Configuring local storage is something desktop Linux users do very infrequently—maybe only once, during installation. Linux storage tech moves slowly, and many storage tools used 20 years ago are still used regularly today. But some things have improved since then. Why aren't people taking advantage of these new capabilities?
This article is about Stratis, a new project that aims to bring storage advances to all Linux users, from the simple laptop single SSD to a hundred-disk array. Linux has the capabilities, but its lack of an easy-to-use solution has hindered widespread adoption. Stratis's goal is to make Linux's advanced storage features accessible.
If that wasn't enough, a new commit in the parent Chromium OS offers "new device policy to allow Linux VMs on Chrome OS." Which about seals it.
Read the accompanying Gerrit documentation and you get further confirmation: "At this time, in order for Linux VMs to run, the Finch experiment also needs to be enabled. After this feature is fully launched, the Finch control logic will be removed."
For VC5, I renamed the kernel driver to “v3d” and submitted it to the kernel. Daniel Vetter came back right away with a bunch of useful feedback, and next week I’m resolving that feedback and continuing to work on the GMP support.
On the vc4 front, I did the investigation of the HDL to determine that the OLED matrix applies before the gamma tables, so we can expose it in the DRM for Android’s color correction. Stefan was also interested in reworking his fencing patches to use syncobjs, so hopefully we can merge those and get DRM HWC support in mainline soon. I also pushed Gustavo’s patch for using the new core DRM infrastructure for async cursor updates. This doesn’t simplify our code much yet, but Boris has a series he’s working on that gets rid of a lot of custom vc4 display code by switching more code over to the new async support.
Eric Anholt of Broadcom has sent out his revised patches for the "V3D" DRM driver, which up until last week was known as the VC5 DRM driver.
As explained last week, the VC5 driver components are being renamed to V3D since it ends up supporting more than just VC5 with Broadcom VC6 hardware already being supported too. Eric is making preparations to get this VideoCore driver into the mainline Linux kernel and he will then also rename the VC5 Gallium3D driver to V3D Gallium3D.
With last week's release of Rise of the Tomb Raider on Linux ported by Feral Interactive, when it came to Radeon GPU support for this Vulkan-only Linux game port the Mesa RADV driver was supported while the official AMDVLK driver would lead to GPU hangs. That's now been fixed.
With the latest AMDVLK/XGL source code as of today, the GPU hang issue for Rise of the Tomb Raider should now be resolved.
More bugfixes, and streams support for Xwayland. This will almost certainly be the last RC.
Adam Jackson of Red Hat today announced the X.Org Server 1.20 Release Candidate 5, which he believes will be the last test release before going gold. Most excitingly about this new release candidate is the merged support for allowing the NVIDIA proprietary driver to work with XWayland.
With last week's initial launch-day Linux benchmarks of the Ryzen 5 2600X / Ryzen 7 2700X some found the Linux performance to be lower than Windows. While the root cause is undetermined, a BIOS/AGESA update does appear to help the Linux performance significantly at least with the motherboard where I've been doing most of my tests with the Ryzen 7 2700X. Here are the latest benchmark numbers.
With last week's initial launch-day Linux benchmarks of the Ryzen 5 2600X / Ryzen 7 2700X some found the Linux performance to be lower than Windows. While the root cause is undetermined, a BIOS/AGESA update does appear to help the Linux performance significantly at least with the motherboard where I've been doing most of my tests with the Ryzen 7 2700X. Here are the latest benchmark numbers.
darktable, the open-source and cross-platform RAW image editor supporting GNU/Linux, macOS, and Windows operating systems, has been updated today to version 2.4.3.
darktable 2.4.3 is a maintenance update that brings support for new digital cameras, including the recently released Fujifilm X-H1 and Sony Alpha A7 Mark III (includes noise profiles and white balance presets), as well as the Kodak EOS DCS 3, Olympus PEN E-PL9, Panasonic Lumix DC-GX9, and Sony Cyber-shot DSC-RX1R II cameras.
The update also brings noise profiles for the Canon PowerShot G1 X Mark III and Nikon D7500 digital cameras, and a bunch of new features like support for ratings and tags in the watermark module, a script to help users convert .dtyle files to the .xmp format, and support for building and installing noise tools.
Blender is a complex piece of software that is capable of producing extremely high-quality visuals for all manner of visual art purposes, from video games to product visualization. Of course, that power needs to be wielded by a controlled hand. Otherwise, you'll end up with a mush of digital geometry that makes no sense at all.
These days, video tutorials are the educational tool of choice for most people. I'm going to give you five of the best free beginner video tutorials for Blender currently available. I recommend you watch all of them. They all cover a lot of the same information. However, every instructor has a different way of presenting. Stick with the one that clicks with you.
The Swords of Ditto is the new compact action-RPG from developer onebitbeyond and publisher Devolver Digital and it just released, although it has a big flaw right now on Linux. Sadly, Devolver Digital didn't respond to our review request. Thankfully, the Linux heroes over at GOG sent over a copy for me.
For those who remember Wipeout, the fast-paced futuristic racer you will probably want to take a close look at BallisticNG [Official Site] now it has Linux support. Released alongside update 0.9.4 that also added SteamVR support, which is the last Early Access version of the game.
BallisticNG features 17 tracks set in unique locations, with a bunch of them being reversible, 13 different teams each with their own different racer, in-game pickups like mines, 6 different game modes, a single-player campaign as well as split-screen support.
Arriving on Linux yesterday, this single-player and co-op shooter sees you and up to four friends take on a sci-fi game-show survival arena and it's actually not bad at all. You can either play by yourself which is quite challenging, but fun or you can do LAN play with up to four people and even two player online support. The developer said the game has been inspired by the likes of Left 4 Dead and Alien Swarm.
Super Inefficient Golf is what you get when you combine Golf with many explosions and it's out with Linux support.
Doom, the classic first-person shooter has a huge modding community and it's incredible to see what people make. The latest I came across is a nonviolent mod named Mr. Friendly.
Trailblazers, the unique co-op racer where you paint a racing line on the course is now releasing on May 8th with Linux support.
AV Linux, the open-source GNU/Linux distribution designed for multimedia content creation, has been updated recently to version 2018.4.2, a release that adds Meltdown mitigations, updated components, and various other enhancements.
Probably the most important change in the AV Linux 2018.4.2 release is the implementation of the KPTI (Kernel page-table isolation) patch to protect users against the Meltdown security vulnerability, but only for 64-bit installations. The distribution is now powered by the long-term supported Linux 4.9.76 kernel, and users can disable the KPTI patch at boot.
