Are physical keyboards for mobile devices making a comeback? TCL and BlackBery just launched a new phone with a QWERTY keyboard. A keyboard module for the Moto Z smartphone is generating some buzz. And an Indiegogo campaign for a 7 inch, pocket-sized Windows notebook has raised over $1.7 million (so far).
Now the folks at UK-based Planet Computers want to bring back the idea of a small, clamshell computer. And they’ve partnered with the designer of the classic Psion Series 5 to do it.
Are you a bit tired of the same old options of salt and pepper, meaning having to choose only between the venerable Windows and MAC computer operating systems?
Looking to branch out a bit, maybe take a walk on the wild side, learn some new things and save money?
If so, the Linux operating system, which has been around for a long time and is used and loved by many hard-core techies and developers, may now be ready for prime time with the masses.
We are now through week one of two for the Linux 4.11 kernel merge window. I've already written a number of news posts this past week covering features I find interesting for Linux 4.11. If you are short on time and behind in your Phoronix reading, here's a quick overview of the material so far for this next major kernel bump.
CentOS developer and maintainer Johnny Hughes announced the availability of an important Linux kernel security update for all users of the CentOS 5 operating system series.
The CentOS Errata and Security Advisory 2017:0323 has been marked as important, and it urges users to update their CentOS 5 installations to either kernel-2.6.18-419.el5, kernel-PAE-2.6.18-419.el5, or kernel-xen-2.6.18-419.el5, which are available for both 32-bit (i686) and 64-bit (x86_64) machines, along with the source package.
Alexandre Oliva from the GNU Linux-libre project, a non-profit organization chartered to develop and promote a deblobbed and libre Linux kernel, announced the general availability of GNU Linux-libre 4.10.
Linux kernel developer Ben Hutchings announced today the availability of two maintenance updates for the long-term supported Linux 3.16 and 3.2 kernel series.
Linux kernels 3.16.41 and 3.2.86 are now available for download if you're using a GNU/Linux operating system powered by any of these long-term supported (LTS) branches. However, they are small patches that include minor changes to the networking and filesystems areas.
It's going on five years since there was the call for deprecating FBDEV within the mainline Linux kernel and various ongoing efforts to get more drivers to making use of the Direct Rendering Manager (DRM) rather than FBDEV. But with Linux 4.11, FBDEV still remains in place.
David Airlie sent in another pull request of DRM material for Linux 4.11, which follows last week's main DRM feature update for Linux 4.11.
For many months now there has been vkQuake as a port of Quake 1 to Vulkan while now there is a port of that pulling in SteamVR support.
If you want to relive Quake 1 in virtual reality, vkQuakeVR is a project you will want to watch. vkQuakeVR that is a fork of vkQuake, which in turn is based on QuakeSpam. The Vulkan implementation is the same as what vkQuake provides, but vkQuakeVR is tieing in SteamVR / OpenVR support.
While most are focused on the OpenXR VR announcement from The Khronos Group as well as the new Vulkan extensions, less people seem to be talking about their call for participation around a new "3D Portability Initiative", which if it succeeds could be a win for Linux gamers and others.
The Khronos Group not only is shipping Vulkan 1.0.42 with many new extensions for this week's GDC but the embargo just expired on even more exciting announcements!
mesa-17.0.0-3 can now be installed side-by-side with nvidia-378.13 driver without any libgl/libglx hacks, and with the help of Fedora and upstream xorg-server patches.
Thanks to the work done in part by Fedora, Arch Linux has enabled in testing support for the GLVND-enabled Mesa that can happily co-exist alongside the NVIDIA proprietary driver.
Links is an open source text and graphical web browser with a pull-down menu system. It renders complex pages, has partial HTML 4.0 support (including tables and frames and support for multiple characters sets such as UTF-8), supports color and monochrome terminals and allows horizontal scrolling.
It’s very useful for low resources computers because day by day the web pages are bigger and heavier. If your computer doesn’t have a suitable performance you’ll have some mistakes while you’re surfing. So, Links is much faster than any common web browser (with GUI) because it doesn’t load all the content of a website, for example, videos, flash, etc.
System optimizer apps are quite the thing on platforms such as Windows and Android. Their usefulness, however, is debatable considering how notorious they are when it comes to using system resources.
On the Linux platform, however, we can almost always find the applications, a developer puts their time in developing to be mostly useful.
Stacer is one such app created to better optimized your Linux PC in the sense that it packs quite the list of features you’d normally expect from an optimizer and more to give your system a refresh whenever you feel the need.
Each Desktop environment has the own launcher and doing their job nicely but it take a while to launch the application whenever we are searching. Ulauncher is a lightweight application launcher that loads instant search results, usese low resources, and remembers your previous choices and automatically selects the best option for you.
It’s written in Python and uses GTK as a GUI toolkit. When you are typing wrong application name, after few words or spelling, it will figure out what you meant. Use Ulauncher to open your files and directories faster with fuzzy search. Type ~ or / to start browsing. Press Alt+Enter to access the alt menu.
I always have quite a bit on my pending list to read - academic papers, blogs, planets, and the sort. Usually, when I go through the planets, such as the Fedora, GNOME or the two neuroscience planets I use - neuroscience, neuroscientists, I don't have the time to read all the articles right then. I used to either bookmark links, or note them down somewhere to read later. One day, though, I ran into Pocket, which lets you save the article to read later and makes it available to you on multiple devices. It's extremely convenient.
Of course, the one issue with Pocket is that it isn't Free software. So, like I do, I went looking for an alternative. After a few hours, I ran into Wallabag on Github. It's written in PHP, and is licensed under the MIT license. It's quite easy to deploy, and there's a Gitter channel where you can get some help too.
More than 40% of software developers use the massively popular software development tool Git as their primary source control tool. Those new to the Git fold who are looking for a professional, up-to-date guide to get them rolling have a new resource in Brent Laster's new book Professional Git.
Though social media has reduced the need of sending emails but still for almost all professional reasons we send emails. Our emails are the online letters and contain useful information hence the information must be protected. In this article, we'll discuss how we can send encrypted emails in Linux
The Wine maintenance release 1.8.7 is now available. This is the final release in the 1.8.x series.
The Wine development team announced today the release of Wine 1.8.7, which appears to the last maintenance update to the Wine 1.8 stable series, adding various improvements and bug fixes for existing users.
Before we dive ourselves into the changes implemented in Wine 1.8.7, you should be aware of the fact that if you're still using the Wine 1.8.x series of your GNU/Linux operating system, it is highly recommended that you prepare to upgrade to the new Wine 2.0 release (not Wine 2.1 or 2.2 because those are development releases).
I spoke to inXile about requesting a Linux review key and they sent me on to the publisher, Techland. The good news is that they've agreed to supply a key. The bad news is that there was no Linux version available before release, so it will take me a short while to get even a basic report out on it.
Awesome news to start the day, not only is Torment now available, but it seems like Telltale's 'The Walking Dead' [Steam] may be heading to Linux.
The beat 'em up River City Ransom: Underground [Steam] has officially launched with the promised day-1 Linux support. So far it seems the reviews are positive.
I've been testing out SteamVR on Linux with the HTC Vive the past few days. From my time spent and trying out various graphics cards with Destinations, Dota 2, and Serious Sam VR: The First Encounter, my impressions is that for this Linux VR beta at least a GeForce GTX 1070 or GTX 1080 is really needed for good performance.
I had to rub my eyes a bit at this, Eschalon: Book I is officially 10 years old! It is also now completely free to download and play. Officially, it hits 10 years in November, but the developer wanted to put it up for free a little early.
I tested it out, as I was keen to see what's so different about their combat system and see if it lives up to that claim.
Honestly, it doesn't really seem all that different to other turn-based battle systems. You start by summoning creatures and you can re-summon them to attempt to heal them, but this is all based on dice rolls. You might end up summoning three, you might end up with one. This whole system feels unfair to the core.
Beat Cop is a new adventure game from 11bit studios and Pixel Crow and it will arrive on March 30th with day-1 Linux support.
Which means it should hopefully work on Linux too, but no word on that yet.
Now that Vulkan 1.0.42 is public and it contains the extensions needed for SteamVR on Linux, the RADV changes are now public.
Linux is all about what you want and having it from the ocean of free and open source software. The same applies while performing a comparison of desktop environments as they comprise of different applications and a GUI via which the user interacts with the operating system. There are many options available and our list of best Linux desktop environment and their comparison includes the likes of KDE, Cinnamon, Xfce, etc.
We take a look at GNOME Night Light, a blue light filter that is included in the GNOME 3.24 desktop and adjusts the color temperature of the display.
As I mentioned in my previous post about the New Users Panel, we are happy to be able to include a new Printers panel in GNOME 3.24.
