Bonum Certa Men Certa

Links 16/11/2017: Tails 3.3, Deepin 15.5 Beta





GNOME bluefish

Contents





GNU/Linux



Free Software/Open Source



  • Navigating the Open Source Landscape
    Traditionally, the telecom industry was driven by large standards bodies such as 3GPP, ATIS (Alliance for Telecommunications Industry Solutions), the ITU (International Telecommunications Union), ETSI (European Telecommunications Standards Institute), which defined standards for everything in telecom right down to the telephone poles. These standards bodies have had dedicated individuals from across the industry working together for years to develop industry standards that are comprehensive to meet stringent requirements across many use cases.


  • ETSI Open Source MANO Group Unveils Release 3.0
    ETSI Open Source MANO group (ETSI OSM) announces the general availability of OSM Release THREE, keeping the pace of a release every 6 months. This release includes a large set of new capabilities as well as numerous enhancements in terms of scalability, performance, resiliency, security and user experience that facilitate its adoption in production environments.

    “OSM Release THREE provides a highly functional and reliable component for NFV Orchestration that enables all industry players to accelerate their deployment plans, with no need to change their target architectures for NFV infrastructure or OSS transformation.” declares Francisco-Javier Ramón, chairman of ETSI OSM group.


  • Euro telco standards wonks publish third iteration of open source orchestrator
    The European Telecommunications Standards Institute (ETSI) has published the third release of OSM, its open source management and orchestration (MANO) stack for network function virtualisation.


  • SDxCentral Releases 2017 Open Source in Networking Report
    Networking has been transformed with the advent of SDN (software-defined networking) and NFV (network functions virtualizations). What has traditionally been a closed and proprietary environment dominated by a few vendors has opened up to innovation and a much more rapid pace of development than in past decades.


  • Why and How to Set an Open Source Strategy


    Open source projects are generally started as a way to scratch one’s itch — and frankly that’s one of its greatest attributes. Getting code down provides a tangible method to express an idea, showcase a need, and solve a problem. It avoids over thinking and getting a project stuck in analysis-paralysis, letting the project pragmatically solve the problem at hand.

    Next, a project starts to scale up and gets many varied users and contributions, with plenty of opinions along the way. That leads to the next big challenge — how does a project start to build a strategic vision? In this article, I’ll describe how to walk through, measure, and define strategies collaboratively, in a community.

    Strategy may seem like a buzzword of the corporate world rather something that an open source community would embrace, so I suggest stripping away the negative actions that are sometimes associated with this word (e.g., staff reductions, discontinuations, office closures). Strategy done right isn’t a tool to justify unfortunate actions but to help show focus and where each community member can contribute.


  • Pentagon spreads the open source
    The US military is set to charge ahead into open source next year after an amendment to the National Defense Authorisation Act for Fiscal Year 2018.

    The amendment introduced by Sen. Mike Rounds (R-SD) and co-sponsored by Sen. Elizabeth Warren (D-MA) will mean that the Pentagon will be going open source.


  • Open Banking Starts With Opening Bank Culture


  • Banks are increasingly turning to open source projects. Here's why.


  • Embracing Open Source will help enterprises stay ahead of the AI game
    Kingsley Wood, Director, Infrastructure Business Group, Asia Pacific – Red Hat, said, “The interesting thing about the open source approach is that many people from the community can contribute a lot of fresh ideas, which can help identify problems quicker.”


  • MNCs & product cos are leading the open source movement in India
    engaluru: Contributing code to the open source world is regarded increasingly as a badge of honour. Yet, Indian IT services companies lag in embracing the open source code culture, shows data from open source code repository GitHub.

    Among GitHub's 75,000 engineers from India, IT services & ITES (IT enabled services) companies have the highest numbers on the platform, but most of the open source contributions were made by employees working for technology product companies and MNCs in India.

    GitHub is a platform where developers host and review codes, manage projects, and even build open source software along with other community members. Open source, which refers to software whose source code (the medium in which programmers create and modify software) is freely available on the internet, has become a major trend in software development today. It stands in contrast to proprietary commercial software whose source code is usually a closely guarded secret.


  • Events



    • Linux Developer Conference Brazil
      Last weekend I attended the first Linux Developer Conference Brazil at Universidade Estadual de Campinas (Unicamp). It was an event focused on the upstream development of low level components related to Linux, such as gcc, systemtap and the Linux kernel itself. The event was organized by a few contributors of some of these upstream projects, like the kernel, and was sponsored by companies that work directly with it (among them were openSUSE and Collabora).


    • Talking at Kieler LinuxTage 2017 in Kiel, Germany
      Compared to other events, it’s a tiny happening with something between fifty and hundred people or so. I was presenting on how I think GNOME pushes the envelope regarding making secure operating systems (slides, videos to follow). I was giving three examples of how GNOME achieves its goal of priding a secure OS without compromising on usability. In fact, I claimed that the most successful security solutions must not involve the user. That sounds a bit counter intuitive to people in the infosec world, because we’re trying to protect the user, surely they must be involved in the process. But we better not do that. This is not to say that we shouldn’t allow the user to change preferences regarding how the solutions behave, but rather that it should work without intervention. My talk was fairly good attended, I think, and we had a great discussion. I tend to like the discussion bit better than the actual presentation, because I see it as an indicator for how much the people care. I couldn’t attend many other presentations, because I would only attend the second day. That’s why I couldn’t meet with Jim :-/


    • Talking at PET-CON 2017.2 in Hamburg, Germany
      A few weeks ago, I was fortunate enough to talk at the 7th Privacy Enhancing Techniques Conference (PET-CON 2017.2) in Hamburg, Germany. It’s a teeny tiny academic event with a dozen or so experts in the field of privacy.




  • Web Browsers



    • Mozilla



      • The Quantum of Firefox: Why is this one unlike any other Firefox?
        The Mozilla Foundation has officially launched a radical rewrite of its browser, a major cross-platform effort to regain relevance in a world that seems to have forgotten Firefox. The much-rewritten browser claims to be 30 per cent faster with half the memory load, although this comes at the cost of compatibility, as Scott Gilbertson found here.

        The proof’s in the pudding, and this pudding doesn’t feel like the old Firefox behemoth at all. It’s long overdue.

        "Firefox is 13 years old – and very few applications have been around for 13 years without accruing technical debt,” Nick Nguyen, Mozilla’s VP of technology told us.






  • Oracle/Java/LibreOffice



  • Pseudo-Open Source (Openwashing)



  • Programming/Development



    • Azul Systems Affirms Commitment to Open Source Embedded Java
      Azul will Provide Continued Support for Embedded builds of OpenJDK on x86, Arm and PowerPC Processors


    • How to create better documentation with a kanban board


      If you're working on documentation, a website, or other user-facing content, it's helpful to know what users expect to find—both the information they want and how the information is organized and structured. After all, great content isn't very useful if people can't find what they're looking for.

