It’s still behind a flag and disabled by default but enabling it and starting Crostini from scratch now gives you the option to pick the amount of disk space you want to use for Linux.


        The renaming feature, like the resizing one, was disabled behind a flag and wasn’t working as of yesterday. With the latest update to Canary, the custom username feature is now working when the flag is enabled and it appears right above the resizing option when you install Crostini for the first time. Some users may like this feature simply because they want to create a unique username for Linux but for others, this will be a crucial update when it hits the Stable Channel in the coming months.

    • Server

      • Just Released: Kube-Scan Open Source Scanning Tool for Kubernetes

        A startup focused on Kubernetes security has released an open source risk assessment tool for the popular container orchestration platform. Cloud-native app security provider Octarine’s Kube-Scan is a cluster risk assessment tool for developers that scans Kubernetes configurations and settings to identify and rank potential vulnerabilities in applications in minutes.

        The tool’s risk score is based on Octarine’s own Kubernetes Common Configuration Scoring System (KCCSS), a framework similar to the widely used Common Vulnerability Scoring System (CVSS). The KCCSS is similar to the CVSS, but it focuses on the configurations and security settings themselves.

      • Catalogic Software Debuts Open Source Backup Tool for Kubernetes

        Catalogic Software has made available the open source KubeDR utility for backing up and recovering Kubernetes cluster configuration, certificates and metadata residing in an etcd repository.

        Company COO Sathya Sankaran says Catalogic Software has been working to extend the reach of its backup and recovery software for Kubernetes and that KubeDR represents an effort to give back to the open source community. The company’s backup and recovery software already have been extended to support instances of Red Hat OpenShift, which is based on a distribution of Kubernetes, running in OpenStack environments.

        As part of that effort, Catalogic Software, which spun out of Syncsort in 2013, has created Catalogic Labs, committed to developing additional open source data protection technologies.

        KubeDR is designed to enable IT organizations to recover Kubernetes configuration, certificates and metadata stored in an S3-compatible object storage system. The idea is to make it easier for IT organizations to recover a Kubernetes cluster in the event of a failure. IT teams still need a separate tool to back and recover any application data that might have been lost as well.

      • Container software startup Anchore raises $20 million

        The open source software evolution that garnered a $150 million buyout by software giant RedHat in 2015 is fueling a second venture for return founder Saïd Ziouani, this time focused on securing the containers at the core of app development.

      • New open-source projects look to secure Kubernetes

        Kubernetes security company Octarine has announced two new open-source projects designed to protect against cloud-native security vulnerabilities. The Kubernetes Common Configuration Scoring System (KCCSS) is a framework for rating security risks, and kube-scan is a workload and assessment tool.

        “Our mission is to make the adoption of DevSecOps best practices simple, understandable, and achievable for any organization running Kubernetes,” said Julien Sobrier, head of product at Octarine. “One glaring blindspot is at the configuration level when building and deploying cloud native apps. We hope these two new projects benefit the Kubernetes practitioners industry-wide and look forward to collaborating with the community to make Kubernetes as secure and compliant as possible.”

      • Explaining Knative, the Project to Liberate Serverless from Cloud Giants

        Today, using serverless means choosing a cloud platform to lock yourself into. The open source project expected to fix that is approaching prime time.

      • IBM

        • OpenShift 4.3: Dashboard refinements and the new Project dashboard

          The Cluster Overview dashboard we introduced in Red Hat OpenShift 4.2 was a significant and well-received addition to the Web Console, and our team has greatly enjoyed seeing how OpenShift users (and even our own developers) have been using it to identify and resolve issues they otherwise may not have noticed.

          We’ve made a number of changes both big and small to the dashboard based on our user research findings and the feedback we’ve collected from readers like you. This post covers some of the key improvements and introduces a new member of the dashboard family that we think developers in particular are going to love.

        • Open Virtual Network unidlingOpen Virtual Network unidling

          Open Virtual Network (OVN) is a project born as a sub-component of Open vSwitch (OVS), which is a performant, programmable, multi-platform virtual switch. OVN allows OVS users to natively create overlay networks by introducing virtual network abstractions such as virtual switches and routers. Moreover, OVN provides methods for setting up Access Control Lists (ACLs) and network services such as DHCP. Many Red Hat products, like Red Hat OpenStack Platform, Red Hat Virtualization, and Red Hat OpenShift Container Platform, rely on OVN to configure network functionalities.

        • Using Red Hat Universal Base Image with Azure Pipelines and Red Hat Quay.io
        • Time to celebrate Data Privacy Day!

          In the words of the National Cyber Security Alliance, Data Privacy Day “is an international effort to empower individuals and encourage businesses to respect privacy, safeguard data and enable trust.”

          Data privacy should be at the forefront of everyone’s mind. Protecting your personal data and understanding your right to privacy is becoming more and more important as we start to understand how valuable personal data is and how we are all accountable for protecting our privacy.

          Data privacy day is focused on staying safe online, which is a great opportunity to reflect on privacy in a personal way.

        • Overview of syslog-ng RPM repositories

          Most Linux distributions – like openSUSE or Fedora – include a syslog-ng package in their official repositories ready to install. Some others – like SLES and RHEL – include it in semi-official repositories, like SLES Backports and EPEL. What is the use case for unofficial repositories?

          Unless you use the rolling version of a distribution, like openSUSE Tumbleweed or Fedora Rawhide, you will be using an old version of syslog-ng. In some extreme cases, like RHEL 7, it means a six years old syslog-ng release, missing many features – like multi-threading – which are taken now for granted. Even if the included syslog-ng version is up-to-date, it might miss a few features – like the Java and Kafka destinations – due to missing or too old dependencies in the distribution.

          If you are lucky or just have a simple use case, the syslog-ng package included in the distro is sufficient for you. If you need one of the features missing from the distribution package, consider the unofficial syslog-ng repositories.

          What “unofficial” means? While I am a Balabit/One Identity employee, these are not official repositories. They are provided as is, with a best effort level of support.

        • Introducing the TRIRIGA Assistant

          Wouldn’t it be nice if your office started to act more like a team player? For employees, that would mean effortless engagement with workplace services. For facility managers, that would mean more engaged and delighted occupants who provide feedback to keep the workplace not just humming but evolving.

          IBM TRIRIGA just announced numerous enhancements to the workplace experience in the latest release. Among these enhancements, the all new TRIRIGA Assistant. The TRIRIGA Assistant is a smart, conversational AI assistant, which is the same frictionless technology that we all have in our homes, and which is another way to meet the ever-growing expectations of the workforce. This AI assistant can help users find and reserve meeting rooms, report maintenance issues correctly, and even locate where a colleague sits. And that is just the beginning.

        • IBM Champions unlock the power of IBM

          After reviewing nearly 1,400 nominations, IBM is proud and happy to announce the 2020 class of IBM Champions.

          The IBM Champion program recognizes innovative thought leaders in the technical community and rewards these contributors by amplifying their voice and increasing their sphere of influence. The program catalyzes their ongoing contributions by providing education, engagement, and opportunities.

          An IBM Champion is a business partner or customer of IBM — an IT professional, business leader, developer, executive, or educator who influences and mentors others to help them innovate with and make the best decisions around IBM software, solutions, and services.

    • Audiocasts/Shows

      • Success Through Vulnerability | LINUX Unplugged 338

        How did we get from shareware to free software? We jump in the Linux powered time machine and revisit software past.

        Plus a new Plasma focused laptop, and two powerful command-line picks.

      • 2020-01-28 | Linux Headlines

        A partnership to keep open-source secure, Flathub gets social, Kali Linux has a new release and Ubuntu’s first in a series of switch guides.

      • Python Bytes: #166 Misunderstanding software clocks and time

        We all know about bits. Quantum computers use a more sophisticated data representation known as a qubit or quantum bit. Each qubit can exist in state 1 or 0, but also in superpositions of 1 and 0, meaning that the qubit simultaneously occupies both states. Such states can be specified by a two-dimensional vector that contains a pair of complex numbers, making for an infinite number of states. Each of the complex numbers is a probability amplitude, basically the odds that the qubit is a 0 or a 1, respectively.

      • Brunch with Brent: Peter Adams Part 1 | Jupiter Extras 50

        Brent sits down with Peter Adams, professional photographer and former founder and CTO of several internet-technology startups in New York and Silicon Valley. We explore his photography project “Faces of Open Source”, his history in the dot-com bubble era, how he came to love open source, and more.

      • 2020-01-27 | Linux Headlines

        Linux 5.5 arrives with support for the Raspberry Pi 4 among many other improvements, Solus and SQLite both see minor version bumps that pack a punch, and The Qt Company has a major update that is not sitting well with its community.

      • LHS Episode #322: YOTA Deep Dive

        Welcome to the 322nd installment of Linux in the Ham Shack. In this episode, the hosts and special guest Neil Rapp, WB9VPG, of Ham Talk Live discuss the very future of amateur radio in the form of YOTA (Youth on the Air). A program started in IARU Region 1 as Youngsters on the Air, Neil and a committee of other amateurs and volunteers in the Americas is trying to foster the idea around the rest of the globe. Learn about these projects which aim to let youth teach youth about the direction of amateur radio and breed interest that will last many lifetimes.

    • Kernel Space

      • Linux 5.5 officially released with a couple of hardware improvements

        A couple of days ago, Linus Torvalds announced that the Linux 5.5 stable version is coming soon. Now, there are reports that the stable version of Linux 5.5 is available. Torvalds pointed out in the release announcement that despite the increase in patches this week and concerns about the possible extension of the Linux 5.5 cycle due to downtime around Christmas and New Year holidays, it chose to release the 5.5 kernel on time.

      • Linux 5.5 “Kleptomaniac Octopus” Officially Launched

        Codenamed Kleptomaniac Octopus, the new Linux release comes with a series of major improvements, including full Raspberry Pi 4 and Chromebook Wake-On-Voice support.

        “Despite the slight worry that the holidays might have affected the schedule, 5.5 ended up with the regular rc cadence and is out now,” Linus Torvalds announced.

      • “Welcome, Kleptomaniac Octopus” – Linux 5.5 Lands, with Improved Hardware Support

        Linux Torvalds has released the first stable Linux kernel update of 2020, Linux 5.5 – and it’s on schedule despite the worries that downtime over the holidays would have an impact on its release.

        The Linux 5.5 kernel update (dubbed “Kleptomaniac Octopus”) brings a host of performance tweaks as well as support for devices like the Raspberry Pi 4 and Broadcom chip BCM2711.

        Depending on your use of Linux the increasing support for Intel processor extensions for its x86-64 line could be of note, as the update includes Intel 5-level paging support as default. This has been done in preparation for the release of Intel servers that will have a significant amount of RAM.

      • AMD Prepares Fix To Address Clicking Issue With Audio Playback On Raven APUs

        Unfortunately it wasn’t a trouble-free experience at launch but with time Raven Ridge APUs have been getting cleaned up on Linux for a pleasant experience, thanks in part to the Google Chromebook play that has also seen these newer AMD APUs seeing HDCP content protection support and PSP / TEE trusted execution functionality.

        The latest overdue improvement on the AMD Raven APU front is a fix for a pesky issue during audio playback. If playing audio streams immediately one after another, clicking noises can be heard. That is in the process of being resolved thanks to a new kernel patch.

      • AMD ZEN 3 CPU Added To Official Linux Kernel With ‘Family 19H’ Indicating Launch Of Next-Gen Processors With Higher IPC Gains?

        AMD’s ZEN 3 Architecture, the next-gen evolution of the company’s powerful CPUs, is now officially a part of the Linux Family. Spotted inside the Linux Kernel are direct references to the AMD’s Zen 3 CPU microcode. Given the recent developments about the as-yet-unannounced AMD Architecture that succeeds ZEN 2, it is quite likely the company could release the new CPUs based on ZEN 3 in the coming months. And, if the leaked benchmarks and test scores are to be believed, AMD has truly pushed its processors and managed to achieve a substantial leap in processor power with lesser power draw.

        After giving a tough competition to Intel last year, AMD appears to be readying a new lineup of CPUs that are based on the company’s latest Architecture, the ZEN 3. Based on the 7nm Fabrication Node, the Zen 3 is the 3rd iteration of the ZEN microarchitecture, which is built using the EUV (Extreme Ultraviolet) lithography process.

      • AMD Zen 3 CPU Support Added To Linux Kernel As We Get Closer To Official Announcement

        It looks like we are getting more closer to the launch of AMD’s Zen 3 CPUs as microcode for the upcoming lineup has been added to the Linux Kernel, as spotted by Komachi. The AMD Zen 3 line of processors are aimed to hit in the coming quarters and it looks like they are going to be a bigger upgrade than we have anticipated as many leaks and official representatives have stated.


        However, this means that in the upcoming months, AMD is definitely bringing us more news as also stated by AMD’s CEO, Dr. Lisa Su, in the ‘The Bring Up’ interview where she states that Zen 3 architecture is doing really well, they are excited about it and that she looks forward to talking more about it later in 2020.

    • Applications

      • MPV 0.32 Released with RAR5 Support & Initial Bash Completion

        MPV media player released version 0.32.0 today with some new features and various bug-fixes.

        MPV 0.32.0 features RAR5 support and initial implementation of bash completion.

      • MPV Player 0.32 Released With RAR5 Support, Bash Completion

        MPV 0.32 is out today as the newest update to this open-source video player based on MPlayer.

        MPV 0.32 adds support for RAR5 compressed content within its libarchive stream implementation. This latest version of RAR supports multi-threaded compression, other compression and decompression speed improvements, and other design improvements.

      • 7 Best Remote Desktop Sharing Applications for Ubuntu

        If you’re a developer or a system administrator and have to travel more then you might be having trouble keeping up with your work. Program or web development and system administration is kind of work which involves continuous attention and it gets even more difficult when you are travelling or have to work from different places.

        Well, for such persons there are some tools called desktop sharing apps which can help to keep up with the work on their computer no matter at which location you are, you can keep track from other computer or smartphone. Many computer manufacturing giants and software developing businesses use these types of tools to troubleshoot problems at customers end.

      • Best Open Source Secure Email Gateway Packages

        Secure Email Gateways or Email security gateways are gateways designed to filter mail traffic. Some mail providers and other types of organizations implement this solution to fight attacks like phishing, email-borne attacks, viruses, malwares and more attacks which can be filtered by an email gateway, but it also can prevent information leak by infidel members of the organization, etc. It is a controller of mail content which rules according to the specified rules and policies.
        Email Secure Gateways are available as a cloud service, as virtual appliance, locally at the mail server and there are both software and hardware solutions but this article focuses on 5 Email Security Gateways: MailScanner, MailCleaner, Proxmox, Hermes Secure Email Gateway and OrangeAssasin, all them include free versions while some offer additional paid versions with extra features.

    • Instructionals/Technical

    • Games

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Kubuntu Focus Linux Laptop Now Has a Cheaper Version

          The officially recognized Kubuntu Focus Linux laptop now has a cheaper version, which makes the powerful machine more affordable to those who want to buy a Linux computer.

          Announced earlier this month, the Kubuntu Focus laptop now has new configuration options starting a US $1,795 for the base model, which comes with an Nvidia GeForce RTX 2060 6GB GPU, 16GB RAM, 250GB Samsung EVO Plus NVMe storage, one 180W power supply, and one year limited warranty. Previously, the cheapest version cost US $2,285.

        • The Qt Company is stopping Qt LTS releases. We (KDE) are going to be fine

          Obvious disclaimer, this is my opinion, not KDE’s, not my employer’s, not my parents’, only mine ;)

          Big news today is that Qt Long-term-supported (LTS) releases and the offline installer will become available to commercial licensees only.

          Ignoring upcoming switch to Qt6 scenario for now, how bad is that for us?

          Let’s look at some numbers from our friends at repology.

          At this point we have 2 Qt LTS going on, Qt 5.9 (5.9.9 since December) and Qt 5.12 (5.12.6 since November).

          How many distros ship Qt 5.9.9? 0. (there’s macports and slackbuilds but none of those seem to provide Plasma packages, so I’m ignoring them)

          How many distros ship Qt 5.12.6? 5, Adélie Linux, Fedora 30, Mageia 7, OpenSuse Leap 15.2, PCLinux OS (ALT Linux and GNU Guix also do but they don’t seem to ship Plasma). Those are some bigger names (I’d say specially Fedora and OpenSuse).

        • Qt offering changes 2020

          Much is happening around Qt these days: We have just opened the Qt Marketplace, released a new MCU offering as well as Qt 5.14, and the Design Studio is developing rapidly.


          Since the Qt Account was introduced, the amount of registered Qt accounts has been growing steadily up to almost one million, today.

          From February onward, everyone, including open-source Qt users, will require valid Qt accounts to download Qt binary packages. We changed this because we think that a Qt account lets you make the best use of our services and contribute to Qt as an open-source user.

          We want open-source users to help improve Qt in one form or another, be that through bug reports, forums, code reviews, or similar. These are currently only accessible from a Qt account, which is why having one will become mandatory.

        • Qt offering changes 2020

          The Qt blog has announced some changes in how the Qt toolkit is offered to consumers. Notably, installation of Qt binaries will require a Qt Account and long-term-supported (LTS) releases and the offline installer will become available to commercial licensees only.

        • About “Qt offering changes 2020”

          When I read “Qt offering changes 2020” yesterday, my first reaction was to write a pissy blog post. I’m still writing a blog post with my thoughts about the changes, but I’ll be nice. There are three parts to this post: a short recap of my history with Qt and then my thoughts on what this means for KDE, for Krita and for free software.

          I started programming using Qt and PyQt when I read about Qt in Linux Journal, which I was subscribing to back in 1996. That means that I’ve been using Qt for about 25 years. I initially wanted to write an application for handling linguistic field data, and I evaluated GTK+, wxWidgets, Qt, Tk, fltk, V and a few others that have been forgotten in the mists of time. I choose Qt because it had great documentation, a consistent API, the most logical (to me…) way of doing things like setting up a window with a menu or handling scrollbars and finally because it made C++ as easy as Java.

        • Interview with Spihon

          That’s an easy one, Which ties in with digital… money. About 2018 I was busy looking for a free art program that I could animate with, since I’m struggling with trying to find a job, so I thought I could do try my hand at making videos for YouTube. And speaking of YouTube, that’s where I found it, from this guy’s video on how to animate, and I was sold so I downloaded it and I’m not going back on it.

          Actually, the anniversary of when I found it is next month, February 18th, so I’ll have been using it for two years.

          Truthfully a bit intimidating at first, until I got the hang of it and it became my go to art program for everything I do, from simple paintings to comics. Heck, David Revoy even got me inspired to do it… Sure, I could have added him to the “who inspires me” section but come on! He needs a special place as my Krita Rockstar…

          Anyhoo, I draw more these days than I play video games.

    • Distributions

      • KnightOS was an interesting operating system

        Still, it was a really interesting operating system which was working under some challenging constraints, and overcame them to offer a rather nice Unix-like environment, with a filesystem, preemptive multiprocessing and multithreading, assembly and C programming environments, and more. The entire system was written in handwritten z80 assembly, almost 50,000 lines of it, on a compiler toolchain we built from scratch.

      • Like its Windows-noob-stabilisers OS, Zorin’s cloudy Grid tool is Linux desktop management for idiots

        Zorin, which provides a Linux distro designed to look familiar for migrating Windows and Mac users, has announced a subscription-based management tool for Linux desktops.

        Six desktop layouts in Zorin include Windows, macOS, Touch, Ubuntu, and Gnome 3, though the full range is only available in the paid-for Ultimate edition (€39 + VAT). But the free Core edition is fully usable, includes the Windows-like desktop, and most of the software in Ultimate can be added manually. The main reason to purchase Ultimate is for installation support and to help finance the Ireland-based project.

        Zorin OS is based on Ubuntu and currently at version 15.1, released in mid-December 2019. There are several variants, including one using the lightweight Xfce desktop for best performance on older hardware. We took a look at version 15 in June last year. New stuff in 15.1 includes version 5.0 of the Linux kernel, the ability to use an Android phone as a remote for presentations, new desktop customisation options, and the inclusion of the Sans Forgetica font, which is deliberately hard to read on the grounds, it is claimed, that you remember things better if the brain puts in more effort.

      • Red Hat vs. SUSE vs. Canonical Contributions To The Mainline Linux Kernel Over The 2010s

        After last week looking at the AMD/Intel/NVIDIA contributions to the mainline Linux kernel over the past number of years, there were reader requests for seeing how some of the top distributions compare namely Red Hat, SUSE, and Canonical.

        These graphs today are looking at the contributions by SUSE, Red Hat, and Canonical to the mainline Linux kernel. Keep in mind this is the Git commits made from using the respective corporate domains for each organization.

      • 25/01/2020: This week in KISS (#8)

        Another new addition to the website is the packages page. This is a full listing of each package in the repositories with version and maintainer information.

        The page is updated automatically with changes to the repositories. The raw repository data is also available as a simple tsv file.

      • Reviews

        • FerenOS (2020) | Review from an openSUSE User

          FerenOS undoubtedly focuses on visual aesthetics, user interface and user experience. The last time I looked at FerenOS, it was built on the Cinnamon Desktop Environment. At the time, the Plasma version was called “Feren Next” and and initially I was disappointed I didn’t use the Plasma version, but now I am very glad I did as I can compare this experience with my last FerenOS experience.

          This is my review as an openSUSE User. To say this will be completely objective would essentially be a big giant lie. This will be quite biased as I enjoy openSUSE Tumbleweed with the Plasma desktop, day in and day out on multiple machines, including my daily driver, low end laptops and more powerful workstations and servers. I am happily entrenched but that doesn’t mean I don’t like to look over the fences from time to time to see what other parts of the community are doing. Plus, you can’t go anywhere without bumping in to “FerenOS Dev” on some YouTube chat, Telegram or Discord announcing his enhancements.

          Bottom Line Up Front: FerenOS (2020) is simply fantastic. The way you are greeted and guided through your setup is brilliant. I am not keen on every design decision but that matters not as I am never keen on every design decision presented in any other distribution, to include my own. FerenOS is going for a look that is uniquely its own and is not afraid to experiment, cross toolkit boundaries and stray from the normal. I appreciate the design decisions, more than any other “boutique” distribution I have seen in a long while. Do I like all of them? No. Would I choose many of these? Also, No. But I think they do look great make for an enjoyable experience, just not one I would prefer.

      • New Releases

        • ExTiX 20.2 Linux Distro Released: Now Rebased On Ubuntu 20.04

          The Ultimate Linux System — ExTiX — releases its new version v20.2 with a major shift to the upcoming Ubuntu 20.04. Arne Exton, the ExTiX developer, names the current release as ExTiX 20.2 KDE Plasma Live DVD.

          ExTiX 20.2 replaces the previous Desktop Environment GNOME and Codebase Deepin 15.11 with KDE Plasma 4.19 and Ubuntu 20.04 LTS.

        • Kali Linux 2020.1 Release

          We are here to kick off our first release of the decade, with Kali Linux 2020.1! Available for immediate download.

          Throughout the history of Kali (and its predecessors BackTrack, WHAX, and Whoppix), the default credentials have been root/toor. This is no more. We are no longer using the superuser account, root, as default in Kali 2020.1. The default user account is now a standard, unprivileged, user.

          For more of the reasons behind this switch, please see our previous blog post. As you can imagine, this is a very large change, with years of history behind it. As a result, if you notice any issues with this, please do let us know on the bug tracker.

        • Kali Linux Ethical Hacking OS Gets First 2020 Release

          Offensive Security kicks of 2020 with the first release of their Kali Linux ethical hacking and penetration testing GNU/Linux distribution, Kali Linux 2020.1.

          The Kali Linux 2020.1 release is now available for download and it looks like it packs quite some goodies for fans of the Debian-based operating system, including non-root by default. This means that Kali Linux 2020.1 is the first release to use a standard, unprivileged user account (kali/kali) by default instead of the superuser account (root/toor), except for the ARM images.

          The second biggest change in Kali Linux 2020.1 is the availability of a single installer image for all supported desktop environments. Therefore, there won’t be separate images of Kali Linux for each desktop environment, which means that, when they want to install Kali Linux, users will have to download a single image and choose their preferred desktop environment.

      • Screenshots/Screencasts

      • PCLinuxOS/Mageia/Mandriva/OpenMandriva Family

        • OpenMandriva Lx 4.1 RC is out

          OpenMandriva Lx 4.1 is just around the corner. The team is publishing today the last milestone for current release cycle.

          OMLx 4.1 RC release is mostly bug fixing and update packages.

      • Fedora Family

        • Richard Hughes: Hunting UEFI Implants

          Last week I spent 3 days training on how to detect UEFI firmware implants. The training was run by Alex Matrosov via Hardwear.io and was a comprehensive deep-dive into UEFI firmware internals so that we could hunt for known and unknown implants. I’d 100% recommend this kind of training, it was excelent. Although I understood the general concepts of the protection mechanisms like SMM, HP Sure Start and Intel BIOSGuard before doing the training, it was really good to understand how the technologies really worked, with real world examples of where hardware vendors were getting the implementation wrong – giving the bad guys full control of your hardware. The training was superb, and Alex used lots of hands-on lab sessions to avoid PowerPoint overload. My fellow students were a mixture of security professionals and employees from various government departments from all over the world. We talked, a lot.

          My personal conclusion quite simply is that we’re failing as an industry. In the pursuit to reduce S3 resume time from 2s to 0.5s we introduce issues like the S3 bootscript vulnerability. With the goal to boot as quickly as possible, we only check the bare minimum certificate chain allowing additional malicious DXEs to be added to an image. OEMs are choosing inexpensive EC hardware from sketchy vendors that are acting as root of trust and also emulating hardware designed 30 years ago, whilst sharing the system SPI chip. By trying to re-use existing power management primitives like SMM as a security boundary the leaky abstractions fail us. Each layer in the security stack is assuming that the lower below it is implemented correctly, and so all it takes is one driver with SMM or CSME access to not check a memory address in a struct correctly and everything on top (e.g. BootGuard, ALSR, SELinux, etc) is broken. Coreboot isn’t the panacea here either as to get that to run you need to turn off various protections like BootGuard, and some techniques like Sure Start mean that Coreboot just isn’t a viable option. The industry seems invested into EDK2, for better or worse. This shouldn’t just be important to the few people just buying stuff from Purism – 10,000x laptops are being sold on Amazon for every laptop sold by vendors that care about this stuff.

          Most of the easy-to-exploit issues are just bugs with IBV or ODM-provided code, some of which can be fixed with a firmware update. Worst still, if you allow your “assumed secure” laptop out of sight then all bets are off with security. About a quarter of people at the UEFI training had their “travel laptop” tampered with at some point – with screws missing after “customs inspections” or with tamper seals broken after leaving a laptop in a hotel room. You really don’t need to remove the screws to image a hard drive these days. But, lets back away from the state-sponsored attacker back to reality for a minute.

          The brutal truth is that security costs money. Vendors have to choose between saving 10 cents on a bill-of-materials by sharing a SPI chip (so ~$10K over a single batch), or correctly implementing BIOSGuard. What I think the LVFS now needs to do is provide some easy-to-understand market information to people buying hardware. We already know a huge amount of information about the device from signed reports and from analyzing the firmware binaries. What we’re not doing very well is explaining it to the user in a way they can actually understand. I didn’t understand the nuances between BIOSGuard and BootGuard until a few days ago, and I’ve been doing this stuff for years.

        • Build your own cloud with Fedora 31 and Nextcloud Server

          Nextcloud is a software suite for storing and syncing your data across multiple devices. You can learn more about Nextcloud Server’s features from https://github.com/nextcloud/server.

          This article demonstrates how to build a personal cloud using Fedora and Nextcloud in a few simple steps. For this tutorial you will need a dedicated computer or a virtual machine running Fedora 31 server edition and an internet connection.

      • Canonical/Ubuntu Family

        • How Well Does the HP Dragonfly Elite Run Ubuntu? Very

          If you’re in the market for a powerful new Linux laptop then the 2-in-1 HP Dragonfly Elite (first-gen) might not be your first thought.

          This 13.3-inch notebook isn’t sold with Linux, and instead coms preloaded with Windows 10.

          But Jim Salter at Ars Technica decide to try out the latest Ubuntu 19.10 release on the Dragonfly Elite to see if a non-Windows experience was up to scratch.

          And the result?

          Pretty dang encouraging!

        • Ubuntu Is Now Patched Against Latest Intel Processor Graphics Vulnerabilities

          Canonical has released today new Linux kernel patches to address the latest security vulnerabilities affecting Intel Graphics Processing Units (GPUs) in all of its supported Ubuntu releases.

          Two weeks ago, on January 14th, Intel revealed two new vulnerabilities affecting systems with Intel Graphics Processing Units (GPUs), known as CVE-2020-7053 and CVE-2019-14615. These vulnerabilities were present in the Intel graphics driver (i915) for GNU/Linux systems, and thus having an impact on almost all Linux-based operating systems.

          CVE-2019-14615 did not let the Linux kernel to properly clear data structures on context switches for some Intel GPUs, which could allow a local attacker to expose sensitive information. On the other hand, CVE-2020-7053 is a race condition that could lead to a use-after-free, destroying GEM contexts in the i915 graphics driver. This could allow a local attacker to crash the system or execute arbitrary code.

        • Have an Intel processor? Enjoy two more vulnerabilities

          Intel are not having a good time lately are they? More vulnerabilities in their CPUs have been made public.

          How many is that Intel have had recently that affect them? Quite a lot. This time, it appears AMD are not affected at least. Still, this is a lot of major security problems to go through with Spectre and Meltdown, Foreshadow and ZombieLoad. Currently, Intel are saying that they’re “not aware of any use of these issues outside of a controlled lab environment” so you don’t need to go and panic just yet. Just keep an eye on updates for your distribution and motherboard BIOS updates.

        • Canonical Releases Ubuntu 16.04 LTS Kernel Security Update to Address 9 Flaws

          Canonical has released today a new Linux kernel security update for the Ubuntu 16.04 LTS (Xenial Xerus) operating system to address several vulnerabilities.

          In addition to mitigating the CVE-2019-14615 vulnerability affecting certain Intel graphics processors, the new Linux kernel security update addresses a race condition (CVE-2019-18683) in the Virtual Video Test Driver (VIVID), which could allow an attacker with access to /dev/video0 to gain administrative privileges.

          Also patched are multiple memory leaks (CVE-2019-19057) in the Marvell WiFi-Ex driver and a NULL pointer dereference (CVE-2019-18885) in the Btrfs file system.

        • Ubuntu 20.04 LTS “Focal Fossa” Artwork for Your Phone by Sylvia Ritter, Made with Krita

          Talented concept artist Sylvia Ritter unveiled today new artwork inspired by Canonical’s upcoming Ubuntu 20.04 LTS “Focal Fossa” operating system, due for release in April 2020.

