We are excited to officially introduce Ignition, the next-generation machine provisioning utility from CoreOS. Those who follow along closely may have noticed that Ignition has been a part of CoreOS for the better part of a year. The project has had time to be tested and to mature, and the features and user interface are in a place where we are happy to encourage daily, heavy duty use. It’s also a good time to welcome the community to test and help improve Ignition. Before diving into the details, let’s understand why we built Ignition in the first place.
Delayed for one day, the major Docker 1.11 release of the open-source application container engine has been released today, April 13, 2016, and has been made available for download for all supported platforms.
I started Muktware some 6 years ago when I moved to Germany. I had quit my job at Linux For You magazine and I wanted to continue my journey as a journalist who covered Linux and Open Source. So I started Muktware. Back in those days I had a lot of free time to play around with Linux desktop and Muktware was a venue to share my experiences.
It was my professor who demonstrated Linux commands back in 2006 while I was doing my Engineering Diploma Course. In 2007, I’d conducted a seminar on Linux File System Hierarchy Standard (FHS) as part of the course. While doing the research for FHS, I found many interesting things about Linux and came to know about open source. Another factor that attracted me was the Linux kernel, which is written in C language and I had a good grasp on C from my college days.
Linux 4.5 seems to have got Intel's Skylake platform (ie, 6th-generation Core CPUs) to the point where graphics work pretty reliably, which is great progress (4.4 tended to lose all my windows every so often, especially over suspend/resume). I'm even running Wayland happily. Unfortunately one of the reasons I have a laptop is that I want to be able to do things like use it on battery, and power consumption's an important part of that. Skylake continues the trend from Haswell of moving to an SoC-type model where clock and power domains are shared between components that were previously entirely independent, and so you can't enter deep power saving states unless multiple components all have the correct power management configuration. On Haswell/Broadwell this manifested in the form of Serial ATA link power management being involved in preventing the package from going into deep power saving states - setting that up correctly resulted in a reduction in full-system power consumption of about 40%.
Well known Linux kernel developer Matthew Garrett who has led the charge for a number of years about UEFI/SecureBoot issues, poorly secured devices, and more, has taken aim now at Intel's latest-generation "Skylake" systems.
In particular, he says that Skylake's power management is "dreadful" and "you shouldn't buy [a Skylake system] until it's fixed." He explains on his Skylake system he can't get beyond the PC3 power-saving state even though SKL hardware supports PC8. He estimates he's burning 40% more power than necessary but none of the kernel developers seem to have a fix for being able to further reduce Skylake power consumption.
While many games are running on Wayland either natively or through XWayland (the most likely scenario right now), not all of them offer a great experience due to functional issues. One of the functionality problems right now for games being piped through XWayland is the lack of pointer/mouse warping.
For those anxious to see compute shaders for then having OpenGL 4.3 support by the RadeonSI Gallium3D driver for GCN GPUs, the latest patches have been published.
Certains actions in Bash on Windows will generate errors due to missing software packages. For instance, I got error messages relating to upstart and systemd when installing the compiler gcc and the popular version control software git. However, the software packages still seemed to install. Elsewhere online there are mentions that certain packages, such as Oracle JDK, won't install because of missing software dependencies.
Vim 7.4 is still the latest stable series for this popular text editor, but Vim 8.0 development is being worked on and as implied by the version number will see a lot of new functionality.
For those still using the FFmpeg-forked Libav project for your multimedia needs, the latest Git code has landed H.264 and MPEG4 encoders using OpenMAX IL.
I haven't yet seen any reports yet to confirm that the OpenMAX implementation is suitable, but it should be good news for those with the open-source RadeonSI Gallium3D driver stack looking to make use of the AMD VCE encoding engine using the Gallium3D OpenMAX state tracker, among other OpenMAX-supported drivers.
Just a few moments ago, April 13, 2016, Valve pushed a new Beta build of the next major SteamOS Debian-based operating system for gamers to the brewmaster_beta channel.
SteamOS 2.68 Brewmaster Beta comes three weeks after the previous Beta build, version 2.67, which added fixes to the built-in PulseAudio sound server, the GRUB bootloader, and the The Talos Principle game.
Doom & Destiny Advanced looks like a really nice 2D RPG, it's currently in Early Access and the Linux & Mac versions have recently been added.
I haven't had a chance to try it yet myself, but I have requested a key to give you some thoughts on it.
I love 2D role playing games like this, as they remind me of Nintendo DS titles I played a lot a few years ago.
Transport Fever has been announced from the same developers as Train Fever. This time you will have access to trains, aircrafts, ships, buses, trams and trucks.
Broken Dreams is a simple, yet beautiful looking 2D casual platformer. It has full voice acting as well as nice looking hand drawn environments.
Life isn't all about AAA graphics and mind bending action, sometimes you need to kick back with a casual platformer.
The developers release the Linux version only a few days ago.
The developers behind the lightweight, free, and open-source Enlightenment window manager/desktop environment have announced the release of the first Alpha build for Enlightenment 0.21.
Now that we have a Gjs profiler we can start looking at doing some fun things with it.
Today I wrote a couple line patch to GNOME Shell to toggle on and off the profiler using SIGUSR2. So if you build Gjs and gnome-shell with the appropriate patches, you can do something like...
For a small team, GNOME design generates a huge amount of work. While we try to publicise as much of it as possible, not everything gets blogged about. In this post, I’m going to present design material from our archives that hasn’t featured in a blog post previously, and which you might not have encountered before. A lot of it is for less critical applications which, while interesting and important, aren’t the core focus of our activities.
So, while Joaquim and Rob were working on the GNOME Software related bits and discussing aspects related to Continuous Integration with the rest of the crowd, I spent some time learning about xdg-app and trying to get Chromium to build that way which, unsurprisingly, was not an easy task.
Deepin OS is a revolutionary distribution. OK. I’ll stop right there; maybe that was giving a little too much credit. But I’ve got to be honest with you, nothing quite easily blows me away when it comes to Linux distributions as of late.
Deepin 15 specifically is awesome! Installer is dead simple and straight forward that even my grandma could install in on a PC.
This will be my third distribution in a row to review and by far the easiest of them to get working with out of the box. You can go through my last two reviews on Linux here.
As of this morning, April 14, 2016, the famous Arch Linux operating system has received a major kernel upgrade, Linux 4.5, which users can now install via the official channels.
Dubbed "Blurry Fish Butt," Linux kernel 4.5 was officially released exactly one month ago, on March 14, and it has been in the Testing repos of Arch Linux for quite some time now. Until today, Arch Linux was powered by Linux 4.4.5, which wasn't quite the latest version of the long-term supported kernel.
Linux kernel developer Jiri Slaby has announced the release of the fifty-eighth maintenance build of the long-term supported Linux 3.12 kernel series, as well as a modification to its EOL status.
Linux kernel 3.12.58 LTS is now available, and those running it on their Linux kernel-based operating system must update as soon as possible. And the good news is that the Linux 3.12 branch is here to stay for one more year, until 2017, because SUSE Linux Enterprise (SLE) 12 Service Pack 1 is based on it.
Arne Exton released today, April 13, 2016, a new version of his Slackware-based SlackEX Live Linux distribution, bringing updates to core components and the graphical desktop environment.
Red Hat is looking to expand their business into the Boston, Massachusetts and a version of the Red Hat logo may point where. Adam Williamson recently set up a directory where one can "easily find Fedora nightly images" and Benjamin Kerensa spoke with Vivaldi founder Jon von Tetzchner. In other news, Sasha Levin announced a new linux-stable security tree project and the Linux Foundation said the Internet is crumbling.
A day after the Business Journal reported that the Raleigh, North Carolina-based open-source tech giant was scouting sites to open a 40,000-square-foot office in Boston, a large marquee sign emblazoned with what appeared to be the Red Hat Inc. (NYSE: RHT) logo showed up in front of 300 A St. in Fort Point. Trouble is, the sign isn’t the company’s actual logo — and Red Hat disavows any involvement.
Real estate sources familiar with the matter confirmed that executives are negotiating with local landlords to lock up as much as 40,000 square feet in the city, considering space in either the Fenway, Back Bay or Seaport.
Fedora 24 and Ubuntu 16.04 families are due to release within next month or so.
Just about a month ago the Linux notes from DarkDuck blog started a poll where you could vote which of these two distributions you await more. It is time to give the results of that poll now.
It is time of the year where Debian project members should elect a new project leader. This year, only one candidate has stepped up, yours truly. As a reminder, my platform is published here.
Logic Supply is the leading industrial and embedded computer hardware manufacturer, known for creating some of the most amazing products, from thin client computers, mini and rugged panel PCs, to fanless, ventless, and dust-resistant units for IoT, virtualization, and numerous other applications.
