Today, however, Lastpass drops a bombshell, announcing it has been bought by the company LogMeIn. I am not familiar with this new owner, but many people are unhappy -- the comment section on the announcement is full of outrage. If you only use Windows, Mac, iOS or Android, there are alternatives, so you can switch if things get bad. Users of Chrome OS, Ubuntu, Fedora and other such operating systems? Not so much. Should we Linux users panic?
A number of the distributions on that list would have been suitable but I was also looking for a distribution that had a 32-bit version.
From the list I could reasonably have gone for PCLinuxOS, Linux Mint XFCE, Zorin OS Lite or Linux Lite but having recently reviewed Q4OS I decided that this was the best option because it looks a lot like older versions of Windows, it is lightweight, fast and easy to use.
Research firm Gartner Inc said worldwide shipments of personal computers fell 7.7 percent to 73.7 million units in the third quarter as a stronger dollar made them costlier.
IBM this week launched a new "LC" line of servers that infuse technologies from members of the OpenPower Foundation and are part of IBM's Power Systems portfolio of servers.
The new Power Systems LC servers were designed based on technologies and development efforts contributed by OpenPower Foundation partners—including Canonical, Mellanox, Nvidia, Tyan and Wistron.
Bottomley, maintainer of the kernel's SCSI subsystem and other code, argues that things on the Linux kernel mailing list aren't all that it's talked up to be.
Another Linux kernel developer has left, citing a toxic environment. Jack Wallen proposes the type of motivation used by the kernel devs could unmake a very precious commodity.
Folks are still discussing the resignation of Sarah Sharp and Matthew Garrett from Linux kernel development. Jack Wallen said Sharp (and Garrett) are cases of more developers being "turned away, simply because developers had no patience for personal respect." He said Linux rules with a "sharp and iron tongue" with "foul and abusive language." He agreed with Dr. Roy Schestowitz in that all this is a "PR nightmare" threatening the "flagship of the open-source movement." He placed part of the blame on what he calls the "Internet of hate" and said if Linux is to compete with Microsoft and Apple its developers need to "start treating the legions of programmers, who are working tirelessly to deliver, as well as they treat the code itself. Open source is about community. A community with a toxic foundation will eventually crumble."
The definition of “thick-skinned” in different dictionaries ranges from “not easily offended” to “largely unaffected by the needs and feelings of other people; insensitive”, going through “able to ignore personal criticism”, “ability to withstand criticism and show no signs of any criticism you may receive getting to you”, “an insensitive nature” or “impervious to criticism”. It essentially describes an emotionally detached attitude regarding one’s social environment, the capacity or ignoring or minimizing the effects of others’ criticism and the priorization of the protection of one’s current state over the capacity of empathizing and taking into account what others may say that don’t conform to one’s current way of thinking. It is essentially setting up barriers against whatever others may do that might provoke any kind of crisis or change in you.
When Matthew Garrett, well-known Linux kernel developer and ââ¬Å½CoreOS principal security engineer, announced he was releasing a [Linux] kernel tree with patches that implement a BSD-style securelevel interface, I predicted people would say Garrett was forking Linux. I was right. They have. But, that's not what Garrett is doing.
Linux Foundation head Jim Zemlin interviewed Linus Torvalds on stage at LinuxCon North America 2015. I thought it was worth sharing.
During the LinuxCon Europe and Embedded Linux Conference Europe events that took place earlier this week in Dublin, Ireland, between October 5 and 7, the non-profit organization The Linux Foundation announced the standardization of the future of the Software Supply Chain by creating the OpenChain Workgroup.
During the LinuxCon Europe event that took place in Dublin, Ireland, between October 5 and 7, 2015, The Linux Foundation non-profit organization announced that they would host FOSSology, the open source license compliance system and toolkit.
The discovery of several high profile zero-day vulnerabilities in popular open source technologies last year served not only to show the importance of open source to the Internet and IT world, but also how woefully under-resourced so many projects were
New KDBUS patches continue being published for this in-kernel IPC mechanism based on D-Bus, but it hasn't been communicated yet whether Linux 4.4 is the next target for hoping to mainline this controversial code.
Just yesterday was a set of 44 patches in attempting to cleanup the KDBUS code further. There's also been an assortment of other KDBUS patches floating around the kernel mailing list.
Lennart Poettering released systemd 227 a few minutes ago with what he describes as "lot's of new awesomeness, and many bugfixes!"
AMD sent in a batch of fixes for the AMDGPU kernel driver today for Linux 4.3. One notable change with this AMDGPU DRM driver update is that it marks the Iceland/Topaz graphics processor support as experimental so it's no longer enabled by default until the support has been better vetted.
Since this summer we've known that Canonical developers have been looking at Vulkan in regards to supporting this forthcoming graphics API by Unity 8 and Mir. Since then we've seen work done in Mir to support renderers other than OpenGL with this Ubuntu display server. As another sign of working towards Vulkan, more of Mir's OpenGL code continues to be re-factored.
Given the recent releases of FreeBSD 10.2 and NetBSD 7.0, plus the H2'2015 Linux distribution updates rolling around, I've just started work on a new BSD vs. Linux operating system performance comparison.
First up are the BSD distributions for testing... The test system being used for this comparison is an Intel Xeon E5-2687W v3 Haswell-E plus AMD FirePro system. Given the new release of NetBSD 7.0, I decided to try that out first.
When you think of Linux and graphic art tools, you probably consider Gimp or Blender to be the only available software. With that thought, you’d be very wrong. Yes, Gimp and Blender are the de facto standard tools for either image manipulation (Gimp) or Blender (3D graphics and animation), but what if you need a tool to create images from scratch?
Fotoxx is an open source photo editing program, working on Linux. It has support for the most important image formats, including JPEG, BMP, PNG, TIFF and RAW. Fotoxx is mostly used for cropping, resizing or retouching photos, without using layers, like Photoshop.
We have been informed by kornelix, the developers of the open-source and free Fotoxx image manipulation software, about the immediate availability for download of Fotoxx 15.10.
On October 8, Opera Software announced the release and immediate availability for download and testing of a new version of their Opera 34 web browser, which is currently in the Developer channel.
Guild Software has had the pleasure of announcing a new maintenance release of their popular Vendetta Online 3D space combat massively multiplayer online role-playing game (MMORPG) for all supported platforms, including Microsoft Windows, GNU/Linux, Mac OS X, Android, and iOS.
Beyond Earth – Rising Tide, the first expansion for the latest game in the Civilization series, is launching today on Linux and other platforms, and it set to greatly expand the gameplay of the original Beyond Earth.
$15 will grant you a DRM-free Linux copy of the game (plus your name in the credits), or add $10 more to it to also get the soundtrack.
Epistory - Typing Chronicles is a rather unique looking atmospheric action/adventure game, and the developers have confirmed a Linux version is coming.
It's a very popular series of games, and having all but the original on Linux is going to be a really amazing thing. Deep Silver do seem to be really rather quickly building up their Linux/SteamOS list of games.
We have just been informed by Riccardo Padovani, the creator of the Falldown face-paced and addictive game for Ubuntu Phone, that he and his team release a major update.
This weekend Storm United should finally have a new update, and the developers have told us it will include Linux too.
The new Humble Weekly Bundle: Nordic Games 3 - Nordic's Staff Picks has arrived and it's mostly about Windows-only games, but a couple of Linux-supported games can be found too for whoever is interested.
Now that Valve has made SteamOS 2.0 the official branch, the developers have also explained how they plan to upgrade the operating systems and with what frequency.
Enlightenment DR 0.20 Alpha has been released as the first step towards E20 with one year having passed since E19.
Enlightenment E20 in its current state has full Wayland support with much better, more featureful support than what's found in E19. That's why Wayland support was removed from E19 rather than for any nefarious reasons.
After reporting the other day on the immediate availability of the Enlightenment 0.19.12 open-source desktop environment, a release that dropped support for the next-generation Wayland display server, today we're happy to inform you about the development of the next major release of the project.
On October 8, Martin Gräßlin, a KDE Developer working for BlueSystems GmbH, reported on the work done for porting the modern KDE Plasma compositor and window manager to the next-generation Wayland display server.