          Sylvia Ritter is known for her astonishing artwork made for each of the 30 releases of the Ubuntu operating system, and now the artist has published new artwork for the upcoming Ubuntu 20.04 LTS release, dubbed Focal Fossa, which you can download from DeviantArt.

          It’s only a single image, which is perfect for use as a wallpaper on your mobile phone, and you don’t even have to be an Ubuntu fan because the ‘Focal Fossa” inspired artwork is nothing but marvelous. I love it!

        • Ubuntu Weekly Newsletter Issue 615

          Welcome to the Ubuntu Weekly Newsletter, Issue 615 for the week of January 19 – 25, 2020. The full version of this issue is available here.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • The Importance Of Growing Developer Action On Open Source Enterprise Blockchain Solutions

        Since major enterprises started taking blockchain seriously and looking at the technology’s potential in their chosen arena, so have a number of popular enterprise-grade blockchain solutions have come to the fore.

        Some of these solutions are sold to companies as an all in one solution, slightly deviating from some of the core decentralized and open-sourced pillars of the technology, but the more popular ones are open-sourced and constantly being developed. The likes of Hyperledger Fabric, as well as Sawtooth and Besu, R3 Corda, and Quorum are all open source solutions that have been tracked for developer activity by Blockchain service firm Chainstack.

      • An Open Source Alternative to AWS SageMaker

        There’s no shortage of resources and tools for developing machine learning algorithms. But when it comes to putting those algorithms into production for inference, outside of AWS’s popular SageMaker, there’s not a lot to choose from. Now a startup called Cortex Labs is looking to seize the opportunity with an open source tool designed to take the mystery and hassle out of productionalizing machine learning models.

        Infrastructure is almost an afterthought in data science today, according to Cortex Labs co-founder and CEO Omer Spillinger. A ton of energy is going into choosing how to attack problems with data – why, use machine learning of course! But when it comes to actually deploying those machine learning models into the real world, it’s relatively quiet.

      • Ambitions for a Unix Shell

        As discussed in the January blog roadmap, I want to concretely describe a reduced Oil language, and see if we can get it “done” in 2020.

        So, to give context to upcoming posts about the language, let’s review the project’s goals from different perspectives: [...]

      • Inside Open-Source Networking

        In this edition of the Embedded Insiders podcast, Brandon and Rich continue their journey into the world of open source, this time by focusing on Z-Wave that was recently donated to the community by Silicon Labs (who acquired the networking technology from Sigma Designs).

        Later, the Embedded Insiders are joined by Laurens Slats from The Things Industries, who continues the discussion of open source networking technologies by outlining the state of LoRa and LoRaWAN. Their upcoming Things Conference in Amsterdam takes place January 30-31st.

      • Rockstar dev debate reopens: Hero programmers do exist, do all the work, do chat a lot – and do need love and attention from project leaders

        The idea that some software developers matter more to coding projects than others is controversial, particularly among open source projects where community cohesion and participation can suffer if contributors are not treated fairly.

        Scott Hanselman, partner program manager at Microsoft, argued against the notion of rockstar programmers back in 2013, as have many others. But not everyone agrees and it’s a difficult debate to settle because there’s no consensus about what to measure, much less about the methods used to make the measurements.

        What’s more, projects may have different needs at different times – a dominant contributor may help bring projects to life but then become a liability when the project is mature.

        The latest entry into this long-running argument comes from a research paper, “Why Software Projects need Heroes (Lessons Learned from 1000+ Projects),” published last year [PDF] and just revised [PDF] with 16 additional pages.

      • Tierion introduces set of open-source tools to create ‘trustless’ Lightning apps
      • Nextcloud evolves into Nextcloud Hub to better meet your company’s needs

        The Nextcloud developers have unleashed one of their most significant upgrades to their on-premises cloud hosting platform: Nextcloud Hub. I was invited to test the pre-release version and never before have I been so impressed with a piece of open source software. Nextcloud has evolved from a tool that can be installed and expanded with a number of applications, to an out-of-the-box, one-stop shop collaboration suite.

        Once installed, Nextcloud Hub includes built-in video chat, OnlyOffice integration, and so much more–out of the box. Admins will no longer have to install or connect to a separate OnlyOffice server. That’s big news for anyone who’s taken the time to add business-grade collaboration to the Nextcloud platform. Open source now has a seriously robust and user-friendly web-based office groupware suite.

        This evolution of the hottest on-premises cloud server software will come about with the next release (version 18 is available now) and will bring with it a full-blown, fully-featured cloud-based set of collaboration tools unlike anything you’ve witnessed in an open source stack.

      • LSD welcomes Knowledge Focus to Planet Open Source

        The strategic integration is the result of a shared vision to unify and further strengthen competencies across key open source solution spaces.

        With this merger, LSD hopes to explore new opportunities with their combined superpowers and will continue to deliver market-leading open-source solutions.

      • Events

        • SUSI.AI release 20200120: Desktop and Smart Speaker

          More than a month has passed, but the winter holidays allowed me to update, fix, and stream line a lot of corners in SUSI.AI. And above all, work on a desktop version that can easily be installed. Thus, the FOSSASIA Team finally can release a SUSI.AI 2020-01-20 of SUSI.AI, the privacy aware personal assistant.

        • FOSDEM by train

          I’ve always loved train journeys, but with flygskam changing people’s travel preferences across Europe (and possibly worldwide, though probably not that much), I decided to take train to FOSDEM this time.


          As some of my readers may know, my backpack was stolen from me after FOSDEM two years ago, and with it were gone, among other things, my passport and my residence permit card. With my flight home having been planned two and half hours from the moment when I realised my things are gone, I couldn’t get a replacement travel document quickly enough from the embassy, so I had to stay at my friends in Vilvoorde (thanks a lot again, Jurgen!) and travel with the cheapest ground transportation I could find. In my case, it was a night RegioJet coach to Prague with a connection to (again) RegioJet train to Bratislava. (I couldn’t fly even though I already had my temporary travel document since I might need to somehow prove that I’m allowed to be in the Schengen zone, which is difficult to do without a valid residence permit.) Sleeping on a bus isn’t the best way to travel for long distances, and I was knackered when I finally dropped on my sofa in Bratislava next morning. However, what I learnt was that it was possible, and were it a bit more comfortable, I wouldn’t mind something like this again.

      • Web Browsers

        • Mozilla

          • Mozilla Thunderbird: Thunderbird’s New Home

            As of today, the Thunderbird project will be operating from a new wholly owned subsidiary of the Mozilla Foundation, MZLA Technologies Corporation. This move has been in the works for a while as Thunderbird has grown in donations, staff, and aspirations. This will not impact Thunderbird’s day-to-day activities or mission: Thunderbird will still remain free and open source, with the same release schedule and people driving the project.

            There was a time when Thunderbird’s future was uncertain, and it was unclear what was going to happen to the project after it was decided Mozilla Corporation would no longer support it. But in recent years donations from Thunderbird users have allowed the project to grow and flourish organically within the Mozilla Foundation. Now, to ensure future operational success, following months of planning, we are forging a new path forward. Moving to MZLA Technologies Corporation will not only allow the Thunderbird project more flexibility and agility, but will also allow us to explore offering our users products and services that were not possible under the Mozilla Foundation. The move will allow the project to collect revenue through partnerships and non-charitable donations, which in turn can be used to cover the costs of new products and services.

          • react-content-marker Released – Marking Content with React

            Last year, in a React side-project, I had to replace some content in a string with HTML markup. That is not a trivial thing to do with React, as you can’t just put HTML as string in your content, unless you want to use dangerouslySetInnerHtml — which I don’t. So, I hacked a little code to smartly split my string into an array of sub-strings and DOM elements.

            More recently, while working on Translate.Next — the rewrite of Pontoon’s translate page to React — I stumbled upon the same problem. After looking around the Web for a tool that would solve it, and coming up short handed, I decided to write my own and make it a library.


            The first thing to note is that you can pass any number of parsers to the createMarker function, and they will all be called in turn. The order of the parsers is very important though, because content that has already been marked will not be parsed again. Let’s look at another example.

            Say you have a rule that matches content between brackets: /({.*})/, and a rule that matches content between brackets that contain only capital letters: /({[A-W]+})/. Now let’s say you are marking this content: I have {CATCOUNT} cats. Whichever rule you passed first will match the content between brackets, and the second rule will not apply. You thus need to make sure that your rules are ordered so that the most important ones come first. Generally, that means you want to have the more specific rules first.

          • TenFourFox FPR19b1 available

            TenFourFox Feature Parity Release 19 beta 1 is now available (downloads, hashes, release notes). I was originally going to do more iteration on Reader mode in FPR19, but in a possible recurrence of the issue that broke SourceForge downloads temporarily, a user reported on Tenderapp they had a site that was failing in the same way.
            On the test system I was able to reproduce the problem and it was due to the selected cipher having insufficient cryptographic strength to pass HTTP/2 TLS profile validation. The selected cipher was one I added as a stopgap for FPR7 to fix another site which was still working (and did not use HTTP/2, hence it didn’t exhibit the issue). Disabling that cipher restored the new failing site, but caused the site I put the workaround for in FPR7 to fail, so in no situation could I get both sites to be happy with the set available. Although I didn’t really want to do this, the only real solution here was to upgrade NSS, the underlying cryptographic library, to add additional more modern ciphers to replace the older one that now needed to be reverted. With this in place and some other fixes, now both sites work, and this probably fixes others.

          • Chromecast Extension For Firefox fx_cast 0.0.5 Adds Support For YouTube, Subtitles For Local Media

            fx_cast, a tool that enables Chromecast support for Firefox web browser, has been updated to version 0.0.5 with some new features and bug fixes. This release includes support for finding and converting local SubRip (.srt) subtitle files for local media casting, an important fix that gets YouTube casting to work correctly, and more.

            fx_cast is made of two parts: a Firefox extension and a companion application that needs to run in the background on the same machine as the extension. This companion bridge application is needed to connect with the receiver devices in order to get around Google’s proprietary protocol.

            It’s important to note that fx_cast is in the pre-beta phase, and is considered “incomplete and likely buggy”. It supports casting web apps like Netflix or BBC iPlayer, HTML5 video and screen/tab sharing.

          • Mapping the power of Mozilla’s Rebel Alliance

            At Mozilla, we often speak of our contributor communities with gratitude, pride and even awe. Our mission and products have been supported by a broad, ever-changing rebel alliance — full of individual volunteers and organizational contributors — since we shipped Firefox 1.0 in 2004. It is this alliance that comes up with new ideas, innovative approaches and alternatives to the ongoing trends towards centralisation and an internet that doesn’t always work in the interests of people.

            But we’ve been unable to speak in specifics. And that’s a problem, because the threats to the internet we love have never been greater. Without knowing the strength of the various groups fighting for a healthier internet, it’s hard to predict or achieve success.

            We know there are thousands around the globe who help build, localize, test, de-bug, deploy, and support our products and services. They help us advocate for better government regulation and ‘document the web’ through the Mozilla Developer Network. They speak about Mozilla’s mission and privacy-preserving products and technologies at conferences around the globe. They help us host events around the globe too, like this year’s 10th anniversary of MozFest, where participants hacked on how to create a multi-lingual, equitable internet and so much more.

            With the publication of the Mozilla and the Rebel Alliance report, we can now speak in specifics. And what we have to say is inspiring. As we rise to the challenges of today’s internet, from the injustices of the surveillance economy to widespread misinformation and the rise of untrustworthy AI, we take heart in how powerful we are as a collective.

      • Education

        • How I teach physics using open source tools

          The nice aspect of being a physicist and a researcher is the openness of our community. There is a lot of collaboration and sharing of ideas (especially during coffee breaks). We also tend to share the software we write. Since we are very picky about algorithms, we want to modify other people’s code to fix the obvious errors that we find. It feels frustrating when I have to use proprietary tools since I cannot understand their inner workings. Having grown up professionally in such an environment, open source has been my go-to solution for all the software I use.

          When I became the regular teacher of the Physics and Biophysics course at the medical school at my university, I decided to use only open source software to prepare my lectures. Here is my experience so far and the solutions I found.

      • BSD

        • iXsystems’ TrueNAS & FreeNAS Hit 11.3

          FreeNAS is a free and open-source NAS software based off of FreeBSD and OpenZFS. It runs on commodity x86-64 hardware, as well as iXsystems gear. FreeNAS supports Window, macOS, and Unix as well as virtualization hosts like XenServer and VMware. TrueNAS is aimed at enterprise storage and supports SMB, AFP, NFS, iSCSI, SSH, rsync and FTP/TFTP sharing protocols over Ethernet and Fibre Channel network fabrics. TrueNAS also supports VMware as well as over protocols such as Microsoft CSV, ODX, and VSS, and Veeam.

          Part of the 11.3 update sees TrueNAS gain several of the features that were already running in FreeNAS, now fully vetted and ready to go to the enterprise. These features include the modernized web UI as well as the ability to use and manage jails, plugins, and VMs. The new features are available in TrueNAS X-Series and M-Series platforms that scale from 10TB to over 10PB with hybrid or all-flash models.

        • The Idealistic Future of HardenedBSD

          In the last status report, we stood up our own git server. Since then, we’ve migrated our entire infrastructure to point to our self-hosted git as the source-of-truth repo.

      • FSF

        • Microsoft Must Open Source Windows 7, Free Software Foundation Says

          The organization claims that by open-sourcing Windows 7, Microsoft can allow the community to “study, modify, and share” code in the operating system. This would also allow the company to “respect the freedom and privacy” of users, FSF continues.

          “We call on them to release it as free software, and give it to the community to study and improve. As there is already a precedent for releasing some core Windows utilities as free software, Microsoft has nothing to lose by liberating a version of their operating system that they themselves say has ‘reached its end,’” the Free Software Foundation adds.

          At the time of writing, the petition has nearly 5,000 supporters.

          Of course, Microsoft hasn’t responded to the petition, but it goes without saying that you shouldn’t expect the company to open-source Windows 7. There are many reasons the company won’t do this, including the fact that Windows 7 shares much of the code with Windows 10, and open-sourcing the 2009 OS would obviously expose its successors.

        • Microsoft urged: Open-source Windows 7 to ‘undo past wrongs’

          But Microsoft is unlikely to cave into the Windows 7 demands that FSF outlined in a petition launched last week, asking Microsoft to “give it to the community to study and improve”.

          FSF argues that Microsoft has “nothing to lose by liberating a version of their operating system that they themselves say has reached its end.

          The petition was aiming to gather at least 7,777 supporters and today has exceeded that by 1,000.


          Also, as The Register points out, there are still portions of Windows 7 code in Windows 10, so it’s probably not in the company’s best interests to release a free version of Windows 7.

          A free Windows has been a consistent demand of Stallman, who retired from FSF last year. He gave a speech at Microsoft Research last year outlining 10 demands, including that Microsoft “publicly take back Microsoft’s attacks on copyleft made in the 2000s” and to release the source code of Windows under the GNU GPL.

        • Petitioners Demand Microsoft Release a Free Windows 7

          The Free Software Foundation wants Microsoft to keep Windows 7 alive as a free operating system. Microsoft stopped providing free security patches and support for Windows 7 earlier this month.

          Although the popular operating system reached its 10th birthday last fall, some 200 million PCs around the globe still run it, according to industry estimates. Users include small business owners, some larger companies, government agencies, and hordes of consumers worldwide.

          Microsoft expects most Windows 7 users to migrate to Windows 10, but it continues to provide patches and support for Windows 7 Pro and Enterprise, which are eligible for extended security update support for three years, for a fee. Windows 7 Home editions and Ultimate editions are not included in the options to purchase extended support.

          The FSF this week launched the “Upcycle Windows 7″ petition. The organization is still collecting signatures, though it has surpassed its goal of getting 7,777 people to sign on to make Windows 7 available for free. The current tally is approaching 10,000.

          Making the OS free would allow users “the freedom to run, copy, distribute, study, change and improve the software,” according to the foundation.

        • Microsoft Asked to Unshackle Windows 7 From Proprietary Tyranny

          The Free Software Foundation (FSF) is asking Microsoft to ‘upcycle’ Windows 7 and allow the community to continue to improve it after its end of life.

          “On January 14th, Windows 7 reached its official ‘end-of-life,’ bringing an end to its updates as well as its ten years of poisoning education, invading privacy, and threatening user security,” says the FSF in a petition published on its website.

          The end of Windows 7′s lifecycle gives Microsoft the perfect opportunity to undo past wrongs, and to upcycle it instead.”

          The non-profit organization, founded by Richard Stallman in 1985 to support and promote the free software movement, wants Redmond to give its EoL OS to the community, to be studied and improved upon.

          In support of this demand, the FSF uses the release of the Microsoft Calculator app as open-source on GitHub under MIT license.

        • LibrePlanet 2020: We’ll see you at the Back Bay Events Center in Boston, MA!

          We at the Free Software Foundation (FSF) are excited to say that the Dorothy Quincy suite of Boston’s very own Back Bay Events Center will be the home of this year’s LibrePlanet conference! We’ve taken the grand tour and couldn’t be happier about our choice of location. We’re confident that the Events Center will be a great host for the technology and social justice conference we’ve all come to know and love. It’s just the right place for us (and the movement) to take our next steps in freeing the future.

          The Events Center is providing LibrePlanet with its own entrance and a dedicated and speedy Internet connection for the livestream, and is close to both public transportation and the FSF headquarters itself. As in past years, we’ll have ample space for an exhibit hall and free software workshops, as well as the ever popular “hallway track,” where you can engage with other attendees in conversations on contributing to free software projects.

          On the Events Center Web site, you will find accommodation and transportation suggestions that will pair nicely with those we’ve put up on the LibrePlanet 2020 site. The Back Bay Events Center is located at the corner of Berkeley and Stuart Street, and is close by the Back Bay stop of the Orange Line MBTA train and the Arlington stop of the Green Line MBTA train.

        • LibrePlanet 2020 needs you: Volunteer today!

          The LibrePlanet 2020 conference is coming very soon, on March 14 and 15 at the Back Bay Events Center in Boston, and WE NEED YOU to make the world’s premier gathering of free software enthusiasts a success.

          Volunteers are needed for several different tasks at LibrePlanet, from an audio/visual crew to point cameras and adjust microphones, to room monitors to introduce speakers, to a set-up and clean-up crew to make our conference appear and disappear at the Event Center, and more! You can volunteer for as much or as little time as you like, whether you choose to help out for an hour or two, or the entirety of both days. Either way, we’ll provide you with a VERY handsome LibrePlanet 2020 shirt in your size, in addition to free admission to the entire conference and lunch and our eternal gratitude.

        • GNU Projects

          • Mark J. Wielaard: A mission statement and social contract for GNU

            2019 was a difficult year for the Free Software Community with lots of questions about the future of GNU. It is hard to come up with good answers unless you know which shared principles you all value. After a very long discussion we finally have a first GNU Social Contract DRAFT and a new public wiki for GNU maintainers to share public discussion documents like this.

          • Pre-release 1.8.90 in alpha.gnu.org

            The pre-release recutils-1.8.90.tar.gz is now available at ftp://alpha.gnu.org/gnu/recutils/recutils-1.8.90.tar.gz
            The NEWS file in the tarball contains a list of the changes since 1.8.
            The planned date for releasing 1.9 is Saturday 1 February 2020.

          • GNU Spotlight with Mike Gerwitz: 16 new GNU releases in January!


      • Openness/Sharing/Collaboration

        • Now available: Open source solar contracts to simplify transacting

          A team of legal advisors and renewable energy experts contributed to an Open Solar Contracts Initiative to accelerate the deployment of solar power worldwide.

          The open source project was initiated by the Terrawatt Initiative (TWI) and the International Renewable Energy Agency (IRENA) in 2016.

        • joão leão develops the first open source electric skateboard made out of recycled plastic

          designer joão leão constantly ran into plastic waste washing ashore on the beaches of porto; he was also constantly running late due to his endless commute on public transportation. so, he created a faster method of personal transportation using recycled thermoplastics as the main manufacturing material — the PET MINI electric skateboard.


          leão took inspiration from the anatomy of an armadillo for the electronics enclosure by designing a series of modular pieces along the bottom of the board. this allows for both the protection of the electronic components, and also maintains the flexibility of the deck — giving it the comfortable ride necessary for the city. other commercial products lose the deck’s flexibility, making it a rough ride through different urban terrains.

        • Open Data

          • How I had a nerdy date night with StreetComplete quests

            StreetComplete is an Android app that makes it fun and easy to contribute to open data by completing quests.

            Quests are used to fill in incomplete or inaccurate information on OpenStreetMap, an open data project dedicated to mapping the world through crowdsourcing. Anyone can contribute to the map and, thanks to free culture and open source licenses, that data can then be used by anyone for anything, from video games to custom map applications and artwork.


            Download the app to your phone from F-Droid or Google Play. It’s licensed under GPLv3.

        • Open Access/Content

          • Academic publishing must better serve science and society

            We propose a new vision for scientific publishing that starts with reversing the relationship between authors and publishers. Under this system, authors would be able to make their research freely accessible to everyone immediately. Journal editors would compete to publish it, but publication would not be the end of the story: researchers could continue to update their papers for years afterwards. Nor would publication be the aim of the game: the incentives, recognition and reward systems would not depend on where a paper is published, but rather on its contents and the extent to which it advances knowledge.

            This is already starting to happen. The number of preprints is increasing daily, and most journals now facilitate the submission of papers to preprint servers via their own submission systems. Others have appointed preprint editors to screen preprints and solicit submissions, adopting scoop protection policies that commit them to disregarding, in their editorial decisions, any competing papers published after submission of the paper or preprint.

      • Programming/Development

        • On The Benefits of Static Trace Points

          Years ago IBM coined the term First Failure Data Capture (FFDC). Capture enough data about a failure, just as it occurs the first time, so that reproducing the failure is all but unnecessary. An observability framework is a set of tools that enable system administrators to monitor and troubleshoot systems running in production, without interfering with efficient operation. In other words, it captures enough data about any failure that occurs so that a failure can be root-caused and possibly even fixed without the need to reproduce the failure in vitro.

          Of course, FFDC is an aspirational goal. There will always be a practical limit to how much data can be collected, managed, and analyzed without impacting normal operation. The key is to identify important exceptional events and place hooks in those areas to record those events as they happen. These exceptional events are hopefully rare enough that the captured data is manageable. And the hooks themselves must introduce little or no overhead to a running system.

          The trace point facility

          The trace point facility, also known as ftrace, has existed in the Linux kernel for over a decade. Each static trace point is an individually-enabled call out that records a set of data as a structured record into a circular buffer. An area expert determines where each trace point is placed, what data is stored in the structured record, and how the stored record should be displayed (i.e., a print format specifier string). The format of the structured record acts as a kernel API. It is much simpler to parse than string output by printk. User space tools can filter trace data based on values contained in the fields (e.g., show me just trace events where “status != 0″).

          Each trace point is always available to use, as it is built into the code. When triggered, a trace point can do more than capture the values of a few variables. It also records a timestamp and whether interrupts are enabled, and which CPU, which PID, and which executable is running. It is also able to enable or disable other trace points, or provide a stack trace. Dtrace and eBPF scripts can attach to a trace point, and hist triggers are also possible.

          Trace point buffers are allocated per CPU to eliminate memory contention and lock waiting when a trace event is triggered. There is a default set of buffers ready from system boot onward. However, trace point events can be directed into separate buffers. This permits several different tracing operations to occur concurrently without interfering with each other. These buffers can be recorded into files, transmitted over the network, or read from a pipe. If a system crash should occur, captured trace records still reside in these buffers and can be examined using crash dump analysis tools.

        • With SiFive, We Can Change the World

          My quest is to build beautiful things that help change the world, and I’ve been fortunate to spend the last 15 years in Silicon Valley, working with some of the major players shaping all sorts of technology. Today, I’m super excited to join SiFive – the company I believe is best positioned to transform the silicon industry, to lead the Platform Engineering team. With experience building and leading large-scale production systems that power our industry, I’m looking forward to making the dream of customized chips a reality with SiFive’s amazing team of engineers.

          The end of Moore’s Law is a profound time, leading to new accelerators, new demand for custom ASICs, and new opportunities – and I believe that it is time for the semiconductor industry to change its approach to innovation. This industry has been defined by proprietary technologies that are difficult to use, don’t interoperate well, and have poor user experience. I believe that open tooling, world class engineering, and a focus on end-to-end user experience can transform the industry. Similarly, the RISC-V architecture pro-vides unique opportunities for SoC customization at every level. This is only possible with SiFive’s ambi-tious design methodology, which is unmatched in the industry.

          My background includes experience creating and leading a number of large-scale technologies, including compiler technologies like the LLVM Compiler Infrastructure project, the Clang C and C++ compiler, the MLIR machine learning infrastructure, and others. I also spearheaded the creation of Swift – a program-ming language that powers Apple’s ecosystem – and led a team at Tesla that applies a wide range of tech in the autonomous driving space. Most recently, I built and managed an array of AI-related compiler, runtime, and programing language teams for Google Brain and TensorFlow.

        • LLVM Founder Chris Lattner Joins SiFive To Lead Platform Engineering

          This move for Chris comes after serving at Apple more than a decade where he led their LLVM-based toolchain efforts as well as developing the Swift programming language, a brief stint at Tesla focusing on their Autopilot software, and then for the past two and a half years has been at Google. At Google is where he was working on TensorFlow and the Machine Learning IR and other compiler-related efforts.

        • Squashing Django Migrations

          The Django migration system is great for modifying your database schema after a database is live. If you’re like me, you quickly end up with many 10s or 100s of migrations.

        • Episode 2 – Writing README files

          Modern day added formatting. Mostly Markdown, sometimes Restructured Text.

        • Three guys on math
        • Excellent Free Tutorials to Learn Scratch

          Scratch is a visual programming language developed by the Lifelong Kindergarten Group at the MIT Media Lab. Scratch teaches programming concepts to kids, offering a stepping stone to more complicated programming languages. Coding includes dragging and dropping various code blocks and linking them together like jigsaw pieces to form logical scripts. While the MIT Media Lab designed this language for 8-16 year-old children, it’s used by people of all ages.

          Scratch has received many plaudits as an ideal way to introduce kids to computer programming and computational thinking. It’s a fantastic beginner’s language. Scratch is often used to make games, interactive stories, and animations, but it can be used for any purpose. The language uses event-driven programming with multiple active objects. The language helps students to think creatively, reason logically, and work together. The language is frequently used in schools, libraries, community centers, and museums.

          Scratch is released under an open source license.

        • ‘Trust no one’ is good enough for the X Files but not for software devs: How do you use third-party libs and stay secure, experts mull on stage

          In a chilly conference room at the San Francisco’s Hyatt Regency on Monday, legal and digital security pros convened at USENIX’s Enigma conference to hold forth on security, privacy, and related matters.

          Following a discussion panel on encrypted messaging, the talk turned to mitigating the risks that come with using third-party code, external vendors, and crowdsourced advice.

          Those risks became more apparent in the security problems spotted in a series of software libraries over the past few years.

          In August last year, a Ruby software package called rest-client was found to be sending credentials to a remote server. In November, 2018, the NPM module event-stream was modified to steal cryptocurrency. There were similar incidents in July last year involving the NPM module electron-native-notify and in September, 2017, when the PyPI, the repository for Python software packages, was found to be hosting malicious software libraries.

        • Technical Debt is Soul-crushing

          The problem starts when companies forget to pay off the debt and let it accumulate and pile up. For good software developers, it is totally demoralizing to work on products that have high tech debt. This aspect isn’t often talked about but it’s effects are very real. Simple things like changing a title tag of a webpage page takes up a whole day because the logic was scattered in five different files. At the end of the day, it’s not a great feeling that it took so much time for a small task. It’s even more upsetting when they have to explain it to their managers, colleagues or the product team why it took so long. Troubleshooting a bug is not just difficult but also painful. Jeff Atwood called it a major disincentive to work on a project: [...]

        • Against unnecessary databases

          In this post, I want to start sharing some of the design principles I discovered for making these scripts robust, generic and flexible. This is part of a series on building your own ‘data mirror’, and there are also more posts to follow!

        • An update on bradfitz: Leaving Google

          After ~12.5 years at Google and ~10 years working on Go (#golang), it’s time for me to do something new. Tomorrow is my last day at Google.

          Working at Google and on Go has been a highlight of my career. Go really made programming fun for me again, and I’ve had fun helping make it. I want to thank Rob Pike for letting me work on Go full time (instead of just as a distraction on painfully long gBus rides) as well as Russ Cox and Ian Lance Taylor and Robert Griesemer and others for all the patience while I learned my way around. I’ve loved hacking on various packages and systems with the team and members of the community, giving a bunch of talks, hanging out in Denver, Sydney, MTV, NYC, at FOSDEM and other meet-ups, etc. While I’ve learned a bunch while working on Go, more excitingly I discovered many things that I didn’t know I didn’t know, and it was a joy watching the whole team and community work their (to me) magic.

        • ‘I am done with open source’: Developer of Rust Actix web framework quits, appoints new maintainer

          The maintainer of the Actix web framework, written in Rust, has quit the project after complaining of a toxic web community – although over 100 Actix users have since signed a letter of support for him.

          Actix Web was developed by Nikolay Kim, who is also a senior software engineer at Microsoft, though the Actix project is not an official Microsoft project. Actix Web is based on Actix, a framework for Rust based on the Actor model, also developed by Kim.

          The web framework is important to the Rust community partly because it addresses a common use case (development web applications) and partly because of its outstanding performance. For some tests, Acitx tops the Techempower benchmarks.

          The project is open source and while it is popular, there has been some unhappiness among users about its use of “unsafe” code. In Rust, there is the concept of safe and unsafe. Safe code is protected from common bugs (and more importantly, security vulnerabilities) arising from issues like variables which point to uninitialized memory, or variables which are used after the memory allocated to them has been freed, or attempting to write data to a variable which exceeds the memory allocated. Code in Rust is safe by default, but the language also supports unsafe code, which can be useful for interoperability or to improve performance.

        • Chinese academic suspended for copying programming language
        • Perl / Raku

          • LANraragi v.0.6.8 – Cool Cat

            LANraragi is a web application for archival and reading of manga/doujinshi. It’s lightweight and Docker-ready for NAS/servers. There is even a standing offer from the author to send out a free sticker pack for the first person to run the linux/s390x docker image on a real IBM System 390.

          • Making YAML.pm, YAML::Syck and YAML::XS safer by default

            Several YAML modules allow loading and dumping objects. When loading untrusted data, this can be a security vulnerability, if this feature is enabled.

