Bonum Certa Men Certa

Links 13/1/2015: Galaxy A7, Linux Mint 17.1 Reviews





GNOME bluefish

Contents





GNU/Linux



Free Software/Open Source



  • Open source software platform released by Lockheed Martin
    Lockheed Martin software engineers have created a platform for easing big data analysis for developers and non-developers and are open sourcing the project on GitHub, a well-known web-based hosting service.


  • 6 excellent open source network monitoring tools
    There are tools that notify users when problems occur as well as when problems have been solved. And others are very good at spotting just about anything out of the ordinary or providing analysis of trends.


  • Three Pillars Of Open Source Governance
    Open source software has morphed from its underground DIY roots to become a common tool that runs essential parts of many businesses. In turn, commercial companies have sprung up around open source projects. These companies make money offering updates, support, and services.

    The intersection of open source and commercial interests raises questions about authority, authenticity, and culture.

    Is the project driven by the commercial sponsor or outside contributors? Will commercial interests trump the wishes of the community? How and where do you draw lines between a commercial entity and the open source community?


  • Top 5 open source project management tools in 2015
    Last year, I covered five of the best open source project management tools, like ProjectLibre and OpenProject. The article struck a chord with readers and continues to prove valuable. So, this year I revisited the tools mentioned in last year's article, taking into account comments and suggestions from readers, and provided an update on where they are today. Next, I share five new open source project management tools for 2015. All in all, this article will give you a good look at 11 of the top open source project management tools out there.


  • Events



    • Free embedded computing conference posts agenda
      “Tomorrow’s Internet of Things will be built as an orchestration of hardware and software platforms, many of which will be built on Linux,” states the RTC Group in its RTECC event announcement. Attendees will have the opportunity to grab a copy of the most recent free RTC Magazine, featuring a cover that asks: “Linux: Can it run everywhere?”


    • Consumer Electronics Show 2015: Open source highlights
      The 48th annual Consumer Electronics Show (CES) has come and gone, bringing with it some exciting new open source platforms and products. While it's difficult to capture every open source announcement and unveiling that happened last week, let’s take a look at a few of the highlights:


    • Linux.Conf.Au 2015 Kicks Off In Auckland
      This year's LCA 2015 keynotes include Linus Torvalds, Bob Young, and Eben Moglen. For those not down under attending the conference, at least there's usually top-notch videos of the keynotes and various sessions that are available in the weeks ahead. I'll also be monitoring for the slides and other presentation assets to analyze and share on Phoronix.




  • Web Browsers



    • Mozilla



      • Announcing the Mozilla Science Lab Fellowship Program
        With generous support from the Leona M. and Harry B. Helmsley Charitable Trust, we are excited to announce the Mozilla Science Lab’s first Open Science fellowship program. The grant is one of the first investments by the Trust’s new funding program dedicated to collaboration, reproducibility, and infrastructure in biomedical sciences.


      • Firefox 35 Is Ready For Release, Available For Download Now
        In usual Mozilla fashion, Firefox 35.0 is scheduled to be released tomorrow but if you're so tempted to upgrade to the latest release of this open-source web-browser you can do so tonight.






  • Oracle/Java/LibreOffice



  • Project Releases



    • rfoaas 0.1.1
      A brand new and shiny version of rfoaas is now on CRAN. The rfoaas package provides an interface for R to the most excellent FOAAS service--which provides a modern, scalable and RESTful web service for the frequent need to tell someone to f$#@ off.


    • Early Preview Release Of Git 2.3
      Beyond announcing Git v2.2.2 on Monday with various bug-fixes, Junio Hamano announced the release of Git 2.3.0-rc0 as a preview release towards Git 2.3.




  • Openness/Sharing



    • Open Access/Content



      • Meet the open access dinosaurs of the year
        As we enter 2015, it’s a good time to reflect on the state of paleontology and the state of open access. Because I’m a dinosaur paleontologist (my apologies to the other 99% of life that ever lived), this post will of course address that clade in particular!

        Thirty-eight new genera or species of dinosaur were announced in 2014 (according to my count based on a list at Wikipedia and the dinosaur genera list), spanning everything from sauropods to tyrannosaurs to horned dinosaurs. Seventeen of these were published in open access or free-to-read journals. This works out to around 45%.