The Printers panel is also part of the GNOME Control Center redesign effort which intents to introduce the new shell in 3.26
Containerised applications solve these issues. Maybe. He mentioned Flatpak, snappy, and Appimage. The former is the oldest technology dating all the way back to 2003. The solutions have in common that they bundle the app and run it in some kind of container or sandbox. From his criteria, the compatibility issue is solved, because the libraries are in the bundles. Portability is solved, because all dependencies are shipped in the bundle. And the pace of change is up to the app developer.
Almost four years ago, in GNOME 3.12, the ability to have custom terminal titles was removed from gnome-terminal. As is wont to happen, users who dealt with scores of similar looking terminal tabs and windows were quick to express their grief at this loss.
A proposal floated this week on an OpenJDK mailing list calls for porting the JDK (Java Development Kit), including the Java Runtime Environment, Java compiler and APIs, to both the distribution and the musl C standard library, which is supported by Alpine Linux. The key focus here is musl; Java has previously been ported to the standard glibc library, which you can install in Alpine, but the standard Alpine release switched two years ago to musl because it’s much faster and more compact.
If you want to learn learn Linux from top to bottom, what better way to learn than by rolling your own mini distribution?
Linux From Scratch, a combination software project and book, now in a newly released 8.0 revision, provides a step-by-step guide to building an entire functional Linux system from the ground up. It's a valuable and revealing project, though it doesn't directly cover the cutting edge of the Linux world.
I really like to make positive, interesting, and informative posts here. Unfortunately, the real world does not always cooperate with me on that. Today is one of those days.
Last week was SUSE Hackweek and one of my projects was to get Let's Encrypt configured and working on my NAS.
Let's Encrypt is a project aimed at providing SSL certificates for free, in an automated way.
LinuxFest Northwest 2017, coming up the first weekend in May, promises to continue its tradition of providing a unique, active, fun experience for open-source enthusiasts at all experience levels. openSUSE continues its long-term sponsorship of the event, and we are looking forward to having a lot of fun! Submit your session proposals by March 1, 2017!
LinuxFest Northwest, if you’re not familiar, is one of the largest community-centric conferences in the USA, and a free+libre event (no attendance fees and registration is optional) promoting open source, open hardware, and community involvement. Now in its 16th year, with an audience rapidly approaching 2,000 people, the event continues to grow, attract a broader audience, and redefine the experience of a weekend conference. With a Linux Game Den, a Robotics Lab, a Job Fair (new this year), community mini-summits, as well as the expo hall and 8 – 10 parallel tracks of sessions, LFNW is a week of conference stuffed into a weekend.
In 2015, Red Hat IoT conducted a survey around the Internet-of-Things (IoT) at the enterprise level and, from that study, Red Hat determined that enterprise IoT was proceeding in a deliberate manner. The new January 2017 Red Hat survey on enterprise IoT seems to indicate that not much has changed in terms of pace and strategy. It was conducted by TechValidate on behalf of Red Hat, and polled more than 200 IT decision makers and professionals from a variety of large organizations. It showed that interest in IoT is picking up, but actual roll-outs are being handled cautiously and carefully.
MWC Netherlands-based telco Altice has announced the continuation of its alliance with Cisco with the long-term aim to build a ‘holistic network function virtualisation (NFV) platform’.
As I shared in the first part of my "Open Leadership Development" series, we started building our leadership development system at Red Hat many years ago, by finding great leadership training designed for conventional organizations, and adapting it to fit our open organization.
Red Hat, Inc. (NYSE: RHT), the world's leading provider of open source solutions, today announced the general availability of Ansible Tower 3.1, the latest version of its enterprise-grade, agentless automation platform. Ansible Tower by Red Hat helps enterprises cut through the complexities of modern IT environments with powerful automation capabilities that can improve productivity and reduce downtime. New additions to the latest version of the platform enable enterprises to better scale DevOps automation and offer the ability to link multiple Playbooks into longer, more complex jobs, enhancing productivity across the business.
MWC (Mobile World Congress) 2017 kicked off in Barcelona and Canonical is there to showcase their latest developments in mobile, cloud, server, and desktop. Today, the company announced that Dell's Edge Gateway 3000 would be on display at the event.
Powered by the Ubuntu Snappy Core 16 operating system, which Canonical designed specifically for use in embedded and industrial devices, including single-board computers like the well-known Raspberry Pi, the small Dell Edge Gateway 3000 series come in three variants, each one targeted at a specific market.
In computing, convergence -- having a single device to serve many roles -- is a popular idea. Using the power of a smartphone to serve as a desktop, for instance, is a great way to save money and reduce waste. Unfortunately, there really have not been any successful convergence devices in practice. Microsoft famously tried with Windows 10 Mobile, but consumers didn't seem to care about Continuum.
Luckily, Canonical seems fairly unfazed, as the company continues to see Ubuntu as an operating system that can run on phones, tablets, laptops, desktops, and more. Like Windows 10 Mobile, Ubuntu phones have failed to pique the interest of consumers, but Linux-based solutions are arguably more appropriate for convergence thanks to the kernel's ability to work well on ARM. To highlight the success of Ubuntu in this regard, Canonical has been given an award at Mobile World Congress 2017.
Canonical announced a new partnership with Technologic Systems, Inc. to deliver the open-source and free Ubuntu Snappy Core 16 operating system on the TS-4900 high-performance Computer on Module (CoM).
Based on the NXP i.MX6 CPU, which implements the ARM CortexTM A9 architecture running at 1 GHz, the TS-4900 Compute Module has been engineered by Technologic Systems, Inc. for use in embedded systems applications, in particular those where wireless connection is required, such as industrial IoT (Internet of Things) gateways.
After announcing the release of Zorin OS 12 Business Edition last week, the developers behind the popular Ubuntu-based operating system unleashed the first point release to the Zorin OS 12 series.
That's right, we're talking about Zorin OS 12.1, which comes three months after the launch of Zorin OS 12 in November 2016 as the biggest release ever of the Linux distro. Zorin OS 12.1 is now based on Canonical's recently released Ubuntu 16.04.2 LTS (Xenial Xerus) operating system, which ships with updated kernel and graphics stacks from Ubuntu 16.10 (Yakkety Yak).
deepin is a Linux distribution devoted to provide beautiful, easy to use, safe and reliable system for global users.
deepin 15.4 Beta has the newly designed Control Center, and it installed a series of Deepin Original Applications. It is easy to use with great beauty and has improved the user experience a lot. Besides, the kernel version has been upgraded to the latest stable version, it has improved the stability and compatibility. Due to the active feedback from alpha test users, deepin 15.4 beta has an outstanding improvement on completeness and compatibility.
The developers of the deepin Linux operating system have announced the availability of a first Beta build for the upcoming deepin 15.4 release, which promises new and exciting features, as well as a large number of improvements.
The biggest new features of the deepin 15.4 operating system appear to be a revamped Control Center that makes it easier for users to set up various general settings for the desktop and the rest of the system, and a brand-new installation UI that offers smart detection for existing installation, helpful tips, and a QR code if you want to give feedback.
"The control center has rewritten and redesigned, it has weather, notifications and convenient operations, etc. in homepage and it becomes easy to change the settings, and it makes more perfect for the system with brand new interaction and design," reads the announcement.
Axiomtek’s PICO300 is a Pico-ITX SBC with Intel Braswell, SATA-600, extended temperature support, and both a mini-PCIe and homegrown expansion connector.
Axiomtek has launched a variation on its recently announced Intel Apollo Lake based PICO312 SBC that switches to the older Intel Braswell generation and offers a slightly reduced feature set. The board layout has also changed somewhat, with LVDS, SATA, and USB ports all changing location.
The MSC C10M-AL COM Express Mini Type 10 module offers Intel Apollo Lake, up to 8GB soldered RAM, dual displays, and optional industrial temp support.
Compulab’s “IOT-GATE-iMX7” gateway runs mainline Linux on its CL-SOM-iMX7 COM, and offers optional GbE, 3G, WiFi, BT, and ZigBee.
Compulab has launched a Linux-driven Internet of Things gateway built around its CL-SOM-iMX7 COM, featuring NXP’s power-sipping i.MX7 SoC. The embedded world is awash in i.MX6-based IoT gateways, but this is the first i.MX7 based model we’ve seen.
Axiomtek’s PICO300 is a Pico-ITX SBC with Intel Braswell, SATA-600, extended temperature support, and both a mini-PCIe and homegrown expansion connector.
Axiomtek has launched a variation on its recently announced Intel Apollo Lake based PICO312 SBC that switches to the older Intel Braswell generation and offers a slightly reduced feature set. The board layout has also changed somewhat, with LVDS, SATA, and USB ports all changing location.