Canonical today announced the winners of the second edition of the Ubuntu Scopes Showdown contest for mobile developers who were tempted to create some of the coolest and innovative Scopes for Ubuntu Phones.
Ubuntu Scopes Showdown 2016 contest was initially announced at the beinning of the year, when Canonical put up prizes like a System 76 Meerkat Mini PC powered by a 5th gen Intel Core i5 processor, 8GB RAM, and 120GB SSD, and, of course, the Ubuntu Linux operating system.
Overall, I’ve been very pleased with what myDevices is doing for the Raspberry Pi. Using Cayenne made the IoT learning curve much easier and I plan to keep using it with my future IoT projects. If you are curious about IoT projects and aren’t sure where to start, or have a Raspberry Pi that you aren’t sure what to do with, I recommend checking out Cayenne.
With the launch of its Software Reference Platform for ARMv8-A processors, Linaro is proud to enable both a complete end-to-end open-source server software stack and access to enterprise-class ARM-based server hardware for developers. The build for the Linaro Enterprise Group is a complete reference implementation for ARM servers, including open-source boot software and firmware implementing the ARM Trusted Firmware, UEFI and ACPI standards, a Linux 4.4 kernel, tested latest Debian and CentOS distributions, OpenStack, OpenJDK, Hadoop and Spark. A build for the Linaro Mobile Group also is available.
Logic Supply, which recently released an Intel Braswell-based CL100 Intel NUC mini-PC, announced a somewhat larger, but similarly fanless, mini-PC manufactured by Taiwan-based Cincoze. Logic Supply is distributing the DA-1000 in the U.S. starting at $569. The highly customizable DA-1000 is “our most affordable rugged computer to date,” says Logic Supply.
Intel released an open-spec development kit for its RTOS-driven Quark D2000 MCU, featuring Arduino compatibility, sensors, and a micro-USB port.
Intel’s “RealSense Robotics Development Kit” features an RPi-like single board computer based on a quad-core Atom x5-Z8350, along with a 3D RealSense camera.
The Intel RealSense Robotic Development Kit runs Ubuntu on a new, unspecified open spec, Raspberry Pi-sized, single board computer based on an Intel Atom x5-Z8350 SoC, along with 4GB RAM and 40-pin GPIO. The $250 kit includes an Intel RealSense camera and is designed for both rapid prototyping and final product integration in robotics devices.
We stand on the shoulders of giants. Matti Makkonen, the father of the mobile data industry was a true giant and many of my books are direct descendants of his teachings and of course I thank him in my books. Matti was a rare visionary who not just saw the potential of his invention, but was able to see beyond it. If you work in Information, News, Education then do work to add ‘tainment’ to what you offer - make it Infotainment or Edutainment when you do deliver mobile services. The same with advertising. Make it so good your customers ask for more, like Amazon, like iadbox, like Coca Cola, like McDonalds.
As to which of these three phones you should buy, it's not an easy choice. This is the most competitive lineup of flagship phones we've seen in a long time. The Galaxy S7 has proved popular so far for its impressive package of performance and design. The G5 is a compelling option because of its semi-modular build that offers you more flexibility than the typical smartphone. We're going to need to put the HTC 10 through our full round of testing before we pass judgment, but so far it seems to be a premium alternative for customers that want a metal unibody phone that's a bit bigger and more solid-feeling than the G5 or S7. Check back soon for a full review and buying advice.
Late last year, Facebook enhanced the performance of its Android application with a byte-code-optimizing tool called ReDex.
Now, ReDex has been open-sourced. Android developers can use the tool to optimize their own apps at no charge. They can also use it as the basis for other Android byte code optimizers.
Back in January of the year 2012, I wrote an article calling out Google for its promise for Android updates on smartphones of all sorts. Back then, Android was an ever-so-slightly different monster. Back then, Google was mad to make the bold and broad Android Update statement that was the "Android Update Alliance." Even just a few months after the Update Alliance was revealed, it was being shot down for its not-so-great results. But NOW, here in 2016, a new program could be the key to timely Android updates for everyone that wants them.
There’s also an 8-megapixel camera for selfies along with a 3D photo feature that exports animated pictures as GIFs. It’s all packed into a 190g device that’s available in a gun-metal finish, which you can personalize by having your name or a custom message laser engraved onto the side bezel.
On the heels of BlackBerry's fourth-quarter earnings, where the company reported lower-than-expected handset sales, Chen pointed toward price as the reason for underperformance. In the interview, Chen admits the Priv was "too high-end" for enterprise-focused buyers. Overall, BlackBerry reported selling 600,000 devices versus analyst expectations of 850,000 units. Shares of the company sold off 9% as investors reacted unfavorably to the news.
Fast forward a few years, and it's clear this trend toward open, collaborative development will come to permeate software development completely. As indicated by VisionMobile data, we're already seeing developer demographics skew younger and less experienced, with this new generation of developers growing up on GitHub and speaking open source as their first language.
This is a far cry from the past two decades, when open source was a religious battle at times, and enterprises were far more likely to use open source than contribute to it. As the O'Reilly survey data indicates, however, we've moved on. This willingness to reuse and contribute should lead to levels of developer productivity that we've never before seen.
Open source isn't just changing the way we interact with the world, it's changing the way the world interacts back with us. Case in point: open source robotics.
Robots are playing an increasing role in our world, and while we perhaps haven't reached the utopian future with robotic housekeepers imagined for us in the Jetsons, robotics are making advances in fields that fifty years ago would have been completely unimaginable.
That’s a longer title than I’d like, but I want to try and catch the attention of anyone who might have missed more directed notifications about this. If you’re not an SPI contributing member there’s probably nothing to see here…
Although I decided not to stand for re-election at the Software in the Public Interest (SPI) board elections last July, I haven’t stopped my involvement with the organisation. In particular I’ve spent some time working on an overhaul of the members website and rolling it out. One of the things this has enabled is implementation of 2009-11-04.jmd.1: Contributing membership expiry, by tracking activity in elections and providing an easy way for a member to indicate they consider themselves active even if they haven’t voted.
PGConf US, the largest official gathering of the PostgreSQL open source community is less than a week away. It will be held this year at the New York Marriott, Brooklyn Bridge, from April 18 - 20 (http://www.pgconf.us).
Many of us who work in the IT field are aware of the grim reality of working late at night. People often end up working long hours as they take on additional work and projects. But, is that good for you? Is it good for your organization? Is it good for your teams and clients? By doing so, are you helping your company or hurting it?
[...]
If you are continuously writing code, you will burn out. To avoid that, McNamara uses a strategy that comes from the Marine Corps: It’s a 72-hour stand. McNamara said that after 72 hours of coding, it’s time for rest, “Do not open your laptops. Go spend time with your family, as we don't want you being divorced.”
McNamara’s teams noticed significant improvements when adopting his advice, “Four days later, our guys had started to think outside the box again.” Don’t you want your teams to be thinking outside the box?
It's more important than usual to actually get your vote in — we're asking the membership to vote on changes the the X.org bylaws that are necessary for X.org to become a SPI affiliate project, instead of continuing on as a separate organization. While I'm in favor of this transition as I think it will provide much needed legal and financial help, the real reason we need everyone to vote is that we need ââ¦â of the membership to cast ballots for the vote to be valid. Last time, we didn't reach that value, so even though we had a majority voting in favor of the change, it didn't take effect. If you aren't in favor of this change, I'd still encourage you to vote as I'd like to get a valid result, no matter the outcome.
Given that PCI was introduced more than two decades ago and that PCI Express was introduced more than ten years ago, one might think that the Linux plumbing already did everything possible to support PCI.
Earlier, April 13, 2016, Google has promoted the Chrome 50 web browser to the stable channel for all supported operating systems, including GNU/Linux, Mac OS X, and Microsoft Windows.
This is an update on the Mozilla Open Source Support (MOSS) program for the first quarter of 2016. MOSS is Mozilla’s initiative to support the open source community of which we are a part.
We are pleased to announce that MOSS has been funded for 2016 – both the existing Track 1, “Foundational Technology”, and a new Track 2, “Mission Partners”. This new track will be open to any open source project, but the work applied for will need to further the Mozilla mission. Exactly what that means, and how this track will function, is going to be worked out in the next few months. Join the MOSS discussion forum to have your say.
On Track 1, we have paid or are in the process of making payments to six of the original seven successful applicants whose awards were finalized in December; for the seventh one, work has been postponed for a period. We are learning from our experience with these applications. Much process had to be put in place for the first time, and we hope that future award payments will be smoother and quicker.
Today, April 13, 2016, Mozilla finally announced the availability of the final release for the highly anticipated Thunderbird 45.0 email, calendar, and news client, for all supported platforms.
