EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

03.26.17

Links 26/3/2017: Debian Project Leader Elections, SecureDrop and Alexandre Oliva FSF Winners

Posted in News Roundup at 4:38 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • SAP buys into blockchain, joins Hyperledger Project
  • Events

    • foss-north speaker line-up

      I am extremely pleased to have confirmed the entire speaker line-up for foss north 2017. This will be a really good year!

  • Web Browsers

    • Chrome

      • Chromium/Chrome Browser Adds A glTF Parser

        Google’s Chrome / Chromium web-browser has added a native glTF 1.0 parser. The GL Transmission Format, of course, being Khronos’ “3D asset delivery format” for dealing with compressed scenes and assets by WebGL, OpenGL ES, and other APIs.

        There are glTF utility libraries in JavaScript and other web-focused languages, but Google adding a native glTF 1.0 parser appears to be related to their VR push with supporting VR content on the web. Their glTF parser was added to Chromium Git on Friday.

  • CMS

    • Sex and Gor and open source

      A few weeks ago, Dries Buytaert, founder of the popular open-source CMS Drupal, asked Larry Garfield, a prominent Drupal contributor and long-time member of the Drupal community, “to leave the Drupal project.” Why did he do this? He refuses to say. A huge furor has erupted in response — not least because the reason clearly has much to do with Garfield’s unconventional sex life.

      [...]

      I’ll unpack the first: open-source communities/projects are crucially important to many people’s careers and professional lives — cf “the cornerstone of my career” — so who they allow and deny membership to, and how their codes of conduct are constructed and followed, is highly consequential.

  • Pseudo-Open Source (Openwashing)

  • FSF/FSFE/GNU/SFLC

  • Openness/Sharing/Collaboration

    • Open Hardware/Modding

      • MRRF 17: Lulzbot and IC3D Release Line Of Open Source Filament

        Today at the Midwest RepRap Festival, Lulzbot and IC3D announced the creation of an Open Source filament.

        While the RepRap project is the best example we have for what can be done with Open Source hardware, the stuff that makes 3D printers work – filament, motors, and to some extent the electronics – are tied up in trade secrets and proprietary processes. As you would expect from most industrial processes, there is an art and a science to making filament and now these secrets will be revealed.

  • Programming/Development

Leftovers

  • Health/Nutrition

    • Cod fishing catches plummet in waters off New England

      The National Oceanic and Atmospheric Administration released an assessment of the Gulf of Maine cod stock in 2014 that said the spawning population was at its lowest point in the history of the study of the fish. Scientists have cited years of overfishing and inhospitable environmental conditions as possible reasons for the decline.

    • [Old] Methane Hydrate: Killer cause of Earth’s greatest mass extinction [iophk: "warning: Elsevier"]

      Global warming triggered by the massive release of carbon dioxide may be catastrophic, but the release of methane from hydrate may be apocalyptic

    • Kochs pledge millions to GOPers in 2018 — if they vote no on health care bill

      In a last-minute effort to sink the Republican health care bill, a powerful network of conservative donors said Wednesday it would create a new fund for Republican 2018 reelection races — but they’ll only open it up to GOPers who vote against the bill.

      The advocacy groups helmed by Charles and David Koch have unveiled a new pool of money for advertisements, field programs and mailings that would exclude those who vote for the health care bill they oppose on Thursday. The effort, which they described as worth millions of dollars, is an explicit warning to on-the-fence Republicans from one of the most influential players in electoral politics not to cross them.

    • Kochs Bankroll Move to Rewrite the Constitution

      A constitutional convention, something thought impossible not long ago, is looking increasingly likely. Under Article V of the U.S. Constitution, if 34 state legislatures “issue a call” for a constitutional convention, Congress must convene one. By some counts, the right-wing only needs six more states. Once called, delegates can propose and vote on changes and new amendments to the U.S. Constitution, which, if approved, are currently required to be ratified by 38 states.

  • Security

    • NSA: We Disclose 90% of the Flaws We Find

      In the wake of the release of thousands of documents describing CIA hacking tools and techniques earlier this month, there has been a renewed discussion in the security and government communities about whether government agencies should disclose any vulnerabilities they discover. While raw numbers on vulnerability discovery are hard to come by, the NSA, which does much of the country’s offensive security operations, discloses more than nine of every 10 flaws it finds, the agency’s deputy director said.

    • EFF Launches Community Security Training Series

      EFF is pleased to announce a series of community security trainings in partnership with the San Francisco Public Library. High-profile data breaches and hard-fought battles against unlawful mass surveillance programs underscore that the public needs practical information about online security. We know more about potential threats each day, but we also know that encryption works and can help thwart digital spying. Lack of knowledge about best practices puts individuals at risk, so EFF will bring lessons from its comprehensive Surveillance Self-Defense guide to the SFPL.

      [...]

      With the Surveillance Self-Defense project and these local events, EFF strives to help make information about online security accessible to beginners as well as seasoned techno-activists and journalists. We hope you will consider our tips on how to protect your digital privacy, but we also hope you will encourage those around you to learn more and make better choices with technology. After all, privacy is a team sport and everyone wins.

    • NextCloud, a security analysis

      First, I would like to scare everyone a little bit in order to have people appreciate the extent of this statement.

      As the figure that opens the post indicates, there are thousands of vulnerable Owncloud/NextCloud instances out there. It will surprise many just how easy is to detect those by trying out common URL paths during an IP sweep.

    • FedEx will deliver you $5.00 just to install Flash

      Bribes on offer as courier’s custom printing service needs Adobe’s security sinkhole

  • Defence/Aggression

    • The New Laptop Ban Adds to Travelers’ Lack of Privacy and Security

      It can be difficult to understand the intent behind anti-terrorist security rules on travel and at the border. As our board member Bruce Schneier has vividly described, much of it can appear to be merely “security theater”—steps intended to increase the feeling of security, while doing much less to actually achieve it.

      This week the U.S. government, without warning or public explanation, introduced a sweeping new device restriction on travelers flying non-stop to the United States from ten airports in eight Muslim-majority countries, and nine airlines from those countries. Passengers on these flights must now pack large electronics (including tablets, cameras, and laptops) into their checked luggage.

    • Laptop ban on planes came after plot to put explosives in iPad

      The US-UK ban on selected electronic devices from the passenger cabins of flights from some countries in north Africa and the Middle East was partly prompted by a previously undisclosed plot involving explosives hidden in a fake iPad, according to a security source.

      The UK ban on tablets, laptops, games consoles and other devices larger than a mobile phone came into effect on Saturday. It applies to inbound flights from six countries – Egypt, Jordan, Lebanon, Saudi Arabia, Tunisia and Turkey. Six UK airlines – British Airways, EasyJet, Jet2, Monarch, Thomas Cook and Thomson – and eight foreign carriers are affected.

      It follows a similar move in the US, which applies to flights from 10 airports in eight countries – Jordan, Egypt, Turkey, Saudi Arabia, Morocco, Qatar, Kuwait and the United Arab Emirates.

    • Risks to US from War on North Korea

      Experts agree that within a few years, at most, North Korea will have mastered the ballistic missile technology needed to destroy U.S. cities with nuclear warheads. It recently demonstrated the use of solid-fuel technology in intermediate-range missiles, and earlier this month the regime tested a sophisticated new rocket engine that even South Korea called a technical breakthrough.

      [...]

      Last fall, the influential Council on Foreign Relations issued a major white paper calling North Korea’s weapons program “a grave and expanding threat” and asserting that Washington may have no choice but to “consider more assertive military and political actions, including those that directly threaten the existence of the [North Korean] regime and its nuclear and missile capabilities.”

      Such threats are foolhardy and counterproductive. As many analysts point out, a pre-emptive attack by the United States cannot guarantee to destroy all of North Korea’s hidden nuclear weapons or mobile missile launchers. Missing even a handful would guarantee the incineration of Seoul, Tokyo, and other nearby cities in radioactive fireballs. Even in the best case, North Korea could respond by flattening Seoul with artillery barrages, and killing tens of thousands of Koreans and Japanese with chemical weapons.

    • The war in Yemen: two years old and maturing?

      The United Nations has stated that, of the four famines predicted for 2017, Yemen is the worst, with seven million people close to starvation and a further ten million in urgent need.

    • Trump’s War on Terror Has Quickly Become as Barbaric and Savage as He Promised

      From the start of his presidency, Donald Trump’s “war on terror” has entailed the seemingly indiscriminate slaughter of innocent people in the name of killing terrorists. In other words, Trump has escalated the 16-year-old core premise of America’s foreign policy – that it has the right to bomb any country in the world where people it regards as terrorists are found – and in doing so has fulfilled the warped campaign pledges he repeatedly expressed.

      The most recent atrocity was the killing of as many as 200 Iraqi civilians from U.S. airstrikes this week in Mosul. That was preceded a few days earlier by the killing of dozens of Syrian civilians in Raqqa Province when the U.S. targeted a school where people had taken refuge, which itself was preceded the week earlier by the U.S. destruction of a mosque near Aleppo that also killed dozens. And one of Trump’s first military actions was what can only be described as a massacre carried out by Navy SEALS in which 30 Yemenis were killed; among the children killed was an 8-year-old American girl (whose 16-year-old American brother was killed by a drone under Obama).

    • Trump Insults the Media, but Bush Bullied and Defanged It to Sell the Iraq War

      As we pass the 14th anniversary of the U.S. invasion of Iraq, its chief progenitor is suddenly beloved by the mainstream media again.

      Every time former President George W. Bush pops up somewhere these days, media pundits gush about how good he looks now, compared to Donald Trump. Recently, for instance, he described himself – and was dutifully portrayed as — a great supporter of the free press.

      “I consider the media to be indispensable to democracy,” he told NBC’s Matt Lauer in early March. “That we need the media to hold people like me to account. I mean, power can be very addictive and it can be corrosive and it’s important for the media to call to account people who abuse their power, whether it be here or elsewhere.”

      The same week, he similarly assured a gushing daytime talk show host Ellen DeGeneres that “I’m a big believer in free press.”

    • America Digs Its Own Afghan Grave

      Afghanistan has long been called the “graveyard of empires,” the site of failed invasions. But the U.S. – in its 15-plus-year endeavor – seems determined to dig its own grave there, as ex-CIA analyst Paul R. Pillar describes.

    • America Digs Its Own Afghan Grave

      The United States had an earlier experience injecting armed force into Afghanistan, with its provision of lethal aid — most notably Stinger anti-aircraft missiles — to mujahedin fighting against the Soviets in the 1980s. During that effort, U.S. policymakers showed little or no concern with the political nature and direction of the forces they were aiding, which included what we would today quickly label as violent Islamists. Those forces were used as a tool to bleed the Soviets, who got themselves stuck in a military expedition that reached a strength just slightly bigger (about 115,000 troops) than the later U.S. expedition.

  • Environment/Energy/Wildlife/Nature

    • The North Atlantic may get its first-ever named storm in March next week
    • Trump’s Defense Secretary Cites Climate Change as National Security Challenge

      Our story on March 13 concerning Secretary of Defense James Mattis’ views on the relationship between climate change and national security was based on excerpts from unpublished written exchanges between Mattis and several Democrats on the Senate Armed Services Committee following his Jan. 12 confirmation hearing. ProPublica has now obtained more comprehensive sets of these “Questions for the Record” and his answers.

      While the exchanges mainly focus on climate change, fossil fuel and renewable energy and related security issues, which was the initial reporting focus, they include discussions of Mattis’ views on issues ranging from Iran’s nuclear weapons program to ISIS, Guantanamo and LGBT issues in the military. The merged documents are posted on DocumentCloud.

  • Finance

    • [Possible paywall] Uber Group’s Visit to Seoul Escort Bar Sparked HR Complaint

      woman who dated Uber CEO Travis Kalanick for three years, Gabi Holzwarth, says she was with Mr. Kalanick when he and a team of five Uber employees visited an escort-karaoke bar in Seoul in mid-2014.

    • We’re in a fine mess if George Osborne is our last hope of halting Brexit

      To adapt Dr Samuel Johnson’s famous saying: attacking the BBC for alleged bias is a last refuge of the scoundrel. In this case, the scoundrel is one Julian Knight MP, who last week assembled some 70 fellow Brexiters to attack the BBC for allegedly being biased in favour of the Remain camp.

      Yes, we Remainers still exist and, according to an interesting finding by Alastair Campbell, our numbers may well be growing, which could help to explain why the Leave camp, ostensibly monarch of all it surveys, is displaying increasing signs of insecurity, as the falsity of its prospectus becomes manifest to a more reflective audience.

      Campbell wrote in the New European that at speaking events, he asks for a show of hands in response to the question: “Are you broadly optimistic or pessimistic about Brexit?”

      When he put this recently to 250 people who recruit from universities for their companies or organisations, only one optimistic hand went up. As Campbell says: “For the other 249 or so … you get the picture. Pessimism by a landslide. These are people who feel they have no voice in the debate as May wishes to conduct it.”

    • The Observer view on triggering article 50

      Like sheep, the British people, regardless of whether they support Brexit, are being herded off a cliff, duped and misled by the most irresponsible, least trustworthy government in living memory. The moment when article 50 is triggered, signalling Britain’s irreversible decision to quit the EU, approaches inexorably. This week, on Black Wednesday, the UK will throw into jeopardy the achievements of 60 years of unparalleled European peace, security and prosperity from which it has greatly benefited. And for what?

      The ultra-hard Tory Brexit break with Europe that is now seen as the most likely outcome when the two-year negotiation concludes is the peacetime equivalent of the ignominious retreat from Dunkirk. It is a national catastrophe by any measure. It is a historic error. And Theresa May, figuratively waving the cross of St George atop the white cliffs of Dover like a tone-deaf parody of Vera Lynn, will be remembered as the principal author of the debacle. This is not liberation, as Ukip argues, nor even a fresh start. It is a reckless, foolhardy leap into the unknown and the prelude, perhaps, to what the existentialist writer Albert Camus described in La chute – a fall from grace, in every conceivable sense.

    • Former Lobbyist With For-Profit Colleges Quits Education Department

      A former lobbyist for an association of for-profit colleges resigned last Friday from the Department of Education, where he had worked for about a month.

      As ProPublica reported last week, the Trump administration had hired Taylor Hansen to join the department’s “beachhead” team, a group of temporary hires who do not require approval from the U.S. Senate for their appointments.

      On the day Hansen resigned, Sen. Elizabeth Warren, D-Mass., sent a letter to Secretary of Education Betsy DeVos, citing ProPublica’s reporting and requesting more information on Hansen’s role.

    • AT&T, Verizon Feign Ethical Outrage, Pile On Google’s ‘Extremist’ Ad Woes

      So you may have noticed that Google has been caught up in a bit of a stink in the UK over the company’s YouTube ads being presented near “extremist” content. The fracas began after a report by the Times pointed out that advertisements for a rotating crop of brands were appearing next to videos uploaded to YouTube by a variety of hateful extremists. It didn’t take long for the UK government — and a number of companies including McDonald’s, BBC, Channel 4, and Lloyd’s — to engage in some extended pearl-clutching, proclaiming they’d be suspending their ad buys until Google resolved the issue.

    • 50+ Economists Warn Against Neoliberalism’s Return in Ecuador

      Over the past ten years, Ecuador has achieved major economic and social advances. We are concerned that many of these important gains in poverty reduction, wage growth, reduced inequality, and greater social inclusion could be eroded by a return to of the policies of austerity and neoliberalism that prevailed in Ecuador from the 1980s to the early 2000s. A return to such policies threatens to put Ecuador back on a path that leads not only to a more unequal society, but to more political instability as well. It is important to recall that from 1996 to 2006, Ecuador went through eight presidents.

    • The First Brick in the Wall

      President Donald Trump’s administration announced a $600 million bidding contest late Friday night to kick off construction of The Wall, a towering physical barrier between the United States and Mexico.

      The process will start with little walls — an unknown number of barriers of concrete and other materials that will serve as models for the bigger wall, which Trump made central to his political campaign.

      Construction will proceed with unusual haste. Companies have just two weeks to submit proposals. Finalists will make a 2 1/2-hour-long oral presentation to the U.S. Customs and Border Protection agency, which is overseeing the contest. Winners will be announced by late May.

      Steven Schooner, a professor of government contracting at George Washington University, tweeted that the process was “extremely/uniquely complicated (and confusing).”

      But CBP officials said the approach was designed to get the best value for the government.

      “Through the construction of prototypes, CBP will partner with industry to identify the best means and methods to construct border wall before making a more substantial investment in construction,” the agency said in a statement.

  • AstroTurf/Lobbying/Politics

    • From Russia, with Panic

      The Russians hacked America.

      After Donald Trump’s surprise victory in November, these four words reverberated across the nation. Democratic Party insiders, liberal pundits, economists, members of Congress, spies, Hollywood celebrities, and neocons of every stripe and classification level—all these worthy souls reeled in horror at the horribly compromised new American electoral order. In unison, the centers of responsible opinion concurred that Vladimir Putin carried off a brazen and successful plan to throw the most important election in the most powerful democracy in the world to a candidate of his choosing.

      It seemed like a plotline from a vintage James Bond film. From his Moscow lair, Vladimir Putin struck up an alliance with Julian Assange to mount a massive cyber-offensive to discredit Hillary Clinton and her retinue of loyal Democratic Party operatives in the eyes of the American public.

      The plot was full of twists and turns and hair-raising tangents, including tales of Russian-American retiree-agents sunning in Miami while collecting payoffs from Russia’s impoverished pension system. But the central ruse, it appears, was to enter the email server of the Democratic National Committee and then tap into the Gmail account belonging to John Podesta, founder of the Center for American Progress and premier D.C. Democratic insider.

    • Trump in No Hurry to Staff ‘Enemy of the People’ Offices

      The New York Times (3/12/17) reported that the Trump administration, for a variety of reasons, was filling the offices of administrative agencies at a glacial pace. From the Department of Agriculture to the Weather Service, over 2,000 mid-level political-appointee positions were still unfilled; the Times called it “the slowest transition in decades.”

      One place that slowness has showed up clearly is in the staffing of what are variously called Public Affairs offices, Newsrooms or Media Offices of these government departments and agencies—the very offices that reporters in both Washington bureaus and in newsrooms around the country depend on to get routine information about what these departments and agencies are doing, or, in the case of more investigative assignments, to ask basic questions and set up interviews with key personnel.

      This reporter stumbled upon the problem earlier in the month while researching a story for High Times magazine on the fate, in the Trump administration, of the now 19-year-old ban on federal student aid for any students who are convicted of even a minor criminal drug violation. In my case, I began by calling the Department of Education’s Press Room. (As of March 17, the website was still listing Arne Duncan as Secretary of Education, though he left a year ahead of Obama, and there was another secretary, John King, before Trump nominee Betsy DeVos took over.)

    • Donald Trump and the Triumph of White Identity Politics

      A recent study conducted by researchers at the University of Massachusetts Amherst entitled Explaining White Polarization in the 2016 Vote for President: The Sobering Role of Racism and Sexism found that “while economic dissatisfaction was part of the story, racism and sexism were much more important and can explain about two-thirds of the education gap among whites in the 2016 presidential vote.” The analysis used data from a national survey conducted during the final week of October (just days before the election), and concluded that the negative effects of neoliberalism and the rule of Wall Street were not the single most important factor in the victory for Trump. Rather it was “whiteness” and misogyny which played a pivotal role.

    • Chris Hedges Explains the Importance of ‘Robust’ Public Broadcasting (Video)

      Chris Hedges just received a Daytime Emmy nomination for his weekly online show “On Contact.” The Truthdig columnist is nominated for Outstanding Information Talk Show Host, alongside mainstream daytime hosts like Dr. Oz and Steve Harvey.

      “We need programs where dissident voices that challenge the dominant narrative, that critique systems of power, including of course corporate power, can be heard,” Hedges said in a press release. “And there is almost no space left, and that’s what we’ve tried to do with ‘On Contact,’ to fill that void.”

    • What causes the populist infection? How can it be cured?

      According to this study, while older generations keep thinking that democracy is essential, younger generations are much more indifferent. In Europe, about 52% of citizens among the generation born in the 1930s believe that to live in a democratic country is fundamental, but only about 45% among those born in the 1980s share this opinion. In the United States, the intergenerational gap is even more heightened. 72% of citizens born in the 1930s believed democracy is essential, while only around 30% of those born in the 1980s had the same view.

  • Censorship/Free Speech

  • Privacy/Surveillance

  • Civil Rights/Policing

  • Internet Policy/Net Neutrality

    • Charter’s Trying To Kill Recent Merger Conditions Banning Usage Caps, Net Neutrality Violations

      For decades now the FCC has been an expert at imposing utterly meaningless merger conditions. Usually these conditions are proposed by the companies’ themselves, knowing full well these “demands” are utterly hollow — and FCC punishment for ignoring them will be virtually non-existent. The end result has been a rotating tap dance of merger conditions that sound good upon superficial press inspection, but wind up being little more than hot air. It’s a symbiotic relationship where as the telecom sector consolidates (often at the cost of less competition) the FCC gets to pretend it’s not selling consumer welfare down river.

    • Confidence Wavers In Google Fiber As ISP Cancels Installs, Refuses To Explain Why

      Late last year Google Fiber announced it would be pausing expansion into several new markets, axing its CEO, and shuffling a number of employees around. Reports subsequently emerged suggesting that Alphabet higher ups were growing frustrated with the high cost and slow pace of fiber deployment, and were contemplating an overall larger shift to wireless. While the company continues to insist that there’s nothing to see here and that everything is continuing as normal, signs continue to emerge that the ground Google Fiber is built on may not be particularly sturdy.

  • DRM

  • Intellectual Monopolies

    • UC Berkeley Receives CRISPR Patent in Europe [iophk: "now we are seeing what the US universities have been allowed to become"]

      The European Patent Office will grant patent rights over the use of CRISPR in all cell types to a University of California team, contrasting with a recent decision in the U.S.

    • Consumers Press the USTR Nominee on Trade Transparency

      A third front in our battle to reform the USTR’s closed and opaque trade negotiation practices is in a submission to the U.S. International Trade Commission (ITC) that we submitted this week. The ITC was seeking public submissions in an enquiry on digital trade, to gather input into a report that it is writing to advise the USTR on the topic.

      [...]

      As the renegotiation of NAFTA is around the corner, the need for USTR to reform its outdated practices is becoming increasingly urgent. With Congress, consumer groups, and international trade experts all demanding similar reforms from the next Trade Representative, we certainly hope that Robert Lighthizer is feeling the heat, and that he will rise to the challenge once he takes office.

    • Trademarks

      • Trademark Censoring: Hungary Considering Banning Heineken Red Star Trademark Because Communism

        When it comes to trademark law, it’s worth repeating that its primary function is to prevent customer confusion and to act as a benefit for consumer trust. This mission has become skewed in many ways in many countries, but one of the lessons learned via the Washington Redskins fiasco is that even well-meaning attempts to have government play obscenity cop will result in confusing inconsistency at best and language-policing at worst. When government begins attempting to apply morality to trademark law in that way, it skews the purpose of trademark entirely.

        To see that on display elsewhere, we need only look to Hungary, where the government is considering stripping the trademark protection for some of the branding for Heineken beer because it resembles the ever-scary demon that is communism.

    • Copyrights

      • Congress Leaks Draft Bill To Move Copyright Office Out Of The Library Of Congress

        Well, we all knew this was coming, but Rep. Bob Goodlatte has been passing around a draft of a bill to move the Copyright Office out of the Library of Congress. Specifically, it would make the head of the Copyright Office, the Copyright Register, a Presidentially appointed position, with 10-year terms, and who could only be removed by the President.

        [...]

        Either way, by making this a Presidential appointment, the MPAA and RIAA know that it will give them significantly greater say over who leads the office. Right now they can (and do!) lobby the Librarian of Congress on who should be chosen, but the Librarian gets to choose. One hopes that the Librarian would take into account the larger view of copyright law, and who it’s actually supposed to benefit — and we’re hoping that the current Librarian will do so (if given the chance). But making it a Presidential appointment will mean heavy lobbying by industry, and much less likelihood that the public interest is considered.

      • eBook Pirates Tend To Be Older And Well Off, Which Means They Pirate Because Of Human Intuition On Economics

        People tend to have a hard time discussing the two mathematical concepts of zero and infinity. It’s not hard to understand why this is, of course, with reality being a material thing and both the lack of and the infinite amount of something being somewhat foreign. And this manifests itself in all sorts of disciplines, from cosmology to spirituality to physics. And, of course, economics, particularly in the digital age where many of the axioms surrounding physicality no longer apply to digitized goods. Zero and infinity play heavy roles here, both in the discussion of free content (zero) and the concept of digital and freely copyable goods as a resource (infinity). The economic nature of these concepts have long vexed established industries, even as some of us have pointed out how efficient and useful infinite digital goods can be if properly applied.

        [...]

        With nearly half of eBook pirates falling into their thirties or forties, and the study later showing that two-thirds of eBook pirates have household incomes of at least $30k per year, and almost a third having incomes in six figures, this simply isn’t a situation that can be explained away by pointing at young poor people. So, why do older, more affluent people pirate eBooks?

        I would argue it’s instinctual. Most of these people may not even be able to explain the term “marginal cost”, but by instinct they feel that something that costs nothing to reproduce ought not to require payment. Their brains do this calculation behind the scenes, not thinking about the sunk costs of initial production, nor the sweat-equity spent by the content creator. Marginal cost is the term used by economists to explain pricing laws that emerged organically through human instinct.

      • Rightscorp Boss Signs Deal That Could Be Bad News For Pirates

        Unfortunately for them, the company is a miserable performer and has lost millions over the past few years. On a good day its stock is worth around $0.04. On a bad one, barely half of that.

      • Lawyers & Academics Warn UK Against Criminalizing File-Sharers
      • Australia Stalls Copyright Safe Harbor Proposal

        Copyright safe harbors for Internet intermediaries are under attack from Big Media both in the United States and in Europe. Laying the blame for falling revenues on platforms such as YouTube and Facebook (despite that fact that revenues aren’t actually falling at all), their aim is to impose new controls over how these platforms allow you to access and share content online. The control at the top of their wish-list is a compulsory upload filter, that would automatically screen everything that you upload. Such a requirement would be a costly imposition on smaller platforms and new innovators, and provide governments with a ready-built infrastructure for content censorship.

        In Australia, the situation is a little different—because due to an oversight in implementation of the original U.S.-Australia Free Trade Agreement in 2005, they never had a copyright safe harbor system to begin with; or rather, a much narrower one which only applies to ISPs, but not to other Internet platforms, nor even to other Internet access providers such as libraries and educational institutions. This oversight was due to be remedied with the passage of new amendments to Australia’s Copyright Act. (The TPP, had it passed, would also have required Australia to bring in this reform.)

      • Australian Govt.: Just Kidding On That Whole Safe Harbors Reform Thing, Guys

        It was just last week that we discussed the pleasant news that Australia’s Prime Minister was backing the idea of reforming the country’s safe harbor laws, which are far out of line with much of the world as the result of poor wording. The whole thing can be basically summarized thusly: in Australia, safe harbor protections only apply to commercial ISPs, as opposed to service providers like websites or institutions that offer internet access, because someone decided to use the term “carriage service providers” in the law as opposed to simply “service providers.” Essentially everyone agrees this was done in error as opposed to intentionally, yet it’s been decades and nobody has bothered fixing the law.

        Until some members of the government revived an attempt to do so and got the Prime Minister’s support. Doing so would have put Australian law on equal footing with the EU and American safe harbor provisions, meaning that service providers generally couldn’t be scapegoated for the actions of a third party. You know, holding the actual people culpable of a crime accountable instead of the service provider.

03.25.17

Links 25/3/2017: Maru OS 0.4, C++17 Complete

Posted in News Roundup at 6:00 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Communities of Communities: The Next Era of Open Source Software

    We are now about 20 years into the open source software era. You might think that open source simply means publishing the source code for something useful. While this is correct by definition, the most important component of any open source project is its community and how it works together.

    Open source projects are not isolated islands. In fact, it’s common for them to depend on each other. As new projects are created, it is also common that members come from related projects to work on something new. Apache Arrow is an example of a new project that worked across many related projects, creating a new community that from the beginning knew it needed to build a community of communities.

  • 9 Open Source Storage Solutions: A Perfect Solution To Store Your Precious Data

    Whatever business nature you have, there must be some precious data which you want to store in a secured place. Finding a right storage solution is always critical for business, especially for small and medium, but what if you get a perfect solution at no cost.

    There is no doubt that business cant runs without data, but while looking for a solution, you might need to spend a fortune to cover all your storage requirements. Open source tools come as the viable solution where you won’t spend money yet get a suitable solution to store your precious data. And don’t worry we will help you to find one of the best.

  • 15 Open Source Solutions To Setup Your Ecommerce Business

    In the past few years, there is a rapid growth in the online sales. According to a survey, more than 40% people are now shifted to online stores and majorly buying products from their smartphones and tablets.

    With the expeditious rise in the online marketplace, more business introducing online stores. For the big fishes in the industry, the expenses of setting up an online store is like spending peanuts, but for the small or startups, it appears to be a fortune.

    The smart move could be open source platforms, to begin with as they are not only free also reliable and scalable. One can set up the online store not only quickly as well as, in future if you want to add some of the functionalities, which are available with only premium, can be done by paying quite a small amount.