          • 2020.04 Almost Springtime

            Damian Conway is back from sabbatical: in the second week of March, they will be giving some very interesting courses in Switzerland: Presentation Skills courses, redesigned language-neutral versions of the “API Design”, “Better Coding Practices” courses and a free half-day seminar on Raku on 12 March!

        • Python

          • Python Community Interview With Kelly and Sean of Teaching Python

            This week I’m joined by Kelly Paredes and Sean Tibor, the hosts of the Teaching Python podcast. Join us as we discuss the benefits of learning Python outside of the code itself, and what it’s like to learn Python when you’re not planning to become a professional developer. So, without further ado, let’s meet Kelly and Sean!

          • Announcing Mu version 1.0.3

            We didn’t intend to cut this release but changes in the way the latest OSX works meant that code highlighting didn’t work correctly. We also managed to apply a fix to an annoying bug relating to where Mu set the current working directory for scripts run in Python3 mode.

            OSX Catalina has posed a number of problems, from the incorrect rendering mentioned above, to the way the application should be installed and problems with permissions when flashing a BBC micro:bit.

            The simple answer to the installation story is, once you’ve installed Mu in your Applications folder, you should first open it with CTRL-click (not a double click) and select the “Open” button in the resulting pop-up. Subsequent runs of Mu can be started in the usual “double click” way. If you don’t do the “CTRL-click” trick you’ll see a pop-up complaining about Mu not being checked for malicious software.

          • Mike Driscoll: PyDev of the Week: Thomas Wouters

            I’m a self-taught programmer, a high school dropout, a core CPython developer, and a former PSF Board Director from Amsterdam, The Netherlands. I’ve been playing with computers for a long time, starting when my parents got a Commodore 64 with a couple books on BASIC, when I was 6 or 7. I learned a lot by just playing around on it. Then in 1994 I discovered the internet, while I was still in high school. This was before the days of the World Wide Web or (most) graphics, but I was sucked in by a programmable MUD, a text-based “adventure” environment, called LambdaMOO. LambdaMOO lets you create your own part of the world by making rooms and objects, and programming their behaviour, in a programming language that was similar to Python (albeit unrelated to it). One thing led to another and I dropped out of high school and got a job at a Dutch ISP (XS4ALL), doing tech support for customers. A year later I moved to the Sysadmin department, where I worked for ten years. I gradually moved from system administration to programming, even before I learned about Python.

            Besides working with computers I also like playing computer games of all kinds, and non-computer games like board games or card games. I do kickboxing, and I have a bunch of lovely cats, about whom I sometimes tweet. I’m pretty active on IRC as well, and I’m a channel owner of #python on Freenode. I also keep ending up in administration-adjacent situations, like the PSF Board of Directors and the Python Steering Council, not so much because I like it but because I don’t mind doing it, I’m apparently not bad at it, and it’s important stuff that needs to be done well.

          • Dividing Deep Into Enhancing Photos With Python

            Python is the most reliable and renowned content management system for websites of any kind to create dynamically attractive web resources for their uses.

            Python has got everything that developers can ask for to provide reliable user experience to end consumers and develop the business online.

            For any website, maintaining the quality of the images becomes challenging because the high-quality image would result in the slow loading speed of the landing pages, which might result in poor user experience.

            There are many tools available online that can compress the images and makes them uploadable on the website. However, the resulted images would often lose all the visual appeal after they are compressed through an online tool.

          • Text Translation with Google Translate API in Python

            Unless you have been hiding under a rock, you have probably used Google Translate on many occasions in your life. Whenever you try to translate a word or a sentence from a certain language to another, it is the Google Translate API which brings you the desired results in the background. Though you can translate anything by simply going to the Google Translate web page, you can also integrate Google Translate API into your web applications or desktop programs. The best thing about the API is that it is extremely easy to set up and use.

            You can actually do a lot of things with the help of the Google Translate API ranging from detecting languages to simple text translation, setting source and destination languages, and translating entire lists of text phrases. In this article, you will see how to work with the Google Translate API in the Python programming language.

          • Python Modules and Packages: An Introduction

            In this course, you’ll learn about Python modules and Python packages, two mechanisms that facilitate modular programming.

            Modular programming is the process of breaking a large, unwieldy programming task into separate, smaller, more manageable subtasks or modules. Individual modules can then be put together like building blocks to create a larger application.

            Learn how to write and import modules so you can optimize the structure of your own programs and make them easier to maintain and grow.

          • PyCoder’s Weekly: Issue #405 (Jan. 28, 2020)
          • Why Should You Use typing In Python?

            I am using typing at my work project and now trying to use it for my personal or freelance projects only if it is not a one-time script. No sense to invest time in the 15-minute thing. And why you should use it too.
            Lots of people like Python because it provides a fast way to build software. But on the other hand, after some time of the team development, it can be hard to understand the code for the team members. Especially, for the new ones.
            I do personally believe that it increases the readability of the code. Seems to me that it is even more about self-documenting the code, not about the type checking. However, yes, it helps to find some obvious bugs.
            My favorite example is a variable called data. Is it a list? Or maybe a dict? Or maybe something custom? Looks like that you need to invest some time in figuring this out. And probably repeat it one more time in a month or two.

          • Text Classification with BERT Tokenizer and TF 2.0 in Python

            This is the 23rd article in my series of articles on Python for NLP. In the previous article of this series, I explained how to perform neural machine translation using seq2seq architecture with Python’s Keras library for deep learning.

            In this article we will study BERT, which stands for Bidirectional Encoder Representations from Transformers and its application to text classification. BERT is a text representation technique like Word Embeddings. If you have no idea of how word embeddings work, take a look at my article on word embeddings.

            Like word embeddings, BERT is also a text representation technique which is a fusion of variety of state-of-the-art deep learning algorithms, such as bidirectional encoder LSTM and Transformers. BERT was developed by researchers at Google in 2018 and has been proven to be state-of-the-art for a variety of natural language processing tasks such text classification, text summarization, text generation, etc. Just recently, Google announced that BERT is being used as a core part of their search algorithm to better understand queries.

            In this article we will not go into the mathematical details of how BERT is implemented, as there are plenty of resources already available online. Rather we will see how to perform text classification using the BERT Tokenizer. In this article you will see how the BERT Tokenizer can be used to create text classification model. In the next article I will explain how the BERT Tokenizer, along with BERT embedding layer, can be used to create even more efficient NLP models.

            Note: All the scripts in this article have been tested using Google Colab environment, with Python runtime set to GPU.

          • PyCharm 2020.1 EAP starts now

            There are two types of people in the world: those who can wait to open a package they’ve received, and people like me, who need to see what’s inside this very second.

            PyCharm isn’t delivered in the mail though, and that’s why we have something even better for impatient people. The early access program (EAP) shows you what’s in the package a couple months before you get it. Take a sneak peek, and get PyCharm’s first EAP now!

          • Webinar Recording: “Advanced Debugging in PyCharm”

            Last week we held a special webinar for “Advanced Debugging in PyCharm”. Special how? In person, in the St. Petersburg office, with the two PyCharm team members in charge of the debugger, and a huge webinar audience. The recording is now available.

  • Leftovers

    • Europe’s easternmost city Photos of life in Vorkuta, one of Russia’s fastest dying cities

      The town of Vorkuta, situated in the permafrost belt about 110 miles from the Arctic Ocean, was founded by the Vorkuta River after large coal deposits were discovered in the area. The first detachment of prisoners was dispatched to the spot in the early 1930s, and they soon constructed a workers’ settlement known as Rudnik. By the start of the Stalinist Terror, the area was already home to one of the biggest and harshest camps in the Soviet Gulag: Vorkutlag (which included the Rechlag camp for political prisoners). In 1943, the many settlements around the coal mines, where the high salaries also attracted workers from across the USSR, were reorganized into the town of Vorkuta, now Europe’s easternmost city.

    • Sunset’s Soon
    • At 51, ultraconservative Russian Orthodox figurehead Vsevolod Chaplin has died. Here’s how his critics will remember him.

      On January 26, Vsevolod Chaplin died in Moscow at age 51. He was among the most publicly visible and controversial members of the Russian Orthodox clergy. Initial reports indicate that Chaplin had a heart attack immediately outside the entrance to the Cathedral of St. Fyodor the Studite, where he had been archpriest since 2016. Between 2009 and 2015, Chaplin essentially served as the spokesperson for the entire Russian Orthodox Church. When he was dismissed from that post, the clergymen threw in his lot with the opposition — specifically, with its most extreme right-wing and left-wing members. Alexey Kovalev asked Biblical Studies scholar Andrey Desnitsky and political analyst Alexey Makarkin, who frequently clashed with Chaplin, to illustrate his often self-contradictory character and the way his views shifted from liberalism to extreme conservatism.

    • Bryant’s Pilot May Have Gotten Lost in the Fog

      Coroner’s officials worked to recover victims’ remains Monday from the hillside outside Los Angeles where a helicopter carrying former NBA superstar Kobe Bryant and eight others crashed in a wreck that aviation experts said may have been caused by the pilot becoming disoriented in the fog.

    • Science

      • Darktable 3:RGB or Lab? Which Modules? Help!

        Pushing pixel values in either direction is one thing. Merging the corrections so they blend seamlessly together on the whole is another. We’ve seen that Lab or non-linear RGB allow the pixels to be pushed more or less correctly, but that it is always when doing mask blending (aka occlusion) and feathering (aka blurs) that we’re paying the price. It turns out there are a lot of blurs under the hood of darktable, sometimes where you don’t expect them. It’s especially problematic when you’re compositing, e.g. inlaying one image within another, to exchange their background without touching the foreground. And it’s precisely this kind of manipulation that led the movie industry to migrate to a scene-referred linear workflow about twenty years ago.

        So darktable is in transition. It’s long, it’s sometimes painful, there are a lot of little bits to change in different places along with grumbling users who are hungry for consistency. At least now you know the why and the how. You also know what you have to win. I hope this helps you move forward.

        For new users, limit yourself to the above recommended modules, and venture further when you begin to be comfortable. For older users, the new modules have a lot to offer to you, but old Lab modules are still relevant for moderate creative effects and when used with knowledge of their dangers.

    • Education

      • Adani and the Purpose of Education

        Recently, Survival International, the organization that campaigns with ‘tribal peoples,’ ran a story about the Indian conglomerate, Adani Group, setting up a Tribal Residential School for children in Bankishole, Baripada, in Mayurbhanj District in Odisha State – a region in Eastern India known for its tribal communities. Adani is best recognized internationally for its mining activities, particularly its recent struggle to get a mine authorized in coal-addicted Australia in the face of massive popular protests.

    • Health/Nutrition

      • Giving Cover to the Abuses of Big Ag

        A recent commentary promoting agriculture by Brenden Weiner of the Gallatin Valley Land Trust was full of misinformation.

      • Trump’s EPA Is a Huge Cancer Risk

        Industry-friendly regulators are letting chemical companies flood the country with toxins. It should be a scandal.

      • Stocks Tumble as Virus Fears Spark Sell-Off

        U.S. stocks fell sharply Monday, sending the Dow Jones Industrial Average down by more than 450 points, as investors grappled with fresh worries about the spread of a new virus in China that threatens global economic growth.

      • ‘Shameful. Disgusting. Disgraceful.’: Outrage After Supreme Court Allows Trump’s Public Charge Rule to Take Effect

        “The Trump administration’s policy could quite literally kill people by making them too afraid to seek life-saving medical care, and the Supreme Court seems to agree such a cruel system is acceptable.”

      • Medicare for All ‘Is What Patients Need’: New Harvard Study Shows Even Those With Private Insurance Can’t Afford Care

        “When so many people can’t get the care they need even when they have insurance coverage, it says that insurance is not doing what it is supposed to do: ensure that healthcare is affordable when you need it.”

      • Gwyneth Paltrow’s Goop Is a Product of Our Crappy Health Care System
      • What Barry Commoner’s Four Principles of Ecology Has to Do With China’s Coronavirus

        “The present system of production is self-destructive; the present course of human civilization is suicidal.”

      • Trump’s EPA Poses Huge Cancer Risks

        Earlier this month, President Trump claimed credit for new figures from the American Cancer Society showing  “the sharpest one-year drop in cancer death rate ever recorded” between 2016 and 2017.

      • Trump Steps Up Attacks on Reproductive Rights Amid Impeachment Trial

        Donald Trump on Friday became the first sitting president in U.S. history to attend the so-called March for Life, the annual anti-abortion rally held in Washington, D.C., that draws thousands of participants. President Trump — who once described himself as “pro-choice in every respect” — accused Democrats of infanticide and falsely stated that Virginia Governor Ralph Northam supports an abortion bill that would “execute a baby after birth.” The March for Life began in 1974 in response to the landmark 1973 Supreme Court ruling in Roe v. Wade, which guaranteed the constitutional right to abortion. Past U.S. presidents who opposed abortion considered the march too extreme and divisive to attend, and instead sent surrogates or recorded video messages. The same day that Trump addressed anti-abortion activists in Washington, his administration threatened to cut off federal funding for some health programs in California unless the state ends its requirement that private health insurers cover abortions. California Governor Gavin Newsom said the state would not change its policy. Trump’s Education Secretary Betsy DeVos also recently compared anti-abortion activism to the fight to end slavery. We speak with Fatima Goss Graves, president and CEO of the National Women’s Law Center.

      • Why cancer-spotting AI needs to be handled with care

        These days, it might seem like algorithms are out-diagnosing doctors at every turn, identifying dangerous lesions and dodgy moles with the unerring consistency only a machine can muster. Just this month, Google generated a wave of headlines with a study showing that its AI systems can spot breast cancer in mammograms more accurately than doctors.

        But for many in health care, what studies like these demonstrate is not just the promise of AI, but also its potential threat. They say that for all of the obvious abilities of algorithms to crunch data, the subtle, judgment-based skills of nurses and doctors are not so easily digitized. And in some areas where tech companies are pushing medical AI, this technology could exacerbate existing problems.

      • Veterans group demands Trump apologize for shrugging off soldiers’ brain injuries as “headaches”

        Veterans of Foreign Wars, a prominent veterans group with more than 1.1 million members, called on the president to apologize for his comments.

        “TBI is a serious injury and one that cannot be taken lightly. TBI is known to cause depression, memory loss, severe headaches, dizziness and fatigue — all injuries that come with both short- and long-term effects,” VFW National Commander William “Doc” Schmitz said in a statement. “The VFW expects an apology from the president to our servicemen and women for his misguided remarks, and we ask that he and the White House join with us in our efforts to educate Americans of the dangers TBI has on these heroes as they protect our great nation in these trying times. Our warriors require our full support more than ever in this challenging environment.”

    • Integrity/Availability

      • Proprietary

        • FilelistCreator is a directory printer for Windows, macOS and Linux

          Many people organize their data into folders to quickly find what they want. The Windows operating system comes with default folders for images, videos, and downloads for example that many users of Windows use.

          Windows does not really provide good easily accessible options to compare the contents of two folders; this is especially the case if root folders contain hundreds of even thousands of files and folders.

        • Ragnarok Ransomware Targets Citrix ADC, Disables Windows Defender

          A new ransomware called Ragnarok has been detected being used in targeted attacks against unpatched Citrix ADC servers vulnerable to the CVE-2019-19781 exploit.

          Last week, FireEye released a report about new attacks exploiting the now patched Citrix ADC vulnerability to install the new Ragnarok Ransomware on vulnerable networks.

          When attackers can compromise a Citrix ADC device, various scripts would be downloaded and executed that scan for Windows computers vulnerable to the EternalBlue vulnerability.

          If detected, the scripts would attempt to exploit the Windows devices, and if successful, inject a DLL that downloads and installs the Ragnarok ransomware onto the exploited device.

        • Apple is attending a meeting in Washington on Monday as a Board Member of the CARIN Alliance on Health Record Sharing

          The CARIN Alliance is meeting with the Office of Management and Budget (OMB) on Monday, January 27, 2020 at 3:00 pm ET in Washington, D.C., and representatives from Apple and Microsoft will be attending via phone. Apple is an official CARIN Alliance Board Member and what transpires on Monday could affect Apple’s work positively regarding their Health Record-Sharing Platform beyond their current work with the U.S. Department of Veterans Affairs.

        • Big tech CEOs are learning the art of the filibuster

          But it’s clear that as prevailing sentiment about big tech companies has darkened, tech CEOs see increasingly little value in having meaningful public conversations. Instead, they grit their teeth through every question, treating every encounter as something in between a legal deposition and a hostage negotiation.

          We saw this in 2018, when the New Yorker profiled Mark Zuckerberg. We saw it again last year, when Jack Dorsey went on a podcast tour. At some point this year Tim Cook will probably give a zero-calorie interview to someone, and if it’s a slow-enough news day I’ll write this column for a fourth time.

        • Pseudo-Open Source

          • Openwashing

            • BT’s ‘open source’ approach will challenge Huawei’s dominance

              BT is seeking to challenge the dominance of Huawei over the industry by throwing its weight behind a new “open source” approach to buying essential network gear, the chief executive of Openreach has claimed.

              Clive Selley, who runs BT’s separate Openreach broadband business, said the company was seeking to push back against the existing industry structure in which a handful of suppliers, including China’s Huawei, Sweden’s Ericsson and Finland’s Nokia, hold too much power over a highly consolidated market.

              “We are trying to challenge them,” he told The Telegraph in an interview last week.

              “Because what you really want is a mix and match approach. We are trying to provoke the industry to move in that direction – more ability to mix and match [suppliers].”

            • Cloudera: Extract Benefit From All Your Data And Work Across Clouds

              We have tracked Cloudera from the very beginning and have watched as it has continually innovated in ways that help both enterprises and the open source community deliver more value. They started off on a mission to make Hadoop safe for the enterprise and then built upon that solid foundation to create full spectrum solutions for data management, security, machine learning and advanced analytics that will work on-prem, in the cloud or across hybrid clouds while maintaining security and business context of the data.

            • Hydro Protocol open-sources its most useful tools for interacting with Ethereum

              The team of Hydro Protocol, an open-source framework for building decentralized exchanges, has now open-sourced three project libraries it found most useful for interacting with the Ethereum blockchain.

              Beyond the three libraries open-sourced today, Hydro Protocol says more will be coming in the months ahead in an effort to give back to the community.

              Listed below are the first three libraries open-sourced. Utilized by the Hydro Protocol team daily, the tools could be useful to a wide spectrum of blockchain developers and enthusiasts.

            • H2O.ai Empowers MarketAxess to Innovate and Inform Trading Strategies

              H2O.ai, the open source leader in artificial intelligence (AI) and machine learning (ML), today announced that its open source platform, H2O, provides critical machine learning capabilities to MarketAxess, the operator of a leading electronic trading platform for fixed-income securities and the provider of market data and post-trade services for the global fixed-income markets. MarketAxess’ Composite+, powered by H2O open source, delivers greater insight and price discovery in real-time, globally, for over 24,000 corporate bonds. Composite+ has won several awards for its use of AI including the Risk Markets Technology Award for Electronic Trading Support Product of the Year and the Waters Technology American Financial Technology Award for Best Artificial Intelligence Technology Initiative.

          • Privatisation/Privateering

            • Linux Foundation

              • XCP-ng Joins the Xen Project as an Incubation Project

                Today, the Xen Project is happy to welcome XCP-ng as an incubation project. XCP-ng is a fully open-source virtualization platform and is a result of the massive cooperation between individuals as well as companies.
                XCP-ng fits well into the Xen Project ecosystem for many reasons. In the past, the Xen Project was primarily focussed on providing code to system integrators, such as distros. Consequently, the project never connected well with it’s end-user community.
                XCP-ng includes some key features inherited from Xen Project as the ability to live migrate VMs without interruption, scalability and security but also brings a whole new ecosystem as a modern Web-ui (Xen Orchestra), compatibility with recognized solution on the market (eg. Netdata) and turnkey installer to ease the adoption.
                XCP-ng provides a central, validated distribution that delivers Xen. Why is this important? It’s a streamlined way for users to gain access and creates a default go-to solution for the community. The inclusion of XCP-ng with its large and active user community into the Xen project creates a bridge between users and developers. The healthy flow of knowledge sharing ensures input from end-users gets incorporated into new releases.

              • Intel Now Part Of CHIPS Alliance

                Intel has joined CHIPS Alliance, the consortium advancing common and open hardware for interfaces, processors and systems. To foster broad adoption, Intel said it is contributing the Advanced Interface Bus (AIB) to CHIPS Alliance.

                CHIPS Alliance is hosted by the Linux Foundation to foster a collaborative environment to accelerate the creation and deployment of open SoCs, peripherals and software tools for use in mobile, computing, consumer electronics and IoT applications.

                Intel is joining CHIPS Alliance to share the Advanced Interface Bus (AIB) as an open-source, royalty-free PHY-level standard for connecting multiple semiconductor die within the same package. This effort should encourage an industry environment in which silicon IP can be developed using any semiconductor process as a “chiplet,” and easily integrated with other chiplets into a single device to deliver new levels of functionality and optimization, the consortium said.

              • New Collaboration Brings Increased Open Source Security Support and Assurances to Software Developers

                The Linux Foundation, the nonprofit organization enabling mass innovation through open source, and the Open Source Technology Improvement Fund (OSTIF) today announced a strategic partnership to advance security for open source software (OSS) that has become critical to the world’s infrastructure.

                The organizations will bring together and build on a depth of their experience supporting security audits for widely deployed open source communities. This formal and strategic agreement will allow the Linux Foundation to augment its work on security audits, of which it has already invested more than $1m across more than 20 security audits for open source projects to date, by including audit sourcing experts through OSTIF’s network. OSTIF will share the resources available through the Linux Foundation’s Community Bridge, a funding and support ecosystem for developers and projects, with its community to help fundraise for new audits.

                “The Linux Foundation’s ability to fundraise across industries to support thousands of developers around the world is unprecedented,” said Amir Montazery, vice president of development at OSTIF. “The Linux Foundation is a pioneer in open source software and one of the few organizations taking the actions required to truly support it for generations to come. We are excited to join forces and increase our collective impact on improving critical software.”

                As part of the strategic partnership, The Linux Foundation will appoint Mike Dolan, vice president of strategic programs, to the OSTIF Advisory Board.

              • How open, trusted edge can help improve data sharing and monetization

                Data is valuable only insofar as you can trust it. If you can’t be confident about its origin or contents, then the information isn’t worth much.That’s a big problem for businesses eyeing the 5G future and developing strategies for monetizing data generated at the edge. Project Alvarium, formed under the Linux Foundation, aims to help organizations disrupt today’s edge business model by quantifying the privacy, accuracy, and security of data flowing into their networks using trust fabrics.


                “The concept of a trust fabric will increasingly become critical in order to make reliable and non-damaging business decisions due to the ever-increasing volume and velocity of edge data, as well as the increasing risk of tainted data going undetected,” said Michael Morton, chief technology officer at Boomi.

                Project Alvarium doesn’t reinvent the trust insertion technologies that make up a DCF. Rather, the project focuses on system-level trust, unifying existing and emerging technologies under a framework with open APIs to create refined confidence scoring algorithms.

          • Entrapment (Microsoft GitHub)

            • The Surface Duo SDK is now available for macOS and Linux
            • Microsoft releases open source source code analyzer

              Looking to aid developers who rely on external software components, Microsoft has introduced a source code analyzer, Microsoft Application Inspector, to help surface features and other characteristics of source code.

              Downloadable from GitHub, the cross-platform command-line tool is designed for scanning components prior to use to assist in determining what the software is or what it does. The data it provides can be useful in reducing the time needed to determine what software components do by examining the source code directly rather than relying on documentation.

        • Security

          • Mushtik botnet now shopping for Tomato routers

            A new variant of the Mushtik botnet has been found attacking routers using the open-source Tomato router firmware with about 4.600 routers currently exposed on the internet.

            Musthtik has been operating since March 2018 using a worm-like propagating ability to infect and harvest Linux servers and IoT devices. The good news is the new variant uses its botnet for only a few tasks, cryptocurrency mining as to launch DDoS attacks and it has not been spotted injecting any additional malware onto a system, said Palo Alto Networks Unit 42.


            “Botnet developers are increasingly compromising IoT devices installed with the open source firmware, which often lack the security updates and maintenance patches necessary to keep devices safeguarded. End users should be cautious when installing open source firmware and must follow the security guidelines in the firmware manual,” Unit 42 said.

          • Fugue open sources Regula, security and compliance tool for Terraform

            Working with Terraform infrastructure-as-code can sometimes be a bit of a headache when it comes to tracking security misconfigurations and compliance violations, but now Fugue has open sourced their Regula tool to assist engineers with maintaining vigilance. Let’s take a closer look.

            Last week, cloud infrastructure security and compliance solution provider Fugue open sourced one of their tools called Regula. From the press release, it “is a tool that evaluates Terraform infrastructure-as-code for security misconfigurations and compliance violations prior to deployment. Regula rules are written in Rego, the open source policy language employed by the Open Policy Agent project and can be integrated into CI/CD pipelines to prevent cloud infrastructure deployments that may violate security and compliance best practices.”

          • Security updates for Tuesday

            Security updates have been issued by Debian (iperf3, openjpeg2, and tomcat7), Mageia (ansible, c3p0, fontforge, glpi, gthumb, libbsd, libmediainfo, libmp4v2, libqb, libsass, mbedtls, opencontainers-runc, php, python-pip, python-reportlab, python3, samba, sysstat, tomcat, virtualbox, and webkit2), openSUSE (java-11-openjdk, libredwg, and sarg), Oracle (sqlite), Red Hat (libarchive, nss, and openjpeg2), Scientific Linux (sqlite), SUSE (nodejs6), and Ubuntu (cyrus-sasl2, linux, linux-aws, linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon, linux, linux-aws, linux-oem, mysql-5.7, mysql-8.0, tcpdump, and tomcat8).

          • Hacker Releases 500,000 IoT Credentials

            One of the biggest issues that IoT has is keeping everything secure. Putting devices online is a double-edged sword: it allows benevolent useful services to connect to it, but it can also allow malicious agents to harvest data from it.

            This was proven a few days ago when a list of 500,000 IoT credentials made their way onto the Internet. The list was posted on a hacker forum for anyone to see and use.

          • Fear, Uncertainty, Doubt/Fear-mongering/Dramatisation

            • More 2020 Trends for Open Source and SCA [Ed: In order to sell its proprietary software, Flexera is -- as usual -- badmouthing FOSS security]

              A review of the National Vulnerability Database (NVD) shows the number of vulnerabilities contributed to the database is increasing year over year. Let’s be clear. This doesn’t mean that code development is getting worse. To the contrary, the industry is doing a better job of paying attention to finding and reporting issues and, in addition, to finding fixes that address problems. We see this as a trend that will continue into 2020 and beyond.

              Likewise, developers are spending a significant amount of time both reviewing and remediating vulnerabilities as opposed to innovating and improving their applications. Technical debt is more than ever moving to the forefront of application development as engineers are dealing with security issues that were once dormant or unknown but because of raised awareness are now being discovered.

            • The Risks and Potential Impacts Associated with Open Source [Ed: DevOps site gives a platform to Black Duck — a Microsoft-connected FUD arm against FOSS]
          • Privacy/Surveillance

            • Letter To Judge Details Vault 7 Leaker’s Post-Incarceration Leaking

              The accused leaker of CIA phone hacking tools — the “Vault 7″ collection released by Wikileaks in early 2017 — is still awaiting trial. To pass the time, alleged leaker Joshua Schulte is suing the government for $50 billion and, apparently, generating a whole lot of evidence against himself.

            • Clearview’s Face Surveillance Shows Why We Need a Strong Federal Consumer Privacy Law

              The New York Times’ recent story on Clearview AI, maker of a secretive facial recognition app that markets its product to law enforcement, has raised critical questions about what can be done to protect our privacy online. Clearview claims to have amassed a dataset of over three billion face images by scraping websites like Facebook, YouTube, and Venmo.

              The solution to the Clearview problem is clear: comprehensive federal privacy legislation that gives consumers real power over their data and real power to fight back.

            • The National Cyber Security Alliance’s Data Privacy Day Honeypot on StaySafeOnline.org

              I was preparing to do something for Data Privacy Day on January 28th, when I discovered something truly alarming…

            • Grindr and OKCupid Sell Your Data, but Twitter’s MoPub Is the Real Problem

              On January 15, a Norweigian Consumer Council (NCC) investigative report exposed the ways that Grindr, OKCupid, and eight other apps are collecting and sharing extremely sensitive personal data. Grindr in particular was sharing users’ age and location tied to a device ID that would allow trackers to match that information to a real identity.

              A third-party advertising company called MoPub, owned by Twitter, was responsible for much of the technology that Grindr used to collect and share data. In response to the NCC report, Twitter announced that it was suspending Grindr’s ad account pending an investigation into “the sufficiency of Grindr’s consent mechanism.”

            • Leaked Documents Expose the Secretive Market for Your Web Browsing Data
            • Wladimir Palant: Avast’s broken data anonymization approach

              Avast used to collect the browsing history of their users without informing them and turn this data into profits via their Jumpshot subsidiary. After a public outcry and considerable pressure from browser vendors they decided to change their practices, so that only data of free antivirus users would be collected and only if these explicitly opt in. Throughout the entire debacle Avast maintained that the privacy impact wasn’t so wild because the data is “de-identified and aggregated,” so that Jumpshot clients never get to see personally identifiable information (PII).


              How Amazon would deanonymize this data

              The example used by Ondřej Vlček makes it very obvious who Avast tries to protect against. I mean, the address identifier they removed there is completely useless to me. Only Amazon, with access to their data, could turn that parameter value into user’s identity. So the concern is that Jumpshot customers (and Amazon could be one) owning large websites could cross-reference Jumpshot data with their own to deanonymize users. Their patent confirms this concern when explaining implicit private information.

              But what if Amazon cannot see that addressID parameter any more? They can no longer determine directly which user the browsing history belongs to. But they could still check which users edited their address at this specific time. That’s probably going to be too many users at Amazon’s scale, so they will have to check which users edited their address at time X and then completed the purchase at time Z. That should be sufficient to identify a single user.

              And if Jumpshot doesn’t expose request times to their clients or merely shows the dates without the exact times? Still, somebody like Amazon could for example take all the products viewed in a particular browser history and check it against their logs. Each individual product has been viewed by a large number of users, yet the combination of them is a sure way to identify a single user. Mission accomplished, anonymization failed.

              How everybody else could deanonymize this data

              Not everybody has access to the same amounts of data as Amazon or Google. Does this mean that in most scenarios Jumpshot data can be considered properly anonymized? Unfortunately not. Researchers already realized that social media contain huge amounts of publicly accessible data, which is why their deanonymization demonstrations such as this one focused on cross-referencing “anonymous” browsing histories with social media.