Martin Gräßlin has shared a monthly status update about the work accomplished in recent weeks for running KDE/KWin atop a native Wayland environment without depending upon any X11 code-paths.
A month ago KDE on Wayland began running rather properly and now it's looking even better.
Season of KDE is a community outreach program, much like Google Summer of Code that has been hosted by the KDE community for seven years.
While this year's Google Summer of Code has long passed, the KDE development community is now once again starting the Season of KDE 2015 as an initiative to get new developers involved with KDE projects.
KDE Frameworks are 60 addon libraries to Qt which provide a wide variety of commonly needed functionality in mature, peer reviewed and well tested libraries with friendly licensing terms. For an introduction see the Frameworks 5.0 release announcement.
This release is part of a series of planned monthly releases making improvements available to developers in a quick and predictable manner.
The Calligra team announce availability of the Calligra Suite, and Calligra Active 2.9.8. It is recommended update that improves the 2.9 series of the applications and underlying development frameworks.
This week is really busy, first three days of Qt World Summit and now hacking away at the Kate/KDevelop sprint in Berlin.
MATE developers are currently working towards MATE 1.12. MATE 1.12 is expected to have full support for GTK3, initial support for Wayland, support for GNOME Account Servers, full support for systemd's logind, xf86-input-libinput driver support, and various other changes. The work-in-progress items can be found via the MATE-Desktop Roadmap.
Tarballs are due on 2015-10-12 before 23:59 UTC for the GNOME 3.18.1 newstable release, which will be delivered on Wednesday.
The GNOME2-forked MATE-Desktop has tagged version 1.11.0 as their newest milestone.
MATE developers are currently working towards MATE 1.12. MATE 1.12 is expected to have full support for GTK3, initial support for Wayland, support for GNOME Account Servers, full support for systemd's logind, xf86-input-libinput driver support, and various other changes. The work-in-progress items can be found via the MATE-Desktop Roadmap.
GNOME Twitch is a GNOME 3 application for watching Twitch.tv (a popular live streaming video platform that primarily focuses on video gaming) on your desktop, without Flash or a web browser.
Following up with Emmanuele’s blog posts about GTK+ being “dead” or “dying” I wanted to point out about the status of the MSVC builds for the GTK+ stack.
Today I am happy to announce we have completed work on the first couple of themes we are updating to be compatible with Moksha.
Netrunner is a Linux distribution that comes into two versions - Main version and Rolling release. Main version is based on Kubuntu and the Rolling release is based on Manjaro Linux. The new Netrunner 2015.09 has been released with a completely different look - KDE4 has been transformed to Plasma 5.2 desktop. Let's look at the complete changes in the Netrunner 2015.09 release.
Robert Shingledecker has had the please of informing us about the immediate availability for download and testing of the first Release Candidate (RC) build of the upcoming Tiny Core Linux 6.4.1 operating system.
A few minutes ago, October 10, the Manjaro Community Team, through Bernhard Landauer, was proud to announce the release and immediate availability for download of the Manjaro Linux Fluxbox 15.10 operating system.
On October 8, SUSE had the great pleasure of announcing the general availability of the SUSE Linux Enterprise Server (SLES) operating system for SAP Applications on the Amazon Web Services (AWS) cloud-computing platform.
On October 9, Douglas DeMaio wrote about the latest major snapshot released for the rolling-release edition of the openSUSE Linux operating system, Tumbleweed, which adds some of the latest software versions.
SUSE Labs is looking to hire another Linux graphics developer to be involved with Linux kernel and user-space driver development, including both X.Org and Wayland.
If you are experienced with Linux graphics driver development and want to work out of the beautiful cities of Nürnberg or Prague, this job listing may be of interest to you.
Stock analysts at Drexel Hamilton started coverage on shares of Red Hat (NYSE:RHT) in a note issued to investors on Friday, MarketBeat.Com reports. The firm set a “buy” rating on the open-source software company’s stock.
Red Hat (RHT) is Initiated by Drexel Hamilton to Buy , according to the research report released to the investors. The shares recommendation by the Brokerage Firm was released on Oct-9-2015.
Red Hat, Inc. (NYSE:RHT) has received a buy rating for the short term, according to the latest rank of 2 from research firm, Zacks. The shares could manage an average rating of 1.47 from 17 analysts. 12 market experts have marked it as a strong buy. 2 analysts recommended buying the shares. 3 analysts have rated the company at hold.
If you're fortunate enough to have a powerful 64-bit ARM board, Xen virtualization support is now available via CentOS ARM64 packages.
It is very likely that you have seen the issues we had with logging in to Fedora Infrastructure services, or other websites that use Fedora OpenID to authenticate you.
This week, another edition of LinuxCon Europe took place in Dublin and as always Fedora was there. The Linux Foundation confirmed our booth quite late, just two weeks before the event, so we didn’t have a lot of time for preparation. On the other hand, we got the stand and three passes for free which was big help because the conference is otherwise very expensive (the standard pass was ~$1000). And I’d like to thank the Linux Foundation for the support.
Fedora has updated its packaging policy to allow more software to be bundled in the Fedora repository, but not everyone is happy with this change.
GParted Live, a small bootable GNU/Linux distribution for x86-based computers that can be used for creating, reorganizing, and deleting disk partitions, has been upgraded to version 0.23.0-2 and is now available for download.
Clonezilla Live, a Linux distribution based on DRBL, Partclone, and udpcast, which allows users to do a lot of maintenance and recovery work, is now at version 2.4.2-59 and is available for download and testing.
The Ubuntu Touch platform is still using some Android bits and it looks like the developers are preparing to upgrade those components as well in the coming months.
The Ubuntu Touch OS is getting a new OTA very soon and the developers are putting the final touches on it. The update is still on track for an October 19 launch and it will remain that way if nothing goes wrong.
The rumor that Microsoft is interested in buying Canonical doesn't seem to go away, despite the fact that there is no real basis to it. We’ve already explained why that is unlikely to happen, but people still don't listen, so here are some more reasons why the rumor is perfect for April 1.
A Spice vulnerability has been found and repaired in the Ubuntu 15.04 and Ubuntu 14.04 LTS operating systems.
The SPICE protocol client and server library has been patched in the past few months a couple of times, and this is just the latest fix. It's not a major component, but users should really close any kind of exploit and vulnerability and upgrade their systems frequently.
A while back I was fitted for a tinfoil hat by some because I had the audacity — the audacity! — to suggest that it would be a shrewd business move by the now-Linux-loving Microsoft to buy Canonical because a.) Canonical had technology that Microsoft would want and need to advance in mobile (like the Ubuntu Phone technology, which blows Microsoft’s out of the water currently), and b.) by this time, Mark Shuttleworth is beyond tired of flushing millions after millions down the toilet (though, as a half-billionaire, he still has several decades of current spending before his bank account resembles, well, mine), and who can blame him?
You laughed. Well, sports fans, allow me to hand back your tinfoil hat and ask, who’s laughing now? Linux Journal’s James Darvell outlines this scenario in great detail, quoting a blog item reporting the business deal, and makes an observation worth keeping an eye on: “Microsoft could convert Canonical into a very profitable acquisition by eliminating the unprofitable parts of the company,” he writes. “In fact, it could become the dominant player in the cloud space, and secure the company’s future.”
The Ubuntu Touch OS is home to a lot of apps, but not nearly enough to satisfy the users who are coming from other platforms. Canonical is taking the long way around this problem and wants to have native apps for the OS instead of just working to port the Android ones.
We recently covered the fact that Ubuntu Touch is being ported for the famous and elusive Oneplus 2 phone, even before the port for the Oneplus One was finished. The developer promised back then that he's working on both ports, and he just delivered.
With this project, the Linux Foundation is getting another fellow: Thomas Gleixner, the long time maintainer of RTLinux, who would join the ranks of Linus Torvalds and Greg KH. Linux Foundation sponsors the work of fellows so they don't have to worry about finding 'jobs' and can keep their focus on their projects.
Linksys has launched a “WRT1900ACS” router that updates the AC version with a faster dual-core, 1.6GHz SoC, twice the RAM (at 512MB), and OpenWrt support.