After being in development for the past few months, Mozilla Thunderbird 45.0 arrives today in its final form, trying to be in part with its bigger brother, the Mozilla Firefox web browser.
We talked briefly about Mozilla Thunderbird 45.0 about two months ago, when we first spotted the first Beta build, which, at that moment in time, promised to bring the long-anticipated GTK3 integration to Linux users.
Mozilla has released an update to the desktop email client Thunderbird that brings the version of the program to Thunderbird 45.0.
It is a major update of the application which has been on life support ever since Mozilla decided to hand over development to the community in 2012 and use freed up resources for other projects.
This week, the RDO community announced the general availability of its freely-available, community-supported distribution of OpenStack, the popular open source project for building private, public, and hybrid clouds.
The thirteenth version of the OpenStack cloud platform, Mitaka, has just arrived, and right on its heels, Google announced in a blog post that the Mitaka release includes a native option to back up OpenStack Cinder storage volumes to its public cloud.
Cinder is used in many OpenStack deployments to house virtual machine data and other data at rest. OpenStack includes a native backup driver that permits Cinder to be backed up to various storage platforms. Now, Google cloud users can choose the native backup option for Cinder as a seamless choice.
Max Bronsema is the chief architect and director of web communication technologies for Western Washington University (WWU) in Bellingham, Washington. Previously, he was the lead Drupal architect at the university, leading a small student team developing innovative Drupal solutions for the public-facing sites at WWU.
It’s 1990, or thereabouts. Linux is not even a twinkle in Torvalds’ eye and GNU is a six-year old showing real promise. An astrophysics PhD student a few years my senior is sitting at a Sun workstation enthusing about a new plotting program he’s found. It strikes me as being simple yet powerful and also a bit odd. I spend some time learning it, grow to like it and go on to use it to create all the plots in my PhD thesis. But during the late 1990s spreadsheets and other software tools became more powerful and ubiquitous and I fell into using them. However, a quarter of a century later, when writing an article for this very magazine, I stumble across gnuplot again and find, to my amazement, that it’s still being developed and it’s just as odd and useful as it ever was. So, let’s take a look at the curious beast that is gnuplot.
Spain’s Ministry of Finance and Public Administrations has published as open source Archive. This web-based solution creates archives of electronic files that are stored in compliance with the country’s eGovernment and interoperability regulations.
The European Commission is working on an open source module for the Drupal content management system that will make it easy for website editors and site contributors to create explanatory EU maps. Using the NextEuropaMap module does not require users to know Javascript, and map-creation is presented in the system’s content interface.
The policy both reaffirms and broadens a goal laid out in the Obama administration’s Second Open Government National Action Plan for improved access to custom software code developed for the federal government. The plan emphasized use of (and contributing back to) open source software to fuel innovation, lower costs and benefit the public. It also furthers a long-standing ‘default to open’ objective going back to the early days of the administration.
Stories are at the very core of YourStory. It is through stories that the world passes the lore. It was about time for stories to help languages make a grand comeback whilst inspiring the leaders of tomorrow’s world.
We will showcase a small video on the workflow of ZeMarmot Open Movie in the “Libre Graphics Culture and Practice” exhibition hosted at London Gallery West, art gallery of the University of Westminster.
The shift to a circular economy presents a wicked, multidimensional problem: how can we redesign our operating system so that it works in the long term, and reflects the current context in terms of resources, energy and economic pressures?
When something is open source, that means that all of the resources that the creators used are available for anyone else to use, either for their own projects or to customize and improve upon the work that was already done. While the concept of something being open source has traditionally been applied to software, it really didn’t take long for the term to to be co-opted for all types of new technologies and ideas. Today there are open sourced plans for hardware, open sourced scientific research, open sourced encyclopedias and even open sourced music. And now there is open sourced home furnishings, designed to be made by anyone, anywhere with easy to access technology and materials.
Everyone needs a cute robotic buddy, right? [Matthew Hallberg] created WireBeings, an open source 3D printed robotic platform. Looking like a cross between Wall-E and Danbo, WireBeings is designed around the Arduino platform. We do mean the entire platform. You can fit anything from an Arduino micro to a Mega2560 stacked with 3 shields in its oversized head. There’s plenty of room for breadboards and custom circuits.
Kite’s self-titled product acts as a sidebar that sits next to a your code editor and enables you to search for open source code that they can incorporate into your programs. It attempts to provide relevant documentation and code examples as you type and tries to spot any errors you might have made while staying out of the way, unlike Microsoft’s infamous digital assistant “Clippy.”
C vs C++ — which one is better? What is a procedural programming language and what is a modular programming language? Which one should be used for better and faster output? Well, we answer all the aspects of using C vs C++ against each other in this article.
A new Node.js Foundation survey shows full stack demand for Node.js, along with developers using it with containers and for IoT development.
The Node.js Foundation, a consortium of organizations fostering the development of the Node.js platform, today announced the results of its first Node.js User Survey Report.
Node.js is an event-driven server-side JavaScript development environment based on Google's V8 JavaScript engine. Mikeal Rogers, community manager for the Node.js Foundation, said there are more than 3.5 million Node.js users. And with an annual growth rate of 100 percent, Node.js is emerging as a universal platform used for Web applications, the Internet of things (IoT) and the enterprise, he said.
And the "left-pad" fiasco was about an "npm module". Npm is a package manager for Javascript, which is a way for developers to list web "dependencies" to include in their application. These might be files they've written, but often they're open source contributions from someone else.
Well, left-pad's developer, Azer Koçulu, was upset by a trademark dispute with another company, so he decided to pull all the modules he had made from npm. Not a big deal if no one besides you uses those modules. But left-pad is depended on by many apps and developers. And when it disappeared, it crippled apps all over the web.
Back in 2003, over 800 blog posts ago, I decided to launch something I called the Standards Blog. Not surprisingly, it focused mostly on the development, implementation and importance of open standards. But I also wrote about other areas of open collaboration, such as open data, open research, and of course, open source software. Over time, there were more and more stories about open source worth writing, as well as pieces on the sometimes tricky intersection of open standards and open source.
But, Internet, I’ve noticed a worrying trend. Both popular media and a lot of tech circles tend to assume that “emoji” de facto means Apple’s particular font.
Twitter generates 1.5 percent of traffic for typical news organizations, according to a new report from the social analytics company Parse.ly that examined data from 200 of its client websites over two weeks in January. (You’ll need to give Parse.ly your email address to access the full report.) Parse.ly’s network includes publishers like Upworthy, Slate, The Daily Beast, and Business Insider.
“Breathtaking. It took just two years for Jeremy Hunt to completely wreck our NHS,” writes Dr Eoin Clarke on Twitter.
Hundreds of patients including people with cancer and kidney failure have missed important appointments for treatment because ambulances did not arrive to take them to hospital, after privatisation of NHS non-urgent transport services in Sussex this month.
Some elderly patients have had to wait more than five hours for ambulances and been stuck at hospital for long periods after their appointments because the transport service, now run by the private firm Coperforma, has proved so unreliable.
Patients, relatives, NHS bodies and local MPs have severely criticised the service’s performance, and a trade union representing ambulance crews said it was an “absolute shambles”. The NHS organisations that awarded the four-year, €£63.5m contract have now launched an investigation.
A host of problems have arisen since Coperforma replaced the NHS’s South East Coast ambulance service (Secamb) as the provider of non-emergency patient transport services on 1 April.
Gail Cartmail of Unite the Union says their legal advice shows the EU still threatens our National Health Service – but that Cameron could fix that without the need for Brexit.
For defense against the fungal pathogens that attack crops—think the blight that bedeviled Irish potato fields in the 19th century—farmers turn to fungicides. They're widely sprayed on fruit, vegetable, and nut crops, and in the past decade, they've become quite common in the corn and soybean fields (see here and here for more). But as the use of fungicides has ramped up in recent years, some scientists are starting to wonder: What are these chemicals doing to the ecosystems they touch, and to us?
According to the USDA, the average U.S. nitrogen fertilizer use per year from 1998 to 2007 was 24 billion 661 million pounds. To produce that nitrogen, the manufacturers released at least 6.7 pounds of GHG for every pound produced. That’s 165 billion, 228 million pounds of GHGs spewed into the atmosphere every year, just for the manufacture of synthetic nitrogen fertilizer. Most of those emissions are nitrous oxide, the most damaging emissions of U.S. agriculture.
To know for sure, we need two things. First, researchers with an open mind. Second, reliable nutritional studies. Unfortunately, since forcing mental patients to be saturated-fat guinea pigs is no longer on the table, it's as hard as ever to conduct reliable studies. Still, keep in mind that the weakness of nutritional studies works both ways: all the evidence that saturated fats are bad and vegetable oil is good is pretty thin too. Go ahead and smear some butter on that toast.