              And if you think about it, it’s really not complicated. For example, if Avast were collecting my data, they would have received the web address https://twitter.com/pati_gallardo/status/1219582233805238272 which I visited at some point. This address contains no information about me, plenty of other people visited it as well, so it would have been passed on to Jumpshot clients unchanged. And these could retrieve the list of likes for the post. My Twitter account is one of the currently 179 who’s on that list.

            • Big Tech joins up with Big Brother to turn your private health data into $38bn ‘public treasure’

              The US government has officially thrown its weight behind the rollout of FHIR, mandating in 2020 that all medical providers who receive government funding make patient data available through FHIR-compatible apps. This move cements an unspoken alliance between Big Tech and Big Brother that has repeatedly seen the former deployed to circumvent troublesome constitutional restrictions imposed on the latter. The government may not be able to violate Fourth Amendment provisions against unreasonable search and seizure, but if, say, the FBI wants access to a target’s health records, it no longer has to show up at their doctor’s office with a warrant – those records will be sitting in an unsecured corporate database on the cloud, if history isanyguide. Unless the medical records industry seriously overhauls its idea of what constitutes information security, patient data will be fair game for everyone from the NSA to the lowliest basement-bound [cracker].

              Americans’ health data is supposed to be protected under a law called HIPAA (Health Insurance Portability and Accountability Act) that, at least in theory, [...]

            • Find you lost keys anywhere with Amazon’s 24-hour blowout on Tile trackers

              First up is a four pack of Tile Sticker for $40. That’s the all time low for this bundle, which often sells for $55 to $60. Tile Sticker is a small Bluetooth beacon that can be slapped on pretty much anything. It has a three-year battery life and a 150-foot range.

            • Confidentiality

              • Ring Doorbell App Packed with Third-Party Trackers

                Ring isn’t just a product that allows users to surveil their neighbors. The company also uses it to surveil its customers.

                An investigation by EFF of the Ring doorbell app for Android found it to be packed with third-party trackers sending out a plethora of customers’ personally identifiable information (PII). Four main analytics and marketing companies were discovered to be receiving information such as the names, private IP addresses, mobile network carriers, persistent identifiers, and sensor data on the devices of paying customers.

              • How Corporate Lawyers Made It Harder to Punish Companies That Destroy Electronic Evidence

                In the early 2000s, a series of civil lawsuits against giant corporations illustrated the disastrous consequences that could ensue if a defendant failed to provide electronic evidence such as company emails or records. In one suit against tobacco giant Philip Morris in 2004, U.S. District Judge Gladys Kessler concluded that the company deliberately deleted troves of emails that contained incriminating information. She fined the company $2.7 million for the breach, levied $250,000 fines against each of the company supervisors found culpable and barred them from testifying at the trial.

                Big corporations rallied for changes and got them. In 2006, the rules that govern federal litigation were changed to create a “safe harbor” that would protect companies from consequences for failing to save electronic evidence as long as they followed a consistent policy and, when put on notice of imminent litigation, preserved all relevant materials.

              • Ring Doorbell App for Android Caught Sharing User Data with Facebook, Data-Miners

                The Amazon-owned video doorbell uses third-party trackers to serve up rich data to marketers without meaningfully notifying users.

                Amazon’s Ring Doorbell app for Android is a nexus for data-harvesting, according to an investigation by the Electronic Frontier Foundation (EFF). Privacy advocates allege Ring goes so far as to silently deliver updates on Ring customer usage to Facebook, even if the Ring owner doesn’t have a Facebook account.

    • Defence/Aggression

      • Americans Need to Hear More From Iranians, Here’s Where to Start
      • Saudi Arabia Outsources Cyber Arsenal, Buys Spyware, Experts Say

        While countries like Russia, China and North Korea have invested in developing powerful, tailored cyber weapons, Saudi Arabia has instead opted to purchase them, according to experts and former government officials.

        The Middle Eastern nation’s cyber arsenal is believed to be primarily composed of outsourced espionage tools, which it has combined with disinformation tactics on social media, they said.

      • Ten years on, the Arab Spring has only benefited the Islamists

        However, the rejection of Wahhabism inside Saudi Arabia and its use as a tool of soft power abroad — the Saudis spent tens of billions of dollars, starting in the 1970s, promoting it — is the most positive global ideological change since the fall of communism. From pop concerts to women driving, art exhibitions to mass tourism, the ending of sex segregation to the neutering of the religious police: for those of us who lived in the kingdom when Wahhabism hung over everything like a toxic cloud, the changes are breathtaking.

      • Pakistani Man Is Blinded By His Father, Brothers For Wanting A ‘Love Marriage’

        Baqi’s horrific tale illustrates that women are not the only victims in Pakistan of so-called “honor crimes” — a scourge of violence that has included acid attacks, blinding, and murder by relatives of victims accused of dishonoring their families.

        Baqi says he was attacked after his 73-year-old father, Dost Mohammad, learned about his intention to marry the woman he loves. He says his father refused to consent to the marriage because the couple had gotten to know each other by speaking on the telephone during the previous three years.

    • Transparency/Investigative Reporting

      • Harry Dunn’s parents call for Prince Andrew to testify in return for Anne Sacoolas

        The future of transatlantic co-operation in criminal investigations will be discussed when the foreign secretary meets his US counterpart in London tomorrow.

        Dominic Raab will discuss the refusal of the US to extradite Anne Sacoolas to face charges over the death of Harry Dunn with the US Secretary of State Mike Pompeo at their bilateral dinner and talks.

        Mr Raab is also under pressure to withhold British co-operation in the case of Jeffrey Epstein — a convicted sex offender whose friendship with the Duke of York is of interest to the FBI — and to resist the extradition on espionage charges of Wikileaks founder Julian Assange.

    • Environment

      • The convergence: Third-world debt and the climate crisis are intimately connected

        Around the world, dozens of theoretically sovereign nations are hopelessly in debt to a global financial system that is rigged to benefit multinational corporations. Those corporations strip these places of all of their natural resources, like gold, diamonds, oil, bauxite and rare earth elements.

        And once the materials are extracted from the earth, they are sent to the cheapest place on the planet to mould them into sellable products — wherever has the most lax labor and environmental regulations at the moment. Then, to grow and protect the wealth generated by this process, they park their revenues in off-shore tax jurisdictions.

        And with their hidden billions, they leverage their financial power to protect the vast political and economic system that made this miserable scheme possible to begin with. You see their influence in our media, the academy, philanthropy, popular culture, and of coruse in our politics. Like the smog from the planet’s burning forests, it covers everything and fills our lungs.

      • Louise Linton publicly calls out husband Steve Mnuchin for insulting teenage activist Greta Thunberg

        Former actress Louise Linton deleted an Instagram post praising teenage climate change activist Greta Thunberg, who her husband Treasury Secretary Steven Mnuchin publicly criticized last week for lacking a college degree.

        “I stand with Greta on this issue. (I don’t have a degree in economics either.) We need to drastically reduce our use of fossil fuels. Keep up the fight @gretathunberg,” Linton posted Saturday alongside a split-screen image of Thunberg and her husband. She later deleted the post.

        Mnuchin aroused controversy last week after he told reporters at the World Economic Forum in Davos, Switzerland, that he did not consider the outspoken Thunberg to be a legitimate critic of fossil fuel investments.

      • Amazon Employees Share Our Views on Company Business

        364 Amazon employees gave one or more quotes below.

      • Climate crisis offers a green business boom

        The tide is turning against the fossil fuel industry as countries and companies recognise the green business boom of alternative energy.

      • The Two Phenomena Transforming the Climate Conversation

        Let me betray my age for a moment. Some of you, I know, will be shocked, but I still read an actual newspaper. Words on real paper every day. I’m talking about the New York Times, and something stuck with me from the January 9th edition of that “paper” paper. Of course, in the world of the Internet, that’s already ancient history — medieval times — but (as a reminder) it came only a few days after Donald Trump’s drone assassination of Iranian Major General Qassem Suleimani.

      • ‘Extremely Disappointing’: New Analysis Offers Scathing Critique of Top Democrat’s CLEAN Future Act

        “This framework should really be called the Dirty Future Act. In every way possible, Pallone’s proposal fails to address the climate crisis.”

      • Energy

      • Wildlife/Nature

    • Finance

    • AstroTurf/Lobbying/Politics

      • Slavs can yell at sneering cats, too An international meme goes to Russia and Ukraine

        Some memes last a day. Others live on for years, forever finding new quirks and variations to keep them floating across the interwebs. The Woman Yelling at a Cat meme, derived from a frame in The Real Housewives of Beverly Hills, falls into the latter category. In fact, Meduza’s readers Russian-speaking named this blond human-feline pair the best meme of 2019. It’s no wonder that the image’s recent ventures into high art have brought Russian and Ukrainian visual traditions right along with them.

      • Controversial former culture minister will lead history and humanities policy for Putin

        Former Culture Minister Vladimir Medinsky was excluded from the new cabinet composed by Russian Prime Minister Mikhail Mishustin. While Medinsky’s former subordinate, Olga Lyubimova, took over his portfolio, the ex-minister became an aide to President Vladimir Putin. On January 27, Kremlin Press Secretary Dmitry Peskov told journalists that in Medinsky’s new position, he will be charged with curating state policy on history and the humanities.

      • Leading by 9 in New Iowa Poll, Sanders Says His Campaign Is ‘Worst Nightmare’ of Trump and Billionaire Class

        “We got Wall Street nervous. We got the insurance companies nervous. We got the drug companies nervous. We got the fossil fuel industry nervous. We got the military-industrial complex nervous.”

      • ‘The Rich Have Class Solidarity’: Bezos Party Features Billionaires Rubbing Shoulders With Trump Admin Officials, Journalists

        “This town, man.”

      • ‘Debate Her’: As Progressive Democratic Challenger Jessica Cisneros Racks Up Endorsements, Incumbent Henry Cuellar Pretends She Doesn’t Exist

        “Our people are waiting, Rep. Cuellar. Debate me.”

      • Tom Perez Stacks 2020 Convention Committees With ‘From the Swamp’ Nominations

        Perez’s nominations clearly show that the swamp seems in it to win for itself, regardless of the electoral outcome for the nation.

      • ‘Time for Him to Do His Job’: Public Urged to Press Chief Justice Roberts to Subpoena Witnesses Amid GOP ‘Cover-Up’

        “Roberts’ job is to preside over a fair trial, where relevant witnesses are heard from and jurors actually listen to the evidence. Right now, he’s helping Republicans break the rules and cover for Trump. That has to end.”

      • Corporate Crap That Doesn’t Kill Bernie

        On January 19th the New York Times oddly co-endorsed Senators Elizabeth Warren and Amy Klobuchar for the Democratic presidential nomination. Two days later, the key New Hampshire primary showed Warren down four points. Bernie Sanders’ surge continued. What happened?

      • Young People Are Set to Make History With Bernie Sanders—If They Show

        The youth movement is on the ground in New Hampshire  showing the nation how it’s done.

      • Candidate Detention
      • ‘Blow Up the Phones’: Demands That #BoltonMustTestify Surge After New Revelations About Ukrainian Aid Freeze

        “We are citizens of the United States of America, and we must indeed unite together to stop this GOP cover-up.”

      • Thank You, Adam Schiff

        For a job well done, the nation should be grateful. But…

      • Bernie Sanders, Joe Rogan, Human Rights Campaign, and Truth in Advertising

        On January 20, comedian and podcast host Joe Rogan mentioned that he’ll “probably vote for Bernie” Sanders in the Democratic Party’s presidential primary. Rogan cited Sanders’s decades of “consistency” as a “very powerful structure to operate from.”

      • Palestinians See Trump-Netanyahu Apartheid Plan as End of Oslo Peace Process and “Steal of the Century”

        Palestinians are under Israeli military rule and are being deprived of basic human rights, including the right to have citizenship in a state.

      • The Misuses of Antisemitism in the UK and the USA

        Britain and the USA have had close ties, echoes and parallels from our start, some very good, others nasty. One of the latter may now be threatening. Jeremy Corbyn’s rise in Labour Party leadership offered great hopes for a leftward turn in Britain, away from the worrisome policies of Boris Johnson.

      • Establishment Democrats Panic at Possibility Bernie Sanders Could Be 2020 Nominee

        “The knives are out.”

      • The Challenge for Chile and the World
      • Democratic Party Elites Rig 2020 Convention Committees Against Sanders

        An array of lobbyists, corporate consultants, think tank board members, party operatives, and pro-Israel Democrats were nominated to the 2020 Democratic National Convention committees by Democratic National Committee Chair Tom Perez.

        Shadowproof editor Kevin Gosztola shared a thread that explored many of these individuals. Quite a few have connections to Bill and Hillary Clinton’s presidential campaigns. Very few have any connection to Senator Bernie Sanders’ 2016 presidential campaign.

      • Establishment Democrats Are Terrified of a Sanders Win in Iowa

        Bernie Sanders was off the campaign trail over the weekend, stuck in the Senate for impeachment hearings, but if polling is any indication, that didn’t stop his campaign’s momentum. A New York Times/Siena College poll of Iowa Democratic voters shows 25% of respondents would vote for Sanders in the Iowa caucus on Feb. 3. A poll from Boston’s Emerson College of Iowa Democrats and independents found 30% of respondents planning to vote for him.

      • Trump Bought Off the Impeachment Jury With Tax Cuts While Hinting at Bigger Ones

        It’s long been obvious that Republican senators have little interest in serving as impartial jurors in the impeachment trial of Donald Trump. While there is a raft of motivations for such historic perfidy — with several GOP senators politically benefiting from some of the same corrupting influences — one under-examined, non-Russian reason is personal greed.

      • Help Us Cover the Election With Electionland 2020

        We’re 10 months away from the 2020 election. While the stakes are incredibly high and the electorate is more polarized than it has been in decades, Americans’ faith in the legitimacy of the outcome is low — and not without reason. There’s evidence that the forces that sought to influence the electorate in 2016 are at it again, and attempts to shore up the cyber defenses of local election systems have had uneven results.

        Crucially, in a vacuum of trustworthy facts, questions about election integrity, fraud and security can be answered by dishonest players with a stake in the outcome. Local newsrooms, reeling from new rounds of belt-tightening and layoffs, are less able to sustain the effort necessary to cover a fast-moving, complex, technical and data-rich story by themselves.

      • The World Is Burning, But It’s Not Front-Page News

        Let me betray my age for a moment. Some of you, I know, will be shocked, but I still read an actual newspaper. Words on real paper every day. I’m talking about the New York Times, and something stuck with me from the January 9th edition of that “paper” paper. Of course, in the world of the Internet, that’s already ancient history — medieval times — but (as a reminder) it came only a few days after Donald Trump’s drone assassination of Iranian Major General Qassem Suleimani.

      • Ahead by 9 in Iowa Poll, Sanders Says His Campaign Is Trump’s “Worst Nightmare”

        “We are their worst nightmare,” Sen. Bernie Sanders said Sunday of the corporate and establishment forces allied against his presidential campaign — and the diverse grassroots movement fueling it — as a new Iowa poll showed the Vermont senator leading the 2020 Democratic field by nine points just a week ahead of the state’s Feb. 3 caucuses.

      • The Vile Message Democrats Are Sending With Impeachment

        Of course President Donald Trump should be impeached. In fact, impeachment proceedings should have been initiated as soon as he took office and enacted the Muslim travel ban, or perhaps even before this, as he was in clear violation of the emoluments clause of the Constitution. But what has been frustrating as news of Trump’s impeachment has taken over headlines is not just the fact that Democrats waited until the final year of his first—though perhaps not his last—term in office, or that they ignored calls to “impeach the motherfucker,” as advised by Michigan Rep. Rashida Tlaib.

      • The Ugly Jingoism Marring Trump’s Impeachment
      • Allegations in Bolton Book Spark New Calls for Witnesses at Impeachment Trial

        Calls are growing for the Senate to call witnesses in President Trump’s impeachment trial, after The New York Times published details about former national security adviser John Bolton’s forthcoming book. In the book, Bolton writes that President Trump personally told him in August that he wanted to maintain a freeze on $391 million in security assistance to Ukraine until Ukraine turned over materials related to former Vice President Joe Biden and supporters of Hillary Clinton in Ukraine. The New York Times broke the story on Sunday, one day after President Trump’s legal team began its defense of the president. During Saturday’s opening arguments, White House deputy counsel Mike Purpura claimed the Democratic case for impeachment is based on assumptions, and Trump’s attorney Pat Cipollone accused the Democrats of attempting to overturn an election. Trump’s lawyers will continue their opening arguments Monday, after the Democratic House impeachment managers wrapped up their three days of opening arguments on Friday. We speak with Dan Friedman, a reporter in the D.C. bureau of Mother Jones who focuses on foreign influence and national security.

      • Social media accounts of multiple NFL teams [cracked]

        Other teams that appeared to be impacted by the [attack] on Twitter were the Dallas Cowboys, the Philadelphia Eagles, the Houston Texans, the New York Giants, the Chicago Bears, and the official Twitter account of the NFL.

        Prior to having its account suspended, OurMine tweeted out a running list of teams that had been [cracked] on Monday, noting that it had also successfully accessed the Instagram accounts of the Dallas Cowboys, the Buffalo Bills and the Minnesota Vikings.

        The Vikings also had their Facebook account compromised, with OurMine tweeting they had also [cracked] the Facebook accounts of the Green Bay Packers, the NFL, the Buffalo Bills, the Dallas Cowboys and the Houston Texans.

      • Can This Notorious Troll Turn People Away From Extremism?

        Still, there have been times when Bonnell wondered aloud whether the American population is cognitively equipped to govern itself. As he said to one viewer, rather frankly, “I think that people in general are stupid, and I’ve actually lost my appreciation for democracy at this point.” Not too long ago, Bonnell inveighed against efforts to “deplatform” prominent figures on the internet, citing his commitment to freedom of speech. Today he supports, albeit waveringly, the opposite: Those who willingly lie and misinform at great scale should be silenced. His weary cynicism about the ordinary intellect is what you might expect from someone who has spent years trying to get people to change not what they think but how they think. That has always been slow, hard work. And it would be almost understandable, in the midst of so much thankless labor, in a climate so wracked by fear over the dangerous contents of the American mind, to forget why you started in the first place.

      • Lessons Learned From 2016, but U.S. Faces New Election Threats

        It’s been more than three years since Russia’s sweeping and systematic effort to interfere in U.S. elections through disinformation on social media, stolen campaign emails and attacks on voting systems. U.S. officials have made advances in trying to prevent similar attacks from undermining the 2020 vote, but the potential threats have increased and some old problems have not been addressed. A look at what has changed since 2016 and what has not.

      • UK citizens still not safe from outside interference in elections, claims Cambridge Analytica whistleblower

        Speaking to the PA news agency she explained: “I saw in the last British election so much widespread usage of fake news, disinformation and even suppression campaigns that look very similar, if not worse, than what we saw in 2016.

        “Technology has advanced greatly in the past few years and there’s now not just one Cambridge Analytica, there are hundreds.

      • Why manipulation campaigns are the biggest threat facing the 2020 election

        This era of political espionage is rooted in manipulative ads, fake news articles and other forms of digital content, which are hardly distinguishable from facts and truths. Today’s espionage is one of the nation’s greatest threats, especially as we approach the 2020 presidential election, and leaders across industries and sectors need to take action now.

        Recent research by the Oxford Internet Institute found that computational propaganda and social media manipulation have proliferated massively in recent years and are now prevalent in more than double the number of countries compared to two years ago. We’ve entered an era where the threat of manipulation on the internet is constant. With the 2020 presidential election looming, it is not only up to the federal government to protect the nation against manipulation campaigns — the private sector must do its part as well.

    • Censorship/Free Speech

      • Welcome News: DC Circuit Revives The Constitutional Challenge Of FOSTA

        We’ve written several times before about the constitutional challenge to FOSTA in the case Woodhull Freedom Foundation, et al. v. U.S. That challenge hit a roadblock when the district court dismissed that lawsuit for lack of standing by the plaintiffs. Per the district court, the plaintiffs had not been hurt by the statute, nor were they likely to be hurt by it, and thus they had no right to challenge it in the courts. The plaintiffs appealed, and we supported the appeal with an amicus brief.

      • Is Devin Nunes’ Lawyer Using Questionable Subpoenas In An Unrelated Case To Seek Info On Satirical @DevinCow Account?

        Buckle up, because here’s a wild one. Over the weekend, a ton of people sent me a tweet from “The Sparrow Project” that many people took to mean that Rep. Devin Nunes — the Congressional Representative who spent much of 2019 filing highly questionable SLAPP suits against news organizations, journalists, political operatives, critics, and, most famously, a satirical internet cow — has issued a highly questionable subpoena for The Sparrow Project’s private Twitter DMs.

      • In Memory of Lina Ben Mhenni, Tunisian Free Expression Activist and Revolutionary

        Like so many of her friends, colleagues, and admirers around the world, we were devastated to hear of the death of Lina Ben Mhenni at age 36, following a long illness. The Tunisian blogger, activist, athlete, and linguistics lecturer was a friend to several of us.

        Amidst a community of determined and brilliant activists, Lina stood out for her compassion, and her relentless dedication to advocating for freedom of expression and women’s and human rights. She was humble but bold, using her real name online to advocate for democracy and human rights at a time when doing so in Tunisia was a great risk.

      • NewsGuard Can Save You From Putin!

        The New York Times headline was an attention grabber worthy of Sen. Joe McCarthy: “How Amazon, Geico and Walmart Fund Propaganda.” A subhed explained: “Algorithms are sending ads by American brands onto Russian disinformation sites.” The op-ed by L. Gordon Crovitz, a former publisher of the Wall St. Journal, culminated in a sales pitch for his latest venture, NewsGuard. The company’s business plan is to do for internet news sites what Red Channels did for Hollywood movies: maintain a blacklist. Patriotism for personal profit —perfect plan.

      • As Tulsi Gabbard’s Silly Attention Seeking Lawsuit Against Google Falters, She Files Equally Silly Lawsuit Against Hillary Clinton

        As you may recall, last year, Presidential candidate and current Congressional Rep. Tulsi Gabbard filed a laughably silly lawsuit against Google. We pointed out at the time that it had no chance at all, and echoed, quite directly, the debunked claims that some conservatives make about how Google censors them… even though Gabbard is not a conservative politician. It still threw the same kitchen sink of dumb legal arguments into the complaint, arguing that Google was a “state actor” (it’s not), and that Google’s moderation choices were a violation of California’s civil rights law, the Unruh Act.

      • Santa Fe Denies Permit for Mural Art Depicting Plight of Palestinian Children

        The stucco wall on Santa Fe’s Old Pecos Trail is now papered with images of Israeli soldiers terrorizing Palestinian women and children. This art was created by Navajo artist Remy at the request of Santa Feans for Justice in Palestine (SFJP), of which I am a member. For the past six years, we have been creating art depicting the conditions of Palestinians under the Israeli occupation. Guthrie Miller, the owner of the wall where the art has been located since 2014, has supported this effort. His wall abuts one of the main thoroughfares leading into Santa Fe, and is also on the cross street leading to Museum Hill, where Native American Art and history are displayed in several prestigious museums.

      • Defying Company Policy, Over 300 Amazon Employees Speak Out

        While Amazon CEO Jeff Bezos was throwing a lavish party at his $23 million mansion in Washington, DC, this weekend—attended by celebrities like Ivanka Trump and Bill Gates—hundreds of his employees were gearing up to revolt.

        At issue was the company’s external communications policy and reports earlier this month that it threatened to fire employees for speaking out about climate change without proper authorization. In protest, more than 350 Amazon workers published statements under their own names in a Medium post on Sunday, intentionally violating the policy en masse.

      • Iran’s regime sentences Christian convert to prison for “insulting Islam”

        Article 18 said Ismaeil, who was arrested at his home in January 2019, faced two additional charges: “propaganda against the the Islamic Republic”, “membership of a group hostile to the regime”.

        A judge said at a November hearing him that criminal chargeof “propaganda against the Islamic Republic” was “applicable”, because he had created a Telegram channel in which he had “promoted evangelical Christianity,” wrote Article 18.

      • Debate Over Freedom of Speech in France as Girl Faces Threats for Branding Islam ‘Religion of Hate’

        As the head of the secular watchdog l’Observatoire de la laïcité, Nicolas Cadène, told the outlet, blasphemy is not a crime in France, so one can insult a religion, albeit not citizens due to their religious affiliation. This is what allowed writer Michel Houellebecq to be let off the hook in 2002 after having called Islam “the most stupid religion in the world”.

        Mila’s case, however, has not only sparked debate in France about the freedom of expression, but has also stirred memories of the Charlie Hebdo attack in January 2015, when journalists were killed for having made a caricature about Islam

      • China putting pressure on Swedish media

        Seven out of the country’s eight biggest newsrooms said that in the last two years the Chinese embassy had contacted them and criticised their content on China, according to a survey conducted by Swedish national television.

      • Our crappy healthcare system is to blame for Goop

        When you consider how emotional, divisive, and deeply high stakes the issues like insurance, pharmaceutical regulation, and the opioid epidemic have become – especially this election year – it’s not difficult to see the how how critical the conversation around our care has become. There’s a reason patients have lost faith in modern medicine. It’s easy to laugh off, or more likely shudder, at Paltrow’s “Goop Lab” promise of “optimization of self.” But know that this juggernaut exists because of the failures of so many other systems. “This series is designed to entertain and inform, not provide medical advice,” the show warns at the top of each episode. But in a world where patients where considered people and medical advice could also be entertaining and informative, we wouldn’t be suckers for a Goop Lab at all.

    • Freedom of Information / Freedom of the Press

    • Civil Rights/Policing

      • The Better Moral Creed

        Last October Attorney General Bill Barr delivered a speech at Notre Dame during which he claimed that “Judeo-Christian moral standards are the ultimate rules for human conduct” and that “the fact is that no secular creed has emerged capable of performing the role of religion.” Barr, like many other Catholic and Evangelical fundamentalists, believes that without the moral standards defined by religion, society is doomed. That simply isn’t true. Look at Sweden and many other countries that are far more secular than American, yet have much lower crime rates. And in America, Christians are 20 times more likely to find themselves incarcerated than atheists. But Barr goes on to say that his moral standards “are like God’s instruction manual for the best running of man and human society.” Are they?

      • Rights Advocates Demand National Attention to ‘State of Emergency’ in Mississippi Prisons, Where 12 Inmates Have Died In Less Than a Month

        “Parchman Prison is a torture chamber and we cannot afford to be robbed of one more human life at the hands of Mississippi’s state corrections system,” said Rep. Ayanna Pressley.

      • Supreme Court Asked To Tell Cops That Consenting To A Search Is Not Consenting To Having Your Home Destroyed

        Five years ago, an Idaho police department destroyed a woman’s house to end a standoff with her dog. The Caldwell PD — after having been given permission (along with a house key) to enter the home to see if a suspect was in the home — decided this meant the Shaniz West had given them permission to fire grenade after tear gas grenade into the house before sending in the SWAT team to confront the family dog.

      • A Historian Reflects on the Return of Fascism

        Back in 1941, the year of my birth, fascism stood on the brink of conquering the world. During the preceding decades, movements of the Radical Right—mobilized by demagogues into a cult of virulent nationalism, racial and religious hatred, and militarism—had made great strides in nations around the globe. By the end of 1941, fascist Germany, Italy, and Japan, having launched massive military invasions of other lands, had conquered much of Europe, Asia, and the Middle East.

      • CIA Contractor Details Torture of 9/11 Suspects

        In his testimony last week in the pre-trial hearing of five men charged with plotting the September 11 attacks on the United States, Dr. James Mitchell vividly described his role in torturing detainees in the program he helped design for the Central Intelligence Agency (CIA).

        Sitting less than 25 feet from Khalid Sheikh Mohamed (referred to as KSM), Mitchell gave a detailed description of how Mohamed was waterboarded. Mitchell read aloud details and repeated the questions he asked Mohamed during a March 2003 interrogation session that included pouring 12 liters of water over Mohamed’s nose and mouth. He even claimed that at one point during a waterboarding session “KSM fell asleep on the waterboard” and thus could not have been scared.

      • Tanzania: World Bank Disregarding Ban on Pregnant Schoolgirls
      • As US Universities Close Confucius Institutes, What’s Next?

        As a Chinese studies graduate of the University of Maryland, I was drawn to the news that the school’s president, Wallace Loh, had decided to close its Confucius Institute – the oldest one in the United States. Confucius Institutes, found at numerous US universities, are Chinese government-funded outposts that offer Chinese language and culture classes.

        Loh emphasized that the university closed its Confucius Institute because of the US 2019 National Defense Authorization Act, which forces schools to choose between keeping their Confucius Institutes or receiving language program funding from the US Defense Department.

      • Women Are Leading the Fight Against Fascism in India

        On the 4th of December 2019 the Hindu nationalist Bharatya Janata Party (BJP)-led government of India introduced the Citizenship Amendment Bill (CAB) in parliament. By the 11th of December the bill had been enacted into law after being pushed through parliamentary votes, and signed by the President. The rules of the law are still being written and yet Home Minister Amit Shah announced on the 10th of January 2020 that the Citizenship Amendment Act (CAA) is now in operation. By doing so, the BJP has chosen to ignore thousands of citizens who have been gathering on the streets to protest against the Act since the 4th of December, and who continue to do so in defiance of state and police violence across the country.

      • Fender Fined $6 Million for Illegal Price-Fixing Scheme

        Fender has been fined 4.5 million pounds (nearly $6 million) in the UK after admitting to price-fixing. The move breaks competition laws and prevents retailers from discounting instruments.

      • Housing Discrimination Is Rising. Trump Is Attacking Protections Against It.

        For the past few months, yet another legislative pillar of the country’s civil rights era, the Fair Housing Act, has been in the Trump administration’s crosshairs. First, in the autumn, the administration unveiled plans to make it harder for tenants, mortgage recipients and community organizations to sue banks and other financial institutions for using algorithms that end up having discriminatory impacts on the basis of race, religion, national origin and other protected categories. Then, a few weeks ago, HUD unveiled additional rule-rewrites diluting the obligation of cities to both develop public infrastructure in poor neighborhoods of color and also to build affordable housing across a range of locales rather than concentrating it all in a handful of places.

      • Diddy Urges a Grammy Boycott: ‘Black Music Has Never Been Respected’

        Diddy outright slammed the Recording Academy and Grammys in a 50-minute speech.

      • Tyler, the Creator Calls Grammy Urban Category ‘Politically Correct N-Word’

        Tyler, the Creator is happy with his Grammy, but dissatisfied with its categorization.