  • An Industry First: Teradata Debuts Open Source Kylo to Quickly Build, Manage Data Pipelines
  • Why You Should Consider Open Sourcing Your Software

    Free & Open source software have grown so rapidly in the last few years. Just compare the situation of being ignored and considered like a nerds-movement in the early 2000’s to the situation today in 2017. We surly made a huge advancement so far. Thanks to the amazing ecosystem of open source which links both communities and enterprises together.

    However, when it comes to individuals, a lot of people are hesitant when it comes to open-sourcing their software. They think that the “secret” behind it will be stolen. They think that they will be releasing their work “for nothing in return” when they do so. That’s definitely false.

  • Events

    • Speaking at FOSSASIA’17 | Seasons of Debian : Summer of Code & Winter of Outreachy

      I got an amazing chance to speak at FOSSASIA 2017 held at Singapore on “Seasons of Debian – Summer of Code and Winter of Outreachy“. I gave a combined talk with my co-speaker Pranav Jain, who contributed to Debian through GSoC. We talked about two major open source initiatives – Outreachy and Google Summer of Code and the work we did on a common project – Lumicall under Debian.

    • Notes from Linaro Connect

      The first of two 2017 Linaro Connect events was held March 6 to 10 in Budapest, Hungary; your editor had the privilege of attending. Reports from a number of the sessions there have appeared in separate articles. There were a number of discussions at the event that, while not being enough to fill an article on their own, were nevertheless worthy of some attention.

      Connect is an interesting event, in that it is a combination of an architecture-specific kernel developers’ gathering and a members-only meeting session. Not being a member, your editor only participated in the former aspect. Sessions at Connect are usually short — 25 minutes — and focused on a specific topic; they also routinely run over their allotted time. There is an emphasis on discussion, especially in the relatively unstructured “hack sessions” that occupy much of the schedule. Many of the sessions are focused on training: how to upstream code, for example, or kernel debugging stories in Mandarin (video).

    • Your guide to LibrePlanet 2017, wherever you are, March 25-26

      The free software community encompasses the globe, and we strive to make the LibrePlanet conference reflect that. That’s why we livestream the proceedings of the conference, and encourage you to participate remotely by both watching and participating in the discussion via IRC chat.

      If you are planning to attend LibrePlanet in Cambridge, we encourage you to register in advance through Tuesday morning at 10:00 EST (14:00 UTC) — advance registration helps us plan a better event. Walk ups are also welcome. Students and FSF members receive gratis admission.

    • IBM Interconnect 2017 first day keynote recap
    • Community Leadership Summit 2017: 6th – 7th May in Austin

      Secondly, the bulk of the event is an unconference where the attendees volunteer session ideas and run them. Each session is a discussion where the topic is discussed, debated, and we reach final conclusions. This results in a hugely diverse range of sessions covering topics such as event management, outreach, social media, governance, collaboration, diversity, building contributor programs, and more. These discussions are incredible for exploring and learning new ideas, meeting interesting people, building a network, and developing friendships.

  • Web Browsers

    • Mozilla

      • MUA++ (or on to thunderbird)
      • Caspia Projects and Thunderbird – Open Source In Absentia

        What does this have to do with Thunderbird? I sat in a room a few weeks ago with 10 guys at Clallam Bay, all who have been in a full-time, intensive software training program for about a year, who are really interested in trying to do real-world projects rather than simply hidden internal projects that are classroom assignments, or personal projects with no public outlet. I start in April spending two days per week with these guys. Then there are another 10 or so guys at WSR in Monroe that started last month, though the situation there is more complex. The situation is similar to other groups of students that might be able to work on Thunderbird or Mozilla projects, with these differences:1) Student or GSOC projects tend to have a duration of a few months, while the expected commitment time for this group is much longer.

  • BSD

    • Make Dragonfly BSD great again!

      Recently I spent some time reading Dragonfly BSD code. While doing so I spotted a vulnerability in the sysvsem subsystem that let user to point to any piece of memory and write data through it (including the kernel space). This can be turned into execution of arbitrary code in the kernel context and by exploiting this, we’re gonna make Dragonfly BSD great again!

  • Licensing/Legal

    • OpenSSL Re-Licensing to Apache License v. 2.0

      The OpenSSL project, home of the world’s most popular SSL/TLS and cryptographic toolkit, is changing its license to the Apache License v2.0 (ASL v2). As part of this effort, the OpenSSL team launched a new website and has been working with various corporate collaborators to facilitate the re-licensing process.

  • Programming/Development

Leftovers

  • We need a software revolution for the greater social good

    Five years ago, tech entrepreneur and venture capitalist Marc Andreessen famously wrote, “Software is eating the world.” It’s hard to think of more prophetic words coming out of Silicon Valley, and new players that have software at their core continue to reinvent entire industries. Uber disrupting the taxi industry and Airbnb the hospitality industry are just two examples.

  • FedEx Caught Off-Guard By Browsers Blocking Flash, Will Give Customers $5 To Enable It

    FedEx will give customers that use the Chrome 56 and Safari 10 browsers or newer a $5 discount once they enable the Flash plugin. The offer comes after both Chrome and Safari have started blocking Flash content by default in the past few months.

  • Science

    • Robots are stronger, faster, more durable… and hackable

      We hear a lot about robots getting smarter as the AI juggernaut rolls on, but less about significant gains in strength and durability thanks to better electric motors and batteries.

      That growing physical prowess raises risks to people near them should something go wrong, which means it is more vital than ever that these devices, set to share our living and working spaces, remain entirely under our control.

  • Hardware

    • Five reasons why I’m excited about POWER9

      There’s plenty to like about the POWER8 architecture: high speed interconnections, large (and flexible) core counts, and support for lots of memory. POWER9 provides improvements in all of these areas and it has learned some entirely new tricks as well.

  • Security

    • Google Threatens to Distrust Symantec SSL/TLS Certificates

      Google is warning that it intends to deprecate and remove trust in Symantec-issued SSL/TLS certificates, as Symantec shoots back that the move is unwarranted.

    • Hackers Stole My Website…And I Pulled Off A $30,000 Sting Operation To Get It Back

      I learned that my site was stolen on a Saturday. Three days later I had it back, but only after the involvement of fifty or so employees of six different companies, middle-of-the-night conferences with lawyers, FBI intervention, and what amounted to a sting operation that probably should have starred Sandra Bullock instead of…well…me.

    • Google Summer of Code

      The Linux Foundation umbrella organization is responsible for this year’s WireGuard GSoC, so if you’re a student, write “Linux Foundation” as your mentoring organization, and then specify in your proposal your desire to work with WireGuard, listing “Jason Donenfeld” as your mentor.

    • Takeaways from Bruce Schneier’s talk: “Security and Privacy in a Hyper-connected World”

      Bruce Schneier is one of my favorite speakers when it comes to the topic of all things security. His talk from IBM Interconnect 2017, “Security and Privacy in a Hyper-connected World“, covered a wide range of security concerns.

    • [Older] Make America Secure Again: Trump Should Order U.S. Spy Agencies to Responsibly Disclose Cyber Vulnerabilities

      Last week, WikiLeaks released a trove of CIA documents that detail many of the spy agency’s hacking capabilities. These documents, if genuine (and early reports suggest that they are), validate concerns that U.S. spy agencies are stockpiling cybersecurity vulnerabilities. The intelligence community uses undisclosed vulnerabilities to develop tools that can penetrate the computer systems and networks of its foreign targets. Unfortunately, since everyone uses the same technology in today’s global economy, each of these vulnerabilities also represents a threat to American businesses and individuals. In the future, rather than hoard this information, the CIA and other intelligence agencies should commit to responsibly disclosing vulnerabilities it discovers to the private sector so that security holes can be patched.

    • Announcing Keyholder: Secure, shared shell access

      The new software is a ssh-agent proxy that allows a group of trusted users to share an SSH identity without exposing the contents of that identity’s private key.

      [...]

      A common use of the ssh-agent is to “forward” your agent to a remote machine (using the -A flag in the OpenSSH client). After you’ve forwarded your ssh-agent, you can use the socket that that agent creates to access any of your many (now unencrypted) keys, and login to any other machines for which you may have keys in your ssh-agent. So, too, potentially, can all the other folks that have root access to the machine to which you’ve forwarded your ssh-agent.

    • pitchfork

      After years of training journalists and NGOs communication and operational security, after years of conducting research into the tools and protocols used, it took some more years developing a reasonable answer to most of the issues encountered during all this time.

      In todays world of commercially available government malware you don’t want to store your encryption keys on your easily infected computer. You want them stored on something that you could even take into a sauna or a hot-tub – maintaining continuous physical contact.

      So people who care about such things use external smartcard-based crypto devices like Ubikey Neos or Nitrokeys (formerly Cryptosticks). The problems with these devices is that you have to enter PIN codes on your computer that you shouldn’t trust, that they are either designed for centralized use in organizations, or they are based mostly on PGP.

  • Defence/Aggression

    • Lawsuits blaming Saudi Arabia for 9/11 get new life

      Sovereign immunity usually protects governments from lawsuits, but the bill creates an exception that lets litigants hold foreign governments responsible if they support a terrorist attack that kills U.S. citizens on American soil.

    • Westminster killer left jail a Muslim – childhood friend [iophk: “UK jails are incubators for Islam”
    • Cornerstone of Afghan Reconstruction Effort — Roads — is Near-Total Failure

      One of the planned cornerstones of the 15+ year Afghan Reconstruction Effort was to be an extensive, nationwide network of roads.

      The United States’ concept was roads would allow the Afghan economy to flourish as trade could reach throughout the country, security would be enhanced by the ability to move security forces quickly to where they were needed, and that the presence of the roads would serve as a literal symbol of the central government’s ability to extend its presence into the countryside.

    • Right-Wing Foundation, Scary Nuke Maps Drive Narrative on North Korea ‘Threat’

      Tensions between the United States and North Korea are making their way back into the news after a series of missile tests and presidential Twitter threats. Meanwhile, a conservative think tank—previously thought all but dead—has seen a resurgence in relevancy, thanks to its alignment with Donald Trump. The result is that the Heritage Foundation has provided much of the narrative backbone for North Korean/US relations in the age of Trump, making the rounds in dozens of media articles and television appearances.

      Heritage talking heads have been featured in North Korea stories in the Washington Post (2/28/27, 3/19/17), New York Times (3/16/17), AP (3/19/17), Christian Science Monitor (3/17/17), Boston Herald (3/9/17), BBC (3/17/17), Fox News (3/10/17), CNN (3/15/17), MSNBC (3/19/17), CNBC (3/7/17), Voice of America (2/24/17) and Vox (3/17/17).

      The most prominent of Heritage’s experts is former CIA analyst Bruce Klingner, who plays the part of the Reasonable Hawk, insisting North Korea is “growing [its] nuclear and missile capabilities” and is an “existential threat to South Korea and Japan and will soon be a direct threat to the continental United States,” but opposes preemptive bombing or invasion until the threat is “imminent”—a term he never quite defines (but one, it’s worth noting, the current Secretary of State uses to describe the situation.)

  • Transparency/Investigative Reporting

    • INTERNATIONAL JOURNALISM PRIZE AWARDED BY MEXICO FOR JULIAN ASSANGE INTERVIEW

      John Pilger has been awarded the International Journalism Prize by the Press Club of Mexico in the XLIV National and International Competition of Journalism, founded in 1951 by Antonio Saenz de Miera. The citation reads, “The exclusive interview with WikiLeaks founder, Julian Assange, through which international public opinion was able to ascertain the extent of the key issues of the current political situation [is] journalism that allows people to defend themselves against powerful, clandestine forces.”

  • Environment/Energy/Wildlife/Nature

    • Earth’s worst-ever mass extinction of life holds ‘apocalyptic’ warning about climate change, say scientists

      According to a paper published in the journal Palaeoworld, volcanic eruptions pumped large amounts of carbon dioxide into the air, causing average temperatures to rise by eight to 11°C.

      This melted vast amounts of methane that had been trapped in the permafrost and sea floor, causing temperatures to soar even further to levels “lethal to most life on land and in the oceans”.

    • TransCanada Drops Keystone XL NAFTA Lawsuit One Hour After Trump Approves Pipeline Project

      [...] Donald Trump reversed the Obama Administration’s rejection of the Keystone XL tar sands pipeline, and within the hour, TransCanada, the company behind the massive pipeline project, announced it will drop its $15 billion North American Free Trade Agreement (NAFTA) complaint against the U.S. over the project’s rejection.

      [...]

      TransCanada dropped this NAFTA lawsuit only after Donald Trump caved on his demand that Keystone XL will be built with American steel.

  • Finance

    • Singapore will ratify Trans-Pacific Partnership: PM Lee [iophk: “stupid and dangerous for all”

      Singapore will push forward with ratification of the Trans-Pacific Partnership (TPP), said Prime Minister Lee Hsien Loong on Friday (24 March), at the end of a four-day official visit to Vietnam.

    • Pay crash expected in online gig economy as millions seek work

      The report argues that because only a handful of countries are responsible for the demand in digital work, concentrated mostly in North America and western Europe, it should be these countries that enforce a minimum standard. That way, workers would have their rights protected regardless of their location.

    • Guy Who Wants Everyone To Believe He Created Bitcoin, Now Patenting Everything Bitcoin With An Online Gambling Fugitive

      As you may recall, there was a giant fuss last year, when an Australian guy named Craig Wright not only claimed that he was “Satoshi Nakamoto” — the pseudonymous creator of Bitcoin — but had convined key Bitcoin developer Gavin Andresen that he was Nakomoto. That was a big deal because Andresen was one of the first developers on Bitcoin and regularly corresponded with Nakamoto (Andresen’s own name sometimes popped up in rumors about who Nakamoto might be). Even with Andresen being convinced, plenty of others soon picked apart the claims and found the claims severely lacking in proof.

      Then, last summer, Andrew O’Hagan published an absolutely massive profile of Wright that only served to raise a lot more questions about Wright, his businesses, his claims to having created Bitcoin, and a variety of other things. However, as we noted at the time, buried in that massive article was a bizarre tidbit about how Wright was actively trying to patent a ton of Bitcoin related ideas. As we noted, the article stated that Wright’s plan was to patent tons of Bitcoin stuff, reveal himself as Nakamoto and then sell his patents for a billion dollars.

    • Ukip’s only MP Douglas Carswell quits party

      Ukip’s only member of parliament, Douglas Carswell, has quit the party to become an independent MP, prompting a backlash from within Ukip and among its supporters.

      Carswell, who defected from the Conservative party to Ukip in August 2014, said he was leaving “amicably, cheerfully and in the knowledge that we won”.

      He said he would not be standing down before the next general election, and claimed there was no need for a byelection because he was not joining another party. Ukip, he added, had achieved its founding aims with the vote to leave the EU. “After 24 years, we have done it. Brexit is in good hands,” he said.

    • Tens of thousands march against Brexit

      Unite for Europe campaigners marched through central London to Westminster, the scene of floral tributes to those killed and injured in Wednesday’s atrocity.

      Opening the event, Alastair Campbell said: “Before we talk about Brexit, before we call on any of the speakers, we need to recognise that something really bad happened not far from here just the other day.”

      Campaigners stood with their heads bowed for a minute-long silence on Saturday, with the only sound the chiming of Big Ben.

    • Brexit talks will fail without compromise: José Manuel Barroso

      Brexit negotiations are on course to fail unless both Britain and the European Union ditch their winner-takes-all approach to the coming talks, the former president of the European commission José Manuel Barroso has said.

      With just days to go before Theresa May formally notifies Brussels of the UK’s intention to leave the EU, Jean-Claude Juncker’s predecessor said the two sides were playing a dangerous game.

      The UK’s prime minister has said she believes “no deal is better than a bad deal”, and some in her cabinet have openly talked up the prospect of walking away from the negotiating table.

      Michel Barnier, the EU’s chief negotiator, has placed the settlement of Britain’s £50bn in financial liabilities as the prerequisite for any progress. Last week the French former minister conjured up a vision of queues of Dover, nuclear fuel shortages and chaos for citizens as a consequence of Britain’s failure to live up to its responsibility.

  • AstroTurf/Lobbying/Politics

    • Trump: Liar, Loser, Not A Leader

      The debacle of Trump and Ryan being unable to pass their “sicknesscare” bill through a Congress that the GOP controls is diagnostic.

    • Michael Moore warns Dems: Now is not the time to gloat

      “This is not the time for the Democrats to gloat,” Moore said. “This is the time we have to now double down. [...]”

    • The Political Economy of ‘Moral Authority’

      The implication of this phrase, of course, is that the United States derives its greatness from a presumed moral authority. Corporate media are now sounding the alarm that the US’s moral authority is suddenly under attack by the Trump administration.

    • Black Man Stabbed to Death by White Supremacist–Then Smeared by Media

      According to police, white 28-year-old Maryland man James Harris Jackson took a Bolt bus up to New York City Friday for the express purposes of killing black men and did just that, stabbing 66-year-old Timothy Caughman in Hell’s Kitchen Monday night. Police say the suspect, an ex-military member of a white supremacist hate group, asked police to arrest him, warning he would attack again if they didn’t.

    • Dan Goldberg on Neil Gorsuch, Marianne Lavelle on Climate Change Denial

      This week on CounterSpin: When Neil Gorsuch’s name was first announced as a candidate for the Supreme Court, corporate media’s focus was on his “eloquence” and “intelligence.” The Washington Post published 30 articles, op-eds, blog posts and editorials in the 48 hours after the announcement—not a single one overtly critical or in opposition to his nomination. That changed somewhat when Gorsuch actually faced questions, but have we learned enough about the record and the ideas of the man who may get one of the most powerful jobs in the country? We’ll talk about Gorsuch with Dan Goldberg from Alliance for Justice.

    • Trump advisor Steve Bannon ordered conservative Republicans to vote for Trumpcare and they just laughed at him

      The general consensus seems to be that the failure to replace Obamacare is unexpectedly bad for both president and GOP: he’s exposed as a crêpe leopard, and them as a bunch of unprincipled bickering morons with nothing to show for 7 years’ empty ranting about Obamacare.

    • Advice for Trump: It’s All About the Infrastructure
    • You Can Be a Journalist, Too, Just Calling Names Like 7th Graders

      The New York Times employs a columnist named Charles Blow (above). Blow writes the same column twice a week, about 800 words of simple name calling directed at Trump. That’s what his job is. He gets paid a lot of money for something that must take him about 15 minutes to type up. It is an amazing world we’ve entered since November.

      [...]

      He continues to have explosive Twitter episodes — presumably in response to some news he finds unflattering or some conspiracy floated by fringe outlets — that make him look not only foolish, but unhinged.

      Trump’s assaults on the truth are not benign. Presidential credibility is American credibility. There is no way to burn through one without burning through the other.

      And when he’s not making explosive charges, he’s taking destructive actions.

  • Censorship/Free Speech

  • Privacy/Surveillance

    • Data Privacy: 7 Trackers Collecting Your Personal Data

      Whether we think about it or not, there’s an agreement at work behind the scenes when you visit some websites and use many popular apps. Call it the price of “free.” For every website visit and app use, you agree to give up certain personal data in exchange for whatever information or service you’re using.

      The problem isn’t only that these activities are taking place, it’s that many apps or services are lax in clearly disclosing that they’re monetizing your personal data. And in many cases, doing so without your explicit approval. We’re automatically being opted in when we agree to Terms of Service and Privacy Policies. Even the most conscientious reader can struggle to make sense of those agreements and the data collection activities they describe.

    • Ban on electronic devices Disproportional and Impractical

      In a written statement yesterday the Secretary of State for Transport, Chris Grayling, announced a ban on “Phones, laptops and tablets larger than 16.0cm x 9.3cm x 1.5cm in the cabin on flights to the UK from Turkey, Lebanon, Egypt, Saudi Arabia, Jordan, and Tunisia.”

      The United States issued a similar ban earlier in the day. It was not long after that that the UK followed suit, however the UK ban is structured around any inbound flights from the afore mentioned countries rather than specific airports, which is the case with the US ban.

      Whilst security is increased on these items coming into the UK, Chris Grayling does state that “These new measures apply to flights into the UK and we are not currently advising against flying to and from those countries.” so anyone travelling to any of the countries on the list is still able to do so, and there is no change to the Foreign Office’s advice against travelling there.

    • The Ad Industry Is Really Excited About Plans To Gut Broadband Privacy Protections

      The broadband, advertising and marketing industries are absolutely thrilled about plans to kill the FCC’s new broadband privacy protections for consumers. Passed last year, the rules simply require that ISPs provide working opt-out tools, go to reasonable lengths to protect data and notify users of hack attacks, and be transparent about what data they collect and who they sell to. The rules also require that ISPs obtain opt-in consent (public enemy number one for marketing folks) for the collection and sale of more personal data like financial details or browsing histories.

    • How ISPs can sell your Web history—and how to stop them

      The House is also controlled by Republicans, but “we think we’ve got a shot at killing it off,” Gillula said. The House is expected to vote on the measure next week, but there’s still time to contact your legislator before a vote.

      “If we kill it [in the House], we don’t have to worry about any of this creepy tracking,” Gillula said.

    • Encryption Workarounds Paper Shows Why ‘Going Dark’ Is Not A Problem, And In Fact Is As Old As Humanity Itself

      That analogy reveals something profound: that the supposedly new problem of “going dark” — of not being able to find out information — has existed as long as humans have been around. After all, there is no way — yet, at least — of accessing information held in a person’s mind unless some kind of interrogation technique is used to extract it. And as the analogy shows us, that is exactly like needing to find some encryption workaround when information is held on a digital device. It may be possible, or it may not; but the only difference between the problems faced by those demanding answers thousands of years ago and today is that some of the required information may be held external to the mind in an encrypted digital form. Asking for guaranteed backdoors to that digital data is as unreasonable as demanding a foolproof method to extract information from any person’s mind. We accept that it may not be possible to do the latter, so why not accept the former may not be feasible either?

    • Three privacy tools that block your Internet provider from tracking you

      Recently, the United States Senate saw fit to allow Internet Service Providers to sell your web browsing history and other data to third parties. The action has yet to pass the House, but if it does, it means anyone concerned about privacy will have to protect themselves against over zealous data collection from their ISP.

  • Civil Rights/Policing

  • DRM

    • It’s happening! It’s happening! W3C erects DRM as web standard

      The World Wide Web Consortium has formally put forward highly controversial digital rights management as a new web standard.

      Dubbed Encrypted Media Extensions (EME), this anti-piracy mechanism was crafted by engineers from Google, Microsoft, and Netflix, and has been in development for some time. The DRM is supposed to thwart copyright infringement by stopping people from ripping video and other content from encrypted high-quality streams.

      The latest draft was published last week and formally put forward as a proposed standard soon after. Under W3C rules, a decision over whether to officially adopt EME will depend on a poll of its members.

    • The End of Ownership

      The internet of things, End User License Agreements, and Digital Rights Management are increasingly being used to give electronics manufacturers control and ownership over your stuff even after you buy it. Radio Motherboard talks to Aaron Perzanowski and Jason Schultz, authors of The End of Ownership about what we stand to lose when our songs, movies, tractors, and even our coffee makers serve another master. 

  • Intellectual Monopolies

    • Why You Should Care About The Supreme Court Case On Toner Cartridges

      [...] the crux of a Supreme Court case that will answer a question with far-reaching impact for all consumers: Can a company that sold you something use its patent on that product to control how you choose to use after you buy it?

    • Copyrights

      • Another Loss For Broadcast TV Streaming, And A Dangerous Shift Of Decision-Making Power

        Another court has ruled that streaming local broadcast TV channels to mobile devices is something that only traditional pay-TV companies can do—startups need not apply. The Ninth Circuit appeals court has ruled that FilmOn, an Internet video service, cannot use the license created by Congress for “secondary transmissions” of over-the-air TV broadcasts. That likely means that FilmOn and other Internet-based services won’t be able to stream broadcast TV at all. That’s a setback for local TV and the news, weather, local advertising, and community programming it carries.

      • Brazil Proposes New Digital Copyright Rules for the WTO

        Copyright rules don’t belong in trade agreements—so where do they belong? For the most part, the World Intellectual Property Organization (WIPO) is probably the right place; it’s a fully multilateral body that devotes its entire attention to copyright, patent, and other so-called intellectual property (IP) rules, rather than including them as an afterthought in agreements that also deal with things like dairy products and rules of origin for yarn. Although we don’t always like the rules that come out of WIPO, at least we can be heard there—and sometimes our participation makes a tangible difference. The landmark Marrakesh Treaty for blind, visually impaired and print disabled users provides a good example.

        But there’s another multilateral international body that can also lay claim to authority over international intellectual property rules—the World Trade Organization (WTO). When the WTO first covered copyright and patent rules in a dedicated agreement called TRIPS, it was decried by activists as being far too strict. Today, ironically, those same activists (even EFF) often tout TRIPS as a more appropriate baseline standard for global IP rules, in contrast to the stricter (or “TRIPS-plus”) rules demanded for inclusion in preferential trade agreements such as the Anti-Counterfeiting Trade Agreement (ACTA) and the Trans-Pacific Partnership (TPP).

      • Netflix Gets Serious About Its Anti-Piracy Efforts
      • [Older] ‘Plan B’ to get Dotcom out of New Zealand drags on for 29 months

        An inquiry into deporting Kim Dotcom has been underway for 29 months and is set to be the longest, most drawn out investigation of its type.

03.24.17

Links 24/3/2017: Microsoft Aggression, Eudyptula Challenge Status Report

Posted in News Roundup at 7:17 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • San Francisco Open Source Voting System Project Continues On

    At the February 15 Elections Commission meeting, the Elections Commission voted unanimously to ask the Mayor’s Office to allocate $4 million towards initial development of the open source voting project for the 2018-19 fiscal year (from Aug. 2018 – July 2019). This would go towards initial development once the planning phase is complete.

  • Hyperledger Bond Trading Platform Goes Open Source

    A bond trading platform built on top of Hyperledger’s Sawtooth Lake distributed ledger was made open source this week, alongside a release of a demo of the technology.

    The project, first announced in September 2016, was designed to demonstrate how bond trading and settlement can be streamlined using distributed ledgers. Created in partnership with the R3 consortium and eight participating banks, the working proof-of-concept has now also been displayed as a public demo on Sawtooth’s website.

  • Coreboot Picks Up A New Kabylake Chromebook “Fizz”

    It may not be as exciting as hearing Dell looking at Coreboot, but another Intel-powered Chromebook is now supported by mainline Coreboot.

  • Cognitive Wi-Fi and disrupting the AP market with Open Source – with Mojo Networks – Wi FiNOW ep 59
  • Open source job opportunities grow at crisis groups

    Learn how you can use your open source skills to make a difference in the world.

  • Why LÖVE?

    This month, IndustrialRobot asked my opinion of FOSS game engines — or, more specifically, why I chose LÖVE.

    The short version is that it sort of landed in my lap, I tried it, I liked it, and I don’t know of anything I might like better. The long version is…

  • CoreOS Tectonic Now Installs Kubernetes on OpenStack

    CoreOS and OpenStack have a somewhat intertwined history, which is why it’s somewhat surprising it took until today for CoreOS’s Tectonic Kubernetes distribution to provide an installer that targets OpenStack cloud deployments.

  • Docker and Core OS plan to donate their container technologies to CNCF

    Containers have become a critical component of modern cloud, and Docker Inc. controls the heart of containers, the container runtime.

    There has been a growing demand that this critical piece of technology should be under control of a neutral, third party so that the community can invest in it freely.

  • How Blockchain Is Helping China Go Greener

    Blockchain has near-universal applicability as a distributed transaction platform for securely authenticating exchanges of data, goods, and services. IBM and the Beijing-based Energy-Blockchain Labs are even using it to help reduce carbon emissions in air-polluted China.

  • An efficient approach to continuous documentation
  • The peril in counting source lines on an OSS project

    There seems to be a phase that OSS projects go through where as they mature and gain traction. As they do it becomes increasingly important for vendors to point to their contributions to credibly say they are the ‘xyz’ company. Heptio is one such vendor operating in the OSS space, and this isn’t lost on us. :)

    It helps during a sales cycle to be able to say “we are the a big contributor to this project, look at the percentage of code and PRs we submitted”. While transparency is important as is recognizing the contributions that key vendors, focus on a single metric in isolation (and LoC in particular) creates a perverse incentive structure. Taken to its extreme it becomes detrimental to project health.

  • An Open Source Unicycle Motor

    And something to ponder. The company that sells this electric unicycle could choose to use a motor with open firmware or one with closed firmware. To many consumers, that difference might not be so significant. To this consumer, though, that’s a vital difference. To me, I fully own the product I bought when the firmware is open. I explain to others that they ought to choose that level of full ownership whenever they get a chance. And if they join a local makerspace, they will likely meet others with similar values. If you don’t yet have a makerspace in your community, inquire around to see if anyone is in the process of forming one. Then find ways to offer them support. That’s how we do things in the FOSS community.

  • Events

    • The A/V guy’s take on PyCon Pune

      “This is crazy!”, that was my reaction at some point in PyCon Pune. This is one of my first conference where I participated in a lot of things starting from the website to audio/video and of course being the speaker. I saw a lot of aspects of how a conference works and where what can go wrong. I met some amazing people, people who impacted my life , people who I will never forget. I received so much of love and affection that I can never express in words. So before writing anything else I want to thank each and everyone of you , “Thank you!”.