      Card sorting is a simple and effective way to gather input from users about what they expect from menu interfaces and pages. The simplest implementation is to label a stack of index cards with the sections you plan to include in your website or documentation and ask users to sort the cards in the way they would look for the information. Variations include letting people write their own menu headers or content elements.



    • Uber Open-Sources Its AI Programming Language, Encourages Autonomous Car Development
      Uber's self-driving car ambitions have been an open secret surrounding the company for some time now. If the ride share company's ambitions are met, someday when you hail a ride using its app it'll be an autonomous car that shows instead of a human looking to supplement his income. The company has been actively recruiting engineering talent toward its autonomous car program – even running into some legal trouble with Google along the way over accusations of poaching talent and technology.


    • 25 Pitfalls When Learning to Program


    • DevOps: How to avoid project death by hand-off
      There's a notion in DevOps that our work begins when we understand the strategic business goals that we're trying to meet, then we deliver on them. This is typically a two-step process where one team creates goals, then hands them off to another team to implement them.




  • Standards/Consortia



    • Open Source or Open Standards? (Yes!) The Future has Arrived
      Once upon a time – oh, say fifteen years ago – the terms open standards and open source software (OSS) were often used interchangeably. Not because they were the same thing, but because many people didn’t really know what either really was, let alone the differences between them. That was unfortunate, because at that time the two had little in common, and were developed for very different purposes.

      Recently, many people (especially OSS developers) have begun referring to the software they develop as “a standard.” This time around they’re a lot closer to being right.

      So, what’s going on here? And is it a good thing?






Leftovers



  • Twitter explains how users can lose their verified status


    Twitter warned users Wednesday that they can lose "verified" status on its platform, releasing a set of rules for keeping the "blue checkmark" that verifies their identity.

    The social media giant, in an update on the help center portion of its website, explained how users can lose the blue check marks denoting that their profiles are verified. The violations include misleading users on Twitter, as well as promoting hate and harassing others, among other types of behavior that violate Twitter’s rules.


  • Health/Nutrition



    • University could lose millions from “unethical” research backed by Peter Thiel
      In August, Kaiser Health News reported that Thiel and other conservative investors had contributed $7 million for the live-but-weakened herpes virus vaccine, developed by the late SIU researcher William Halford. The investments came after Halford and his private company, Rational Vaccines, had begun conducting small clinical trials in the Caribbean nation of St. Kitts and Nevis. With the off-shore location, Rational Vaccines’ trial skirted federal regulations and standard safety protocols for human trials, including having approval and oversight from an institutional review board (IRB).

      Experts were quick to call the unapproved trial “patently unethical,” and researchers rejected the data from publication, calling the handling of safety issues “reckless.” The government of St. Kitts opened an investigation into the trial and reported that health authorities there had been kept in the dark.





  • Security



    • Survey of bug bounty hunters shows who pans for pwns
      Asking the crowd for help in fixing security problems is going mainstream. Microsoft, Facebook, and other tech giants have offered "bug bounties"—cash rewards or other prizes and recognition—to individuals discovering vulnerabilities in their products for years. (Ars even made it onto Google's security wall of fame in 2014 for reporting a Google search bug, though we didn't get a cash payout.)


    • Mother-Son Duo Fools iPhone X Face ID Like It’s No Big Deal
      Uploaded by Attaullah Malik on YouTube, the 41-second clip shows his 10-year-old son unlocking Face ID on an iPhone X which was configured to accept the mother’s face.


    • Watch a 10-Year-Old's Face Unlock His Mom's iPhone X

      Malik offered to let Ammar look at his phone instead, but the boy picked up his mother's, not knowing which was which. And a split second after he looked at it, the phone unlocked.



    • This 10-year-old was able to unlock his mom’s iPhone using Face ID

      Although Apple says Face ID is more secure than Touch ID, this raises questions about the possibility of false positives not only happening with twins and siblings around the same age, but with people of different sexes and significantly different ages. It is possible that the son’s age played a role as Apple has said that the “undeveloped facial features” in those under the age of 13 could cause issues with Face ID.

    • How can airlines stop hackers pwning planes over the air? And don't say 'regular patches'
      At least some commercial aircraft are vulnerable to wireless hacking, a US Department of Homeland Security official has admitted.

      A plane was compromised as it sat on the tarmac at a New Jersey airport by a team of boffins from the worlds of government, industry and academia, we're told. During the hack – the details of which are classified – experts accessed systems on the Boeing 757 via radio-frequency communications.

      “We got the airplane on September 19, 2016. Two days later, I was successful in accomplishing a remote, non-cooperative, penetration,” said Robert Hickey, aviation program manager within the cyber-security division of the DHS's science and technology directorate, while speaking at the CyberSat Summit in Virginia earlier this month.


    • Google researcher discovers 14 Linux USB vulnerabilities


    • How a cloud-based Kali Linux system helps with pen testing
      More substantial and more security minded businesses often also perform regular penetration tests to identify vulnerabilities in their systems that go beyond the reach of standard vulnerability scanners.

      When it comes to penetration testing, Offensive Security's Kali Linux is one of the most widely used tool sets in the industry. It is a free, Debian-based Linux distribution that contains hundreds of specific penetration testing tools.


    • Security updates for Wednesday
    • Security Jobs Are Hot: Get Trained and Get Noticed
      The demand for security professionals is real. On Dice.com, 15 percent of the more than 75K jobs are security positions. “Every year in the U.S., 40,000 jobs for information security analysts go unfilled, and employers are struggling to fill 200,000 other cyber-security related roles, according to cyber security data tool CyberSeek” (Forbes). We know that there is a fast-increasing need for security specialists, but that the interest level is low.


    • security things in Linux v4.14


    • Schneier: It's Time to Regulate IoT to Improve Cyber-Security
      The time has come for the U.S. government and other governments around the world, to start regulating Internet of Things (IoT) security, according to Bruce Schneier, CTO of IBM's Resilient Systems.

      Schneier delivered his message during a keynote address at the SecTor security conference here. He noted that today everything is basically a computer, whether it's a car, a watch, a phone or a television. IoT today has several parts including sensors that collect data, computing power to figure out what to do with the collected data and then actuators that affect the real world.


    • Shady Anti-Spyware Developer Loses Lawsuit Against Competitor Who Flagged Its Software As Malicious
      Enigma Software makes Spyhunter, a malware-fighting program with a very questionable reputation. But the company isn't known so much for containing threats as it's known for issuing threats. It sued a review site for having the audacity to suggest its pay-to-clean anti-spyware software wasn't a good fit for most users… or really any users at all.

      Bleeping Computer found itself served with a defamation lawsuit for making fact-based claims (with links to supporting evidence) about Enigma's dubious product, dubious customer service tactics (like the always-popular "auto-renew"), and dubious lawsuits. Somehow, this dubious lawsuit managed to survive a motion to dismiss. Fortunately, Bleeping Computer was propped up by Malwarebytes' developers, who tossed $5,000 into Bleeping Computer's legal defense fund.