      • Juice WRLD Wasn’t Even Mentioned at the 2020 Grammy Awards

        Juice WRLD was almost entirely ignored the Grammy Awards on Sunday night, partly due to the shocking death of Kobe Bryant. But the rapper wasn’t nominated for any awards, despite a stellar 2019.

      • After declared karo-kari couple seeks protection

        The couple said, their marriage had sparked enmity between their families who had declared them Karo-Kari and wanted to put them to death. Ghulam Rasool Bhutto flanked by his wife, told that he had contracted love marriage with a woman, out of his caste.

      • Pakistan: Pashtun Activist Arrested
      • The debunked “Russian influence” nonsense is infantilizing liberals

        In 2018, Hillary Clinton told Britain’s Channel Four News: “The real question is how did the Russians know how to target their messages so precisely to undecided voters in Wisconsin or Michigan or Pennsylvania–that is really the nub of the question.” No, the real question is why so much of the US and European establishment accepted and promulgated Clinton’s alibi for her failure to follow her husband into the office of president of the United States. A Clinton or a Bush was president, vice president, or secretary of state in every year between 1981 and 2013, an era in which working-class incomes stagnated, offshoring devastated US and European manufacturing, the world suffered the worst economic collapse since the Great Depression of the 1930s, and the US plunged into multiple disastrous wars in the Middle East and Central Asia. Trump became president by running against a Bush in the Republican primaries and a Clinton in the general election. The desire of many American voters to disrupt the quarter-century cycle of nearly identical versions of technocratic neoliberalism under alternating Bushes and Clintons is quite sufficient to explain the presidential election of 2016.

      • Could the Zulus Heal America’s Polarization?

        Most of us, who are Americans or Europeans, would answer with our name, hometown, job, and any other information that helps to locate our unique spot on the socio-cultural grid.

        When I describe who I am in enough detail, that description doesn’t fit anybody else.

        But that is just one culture’s way of answering the question, “Who are you?” Other cultures answer the question very differently. Consider the answer given by members of the Zulu tribe in South Africa.

        If you were to ask an individual Zulu, “Who are you?” they would respond with the word “ubuntu.” This is a word that translates, “I am because you are.” The Zulus have no concept of an individual in isolation. They define who they are through community.

    • Internet Policy/Net Neutrality

      • The ‘Race To 5G’ Is A Giant Pile Of Lobbyist Nonsense

        We’ve noted for a while that the “race to 5G” is largely just the byproduct of telecom lobbyists hoping to spike lagging smartphone and network hardware sales. Yes, 5G is important in that it will provide faster, more resilient networks when it’s finally deployed at scale years from now. But the society-altering impacts of the technology are extremely over-hyped, international efforts to deploy the faster wireless standard aren’t really a race, and even if it were, our broadband maps are so terrible (by design) it would be impossible to actually determine who won.

      • Why the BBS is still awesome in 2020

        Here we are. The year 2020. The future. We’ve got more Internet-based services than you can shake a stick at. And, yet, with all of these modern advancements… there’s one decades old technology that is proving surprisingly useful. And fun. The BBS. Back in the 1980s (and a pretty big chunk of the 90s) most people who did something “On-Line” with their computer were doing so via a modem, a POTS phone line, and a dial-up Bulletin Board System (aka “BBS”).

    • Digital Restrictions (DRM)

      • You Don’t Own What You Buy: The Tetris Edition

        In the convoluted realm that has become copyright, licensing agreements, and SaaS-style everything, we’ve had something of a running series of posts that focus on the bewildering concept that we no longer own what we buy. Between movies simply being disappeared, features on gaming consoles being obliterated via firmware update, and entire eBook platforms simply ceasing to work, the benefits of handing over very real dollars have never been more fleeting.

    • Monopolies

      • U.S. and China Approve Trade Agreement: Part 1

        On January 15th, the U.S. and China announced bilateral approval of an agreement resolving some of the trade disputes between the two countries that have developed (or become more evident) over the past three years. One of the most consistent (if sometimes incoherently expressed) policy positions taken by the Trump Administration (and Mr. Trump himself) is that the trade balance between the U.S. and China has been unbalanced and in need of correction. This idea is not unique to Mr. Trump (although its idée fixe nature may be) and has been a feature of the U.S. Trade Representative’s Special 301 Report for the past decade (most recently last April). It has been the source of numerous tariffs imposed on China by this Administration (even in the face of criticism from economists and others that U.S. consumers and farmers, not the Chinese, bore the brunt of the consequences and the costs) and the periodic imposition of these tariffs has rattled the financial markets since the time when Mr. Trump first came into office.


        As mentioned above, one interesting feature of the agreement is that many of the provisions setting forth standards for protection of party rights contain the affirmative statement (requirement to requirement) that “[t]he United States affirms that existing U.S. measures afford treatment equivalent to that provided for in this Article,” indicating that the negotiators conceded to adopt U.S. standards for intellectual property protection and other matters falling within the scope of the agreement. Indeed, it is difficult to ascertain any concessions made by the U.S. for obtaining China’s approval of these terms. There is an aphorism that if a deal seems to good to be true then perhaps it isn’t (true, that is). It is contrary to this administration’s puffery that the U.S. might not get the better part of any agreement it enters, and when making arrangements with economically weaker partners that may tend to be true because the odds tend to be stacked in our country’s favor. But in view of China’s strengths it might be foolish to think that the Chinese will be as accommodating as the Trump Administration would prefer them to be, and agreements inconsistent with these realities are likely to be ephemeral.

      • Patents

        • New NAFTA top priority as Parliament resumes Monday

          The new North American trade deal is expected to take centre stage when Parliament returns Monday, marking the first challenge for a Liberal minority government that will need Opposition support to pass legislation.

          The House of Commons reconvenes Monday after rising for the holidays in December, giving Canadians their first serious look at Canada’s 43rd Parliament in action.

          Moving forward with the Canada-United States-Mexico Agreement (CUSMA) will likely dominate the agenda this week when the Liberals table a bill to approve the deal Wednesday.

        • ABA Opinion Limits Ability of Firms to Restrict Departing Lawyers

          An issue I’ve frequently been asked to discuss is the ethical constraints on firms to impose restrictions or requirements on departing lawyers — such as precluding a lawyer from doing logistical work on setting up a new, separate firm upon departure — as well as the departing lawyer’s obligations to her clients and soon-to-be-former firm. In addition, migrating lawyers create issues for the new employer, such as imputed disqualification of former client conflicts.

        • $85.23 million for WiLAN against Apple.

          The jury awarded a royalty of $.45 per iPhone 6 & 7. This is less than 0.1% royalty rate ($650 per iPhone 7) but things add up when you sell 200 million units.

          This is the second time around on damages. The first jury awarded $145,100,000. However Judge Sabraw gave WiLAN the option of either (1) remitting the damages down to $10 million or (2) holding a new trial on damages. According to the court the problem stemmed from expert opinions regarding apportionment that were not supported by the evidence. Even though it was a single-issue jury trial, the judge still provided the jury with 31 pages of jury instructions: Jury Instructions.

        • Monsanto v. Nuziveedu: A Missed Opportunity by the Supreme Court?

          Monsanto Technology LLC (Monsanto) had a registered patent no. 214436 for Nucleotide Acid Sequence (NAS) containing the gene Bacillus thuringiensis (Bt gene). On insertion into DNA of cotton seeds, NAS killed bollworms from inside the seed and therefore reduced the dependence of farmers on insecticides and pesticides.

          The dispute between Monsanto and Nuziveedu Seeds Limited (Nuziveedu) started in 2016, when Monsanto issued proceedings in the Delhi High Court for patent infringement. In its reply, Nuziveedu filed a counter-claim challenging the validity of the patent. The trial court held that the patent was prima facie valid. Against the order, both the parties appealed to the division bench of the Delhi HC. This Court revoked the patent on the ground that the said invention was not patentable subject matter under Section 3(j) of the Patents Act, 1970 (the Act), which excludes from patentability “plants and animals in whole or any part thereof other than micro-organisms but including seeds, varieties and species and essentially biological processes for production or propagation of plants and animals”. It opined that the product of Monsanto was more suitably protected under the Protection of Plant Variety and Farmers’ Rights Act, 2001 (PPV). Both parties appealed the decision to the Supreme Court.

          On 8th January 2019, the SC remanded the matter to the division bench holding that the Delhi HC was wrong in deciding the validity of the patent merely on the basis of prima facie examination. It held that the question of validity of a patent is a mixed question of fact and law and therefore evidence and expert testimony were to be considered.


          The matter is currently pending before the High Court of Delhi. Monsanto’s patent has already expired, leaving Monsanto’s claim for injunction defunct. The only remedy available to it now is damages, that is, if the NAS is held to be patentable subject matter. Though the decision of the Delhi HC may not have any significance for the immediate parties, it would definitely establish the law for future applications involving NAS-like inventions.

        • Cert Denied

          The Supreme Court has denied certiorari in these three eligibility cases largely clearing the docket of pending petitions in patent cases. There are a few remaining:

        • Federal Circuit Disqualifies Litigation Counsel Who Prosecutes Patents for Subsidiary Company

          In an unusual decision, the Federal Circuit has disqualified PerDiem’s appellate counsel – the firm of Davidson Berquist Jackson & Gowdey, LLP – based upon a current client conflict.

          The particular problem here stems from Davidson’s simultaneous performance of patent prosecution work for Trimble Transportation Enterprise Solutions, Inc.. Trimble Transport is a wholly owned subsidiary of appellant Trimble Inc (TRMB).

          Although Davidson has now withdrawn its representation of Trimble, the court judges current-client conflicts as of the filing of the motion to disqualify. At that time Davidson was representing both Trimble Transportation and PerDiem. Also, because the district court case was litigated in California, California professional responsibility rules control conflict situations.


          Despite my misgivings noted above, this appears to be the right outcome. Representing a client is a pledge of loyalty that is not easily set aside.

        • Software Patents

          • Prior art found for Blueprint IP

            Unified is pleased to announce the PATROLL crowdsourcing contest winner, Rakon Nahar, who received a cash prize of $1,000 for his prior art submission for U.S. Patent 8,089,980, owned by Blueprint IP Solutions, LLC, a subsidiary of well-known NPE, IP Edge, LLC. The ‘980 patent was acquired as part of a larger portfolio originating with Siemens, was used in an assertion campaign that started in March 2019 over a network redundancy patent, and has been asserted in district court litigation against various companies.

            To help the industry fight bad patents, we have published the winning prior art below.

          • iLife Technologies, Inc. v. Nintendo of America, Inc. (N.D. Tex. 2020)

            With the eligibility rubric of Alice v. CLS Bank, an applicant/patentee must navigate a minefield of pre-issuance and post-issuance validity challenges under 35 U.S.C. § 101 in order to obtain and enforce a patent.

            First, through clever drafting, the applicant must convince a U.S. Patent and Trademark Office (USPTO) examiner to not raise a § 101 rejection during prosecution. If one is raised, the applicant has to persuade the examiner, through amendment or argument, to withdraw it. If the examiner remains unpersuaded, an appeal to the USPTO’s Patent Trial and Appeal Board (PTAB) must serve that function. Failing that, appeals to the Federal Circuit (which applies a highly-unpredictable eligibility analysis) and even the Supreme Court (which has not found a patent eligible since 1981) are possible. To be fair, it is unlikely that the high Court will grant certiorari on a § 101 issue these days, as we have recently seen.

            Once issued, the patent might be able to be pulled back into the PTAB for a Post-Grant Review (PGR) or a Covered Business Method (CBM) Review. In addition to that, enforcement proceedings in a district court can subject the patent to further invalidity challenges under § 101 on the pleadings and at summary judgment. If the district court’s § 101 decision is appealed, the patent then has to survive said eligibility analysis of the Federal Circuit, the decision of which could potentially be further appealed to the Supreme Court with said unlikely chance of being heard.

            Only once these avenues have been exhausted can the patentee relax and use the surviving patent to enjoin a party from practicing the claimed invention or to seek damages therefrom without the specter of § 101 hanging over the proceedings (this specter is one of stock horror-movie fare — pale complexion, chunks of missing flesh, sharp claws — quite non-abstract, if you will). And yes, the patent also has to be found novel, non-obvious, properly specified, and infringed.


            Consequently, the Court ruled the ’796 patent invalid under § 101 as a matter of law, effectively rendering the jury verdict moot.

            For anyone following § 101 jurisprudence, a quick glance at claim 1 was probably enough to provide an educated guess for which way the Court was going to rule. Recent § 101 opinions from the Federal Circuit have repeated found that claims lacking in technical detail — ones that recite what an invention does rather than how the invention accomplishes its goals — are generally abstract. This is not the dictionary definition of the word “abstract,” but instead a legal fiction that a concrete and tangible invention can be invalid if it is defined in terms of its outcome rather than the process used to achieve that outcome.

          • Supporting Amendment to 35 U.S.C. Section 102(a) Clarifying Public Disclosure

            Intellectual Property Owners Association (IPO) Board has proposed a “clarifying” amendment to Section 101(a)(1) of the Patent Act:


            EPC Art. 54. Note that 54(1) and 54(2) are parallel to 35 U.S.C. 102(a) while 54(3) is parallel to 102(a)(2) which the IPO does not propose to change. Regarding these secret prior patent application filings identified in 54(3) and 102(a)(2); the European approach is broader than the US in some ways because it creates prior art even when the prior filing is the same inventor / owner; at the same time, the European approach is narrower than the US because 54(3) prior art does not apply to the inventive step (obviousness) analysis.

      • Trademarks

        • Hästens Sängar fails in trade mark application concerning its chequered figurative mark

          Starting from the perception of the relevant public (collectively agreed to be the general public of the EU), the Court emphasised the need to assess whether the mark applied for was unrelated to the appearance of the goods.

          It was apparent that the classes of goods and services applied for could be made from fabric bearing the pattern or contain fabric parts which might represent or bear the pattern constituting the mark applied for.

          The Court drew on Louis Vuitton Malletier v OHIM – Nanu-Nana (T-359/12 and T-360/12 (IPKat analysis here), concerning the representation of Vuitton’s chequerboard pattern. As affirmed in that case (and in accordance with earlier case law), the more closely the shape for which registration is sought resembles the shape most likely to be taken by the goods in question, the greater the likelihood of the shape being devoid of distinctive character is. Whilst that case law had been developed in relation to 3D trade marks consisting of appearance the goods themselves, the Louis Vuitton case highlighted that it would equally apply to figurative marks consisting of a 2D representation of that product. As such, a figurative mark consisting of a part of the shape (or characteristic) of a product could not be considered unrelated to the appearance of the goods covered by the mark.


          It is interesting to see Hästens Sängar’s mark back on the IP scene, this time in relation to a different type of IP protection. Hästens Sängar previously unsuccessfully applied to the US Copyright Office for protection of a very similar mark, referred to as a “repeating 2-dimensional fabric pattern”. It therefore serves as a good example of how protection can be sought for (virtually) the same mark in various ways, yet still fail to do so (due to a lack of distinctiveness or a lack of originality).

          As a side note, this case may also be seen to contribute to wider questions raised around the effectiveness of the EU court system. This Kat couldn’t help but be reminded of a point raised by Sir Robin Jacob when he gave his keynote speech at the JIPLP-GRUR Joint Conference in December 2019. When asked whether there could be any improvements to the EU system, he raised the three stage appeal process for trade mark decisions. In retrospect, the General Court Hästens case was, in effect, a reiteration of all of the remarks made by the Board of Appeal, which nonetheless made a reappearance before the EU courts. To a seasoned trade mark expert, the mark was unlikely to achieve the protection sought.

          Obviously, the EU court system is not something that can be changed overnight, nor does this Kat think that this will happen anytime soon. Even so, this acts as an apt illustration of how the process of trade mark registration has the potential to be improved.

      • Copyrights


Don’t Let the Collapse of News Companies Be the Collapse of Information (or Ascent of Misinformation)

Posted in Deception, Finance at 9:15 am by Dr. Roy Schestowitz

As journalism and reporters jump ship (or jump the shark or get fired) the public may suffer informational homelessness and resort to/rely on any random piece of propaganda on the Web, in social (control) media, or YouTube

Old boat

Summary: We’re growingly concerned that the collapse of the mainstream media will entail reliance not on reliable and independent alternatives but corporate marketing agencies, charlatans and frauds, sometimes even deliberate falsehoods and state-manufactured bogus stories

THE ‘news’ houses were never brilliant. Their rich owners had agenda and they were always tempted to use these houses to propel them to power (or greater power). We see that a lot in presidential campaigns.

On homelessness; Someone's ShelterBut their collapse entails a certain risk — the risk that something even worse would capitalise on the new vacuum and general distrust/dissatisfaction. Plenty of people nowadays immerse themselves in YouTube videos with so-called ‘influencers’ who are actually marketers. We previously remarked on the downside of social (control) media and the opportunists who thrive in lying, partisan media (which can be akin to tabloids and more shameless about its biases). Think of the likes of Fox ‘News’ (Faux Noise).

In 2020 we’ve repeatedly noted that journalism about the European Patent Office (EPO) is more or less dead. António Campinos and Battistelli more or less ‘pacified’ their critics using bribes and threats. A decade ago we still saw many articles about the harms of software patents in Europe; we have found a single such article… in years! As for 35 U.S.C. § 101 in the US, well… guess whose narrative dominates the media, eh? Of course the law firms’.

“In 2020 we actually spend a lot of time on each article as we work to ensure that we cover things 100% accurately.”We believe — but are happy to be proven wrong — that Techrights is one of the last if not the last to speak about these issues routinely. We specialise in this topic because long ago we identified the gap (in media coverage). Sometimes someone needs to speak for software developers and speak truth to power. The ‘old’ media certainly isn’t doing that and it arguably isn’t equipped financially to deal with detailed, long-term investigations. Instead it based entire articles on a Trump ‘tweet’ or Twitter ‘trending’ or some daily outrage, which is likely based on a misrepresentation or mob mentality (see what happened to Richard Stallman last year; the media still occasionally mentions this in 2020). In 2020 we actually spend a lot of time on each article as we work to ensure that we cover things 100% accurately. The accuracy can be assurd with evidence, which sometimes we keep private in order to protect sources. We also leave additional evidence in IRC (sometimes anonymised or partly redacted), where readers can always dig for additional information, views, opinions, and analysis. It’s not so well structured, not always coherent, but it is there and it is publicly accessible. We do not hide the gory details, we only demote them a little.

When Police Gets in the Way of Investigations, Having Used Microsoft Products to Investigate Microsoft Issues

Posted in Bill Gates, Microsoft at 9:15 am by Dr. Roy Schestowitz

An update on our biggest investigation in recent years (conflict of interest may be an obstacle)

Seattle police website
We might soon issue a broader call for further requests

Summary: In this long article we outline barriers we’ve come across in pursuit of information from the police (the pedophilia arrest at the mansion of Bill Gates — followed by conviction and arrest — has thousands of pages about it, but since September the police has shared not even one!)

IT MAY seem like we’ve gone quiet lately, as not many articles were published over the past week. But the reality is, we work hard on bringing exclusive stories. We also carefully fact-check to avoid publishing falsehoods, unverified claims, and nutty conspiracies (right now there are many rumours about Bill Gates in relation to the Coronavirus).

As of this moment, we work with a number of sources and collaborators. We also look forward to next month’s update from Seattle PD, albeit we don’t expect much from them (based on past experiences). We’d rather wait than publish speculative material.

As of this month/year, there are at least 2 relevant queries with the PD. It is difficult to know for sure how many exactly. If things slow down or momentum is altogether lost, we’ll encourage more queries (or petitions). For now, it seems strategically wiser not to over-encumber a department which claims that it is already understaffed (it said so a few months back). We’ve already received an informal commitment from victims of ephebophiles. They too may be submitting requests shall that accelerate the process (the PD asks the petitioners if they’re personally harmed, which might speed things up compared to queries from journalists).

“We’ve already received an informal commitment from victims of ephebophiles. They too may be submitting requests shall that accelerate the process (the PD asks the petitioners if they’re personally harmed, which might speed things up compared to queries from journalists).”Various weird things have happened in recent months. One day we’ll share all the details and that’s a promise (it seems like there are subtle efforts to intimidate and discourage the curious). Several Techrights associates have been made aware of these things and are also well aware of the Seattle PD thing, as well (case IDs and communications). We’ve circulated parts of the timeline privately. So we are backed up, so to speak. Too many people are now involved for further exploration to be completely scuttled. If it takes the whole year, so be it. But we’ll insist on getting answers. We’ve been diplomatic about it and the communication with the PD is amicable, polite, and professional.

Suffice to say, if they continue to stonewall (blatantly or subtly), especially if this is done repeatedly, they can be publicly accused of aiding abusers. If they’re aware of this, which we presume they are, they will release something… the question is, how much? Any redaction can leave more questions than answers. This much too they should know. They need to reassure the public that they are being transparent and honest. We adopt “presumption of innocence” (the principle) here as anything else can lead us astray. We try to remain as patient as possible, even when it is hard. They’re seemingly hiding, postponing, then they claim to be redacting, then they say they got stuck, then again they merely fetch and open files (again). Some inconsistencies in the explanations can easily suggest that they’re coming up with excuses. We’re almost in February and the whole process started way back in September, so right now we’re not far from 6 months (half a year) merely ‘stuck in the process’ with not a single document/page emitted. Batch processing is being considered right now, at the very least as a contingency (several pertinent requests for smaller documents).

“We’re almost in February and the whole process started way back in September, so right now we’re not far from 6 months (half a year) merely ‘stuck in the process’ with not a single document/page emitted.”Our investigation has thus far attracted attention not just from dodgy circles but also respectable ones, such as best-selling authors. It’s extremely important to maintain a high level of accuracy, precision and preferably concision too. This is why we’ve left this part out of the “Mansion of Pedophilia” series (we’ve relegated some bits to appendix status).

So far we’ve seen no complaints anywhere about this Gates series. Nobody has pointed out inaccuracies and we’ve received positive feedback from past Microsoft employees. They are interested in the subject. They want to know more about the person whom Microsoft treats like an oracle and Wikipedia mostly describes as a Saint whilst linking (as citations) articles composed by Bill Gates-funded sites. PR or perception management create a growing disparity between reality and public opinion.

“So far we’ve seen no complaints anywhere about this Gates series.”Let’s consider this article entitled “1 of 3 elderly Seattle brothers sentenced to 9 months in child-porn case”. The Bill Gates-funded Seattle Times published it not too long ago. We’ve been passed the following response to it in earlier phases of the investigation. About the above article it said:

Good luck! Kudos! Seattle/King County ❤️ Pedos. Only 1 of these demons got 90 days for molesting, producing, and distributing…

A cop friend of mine told me that it’s not necessarily unusual for the elite/rich class to be treated better than the average citizen and get their arraignments scheduled up to a year later. He said that when departments are afraid of being sued they are less likely to risk losing their case and will release them first and send them a notice to appear in court through mail at a later date. Anyone else and it’s automatic detention and a bail is set. He also told me that as soon as the guy was arrested it would have been public record. Different local areas report crimes on a weekly basis, commonly. I’m not sure if he was booked that day or not and I could not find any local blurbs about an arrest or search of his apartment. Also not sure if it would have been mentioned where the arrest took place but its common for warranted searches and arrests to be published in local news. I don’t know if that happened or if any mention of Gates or Gates’s home would have been in that, if it was. Which could be a practical reason why media didn’t pick up on it (I don’t think so – but considering giving the benefit of the doubt.)

I thought I’d ask him about it so I don’t come off as being unreasonable in any of my suspicions or questions when writing on it.

We’ve come across similar explanations (see recent reporting by ProPublica) for why the IRS isn’t going after or seeking to prosecute the very rich. They’re afraid of lengthy legal battles and expensive lawyers. ProPublica recently covered this in relation to Microsoft's massive tax evasion. We will revisit the subject soon, but it’s worth noting that Gates himself evades tax using his so-called ‘charity’; we wrote many articles about this in the past. The key point is, authorities are typically reluctant to hold the powerful accountable as it’s perceived as risky and cumbersome (it’s a lot easier to ‘clock’ big numbers by going after the vulnerable in bulk). That applies to the IRS and also to police departments. It’s actually common knowledge… for decades if not centuries.

“The key point is, authorities are typically reluctant to hold the powerful accountable as it’s perceived as risky and cumbersome (it’s a lot earlier to ‘clock’ big numbers by going after the vulnerable in bulk).”So far we’ve been focused on the police, albeit the court system too is being explored (there are court documents); there too there’s a fear of prosecuting the powerful and judges aren’t immune to bribery, fixing of appointments and other forms of mischief/corruption.

Eric Lundgren’s case — a relatively recent case — potentially shows an example of it. We covered that in:

We might revisit the above series in the future as we’re particularly interested in material from the court and evidence of a ‘fixed’ decision. Eric Lundgren once told us he’d pass over some documents; we’ve since then forgotten about it, but it’s still in the list of stories to work on. We have a bunch of stories in the making, some with about a year’s worth of notes having already accumulated (source protection remains the top concern associated with publication). Techrights (TR) is exceptionally strict when it comes to source protection and none of our sources ever got caught. We intend to keep that perfect record, even if that means not publishing some stories (at least not as quickly as possible).

“So far we’ve been focused on the police, albeit the court system too is being explored (there are court documents)…”“It may TR’s most high profile series to-date,” one person told us about the Gates series. “Be sure to dot all the Is and cross all the Ts. If it has results it will be good in and of itself. If it also brings people around regarding software freedom and about fighting software patents, then that is icing on the cake.”

“Again,” the person noted, “I wonder if any group would be willing to FOIA the licensing for the SPD [Seattle PD] computers, both desktops and servers and “cloud”. That would enable them to find if Microsoft has full access to the data and potential to interfere at that level.”

“The concern may seem legitimate if and only if the police has some very incriminating material about Microsoft or top-level people at Microsoft.”The person suggested making further inquiries, asking the police what systems it uses, including the pertinent details such as licenses. “And by licenses,” said this person, “I mean all the licenses for all versions and each update. It will be a thick stack but buried in there will be payloads allowing Microsoft to access and mess with the systems and the data they contain.”

The concern may seem legitimate if and only if the police has some very incriminating material about Microsoft or top-level people at Microsoft. The temptation is always there. What can one do about police departments that use software with remote access (or back doors) for those whom they investigate? Similar scenario to what happened to the US Senate a few years ago (the CIA broke into the systems to hinder an investigation of CIA abuses, then admitted that).

We’ve long argued that police departments must remove all Microsoft technologies from their infrastructure because they must maintain complete control, a total autonomy. It cannot be “Police… brought to you by Google” or “Police… in partnership with Microsoft…” (like Microsoft storing all police footage for TASER International, now known as Axon).

Microsoft does not belong in police departments as it gives Microsoft unjust power/control over sheriffs, various police chiefs and cops. See for example any of the many stories from TechDirt about police abuse of this kind. It’s a lot more common than people care to realise. If it’s possible, then it almost inevitably be done at some stage by somebody.

“We’ve long argued that police departments must remove all Microsoft technologies from their infrastructure because they must maintain complete control, a total autonomy.”The person has incidentally shared this report (“Microsoft defends its right to read your email”). “The 2014 link about Microsoft reading e-mail is relevant to the the ongoing FOIA requests,” this person asserted. “The requests have been held up for many months due to machines which Microsoft controls and a second FOIA request for the thick sheaf of licenses for all versions of all Microsoft software on PD computers will prove that (IMHO).”

We should note that all E-mails associated with our investigation (about half a dozen people) are encrypted. All of them. But all communications with the police are not encrypted, so outsiders including some technology companies might be seeing what isn’t public. It gives them an intelligence advantage.

It would be useful to know who can read internal and outward (to the various members of the public) communications of the police department. Or what software they use for communications (as that software too can report back to vendors). So we might sooner or later ask about the software they use. “Assuming they would at all divulge such a list if asked,” I told the person, having added that “[i]t would likely only alienate and undermine the ongoing queries (we can put in more, but not yet…)”

“It would be useful to know who can read internal and outward (to the various members of the public) communications of the police department.”There are various different issues we’ve identified as we continue to pursue these thousands of pages from the police.

About the Microsoft scandals (confirmed, caught in the act) associated with snooping on mail, more can be found in the CNN article. “The gist is that back when they were caught rummaging through the mail,” our reader explained, and “they made a press release saying that they wouldn’t do that anymore … unless they decide they need to again. It was a real “sorry, not sorry” type of apology.”

“Just an additional note that all this could prove initially would be a conflict of interest. Unfortunately due to current US politics, the public has become inured to such and would even ignore strong evidence in its place, were it available. But it will not be available because Microsoft products are designed with plausible deniability all the way through. So conflict of interest would most probably be all that can be proven.”

Guest Post: Free Software is About Software Ownership

Posted in Free/Libre Software at 5:17 am by Guest Editorial Team

By Jagadees

Wake up

Summary: “In effect, companies will lose control and profit. Will they accept that?”

“Free software” is a confusing name/term. The “free” here means freedom. So it is freedom software. But to exercise freedom you need something more. What is that? You have to own the software. Therefore, free software is about ownership of software.

All software is free software for its owners

Take any software. Who owns that software? User, seller, developer, lawyer or whoever it is, if they have the ownership of some software, then that software is a free software for him/her/them. Majority of software/programs used nowadays are owned by software companies. So we can say majority of software/programs are free software for those companies.

Private software

These companies can sell software, modify software, share, or ‘open’ their software. They can have or exercise full rights over it. Others — including users — have limited ownership; only things which are allowed by the owner/company. In other words, these software programs are privately-owned software. So let’s call them private software.

Problems with private software

“Majority of software/programs used nowadays are owned by software companies.”There are lots of issues with private software. As a user, you can only run the software if you’ve paid the license fee. You cannot use it in a different way from what they they allowed (for example, a 10-user licensed software cannot be used by 11 users). You cannot give it to a friend. You cannot modify anything in there. You cannot know what the software does behind the scenes. The list goes on.

Public software

Because of all these issues, in 1983 a person named Richard Stallman began a movement. Its aim was to give full control, full rights and full ownership of software to the person who uses it. That was the Free Software Movement. At that time it was an Utopian idea. Nobody cared for it. But because of his and his group’s persistence and commitment they could made it a reality. So software got public ownership. That is Free software. Let us call it public software.

Impact of public software

What will happen if the public gains ownership of software? Then, no private person can control software.

- Cannot sell copies of software.
- Companies can charge a price for software (maximum) only one time.

In effect, companies will lose control and profit. Will they accept that?

“In effect, companies will lose control and profit. Will they accept that?”No way. Anything that that is publicly owned will cause reduction in profits of companies. Look around and learn about the idea of public education, public health care, public housing, and public utilities. So, they will find ways to destroy the idea of public ownership. If anything publicly owned is still existing, they will make it corrupt and finally dismantle it, because people are always distracted.