Today is Raspberry Pi’s fifth birthday: it’s five years since we launched the original Raspberry Pi, selling a hundred thousand units in the first day, and setting us on the road to a lifetime total (so far) of over twelve million units. To celebrate, we’re announcing a new product: meet Raspberry Pi Zero W, a new variant of Raspberry Pi Zero with wireless LAN and Bluetooth, priced at only $10.
In celebrating their five-year milestone, the Raspberry Pi Foundation has announced their latest product: the Raspberry Pi Zero W.
The Raspberry Pi Zero W is similar to the $5 Raspberry Pi Zero but adds in wireless LAN and Bluetooth support. But for getting this variant with WLAN and Bluetooth, the cost is $10 USD.
Today, on the fifth anniversary of the release of the original Raspberry Pi, the Foundation has released Pi Zero W, a Pi Zero with built-in WiFi and Bluetooth, for $10.
The original Pi Zero was great (and still is!)—but many people found its lack of wireless connectivity an inconvenience. Now with Zero W, you can connect to the Internet without using any adapters, and you can even use a Bluetooth mouse and keyboard rather than wired USB, or use a Bluetooth speaker for audio.
Mobile OS maker Jolla, whose Sailfish platform remains one of the few smartphone alternatives in play these days, has signed an exclusive license to a Chinese consortium to develop a Sailfish-based OS for the country.
Jolla says the Chinese consortium will be aiming to invest $250M in developing a Sailfish ecosystem for the country, though it’s not specifying exactly is backing the consortia at this point, nor over what timeframe the investment will happen — beyond saying one of its early investors, a local private equity investor Shan Li, will take a “leading role” in building it up.
“There are very big players behind it,” Jolla chairman Antti Saarnio tells TechCrunch, speaking ahead of a press conference held to announce the news here at the Mobile World Congress tradeshow in Barcelona.
It has been over six months since the launch of the last Tizen Smartphone which was the Samsung Z2 and hence we should soon be seeing a successor to refresh the series. Earlier today, we reported on the leaked specifications and features of one such upcoming Tizen device which is the highly anticipated Samsung Z5. Now, we are getting hints on another Tizen device in the making bearing the Model name SM-Z400F which should logically be the Samsung Z4.
Dino Simulator Dino World is a game where you are a dinosaur causing chaos all over the place. There is one objective and that is to kill, destroy, and to destroy more!!! By causing destuction to innocent people’s lives (and proberably killing those innocent people), you get points! (YAY!).
Remember the Huawei Watch? It was one of the best Android Wear watches, with a simple and minimalist dress watch appeal. The Huawei Watch 2 (and Watch 2 Classic) are nothing like it.
The Watch 2 is big, bulky, and plasticky. I was reminded of the LG Watch Sport I recently reviewed. Huawei’s sport watch has similar features, including NFC, GPS, and a heart rate monitor, and a similar big, chunky, sporty look. However, Huawei’s new watch feels a bit lighter and is more ergonomically shaped, and is thus more comfortable to wear than LG’s Watch Sport.
Intrinsyc’s Android-ready Open-Q 650 IP Camera Reference Design is built on a Snapdragon 650, and supports up to three 4K H.264/H.265 30fps streams.
Intrinsyc Technologies has followed up on last year’s Open-Q 410 Wearable Camera Reference Design with a more powerful Open-Q 650 IP Camera Reference Design. Like the 410 model, the 650 IP version runs Android on a Qualcomm Snapdragon SoC. However, it features a faster, hexa-core Snapdragon 650 SoC in place of the quad-core, Cortex-A53 Snapdragon 410.
Lately I've been giving this question quite a bit of thought. I depend on both Chrome OS and Android. I use them throughout every day and would find my process a bit more challenging without them. When it was first announced that Chrome OS would be able to run Android apps, my initial thoughts were positive; I considered this move by Google to be the most logical step forward. It was clearly the best way to compete with the Microsoft Surface and to bring more users into the fold. Although chromebooks continually sell incredibly well, some consider Chrome OS to be less than a legitimate platform. Why? The lack of native apps. And that is why Google gave life to the Android Play Store on Chrome OS (at least for certain devices).
Powering Potential Inc. (PPI) aims to enhance education opportunities for students in Tanzania with the help of the Raspberry Pi and open source technology.
“I believe technology is a vital part of the modern human experience. It enlightens. It ties us together. It broadens our horizons and teaches us what we can be. I believe everyone deserves access to these resources,” says Janice Lathen, Founding Director and President of PPI.
Open-source projects underpin many of today's popular apps, software packages, and online services.
If a vendor releases code to the open-source community, license restrictions are removed and software can be integrated into other systems. From Google's end-to-end encryption system E2EMail to the Netflix cross-scripting site vulnerability scanner Sleepy Puppy, open-source development is thriving and thousands of developers contribute their time to improving coding and ferreting out bugs every month.
A friend pointed me to the Open Source Guides website, a collection of resources for individuals, communities, and companies who want to learn how to run and contribute to an open source project. I thought it was very interesting for new contributors, so I thought I'd share it here.
Richard Craib, the South African technology guru and founder of nontraditional hedge fund Numerai, is hoping for nothing short of completely restructuring the hedge fund industry. Numerai has recently created a new type of digital currency, a so-called "digital token," which is based on the internet and which aims to help crowdsource data-sharing and decisionmaking among Wall Street professionals. If the idea catches on, it could mean a significant shift for the way that investors do business; typically, it has been everyone-for-himself, with managers guarding their strategies and ideas closely in an attempt to gain the upper edge over every competitor. Is it possible that Craib could bring about a Wall Street in which investors actually work together in a collaborative way?
The Linux Foundation has announced the creation of the new Open Network Automation Platform (ONAP) Project with the merger of Open Orchestrator Project (OPEN-O) and open source ECOMP. This new platform will help in designing, automating, orchestrating, and managing network services and virtual functions by creating a comprehensive and a harmonized framework that allows virtual network functions to be automated by using real-time, policy-driven software.
Service providers of all sizes and types should take note of some changes occurring across the open-source community—changes that promise to accelerate the adoption of software-defined networks (SDN).
The first is a decision by AT&T to open source the ECOMP management and orchestration (MANO) framework it developed via the Linux Foundation. Through a variety of working groups, the foundation has been accelerating the development of core network function virtualization (NFV) software and associated SDN technologies. But a big piece missing from that equation has been the management plane.
OSI Affiliate Member, the California Association of Voting Officials (CAVO), has shared some exciting news regarding their advocacy work in San Francisco: according to the San Francisco Examiner, the city of San Francisco is pushing forward with plans to develop their open source election system. In addition, the paper is reporting that the San Francisco Elections Commission voted unanimously on Feb 17th to request $4 million to fund the initial stages of the open source voting system.
For many years board members of CAVO have been urging San Francisco to expedite, "the creation and deployment of a GPL v3 open source / paper ballot printing system that would set the standard for voting systems nationally." According to CAVO, currently only New Hampshire has deployed a voting system using open source software, Prime III.
The ongoing struggle to provide encrypted email solutions that aren’t on a PGP level of complexity and difficulty is a real challenge.
Google’s attempt at it, called E2EMail, was introduced more than a year ago as an effort to give users a Chrome app that allows for the simple exchange of private emails. On Friday, Google cut it loose to open source.
Google has announced that E2EMail, an experimental end-to-end encryption system, has now been given to the open-source community with no strings attached.
In some organizations, faster development is the primary motivation for using Open Source Software (OSS.) For others, cost savings or flexibility is the most important factor.
Last week, we detailed how OSS speeds development. Now let’s explore how open source software reduces development costs.
Open sourcing of data for Geographical Information System (GIS) mapping will create a huge potential for employment and transparency in administration, secretary of OSGEO-India V. Ravi Kumar has said.
Proprietary software for GIS costs up to Rs. .30 lakh. Instead, utilising tools developed using open software and training youth would help in creating employment locally, he said. Money will be spent on those working using GIS but not for the software, he said.
After the revision of Genode's most fundamental protocols in the previous release it was time to move our attention upwards the software stack. The current release largely revisits the integration of the C runtime with the Genode component API as well as the virtual-file-system (VFS) infrastructure. The two biggest challenges were making Genode's VFS capable to perform I/O asynchronously, and to make the C runtime compatible with the state-machine-based execution model of modern Genode components. This line of work is described in detail in Sections Enhanced VFS infrastructure and New execution model of the C runtime. One particularly exciting result is the brand-new ability to plug the Linux TCP/IP stack as a VFS plugin into any libc-using component by the sole means of component configuration.
Genode OS 17.02 has been released today as the latest version of this open-source operating system framework.