  • Pseudo-Open Source (Openwashing)

  • Funding

  • Public Services/Government

    • Defense department announces the launch of “Code.mil,” an experiment in open source

      The Department of Defense (DoD) announced the launch of Code.mil, an open source initiative that allows software developers around the world to collaborate on unclassified code written by federal employees in support of DoD projects.

      DoD is working with GitHub, an open source platform, to experiment with fostering more collaboration between private sector software developers and federal employees on software projects built within the DoD. The Code.mil URL redirects users to an online repository that will house code written for a range of projects across DoD for individuals to review and make suggested changes.

      [...]

      DoD faces unique challenges in open sourcing its code. Code written by federal government employees typically does not have copyright protections under U.S. and some international laws, which creates difficulties in attaching open source licenses.

    • PrismTech to Demonstrate Open Source FACE 2.1 Transport Services Segment (TSS) Reference Implementation at Air Force FACE Technical Interchange Meeting

      PrismTech’s TSS reference implementation is being made available under GNU Lesser General Public License (LGPL) v3 open source license terms.

  • Openness/Sharing/Collaboration

  • Programming/Development

    • RApiDatetime 0.0.1

      Very happy to announce a new package of mine is now up on the CRAN repository network: RApiDatetime.

    • FYI anyone who codes outside work: GitHub has a contract to stop bosses snatching it all

      In contrast to the restrictions many companies place on their workers, GitHub believes it can loosen the reins through the release of its Balanced Employee Intellectual Property Agreement (BEIPA).

      Technology companies often require that employees, as a condition of their employment, sign away the intellectual property rights to any work created while employed, even on personal time. Such contracts may even give companies ownership rights to work created during a limited period after employees leave the company.

Leftovers

  • Health/Nutrition

    • Medicines Patent Pool Sublicenses New Antibiotic Candidate To TB Alliance For Development

      TB Alliance is a not-for-profit organisation which works to find affordable medicines to fight tuberculosis. The Medicines Patent Pool (MPP) is a United Nations-backed organisation which works to increase access to HIV, hepatitis C and tuberculosis treatments in low and middle income countries. Medicines Patent Pool was awarded an exclusive licence on the drug candidate from John Hopkins University (US), which holds the patent on the compound. MPP has sublicensed the patent to TB Alliance so that the groups can collaborate in clinical development of the drug.

  • Security

  • Defence/Aggression

  • Transparency/Investigative Reporting

    • U.S. reclassifies information in response to FOIA for Iran-Contra files

      Years after information on Iran-Contra had been labeled UNCLASSIFIED and released to the public, the government began reclassifying some of that information in response to Freedom of Information Act (FOIA) requests. Unlike the more well-known reclassification program, this cannot be said to be in response to correcting mistakes from the 1995 declassification order as the information had been declassified and published in 1987. One notable example from the Iran-Contra files, a formerly TOP SECRET chronology on US-Iranian Contacts and the American Hostages, shows that key pieces of information about the extent of CIA and Israel’s involvement have been reclassified. This seems to have taken place sometime between the publication of the Report of the congressional committees investigating the Iran-Contra Affair (November 1987), which included versions of the chronology, and the time the document was reviewed as part of a FOIA request (June 2005).

  • Finance

  • AstroTurf/Lobbying/Politics

    • How Much Of The Trump-Russia Story Is Smoke And How Much Is Fire?
    • Media can’t ignore financial scandal in Ecuador’s presidential election

      As Ecuador heads toward the second round of its presidential election on April 2, a scandal has broken out over the opposition candidate Guillermo Lasso’s financial dealings.

      The accusations are serious and largely based on public records, with most of it verifiable on websites such as the Panamanian Public Registry and Superintendency of Banks and the Ecuadorean Superintendency of Companies. The newspaper that broke the story was Página/12 of Argentina, with two articles there in the last week by journalist Cynthia Garcia, as well as on her website.

      Yet, as of this writing, the major international media covering the election, as well as the big privately owned Ecuadorian media, have pretended for a week that the story does not exist.

      This is despite the fact that President Rafael Correa has publicly denounced Lasso for his dealings and called on him to resign from his campaign. And Lasso publicly responded without denying the accusations. It is difficult to explain this gap in reporting on the basis of what most people would consider journalistic norms.

    • Hardball political operative Roger Stone finds himself on the receiving end

      Roger Stone, the legendarily hardball Republican operative who for years has lustily embraced such media epithets as the dapper don of dirty deeds and the undisputed master of the black arts of electioneering, now finds himself on the receiving end of what he calls a political dirty trick –– allegations that he helped mastermind Russian leaks of hacked Democratic Party emails –– and he’s not liking it much.

      “You just wake up one day and a bunch of congressmen are kicking your balls across the field,” Stone said reflectively. “Based on nothing more than a Hillary Clinton campaign meme…. I understand. It’s politics. It’s the democratic process. All I want is the same open forum to respond.”

      A steady drumbeat of accusations against Stone that had been building for months –– since a Jan. 19 story in The New York Times identified him as one of three associates of President Donald Trump under FBI investigation for links between Trump’s presidential campaign and Russia –– reached a crescendo this week, when Stone’s name was mentioned 19 times during a hearing of the House Intelligence Committee.

    • The House Intelligence Committee’s Civil War

      The top Republican and Democrat on the House Intelligence Committee escalated their feud on Friday, with GOP Chairman Devin Nunes announcing that he wished to cancel a public hearing next week and Ranking Member Adam Schiff charging Nunes with bad faith and attempting to choke off an independent hearing.

      In a press conference at the Capitol Friday morning, Nunes announced that Paul Manafort, Donald Trump’s former campaign manager, had offered through his attorney to testify before the committee as it investigates Russian interference in the presidential election. But Nunes also announced he wanted to cancel an open hearing scheduled for next week, with former Acting Attorney General Sally Yates, former CIA Director John Brennan, and former Director of National Intelligence James Clapper, until the committee had a chance to have a closed hearing with FBI Director James Comey and NSA Director Mike Rogers. He said his decision did not have anything to do with new documents he received this week.

    • House Intelligence Committee chairman abruptly cancels open hearing on Russia

      Congressman Devin Nunes (R-CA), the chairman of the House Intelligence Committee, has abruptly canceled a public hearing scheduled for next Tuesday with former DNI director James Clapper, former CIA Director John Brennan, and former Acting Attorney General Sally Yates. The hearing is part of the committee’s investigation into Russia’s interference in the 2016 presidential election, including whether the Trump campaign colluded with Russian operatives.

  • Censorship/Free Speech

  • Privacy/Surveillance

  • Civil Rights/Policing

    • Amos Yee faults Singaporean activists for not pressuring the USA judge to release him from jail sooner
    • Saudi Arabia says 43 Indian workers not held captive, addressing their concerns

      The more than 3 million-strong Indian community in Saudi Arabia is the largest expatriate community in the kingdom.

    • [Older] What’s driving Malaysian support for Islamic penal code?

      As Malaysia considers the introduction of a strict sharia punishment code known as hudud, minorities have been left to consider their place in a country once lauded for diversity and moderation – and to ponder the wisdom of experts who warn creeping Islamisation could breed extremism.

    • Lawsuit: Police Destroyed Farm House To Capture Homeless Man Armed With An Ice Cream Bar

      Is it possible to arrest an unarmed homeless person without destroying the residence he’s hiding in? To the Fresno County Sheriff’s Department and Clovis PD (and far too many other law enforcement agencies), the question remains rhetorical.

      David Jessen’s farmhouse felt the full, combined force of two law enforcement agencies and all their toys last June. According to his lawsuit [PDF], a homeless man was rousted from a nearby vacant house after he was discovered sleeping in the closet. He left peacefully but was soon spotted by the construction crew breaking into Jessen’s house. The construction worker, god bless him, called the police because he thought they could help.

      Jessen was notified shortly thereafter. He returned home to find four sheriff’s office cars parked at his residence (one of them “on the lawn,” because of course it was) and a deputy yelling at his house through a bullhorn. According to the deputies, the homeless man refused to come out and threatened to shoot anyone who came in. Jessen was asked if he had any guns in the house. He replied he did, but two were unloaded and had no ammo and the third was hidden so well “only he could find it.”

    • A Last Chance for Turkish Democracy

      The first time I met Selahattin Demirtaş, the leader of Turkey’s largest Kurdish political party, known as the H.D.P., he arrived at a restaurant in Istanbul with a single assistant accompanying him. Demirtaş is warm and funny. Among other things, he is an accomplished player of the saz, a string instrument that resembles the oud. At the time—it was 2011—Demirtaş was trying to lead his party and people away from a history of confrontation with the country’s central government. It wasn’t easy. Like other Kurdish leaders in Turkey, Demirtaş had spent time in prison and seen many of his comrades killed. I remember him telling me how, in the nineteen-nineties, when civil unrest in the country’s Kurdish areas was hitting its bloody peak, a particular make of car—a white Renault—had been notorious in Kurdish towns. The cars were used by Turkish intelligence officers, who had developed a terrifying reputation for torturing and executing Kurds. “I’ve been inside the Renaults,’’ Demirtaş told me. “A lot of people I know never made it out of them.”

  • Internet Policy/Net Neutrality

  • DRM

    • How iTunes built, and then broke, my meticulous music-listening system

      There is an entire field of Apple criticism reserved for iTunes, a cross-platform monolith that serves a bewildering variety of functions. It outgrew its origins as a place to manage your MP3s to become the place where you activate new iPhones and iPads, buy TV shows and movies, and access Apple’s subscription music service. It’s an app that does way too much, and yet each function is so important to Apple that the company seemingly cannot imagine it doing less. And so each year it does more.

  • Intellectual Monopolies

    • “What is this thing called love, this funny thing called love”? And while you’re at it, what is a covenant not to sue?

      Focusing on patents, consider that the statutory treatment of licenses and licensing varies greatly. In the U.S., the subject is largely absent from the patent statute, with no real treatment of the differences between an exclusive and a non-exclusive license. By contrast, take a country like Israel, whose patent statute provides (at least a partial) definition of exclusive and non-exclusive licenses, with special attention to the right to sue. Here, as well, however, there is no statutory reference made to a covenant not to sue. Varieties of these two approaches can be found in most other jurisdictions; what seems common to all is that none provides a real definition of what is entailed in a covenant not to sue.

    • Copyrights

      • Mining Is The New Reading

        Representatives of the research and academic community applauded amendments by the rapporteur to the draft new European Union Copyright Directive in yet another hearing on the megaproject yesterday in Brussels. Especially welcomed was the rapporteur’s proposal to extend the scope of an exemption for text and data mining. Representatives of publishers, on the other hand, said there is no evidence of the need for additional mandatory exemptions.

      • Australia Shelves Copyright Safe Harbor For Google, Facebook, et al

        Due to what some have described as a drafting error in Australia’s implementation of the Australia – US Free Trade Agreement (AUSFTA), so-called safe harbor provisions currently only apply to commercial Internet service providers Down Under.

      • US Ambassador Asks Vietnam to Target 123movies, Putlocker and Kisscartoon

        While copyright industry groups frequently call on governments to take action against pirate sites, it’s not often that we see such requests on the highest diplomatic level.

03.23.17

Links 23/3/2017: Qt 5.9 Beta, Gluster Storage 3.2

Posted in News Roundup at 7:01 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Eraserhead: the true story behind David Lynch’s surreal shocker

    On 19 March 1977, the world changed, after which there was a long uncomfortable silence. The occasion was the first public screening of Eraserhead, the feature debut of David Lynch, at the Filmex festival in Los Angeles. It was not a hot ticket. The film arrived with little advance publicity at the only festival to accept it. The screening took place at midnight, drawing a modest crowd who dutifully watched for the next two hours (the film was then longer than the 89 minutes it became). When it ended: nothing. But no one left either. Just silence. Then, finally, applause.

  • Science

  • Health/Nutrition

    • How Politicians Force Doctors to Lie to Women

      On Tuesday, the Texas Senate advanced a bill that would enable doctors to lie to pregnant patients about fetal deformities in order to coercively dissuade them from choosing to have an abortion. Specifically, SB 25 eliminates withholding information regarding fetal health as a cause of action in so-called “wrongful birth” lawsuits, which prevents parents from pursuing financial damages.

    • “There’s No Way We’re Gonna Drink That”: Fighting for Clean Water in Flint

      Ongoing government noncompliance and backroom deals halt any progress the city could be making to limit the effects of the crisis, which makes even good news like the EPA’s $100 million grant for infrastructure improvements fall a little flat. The deeply flawed emergency management law, under which both Flint and Detroit’s crises emerged almost overnight, is still on the books.

    • Doctors Around the World Rally for New Surgery to Counter Female Genital Mutilation

      The UNFPA would like to see more doctors that are trained in treating the effects of FGM, says Nafissatou J. Diop, the Senior Advisor for the UNFPA-UNICEF Joint Programme on FGM, but for the moment they are putting their scarce resources towards eliminating the practice altogether. “We want to focus on the girls who have not yet gone through it, to make sure that they are the priority.”

    • What To Watch Out For In The EU-Mercosur FTA Negotiations: Consequences For Access To Medicines

      This week (20-24 March), a new round of negotiation of the free trade agreement (FTA) between Mercosur and the European Union (EU) is taking place in Argentina. For almost two decades, the negotiation of bilateral trade agreements (FTAs), outside of the multilateral international institutions, has been part of the strategy of high income countries to extend the monopolies of major pharmaceutical companies, through intellectual property and regulatory measures. Will the Mercosur/EU FTA have consequences on access to medicines in Latin America countries? After the release of the draft agreement by the European Commission, and through projections made on HIV/AIDS, hepatitis C and cancer medicines, we tried to evaluate the impact of one of the TRIPS-plus measures of the Mercosur/EU FTA on the prices of medicines in Brazil. Per our calculations, an additional USD 444 million would be necessary to be spent by the public health system for the purchase of 6 medicines alone[1]!

  • Security

    • Windows flaw lets attackers take over A-V software

      A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

    • Security updates for Thursday
    • Devops embraces security measures to build safer software

      Devops isn’t simply transforming how developers and operations work together to deliver better software faster, it is also changing how developers view application security. A recent survey from software automation and security company Sonatype found that devops teams are increasingly adopting security automation to create better and safer software.

  • Defence/Aggression

    • Erdoğan: Europeans ‘will not walk safely’ if current behavior persists

      Turkish President Recep Tayyip Erdoğan warned Europe that its behavior will put its citizens at risk in other parts of the world, the AFP reported Wednesday.

      “If you [Europe] continue to behave like this, tomorrow in no part of the world, no European, no Westerner will be able to take steps on the street safely and peacefully,” Erdogan said during a speech in Ankara.

      The warning was another sign of the increasingly acrimonious relationship between the EU and Turkey, which soured over some countries’ refusal to allow Turkish government officials to campaign in European cities ahead of a referendum on expanding the president’s powers. On Tuesday, Turkey announced that it is canceling all planned rallies in Germany in the run-up to the referendum on April 16.

    • Crude nature of Westminster attack suggests limited Isis network in Britain

      Last July a stolen truck driven through a Bastille Day parade in Nice killed 86. The strikes appear inspired, if not actively commissioned, by Isis in Iraq and Syria.

      In November a student used a vehicle and knives to injure 13 on a campus in Ohio, in the US. His motives and allegiance are less clear.

      Such attacks are not unprecedented, but have become much more numerous in recent years.

    • Brussels mayor: All our mosques are controlled by Salafists

      He added: “Terrorism is a problem that involves Europe as a whole. Don’t forget what happened in Paris, Nice and Berlin. If this was only a Brussels problem, it would have been solved.”

    • Attempted Antwerp attack: Shotgun and bladed weapons found in man’s car who tried to drive into shopping district

      A shotgun and several bladed weapons have been found in the car of a man who tried to drive at high speed through a busy shopping street in Antwerp, forcing pedestrians to jump out of the way.

      The federal prosecutor’s office said the car was intercepted at the port docks and a Frenchman living in France was arrested.

      The bomb squad was brought in and the authorities raised security in the centre of town, in places where people normally gather.

  • Transparency/Investigative Reporting

    • Assange: ‘Only 1 percent’ of the CIA material has been published

      There are no less than 16 different intelligence agencies in the United States. In 2017, they will cost US taxpayers some $70 billion (65 billion euros) – roughly twice Germany’s overall annual defense budget. The actual distribution of that sum among US intelligence services is classified, but revelations brought to light by Edward Snowden in 2013 suggest that the Central Intelligence Agency (CIA) receives the lion’s share. In 2013, that sum was around $15 billion. Now the CIA, a highly funded agency tasked with gleaning state secrets from other countries, has a problem keeping its own secrets: On March 7, the whistleblower platform WikiLeaks began publishing CIA documents under the name “Vault 7.”

  • Environment/Energy/Wildlife/Nature

  • Finance

    • Why becoming a tax haven would be bad news for Britain

      Theresa May and Philip Hammond have warned the EU that if they don’t like the Brexit deal, they could turn the UK into a tax haven. The truth is that being ‘offshore’ means being unfair and undemocratic – and you still pay tax

    • UK CEOs ‘earn 386 times more than workers on national living wage’

      The average FTSE chief executive earns 386 times more than a worker on the national living wage, according to an analysis published by the Equality Trust as it steps up its campaign for new government rules to expose pay gaps.

    • JEFTA: The Latest Massive ‘Trade’ Deal You’ve Never Heard Of, Negotiated Behind Closed Doors, With Zero Public Scrutiny

      As Techdirt has reported, the election of Donald Trump has turned the world of US trade deals upside-down. The US officially pulled out of TPP, although some still hope it might come back in some form. TAFTA/TTIP seems to be on ice, but Trump’s choice for US trade representative has just said he is open to resuming negotiations, so it’s not clear what might happen there (or with TISA). Against that confusing backdrop, the European Union has been quick to emphasize that it is in favor of trade deals, and is keen to sign as many as possible, presumably hoping to fill the economic and political vacuum left by the US.

      [...]

      But the worst aspect of JEFTA is not that it’s probably not worth the effort, but that the EU and Japan have done everything they can to prevent both the public and even politicians from finding out what a bad deal is being negotiated in their name. After the humiliating defeat of the Anti-Counterfeiting Trade Agreement (ACTA), and the more recent failures of TPP and TTIP, you would have thought that the governments involved would have realized that this kind of secret dealmaking just isn’t acceptable any more, but apparently, they haven’t. Fortunately, JEFTA is finally out in the open, which means it can begin to be subjected to long-overdue scrutiny and democratic input. What we need now is for the EU to release negotiating texts as it did for TTIP.

    • Majority Of Intuit’s Lobbying Dollars Spent Trying To Stop IRS From Making It Easier To File Your Taxes

      There has been an effort underway these past few years to make tax season less stressful, less complicated, and less expensive for a large swath of Americans. These efforts have produced plans to make tax season “return free” for many, with pre-populated tax forms prepared by the government that can either be signed if accurate, or ignored if not with a separate filing then being produced by the person in question. That is, since the IRS already should have most of the details on how much you earned from the companies that paid you, it can send you a pre-filled out tax return document, rather than forcing everyone to redo the same work with the same documents hoping that you don’t make some mistake that will make the IRS man mad. Again, for those who want to go a different way, they can. But for those who find the IRS’s pre-filled documents to be okay, it will make tax filing significantly less of an issue. If you live outside the US, this may sound strange to you, because much of the rest of the world alread does it this way. In a recent episode of Planet Money, the analogy is made that the way we do taxes in the US would be like if credit card companies sent you a “bill” that was a blank sheet of paper, expecting you to fill out all your charges over the past month, and if you got anything wrong, you’d be punished. On taxes, most of the rest of the world the taxes are more like your credit card bill. In the US, it’s more like a blank sheet of paper. And, as in years past, some are finally trying to fix things in the US.

  • AstroTurf/Lobbying/Politics

    • Secretary of State Rex Tillerson to skip Nato meeting and visit Russia instead

      Secretary of State Rex Tillerson is skipping a major North Atlantic Treaty Organisation (Nato) Summit, opting to meet with China and Russia instead and people are worried about the message that sends.

      The Nato summit is scheduled for 5-6 April, but the State Department confirmed that Mr Tillerson would meet with Chinese President Xi Jinping at President Trump’s Florida club, Mar-a-Lago, from 6-7 April.

      He is also scheduled to visit Russia in April after a Group of 7 meeting in Italy, a State Department spokesperson told Reuters.

      Mr Tillerson is set to meet with 26 of the 27 foreign ministers of Nato member countries on 22 March. The meeting will include Secretary of Defence James Mattis and will be focused solely on counterterrorism and the eradication of Isis.

    • FBI: We have evidence Trump team and Russia communicated mid-campaign, maybe to coordinate Clinton info dump

      Late Wednesday, the FBI said it has evidence that associates of Donald Trump communicated with Russia during the 2016 U.S. presidential campaign, possibly to coordinate the release of Hillary Clinton campaign info via Wikileaks.

    • Amy Goodman narrates a gorgeous animation about Chomsky’s “Manufacturing Consent”
    • This is a photo of lawmakers discussing taking away maternity coverage

      On Thursday, a bunch of men met at the White House to discuss taking away potentially millions of women’s coverage for pregnancy, maternity, and newborn care.

      The White House meeting was broadly about the American Health Care Act, the Republican bill meant to repeal and replace Obamacare. But it was focused on whether the bill should include a repeal of 10 “essential health benefits” that insurers in the individual marketplace must cover. Among those benefits is pregnancy, maternity, and newborn care.

      Yet Vice President Mike Pence, who was at the meeting along with President Donald Trump and Republican members of the House Freedom Caucus, tweeted out a picture showing that the meeting didn’t represent the exact people who most directly benefit from pregnancy, maternity, and newborn coverage in their health plans: women. This, unsurprisingly, drew quick criticism from groups like Planned Parenthood.

  • Censorship/Free Speech

  • Privacy/Surveillance

    • Senate Republicans Just Sold You Out to Advertisers

      In a 50-to-48 vote along party lines, the U.S. Senate decided to kill FCC rules blocking your ISP from selling your browsing history to the advertising industry without permission. Should the change pass the House, as is expected, the likes of Comcast and Verizon will be able to make money disclosing what you buy, where you browse, and what you search from your own home, all without asking permission.

    • Senate Puts ISP Profits Over Your Privacy

      The Senate just voted to roll back your online privacy protections. Speak up now to keep the House from doing the same thing.

      ISPs have been lobbying for weeks to get lawmakers to repeal the FCC’s rules that stand between them and using even creepier ways to track and profit off of your every move online. Republicans in the Senate just voted 50-48 (with two absent votes) to approve a Congressional Review Action resolution from Sen. Jeff Flake which—if it makes it through the House—would not only roll back the FCC’s rules but also prevent the FCC from writing similar rules in the future.

    • Congress Just Voted To Kill Consumer Broadband Privacy Protections

      Despite a last-ditch effort by the EFF and other consumer and privacy groups, Congress today voted to dismantle privacy protections for broadband subscribers in a 50-48 vote. The rules, passed last October by the FCC, simply required that ISPs clearly disclose what subscriber data is being collected and sold by ISPs. It also required that ISPs provide working opt out tools, and required that consumers had to opt in (the dirtiest phrase imaginable to the ad industry) to the collection of more sensitive data like financial info or browsing histories.

      Another part of the rules, which simply required that ISPs were transparent about hacking intrusions and data theft, had already been killed off quietly by new FCC boss Ajit Pai.

      The rules were seen as important in the face of greater consolidation in an already uncompetitive broadband market, where said lack of competition eliminates any organic market punishment for bad behavior on the privacy front (unlike the content or other industries). Now, with neither broadband competition — nor meaningful regulatory oversight — privacy advocates are justifiably worried about the repercussions to come.

    • WikiLeaks Reveals How the CIA Can Hack a Mac’s Hidden Code
    • Dark Matter

      Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.

      Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

    • Two Ways GDPR Will Change Your Data Storage Solution

      By now, most companies who do any business in the EU are aware of the General Data Protection Regulation (GDPR), which goes into effect in 2018 and applies to any entity doing business within any of the 28 EU member states. Not only does the GDPR apply somewhat broadly to “monitoring the behaviour” of EU residents, but it also comes with some hefty fines (up to €20 million, or 4% of worldwide turnover) for companies that violate the regulation. In short, the new regulation is going to require companies to implement entirely new processes and procedures around the collection and storage of personally identifiable information (PII), which will likely result in changes to data storage solutions as well.

    • Senate on the verge of vote to kill FCC’s consumer privacy protections

      A congressional resolution to roll back the Federal Communications Commission’s broadband privacy rules could see a vote in the Senate as early as Wednesday evening.

    • The Senate Prepares to Send Internet Privacy Down a Black Hole

      Even if you agree that the FCC’s rules are unfair or confusing, using the Congressional Review Act to reverse them completely at best complicates future privacy enforcement. One problem lies in the phrase “substantially similar.” The act is seldom used, and depending on how courts interpret it, the FCC could end up barred from introducing even the less controversial parts of the privacy order. “The only difference between the FCC rules and the FTC rules is that [the FCC rules] moves web browsing history to the ‘sensitive data’ category,” says Dallas Harris of the consumer advocacy group Public Knowledge. In other words, the FCC could be banned even from passing a less strict set of rules closer to the FTC’s provisions.

    • Just Prior To Hearing Over NSL Gag Orders, Court Allows Cloudflare & CREDO Mobile To Be Named As Plaintiffs

      In December, we wrote about how (thanks to EFF’s lawyering) mobile phone provider CREDO Mobile was finally (after many years) allowed to reveal the National Security Letter (NSL) it had received from the DOJ back in 2013. As per usual, the NSL had a complete gag order, barring the company from admitting it had received such a letter. Then, just about a month later, Cloudflare was similarly ungagged over an NSL it had received in 2013 as well.

    • Decrypt, or else…
  • Civil Rights/Policing

    • Woman given triple talaq for not bearing male child
    • [Older] Some Saudi women are secretly deserting their country

      Propelling the flight is the kingdom’s wilaya, or guardianship, law. Although it has received less publicity than the world’s only sex-specific driving ban, it imposes harsher curbs on female mobility. To travel, work or study abroad, receive hospital treatment or an ID card, or even leave prison once a sentence is served, women need the consent of a male wali, or guardian. From birth to death, they are handed from one wali to the next [...] women are treated as minors all their lives.

    • Child sex offences recorded across UK hits all-time high amid growing concerns over online grooming

      The shocking statistics, obtained through Freedom of Information requests, have prompted calls for specialist training for police investigating child abuse that occurs through online platforms, which have increased dramatically in recent years.

    • Guantánamo judge orders CIA testimony on destroyed ‘Black Site’ videotapes

      A military judge ruled Tuesday that defense attorneys could call former CIA officials as witnesses in their bid to derail the death-penalty trial of the alleged USS Cole bombing plotter, who was waterboarded in the spy agency’s secret prison network, the Black Sites.

      The one-page ruling by Air Force Col. Vance Spath, the judge, authorized Witnesses A, B, C and D.

    • Rendition: government evidence to be heard in secret in UK for first time

      Government evidence in a rendition case will be heard in secret for the first time following a high court ruling.

      Lawyers for the Ministry of Defence and the Foreign Office in a case brought by two Pakistani men will be allowed to present evidence behind closed doors under rarely used provisions of the Justice and Security Act.

      The two men, Amanatullah Ali and Yunus Rahmatullah, claim they were subjected to torture and rendition.

  • Internet Policy/Net Neutrality

    • Netflix Is No Longer Worried About Net Neutrality Now That It’s Massive And Successful

      Once upon a time, Netflix was among the fiercest supporters of net neutrality, and a consistent critic of arbitrary and unnecessary broadband usage caps. So much so that the company effectively became public enemy number one at many of the nation’s broadband providers, resulting in a steady stream of bizarre policy and lobbying attacks on the company. Netflix, we were told by a rotating crop of ISP-tied mouthpieces (even by current FCC boss Ajit Pai), was a dirty freeloader, and a nasty company responsible for most of the internet’s ills.

      But as Netflix has grown larger and more powerful, the company’s positions on usage caps and net neutrality has, well, softened.

  • DRM

    • DRM in HTML5 Takes its Next Step Toward Standardization

      Encrypted Media Extensions (EME), a mechanism by which HTML5 video providers can discover and enable DRM providers offered by a browser, has taken the next step on its contentious road to standardization. The World Wide Web Consortium (W3C), the standards body that oversees most Web-related specifications, has moved the EME specification to the Proposed Recommendation stage.

      The next and final stage is for the W3C’s Advisory Committee to review the proposal. If it passes review, the proposal will be blessed as a full W3C Recommendation.

  • Intellectual Monopolies

    • Millions of Papers, Papers for Me

      Stuck in the 19th Century, the Federal Circuit Rule 30(a) requires appellants to submit six paper copies of the appendix to the briefs. In a recent filing, pro se appellant Urvashi Bhagat asked the court to waive this requirement in favor of another form of out-dated technology known as “CDROM.” Bhagat’s argument is that the 1,000+ pages of her appendix, would be cost prohibitive, unwieldy, and an unwarranted consumption of paper. The copying and delivery cost here really is several thousand dollars — easily outweighing the $500 appeal filing fee.