The open source infrastructure of the internet is crumbling because of poor maintenance, the Linux Foundation warned today.
Likening open source to the “roads and bridges of the internet”, Linux Foundation CTO Nicko van Someren said that underpaid developers are struggling to patch dangerous bugs and keep the open aspects of the web up to date.
Security is the biggest plague of open source software, and more people are needed to work together squashing bugs and plugging holes in the code on which much of the internet relies.
That’s according to Nicko van Someren, chief technology officer at the Linux Foundation, who explained that huge swathes of the internet and companies with online business models rely on open source code, software and infrastructure.
CYBER SECURITY is the plague of open source software, and more people are needed to work together squashing bugs and plugging holes in the code on which much of the internet relies.
That’s according to Nicko van Someren, chief technology officer at the Linux Foundation, who explained that huge swathes of the internet and companies with online business models rely on open source code, software and infrastructure.
"Open source projects are the roads and bridges of the internet. Pretty much everything we do on the internet relies on open source," he said in a keynote speech at Cloud Expo in London.
After being bombarded with new malware towards the end of last year, the Linux ecosystem is rocked again by the discovery of a new trojan family, identified by security researchers as Linux.BackDoor.Xudp.
The only detail that matters is that this new threat does not leverage automated scripts, vulnerabilities, or brute-force attacks to infect users and still relies on good ol' user stupidity in order to survive.
Let's Encrypt has announced that the free secure certificate program is leaving beta in its push to encrypt 100 percent of the web.
Here's the thing though. It wasn't nearly as good as the hype claimed. It probably couldn't ever be as good as the hype claimed. This is like waiting for a new Star Wars movie. You have memories from being a child and watching the first few. They were like magic back then. Nothing that ever comes out again will be as good. Your brain has created ideas and memories that are too amazing to even describe. Nothing can ever beat the reality you built in your mind.
For April 2016 Patch Tuesday, Microsoft released 13 security bulletins, with six being rated as critical for remote code execution flaws and the patch for Badlock being among those rated only as important.
IN THE MIDDLE of intense public debate over whether Apple should be forced to help the government decrypt iPhones for criminal investigations, the company quietly closed a six-month-old security vulnerability in its Messages app. Newly published details reveal just how severe that vulnerability was, allowing the exfiltration of chat history, including photos and videos, if the user could be tricked into clicking a single malicious link.
The bug, which affected Apple’s laptop and desktop computers from September through March, highlights just how hard it is for companies like Apple to effectively secure sensitive data — even before those companies begin fielding requests from the government for special access. Tech companies like Apple are nearly unanimous in their agreement that creating “backdoors” through which the government may access protected data undermines even the most basic security measures, including those designed to protect against vulnerabilities like the Messages bug.
If you use an Apple iPhone, iPad or other iDevice, now would be an excellent time to ensure that the machine is running the latest version of Apple’s mobile operating system — version 9.3.1. Failing to do so could expose your devices to automated threats capable of rendering them unresponsive and perhaps forever useless.
More than 90 percent of corporate executives said they cannot read a cybersecurity report and are not prepared to handle a major attack, according to a new survey.
More distressing is that 40 percent of executives said they don't feel responsible for the repercussions of hackings, said Dave Damato, chief security officer at Tanium, which commissioned the survey with the Nasdaq.
"I think the most shocking statistic was really the fact that the individuals at the top of an organization — executives like CEOs and CIOs, and even board members — didn't feel personally responsible for cybersecurity or protecting the customer data," Damato told CNBC's "Squawk Box" on Friday.
The security firm said that the enemy is now more organised than ever before, and that most groups have the same kind of resources, skills and support as nation-state hacker groups.
"Advanced criminal attack groups now echo the skills of nation-state attackers. They have extensive resources and a highly skilled technical staff that operate with such efficiency that they maintain normal business hours and even take the weekends and holidays off," said Kevin Haley, director of Symantec Security Response.
"We are even seeing low-level criminal attackers create call centre operations to increase the impact of their scams."
These sophisticated hackers are often the first to embrace zero-day vulnerabilities, which increased by 125 percent in 2015 to 54.
I am in the strange position of knowing that I am on the ‘Kill List’. I know this because I have been told, and I know because I have been targeted for death over and over again. Four times missiles have been fired at me. I am extraordinarily fortunate to be alive.
I don’t want to end up a “Bugsplat” – the ugly word that is used for what remains of a human being after being blown up by a Hellfire missile fired from a Predator drone. More importantly, I don’t want my family to become victims, or even to live with the droning engines overhead, knowing that at any moment they could be vaporized.
I am in England this week because I decided that if Westerners wanted to kill me without bothering to come to speak with me first, perhaps I should come to speak to them instead. I’ll tell my story so that you can judge for yourselves whether I am the kind of person you want to be murdered.
Things have been moving fast since a momentous 60 Minutes report on the drive to declassify 28 pages on foreign government financing of 9/11. Here’s your personal briefing on all the latest developments.
Late last month, amid a spate of suicide bombings planned by the Islamist terrorist group Boko Haram in northeastern Nigeria and across the border in the far north of Cameroon, something strange happened. A vigilante force in a Cameroonian town called Limani stopped a twelve-year-old girl and a thirty-five-year-old woman who were carrying explosives, and subsequently handed them over to authorities. While they were being questioned in custody, the girl said she had been sent by Boko Haram to detonate herself, which wasn’t in itself unusual—one of every five suicide bombings that the group has staged or inspired over the past two years has been executed by children, usually young girls. But the girl also said that she had ended up with the Islamist group after it kidnapped her and more than two hundred schoolgirls in the Nigerian town of Chibok, in a mass abduction that began on the evening of April 14, 2014, two years ago this Thursday.
U.S. Secretary of State John Kerry and fellow envoys from the G7 visited Hiroshima’s Peace Memorial Park on the margins of their summit meeting this week.
Kerry was the highest ranking American government official to visit the Peace Park, the memorial dedicated to the victims of the world’s first nuclear attack on August 6, 1945.
The 15-year anniversary of the 9/11 attacks is this September, and we still don’t know the whole story.
On Sunday’s edition of “60 Minutes,” Steve Kroft looked into a gaping hole that remains in the narrative—the “28 pages.” They are the final chapter from the report of the joint congressional inquiry into 9/11, and the redacted pages are believed to offer insights into what role Saudi Arabia played in the 9/11 attacks on America.
Fifteen of the 19 hijackers were from Saudi Arabia, and the country has been considered the chief source of funding for al-Qaida for many years. Since the 9/11 report was made public on Dec. 11, 2002, Bob Graham, chairman of the Senate Select Committee on Intelligence at the time, has worked to reveal all Saudi links to terrorists, but no link has been proved.
Kroft spoke with Graham and others who want the Obama administration to declassify the 28 pages, and the former senator said he remains “deeply disturbed by the amount of material that has been censored from this report.”
Threats to police officers and their families have become increasingly common as the death toll from the gang war in El Salvador rises to the same level of violence as its bloody civil war.
Hillary Clinton is proving to be the “teflon candidate.” In her campaign for the Democratic presidential nomination, she has escaped damage from major scandals, any one of which would destroy a politician. Hillary has accepted massive bribes in the form of speaking fees from financial organizations and corporations. She is under investigation for misuse of classified data, an offense for which a number of whistleblowers are in prison. Hillary has survived the bombing of Libya, her creation of a failed Libyan state that is today a major source of terrorist jihadists, and the Benghazi controversy. She has survived charges that as Secretary of State she arranged favors for foreign interests in exchange for donations to the Clintons’ foundation. And, of course, there is a long list of previous scandals: Whitewater, Travelgate, Filegate. Diana Johnstone’s book, Queen of Chaos, describes Hillary Clinton as “the top salesperson for the ruling oligarchy.”
As the Battle of New York looms, an underground shadow war flirts with High Noon. After nearly one year, the FBI has finally investigated the treasure trove contained in Hillary Clinton’s subterranean private email server. The FBI has refused to release any records. Remember, this is a criminal investigation.
Former State Department IT official Bryan Pagliano – who essentially set up Clinton’s personal server – was granted immunity in exchange for cooperating with the FBI’s investigation. A whodunit applies on whether Pagliano was told this server might be the conduit of secret State Department communications as well as top secret National Security issues.
Hillary Clinton and CIA director David Petraeus had a brilliant idea: they would fund, arm, and train a proxy army in Syria, overthrow the regime of strongman Bashar al-Assad, and jump on the rapidly moving train of the “Arab Spring” to extend US influence in the region. What could go wrong?
Plenty.