A new updated image of the Q4OS Centaurus testing live media has been just released, its core is based on the latest Debian Buster testing and Trinity Desktop 14.0.5 testing versions.
The Travel Support Program (TSP) provides travel sponsorships to openSUSE community who want to attend the openSUSE conference and need financial assistance. The openSUSE conference 2018 will be in Prague, Czech Republic from May 25 to May 27.
The goal of the TSP is to help everybody in and around openSUSE to be able to attend the openSUSE Conference!
We’re extremely pleased to announce additions and updates to our suite of Red Hat Developers desktop tooling products, including Container Development Kit 3.4, JBoss Developer Studio 11.3, and our DevSuite 2.3 installer. These updates are a continuation of our efforts to increase developer usability, while adding new features that matter most for users of Red Hat platforms and technologies.
Javaâ⢠10 is now supported with Red Hat JBoss Developer Studio 11.3.
Please note that Red Hat JBoss Developer Studio does not run on a Javaâ⢠9/10 virtual machine, but allows for managing and building of Javaâ⢠9/10 projects and artifacts. So, you must first define in your workspace a Javaâ⢠9/10 JDK if you want to manage and build Javaâ⢠9/10 projects.
A few weeks ago, I was having a discussion with a fellow manager on my team. This person reports to someone who reports to me, generally has a different set of concerns than I do, and therefore holds a unique perspective on the challenges we face. I'd been digressing on a hypothetical course of action when the manager interrupted me to say, "Excuse me, I just want to say that I'm not comfortable with the direction this is going in." I immediately stopped talking and thought about what I'd been saying. I tried to explain what I meant, to give more context, and to go at it from a different angle. The manager also shared some context and perspective, which helped me understand the discomfort.
Better late than never: last month Red Hat celebrated 25 years. (The cake and candles may seem like ancient history to Jim Whitehurst, CEO of the open source pioneer, but we believe in prolonging anything involving icing.) Jim spoke with Computer Business Review; looking both back on 25 years of Red Hat and to the future.
Been some time now since my last update on what is happening in Fedora Workstation and with current plans to release Fedora Workstation 28 in early May I thought this could be a good time to write something. As usual this is just a small subset of what the team has been doing and I always end up feeling a bit bad for not talking about the avalanche of general fixes and improvements the team adds to each release.
Fedora Workstation 28 is shaping up to be another compelling update for those that are fans of this bleeding-edge Red Hat sponsored Linux distribution. I've been running Fedora Workstation 28 snapshots on a few laptops and test machines here and am quite happy with how it's shaped up as another Fedora release that delivers not only the latest features, but doing so in a seemingly sane and stable manner: I haven't encountered any problems unlike some of the past notorious Fedora releases from years ago. Overall, I am quite excited for next month's Fedora 28 release and will be upgrading my main production system to it.
This article answers frequently asked questions about Ubuntu 18.04 and thus informing you of the important things you should know about Ubuntu 18.04.
Ora is a user-friendly task management service with integrated time-tracking, reports, list view, git integrations and many other features. Often referred to by users as ‘the sweet spot between Trello and Jira’, Ora provides almost a complete match of Jira’s feature set but in a new and more accessible way.
Last month, Ora launched their application as a snap and thereby broadening out their reach across the Linux user base. We spoke to Nikolay Mihaylov, co-founder at Ora, who told us more about their reasons to publish a snap and how it will help Ora move forward.
As discussed last week when unveiling the communitheme snap for ubuntu 18.04 LTS, here is a suite of interview this week on some members of the core contributor team shaping this entirely community-driven theme.
Today is the turn of Merlijn, merlijn-sebrechts on the community hub.
Another week of bugfixes for us as more and more people update to the 3.0 releases!
Quite a bit of work went into improving the handling of the two database in LXD 3.0, making it easier for us to debug issues and provide fixes to our users when something goes wrong. Work is also continuing on the new backup/restore API for LXD with it hopefully landing later this week.
We’re also excited to see LXD debuts on the Chromebooks through the new Crostini feature. This also led to a minor change to LXD to allow restricting users to unprivileged containers as was needed for those users.
For Ubuntu 17.10 (Artful Aardvark) users, today's security update addresses a bug (CVE-2018-8043) in Linux kernel's Broadcom UniMAC MDIO bus controller driver, which improperly validated device resources, allowing a local attacker to crash the vulnerable system by causing a denial of service (DoS attack).
For Ubuntu 16.04 LTS (Xenial Xerus) users, the security patch fixes a buffer overread vulnerability (CVE-2017-13305) in Linux kernel's keyring subsystem and an information disclosure vulnerability (CVE-2018-5750) in the SMBus driver for ACPI Embedded Controllers. Both issues could allow a local attacker to expose sensitive information.
Not quite five years ago, Canonical tried to challenge Apple iOS and Google Android with Ubuntu Touch, an alternative smartphone Linux. Users, phone carriers, and the open-source community failed to support it, so Ubuntu founder Mark Shuttleworth closed the door on Ubuntu Touch development. But, in open source, programs don't die until its last developer gives up on it. Purism and UBports have partnered to offer Ubuntu Touch on Purism's Librem 5 smartphone.
Being able to bang on (that is to say, percussively test) Bionic Beaver has been a blast. I haven't done ISO testing this round. Instead, I've been using my Xubuntu desktop daily watching things break and have been watching apport file bugs. Doing so makes me realize that, frankly, I am not normal in terms of installed packages or workflow. I have quite a bit of LaTeX installed due to church work. I have many ham radio-related things installed. Audio production and video production packages are installed too. Yes, sometimes I break down and even use LibreOffice. I don't have the whole package archive installed but I have a visible chunk of it in place as I use many things in many ways.
Based on the Ubuntu 18.04 LTS (Bionic Beaver) operating system, the ExTiX 18.4 Deepin Edition is now available and it ships updated components, including the latest Deepin 15.5 Desktop, the Calamares 3.1.12 universal installer framework, and a custom Linux 4.16.2 kernel with extra hardware support.
"I’ve made a new extra version of ExTiX with Deepin 15.5 Desktop (made in China!)," said Arne Exton in the release announcement. "Only a minimum of packages is installed in ExTiX Deepin. You can, of course, install all the packages you want, even while running ExTiX Deepin live, i.e. from a DVD or USB stick."