    • Copyrights

      • Supreme Court Says You Can Copyright Elements Of ‘Useful Articles’ — Which May Spell Disaster For 3D Printing & More

        Last summer, we wrote about a potentially important case going to the Supreme Court, technically about the copyright design of cheerleading uniforms. As we’ve discussed, copyright is supposed to apply to artistic expression, and it’s been considered not to apply to functional products or industrial design — sometimes referred to as “useful articles.” Along those lines, things like fashion design, have always been considered not subject to copyright. In this case, Star Athletica v. Varsity Brands, the question was raised about the design of certain stylistic elements on cheerleading uniforms, and whether one copy using similar elements on its cheerleading uniforms infringed on the copyrights of the other. A district court said no, the appeals court said yes. And now the Supreme Court has weighed in saying that the designs can be covered by copyright and creating a new test on such matters (previously, there was something of a mess of different tests that judges would apply, sometimes haphazardly). Having a single test seems better than a mishmash of competing tests, but the situation here is… potentially very dangerous to a variety of innovations.

      • EU Parliament: No Commercial Availability Or Compensation In Marrakesh Implementation

        The European Parliament announced today that its Legal Affairs Committee approved new draft legislation to bring European Union law into line with an international treaty providing copyright exceptions for special format books for visually impaired people. Limitations to the scope of the treaty, such as commercial availability or compensation, were disregarded by Parliament members.

03.22.17

Links 22/3/2017: GNOME 3.24, Wine-Staging 2.4 Released

Posted in News Roundup at 6:19 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • JS package catalog npm frees its team software for open source devs

    npm Inc, the company behind the Node.js package manager and command-line utility known by the same three letters, on Wednesday plans to make its developer collaboration tool known as Orgs free for open source projects.

    Those using npm to manage private packages still have to pay. “This lets us decouple the paid features from the team management features,” said npm cofounder Isaac Schlueter in a phone interview with The Register.

    Orgs, or Organizations, depending upon where one looks on the inconsistent npm website, costs $7 per month per user. There’s also a sensible requirement for at least two users. Otherwise it’s not much of an organization.

  • A new (slow) open source JPEG algorithm makes images 35% smaller and looks better than older compression systems

    Guetzli is Google’s new free/open JPEG compression algorithm, which produces images that are more than a third smaller in terms of byte-size, and the resulting images are consistently rated as more attractive than traditionally compressed JPEGs. It’s something of a web holy grail: much smaller, better-looking files without having to convince people to install a plugin or browser makers to support a new file-format.

  • Open source: The new normal in enterprise software

    Open source software — that is, software that gives users permission to modify, copy and distribute its source code and is either freely distributed or licensed — used to be viewed as the red-headed stepchild of enterprise software.

    “It took time for enterprise to come on board,” said Rafael Laguna, CEO of Open-Xchange, a German open-source company specializing in open-source email software. “If you go back 10 years, [proprietary software from] Microsoft, IBM dominated the architecture of enterprise software, but that is changing.”

  • Blender Making Progress On Its Realtime PBR Engine

    F
    Eevee is the codename for the Blender project to implement a realtime engine with physically-based rendering (PBR) within Blender 2.8.

    This realtime, PBR-based engine is aiming to deliver high-end graphics with a responsive realtime view-port. The developers working on “Eevee” have made progress with lighting, materials, and other features.

  • Chef automation survey: what shape is the continuous enterprise?
  • Cloud Foundry connects open-source standards for quicker code development

    Tech businesses are discovering a powerful truth: building custom code is no fun. It takes time, it’s a distraction from working on core products and it’s likely someone out there already did it better. The real solution is for a company to integrate mature and tested products into their own systems, but that can be a job in itself.

    Open-source software, built around specific abstract standards, can help simplify the work involved. Cloud Foundry is an organization dedicated to creating and maintaining an open-source abstraction platform to speed up software development.

  • IBM’s cloud dreams soar on the wings of AI, open source
  • IBM launches cloud-based blockchain service for Linux Hyperledger Fabric

    IBM also announced availability of blockchain governance tools and new open-source developer tools aimed at shortening the time it takes to build with Hyperledger Fabric.

  • 10 Vendors Jumping on the Kubernetes Bandwagon
  • From supply chain to equity, seven real-world uses of the blockchain today

    A blockchain is a digital ledger that is available for all parties to see, providing transparency across the chain – and businesses in financial trading, insurance, and supply chain management are all taking notice.

  • Events

    • Two open source secure email services

      As much we all complain about email, for most of us, email is still our primary conduit for online communication. That said, numerous hacks and revelations about government surveillance have made it clear that email is also one of the most vulnerable of those conduits.

      What you send via email is your business and yours alone. Besides you and the recipient, no one else should be reading that message. Not hackers, not government agencies, and definitely not nosy siblings or friends.

    • 33C3 – Event Report

      I recently had the opportunity to attend the 33rd Chaos Communication Congress (33C3). The event, as its name suggests, was chaotic. Let me give you two hints: twelve thousand (12000) participants, plus twenty-four (24) hours unrestricted access to the venue.

    • LibrePlanet free software conference returns to MIT this weekend, March 25-26

      LibrePlanet is an annual conference for people who care about their digital freedoms, bringing together software developers, policy experts, activists, and computer users to learn skills, share accomplishments, and tackle challenges facing the free software movement. LibrePlanet 2017 will feature sessions for all ages and experience levels.

      In accordance with the theme “The Roots of Freedom,” the conference’s sessions will examine the roots of the free software movement, including the Four Freedoms, the GNU General Public License and copyleft, and the community’s focus on security and privacy protections. Other sessions will explore new ideas and current work that has arisen from those roots, reaching in to activism, the arts, business, and education.

      Keynote speakers include Kade Crockford, Director of the Technology for Liberty Program at the American Civil Liberties Union of Massachusetts, special consultant to the Electronic Frontier Foundation and author Cory Doctorow, Changeset Consulting founder Sumana Harihareswara, and Free Software Foundation founder and president Richard Stallman.

    • ZTE’s Approach to Digital Transformation with Software-Defined Networking

      The dawn of new services such as 5G, IoT, AR/VR, e-commerce, connected cars,and more, is driving us to digitalization — a massive transition that also requires the network to change.

    • Easier Persistent Memory Programming with Extensions to libstdc++ and libc++

      Persistent memory, unlike volatile memory, retains its contents even if the server has a power failure. However, as Tomasz Kapela, Software Engineer at Intel, points out during his LinuxCon Europe 2016 talk, persistent memory is hard to achieve. Since persistent memory programming is non-trivial, they have been focused on making it easier for the end user and for applications to use persistent memory correctly.

    • Persistent Memory Extensions to libstdc++/libc++ by Tomasz Kapela, Intel
  • Web Browsers

    • Chrome

      • Chromium Rolls Out Enhanced GTK3 Theme Support

        Chromium is sporting greater GTK3 support in its latest daily development snapshots. Developers have begun building the browser with proper GTK3 theme integration enabled by default. I know: hardly ground breaking, but as Chromium (and its more popular sibling, Google Chrome) are widely used by Ubuntu users, it’s a change worth a note.

      • Chrome 58 Beta: IndexedDB 2.0, an improvement to iframe navigation, and immersive full screen for PWAs

        The IndexedDB 2.0 standard is now fully supported in Chrome, making it simpler to work with large data sets in the browser. IDB 2.0 features new schema management, bulk action methods, and more standardized handling of failures.

      • Chrome 58 Beta Supports IndexedDB 2.0, New Developer Features

        Google developers are busy today not only with the Android O Developer Preview but the Chrome team has delivered the first public beta for the upcoming Chrome 58.0.

        The Chrome 58 beta adds full support for IndexedDB 2.0, improvements to iframe navigation by adding a new sandbox keyword to control iframe top navigation behavior, immersive full-screen support for Progressive Web Apps (PWAs), and various other developer changes.

    • Mozilla

      • Mozilla has proposed ‘Obsidian’, a low-level GPU API for the web

        So it looks like after Vulkan for desktop and mobile, the web may be getting a low-level API for interactions with the GPU. They are calling it Obsidian right now (temporary name) and they state it’s not a specification just yet, as they are looking to gather feedback.

  • Oracle/Java/LibreOffice

    • LibreOffice 5.3.1 is out

      Last week, LibreOffice released version 5.3.1. This seems to be an incremental release over 5.3 and doesn’t seem to change the new user interface in any noticeable way.

      This is both good and bad news for me. As you know, I have been experimenting with LibreOffice 5.3 since LibreOffice updated the user interface. Version 5.3 introduced the “MUFFIN” interface. MUFFIN stands for My User Friendly Flexible INterface. Because someone clearly wanted that acronym to spell “MUFFIN.” The new interface is still experimental, so you’ll need to activate it through Settings→Advanced. When you restart LibreOffice, you can use the View menu to change modes.

  • Programming/Development

    • anytime 0.2.2

      A bugfix release of the anytime package arrived at CRAN earlier today. This is tenth release since the inaugural version late last summer, and the second (bugfix / feature) release this year.

    • GitLab 9.0 released with Subgroups and Deploy Boards

      Today we are releasing GitLab 9.0, 18 months after releasing 8.0. We’ve made significant advances to GitLab during this period, shipping a version every single month on the 22nd. Let’s quickly recap how far we’ve come since 8.0, and see those features dovetailing into today’s 9.0 release. Or jump ahead to 9.0 features.

    • Suggests != Depends

      A number of packages on CRAN use Suggests: casually.

    • 2038: only 21 years away

      Sometimes it seems that things have gone relatively quiet on the year-2038 front. But time keeps moving forward, and the point in early 2038 when 32-bit time_t values can no longer represent times correctly is now less than 21 years away. That may seem like a long time, but the relatively long life cycle of many embedded systems means that some systems deployed today will still be in service when that deadline hits. One of the developers leading the effort to address this problem is Arnd Bergmann; at Linaro Connect 2017 he gave an update on where that work stands.

      That work, he said, is proceeding on three separate fronts, the first of which is the kernel itself. He has been working for the last five years to try to prepare the kernel for 2038. Much of that work involves converting 32-bit timestamps to 64-bit values, even on 32-bit systems. Some 32-bit timestamps also show up in the user-space API, which complicates the issue considerably. There is a plan for the enhancement of the user-space API with 2038-clean versions of the problematic system calls, but it has not yet gotten upstream. One recent exception is the statx() system call, which was merged for 4.11; statx() will serve as the year-2038-capable version of the stat() family of calls. There are quite a few other system calls still needing 2038-clean replacements, though.

Leftovers

  • Amid boycott, Google changes ad policy to give advertisers more control

    Google’s Chief Business Officer Philipp Schindler explained in a blog post how the company will revamp its advertising policies to give companies more control over where their ads appear on YouTube and the Google Display Network. Schindler also signals a new epoch for Google and YouTube, one in which the company will focus more effort on preventing hate speech on its online video platform.

  • 2 new tools for creating more accessible projects

    Accessibility has been an afterthought in development for far too long. The result has been costly retrofitting, the risk of inaccessible solutions, and unhappy users.

    We are where we are because developers often ignore accessibility in hopes that it will resolve on its own.

    But solutions should be accessible by all—including the blind, deaf, those with cognitive disabilities and more. This is especially important considering the 1 billion people (including the aging population) with disabilities, the proliferation of new technology, and new industry standards. Further, it’s more than just the right thing to do. It is required by any organization working with the U.S. government, and increasingly, those in the private sector too.

  • Science

    • 5 big ways AI is rapidly invading our lives

      Open source projects are helping drive artificial intelligence advancements, and we can expect to hear much more about how AI impacts our lives as the technologies mature. Have you considered how AI is changing the world around you already? Let’s take a look at our increasingly artificially enhanced universe and consider the bold predictions about our AI-influenced future.

  • Health/Nutrition

  • Security

    • Security updates for Tuesday
    • Reproducible Builds: week 99 in Stretch cycle
    • Government Agencies to be Rated on Cybersecurity Using NIST Framework

      The Trump administration has announced that it will impose new metrics on federal agencies related to cybersecurity. Agencies and departments will be required to comply with the framework developed by the National Institute of Standards and Technology (NIST) and report back to the Department of Homeland Security (DHS), the Office of Management and Budget (OMB), and the White House.

      Homeland security advisor Thomas Bossert stated that the President’s budget will include an increase in federal funding to combat cyber threats, and that the administration’s priorities vis-à-vis cybersecurity are to modernize and centralize the existing system. To this end, the Administration intends to partner with business, including Silicon Valley, and state and local governments, on cybersecurity.

    • Firefox gets complaint for labeling unencrypted login page insecure

      The operator of a website that accepts subscriber logins only over unencrypted HTTP pages has taken to Mozilla’s Bugzilla bug-reporting service to complain that the Firefox browser is warning that the page isn’t suitable for the transmission of passwords.

      “Your notice of insecure password and/or log-in automatically appearing on the log-in for my website, Oil and Gas International, is not wanted and was put there without our permission,” a person with the user name dgeorge wrote here (the link was made private shortly after this post went live). “Please remove it immediately. We have our own security system, and it has never been breached in more than 15 years. Your notice is causing concern by our subscribers and is detrimental to our business.”

    • Security updates for Wednesday
    • Customer security awareness: alerting you to vulnerabilities that are of real risk
    • Cisco’s WikiLeaks Security Vulnerability Exposure: 10 Things Partners Need To Know

      Cisco’s security team has discovered that hundreds of its networking devices contain a vulnerability that could allow attackers to remotely executive malicious code and take control of the affected device.

      “We are committed to responsible disclosure, protecting our customers, and building the strongest security architecture and products that are designed through our Trustworthy Systems initiatives,” said a Cisco spokesperson in an email to CRN regarding the vulnerability.

      Some channel partners of the San Jose, Calif.-based networking giant are already advising customers on how to bypass the critical security flaw. Here are 10 important items that Cisco channel partners should know about the security vulnerability.

    • Linux had a killer flaw for 11 years and no one noticed

      One of the key advantages of Open sauce software is that it is supposed to be easier to spot and fix software flaws, however Linux has had a local privilege escalation flaw for 11 years and no-one has noticed.

      The vulnerability, tracked as CVE-2017-6074, is over 11 years old and was likely introduced in 2005 when the Linux kernel gained support for the Datagram Congestion Control Protocol (DCCP). It was discovered last week and was patched by the kernel developers on Friday.

    • 6 Hot Internet of Things (IoT) Security Technologies
    • Microsoft Losing Its Edge

      However, despite these improvements in code cleanness and security technologies, it hasn’t quite proven itself when faced with experienced hackers at contests such as Pwn2Own. At last year’s edition of Pwn2Own, Edge proved to be a little better than Internet Explorer and Safari, but it still ended up getting hacked twice, while Chrome was only partially hacked once.

      Things seem to have gotten worse, rather than better, for Edge. At this year’s Pwn2Own, Microsoft’s browser was hacked no less than five times.

    • Microsoft loses the Edge at hacking contest

      And for every hack perpetrated against Edge, there was a corresponding attack against the Windows 10 kernel, indicating that it has a way to go in terms of security, according to Tom’s Hardware.

    • Wikileaks: Apple, Microsoft and Google must fix CIA exploits within 90 days

      The 90-day deadline is the same that Google’s own Project Zero security group provides to companies when it uncovers flaws in their software. If a company has failed to patch its software accordingly, Project Zero publishes details of the flaw whether the vendor likes it or not.

    • NTPsec Project announces 0.9.7
  • Defence/Aggression

    • [Older] Lucknow encounter: Are moderate {sic} Indian Muslims losing Lucknow to the Islamic State now?

      Given that the congratulatory letter was issued by a senior teacher in India’s leading madrasa—Nadwatul Ulama in Lucknow— it clearly reflected a sharp turnaround in the attitude and approach of the Lucknow-based clergy towards the emergence of a global Islamic caliphate. However, in his letter, Nadwi was only a spokesperson of the petro-dollar-funded Wahabi seminaries in India.

    • India could strike Pakistan with nuclear weapons if threatened, says expert

      In February, both countries extended a bilateral pact, dealing with reducing the risk of nuclear weapon-related accidents including a war, for a period of five years. India hand Pakistan have fought three full-fledged wars besides the 1999 Kargil hostilities.

    • Former NZ defence minister admits civilians were killed in bungled special forces raid

      The former New Zealand defence minister has admitted for the first time that civilians were killed during a bungled raid by New Zealand SAS troops in Afghanistan in 2010.

      For years, New Zealand politicians and military commanders denied this, claiming that the people killed were insurgents responsible for an earlier attack on the troops.

      Today’s comments by the former minister, Wayne Mapp, come less than 24 hours after the launch of an explosive new book Hit and Run by investigative reporters Jon Stephenson and Nicky Hager.

      The book claims the controversial operation killed six civilians and wounded 15.

    • Why would Google take sides in Syria’s Civil War?

      This morning, an apparently innocuous AP article eventually led me to the question, “Why would Google take sides in Syria’s civil war?”

      The article announced that Google was getting involved in protecting “news organizations and election-related sites” from cyberattacks and hacking though Jigsaw, a research arm of Google and Alphabet Inc.

    • What They Won’t Tell You About the American Military
  • Transparency/Investigative Reporting

    • In a letter to the editor, CIA Public Affairs Director corrected the record with a lie of omission

      In 1981, the CIA took exception with newspapers reporting that Frank Sturgis was a former CIA employee. Herbet Hetu, the Agency’s then-Director of Public Affairs, had such a problem with the reporting that he wrote to the editors of several newspapers to try to issue a correction. The first letter, dated January 6, 1981, was sent to the editor of The Washington Star objecting to an article that had been published that day.

    • Whoops: The DOJ May Have Confirmed Some of the Wikileaks CIA Dump

      The US government says it wants to keep some of the now-public documents out of court because they contain classified material, suggesting that they could be authentic.

      Last week, the US government may have confirmed the authenticity of a number of CIA documents concerning the agency’s hacking operations, but not in the way you might expect.

      Judging by a recent court filing, at least some of the CIA files Wikileaks published earlier this month are genuine, because the government pushed back against having them admitted in court due to the documents’ classified content.

      “The government is not able to declare non-government records as classified, unless they are taking ownership of the records themselves,” Bradley P. Moss, a national security attorney, told Motherboard in an email.

  • Finance

  • AstroTurf/Lobbying/Politics

    • [Old] `I Don`t Recall` Marks Excerpts Of Reagan Testimony
    • Ivanka Trump has West Wing office and will get access to classified information [iophk: "somehow the word nepotism is missing from the entire article"]
    • Ivanka Trump getting West Wing office in White House ‘like a coup’, says former Labor secretary Robert Reich

      Shaun King, a senior justice writer and activist, simply called the news “disturbing”

    • Cyber Firm at Center of Russian Hacking Charges Misread Data

      An influential British think tank and Ukraine’s military are disputing a report that the U.S. cybersecurity firm CrowdStrike has used to buttress its claims of Russian hacking in the presidential election.

      The CrowdStrike report, released in December, asserted that Russians hacked into a Ukrainian artillery app, resulting in heavy losses of howitzers in Ukraine’s war with Russian-backed separatists.

      But the International Institute for Strategic Studies (IISS) told VOA that CrowdStrike erroneously used IISS data as proof of the intrusion. IISS disavowed any connection to the CrowdStrike report. Ukraine’s Ministry of Defense also has claimed combat losses and hacking never happened.

      The challenges to CrowdStrike’s credibility are significant because the firm was the first to link last year’s hacks of Democratic Party computers to Russian actors, and because CrowdStrike co-founder Dimiti Alperovitch has trumpeted its Ukraine report as more evidence of Russian election tampering.

    • 5 congressional staffers in criminal probe over unauthorized computer access

      Five people employed by members of the House of Representatives remain under criminal investigation for unauthorized access to Congressional computers. Former DNC chair Debbie Wasserman Schultz employed at least one of those under investigation.

      The criminal investigation into the five, which includes three brothers and a wife of one of the men, started late last year, as reported by Politico in February. The group is being investigated by US Capitol Police over allegations that they removed equipment from over 20 members’ offices, as well as having run a procurement scheme to buy equipment and then overcharge the House.

      House Speaker Paul Ryan said last week Capitol Police are receiving additional help for the investigation. “I won’t speak to the nature of their investigation, but they’re getting the kind of technical assistance they need to do that, this is under an active criminal investigation, their capabilities are pretty strong but they’re also able to go and get the kind of help they need from other sources,” Ryan said.

    • Trump ex-aide Paul Manafort ‘offered to help Putin’

      US President Donald Trump’s one-time campaign chairman secretly worked for a Russian billionaire to assist President Vladimir Putin, the Associated Press (AP) news agency reports.

  • Censorship/Free Speech

    • Arkansas Legislators Want To Make Corporate Whistleblowing Illegal

      Another “ag gag” law is in the works in Arkansas. These bills are brought under the pretense of safety — both for the person supposedly breaking them, as well as for the employees of the entity “trespassed” upon. The unspoken aim of these laws is to prevent whistleblowing, and they often spring into existence after someone has exposed horrible practices at local businesses — in most cases, the mistreatment of animals. The other consequence of most of these laws — unintended or not — is to deter employees from speaking up about questionable business practices, as there often is no exception carved out for employees of the companies protected by these laws.

      Kaleigh Rogers of Vice reports another ag gag bill has passed the Arkansas state House and is on its way to a Senate vote. And once again, the bill’s wording would deter whistleblowing and make journalistic efforts a civil violation.

    • Twitter suspends 376k more accounts linked to ‘terrorism’

      Twitter said Tuesday it suspended 376,890 accounts in the second half of 2016 for “promotion of terrorism,” an increase of 60 percent over the prior six-month period.

      The latest suspensions bring the total number of blocked accounts to 636,248 from August 2015, when Twitter stepped up efforts to curb “violent extremism,” the company announced as part of its latest transparency report.

    • UK’s Piracy Blocklist Now Exceeds 3,800 URLs

      By now, most UK Internet users have gotten used to pirate sites being blocked by their ISPs. Internet providers have been ordered to block a wide variety of torrent, direct download and streaming portals that offer copyright-infringing content. The full list uf URLs, which includes several reverse proxies, has now swelled to more than 3,800 according to one of the ISPs involved.

  • Privacy/Surveillance

    • Adobe buddies up with Microsoft for new ways to mine your data

      Adobe and Microsoft have announced new product integrations along with the XDM (Experience Data Model) language for interchanging behavioural and marketing data between platforms.

      Microsoft has a CRM (Customer Relationship Management) offering, Dynamics 365, but is weak in marketing automation, while Adobe lacks a CRM product to compete with Salesforce, so it makes sense for the two companies to integrate.

      A new piece announced at the Adobe Summit under way in Las Vegas is that Adobe Campaign – which manages cross-channel campaigns across web, mobile, email and print – is integrated with Dynamics 365.

    • The CIA’s New Guidelines Governing Publicly Available Information

      On January 18, 2017, the CIA declassified and released new internal Central Intelligence Agency Activities: Procedures Approved by the Attorney General Pursuant to Executive Order 12333, approved by the Attorney General under Section 2.3 of Executive Order 12333. These new guidelines will be known as Agency Regulation (AR) 2-1 when they take effect on March 18, 2017. They will replace AR 2-2, including Annexes A and B, which were originally issued in 1987, most recently revised in 2012, and released to the public in 2015. The new CIA guidelines were part of a larger effort by the Obama administration, commenced before 2013 and completed two days before President Trump’s inauguration, to update Intelligence Community (IC) guidelines.

    • With appeals ruling, the United States has effectively outlawed file encryption

      An appeals court has denied the appeal of a person who is jailed indefinitely for refusing to decrypt files. The man has not been charged with anything, but was ordered to hand over the unencrypted contents on police assertion of what the contents were. When this can result in lifetime imprisonment under “contempt of court”, the United States has effectively outlawed file-level encryption – without even going through Congress.

  • Civil Rights/Policing

    • Should You Have Any 4th Amendment Rights In An Airport?

      For many years, we’ve written about the craziness of the so-called “border search exception” to the 4th Amendment, in which the US government has insisted that the 4th Amendment doesn’t apply at the border, and thus it’s allowed to search people at the border. The initial reasoning was — more or less — that at the border, you’re not yet in the country, and thus the 4th Amendment doesn’t apply yet. But that’s expanded over time — especially in the digital age. Perhaps, back when people just had clothes/books/whatever in their luggage, you could understand the rationale for allowing a search, but today, when people carry laptops and handheld electronic devices that basically store their whole lives, the situation is a lot scarier. Unfortunately, (with just a few small exceptions) the courts have simply taken the historical ability to search luggage at the border and expanded it to cover electronic devices. Then, things got even more ridiculous, when Homeland Security decided that anywhere that’s within 100 miles of the border could be “close enough” to count as a “border search,” making the “border search exception” apply. That’s… messed up.

    • Sex slave’s rescue in Riyadh reveals widening web of traffickers in India

      Of an estimated six million Indian migrants in the six Gulf states of Bahrain, Kuwait, Qatar, Saudi Arabia, United Arab Emirates and Oman, domestic workers are among the most exploited, campaigners say.

      “Housemaids are treated like cattle here. This woman didn’t even know where she was when I asked her location. She kept crying to be saved. India should ban sending housemaids to the Gulf,” Sriniwas said.

    • The International Women’s Peace Group hosts a seminar for BAN FGM
    • Saudi ‘prisoner of conscience’ ordered to pay $270,000 fine

      His sentence was extended to ten years imprisonment and 1,000 lashes in 2015.

    • Aceh’s latest tourist attraction? Dozens of Malaysian tourists come to watch public caning in Banda Aceh

      On Monday, dozens of tourists from Malaysia came by bus to visit the Lamteh Mosque in Banda Aceh to witness a dozen people getting publicly caned for crimes ranging from gambling to ikhtilat (the intermingling of men and women who are not married).

      Among the tourists was a Malaysian State Senator from Klanten, Dato Dr Johari bin Mat, who said that he respected Aceh implementation of Islamic law and use of public canin to ensure security and public order.

    • ‘Multilingual Society’: German Educators Call for Compulsory Arabic in Schools
    • UK follows US on cabin device ban [iophk: “in 7th gen Intel“]

      The devices were listed as: laptops, tablets, e-readers, cameras, portable DVD players, electronic game units larger than a smartphone and travel printers/scanners.

    • WATCH: Lucknow girl thrashes molesters with police baton

      When police stood as mute spectators in Lucknow, a girl decided to take law in her hands and ensured that she teaches her molesters a lesson.

      A group of girls were allegedly eve-teased by a bike-borne gang in Gautam Palli area on Sunday night. However, the police standing there didn’t come to their rescue, that is when the girls from the group snatched the baton from the cops and thrashed the men on bike.

  • Internet Policy/Net Neutrality

    • From bad to worse: the del Castillo Report on the European Electronic Communication Code

      To understand what it’s about, let’s step back a little.

      Since 2002, the regulation of telecommunication has been based on a group of European directives called “the telecom package”. The second revision of this package (the first was in 2009) began in September 2016 with the publication by the European Commission of a draft bill for a European Code of Electronic Communication. This massive bill of more than a hundred articles aims to recast and reform the current telecom package. It is now being negotiated at the Council of the European Union, and a report just had been published at the European Parliament. This report published by the MEP Pilar del Castillo (ES – EPP) will be discussed in the coming months.

    • IPv6 and CGNAT

      Today I ended reading an interesting article by the 4th spanish ISP regarding IPv6 and CGNAT. The article is in spanish, but I will translate the most important statements here.

      Having a spanish Internet operator to talk about this subjet is itself good news. We have been lacking any news regarding IPv6 in our country for years. I mean, no news from private operators. Public networks like the one where I develop my daily job has been offering native IPv6 since almost a decade…

  • DRM

    • Why American Farmers Are Hacking Their Tractors With Ukrainian Firmware

      Tractor hacking is growing increasingly popular because John Deere and other manufacturers have made it impossible to perform “unauthorized” repair on farm equipment, which farmers see as an attack on their sovereignty and quite possibly an existential threat to their livelihood if their tractor breaks at an inopportune time.

    • W3C moves to finalize DRM standardization, reclassifies suing security researchers as a feature, not a bug

      The World Wide Web Consortium has announced that its members have until April 19 to weigh in on whether the organization should publish Encrypted Media Extensions, its DRM standard for web video, despite the fact that this would give corporations the new right to sue people who engaged in legal activity, from security researchers who revealed defects in browsers to accessibility workers who adapted video for disabled people to scrappy new companies who come up with legal ways to get more use out of your property.

  • Intellectual Monopolies

    • Italian Supreme Court rules that mere reproduction of Vespa image may amount to counterfeiting

      Italian online IP resource Marchi & Brevetti has just reported a very interesting and recent decision of the Criminal Section of the Italian Supreme Court (Corte di Cassazione) regarding the crime of counterfeiting within Article 474 of the Italian Criminal Code.

    • Trademarks

      • The Changing Perspective Of Well-Known Trademarks In India

        The innovative advertisements of famous trademarks we come across remind us of the image they have created in our minds and the quality of the respective products or services they reflect. Millions are spent by the owners of such marks to build their reputation and maintain their popularity in this competitive globalised world.

    • Copyrights

      • University Puts 20,000 Lectures Behind A Registration Wall In Response To DOJ Pressure On Website Accessibility Compliance

        Back in 2012, a federal court ruled US websites were “places of public accommodation.” The ruling (overturned on appeal) came in a lawsuit brought against Netflix by the National Association of the Deaf. It seems like an obvious conclusion — more people get their information, news, and entertainment from the web than other sources. But the ruling had plenty of adverse consequences, especially for smaller, less profitable purveyors of online content.