  • Defence/Aggression



    • U.S.-Backed, Saudi-Led Coalition Bombs Airport in Yemen’s Capital
      In Yemen, the U.S.-backed, Saudi-led coalition bombed the main airport in the capital Sana’a Tuesday, damaging the runway and destroying navigation equipment. The attack came after Saudi Arabia shut air, land and sea routes into Yemen, drawing warnings from the United Nations that the clampdown could worsen Yemen’s massive cholera epidemic and set off the largest famine the world has seen in decades, with millions of victims. Tuesday’s attack drew condemnation from Connecticut Democratic Senator Chris Murphy, who tweeted, “The US/Saudi coalition took out the Sanaa airport last night. Now no humanitarian relief by air. This is barbaric.”



    • Zimbabwe's Mugabe 'under house arrest' after army takeover
      Zimbabwe's military has placed President Robert Mugabe under house arrest in the capital Harare, South African President Jacob Zuma says.

      Mr Mugabe told Mr Zuma in a phone call that he was fine, the South African leader's office said.

      Troops are patrolling the capital, Harare, after they seized state TV and said they were targeting "criminals".


    • 'Tis The Season To Fail To Catch Contraband And Explosive Devices At TSA Checkpoints
      Just in time for the travel season to kick in, the TSA is operating at peak efficiency. Streamlining travelers' pre-boarding procedures this year -- just like every year preceding it -- will be the agency's inability to keep dangerous items from making their way onboard.

      Two years ago, the TSA's Inspector General discovered it could sneak contraband -- including explosive devices -- past the agency's pizza box recruits 95% of the time. A follow-up audit two years later was just as unimpressive. The IG's "Red Team" audit team called it quits after sneaking 17 of 18 forbidden items past TSA screeners. At 94.4%, it's hard to tell whether this is the TSA's idea of improvement or just the result of a smaller sample size. (The first audit team made 70 smuggling attempts, succeeding 67 times.) Theoretically, given enough attempts, the TSA may have been able to push this number much closer to 100%.




  • Transparency/Investigative Reporting



  • Environment/Energy/Wildlife/Nature



    • A Radioactive Cloud Wafts Over Europe, With Russia as Chief Suspect


    • Harvey-scale rains could hit Texas 18x more often by the end of the century
      Hurricanes strike the US with regularity, but there's nothing on record that is at all like Hurricane Harvey's pummeling of Houston. Understanding the risk of that kind of wind and rainfall happening again is critical if we intend to rebuild infrastructure that's going to survive to its expected expiration date. But freakish storms like Harvey make risk calculations challenging. These storms have no historic precedent, so we have no idea how often they occur; and the underlying probability of these events is shifting as our planet grows warmer.


    • ‘This Is an Emergency’: 1 Million African Americans Live Near Oil, Gas Facilities
      A new analysis concludes what many in African-American communities have long experienced: Low-income, black Americans are disproportionately exposed to toxic air pollution from the fossil fuel industry.

      More than 1 million African Americans live within a half-mile of oil and natural gas wells, processing, transmission and storage facilities (not including oil refineries), and 6.7 million live in counties with refineries, potentially exposing them to an elevated risk of cancer due to toxic air emissions, according to the study.

      When the authors looked at proximity to refineries, they found that about 40 percent of all people living in counties with refineries in Michigan, Louisiana and Pennsylvania are African American, and 54 percent in Tennessee are.

      In three other states—Oklahoma, Ohio and West Virginia—they found that about one in five African-American residents statewide lives within a half-mile of an oil or gas facility.



    • Some state-level policies really do curb energy sector emissions
      Researchers studying state-level climate policy in the US confirm what high school teachers already know: if you make an assignment voluntary and offer no incentives for completing it, no one’s gonna do it.

      In an assessment of 17 climate and energy policies enacted by US states between 1990 and 2014, researchers from Emory University found that mandatory policies usually had a positive effect on emissions reduction while voluntary policies always had negligible or no effect.

      What may be more interesting, however, is to look at which policies worked best. Such an analysis has growing practical implications. This year, the Trump administration reversed many of the Obama administration’s federal emissions-reducing guidelines, rules, and regulations, meaning states that want to curb emissions are left to their own devices. Legislators who are serious about crafting good environmental policy would do well to look at what has worked for others before making proposals.






  • Finance



  • AstroTurf/Lobbying/Politics



    • AG Sessions Faces Perjury Claims Ahead of Congressional Testimony
      This comes as Attorney General Jeff Sessions is heading to Capitol Hill today to testify before a congressional hearing on Russian meddling in the 2016 election. Some Democratic lawmakers have accused Sessions of committing perjury for previously telling Congress that he was not aware of any Trump campaign official talking to the Russians. Sessions’s remark contradicts the statements of two former Trump campaign aides, Carter Page and George Papadopoulos, who have admitted they had contacts with Russians during the campaign. Meanwhile, Sessions has asked officials to look into whether a special prosecutor is needed to investigate the Clinton Foundation and an Obama-era deal to sell a uranium company to Russia.



    • Senate panel approves Trump Homeland Security pick


    • It's not just Russia: Covert online tactics influenced votes in 18 countries in last year

      Elections and referendums in at least 18 countries over the past 12 months have been influenced by carefully planned "manipulation and disinformation tactics", new research suggests.



    • Governments in 30 countries are paying 'keyboard armies' to spread propaganda, report says

      It found governments including Mexico, Saudi Arabia and Turkey were using "paid pro-government commentators" to shape opinions online, often to give the impression of grassroots support for government policies.



    • New Report - Freedom on the Net 2017: Manipulating Social Media to Undermine Democracy

      Governments around the world are dramatically increasing their efforts to manipulate information on social media, threatening the notion of the internet as a liberating technology, according to Freedom on the Net 2017, the latest edition of the annual country-by-country assessment of online freedom, released today by Freedom House.



    • Hey, Mark Zuckerberg: My Democracy Isn’t Your Laboratory
      My country, Serbia, has become an unwilling laboratory for Facebook’s experiments on user behavior — and the independent, nonprofit investigative journalism organization where I am the editor in chief is one of the unfortunate lab rats.

      Last month, I noticed that our stories had stopped appearing on Facebook as usual. I was stunned. Our largest single source of traffic, accounting for more than half of our monthly page views, had been crippled.

      Surely, I thought, it was a glitch. It wasn’t.
    • Oklahoma Democrats win state Senate seat in red-district special election
      Democrats in Oklahoma picked up a key state Senate seat in a Tuesday special election, marking the fourth seat Democrats have gained in special elections in the state this year.

      The Tulsa World reports Democrat Allison Ikley-Freeman won a close race over Republican Brian O’Hara in Oklahoma’s Senate District 37. The race was held to fill the seat of Republican Dan Newberry, who was leaving the state Senate.