Scheduled to ship with the upcoming Linux Mint 19 "Tara" operating system series this summer, the Cinnamon 3.8 desktop environment is now available for download and it's a major release that brings numerous improvements, new features, and lots of Python 3 ports for a bunch of components.
Among the components that got ported to Python 3 in the Cinnamon 3.8 release, we can mention cinnamon-settings, cinnamon-menu-editor, cinnamon-desktop-editor, cinnamon-settings-users, melange, background slideshow, the switch editor and screensaver lock dialogs, desktop file generation scripts, as well as all the utilities.
Lead by talented Linux developer Marius Gripsgard, the UBports Foundation keeps the Ubuntu Touch mobile OS developed by Canonical, the company behind the widely-used Ubuntu Linux operating system, alive for various popular smartphones, including Fairphone 2, Nexus 5, OnePlus One, as well as the BQ Aquaris M10 FHD tablet that was designed to run Ubuntu Touch in the first place.
Now, Purism and UBports are partnering to offer the Ubuntu Touch mobile operating system on the upcoming Librem 5 Linux phone, which raised more than $2 million last fallââ¬â¹, promising to be the privacy and security-focused smartphone you've been expecting for a long time. While not the default OS, users will be able to easily run Ubuntu Touch on the Librem 5 phone.
After raising more than $2 million last year to build a Linux-powered smartphone with a focus on privacy and open source software, Purism hopes to deliver the first Librem 5 smartphones early next year.
The phone is expected to ship with an NXP i.MX8M 64-bit, ARM Cortex-A53 processor, feature 3GB of RAM, 32GB of storage, a microSD card slot, a headphone jack, USB Ty[e-C port, and front and back cameras… but it will also have physical kill switches that disconnect the camera, mic, baseband, and WiFi or Bluetooth for security and privacy purposes when you’re not using those features.
One of the most interesting upcoming smartphones is Purism’s Librem 5. This crowdfunded device, which is expected to land early next year, emphasizes privacy above all else.
For starters, it runs totally open-source software. Forget iOS and Android, with its proprietary binary blobs: every bit and byte that ships with the Librem 5 is open to inspection.
And as is the case with the Librem 13 laptops (which are apparently selling well), the librem 5 comes with hardware switches allowing you to disable parts of the phone. So, if you’re ultra-paranoid about your privacy, you can disconnect the camera, Wi-Fi, bluetooth, and baseband with just a tap.
Earlier this year hackers started to show evidence of an exploit that allowed you to load custom software on a Nintendo Switch game console. Theoretically that opens the door for homebrew applications, modified games, or even running an alternate operating system such as a GNU/Linux distribution on Nintendo’s latest game system. It could also make it possible to run pirated games, which is why console makers usually don’t encourage this sort of thing.
But now a team of hackers called ReSwitched have described a bootrom vulnerability called Fusée Gelée that makes it possible for anyone to hack a Nintendo Switch… assuming you’re willing to do a little hardware hacking too.
The Nintendo Switch hack has been released for good. We knew this was coming, but the timetable for the reveal was suddenly accelerated when the Tegra X1 Bootrom got leaked on April 23rd.
The exploit is based on the Fusée Gelée Nintendo Switch hack discovered by Kate Temkin. Since this vulnerability extends to most Tegra devices, the likes of Google, NVIDIA and even Nintendo were alerted in advance by the hackers.
The USRP Embedded Series platform uses the OpenEmbedded framework to create custom Linux distributions tailored to application specific needs. The default operating system is pre-installed with the UHD software API and a variety of third party development tools such as GNU Radio. Support for the RFNoC FPGA development framework enables deterministic computations for real-time and wideband signal processing.
Dubbed Open Autonomous Safety, the initiative aims to help autonomous driving startups implement better safety-testing practices. Companies looking to access the documents, safety procedures and test code can do so via a GitHub repository.
Without a driver to help identify and mitigate failures, autonomous vehicle systems need incredibly robust safety requirements and an equally comprehensive and well-defined process for analyzing risks and assessing capabilities. Voyage models its safety approach after the ISO 26262 standard for automotive safety, taking the best practices from the automotive industry and applying them to autonomous technology. The automotive industry continues to reach for new levels of safety in manufacturing vehicles, and we are inspired by that approach.
Under what the company calls its Open Autonomous Safety initiative, Voyage is publishing information on its safety procedures, materials, and test code in a series of releases. The goal is to create an open-source library of safety procedures that multiple companies can use as a standard, a Voyage blog post said.
The initial release, which Voyage calls Open Autonomous Safety (OAS), will take the form of a GitHub repository containing documents and code. The functional safety requirements are Voyage's interpretation of the ISO 26262 standard for automotive safety, updated for autonomous vehicles. "This is our internal driving test for any particular software build," says Cameron. "It lets us evaluate our designs and look for the different ways they can fail in the real world."
This is the second in a series of posts about Rust compiler errors. Each one will talk about a particular error that I got recently and try to explain (a) why I am getting it and (b) how I fixed it. The purpose of this series of posts is partly to explain Rust, but partly just to gain data for myself. I may also write posts about errors I’m not getting – basically places where I anticipated an error, and used a pattern to avoid it. I hope that after writing enough of these posts, I or others will be able to synthesize some of these facts to make intermediate Rust material, or perhaps to improve the language itself.
As we’ve argued on many occasions, effective government vulnerability disclosure (GVD) review processes can greatly enhance cybersecurity for governments, citizens, and companies, and help mitigate risk in an ever-broadening cyber threat landscape. In Europe, the EU is currently discussing a new legislative proposal to enhance cybersecurity across the bloc, the so-called ‘EU Cybersecurity Act’. In that context, we’ve just published our policy recommendations for lawmakers, in which we call on the EU to seize the opportunity to set a global policy norm for government vulnerability disclosure.
As you may already know, last Friday – April 20th – we held a new Testday event, for Firefox DevEdition 60 Beta 14.
Thank you all for helping us make Mozilla a better place: gaby2300, micde, Jarrod Michell, Thomas Brooks.
Firefox 60 will introduce support for the same-site cookie attribute, which allows developers to gain more control over cookies. Since browsers will include cookies with every request to a website, most sites rely on this mechanism to determine whether users are logged in.
Attackers can abuse the fact that cookies are automatically sent with every request to force a user to perform unwanted actions on the site where they are currently logged in. Such attacks, known as cross-site request forgeries (CSRF), allow attackers who control third-party code to perform fraudulent actions on the user’s behalf. Unfortunately current web architecture does not allow web applications to reliably distinguish between actions initiated by the user and those that are initiated by any of the third-party gadgets or scripts that they rely on.