      • Supreme Court Cheers on Copyright Separability

        In a new Copyright decision, the Supreme Court has modified the doctrine of separability that allows for copyright of works of authorship associated with useful articles.

      • US Supreme Court holds cheerleading uniforms eligible for copyright protection

        The US Copyright Act, §101 states that “pictorial, graphic, or sculptural features” of the “design of a useful article” can be protected by copyright as artistic works if those features “can be identified separately from, and are capable of existing independently of, the utilitarian aspects of the article.”

      • US Supreme Court finds cheerleading uniform designs copyright eligible

        The Supreme Court has held that the designs in a cheerleading uniform satisfy the test for copyright protection in its Star Athletica v Varsity Brands ruling. Observers say the decision provides a standard test to be applied to the separability analysis

      • Unpaywall: The Browser Add-on That Finds (Legal) Free Copies Of Academic Papers You See As You Browse The Web

        Techdirt has just written about ResearchGate, which claims to offer access to 100 million academic papers. However, as we wrote, there’s an issue about whether a significant proportion of those articles are in fact unauthorized copies, for example uploaded by the authors but in contravention of the agreement they signed with publishers. The same legal issues plague the well-known Sci-Hub site, which may deter some from using it. But as further evidence of how the demand for access to millions of academic papers still locked away is driving technical innovation, there’s a new option, called Unpaywall, which is available as a pre-release add-on for Chrome (Firefox is promised later), and is free. It aims to provide access to every paper that’s freely available to read in an authorized version.

      • Leaked Text: Is EU Tempted By Too Many Safeguards Limiting The Scope Of Blind Treaty?

        As the ratification by the European Union of an international treaty creating an exception to copyright for visually impaired people nears, a leaked text shows that the directive implementing the treaty in the EU might come with safeguards limiting the scope of the treaty, allegedly pushed by the publishing industry.

        The leaked document (from the General Secretariat of the Council of the EU to the Permanent Representatives Committee), seen by Intellectual Property Watch, is the latest draft proposal for a directive of the European Parliament and the Council. The directive would be on “certain permitted uses of works and other subject-matter protected by copyright and related rights for the benefit of persons who are blind, visually impaired or otherwise print disabled and amending Directive 2001/29/EC on the harmonisation of certain aspects of copyright and related rights in the information society.”

03.21.17

Links 21/3/2017: PyPy Releases, Radeon RX Vega, Eileen Evans at Linux Foundation

Posted in News Roundup at 2:49 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • Red Flag Windows: Microsoft modifies Windows OS for Chinese government

      China has long been both a huge lure and a thorn in the side for Microsoft. Massive piracy of Windows XP, a decade-long effort to replace Windows entirely with a home-grown Linux variant called Red Flag and an OpenOffice variant called RedOffice, and a ban on Windows 8 for government use following the leak by former NSA contractor Edward Snowden of information on National Security Agency spying all have combined to hinder Microsoft in the Chinese market. But now Microsoft—in partnership with the state-owned China Electronics Technology Group (CETC)—is preparing to reboot its relationship with Beijing, thanks to a modified version of Windows produced specifically for China, Dow Jones Newswires reports.

    • [Old] Windows 10 May Delete Your Programs Without Asking

      When you install a major Windows 10 update, you may reboot to find some of your programs missing. Yes, Windows 10 may remove your programs without asking you–but you can get them back pretty easily.

      This is the takeaway from some people’s experiences with the “November update,” Windows 10’s first big update. Microsoft has refused to comment on this, but it seems like the update process is designed to remove incompatible programs. Here’s what’s going on, and what you can do about it.

  • Server

    • DevOps still very much a work in progress, survey suggests

      That’s the key takeaway from a recent survey of 2,045 IT managers and professionals, released by Quali, an IT automation solutions provider. While most people in enterprises would say at this point that they have DevOps underway in some shape or form, achieving agility is another story.

    • IBM chases Google, Microsoft with Kubernetes in the cloud

      It’s only a matter of time before every major cloud vendor offers a version of Kubernetes as a service. Now it’s IBM’s turn.

    • In The Virtualization Space, Containers Are Making A Move

      Wow has it been a whirlwind over the last ten years in the virtualization space. Where once Xen and then KVM sat on the pedestal, the baton has been passed to the projects revolved around containers. Names like Docker, Kubernetes and Mesos are most often mentioned. As is generally the case in the FLOSS arena, evolution is a constant. Therefore, if one is in the DevOps arena, it is time to familiarize yourself with containers if you have not already done so.

    • The DOE and NSA Construct Doomsday Scenario for American HPC

      One last point. The Chinese economy continues to expand faster than that of the US, and, depending on who you talk to, will reach the size of the US sometime between 2018 and 2028. Such an economy would be expected to field an HPC capability on par with that of the US. Furthermore, China and the US should both be able to maintain an indigenous and self-sustaining HPC capability for their own use, and it’s unreasonable to think either could prevent the other from doing so. In such a world, the US may no longer enjoy technological supremacy, but it can surely have the wherewithal to control its own future in HPC.

    • [Older] Getting Down To Bare Metal On The Cloud

      When you think of the public cloud, the tendency is to focus on the big ones, like Amazon Web Services, Microsoft Azure, or Google Cloud Platform. They’re massive, dominating the public cloud skyline with huge datacenters filled with thousands of highly virtualized servers, not to mention virtualized storage and networking. Capacity is divvied up among corporate customers that are increasingly looking to run and store their workloads on someone else’s infrastructure, hardware that they don’t have to set up, deploy, manage or maintain themselves.

    • Avoid complex infrastructure when building simple things

      For local development, go crazy. For real production use.. I think you should avoid this until you’re the size of business that someone else will do this for you. If this seems controversial do the math: include backing it up, patching it, keeping it highly available, the time spent not working on your differentiating features etc. There are plenty of datastore services available that will do all this for you and let you focus your limited time on your app, and they’re really very cheap when you consider the actual cost of running a production database. Write your app so that the cost of moving to your own database later if you need to is unlikely to be high. Managing a simple web app instead of managing a web app, a production database, a message queue etc is a big win.

  • Kernel Space

    • Intel Has More DRM Graphics Driver Code Ready For Linux 4.12

      Intel had already sent in a batch of feature updates to DRM-Next targeting the Linux 4.12 kernel and yesterday an additional feature pull was submitted of work to premiere in this next kernel series.

    • Eric Anholt Continues Tuning GLAMOR, Cleaning Up ARM CLCD Driver

      For those following the development of the open-source VC4 driver stack that notably supports the Raspberry Pi graphics hardware, developer Eric Anholt has published another status update.

      As covered already, VC4 HDMI audio is coming to Linux 4.12 as a big milestone.

    • The Linux Foundation’s Arpit Joshipura to Host Open Networking Q&A on Twitter [Ed: If you do not join (i.e. give data to) surveillance and censorship platform Twitter you can't speak to the Linux Foundation now?]

      On Friday, March 31, The Linux Foundation will kick off a new initiative. No, it’s not a new project, event, or training course, although there are plenty of those in store. Instead, the foundation will begin a monthly Twitter chat, called #AskLF, with leaders at the organization.

    • CoreOS Donates its rkt Container Technology to CNCF

      At the same time that Docker offered to donate its containerd technology to the Cloud Native Computing Foundation (CNCF), CoreOS did the same with its competing rkt.

    • The Linux Foundation Appoints Eileen Evans to Board of Directors

      The Linux Foundation, the nonprofit advancing professional open source management for mass collaboration, today announced that Eileen Evans, Vice President and Deputy General Counsel for Software and Open Source at Hewlett Packard Enterprise (HPE), has joined The Linux Foundation Board of Directors as an At-Large director. Ms. Evans had represented HP and then HPE from 2012 through 2016 on the Board as a Platinum director.

    • Graphics Stack

      • AMD GPU Linux driver patches is listing seven Vega 10 IDs

        100 Linux patches amounting to over fourty thousand lines of code was sent out today for review in order to provide “Vega 10″ support within the Linux AMDGPU DRM driver.

        Adding Vega support to AMDGPU is a big task due to all of the changes over Polaris and other recent GPUs reports Phoronix.

      • Mesa 17.0.2 Brings Improvements to Radeon RADV and Intel ANV Vulkan Drivers

        Immediately after announcing the last maintenance update to the Mesa 13.0 3D Graphics Library series, Collabora’s Emil Velikov published the second point release for the new Mesa 17.0 branch.

        Mesa 17.0.2 is here only two weeks after the release of the first maintenance update to Mesa 17.0, which is currently the most advanced stable branch of the graphics stack used by default in numerous Linux-based operating systems.

      • Mesa 13.0.6 Is the Last in the Series, Users Encouraged to Move to Mesa 17.0

        Collabora’s Emil Velikov is announcing today the general availability of the sixth and last scheduled maintenance update for the Mesa 13.0 3D Graphics Library series for GNU/Linux distributions.

        Mesa 13.0.6 is here only to backport many of the improvements from the newest stable branch, Mesa 17.0, to the Mesa 13.0 series, which some of you are still using on your Linux distro. However, you should start migrating to Mesa 17.0 as soon as you read this.

      • 140 Patches Posted To Wire Up Radeon RX Vega In RadeonSI Gallium3D Driver
      • Porting Mesa/Libdrm’s Build System To Meson Brings Up Controversy

        Last week an independent developer proposed replacing the build system of libdrm — the DRM library that sits between Mesa and the Linux kernel DRM — to using the Meson build system as a potential replacement to using Autotools. That has led to another colorful discussion around build systems.

        Dylan Baker’s RFC patches can be found on the dri-devel list and the discussion that ensued. He argues that the build system with Meson would be better since it’s written in Python, Meson makes use of Ninja rather than CMake, its syntax is arguably simpler, and it’s quicker. Dylan found that his build times dropped from 26 seconds to 13 seconds when going from Autotools to Meson. When making use of ccache, the build times dropped from 13 seconds to 2 seconds. He also mentioned he’s planning on porting Mesa’s Autotools/CMake build system over to Meson.

      • AMD’s Linux GPU patches seven Vega 10s

        These 100 patches add up to 40,000 lines of code and have been sent out today for review. The idea is that AMD will use them as the basis to provide “Vega 10″ support within the Linux AMDGPU DRM driver.

      • Seven AMD Vega GPU IDs have appeared in the latest Linux driver release

        More than forty thousand lines of updated code have been sent out with 100 little patches for AMD’s Linux graphics drivers so they can deliver Vega GPU support when the new architecture launches. Inside the latest drivers have appeared seven discrete Vega 10 device IDs.

      • AMD Linux Driver Team Releases Over 100 ADMGPU Driver Patches Including Vega 10, Polaris 12 Support

        More than 100 patches for ADMGPU driver, including some much talked about support for Vega 10, were released by AMD’s Linux driver team yesterday.

  • Applications

    • Buku – A Powerful Command-line Bookmark Manager for Linux

      I can damn sure, managing bookmarks is one of the major/important tasks to everyone now a days. Everyone have different requirement and holding bunch of URL’s for their needs and keeping those in bookmarks.

      We all knows about bookmarks, usage, and how to do in web browser, especially in GUI mode. What about command-line? Most of us doesn’t know about this awesome utility which used to create bookmarks in command-line.

    • Indicator DOOM Gives Your Ubuntu Desktop the Badass CPU Monitor It Deserves

      Say hello to the flat-out coolest way to keep and eye on your desktop’s CPU load.

      Because as handy as tools like Indicator Multiload are, they lack a certain …badassery.

      Indicator DOOM is a CPU load indicator for Ubuntu that displays processor load using Doomguy‘s face from the iconic DOOM video game.

    • PiCluster 1.7 – Efficient Container Management

      I am pleased to announce PiCluster v1.7. In this release, I wanted to make PiCluster easier to use by having the Web Console handle most of the common configuration file changes. Not everyone enjoys editing json files including myself. Now let’s go over what is new in this release.

    • Command-line document conversion tools for writers

      Today, we have ample tools available for editing memos, letters, essays, books, presentation slides, and other documents on our computers. This can be both an advantage and a disadvantage: on the one hand, if you don’t like a piece of software, you can simply move on to another one any time; on the other hand, a lot of these tools, especially proprietary software, are fully compatible with their own formats only. As a consequence, the more documents you have created with such a program, the less likely switching over to another solution will be possible without investing significant time, energy, and even money. This phenomenon is called vendor lock-in.

    • Instructionals/Technical

    • Games

      • The 25 Best Games for Linux and Steam Machines

        When I was first introduced to Linux and the Open Source community gaming was an issue that users always complained about. Interested gamers always had to use wine or implement one workaround or the other.

        There were either not good enough drivers to run certain games on Linux or the games themselves weren’t available for the platform.

        Fast forward to 2017 and the story has changed. Linux gamers now have a variety of games they can choose from ranging from free to the relatively pricey ones.

        Today, I bring you a list of the 25 best games you can play on your Linux system.

      • Dota 2 patched for AMD Ryzen

        Valve have put out a small Dota 2 update that aims to improve performance on the new Ryzen processors from AMD.

      • Jack Orlando: Director’s Cut now has a Wine-port on Steam for Linux

        Jack Orlando: Director’s Cut [Steam], an adventure game published by Topware is the latest game of theirs to get a Wine-port on Steam.

      • RPG Maker MV now has a Linux version and a Linux game export option

        We saw signs of RPG Maker MV [Steam] coming to Linux early last year, but now it’s official. RPG Maker MV now has a Linux version and it can export Linux games.

        With the release of the 1.4.0 update, anyone who owns it now has access to the Linux version on Steam. So anyone wanting to make simple RPG games on Linux has access to a highly rated tool.

      • Dota 2 Receives Optimization For AMD Ryzen CPUs

        If you were an early buyer of AMD Ryzen hardware, Valve has pushed out a Dota 2 game update with some Ryzen optimizations.

        Today’s Dota 2 update from Valve mentions, “Improved threading configuration for AMD Ryzen processors.” Presumably this is with better dealing of Ryzen’s new SMT capabilities for AMD processors.

      • Space sandbox game ‘Avorion’ has a whopper of an update, considering getting a server for it

        I am a massive fan of ‘Avorion’ [Steam] as this Early Access space sandbox has a lot going for it and it just got a major update. I am also considering setting up a GOL server for it!

        This new update will mean a re-design of your ships, so be warned. The flight model has been reworked and you now need to make use of three new blocks: Directional Thruster, Gyro Array, Inertia Dampeners.

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

    • GNOME Desktop/GTK

      • GNOME Photos 3.24.0

        It was high time that we overhauled our old GtkIconView-based overview grids. Their inability to reflow the thumbnails leads to a an ugly vertical gutter of empty space unless the window is just the right size. The other problem was performance. GtkIconView gets extremely slow when the icons are updated, which usually happens when content is detected for the first time and start getting thumbnailed.

  • Distributions

  • Devices/Embedded

    • Rugged, Linux-ready sandwich style SBC packs Skylake CPUs

      VersaLogic’s 125 x 85 x 37mm “Blackbird” offers Skylake CPUs, up to 32GB of DDR4, 3x mini-PCIe sockets, wide-range power, and MIL-STD-202G ruggedization.

      VersaLogic calls its dual-layer Blackbird an Embedded Processing Unit (EPU). Like the other VersaLogic EPUs we’ve seen, such as the Atom-based Osprey EPU, the Blackbird is a three-layer sandwich consisting of a COM Express module in the middle, a same-sized I/O interface board on the top, and a heat spreader on the bottom. Compared to the Osprey, the Blackbird has a lot more real-world ports, making it more SBC-like rather than a COM with SBC-like characteristics. The Blackbird is “supplied fully assembled and tested, including heat plate, ready to install in a system,” says Versalogic.

    • Phones

Free Software/Open Source

Leftovers

  • Health/Nutrition

    • Chile: Civil Society, Members Of Congress Urge Issuance Of Compulsory Licences

      Representatives of Chilean civil society and Congress this week presented the Chilean health minister with a proposal urging the government to take advantage of international trade law and a newly passed congressional resolution to issue compulsory licences on high-priced drugs for hepatitis C and prostate cancer.

      The proposal was made under the advisement of Luis Villarroel, director of Corporación Innovarte, a non-governmental organisation in Santiago.

    • Eli Lilly Loses Quixotic Quest To Get Canada To Pay $500 Million For Rejecting Its Bad Patents

      Over the last few years, we’ve written a ton about “corporate sovereignty” provisions in trade agreements. Technically, these tend to be called “Investor State Dispute Settlement” or ISDS provisions, but I really believe that a decent part of the reason they’re called something so boring is to stop people from paying attention to just how nefarious these provisions truly are. One of the reasons we first started paying attention to these provisions — as they were showing up in agreements under negotiation, such as the TPP and TTIP — was following a story involving the pharmaceutical giant Eli Lilly demanding $100 million from Canada for rejecting two of its patents.

      The issue was that Canada had rejected these two patents because the company couldn’t prove that the patented drugs were actually useful. Eli Lilly claimed that Canada had no right to reject patents on that basis, arguing that it was a “dramatic” shift in how patents were reviewed, and thus it was “expropriating its property” and undermining the company’s “expected future profits.” Think about that for a second. By the time this case went to an actual tribunal, the amount that the company was demanding had ballooned from $100 million to $500 million. This battle has waged on for many years — and for Eli Lilly, this was a huge deal. Management at the company basically bet the company on continuing to get new patents, and any hiccup — even a rejection of patents for not being useful — could be a disaster for the company. The company even pushed to get Canada slammed during diplomatic proceedings in the infamous Special 301 Report for the USTR for daring to reject its patents — and the USTR complied.

    • Patients, Members of Congress Ask Chilean Government to Issue Compulsory Licenses on Prostate Cancer and HCV Drug Patents

      Members of the Chilean Congress and a group of 6 patients visited the Chilean Ministry of Health yesterday to ask that the government use its authority under Chilean law to end patent monopolies on the prostate cancer drug enzalutamide (U.S. brand name Xtandi) and on sofosbuvir-based combination drugs for the treatment of hepatitis C virus (HCV).

      The patients and members submitted a petition (signatures here) that outlined the legal authority and public policy rationale for the grant of compulsory licenses on the patents for the drugs described in the petition. Those compulsory licenses would allow prescription drug manufacturers to produce affordable generic versions of the drugs, subject to a reasonable royalty.

      The petition was written by Chilean attorney Luis Villarroel, and signed by Luis and five members of civil society and patient groups, and four members of the Chilean Congress, including Diputados Giorgio Jackson, Karla Rubilar, Miguel Alvarado, and Gabriel Boric.

      Knowledge Ecology International was asked to provide technical advice on the petition.

    • Norway Is No. 1 in Happiness. The U.S., Sadly, Is No. 14.

      After placing fourth last year, Norway is now the world’s happiest country, according to the 2017 World Happiness Report, released on Monday. The Central African Republic was the least happy of 155 countries.

      The authors of the report found that a half-dozen socioeconomic factors explain much of the difference in happiness among countries, but that social factors play an underappreciated role. As evidence, they cite periods of substantial economic growth that were nonetheless matched by declining happiness in China and the United States, which ranked 14th.

  • Security

    • Security updates for Monday
    • Old Linux kernel security bug bites

      OK, hands up, who knows what High-Level Data Link Control (HDLC) is? It’s an archaic networking data framing protocol that’s used in modems, X.25, frame-relay, ISDN, and other now uncommon networking technologies. I know it because I used to work with them back in the day. You’ll get to know it now because a researcher discovered a security hole hidden within the Linux kernel driver that implements it.

    • Seven year-old Linux vulnerability now patched

      An old vulnerability was just discovered in the Linux kernel, potentially allowing hackers to gain privilege escalation, or cause a denial of service. The vulnerability was quickly fixed and there have been no signs of it in the wild, although that does not necessarily mean it went unnoticed.

    • OpenSSH 7.5 released

      OpenSSH 7.5 has just been released. It will be available from the mirrors listed at http://www.openssh.com/ shortly.

    • OpenSSH 7.5 Has Security Fixes, Removes OpenSSL 1.0 Support for Portable OpenSSH

      OpenSSH, the cross-platform and open-source 100% complete SSH 2.0 protocol implementation offering both SFTP server and client support was updated today to version 7.5.

      OpenSSH 7.5 comes three months after the release of OpenSSH 7.4 in late December 2016, and promises to be a maintenance update that addresses two important security issues, implements support for the “=-” syntax to make removing of methods from algorithm lists a lot easier, and fix numerous reported bugs.

    • Is Linux Mint a secure distribution?

      Linux Mint has been lambasted by some in the media for security problems over the last few years. But how accurate are such perceptions? Does Linux Mint really suffer from security problems or is it all much ado about nothing?

      A writer at DistroWatch wades into the controversy and examines some of the myths and misunderstandings about Linux Mint and security.

    • Linux Mint’s security record

      Some of the more common misunderstandings I have encountered recently have involved the Linux Mint distribution. Mint has been a popular project in recent years and, with many people using the distribution and talking about the project, there is bound to be some mis-communication. In particular, most of the rumours and misunderstandings I have encountered have revolved around Mint’s security practises and history. I would like to clear up a few of the more common rumours.

    • Mozilla Firefox is the First Pwn2own 2017 Victim to be Patched

      Some vendors respond to security issues faster than others. Last week, the 10th annual Pwn2own hacking challenge was hosted by Trend Micro’s Zero Day Initiative (ZDI), with multiple groups of researchers taking aim at web browsers, operating systems and virtualization technology.

      Mozilla’s Firefox web browser was successfully exploited on March 16, the second day of the Pwn2own event. Researchers from Chaitin Security Research Lab were the only group to attack Mozilla Firefox, and earned $30,000 for demonstrating a new zero-day exploit. The day the exploit was demonstrated, the only thing publicly revealed about the exploit is that it made use of an integer overflow flaw in combination with an uninitialized memory buffer in the Windows kernel.

  • Defence/Aggression

  • Transparency/Investigative Reporting

    • [Older] Leaked travel advice for spooks from the CIA

      AMONG the trove of American intelligence agency documents released by Wikileaks this week is one that instructs the country’s spies on protocols to follow while travelling abroad. Some of these are specific to the CIA’s needs. (“Talk to CCIE/Engineering about your planned TDY timeline,” the document begins, adding such tidbits as “Breeze through German Customs because you have your cover-for-action story down pat.”) But others are just good common-sense business-travel tips—for spies and corporate sales managers alike.

      The first universal advice in the document, which appears to be designed for spooks visiting an operations base in Frankfurt, is this: “If you are using a personal credit card, be sure to call your credit card company and notify them of your travel to Germany.” That seems like sound guidance.

  • Environment/Energy/Wildlife/Nature

    • Indonesia’s Peat Fires Still Blaze, But Not As Much As They Used To [iophk: "transmigration"]

      Indonesia is home to half the world’s tropical peat lands, and the catastrophe focused unprecedented attention on their importance. Despite being illegal, clearing peat land by fire remains widespread in Indonesia, as it is the cheapest way to clear land for agriculture and industry.

      [...]

      Subandi says he moved with his parents from the island of Java to Borneo in the early 1970s. Many of today’s peat land residents were moved there by the government [...]

    • Hunt Saboteurs Assaulted by Notorious Yorkshire Hunt

      Hunt saboteurs were assaulted by members of the Middleton Hunt at their meet in Uncleby, North Yorkshire on Saturday 18th March. Riders from the hunt stole a video camera and two body cams, hit sabs on the head with whips, attempted to ride them down and jumped off their horses to continue the attacks. One female saboteur has cracked ribs after being crushed between two horses.

  • Finance

    • US Apple users urge company to ‘do the right thing’ and pay NZ taxes

      He was commenting on revelations today in the Weekend Herald that Apple paid zero tax to the NZ Government in the past 10 years in a period when its sales in this country totalled $4.2 billion.

    • Goldman to move hundreds of staff from London pre-Brexit: Europe CEO [Ed: Getting rid of parasitic banks may be good for society, but when they leave because we have nothing to offer it's a loss]

      Goldman Sachs will begin moving hundreds of people out of London before any Brexit deal is struck as part of its contingency plans for Britain leaving the European Union, the Wall Street firm’s Europe CEO said.

      “We are going to start to execute on those contingency plans,” Richard Gnodde, chief executive officer of Goldman Sachs International, the European arm of the Wall Street bank, told CNBC on Tuesday.

      “For this first period, this is really the period as we put in place contingency plans, this is in the hundreds of people as opposed to anything greater than that,” he said.

      British Prime Minister Theresa May will trigger EU divorce proceedings on March 29, launching two years of negotiations that will shape the future of Britain and Europe.

    • Tory MPs are attacking the BBC for not telling the public fairytales about Brexit

      Donald Trump might have sunk to record levels of unpopularity across the Atlantic, but that hasn’t stopped 72 Brexiteer MPs from taking a leaf out of his playbook.

      The august Parliamentarians have come together to form a little corp of Trump-kin Mini-Mes by signing a letter lambasting the BBC for its coverage of Brexit.

      It claims, among other things, that the corporation’s “pessimistic and skewed reporting” risks undermining the project and damaging Britain in the process.

      “It particularly pains us to see how so much of the economic good news we’ve had since June has been skewed by BBC coverage which seems unable to break out of pre-referendum pessimism and accept new facts,” it opines.

  • AstroTurf/Lobbying/Politics

  • Censorship/Free Speech

    • Judge Decides Free Speech Is Still A Right; Dumps Prior Restraint Order Against Mattress Review Site

      A couple of weeks ago, a federal judge in Utah decided prior restraint was the best way to handle a recently-filed defamation suit against Honest Mattress Reviews by Purple Innovations, makers of the Purple Mattress.

      Purple’s lengthy filing contained numerous allegations of harm caused by Honest Mattress Reviews’ extended commentary on the white plastic powder covering every mattress Purple ships. It also alleged HMR was just a front for site owner Ryan Monahan’s brand management work with Purple’s competitor, Ghostbed. Rather than give HMR a chance to respond, the judge decided the review site could publish nothing further about Purple or the lawsuit. It wasn’t even allowed to refer to its previous rating of Purple’s mattress.

      Honest Mattress Review didn’t care much for this decision — one it had been given no chance to contest. It immediately posted an article about the case and offered to comply with the letter of the order, but perhaps not its spirit.

    • Censorship Is Never Acceptable

      Doing a sociolinguistics module last semester made me well aware of the power of language. We use the words we do to construct our own identities, and therefore language contributes to the shaping of society. This means that it can be used in harmful ways. Yet the beauty of language is in its variety and its flexibility, and therefore we should oppose any attempt to censor language.

      Alas, that is what Cardiff Metropolitan University has done. By banning the use of certain words, they are impinging on people’s right to use language in whichever way they choose. Freedom of expression is not just about being able to express any opinion, it is about being able to express that opinion in any way you choose. Cardiff Met are restricting this freedom and therefore, whilst well-meaning, this policy is actually a step away from a more liberal society.

    • Censorship allegation made as Bruce Township officials toss newspaper from hall

      Cory said the treasurer gave away copies of The Record to residents coming into her office for them to read articles relating to Brockmann’s arrest, which is being adjudicated through the 42-2 District Court in New Baltimore. Sobczak said that he never told Obrecht to personally distribute The Record, but stands by her right to do so.

    • Filing Bogus Lawsuits As Part Of A ‘Reputation Management’ Strategy Costs Firm $71,000

      Because abusing the DMCA process only goes so far, some reputation management entities have begun exploiting an inattentive legal system to push lawsuits past judges. In some cases, these suits have featured fake plaintiffs filing bogus libel lawsuits against fake defendants and using a fake affidavit to fraudulently obtain court orders requiring Google to delist URLs.

      Those engaged in this fraudulent behavior aren’t likely to get away with it for much longer. Paul Alan Levy and Eugene Volokh managed to track down the person behind one set of bogus lawsuits and get the presiding judge to take a closer look at the bogus documents he was being handed. Pissed Consumer has also been reporting on others using the same MO, and has headed to court to get these suits examined and tossed.

      The end of line for supposed reputation manager Richart Ruddie came at the hands of Volokh and Levy, with the judge granting discovery to the defendant after being apprised of the apparently fraudulent filings. Now that Richart Ruddie of Profile Defenders has been exposed, it looks as though he’s given up the fight. Levy reports Ruddie has settled anti-SLAPP claims brought against him and is paying restitution for his reputation mismanagement.

    • To censor or not to censor? YouTube’s double bind

      YouTube has found itself fighting battles on two fronts this week.

      Advertisers have launched a concerted attack against the video-streaming platform for its devil-may-care attitude to extremist content. They argue it is too hard to guarantee that advertising spend won’t end up going to the likes of far-right group Britain First, and have decided to boycott the platform en masse until YouTube can confirm changes.

      In response, YouTube’s parent company Google has apologised, and promised a raft of changes to appease the big spenders, from better categorisation of hate speech to simpler, more powerful controls for advertisers. It’s also promised to hire “significant numbers of people”, on top of the thousands who already do the work, to review questionable content.

      At the same time, in a very different community, YouTube creators are lambasting the site after the discovery that its “restricted mode”, a feature intended to let schools, parents and libraries filter out content not appropriate for children, also removed a vast amount of LGBT content. Some videos from pop duo Tegan and Sara, who are gay, were hidden from view, as were videos from bisexual YouTuber NeonFiona – but only those which talked about her sexuality.