      Ikley-Freeman, a 26-year-old lesbian, defeated O’Hara by 31 votes.
    • Koch Brothers Said to Back Time Inc. Deal Talks With Meredith
    • Trump Adds to Washington’s ‘Swamp’
      President Trump’s vow to “drain the swamp” was just one more empty promise as he adds to the muck with military contractors in key Pentagon jobs and other industry lobbyists at regulatory posts, says Jonathan Marshall.
    • Trump’s Debasement of Civilization
      Hillary Clinton’s “deplorables” comment was surely a campaign gaffe, but she wasn’t wrong about Donald Trump’s exploitation of white grievances and other ugly attitudes, writes Lawrence Davidson.
    • Lawmaker Seeks Records of Lobbyist Contacts with Agriculture Official
      A House Democrat demanded on Tuesday that a former pesticide lobbyist who was appointed to the Department of Agriculture by the Trump administration release all emails she has exchanged with lobbyists or other representatives from her former industry.
    • GOP senators from NC come out against Trump EPA nominee
      North Carolina’s two Republican senators said Wednesday they oppose President Donald Trump’s pick to oversee chemical safety at the Environmental Protection Agency, putting his nomination at serious risk.

      Senators Richard Burr and Thom Tillis issued statements saying they will vote against Michael L. Dourson to serve as head of EPA’s Office of Chemical Safety and Pollution Prevention.
    • Trump Judicial Nominee Brett Talley Appears to Have Defended “the First KKK” in Message Board Post
      Brett Talley, the Alabama lawyer Donald Trump has nominated to be a federal district judge, is a 36-year-old ghosthunter who has never tried a case and who failed to disclose to the Senate that he is married to the chief of staff to the White House counsel. He also seems to have written 16,381 posts—more than 3€½ per day—on the University of Alabama fan message board TideFans.com. As BuzzFeed has reported, a user who is almost certainly Talley posted for years under the handle BamainBoston. (BuzzFeed managed to identify him because BamainBoston wrote a message headlined “Washington Post Did A Feature On Me,” linking to a 2014 Ben Terris profile of Talley. BuzzFeed reported that a “Justice Department spokesman declined to comment on Talley's behalf.”)





  • Censorship/Free Speech



    • New EU law prescribes website blocking in the name of “consumer protection”

      According to the new rules, national consumer protection authorities can order any unspecified third party to block access to websites without requiring judicial authorisation.

      [...]

      Tragically, the Parliament’s negotiator, MEP Olga Sehnalová from the Czech Social Democrats (S&D group), agreed to a compromise that adopted the Council’s proposal on website blocking.



    • Get ready for a whole lot more site blocking in the EU, thanks to a new consumer protection [sic] law

      Here’s the important bit, though, in Article 9(4), which covers minimum enforcement powers



    • European Union just decided to block websites without due process “For Consumer Protection”

      In a new bill just passed by the European Parliament, the European Union decided to give Internet censorship powers to each state’s consumer protection agency, completely without judicial oversight or a court order. These are the agencies typically dealing with defective electrical products or dangerous chemicals.



    • The Pirate Bay & 1337x Must Be Blocked, Austrian Supreme Court Rules

      After a prolonged battle through every stage of the Austrian legal system, the Supreme Court has now ruled that local ISPs must prevent their subscribers from accessing The Pirate Bay. The case, filed by a collecting society representing around 3,000 artists, also involves top 10 torrent site 1337x and long defunct index h33t.to.



    • 20 Years of Protecting Intermediaries: Legacy of 'Zeran' Remains a Critical Protection for Freedom of Expression Online
      At the Electronic Frontier Foundation (EFF), we are proud to be ardent defenders of €§230. Even before €§230 was enacted in 1996, we recognized that all speech on the Internet relies upon intermediaries, like ISPs, web hosts, search engines, and social media companies. Most of the time, it relies on more than one. Because of this, we know that intermediaries must be protected from liability for the speech of their users if the Internet is to live up to its promise, as articulated by the U.S. Supreme Court in ACLU v. Reno, of enabling “any person … [to] become a town crier with a voice that resonates farther than it could from any soapbox“ and hosting “content … as diverse as human thought.”

      As we hoped—and based in large measure on the strength of the Fourth Circuit’s decision in Zeran—€§230 has proven to be one of the most valuable tools for protecting freedom of expression and innovation on the Internet. In the past two decades, we’ve filed well over 20 legal briefs in support of €§230, probably more than on any other issue, in response to attempts to undermine or sneak around the statute. Thankfully, most of these attempts were unsuccessful. In most cases, the facts were ugly—Zeran included. We had to convince judges to look beyond the individual facts and instead focus on the broader implications: that forcing intermediaries to become censors would jeopardize the Internet’s promise of giving a voice to all and supporting more robust public discourse than ever before possible.
    • Appeals Court’s Disturbing Ruling Jeopardizes Protections for Anonymous Speakers
      A federal appeals court has issued an alarming ruling that significantly erodes the Constitution’s protections for anonymous speakers—and simultaneously hands law enforcement a near unlimited power to unmask them.

      The Ninth Circuit’s decision in U.S. v. Glassdoor, Inc. is a significant setback for the First Amendment. The ability to speak anonymously online without fear of being identified is essential because it allows people to express controversial or unpopular views. Strong legal protections for anonymous speakers are needed so that they are not harassed, ridiculed, or silenced merely for expressing their opinions.
    • California Appeals Court Issues A Ruling That Manages To Both Protect And Undermine Online Speech
      Earlier this year I wrote about Yelp's appeal in Montagna v. Nunis. This was a case where a plaintiff had subpoenaed Yelp to unmask one of its users and Yelp tried to resist the subpoena. In that case, not only had the lower court refused to quash the subpoena, but it sanctioned Yelp for having tried to quash it. Per the court, Yelp had no right to try to assert the First Amendment rights of its users as a basis for resisting a subpoena. As we said in the amicus brief I filed for the Copia Institute in Yelp's appeal of the ruling, if the lower court were right it would be bad news for anonymous speakers, because if platforms could not resist unfounded subpoenas then users would lose an important line of defense against all the unfounded subpoenas seeking to unmask them for no legitimate reason.
    • Africa’s largest TV platform has a growing free speech and censorship problem
      Africa’s largest television platform has pulled a talk show after it asked questions about police brutality and media freedom in Zambia.

      Radio and television promos for Talk With Kwangu were pulled off air after they featured a sound bite from the wife of Zambia’s opposition leader, Hakainde Hichilema, the Mast newspaper reported. The show, hosted by journalist Kwangu Liwewe, airs on M-Net’s Zambezi Magic channel in six southern African countries.
    • Rozcomnadzor's Corruption Scandal Doesn't Prevent The Russian Government From Empowering It To Ignore Due Process
      Reading our coverage of Rozcomnadzor, the Russian government agency tasked with keeping the internet clean of piracy, you would know that the agency has a laughably bad track record for pretty much everything. Even as ranking members of the agency have been embroiled in a corruption scandal in which they bilked Russian taxpayers by creating fake employees, the statistics out on Rozcomnadzor's ability to carry out its stated mission -- blocking sites used for piracy on the internet -- are horrendous. Put simply, the agency has managed to take down 4,000 "pirate" sites through legal cluster bombs that have inflicted 41,000 sites worth of collateral damage. Any honest look at those kinds of numbers would lead a sincere government to seriously consider whether such an agency was worthy of existence at all.
    • Letter to the Editor: “On learning, student activism, and censorship”


      I am receiving messages from my family warning me not to speak up. They know all too well about the unspoken systems of white retaliation that exist in the “real world” and are afraid that I may lose school scholarships, career opportunities, or be hurt.
    • MYANMAR: HOW ART HAS SURPASSED CENSORSHIP LAWS
      With censorship so prominent in Myanmar, it is vital that artists from this country are especially applauded for their works and the challenges they faced to simply offer their perspectives. Below are a few spotlight artists that went beyond censorship limitations to share their work with the world.