Accomplished for Genode OS 17.02 were ABI improvements, a much better virtual file-system (VFS) implementation, new input event processing capabilities, and a dynamic component-composition engine.
heads 0.0 is a preview live CD of what heads is going to be about. This release is not intended to be used from a security point of view, but as a showcase and testing point of view.
I am not even completely sure everything is torified, but hey, that's what testing is for, no?
I started the hackathon by upgrading a number of packages in Xenocara. The most noteworthy being the XCB (X protocol C-language Bindings) suite updated to the most recent 1.12 version.
We are excited to announce that the Mozilla Corporation has completed the acquisition of Read It Later, Inc. the developers of Pocket.
Mozilla is growing, experimenting more, and doubling down on our mission to keep the internet healthy, as a global public resource that’s open and accessible to all. As our first strategic acquisition, Pocket contributes to our strategy by growing our mobile presence and providing people everywhere with powerful tools to discover and access high quality web content, on their terms, independent of platform or content silo.
Pocket will join Mozilla’s product portfolio as a new product line alongside the Firefox web browsers with a focus on promoting the discovery and accessibility of high quality web content. Pocket’s core team and technology will also accelerate Mozilla’s broader Context Graph initiative.
Mozilla, the company behind the Firefox browser, today announced that it has acquired Pocket, the startup that develops an app for saving articles and other content. Terms of the deal weren’t disclosed.
The Pocket code will become a part of the Mozilla open-source project, Mozilla chief business and legal officer Denelle Dixon-Thayer wrote in a blog post.
Chances are you've heard the new: Mozilla has acquired Pocket, the go-to 'read it later' service, and says it plans to open-source Pocket code in due course.
The X.Org Foundation has been once again accepted as a mentoring organization for this year's Google Summer of Code. Yes, the X.Org involvement in GSoC isn't limited to just the xorg-server but also covers Mesa, Wayland, and other involvements.
MySQL 8 is coming and it is going to be a big change. MySQL 5.7 has been out for well over a year and has been very well received with its native JSON data type, increased security, and better performance. But there are some things about 5.7 that needed modernization and that is why MySQL 8 is on the way.
LLVM's LLD linker still isn't too widely used yet on Linux systems, but the performance of this linker alternative to GNU Gold and GNU ld are quite compelling.
We've written many times before about the much progress and better performance of "the LLVM linker" while some new numbers were committed to the LLD documentation.
The Open Government Partnership (OGP) recently launched the OGP Toolbox, bringing together digital tools to promote openness in government and improve democracy. Development of the platform started at a hackathon organised at last year's OGP Summit in Paris. The portal currently features 190 use cases, 1277 tools, and 521 organisations.
The Department of Defense (DoD) announced the launch of Code.mil, an open source initiative that allows software developers around the world to collaborate on unclassified code written by federal employees in support of DoD projects.
The Kerala government has made a saving of Rs 300 crore through introduction and adoption of Free & Open Source Software (FOSS) in the school education sector, said a state government official on Sunday.
IT became a compulsory subject in Kerala schools from 2003, but it was in 2005 only that FOSS was introduced in a phased manner and started to replace proprietary software. The decision made by the curriculum committee to implement it in the higher secondary sector has also been completed now.
I’m currently over at FOSDEM, and have been asked by a couple of people about the state of ZFS and Debian. So, I thought I’d give a quick post to explain what Debian’s current plan is (which has come together with a lot of discussion with the FTP Masters and others around what we should do).
[...]
Debian has always prided itself in providing the unequivocally correct solution to our users and downstream distributions. This also includes licenses – we make sure that Debian will contain 100% free software. This means that if you install Debian, you are guaranteed freedoms offered under the DFSG and our social contract.
When I was at Mozilla and WMF, I frequently got asked how to give proper credit when using Creative Commons-licensed images in slideshows. I got the question again last week, and am working on slides right now, so here’s a quick guide.
Denmark’s Agency for Digitisation (Digitaliseringsstyrelsen - DIGST) is inviting comments on its draft IT architecture for digitalisation of the public sector. The document sets out the IT principles for the country’s 33 digitisation initiatives.
Norway’s government procurement centre (ANS) and the Agency for Public Management and e-Government (Difi) are preparing the country’s first procurement frameworks related to IT. The first call, on telephony services, will be published in the next few days. The second call, for telephony and PC workstations, is expected around 24 April. Calls will be published on both Norway’s and Europe’s procurement portals, Doffin and Ted.
The 2017-2019 Open Government Action Plan is being prepared by the government modernisation unit (Secretariat-General for Government Modernisation, SGMAP). This week, on Tuesday, SGMAP is hosting a public workshop, where it will present a draft of the plan. The final text is expected in September.
Agriculture production data should be public and the open source movement should be the model for analysing it, according to the Open Agriculture initiative at MIT Media Lab.
This could involve making the data from every farming IoT sensor public - so you could use the climate data to understand how best to grow what and where, or use other IoT data points to trace where the food has come from across the whole supply chain.
You can stop it. Stop buying Intel. Better yet, don’t buy AMD either. Buy ARM, the processor that has multiple sources of production at competitive prices all year long. No need for a time-warp to get that for which you pay.
It's hard to believe that we're mere days away from the official launching of AMD's first Ryzen processors. It's been a long wait, but an even longer one if you think back to a time when the world got this excited about a new CPU launch. To call Ryzen "disruptive" even before launch seems apt, but all we can do right now is wait for the reviews to go live (and of course here at HH) to see just how well it will perform under pressure.
Microbial resistance to antibiotics has been rising and the world is now facing the serious possibility of falling back to the days when infectious diseases were hardly treatable. The World Health Organization today published a list of bacteria for which new antibiotics are most urgently needed, to help with the race against time, as the medical world is running out of treatment options.
The list of antibiotic-resistant ‘priority pathogens’ is the first published by the WHO, according to a press release. The list was drawn up “in a bid to guide and promote research and development (R&D) of new antibiotics, as part of WHO’s efforts to address growing global resistance to antimicrobial medicines.”
The Global Fund to Fight AIDS, Tuberculosis and Malaria is deliberating on how to start over on its search for a new executive director after questions arose near the end of the process.
Dangerous multidrug-resistant infections are surging in children across the country, researchers report in the Journal of the Pediatric Infectious Diseases Society.
From 2007 to 2015, the number of kids treated in hospitals for certain types of multidrug-resistant infections rose 750 percent, researchers found. Though overall incidence is still low, researchers say the study’s findings are pointing to worrying trends—namely, silent spreading within communities, and severe, potentially life-threatening infections becoming common.
"The rate of rise was very rapid," the study’s lead author, pediatrician Sharon Meropol of Case Western Reserve University, told CIDRAP News. "And if that continues, it's not going to be long before we get much higher rates."
The World Health Organization has issued a list of the top dozen bacteria most dangerous to humans, warning that doctors are fast running out of treatment options.
In a press briefing on Monday, the U.N. health agency said its list is meant to promote the development of medicines for the most worrying drug-resistant bacteria, including salmonella and Staphylococcus aureus.
WHO's Marie-Paule Kieny said that if such priorities were left to market forces alone, "the new antibiotics we most urgently need are not going to be developed in time." She estimated that it would take up to a decade for new medications.
There are a lot of reasons to choose a security-centric Linux distribution to test your network and system as in ethical hacking or penetration testing or security analysis. Are you looking? Luckily for you, there are a lot of them available for use. So let’s dive in and look at the best security centric Linux distributions.
Now that Google has proven SHA1 as unsafe, Ubuntu's Mir display server developers were quick to abandon its usage in favor of SHA256.
Mir cookies have the switch to now use SHA256 in place of SHA1 for their cookies in order to improve the security.
Windows 10 was the least secure of of current Windows versions in 2016, with 46% more vulnerabilities than either Windows 8 or 8.1, according to an analysis of Microsoft's own security bulletins in 2016.
Security firm Avecto said its research, titled "2016 Microsoft Vulnerabilities Study: Mitigating risk by removing user privileges", had also found that a vast majority of vulnerabilities found in Microsoft products could be mitigated by removing admin rights.
The research found that, despite its claims to being the "most secure" of Microsoft's operating systems, Windows 10 had 395 vulnerabilities in 2016, while Windows 8 and 8.1 each had 265.
The research also found that while 530 Microsoft vulnerabilities were reported — marginally up from the 524 reported in 2015 — and 189 given a critical rating, 94% could be mitigated by removing admin rights. This was up from 85% in 2015.
The latest Windows 10 Insider Preview build doesn't add much in the way of features—it's mostly just bug fixes—but one small new feature has been spotted, and it could be contentious. Vitor Mikaelson noticed that the latest build lets you restrict the installation of applications built using the Win32 API.