    • Open Hardware







Leftovers



  • Hardware



    • making it work
      Linus recently noted that many-core (1000+ core) computing will never happen because software doesn't work with it. Fortunately for us, Linus is a man of limited vision and is wrong about the inevitability of that outcome because he makes a flawed assumption: we will continue writing software the way we currently do. He is right that if we keep writing software the way we do, many-core will not happen. Even multi-system will run into limits, particularly on the client side. However, we don't need to keep writing software the way we do.




  • Health/Nutrition



    • Fall in life expectancy raises alarm amid fears that cuts and pressure on NHS may be to blame for earlier deaths


      Health officials are investigating a “statistically significant, sustained” decline in life expectancy among elderly people in some parts of England, amid warnings that cuts to social care and pressures on the NHS may be contributing to earlier deaths.


    • EU lawmakers pass controversial GMO food law
      EU lawmakers on Tuesday approved controversial legislation to allow EU member states to decide for themselves whether to allow cultivation of Genetically Modified foods after years of bitter dispute.

      "This agreement will ensure more flexibility for member states who wish to restrict the cultivation of the GMOs in their territory," said Liberal Democrat MEP Frederique Ries who steered the legislation through the assembly.

      For some of the 28 European Union nations such as France, GMO foods are a potential threat to public health and the reputation and integrity of its famed agricultural produce.




  • Security



  • Defence/Police/Secrecy/Aggression



    • The Centcom ‘hack’ that wasn’t
      Hackers claiming links to the Islamic State have hijacked several social media accounts belonging to U.S. military's Central Command. The hacking group, which calls itself "CyberCaliphate," is tweeting out what the group claims are U.S. military PowerPoints and data on retired Army personnel — seemingly sensitive files that have no business being publicly aired. The images are meant to show that the hackers have penetrated the Pentagon's network. But the chances of this actually having happened appear rather slim. Here's why.


    • Manipulation of Terror
      Nationalists are spreading hate, fanatics are attacking Muslims, governments are capitalizing on this tragedy.




  • Transparency Reporting



    • WikiLeaks: not perfect, but more important than ever for free speech
      The secret CIA files appeared just before Christmas. One detailed how CIA operatives could maintain cover, using fake IDs, when travelling through foreign airports. Israel’s Ben Gurion airport was said to be one of the hardest to trick.

      The other document, from 2009, was an assessment of the CIA’s assassination program. It raised doubts about the effectiveness of the program in reducing terrorism. Likewise with Israel’s killing of Palestinians.

      In Afghanistan, the CIA discovered that murdering Taliban leaders could radicalise the militants, allowing even more extreme actors to enter the battlefield. The Obama administration ignored this advice and unleashed “targeted killings” in the country. Unsurprisingly, the insurgency is thriving.




  • Privacy



    • David Cameron’s internet surveillance plans rival Syria, Russia and Iran
      What David Cameron thinks he’s saying is: “We will command all the software creators we can reach to introduce back doors into their tools for us.” There are enormous problems with this: there’s no back door that only lets good guys go through it. If your WhatsApp or Google Hangouts has a deliberately introduced flaw in it, then foreign spies, criminals, crooked police (such as those who fed sensitive information to the tabloids who were implicated in the phone-hacking scandal – and like the high-level police who secretly worked for organised crime for years) and criminals will eventually discover this vulnerability. They – and not just the security services – will be able to use it to intercept all of our communications, from the pictures of your kids in your bath you send to your parents to the trade secrets you send to co-workers.


    • WhatsApp and iMessage could be banned under new surveillance plans


      David Cameron could block WhatsApp and Snapchat if he wins the next election, as part of his plans for new surveillance powers announced in the wake of the shootings in Paris.


    • UK government could ban encrypted communications with new surveillance powers
      Britain’s Prime Minister, David Cameron, is calling for new surveillance powers in the wake of the recent shootings in Paris. Speaking at a public event in the UK this morning, Cameron outlined the government’s stance on secure communications that can’t be read by police or government agencies. "In our country, do we want to allow a means of communication between people which […] we cannot read?" he asked, comparing letters and phone conversations to encrypted communications used online, adding that "we must not" allow a means of communication where individuals can communicate in secret over the internet.


    • David Cameron Should Worry You
      It should have come as a surprise to nobody that leaders around the world are jumping on the Charlie Hedbo attacks in Paris as a means to justify increased warrantless surveillance.