Last year, Mozilla ran a survey to find out top enterprise requirements for Firefox. Policy management (especially Windows Group Policy) was at the top of that list.
For the past few months we’ve been working to build that support into Firefox in the form of a policy engine. The policy engine adds desktop configuration and customization features for enterprise users to Firefox. It works with any tool that wants to set policies including Windows Group Policy.
Thanks to Ms2ger web-platform-tests is now even more awesome (not in the American sense). To avoid writing HTML boilerplate, web-platform-tests supports .window.js, .worker.js, and .any.js resources, for writing JavaScript that needs to run in a window, dedicated worker, or both at once. I very much recommend using these resource formats as they ease writing and reviewing tests and ensure APIs get tested across globals.
Today marks my fifth year working for Mozilla! This past year has been both fun and frantic, and overall was a really good year for both Mozilla and Firefox. Here’s a run down a few of the things I got to work on.
May 27, 2018 is the 15th anniversary of the first WordPress release — and we can’t wait to celebrate!
Following Google announcing their GSoC 2018 participants, the Outreachy program to help support women and other under-represented groups in tech announced their summer 2018 interns.
Google has announced the accepted student projects for this year's Google Summer of Code. As usual, there is an interesting mix of open-source software projects across the hundreds (or rather thousands) of applicants. Here's a look at the most interesting initiatives we found when going through the list.
While Linux distributions are still migrating to Glibc 2.27, in the two months since the release changes have continued building up for what will eventually become the GNU C Library 2.28.
The Glibc 2.28 work queued thus far isn't nearly as exciting as all the performance optimizations and more introduced with Glibc 2.27, but it's a start. Most notable at this point for Glibc 2.28 is that it will now build and run cleanly on GNU/Hurd without requiring any out-of-tree patches. There has been a ton of Hurd-related commits to Glibc over the past month.
Last year I thought to myself: since my phone is just a computer running an operating system called Android (or Replicant!), and that Android is based on a Linux kernel, it's just another foreign distribution I could install GNU Guix on, right? It turned out it was absolutely the case. Today I was reminded on IRC of my attempt last year at installing GNU Guix on my phone. Hence this blog post. I'll try to give you all the knowledge and commands required to install it on your own Android device.
The GNU Guix transactional package manager can be made to run on Android smartphones/tablets, but not without lots of hoops to jump through first.
The Eclipse Foundation, the platform for open collaboration and innovation, today unveiled the new open source governance model and a “cloud native Java” path forward for Jakarta EE, the new community-led platform created from the contribution of Java EE. In September 2017, Oracle announced that it was transferring the future of Java EE technologies to the Eclipse Foundation, to make the process of evolving its standards “more agile, flexible and open.”
Following Oracle offloading Java EE to the Eclipse Foundation and then renaming the project to Jakarta EE, we now know more about the future of this Java Enterprise Edition.
The Eclipse Foundation announced today a new open-source governance model and "a 'cloud native Java' path forward for Jakarta EE, the new community-led platform created from the contribution of Java EE." According to the press release, with this move to the community-driven open-source governance model, "Jakarta EE promises faster release and innovation cycles." See https://jakarta.ee for more details or to join the Jakarta EE Working Group.
Jakarta EE is officially out! OK, given the amount of publicity and evangelizing we and others have done around EE4J and Jakarta EE over the past few months you would be forgiven for thinking it was already the case but it wasn’t… until today!
I cannot stress enough how important this is to our industry. The number of Java developers globally is estimated at over 14 million. The Java EE market is estimated at a high multi-billion Dollar value to the industry. Yes there are other languages out there and other frameworks but none of them have yet made the impact Java and Java EE has over the years. Of course Java EE was not perfect for a variety of reasons, but if you consider how much of an impact it has had on the industry given known and debated limitations, just imagine how much it can bring in the years ahead if it were improved.
One of our major goals for Qt 5.9 LTS was to improve the performance and memory consumption compared to our previous long-term-support release Qt 5.6 LTS. In this blog post, I want to highlight the performance increase in modern embedded processors that support the 64-bit ARMv8 instruction set. The result: Qt 5.9.5 Qt Quick performance has improved 2x, and JavaScript performance is a whopping 18 times higher compared to Qt 5.6.3.
The Qt Company had been working on performance improvements for 64-bit ARM (AArch64) as part of the Qt 5.9 LTS cycle and continuing through with the ongoing long-term support point releases, and that work is paying off.
Qt's Tuukka Turunen has shared today that as of the recently released Qt 5.9.5 that came earlier this month, on 64-bit ARMv8 the Qt Quick performance has improved by 2x compared to the older Qt 5.6.3 LTS release. Even more profound, the JavaScript performance is 18x faster with Qt 5.9.5 over that same older LTS branch.
Speaking of which, the brand-new Node.js 10.0 is expected to soon support npm version 6 (currently Node.js ships with npm 5.7.x). The company npm Inc., which maintains the npm software package management application, today announced that major update, called npm@6. The npm company said its JavaScript software installer tool includes new security features for developers working with open source code.
In coordination with today’s announcement of Node.js v10, we’re excited to announce npm@6. This major update to npm includes powerful new security features for every developer who works with open source code. Read on to understand why this matters.
Future of photo-sharing site remains unclear but its founders say the innovation at Flickr died as soon as it was acquired in 2005
Verizon agreed to buy Yahoo’s core internet business for $4.83bn (€£3.62bn) in cash on Monday, marking the final chapter in the struggling fortunes of the fading web pioneer.
Who owns virtual space, and what recourse does a museum have if an outside party “trespasses” on its virtual space? Moreover, is it even in a museum’s best interest to retaliate against unauthorized virtual augmentations—or should they be embraced as a new, if uninvited, tool for visitor engagement?
Intel, one of the biggest semi conductor firms has requested a patent for an innovative mining chip accelerator for Bitcoin. Known as “Bitcoin Mining Hardware Accelerator,” this patent was submitted in 2016 however is now being publicized for the first time.
Cryptocurrency and bitcoin mining has long been under inspection for the extreme energy it supposedly uses. For instance, countries such as Iceland admit that more energy is utilized to mine Bitcoin than to power its habitations, while cities like Plattsburgh, NY – a once famous sanctuary for commercial Bitcoin mining have forced strict moratoriums to reduce the growing needs of the miners and the surging prices of electricity.