    • Freedom Of Expression – Paper Looks At ‘Right To Be Forgotten’ In Latin American Context
      It’s hard to escape the watchful eye of the internet – it will follow you through life. But if something put on the internet about you is wrong, misrepresents you or even endangers you, should you have a right to remove it from the internet? A new paper from the Inter-American Dialogue in Washington, DC looks at the European Union ‘right to be forgotten online’ rule and considers its applicability in Latin America.

      [...]

      According to Inter-American Dialogue, “The authors conclude with four recommendations: (1) that governments in the Americas face these questions head-on; (2) that courts and authorities throughout the hemisphere work to apply the existing and hard-fought inter-American standards protecting the freedom of expression; (3) that a transatlantic dialogue be initiated to discuss the right to be forgotten online; and (4) that governments search for alternative legal and technological mechanisms to protect privacy so as to limit the tensions while taking into account the very real concerns that the right to be forgotten attempts to address.”




  • Privacy/Surveillance



    • Shadow Brokers cause ongoing headache for NSA


    • Russian Hackers Aren't the NSA's Biggest Problem
      It's hard to say which is more disturbing: Reports that hackers have obtained some of the National Security Agency's most classified cybertools and are auctioning them off on the internet -- or that, 15 months into its investigation, the agency still doesn't know if it's dealing with an outside hack, a leak or both.

      In short, the agency is reeling. What the NSA needs most of all -- aside from finding out how the hackers, suspected to be a Russian group known as the Shadow Brokers, got the material -- is a change in culture. Fortunately, there are precedents for a security agency seeking to restore its reputation and credibility: the actions taken by the FBI and CIA after the moles Robert Hanssen and Aldrich Ames, respectively, were exposed in 2001 and 1994.
    • An NSA Breach and the New Hobbesian War on Our Privacy
      Since the former intelligence contractor Edward Snowden's disclosures began showing up in the Washington Post and the Guardian, the political debate over the American surveillance state has been stuck in the 20th century.

      The public has feared a secretive, all-seeing eye, a vast bureaucracy that could peer into our online lives and track the numbers our smartphones dialed. Privacy as we knew it was dead. The era of Big Brother was here.

      President Barack Obama responded to the Snowden leaks by commissioning a blue-ribbon panel that ended up concluding the way the National Security Agency did business often trampled on legitimate civil liberties concerns. The government did not need to store our metadata, or the numbers, times and dates of our phone calls.


    • First Ever En Banc FISA Court Review Gives Plaintiffs Standing To Challenge Surveillance Program Secrecy


      One more thing we can give Ed Snowden credit for: the possibility we may be seeing even more public access to FISA court opinions and other FISA docs in the future. [h/t Mike Scarcella]

      There's still a long way to go procedurally, but this latest ruling from the FISA court will allow a First Amendment lawsuit by the ACLU and the Yale Law School Media Freedom and Information Access Clinic to move forward. Being granted the standing to actually challenge government surveillance is a rarity. The cover of national security darkness has prevented many plaintiffs from being able to allege harm, but the Snowden leaks have provided many public entities the information they need to shore up these allegations.
    • Latest DOJ WTFness: Encryption Is Like A Locked House That Won't Let Its Owners Back Inside


      Deputy Attorney General Rod Rosenstein continues his push for law enforcement-friendly broken encryption. The ultimate goal is the same but the arguments just keep getting worse. Trying to pitch worthless encryption (i.e., encryption easily compromised in response to government demands) as "responsible" encryption is only the beginning of Rosenstein's logical fallacies.

      After a month-plus of bad analogies and false equivalents, Rosenstein has managed to top himself. The path to Rosenstein's slaughtering of a metaphor runs through such highlights as the DAG claiming device encryption is solely motivated by profits and that this is the first time in history law enforcement hasn't had access to all forms of evidence. It's an intellectually dishonest campaign against encryption, propelled by the incredibly incorrect belief that the Fourth Amendment was written to provide the government with access, rather than to protect citizens from their government.


    • 'Leaker' behind massive NSA breach possibly still working at agency


      Around mid-2016 the United States National Security Agency (NSA) was breached – and it has been revealed the ‘leaker’ might still be at play.

      The breach was reported as ‘catastrophic’ and even more damaging than Edward Snowden’s massive data leak.

      Since August 2016, a group called the Shadow Brokers has been releasing information on NSA cyberweapons.



    • Netflix Knows Some Very Strange Things About Public Viewing Habits

      Yes, Netflix is paying attention to when, where, and how people consume TV and movies, and has actually started studying how their habits are changing.



    • Netflix finds that people who stream steamy scenes on the train aren’t usually embarrassed about it

      Of the 37,056 people Netflix polled globally between August and September, 67 percent revealed themselves to be public bingers. Most of them, 77 percent, upon noticing snoopers, refused to turn off their show or film and just casually continued watching.



    • When Bingeing Goes Public, Private Behaviors are Exposed and Social Norms are Shelved

      The survey was conducted by SurveyMonkey from August 24 - September 7, 2017 and based on 37,056 responses. The sample was balanced by age and gender and representative of an adult online population who watch movies and TV shows via streaming services in public settings in The United States, Argentina, Australia, Brazil, Canada, Chile, Colombia, France, Germany, India, Italy, Malaysia, Mexico, Netherlands, Philippines, Poland, South Korea, Spain, Sweden, Taiwan, Thailand and Turkey.



    • First Digital Pill Approved to Worries About Biomedical ‘Big Brother’

      The patch sends the date and time of pill ingestion and the patient’s activity level via Bluetooth to a cellphone app. The app allows patients to add their mood and the hours they have rested, then transmits the information to a database that physicians and others who have patients’ permission can access.



    • Safety alert: see how easy it is for almost anyone to hack [sic] your child’s connected toys

      Watch our video below to see just how easy it is for anyone to take over the voice control of a popular connected toy, and speak directly to your child through it. And we’re not talking professional hackers [sic]. It’s easy enough for almost anyone to do.



    • Trump administation to release rules on disclosure of cybersecurity flaws: NSA
      The Trump administration is expected to publicly release on 15 November its rules for deciding whether to disclose cybersecurity flaws or keep them secret, a national security official told Reuters.


    • EFF’s Street-Level Surveillance Project Dissects Police Technology
      Step onto any city street and you may find yourself subject to numerous forms of police surveillance—many imperceptible to the human eye.