      What you should take away from his statement is that he’s willing to encroach on the civil liberties of millions of British people in a misguided attempt to increase national security. We know from leaked NSA slides (see left) that this has always been the desire of the surveillance arms of the UK and US governments. Now, they’re using the fear that Paris generated to pass legislation.


    • Max Hastings embraces 'der Deutsche Blick'
      It is concerning that, in the midst of citing the "coherent doctrine[s]" of Nazism and the Eastern Bloc, Hastings advocates their "everything about everyone" methods of domestic surveillance. The NSA's term is "collect it all". Apparently, Hastings is blind to the danger of history repeating, a history that includes MI5 finding itself with "very little to do" by the early 1970s, and turning (in the 1980s) on the people it was supposed to protect (see: DS19, and F branch) - surveilling for the first time with data banks and networks. By the 1990s, whistleblowers were reporting that Hastings' "few mavericks, [...] who abuse such power" were a majority within positions of power, and broadly ignoring the Act of Parliament (1989) meant to curtail the agency's excesses. Without oversight, institutions are as likely to devolve as reform, and Hastings' outdated deference creates the space for further abuses.


    • U.K. Prime Minister David Cameron Proposes Banning End-to-End Encryption


    • What David Cameron just proposed would endanger every Briton and destroy the IT industry
      What David Cameron thinks he's saying is, "We will command all the software creators we can reach to introduce back-doors into their tools for us." There are enormous problems with this: there's no back door that only lets good guys go through it. If your Whatsapp or Google Hangouts has a deliberately introduced flaw in it, then foreign spies, criminals, crooked police (like those who fed sensitive information to the tabloids who were implicated in the hacking scandal -- and like the high-level police who secretly worked for organised crime for years), and criminals will eventually discover this vulnerability. They -- and not just the security services -- will be able to use it to intercept all of our communications. That includes things like the pictures of your kids in your bath that you send to your parents to the trade secrets you send to your co-workers.

      [...]

      Cameron is not alone here. The regime he proposes is already in place in countries like Syria, Russia, and Iran (for the record, none of these countries have had much luck with it). There are two means by which authoritarian governments have attempted to restrict the use of secure technology: by network filtering and by technology mandates.
    • Why MI5 does not need more surveillance powers after the Paris attacks
      Soon after the attacks in Paris last week, the director general of MI5, Andrew Parker, said of the jihadi threat: “Whenever we lose visibility of what they are saying to each other, so our ability to understand and mitigate the threat they pose is reduced.”

      Few would disagree with this sentiment, or in any way underestimate the enormous responsibility counter-terrorist agencies face after the killings, but the coded suggestion that MI5 needs further sweeping surveillance powers to track down terrorists is more controversial, because it doesn’t take into account the facts.


    • George Brandis still struggling with metadata
      While it is perhaps unsurprising, the Attorney-General's latest attempt to use the Sydney siege and recent events in France as justifications for the government's mandatory data retention laws is as distasteful as it is misleading.
    • What new snooping powers do PM and MI5 want – and what are the concerns?


    • In wake of Paris attacks, French surveillance gets a closer look
      French President Francois Hollande chaired an emergency meeting Monday morning with key cabinet ministers and heads of police and security services to discuss how persons known to the country’s intelligence community were still able to coordinate violent raids in Paris. But just days before the attacks on the offices of satirical magazine Charlie Hebdo left 12 dead and wounded another 11, a controversial new law, broadly expanding the French government’s surveillance powers, went into effect.
    • MI6 forced to show how it may snoop on privileged lawyer-client exchanges
      MI6 has been forced to reveal documents detailing how it may access legally privileged communications between solicitors and their clients, even if the lawyers are suing the government.

      Policy guidance handed over to the civil liberties organisation Reprieve shows how the Secret Intelligence Service (SIS) is attempting to regulate its mass surveillance practices and demonstrate compliance with the law.

      The revelations have emerged from a case brought by lawyers for two Libyans, Abdel-Hakim Belhaj and Sami al-Saadi, who, along with their families, were abducted in a joint MI6-CIA operation and sent back to Tripoli to be tortured by Colonel Muammar Gaddafi’s regime in 2004.