When MPs from different parties put aside their differences to work together, it’s worth listening to what they have to say – especially when it comes to protecting our crisis-ridden NHS. So when Liz Kendall, Norman Lamb and Nick Boles took to the airwaves this morning proposing a cross-party solution to our healthcare crisis, I understand why many people will have listened with interest.
I agree with a number of the proposals, including a commitment to keeping the NHS free at the point of use, integration of social care and increasing funding above inflation. But sadly – and I don’t doubt these MPs care about the NHS – I believe that the sum total of their “ten principles of long-term funding for NHS and social care” ââ¬â¹risk undermining healthcare in this country.
A Match Group spokesperson confirmed that a “limited number” of old accounts had been accidentally reactivated recently and that any account affected received a password reset. Match.com’s current privacy statement, which was last updated in 2016, says that the company can “retain certain information associated with your account” even after you close it. But that Match Group spokesperson also told The Verge that the company plans to roll out a new privacy policy “in the next month or so,” in order to comply with the EU’s General Data Protection Regulation (GDPR); under the new policy, all those years-old accounts will be deleted. The Verge has requested clarification on which accounts will qualify for deletion, and what “deletion” will specifically entail, but has not received a response as of press time.
Like most of the other attacks developed by Ben-Gurion University professor Mordechai Guri and his colleagues, the currency wallet exploits start with the already significant assumption that a device has already been thoroughly compromised by malware. Still, the research is significant because it shows that even when devices are airgapped—meaning they aren't connected to any other devices to prevent the leaking of highly sensitive data—attackers may still successfully exfiltrate the information. Past papers have defeated airgaps using a wide array of techniques, including electromagnetic emissions from USB devices, radio signals from a computer's video card, infrared capabilities in surveillance cameras, and sounds produced by hard drives.
The group, which Symantec has named “Orangeworm,” has been installing backdoors in large international corporations based in the U.S., Europe and Asia that operate in the health-care sector.
Among its victims are health-care providers and pharmaceutical companies, as well as IT companies and equipment manufacturers that work for health organizations.
In an age where cryptomining software is beating out ransomware as the go-to for most hackers, a Python-based Monero miner is using stolen NSA exploits to gain an edge.
In 2016 the Shadow Brokers leaked several hacking tools and zero-day exploits including ETERNALBLUE and ETERNALROMANCE that targeted versions of Windows XP/Vista/8.1/7/10 and Windows Server 2003/2008/2012/2016 and took advantage of CVE-2017-0144 and CVE-2017-0145.
Fortinet researchers spotted a malware dubbed “PyRoMine” which uses the ETERNALROMANCE exploit to spread to vulnerable Windows machines, according to an April 24 blog post. The malware isn't the first to mine cryptocurrency that uses previously leaked NSA exploits the malware is still a threat as it leaves machines vulnerable to future attacks because it starts RDP services and disables security services.
The musical chairs playing out among the senior officials that make up the President Donald Trump White House team would be amusing to watch but for the genuine damage that it is doing to the United States. The lack of any coherence in policy means that the State Department now has diplomats that do not believe in diplomacy and environment agency heads that do not believe in protecting the environment. It also means that well-funded and disciplined lobbies and pressure groups are having a field day, befuddling ignorant administrators with their “fact sheets” and successfully promoting policies that benefit no one but themselves.
In the Trumpean world of all-the-time-stupid, there is, however, one individual who stands out for her complete inability to perceive anything beyond threats of unrelenting violence combined with adherence to policies that have already proven to be catastrophic. That person is our own Ambassador to the United Nations Nikki Haley, who surfaced in the news lately after she unilaterally and evidently prematurely announced sanctions on Russia. When the White House suggested that she might have been “confused” she responded that “With all due respect, I don’t get confused.” This ignited a firestorm among the Trump haters, lauding Haley as a strong and self-confident woman for standing up to the White House male bullies while also suggesting that the hapless Administration had not bothered to inform one of its senior diplomats of a policy change. It also produced a flurry of Haley for higher office tweets based on what was described as her “brilliant riposte” to the president.
Bloggers in Tanzania will have to pay $920 (€£660) for the privilege of posting content online, according to new regulations.
The government says it wants to protect the East African nation from "lies" being spread online though critics see it as a way of muzzling freedom of expression.
When something happens in Congress, legislators love to brag about it — or condemn it — for their audience of journalists and professionals in Washington and for their constituents back home. The text of their public statements can provide a window into what members are thinking and what matters most to them in any given week.
A new page on ProPublica’s Represent database — and a new Twitterbot — track what Congress members have said in the past week. It picks out the phrases that are most distinctive to that week’s batch of kudos and complaints contained in Congressional press releases.
Exactly 200 days before the crucial midterm election that will determine whether Republicans maintain control of Congress, the Democratic National Committee filed a 66-page lawsuit that surely cost lots of money and energy to assemble.
Does the lawsuit target purveyors of racist barriers to voting that block and deflect so many people of color from casting their ballots?
Last week, the Democratic National Committee filed a multimillion-dollar suit against more than a dozen people, entities, and countries (well, one country), charging that “Russia mounted a brazen attack on American democracy” with the goal of “destabilizing the U.S. political environment, denigrating the Democratic presidential nominee, and supporting the campaign of Donald J. Trump, whose policies would benefit the Kremlin.” The defendants in the case include the Russian Federation, Russian military intelligence, the Trump campaign, WikiLeaks, Julian Assange, Paul Manafort, Jared Kushner, Roger Stone, George Papadopoulos, and Donald J. Trump, Jr. The candidate who was the beneficiary of this alleged conspiracy,
[...]
And that, of course, is easier said than done. Thanks to a legal doctrine known as foreign-sovereign immunity, it’s nearly impossible, except in cases of terrorism, to sue another nation (to say nothing of its military) in a United States court. Likewise, WikiLeaks and its leader, Julian Assange (who is currently still holed up in the Ecuadorian embassy in London), maintain only shadowy presences in the United States; it will be difficult for the plaintiffs in the case to serve these defendants and force them to appear in the Manhattan federal court where the case was brought. But several other defendants will undoubtedly be forced to answer the charges. These include, most notably, representatives of the Trump campaign and Kushner and Donald Trump, Jr. These defendants will certainly ask that the charges be thrown out, arguing that they have no connection to the hacking that is at the core of the case. But candidate Trump’s own comments —“I love WikiLeaks!” or “Russia, if you’re listening, I hope you’re able to find the thirty thousand e-mails that are missing”—may suggest enough of a connection for the judge to let the case to proceed to discovery. (The D.N.C. suit is a civil action, so it will not result in any criminal liability.) And that may be the point of the whole enterprise.who is now the President of the United States, is not a defendant—yet.