"Well, f**k."
Harsh language was appropriate under the circumstances. My router had just been hacked.
Setting up a reliable home network has always been a challenge for me. I live in a cramped three-story house, and I don't like running cables. So my router's position is determined by the fiber modem in a corner on the bottom floor. Not long after we moved in, I realized that our old Airport Extreme was not delivering much signal to the attic, where two game-obsessed occupants fought for bandwidth.
I tried all sorts of things. I extended the network. I used Ethernet-over-powerline connectors to deliver network access. I made a mystic circle and danced naked under the full moon. We lost neighbors, but we didn't gain a signal.
According to Purism's Youness Alaoui, their Coreboot port to the Librem 13 v1 laptop is now considered complete.
The Librem 13 was long talked about having Coreboot over a proprietary BIOS while the initial models still had shipped with the conventional BIOS. Finally in 2017, they have now Coreboot at what they consider to be 100% complete for this Linux-friendly laptop.
Here are the news you’ve been waiting for: the coreboot port for the Librem 13 v1 is 100% done! I fixed all of the remaining issues, it is now fully working and is stable, ready for others to enjoy. I fixed the instability problem with the M.2 SATA port, finished running all the tests to ensure coreboot is working correctly, fixed the headphone jack that was not working, made the boot prettier, and started investigating the Intel Management Engine issue.
Andrey Konovalov, a security researcher at Google, found a use-after-free hole within Linux, CSO Online reported. This particular flaw is of interest because it appears to be situational. It only showed up in kernels built with a certain configuration option — CONFIG_IP_DCCP — enabled.
The European Union Agency for Network and Information Security (ENISA) has published an updated version of its Smartphone Secure Development Guidelines. This document details the risks faced by developers of smartphone application, and provides ways to mitigate these.
CloudLinux's Mykola Naugolnyi announced today the availability of a new Beta kernel for the CloudLinux 7 operating system series, which patches a recently discovered and critical security flaw.
LINUX FOUNDER Linus Torvalds was warned in 2005 that the use of the SHA-1 hash to sign code in Linux and Git was insecure and urged to shift to something better protected, but rejected the advice outright.
Free software evangelist John Gilmore warned Torvalds ten years ago that "SHA1 has been broken; it's possible to generate two different blobs that hash to the same SHA1 hash".
Gilmore penned his warning to Torvalds in April 2005, when MD5 had already been cracked and SHA1 remained "hard to crack" - but still crackable.
You probably saw the news last week that researchers at Google had found a scenario where they were able to break the SHA1 algorithm by creating two PDF files with differing content that produced the same hash. If you are following this story then you may have also seen that the Webkit Subversion repository had problems after a user committed these example files to their repository so that they could be used in test cases for SHA1 collisions.
git-annex has never used SHA1 by default. But, there are concerns about SHA1 collisions being used to exploit git repositories in various ways. Since git-annex builds on top of git, it inherits its foundational SHA1 weaknesses. Or does it?
OpenSSH (really, are there any other implementations?) requires Trust on First Use for fingerprint verification.
Verification can be especially problematic when using remote services like VPS or colocation.
How can you trust that the initial connection isn’t being Man In The Middle’d?
NEARLY OF THE VULNERABILITIES THAT AFFECT Microsoft's Windows operating system could be mitigated through a little careful control.
Avecto, a security company, is the source of the latest revelation in this direction, and it says that 94 per cent of security problems could have been killed off if admin rights had been removed from the affected computer.
This makes a lot of sense, since a computer that cannot be molested by a user cannot be molested by a third party. 94 per cent is just one example of the differences that can be made and Avecto says that in the case of Internet Explorer 100 per cent of risks are mitigated when rights are removed.
This blog has featured several stories about “overlay” card and PIN skimmers made to be placed atop Ingenico-brand card readers at store self-checkout lanes. I’m revisiting the topic again because a security technician at a U.S.-based retailer recently shared a few photos of several of these devices pulled from compromised card terminals, and the images and his story offer a fair bit more detail than in previous articles.
Fighters from the Islamic State group, whose abuses against Yazidi women have been well documented, are raping and torturing Sunni Arab women too, Human Rights Watch said Monday.
The watchdog documented cases of arbitrary detentions, beatings, forced marriages and rape by the jihadists on women who have fled the town of Hawijah, which is still under IS control.
HRW recounted the story of Hanan, a 26-year-old whose husband had already fled Hawijah, who was captured by IS fighters along with other women when they also attempted to escape the town.
Fighters from the Islamic State (also known as ISIS) are arbitrarily detaining, ill-treating, torturing, and forcibly marrying Sunni Arab women and girls in areas under their control in Iraq, Human Rights Watch said today.
Shortly after the video appeared, the Philippine government envoy Jesus Dureza confirmed the German’s death.
“We grieve as we strongly condemn the barbaric beheading of yet another kidnap victim,” Dureza said in a statement. “Up to the last moment, many sectors including the armed forces of the Philippines exhausted all efforts to save his life. We all tried our best. But to no avail.”
Military officials in the south said they had not yet found Kantner’s body.
Militant group Abu Sayyaf had demanded a ransom of 30m pesos (€£480,000) be paid by Sunday to spare the 70-year-old.
The group had previously released videos that showed a haggard Kantner appealing for payment of the ransom.
Enraged by the rudely-worded command, the woman from Al-Bukamal, a town on the Iraqi border, told the jihadist to “get back to Morocco,” adding that “people living around here are faithful Muslims.”
Hearing this, the jihadist “policewoman” called a prison truck and arrested the woman and her son. The woman was sentenced to 300 lashes in public.
Whipping her victim on her back and arms, the Moroccan terrorist kept saying that “this will serve a lesson for all women of the caliphate!”
Two madrassa students were arrested on Saturday in connection with the murder of a 14-year-old fellow student at Tewra village of Muzaffarnagar in Uttar Pradesh, police said.
Kamruzama (20) and Adnan (21) were arrested for their alleged role in killing the fellow student by slitting his throat after subjecting him to sodomy, said circle officer Akhil Ahmad.
The duo has confessed to their crime, he said.
In 1967, a two-month orgy of violence and hysteria swept a rural province in China and an astonishing 4,000 people were brutally slaughtered. Without the bravery of Tan Hecheng, the story of what happened to these ‘black elements’ would never have been told. David Barnett on the journalist who uncovered the Killing Wind
The main camp for Dakota Access Pipeline protesters was cleared this week by authorities, who arrested about 50 holdouts on Thursday at the Oceti Sakowin site near Cannon Ball, N.D.
The eviction, ordered by the Army Corps of Engineers on Wednesday in advance of spring flooding, follows an earlier request by the Standing Rock Sioux Tribal Council that demonstrators leave camps on the reservation. And it represents a turning point for the movement, whose members pledge to block similar projects in several states, even as their opposition stiffens.
"The closing of the camp is not the end of a movement or fight, it is a new beginning,” said Tom Goldtooth, executive director of the Indigenous Environmental Network. "They cannot extinguish the fire that Standing Rock started."
One in five species on Earth now faces extinction, and that will rise to 50% by the end of the century unless urgent action is taken. That is the stark view of the world’s leading biologists, ecologists and economists who will gather on Monday to determine the social and economic changes needed to save the planet’s biosphere.
“The living fabric of the world is slipping through our fingers without our showing much sign of caring,” say the organisers of the Biological Extinction conference held at the Vatican this week.
Threatened creatures such as the tiger or rhino may make occasional headlines, but little attention is paid to the eradication of most other life forms, they argue. But as the conference will hear, these animals and plants provide us with our food and medicine. They purify our water and air while also absorbing carbon emissions from our cars and factories, regenerating soil, and providing us with aesthetic inspiration.
The Environmental Protection Agency's website has gotten a makeover since the Trump administration took office, with some references to climate change now wiped from its pages.
The agency removed the word "climate" from a division's name and webpage before President Donald Trump's inauguration, suggesting that EPA employees may have started constraining information as the transition team settled in and in anticipation of the incoming chill from the new administration.
The division once known as Climate Ready Water Utilities was rebranded as the Creating Resilient Water Utilities in late December, according to archived webpages. By then, Myron Ebell had been in place as head of the agency's transition team for more than a month. Ebell, a senior fellow at the conservative Competitive Enterprise Institute who has long promoted climate denial in his work, was considered a threat to the agency's mission by many of the career employees.
We hear the White House tomorrow will send Cabinet officials their first draft budget numbers.
One budget we'll be watching especially closely is the EPA ,which is the leading edge of the first wave of Trump's planned "deconstruction of the administrative state." Expect massive, transformational cuts, particularly to climate-change programs, top officials tell us.