    • Man Actually Arrested For Assault With A Deadly Tweet

      Late last year, we wrote about the crazy case in which journalist Kurt Eichenwald was suing an anonymous Twitter troll, claiming that the troll had sent Eichenwald a flashing gif designed to cause some small percentage of epileptics to have a seizure. Eichenwald claimed that it had worked and he’d had a seizure on the spot. As we noted at the time, we’re no fans of Eichenwald. In our opinion, he’s an absolutely terrible journalist with a fairly long history of really weird issues, and a strange obsession with massively overselling stories. He has me blocked on Twitter and has indicated that he’s no fan of us either.

      [...]

      If you can’t see those, it’s a series of Direct Messages from the “@jew_goldstein” account, saying things like that Eichenwald “deserves to have his liver pecked out by a pack of emus.” “I hope this sends him into a seizure.” “Spammed this at [Eichenwald] let’s see if he dies.” “I know he has epilepsy.”

      [...]

      If you can’t see it, that’s the flashing gif that @jew_goldstein sent Eichenwald and it says “You Deserve A Seizure For Your Posts.” This was the same one that Eichenwald’s wife found on Kurt’s computer when she found him having a seizure. The affidavit includes a screenshot she took of his computer screen showing that exact gif. Oh, and also stored in Rivello’s iCloud? A screenshot of an edited Wikipedia page of Eichenwald, claiming that he’d died the day after the gif was set. And also screen shots of an article about epilepsy seizure triggers, and an article about how the police were trying to track down the troll.

      So that’s a lot of pretty damning evidence. As lawyer Keith Lee notes, it’s something of a miracle he was tracked down. Even though he took some fairly basic precautions to cover his tracks (fake account, Tracfone phone connection), he didn’t take that many and didn’t seem to realize how many other ways there were to track him down.

    • A Cuban film about gay repression pulled from festival. Was it censorship?

      Cuban filmmaker Carlos Lechuga has pulled an acclaimed film, based on repression against gay writers in the early years of the Revolution, from an upcoming presentation in New York after festival organizers banned it from official competition and instead categorized the screening as a special presentation.

    • Goodbye craft and DIY inspo: Pinterest falls victim to China’s Great Firewall
    • Chinese Internet Censors Have Banned Pinterest
    • Pinterest Gets The Boot In China
    • Pinterest—the Largest Digital Design-Inspiration Board—Is Blocked in China
    • Power Rangers next to be banned in Malaysia?
    • Nazri to LPF: Don’t ban Power Rangers, slap on P13 rating instead
    • Nazri appeals for Power Rangers not to be banned (Updated)
    • Nazri hopes no ban on Power Rangers
    • You are not our appointed moral guardian, Nazri tells Censorship Board
    • Now Power Rangers in the sights of censors for minor lesbian scene
    • Australian Senator Attacks Game Censorship, Classification Board

      Australian Liberal Democratic Party Senator David Leyonhjelm has criticised the Government and the Australian Classification Board in a speech delivered to the Senate yesterday.

      The Senate crossbencher highlighted the recent case of Outlast II, which was refused classification late last week due to a rape sequence during one of the game’s cut-scenes.

    • Censorship and extremism worry content creator even as tech helps: Uday Shankar
    • STAR CEO Uday Shankar on courts, censorship and the Internet as a “progressive challenger”
    • Uday Shankar:Rising censorship,hooliganism killing creativity
    • Benegal committee recommends immediate abolishment of censorship: Rakeysh Omprakash Mehra
    • Shyam Benegal committee recommends abolishment of censorship: Rakeysh Omprakash Mehra
  • Privacy/Surveillance

    • Home Office admits it’s preparing to accept EU ruling on surveillance

      The Home Office has acknowledged that it is preparing to accept a landmark EU ruling from last year which restated that access to retained data must only be given in cases of serious crime, unlike the range of cases provided for under the new Investigatory Powers Act.

      When the Court of Justice of the European Union (CJEU) handed down its judgment last December, the Home Office said it was “disappointed with the judgment… and will be considering its potential implications”.

      Among those implications was the requirement for a far higher bar to access the range of data which the government had made it a legal requirement for ISPs to store on their users, including prohibiting the police and public bodies from authorising their own access to this data. Instead the CJEU ruling requires that access requests receive prior authorisation by independent courts or similar bodies.

    • Met police accused of using hackers to access protesters’ emails

      The police watchdog is investigating allegations that a secretive Scotland Yard unit used hackers to illegally access the private emails of hundreds of political campaigners and journalists.

      The allegations were made by an anonymous individual who says the unit worked with Indian police, who in turn used hackers to illegally obtain the passwords of the email accounts of the campaigners, and some reporters and press photographers.

    • NSA Director Backs Agency Surveillance Procedures

      Adm. Michael Rogers, head of the National Security Agency and U.S. Cyber Command, said that the section of the Foreign Intelligence Surveillance Act (FISA) that allows the NSA to collect information on foreign nationals is “instrumental” in providing U.S. political leaders with intelligence.

    • NSA officials deny mass surveillance during Utah Olympics

      Former CIA and National Security Agency Director Michael Hayden is denying allegations from a former Salt Lake City mayor that the NSA conducted a mass warrantless surveillance program during the 2002 Winter Olympics in Utah.

    • Fox News drops legal analyst Andrew Napolitano over GCHQ Donald Trump spying claims
    • Legal analyst Andrew Napolitano pulled from Fox News over claims GCHQ helped spy on Trump
    • Fox drops analyst who said UK might have helped spy on Trump
    • How do you feel about the government sharing our personal data?

      In October 2016, the digital economy bill began its progress through the UK parliament, including, as a Guardian editorial noted, a big shift: when it becomes law, the public’s personal data will be shared across departments without specified safeguards.

      For some, this is an essential move towards making the government more efficient. Others are concerned that government departments will be able to pool data collected without having put in place robust privacy protections, and fear that public sector bodies may end up following the “data free-for-all” that exists in the private sector.

    • Three UK’s mobile customers experience new data breach

      The mobile phone company Three has experienced a fresh data breach after some customers logging into their accounts were presented with the names, addresses, phone numbers and call histories of strangers.

      Three said it was investigating a technical issue with its systems and urged those affected to contact its customer service department.

      One customer, Andy Fidler, told the Guardian he was presented with the data usage and full call and text history of another named customer when he logged in on Sunday night. Another, Mark Thompson, said on Facebook he received a call from a complete stranger who said she had logged on to her account and was shown his details.

    • US forbids any device larger than cellphone on airlines from 13 countries

      The new edict was distributed in an email described as “confidential” from the US transportation safety administration (TSA) on Monday.

      The requirement forbids passengers from bringing laptops, iPads, Kindles and even cameras larger than mobile phones into the cabin. All such devices must be checked.

    • TSA will ban flyers from 13 countries from bringing laptops, tablets onboard

      US authorities will no longer allow travelers from 13 African and Middle Eastern countries to bring computers and laptops into airplane cabins anymore, two news agencies have reported.

    • U.S. to ban some airline passengers from carrying larger electronics [iophk: "makes them easier to steal or break into"]

      Passengers traveling on certain U.S.-bound foreign airline flights will have to check electronic devices larger than a cell phone once U.S. authorities formalize a new ban in response to an unspecified terrorism threat, U.S. officials told Reuters on Monday.

    • New mass warrant reverses concepts: demands all data about everybody who searched for a specific term on Google

      A Minnesota judge has issued a warrant to Google to provide the local police with all data relating to anybody who searched for specific keywords. This is an enormous expansion of the concept of mass surveillance, and turns all previous concepts of search and seizure on their heads: no longer is a suspect subject to search, but the entire population is dragnetted without restraint.

    • Adobe, Microsoft team up to share sales and marketing data [iophk: "both companies infamous for failed security"]
    • RAND Study Suggests 0-Day Exploits Should be Stockpiled
    • Disable TELNET! Cisco finds 0-Day in CIA Dump affecting over 300 Network Switch Models

      Cisco is warning of a new critical zero-day IOS / IOS XE vulnerability that affects more than 300 of its switch models.

      The company identified this highest level of vulnerability in its product while analyzing “Vault 7″ — a roughly 8,761 documents and files leaked by Wikileaks last week, claiming to detail hacking tools and tactics of the Central Intelligence Agency (CIA).

  • Civil Rights/Policing

    • Jailed ex-sergeant loses contempt case over device passwords

      “It’s quite possible he remains in jail for failing to comply with an order he can’t comply with,” he said.

    • After Trump, Amos Yee blames US judge in phone call from jail

      Singaporean blogger Amos Yee blamed a U.S. judge for his extended incarceration in a U.S. jail, this after blaming US President Donald Trump’s anti-immigration executive order.

      In a phone call from jail, Amos Yee spoke to Han Hui Hui in what appears to be instructions on what he expects the activist community in Singapore to do for his release.

      The video was sent to TISG by Han Hui Hui after her telephone call with Amos Yee. The video is also uploaded on Youtube with the Prickly Porcupine handle.

    • Dear recruiter, “open floor space” is not a job benefit

      The fundamental problem facing managers is that productivity is hard to measure. Faced with the inability to measure productivity, managers may feel compelled to measure time spent working. Never mind that it’s counter-productive: at least it gives management control, even if it’s control over the wrong thing.

    • Homeland Security Starts Banning Laptops & Tablets On Planes From The Middle East

      It’s been a very long time since I last flew somewhere without my laptop. I actually am more productive than usual on planes, and I tend to use flying time to just focus in and get a ton of stuff done. I can’t even begin to explain how ridiculously frustrating it would be to find out that I wouldn’t be allowed to bring a laptop onto a plane, and yet it appears that our new Homeland Security overlords have put in place new restrictions on flights to the US from certain countries in the middle east barring tablets and laptops from the cabin (apparently no American carriers are impacted — just foreign ones). Passengers are being told to check such things (which is odd, since normally you’re not supposed to check lithium ion batteries…). Flights from 13 countries are being hit with this, and Homeland Security won’t give any further explanation beyond the usual “national security.” And, just this morning, the UK announced that it would be doing the same thing.

      Homeland Security has been hinting that this is due to some sort of specific threat — so it sounds like there’s intelligence around a planned attack using such a device. Perhaps then the extra precaution is sensible. But, once again, this feels like a form of overkill security theater: inconveniencing basically everyone (to extreme levels) based on the slight possibility of a very small number of bad actors. There has to be a better way. Every time one of these new restrictions is put in place, it not only completely inconveniences people, but it shows people that if they somehow convince the scaredy cats at DHS of some new type of threat, they can inconvenience people even more. It’s almost as if each additional inconvenience is impacting things way more than an actual exploding laptop or whatever might.

  • Internet Policy/Net Neutrality

    • San Francisco Ponders The Largest Community Broadband Network Ever Built

      Despite being considered one of the technology capitals of the country, San Francisco and the Bay Area continue to suffer from a lack of broadband options — just like the rest of us sorry sods. If they’re lucky, most locals there still only have the option of one of two large ISPs: AT&T and Comcast. Both companies have a long, proud history of fighting competition tooth and nail, often by quite literally writing shitty state telecom law that ensures the status quo remains intact. Attempts to break through this logjam and bring faster, better broadband service to the city have seen decidedly mixed results.

      Like most areas, ultra-fast next-generation broadband in particular is notably lacking. Some estimates suggest that just 2.6% of San Francisco residents have access to gigabit broadband service. Sonic CEO Dane Jasper, whose company is also busy deploying gigabit services to the Bay Area, tells me he believes those figures are stale and gigabit penetration rates in the city are closer to 17%. And while Google Fiber had tinkered with the idea of bringing fiber to the city, the company’s pivot to wireless has left that added avenue of competition up in the air.

    • Despite Gigabit Hype, Comcast Is Facing Less Broadband Competition Than Ever

      Despite the rise of heavily-hyped-but-highly-scattered gigabit deployments, the broadband industry is actually seeing less competition than ever before across huge swaths of the country. Once upon a time, broadband “competition” consisted of an equally matched telco going head to head with the incumbent cable provider (if you were lucky). These days, most phone companies lack the finances or competitive motivation to improve lagging DSL speeds across their footprints — speeds that don’t even meet the FCC’s base definition of broadband (25 mbps).

      That’s resulting in a growing monopoly for the nation’s cable broadband providers, who have quietly been absolutely butchering phone companies over the last several years. Just take a look at the latest data from Leichtman Research, which notes that while cable broadband providers collectively added 2.7 million net additional high-speed Internet subscribers last year, phone companies collectively shed roughly 600,000 broadband users.

  • DRM

    • DRM in HTML5 takes its next step toward standardization

      Ever since W3C decided to start working on a DRM proposal, there have been complaints from those who oppose DRM on principle. The work has continued regardless, with W3C director and HTML inventor Tim Berners-Lee arguing that—given that DRM is already extant and, at least for video, unlikely to disappear any time soon—it’s better for DRM-protected content to be a part of the Web ecosystem than to be separate from it.

  • Intellectual Monopolies

    • US must bolster fight with China over intellectual property rights [Ed: Person from the "IP" industry wants more "IP" action]

      But promoting innovation is only part of the Founding Fathers’ mandate — without enforcing those property rights, American competitiveness is at risk. A new administration with Lighthizer at the helm of U.S. trade policy, should help solidify recent gains with China and reinforce efforts to overhaul China’s IP system.

    • Intellectual property rights in a virtual world [Ed: "IP" maximalists ('owning' concepts) don't get enough 'ownership' in the real world, go after virtual world too ]

      This article will explore the key legal issues relating to intellectual property (IP) rights, traditionally only used in the real world, and their role in the virtual or augmented world. The basic legal position on including virtual or augmented versions of IP in virtual reality (VR) or augmented reality (AR) experiences is straightforward; if the creator of VR or AR content does not hold the requisite IP rights to include certain material in its content, it should seek permission from the owner of such rights.

    • A Look At Optimal Patent Regimes For Canada

      Blit argues that Canada’s patent regime has not contributed to domestic innovation, and therefore has not offset the potential welfare losses which strong IP rights may bring. It is countries which have the highest innovation intensity, Blit says, which advocate for stringent IP protections beyond the level that would maximise global welfare.

    • Traditional Knowledge: beware of patent protection

      Protection of Traditional Knowledge (TK) is a complex legal issue, owing to its dynamic nature, lack of definition and the difficulty in establishing ownership and the
      geographical origin of TK, as well as the absence of an appropriate scheme for its protection. Indigenous communities and traditional knowledge practitioners all over the world are greatly concerned about the increased biopiracy and usurpation by commercial entities. It is in this context that the Council of Scientific and Industrial Research (CSIR) in India formulated the Traditional Knowledge Digital Library (TKDL), which is an endeavor to preempt the grant of patents on India’s TK. TKDL contains approximately 2,08,000 formulations based on the traditional healing systems, such as Ayurveda, Unani, Siddha and Yoga.

      TK Digital Libraries are the best defensive mechanism to prevent the patenting of TK already written down in ancient texts and manuscripts, although it still leaves scope for private appropriation of TK by making cosmetic improvements on it. India has signed access agreements with the European Patent Office and US Patents and Trademark Office, on the condition that secrecy be maintained and the database may be used as prior art for search and examination only. ‘Prior art’ is meant to encompass everything that has been published, presented or otherwise disclosed to the public as of the date of the patent and it includes documents in foreign languages disclosed in any format in any country. However, it is common sense that secrecy cannot be maintained on something that is classified as ‘prior art’.

    • UN Development Programme Calls For Reform Of IP And Investor Protection Regimes

      A United Nations Development Programme report released today places importance on transforming global institutions, and establishing fair trade and investment rules. The report calls for global reform of the intellectual property rights regime and investor protection regime. In addition, the report ranks countries on their human development level, putting Norway first followed by Australia and Switzerland.

    • Copyrights

      • Industry-Hated Game Emulators Save Two Video Games For Posterity

        For far too many years, the video game industry struggled to assert its place as a true artform, one deserving of the kind of respect granted to movies, music, television, and literature. This has been a source of frustration to those of us who can recognize the powerful storytelling device that video games represent, as well as the way modern games contribute to art and social commentary. But by its nature as a relatively new medium, games have also struggled to preserve the industry’s history in the way more widely and permanently disseminated artforms have accomplished. And that’s where the gaming industry has taken a turn against its own artistic interests, often demonizing methods for preserving gaming history over intellectual property concerns. Emulators are the chief method at hand, where games that are ancient by gaming standards can be digitized and preserved for posterity, save for the threat of legal action over copyright infringement and the industry’s attempts to stave off these useful tools.

        Like so many issues in the intellectual property world, it’s not hard to understand the gaming industry’s consternation. There’s no doubt that many people use emulators simply to play games from old consoles and cabinets rather than pay for physical copies. Still, there’s also no doubt that these same emulators work to preserve the artistic output in the gaming realm. This was most recently evidenced in two games that might never have seen the light of day again, save for emulators.

      • Yes We Scan: Why Concordia Should Not Shelve Its Book Scanner

        The copyright mistake at Concordia – a poetry centre scanned several books and posted them on the Internet without permission – has attracted considerable attention in the press and social media. Kate Taylor wrote a Globe and Mail column placing much of the blame at the feet of fair dealing, while I responded with a post yesterday that noted that no one claimed that the posting of the full-text books was permissible and that Concordia was an ill-advised target for fair dealing criticism given that it has a copyright collective licence with Copibec that compensates for copying on campus.

      • Kim Dotcom’s Historical Speeding Conviction Still a Deportation Danger

        Somewhat bizarrely, however, more than two years later and the case is still ongoing. According to the NZHerald, the case is now in its 29th month and is set to be the “longest, most drawn out investigation of its type.”

      • Getty Images Slams Google For Seeking Copyright Safe Harbor

        The notion that online platforms should not be held responsible for the infringing acts of their users is something entrenched in law in many regions, including the United States and Europe.

        In Australia, however, a perceived drafting error in the implementation of the Australia – US Free Trade Agreement (AUSFTA) means that safe harbor provisions only apply to commercial Internet service providers.

      • ‘Free TV’ Android box dealers lose court appeal to lift sales ban

        Cable giants won another victory today in the legal battle over fully loaded Android TV boxes. The Federal Court of Appeal in Montreal quickly dismissed an appeal of an injunction banning defendants from selling the controversial devices.

        Cable companies and content producers Bell, Rogers and Quebec’s Vidéotron won the temporary injunction in June after launching a legal case to stamp out the Android box business.

      • The Delhi University photocopy case comes to an abrupt end after publishers withdraw lawsuit

        In a rather bizarre end to the long running copyright infringement lawsuit filed against Delhi University (DU) and a photocopy shop, the three publishers: Oxford University Press, Cambridge University Press and Francis & Taylor who filed the lawsuit have announced that they are withdrawing the lawsuit. The lawsuit was filed by the publishers in 2012 to restrain DU and the photocopy shop from reproducing portions of copyright protected books for the purpose of creating course packs for students of DU. This had been the practice in DU and most Indian universities for several decades and was never challenged till the filing of this lawsuit. As a result, the lawsuit provoked protests and rallies by students and also rallies and a legal intervention by a society of academics and students who supported the university’s position that the educational use was covered by an exception in the Copyright Act, 1957.

      • Marrakesh Treaty For Blind Readers Jeopardised By EU Publishing Industry Lobbying, Group Says

        The treaty adopted almost four years ago in Marrakesh allowing for exceptions to copyright for the benefit of visually impaired people was hailed as a victory for human rights over private rights. However, as the European Union is preparing to ratify the treaty, according to a civil society group report, intense lobbying by the publishing industry is influencing the debate and might diminish the hard-gained ground in the treaty on copyright exceptions. The World Blind Union, meanwhile, said it finds the report “revealing and shocking”.

      • Rakeysh Omprakash Mehra – Needs More Theatre To Tackle Piracy [Ed: Millionaires and billionaires trampling all over blind people to ensure they stay rich and powerful (control over information)]

        Rakeysh Omprakash Mehra at Ficci Frames 2017, expressed that unless we build more theatres, piracy will be only way to take content out.

        Established in 1927, FICCI is the largest and oldest apex business organisation in India. Its history is closely interwoven with India’s struggle for independence, its industrialization, and its emergence as one of the most rapidly growing global economies, kick started the FICCI Frames 2017 today.

03.20.17

Links 20/3/2017: Linux 4.11 RC3, OpenSSH 7.5 Released

Posted in News Roundup at 6:56 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Linux, not Microsoft, the real winner of Windows Server on ARM

    Cutting to the heart of it, it doesn’t actually matter if Microsoft releases Windows Server for ARM. Windows isn’t the future and even Microsoft knows it. The upcoming availability of SQL server on Linux is all the proof we need that the game is over and, in the data centre at least, Microsoft didn’t win.

    Quite frankly, there’s nothing wrong with that. Legacy x86 Windows applications have been a millstone around the neck of the entire industry for ages now and its long past time they were relegated to a niche and left to quietly slip away into the night. What’s interesting here isn’t that Microsoft managed to take its existing code base, strip out some of the cruft and compile it on ARM. What’s interesting is what Microsoft’s experiment unlocks outside the Windows ecosystem.

  • Desktop

    • Microsoft’s latest Windows 10 ad annoys Chrome users with taskbar pop-ups

      Microsoft’s aggressive advertising push inside Windows 10 is going beyond pop-ups for Microsoft Edge.

      Myce recently spotted yet another pop-up ad on the taskbar in Windows 10. This time around Microsoft was advertising its extension for Chrome dubbed the Personal Shopping Assistant (Beta). The extension is a Microsoft Garage project that lets you compare prices across shopping sites.

      Prior to the Chrome extension pop-up, Microsoft was advertising its rewards program for Microsoft Edge, which we spotted in early November. The earlier ad appeared to be targeted at people who didn’t use Edge that frequently.

  • Server

    • Docker to Donate its Container Runtime, containerd, to the Cloud Native Computing Foundation

      Docker plans to donate its containerd container runtime to the Cloud Native Computing Foundation, a nonprofit organization dedicated to organizing a set of open source container-based cloud-native technologies.

      In December, Docker released as open source the code for containerd, which provides a runtime environment for Docker containers. By open sourcing this component of the Docker stack, the company wanted to assure users, partners, and other actors in the container ecosystem that the core container component would remain stable, and that the community would have a say in its advancement.

    • Docker at 4: The Container Revolution Continues

      The open-source Docker container project held events around the globe last week as it celebrated its fourth birthday. Docker is more popular than ever as the standard bearer for the container microservices DevOps movement, though Docker Inc. as a company now faces more challenges than ever before as well.

      Three years ago, I wrote about the first anniversary of Docker, predicting significant growth in 2014. As it turned out, I was right about the growth, though I was wrong about Docker Inc. Back in 2014, I had predicted that Docker Inc. would likely be acquired, but to date that hasn’t happened—though there has been no shortage of speculation over the last three years.

      Docker Inc. and the open-source container ecosystem that Docker helped create have evolved significantly since 2014, and over the course of the project’s four-year existence. This past year has arguably been the most significant yet for Docker Inc., both as a business and an open-source project.

  • Kernel Space

    • Linux 4.10.4

      I’m announcing the release of the 4.10.4 kernel.

      All users of the 4.10 kernel series must upgrade.

      The updated 4.10.y git tree can be found at:
      git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.10.y
      and can be browsed at the normal kernel.org git web browser:

      http://git.kernel.org/?p=linux/kernel/git/stable/linux-st…

    • Linux 4.9.16
    • Linux 4.4.55
    • Linux Kernel 4.4.55 LTS Arrives with Various MIPS Changes, Updated USB Drivers
    • Linux Kernel 4.10.4 Released with MIPS Improvements, Updated USB Drivers

      The fourth maintenance update to the Linux 4.10 kernel series arrived this weekend with various improvements to some of the supported filesystems and architectures, as well as updated drivers.

    • Linux Kernel 4.9.16 LTS Has Various MIPS and PowerPC Changes, Updated Drivers

      Immediately after announcing the release of the Linux 4.10.4 kernel, Greg Kroah-Hartman informed the community about the availability of the sixteenth maintenance update to the long-term supported Linux 4.9 kernel series.

    • Standards for ARM computers and Linaro

      It looks like someone else figured it out, ergo Linaro. Unfortunately, they do not seem to be eager to create a real platform, but rather slap a veneer of something OpenFirmware-like on top of exising systems. Also, they are buddying with Ubuntu. So, a half-hearted effort and a top-down deal. But it’s a step in the right direction.

    • Linux 4.11-rc3

      Another week, another rc.

      As is our usual pattern after the merge window, rc3 is larger than
      rc2, but this is hopefully the point where things start to shrink and
      calm down. We had a late typo in rc2 that affected arm and powerpc
      (the prep code for the 5-level page tables), and hopefully there are
      no similar brown-paper-bugs now in rc3.

      On the whole rc3 looks pretty normal, with two thirds being driver
      updates (late qla2xxx scsi driver updates stand out, but ethernet
      drivers for broadcom and cavium aren’t that far behind, and there are
      updates for gpu, md, cpufreq, x86 platform drivers etc).

      Outside of drivers, the rest is a mix of arch updates (parisc,
      powerpc, x86), filesystems (afs, nfs, xfs) and “misc” (mainly core
      kernel and general networking updates).

      Shortlog appended for those who want to see some overview of the
      details, but what we really want is testing. Please.

      Linus

    • Linus Torvalds Announces the Third Release Candidate of the Linux 4.11 Kernel

      It’s still Sunday in the US, and that means Linus Torvalds has prepared yet another Release Candidate (RC) milestone for the upcoming Linux 4.11 kernel for GNU/Linux distros.

      That’s right, Linux kernel 4.11 Release Candidate 3 is now ready for public testing, and, according to Linus Torvalds, it appears to be a fairly normal patch that’s just a bit larger than last week’s Release Candidate because of a typo that affected the PowerPC (PPC) and ARM architectures.

    • Linux 4.11-rc3 Released
    • Raspberry Pi VC4 HDMI Audio Support Coming To Linux 4.12

      The ongoing work for HDMI audio support with the VC4 DRM driver is being wrapped up and will be working in the Linux 4.12 kernel.

      HDMI audio will work in conjunction with the open-source VC4 driver when the Linux 4.12 kernel rolls out. This was among the changes queued today in drm-misc-next and in turn called for landing into DRM-Next, which will be merged next month into the Linux 4.12 mainline code-base.

    • Graphics Stack

    • Benchmarks

      • Benchmarks Of Many ARM Boards From The Raspberry Pi To NVIDIA Jetson TX2

        For some weekend benchmarking fun, I compared the Jetson TX2 that NVIDIA released this weekend with their ARM 64-bit “Denver 2″ CPU cores paired with four Cortex-A57 cores to various other ARM single board computers I have access to. This is looking at the CPU performance in different benchmarks ranging from cheap ~$10 ARM SBCs to the Raspberry Pi to the Jetson TX1 and Jetson TX2.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • Plasma Team Discusses Web-browser integration, Bundled Apps and new Features

        In February, KDE’s Plasma team came together in for their yearly in-person meeting. The meeting was kindly hosted by von Affenfels GmbH, a webdesign agency in Stuttgart, Germany. The team discussed a wide variety of topics, such as design, features new and old, bugs and sore points in the current implementation, app distribution, also project management, internal and outward-facing communication and Wayland.

      • KDE Plasma Planning Browser Integration, Possible Touchpad Gestures

        Key developers of KDE’s Plasma team met last month in Stuttgart. More details on this Plasma developer meeting have now come to light.

        KDE Plasma developers continue eyeing Flatpak, Snap, and AppImage for possible next-generation packaging solutions. The developers also discussed better browser integration within Plasma to have native notifications and download progress, better multimedia handling, and more. Another new feature discussed was touchpad gestures support to control the window manager.

    • GNOME Desktop/GTK

      • WebKitGTK+ 2.16

        The Igalia WebKit team is happy to announce WebKitGTK+ 2.16. This new release drastically improves the memory consumption, adds new API as required by applications, includes new debugging tools, and of course fixes a lot of bugs.

      • 6 Features You’ll Love in GNOME 3.24

        We look at 6 of the best new GNOME 3.24 features, including the ‘night light’ blue light filter, a pair of ace new apps, and integrated weather forecasts.

      • Builder 3.24

        I’m excited to announce that Builder 3.24 is here and ready for you to play with!

        It should look familiar because most of the work this cycle was underneath the hood. I’m pretty happy with all the stabilization efforts from the past couple of weeks. I’d like to give a special thanks to everyone who took the time to file bugs, some of whom also filed patches.

      • Gnome Encfs Manager – An Ease way to Create a Encrypted Directory in Linux

        Gnome Encfs Manager (short name is GEncfsM) is a tool to manage EncFS filesystems in Linux whihc is best alternative for Cryptkeeper and has lots of unique features. It’s very useful when you use EncFS with cloud sync / storage services such as Dropbox, etc.,

      • Blender Constraints

        So what are they and how are they useful in the context of a GNOME designer? We make quite a few prototypes and one of the things to decide whether a behavior is clear and comprehensible is motion design, particularly transitions. And while we do not use tools directly linked to out stack, it helps to build simple rigs to lower the manual labout required to make sometimes similar motion designs and limit the number of mistakes that can be done. Even simple animations usually consist of many keyframes (defined, non-computed states in time). Defining relationships between objects and createing setups, “rigs”, is a way to create of a sort of working model of the object we are trying to mock up.