      Their complaint about illegal monitoring is being heard before the investigatory powers tribunal and a full trial of the issues is expected this spring.

      Exchanges between lawyers and their clients enjoy a special protected status under UK law. Following exposure of widespread monitoring by the US whistleblower Edward Snowden in 2013, Belhaj’s lawyers feared that their exchanges with their clients could have been compromised by GCHQ’s interception of phone conversations and emails.


    • After Paris: More Intelligence, not More Surveillance
      This is the extraordinary thing about mass surveillance. Every time it fails, its supporters use it as evidence that we must have more (even though blanket surveillance is no longer possible in the EU.) If something doesn't work, you shouldn't do more of it, but something different and more effective. One of the striking things to emerge from the report on intelligence matters relating to the murder of Fusilier Lee Rigby, which I wrote about back in November, was that the UK intelligence services simply didn't have enough people to follow up all the leads they had. So the idea that we need *more* surveillance data, more false positives, more leads to follow up, is clearly folly.
    • What you 'like' on Facebook gives away your personality
      Be careful what you "like" on Facebook. You're opening a small window on your soul.

      A machine-learning algorithm can now predict human personality types using nothing but what people like on the Facebook social media site. A team at Stanford University in California and the University of Cambridge used data from a questionnaire filled out by 86,000 people that identified their "big five" personality traits. The results were correlated with their Facebook activity.

      On the basis of between 100 and 150 Facebook likes, the team's algorithm could determine someone's personality more accurately than could their friends and family, and nearly as well as their spouse.


    • Ever liked a film on Facebook? You’ve given the security services a key to your soul
      Why on earth does David Cameron feel the need to call for new digital powers for the security services when they are only beginning to use the ones they already have? Suppose you wanted personality profiles of a quarter of the population of England? Turns out you can mine them from Facebook with publicly published algorithms. About half the adult population of England uses Facebook at least once a month. About a quarter of us have “liked” more than 250 things there. So it’s really disconcerting to discover that completely banal acts on Facebook can add up to a quite detailed psychological profile.




  • Civil Rights



    • Risen finally off hook in leak trial
      New York Times reporter James Risen won't be called to the witness stand at a leak trial for one of his alleged sources, but jurors may hear some of the words he uttered at a pre-trial hearing last week, according to lawyers and the judge overseeing the case.


    • Feds want Risen out of leak trial
      Federal prosecutors who have decided after a seven-year legal battle not to call New York Times reporter James Risen in the leak trial of one of his alleged sources are now intent on making sure the defense in the case can't call Risen either—or even talk about the government's decision not to call him.
    • Psychologists provided legal cover for US torture programs in exchange for status and power, book shows
      James Risen's new book "Pay Any Price: Greed, Power and Endless War" spells out how the American Psychological Association and the US security apparatus worked together, towards mutually beneficial aims, to cloak the government's torture programs in a mask of legality. Essentially, the APA gave the military what it wanted—claims that the torture programs were medically sound—in exchange for power and prestige.

      The story is simultaneously pathetic and horrifying.

      Risen describes how in 2002, the APA changed its ethical guidelines to allow members to do things that violate the APA code of ethics, as long as the psychologists were following the law or what they called "governing legal authority." As long as the US government said it was ok, the APA's members could engage in torture—its own ethics rules be damned. As Risen observes, the "change introduced the Nuremberg defense into American psychology—following lawful orders was an acceptable reason to violate professional ethics." Always a bad sign when one begins to take legal cues from Nazis.



    • “Insider Threat” Program Lags Behind Schedule
      Currently, the anticipated achievement of an Initial Operating Capability for insider threat detection by January 2017 is “at risk,” according to a new quarterly progress report. Meanwhile, the date for achieving a Full Operating Capability cannot even be projected. See “Insider Threat and Security Clearance Reform, FY2014, Quarter 4.”


    • The Corrupt Philanderer Who Built the CIA’s Black Sites
      Democratic deliberation rests on the premise that ideas, once exposed to the public—unfolded, challenged, tested, and disputed—will stand or fall on their own merit. The bureaucratic drive for secrecy rests, in many cases, on a need to keep information out of the hands of individuals who could use it to harm the bureaucracy. The bureaucrat will invariably say that an enemy could use the information to harm the country, but more often than not the real concern originates with the bureaucrat personally or the office where he or she works.