The “Free Syrian Army” created by Washington is, today, fighting alongside al-Qaeda and its Salafist allies, filling the vacuum left behind by the “Islamic State”/ISIS as it contracts under fire from Russian war planes and the Syrian army.
In a discussion with acTVism, the renowned linguist and political commentator offers context to the seemingly endless turmoil in the Middle East.
I have no doubt that the previous government was corrupt. Corruption is the stock-in-trade of governments. But according to Transparency International, corruption in the Ukrainian government is about the same after the US-backed coup as it was before. So the intervention failed to improve anything, and now the US-installed government is falling apart. Is a Ukraine in chaos to be considered a Washington success story?
If Clinton becomes President, she will be surrounded by a neocon-dominated American foreign policy establishment that will press her to resume its “regime change” strategies in the Middle East and escalate its new and dangerous Cold War against Russia.
Leaked State Department cables revealed that the U.S. ambassador in Honduras pleaded with Clinton to call what happened in Honduras a military coup, as did members of Congress. But she refused, and worked instead to broker a deal that elected a new government that was much friendlier to multinational corporations and the U.S. military.
Americans like to forget we ever had an empire or to claim that, if we did, we never really wanted one. But the momentum of Manifest Destiny made us an imperial power. It carried us well beyond the shores of the continent we seized from its original aboriginal and Mexican owners. The Monroe Doctrine proclaimed an American sphere of influence in the Western Hemisphere. But the American empire was never limited to that sphere.
[...]
In 1893, the United States engineered regime change in Hawaii. In 1898, we annexed the islands outright. In that same year, we helped Cuba win its independence from Spain, while confiscating the Spanish Empire’s remaining holdings in Asia and the Americas: Guam, the Philippines, and Puerto Rico. Beginning in 1897, the U.S. Navy contested Samoa with Germany. In 1899, we took Samoa’s eastern islands for ourselves, establishing a naval base at Pago Pago.
[...]
From 1899 to 1902, Americans killed an estimated 200,000 or more Filipinos who tried to gain independence for their country from ours. In 1903, we forced Cuba to cede a base at Guantánamo to us and detached Panamá from Colombia. In later years, we occupied Nicaragua, the Dominican Republic, parts of Mexico, and Haiti.
In this sense, the Dutch referendum was surely the trigger for the removal of Yatsenyuk to show Europe and the world that Ukrainian leaders were trying to consolidate their power in order to proceed with deep reforms. But Kiev’s political leadership is not where the real power in the country lies.
George Bush! Who knew he was such a climate change advocate?
[...]
I continually wonder why Wall Street Journal readers enjoy paying good money to get lied to so routinely. There's almost literally nothing true about that passage above. And yet, apparently this is what the Journal's audience craves. Why?
Blistering temperatures and rainfall over Greenland have jump-started the summer melt season weeks early. On Monday, a stunning 12 percent of Greenland’s massive ice sheet was melting — “smashing by a month the previous records of more than 10 percent of the ice sheet melting,” according to the Danish Meteorological Institute (DMI).
DMI scientists were “at first incredulous.” One DMI climate scientist said, “We had to check that our models were still working properly.” But in fact, temperatures over parts of Greenland this month have been measured as high as 17.8€°C — a scorching 64€°F.
“Even weather stations quite high up on the ice sheet observed very high temperatures on Monday,” explained Robert Fausto of the Geological Survey of Denmark and Greenland (GEUS). At one “site at 1840 meters [1.1 miles] above sea level, we observed a maximum temperature of 3.1€°C [37.6€°F]. This would be a warm day in July, never mind April.”
Sometimes, it's simple. Sometimes, a newspaper editor gives their coal-baron buddy a column from which to repeatedly deny the climate science whose conclusions threaten his wealth. Or they imply the dubious claims of a report from a dodgy anti-science 'think-tank' are 'peer-reviewed'. Or they launch a smear campaign against climate scientists, trying to 'prove' that normal statistical techniques amount to 'doctoring data'.
Sanders burnishes his green scorecard with a key endorsement from one of the most pro-environment senators.
A trove of newly uncovered documents shows that fossil fuel companies were explicitly warned of the risks of climate change decades earlier than previously suspected.
And while it's no secret—anymore—that the companies knew about those dangers long ago, the documents, published Wednesday by the Center for International Environmental Law (CIEL), reveal even more about the broader industry effort to suppress climate science and foment public doubt about global warming.
Industry executives met in Los Angeles in 1946 to discuss growing public concern about air pollution. That meeting led to the formation of a panel—suitably named the Smoke and Fumes Committee—to conduct research into air pollution issues.
But the research was not meant to be a public service; rather, it was used by the committee to "promote public skepticism of environmental science and environmental regulations the industry considered hasty, costly, and potentially unnecessary," CIEL writes.
Dan Lyons’ account of his time at the software company HubSpot describes a workplace in which employees are disposable, “treated as if they are widgets to be used up and discarded.” And HubSpot is scarcely unique: The description of Amazon’s work environment is just one of many similar cases. An increasing number of companies offer snacks, foosball, and futuristic jargon to keep employees’ minds off their long hours and omnipresent economic insecurity.
AS 40,000 VERIZON workers went on strike Wednesday to protest cuts to health care and pensions, presidential candidate Bernie Sanders rallied with some of them in New York City, blasting the company’s practices.
“This is just another major American corporation trying to destroy the lives of working Americans,” Sanders told the workers, who decided to strike after failing to reach a contract. “Today you are standing up not just for justice for Verizon workers, you’re standing up for millions of Americans who don’t have a union.”
Meanwhile, Verizon CEO Lowell McAdam published a lengthy essay on LinkedIn titled “Feeling the Bern of Reality — the Facts About Verizon and the ‘Moral Economy,’” in which he called Sanders’s views “contemptible.”
Bernie Sanders' response to Verizon CEO Lowell McAdam's charge that the Democratic presidential candidate has "contemptible" views? Bring it.
Sanders on Wednesday joined striking Verizon workers on a picket line in New York City. He applauded them, saying, "Today you are standing up—not just for justice for Verizon workers—you are standing up for millions of Americans."
The Manhattan march was one of many the roughly 40,000 members of the Communications Workers of America (CWA) and International Brotherhood of Electrical Workers (IBW) unions staged on the East Coast to protest what they described as the communication behemoth's "devastating" cuts.
"They want to take away the health benefits that you have earned," Sanders said. "They want to outsource to decent paying jobs. They want to give their CEO $20 million a year in compensation," he told the workers.
In the first stories about the Panama Papers, we got the names of a bunch of politicians, a few criminals, sports and other celebrities and one or two names of rich people. But in focusing solely on this kind of person, we miss the major point about tax havens. They are used by hundreds of thousands of people, including many who are not billionaires and who are not famous or otherwise newsworthy. They are commonly used by doctors, lawyers, accountants, small business owners and those who inherited money from such people.
Here’s a chart from the New York Times showing the mix of people making up the top 1% in income in the US; the chart is from 2012 and uses 2007 data. The cut-off for this level is the Census Bureau figure of $380K, while other studies put it higher. The Fed Survey of Consumer Finances, a better survey, has it at $690K in 2007. The cut-off for the top 1% in wealth was estimated at nearly $8.4 million in 2007. Those numbers went down after the Great Crash, but recovered smartly. By 2013, the cut-off for the top 1% in wealth was back to nearly $8 million, and climbing.
Boots Riley’s recent article, posted in The Guardian, systematically dispels the myth of black-on-black crime advocated by Bill Clinton. Rather than pointing the image of failure at black people in the US, Riley insists, the mirror should be redirected to class war and the failure of liberal democracy. The condition of black people will advance with economic prosperity, not punitive drug laws.
The attempts to demean black people in the US, while specific to modern racism, has its roots in old fashioned class hatred interwoven within the fabric of western civilization.
Elizabeth Warren wants to make tax filing season simpler and cheaper for most Americans.
On Wednesday, the Democratic senator introduced a bill with seven cosponsors, including Democratic presidential candidate Bernie Sanders, seeking to make significant reforms to the Internal Revenue Service (IRS). Under the bill, Americans with simple tax obligations would have the option not to complete a tax return at all, but to instead receive a pre-prepared return from the IRS with their liability or refund already calculated for them. The IRS already gets most employer and bank information on taxpayers’ obligations — such as W2s and interest earned — so all it would have to do is calculate what they would owe for them.
The US Chamber of Commerce is an organization that's always carried a completely undeserved air of legitimacy. For one, its name makes it sound as though it's actually an extension of the federal government, rather than what it is: a lobbying group representing a variety of trade interests.
It also gains unearned legitimacy by its name being a reflection of thousands of local chambers of commerce, which are far more representative of its members than the national version. The US Chamber of Commerce continues to push for legislation and regulation that isn't aligned with the views of its membership as a whole, but rather just its most generous contributors.