They know that if you attack anything directly, that will always strengthen that. Understand please, they have 10,000 years of history in ruling humankind. So to attack public software they’ve created decoys. Then they attribute some ideas of public software to those decoys and they’ve slanted the game. For all these ideas there’s no need for any secret conspiracy or anything like that. The system is self-sustaining. So it will work automatically. Whatever we do in this system, it only strengthen the system unless we’re consciously and purposefully doing something against it. Still, that also not 100% effective.

So instead of dealing with public software, i.e. Free software, they are playing with decoys. There are lots them now. Open Source (OSS), FOSS etc. are among the notable examples.

What do OSS and FOSS do?

They imitate the Free Software Movement. They turned the idea of public ownership of software upside down by ignoring the user or removing the user from the picture. They marked users as dumb and passive actors. (They appear only when talking about their dumbness, which means “user friendliness”.[joke]) Now, who is in the picture? It’s the software providers. Who are they? Programmers and mostly companies.

Then again, they introduced another twist. They hide companies. They put the spotlight on a poor, intelligent, isolated, expert programmer who is trying to save the world from some “xyz”. With these two twists they completely changed the narrative.

By hiding the user they removed the politics of ownership and rights of users. By hiding the companies as the main actors, they removed the profit motives and vested interests of companies. What a perfect decoy!

“They know that if you attack anything directly, that will always strengthen that.”From 1998 onwards they not only started but exacerbated this. Since companies are backing them they have had huge funds, they could literally buy all media, pundits and of course the idiot developers. Now all these developers are doing Gig 2.0, which means unpaid voluntary work for companies, dreaming that their code is saving the planet (which actually is destroyed it by the same masters themselves). Media is flooded with their narcissistic “success” stories. These high-end organised works may have completely destroyed the Free Software Movement within its founder’s lifetime.

First-generation Free software activists retired. Second-generation Free software activists are in the OSS/FOSS trap. Third-generation Free software activists actually don’t know what Free software is. These people think that the OSS/FOSS things are the movement. The bad things these companies are doing stomped/stepped on the movement, too. They fired the founder from his own organisation. But there is a complete silence from these kids. They are busy writing gratis code for the masters. This is the situation now.

Wake up, Free software friends

This is nothing new. Think about the Great Depression. People suffered a lot. They politically organised and forced the person in charge to implement their demands. The New Deal era began. Then what happened to it? Gradually it got destroyed, causing another great depression in 2008. So, if we loosen our attention a little bit, they will turn things upside down in their own favor. Same thing has happened to the Free Software Movement, too.

“So to attack public software they’ve created decoys.”Software freedom is like democracy. Initially it was just ‘there’, albeit only for white land-owning men. There were other people and they protested to get representation. With a long struggle — one by one — new groups got chances in democracy.

Like the above, nowadays software is only free for the private owners. We cannot let this current status quo continue. We have to fight to get the ownership and rights. We have to end this rebranding of Free software by OSS/FOSS kind of ‘corporate pimps’. So let’s work for a strong software freedom movement that empowers users as well as developers.

Long live the GPL.

Note: This is part of the software freedom series. To see all posts please go to Neritam.

IRC Proceedings: Monday, January 27, 2020

Posted in IRC Logs at 2:56 am by Needs Sunlight



#techrights log

#boycottnovell log



#boycottnovell-social log

#techbytes log

Enter the IRC channels now


Links 27/1/2020: Linux 5.5 is Out, Work on Linux 5.6 Commences, New Solus and Award for Andrew Tridgell

Posted in News Roundup at 3:06 pm by Dr. Roy Schestowitz

  • GNU/Linux

    • Desktop/Laptop

      • Kubuntu Focus Linux laptop now available (for $1800 and up)

        The Kubuntu Focus is a premium notebook with a 16.1 inch display, an Intel Core i7-9750H hexa-core processor, and NVIDIA RTX graphics. But the most unusual feature is that rather than Windows, it ships with Kubuntu — a version of Ubuntu Linux with the KDE desktop environment.

        First announced in December, the Kubuntu Focus is now available for purchase, and it should ship in early February.

        The notebook has also received a bit of a price cut — rather than starting at $2300 as originally planned, there’s now a more affordable entry-level model with a $1800 price tag.

      • Kubuntu Focus KDE Laptop Launches New $1,795 USD Base Model

        Formally announced earlier this month was Kubuntu Focus as the most polished KDE laptop we’ve ever tested. Besides offering a great KDE desktop experience, the Kubuntu Focus offers high-end specs while now there is a slightly cheaper base model introduced.

        The Kubuntu Focus is great for a KDE laptop, but the former base pricing of $2,395 was a bit tough to swallow for some. The Kubuntu Focus crew has now introduced a new $1,795 USD base model that while still pricey is a bit easier to manage in comparison to other high-end laptops.

    • Server

      • IBM

        • Broadridge Signs With IBM For Greater Cloud Capabilities

          Red Hat, which IBM acquired in 2018 is the most pervasive container solution on the planet today, said Schlesinger.

          “It allows us to containerize our apps and then allows us to run them on any cloud unchanged, whether our private cloud, Azure, AWS or IBM.”

        • IBM Power-based cloud instances available… from Google

          IBM and Google may be competitors in the cloud platform business, but that doesn’t prevent them from working together. Google is partnering with IBM to offer “Power Systems as a service” on its Google Cloud platform.

          IBM’s Power processor line is the last man standing in the RISC/Unix war, surviving Sun Microsystems’ SPARC and HP’s PA-RISC. Along with mainframes it’s the last server hardware business IBM has, having divested its x86 server line in 2014.

          IBM already sells cloud instances of Power to its IBM Cloud customers, so this is just an expansion of existing offerings to a competitor with a considerable data center footprint. Google said that customers can run Power-based workloads on GCP on all of its operating systems save mainframes — AIX, IBM i, and Linux on IBM Power.

    • Audiocasts/Shows

      • Linux Action News 142

        The real reason Rocket League is dropping support for Linux, Wine has a massive release, and the potential for Canonical’s new Android in the cloud service.

        Plus, our take on the FSF’s Upcycle Windows 7 campaign, and the clever Chrome OS strategy upgrade for education in 2020.

      • Open Source Security Podcast: Episode 180 – A Tale of Two Vulnerabilities

        Josh and Kurt talk about two recent vulnerabilities that have had very different outcomes. One was the Citrix remote code execution flaw. While the flaw is bad, the handling of the flaw was possibly worse than the flaw itself. The other was the Microsoft ECC encryption flaw. It was well handled even though it was hard to understand and it is a pretty big deal. As all these things go, fixing and disclosing vulnerabilities is hard.

      • GNU World Order 337

        The **acct** command from the Slackware **ap** software series.

      • Podcast.__init__: Simplifying Social Login For Your Web Applications

        A standard feature in most modern web applications is the ability to log in or register using accounts that you already own on other sites such as Google, Facebook, or Twitter. Building your own integrations for each service can be complex and time consuming, distracting you from the features that you and your users actually care about. Fortunately the Python social auth library makes it easy to support third party authentication with a large and growing number of services with minimal effort. In this episode Matías Aguirre discusses his motivation for creating the library, how he has designed it to allow for flexibility and ease of use, and the benefits of delegating identity and authentication to third parties rather than managing passwords yourself.

    • Kernel Space

      • Linux 5.5
        So this last week was pretty quiet, and while we had a late network
        update with some (mainly iwl wireless) network driver and netfilter
        module loading fixes, David didn't think that warranted another -rc.
        And outside of that, it's really been very quiet indeed - there's a
        panfrost driver update too, but again it didn't really seem to make
        sense to delay the final release by another week.
        Outside of those, it's all really tiny, even if some of those tiny
        changes touched some core files.
        So despite the slight worry that the holidays might have affected the
        schedule, 5.5 ended up with the regular rc cadence and is out now.
        That means that the merge window for 5.6 will open tomorrow, and I
        already have a couple of pull requests pending. The timing for this
        next merge window isn't optimal for me - I have some travel and other
        things going on during the same two weeks, but hopefully it won't be
        all that noticeable.  But there might be random timezones, odd hours,
        and random delays because of that. I try to avoid scheduling things
        during the merge window, but hey, it doesn't always work out, and I'd
        have to delay things by two weeks to avoid the conflicts, which just
        doesn't seem worth it.
        Particularly since it's not necessarily going to be a problem to begin
        with. We'll see.
        Anyway. Go out and test 5.5, and start sending me those pull requests
        for all the new development that is ready,
      • Linus Torvalds Releases Linux Kernel 5.5 With Better Feature

        Insight: Linus Torvalds Releases Linux Kernel 5.5 With Better Hardware Support

        Founder of Linux, Linus Torvalds releases Linux Kernel 5.5 with tons of new features. Linux 5.5, named Kleptomaniac Octopus has better hardware support.

      • The 5.5 kernel is out

        In the end, Linus decided to release the 5.5 kernel rather than going for another prepatch. “So despite the slight worry that the holidays might have affected the schedule, 5.5 ended up with the regular rc cadence and is out now.”

      • Linus Torvalds Releases Linux Kernel 5.5 With Better Hardware Support

        With the regular milestone of Release Candidate (rc7), Linus Torvalds has announced the first stable release of the Linux kernel 5.5 for the general public.

        Apart from the last-minute network driver fixes, Linux 5.5 includes various improvements for security, the new and upcoming hardware platforms such as Raspberry Pi 4, Intel processors, and Chromebooks.

      • Linux 5.5 Released With Many Hardware Support Improvements
      • Linux 5.5 Release – Main Changes, Arm, MIPS and RISC-V Architectures

        Linux 5.5 has just been released by Linus Torvalds…

      • Linux Kernel 5.5 Officially Released, This Is What’s New

        The Linux 5.5 kernel series is now generally available. Here are some of the new features and improvements.

      • Linux kernel 5.5 [in Sparky Linux]

        The first release of the Linux kernel of the new 5.5 line landed in Sparky “unstable” repository.


        Then reboot your machine to take effects.

        To quick remove older version of a Linux kernel, simply run APTus-> System-> Uninstall Old Kernel tool.

      • Linux 5.5 Released

        Linus Torvalds has announced Linux 5.5 release, codenamed as Kleptomaniac Octopus.The latest version of the open source operating system kernel brings RAID1 with 3- and 4- copies to btrfs filesystem, ext4 gets direct I/O via iomap together with fscrypt supporting smaller block sizes, and you can now use SMB as root filesystem. AMD OverDrive overclocking is now supported on Navi GPUS, wake-on-voice on newer Google Chromebooks is now supported. Added was a Logitech keyboard driver. KUnit is a new unit testing framework for the kernel. There are many more new features which you can read about on Kernel Newbies changelog page. For downloads visit The Linux Kernel Archives.

      • 10 Best Features in Linux 5.5, Out Now

        Serving as the latest stable version of the Linux kernel, the Linux 5.5 release was announced on the Linux Kernel Mailing List (LKML) by Linus Torvalds, who said: “Despite the slight worry that the holidays might have affected the schedule, 5.5 ended up with the regular [release candidate] cadence and is out now.”

        He goes on to describe the release as being “really tiny” — make of that what you will — and has named it “Kleptomaniac Octopus”.

        Linux 5.5 is likely to be included in the upcoming Ubuntu 20.04 LTS release, which is due for release in mid April. This kernel version will also be back-ported to Ubuntu 18.04 LTS later in the year as part of the Ubuntu HWE stack.

        If you want to install the mainline kernel on Ubuntu or another Linux distribution right now you can — but doing so is not recommended, comes with no support, and may break your system (but don’t worry: you get to keep both halves if it does).

      • Andrew Tridgell and Genevieve Bell awarded Australia Day honors

        Dr Andrew James Tridgell – know in the open source commmunity as ‘Tridge’ – has been awarded a medal in the general division of the Order of Australia (OAM).


        RSync is a powerful and ubiquitous file synchronisation utility that is an essential part of any Linux sysadmin’s toolkit, in part because it only synchs files that have changed and therefore makes it possible to sync without using unnecessary network resources,

        Samba is a free implementation of Server Message Block that underpins Windows networking. Samba runs on Unix-like systems and its mere existence was a huge factor in the rise of Linux as it allowed the open source OS to more easily integrate with Windows servers.

        Both RSync and Samba are very, very, widely used – it’s not a stretch to say they’re both crucial underpinnings of modern computing.

      • Well done Tridge! – Medal of the Order of Australia

        In our world, we know Dr Andrew Tridgell as simply Tridge, his groundbreaking work in the software world has been recognised by the Australian Government.

        He has been awarded the Medal of the Order of Australia in the 2020 Australia Day honours list. This medal is given for service worthy of particular recognition

        Just one of his interests has been CanberraUAV. They have been the team to beat at the Outback Challenge, the worlds greatest drone competition for several years and Tridge and his team have shared all their work. Something Tridge is passionate about.

      • Linux 5.6 Is Looking Like It Will Be Spectacular With A Long List Of Features

        Linux 5.5 is likely to be released later today and with that are many new features. But as soon as 5.5 is released it marks the opening of the Linux 5.6 merge window and this next kernel has us particularly exciting… It’s certainly shaping up to be one of the most exciting kernel cycles in recent times with many blockbuster features and improvements.

      • Linux 5.6 “HWMON” Changes Sent In With Big AMD Improvements

        Following the Linux 5.5 kernel release one of the first pull requests sent in is for the hardware monitoring “HWMON” subsystem updates. Dominating the HWMON interest this cycle is a long overdue SATA temperature monitoring driver and vastly improving the k10temp driver for AMD Zen desktop and server CPUs.

        The SATA drive temperature driver for capable Serial ATA drives is long overdue. This generic driver allows reporting SATA drive temperatures via the kernel using existing HWMON infrastructure, unlike existing tools running in user-space and requiring root access just to read SATA drive temperatures… Way long overdue especially with Linux 5.5 having already merged its equivalent NVMe drive temperature driver. Plus now integrating nicely with all the Linux utilities polling the exposed HWMON sensors.

      • The Initial AMD Family 19h Support Sent In For Linux 5.6 EDAC Driver

        SUSE’s Borislav Petkov sent in the (Reliability, Availability and Serviceability) updates for the Linux 5.6 kernel on this first day of the new merge window.

        Notable to the RAS pull is the AMD Family 19h support in the AMD EDAC driver. Up to now Zen / Zen+ / Zen 2 has been Family 17h CPUs but for Zen 3 and beyond it’s looking like it will be treated as Family 19h. With Linux 5.6 this early enablement is underway beginning with their memory EDAC (Error Detection And Correction) driver code.

      • Linux 4.19.99
      • Linux 4.14.168
      • Stable Kernels: Linux 5.4.15

        I’m announcing the release of the 5.4.15 kernel.

        All users of the 5.4 kernel series must upgrade.

        The updated 5.4.y git tree can be found at:
        git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.4.y
        and can be browsed at the normal kernel.org git web browser:


    • Benchmarks

      • Monitor and stress-test your Linux gaming PC with GtkStressTesting

        Monitoring your Linux gaming PC is pretty easy, there’s some good applications out there to keep an eye on CPU use and more but what about some stress testing to see how it holds up? GtkStressTesting seems nice.

        The developer, Roberto Leinardi, who also made GKraken (control the cooling (and soon also the lighting) of a NZXT Kraken X) and GreenWithEnvy (controlling NVIDIA fans and overclocking on Linux) emailed in about GtkStressTesting. Originally called GnomeStressTest, they recently changed the name to GtkStressTesting along with a new release.

      • Stress Testing Your Linux System Just Got Easier

        The goal of GTKStressTesting (GST) is to put everything you need to know about your CPU, RAM and motherboard in one screen, complete with usage monitors, temperature sensors, and more.

        You can use the app to run some stress tests too, ideal if you want to see how specific bits of hardware hold up under heavy load. A small benchmark feature is also included, though the developer stresses (ho, ho) that this is ‘nothing too serious’.

      • Linux 5.5 SSD RAID 0/1/5/6/10 Benchmarks Of Btrfs / EXT4 / F2FS / XFS

        For this round of testing on a Dell PowerEdge server with dual EPYC 7601 processors were using four Samsung 860 EVO SATA 3.0 500GB drives for conducting these fresh solid-state drive RAID benchmarks. Off a Linux 5.5 Git kernel snapshot, EXT4, F2FS, Btrfs, and XFS were tested. The RAID modes were RAID0/RAID5/RAID6/RAID10 across the four drives plus results from a single drive as well.

    • Applications

      • List Of Top 7 Best Linux Firewall Software In 2020

        Despite of being secure operating system, Linux still needs some mechanism to strength it’s security system. One of the mechanism is firewall which protects Linux system from unauthorized network traffic or access.

        Basically, A firewall is a security system which monitors and controls incoming and outgoing network traffic. Firewall can be considered as a set of rules which monitors the data packets movement. It’s a wall between trusted network and untrusted network.

      • Deepin Music – a beautiful and simple music player

        I’ve reviewed a smorgasbord of open source music players. But there’s still quite a few I’ve yet to put through their paces. For this review, I’m looking at Deepin Music. The software bills itself as a “beautiful and simple music player that plays local audio. It supports viewing lyrics during playback, playing lossless audio, and playlist customization”.

        While the music player is designed for the Deepin Desktop Environment, it’s not tied to that environment. If you’re curious about Deepin Desktop Environment, it was featured in the survey of Best Linux Desktop Environments: Strong and Stable.

      • Joplin: The True Open Source Evernote Alternative

        If you like Evernote, you won’t be too uncomfortable with the open source software, Joplin.

        Joplin is an excellent open source note taking application with plenty of features. You can take notes, make to-do list and sync your notes across devices by linking it with cloud services like Dropbox and NextCloud. The synchronization is protected with end to end encryption.

        Joplin also has a web clipper that allows you to save webpages as notes. The web clipper is available for Firefox and Chrome/Chromium browsers.

        Joplin makes the switch from Evernote easier by allowing importing Evernote files in Enex format.

        Since you own the data, you can export all your files either in Joplin format or in the raw format.

      • The 20 Best Linux Debuggers for Modern Software Engineers

        Debuggers are a group of software used to analyze computer programs. They are very important from a software engineering point of view since they allow us to find problems in our code. There are several kinds of Linux debuggers, including memory debuggers, source debuggers, profilers, and so on. Common usage of these tools includes finding bugs, optimizing codebases, controlling runtime parameters, etc. Today, our editors have compiled a helpful resource outlining 20 of the best debuggers for Linux-based developers and software engineers. Take a look at them below to find out the perfect toolkit for your programming arsenal.

      • A big AppStream status update

        What actually was AppStream again? The AppStream Freedesktop Specification describes two XML metadata formats to describe software components: One for software developers to describe their software, and one for distributors and software repositories to describe (possibly curated) collections of software. The format written by upstream projects is called Metainfo and encompasses any data installed in /usr/share/metainfo/, while the distribution format is just called Collection Metadata. A reference implementation of the format and related features written in C/GLib exists as well as Qt bindings for it, so the data can be easily accessed by projects which need it.

        The software metadata contains a unique ID for the respective software so it can be identified across software repositories. For example the VLC Mediaplayer is known with the ID org.videolan.vlc in every software repository, no matter whether it’s the package archives of Debian, Fedora, Ubuntu or a Flatpak repository. The metadata also contains translatable names, summaries, descriptions, release information etc. as well as a type for the software. In general, any information about a software component that is in some form relevant to displaying it in software centers is or can be present in AppStream. The newest revisions of the specification also provide a lot of technical data for systems to make the right choices on behalf of the user, e.g. Fwupd uses AppStream data to describe compatible devices for a certain firmware, or the mediatype information in AppStream metadata can be used to install applications for an unknown filetype easier. Information AppStream does not contain is data the software bundling systems are responsible for. So mechanistic data how to build a software component or how exactly to install it is out of scope.

        So, now let’s finally get to the new AppStream features since last time I talked about it – which was almost two years ago, so quite a lot of stuff has accumulated!

    • Instructionals/Technical

    • Wine or Emulation

      • Wine Debugger Improvements Are On The Way, Start Of LLVM LLDB Support

        With Wine 5.0 having released and the Git tree back open for feature work, we’re quite looking forward to see what new material will land following this feature freeze that was in effect the past two months.

        One of the new patch series out by CodeWeavers’ Rémi Bernon is improving Winedbg, the Wine debugger. Winedbg is used for debugging Windows applications and among its many debug capabilities is a proxy mode for interacting with the GNU Debugger (GDB). It’s that GDB integration that is being improved upon while also starting to support LLVM’s Debugger (LLDB).

    • Games

      • Black Mesa 1.0 preview coming soon – still getting big improvements to visuals and the AI

        The finishing line for Crowbar Collective and their re-imaging of Half-Life with Black Mesa is almost in sight, with a preview of the full finished game to come soon. In a new announcement on Steam, they said it will be available to test as soon as it’s ready.

        Plenty of upgrades are still going in though, like an overhaul to the HECU AI so the soldiers you encounter around Black Mesa on cleanup duty will be a lot smarter. They now know to “lay down suppressing fire, flank your position, communicate more, throw grenades more effectively, use their MP5 grenade launchers, and more” which has me quite excited to see in action.

      • Chained Echoes an RPG in a world filled with Dragons and Mech suits – Steam page is up

        There’s a lot of sweet Linux games to look forward to, one of them being Chained Echoes. Set in a world where a Dragon is as common a sight as a mechanised suit flying around.

        Funded on Kickstarter and listed in our little overview of crowdfunded titles coming to Linux, the creator Matthias Linda announced that it now has a Steam page live where you can follow along. They also confirmed on Twitter, that the Linux (and macOS) releases are still planned. Another reminder of a quality-looking title coming to Linux.

      • Dawnthorn, a pixel-art ARPG standalone prequel to Hazelnut Bastille releases this year

        During the Kickstarter campaign for the upcoming Zelda-like ARPG Hazelnut Bastille, Aloft Studio let out their secret other project in an announcement called Dawnthorn.

        Acting as a standalone prequel to the unreleased Hazelnut Bastille, Dawnthorn is something their team worked on to prepare everything they needed for Hazelnut Bastille. This isn’t some small tech demo though, Dawnthorn will be a full-length game at around “12-15 hours to complete”.

      • Business and trading sim ‘Merchant of the Skies’ approaching full release – price to increase

        Merchant of the Skies, the mix of exploration and a base-building/tycoon game has improved a huge amount since the first few Early Access builds and the full release is coming closer.

        According to Coldwild Games, the final release patch will be released in March or April adding “A LOT” of story content and a “fully fledged missions/campaign system”. With all the work that’s gone into crafting this very sweet game, they’re upping the price on February 15 by €5 (and whatever the equivalent turns out to be for everyone else so around £5/$5 extra).

      • Dying Light turns five years old, send Zombies flying in the HyperMode event – big sale too

        Techland managed to create probably one of the best Zombie games ever with Dying Light, it’s currently heavily discounted again and it’s now hit five years since release.

        It was actually released on Linux same-day as Windows, something that was quite a surprise years ago for such a huge release. Sadly, it wasn’t in the best state but they eventually got there and it ended up as one of my favourite games on any platform.

        To celebrate the occasion, Techland has turned on the HyperMode in-game event. This is where you’re as strong as Superman, sending Zombies flying as you punch and kick. Additionally, for this event Techland has also boosted XP gain and there’s person and global goals to hit to earn rewards.

      • Get ready to live a Life of Crime with Kingpin: Reloaded announced by 3D Realms – will be coming to Linux

        Kingpin: Life of Crime is being remastered with 3D Realms recently announced Kingpin: Reloaded bringing new life to the Quake II engine classic.

        Originally created by Xatrix Entertainment and published by Interplay Entertainment back in 1999, it’s being given a fresh look by Slipgate Ironworks with 3D Realms publishing who will be enhancing it with a new quest system, Ultrawide and 4k Support, classic and enhanced modes, controller support, a no violence mode (but all the profanity stays), multiplayer and more.

      • Rocket League Drops Linux and Mac Support But Won’t Refund Microtransactions

        Psyonix will stop supporting Rocket League on Mac and Linux in March, and while it’s offering refunds for the game, players are reportedly not getting reimbursed for microtransactions. Rocket League was just the second game to support full cross-platform play across all of its platforms, after Fortnite. That makes the end of support for Mac and Linux a big deal for players on those platforms, who don’t have as many options as players on consoles and PC.

        It’s not the first time that microtransactions have been at the center of a controversy in Rocket League. Last year, a movement against loot boxes picked up steam, leading to discussions about banning that form of microtransactions for being predatory and contributing to gambling addiction. Rocket League’s heavy use of loot boxes to deliver random cosmetic items to players put the game squarely in the crosshairs. Near the end of 2019, Psyonix eliminated loot boxes from Rocket League in favor of “blueprints,” which allowed players to see exactly what they were purchasing, but was again hit with criticism over their high prices.

      • ‘Rocket League’ To Drop Linux and Mac Support

        The announcement says their final patch “will disable online functionality (such as in-game purchases) for players on macOS and Linux, but offline features including Local Matches, and splitscreen play will still be accessible.”

        “Players on Mac can try running Rocket League on Windows with Apple’s Boot Camp tool,” explains a support page, while adding in the next sentence that “Boot Camp is not something Psyonix officially supports.” And if you play Rocket League on Linux, “you can try Steam’s Proton app or Wine. These tools are not officially supported by Psyonix.”

        The support page also includes instructions on how to request a refund.

      • Refunds now available for Rocket League on macOS and Linux

        As online support for Rocket League on macOS and Linux is officially being pulled in March, players on those platforms can request a refund through Steam if they no longer wish to play the game.

        Regardless of whether you’ve owned the game for more than 2 weeks or have more than 2 hours of playtime logged, you can still request a refund. There are two ways to go about it.

      • Rocket League Mac and Linux players can get a refund

        Previously I wrote about Epic Games ending their support for Rocket League on macOS and Linux Platforms. The main reason behind this decision as Epic Games explained was that they both were not viable for them. Furthermore, Rocket League only multiplayer support was finished, players could still play in split-screen and other modes. Their support ending also meant that if the game went through some terrible buggy phase or anything else, they won’t try to fix it.

      • Psyonix Granting Refunds to Mac and Linux Rocket League Players

        Earlier this week, Rocket League developer Psyonix announced that it would be ending support for the Mac and Linux versions of the game. Although the platforms don’t have a particularly large player base, the developer claims it “cannot justify the additional and ongoing investment in developing native clients for those platforms”. For such cases, Psyonix is offering two alternatives: you can either continue online play on Windows, or you can claim a refund.

      • Rocket League players on Mac and Linux get refunds after dropped support

        Essentially, this meant that online modes would no longer be supported, but the game’s other modes would be playable. Unfortunately, multiplayer is pretty much integral to the experience, and as such, the lack of online options all but crippled Rocket League.

      • Rocket League PC, Mac, Linux Refund | How to get money back

        Following the news that the game will be dropping online support for macOS and Linux, Psyonix has confirmed that you will be able to receive a full Rocket League refund on the platforms. Read on to discover how to get a refund for Rocket League on PC, macOS, and Linux (SteamOS). Discover how to get money back from Rocket League if you no longer wish to play on PC, macOS, and Linux (SteamOS).

      • Rocket League ending Mac and Linux support because they represent “less than 0.3%” of active players

        Last week, Psyonix revealed they’re going to stop supporting Rocket League on Mac and Linux, ending the ability to use any of the online functions on those platforms. They explained that it was “no longer viable” to support Mac and Linux as they continued to upgrade the game with “new technologies”.

        This was a bit of a vague reason that naturally left a lot of fans asking questions – but now they’ve said they can’t justify upgrading the tech on platforms that house less than 0.3% of their active player base.

        In a post that went up over the weekend, Psyonix explained that, while there are a lot of reasons it makes sense for them to stop supporting the platforms, the biggest is incompatibility with tech upgrades they’re planning.

      • Rocket League Mac and Linux players can now get refunds

        Psyonix announced that it was dropping multiplayer support for the Mac and Linux versions of Rocket League last week, with the changes coming in early March. While the other modes will still be playable, multiplayer is a vital component of the car-ball romp, leaving its small community unimpressed—especially as there was seemingly no refund option. It looks like this was a miscommunication, however, and Psyonix has since clarified why it’s dropping support, as well as offering players refunds.

        DirectX 11 is the main reason Mac and Linux players won’t be able to play online, apparently. Rocket League is being updated from 32-bit to 64-bit later this year, as well as updating from DX9 to DX11. Unfortunately, this means DX9, which the Mac and Linux clients require for OpenGL, will no longer be supported. Psyonix claims that only 0.3 percent of Rocket League’s players use Mac or Linux, so it can’t justify spending time and resources on an alternative.

    • Desktop Environments/WMs

      • K Desktop Environment/KDE SC/Qt

        • Slimbook & Kubuntu – Combat report 12

          There we go. My Slimbook brings all the boys to the yard. And the thing is, it’s a very decent laptop. The overall feel has become more refined, part due to my tweaking and fine polishing touches, part due to updates and fixes introduced in the Kubuntu desktop. All in all, it’s fairly invisible, sitting in the background and doing its job.

          Now, technically, this could be a machine for everyone, but the problem is – applications. A generic Linux issue. There are some key programs that people expect and need, and are not available. Games, another big one. No matter how advanced and slick the operating system is, you can’t just plop a random Windowser, and expect them to have a transparent experience. But it’s pretty close. I’m quite pleased with how elegant Slimbook and Kubuntu are. Well, I guess that’s all for now. Bottom line: me happy. Annoyances? Yes, here and there. I hope they get sorted. Until the next report.

        • Qt LTS Releases To Be Restricted To Commercial Customers, Other Commercial Changes

          Moving forward, Qt Long-Term Support (LTS) releases will be restricted to commercial customers. All bug fixes will go into the public Qt development tree but the back-porting of fixes to Qt LTS branches will be restricted now to commercial customers. The Qt Company is hoping this move will make more companies become commercial customers in order to gain LTS access.

          Additionally, The Qt Company will now require Qt Accounts for downloading binary packages. This helps The Qt Company in tracking users and they say to “simplify distribution and integration with the [Qt] Marketplace.” Thankfully most Linux users get Qt via their distribution package management systems.