      A cruiser equipped with automated license plate readers (also known as ALPRs) may have just logged where you parked your car. A cell-site simulator may be capturing your cell-phone data incidentally while detectives track a suspect nearby. That speck in the sky may be a drone capturing video of your commute. Police might use face recognition technology to identify you in security camera footage.





  • Civil Rights/Policing



    • At Guantánamo, a Death Penalty Case Without a Death Penalty Lawyer
      The Guantánamo military commissions, the scheme created by the government to try 9/11 and other detainees, have devolved into an unacceptable and alarming assault on defense lawyers attempting to provide fair representation to their clients.

      A new letter, drafted by the ACLU and joined by 150 death penalty lawyers and law professors, registers the capital defense community’s outrage over the legal breakdown, which clearly violates federal and international law.
    • An Arkansas Town Agrees to Criminal Justice Reform to Ensure That the Poor Are Not Jailed
      For years, the city of Sherwood, Arkansas, home to about 30,000 people, had a practice of jailing people who could not afford to pay court costs incurred from bounced checks. Thousands of Arkansans were locked up—sometimes after bouncing checks in small amounts—when they could not pay crushing fees, fines, and other costs that compounded their debt by as much as 10 times the original amount.
    • Edward S. Herman: Master of Dissent (1925–2017)
      One of the greatest and sweetest media critics ever, Edward S. Herman, has passed away. Ed was the main author of Manufacturing Consent: The Political Economy of the Mass Media, written with Noam Chomsky—the 1980s masterwork that exposed how elite US media typically function as propaganda organs for US empire and militarism.

      In 1984, when I was part of a lawyers’ delegation monitoring an “election” in death squad-run El Salvador, I remember a gaggle of progressive attorneys at the Salvador Sheraton tussling with each other to get their hands on a shipment of hot-off-the-press copies of Demonstration Elections, Ed’s devastating book (with Frank Brodhead) on the US “staging” elections as PR shows to prop up repressive puppet regimes, from the Dominican Republic to Vietnam to Salvador.
    • Who Has Your Back in Colombia? Our Third-Annual Report Shows Progress
      Fundación Karisma in cooperation with EFF has released its third-annual €¿Dónde Estan Mis Datos? report, the Colombian version of EFF’s Who Has Your Back. And this year’s report has some good news.

      According to the Colombian Ministry of Information and Communication Technologies, broadband Internet penetration in Colombia is well over 50% and growing fast. Like users around the world, Colombians put their most private data, including their online relationships, political, artistic and personal discussions, and even their minute-by-minute movements online. And all of that data necessarily has to go through one of a handful of ISPs. But without transparency from those ISPs, how can Colombians trust that their data is being treated with respect?


    • EU citizens keep immigration rights in UK, court rules
      EU nationals who become British citizens do not lose the right to bring a foreign-born spouse to the UK, the European Court of Justice has ruled.

      London's High Court referred the case of an Algerian man, who lived in the UK with his wife, but who British authorities were trying to deport.

      His wife had dual Spanish and British nationality, which gave the man a "derived" residence right, judges said.


    • Black worker says Tesla factory was a “hotbed for racist behavior”
      Tesla’s factory in Fremont is a “hotbed for racist behavior,” according to a legal complaint filed in California's Alameda County Superior Court on Monday and reported by Bloomberg.

      Marcus Vaughn is an African-American who worked on Tesla’s factory floor from April to October of this year. Vaughn charges that workers and managers on the factory floor routinely used the n-word within his earshot. When he complained to the human resources department, Vaughn says, he was fired for “not having a positive attitude.”

      According to Bloomberg, Vaughn is seeking to be the lead plaintiff in a class-action lawsuit on behalf of more than 100 black Tesla workers.

      The lawsuit was filed by Lawrence Organ, the same civil rights lawyer who sued on behalf of three other black Tesla workers for racial discrimination last month. Those men also said they routinely heard people on the factory floor using racial epithets. A third lawsuit, alleging similar facts, was filed in March.


    • DOJ: Civil Asset Forfeiture Is A Good Thing That Only Harms All Those Criminals We Never Arrest
      Deputy Attorney General Rod Rosenstein has taken a brief vacation from his "Responsible Encryption World Tour" to defend the merits of something equally questionable: civil asset forfeiture.

      [...]

      From there, Rosenstein says the expected stuff: civil asset forfeiture is just a way of crippling criminal enterprises, despite it being predicated on one-sided accusations about the allegedly illegitimate origin of seized property and tied to a judicial process that discourages citizens from attempting to reclaim their possessions.

      The opening paragraph also makes it appear as though civil asset forfeiture is often used to return unlawfully obtained assets to victims of crime. Nothing could be further from the truth. While this occasionally happens in criminal forfeiture cases, the lack of criminal charges in civil forfeiture cases makes it extremely unlikely there will be any "victims" to "return" seized assets to.


    • North Carolina Is Trying to Destroy the State’s Only Farmworkers Union. We’re Suing.
      North Carolina passed a law making it all but impossible for the state’s only farmworkers union to operate effectively.

      Dolores Huerta, the legendary civil rights icon and farmworker activist, had it right: “Organized labor is a necessary part of democracy.” Day in and day out, unions struggle to make sure that farmworkers have a voice in in their workplace and in their communities, but they face enormous obstacles.

      Farmworkers, most of whom are people of color and many of whom are in this country on temporary visas, have long been excluded from federal and state labor laws. That means they don’t enjoy many of the key protections under the National Labor Relations Act, the Fair Labor Standards Act, and numerous state minimum wage, workers’ compensation, and youth employment laws. As a result, they face high risks to their health and safety, substandard living conditions, and abuse and exploitation by their employers.

      Now North Carolina has mounted a direct assault on the state’s only farmworkers union, the Farm Labor Organizing Committee (FLOC), which works tirelessly to protect those workers. A new state law, sponsored and supported by legislators who have a financial interest in suppressing farmworker organizing, would make it all but impossible for the union to operate effectively in the state. Together with a coalition of civil rights groups, including the Southern Poverty Law Center and the North Carolina Justice Center, the ACLU filed a federal lawsuit alleging that the law violates farmworkers’ constitutional and civil rights. We have also asked the court for a preliminary injunction, which would suspend the law’s operation during the course of the litigation.


    • A Heartfelt Thank You to Edward Herman


      It is with great sadness that we report the death of the brilliant and prolific Edward Herman…he was 92. He gave us a great chapter for our latest book, Censored 2018: Press Freedoms in a ‘Post-Truth’ World— “Still Manufacturing Consent: the Propaganda Model at Thirty.” He takes on critics of the Propaganda Model and argues how it continues to stand the test of time. Grateful that we got to work with him this past spring through late June during his writing of the chapter, which may be his last published work (done after his work on Fake News/Russia for Monthly Review).

      He was incredibly kind in our exchanges. When I reached out to him last spring to talk about the upcoming 30-year anniversary of his book with Noam Chomsky (Manufacturing Consent), he was a bit reluctant as he had two other chapter-length projects in the hopper (yes, into his 90s), but said he really wanted to do the retrospective on the Propaganda Model for Project Censored. He eventually wrote back and said…”I’ll do it.” We were delighted that he agreed.


    • NYT’s Campus Free Speech Coverage Focuses 7-to-1 on Plight of Right


      Over the past 18 months, the New York Times has dedicated 21 columns and articles to the subject of conservatives’ free speech on campus, while only three covered the silencing of college liberals or leftists. A review of Times articles, columns, op-eds and reports shows a clear emphasis on documenting and condemning perceived suppression of conservative voices at American universities, while rarely mentioning harassment campaigns against leftist professors and/or the criminalization of leftist causes such as the pro-Palestinian BDS (Boycott Divestment Sanctions) movement.


    • Cards Against Humanity buys piece of the U.S. border so Trump can't build his wall
    • DOJ Still Demanding Identity Of Twitter Users Because Someone They Shouldn't Have Arrested Tweeted A Smiley Emoji
      Last month, I had two blog posts about a particularly insane lawsuit being pushed by the Justice Department against a computer security researcher, Justin Shafer. As we explained, the arrest and prosecution of Shafer appeared to be the result of a truly ridiculous vendetta against Shafer by the FBI because Shafer got angry over a previous (and totally misguided) decision to raid his home, after he properly disclosed security problems involving some dental practice software. It seems clear that Shafer never should have been arrested (and never should have had the FBI raid his house three times over just a few months). Of course, what first brought the case to my attention was an even more ridiculous part of the story, in which the DOJ had sent a subpoena to Twitter demanding basically all info on five Twitter users -- even though two of them don't hide their identity -- because Shafer tweeted a smiley emoji at them.


    • Why Google should be afraid of a Missouri Republican’s Google probe
      The Republican attorney general of Missouri has launched an investigation into Google's business practices. Josh Hawley wants to know how Google handles user data. And he plans to look into whether Google is using its dominance in the search business to harm companies in other markets where Google competes.

      "There is strong reason to believe that Google has not been acting with the best interest of Missourians in mind," Hawley said in a Monday statement.
    • Texas Shooting Shows Once Again That Animal Cruelty and Human Cruelty Are Strongly Linked
      What do Ted Bundy, John Wayne Gacy, Jeffrey Dahmer, Devin Kelley the Texas church killer and a host of other killers have in common? They tortured animals and delighted in the pain they inflicted.

      Dahmer, who murdered 17 men and boys between 1978 and 1991 tortured frogs and cats and decapitated dogs. He mounted their heads on sticks including his own puppy. Mass murderer Ted Bundy watched as his father tortured animals and then did the same.

      “The “Boston Strangler” Albert DeSalvo trapped dogs and cats in wooden crates and shot them with a bow and arrow, reports the New York Post. “John Wayne Gacy, who murdered 33 men and boys in his suburban Chicago home, tortured turkeys by throwing balloons filled with gasoline and then igniting the birds.”


    • U.N. Warns European Union over Dire Conditions in Libyan Migrant Camps
      In Libya, human rights monitors who toured the country’s migrant detention camps say nearly 20,000 people are enduring “horrific conditions.” This is United Nations spokesperson Jeremy Laurence.





  • Internet Policy/Net Neutrality

    • FCC’s latest gift to telcos could leave Americans with worse Internet access
      The Federal Communications Commission will vote Thursday on a plan that, according to Chairman Ajit Pai, will strip away regulations that prevent telcos from upgrading their networks.

      But in doing so, the Republican-controlled FCC plans to eliminate a requirement that telcos provide Americans with service at least as good as the old copper networks that provide phone service and DSL Internet. The requirement relates to phone service but has an impact on broadband because the two services use the same networks.

      As carriers like AT&T and Verizon turn off copper networks throughout much of the country, many people fear that the networks won't be replaced with fiber or something of similar quality. That's why the FCC in 2014 created a "functional test" for carriers that seek permission to abandon copper networks. In short, carriers have to prove that the replacement service is just as good and provides the same capabilities as what's being discontinued.


    • AT&T Promises Your Broadband Will Suck Less...But Only If It Gets Another Massive Tax Cut
      One of the reasons for the U.S.' pricey and mediocre broadband is our historical habit of throwing oodles of tax breaks and subsidies for fiber optic networks at giant ISPs, then letting them tap dance over and around those obligations when it comes time to deliver. Verizon, for example, has gobbled up millions in subsidies and tax breaks from cities and states up and down the Eastern seaboard for fiber optic networks it fails to fully deploy. Given the stranglehold large ISPs have on federal and state regulators and lawmakers, efforts to hold these companies accountable for any of this have been decidedly mixed.


    • Pressure grows on FCC to kill state consumer protection laws
      The broadband industry is stepping up its attack on states that dare to impose privacy or net neutrality rules on Internet service providers.

      Mobile industry lobby group CTIA urged the Federal Communications Commission to preempt state laws on privacy and net neutrality in a recent meeting and filing. Comcast and Verizon had already asked the FCC to preempt such laws; CTIA represents AT&T, Verizon, T-Mobile USA, Sprint, and other mobile companies.




  • Intellectual Monopolies



    • ‘Damaging’ Provisions On IP And Health Dropped From TPP Agreement, MSF Says
      Trade ministers negotiating the Trans-Pacific Partnership (TPP) without the United States have dropped many problematic provisions related to intellectual property and health, Médicins Sans Frontières (MSF, Doctors Without Borders) reported today. Also removed from the agreement appears to be the investor-state dispute settlement provisions, according to a source.

      “Ministers from the eleven countries assessing the Trans-Pacific Partnership (TPP) trade deal have suspended many of the damaging provisions that would have restricted access to medicines and vaccines, a victory for millions of people who rely on affordable medicines worldwide,” MSF said in a press release.


    • Trademarks



      • City Of Portland Still Jerking Around Local Businesses Over Trademark Of Famous City Sign
        The last time we checked in with the city of Portland, it was attempting to navigate some perilous waters regarding a trademark the city has on a famous city sign. Beer-maker Pabst, which I am to understand somehow won a blue ribbon a long time ago, built a logo for a concert series it wanted to promote in Portland that served as an homage to the famous sign, which includes an outline of the state and a stag leaping across the top of it. Because of this, the city saw fit to send a cease and desist notice to Pabst, despite beer not generally being a competitor for a city's tourism business. When everyone pointed this out to the city, it decided to not pursue any legal action. But the city continued to threaten local businesses with its trademark, including Vintage Roadside, which sells a "Made In Portland" series of photos on Etsy, some of which included the famous sign. Vintage Roadside decided to sue the city to have the trademark declared invalid, prompting Portland officials to issue a covenant not to sue to avoid any ruling on the matter.

        You might have thought that this series of slapdowns would have deterred Portland officials from this bullying course of action, but you'd be wrong. Portland attempted to expand the trademark it has for the sign into the alcohol designation, thinking that it could license the image to beermakers and make some coin. Unfortunately for the city, a local brewery already has a trademark for the sign for the beer business.




    • Copyrights



      • ResearchGate Restricts Access to Nearly 2 Million Articles

        The dispute with ResearchGate is just the latest in a series of actions by academic publishers against websites and social networks that make copyrighted academic articles freely available to users. In 2013, Elsevier sent another paper-sharing site, Academia.edu, around 2,800 take-down notices in a single month. And earlier this week, a US judge issued an injunction that allows ACS to demand that Internet service providers block access to pirate site Sci-Hub, which hosts more than 60 million research articles.



      • Publishers push ResearchGate harder in copyright battle


      • TPP Texts Show Suspended IP Provisions
        Trade ministers negotiating the Trans-Pacific Partnership agreement have released the list of provisions they have suspended, including a range of articles related to intellectual property rights, such as patentable subject matter, test data protection, biologics, copyright terms of protection, and technological protection measures.

        Ministers from the 11 countries issued a statement and the list of suspended provisions, after concluding their latest negotiations in the margins of the Asia-Pacific Economic Cooperation (APEC) meetings in Da Nang, Vietnam earlier this week.

        The ministerial statement and list of provisions are available here. The TPP is now named the Comprehensive and Progressive Agreement for Trans-Pacific Partnership (CPTPP).
      • US Copyright Office: Re-Registration Required For Claiming Liability Exemptions
        The United States Copyright Office has issued a reminder to all online service providers and agents that they must renew their registration with the office by end of year in order to claim liability limitations from copyright infringing content.
      • US, Canadian & Mexican Law Professors, Academics And Policy Experts: NAFTA Must Include Fair Use, Safe Harbors
        Today, over seventy international copyright law experts called for NAFTA and other trade negotiators to support a set of balanced copyright principles. The experts urge trade negotiators to support policies like fair use, safe harbor provisions, and other exceptions and limitations that permit and encourage access to knowledge, flourishing creativity, and innovation. Signatories include preeminent intellectual property professors and experts from law schools, think tanks, and public interest organizations in the US, Canada, and Mexico, as well as Argentina, Australia, China, Ireland, and Switzerland.
      • Copyright Exceptions For Libraries Widespread, Study At WIPO Shows, But Disharmony Persists
        Nobody among members of the World Intellectual Property Organization disputes the importance of the public services provided by libraries and archives. However, positions are different when it comes to providing exceptions to copyright to those entities so they can continue to dispense their services, in particular in the digital age. An updated study presented today in a WIPO committee shows that most countries have exceptions relating to libraries, but termed in very different ways, and are hesitant on how to deal with digital technologies.






Recent Techrights' Posts

Google Has Mass Layoffs (Again), But the Problem is Vastly Larger
started as a rumour about January 2025
Electronic Frontier Foundation Defends Companies That Attack Free Speech Online (Follow the Money)
One might joke that today's EFF has basically adopted the same stance as Donald Trump and has a "warm spot" for BRICS propaganda
 
Gemini Links 22/12/2024: Solstice and IDEs
Links for the day
BetaNews: Microsoft Slop is Your "Latest Technology News"
Paid-for garbage disguised as "journalism"
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, December 21, 2024
IRC logs for Saturday, December 21, 2024
Links 21/12/2024: EU on Solidarity with Ukraine, Focus on Illegal and Unconstitutional Patent Court in the EU (UPC)
Links for the day
[Meme] Microsofters at the End of David's Leash
Hand holding the leash. Whose?
Deciphering Matt's Take on WordPress, Which is Under Attack From Microsofters-Funded Aggravator
the money sponsoring the legal attacks on WordPress and on Matt is connected very closely to Microsoft
Gemini Links 21/12/2024: Projections, Dead Web ('Webapps' Replacing Pages), and Presentation of Pi-hole
Links for the day
American Samoa One of the Sovereign States Where Windows Has Fallen Below 1% (and Stays Below It)
the latest data plotted in LibreOffice
[Meme] Brian's Ravioli
An article per minute?
Links 21/12/2024: "Hey Hi" (AI) or LLM Bubble Criticised by Mainstream Media, Oligarchs Try to Control and Shut Down US Government
Links for the day
LLM Slop is Ruining the Media and Ruining the Web, Ignoring the Problem or the Principal Culprits (or the Slop Itself) Is Not Enough
We need to encourage calling out the culprits (till they stop this poor conduct or misconduct)
Christmas FUD From Microsoft, Smearing "SSH" When the Real Issue is Microsoft Windows
And since Microsoft's software contains back doors, only a fool would allow any part of SSH on Microsoft's environments, which should be presumed compromised
Paywalls, Bots, Spam, and Spyware is "Future of the Media" According to UK Press Gazette
"managers want more LLM slop"
On BetaNews Latest Technology News: "We are moderately confident this text was [LLM Chatbot] generated"
The future of newsrooms or another site circling down the drain with spam, slop, or both?
"The Real New Year" is Now
Happy solstice
Microsoft OSI Reads Techrights Closely
Microsoft OSI has also fraudulently attempted to censor Techrights several times over the years
"Warning About IBM's Labor Practices"
IBM is not growing and its revenue is just "borrowed" from companies it is buying; a lot of this revenue gets spent paying the interest on considerable debt
[Meme] The Easier Way to Make Money
With patents...
The Curse (to Microsoft) of the Faroe Islands
The common factor there seems to be Apple
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, December 20, 2024
IRC logs for Friday, December 20, 2024
Gemini Links 21/12/2024: Death of Mike Case, Slow and Sudden End of the Web
Links for the day
Links 20/12/2024: Security Patches, Openwashing by Open Source Initiative, Prison Sentence for Bitcoin Charlatan and Fraud
Links for the day
Another Terrible Month for Microsoft in Web Servers
Consistent downward curve
LLM Slop Disguised as Journalism: The Latest Threat to the Web
A lot of it is to do with proprietary GitHub, i.e. Microsoft
Gemini Links 20/12/2024: Regulation and Implementing Graphics
Links for the day
Links 20/12/2024: Windows Breaks Itself, Mass Layoffs Coming to Google Again (Big Wave)
Links for the day
Microsoft: "Upgrade" to Vista 11 Today, We'll Brick Your Audio and You Cannot Prevent This
Windows Update is obligatory, so...
The Unspeakable National Security Threat: Plasticwares as the New Industrial Standard
Made to last or made to be as cheap as possible? Meritocracy or industrial rat races are everywhere now.
Microsoft's All-Time Lows in Macao and Hong Kong
Microsoft is having a hard time in China, not only for political reasons
[Meme] "It Was Like a Nuclear Winter"
This won't happen again, will it?
If You Know That Hey Hi (AI) is Hype, Then Stop Participating in It
bogus narrative of "Hey Hi (AI) arms race" and "era/age of Hey Hi" and "Hey Hi Revolution"
Bangladesh (Population Close to 200 Million) Sees Highest GNU/Linux Adoption Levels Ever
Microsoft barely has a grip on this country. It used to.
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, December 19, 2024
IRC logs for Thursday, December 19, 2024