The poll, conducted March 31-April 4, found that 48 percent of Americans have a favorable view of Sanders, while 39 percent view him unfavorably. Compare that with delegate leaders Trump and Clinton, whose unfavorable ratings blow Sanders out of the water. Fifty-five percent of Americans say they have unfavorable views of Clinton, while 40 percent say they have a favorable take.
His starting point was that reporters should not assume governments and corporations are telling the truth, but verify all their claims as much as possible. I wonder how many Norwegian reporters can be said to follow the principles of I. F. Stone. They are definitely in short supply. If you, like me half a year ago, have never heard of him, check him out.
Despite Western media dominance, the U.S. government wants to stop the world from hearing the “other side” on foreign disputes by “countering” or discrediting those voices, explains Jonathan Marshall.
Political strategists know well that attacks can backfire, especially for candidates with high negatives such as Hillary Clinton. Accordingly, the Clinton campaign attacked Sanders through a common political maneuver: They used surrogates.
[...]
Though as FAIR (4/7/16) pointed out, the banking issue was a red herring. (“When asked how he would break up the big banks, Sanders said he would leave that up to the banks,” economist Dean Baker wrote. “That’s exactly the right answer.”) But by Wednesday, MSNBC’s Morning Joe (4/6/16) had already picked up the Clinton campaign’s talking points. Host Joe Scarborough repeatedly tried to get Clinton herself to weigh in on whether Sanders was “unqualified” to be president. Instead of answering yes or no, she reiterated the campaign’s carefully massaged strategy: “I think he hadn’t done his homework, and he’d been talking for more than a year about doing things that he obviously hadn’t really studied or understood, and that does raise a lot of questions.”
[...]
The next move revealed the sophisticated media-handling of Clinton campaign strategists. Clinton operatives Christina Reynolds and Brian Fallon went on the offensive with, as Salon (4/8/16) put it, “sanctimonious incredulity,” saying, “This is a ridiculous and irresponsible attack for someone to make.” They complained that Clinton herself had never said such a thing, yet Sanders opened his comments with “quote, unquote.”
I know that many students disagree with Cameron’s political views. He’s too left-wing for my liking. But unlike SU politicos I don’t consider differences of opinion as a justification for censorship. Many of my fellow students today seem to lack the capacity to engage with ideas contrary to their own, to the extent that dissenting views make them feel ‘unsafe’ or ‘threatened’. These people need to get a grip on reality and realise that the world will not bow down to their fragile egos.
The Prevent Duty – which put the existing Prevent Strategy measures on a legal footing – is, ostensibly, about protecting and caring for students. It spells out the safeguards universities are required to have in place before allowing speakers on campus. When prime minister David Cameron announced the new measures in September, he said it was every public institution’s responsibility to deny all extremist ideas ‘the oxygen they need to flourish’. But, rhetoric aside, it was clear that this was aimed squarely at Islamist hate preachers.
Complaint censorship is a rising tide on YouTube, threatening to scrub the internet clean of video recorded in public, which people want to take back years later.
A New Hampshire citizen journalist recorded a public conversation on a sidewalk and posted it to YouTube (see below) where it went viral, getting over 1,000,000 views, but now someone is using complaint censorship to claim a privacy right, on a public sidewalk.
Complaint censorship uses illegitimate claims to bog down news and public interest videos on YouTube.
The one place where freedom of expression and the open mind should prevail is on college campuses, right? Isn’t that what liberal education is supposed to be about — the free and open inquiry into history, science and the arts in order to understand how humanity has understood itself for millennia?
But if that is so, why has the university become its opposite: an astonishingly illiberal institution where speech codes, “safe spaces,” and other controls of freedom of expression are intended to close down debate? Why is it increasingly a “space” where prominent people like former Harvard University President Larry Summers are forbidden to speak, where professors who buck the party line are suspended from teaching, and where some schools even try to control how people address one another in public (“Ze” and “hir” instead of Mr., Miss or him or her)?
Exactly as Böhmermann doubtless intended, this has caused a huge political stink. The broadcaster ZDF took down the video, and the German Chancellor, Angela Merkel, told Turkey's prime minister that the poem was a "deliberately offensive text" that she personally disapproved of. Most significantly, the Turkish government has filed a formal request for Böhmermann's prosecution. So what? you might ask. Germany isn't Turkey, and so surely there's no way that somebody would be prosecuted just for a few rude lyrics about a foreign leader.
The Texas Department of Criminal Justice is getting in the digital censorship game with a new policy that would punish an offender for having a social media presence, even when someone on the outside is posting updates on their behalf.
Texas is banning inmates from having any kind of social media accounts. The ban includes accounts run in their name by friends or family members. Included in the latest version of the Texas Department of Criminal Justice’s offender handbook updated April 1, the new rule prohibits all inmates from “maintaining active social media accounts for the purposes of soliciting, updating, or engaging others."
Israel’s state archivist confirms that nearly half a million pages have been sent to the IDF Censor, which has redacted historical documents that already saw the light of day, and talks about why he didn’t foresee the storm that erupted over his decision to end access to paper documents.
Julie Mora-Blanco remembers the day, in the summer of 2006, when the reality of her new job sunk in. A recent grad of California State University, Chico, Mora-Blanco had majored in art, minored in women’s studies, and spent much of her free time making sculptures from found objects and blown-glass. Struggling to make rent and working a post-production job at Current TV, she’d jumped at the chance to work at an internet startup called YouTube. Maybe, she figured, she could pull in enough money to pursue her lifelong dream: to become a hair stylist.
UC Davis contracted with consultants for at least $175,000 to scrub the Internet of negative online postings following the November 2011 pepper-spraying of students and to improve the reputations of both the university and Chancellor Linda P.B. Katehi, newly released documents show.
The payments were made as the university was trying to boost its image online and were among several contracts issued following the pepper-spray incident.
Some payments were made in hopes of improving the results computer users obtained when searching for information about the university or Katehi, results that one consultant labeled “venomous rhetoric about UC Davis and the chancellor.”
Others sought to improve the school’s use of social media and to devise a new plan for the UC Davis strategic communications office, which has seen its budget rise substantially since Katehi took the chancellor’s post in 2009. Figures released by UC Davis show the strategic communications budget increased from $2.93 million in 2009 to $5.47 million in 2015.
“We have worked to ensure that the reputation of the university, which the chancellor leads, is fairly portrayed,” said UC Davis spokeswoman Dana Topousis. “We wanted to promote and advance the important teaching, research and public service done by our students, faculty and staff, which is the core mission of our university.”
Money to pay the consultants came from the communications department budget, Topousis said.
The U.K. Department for Culture, Media & Sport is concerned about the prevalence of anal sex in online pornography. In a report on age-verification rules for British porn websites, the department frets that anal sex is not sufficiently pleasurable for women and wonders whether porn may be pressuring the poor dears into it.
So yes, a mask has slipped. The Charliephobes’ mask. Their claim to be against "punching down," to care about ordinary, vulnerable people, has been exposed as utter bunkum. In truth, they’re all about protecting a global religion, an ideology, from ridicule, and in the process they’re doing more damage to freedom and social solidarity in Europe than they could ever understand.
PRIVACY ADVOCATES SAY government officials are talking out of two sides of their mouths when it comes to cybersecurity. The latest case in point: Assistant Attorney General John Carlin calling for super-secure, hack-proof cars at an automotive conference on Tuesday, even as FBI Director James Comey continues to pressure phone manufacturers and technology companies to roll back their security to allow for law enforcement access.
“There are things you can do to mitigate the risk, protect yourselves and your companies, and ultimately, the cybersecurity of the United States,” Carlin said at the SAE 2016 World Congress conference in Detroit. “First, design with security in mind.”
But driving a car in 2016 is not totally different from using a cellphone — and protecting either of them against hacking raises the same issues. These days, dozens of networked electronic control units manage things like braking and accelerating by communicating with each other, and more and more cars are connected to the internet, or accessible via Bluetooth. Securing the conversation between your brake pedal and your brakes is a lot like securing your banking app or your intimate phone conversation.
A significant portion of the Harry Potter series is devoted to critiquing the invasions of a surveillance state.
Former state monopoly BT is on the hunt for 900 security bods to help it meet the "surge" in customer demand for those skills, following a number of high-profile security and data breaches.
Last week, we wrote about a "discussion draft" of Senators Richard Burr and Dianne Feinstein's new anti-encryption bill that would effectively require any company doing anything with encryption to make sure that encryption was flat out broken, putting everyone at risk. Feinstein and Burr's offices refused to comment on the criticism of the draft, insisting that they were still working on the bill. Well, late Wednesday Burr officially released a copy of the bill and it's basically the same insane bill we saw last week. As far as I can tell, the only real change is further defining what is meant by a "court order." It used to just say any court order, but now says only court orders for specific issues, but it's a pretty broad list: crimes involving serious bodily harm, foreign intelligence, espionage, terrorism, sexual exploitation of a minor, a "serious violent felony," or a serious drug crime. So, I guess we should feel relieved that it won't be used for cases where someone's caught trespassing or something? It's still a ridiculous bill (and it still doesn't explain what the penalties are).
The California Assembly Committee on Privacy and Consumer Protection has scuttled A.B. 1681, the anti-smartphone encryption bill that EFF has been fighting for the last few months. The bill was unable to get a second in committee, so it died without a formal vote.
A.B. 1681 was introduced in January of this year, and originally required that every smartphone sold in California have the technical ability to be decrypted and unlocked at the time of sale by the manufacturer or operating system provider. The bill was then amended to penalize companies that couldn’t decrypt the contents of a smartphone pursuant to a state court order.
The bill, both before and after it was amended, posed a serious threat to smartphone security. It would have forced companies to dedicate resources to finding ways to defeat their own encryption or insert backdoors to facilitate decryption. As a result, the bill would have essentially prohibited companies from offering full disk encryption for their phones.
This week, the Sixth Circuit Court of Appeals held, in United States v. Carpenter, that we lack any privacy interest in the location information generated by our cell phones. The opinion shows a complete disregard for the sensitive and revealing nature of cell site location information (CSLI) and a misguided response to the differences between the analog technologies addressed in old cases and the data-rich technologies of today.
In 2011, the FBI was investigating a string of robberies in and around Detroit. Relying solely on a court order, the FBI got several months of round-the-clock CSLI data on the two defendants in an attempt to link them to the crimes. CSLI are phone company records of cell phone towers your phone connects to at a given time and date. After the case was appealed to the federal appellate court, we joined the ACLU, the Brennan Center, CDT, and NACDL in arguing that acquiring this sensitive long-term, historical location information without a warrant violated the Fourth Amendment.
Dozens of nonprofit organizations, companies, and academics sent a joint letter today urging President Obama to take a strong stance against backdoors and oppose legislation that would undermine security.
The coalition effort—which included EFF, Access Now, Fight for the Future, and others— was organized after The Hill published a draft of anti-security legislation written by Senators Richard Burr (R-NC) and Dianne Feinstein (D-CA). The draft bill would create a new obligation on device manufacturers, software developers, ISPs, online services and others to decrypt encrypted data or offer "such technical assistance as is necessary" if ordered to do so by any court in the country.
There’s one more thing that is getting lost in this debate. Comey and others keep talking about the use of this for an intelligence function, as if to justify keeping this exploit secret. I know that’s the convenient part of using a terrorism case to raise the stakes of back dooring phones. But this is ultimately a law enforcement issue, not an intelligence one, no matter how much FBI wants to pretend we’re going to find out something going forward. And as such it should be subject to greater standards of disclosure than a pure use of an exploit for intelligence purposes would.
That's why last weekend more than 30 citizen watchdogs joined EFF's team to hold California law enforcement and public safety agencies accountable. Together, we combed through nearly 170 California government websites to identify privacy and usage policies for surveillance technology that must now be posted online under state law.
On January 1, 2016 two new laws went into effect in California: S.B. 34 requires agencies that use automated license plate recognition (ALPR) or access ALPR data to publish privacy and usage policies, while S.B. 741 requires public policies for cell-site simulators, a type of cellphone tracking technology often referred to as "Stingrays" and "Dirtboxes." These policies must be posted "conspicuously" on their websites.
It’s no secret that OpenMedia is worried about the use of Stingrays.
Just weeks ago, we launched a new campaign to Stop Stingray Surveillance, and almost 30,000 people have already spoken up against invasive cell phone spying.
The campaign builds on our detailed policy intervention we filed last month with the B.C. Office of the Information and Privacy Commissioner, as a part of its investigation into the Vancouver Police Department’s failure to respond to access to information requests on the potential use of Stingrays.
Well, now we’re taking the fight national.
The House is finally moving forward with updating the Electronic Communications Privacy Act (ECPA), one of the main laws protecting the privacy of online communications. This year, The Email Privacy Act (H.R. 699), which updates ECPA to ensure all of our private online messages are protected by a warrant, garnered 315 cosponsors, almost three-quarters of the entire House. This impressive number of cosponsors makes a powerful statement. And it’s why Rep. Bob Goodlatte, Chair of the House Judiciary Committee, scheduled a committee meeting on Wednesday to advance the bill.
Today, Rep. Goodlatte announced that he will be moving his own amendment to The Email Privacy Act through the House Judiciary Committee. While we would prefer the committee pass a clean version of the Email Privacy Act, we support Rep. Goodlatte’s amendment.
On Wednesday, the former Reuters journalist Matthew Keys was sentenced to two years in prison for computer hacking.
Keys, who once worked for Tribune Company-owned Sacramento television station Fox 40, left that job in 2010 and went on to copy and paste login credentials for the Tribune Company’s content management system (CMS) into a chatroom where members of the hacking collective Anonymous planned out their operations. (Keys still denies all allegations.)
An unknown person under the username “sharpie” then went on to log into the CMS and deface a Los Angeles Times article. The article’s headline and dek (the subtitle beneath the headline) remained defaced for about forty minutes before an editor noticed and changed it back.
The FBI reportedly bought a previously unknown security bug from a group of professional hackers to gain entry to the San Bernardino iPhone 5C, according to the Washington Post.
The report suggests hackers supplied at least one so-called zero-day flaw in the iPhone 5C’s security that allowed the FBI to circumvent the lockscreen and automatic wipe feature that kicks in after 10 wrong passcode entries.
The hack meant the FBI dropped its attempt to force Apple to create software to unlock the iPhone 5C, which the company said would put all iPhones at risk.
The FBI has already clarified that the hack bought for a one-time-fee cannot break into newer iPhones, including the iPhone 5S or later, but the hack could affect any iPhone 5C or older, including the iPhone 5 and 4S.
A key House panel voted Wednesday to pass an email privacy bill that would stop the government from being able to read Americans' old emails without a warrant.
The House Judiciary Committee voted 28-0 to approve the Email Privacy Act, a bipartisan bill that would replace a 1986 law that allows government investigators to peruse emails at will if the communications are at least six months old. The bill would require federal officials to obtain a warrant before they can read or view emails, texts, photos or instant messages — regardless of when the data was sent.
ISPs and cable companies already track and sell your online behavior, your location data, and effectively everything you do on the Internet (to the second). Now broadcasters and app developers are cooking up a new technology that uses so-called "smart audio beacons" emitted during television programs to help track user viewing habits. These tones, inaudible to the human ear, are picked up by applications which use your smartphone or tablet microphone to listen and record them. That data can then be used to build a profile that potentially matches your existing online data with your viewing habits.
The novel solution is for the NSA to exploit "raw capitalism," and to "throw money at the problem" by playing the role of a friendly local venture capitalist that wants to turn the idea into a company. At the same time, the NSA finds a relevant patent held by one of its "friends" in the industry, and then asks those friends to send around their patent lawyers to the new startup it is funding, to get it shut down in a perfectly non-suspicious way.
In this edition of the Irari Report, Ira Winkler and Araceli Treu Gomes continue their interview of Chris Inglis, former Deputy Director of NSA. In this segment, they focus on how an organization that is so aware of the insider threat can be compromised by a person like Edward Snowden.
Inglis highlights how trust is critical to function, but verification must be implemented. This relies upon a stringent screening process, as you have to extend to trust to the people you hire. While Snowden was one traitor among 250,000, the damage one person can cause is clear, and it must be accepted as an eventuality.
Princess Elizabeth Way - one of the main routes to GCHQ and Gloucester through Cheltenham is to be resurfaced later this month – and motorists have been warned of delays.
The FBI's Inspector General has released a report on the New Jersey FBI branch's Computer Forensics Laboratory. For the most part, the report is positive and shows this branch tends to handle its forensics work competently. The problem comes when it opens up its tools up to local law enforcement.
On 29 February 2016, the European Commission and the US government released the details of the proposed EU-U.S. “Privacy Shield”. The “Privacy Shield” replaces the now defunct so-called “Safe Harbor”.
The Privacy Shield is in fact a significant number of documents from various parts of the U.S. administration, which merely outline the existing, weak U.S. safeguards applicable to personal data of EU citizens. These documents are meant to serve as the basis for an “adequacy” decision by the European Commission that the U.S. has a data protection regime that is essentially equivalent to that applicable in the EU. In making that decision, the European Commission must also review issues related to government surveillance and consumer data protection.