        • [Development] Changes to Qt offering
          Hi all,
          The Qt Company has done some adjustments to the Qt will be offered in the future. Please check out https://www.qt.io/blog/qt-offering-changes-2020 . 
          The change consists of three parts. 
          One is a change in policy regarding the LTS releases, where the LTS part of a release is in the future going to be restricted to commercial customers. All bug fixes will (as agreed on the Qt Contributor Summit) go into dev first. Backporting bug fixes is something that the Qt Company will take care of for these LTS branches. We’ve seen over the past that LTS support is something mainly required by large companies, and should hopefully help us get some more commercial support for developing Qt further.
          The second change is that a Qt Account will be in the future required for binary packages. Source code will continue to be available as currently. This will simplify distribution and integration with the Marketplace. In addition, we want open source users to contribute to Qt or the Qt ecosystem. Doing so is only possible with a valid Qt Account (Jira, code review and the forums all require a Qt Account).
          The third change is that The Qt Company will in the future also offer a lower priced product for small businesses. That small business product is btw not limited to mobile like the one Digia had some years ago, but covers all of Qt for Device Creation.
          None of these changes should affect how Qt is being developed. There won’t be any changes to Open Governance or the open development model.
          Best regards,
        • Qt 5.14.1 Released

          I am happy to announce we have released Qt 5.14.1 today. As a patch release, Qt 5.14.1 does not add any new functionality but provides many bug fixes and other improvements.

          Compared to Qt 5.14.0, the new Qt 5.14.1 contains around 220 bug fixes including security issue fixes for both Qt (CVE-2020-0570) and 3rd party components (CVE-2019-19244, CVE-2019-19603, CVE-2019-19242, CVE-2019-19645, CVE-2019-19646 & CVE-2019-19880). Also in QtWebEngine there are many CVE fixes from Chromium. For details of the most important changes, please check the Change files of Qt 5.14.1.

        • Qt 5.14.1 Released With 200+ Bug Fixes, Including Security Fixes

          Following last month’s release of the big Qt 5.14 tool-kit, Qt 5.14.1 is out this morning as the first point release.

          Qt 5.14.1 is shipping with around 220 known bug fixes. Among those many bug fixes are several security fixes, including for the likes of Qt WebEngine, Qt’s copy of SQLite, and other components.

          There is also a security fix for Qt core itself over it trying to load libraries from the current working directory path and that could lead to inadvertently loading unintended or perhaps malicious libraries. Qt 5.14.1 corrects the library loading behavior to address this CVE-2020-0570 issue.

    • Distributions

      • Distrowatch is NOT a Measure for Distributions Popularity

        Another alternative could be releasing the hit statistics for the official distribution’s repositories. Almost every user may need to download a certain package or an update from the repositories at least once every few weeks, so if we could access the logs of how many unique IP addresses are accessing the distribution’s repositories mirrors per month for example, we may gain a good vision on how popular that distribution is.

        While this alternative is theoretically good, the issue about it is that it won’t count offline installations. People from both sides can argue with strong reasons why offline installations are important or not important, but it leaves us in an issue anyway. Additionally, this would count Linux Mint users, Kubuntu users and Ubuntu MATE users all as Ubuntu users, simply because they are using Ubuntu’s official repositories, which is not a nice thing to have.

        At the end, it sounds like each methodology has its own issues, but some are way more better than the other. Still, do not get tricked by people who try to use Distrowatch’s visitor statistics to rank all the Linux distributions out there.

      • New Releases

        • ExTiX 20.2, Build 200127, with KDE Plasma Desktop 5.17, Calamares Installer, Refracta Snapshot, Nvidia Graphics Driver and kernel 5.5.0-rc7-exton

          I have made a new version of ExTiX – The Ultimate Linux System. I call it ExTiX 20.2 KDE Plasma Live DVD. (The previous KDE version was 19.1 from 181228). The best thing with ExTiX 20.2 is that while running the system live (from DVD/USB) or from hard drive you can use Refracta Snapshot (pre-installed) to create your own live installable Ubuntu 20.04 system. So easy that a ten year child can do it!

          ExTiX 20.02 KDE Plasma DVD 64 bit is based on Debian and (upcoming) Ubuntu 20.04 LTS. The original system includes the Desktop Environment Gnome. After removing Gnome I have installed KDE Frameworks 5.66.0 with KDE 4.19. KDE Frameworks are 60 addon libraries to Qt which provide a wide variety of commonly needed functionality in mature, peer reviewed and well tested libraries with friendly licensing terms.

        • ExTiX 20.2 Is the First Distro to Be Based on Ubuntu 20.04 LTS, Linux Kernel 5.5

          ExTiX 20.2 appears to be the first to adopt the Linux 5.5 kernel series, and the Ubuntu 20.04 LTS base. It lets you create your own Ubuntu live system.

        • Solus 4.1 Released with Zstd Compression, Improved Gaming

          Solus 4.1 is now available to download. It ships with Budgie, GNOME, MATE, and KDE Plasma editions.

        • Solus 4.1 Fortitude Linux distro now available for download with Budgie, GNOME, KDE Plasma, and MATE

          There are too many Linux distributions these days, but as long as many of them are of high quality, I suppose that isn’t such a bad problem to have. Many people in the Linux community know of the common ones, such as Ubuntu, Fedora, Mint, and Manjaro, but there are some lesser-known distros that are actually worth consideration, like Deepin and Solus.

          Speaking of the latter, there is a new version of that operating system available for download. While technically just a point release, Solus 4.1 Fortitude is chock full of updates, fixes, and more. You get Linux kernel 5.4.12 and Mesa 19.3.2. The operating sytem comes with many quality apps pre-installed too, such as Firefox 72.0.2, LibreOffice, and Thunderbird 68.4.1 — three essential productivity tools. Once again, there are four desktop environments to choose — Budgie, GNOME, KDE Plasma, and MATE. All four are great, but Budgie is considered the default for this operating system.

        • Solus 4.1 is out with upgraded drivers, ESync support for better Linux gaming and more

          Solus, the independently developed Linux distribution that also houses the Budgie desktop environment has a big new released tagged with Solus 4.1 Fortitude.

          This is quite a big one, although Solus has a curated rolling-release model where you install once and continue getting updates, a tagged release gives people a good base to start with that should be stable.

        • Solus 4.1 “Fortitude” available for download now

          The Solus team announced the release of Solus 4.1 “Fortitude,” the latest in their Solus 4 “Fortitude” series. According to the official release announcement, this release “delivers a brand new desktop experience, updated software stacks, and hardware enablement.”

          The FOSS Linux Solus distro independently developed and uses its desktop environment, Budgie, derived from GNOME. In 2016, the Solus development team abandoned its fixed point release approach and adopted a curated rolling release model with the slogan “Install Today. Updates Forever”.


          Audio and video multimedia playback differs with out-of-the-box software chosen explicitly for the best experience in a particular environment. Budgie, GNOME, and MATE editions use Rhythmbox for audio playback, with the latest release of the Alternate Toolbar extension, while KDE Plasma uses Elisa for audio playback. KDE uses SMPlayer for video playback, while MATE ships with VLC and Budgie and GNOME utilize GNOME MPV.

      • Screenshots/Screencasts

      • SUSE/OpenSUSE

        • How SUSE builds its Enterprise Linux distribution – PART 1

          In 2020, one might think that Operating Systems in general are not interesting any more, possibly because some have an interest on shifting the attention to an “upper layer”, like Cloud or Containers. But even if the OS lost it’s former attraction, somehow you (or someone else) still needs a software system that manages computer hardware, software resources and provides services to applications and users. Obviously an OS is essential but it needs everything around it to serve an higher purpose than just a basic interface between human and hardware.
          As of now with the increased pace of new technologies and changes to the “upper layer”, a modern Operating System needs to adapt, support new hardware, new software, and needs. But also be stable, resilient and secure to properly host the “upper layer”.
          But before we discuss modern days, let’s have a look back in the past.


          SUSE is a long lasting player in the GNU/Linux Operating Systems, as you might know SUSE once stood for Software-und System-Entwicklung (Software and Systems Development), and was created in 1992 doing a lot of translation, documentation and hacking (on technologies but not subverting computer security). The same year we were distributing the first comprehensive Linux Distribution (more than just Linux Kernel and GNU tools), called Softlanding Linux System (SLS), one of the earliest Linux Distributions at large.
          Soon we switched our focus from SLS to Slackware (initially based on SLS), by translating in German and supporting this new Linux Distribution. And thanks to this effort and experience, we were able to release S.u.S.E Linux 1.0 based on Slackware in 1994.
          This were really an exciting time for the Linux community, it was basically the beginning and everything rapidly changed or grew, new projects arise, new people started to contribute, in short a lot of things were in flux. Just two years after S.u.S.E Linux 1.0, in 1996, we have released SUSE Linux 4.2 our very first true SUSE distribution! which was not based on Slackware but on Jurix.
          Yet another big milestone was achieved in 2000, when we brought the first Enterprise Linux Distribution ever, with SUSE Linux Enterprise Server (for IBM S/390)!

      • Fedora Family

        • DevConf 2020

          As it happened at other times in my life, I managed to be present at DevConf. DevConf is one of the best conferences that I attend. The reasons are many and varied, starting from the location that I find relatively stress-free. Another reason is the fact that there are many different kinds of sessions, and many sessions are not overcrowded, so it is relatively simple to participate in any session you would like to.

          This year, I chose to participate in many container and security sessions, since this is what I mostly work with nowadays, as probably pretty much anyone in the industry.

        • DevConf.cz 2020 – Awesome people! [Ed: Red Hat is pushing Microsoft .Net]

          Let me actually start a week before devconf. .NET Core had a Security update that went public on Tuesday and we were unable to build it until Wednesday!


          I was driving (and loading the car) while I was in our weekly dotnet meeting on headphones and later another one with Microsoft.

      • Debian Family

        • DebConf20: offer to speak in Palestine censored

          On 20 December 2019, a Debian Developer posted the message below to the debian-project mailing list, offering to give the same talk at both DebConf20 in Haifa, Israel and again in Palestine.

          The message never appeared in the list and can’t be found in the list archive for December.

          Alexander Wirt (formorer) has previously declared that he will censor messages about Israel due to anti-semitism. Yet the message below doesn’t include anything against Israel and doesn’t mention the boycott campaign. It is simply a volunteer offering to give up more of his time to help a population in Palestine who suffer from extraordinary discrimination.

          Is Wirt really fighting anti-semitism, or could the DebConf20 organizers simply be afraid of any discussion that may deter wealthy Israeli sponsors?

      • Canonical/Ubuntu Family

        • What’s New in Coming Ubuntu 20.04 LTS? Features Brief!

          New Features in Ubuntu 20.04: Ubuntu 19.10 is about to end in a few months. The upcoming Ubuntu version is 20.04 and Focal Fossa is the name of the Ubuntu 20.04. Ubuntu 20.04 is a LTS version and have 10 years of software and bugfix support! Team Canonical says, Ubuntu 20.04 will be launched with many exotic features which includes new Gnome Themes, GUI & many Software Tweaks. Here in this article, we added the some essential and unique features of coming Ubuntu 20.04 LTS version.

        • Ubuntu 19.04 Reached End of Life, Upgrade to Ubuntu 19.10 Now

          If you’re using the Ubuntu 19.04 (Disco Dingo) operating system on your personal computer or server, you should know that it has reached end of life on January 23rd, 2020. Of course, this means that Canonical will no longer provide software updates and security patches that address bugs or vulnerabilities.

          Dubbed as the “Disco Dingo,” Ubuntu 19.04 was released on April 18th, 2019, and it was supported for 9 months. Ubuntu 19.04 was the first Ubuntu release to adopt the Linux 5.0 kernel series. This added quite some goodies, including AMD FreeSync display support, advanced ARM hardware support, Btrfs swap files, support for Raspberry Pi touchscreens, and support for the Adiantum file system encryption.

          Ubuntu 19.04 also shipped with the GNOME 3.32 desktop environment, which introduced the long-anticipated fractional scaling feature, as well as an updated toolchain including GCC 8.3, Python 3.7.3 by default, Golang 1.10.4, OpenJDK 11, Glibc 2.29, etc.. Other changes included a new icon theme, improvements to the Yaru theme, a new “Safe Graphics Mode” option in the GRUB menu, and improved VMware integration.

        • scrcpy Now Available In Debian Testing / Sid And Ubuntu 20.04 Focal Fossa

          scrcpy, a tool to display and control Android devices from your desktop, was added recently to the Debian testing (bullseye) and sid, and Ubuntu 20.04 LTS Focal Fossa repositories. As a result, the popular tool will also be in upcoming releases for other Linux distributions based on these Debian or Ubuntu versions, like Pop!_OS 20.04 or Elementary OS 6 Odin.

          scrcpy is a free and open source application that can be used to show an Android device’s screen on a Linux, macOS or Windows desktop, allowing you to control it remotely. This can be done by connecting your Android device to a computer either via USB or wirelessly.

        • Linux on laptops: Ubuntu 19.10 on the HP Dragonfly Elite G1

          If you’re looking for the easiest possible experience in procuring a Linux laptop, you just can’t argue with an OEM experience like Dell’s XPS 13 Developer Edition, or System76′s Galago Pro. But it’s nice having the option to retrofit Linux onto a laptop you just plain like rather than being limited to the ones sold with it—and if you like the Dragonfly Elite, it makes a great Linux laptop. We didn’t face any significant hurdles getting Ubuntu 19.10 installed (we were completely done in well under ten minutes), and the laptop was completely and immediately functional, without the need to mess around with anything.

          The Dragonfly Elite is a great performer. Everything from booting to opening applications to running them felt quick and crisp; for more detail, refer to Valentina’s original review. The important thing from our perspective is that changing operating systems didn’t slow the system down or make anything get perceptibly clunky—it’s still a well-behaved eighth generation i7 system with 16GB of RAM and fast solid state storage, and it behaves just as you’d expect such a system to.

          The battery life is also excellent, with a solid six to seven hours of full-screen, online 720P YouTube watching at full screen brightness. If you’re watching offline media and willing to drop the screen brightness down to 50%, you could almost certainly watch movies on the Dragonfly Elite for a full ten-hour plane ride across the Atlantic.

        • An intro to MicroK8s

          MicroK8s is the smallest, fastest multi-node Kubernetes. Single-package fully conformant lightweight Kubernetes that works on 42 flavours of Linux as well as Mac and Windows using Multipass. Perfect for: Developer workstations, IoT, Edge, CI/CD.

          Anyone who’s tried to work with Kubernetes knows the pain of having to deal with getting setup and running with the deployment. There are minimalist solutions in the market that reduce time-to-deployment and complexity but the light weight solutions come at the expense of critical extensibility and missing add-ons.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Events

        • What to Talk About at ChefConf 2020 – Ecosystem and Community

          ChefConf 2020 will be the best gathering of the Chef Community yet. We rely on our community to help us see all the amazing use cases for our products and help us make them better. ChefConf is a great place for our community members and folks from other companies in our ecosystem to talk about how all the tools in their toolboxes fit together. Chef Infra, Chef InSpec, and Chef Habitat fit with all sorts of other tools and workflows, so if you?re still thinking about your talk submission, maybe some of these ChefConf 2019 hits will inspire you. Check out the whole YouTube Playlist for more sessions!

      • Web Browsers

      • Productivity Software/LibreOffice/Calligra

        • LibreOffice Calc Guide 6.2 is now available

          The LibreOffice Documentation Team is happy to announce the Calc Guide 6.2, a long-awaited update of the old Calc Guide 4.4, to cover all of the innovations included in newer versions of the suite. The team wanted to catch-up with the forthcoming release of LibreOffice 6.4, while offering to the user community a book with its contents suitable for the most-used features of the LibreOffice 6 family.

      • BSD

        • Review of FuryBSD 12.0

          FuryBSD is the most recent addition to the DistroWatch database and provides a live desktop operating system based on FreeBSD. FuryBSD is not entirely different in its goals from NomadBSD, which we discussed recently. I wanted to take this FreeBSD-based project for a test drive and see how it compares to NomadBSD and other desktop-oriented projects in the FreeBSD family.

          FuryBSD supplies hybrid ISO/USB images which can be used to run a live desktop. There are two desktop editions currently, both for 64-bit (x86_64) machines: Xfce and KDE Plasma. The Xfce edition is 1.4GB in size and is the flavour I downloaded. The KDE Plasma edition is about 3.0GB in size.

          Booting from the live media brings up the Xfce 4.14 desktop environment. Along the bottom of the screen is a panel which holds the application menu, task switcher and system tray. Icons on the desktop open the Thunar file manager, launch the system installer, and provide quick access to a Getting Started document. There are two more icons for accessing X.Org configuration options and showing system information. The Getting Started document is a quick reference text file containing command line instructions for setting up networking and installing video drivers. The System Information icon opens the Firefox web browser and displays a locally generated page which contains general information about our computer and its resource usage.

        • FreeBSD is an amazing operating system

          The BSDs just aren’t my thing. I’m not a developer, and I’m not a system administrator. Over the past six months or so, I’ve moved all my machines and all my workflows over to Linux – my laptop, my main PC (used for everything that isn’t translating), and my office PC (for my translation work), and I couldn’t be happier (in the interest of full disclosure, I do keep Windows around on my main PC for possible future Windows-only games, and I have a Windows 10 virtual machine on my office PC for some Windows-specific translation software I need to keep around).

          As I was planning this careful migration, I never once considered using any of the BSDs. For the simpler, almost exclusively desktop oriented work that I do, BSD just doesn’t seem like the right tool for the job – and that’s okay, I’m not the target audience – and I suspect there are many people like me. I think the BSDs are stronger for not trying to be everything to all people, and this more focused development seems to be exactly why someone chooses BSD over Linux.

      • FSF

        • GNU Projects

          • Missing documentation and the reproduction problem

            I recently took some criticism over the fact that reposurgeon has no documentation that is an easy introduction for beginners.

            After contemplating the undeniable truth of this criticism for a while, I realized that I might have something useful to say about the process and problems of documentation in general – something I didn’t already bring out in How to write narrative documentation. If you haven’t read that yet, doing so before you read the rest of this mini-essay would be a good idea.

            “Why doesn’t reposurgeon have easy introductory documentation” would normally have a simple answer: because the author, like all too many programmers, hates writing documentation, has never gotten very good at it, and will evade frantically when under pressure to try. But in my case none of that description is even slightly true. Like Donald Knuth, I consider writing good documentation an integral and enjoyable part of the art of software engineering. If you don’t learn to do it well you are short-changing not just your users but yourself.

            So, with all that said, “Why doesn’t reposurgeon have easy introductory documentation” actually becomes a much more interesting question. I knew there was some good reason I’d never tried to write any, but until I read Elijah Newren’s critique I never bothered to analyze for the reason. He incidentally said something very useful by mentioning gdb (the GNU symbolic debugger), and that started me thinking, and now think I understand something general.

            If you go looking for gdb intro documentation, you’ll find it’s also pretty terrible. Examples of a few basic commands is all they can do; you never get an entire worked example of using gdb to identify and fix a failure point. And why is this?

            The gdb maintainers probably aren’t very self-aware about this, but I think at bottom it’s because the attempt would be futile. Yes, you could include a session capture of someone diagnosing and debugging a simple problem with gdb, but the reader couldn’t reliably reproduce it. How would you the user go about generating a binary on which the replicating the same commands produced the same results?

            For an extremely opposite example, consider the documentation for an image editor such as GIMP. It can have excellent documentation precisely because including worked examples that the reader can easily understand and reproduce is almost trivial to arrange.

          • GNU Linux-libre 5.5-gnu
            GNU Linux-libre 5.5-gnu sources and tarballs are now available at
            It didn't require any deblobbing changes since -rc5-gnu, though the
            first published snapshot was only -rc6-gnu, and there was a regexp fix
            in -rc7-gnu to silence warnings and even errors in regexp compilers in
            gawk and Python 3.8.  Binaries are expected to show up in the near
            This release had more new drivers needing cleanup than we've seen in a
            while: Realtek RTL815[23] USB ethernet adaptors, WFX wf200 wireless, IDT
            Clockmatrix and RT5677 sound codecs.  Other drivers that needed
            deblobbing changes were wilc1000, brcmstb_dpfe, r8169, iwlwifi, x86
            touchscreen dmi, xhci-tegra, i915, and mlxsw spectrum.
            For up-to-the-minute news, join us on #linux-libre of irc.gnu.org
            (Freenode), or follow me (@lxoliva) on Twister <http://twister.net.co/>,
            Secure Scuttlebutt, GNU social at social.libreplanet.org, Diaspora* at
            pod.libreplanetbr.org or pump.io at identi.ca.  Check my web page (link
            in the signature) for direct links.
            Be Free! with GNU Linux-libre.
            What is GNU Linux-libre?
              GNU Linux-libre is a Free version of the kernel Linux (see below),
              suitable for use with the GNU Operating System in 100% Free
              GNU/Linux-libre System Distributions.
              It removes non-Free components from Linux, that are disguised as
              source code or distributed in separate files.  It also disables
              run-time requests for non-Free components, shipped separately or as
              part of Linux, and documentation pointing to them, so as to avoid
              (Free-)baiting users into the trap of non-Free Software.
              Linux-libre started within the gNewSense GNU/Linux distribution.
              It was later adopted by Jeff Moe, who coined its name, and in 2008
              it became a project maintained by FSF Latin America.  In 2012, it
              became part of the GNU Project.
              The GNU Linux-libre project takes a minimal-changes approach to
              cleaning up Linux, making no effort to substitute components that
              need to be removed with functionally equivalent Free ones.
              Nevertheless, we encourage and support efforts towards doing so.
              Our mascot is Freedo, a light-blue penguin that has just come out
              of the shower.  Although we like penguins, GNU is a much greater
              contribution to the entire system, so its mascot deserves more
              promotion.  See our web page for their images.
            What is Linux?
              Linux is a clone of the Unix kernel [...]
            (snipped from Documentation/admin-guide/README.rst)
          • GNU Linux-Libre 5.5 Kernel Arrives for Those Seeking 100% Freedom for Their PCs

            GNU Linux-Libre 5.5 kernel has been released for those seeking 100% freedom for their personal computers.

          • Linux 5.5 Required More Deblobbing Than Usual For GNU Linux-libre 5.5

            Fresh off the Linux 5.5 release, the Free Software Foundation Latin America crew has debuted their GNU Linux-libre 5.5 downstream that continues to be focused on deblobbing the kernel of drivers requiring proprietary firmware and stripping out other code/functionality that is contingent upon non-free software bits and removing the ability to load closed-source kernel modules.

            Linux 5.5 with its many changes proved more challenging than usual for their “deblobbing” adventure. The new WFX WiFi driver and others required handling as well as updates to existing drivers like the Intel IWLWIFI driver and Realtek r8169.

      • Programming/Development

        • A little hidden gem: QStringIterator

          The code above is broken.

          It falls into the same trap of endless other similar code: it doesn’t take into account that QString does not contain characters/code points, but rather UTF-16 code units.

          All operations on a QString (getting the length, splitting, iterating, etc.) always work in terms of UTF-16 code units, not code points. The reality is: QString is Unicode-aware only in some of its algorithms; certainly not in its storage.

          For instance, if a string contains simply the character “𝐀” — that is, MATHEMATICAL BOLD CAPITAL A (U+1D400) — then its QString storage would actually contain 2 “characters” reported by size() (again, really, not characters in the sense of code points but two UTF-16 code units): 0xD835 and 0xDC00.

          The naïve iteration done above would then check whether those two code units are uppercase, and guess what, they’re not; and therefore conclude that the string is not uppercase, while instead it is. (Those two code units are “special” and used to encode a character outside the BMP; they’re called a surrogate pair. When taken alone, they’re invalid.)

        • How to get started with test-driven development

          I am often approached by software developers who are on board with the switch to test-driven development (TDD). They understand that describing expectations first and then writing code to meet those expectations is the best way to write software. And they agree that writing tests first does not introduce any overhead since they must write tests anyway. Still, they find themselves stuck, not being clear on what to test, when to test it, and how to test it. This article will answer those questions.


          One way to the test custom-made car battery would be to hire a testing crew, ship the car with the battery to Portland, and then get the testing crew to drive the car from Portland to Seattle. If the car arrives in Seattle, you can confirm that, yes, the car battery functions as expected.

          Another way to test the custom-made car battery would be to install it in the car and see if the engine turns over. If the engine starts, you can confirm that, yes, the car battery functions as expected.

          Still another way would be to use a voltmeter and connect the positive (+) and the negative (-) terminals to see if the voltmeter registers voltage output in the range of 12.6 to 14.7 volts. If it does, you can confirm that, yes, the car battery functions as expected.

        • Perl / Raku

          • Perl Weekly Challenge 44: Only 100, Please, and Make it $200

            These are some answers to the Week 44 of the Perl Weekly Challenge organized by Mohammad S. Anwar.


            For solving this task, we first use a recursive combine subroutine that generates all possible strings by inserting between the digits of the “123456789” string the + plus addition, the – subtraction operator, or the ” empty string (i.e. no operator). We then use the evaluate subroutine with each string to perform the various arithmetic operations and compute whether the total is 100.


            You have only $1 left at the start of the week. You have been given an opportunity to make it $200. The rule is simple with every move you can either double what you have or add another $1. Write a script to help you get $200 with the smallest number of moves.

            Obviously, doubling your asset is a faster way to go high values than just adding 1. But, if you only double your asset, you get powers of 2, leading you to 128, and then you have to go all the way from 128 to 200, which is most probably not the fastest way to get to 200. In fact, if you first go to three (for example by adding 1 twice), then multiplying by 2 six times, you get to 192, which is much closer to 200. That’s 16 moves, which seems not bad at all. But there may be a yet faster way, let’s see.

  • Leftovers

    • Health/Nutrition

      • There’s Nothing “Pro-Life” About Trump’s Opposition to Abortion Rights

        As Senators sat listening to hours upon hours of impeachment proceedings, considering the possibility of removing the president from office, Donald Trump began campaigning for a second term. Yesterday, that meant being the first sitting president ever to attend and speak at the March for Life. Trump said it was a “profound honor” to be the first president to attend, and assured that “unborn children have never had a stronger defender in the White House.” Similar to his campaign rallies, at the end of Trump’s speech, the crowd erupted into a chant of “four more years.”

      • The Flu Poses a Far Greater Threat to Americans Than the Coronavirus From China

        There’s a deadly virus spreading from state to state. It preys on the most vulnerable, striking the sick and the old without mercy. In just the past few months, it has claimed the lives of at least 39 children.

      • Lyme disease patients fight for their lives while academics fight each other. That’s just wrong.

        And yet this should not be a solely academic debate: The Centers for Disease Control and Prevention estimated in 2013 that roughly 329,000 new cases of Lyme occurred every year when around 30,000 were reported. In 2017, 42,743 new cases were reported to the CDC, leading scientists to calculate that the true yearly incidence of new Lyme infections is now over 400,000 (and approximately 427,000 in 2017). Either makes the number of people infected with Lyme each year larger than the number of people diagnosed with breast cancer, HIV and hepatitis C combined. And that’s just in the United States.

      • Arizona, California Cases Push U.S. Tally of New Virus From China to 5

        The U.S. has five confirmed cases of the new virus from China, all among people who traveled to the city at the center of the outbreak, health officials said Sunday.

      • Of Coronavirus and Chartism

        I am cheerfully optimistic that this Coronavirus, like asian swine flu and SARS before it, will prove not to be as deadly as may be prognosticated by journalists wanting to fill column inches. One day the human race will become extinct; but it is unlikely to be a virus that does it, as wiping out your host is not a clever survival policy for a virus. Even a disease as vicious as ebola proved not to be so potent against subjects who were not malnourished nor struggling with other health issues. So far this coronavirus seems to have a mortality rate of about 3%, which is probably an over high estimate as it is only a percentage of those who died after testing, whereas it appears there are large numbers with milder symptoms who are unlikely to have been tested in the first place. So coronavirus is not looking vastly different to ordinary influenza, which has a mortality rate of about 1%.

    • Integrity/Availability

      • Proprietary

        • Security

          • Security updates for Monday

            Security updates have been issued by Debian (jsoup and slirp), Fedora (community-mysql, elog, fontforge, libuv, libvpx, mingw-podofo, nodejs, opensc, podofo, thunderbird-enigmail, transfig, and xfig), openSUSE (arc, libssh, and libvpx), Red Hat (git, java-1.8.0-openjdk, java-11-openjdk, python-reportlab, and sqlite), Slackware (thunderbird), and SUSE (java-1_8_0-openjdk, python, and samba).

          • Privacy/Surveillance

            • Top EU court’s advisor: bulk surveillance is “disproportionate”, and national security exemptions do not always apply

              The Court of Justice of the European Union (CJEU), the EU’s top court, has played a key role in protecting privacy in the digital age, in Europe and beyond. In 2014, it ruled that a major piece of EU legislation, the Data Retention Directive, was “invalid” – that is, illegal – and should be taken off the statute books by members of the EU. This is known as the Digital Rights Ireland judgment:

            • Hillary Clinton: Mark Zuckerberg Has ‘Authoritarian’ Views on Misinformation

              Now that Clinton gets it, she’s horrified—and she’s specifically alarmed by what she views as Mark Zuckerberg’s unwillingness to battle the spread of disinformation and propaganda on his own platform. There was the time, last spring, when a slowed-down video of House Speaker Nancy Pelosi caught fire online. The distorted speed, which made Pelosi appear as though she was slurring her words, seemed designed to make her appear cognitively impaired. “Google took it off YouTube … so I contacted Facebook,” Clinton said. “I said, Why are you guys keeping this up? This is blatantly false. Your competitors have taken it down. And their response was, We think our users can make up their own minds.”

            • Google Is Going to Charge Cops for Your Data

              The New York Times reports that Google sent out a notice announcing the new fees, which went into effect on Jan. 13, to law enforcement officials. The fees are legal, as federal law allows companies to charge reimbursement fees for these requests, and they are not new for Google. According to the Times, the company has charged to fulfill legal data requests in the past, and it is not the only company that charges for such work. Cell phone carriers have been charging to fulfill similar legal requests for years.

            • Have a Search Warrant for Data? Google Wants You to Pay

              Facing an increasing number of requests for its users’ information, Google began charging law enforcement and other government agencies this month for legal demands seeking data such as emails, location tracking information and search queries.

              Google’s fees range from $45 for a subpoena and $60 for a wiretap to $245 for a search warrant, according to a notice sent to law enforcement officials and reviewed by The New York Times. The notice also included fees for other legal requests.

              A spokesman for Google said the fees were intended in part to help offset the costs of complying with warrants and subpoenas.

    • Defence/Aggression

      • The Muslim Ban Is 3 Years Old. Its National Security Argument Is Still Bogus.

        January 27 marks three years since President Trump issued the original Muslim Ban, which disrupted the lives of thousands of people around the world and triggered mass protests around the United States. Since then, the ban has been through three iterations, all of which have been met with legal challenges on the grounds that the policy was motivated by animus toward Muslims.

      • Rwanda: Abusive Detention of Street Children

        Rwandan authorities are seeking to formalize their abusive arrests and detention of some of the country’s most vulnerable children under the pretense of rehabilitating them, Human Rights Watch said in a report released today. The Geneva-based United Nations Committee on the Rights of the Child, which starts its review of Rwanda on January 27, 2020, should call for the immediate closure of Gikondo Transit Center, where children are arbitrarily detained and abused.