    • America’s over-policing bombshell: How new data proves “stop & frisk” critics were right all along
      People are talking about the police a lot these days. The killing of unarmed residents. The killing of cops. Disputes between New York City mayor Bill de Blasio and rank-and-file officers over issues of respect. And yet, a policing issue that totally consumed and divided New York and the nation in recent years now garners little mention: the NYPD’s stop-and-frisk policy.

      One big reason, of course, is that the tactic is used much less now. But another is that, while few have announced it, the debate over the once hotly divisive practice is effectively over. As new data this week confirmed, when it comes to whether a city can reduce crime without stopping-and-frisking enormous numbers of its residents of color, one side was right and one was wrong.


    • The VICE News Interview: Joseph Hickman
      According to the US government, three detainees — all imprisoned as part of the global war on terror — hung themselves in their cells that night. But Army Staff Sergeant Joseph Hickman, who was on guard that night at Camp Delta, came to believe something very different: that the three men were murdered in a secret CIA black site at Guantanamo.


    • Hotter Than Lava
      Every day, cops toss dangerous military-style grenades during raids, with little oversight and horrifying results.
    • Politicians apply double standard in support of David Petraeus amid FBI leaks inquiry
      Though under investigation by the FBI for unauthorized disclosure of classified information related to an affair with his biographer, David Petraeus counts among his defenders a host of prominent politicians who typically denounce security leaks.

      The former US army general and CIA director has deep ties to a bipartisan host of political heavyweights, from potential Democratic presidential nominee Hillary Clinton to former Republican presidential nominee John McCain, and a well of media support stemming from his stewardship of the 2007-08 Iraq troop surge. Many have raced to support Petraeus in the days since word emerged that the most acclaimed military officer of his generation might face felony charges.


    • Obama & Counterterror: The Ignored Record
      Torture, paradoxically, has been the area where Obama’s policy has been both the firmest and the most qualified. By all available evidence, use of the “enhanced interrogation techniques” has stopped. Obama also prohibited further use of secret detention facilities where suspects had “disappeared” in CIA custody for torture. (To be fair, Bush by the end of his presidency seemed to have ended both too.)
    • Guantanamo Bay: A ‘Battle Lab’ Where Personnel Experimented on Prisoners to Develop Torture Techniques
      On the thirteenth anniversary of the first prisoners brought to Guantanamo Bay, a report from the Seton Hall Law Center for Policy and Research examines how the United States government used the facility as a “battle laboratory.”

      Prisoners were treated like “test subjects” as personnel, including medical officers, engaged in experiments to develop new interrogation techniques. Numerous detainees were drugged upon arrival to help interrogators break them. One prisoner, Mohammed al-Qahtani, was treated like a “lab rat” and monitored closely by medical personnel to determine if his body could continue to be tortured.


    • "Circus of Hypocrisy": Jeremy Scahill on How World Leaders at Paris March Oppose Press Freedom


      An estimated 3.7 million people rallied across France on Sunday in response to the Charlie Hebdo shootings and ensuing attacks that left 17 people dead. More than a million people marched in Paris, making it the largest demonstration in French history. More than 40 world leaders traveled to Paris to help lead the march. "What we saw on display on the one hand was very heartening, to see so many people come into the streets," says Jeremy Scahill, co-founder of The Intercept. "But on the other hand, this is a sort of circus of hypocrisy when it comes to all of those world leaders who were marching at the front of it. Every single one of those heads of state or representatives of governments there have waged their own wars against journalists."
    • The Intercept Found Serial's Elusive Jay, but Can It Find a Profitable Future? [UPDATED]


    • Consent of the Governed
      Recent polling data confirms that a majority of Americans -- in some cases a vast majority -- have very low levels of trust in our ruling institutions. Only about a fifth of the population has a lot or great deal of trust in big business. Americans have an all-time historic low level of trust for the US Congress -- a minuscule 7 percent -- and distrust in the government as a whole is at an historic high: 81 percent. Though these numbers are abysmal, the troubling aspect of the reporting is that the numbers continue to trend in the wrong direction. Meaning, it will likely get worse without corrective action. This condition is more serious than some realize.
    • I Helped Create Gitmo. Now I Want It Shut Down.
      Thirteen years ago this month, I arrived in Guantanamo Bay, Cuba, as the commander, Joint Task Force 160, charged with constructing and operating a detention facility to hold Taliban and al Qaeda detainees. Today the detention facility at Guantanamo is a blight on our history, and it should be closed.