It's probably not going to change anything, but the Democratic National Committee has sued Russia (and members of the Russian establishment), members of the Trump campaign, and Wikileaks regard the 2016 election security breaches. The DNC's complaint includes almost every claim imaginable in response to a hacking incident. If nothing else, it's a good model for lawyers to crib from.
In late March, Ecuador's Lenin Moreno disconnected Julian Assange's internet access. The reasoning behind this decision involved tensions with Spain and the United Kingdom regarding Assange's social media messages.
Coinbase is grabbing the wrong headlines again. This time they’ve decided it makes sense to pick a fight with WikiLeaks. Because, that’s always been a good idea. An organization that makes it their mission to publish secrets and uncensored data now has a reason to dig into Coinbase’s dirty laundry. Ummmm…probably the wrong account to ban from your ‘bank’.
According to WikiLeaks on Twitter, the move was sudden and Coinbase offered no explanation. WikiLeaks has directed its Twitter followers to donate bitcoin on the website, where other digital currencies including Litecoin, Zcash, Monero and Ethereum are listed with the message that “additional cryptocurrency options will be announced.”
Coinbase, which is registered with the US Department of the Treasury’s Financial Crimes Enforcement Network, only said that the WikiLeaks account “had engaged in prohibited use in violation of our terms and service and we regret to inform you that we can no longer provide you with access to our service.” The WikiLeaks shop was then advised to redirect its remaining balance to an external digital wallet.
If you're thinking about taking a job at a large tech company for the first time, you should remember to ask them how their "leveling" works. This is something that seems to be poorly conveyed to a lot of people, and many folks from outside the valley (myself included, back in the day) have no idea what's going on or how it should work.
First, there is the notion of job ladders. A software engineer is not a production engineer/SRE, project manager, or a people manager. Those are all separate ladders, tracks, whatever you want to call them. If you are hired onto a certain ladder, odds are good that you will have to interview to change to another, no matter how long you've been doing the gig. I wrote about this in 2011 describing Google, but the same applies to Facebook. It's probably being practiced in plenty of other places, too.
I am hopeful that the commendable discovery process involved in US litigation will bring to light further details of the genesis of Christopher Steele’s ludicrous dossier on Trump/Russia, and may even give some clues as to whether Sergei Skripal and/or his handler Pablo Miller were involved in its contents.
The decision by the Democratic National Committee to sue the Russian Government, Wikileaks, Julian Assange personally and the Trump campaign is an act of colossal hubris. It is certain to reveal still more details of the deliberate fixing of the primary race against Bernie Sanders, over which five DNC members, including the Chair, were forced to resign. It will also lead to the defendants being able to forensically examine the DNC servers to prove they were not hacked – something which astonishingly the FBI refused to do, being instead content to take the word of the DNC’s own private cyber security firm, Crowdstrike. Unless those servers have been wiped completely (as Hillary did to her private email server) I know that is not going to go well for the DNC.
In disclosing the deaths of two Western hostages in a U.S. drone strike on an Al-Qaeda compound, President Barack Obama said on Thursday that he had ordered the declassification of the secret operation because “the United States is a democracy committed to openness in good times and in bad.”
But the reality of the past six years has been that his administration has enforced wildly excessive secrecy, selectively declassified material to mislead the American people, and failed to correct erroneous information on sensitive international issues.
This failure to trust the people with accurate information has arguably done great harm to U.S. democracy by promoting false narratives on a range of foreign conflicts. With all its talk about “public diplomacy” and “information warfare,” the Obama administration seems intent on using half-truths and falsehoods to herd the people into a misguided consensus rather than treating them like the true sovereigns of the Republic, as the Framers of the Constitution intended with the explicit phrase “We the People of the United States.”
Hillary Clinton is changing her Twitter bio. After Clinton’s Arthur Miller Freedom to Write lecture at the PEN America World Voices Sunday night, Clinton sat down for a conversation with author Chimamanda Ngozi Adichie. Adichie asked Clinton about her Twitter bio, which reads, “Wife, mom, grandma, women+kids advocate, FLOTUS, Senator, SecState, hair icon, pantsuit aficionado, 2016 presidential candidate.” “The first word that describes you is wife. And then I think it’s mom, and then grandmother. When I saw that, I have to confess I felt just a little bit upset. Then I looked at your husband’s Twitter account, and the first word was not husband,” Adichie said. Was this Hillary’s choice, she asked. Clinton smiled: “When you put it like that, I’m going to change it.”
Chimamanda Ngozi Adichie interviewed Hillary Clinton at a PEN World Voices Festival lecture at the Cooper Union in Manhattan on Sunday night, and she took the opportunity to confront the former Democratic presidential candidate with something that was bothering her. Why, with all of Clinton’s career accomplishments, did her Twitter bio primarily identify her as a “Wife”?
On Sunday night, Hillary Clinton delivered the Arthur Miller Freedom to Write Lecture at the PEN America World Voices Festival. It was about what you’d expect from the former candidate in her first speech since the publication of James Comey’s memos on Donald Trump. “Today, we have a president who seems to reject the role of a free press in our democracy,” she said. “Although obsessed with his own press coverage, he evaluates it based not on whether it provides knowledge or understanding, but solely on whether the daily coverage helps him and hurts his opponents.” More interesting, however, was Clinton sitting down with novelist Chimamanda Ngozi Adichie after her speech.
Student activists trying to ignite the #MeToo movement in China have turned to the technology behind bitcoin to battle government censorship.
The rare display of dissent emerged after student Yue Xin accused prestigious Peking University of trying to silence her demands for a public airing of a sexual harassment episode more than 20 years ago. While she wasn’t involved in that long-ago incident, college officials have allegedly tried to intimidate and muzzle her, Yue wrote in an open letter Monday. The school forced her to delete information about the case and asked her parents to confine her to home, the undergraduate wrote.
[...]
An anonymous user attached Yue’s letter to an ether transaction and posted it to the blockchain: the decentralized ledger that records all activity for the cryptocurrency. That transaction cost the poster all of 52 cents, according to the record. While that means anyone with access to an ethereum node can now see the memo, it won’t be easy for the general public to access -- unless someone copies the message from the ledger and reposts it on the web. Even then, Chinese authorities could easily block the site.
“It’s symbolic but won’t be easily adopted by the public masses," said Isaac Mao, a San Francisco-based entrepreneur who’s building a media platform that uses blockchain technology to fight censorship. "Decentralised media still has miles to go. But it gives people new hope.”