The Ministry for Infrastructure and the Ministry of Public Administration in Slovenia have begun a one-year pilot to test car sharing. Earlier this month, the ministries signed a contract that lets 50 staff members share electric vehicles. After one year, the cost of car sharing and their use will be compared to the costs and use of cars owned by the ministries.
Times are good for Fey Wei Dong. A genial, middle-aged businessman based near Shanghai, China, Fey says he is raking in the equivalent of €£180,000 a year from trading in the humblest of commodities: sand.
Fey often works in a fishing village on Poyang Lake, China’s biggest freshwater lake and a haven for millions of migratory birds and several endangered species. The village is little more than a tiny collection of ramshackle houses and battered wooden docks. It is dwarfed by a flotilla anchored just offshore, of colossal dredges and barges, hulking metal flatboats with cranes jutting from their decks. Fey comes here regularly to buy boatloads of raw sand dredged from Poyang’s bottom. He ships it 300 miles down the Yangtze River and resells it to builders in booming Shanghai who need it to make concrete.
A new paper from the intergovernmental South Centre argues that intellectual property provisions in recent free trade agreements would impair countries trying to fulfil the United Nations Sustainable Development Goals.
The European Commission is pushing ahead with its Multilateral Investment Court (MIC) project, but called requests to eliminate specialised investor protection mechanisms unrealistic during a dedicated meeting with stakeholders in Brussels today.
The discussion about "fake news" certainly began with good intentions, with participants earnestly focused on how disinformation, shitty journalism and bullshit clickbait were filling the noggins of a growing segment of the public for whom critical thinking was already a Sisyphean endeavor. The solution for this problem was never as clean and easy as most of the conversations suggested, especially given that Americans -- thanks in large part to our struggles with education quality and funding -- have never been particularly adept at spotting disinformation, much less understanding how you expose, undermine and combat it at scale.
None of these problems are new. Bad journalism and propaganda have plagued publishing and governments for thousands of years. Donald Trump's violently-adversarial relationship with facts and Vladimir Putin's warehouses full of paid internet trolls have simply taken the conversation to an entirely new level in the internet age. But it's becoming increasingly clear that many of the folks who believe they can somehow legislate this problem away may be doing more harm than good.
In fact, much of the moral panic surrounding the initial fake news conversation has quickly degenerated into something that vacillates quickly between comedy and terror. As we've consistently pointed out, a growing number of countries have moved to make fake news illegal -- even before they've taken time to understand what it actually is. Germany's decision to make publishing fake news illegal teeters dangerously close to censorship. Letting politicians define "fake news" (with an obvious incentive toward defining it in their favor) should be a fairly obvious slippery slope.
Well before fake news became a thing, Karl was reporting on the fascinating details that have emerged about Russia's Internet troll factories that relentlessly pump out fake posts on an extraordinary scale. More recently, the Russian Defense Minister Sergei Shoigu revealed that the country's military has created a force specifically tasked with waging information warfare. We may know about Russia's domestic activities in this area, but what about online propaganda teams active in other countries?
Even before the White House press corps was born—in 1896, when newspapers assigned reporters to a table outside the office of Grover Cleveland’s secretary—attentive reporters irritated occupants of the White House. To hide the fact that he had a tumor, Cleveland, in 1893, disappeared from Washington for four days to have surgery aboard a friend’s yacht. In 1913, Woodrow Wilson, who hated the press’s fascination with his three daughters, accused “certain evening newspapers” of quoting him on things he meant to stay off the record. He eventually all but abandoned news conferences. It was six years before Warren G. Harding, who had been a newspaper publisher, revived the tradition.
There is now mounting evidence of US interference in Britain’s EU referendum vote. From what we already know, this could constitute a flagrant breach of UK electoral rules.
Cambridge Analytica (CA) is a US company, endorsed by Britain’s Ministry of Defence (MoD). President Trump’s adviser Steve Bannon is a board member of the company. And Trump’s main backer, Robert Mercer, is a key financier. During the EU referendum campaign in Britain, CA targeted over a million social media users. According to a prominent Leave.eu figure, it was CA technology that ensured a Brexit win.
Sen. Bernie Sanders (I) urged Democrats on Sunday to undertake an overhaul of the party’s message as they move forward in the uncertain era under President Trump and seek to regain lost seats in midterm and local elections.
"We need a total transformation," the Vermont senator and former Democratic presidential candidate said on CNN's "State of the Union."
"We need to open up the party to working people, to young people and make it crystal clear that the Democratic Party is going to take on Wall Street, it's going to take on the greed of the pharmaceutical industry, it's going to take on corporate America that is shutting down plants in this country and moving our jobs abroad," he added.
Senator Sanders’s remarks came just a day after Democrats voted to select former Labor Secretary Tom Perez to head the Democratic National Committee over Rep. Keith Ellison (D) of Minnesota. The contentious race pitted Mr. Perez, who served in former President Barack Obama’s administration, against Sanders-backed Representative Ellison, who embodied the party’s more progressive wave, continuing the party's ideological battle that came to the fore during the 2016 primary race.
Google has agreed to demote so-called “pirate” sites from its search results, at the demands of the copyright industry. All experience from the past 600 years says this is a mistake.
A story in Ars Technica and elsewhere celebrates that Google will hide the sites people are looking for, because there are others that don’t want people in general to find them. When phrased like this, it becomes obvious that Google has little or nothing to gain from this move, and that throwing whiners a bone of meat to make them shut up is a mistake, for two reasons working together.
The Russian government has passed draft legislation to parliament which would compel companies such as Google and local giant Yandex to remove pirate sites from search results. If the law is passed, sites that fail to respond to takedown notices will be the initial targets.
As Techdirt readers know only too well, doing things "for the children" is a perfect excuse to pass all kinds of ridiculous laws that would otherwise be thrown out without a thought. For example, back in 2013, we wrote about attempts to pass legislation in Russia that would ban swearing on the Internet. It was framed as an amendment to an existing law called "On the Protection of Children" that introduced a blacklist designed to block access to information on drugs, suicide and child pornography. Now the head of Roskomnadzor, the body that oversees website-blocking in Russia, has a bold proposal for protecting children from all the Internet's possible harms.
A trainee Church of England priest at Oxford University has accused it of discrimination and bias after he says he was told he could not ask a lecturer critical questions about Islam.
The student has filed a formal complaint to the university’s proctors’ office in which he claims the lecturer pointed at him in a seminar and said: “Everybody can ask a question except you.”
The student, Shahriar Ashrafkhorasani, 33, is an Iranian-born convert from Islam who is set to become a Church of England priest in July, while the lecturer, Minlib Dallh, is a research fellow at Regent’s Park College in Oxford on a project about love in religion part-sponsored by the King of Jordan.
The Oscars celebrate films that can be both beautiful and controversial. But such storytelling is still a privilege in many parts of the world. And in Malaysia, one important British film has just experienced a serious blow.
AS a documentary filmmaker, I regularly screen my films and also give talks and workshops, both locally and internationally. When I am out of the country, I always get asked the question of how local filmmakers deal with the strict censorship laws in Malaysia.
My first response is always to correct their question. The question shouldn’t be how we Malaysian filmmakers deal with strict censorship laws; it should be how we deal with vague, unclear and inconsistent censorship laws.
Take for example, Lena Hendry, who is a former employee of a Malaysian-based human rights non-governmental organisation called Pusat KOMAS. She was found guilty of screening the documentary ‘No Fire Zone: The killing fields of Sri Lanka’ without censorship approval in 2013.
George Orwell once said that 'Intellectual freedom is a deep-rooted tradition without which our characteristic western culture could only doubtfully exist.'
Alankrita Shrivastava's film Lipstick Under My Burkha may have been refused certification by the Central Board of Film Certification (CBFC) back home but it managed to impress the audience at the Glasgow Film Festival.
A group of Muslim leaders in Bhopal on Saturday passed a resolution advocating the boycott of Alankrita Shrivastava’s Lipstick Under My Burkha, and asked the central government to ban the controversial movie for hurting the community’s religious sentiments.
The All India Muslim Tehwar Committee, which met here under the chairmanship of Ausaf Shahmeeri Khurram, also disclosed plans to take legal action against the movie.
Censorship has loaded connotations. We have the Central Board of Film Certification (CBFC) which is a statutory body, and all our films go to them for certification. An industry such as films can be accorded a certain kind of self-censorship. I find the word ‘censorship’ itself a bit problematic. When we see films from the West, they are rated — this film needs parental guidance, this film is rated this and that. So a certain age or a certain demographic is thought suitable to watch the film. In our country, we have U/UA/A certificates. The need is to certify the films. But to censor the film is something which inevitably seems contrary to freedom of artistic expression. It is a bit problematic to think of CBFC as a censor board.