    • Nigeria's Horror in Paris's Shadow
      Why a 10-year-old suicide bomber isn't front-page news




  • Internet/Net Neutrality



  • Intellectual Monopolies





Recent Techrights' Posts

WIPO UDRP D2024-0770 Debian vendetta response
Reprinted with permission from Daniel Pocock
Links 12/04/2024: Reporters Without Borders Rep Kicked Out of Hong Kong
Links for the day
Gemini Links 12/04/2024: Funny Thing, Manual Scripts, and More
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, April 11, 2024
IRC logs for Thursday, April 11, 2024
[Video] Trainline Finally Issues a Refund, But It Took 9 Days and Showed How 'Modern' Systems Fail Travelers
They treat people like a bunch of animals or cattle, not like valuable customers
DebConf22 Kosovo segregation of women exposed
Reprinted with permission from disguised.work
Links 11/04/2024: Web Diversity and More Crackdowns in Russia
Links for the day
Gemini Links 11/04/2024: Activity and Motivation in Geminispace, gwit Implementations
Links for the day
First They Came for Iranian Developers...
Red Hat/IBM and 'cancel culture'
[Video] A Debian Project Leader Needs to Also be a Technical Project Leader
We do not vouch for one (or none) horse in this race
Aggressive Efforts (and Threats) for Those Who Speak About What Happened in the Balkans
Acting in this way in an effort to censor people typically results in a second scandal on top of the original scandal
How Kosovo won DebConf21
Reprinted with permission from Daniel Pocock
[Video] How the Media Blamed SSH and Linux (for Nearly a Whole Fortnight!) Instead of Microsoft's GitHub and Systemd
Microsoft-connected sites have said a whole bunch of lies
Anzacathon: a hackathon for Anzac day at home
Reprinted with permission from Daniel Pocock
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, April 10, 2024
IRC logs for Wednesday, April 10, 2024
On Julian Assange, Now 5 Years in Belmarsh Prison: The Good News, the Bad News, and Ugly Noise
Some time this spring (or summer) we'll revisit the Appelbaum case
Links 10/04/2024: Starvation as Weapon in Sudan, Sonos v. ITC Explained
Links for the day
Gemini Links 10/04/2024: JSON explore and geminiprotocol.net Downtime
Links for the day
Links 09/04/2024: Netflix Layoffs and Cox Will Try to Bring Copyright Liability of ISPs to SCOTUS
Links for the day
Links 10/04/2024: Biden Reportedly Considers Dropping the Charges Against Julian Assange
Links for the day
Wikileaks, Dickileaks & Ubuntu Underage girl
Reprinted with permission from the Free Software Fellowship
Gemini Links 10/04/2024: Tanana River, Picotron, and Citation on Gemini
Links for the day
Elio Qoshi & Redon Skikuli missing from OSCAL agenda
Reprinted with permission from the Free Software Fellowship
Links 10/04/2024: TikTok Trouble, East Asian Companies Receive Subsidies From American Taxpayers
Links for the day
This is What Techrights Would Look Like If We Participated in 'CSS Naked Day'
All cascading style sheets (CSS) should be optional
Microsoft Hiring People Who Attempt to Murder Colleagues
magnet for sociopaths
Francophone GNU/Linux
Moving in a positive direction
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, April 09, 2024
IRC logs for Tuesday, April 09, 2024
Over-Enforcement of a Code of Conduct (CoC) Would Ruin Events, Maybe Not for Corporate Posters, Sponsors, Posers, and Speakers
a shrine for corporate supremacy
The "F" in Free Software Doesn't Stand for "Censorship"; Attempts to Censor Mere Links to Articles About DebConf22 in Kosovo
It's about an article we'll reproduce here later this week
Daniele Scasciafratte & Mozilla, OSCAL, Albania dating
Reprinted with permission from the Free Software Fellowship
Gemini Links 10/04/2024: Notifications, Motivation, Profectus Graphical Browser for the Smallnet
Links for the day
Abuse & Sex Crimes at FOSDEM and Open Source tech events
Reprinted with permission from the Free Software Fellowship