In a world where false and misleading information reaches billions instantly and online manipulation is becoming ever more sophisticated, governments are increasingly turning to legislation to combat fake news.
[...]
Infinitely easier and cheaper to produce and spread than ever before, fake news is also “low-hanging fruit” for politicians, Alemanno said: “They can talk to voters about it, whereas tackling the underlying, structural reasons why it’s so pervasive in our society and media environment is far, far harder.”
From Europe to Asia, leaders are rushing to adopt anti-fake news laws. France – where “fake news”, necessarily narrowly defined so as to protect free speech, has been illegal since 1881 – aims to allow judges to order the deletion of false online content in election periods.
The legislation will also oblige social media platforms to name advertisers who are financing content, and say how much they are paying, and permit France’s independent broadcasting authority to suspend media seen as trying to destabilise a vote, notably if “influenced by foreigners”.
Germany earlier this year also introduced an online hate speech law, giving platforms with more than 2 million users 24 hours to remove “obviously illegal” terror content, racist material and fake news or face fines of up to €50m (€£44m). Other offensive material must be blocked with seven days.
An article published by a leading British newspaper has said that press freedom in Pakistan is under threat, being selectively censored by that country's powerful military establishment, which doesn't take kindly to criticism of its actions, or support for the civilian political class.
It is now a well known fact that in the month gone by, popular and privately-run Geo TV was taken off the air recently and could only start operations again after it reportedly reached a back door agreement with the military establishment to stop covering former Prime Minister Nawaz Sharif favourably and cease to criticize the military.
Originally aligned with McCarthy, President Eisenhower eventually came to his senses, saying, “Don't join the book burners. Don't think you are going to conceal faults by concealing evidence that they ever existed. Don't be afraid to go in your library and read every book.”
Bill Fawell, the Republican candidate for the Illinois 17th Congressional District, says Facebook is censoring his Elect Fawell page and that posts shared from a blog called theburningplatform.com were removed.
Fawell, an author and real estate broker from Galena, will face U.S. Rep. Cheri Bustos, D-Moline, in the Nov. 6 election.
In a news release Monday, Fawell said Facebook deleted three articles on a discussion of the 1998 book "The Fourth Turning" by William Strauss and Neil Howe. The book theorizes on history and generational changes in society, asserting that every 80 to 100 years a "gray champion" emerges as a leader during a time of crisis.
More social media execs could be coming to Capitol Hill this week, but it's not yet a done deal.
The House Judiciary Committee has scheduled a hearing on online censorship and whether social media platforms disfavor or favor certain speech.
Invited are representatives of Facebook, Google and Twitter, though not word on whether any will show.
Bill Fawell, the Republican candidate for the 17th Congressional District, says Facebook is censoring his Elect Fawell page and that posts shared from a blog called theburningplatform.com were removed.
Mr. Fawell, an author and real estate broker from Galena, will face U.S. Rep. Cheri Bustos, D-Moline, in the Nov. 6 election.
In a news release Monday, Mr. Fawell said Facebook deleted three articles on a discussion of the 1998 book “The Fourth Turning” by William Strauss and Neil Howe. The book theorizes on history and generational changes in society, asserting that every 80 to 100 years a “gray champion” emerges as a leader during a time of crisis.
Facebook, the company that’s getting roasted every next day has published another ‘hard questions’ blog post. This time, Facebook wants to tell us about the information known to the advertisers who want to throw ads in front of the 2 billion people on the social network.
Just like they have repeatedly stated in the past, Facebook stressed that they don’t sell user data. They take inputs from the advertisers and throw ads accordingly. The company calls it selling “space” on Facebook, similar to what it’s like on TV, radio, or newspaper.
The Egyptian government is currently debating a bill which would compel all ride-sharing companies to store any Egyptian user data within Egypt. It would also create a system that would let the authorities have real-time access to their passenger and trip information. If passed, companies such as Uber and its Dubai-based competitor Careem would be forced to grant unfettered direct access to their databases to unspecified security authorities. Such a sweeping surveillance measure is particularly ripe for abuse in a country known for its human rights violations, including an attempts to use surveillance against civil society. The bill is expected to pass a final vote before Egypt’s House on May 14th or 15th.
Article 10 of the bill requires companies to relocate their servers containing all Egyptian users’ information to within the borders of the Arab Republic of Egypt. Compelled data localization has frequently served as an excuse for enhancing a state’s ability to spy on its citizens.
Even more troubling, article 9 of the bill forces these same ride-sharing companies to electronically link their local servers directly to unspecified authorities, from police to intelligence agencies. Direct access to a server would provide the Egyptian government unrestricted, real-time access to data on all riders, drivers, and trips. Under this provision, the companies themselves would have no ability to monitor the government’s use of their network data.
Earlier this month I talked a little bit about "Facebook Derangement Syndrome" in which the company, which has real and serious issues, is getting blamed for other stuff. It's fun to take potshots at Facebook, and we can talk all we want about the actual problems Facebook has (specifically its half-hearted attempts at transparency and user control), but accusing the company of all sorts of things that are not actually a problem doesn't help. It actually makes it that much harder to fix things.
The latest case in point. Zack Whittaker, who is one of the absolute best cybersecurity reporters out there, had a story up recently on ZDNet about a data mining firm called Localblox, that was pulling all sorts of info to create profiles on people... leaking 48 million profiles by failing to secure an Amazon S3 instance (like so many such Amazon AWS leaks, this one was spotted by Chris Vickery at Upgard, who seems to spot leaks from open S3 instances on weekly basis).
Ten years ago, Amazon introduced the Kindle and established the appeal of reading on a digital device. Four years ago, Jeff Bezos and company rolled out the Echo, prompting millions of people to start talking to a computer.
The American security agency CIA knows that the future can’t go without artificial intelligence. The agency was all over the news last year because of Wikileaks which published their collection of hacking tools.
CIA wants to deal with foreign spies, not human but AI-powered spies tracking CIA agents deployed overseas. An effective countermeasure would be using technology instead of humans to get the required intel.
Human spies will soon be relics of the past, and the CIA knows it. Dawn Meyerriecks, the Agency’s deputy director for technology development, recently told an audience at an intelligence conference in Florida the CIA was adapting to a new landscape where its primary adversary is a machine, not a foreign agent.