New Attorney General Jeff Sessions has just sent another message about the future of US law enforcement: there will be no policing of the police during the Trump Years. In his first on-the-record briefing, Sessions flat-out stated the DOJ's many civil rights investigations of local police departments mean nothing.
So we've noted time and time again how so-called "smart" toys aren't immune to the security and privacy problems plaguing the internet of broken things. Whether we're talking about the Vtech hack (which exposed kids' selfies, chat logs, and voice recordings) or the lawsuits against Genesis Toys (whose products suffer from vulnerabilities to man-in-the-middle attacks), the story remains the same: these companies were so excited to connect everything and anything to the internet, but few could be bothered to spend more than a fleeting moment thinking about product security and consumer privacy.
Of course, if the messages are deleted soon after sending, as the app advertises, then showing the app to a reporter doesn't really prove much of anything. Either way, hold that thought.
Security experts have ripped apart Confide, saying that it's claims of being secure are "a triumph of marketing over substance," however others in the White House are making use of an app that is generally considered more secure: Signal.
And, apparently, that has some in Congress worried that the apps are being used not to undermine things like federal record keeping laws, but rather that it may be used by people inside the government to go undermine the administration or to leak information to the press.
Officials in China’s largest prefecture, in the far-western region of Xinjiang, are requiring all drivers there to install a Chinese-made satellite navigation system in their vehicles, according to an official news report this week.
Police officials say drivers must install the navigation system by June 30. “The installation rate will reach 100 percent,” said a report on Monday on the website of The Korla Evening Post, a newspaper in the prefecture’s capital, Korla. The report was also posted on the government-managed website of Beidou, the Chinese satellite navigation system. Beidou is China’s version of the Global Positioning System, or GPS.
The new requirement is intended to help the authorities track people in a region where violence sometimes erupts because of ethnic tensions. Parts of Xinjiang are home to ethnic Uighurs, a Turkic-speaking people who mostly practice Sunni Islam and often resent policies made by the ethnic Han, the dominant group in China.
The most notable burst of violence occurred in 2009, when ethnic rioting convulsed Urumqi, the regional capital, resulting in about 200 deaths, most of them ethnic Han, according to official reports. Officials responded with a harsh security crackdown. Other episodes have resembled domestic terrorism, and some officials say the attackers have connections to groups engaged in global jihadist activities, but they have not offered any evidence to buttress that claim.
Are we fighting a new Cold War, but this time in cyber space?
New FCC boss Ajit Pai, apparently taking a break from paying empty lip service to the poor, has quietly announced the FCC will be killing consumer broadband privacy protections before they even have a chance to take root. Hoping the news would get lost in the pre-weekend hustle, the FCC quietly circulated an e-mail on Friday stating that the agency would be moving to kill the rules before they arrive March 2, just as large ISPs had demanded.
Really can't say enough good things about public servants, especially when their response to criticism is to expose personal details in a published interview.
Andie Fox wrote an article for the Canberra Times about her struggle to get an ex's debt removed from her record. Following several calls from Centrelink -- Australia's Department of Human Services -- attempting to recover this misplaced debt, Fox spent hours -- including most of day she took off from work -- trying to speak to human being directly about her situation. As is par for the bureaucratic course, this was almost impossible.
The German Federal Intelligence Agency (Bundesnachrichtendienst, BND) spied on foreign journalists, according to a report of German magazine “Der Spiegel”. A document obtained by the magazine showed that the BND had taps on at least 50 phone numbers, fax numbers and email addresses of journalists from the BBC, Reuters and the New York Times.
Half of the web’s traffic is now encrypted, according to a new report from the EFF released this week. The rights organization noted the milestone was attributable to a number of efforts, including recent moves from major tech companies to implement HTTPS on their own properties. Over the years, these efforts have included pushes from Facebook and Twitter, back in 2013 and 2012 respectively, as well as those from other sizable sites like Google, Wikipedia, Bing, Reddit and more.
As if not troubled enough by President Trump’s attacks, a new debate is heightening tensions in the intelligence community. The Pentagon has started to assess whether it is time to divide the leadership of the National Security Agency and U.S. Cyber Command. Such a move is dubious: Is change necessary? Can the IC tolerate another shock?
This contrasts with other decisions dealing with the same subject matter, where judges have found there's no expectation of privacy in IP addresses, even when one has taken extra steps to obscure it. Those findings seem logically contradictory, at best. If someone's attempts to keep third parties from obtaining information, this information can't truly be considered held by a third party. Stripping away these efforts turns the FBI into the "third party," and the government isn't allowed to both act as a third party and excuse its actions with the Third Party Doctrine.
But in the end, there's no suppression. As the court points out, two things weigh against suppressing the evidence, even with the warrant being facially invalid under Rule 41. First, the FBI malware only infected registered users visiting the dark web child porn site, which makes the possibility of accidental infection almost nonexistent. Second, the fact that the FBI had no idea where the site's visitors were actually located makes this an inelegant solution to a problem, not a case of judge-shopping for compliant magistrates.
The good news is the Supreme Court's Riley decision forces law enforcement to obtain warrants before searching cell phones. The bad news, apparently, is everything else. To begin with, particularity remains a problem. As the Supreme Court pointed out in its decision, people's entire lives are contained in their cell phones. When searching for what's relevant to the suspected criminal activity, the government is pretty much free to dig through these "lives" to uncover what it needs to move forward with prosecution.
The lack of strict parameters (perhaps an impossibility given the nature of digital communications/data) leads to fishing expeditions operating under the cover of Fourth Amendment adherence. There's no way to prevent trolling for evidence of unrelated criminal activity. The only recourse is to challenge it after it happens. Sometimes the courts find the government has gone too far. Other times, courts say the evidence would have been "inevitably discovered" in the course of the search and prevent it from being suppressed.
Yee, the 18-year-old teenager who ran away from Singapore to seek political asylum in the US, looks set to spend a few more months languishing in jail over there as a result of President Donald Trump’s recent executive order barring refugees from entering the country.
Yee’s Facebook page carried a post on Feb. 21 complaining about his prolonged stay in jail and asking his supporters to call attention to his plight to expedite his release.
However, there was no mention made about him spending time in solitary confinement in that post.
The BBC has hired commissioner Fatima Salaria – its second Muslim executive to take control of its faith-based output and serve as the new commissioning editor for religion and ethics.
This places her in charge of all of the BBC's religious content on television, including Songs Of Praise.
The move comes after the Beeb faced criticism previously from those who believed that the job should go to a Christian given it is the UK's main faith.
Passengers of a domestic Delta flight from San Francisco to New York were told to show their identity documents to uniformed agents of the Customs and Border Protection agency upon their arrival at John F. Kennedy airport on Wednesday evening.
CBP officers are border agents, whose statutory authority is generally limited to international arrivals.
CBP agents inspected passenger identifications on the jetbridge by the door of the aircraft. A CBP spokesman insisted to Rolling Stone that this action is "nothing new" and that there is "no new policy." But the unusual – and legally questionable – search of domestic travelers comes days after the Department of Homeland Security outlined its plans to implement President Trump's sweeping executive order targeting millions of "removable aliens" for deportation.
I am accustomed to being hectored by Islamists, frightbats, anti-vaccination fruitcakes and an assortment of social justice warriors — aka government-funded Twitter trolls.
But last week, I had the surreal experience of being scolded by an ABC host for not being sufficiently supportive of an Islamic activist advocating for sharia law.
ABC radio drive host Rafael Epstein had the gall to admonish me, a migrant who escaped a country under Islamic law, for not supporting an advocate of Islamic law.
It’s akin to a freed slave being criticised for a fear of slavery and reluctance to support slavery advocates.
Can you imagine the indignation from feminists if a privileged, white, private school-educated, heterosexual, conservative male was castigating an immigrant woman of colour about how their experience and opinions “distort the debate”?
Epstein is all of the above except he is a typical ABC Leftist and so his behaviour is excused and even applauded by those who most enthusiastically embrace identity politics.
While it's hard to make any solid, direct links between the three incidents, together they highlight a growing trend of young women becoming involved in real, perceived or forced acts of terrorism in various global locations. Research suggests groups such as IS, Boko Haram and the Islamic militant organization in Somalia, al-Shabab, are actively targeting women to join their ranks.
UN Watch expressed concern that Sweden’s self-declared “first feminist government in the world” sacrificed its principles and betrayed the rights of Iranian women as Trade Minister Ann Linde and other female members walked past Iranian President Rouhani on Saturday all covered up in compliance with Iran’s compulsory Hijab law, despite Stockholm’s promise to promote “a gender equality perspective” internationally, and to adopt a “feminist foreign policy” in which “equality between women and men is a fundamental aim.” In doing so, the Swedish female politicians ignored the recent appeal by Iranian women’s right activist Masih Alinejad who urged Europeans female politicians “to stand for [their] own dignity” and refuse to wear the hijab when visiting Iran.