In early 2014 when Linksys resurrected the hackable Linksys WRT54G WiFi router in a new WRT1900AC model, the Belkin subsidiary said the the Linux-based router would also support the lightweight, networking-focused OpenWrt Linux distribution. With the new WRT1900ACS, Linksys is making life easier for OpenWrt lovers by providing full, open source OpenWrt support out of the box.
Open source firmware is the headline feature in the newest router from Linksys, the WRT1900ACS, which features vendor-endorsed compatibility with the latest version of the Linux-based OpenWrt router OS.
The RZ/G updates the Renesas Electronics RZ line of system-on-chips, which includes the Linux-ready RZ/A1 line of single-core, 400MHz Cortex-A9 SoCs, as well as an RZ/T line that runs an RTOS on a Cortex-M4 microcontroller. The new devices are aimed at a wide range of Linux- and Android embedded products including hand-held medical devices, digital signage, and industrial, home appliance, and office equipment devices that use a human-machine interface (HMI), says the Japanese semiconductor firm.
Amazon’s new “AWS IoT” cloud IoT platform offers Starter Kits built around Linux-ready SBCs like the BeagleBone Green, DragonBoard 410c, and Intel Edison.
Amazon made its first big Internet of Things play by launching an IoT managed cloud platform for aggregating and processing IoT endpoint data, built around its Amazon Web Services (AWS) platform. Available now in beta form, AWS IoT, is being made available in the form of a series of AWS IoT Starter Kits, which bundle popular hacker boards with the AWS IoT Device SDK, and in some cases other hardware such as Grove sensors. Three of the 10 kits runs Linux, including kits for the DragonBoard 410c, BeagleBone Green, and Intel Edison (see farther below).
I believe there is only one way to avoid a debacle: mandated device upgradeability and mandated open-source licensing for device firmware so that the security and reliability problems can be swarmed over by all the volunteer hands we can recruit. This is an approach proven to work by the Internet ubiquity and high reliability of the Linux operating system.
Eric Anholt has published an updated BCM2835 KMS driver for supporting the Raspberry Pi budget SBCs with this DRM driver.
This latest Raspberry Pi KMS driver code now supports setting new video modes thanks to having a real clock driver. There's also been DeviceTree changes with this latest patch series.
CRASH Space is a 501(c)3 non-profit hackerspace in Los Angeles. Throughout the years, we've brought our members and our equipment to schools, outreach events, and tech conventions all across California. And at each event, we brought along a little donation jar for people to give to our cause. Despite the often very impressive array of tech available for show at our booth, the donation jar we brought was literally an old Cheezy-Poofs container with a little hole cut into the lid.
The LF’s new “Real-Time Linux Collaborative Project” offers better funding, more developers, and tighter integration into mainline kernel development.
Advantech’s latest 10.1- and 15.6-inch touch-panels run Linux on a dual-core Atom E3827, and offer extended temperature support and iDoor expansion.
The TPC-51WP and TPC-1551WP continue Advantech’s line of rugged touch-panel PCs, dating back to the circa-2010, Intel Atom-based TPC-651H. The new devices have a more up-to-date Atom processor: the dual-core, 1.75GHz E3827 system-on-chip that includes Intel HD Graphics. Linux and multiple Windows flavors are supported.
It’s time to have a look at the top 20 apps of last month, September 2015 in this case, to see what users has downloaded the most. WhatsApp is the number 1 app with the newly released SShare app taking second place. Lots of new apps that month: Memorable photoframes, FFX Jumper, Sniper, WallpaperDecor, Balloon shoot, Cam-FX, Mehndi Designs, Colorlight, and MP3 Player climbing into the Top 20.
I’ve been enthusiastic about Android TV ever since Google first launched the platform a year ago.
The idea of Android TV is to take all the features of Google’s Chromecast dongle and add a full TV interface on top. That way, you get a traditional remote control when you want it, along with Google-powered voice search and recommendations. The concept intrigued me enough to buy an Nvidia Shield Android TV last May, and to make it my main living room set-top box even though it was rough around the edges at launch.
Sony's Xperia Z5 has just gone on sale in the UK. Before you splash out, we find out how it compares to the current king of the Android phone market, the Samsung Galaxy S6. Read our Z5 vs S6 comparison.
People are still crazy protective of the computers and phones they use. When I wrote a piece a little while back lamenting the fact that the iPhone doesn't play nicely with Windows the way Android can, a reader said I was "cocking stupid," just as one example.
Android, Google’s mobile operating system, has matured a lot over the past year. It’s running on 1.4 billion devices (up from 1 billion last year) and its most popular app store, Google Play, has more than 1 billion active users. In the last quarter, IDC estimates that Android held 82.8 percent of the global smartphone market. As its newest iteration, 6.0 Marshmallow, rolls out, Android’s going incredibly, undeniably strong.
The Nvidia Shield is almost certainly more important to Google than it is to Nvidia. After the failure of Google TV—in part thanks to its lacklustre UI and poor developer support—its follow-up Android TV needed to do better. Unfortunately, that hasn't quite happened. Sure, Google's own Nexus Player is fine piece of hardware, and Razer's Forge TV has its charms, but neither sport the flagship specs, nor the feature set of Nvidia's sleek black box. There's no doubt that the Shield is the best Android TV device money can buy, but like all Android TV devices, it comes with a few compromises.
Smartphone pioneer BlackBerry Ltd. could leave the physical smartphone business if it fails to turn a profit in a year, to focus solely on selling secure software across mobile platforms, chief executive John Chen suggested Thursday.
When it comes to using a smartphone to make purchases in retail stores, Apple Pay has been getting most of the attention.
But Android users now have a comparable alternative. Launched earlier this month, Android Pay not only sounds like Apple's payment feature, it works a lot like it.
Several Android One devices receive their update to Android 6.0 Marshmallow in India, Indonesia, Myanmar, and Nepal. Supposing you have any one of several carrier-infused Android smartphones in your hand right this minute and are waiting for an update to Marshmallow, you may be interested to know that it's not only Nexus devices that'll be getting their software before you. This does not mean Google has betrayed you in any way, shape, or form. It means Google is making good on their promise to bring timely updates to devices - and not just the biggest and the best.
I have covered a lot of different scientific packages that are available under Linux in this space, but the focus has been on Linux running on desktop machines. This has been rather short-sighted, however, as lots of other platforms have Linux available and shouldn't be neglected. So in this article, I start looking at the type of science you can do on the Android platform. For my next several articles, I plan to include occasional Android applications that you may find useful.
Ever since Google made Android 6.0 Marshmallow official, many users have wondered, “When will my phone get the latest OS update?” Well, that largely depends on the manufacturers and carriers. Thankfully, HTC, Motorola, Samsung, Sony and T-Mobile have already announced their list of devices that will be getting the OS, though most have yet to reveal a set timeline for the update to reach these devices. Here’s what we know so far.
The Cat S40 rugged smartphone, built to take abuse in extreme environmental conditions in the workplace or daily life, is now available in the United States.
The new Android phone, which runs on GSM networks, such as T-Mobile and AT&T Wireless, sells for $399, according to an Oct. 7 announcement by Bullitt Mobile, which licenses the Caterpillar name for the device.
In conference rooms and boardrooms around the world for the last 25 years, there has been a common sight: a three-legged Polycom conference phone. Polycom is now updating that phone, as well as their other unified communications services, as part of a new wave of products announced on October 7.
We become better software developers by observing how some of the best software in the world is being written. Open source has changed and will continue to change the way the world builds software, not only by creating high-quality reusable components, but by giving us a model for how to produce better software. Open source gives us complete transparency into that process.
KNIME is an open source data analytics, reporting and integration platform developed and supported by KNIME.com AG. Through the use of a graphical interface, KNIME enables users to create data flows, execute selected analysis steps and review the results, models and interactive views.
This time last year the Computer Weekly Open Source Insider blog reported on the inaugural PentahoWorld 2014 conference and exhibition.