        “Rwandan authorities claim they are rehabilitating street children,” said Lewis Mudge, Central Africa director at Human Rights Watch. “But instead, they are locking them up in inhuman and degrading conditions, without due process, and exposing them to beatings and abuse.”

      • Fighting Rages as Libya Force Pushes Toward Key Western City

        Officials from Libya’s two rival governments said fighting erupted Sunday as the country’s east-based forces advanced toward the strategic western city of Misrata, further eroding a crumbling cease-fire agreement brokered earlier this month.

      • Austin police to host several ‘no questions asked’ gun surrender programs this year
      • Muslim Cleric Issues Fatwa Against Bollywood Film Director for ‘Showing Quran in Bad Light’

        New Delhi (Sputnik): The Bollywood movie “Gul Makai”, based on the story of the life and struggle of 22-year-old Pakistani Nobel Peace Prize laureate Malala Yousafzai, has drawn the ire of a Muslim cleric.

      • One of two civilians killed by Pak Army along LoC, was beheaded

        In a gruesome revelation, it has come to light that one of the two unarmed civilians killed in an attack in Poonch sector along LoC two days ago by Pakistan Army’s Border Action Team (BAT), was beheaded, government sources informed.

    • Environment

      • How Does a Nation Adapt to Its Own Murder?

        And to the names of those historic betrayers of their people — Vidkun Quisling, Benedict Arnold, Mir Jafar — perhaps one day will be added that of Scott Morrison, the prime minister of Australia who, when faced with the historic tragedy of his country’s destruction, dissembled, enabled, subsidized and oversaw omnicide, until all was ash and even the future was no more.

      • When Fire Weather Becomes the Norm

        In the bush, the fires have killed millions of animals. Rescue workers have recounted hearing koalas screaming in the trees. So many of the marsupials have died that scientists might classify them as endangered in certain regions of Australia. Ecologists are worried that 100 threatened animal species have been either critically endangered or effectively wiped out, as the fires have engulfed many national parks. Even the beaches are awash with thousands of bird carcasses; in Mallacoota, one local man counted 25 different species along a short stretch of shore.

      • These scientists think we’re in a ‘bushfire spiral’. They have a plan

        Importantly, a healthy forest needs a patchwork mosaic of burnt areas. Possums, mallee fowl and parrots rely on recently burnt areas to feed, but live in old-growth areas that are full of good nesting sites.

        Over lunch, Morgan pulls out his phone and shows off an image of a dot painting he’s had commissioned by Pauline Bonney, a Wongi artist from Western Australia.

        It’s a stand of banksia trees being licked by flames, the fire a matrix of red and purple and black dots. Banksias need fire to open their seed pods and spread the seed. Without fire, they die. “Fire’s not about destruction,” says Morgan. “It’s about regeneration.”

      • Cut Back on Email If You Want to Fight Global Warming

        Right now, data centers consume about 2% of the world’s electricity, but that’s expected to reach 8% by 2030. Moreover, only about 6% of all data ever created is in use today, according to research from Hewlett Packard Enterprise. That means that 94% is sitting in a vast “cyber landfill,” albeit one with a massive carbon footprint.

        “It’s costing us the equivalent of maintaining the airline industry for data we don’t even use,” says Andrew Choi, a senior research analyst at Parnassus Investments, a $27 billion environmental, social, and governance firm in San Francisco.

      • Global Groundwater Is Threatened by Unsustainable Practices Amid Climate Crisis

        As the planet’s thermometer continues to inch upwards, one sought-after resource is only going to increase in value: groundwater.

      • Rolling Back Water Rules Doesn’t Help Most Farmers — It’s For Big Polluters

        On Thursday, Donald Trump’s Environmental Protection Agency finalized its new rules to dramatically reduce the number of waterways previously protected from harmful pollution and runoff under the Clean Water Act (CWA). These rules replaced the Obama-era Waters of the U.S. (WOTUS), or Clean Water Rule, an executive order that redefined and expanded the term “waters of the U.S.” in the CWA to include streams and wetlands.

      • 2020 Is Off to a Terrifyingly Hot Start

        The year is less than four weeks old, but scientists already know that carbon dioxide emissions will continue to head upwards – as they have every year since measurements began – leading to a continuation of the Earth’s rising heat.

      • Energy

        • Blocking Trains and Removing Coal, Climate Activists Fight to Close One of New England’s Largest Power Plants

          By escalating from symbolic actions to obstruction, the #NoCoalNoGas campaign is mounting a serious challenge to the fossil fuel industry with a growing network of climate activists.

          Sarah Freeman-Woolpert is a writer, researcher and organizer focused on nonviolent social movements and creative action. She lived for two years in the Balkans, studying and supporting youth activist movements. Sarah now works as a grassroots organizer for peace and justice and is based in Boston.

          Arnie Alpert is a longtime nonviolent action trainer in New Hampshire. He blogs at inzanetimes.wordpress.com.

        • Groups Funded by Oil Industry Bash Plan to Reduce Northeast’s Dependence on Oil

          These campaigns are active in multiple states throughout the Northeast, featuring public events to sway legislators, public letters co-signed by various free market groups, and at least one study produced by a Koch- and oil-industry funded think tank based in Texas. 

        • The surprising protest of Exxon’s law firm at Harvard Law

          Law school recruitment dinners like these are usually high-end, low-key, genteel affairs, according to students. The venue for the Paul Weiss dinner was the Catalyst Restaurant in Cambridge, Massachusetts, replete with an open bar, whole lobsters, and an ice sculpture, and more than 100 students were in attendance.

          So a raucous protest like this served as a jarring new tactic to pressure greenhouse gas emitters: targeting the white-collar workers that protect them.

    • Finance

      • The Failure to Deliver Reparations

        In July 2019, on a stage cluttered with nine other Democratic presidential candidates, Marianne Williamson broke with her normal jargon of cosmos to present a plan for reparations to black Americans. After translating 40 acres and a mule into a modern-day equivalent, she proposed from $200 billion to $500 billion for reparations programs, along with some “deep truth telling” in America. Her reference to “truth telling” likely refers to this nation’s deep and long history of racial inequality. The liberal media exploded with praise over Williamson’s rare and sobering policy talk in this moment. Though she will not be president in 2020, her call for reparations revealed a larger national conversation reignited by a variety of contributing factors, notwithstanding Donald Trump’s unabashed racism.

      • Trump’s new food stamp rules hurt vulnerable Texans
      • The science behind why saving for retirement is hard

        The data is alarming: Most people aren’t saving enough for retirement. According to the 2019 Planning & Progress Study nearly one in four of Americans have less than $5,000 put aside for retirement. In fact, because of low retirement savings, almost half of Americans say they’ll be forced to work past the age of 65.

        The majority of Americans—59% according to a 2019 study by Charles Schwab—say they live paycheck to paycheck, making saving money a challenge. But beyond the that, there are lots of reasons why people don’t prioritize planning for their future, even though they know they should. It’s here where research in behavioral science can help.

    • AstroTurf/Lobbying/Politics

      • ‘Big-Monied Interests Are Getting Very Nervous’: Sanders Leads in New Hampshire Poll

        “They’re looking at recent polls,” the Democratic candidate said, “and they’re saying, ‘Oh my God, Sanders can win.’”

      • Sanders Takes Commanding Lead in New Iowa Poll

        Sen. Bernie Sanders has a strong lead over his Democratic rivals among likely voters in Iowa, according to a new New York Times/Siena College poll released Saturday, just over a week out from the state’s caucuses.

      • “A Who’s-Who” of People Against Progressive Agenda: DNC’s Perez Under Fire for Convention Committee Picks

        Former Congressman Barney Frank, who wrote a 2015 op-ed entitled “Why Progressives Shouldn’t Support Bernie,” is among those nominated.

      • The Evolution of ‘Davos Man’ into . . . Trump Fan!

        With everything from tax cuts to deregulation, the president has made himself indispensable to the world’s mega rich.

      • In Secret Recording, Trump Admits Fear of Clinton Picking Sanders as VP in 2016

        In a nearly 90-minute audio recording of a private dinner that took place with numerous individuals and President Donald Trump in 2018 and that was made public Saturday evening by the legal team of Lev Parnas, a close associate of the president’s personal attorney Rudy Giuliani, the president can be heard saying “take her out” in reference to former U.S. Ambassador to Ukraine Marie Yovanovitch—a key witness in the impeachment trial now in the U.S. Senate.

      • Trump Told Bolton Ukraine Aid Contingent on Probe Into Democratic Rivals: NYT

        “There is no pretense left. There are no excuses remaining,” said Chris Murphy (D-Conn.).

      • ‘Take Her Out.’ In New Recording, Trump Heard Discussing Firing Ambassador To Ukraine

        In a new recording made public on Saturday, President Trump can be heard speaking with two men he has claimed to not know and ordering the firing of the U.S. ambassador to Ukraine.

        The hour-long recording from April 2018 captures a meeting between Trump and a group of donors that includes two associates of his personal attorney, Rudy Giuliani, who in recent weeks have emerged as central figures in the impeachment inquiry: Igor Fruman and Lev Parnas.

      • UK’s failure to ban far-right groups undermines fight against online extremism, report finds

        A report by the Henry Jackson Society (HJS) warned that posts by non-proscribed groups may not be properly monitored or taken down by social media companies.

        Nikita Malik, director of the think tank’s Centre on Radicalisation and Terrorism, said some companies rely on government lists of banned organisations when deciding what to remove.

        “The lack of far-right groups subject to proscription in the UK, when compared to Islamist groups, has left the authorities reliant on hate crime legislation rather than specific terrorist offences which carry heftier sentences,” she added.

      • UK Think Tank Recommends Silencing Foes of Jihad Terror

        “The report, which was commissioned by Facebook, proposed a ‘harm classification system’ to improve consistency across different kinds of extremism.” How will this “real and significant harm” be classified? Lowest level is feeling annoyed, highest level is being moved to tears? And what if someone lashes out online at the perpetrator of the online harm – is the “harm” negated? It’s ridiculous.

        The second problem with the HJS analysis is that it continues the practice of the Southern Poverty Law Center (SPLC) in the U.S., of tarring with the “far-right extremist” label people who are not neo-Nazis or Klansmen, and whose only crime is to oppose jihad violence and Sharia oppression of women, gays, and others. The report, says the Independent, “also named extremists, such as anti-Islam figures Pamela Geller and Robert Spencer, who had been prevented from entering Britain because of extremist concerns but are allowed to remain on Facebook, Twitter and YouTube.”

    • Censorship/Free Speech

      • Zindagi Tamasha: Pakistan film suspended after religious uproar

        Pakistan has suspended the release of an award-winning film, after an Islamist political party objected to its portrayal of a struggling cleric.

      • India says [Internet] is being restored to Kashmir, but no social media

        After a monthslong internet blackout, Indian authorities said that Kashmir residents can now go online under strictly controlled conditions. The users can visit only about 300 websites and cannot access social media.

      • Your social media posts can be used against you

        For many reasons, it’s a good idea to watch what you post on your social media accounts. One of them is because companies like Airbnb may well be monitoring the habits of its possible renters in order to predict bad behavior.

        As more reports have surfaced involving Airbnb renters trashing homes, the company realizes that more screening may be needed to avoid future problems.

        Airbnb says it already makes a risk assessment on everyone who fills out an application for a reservation along with a background check. The company explains that they use predictive analytics and machine learning to instantly evaluate and flag suspicious activity before it happens. But now it seems that this process may not be going far enough.

        It has been reported that Airbnb filed a patent last year with the European Patent Office (EPO) for a new technology that will allow it to search the internet in an effort to calculate the risk of someone trashing a host’s home. The patent documents suggest that the technology is for determining the trustworthiness and compatibility of a person along with assessing behavioral and personality traits. Airbnb seems to be downplaying the patent by stating that it acquired the U.S. patent after buying the California-based background check startup Trooly.

    • Freedom of Information / Freedom of the Press

      • When Computer Crimes Are Used to Silence Journalists

        Why EFF stands against the prosecution of Glenn Greenwald

      • Reporters Face New Threats From the Governments They Cover

        When Julian Assange, the WikiLeaks founder, was charged last year by the Trump administration in connection with the publication of secret United States government documents nearly a decade earlier, many journalists expressed deep concern about the dangerous precedent the case could set for investigative reporting in America.

        But few seemed to consider that the case might also serve as a model for other nations eager to clamp down on press freedom.

        On Tuesday, Glenn Greenwald, an American journalist living and working in Brazil, was charged, in a criminal complaint brought by Brazilian prosecutors, with cybercrimes in connection with his stories on private messages among Brazilian officials that revealed corruption and abuses at the highest levels of the government. Brazilian prosecutors asserted that Mr. Greenwald was part of a criminal organization that hacked the cellphones of government officials. He has denied the charges. (Full disclosure: Mr. Greenwald is a co-founder of The Intercept, where I work as a reporter; I also run the First Look Press Freedom Defense Fund, part of the nonprofit organization that includes The Intercept.)

      • American tortured by rebels sues Qatari bank for financing terrorism in Syria

        American photojournalist, Matthew Schrier, who was held captive and tortured for seven months in 2013 in Syria by extremist rebel groups, has filed a law suit against Qatar Islamic Bank alleging the bank provided financial services to terrorist groups, he told Al Arabiya on Friday.

        Schrier said he was tortured by two Syrian al Qaeda-affiliated rebel groups, US-designated terrorist group al Nusra Front and rebel group Ahrar al-Sham. He now alleges that the Qatari bank helped finance the two Syrian organizations in several ways.

      • Mike Pompeo Berated A Journalist Who Asked Him A Tough Question Then Called Her A Liar For Reporting It

        Secretary of State Mike Pompeo did not deny Saturday that he lashed out at an NPR reporter after abruptly ending an interview, but claimed in a statement that the (reportedly profanity-laden) “post-interview conversation” between himself and journalist Mary Louise Kelly was off the record.

      • After Contentious Interview, Pompeo Publicly Accuses NPR Journalist Of Lying To Him

        “He shouted at me for about the same amount of time as the [9-minute] interview itself had lasted,” Kelly told Shapiro. “He was not happy to have been questioned about Ukraine. He asked, ‘Do you think Americans care about Ukraine?’ He used the F-word in that sentence and many others.”

        Pompeo then had a pop quiz for Kelly, a veteran national security correspondent who has reported from China, Russia and, most recently, Iran.

        “He asked if I could find Ukraine on a map; I said yes,” she continued. “He called out for his aides to bring him a map of the world with no writing, no countries marked. I pointed to Ukraine. He put the map away. He said, ‘People will hear about this.’ ”

      • Pompeo Accuses NPR Journalist Of Lying Following Controversial Interview

        NPR issued a response to Pompeo’s statement, calling Kelly a reporter with “utmost integrity” and said it stood behind her report.

        The Committee to Protect Journalists also issued a statement later on January 25 criticizing Pompeo, saying his reaction was another sign of the Trump administration’s “hostility” toward the press.

        “These verbal attacks undermine efforts to protect journalists and erode U.S. standing as a beacon of press freedom,” the committee said.

    • Civil Rights/Policing

      • Trump Team Titans

        “Birds of a feather will gather together.”

      • Ten Years After Howard Zinn’s Death — Lessons from the People’s Historian

        Now is an especially good time to remember some of Howard Zinn’s wisdom.

      • What to Do When You Have Been Abusive

        As I sit in my bed and begin to type (beds are my favorite typing places), there is a part of me that says, “Don’t write this article.”

      • Turkey: UN Review Should Address Sharp Decline on Rights

        A review of the situation in Turkey before the United Nations offers a chance to acknowledge and address the country’s human rights crisis and the dramatic erosion of its rule of law framework, Human Rights Watch said today. On January 28, 2020, Turkey will undergo its third Universal Periodic Review (UPR) before the UN Human Rights Council in Geneva.

        Over the past four years, the Turkish authorities have detained and prosecuted perceived government opponents, journalists, activists, and human rights defenders on broad and vague terrorism and other charges for peacefully exercising their freedom of expression and other non-violent activities. The rights to assembly and association have been severely curtailed across the country and the government has exerted heavy political control over the courts, whose judges have all too easily handed down convictions and harsh sentences in defiance of human rights norms.

      • Two years after a federal law banning shackling women during childbirth was passed, prisoners in America are still giving birth in chains

        As a result, the practice of shackling women before, during and after childbirth is rampant across America, and in the majority (61%) of these circumstances, the women are shackled not because of any specific danger, but because the facility has a policy that insists that they be in chains. The US government does not require state or local lockups to maintain statistics on pregnancy among inmates, and a bill to require this data collection has languished in Congress since September 2018.

      • The American Dream — in crisis

        The World Economic Forum released a report this week in Davos that ranked the United States 27th in the world for social mobility. The top five nations were Denmark, Norway, Finland. Sweden and Iceland.

        In a recent study, researchers from UPenn, Northwestern, the University of Nebraska and the Census Bureau looked back as far as 1850 and concluded that socioeconomic mobility in America is at its worst ever.

      • ‘Enhanced Interrogation’ Architect Dr. James Mitchell’s Testimony at Guantánamo Highlights His Role in U.S. Torture, Debasement of Psychological Ethics: PHR

        As nearly two decades of Physicians for Human Rights (PHR) research and advocacy have made clear, the post-September 11 U.S. torture program constituted a systematic, illegal, and unethical regime of human rights violations. The complicity of health professionals like Dr. James Mitchell and his collaborator, Dr. Bruce Jessen, represents one of the gravest breaches of medical ethics in U.S. history.

      • The Torturers Wanted to Stop, but the CIA Kept Going

        Prisoner Abu Zubaydah was terrorized that way 83 times at a black site in Thailand. According to the Senate torture report, he was “completely unresponsive, with bubbles rising through his open, full mouth.” That report also noted that “non-stop use of the CIA’s enhanced interrogation techniques was disturbing to CIA personnel at Detention Site Green,” and that they objected, but were “instructed by CIA headquarters to continue using the techniques.” It added that the techniques continued for “more than two weeks” after CIA personnel on-site questioned the legality of what they were doing.

      • Architect Of CIA’s Torture Program Says It Went Too Far

        The CIA paid a company owned by Mitchell and his partner, Bruce Jessen, another psychologist, more than $80 million to develop the torture program ultimately used by the CIA on suspected terrorists: waterboarding, stress positions and mock burials, among others. Mitchell and Jessen took a training program meant to teach the U.S. military to resist torture and reverse-engineered it. Once the public learned about the practices, the CIA canceled Mitchell and Jessen’s contract amid international controversy in 2009. Jessen is expected to testify after Mitchell.

      • CIA Used Prisoner As ‘Training Prop’ For Torture, Psychologist Testifies

        According to CIA records, the interrogation provided little new information.

        Testifying at the U.S. military court at Guantanamo in a pretrial hearing for al-Baluchi and other Sept. 11 defendants, Mitchell affirmed claims by al-Baluchi’s attorneys that CIA employees used the experience to earn certification in the agency’s “enhanced interrogation techniques.”

      • Architect of CIA’s ‘enhanced interrogation’ testifies at Guantánamo tribunal

        At a pre-trial hearing in Guantánamo, lawyers for the accused are seeking to have evidence statements that their clients made to the FBI thrown out because of the CIA interrogation methods used to extract them.

      • Marni Soupcoff: Torture doesn’t work. Stop using it

        It is a mistake to treat people suspected of crimes, including people captured during wartime, inhumanely. And the lesson is being underlined this week in pretrial hearings at Guantanamo Bay for Khalid Sheikh Mohammed, the man who is alleged to have planned and directed the 9/11 attacks — and, also, a man who was waterboarded 183 times by the Central Intelligence Agency (CIA).

      • Architect of C.I.A. Interrogation Program Testifies at Guantánamo Bay

        It was an extraordinary moment in the slow-moving justice system set up to try foreign prisoners of the war on terror, with American lawyers for defendants who were tortured more than a decade and a half ago flipping the script to question an interrogator from the so-called black sites.

        Dr. Mitchell, a former contract psychologist for the C.I.A., expressed no regrets or contrition, tearfully saying he did it for the American people at a time when President George W. Bush’s administration feared a follow-on attack by airplane or nuclear bomb to the Sept. 11 hijackings that killed 2,976 people.

      • Call it torture if you want, military judge says at Guantanamo hearing

        “I know torture’s a dirty word,” defense attorney Walter Ruiz told the tribunal. “I’ll tell you what, judge, I’m not going to sanitize this for their concerns.”

        Ruiz repeatedly used the word “torture” — and gave vivid descriptions of what had been done to his client, Mustafa Hawsawi, in secret CIA-run black-site prisons — something that would have been unthinkable for most of the eight years the case has been ongoing.

      • Iran Eliminates ‘Other Option’ Of Religious Affiliation For Citizens’ IDs

        Article 13 of the Islamic Republic Constitution stipulates that “Zoroastrian, Jewish, and Christian Iranians are the only recognized religious minorities, who, within the limits of the law, are free to perform their religious rites and ceremonies, and to act according to their own canon in matters of personal affairs and religious education.”

        Removal of the “other religions” affects Baha’is, a persecuted religious minority, in applying for a new National ID card. Without the ID, Baha’is will be deprived of a official and business transactions.

      • Marriage of minor halted by police

        The girl’s father allegedly obtained Rs0.5million from a 50-year-old man to marry his 11-year-old daughter.

        The incident occurred in Chak -140 where a man named Mazhar Iqbal, resident of Chak-138 forcibly tried to tie the knot of his minor daughter Yasmeen with an old man, Mazhar.

      • Proposal would end Oklahoma death penalty

        State Rep. Jason Dunnington, D-Oklahoma City, filed House Bill 2876 to end use of the death penalty in Oklahoma.

        According to a press release, Dunnington pointed to problems with the death penalty, including high costs, no conclusive evidence that it deters crime and the fact that for every 10 inmates executed, one is exonerated.

        “I’m proud to be a part of the important progress we’ve made toward criminal justice reform,” Dunnington said. “This is neither a partisan nor an ideological proposal… The profound problems with the death penalty are a concern for all Oklahomans.”

      • We’ll Never Advance Australia Fair Until We Face Our Black Past

        On January 26, Alison Pennington reflects on the history of a nation defined by resistance and determination, but diverted by elite self-interest.

    • Monopolies

      • Patents

        • Danger in delay (periculum in mora) is still a relevant requirement in certain cases to obtain preliminary injunctions in Spain (three pi decisions on fulvestrant)
        • Barcelona Court of Appeal confirms refusal of preliminary injunctions against fulvestrant generics

          The Barcelona Court of Appeal recently issued two decisions confirming the refusal of the preliminary injunctions that AstraZeneca….

        • Software Patents

          • Jury Orders Apple to Fork Over $85 Million in Royalties for Wi-LAN Suit

            Wi-LAN, a Canadian tech developer, has been lobbing similar lawsuits at the biggest names in tech for the better part of a decade now (to varying degrees of success) over its patents for Bluetooth and other wireless communication technology. The company’s suit against Apple hinged on two of its patents concerning downloading data while simultaneously making phone calls, Bloomberg reported.

          • Apple Owes Quarterhill $85 Million in Royalties, U.S. Jury Says

            WiLan’s two patents cover ways to make phone calls and download data at the same time. A different jury in 2018 said Apple infringed the patents and awarded $145 million, but a new trial was ordered to reconsider the damages.


            The case is Apple Inc. v. Wi-Lan Inc., 14-2245, U.S. District Court for the Southern District of California (San Diego)

          • IP5 hold joint AI response meeting
          • The intellectual property dilemmas caused by AI-generated works

            Intellectual property is extremely valuable for your company. Not only can investments in innovation be recouped through the exploitation of intellectual property, you can also keep competitors at bay by enforcing these rights. In addition, the (re)structuring of intellectual property portfolios can provide strategic benefits.

            Traditionally, intellectual property rights vest with the human creator or inventor. At the time when intellectual property laws came into being, it was clear who the inventor or creator was: the human(s) that created the work. This can still be the case with AI-generated works if AI is merely used as a tool and human intervention in such a work is clearly present. However, the latter is becoming increasingly difficult to establish as the technology progresses rapidly and AI is able to operate more independently.


            Under the European Patent Convention (EPC), you can’t patent software ‘as such’. Case law shows that software is patentable when it can be presented as a new, non-obvious technical solution to a technical problem.

            The European Patent Office (EPO) has amended its guidelines to provide more clarity on the circumstances under which inventions in the field of AI are patentable. According to these guidelines, AI-based inventions are patentable as long as the method used serves a technical purpose. For example, the use of a neural network in a heart-monitoring apparatus for the purpose of identifying irregular heartbeats makes a technical contribution and is thus, in principle, patentable.

      • Trademarks

      • Copyrights/Entertainment/Sports

        • Is the New James Bond Film Just More Neoliberal Hype?

          Yet another James Bond sequel, No Time to Die, is scheduled for release in April 2020, and a major marketing rollout is now trying to build a frenzy of anticipation for the hugely popular and highly profitable spy thriller series.

        • Kobe Bryant, His Daughter and 7 Others Die in Helicopter Crash

          NBA legend Kobe Bryant, his daughter and seven others were killed Sunday when their helicopter plunged into a steep hillside in dense morning fog in Southern California, his sudden death at age 41 touching off an outpouring of grief for a star whose celebrity transcended basketball.

        • Kobe Bryant’s Death Creates a Logistical Nightmare for the Grammys

          The shocking and unexpected death of Kobe Bryant Sunday morning created a major crowd-control problem outside the Staples Center, where the Grammys red carpet and event was held.

        • Movie & TV Show Database Bombards Google With Bizarre Takedown Notices

          Movie and TV show information portal AlloCiné has reportedly sent a wave of DMCA notices to Google to have allegedly-infringing content taken down. Unfortunately, however, the complaints are littered with clearly erroneous URLs that target everything from Netflix and Amazon listings to news reports from sites like Wired, plus content on rival movie portals such as JustWatch and Rotten Tomatoes.

        • Indonesia Faces Call for US Trade Sanctions over Online Piracy

          The MPA, RIAA and other entertainment industry groups are unhappy with Indonesia’s progress on the anti-piracy front. The country is blocking over 1,500 pirate domains but should do more to prevent domain hopping, they argue. Without significant improvement on this and other copyright issues, the rightsholders advise the US Government to suspend or withdraw several trade benefits.

        • AG Szpunar advises CJEU to rule that car leasing companies are not ‘users’ that provide a communication to the public

          Eventually, the matter reached the Swedish Supreme Court, which stated that, according to CJEU case law, it is apparent that a communication to the public may take place – in the manner envisaged by Article 3(1) of the InfoSoc Directive – when transmissions are made by means of technical equipment to a nearby public (e.g. in a hotel, café, rehabilitation centre, or a spa). Furthermore, the CJEU has held that hotel operators carry out a “communication to the public” in light of Article 8(2) of the Rental Rights Directive, when hotel rooms are equipped with phonograms available in digital or physical form and which can be played or intercepted (Phonographic Performance Ireland, C-162/10). Nonetheless, the CJEU also came to the contrary conclusion regarding transmission of phonograms in a dentist’s waiting room (Società Consortile Fonografici, C-135/10). The Supreme Court was unsure how to treat the providers of rental cars. Thus, it asked the CJEU to answer the following questions:

          1) Does the hiring out of cars which are equipped as standard with radio receivers mean that the person who hires the cars out is a user who makes a communication to the public within the meaning of Article 3(1) of Directive 2001/29 and within the meaning of Article 8(2) of Directive 2006/115?

          2) What is the significance, if any, of the volume of the car hire activities and the duration of the hires?

EPO: Goodbye to the Rule of Law and Hey Hi, AI!

Posted in Deception, Europe, Law, Patents at 6:04 am by Dr. Roy Schestowitz

Oh, hi! Welcome to the EPO, where examiners are now forced to violate the EPC.

On maths, stats, hey hi, technical contribution

Summary: The EPO’s embrace of buzzwords — no longer a unique EPO strategy (it has already spread elsewhere) — puts examiners in a very bad position and they’re grappling with nerve- and mind-racking dilemmas (risk of unemployment for truly upholding the EPC)

THE “HEY HI” (AI) buzzword is pure magic. Things are “innovative” just by virtue of being labeled “HEY HI” (AI) and the U.S. Patent and Trademark Office (USPTO) nowadays exploits this buzzword — boosted by at least two years of unprecedented media hype — to discard/disregard 35 U.S.C. § 101. The hype is also exploited by abusive WIPO and occasionally in Munich’s abusive think tanks, which serve litigation firms.

“Using new guidelines the EPO more or less forces examiners to allow such illegal patents (or risk losing the job).”As noted here before, WIPR’s puff piece “IP5 hold joint AI response meeting” (based on EPO fluff alone) contributed to the idea that media was ‘captured’ by maximalists and European Patent Office (EPO) management, pushing for software patents in Europe at every turn not because software professionals want these but because litigation firms want these. António Campinos meddling in a Board decision (upcoming case) regarding the matter is another insult on top of an injury (caused mostly by Battistelli).

The other day, promoted through a network of law firms was this piece by Yasar Celebi (CMS Netherlands) which leverages “HEY HI” (AI) as means by which to bypass the EPC and grant patents on algorithms. To quote:

Under the European Patent Convention (EPC), you can’t patent software ‘as such’. Case law shows that software is patentable when it can be presented as a new, non-obvious technical solution to a technical problem.

The European Patent Office (EPO) has amended its guidelines to provide more clarity on the circumstances under which inventions in the field of AI are patentable. According to these guidelines, AI-based inventions are patentable as long as the method used serves a technical purpose. For example, the use of a neural network in a heart-monitoring apparatus for the purpose of identifying irregular heartbeats makes a technical contribution and is thus, in principle, patentable.

It boils down to maths and statistics, but when the EU is seen promoting this whole AI hype (not even a new thing, it’s decades old) we’re supposed to ignore that simple fact and resort to vague nonsense like “technical contribution” (or “effect”) and tolerate grants of illegal (invalid) patents. Using new guidelines the EPO more or less forces examiners to allow such illegal patents (or risk losing the job). In other words, they’re compelled to break the law to comply with rules or put in a position where they must choose between employment and obeying the law.

IRC Proceedings: Sunday, January 26, 2020

Posted in IRC Logs at 2:30 am by Needs Sunlight



#techrights log

#boycottnovell log



#boycottnovell-social log

#techbytes log

Enter the IRC channels now

« Previous entries Next Page » Next Page »

Further Recent Posts

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources




Samba logo

We support

End software patents


GNU project


EFF bloggers

Comcast is Blocktastic? SavetheInternet.com

Recent Posts