Alinrejad created a Facebook page for Iranian women to resist the law and show their hair as an act of resistance, which now numbers 1 million members. “European female politicians are hypocrites,” says Alinejad. “Because they stand up with French Muslim women and condemn the burkini ban—because they think compulsion is bad—but when it happens to Iran, they just care about money.”
Dozens of DAPL protesters were arrested after police raided and cleared the Oceti Sakowin camp near the Standing Rock Sioux Reservation in North Dakota. Some activists refused to leave peacefully and set fire to their makeshift housing.
The Oceti Sakowin camp was completely emptied shortly after 2:00pm local time (8:00pm GMT), the Morton County Sheriff's Department said, as cited by Reuters.
Recently travel to the US has become even more stressful as CBP have been more aggressively exercising their authority to examine digital devices. Their theory goes something like “we can open a cargo container to check whats inside therefore we can open a digital device to check whats inside.” Along with the apparent increase in searching traveller’s laptops and phones, there has been a rise in amateur smuggling suggestions (seemingly by US citizens who aren’t exposed to any risk at the border.) This advice is terrible, dangerous and possibly endangers anyone reckless enough to follow it.
Both as a candidate and now as President, Donald Trump has made clear his intent to pursue aggressive policies targeting Muslims, refugees and immigrants under the banner of national security. In his first week in office Trump enacted the patently unlawful travel ban seeking to bar all refugees, and individuals from 7 Muslim-majority countries from entering the US. A second executive order the same week, as well as later accompanying policy memoranda, extended powers to law enforcement and immigration agencies to increase detention and deportation of undocumented immigrants.
We do not know what the future holds, but the President’s statements certainly give cause for serious concern. Trump has notoriously refused to rule out the possibility of a “Muslim registry”, and has stated his intention to quickly deport between 2 and 3 million undocumented immigrants.
The wife of a blogger and journalist detained in Ethiopia has called on the international community to pressure local authorities to release her husband, who is among tens of thousands held since a state of emergency was declared in the emerging east African power last year.
Anania Sorri, a 34-year-old writer and intellectual, was arrested in November on his way to a meeting at the US embassy in Addis Ababa. He is being held in a high security prison in the Ethiopian capital and has not yet been formally charged with any offence.
That’s according to the latest figures from the NHS, which also stated that of the women were aged between 18 and 39 at the time their FGM was recorded in 2015/16.
FGM has been a criminal offence in the UK for 30 years, and in 2003 it also became a criminal offence to take a child abroad to have female genital mutilation. Despite this, there is yet to be a successful prosecution.
The NSPCC set up a specialist FGM helpline in June 2013, and since then it has been contacted more than 1,500 times – on average, once a day.
Of those, a third were considered serious enough to be referred to social services.
It seems we see more and more fake "hate crimes" these days, and I've been wondering why.
A way to get attention? A way to get revenge? A way to get some money from sympathetic crowd-funders? A way to throw a little weight on whomever you perceive as your opponent? Or just a way to feel you're somebody and part of something?
I do think social media has a lot to do with it -- people seeing that other people get attention, sympathy, and money from being victims -- or perhaps "victims."
Well, the latest apparent faked hate crime, according to a couple's lawyer, is the claim by a waitress that she was stiffed out of a tip by a couple who wrote at the bottom of the check that they "don't tip Black people."
The nice thing about truly stupid ideas is they generally have very short lifespans. Last week, the Arizona Senate did itself a huge disservice by passing a bill targeting a nonexistent problem ("paid protesters") with fines, jail time, and seized assets if any act of destruction occurs during a protest. It wasn't limited to just the person committing the act. Anyone else participating in the same protest could be rung up on the same charges, as well as any nonparticipants who may have been involved in the planning process.
In support of this idiocy, idiotic statements were made, including the unforgettable assertion that a new terrible law was needed because existing rioting laws were constantly being undercut by a functioning bail system.
Earlier this month, in a classic late Friday afternoon news dump, the Federal Communications Commission announced a rollback of two key decisions made during the Obama administration. In another era, few besides policy wonks and internet activists would have noticed such a thing. But these changes drew intense attention. These days, politics isn’t just what happens on the internet—it’s what happens to the internet.
“Trump’s FCC Pick Quickly Targets Net Neutrality Rules,” the New York Times declared. “FCC blocks 9 companies from providing low-income internet access,” CNN reported. Mignon Clyburn, the only remaining Democratic commissioner at the FCC, published sharp rebukes to the moves, complaining that her colleagues had acted “without a shred of explanation.”
Last month, AT&T revealed how it might structure its deal to acquire Time Warner without having to go through FCC review. The communications giant noted that it "anticipated that Time Warner will not need to transfer any of its FCC licenses ... after the closing of the transaction." That means that the FCC wouldn't need to review the transaction, and today FCC commissioner Ajit Pai confirmed that his agency would indeed not likely look at AT&T's purchase.
Last week, we noted how Apple was one of several companies lobbying against a right to repair bill in Nebraska. The bill would make it easier for consumers to repair their own products and find replacement parts and tools, which is generally considered to be a good thing -- especially if the only Apple store is eighty miles away from your current location. But Apple tried to argue that Nebraska's bill would not only make the public less safe (self-immolation everywhere!), but it would also result in Nebraska becoming some kind of "mecca" for nefarious hoodie-wearing ne'er-do-well hackers.
Of course Apple, like most companies, just enjoys a repair-monopoly, which not only allows it to charge an arm and a leg for what very well may be superficial repairs, but helps prop up closed, proprietary ecosystems, hurting customers in a myriad of other ways as well.
It's not just in Nebraska where this conversation is happening (the Nebraska bill just happens to be the furthest along legislatively). Similar bills are also winding their way through New York, Minnesota, Wyoming, Tennessee, Kansas, Massachusetts, and Illinois state legislatures. And in most of these states, the companies lobbying against these laws are using the same disingenuous arguments Apple has been embracing. Usually it's the trifecta of false claims that the bills will make users less safe, pose a cybersecurity risk, and open the door to cybersecurity theft.
The decline in books stocked by public libraries may be far worse than official figures indicate, with industry sources claiming that it may be many millions higher than the 25 million books recorded as missing, meaning that the number of books available to borrowers has plummeted by more than 50% since 1996.
Librarians are calling for a national audit to reveal the true extent of the problem, with the news coming as the Chartered Institute of Library and Information Professionals (Cilip) sent an open letter to chancellor Philip Hammond calling on him to increase funding for the sector, to protect it from irreparable decline as part of his strategy for economic growth.
The Internet Corporation for Assigned Names and Numbers (ICANN) is on an “ambivalent drift” into online content regulation through its contractual facilitation of a “trusted notifier” copyright enforcement program between the Motion Picture Association of America (MPAA) and the registry operators for two new generic top-level domains, University of Idaho College of Law Professor Annemarie Bridy says in a draft article for the Washington & Lee Law Review.
It's easy to forget that Kim Dotcom is not the only one being hounded by the US Government. Finn Batato was Megaupload's advertising manager, but today he's facing extradition to the US and potentially decades in jail. After spending his savings fighting his case, he's now trying to save his marriage while conducting his own defense.
At the end of 2014 Swedish police confiscated dozens of servers which many believed to belong to The Pirate Bay. The authorities later confirmed that an investigation involving copyright crimes was ongoing, but not much progress has been reported since. According to the prosecutor, the case isn't getting any stronger, as the statute of limitations for several key crimes is expiring.
As negotiations take place this week in Japan for a free trade agreement covering the Asia-Pacific region, a group of intellectual property scholars is calling for the public interest to be clearly considered in the copyright rules of the future agreement.
As the 17th round of negotiations for the Regional Comprehensive Economic Partnership (RCEP) is taking place in Kobe, Japan, a statement has been circulated and endorsed by 64 IP scholars from a number of countries.
The RCEP would include the 10 members of the Association of Southeast Asian Nations (ASEAN) – Indonesia, Malaysia, the Philippines, Singapore, Thailand, Brunei Darussalam, Cambodia, Laos, Myanmar, and Vietnam – as well as Australia, China, India, Japan, South Korea, and New Zealand.
In a case pitting copyright protection against competition, the United States Court of Appeals for the Fourth Circuit must decide whether World Programming Limited (WPL) violated SAS Institute's copyright by copying software interfaces that enable interoperability. WPL has already won the argument in the UK and in Europe's highest court. The case has drawn strong support on both sides from the tech sector and a civil liberties group.