A recently-released Inspector General's report shows the FBI didn't try as hard as it could to find a way into the San Bernardino shooter's locked iPhone. It appears FBI officials were more interested in obtaining a favorable court ruling than seeking technical assistance from anyone other than Apple, despite the DOJ's courtroom claims about time being of the essence.
This had a lot to do with the current FBI leadership. James Comey made fighting encryption his personal crusade -- one that has been carried forward by both the DOJ and the FBI's new director, Christopher Wray. Comey's new book about his government career -- one that came to an unceremonious end when President Trump fired him -- provides a few more details about his crusade against math and personal security.
Early this year, Huawei was so, so close to an actual deal with a US carrier. The Mate 10 was supposed to be compatible with and sold through AT&T. But, alas, politics got in the way. The NSA, FBI, and CIA all say US citizens should tread carefully when using the China-made smartphones and managed to pressure AT&T, Verizon, and T-Mobile enough for the carriers to back away.
But “Download Your Data” hardly tells you everything Facebook knows about you. Among the information not included:
- information Facebook collects about your browsing history
- information Facebook collects about the apps you visit and your activity within those apps
- the advertisers who uploaded your contact information to Facebook more than two months earlier
- ads that you interacted with more than two months prior
Download Your Data is particularly spotty when it comes to the information Facebook taps to display ads. Typically, Facebook uses information it collects or buys to place users into categories that advertisers can target. This can include data a user provides explicitly (your age), implicitly (which browser you use) or unknowingly (information on purchases from loyalty cards).
Under Chinese law, gender discrimination in hiring practices and advertising are illegal, but the law isn’t clear on what exactly constitutes gender discrimination and enforcement of the rules is spotty. Offending companies are usually not punished.
The Human Rights Watch report reveals gender discrimination amongst major tech companies, as in the rest of Chinese society, is common and widespread. Search engine Baidu listed a job for content reviewers in March 2017 stating that applicants had to be men with the “strong ability to work under pressure, able to work on weekends, holidays and night shifts.”
Trump talks the talk on reentry, but neither he nor his administration walks the walk.
A couple of weeks ago, Trump designated April as Second Chance Month. He declared that our nation must “provide opportunities for people with criminal records to earn an honest second chance.” Just before that declaration, on March 7, Trump established a Federal Interagency Council on Crime Prevention and Improving Reentry. In doing so, Trump said that we need “to provide those who have engaged in criminal activity with greater opportunities to lead productive lives.”
All this talk sounds great, but unfortunately, that’s all it is.
After the shocking news of the massive Equifax data breach, which has now ballooned to jeopardize the privacy of nearly 148 million people, many Americans are rightfully scared and struggling to figure out how to protect themselves from the misuse of their personal information.
To protect against credit fraud, many consumer rights and privacy organizations recommend placing a ‘credit freeze’ with the credit bureaus. When criminals seek to use breached data to borrow money in the name of a breach victim, the potential lender normally runs a credit check with a credit bureau. If there’s a credit freeze in place, then it’s harder to obtain the loan.
But placing a credit freeze can be cumbersome, time-consuming, and costly. The process can also vary across states. It can be an expensive time-suck if a consumer wants to place a freeze across all credit bureaus and for all family members.
Apparently, you don't actually hate overpaying for cable, broadband and phone service. At least that's the takeaway from this bizarre editorial over at the Washington Post by columnist Megan McArdle. In it, McArdle ineffectively argues that while the rise in streaming video competition is great and all, over-paying your regional telecom monopoly is something we all secretly love.
If the Facebook privacy debacle has shown one thing, it’s that technology companies have become immensely powerful and seemingly accountable to no one. Recent federal rollbacks of net neutrality and online privacy protections have put Americans in an even weaker position when dealing with Internet service providers.
But there is a way for the public to push back: through Internet service provided by local governments, which are directly accountable to citizens.
You have to pay bar dues for your state, meet CLE requirements, and so on, or you can be administratively suspended by your state. If you are, you can’t practice trademark law before the USPTO. There was another recent OED decision recognizing that basic point, here.
The USPTO once considered making practitioners take CLE, but that failed. But, you can be administratively suspended by the USPTO for various reasons, including failing to keep your contact, and other, information current under 37 CFR 11.11. The USPTO periodically sends surveys to practitioners and those who don’t respond get their names published, and if they fail to correct the problem, they get administratively suspended from patent practice, as shown here.
The United States Patent and Trademark Office has attachés around the world specialised in intellectual property issues, including but not limited to enforcement. The office today announced an opening for a new attaché to be located in New Delhi, India, a key post.
The people behind TVAddons and the ZemTV Kodi addon have failed to have their case dismissed. The defendants asked the Texas court to drop the case because they are foreign nationals with no connection to the state. However, the court disagrees which means that the legal battle continues.
French Minister of Culture, Françoise Nyssen, is considering implementing a national blacklist to target the streaming piracy epidemic. The proposed list should be regularly updated so that ISPs, search engines, and advertising companies can block the sites. The idea comes shortly after industry groups criticized the country for not doing enough to stop piracy.
Authorities in India are reporting success in their fight against online piracy. After measuring websites against standards established by the UK's Police Intellectual Property Crime Unit, complaints were filed with the registrars of 11 'pirate' websites. All of the domains were suspended and a further 89 domains are now being targeted.
The Ninth Circuit released its opinion in the "monkey selfie" case, reasonably ruling that Naruto the monkey doesn't have standing under the Copyright laws. The opinion dodges the hard questions about who can be an author (thus leaving for another day questions about artificial intelligence, for example) by instead focusing on mundane things like the ability to have heirs. As a result, it's not the strongest opinion, but one that's hard to take issue with.
But I'd like to focus on an issue that's received much less attention in the press and among my colleagues. The court ruled that Naruto has Article III standing because there is a case or controversy. I'll admit that I hadn't thought about this angle, having instead gone right to the copyright authorship question (when you're a hammer, everything looks like a nail). But I guess when you're an appellate court, that whole "jurisdiction and standing section" means something even though we often skim that in our non-civ pro/con law/fed courts classes in law school.
I'll first note that the court is doubtful that PETA has standing as "next friend." Footnote 3 is a scathing indictment of its actions in this case, essentially arguing that PETA leveraged the case for its own political ends rather than for any benefit of Naruto. Youch! More on this aspect here. The court also finds that the copyright statute does not allow for next friend standing, a completely non-shocking result given precedent.
The digital-music business of Chinese internet giant Tencent Holdings Ltd. TCEHY -1.71% plans to interview potential underwriting banks over roughly the next month, according to people familiar with the matter.