Last month Privacy International joined other European and American NGOs in expressing concerns that the “Privacy Shield” will put users at risk, undermine trust in the digital economy, and perpetuate the human rights violations that are already occurring as a result of surveillance programs and other activities.
We have now analysed in detail the government surveillance aspects of the proposed personal data transfers arrangements, and have found the shield isn’t operational.
The use of sniffer dogs at Manchester Airport has been criticised after dogs there failed to discover any Class A drugs in a seven-month period.
But one dog, trained to detect illegal animal products, often found "small amounts of cheese or sausages" carried by holidaymakers, a report said.
The review, by the Independent Chief Inspector of Borders and Immigration, assessed border checks at the airport.
I very much hope that Helen Clark becomes the new UN Secretary-General.
[...]
For these reasons Clark is not the preferred candidate of the US or UK governments for the Secretary General position. But her independence does mean she is ultimately acceptable to Russia and China, whose agreement is essential as the appointment is confirmed by the Security Council. The Russians in particular feel they made a mistake in agreeing to the disappointing Ban Ki-Moon last time.
Footage of a private meeting with local leaders before Bernie Sanders’ rally at Marist College in Poughkeepsie, N.Y., on Tuesday provides insight into how he might work with grass-roots activists to pursue a national populist agenda.
Sanders spoke directly with Dutchess County Democratic legislators Francena Amparo and Joel Tyner, labor leaders and activists about issues of immigration, economic fairness and climate change. Cheers from the crowd nearby erupted intermittently.
“I just want to thank you for your strong opposition to … fossil fuel infrastructure,” one woman said. “We are fighting the first crude oil pipeline project in New York State in over 100 years, and we need you.”
The police chief said he was happy with the cameras but dismayed with what he felt were excessive requests for footage from suspects and their lawyers.
Poor Sprint. Ever since T-Mobile became the darling of the wireless industry simply for treating consumers well (ingenious!), Sprint hasn't quite known what to do with itself. After T-Mobile leap-frogged Sprint to become the nation's third-largest carrier last year, Sprint has been trying desperately to convince customers that hey, it's really cool too. But Sprint has found it hard to shake the image that it's little more than a decidedly unhip copycat with a less competent network. A lot of Sprint's PR struggles have been thanks to the fact that it hasn't been easy keeping up with T-Mobile's foul-mouthed, hipster-esque CEO, John Legere.
Verizon has reportedly switched 1.1 million customers from copper to fiber lines over the past few years under a program it calls "Fiber Is the Only Fix." But some phone customers have refused the switch to fiber because they prefer to keep their copper lines—even though Verizon apparently is refusing to fix problems in the copper infrastructure.
The Philadelphia Inquirer reports that it obtained internal company documents that describe the effort to switch problematic copper lines to fiber. Verizon customers with copper-based landline phones who call for repairs twice in 18 months "will be told that their 'only fix' is to replace decades-old copper line with high-speed fiber as Verizon won't fix the copper," the report said.
President Obama has long been a vocal supporter of net neutrality, the idea that all content on the internet should be equally accessible—and now he’s backing up his principles with policy.
In a "Statement of Administration Policy" released Tuesday, Obama signaled that he intends to veto Republican-backed legislation that open internet advocates say could eviscerate federal net neutrality protections.
Earlier this year, a GOP-controlled House subcommittee approved the "No Rate Regulation of Broadband Internet Access Act," (H.R. 2666) which net neutrality supporters say could severely undercut the Federal Communications Commission’s ability to police the nation’s largest cable and phone companies.
The FCC’s 2015 Open Internet Order was the culmination of years of net neutrality advocacy and a big step toward a free and open Internet. This week, a vote in Congress could undo a lot of that work.
H.R. 2666, the No Rate Regulation of Broadband Internet Access Act, might sound good in theory, but in practice, it could seriously undermine the FCC’s ability to protect the open Internet.
As Facebook has expanded its video ambitions, YouTube creators have cried foul about “freebooting,” or the practice of stealing a YouTube video and posting it on Facebook without permission. Facebook finally seems prepared to take the issue seriously now that media companies and celebrities are embracing Facebook Live, the company’s new broadcasting tool. Facebook is rolling out a new rights management system that will let creators upload reference videos so that duplicates are automatically flagged and, hopefully, removed much faster.
A study commissioned by the World Intellectual Property Organization to analyse which essential medicines on the 2013 World Health Organization Essential Medicines List were under patent found that over 90 percent of medicines on the list were off patent, and advocated more transparency in patent information. The study’s release set off an outcry among public health advocates who viewed the report as biased toward pharmaceutical companies.
Brazil said the statement made by a WIPO representative during a presentation briefing in February caused great concern because it apparently questioned the High Panel’s mandate (IPW, Public Health, 1 February 2016).
AS&E argued that Rapiscan infringed the patent. During trial Rapiscan admitted it had committed the acts, but that the patent was invalid. Rapiscan argued that the patent was obvious on the basis of a paper by Roderick Swift entitled "Mobile X-ray Backscatter Imaging System for Inspection of Vehicles" published on 19-20 November 1996 in the Proceedings of the SPIE conference ("Swift"). The Swift article introduces AS&E's MobileSearch system, which at that time was a prototype, and provides background for AS&E's earlier CargoSearch system (a system for inspecting vehicles crossing the border from Mexico to the US). CargoSearch was a mixed transmission and backscatter system. The vehicle or target was then towed slowly through the scanning area at a fixed speed. MobileSearch was a combined backscatter and transmission system (Swift explains that the prototype was designed only to include backscatter but could be upgraded to provide transmission imaging). Swift describes the objective of the prototype of being a fully mobile, self contained large-scale system. The occupants of scanned vehicles are required to exit before a scan is started. This very much removes the "covert" element needed to tackle security threats.
The following post from former Guest Kat Valentina Torelli explores the question of having to prove use as part of an opposition proceeding and the differences of opinion between the courts in ruing on this challenging question.
Sports sponsorship is big business, and can bring benefits to both the brand owner and the endorser. Nisha Kumar discusses how you can minimise the damage when things go wrong
This article summarises some of the more noteworthy Canadian trademark law decisions and developments from 2015.
It's political season here in America, which means that it's time for everyone to disagree as violently as possible and to such a degree that all conversation is at an impasse. You know, basically just like every other time in America, except now we televise this stuff because the brains of our citizenry might still have a little meat left on the bone that can be melted away through "debates." But two companies are bucking that trend in a way readers here might not expect: two breweries are dealing amicably with having come up with politically-themed beer brews named very similarly to one another.
Thirsty Dog Brewing in Ohio had recently announced its latest beer, Unconventional Ale, named after the RNC convention set to take place in Cleveland. The convention is of course gaining even more attention than usual this presidential cycle, mostly because reports on the machinations of the party suggest it might be exactly the best kind of shit show to watch from the outside. That notoriety explains why Platform Beer Co. too had announced it was releasing a new brew, entitled UnconventionAle. So the names are similar to the point of being nearly identical. I'm sure you're already bracing for the nasty threats and legal filings. But no, these two breweries have managed to do what our politicians won't: talk to each other.
Last week, the Fifth Circuit Court of Appeals overturned an injunction issued by a federal district court judge last year. The injunction would have prevented Mississippi Attorney General Jim Hood from enforcing his massively large and demanding administrative subpoena against Google. The injunction would also have prohibited the Attorney General from bringing civil or criminal charges against the company for making third-party content accessible to Internet users.
Piracy is not killing the movie business. According to the MPAA's Theatrical Market Statistics report the industry has just turned in a record year, with $38.3b taken at the box office. Meanwhile, MPAA chief Chris Dodd is set to meet Napster founder Sean Parker, whose Screening Room threatens to upset box office revenues......
Last year, after a bunch of YouTube video creators started slamming Facebook for allowing people to re-upload their videos to Facebook (they called it "freebooting"), Facebook insisted that it, too, was building a ContentID-like system to automate the process of taking down videos based on infringement claims. Last fall, the company announced that it would be using the same system basically everyone other than Google uses: Audible Magic as the backend system of that tool. And now Facebook has officially announced its product, called "Rights Manager."
This isn't surprising, even if it is a bit disappointing. Led Zeppelin has long been accused of copying others songs, and there are actually a bunch of videos on YouTube detailing examples.
As we've been discussing, the FCC has started working more seriously on opening the cable set top box to real competition. As it stands, 99% of consumers currently pay about $231 annually in rental fees for aging hardware that's often worth about half that much. The FCC's goal is ultimately to let consumers access cable content using the hardware of their choice, creating a healthy new competitive market, and by proxy better hardware at lower prices. But monthly set top box rental fees represent $20 billion in annual revenue to cable providers, which is why they've been having a hissy fit about the FCC's plan.