  • Distributions

  • Devices/Embedded

    • Raspberry Pi Surges To 3rd Best Selling Computer Of All Time Surpassing The Commodore 64

      In many regards, the Raspberry Pi family of computers is quite modest, which is of course by design. For a relatively small price, you can pick up a fully-functional RPi single board computer that can be used for many purposes, whether it is for learning, creating homemade bots, or cobbling together your own purpose-built media player or server solution. Given RPi’s flexibility, it should come as no surprise that the open source Linux-power min PC has proven to be such a popular computing platform for scores of consumers, businesses and educational institutions.

    • How to secure your Raspberry Pi

      The Raspberry Pi and many other inexpensive computer boards like it have become part of the “Internet of Things” or IoT revolution. Internet-connected computing devices have emerged beyond traditional servers, desktops, laptops, and mobile devices. Now your TV, DVR (digital video recorder), thermostat, refrigerator, Internet radio, Raspberry Pi, and other devices are on the network too.

      IoT has been huge for experimentation and innovation. But as projects get rushed to completion, there have been severe consequences for ignoring security. And this applies both to commercial products and hobby projects. I’ll talk about the Raspberry Pi specifically in this article, so this post is oriented more toward do-it-yourself projects.

    • Pico-ITX board gives you Rockchip RK3288 and optional wireless

      Aaeon’s RICO-3288 Pico-ITX SBC runs Android 6.0 on a quad Cortex-A17 RK3288, and offers up to 4Kx2K resolution and optional wireless, CAN, and -20 to 70°C.

      The RICO-3288 is the first Aaeon product we can recall featuring a Rockchip SoC, and one of the relatively few Rockchip RK3288 based SBCs we’ve seen outside of Firefly’s open-spec Firefly boards, such as the sandwich-style Firefly-RK3288 Reload. The other main exception is the recent, maker oriented Tinker Board from Aaeon’s owner, Asus.

    • Jetson TX2 module gains third party carrier boards

      Connect Tech released three carriers for the Jetson TX2 and TX1: Cogswell with GigE Vision, Spacely for cam-intensive Pixhawk drones, and a $99 Sprocket.

      Last April, Connect Tech announced an Astro carrier board for Nvidia’s Tegra X1-driven Jetson TX1 COM, and then followed up with the Orbitty and Elroy boards in May. Now, following Nvidia’s release of the Jetson TX2 earlier this month, Connect Tech has launched three new carriers that support both the TX2 and TX1 modules.

    • The Intel Edison: Linux Maker Machine in a Matchbox

      The console is a great place to start to see if the Edison is up and running. Connect the micro USB labeled console on the Base Block breakout to your desktop Linux machine and check dmesg to see something like the below to discover where the console is. The Base Block has power, TX, and RX LEDs on board so you can get some feedback from the hardware if things are working. If things go as they should, you will be presented with a root console to the Edison. There is no default password, you should just get right onto the console.

    • Phones

Free Software/Open Source

  • 10 BEST OPEN SOURCE SOFTWARE IN 2017

    When we talk about open source software, we are talking about software program which has been created with the idea of being shared. Open source software is developed, tested, and improved through public collaboration. The main objective is that in future the collaboration is maintained i.e. the user is able to make changes to the program and tailor it to suit their own needs.

    In the past years, the world of open source software has changed tremendously. No longer are the old programs used and each year, you will find a new innovation in the field. On year, you will find a particular program leading the market, while the other year, you will find the same program in the pits of obsolescence. That’s how innovations move through this field.

  • Open source seen as door to digital innovation by decision-makers in Malaysia, survey finds

    According to a new Forrester Consulting survey in the Asia Pacific region, 76 percent of survey respondents in Malaysia view open source as computing as a door to business innovation, cost-saving and the forming of deeper customer experience.

    Damien Wong (pic below), vice president and general manager, ASEAN, Red Hat, said, “It is encouraging to see IT decision makers in Malaysia thinking beyond the traditional approaches and taking a cue from the companies championing digital innovation through open source.”

  • Software And Choice

    Some projects, whether intentionally (e.g., LLVM) or by accident (e.g., Linux) will grow beyond this scope (in those cases, vastly so). The question then becomes murkier. The two projects I’ve chosen for example here are both, I would say, “fork-proof” – LLVM has a very lenient code acceptance policy (see: all of the ghc-specific portions of the backend), while Linux has an extremely powerful module interface against which things can be built that do not merit inclusion into mainline. A user could fork LLVM, or Linux, but their version is extremely unlikely to become authoritative. Even if one does become authoritative, or close to it, that decision may also revert if the new fork does not live up to the quality standards of the old (I’m thinking about ffmpeg/libav here).

  • Giessen Public Works using open source for energy supply

    The German City of Giessen is using open source software for IT Service Management (ITSM) functions in its municipal energy supply. The most visible part of the setup is openITCOCKPIT, a web-based front-end for the Nagios and Naemon packages for IT infrastructure monitoring.

  • OpenSSH 7.5 released

    OpenSSH 7.5 has just been released. It will be available from the
    mirrors listed at http://www.openssh.com/ shortly.

    OpenSSH is a 100% complete SSH protocol 2.0 implementation and
    includes sftp client and server support. OpenSSH also includes
    transitional support for the legacy SSH 1.3 and 1.5 protocols
    that may be enabled at compile-time.

  • OpenSSH 7.5 Released, Legacy Crypto Functions Still Heading For Retirement
  • IBM unveils Blockchain as a Service based on open source Hyperledger Fabric technology

    IBM unveiled its “Blockchain as a Service” today, which is based on the open source Hyperledger Fabric, version 1.0 from The Linux Foundation.

    IBM Blockchain is a public cloud service that customers can use to build secure blockchain networks. The company introduced the idea last year, but this is the first ready-for-primetime implementation built using that technology.

  • IBM launches blockchain tool on Linux Hyperledger Fabric

    IBM unveiled a cloud-based Blockchain offering on Monday along with governance and developer tools.

    Calling it the first enterprise-ready blockchain service, the company said that the technology makes it possible for developers to build and host production of blockchain networks on the IBM Cloud in a secure environment.

  • IBM launches enterprise-ready blockchain service

    The U.S. technology company said on Monday its new product called IBM Blockchain was the first service for developers to build enterprise-grade technology using Hyperledger Fabric, the first code set to be released by the open source group.

  • IBM Launches Enterprise-Ready Blockchain Services for Hyperledger Fabric v 1.0 on IBM Cloud

    IBM today announced the new release of IBM Blockchain, the first enterprise-ready blockchain service based on the Linux Foundation’s Hyperledger Fabric version 1.0. The service enables developers to quickly build and host security-rich production blockchain networks on the IBM Cloud, and is underpinned by IBM LinuxONE, the industry’s most secure Linux server.

  • How One Service Provider Developed On Demand Network Services with SDN and NFV

    IT virtualization has radically changed the face of compute, storage, and network services in data centers and beyond. In response, Colt — a network and communications service provider — back in 2015 began developing a program that has transformed the way the company offers network services to customers, says Javier Benitez, Senior Network Architect, Colt Technology Services, who will be speaking at Open Networking Summit.

    According to Benitez, the aim was to move away from a traditional consumption model to one where network services are consumed through an on-demand model based on software defined networking (SDN) and network function virtualization (NFV) technologies. Here, Benitez explains more about Colt’s SDN and NFV solutions, focusing on current development efforts and future plans.

  • Open Source at the Heart of IoT Revolution

    Internet of Things (IoT) can be transformative for businesses, by opening up novel ways to connect with customers, creating new avenues and converting data into insights. Several organizations have already moved beyond the experimental phase to actual deployments of IoT. Government, healthcare, retail, transportation and many more industries have come up with innovative applications for improved customer experience and competitive differentiation.

    However, considering its vast scope, IoT has currently not achieved its full potential. Enterprises are grappling with multiple issues. Nevertheless, IoT enthusiasts believe that open source plays a key role in ensuring that the technology moves past the hype cycle to become a disruptive trend for enterprises.

  • Events

  • Web Browsers

    • Mozilla

      • There’s Now an Arc Theme for Thunderbird

        If you use both the Arc GTK theme and Mozilla Thunderbird as your e-mail app, we’ve found a theme you’ll want to use.

      • WebVR and AFrame Bringing VR to Web at the Virtuleap Hackathon

        Imagine an online application that lets city planners walk through three-dimensional virtual versions of proposed projects, or a math program that helps students understand complex concepts by visualizing them in three dimensions. Both CityViewR & MathworldVR are amazing applications experiences that bring to life the possibilities of virtual reality (VR).

  • SaaS/Back End

    • Community leadership charts course for OpenStack

      Last week, about 40 people from the OpenStack Technical Committee, User Committee, Board of Directors and Foundation Staff convened in Boston to talk about the future of OpenStack. We candidly discussed the challenges we face as a community, but also why our mission to deliver open infrastructure is more important than ever.

      To kick things off, Mark Collier opened with a state of the union address, talking about the strength of our community, the number of users running OpenStack at scale across various industries and the progress we’ve made working across adjacent open source projects. OpenStack is one of the largest, global open source communities. In 2016 alone, we had 3,479 unique developers from dozens of countries and hundreds of organizations contribute to OpenStack, and the number of merged changes increased 26 percent year-over-year. The size and diversity of the OpenStack community is a huge strength, but like any large organization, scale presents its own set of challenges.

    • OpenStack® Board Elects Huawei as Platinum Member and H3C as Gold Member of the Foundation
    • Community leadership planning, new board members, and more OpenStack news
  • Education

    • Open project collaboration from elementary to university classrooms

      In this article, we share our experiences: two examples of fostering creative collaboration among students from elementary school to higher education. Aria F. Chernik, an open educator and director of OSPRI (Open Source Pedagogy, Research + Innovation) at Duke University, introduces an open-by-design, learning innovation project at Duke. Anna Engelke, a tinkering and technology educator, speaks about using open pedagogy to design a Scratch-based maker club at a local elementary school.

  • BSD

    • MIT-Stanford project uses LLVM to break big data bottlenecks

      The more cores you can use, the better — especially with big data. But the easier a big data framework is to work with, the harder it is for the resulting pipelines, such as TensorFlow plus Apache Spark, to run in parallel as a single unit.

      Researchers from MIT CSAIL, the home of envelope-pushing big data acceleration projects like Milk and Tapir, have paired with the Stanford InfoLab to create a possible solution. Written in the Rust language, Weld generates code for an entire data analysis workflow that runs efficiently in parallel using the LLVM compiler framework.

  • Public Services/Government

    • EC study recommends that policies emphasise open source

      Europe’s public administrations should support the use of open source in all sectors of the economy and in public administration, a study for the European Commission’s Directorate-General for Communications Networks, Content and Technology recommends. The report by German and French ICT researchers, concludes that “open source is important for the future of the European software industry.”

  • Licensing/Legal

    • Why viral licensing is a ghost

      A brief analysing of the distinction between weak and strong copyleft (sometimes called viral licensing – a pejorative name for copyleft licences) based on the European Directive on the legal protection of computer programs.

  • Programming/Development

    • Rcpp 0.12.10: Some small fixes

      The tenth update in the 0.12.* series of Rcpp just made it to the main CRAN repository providing GNU R with by now over 10,000 packages. Windows binaries for Rcpp, as well as updated Debian packages will follow in due course. This 0.12.10 release follows the 0.12.0 release from late July, the 0.12.1 release in September, the 0.12.2 release in November, the 0.12.3 release in January, the 0.12.4 release in March, the 0.12.5 release in May, the 0.12.6 release in July, the 0.12.7 release in September, the 0.12.8 release in November, and the 0.12.9 release in January — making it the fourteenth release at the steady and predictable bi-montly release frequency.

Leftovers

  • Science

    • Ancient Giant Penguin Unearthed in New Zealand

      The fossil was found by amateur fossil collector Leigh Love in the Waipara Greensand at Waipara River, Canterbury Province, New Zealand.

      It was analyzed by a team of paleontologists from Canterbury Museum in Christchurch, New Zealand, and the Senckenberg Research Institute in Frankfurt, Germany.

      According to the researchers, the new find is one of the oldest penguin fossils in the world.

      “Together with the fossils of the recently discovered penguin-like bird Waimanu manneringi, the new specimens are the earliest published penguin remains,” they said.

  • Health/Nutrition

    • Record numbers of EU nurses quit NHS

      The number of EU nationals registering as nurses in England has dropped by 92% since the Brexit referendum in June, and a record number are quitting the NHS, it can be revealed.

  • Security

    • Hire a DDoS service to take down your enemies

      According to Neustar, almost three quarters of all global brands, organizations and companies have been victims of a DDoS attack. And more than 3,700 DDoS attacks occur each day.

    • Apollo Lake 3.5-incher doubles down on security

      Kontron’s Linux-friendly, Intel Apollo Lake based “3.5″-SBC-APL” SBC features triple display support, a TPM 2.0 chip, and optional security services.

    • Leading Linux distros dawdle as kernel flaw persists

      A local privilege esclation flaw has been fixed in the Linux kernel, but several upstream distributions have yet to release updates. Administrators should plan on mitigating the vulnerability on Linux servers and workstations themselves and monitor the distributions for their update plans.

    • More than 300 Cisco switch models vulnerable to CIA hack

      A cache of CIA documents was dropped on the internet two weeks ago via WikiLeaks. It was a huge volume of data, some of which detailed CIA tools for breaking into smartphones and even smart TVs. Now, Cisco has said its examination of the documents points to a gaping security hole in more than 300 models of its switches. There’s no patch for this critical vulnerability, but it’s possible to mitigate the risk with some settings changes.

      Cisco’s security arm sent out an advisory on Friday alerting customers that the IOS and IOS XE Software Cluster were vulnerable to hacks based on the leaked documents. The 318 affected switch models are mostly in the Catalyst series, but there are also some embedded systems and IE-series switches on the list. These are enterprise devices that cost a few thousand dollars at least. So, nothing in your house is affected by this particular attack.

    • Assange chastises companies who haven’t responded to CIA vulnerability offers

      Wikileaks head Julian Assange slammed companies not taking the site up on the sites offer to share security flaws the CIA had exploited in their products.

      In a screen-shot statement tweeted on Saturday, Wikileaks noted that “Organizations such as Mozilla” had responded to the site’s emails offering unreleased security vulnerabilities from leaked CIA files. “Google and other companies” had not.

      “Most of these lagging companies have conflicts of interest due to their classified work with US government agencies. In practice such associations limit industry staff with US security clearances from fixing holes based on leaked information from the CIA. Should such companies choose to not secure their users against CIA or NSA attacks users may prefer organizations such as Mozilla or European companies that prioritize their users over government contracts,” the statement read.

      Wikileaks recently published a trove of files leaked from the CIA, including descriptions of hacking techniques. The site made an effort to redact source code showing how to actually accomplish the techniques, although enough code slipped through the cracks for researchers to reverse engineer at least one of the security flaws.

    • Gentoo: 201703-02 Adobe Flash Player: Multiple vulnerabilities
  • Defence/Aggression

  • Transparency/Investigative Reporting

    • As CIA Director, George Bush waffled on promise to not destroy records of Agency’s illegal activities

      Declassified records recently unearthed in CREST show the CIA waffled on a promise to obey the law in destroying records of Agency’s illegal activities and wrongdoing

      In 1976, Congresswoman Bella Abzug wrote to CIA Director George H.W. Bush about the existing moratorium on the destruction of CIA files. As the Chairwoman of the Subcommittee on Government Information and Individual Rights, which had jurisdiction over government information policy including FOIA and the Privacy Act, she wanted the moratorium extended – specifically, she wanted to ensure that Congress had time to enact legislation in response to the Church, Pike, and Rockefeller hearings and the resulting reports.

    • The Assange case – coming to a close, or not?

      In the Assange case, Swedish prosecutors seem to be running out of excuses for dragging their feet.

      [..]

      And this goes all the way back to the Prosecutors Special Unit for »Advancement« of Sex Crimes re-opening this case after it had been closed by the regular branch of the Prosecutors’ Office.

  • Environment/Energy/Wildlife/Nature

    • As Trump Slashes EPA, Worry Over the Fate of an Agency Doing Similar Work

      It has little name recognition, a budget less than 10 percent of the Environmental Protection Agency’s, and is part of a government institute embraced by both of the nation’s major political parties.

      Still, those concerned about the future of the National Institute of Environmental Health Sciences are wary of what’s to come.

      “In light of what President Trump wants to do to the EPA, I don’t think any agency that deals with issues unpopular with the current government is going to escape,” said Tracey Woodruff, a professor at University of California, San Francisco’s School of Medicine.

    • Bald eagles: scientists decry overturn of ban that would save American symbol

      “The short answer is that no level of lead is acceptable for living things – eagles, condors and people,” said raptor biologist Glenn Stewart.

  • Finance

  • AstroTurf/Lobbying/Politics

    • Fired U.S. Attorney Preet Bharara Said to Have Been Investigating HHS Secretary Tom Price

      Former U.S. Attorney Preet Bharara, who was removed from his post by the Trump administration last week, was overseeing an investigation into stock trades made by the president’s health secretary, according to a person familiar with the office.

      Tom Price, head of the Department of Health and Human Services, came under scrutiny during his confirmation hearings for investments he made while serving in Congress. The Georgia lawmaker traded hundreds of thousands of dollars worth of shares in health-related companies, even as he voted on and sponsored legislation affecting the industry.

      Price testified at the time that his trades were lawful and transparent. Democrats accused him of potentially using his office to enrich himself. One lawmaker called for an investigation by the Securities and Exchange Commission, citing concerns Price could have violated the STOCK Act, a 2012 law signed by President Obama that clarified that members of Congress cannot use nonpublic information for profit and requires them to promptly disclose their trades.

    • Angela Merkel is now the leader of the free world, not Donald Trump

      The US President isn’t motivated by protecting liberal democracy or freedom, his sole ideology is Trumpism: corporate autocracy with a populist facade. And he surrounds himself with white nationalists even more hostile to liberal democracy than he is

    • No evidence of Trump/Russia Collusion
    • Donna Brazile Finally Admits Giving Hillary Clinton Debate Questions. Democrats Still Demand Unity

      Democrats and progressives too frightened of Trump to demand major DNC reforms must review the following timeline.

      First, Debbie Wasserman Schultz and other DNC officials were forced to resign for cheating Bernie Sanders.

      In a twist of fate, POLITICO stated “With just three months until Election Day and the Democrats’ official party apparatus struggling to right itself from months of dysfunction and the scandal caused by the WikiLeaks email hack, interim Democratic National Committee chair Donna Brazile cleaned house Tuesday with the ouster of three top officials.”

      Yes, Donna Brazile forced others to resign for cheating Bernie.

      Welcome to Democratic politics.

  • Censorship/Free Speech

  • Privacy/Surveillance

    • Former CIA Director Blame Millennials Lack Of Loyalty For All The Government Leaks

      That’s Hayden’s response to the CIA leak, which exposed the agency’s exploits and device-targeting tactics. Hayden’s saying people used to trust the government more. That’s what this breaks down to, even if couched in Hayden’s implicit demand youngsters remove themselves from his lawn, but leave any and all government documents behind.

      “Transparency” should mean what it’s always meant. But “transparency” is defined by government agencies and officials harboring zero desire to engage in it. We spent years listening to Obama pat himself on the back for increased government obfuscation and secrecy, something he referred to as the “most transparent administration.” The word “transparency” is meaningless in the government’s hands. That’s why almost anything of significance is revealed by leakers/whistleblowers routing around the “official channels.”

      “Secrecy” means the same thing it always has as well. The government likes it. Citizens are not quite as enthralled with government secrecy, especially considering more and more of their lives are open books. An example: anyone shot by a police officer will have their criminal record immediately delivered to the press while EMTs are still checking for a pulse. Weeks or months will pass before law enforcement agencies release the name of the officer whose gun “discharged,” much less their disciplinary record.

      People of all ages are likely tiring of the government’s insistence on keeping secrets, even as it engages in mass surveillance, reinterprets privacy-shielding laws on the fly, builds massive biometric databases, and declares the Constitution invalid within 100 miles of the border. It’s not just millennials. It’s everyone.

    • US Court Decides Name Search Makes You a Suspect

      This case also highlights the usefulness of privacy-focused search engines such as StartPage. The editor of Tech Rights, Dr. Roy S. Schestowitz, told me that he believes Google is far too invasive, but he also implies that people who use Google may be opening up their data to this sort of invasion:

      “The core of the problem is that Google maintains logs about people who search, what they search for, and even compiles this information (for purposes of advertising or customized results) in a fashion that facilitates such warrants. No search engine ought to collect this much information. People who choose to use search engines that do, put themselves at risk of wrongful accusations, i.e. a potential legal Hell even if they are entirely innocent.”

      It is also yet another fantastic example of why everyone should use a virtual private network (VPN) for even the most mundane tasks. VPN subscribers don’t have to worry that their data might get hoovered up in cases like these. Using a VPN and a private search engine is something everyone should consider for protecting their digital footprint.

    • Leading NSA officials deny claims of “blanket” surveillance at 2002 Winter Olympics

      Senior officials of the United States’ National Security Agency (NSA) have denied claims that the intelligence organisation conducted a “blanket” surveillance programme of Salt Lake City-area residents during the 2002 Winter Olympic Games.

      The Salt Lake Tribune reports that current NSA director of operations Wayne Murphy and former NSA director Michael Hayden have rejected allegations made in a lawsuit against the Agency.

    • How Facebook, fake news and friends are warping your memory

      Memory is notoriously fallible, but some experts worry that a new phenomenon is emerging. “Memories are shared among groups in novel ways through sites such as Facebook and Instagram, blurring the line between individual and collective memories,” says psychologist Daniel Schacter, who studies memory at Harvard University in Cambridge, Massachusetts. “The development of Internet-based misinformation, such as recently well-publicized fake news sites, has the potential to distort individual and collective memories in disturbing ways.”

  • Civil Rights/Policing

    • The Hardening of Society and the Rise of Cultures of Cruelty in Neo-Fascist America

      What does the culture of cruelty look like under a neo-fascist regime?

      First, language is emptied of any sense of ethics and compassion.

      Second, a survival of the fittest discourse provides a breeding ground for racial and social sorting.

      Third, references to justice are viewed as treasonous or, as at the present moment, labelled dismissively as “fake news.”

    • Useless Eaters and Ethnic Purity: the Trump/Bannon War for Biological Nationhood

      The Trump regime has defended its plan to cut the “Meals on Wheels” program by saying it “doesn’t show any results.” What kind of “results” are they talking about? The program delivers meals to shut-ins; the shut-ins eat the meal; they don’t starve to death. That is the result, and it happens all day every day. It is one of the most “resultful” programs in existence. But notice that the Trumpists aren’t saying we can’t afford the program; they are clearly saying it’s not delivering the results they want to see. And what are the only “results” produced by not delivering meals to the sick and shut-in who can’t provide for themselves? THEY WILL DIE.

      Therefore, we can only conclude that the “result” Donald Trump and his ideological Svengali, Stephen Banon, are looking for is a higher death count for the sick and elderly. We know that throughout his public life, Trump has often expressed his belief in genetic superiority, that the right genes, the right blood are responsible for success in life. (Particularly his succes!) The flipside, of course, is that those who haven’t “succeeded” according to his lights, the people who are “weak” and “losers” (to quote two of his favorite epithets), are therefore genetically inferior. We know this is his belief from his own statements.

    • Tamil Nadu man hacked to death over atheistic FB posts
    • Muslims will be majority in India by 2050 and they will be majority in the world by 2070.
    • Appeals Court Says Prior Restraint Is Perfectly Fine, Refuses To Rehear 3D-Printed Guns Case

      It looks as though the Supreme Court may have to step in and settle a particularly thorny question involving the First Amendment, Second Amendment, national security interests, and 3D-printed weapons. Cody Wilson and his company, Defense Distributed, sued the State Department over its demands he cease distributing instructions for the creation of weapons and weapons parts.

      The State Department came along too late to make much of a difference. It claimed Wilson’s instructions violated international arms distribution laws, but by the time it noticed what Defense Distributed was doing, the instructions were all over the web. They still are, and no amount of litigation or government orders is going to change that.

    • CIA’s first ‘Black Site’ prisoner to take stand in Guantánamo court

      The judge in the Sept. 11 war crimes case has agreed to hear testimony next week from forever prisoner Abu Zubaydah, the guinea pig in the CIA’s post- 9/11 interrogation program who has never been charged with a crime and never been allowed to speak in public.

      At issue is a claim by accused 9/11 plot deputy Ramzi bin al Shibh that someone is intentionally disrupting his sleep at the clandestine Camp 7 prison. Bin al Shibh, 44, blames the CIA or troops doing its bidding for noises and vibrations that interfere with his ability to prepare for his death-penalty trial, which has no start date.

  • Internet Policy/Net Neutrality

  • DRM

    • Encrypted Media Extensions

      The DRM proposal is now in final consideration to become an official Web standard. We have until April 13th to stop it. Act now and spread the word!

      [...]

      Decision-making about the standard lies with the World Wide Web Consortium (W3C). The standards body is under heavy pressure from Microsoft, Netflix, Apple, Google, and others to enshrine DRM in Web standards. But through in-person protests and online activism, we push back. Along with allied organizations, we have already significantly slowed the progress of Encrypted Media Extensions.

  • Intellectual Monopolies

    • Copyrights

      • Things Looking Even Worse For Prenda’s Paul Hansmeier: Bankruptcy Fraud On Deck

        So, let’s just say that things probably haven’t been looking very good for Prenda’s Paul Hansmeier lately. Obviously, there was a long series of legal losses in the Prenda and Prenda-related cases, but those are in the distant past now. Back in September, he lost his law license for some of the Prenda copyright trolling activities (if you haven’t been playing along, Prenda set up their own honeypots with their own films –which they pretended were some other company’s, filed bogus CFAA charges to try to get IP addresses, demanded cash from people to drop lawsuits, lied in court multiple times and more…). Then, in December, the two main players: John Steele and Hansmeier were finally indicted and arrested. Then, just a couple weeks ago, Steele took a guilty plea, making it clear he’s thrown Hansmeier under the bus and will testify against him (given the history of Steele throwing many others under rapidly approaching buses, this is no surprise).

        [...]

        Ouch. The document below, in which Hansmeier reveals the bankruptcy fraud investigation, is actually part of his effort to have the bankruptcy court to hold off on these proceedings while all this other stuff gets taken care of. But, even if he weren’t facing criminal charges where his partner in crime has already admitted everything and agreed to testify against him, and even if he weren’t also facing separate investigations over bankruptcy fraud and ADA trolling, it appears that Hansmeier’s bankruptcy case is getting even worse than it was before. This is beyond big leagues. This is beyond the All-Star game. This is truly Hall of Fame material.

      • Google Gets More WordPress.com Takedown Requests Than WordPress Itself

        WordPress has published new data on the number of piracy takedown notices the company receives. Of all the DMCA requests copyright holders sent, roughly 40% were rejected due to inaccuracies or abuse. Most interesting, perhaps, is that Google processes more WordPress.com takedowns than WordPress itself.

      • EU High Court Ruling’s Implications For Content Streaming In Europe And Worldwide

        A recent Court of Justice of the European Union (CJEU) ruling relating to TV internet broadcasts from the UK underscores tight restrictions in place for content streaming in the European Union (EU), legal scholars say.

03.19.17

Links 19/3/2017: Linux Sightings, What’s Wrong With Microsoft, and Death of Docker

Posted in News Roundup at 12:23 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Gitter + GitLab = win

    Before getting into the details, we’d like to thank the 800,000+ people who make up the Gitter community for your enthusiasm and support for everything we’ve done. You’ve inspired our tiny team to keep shipping and making the open source and developer community a better place to connect to one another.

  • Google Unveils Guetzli, Open Source JPEG Encoder, to Speed Browsing

    Google on Thursday announced Guetzli, a new contribution to its evolving set of tools for the open source community. Guetzli is an encoder that allows JPEG files to be compressed as much as 35 percent, resulting in much faster Web page loading.

    “Guetzli,” which means “cookie” in Swiss German, allows users to create smaller JPEG images while maintaining compatibility with existing Web browsers, image processing applications and the existing JPEG standard, noted Robert Obryk and Jyrki Alakuijala, software engineers at Google Research Europe, in an online post.

  • Events

    • Google Summer of Code starts in four days, many open source project ideas still available

      The application period for this year’s Google Summer of Code (GSoC) opens in just four days (March 20, 16:00 UTC) and runs until April 3th. If you couldn’t find anything interesting in the 54 Google Summer of Code ideas by the KDE project, here’s some more ideas on participating projects and their ideas.

    • Speakerfight: A new way to do call4talks

      Since January I’m participating on events on Rio de Janeiro area. The one that every month is scheduled in my calendar is PythonRio. A Python(obviously =P ) event, but you can talk about everything that you want that fit the goal of the event: Share knowledge.

    • University Connect – PCCOE, Pune

      Another bright morning and another college visit was planned under the wings of University Connect. Thanks to the Pune site team again for the arrangements. On 15th February 2017, we visited the PCCOE college in Pune. Again the early morning alarm clock bell managed to break my sleep. Though, I was not feeling very well (thanks to my on going illness due to allergies), but Open Source, college students and Fedora makes me feel enough energy to beat a dull me.