Day one is the first day of main event. I was late to wake up, but somehow managed to reach the venue around 8:30am. Had a quick breakfast, and then moved into the Red Hat booth. Sankarshan, Alfred, Soni were already there. I don’t know the exact reason, but the booth managed to grab the attention of all the people in the venue. It was over crowded :) While the students were much more interested in stickers, and other goodies, many came forward to ask about internship options, and future job opportunities. Alfred did an excellent job in explaining the details to the participants. The crowd was in booth even though the keynote of day one had started. I missed most of keynote as many people kept coming in the booth, and they had various questions.
With the upcoming releases of the Mozilla Firefox and Google Chrome web-browsers is support for the W3C Subresource Integrity (SRI) specification.
The Subresource Integrity feature allows web developers to ensure that externally-loaded scripts/assets from third-party sources (e.g. a CDN) haven't been altered. The SRI specification adds a new "integrity" HTML attribute when loading such assets where you can specify a hash of the file source expected -- the loaded resource must then match the hash for it to be loaded.
Microsoft tried to move users from its infamous Internet Explorer browser to a minimalist new web browser dubbed Edge following the launch of Windows 10.
But new data has revealed that Windows 10 users are reluctant to make the transition.
Google has announced a new project that could make a difference for mobile browsing. The company has launched the Accelerated Mobile Pages project (AMP), a fully open source initiative, with the underlying code available on GitHub.
Google has a plan to speed up mobile Web browsing. The recently unveiled AMP—Accelerated Mobile Pages—project is an open source initiative that restricts certain elements of HTML, CSS, and JavaScript to produce leaner Web pages "that are optimised to load instantly on mobile devices." How much quicker is "instantly"? According to Google, early testing with with a simulated 3G connection and a simulated Nexus 5 showed improvements of between 15 to 85 percent.
Firefox continues making progress on loosening web developers' and users' dependence on NPAPI plug-ins with a goal still in place to remove support for most NPAPI plugins by the end of 2016.
As it matures, OpenStack's parallel to Linux is clearer. Linux emerged 20 years ago as a somewhat exotic challenger to proprietary operating systems. Today, it is one of the most popular and widely used OSes. However, Linux still exists in a market of mixed use. It's likely that OpenStack will be subject to the same effect, becoming a viable option among a number of cloud infrastructures.
A little love, please, for Miami-based dotCMS, maker of Java open source content management system (CMS) software. Just yesterday, it was chosen as one of the 20 Most Promising Open Source Software Solution Providers by CIO Review.
Only a few weeks after entering an agreement to help Microsoft Corp. bring its namesake data center orchestration framework to Windows, Mesosphere Inc. is announcing a partnership with another major vendor hoping to secure a seat at the software-defined table. EMC Corp. sees the same promise in the startup’s technology as Redmond.
FreeNAS' Jordan Hubbard was proud to announce the other day, October 8, the release and immediate availability for download of the first Alpha build of the upcoming FreeNAS open source Network Attached Storage (NAS) solution.
In the series of questions and answers from the NetBSD-7.0 developers, we will meet Leoardo Taccari, a recent NetBSD committer, who works with this system on his desktop and maintains in this field pkgsrc packages.
The developers of the open source, BSD-based NetBSD operating system have had the great pleasure of announcing the release and immediate availability of the project's fifteenth major release.
The GnuCash Project has announced the immediate availability for download of the ninth point release for all supported operating systems, including GNU/Linux, Mac OS X, and Microsoft Windows.
Put simply this means you now have permission to adapt another licensor’s work under CC BY-SA 4.0 and release your contributions to the adaptation under GPLv3 (while the adaptation relies on both licenses, a reuser of the combined and remixed work need only look to the conditions of GPLv3 to satisfy the attribution and ShareAlike conditions of BY-SA 4.0).
Last Saturday, we celebrated the Free Software Foundation's thirtieth birthday with a party to remember.
While I was mass editing the transcripts I used to create the FSF30 wordclouds, I realized I was doing too much manual movery to get to the next misspelled word. In a moment of clarity, I was like "hey, I bet vim has a way to properly do this!" And of course it did!
Compatibility means that a person can now take a work they received under the terms of CC BY-SA 4.0 and then distribute adaptations of that work under the terms of GPLv3.
Guix-Tox is a young variant of the Tox "virtualenv" management tool for Python that uses guix environment as its back-end. In essence, while Tox restricts itself to building pure Python environments, Guix-Tox takes advantages of Guix to build complete environments, including dependencies that are outside Tox's control, thereby improving environment reproducibility. Cyril will demonstrate practical use cases with OpenStack.
While the Internet has been buzzing recently about the new FLIF image format, libjpeg-turbo developers released a new version of their JPEG library.
Libjpeg-turbo 1.4.2 is the new release and it quietly made it out at the end of September. Libjpeg-Turbo 1.4.2 features at least five known bug fixes resulting in crashes and other problems.
The report released by DHS is definitely worth a read. While focused on real problems and challenges facing use of OSS by the USG, it has very useful insights for governments around the world. It confirms my growing view, as I've written previously, that we are past some of the old debates about OSS. Instead, many governments are today increasingly focused on the "how tos" of open source choices; not "whether" to use it.
Seven start-ups from UK, Italy, France, Estonia and Austria were selected to be part of the first round of companies benefiting from the Open Data Incubator for Europe (ODINE). This two-year programme awarded EUR 650 000 in total to the companies, which can receive up to EUR 100 000 each.
ISG3D has taken to Kickstarter this month to raise $11,000 to help take their open source 3D printer design into production.
The Eleven 3D printer has been specifically designed to provide users with an affordable machine but offers an impressive 22 x 40 x 40 cm build area and is completely open source allowing for modifications and enhancements to be created.
Perl 6, a long-awaited upgrade to the well-known scripting language, has gone into beta, with the general release planned for Christmastime.
The upgrade went to beta late last month, Perl designer Larry Wall told InfoWorld on Wednesday, and the October monthly release will feature the first of two beta releases of the Rakudo Perl 6 compiler. There been having monthly compiler releases for years, but the language definition has now stabilized. Wall added, “At this point we're optimizing, fixing bugs, and documenting, and I feel comfortable saying we can take a snapshot of whatever we have in December and call it the first production release.”
Couchbase Server 4.0 is designed to give software application development pros a route to building more apps on Couchbase.
By examining just a handful of sites along the genome and determining whether they are methylated, scientists can peg sexual orientation with nearly 70 percent accuracy. That’s according to data presented today (October 8) at the American Society of Human Genetics meeting.
According to Tesla Motors co-founder and CEO Elon Musk, engineers who can't make the cut at Tesla end up at Apple, or the "Tesla graveyard," as he calls the company in an interview with German newspaper Handelsblatt, published Friday.
"They have hired people we've fired," the CEO tells Handelsblatt. "We always jokingly call Apple the 'Tesla graveyard.' If you don't make it at Tesla, you go work at Apple. I'm not kidding."
Dell Inc [DI.UL], the world's third largest personal computer maker, is in talks to buy data storage company EMC Corp (EMC.N), a person familiar with the matter said, in what could be one of the biggest technology deals ever.
A deal could be an option for EMC, under pressure from activist investor Elliott Management Corp to spin off majority-owned VMware Inc (VMW.N).
The order issued by the Jabalpur bench of the high court directed authorities in Raisen district to immediately release the five people, including three teenagers, who were arrested on July 25 on the orders of the district magistrate.
The Experian/T-Mobile hack may be more worrisome than Experian’s carefully worded description of it suggests, some security experts said Friday.
One is the co-creator of the Tor secure browser, David Goldschlag, (now SVP of strategy at Pulse Secure). Goldschlag previously was head of mobile at McAfee, and also once worked at the NSA.
I asked Goldschlag a simple question: “After the Office of Personnel Management and Experian hacks, is there reason to fear that hackers now have the means to steal actual financial information (credit card numbers, etc.) from banks or insurers?”
To do so, it is often sufficient to copy files from a Linux environment to Windows.” it further adds. The most obvious mode of attack involves luring victims to install software or updates via third-party package sources. The team conducted test by running 16 different Anti-virus solutions and splitting test session into three distinct phases,
The detection of Windows malware The detection of Linux malware and The test for false positives.
Out of 16 antivirus solutions 8 detected between 95-99% of the 12,000 Windows threat used in the test: The Anti-virus solutions that helped in detection include Bitdefender, ESET, Avast, F-Secure, eScan, G Data, Sophos and Kaspersky Lab (server version).
The cross-site request forgery vulnerability means that any user visiting a malicious page can have their accounts hijacked without further interaction.
The since-patched hole existed in Microsoft Live.com and could have been spun into a dangerous worm, Wineberg says.
However, Softpedia News noted that the Linux.Wifatch source code has not been released in its entirety. That’s likely because the White Team is worried that traditional cybercriminals would exploit the malware for more nefarious purposes. It also explains why it was a clandestine operation in which router owners weren’t aware their systems had been infected, even if it was only to defend them against black-hat attackers.
Whether or not anyone appreciates the White Team’s form of vigilante security tactics, they may believe the work should serve as a warning to those who don’t follow basic data protection procedures, Hacked said. For example, there are still untold numbers of home routers that use default passwords and leave admin access wide open to malware and other threats.
The nuclear industry is ignorant of its cybersecurity shortcomings, claimed a report released today, and despite understanding the consequences of an interruption to power generation and the related issues, cyber efforts to prevent such incidents are lacking.
The report adds that search engines can "readily identify critical infrastructure components with" VPNs, some of which are power plants. It also adds that facility operators are "sometimes unaware of" them.
Nuclear plants don't understand their cyber vulnerability, stated the Chatham House report, which found industrial, cultural and technical challenges affecting facilities worldwide. It specifically pointed to a "lack of executive-level awareness".
It just dawned on me. The extravagant market-share shown for GNU/Linux in Palau is a real “experiment”. With GNU/Linux being part of a botnet that spoofs Palau, we can see the huge boost That Other OS must get with its multiple botnets and high percentage of infected hosts
When security vulnerabilities are found in any piece of software, the ideal way to fix them is before the general public or attackers are made aware of bugs. Kurth explained that the traditional wisdom in security is to keep any type of predisclosure list for security as small as possible. In Xen's case, the project went through multiple iterations of its security disclosure process, in an attempt to keep things fair for both large and small vendors.
A convicted murderer was beaten up in a revenge attack in Wakefield Jail by Muslim prisoners because of his army service in Afghanistan, a jury was told.
Jeremy Green was a former army lieutenant whose history, and sentencing on April 7 last year for murder and attempted murder, was widely reported, said Tony Kelbrick prosecuting.
Just last year it was reported that the US State Department had been sending in fleets of specifically Toyota-brand trucks into Syria to whom they claimed was the “Free Syrian Army.”
Precisely why Russian action against Saudi Arabia’s proxy militias of fanatics is against western interests is something which nobody in the western elite seems to believe it is necessary to explain. That Russia is bad and evil and must be opposed is another one of those axiomatic beliefs of the governing elite, which they can’t bring themselves to believe the public do not wholeheartedly share. Equally they cannot quite understand why we the people do not see the necessity of backing the Saudi regime.
In 1987, three years after the National Times story, the Labor government’s treasurer, Paul Keating, introduced a system which restricted how many newspapers and television stations any one person could own in Australia. Known as the cross-media ownership rules, it allowed media proprietors to make a choice between either controlling a TV station or a newspaper in any given geographical market.
Nothing says “election season” quite like politicians dumping their long-held policy stances overboard in a desperate gambit to gain votes, but you have to hand it to Hillary Clinton. With her recently-announced opposition to the Trans-Pacific Partnership trade deal, she’s making one of the more brazen flip-flops in recent political memory.
What’s so amazing about Clinton’s newfound opposition to the highly controversial deal is the jaw-dropping transparency of the move. It’s such an open ploy to counter both the rise of staunch TPP critic Bernie Sanders and the possible entry of TPP supporter Joe Biden that it’s almost refreshing in its shamelessness.
[...]
here is absolutely nothing in either her political background or her political history to suggest that she has any real substantive problems with the deal.
Trade negotiators announced their agreement over the terms of the Trans-Pacific Partnership (TPP) on Monday, and yet the exact terms of the deal remain as secret as ever. For more than five years, we have been given a series of dubious justifications for keeping the text under close wraps. Now that it's done, there is absolutely no reason they should not release it immediately.
When we talk about trade, we often think about material goods. News articles on the subject are illustrated with images of ships weighed down with big, corrugated containers, presumed to be filled with shoes, tires, cell phones, apples. And much of the discussion of the Trans-Pacific Partnership, the trade deal announced earlier this week between the U.S., Australia, Canada, Japan, Malaysia, Mexico, Peru, Vietnam, Chile, Brunei, Singapore, and New Zealand, has focussed on the movement of such goods across borders. But on Monday, after the deal was announced, some in the tech industry were fixated on a more of-the-moment aspect of the deal: its regulation of the movement of digital information—the substance of our music streams, financial payments, online communications, and just about everything else we do on the Internet.
Digital rights advocates’ worst fears were confirmed on Friday morning after the finalized intellectual property chapter of the massive Trans-Pacific Partnership trade deal was leaked by Wikileaks, just days after talks concluded in Atlanta.
Under the agreement, it appears that internet service providers could be forced to block websites hosting content that infringes copyright.
The leaked copyright chapter of the TPP is just a portion of the text that all 12 negotiating nations agreed upon; the rest of the agreement will remain a closely-guarded secret until the full text is released in the coming months.
Superstar theoretical physicist Stephen Hawking just took a strong stance on income inequality, political lobbying and the redistribution of wealth. During a curated Reddit "Ask Me Anything" session July 27, Hawking was asked whether he saw technological unemployment — robots and computers taking human jobs — as a threat.
China launched a cross-border renminbi payments system on Thursday, a big step in its drive to boost international use of the Chinese currency and protect itself from US spy agencies with access to the Swift system.
Chinese leaders want the renminbi to rival the US dollar as a global currency for trade and investment. The “redback” is now the fourth most-used currency for global payments but its share by value remains low at just 2.8 per cent in August, according to Swift.
Ireland’s government is poised to drop a threat to increase a 150 million-euro ($170 million) annual levy on the nation’s banks, according to a person with knowledge of the matter.
In delivering the budget on Tuesday in Dublin, Finance Minister Michael Noonan is set to signal the charge will remain in force after 2016, extending its original three-year lifespan, should the ruling coalition win re-election, said the person, who asked not to be named as the final decision hasn’t been made.
In this video acTVism Munich asks Glenn Greenwald at a Press Conference in Munich his opinion on the Mainstream Corporate Media and their reaction towards the NSA disclosures brought to light by whistleblower, Edward Snowden. Furthermore, Greenwald talks about the signficance of the preparations that he undertook with Laura Poitras and Edward Snowden before they decided to go public with the highly-classifed NSA documents. The next two parts of this press conference with Greenwald will be released soon.
Well, no—because elections aren’t won by getting a lot of votes, but by getting more votes than your opponents. If Obama got many more votes than Romney among lower-income voters, as he surely did, and fewer votes than Romney among upper-income voters, then lower-income voters were, in fact, more important to his coalition.
Now, it’s true, as Edsall says, that the Democratic Party is dependent on affluent donors—and his column has some interesting things to say about how, because of this dependence, “the Democratic Party has in many respects become the party of deregulated markets.”
Donald Trump told right-wing radio host Michael Savage there would be "common sense" if Trump appointed him head of the National Institutes of Health (NIH) as president. Savage has called autism "a fraud, a racket," said PTSD and depression sufferers are "losers," advised people not to get flu shots because you can't trust the government, theorized liberals have been driven insane because of seltzer bubbles, claimed President Obama was intentionally trying "to infect the nation with Ebola," and once told a caller he was a "sodomite" who should "get AIDS and die."
At the CNN-sponsored Republican Party debate last month at the Reagan Library, one of the three panelists CNN selected to question the candidates was conservative radio host Hugh Hewitt, affiliated with the proudly right-wing Salem Radio Network.
But at Tuesday’s upcoming Democratic Party debate, CNN is not planning to include a single progressive advocate among its panel of four questioners.
It’s clear that who gets to pose questions has impact on the tenor of the debate. For example, Hewitt used September’s Republican debate to declare that President Obama’s “knees buckled” over Syria and that every Republican candidate was “more qualified than” Hillary Clinton. Hewitt pressed Jeb Bush from the right over his comment about making sure guns are not in the hands of the mentally ill: “Where does it go from what you said last week, how far into people’s lives to take guns away from them?” (Hewitt’s appearance on the CNN panel is reportedly part of an agreement by which CNN and the right-wing Salem Media company are teaming up on three GOP presidential debates.)
At CNN‘s Republican debate last month, along with Hewitt, the panel was composed of two journalists CNN presents as neutral or objective: CNN anchor Jake Tapper and CNN correspondent Dana Bash.
You cannot watch Barton Gellman’s conference presentation about the National Security Agency and Edward Snowden. Purdue University deleted the video.
Gellman gave the keynote presentation at the university’s "Dawn or Doom" colloquium in September. He was promised a link to video of the presentation afterward, but was subsequently told that, on the advice of its lawyers, Purdue was unable to publish the video at all.
What happened? In a blog post for the Century Foundation, Gellman explains: three of the slides he used during his 90-minute talk contained classified information. It's leaked information that lives on the Internet and has been viewed by millions of people, but it is classified nonetheless.
I have not heard back from Purdue today about recovery of the video. It is not clear to me how recovery is even possible, if Purdue followed Pentagon guidelines for secure destruction. Moreover, although the university seems to suggest it could have posted most of the video, it does not promise to do so now. Most importantly, the best that I can hope for here is that my remarks and slides will be made available in redacted form — with classified images removed, and some of my central points therefore missing. There would be one version of the talk for the few hundred people who were in the room on Sept. 24, and for however many watched the live stream, and another version left as the only record.
For our purposes here, the most notable questions have to do with academic freedom in the context of national security. How did a university come to “sanitize” a public lecture it had solicited, on the subject of NSA surveillance, from an author known to possess the Snowden documents? How could it profess to be shocked to find that spillage is going on at such a talk? The beginning of an answer came, I now see, in the question and answer period after my Purdue remarks. A post-doctoral research engineer stood up to ask whether the documents I had put on display were unclassified. “No,” I replied. “They’re classified still.” Eugene Spafford, a professor of computer science there, later attributed that concern to “junior security rangers” on the faculty and staff. But the display of Top Secret material, he said, “once noted, … is something that cannot be unnoted.”
This is useful since GPS-based location from android is almost always going to be more accurate than WiFi-based one (assuming neighbouring WiFi networks are covered by Mozilla Location Service). This is especially useful for desktop machines since they typically do not have even WiFi hardware on them and have until now been limited to GeoIP, which at best gives city-level accurate location.
A federal judge in the District of Columbia hearing arguments Thursday on a revived motion to block NSA phone snooping acknowledged his own concern that the program is continuing to violate millions of Americans’ constitutional rights.
But U.S. District Judge Richard Leon has not decided whether to issue a second preliminary injunction to block the collection of phone metadata in the final weeks of activity as part of the National Security Agency program.
“It’s important to get this ruling out as fast as possible,” Judge Leon said at the end of the latest hearing in conservative lawyer Larry Klayman’s challenge.
A federal judge who already ruled once against the administration of President Barack Obama and the National Security Agency in a lawsuit over the spy agency's phone record collection program is set to make another decision about the case on Thursday.
The lawsuit, brought by activist Larry Klayman in 2013, challenges the constitutionality of the NSA's phone record gathering practices. The case quickly resulted in a preliminary injunction to stop the practice by US District Court Judge Richard Leon, who said it was likely unconstitutional.
Last week, Republican presidential candidate Carly Fiorina bragged about providing truckloads of HP servers to the NSA after 9/11, at the urgent request of then-NSA-chief Michael Hayden.
In an interview with Yahoo News, she boasted about receiving a call from Hayden, after which she swiftly redirected an order of HP servers to Fort Meade. “Carly, I need stuff and I need it now,” he reportedly told her. The NSA needed the machines to implement its warrantless wiretapping program codenamed “STELLARWIND.”
Police wiretaps of their Skype conversations revealed...
Andrew "Weev" Auernheimer, the hacker who was once sent to prison for sharing 114,000 e-mail addresses of iPad users, says he has plotted a new revenge.
Weev's conviction and three-year prison term was overturned on jurisdictional grounds last year. But in an "open letter" sent today to two federal prosecutors by e-mail and posted on Twitter, Auernheimer says he will reveal private information about Department of Justice prosecutors who have attempted to cheat on their wives.
"The statements of prosecutors should be inviolate, and yet all around the country you have continually spewed nothing but lies in federal criminal cases," writes Auernheimer. "Even the most sacred personal oath that a man can take is a rotten joke to people like you: a promise of commitment to one's wife. We have located a number of US Attorneys within the Ashley Madison dataset using the resources of the taxpayer (offices, computers, paid time, and Internet connections) to attempt to cheat on their wives."
Zimmermann, who created Pretty Good Privacy, one of the world's most popular email encryption systems, said at IP Expo 2015 in London on Thursday that surveillance is getting "easier and easier" in the UK.
The country needs technologies such as phone and email encryption, but it also needs "cultural tools" that prompt citizens to change their expectations and demands and to "push back" at surveillance, he said.
Earlier this week, we wrote about the EU Court of Justice's decision that the NSA's surveillance of the internet meant that the EU-US data protection safe harbor was invalid. As we noted, there's a lot of mess in all of this, but losing that safe harbor would be tremendously problematic for the internet. And the impact could be that the NSA basically screwed things up royally for American internet companies by spying on European users. But, the issue actually goes much deeper. As that ruling recognized, the crux of the matter was dependent on the EU's Data Protection Directive. And that Data Protection Directive is about to be updated.
Usually, investigators from the National Transportation Safety Board have to guess what went wrong in such situations. But when they examined the chopper’s charred wreckage, they found a treasure in the ashes: a cockpit video recorder. The footage, from a camera mounted on the ceiling behind pilot Mel Nading, ruled out mechanical problems or ice as factors in the crash. Rather, investigators could see that Nading was confused. He allowed the helicopter to slow and start rocking back and forth, then reached out and reset the device that should show whether the craft is flying level—a decision that sealed his fate, making it “very unlikely that he would regain control of the helicopter,” the NTSB said in its report. In the dark, without an accurate reading, Nading had no way of knowing which way was up. “It really gave us the insight that this pilot was spatially disoriented,” says John DeLisi, the NTSB’s chief aviation investigator. “Without that video, we would have been looking at a pile of burned-up wreckage, trying to figure out what caused the erratic flight path that led to this crash.”
The recent European Court of Justice ruling, and the coming court cases over the next year or two, promise a second wave of post-Snowden privacy wins
He got Europe’s top court to strike down the decades-old Safe Harbour agreement between the E.U. and the U.S., an outcome that had been described as a “Doomsday scenario” by a business group talking to Fortune.
Finally, the Court observed that Commission Communications 846/2013 and 847/2013 showed that the processing of EU personal data in the US by US authorities went beyond what was strictly necessary and proportionate for the protection of national security. At the same time, concerned individuals had no means of redress to access, rectify and eventually erase their data. Finally, the Court observed that those same Commission Communications showed that the processing of EU personal data in the US on the part of US authorities went beyond what was strictly necessary and proportionate for the protection of national security: concerned individuals had no means of redress to access, rectify and eventually erase their data. The Court thus found that there was no equivalent level of protection f for the fundamental rights and freedoms guaranteed in the EU, by which the right to privacy under EU law can be derogated by the collection, storage and processing of personal data only when strictly necessary.
When the Snowden leaks first became public knowledge, we predicted that there could be long-term ramifications as a result. The intervening period has done little to quell fears. Under the auspices of General Alexander and with ample support from sealed court cases and secret White House decisions, the NSA began hoovering up data from every conceivable source. Even in situations where the NSA had the right to order companies to turn over private records, it opted for yet more spying. Now, after 2.5 years, some of the country’s we’ve spied upon are beginning to push back.
The Court of Justice of the European Union decision to strike down the transatlantic Safe Harbor agreement gives EU officials and their American counterparts a chance to start over on data protection.
The two sides should take this opportunity to hammer out a deal that fixes the inherent problems with the original arrangement in order to offer meaningful data protection that respects the rights of everyone.
But for any real movement to improve on the Safe Harbor agreement will require meaningful political reform to curb the digital eavesdropping practices at the National Security Agency as well as at spy agencies across Europe.
Senate Intelligence Committee Chairman Richard Burr (R-N.C.) and ranking member Dianne Feinstein (D-Calif.) are taking on critics of a cybersecurity information-sharing bill.
The sponsors of the Cybersecurity Information Sharing Act (CISA) hit back at opponents who have likened the measure to a "surveillance bill" on Friday.
Worse, the NSA has been spying on us for 50 years, not merely since 9/11, as its defenders often imply to excuse the agency’s evisceration of privacy. But even that revelation failed to faze us.
The Smurf Suite is comprised of apps: the Dreamy Smurf, the Nosey Smurf, the Tracking Smurf and the Paranoid Smurf. The Dreamy Smurf allows intelligence agency to turn the phones on and off. The Nosey Smurf is a microphone that can be turned on if government wants to listen to everything the owner is saying, even if the smartphone is off. The Tracker Smurf follows an individual with a greater precision than the typical triangulation of cellphone towers. The Paranoid Smurf cloaked all manifestations made by the government if something wrong happened to the phone and the user had it fixed.
Edward Snowden joined Twitter on September 29 and already has 1.37 million followers and counting. Just seven tweets by the famed NSA whistleblower almost immediately prompted George Pataki to call for Twitter to ban the account, though Twitter does not appear to be taking the bait. It’s worth noting, however, that Snowden isn’t the only whistleblower on Twitter. Here’s a rundown of 36 others.
At the time, that dormant account had a small number of followers, covered national security, and was named "Jay Snowden".
For years it has been abundantly clear that the line between AT&T and the US intelligence services is blurry at best. AT&T whistleblower Mark Klein showed us how the telco effectively uses fiber splits to clone and potentially deliver every shred of data that touches the AT&T network to the NSA. Subsequent reports have indicated that the AT&T has volunteered its employees to work as intelligent analysts, even giving the government advice on how best to skirt around privacy and wiretap laws.
Much has changed in the nearly ten years since we launched our first lawsuit challenging the NSA’s illegal surveillance of millions of Americans’ Internet communications. Over time, the defendants in the cases have changed; the legal “authority” the government has invoked to justify the program has changed; and the public’s knowledge and understanding of the programs has increased remarkably.
But, nearly a decade in, one thing has stayed remarkably constant: the relevant facts. The NSA, with the help of the nation’s largest telecommunications firms, like AT&T, has tapped the nation’s Internet backbone, searching and sifting through vast amounts of innocent Americans’ Internet communications.
Suppose for one minute that Thailand’s military government is indeed hell-bent on getting their single gateway internet and ignoring all the yes-men and politicians who deny its existence and seem to be scrambling to protect the Dear Leader from any criticism whatsoever. Undoubtedly the best description of the gateway is the interview by NBTC commissioner Colonel Setthapong Malisuwan with the BBC.
Rubel says people’s lives have been turned upside down because their communication was being monitored. He says that includes innocent people who were not involved in criminal activity. Rubel says some groups have also been monitored for no obvious reason other than their political activism.
Of course, the all-seeing, all-knowing National Security Agency was aware. And, perhaps in light of the bad publicity the NSA has garnered since the Edward Snowden revelations, the agency decided to lighten up a bit and share some love notes of its own on its website.
Given the realities of the internet age and the potential danger posed by terrorism, there will almost certainly be some trade-off between our desire for intelligence and respecting our allies’ privacy. But if our government is going to persist in its panopticon-inspired attitudes regarding electronic communications, we should expect continued resistance from those whose trade, trust, and assistance we need.
Delivering a keynote in London today, the famous inventor of PGP complained that consumers want privacy for free, forcing his company Silent Circle to focus on selling secure telephony to enterprises - while he would like to see it more widely employed.
Silent Circle, the cryptographic communications firm at which Zimmermann is co-founder and Chief Scientist, has been is business for three years, and has recently launched its Blackphone 2 model - a "reasonably secure" Android-powered smartphone.
Zimmermann, the creator of encryption program Pretty Good Privacy (PGP), said he had always felt that "secure telephony is a lot more fun than secure email."
Former National Security Agency contractor Edward Snowden on Monday told the BBC about efforts by intelligence agencies in the U.S. and the UK to take control of mobile devices using malware – and explained there "is very little" that smartphone users can do to stop them. Once they have access to the smartphone, agents or hackers can hijack a smartphone's camera and microphone to take photos, video, and audio without a user's knowledge.
The Liberal Party of Canada clarified its platform on Tuesday saying that they don't intend to give the Communication Security Establishment (CSE) any new powers to surveil Canadians.
In the Liberals' platform, released Monday, the party committed to "limit Communications Security Establishment's powers by requiring a warrant to engage in the surveillance of Canadians."
An award-winning investigative journalist at The Washington Post, Carol Leonnig, broke the story about what can be described as a Secret Service “plot” to leak confidential documents in an attempt to embarrass Congressman Jason Chaffetz, an outspoken critic of the Service. Over a dozen officials at the Secret Service knew about the plot but failed to report this illegal activity.
Instead of focusing on the unlawful leak intended to humiliate Chaffetz, government officials issued judge-less warrants for the telephone records of the “good cop” who spoke with Leonnig when his colleagues failed to follow the law.
Without your consent, and likely without your knowledge, the state of Utah has been collecting data on your children in their schools since 2010. Yea you read that right. Without you having been told or warned in any way, shape, or form, your kids have been turned in to pencil pushing statistics for the state government to pull data and information on whenever they feel like it. Thank you former governor Huntsman for doing so all in exchange for part of the stimulus package slush fund.
At the end of August Hortonworks acquired technology startup Onyara, whose secure connection software was originally created by the NSA before the outfit was spun out.
Along with the technology, Hortonworks has also acquired a number of ex-NSA staff from the 10-man outfit. Cunitz said more acquisitions are on the cards.
On a late summer afternoon at the Goethe Institut in Washington DC, visual artist Simon Menner begins to address a small group of people. Behind him, two grainy, black and white photographs of a busy street are being projected onto a screen.
"My name is Simon Menner. I'm a visual artist. My work pretty much focuses on the nature of images, how images are used and utilized - very often against us."
It's the latest in a long string of exhibit openings and lectures he's given about his research in the photographic archives of the former East German secret police, or the Stasi.
Menner's initial interest in the photographs didn't come from historical curiosity, he says, but rather the renewed dialogue about surveillance brought on by the recent NSA revelations.
The United States has an extensively complicated history with hacking, vulnerability analysis and disclosure. Some of the laws passed by them recently in regards to whistle blowing seem to directly affect how security researchers do their jobs and conduct research50 51 52.
But at the giant fair this December, artist Trevor Paglen will lead a small group on a scuba-diving expedition to the site of underwater Internet cables that have been tapped by the National Security Administration (NSA). His gallery, New York's Metro Pictures, is organizing the trip.
Obama’s position on encryption is now public, as reported by the Washington Post. According to Ellen Nakashima and Andrea Peterson of the Post, Obama “will not —for now—call for legislation requiring companies to decode messages for law enforcement.”
Instead, the Post reports, the “administration will continue trying to persuade companies that have moved to encrypt their customers’ data to create a way for the government to still peer into people’s data when needed for criminal or terrorism investigations.”
While eschewing attempts to legislatively mandate that tech companies build backdoors into their services, the president is continuing the status quo – that is, informally pressuring companies to give the government access to unencrypted data.
The dawn of Snowden has been set (again). The Oliver Stone-directed thriller will open in theaters May 13, 2016.
The East Stroudsburg University computer security degree program has been notified by the National Security Agency (NSA) and the U.S. Department of Homeland Security (DHS) of the renewal of its designation as an NSA Center of Academic Excellence (CAE). ESU is one of only five institutions in the Commonwealth to hold this esteemed accreditation.
Fault Lines investigates the fallout over the NSA's mass data collection programs in the US and abroad
Though few noticed it, wireless network provider Verizon recently announced its intent to reintroduce its highly contentious user data tracking program. Sometimes colloquially dubbed as Verizon’s “supercookie” ad network, the “Relevant Mobile Advertising” program works by injecting a hidden tracking code into user’s mobile data, allowing the wireless giant to essentially trace their customers. While traditional cookies gather basic information about web users, such as where they are generally located, how long they read or use a page and what other sites are visited — Verizon’s supercookie is substantially more intrusive.
A privacy bill that would prohibit collection of electronic data from communication service providers without a warrant in most cases, and that would effectively block an NSA data sharing program, continues to work its way through the Massachusetts legislature.
Last spring, a bipartisan coalition of 36 legislators introduced Senate Bill 903 (S903). The legislation would prohibit any Massachusetts government agency, including law enforcement, from obtaining personal electronic records from a third party provider without either a judicially issued warrant or subpoena, with only a few exceptions. This would effectively block what NSA former Chief Technical Director William Binney called the country’s “greatest threat since the Civil War.”
A Justice Department prosecutor said Thursday that ordering the immediate end of bulk surveillance of millions of Americans’ phone records would be as hasty as suddenly letting criminals out of prison.
On Tuesday, the BBC published an article laying out how ISIS has been using Telegram, a secure messaging app, to distribute propaganda online.
The militant Islamist organisation has been using a new feature in the app — the ability to make public "channels," akin to a Facebook page — to spread its message to more than 4,500 subscribers (and counting). The Yemeni branch of Al-Qaeda also apparently has a Telegram channel, as do some other terrorist organisations.
The Pentagon and U.S. Cyber Command have blocked the use of telecommunications equipment produced by the global Chinese company Huawei Technologies over cyber spying fears, according to congressional testimony last week.
Deputy Defense Secretary Robert Work was asked if the Pentagon employs Huawei equipment during an appearance before the House Armed Services Committee.
Top CIA officials may have covered up details of JFK’s assassination, according to a recently-declassified report.
The revelation comes from a once-secret document now published online at the George Washington University National Security Archive, 52 years after John F Kennedy was shot dead in Dallas.
CIA historian David Robarge alleges that CIA director John McCone was involved in a “cover-up” which concealed “incendiary” information from the official investigation into JFK’s death by the Warren Commission.
It's been nearly 20 years since a German president was received in the White House. Joachim Gauck, a dissident who organized opposition to the East German state, is calling on the US to practice the values it preaches.
German President Joachim Gauck called for a greater US commitment to easing the refugee crisis engulfing Europe, during a visit to the White House on Wednesday.
Barack Obama was, in 2008, the anti-torture candidate.
It's a sad comment on the state of U.S. democracy that such a thing ever existed. After all, it would be startling to hear appeals from a pro-oxygen or an anti-apocalypse candidate (though, of course, if the Republicans field a climate-change denier who uses the Book of Revelations as a policy guide, such a future scenario is not entirely beyond the realm of possibility).
Still, it was refreshing in 2008, after eight years on the "dark side," to hear a presidential aspirant make a clear moral statement. "We need a commander in chief who has never wavered on whether or not it is acceptable for America to torture, because it is never acceptable," Obama said in a back-and-forth with Hillary Clinton during the primary" said in a back-and-forth with Hillary Clinton during the primary.
Obama also promised to end extraordinary rendition (sending suspects to countries that specialize in torture), close the Guantanamo detention facility, and rebuild America's international reputation.
Shane reports on the United States intelligence community. Prior to his work at The Times, he wrote for the Baltimore Sun from 1983-2004, and his book Dismantling Utopia: How Information Ended the Soviet Union reflects his work as the Sun’s Moscow correspondent from 1988-91. He is also the co-writer of a six-part explanatory series on the NSA (the first major investigation of the NSA since 1982) and the subject of his own New York Times series about his relationship with former CIA officer John Kiriakou and the reporter’s role in stories involving national security.
This is the man who boldly testified to a Congressional Committee that not a single civilian had been killed by drone strikes in Pakistan. This is the man who told the press, the morning after Osama bin-Laden's assassination was announced, that OBL had shot it out with the SEALS while holding his youngest wife as a shield - all a total fabrication. This is the man who tells Americans that there is no blanket electronic surveillance of their communications. This is the man who denied ordering the hacking of the Senate Intelligence Committee's computers. When refuted, this is the man who claims that the Agency was simply retrieving its property "stolen" by the Committee's staffers.
A judge in Germany has said the country's justice minister Heiko Maas is attempting to quietly push through legislation that would criminalize whistleblowing and "would be an attack on democracy and freedom of the press".
Ulf Buermeyer, a judge at the Regional Court of Berlin and former research assistant at the Federal Constitutional Court, says Maas is attempting to push through a clause in the German criminal code that makes it an offence to receive stolen data.
On 21 September 2015, Alkarama transmitted its submission to the Stakeholder's Summary in view of the Sudan's second Universal Periodic Review (UPR) by the United Nations Human Rights Council (HRC) which is expected to be held during its 25th Session in April-May 2016. In its submission, Alkarama stressed that despite the adoption of a National Action Plan for the protection of human rights for the period 2013-2023, the situation since Sudan's first UPR review in 2011 had not changed and that torture, unfair and military trials and violations of the rights to freedom of expression and of association were still prevailing in the country.
The system hates the police and the military. The problem is the entire rotten system, not an individual. The system is rotten. It's so important to have people who oppose torture, because supporting torture will go all the way down the chain of command and to the police. We need fewer police and more Second Amendment and no torture.
Trump's formula is a joke. He doesn't really support a Second Amendment. He wants to watch a civil war. I don't want to see a civil war. I hope it can be avoided. Donald Trump wants to close down the borders, but then he also says he supports the Second Amendment, while simultaneously wanting to repeal the Fifth Amendment, and wants more police with more powers. So when I saw the news story about Donald Trump telling us which way the wind is blowing with ISIS and talking about the Second Amendment, I saw somebody who actually wants to watch a civil war take place. Like he gets some kind of sadistic pleasure over being able to engineer one.
Domain system overseer ICANN has embarked on a campaign of fear and fuzzy logic in its latest bid to seize control of the internet from the US government without agreeing to limits on its power.
The handover of the critical IANA functions from Uncle Sam to ICANN was due to happen last week, but has been set back a year to October 1, 2016 following procedural delays and extensive negotiations.
Now, ICANN warns, unless the internet community makes concessions on the controls that it wants to place on the organization's Board, the process could take even longer – and that could lead to the end of ICANN itself, as well as the United Nations taking over the internet.
Performance is a feature. For many Google applications it is the feature that makes everything else possible—instant text and voice search, directions, translations, and more. The platforms and infrastructure teams at Google are always on the leading edge of development and deployment of new performance best practices. These best practices, in turn, benefit your applications running on Google Cloud Platform.
No, actually, he absolutely did not violate trademark law by making fun of Trump's hat with his own hat. There are any number of reasons why this is the case. Essentially, all de Blasio would have to do is shout "Parody!" at anyone discussing this and the conversation is over, as parody is protected under Fair Use. But even beyond that, Trump would have to demonstrate before a court that not only is de Blasio's hat not protected as parody, but that de Blasio is using his hat in commerce in competition with Trump's hat, that the two slogans aren't distinct enough to be easily separated in the mind of a moron in a hurry, and that anyone might be confused into thinking that Trump was behind the "fair" hat. None of those are the case. And, again, parody.
Dutch Filmworks, a large movie distributor based in the Netherlands, has successfully registered the logo and word trademarks for Popcorn Time. The company used Popcorn Time's official logo for the application. Dutch Filmworks' doesn't plan to actively enforce the trademarks, but says they may play a role in future anti-piracy efforts.
Kim Dotcom and his Megaupload co-defendants don't need to hire expert witnesses in the United States, the U.S. government argued today. Refuting claims that around $500,000 is needed to mount a proper extradition defense, the Crown prosecutor argued that incriminating admissions could not be trumped by technical know-how.