  • Oracle/Java/LibreOffice

    • LibreOffice 5.3 – Freedom Meets Functionality

      Freedom to create with code is not the same as the freedom to create a specific product. Sometimes the freedom offered in the open source community makes it easier for me to be more productive. Other times, not so much. The biggest excuses I have to grab one of my machines with a closed source operating system consists of the following photo editing (Adobe CC), video editing (Final Cut Pro), and Civilization IV. Yes, I’m still playing Civ IV. It’s my favorite. I don’t need to upgrade. I’d love to find a tutorial that worked to get it working under Neon, but sadly the community that would write such a post appears to have moved on.

      I used to think that I couldn’t create documents under Linux but LibreOffice 5.3 has really been a game changer. Everyone else beat me to the flashy reviews, so this isn’t a review that exposes the new features. This is a commentary of my experience.

  • FSF/FSFE/GNU/SFLC

  • Public Services/Government

    • Fund Open Source Software Research to Enhance ICT for Development (ICT4D) and ICT for Dollars (ICT4$)

      I owe part of my IT education to the Open Source community. I enhanced my programming skills using Open Source programming languages; I garnered a better understanding of operating systems through my study and research of the Linux kernel; I understood the inner workings of software by having access to their code; and in college, I used learning materials from computer science classes made available by MIT Open Courseware. But this article is not about how I benefited from open source software. I only mentioned my experience with Open Source Software (OSS) to stress the plethora of opportunities that it provides and the impact it can have on our ICT sector, and the country as a whole. Hence, the subsequent paragraphs provide insights into the positive impact that Open Source Software can have on a developing country like Liberia. The article is also a call to both the public and private sectors to invest in Open Source Software or OSS in order to enhance Information and Communications Technology for Development (ICT4D) and Information and Communications Technology for Dollars (ICT4$).

  • Licensing/Legal

    • Linux XIA Joins Conservancy as a Member Project

      Software Freedom Conservancy proudly welcomes Linux XIA as a member project. Linux XIA is a new protocol stack for Linux built using eXpress Internet Architecture (XIA), an interoperable meta network architecture. Linux XIA is designed to meet unfulfilled demands of real-world networking. The project’s roadmap includes the development of a DDoS protection system, and the addition of state-of-the-art algorithms and data structures to increase Linux XIA’s speed and flexibility.

      Conservancy, a non-profit public charity focused on ethical technology, acts as a home to over forty member projects dedicated to developing free and open source software. Conservancy acts as a corporate umbrella, allowing member projects to operate as charitable initiatives without having to independently manage their own corporate structure and administrative services.

  • Programming/Development

Leftovers

  • A Few Words About that Ten-Million-Dollar Serial Comma

    The issue is that, without a comma after “shipment,” the “packing for shipment or distribution” is a single activity. Truck drivers do not pack food, either for shipment or for distribution; they drive trucks and deliver it. Therefore, these exemptions do not apply to drivers, and Oakhurst Dairy owes them some ten million dollars.

  • Health/Nutrition

    • Peer Into the Post-Apocalyptic Future of Antimicrobial Resistance

      About 4 million years ago, a cave was forming in the Delaware Basin of what is now Carlsbad Caverns National Park in New Mexico. From that time on, Lechuguilla Cave remained untouched by humans or animals until its discovery in 1986—an isolated, pristine primeval ecosystem.

      When the bacteria found on the walls of Lechuguilla were analyzed, many of the microbes were determined not only to have resistance to natural antibiotics like penicillin, but also to synthetic antibiotics that did not exist on earth until the second half of the twentieth century. As infectious disease specialist Brad Spellberg put it in the New England Journal of Medicine, “These results underscore a critical reality: antibiotic resistance already exists, widely disseminated in nature, to drugs we have not yet invented.”

      The origin story of antibiotics is well known, almost mythic, and antibiotics, along with the other basic public health measures, have had a dramatic impact on the quality and longevity of our modern life. When ordinary people called penicillin and sulfa drugs miraculous, they were not exaggerating. These discoveries ushered in the age of antibiotics, and medical science assumed a lifesaving capability previously unknown.

    • Famine stalks Somalia again

      I last worked in Somalia six years ago, when famine also loomed, and there were countless stories to tell about starvation, a health crisis and devastation.

      Knowing it is little different this time round is heartbreaking. A drought that appears to be worsening has left more than 6.2 million people without enough food, if any at all.

      Last week, the World Health Organization (WHO) warned that Somalia was at risk of its third famine in 25 years. The last one, in 2011, killed almost 260,000 people.

    • Half of Somalia’s Population May Feel Effects of Impending Third Famine

      As drought in Somalia looms, the nation is “on the brink” of its third famine in twenty-five years, according to information posted by the World Health Organization (WHO) in February 2017. According to the WHO’s alert, there 360,000 acutely malnourished and 70,000 severely malnourished Somali children in need of immediate medical attention.

    • Thousands of NHS Patients in Harm’s Way; Considered Less Important than Financial Targets

      A private hospital in England has repeatedly mistreated and put thousands of patients in harm’s way. On top of that, Melanie Newman reported for the Bureau of Investigative Journalism in February 2017, a senior surgeon has been under investigation for fraud and other serious issues that have created serious problems to the hospital patients. Thousands of patients have been affected by the hospital’s poor care and mistreatment as it has been prioritizing the financial state of the private hospital over the safety and health of the patients.

      Fawkham Manor hospital underwent inspection multiple times during 2016 that resulted in unusual and serious findings. For example, when inspectors went into the hospital they found that staff regularly failed to wash their hands, and frequently brought patients to the wrong theater, as well as neglecting equipment maintenance. According to the inspectors, the leadership team “did not understand the risks,” thus putting patients at “high risk of avoidable harm.”

    • Killing the Elderly: Social Security Starves Us Slowly as the GOP Tries to Kill Us by Gutting Health Care

      I currently receive a Social Security benefit check of $985 a month, which is a spousal benefit I qualified for, one of the last to be able to make use of the so-called file-and-suspend option for married people reaching age 66 that the Obama Administration and Congress agreed to do away with two years ago, in one of many small cuts being applied to the Social Security program.

      This year that benefit, like the benefit checks of all 60 million people (one in five of all Americans) on Social Security, rose by a scant 0.3 percent, taking my check from $983 a month last year to its present level — a rise of $2.00 a month (I was actually screwed out of a dollar because of crooked rounding!).

  • Security

    • Some HTTPS inspection tools might weaken security [iophk: "the death of web-mail UI"]

      In a typical enterprise environment, an HTTPS connection can even be intercepted and re-encrypted multiple times: at the network perimeter by gateway security products or data leak prevention systems and on endpoint systems by antivirus programs that need to inspect such traffic for malware.

      The problem is that users’ browsers no longer get to validate the real server certificates because that task falls to the interception proxy. And as it turns out, security products are pretty bad at validating server certificates.

    • Defence against the Dark Arts involves controlling your hardware

      In light of the Vault 7 documents leak (and the rise to power of Lord Voldemort this year), it might make sense to rethink just how paranoid we need to be.

    • This laptop-bricking USB stick just got even more dangerous

      Remember that USB stick that would destroy almost anything in its path, from laptops, photo booths, kiosks, to even cars?

      Now there’s a new version, and it’s even more dangerous than before.

      In case you missed it the first time around, a Hong Kong-based company built a weaponized pocket-sized USB stick, which when plugged into a device, will rapidly charge its capacitors from the USB power supply and then discharge, frying the affected device’s circuits.

    • Docker Image Vulnerability Research

      Managing known vulnerabilities is the first step towards a strong security posture. If we’re not updating our systems, and keeping an eye on emerging vulnerabilities that are yet to be patched upstream, we’re basically leaving the front door wide open.

  • Defence/Aggression

    • Pentagon Denies Bombing Syrian Mosque, But Its Own Photo May Prove That It Did

      The Pentagon spokesperson insisted that the U.S. airstrike in the rebel-held village of Al-Jina in northern Syria on Thursday night did not hit a mosque. “The area was extensively surveilled prior to the strike in order to minimize civilian casualties,” Navy Captain Jeff Davis wrote in an email. “We deliberately did not target the mosque.”

      He even unclassified and circulated a photo. And he pointed out that on the left, you can see a small mosque, still standing.

    • Letting Russia Be Russia

      Political philosophers stressing Traditionalist values have influenced the thinking of Presidents Putin and Trump, but that may offer a path for Russia and the U.S. to coexist, explains ex-British diplomat Alastair Crooke.

  • Environment/Energy/Wildlife/Nature

    • How millions of songbirds are being illegally slaughtered to supply Cypriot restaurants

      They set the traps at night. Virtually invisible “mist” nets are strung between trees, with fake bird song warbling from hidden electronic calling devices.. For the exhausted songbirds, it is a seeming safe haven to eat and rest during their long migration.

      As dawn breaks the poachers return, tearing the terrified birds from the illegal snares, often leaving their feet behind, then jabbing them in the throat with a toothpick or penknife.

    • US ‘forces G20 to drop any mention of climate change’ in joint statement

      Financial officials from the world’s biggest economies have dropped from a joint statement any mention of financing action on climate change, reportedly following pressure from the US and Saudi Arabia.

      Finance ministers from the G20, which comprises more than 80 percent of the global economy, debated the wording of their final joint statement on trade at their summit in the German resort of Baden-Baden.

      Their communique showed no mention of a commitment to fund action on climate change, and Reuters reported there had been opposition from the US, Saudi Arabia and other countries to Germany’s intention to include it. “Climate change is out for the time being,” an official told the agency.

    • China Beating US in Green Energy

      According to a five-year policy plan released by China’s National Energy Administration, the country will be investing $361 billion towards renewable energy by 2020 Yizhu Wang reported for Who.What.Why in January 2017. China’s plans, Wang wrote, contrast with what the US appears to be poised to do under newly elected President Donald Trump. While Trump claimed he would provide Americans with more jobs in the coal industry, China is shutting down 38% of its coalmines, and instead plans to create 3 million more jobs in renewable energy. As for the US, subsidies are quickly declining in the pursuit of renewable energy, and will continue to do so, per the Energy Information Administration.

  • Finance

    • Brexit: the board game

      What better way to celebrate this momentous occasion than by gathering all the family and enjoying an old-fashioned board game?

  • AstroTurf/Lobbying/Politics

    • Trump Adviser Is Betting Millions of Dollars That Trump Will Take His Advice

      Carl Icahn, the high-stakes financier who has been using his position as a Trump adviser to push for a major rule-change affecting the ethanol industry, is now literally betting millions of dollars on financial markets that Trump will take his advice.

      As previously reported at The Intercept, Icahn has pushed to get the Environmental Protection Agency to shift responsibility for blending the required amount of renewable fuel into gasoline. Right now, that obligation lies with oil refiners; Icahn wants it shifted to wholesalers.

      As an unpaid but influential “special advisor to the president on regulatory reform” who vetted EPA chief Scott Pruitt, Icahn has plenty of clout to get this done.

    • Our Two Party System is Dead

      The philosopher Friedrich Nietzsche (1844-1900) famously proclaimed the death of God. Following this far more momentous precedent, it would now be fair to proclaim the death of the debilitating, semi-established duopoly party system that disables progressive politics in the United States.

      The analogies are many.

      Nietzsche claimed that it would take centuries for the Divine body to decompose.

      By this, he did not just mean that it was no longer possible, without self-deception, to believe that there is an omnipotent, omniscient, perfectly good being who created all that is and with whom human beings can have personal relationships. Materialist philosophers a century earlier could have said that, albeit not in as colorful a way. Nietzsche took it for granted.

    • White House Budget Bombs on Front Pages of Red State Newspapers

      The White House budget proposal released on Thursday produced harsh, highly critical headlines in local newspapers based in states that President Trump carried in his election in November.

      Papers highlighted the cuts to spending on infrastructure, the environment, the impoverished, and arts and culture.

    • Brazile: Sending Clinton town hall topics ‘mistake I will forever regret’ [iophk: "one of the several big mistakes which cost her party the White House; exhibits no remorse"]

      Brazile appeared not to regret sharing the questions in advance.

      [...]

      “My conscience — as an activist, a strategist — is very clear,” Brazile said in an interview with SiriusXM host Joe Madison, adding, “If I had to do it all over again, I would know a hell of a lot more about cybersecurity.”

    • UPDATE: ‘Major meeting’ on VA not happening tonight at Mar-a-Lago

      Trump then turned to [VA Secretary] Shulkin.

      “So are you going to be at that meeting?” Trump asked. Shulkin shook his, no. “You heard about it, right? It’s going to be great — all about the VA.”

    • World’s cartoonists on this week’s events
    • EXCLUSIVE: Nazi-Allied Group Claims Top Trump Aide Sebastian Gorka As Sworn Member

      Sebastian Gorka, President Trump’s top counter-terrorism adviser, is a formal member of a Hungarian far-right group that is listed by the U.S. State Department as having been “under the direction of the Nazi Government of Germany” during World War II, leaders of the organization have told the Forward.

      The elite order, known as the Vitézi Rend, was established as a loyalist group by Admiral Miklos Horthy, who ruled Hungary as a staunch nationalist from 1920 to October 1944. A self-confessed anti-Semite, Horthy imposed restrictive Jewish laws prior to World War II and collaborated with Hitler during the conflict. His cooperation with the Nazi regime included the deportation of hundreds of thousands of Jews into Nazi hands.

    • Racist Chickens Come Home To Roost In Trump’s White House

      Despite denials of racism, Trump’s administration keeps having dead bodies of racist origin float to the surface or Trump’s new swamp. Why do Trump’s “fighters against terrorism” have to be haters? Why can’t they just be good old boys who love USA and all for which it stands? Nope. Instead Trump brings on board folks steeped in racist ideology and no particular experience dealing with terrorism or any other desirable skill in government.

    • Key Democratic Officials Now Warning Base Not to Expect Evidence of Trump/Russia Collusion

      From MSNBC politics shows to town hall meetings across the country, the overarching issue for the Democratic Party’s base since Trump’s victory has been Russia, often suffocating attention for other issues. This fixation has persisted even though it has no chance to sink the Trump presidency unless it is proven that high levels of the Trump campaign actively colluded with the Kremlin to manipulate the outcome of the U.S. election — a claim for which absolutely no evidence has thus far been presented.

      The principal problem for Democrats is that so many media figures and online charlatans are personally benefiting from feeding the base increasingly unhinged, fact-free conspiracies — just as right-wing media polemicists did after both Bill Clinton and Obama were elected — that there are now millions of partisan soldiers absolutely convinced of a Trump/Russia conspiracy for which, at least as of now, there is no evidence. And they are all waiting for the day, which they regard as inevitable and imminent, when this theory will be proven and Trump will be removed.

    • Warrantless Spying, Russian Targets, and Trumped-Up Wire Tap Charges: What the Feds Might Really Have on the President

      Recently, President Trump accused former President Barrack Obama of wire tapping Trump Tower. He tweeted, “Terrible! Just found out that Obama had my “wires tapped” in Trump Tower just before the victory. Nothing found. This is McCarthyism!” And he further tweeted, “How low has President Obama gone to tapp my phones during the very sacred election process. This is Nixon/Watergate. Bad (or sick) guy!” And also, “Is it legal for a sitting President to be “wire tapping” a race for president prior to an election? Turned down by court earlier. A NEW LOW!” The Trump administration then called for an investigation into the claimed “wire tapp [sic]” without providing any evidence to justify such an investigation. Unfortunately, the corporate, mainstream media has taken to this claim like a dog thrown a sliver of red meat. As a result, the really important issues have been buried beneath a smokescreen of “alternative facts.”

    • The Cost of Trump’s Wall Compared to the Programs He’s Proposing to Cut

      The fiscal 2018 price for President Trump’s border wall is in: $2.6 billion. That’s a cost to U.S. taxpayers, not a cost many people any longer think will be picked up by the Mexican government.

      As first installments go, it’s a pretty big number. Indeed, its size can be appreciated in one powerful way by setting it against some of the many budget cuts Trump proposed this week.

    • Twitter Lights Up After ‘Too Embarrassing to Watch’ Trump-Merkel Press Conference

      President Donald Trump slipped up and called the U.S. a “company,” ignored German Chancellor Angela Merkel’s request for a handshake, and called a German press outlet “fake news”

    • ‘Belligerent,’ ‘Rude,’ ‘Damn Frustrating’: Dems Slam Meeting With DHS Chief

      Homeland Security Secretary John Kelly reportedly told House Democrats on Friday that he was “the best thing to happen” to undocumented immigrants brought to the U.S. as children, in a closed-door meeting that lawmakers described as “damn frustrating” and “belligerent.”

      The meeting was called to get information on the Trump administration’s deportation policies after a number of Democratic lawmakers were kicked out of a meeting with immigration officials last month, but party leaders told Politico on Friday that Kelly showed up without answers to dozens of letters Democrats have been mailing to the Department of Homeland Security (DHS), which the agency has also ignored.

    • Kellyanne Conway: Making History?

      Yet the story of Conway’s pioneering successes went largely unreported in the establishment press, or these historic firsts received only passing comment. The corporate media did not discuss how she did it or the implications for women throughout the United States. Though Hilary Clinton did not win the presidential election, surely having a woman successfully run a presidential campaign is a noteworthy news story.

  • Censorship/Free Speech

  • Privacy/Surveillance

    • Trump’s Wiretapping Accusations: Here’s What the Government Can Actually Do

      Assisted by companies like Facebook, Google, AT&T, and Verizon, the government uses this law to monitor Americans’ communications with foreigners abroad. In doing so, the government sweeps up billions of international emails, web-browsing activities, and phone calls — which NSA, CIA, and FBI analysts can then sift through looking for information about Americans. While there have been no public indications of this to date, it’s possible that Section 702 surveillance also captured communications between the Trump campaign team and the same Russian entities abroad.

    • WikiLeaks Vault 7 Reveals CIA Cyberwar and the Real Battleground of Democracy

      WikiLeaks dropped a bombshell on the U.S. Central Intelligence Agency. Code-named “Vault 7”, the whistleblowing site began releasing the largest publication of confidential documents, that have come from the top secret security network at the Cyber Intelligence Center. Long before the Edward Snowden revelations, Julian Assange noted how “The Internet, our greatest tool of emancipation, has been transformed into the most dangerous facilitator of totalitarianism we have ever seen.” He decried the militarization of the Internet with the penetration by the intelligence agencies like NSA and GCHQ, which created “a military occupation of civilian space”. Now, WikiLeaks’ latest disclosures shed further light on this cyber-warfare, exposing the role of the CIA.

    • Three Myths the Telecom Industry is Using to Convince Congress to Repeal the FCC’s Privacy Rules, Busted

      Back in October of 2016, the FCC passed some pretty awesome rules that would bar your internet service provider (ISP) from invading your privacy. The rules would keep ISPs like Comcast and Time Warner Cable from doing things like selling your personal information to marketers, inserting undetectable tracking headers into your traffic, or recording your browsing history to build up a behavioral advertising profile on you—unless they can get your consent. They were a huge victory for everyday Internet users in the U.S. who value their privacy.

      But since the restrictions also limit the ability of ISPs and advertisers alike to profit from the treasure trove of data ISPs have about their subscribers, powerful interests have come out in force to strip those protections away. Lobbyists in DC are pulling out all the stops trying to convince Congress that these straightforward, no-nonsense privacy rules are unnecessary, unfair, overly burdensome, or all of the above. EFF wrote a memo for congressional staffers that busts these myths.

    • Video calls for Signal out of beta

      We recently released encrypted video calling as an opt-in beta. We’ve spent the past month collecting feedback and addressing the issues that the Signal community found in order to get it production ready. Today’s Signal release for Android and iOS enables support for end-to-end encrypted video calls by default, which also greatly enhances the quality of Signal voice calls as well.

    • NSA officials deny ‘blanket’ spying in Salt Lake during 2002 Olympics
    • Top NSA officials deny ‘blanket’ surveillance during Salt Lake City Olympics
    • Top NSA official rejects claims they spied on everyone in SLC during the 2002 Olympics
    • US Marine Corps issues new social media guidance following naked photo sharing scandal [iophk: "yet ignores the real scandal that FB was used at all by active duty personnel"]

      The message urges Marines to think about what they are posting on social media or blogs [...]

    • [Older] Suspicious cellular activity in D.C. suggests monitoring of individuals’ smartphones

      “For several years, cyber security experts have repeatedly warned that U.S. cellular communications networks are vulnerable to surveillance by foreign governments, hackers, and criminals exploiting vulnerabilities in Signaling System 7,” wrote Sen. Ron Wyden (D-Oregon) and Rep. Ted Lieu (D-California). “U.S. cellular phones can be tracked, tapped, and hacked—by adversaries thousands of miles away—through SS7-enabled surveillance. We are deeply concerned that the security of America’s telecommunications infrastructure is not getting the attention it deserves.”

  • Civil Rights/Policing

    • Top 10 most powerful passports of 2017

      By comparison, for three years between 2013 and 2015, the U.K. shared first place with Germany. And with the fallout from Brexit still playing out, analysts predict the changing geopolitical climate to affect the ranking over the next 12 months.

      “We have witnessed several major events recently that are likely to have an impact on global mobility, including Brexit and the election of [United States] President Donald Trump,” said Henley & Partners chairman Christian Kalin.

      “Both can be interpreted as steps toward restricting movement and creating barriers to entry,” he added. “This trend towards curbing travel freedom is already apparent in the shift in rankings on this year’s Visa Restrictions Index.”

      Rounding out the top three spots is Sweden in second place, and Denmark, Finland, Italy, Spain and the U.S., all tied for third.

      The biggest mover in this year’s index is Peru, which gained 15 spots.

      Island nations like the Marshall Islands, Solomon Islands, Micronesia, Kiribati and Tuvalu also gained nine spots, while Ghana posted the biggest loss, dropping four spots.

    • EU citizens in UK anxiously seek security before Brexit

      Sam Schwarzkopf, a German neuroscientist at University College London, was startled to receive a letter from the British government telling him that his application for permanent residence had been rejected and he should prepare to leave the UK.

      As a European Union citizen, he is legally entitled to live in Britain, and last year’s decision by UK voters to leave the 28-nation bloc hasn’t changed that. But he is one of hundreds of thousands of Europeans battling British bureaucracy to confirm their legal status – and sometimes discovering that the process only increases their uncertainty.

    • In a first, former CIA captive appeals Guantánamo trial to Supreme Court

      Lawyers for the man accused of orchestrating the USS Cole bombing are asking the U.S. Supreme Court to intervene in the military tribunal here using accounts of the captive’s CIA torture drawn from declassified documents and an interrogator’s recent memoirs.

      The 38-page petition with hundreds of pages of supporting documents describes Abd al Rahim al Nashiri’s being sodomized, kept naked and kenneled like a dog, crammed into a box the size of an office safe and being threatened with a revved power drill while hanging shackled and nude from a cell ceiling.

      And that’s from the portion that isn’t blacked out.

    • Xenophobic violence in the ‘Rainbow’ nation

      For the fourth consecutive week now, South Africa is witnessing what many analysts call a “resurgence” of xenophobic violence in parts of Johannesburg and Pretoria, the country’s capital city.

      The reality is that this type of violence is a daily occurrence in the country, although it does not always get media attention. It has, in fact, become a long-standing feature in post-apartheid South Africa.

      Since 1994, tens of thousands of people have been harassed, attacked or killed because of their status as outsiders or foreign nationals (PDF).

      Despite claims to the contrary by the government, violence against foreign nationals in South Africa did not end in June 2008 when the massive outbreak that started a month earlier subsided.

    • Why is DHS Labeling Protesters “Domestic Terrorists”?

      The United States government considered Nelson Mandela a terrorist until 2008. Mandela was a designated terrorist 18 years after he was released from prison, 15 years after he won the Nobel peace prize, and 14 years after he was elected president of South Africa.

      Let that sink in for a moment.

      In 1962, the U.S. government considered Mandela to be “the most dangerous communist” outside of the then Soviet Union. It was subsequently revealed that a CIA agent provided the South African government with the information necessary to apprehend him and land him in prison for 27 years.

      The indignity suffered by Mandela during every visit to the United States — as a “terrorist” he had to get special clearance to enter the country — was finally wiped clean by an act of Congress just five years before he died.

      Nelson Mandela, and his organizing in South Africa, was not protected by the First Amendment, a freedom afforded by the U.S. Constitution only to those in the United States. But we should not forget that Angela Davis, Malcom X, and yes, even the now-beloved Martin Luther King, Jr., were at varying times labeled enemies of the state during their struggle against segregation in the United States. The First Amendment protected their organizing. But it did not stop our federal law enforcement agencies from watching, labeling, and arresting them. We are fortunate that these heroes of racial justice did not cower when faced with jail time, but instead spoke louder.

    • Children Make Up Half the World’s Refugees

      Children refugees have increased to 50 million children worldwide with over 75% of them from ten countries. Syria and Afghanistan alone contribute to half of all children refugees under the United Nations High Commissioner for Refugees according to UNICEF. Over 70% of children in Syria alone show signs of toxic stress due to conflict-related exposures, contributing to the tragedy of what will become a lost generation of Syrians. Refugee children are at high risk for recruitment, work abuse, violence, sexual abuse, trafficking, and lives of poverty. UNICEF is calling for the international community to uphold the Convention of the Rights of the Child in assisting the migrant child crisis.

    • On International Women’s Day, Here’s How the ACLU Is Fighting for Women’s Rights in the Face of the Most Anti-Woman Agenda in History

      A Day Without a Woman gives us another concrete way to make our strength visible: Organizers are encouraging participants to take the day off work, avoid shopping (with exceptions for women- and minority-owned small businesses), and/or wear red to demonstrate solidarity. This demonstration of strength is critical because the Trump administration poses an unprecedented threat to women’s equality and well-being. Defeating it is going to take all of our strength and persistence.

      Well, here at the ACLU, we know a little something about persistence. The ACLU has been on the front lines in the struggle for women’s equality since the Women’s Rights Project was co-founded by Ruth Bader Ginsburg in 1972. While the progress we’ve made is undeniable, we’re still fighting some of the same battles today we fought back then in three priority areas: employment, education, and ending violence against women. And our colleagues in the Reproductive Freedom Project continue their tireless fight to protect the right to contraception, the right to abortion, and the right to bear a child.

    • Israel and the A-Word

      Since then, Israeli law and policy has only deepened the state apparatus of separation and segregation, discrimination and domination. Over the years, countless activists, authors and artists, as well as leading anti-apartheid figures from South Africa, have referred to Israel’s particular brand of structural discrimination as akin to apartheid. In the last decade, international lawyers have also begun to do likewise, but with reference to the definition of apartheid under international law rather than by analogy to southern Africa.

    • Raped, beaten, exploited: the 21st-century slavery propping up Sicilian farming

      Every night for almost three years, Nicoleta Bolos lay awake at night on a dirty mattress in an outhouse in Sicily’s Ragusa province, waiting for the sound of footsteps outside the door. As the hours passed, she braced herself for the door to creak open, for the metallic clunk of a gun being placed on the table by her head and the weight of her employer thudding down on the dirty grey mattress beside her.

      The only thing that she feared more than the sound of the farmer’s step outside her door was the threat of losing her job. So she endured night after night of rape and beatings while her husband drank himself into a stupor outside.

      “The first time, it was my husband who said I had to do this. That the owner of the greenhouse where we had been given work wanted to sleep with me and if we refused he wouldn’t pay us and would send us off his land,” she says.

  • Internet Policy/Net Neutrality

    • The future of US net neutrality under Trump

      There is a case to be made that Pai is motivated by the firm conviction of operating within the limits of power/oversight granted to the FCC by Congress. Regardless of his intentions, though, he is expected to steer the FCC into “a more hands-off, pro-industry direction,” which was reinforced during his first US Senate hearing as FCC chairman on 8 March 2017. Time will tell whether or not his conviction – and his vision – will manifest in a way that protects the free, competitive, and open Internet he and many of his Republican colleagues advocate so adamantly for, or if it will lead to the fears some consumer advocates believe may come to pass: greater market capture/monopolization by the powerful, existing telecoms, and ultimately higher costs for US Internet subscribers.

  • Intellectual Monopolies

    • Copyrights

      • SXSW 2017 on BitTorrent: 7.86 GB of Free Music

        SXSW’s showcase MP3s are still freely available on the festival’s site for sampling purposes.

        For the past several years Ben Stolt has taken the time and effort to put all of the MP3s on BitTorrent. Last week he published the latest 2017 torrent, which consists of 1,201 tracks totaling 7.86 gigabytes of free music.

        All the tracks released for the previous editions are also still available and most of these torrents remain well-seeded. The 2005 – 2017 archives now total more than 77 gigabytes.

      • Pirate Bay’s Peter Sunde Doesn’t Plan to Pay Hollywood ‘Back’… Ever

        With these numbers the damages will be more than half a billion before he retires. In fact, it already is pretty much impossible for Peter to pay even the interest alone. It’s likely he’ll be in debt for the rest of his life. But even if he could pay, he wouldn’t.

      • Huge Scandal Engulfs Greek Anti-Piracy & Royalties Group

        Greek anti-piracy and royalties group AEPI is in crisis after a government-commissioned investigation found huge irregularities in its accounts. Following an audit by Ernst & Young, it was discovered the group had failed to pay more than 42 million euros owed to artists. They did pay themselves well, however, with the CEO alone earning 52,000 euros per month.

« Previous entries Next Page » Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts