It looks like Google is taking support for Linux apps very serious lately by recently enabling its integrated virtualization machine for running Linux apps on Chrome OS to support Chromebooks powered by Intel Braswell CPUs.
Patches have been revised for the Linux kernel to support the initial Hygon Dhyana server CPUs that are the licensed AMD Family 17h "Zen" technology, basically the EPYC server CPUs for the Chinese market.
Back in June the initial Hygon Dhyana Linux patches were posted and today they were revised for the third time. V3 of the Hygon Dhyana patches are re-based against the latest Linux 4.18 development code and rework some of the vendor checking codes for improved consistency.
While a bit late, Freedreno lead developer Rob Clark is hoping to see the Qualcomm Adreno 600 series bring-up happen for the Linux 4.19 kernel cycle.
The MSM Direct Rendering Manager has long been prepping for Adreno 600 series support as the latest-generation Qualcomm graphics found on their Snapdragon SoCs. The initial code for A6xx was posted earlier this year including work by Qualcomm / Code Aurora on that hardware bring-up. With Linux 4.19 queued in DRM-Next is already the "DPU1" display code needed for newer SoCs and Rob Clark is hoping to get the working A6xx support in place for this cycle.
The early registration deadline is August 18, 2018, after which the regular-registration period will begin. So to save $150, register for the Linux Plumbers Conference before August 18th!
The ASWF is the result of a two-year investigation by the Academy’s Science and Technology Council into the use of Open Source Software (OSS) across the motion picture industry. The survey found that more than 80% of the industry uses open source software, particularly for animation and visual effects. However, this widespread use of OSS has also created challenges including siloed development, managing multiple versions of OSS libraries (“versionitis”) and varying governance and licensing models that need to be addressed in order to ensure a healthy open source ecosystem.
Some 13 companies are listed as founding members alongside the Academy, including The Walt Disney Co., video game giant Epic Games Inc. and DreamWorks Animation LLC. A sizable portion of the foundation’s remaining backers hail from the tech industry. Among them are Intel Corp., Cisco Systems Inc. and Google LLC’s cloud division.
The Academy of Motion Picture Arts & Sciences and the Linux Foundation have launched the Academy Software Foundation (ASWF), a new nonprofit organization devoted to tech advancement in image creation, visual effects, animation, and sound. The focus will be on expanding open source software (OSS) development, once proprietary, for greater standardization, collaboration, and efficiency.
Founding ASWF members include Animal Logic, Autodesk, Blue Sky Studios, Cisco, DNEG, DreamWorks, Epic Games, Foundry, Google, Intel, SideFX, Walt Disney Studios (Disney Animation, Pixar, Industrial Light & Magic, and Marvel), and Weta Digital.
The Academy of Motion Picture Arts and Sciences and The Linux Foundation have launched the Academy Software Foundation, a forum for open source software developers in the motion picture and broader media industries. The new hub is designed to share resources and collaborate on technologies for image creation, visual effects, animation and sound.
The idea is to enable them to share resources and collaborate on technologies for image creation, visual effects, animation and sound.
“We are thrilled to partner with The Linux Foundation for this vital initiative that fosters more innovation, more collaboration, more creativity among artists and engineers in our community,” said Academy CEO Dawn Hudson. “The Academy Software Foundation is core to the mission of our Academy: promoting the arts and sciences of motion pictures.”
The RC1 release candidate for wayland 1.16 is now available.
Derek Foreman of Samsung's Open-Source Group put out the release candidates on Friday for the upcoming Wayland 1.16 release as well as the Weston 5.0 reference compositor.
The Wayland 1.16 release candidate hasn't seen any changes over the earlier development release besides updating the contributor documentation to reflect that Gitlab is now used for handling merge requests. The Wayland 1.16 cycle overall was quite light but earlier in the cycle it did see build system updates, dropping of the wl_buffer definition, and the protocol now allows a zero physical size output.
Due to a busy week and a slip of my mind I didn't get out the announcement for 18.1.6 on Wednesday. Therefore, I'm planning to make the release Monday August 13th, at or around 10AM PDT.
While Mesa 18.2 is baking for release later this month, Mesa 18.1 remains the currently supported stable series. Final release preparations are underway for Mesa 18.1.6 as the latest bi-weekly point release.
Mesa 18.1.6 is expected to be released this coming Monday, 13 August, and so far has staged more than three dozen fixes as confirmed via Friday's release notice.
Dropbox is thinking of limiting the synchronization support to only a handful of file system types: NTFS for Windows, HFS+/APFS for macOS and Ext4 for Linux.
Cloud storage rules -- especially when coupled with a local backup plan. Quite frankly, it is one of the best computing innovations of all time. How cool is it that you can easily backup important files to an offsite location? Let's be honest -- before the cloud, many computer and smartphone users didn't bother backing up at all. While many still do not, the cloud has definitely improved the situation through convenience and affordability.
VMware Workstation Player is a very decent program, especially for new users. It comes with a reasonable set of options, it tries to guess what you're doing and help, and for lightweight use, it makes perfect sense. But if you are an advanced user, you will definitely need and want more, and this is where the full pro version comes into play. Or alternatively, go for other options. Overall, it remains similar to version 4, which I tested several years ago.
My biggest gripe is not having hardware acceleration, which significantly improves the performance of virtual machines. The network and storage side of things are less critical for everyday use. Multi-VM is also important if you need to create more complicated setups or labs. That said, the program is simple and easy, and has a very gentle curve for people just freshly starting in the virtualization world. Worth testing, but always remember, 'tis but a teaser for the heavyweight just hiding behind the corner. Indeed, for me, the big take from this endeavor is that I need to test the Workstation as well. We shall see.
I first have to admit I am no a JavaScript or TypeScript expert, but the moment I wanted to implement some generic functionality (Discrete Interval Encoding Tree with additional data and that is merged according to a functional type parameter), I immediately stumbled upon lots of things I would like to have but aren’t there – I guess I am too much used to Scala.
That patch at this stage isn't in the mainline kernel nor has been queued in the HID subsystem tree ahead of the Linux 4.19 kernel or anything along those lines, right now just under review on the kernel mailing list.
It's great to see this rumble/vibrate support for this Xbox controller finally seeing the finish line for getting into mainline kernel. Interestingly, Pierre-Loup Griffais has confirmed on Reddit that they are working with Andrey Smirnov (who submitted today's Xbox One S controller rumble patch) to upstream "all that stuff" from SteamOS, with this being one of the patches they've long carried in Valve's Linux distribution for improving the Linux gaming experience.
Valve's Pierre-Loup Griffais announced on Twitter that they've hired Andrey Smirnov to help them get some SteamOS changes upstream into the main Linux Kernel.
Yet another game that was successfully funded on Kickstarter, also one that seems it will keep the promise of Linux support too since the developer got in touch with us directly to point it out. They even joined our Discord as well, so that was pretty fun to see.
I have no idea how long it's been a thing that Kingdom Rush Origins would be making its way to PC, but it seems it will release soon.
After chatting with our wonderful contributor Scaine today, he pointed out that Kingdom Rush Origins has a Steam page. The page already has a SteamOS + Linux system requirements tab and considering the two previous titles support Linux, it seems it will too!
KDE Frameworks consists of more than 70 add-on libraries for the open-source and cross-platform Qt application framework that offers a wide range of commonly needed functionality, as well as many core components and apps that are required for the KDE Plasma desktop environment to function correctly.
For the past several years, new KDE Frameworks versions are published every month in the second Saturday of the month, and KDE Frameworks 5.49.0 is the release the KDE Project prepared for the month of August 2018, bringing various improvements and addressing numerous bugs.
KDE today announces the release of KDE Frameworks 5.49.0.
KDE Frameworks are 70 addon libraries to Qt which provide a wide variety of commonly needed functionality in mature, peer reviewed and well tested libraries with friendly licensing terms. For an introduction see the Frameworks 5.0 release announcement.
The latest monthly update to the KDE Frameworks is now available that complement the offerings of the Qt5 tool-kit.
Coming to the last week, the activity Note_names is finally developed and being tested on different platforms.
Principle: This activity aims to teach sight reading the musical notes and their position on the staff by presenting several notes one-by-one with animation from the right of the staff sliding to the right of the clef image. The user will get the combination of all the notes he has learned previously and the current targetted notes from the dataset. Only the reference notes are colored as red and the user is made to learn the notes around it using it as a leverage. One has to correct enough notes to get a 100% and advance to next stage.
For this phase, I started with implementing Stamps feature in the Drawing activity. This feature allows users to use different stamps images in their beautiful arts. For now, I have added images from solar activity to use as stamps.
This week we’re all at Akademy–KDE’s yearly gathering of developers, designers, system administrators, and users. I’m giving a presentation later today about how we can make KDE Software irresistible!
As such, it as a bit of a lighter week for the Usability & Productivity initiative, what with all the preparation and conference-going, but we still managed to get quite a bit done. And all the in-person interactions are setting the stage for many more good things to come.
Hello readers, today I’ll be covering on how to increase your productivity and this applies to all types of computer users, especially Linux, just kidding. :P Believe me most of us who work on computers have suffered back pain, eye strain, stress, and then end up getting frustrated. However, did you know that one can fix all those issues by managing time in intervals and a short break in between? Yes, that’s right, read on below how you can go about that using GNOME Pomodoro.
As probably most of you already know, or recently found out, at the beginning of this week the GSoC coding period officially ended, and it is time for us, GSoC students, to submit our final evaluations and the results we achieved thus far. This blog post, as you can probably tell from the title, will be a summary of all of the work I put into modernising Five or More throughout the summer months.
My main task was rewriting Five or More in Vala since this simple and fun game did not find its way to the list of those included in the Games Modernisation Initiative. This fun, strategy game consists of aligning, as often as possible, five or more objects of the same shape and color, to make them disappear and score points.
After three months of hard work and a lot of coding the Google Summer of Code is over. I learned a lot and had a lot fun. GSoC was an amazing experience and I encourage everybody to participate in future editions. At this point I’ve been a contributor to GNOME for nearly a year, and I plan on sticking around for a long time. I really hope that other GSoC students also found it so enjoyable, and keep contributing to GNOME or other Free Software Projects.
Yesterday I booted my laptop with OpenMandriva Lx and went to look for a book. When I returned to the machine, a kernel panic was waiting for me on the screen.
Apparently, something went very wrong with the updates that I performed last week, but I did not notice.
This has happened before, though. As the laptop boots seven OSs (OpenMandriva, Mageia, PCLinuxOS, Pisi, Elive, Fedora, and PicarOS), when I install a system that changes the OMV-controlled GRUB2, OpenMandriva gets a panic.
I do not have the expertise to rectify things other than by performing a re-install. So, I reinstalled OpenMandriva, updated it (the process did not last more than an hour or so) and, sure enough, the OS was bootable again.
[...]
Maybe it is time for me to start experimenting with BSD, Haiku, or something.
Flatpak now has access to an updated FreeDesktop SDK runtime that is built on their new BuildStream build system rather than Yocto and has other improvements.
Flatpak lead developer and Red Hat employee Alexander Larsson has outlined this new runtime option for Flatpak, the FreeDesktop SDK 18.08 release. The FreeDesktop Runtime ends up being used by most Flatpak packaged applications out there.
This would be a long blog post as I would be sharing a lot of journeys, so have your favorite beverage in your hand and prepare for an evening of musing.
Before starting the blog post, I have been surprised as the last week and the week before, lot of people have been liking my Debconf 2016 blog post on diaspora which is almost two years old. Almost all the names mean nothing to me but was left unsure as to reason of the spike. Were they debconf newcomers who saw my blog post and their experience was similar to mine or something, don’t know.
Available for Ubuntu 18.04 LTS (Bionic Beaver), Ubuntu 16.04 LTS (Xenial Xerus), and Ubuntu 14.04 LTS (Trusty Tahr), the new kernel live patch fixes a total of five security vulnerabilities, including the recently disclosed critical TCP flaw (CVE-2018-5390) discovered by Juha-Matti Tilli, which could allow a remote attacker to cause a denial of service.
The rebootless kernel security patch also addresses a vulnerability (CVE-2018-13405) in the inode_init_owner function in fs/inode.c in the Linux kernel through 4.17.4 that could allow a local user to escalate his/her privileges by creating a file with an unintended group ownership and then make the file executable and SGID (Set Group ID).
Support for the stable XDG Shell protocol has just landed in Mir, and it will ship with the next release. It will eventually replace XDG Shell unstable v6 as the primary way in which Wayland applications create traditional style windows. You can get it now in our development PPA: ppa:mir-team/dev.
Canonical developers continue working on advancing the Mir display server's support for Wayland.
The latest Wayland enhancement to Mir is on supporting the stable version of the XDG Shell protocol. XDG-Shell is the protocol for improved management of Wayland surfaces including for minimization of windows, dragging, resizing, and other desktop-aligned tasks. XDG Shell also defines protocol around transient windows like pop-up menus.
So, you just decided to switch to using a Linux distro and you’ve come to the decision that Ubuntu is the one for you. But while you were doing your research you came across tags like Ubuntu flavours and derivatives – “what are the differences?” you ask. Also, why are there so many versions and what is the alpha-beta-LTS business all about?
Today, I’ll give you the perfect weighing scale to help you choose which Ubuntu version to use as well as give you a fundamental understanding of why there are “so many” versions.
With the upcoming rise of self-driving and more connected vehicles come an increased risk of hacking those vehicles with ill-intent.
Elon Musk thinks that Tesla’s vehicle security software is the best solution and he plans to open-source it for free to other automakers for a safer self-driving future.
Musk has expressed concerns about hackers gaining access to Tesla system in the past.
Tesla CEO and founder Elon Musk took to Twitter to share more news about the company's self-driving technology. According to the entrepreneur, plans are in place to make the autonomous software found in Tesla units available on open-source platforms.
The best explanation to Tesla’s decision to give away its patents in good faith was written by Bin Hu, Ming Hu, and Yi Yang on Informs.Org. They wrote, “We believe that Tesla opened up its patents to tip the scale between the two competing technologies in its favor. This is the logic: if Tesla’s patents are more likely to be adopted by other auto makers because they are free, the electric vehicle technology is more likely to become mainstream, and holding on to this belief, component suppliers (including energy companies by extension) are more likely to make investments into the electric vehicle technology rather than the competing hydrogen fuel-cell vehicle technology.”
As tech’s social giants wrestle with antisocial demons that appear to be both an emergent property of their platform power, and a consequence of specific leadership and values failures (evident as they publicly fail to enforce even the standards they claim to have), there are still people dreaming of a better way. Of social networking beyond outrage-fuelled adtech giants like Facebook and Twitter.
There have been many such attempts to build a ‘better’ social network of course. Most have ended in the deadpool. A few are still around with varying degrees of success/usage (Snapchat, Ello and Mastodon are three that spring to mine). None has usurped Zuckerberg’s throne of course.
[...]
The team behind Openbook includes crypto(graphy) royalty, Phil Zimmermann — aka the father of PGP — who is on board as an advisor initially but billed as its “chief cryptographer”, as that’s what he’d be building for the platform if/when the time came.
With this patch series, nbdkit, the pluggable Network Block Device server, supports FreeBSD ââ°Â¥ 11.2.
Unifont 11.0.02 is now available. This is an interim release, with another released planned in the autumn of 2018. The main addition in this release is David Corbett's contribution of the over 600 glyphs in the Sutton SignWriting Unicode block.
Squaro Engineering has just developed their first e Ink product called Badgey. It features a 2.9 inch e-paper display with a resolution of 296Ãâ128 E and a five-way tactical switch for user input. The default firmware includes support for WiFiManager and OTA updates. This device retails for $29.99 and they offer volume pricing options, but it does not come with a battery, it has to be purchased separately.
Git-cinnabar is a git remote helper to interact with mercurial repositories. It allows to clone, pull and push from/to mercurial remote repositories, using git.
They’re a month overdue, and from the volume of inbound questions about when the language rankings would drop, it’s been noticed. As always, these are a continuation of the work originally performed by Drew Conway and John Myles White late in 2010. While the means of collection has changed, the basic process remains the same: we extract language rankings from GitHub and Stack Overflow, and combine them for a ranking that attempts to reflect both code (GitHub) and discussion (Stack Overflow) traction. The idea is not to offer a statistically valid representation of current usage, but rather to correlate language discussion and usage in an effort to extract insights into potential future adoption trends.
A newly declassified secret of the CIA's is the handiwork of experts in Poland: custom-made plates, bowls and other pieces of tableware painted with the U.S. intelligence agency's official seal.
Helena Smolenska, the head of the craft-maker cooperative in the town of Boleslawiec that produced the ceramic set, said workers met the order with "joy and disbelief" and saw it as a chance to do "something exceptional."
Intel is flying press to an Analyst day to discuss their impending server meltdown. SemiAccurate has been detailing this impending catastrophe for over a year now, it is now time for the details.
In this paper I'll show you how to compromise websites by using esoteric web features to turn their caches into exploit delivery systems, targeting everyone that makes the mistake of visiting their homepage.
I'll illustrate and develop this technique with vulnerabilities that handed me control over numerous popular websites and frameworks, progressing from simple single-request attacks to intricate exploit chains that hijack JavaScript, pivot across cache layers, subvert social media and misdirect cloud services. I'll wrap up by discussing defense against cache poisoning, and releasing the open source Burp Suite Community extension that fueled this research.
At the Black Hat security conference in Las Vegas, researchers Billy Rios and Jonathan Butts said they first alerted medical device maker Medtronic to the hacking vulnerabilities in January 2017. So far, they said, the proof-of-concept attacks they developed still work. The duo on Thursday demonstrated one hack that compromised a CareLink 2090 programmer, a device doctors use to control pacemakers after they’re implanted in patients.
The new research is some of the most chilling to date. Rios and Butts have found vulnerabilities in Medtronic's infrastructure for programming and updating the pacemakers and their programming terminals (which run Windows XP!) (Windows XP!!). By attacking Medtronic's cloud infrastructure, the pair can poison all the devices as they leave the factory, or corrupt them once they're in the field.
To take control of the pacemaker, Rios and Butts went up the chain, hacking the system that a doctor would use to program a patient’s pacemaker. Their hack rewrote the system to replace the background with an ominous skull, but a real hack [sic] could modify the system invisibly, while ensuring that any pacemaker connected to it would be programmed with harmful instructions. “You can obviously issue a shock,” Butts said, “but you can also deny a shock.” Because the devices are implanted for a reason, he added, withholding treatment can be as damaging as active attempts to harm.
Details included usage stats from GoDaddy, pricing and negotiated discounted rates from Amazon. More worryingly, there's also server config information, CPU specs, hostnames, operating systems and server loads.
[...]
GoDaddy was given a chance to plug the leaks, but after five weeks, UpGuard decided to act, as GoDaddy still hadn't locked things down.
Data leaks are par for the course these days, and the latest company to be involved in one is GoDaddy. The company, which says it's the world's top domain name registrar with over 18 million customers, is the subject of a new report from cybersecurity firm UpGuard that was shared exclusively with Engadget. In June, cyber risk analyst Chris Vickery discovered files containing detailed server information stored in an unsecured S3 bucket -- a cloud storage service from Amazon Web Services. A look into the files revealed multiple versions of data for over 31,000 GoDaddy systems.
The researchers studied three different Internet of Things devices that help control irrigation and found flaws that would allow malicious hackers [sic] to turn them on remotely in an attempt to drain water. The attacks don’t rely on fancy hacking techniques or hard to find vulnerabilities, but to make a real, negative impact on a city’s water reserves, the hackers [sic] would need to take control of a lot of sprinklers. According to the researcher’s math, to empty an average water tower, hackers [sic] would need a botnet of 1,355 sprinklers; to empty a flood water reservoir, hackers [sic] would need a botnet of 23,866 sprinklers.
The researchers say their attacks are innovative not because of the techniques, but because they don’t rely on targeting a city’s critical infrastructure itself, which is (or should be) hardened against hackers [sic]. Instead, it attacks weak Internet of Things devices connected to that infrastructure.
Malicious attackers have launched a Windows ransomware attack on the servers of the PGA of America golf tournament which began at the Bellerive County Club in St Louis on Thursday.Allan Liska, a ransomware expert from security form Recorded Future, told iTWire that the ransomware in question appeared to be BitPaymer.
That attack, which researchers will demonstrate Thursday at the Black Hat security conference in Las Vegas, targets enterprise Macs that use Apple's Device Enrollment Program and its Mobile Device Management platform. These enterprise tools allow employees of a company to walk through the customized IT setup of a Mac themselves, even if they work in a satellite office or from home. The idea is that a company can ship Macs to its workers directly from Apple's warehouses, and the devices will automatically configure to join their corporate ecosystem after booting up for the first time and connecting to Wi-Fi.
The vulnerability works against DLink DSL-2740R, DSL-2640B, DSL-2780B, DSL-2730B, and DSL-526B models that haven’t been patched in the past two years. As described in disclosures here, here, here, here, and here, the flaw allows attackers to remotely change the DNS server that connected computers use to translate domain names into IP addresses.
In late 2016, security researcher Justin Shattuck was on assignment for an organization that was under a crippling denial-of-service attack by a large number of devices, some of which appeared to be hosted inside the network of a large European airport. As he scanned the airport’s network from the Internet—and later, with the airport operators’ permission, from inside the network—he was eventually able to confirm that the devices were indeed part of several previously unseen botnets that were delivering record-setting denial-of-service attacks on websites.
Nearly two years have passed since we first started observing cellular gateways distributing packets across the internet. Today, we are only scratching the surface of what will inevitably turn into years of future research and discoveries before the world has tackled the problem of IoT devices being deployed without security considerations. For now, this article includes the following, and will be followed up with future research and discoveries.
- The existence of cellular IoT devices that are not properly configured is allowing attackers to easily leverage remote administration for nefarious purposes.
- The improperly configured devices we discovered and tested had either default administration credentials (such as admin:12345), or they required no authentication at all.
- The absence of logging capabilities on these devices ensures that nefarious activities cannot be tracked.
- Because most of the use cases for cellular IoT are for moving fleets, devices that need tracking, or remote critical infrastructure, virtually all of them have GPS coordinates. Excessive information disclosure, such as providing GPS coordinates publicly without requiring authentication (as some devices we discovered do) is giving attackers the ability to track fleet vehicles without ever breaking the law with unauthorized access. Yes, police cars can be tracked without breaking the law.
- There is no bias on which industries or cellular device manufacturer will fall victim to threats emerging from cellular devices. Virtually every industry that requires some form of long-range, constant connectivity is impacted (and likely, most manufacturers) as development standards apply unilaterally.
- As of July 28, 2018, we have identified more than 100,000 devices that are impacted online. 86% of the devices identified exist within the United States.
- Attackers have been exploiting many of these systems since August 2016, if not earlier.
- We have a defined list of impacted Sierra Wireless makes and models, however, we believe the problem to be widespread across all manufacturers of cellular IoT devices.
Today I’m giving a talk in the IoT Village at DEF CON 26. Though not a “main stage” talk, this is my first opportunity to speak at DEF CON. I’m really excited, especially with how much I enjoy IoT hacking. My talk was inspired by the research that lead to CVE-2017-17704, but it’s not meant to be a vendor-shaming session. It’s meant to be a discussion of the difficulty of getting physical access control systems that have IP communications features right. It’s meant to show that the designs we use to build a secure system when you have a classic user interface don’t work the same way in the IoT world.
A presentation today at Defcon from Drexel computer science prof Rachel Greenstadt and GWU computer sicence prof Aylin Caliskan builds on the pair's earlier work in identifying the authors of software and shows that they can, with a high degree of accuracy, identify the anonymous author of software, whether in source-code or binary form.
Rachel Greenstadt, an associate professor of computer science at Drexel University, and Aylin Caliskan, Greenstadt's former PhD student and now an assistant professor at George Washington University, have found that code, like other forms of stylistic expression, are not anonymous. At the DefCon hacking conference Friday, the pair will present a number of studies they've conducted using machine learning techniques to de-anonymize the authors of code samples. Their work could be useful in a plagiarism dispute, for instance, but it also has privacy implications, especially for the thousands of developers who contribute open source code to the world.
A member of Sweden’s neo-Nazi party the Nordic Resistance Movement (NMR) has been arrested after police found proof that he was planning to murder two journalists.
On Sunday I joined the three-day YouTube vigil for imperiled Wikileaks founder Julian Assange. The next day I realized that I must have sounded obsessive because I’d kept returning to a single classified diplomatic cable from Kigali, the capital of Rwanda, sent to the US State Department. This is one of the many thousands of diplomatic cables that Wikileaks released between February 18, 2010, and September 1, 2011. I know I didn’t fully explain it although I kept returning to it because I kept turning it over in the back of my mind. Apologies to the YouTube vigil producers and listeners for any inexplicable redundancy. I’m going to do my best to clear that up now that I’ve had more time to think about.
The cable’s title is “ETHNICITY IN RWANDA - - -WHO GOVERNS THE COUNTRY?” It’s dated August 5, 2008. Its overall classification is “SECRET,” second only to “TOP SECRET,” and “NOFORN,” no distribution to foreign nationals. Those parts of it which describe Rwandan reality in general terms are marked “CONFIDENTIAL, NOFORN.” Passages naming specific individuals holding various positions in Rwanda are marked “SECRET, NOFORN.” The latter seem to explain why the cable is marked “SECRET, NOFORN” overall.
Unknown forces attempted to assassinate Venezuelan President Nicolás Maduro last Saturday in Caracas. The weapon of choice: a pair of powerful M600 quadcopters, each armed with more than two pounds of C4 explosive, and equipped with remote-control detonators.
Venezuela confirmed the arrest of one lawmaker and ordered the detention of another on Wednesday, accusing the opposition politicians of scheming to assassinate President Nicolas Maduro with explosives-laden drones at a rally last weekend.
Two drones detonated during a military parade on Saturday, injuring seven officers and sending soldiers scurrying for cover during a Maduro speech broadcast live. Maduro himself was unharmed.
A quick survey of some of the well known victims illustrates the targeted killings. Phillip II of Macedonia was assassinated in 336 B.C. and Julius Caesar on the Ides of March in 44 B.C. For a number of centuries, the 8th through the 14th, an Islamic sect called the Assassins was active in the areas of what is now Iran and Syria, killing, often under influence of hashish, caliphs, viziers, sultans, and Crusaders for political and religious reasons.
After the Chinese carried out their first nuclear test in 1964, the US decided to spy on China’s nuclear capabilities via India. The CIA asked the Indian government if it could plant a sensor. The government, which at the time blindly followed the CIA, agreed. On June 23, 1965, we did a trial run on Mount McKinley in Alaska, and then went to Nanda Devi, but had to turn back because of bad weather conditions. Unable to carry it back, we left the device there. We went back in May 1966 to search for it, and again in 1967 but had no luck. In 1968, we finally abandoned the search. Because it was a top-secret mission, we were not allowed to disclose what we were doing even to our families. The American agents used aliases. The whole thing was quite exhausting, but we were in the service of the nation.
At least three Palestinians, including a pregnant woman and her 18-month-old child, were killed by Israeli air attacks and artillery shelling on the besieged Gaza Strip.
Israeli launched more than 140 attacks after about 150 rockets were fired from the coastal enclave, injuring at least six people in Israel.
Yang said the play will not only be enjoyable to those who may not have know about the Secret War, but it will also shed light on the war for younger generations of Hmong.
"The younger Hmong generation who were born here after 1975, they had no idea how hard, how bad their parents went through," Yang said. "They had no idea what happened in the Secret War."
Following the play, Hansen and Yang will hold a question and answer segment. Yang hopes this will allow people, young and old, who want specific answers to what exactly happened all those years ago in Laos to get a chance to ask people who have a deep connection to it.
2nd Amendment reporter Stephen Gutowski has a must-read piece over at the Free Beacon on the censorship of CodeIsFreeSpeech.com, a coalition of gun-rights groups that published the now infamous 3D-gun design files.
An attack on a bus at a market in rebel-held northern Yemen killed at least 29 children Thursday, the Red Cross said, as the Saudi-led coalition faced a growing outcry over the strike.
The coalition said it had carried out a "legitimate military action", targeting a bus in response to a deadly missile attack on Saudi Arabia on Wednesday by Huthi rebels.
Coalition spokesman Turki al-Maliki told AFP that claims by aid organisations that children were inside the bus were "misleading", adding that the bus carried "Huthi combatants".
The International Committee of the Red Cross said the strike hit a bus filled with children at the Dahyan market in the Huthi stronghold of Saada.
WikiLeaks says Assange is "considering the offer but testimony must conform to a high ethical standard."
After a few years, the effort is still nascent and Oracle trails market-share leaders in key segments. The Redwood Shores, California-based company stopped disclosing specific cloud sales metrics as of June, giving investors less insight into its transition to [I]nternet-based software.
The suit claimed that Oracle’s executives lied in forward-looking statements, which are never guaranteed, during earnings calls and at investor conferences in 2017 when they said customers were rapidly adopting their cloud-based products and cloud sales would accelerate.
Nadella will continue to divest shares in the next year through the structured plan in which he doesn’t control the timing or amounts sold, the company said Friday. He will sell fewer than half his Microsoft shares through the plan, according to the company.
One thing the two companies do have in common is that neither one has shown any signs of turning a profit.
More than 100 Westminster constituencies that voted to leave the EU have now switched their support to Remain, according to a stark new analysis seen by the Observer.
In findings that could have a significant impact on the parliamentary battle of Brexit later this year, the study concludes that most seats in Britain now contain a majority of voters who want to stay in the EU.
The analysis, one of the most comprehensive assessments of Brexit sentiment since the referendum, suggests the shift has been driven by doubts among Labour voters who backed Leave.
[...]
One seat has switched support in Scotland and 97 have switched in England, while 14 of the 40 seats in Wales have changed from Leave to Remain. Overall, the model puts Remain on 53% support, with 47% backing Leave.
It suggests that there is now a majority for Remain in Scotland and Wales – meaning greater pressure on the union following the UK’s departure. Young voters and those from ethnic minorities have also driven the switch to Remain.
“The Department has not produced a single document in 2018 in response to our request,” Cummings and Kelly wrote, arguing that the dearth of documents has prevented lawmakers from understanding “the basis of the Department’s decision to shutter” the office and from “planning for the reorganization of these functions.”
The resolution from New York Reps. Tom Reed (R) and Kathleen Rice (D) would amend House rules to mirror a Senate provision banning lawmakers from sitting on the boards of “any publicly-held or publicly regulated corporation, financial institution, or business entity.”
We drop faulty beliefs not when they’re disproven by scientists or lawyers, but when—and only when—they cost us our relationships, our professional standing, our freedom, and even our chances for survival. We’re humans in a world of natural selection. The prospect of exile, isolation, and death can be keenly persuasive.
A merger that would have given a conservative broadcasting company access to 73 percent of US households is now officially dead. Today, the Tribune Media Company announced that it has terminated its $3.9 billion merger agreement with Sinclair Broadcast Group, and is now suing Sinclair for $1 billion for breach of contract.
Late on a recent Thursday night, a Reddit user posted a comment in a forum (or subreddit) devoted to the game Magic: The Gathering about how the company that makes the game is hiring with diversity in mind — and how that was ruining the quality of its cards.
As the editor of the JFK Facts blog, I try not to spend a lot of time on stupid conspiracy theories, but given widespread ignorance and confusion on the subject, unpleasant journalist duty often calls.
Who killed JFK? The Federal Reserve? Nah. The Secret Service man? A hoax. Ted Cruz’s father? Pure B.S. George H.W. Bush? Heavy breathing is not the same as credible evidence. On a recent Black Vault podcast, the most common JFK question I heard was, “Was Kennedy assassinated because of his interest in UFOs?” Um, no, he was not.
Which brings me to QAnon, the imaginative conspiracy theorist now dominating the internet, attracting followers of President Trump, and obsessing the Washington Post, which has published a dozen articles about QAnon in the span of four days. Like many conspiracy theories, the QAnon fever dream can be traced back to the assassination of JFK.
A shadowy group of powerful figures are secretly in control of the United States. They’re abducting children and subjecting them to lurid, Satanic abuse. Our only hope lies with a single brave source, one with first-hand experience of the horrifying conspiracy, to expose the plot.
This may sound like a brief description of the QAnon conspiracy theory, which, after spending a year bubbling at the fringes of the internet, suddenly burst into the mainstream last week at a Trump rally in Tampa, Florida. But it’s actually a description of another conspiracy theory that gripped America in the early 1980s, one that led to the most expensive trial in California’s history and was eventually proven to be utterly false.
In 1980, Canadian psychiatric patient Michelle Smith co-wrote a book with her psychiatrist Lawrence Pazder — whom she later married — titled Michelle Remembers. In the book, Michelle claimed to “remember,” via hypnosis, that her mother was actually a member of a Satanic cult and had forced her to endure horrific abuse. Michelle claimed that she was caged, was forced to watch the cult slaughter kittens, and endured 81 straight days of abuse in an effort to summon Satan himself.
The Democrats’ embrace of identity politics is turning off a generation of voters.
Just two months after the Democratic National Committee (DNC) was celebrated by environmentalists for banning donations from fossil fuel companies, it voted 30-2 on Friday to adopt a resolution from Chair Tom Perez that critics said effectively reverses the ban and represents “an absolute failure by the DNC.”
nternet censorship is the topic of the moment, and there are lots of members of the blockchain community who hope that decentralization can put an end to what they perceive to be arbitrary speech restrictions by governments and private corporations.
Today, a blockchain-based online encyclopedia called Everipedia announced the launch of its network, which it claims will be able to store knowledge, decentralized and free from government interference. It counts Wikipedia co-founder Larry Sanger among its team.
All this social media censorship talk that’s been fueling conservative angst in recent months has had the distressing effect of putting the ideological right exactly where the left wants it — in a regulatory box with nowhere to go.
The solution? The ideological right needs to create a new battlefield. How about amending Title VII of the Civil Rights Act?
Look at the situation; look at what’s going on.
Verified accounts belonging to the group and its founder, Gavin McInnes, were suspended for violating the platform’s policy against “violent extremist groups”, a company spokeswoman confirmed. A number of non-verified accounts for various Proud Boys chapters were also suspended.
In a series of bizarre takedown requests, a DMCA takedown outfit is inadvertently going after a wide variety of legitimate sites. Some requests specifically target news about the EU upload filters, or censorship machines, as they are sometimes called. As a result, one article from EU MEP Julia Reda was wiped from Google's search results.
“Sharing instructions on how to print firearms using 3D printers is not allowed under our Community Standards. In line with our policies, we are removing this content from Facebook,” a Facebook spokesperson told The Hill on Thursday.
The company said it is looking at how to further strengthen its policy against 3D guns.
In response, young Chinese are coming up with ever more creative ways to bypass their censors. Words that are already in common use can be employed to prevent the censors from blanket-banning terms. In the last couple of years, censors have struggled to remove comments mentioning ‘toads’, for instance, which refer cryptically to the bespectacled former Chinese president Jiang Zemin.
A number of prominent social media and video platforms removed all content by Infowars’ Alex Jones, citing hate speech and inciting violence among the reasons. DC Metro union workers refuse special service to white nationalists (AKA white supremacists) coming to rally in DC. Journalist Matt Taibbi discusses the slippery slope of social media censorship and civil liberties. And, somehow, in a small bit of hope, gingko trees in Hiroshima were able to survive through one of the most destructive moments in history.
Alex Jones is one of America’s most heard, read and watched conspiracy theorists – on YouTube, he had 2.4 million subscribers and billions of video views.
But he has now been banned from YouTube (owned by Google), Apple, Facebook and Spotify, and the majority of his content has been removed from those sites.
Among his infamous claims, Jones says the U.S. government was involved in the 1993 bombing of the federal building in Oklahoma City and the Sept. 11 terrorist attacks on the World Trade Center’s twin towers and the Pentagon.
It’s important to note at the outset that I have no love for Jones whatsoever — lest this be read as some kind of endorsement or defense of InfoWars. It is not.
Known primarily for his conservative fringe media site, Infowars — that pushed such conspiracies as “The Sandy Hook Hoax” — Alex Jones has come under fire recently for his repeated policy violations of social platforms. YouTube and Facebook have taken very small steps toward censoring content of his they find to be hate speech.
In response to this, some argue this kind of censorship is too slippery of a slope: today they crack down on hate speech, tomorrow they outlaw certain words. But what this argument fails to recognize is the immense difference in government censorship and private sector censorship.
Snapchat has largely escaped scrutiny about fake news and election interference because its content quickly disappears and its publisher hub, Discover, is a closed platform. But now the Infowars mess that’s plagued Facebook and YouTube has landed at Snap’s feet, as conspiracy theorist Alex Jones has begun tweeting to promote an augmented reality Snapchat Lens built by someone in his community that puts a piece of masking tape with the word “censorship” written over it across the mouth of the user with a “Free Infowars” logo in the screen’s corner. He’s also encouraging his followers to follow Infowars’ official Snapchat page.
The situation highlights the whack-a-mole game of trying to police the fragmented social media space. There always seems to be another platform for those kicked off others for inciting violence, harassing people or otherwise breaking the rules. A cross-industry committee that helps coordinate enforcement might be necessary to ensure that as someone is booted from one platform, their presence elsewhere is swiftly reviewed and monitored for similar offenses.
First came Alex Jones, and the outright booting of his Infowars news product from several top social media sites.
Then came headlines of Sebastian Gorka, former deputy assistant to President Donald Trump, about facing a so-called “soft ban” at Fox News.
SIX WEEKS from New Hampshire’s September primary and three months from the November election, we saw this week significant censorship by technology companies of offensive speech.
After Apple removed five podcasts by talk show host Alex Jones and his site Infowars, other platforms quickly followed suit. On Monday, Facebook delated Jones’s content, and YouTube banned him. Spotify is also barring Jones from posting.
There has been a mixed reaction to this censorship. For example, Sen. Chris Murphy, D-Conn., applauded the censorship and even called for more, saying, “These companies must do more than take down one website. The survival of our democracy depends on it.”
The Constitution guarantees Americans the right to free speech – but what about when you are on Facebook?
After Facebook and other social media services removed "The Alex Jones Show" and other content created by Jones-founded Infowars, the topic of free speech online has intensified.
Facebook has removed the page of yet another media outlet. This time, it’s not a far right fringe network like Infowars, but “Venezuela's only independent, grassroots leftwing English media platform,” the outlet, Venezuela Analysis, noted on Twitter.
Publishers for the news outlet were informed by Facebook on Thursday that their page had been "unpublished" due to "recent activity" that "doesn't follow the Facebook Pages Terms." When a Facebook page is unpublished, it becomes no longer viewable to the public, only to the administrators. Venezuela Analysis will have the option to appeal the decision.
Days after the purge of Alex Jones from social media, Big Tech seems to have found another suitable target for apparent censorship. Facebook suspended the page of a prominent leftist news site writing about Venezuela.
Venezuelanalysis.com, a left-leaning news site that writes from a pro-Bolivarian revolution stance, has been around since 2003. Critics, including the US government, brand it as a propaganda outlet of the government in Caracas. The site says it is funded by donations and lists as its team Western-born journalists and filmmakers, as well as endorsements from dozens of Western intellectuals, including Noam Chomsky, Tariq Ali and Oliver Stone.
On Thursday, its Facebook page was suspended in what Venezuelanalysis described as a “flagrant act of political censorship.” It suggested that the ban may have been timed to suppress a “brilliant piece” on how the Western media covered the drone assassination attempt on Venezuelan president Nicolas Maduro. The banned site also asked for public support in the face of the suspension.
The tug of war between creative freedom and censorship began years ago. Not just in films, creative freedom is infringed upon in almost all spheres. We have seen authors being attacked for their words and films facing cuts, mutes and bans all the time. Some recent examples include Padmavati, Lipstick Under My Burkha, S Durga and Aabhasam.
Cottrell was convicted last year of “inciting contempt against Muslims,” the BBC reported, which also claimed that he once led an anti-immigration organization. According to the Sydney Morning Herald, Cottrell previously wrote on Facebook that “there should be a picture of [Adolf Hitler] in every classroom and every school, and his book should be issued to every student annually.” iMediaEthics has messaged Cottrell to verify.
The company's apparent retreat on censorship show that it is not immune to the pressures that have long shaped the tech industry.
While Google has drawn opposition for reportedly choosing to once again do business in authoritarian China, there are some people who are enthusiastic about the venture: leaders of the Chinese government.
In an opinion piece and on social media posts on Monday, Chinese state media welcomed Google back to the country, so long as it follows the law, according to the South China Morning Post. The commentary by People’s Daily, the main newspaper of the Chinese Communist Party, follows reports that the search giant is developing a censored version of its app that would earn the blessing of the Chinese government.
Leftists have been particularly crafty about clamping down and chilling conservative thought lately, boldly going where milder-mannered censors have previously feared to tread and managing to make several righteous-sounding cases, at least among their circles of progressive types, for the booting of deemed hate speakers from social media.
But their censorship argument dangles precariously on the meaningless claim that in America there’s no room for hate speech.
In July 2017, the World Socialist Web Site published an exposure of the fact that changes to Google’s search algorithms had massively slashed traffic to left-wing, anti-war and socialist publications. Over the course of dozens of articles, we established that Google, together with the other technology monopolies, was engaged in a campaign of censorship of oppositional viewpoints, in close collaboration with the US intelligence apparatus.
In the ensuing year, every claim made by the WSWS, initially denied by the technology giants, has been established as fact. Google, Facebook and Twitter have all acknowledged that they have promoted “trusted” news outlets, while restricting the distribution of “alternative” sources of information. Facebook CEO Mark Zuckerberg has stated that it is promoting publications like the New York Times and the Wall Street Journal, while demoting and blocking “sites that have intense followings” but are supposedly “not widely trusted beyond their core audiences.”
Research conducted by the National Security Agency has found that after five hours of cyber operations, performance drops and frustration begins to increase among staffers.
Those longer missions caused roughly 10 percent more fatigue and frustration compared to operations that lasted less than five hours, Celeste Paul, a senior researcher at the NSA, said during the Black Hat conference in Las Vegas.
The reason? Extended operations are more tiring and mentally demanding, the research found. Hacking is stressful because it is complex, unpredictable and operates in a high-risk and high-reward environment, Paul said. In addition, NSA cyber operators are highly motivated and “they put success of the mission above all else, even themselves,” Paul said.
Under these regulations Facebook wouldn't have to cut a deal with each bank to provide these services, they could simply build a service that accesses this information via the public API and try to convince customers to opt in.
Newly released official documents obtained by the National Security Archive showing that CIA Director Gina Haspel directly supervised waterboarding at the first CIA “Black Site” simply confirm what Senate Intelligence Committee Chair Richard Burr (R-NC) already knew as he orchestrated the charade that was Haspel’s confirmation hearing. Burr allowed her to “classify” her own direct role in waterboarding and other torture techniques so that it could be kept from the public and secure her confirmation–further proof that this Senate oversight committee has instead become an overlook committee.
That Haspel supervised the torture of Abd al-Rahim al-Nashiri at the first CIA “black site” for interrogation was already clear to those who had followed Haspel’s career, but she was able to do a song and dance when Sen. Sen. Diane Feinstein (D-CA) asked her about it. Haspel declinded to reply on grounds that the information was classified. It was of course because Haspel herself had classified it. All the senators knew that only too well. Sen. Ron Wyden (D-OR) had strongly objected to this bizarre practice only minutes before.
Witnessing this charade from the audience is prompted me to stand up, excuse myself for interrupting, and suggest that the committee members were entitled to an honest answer since this was a public hearing with thousands watching on TV. The American people were also entitled to know whether or not she was directly involved in torture. As I was calmly pointing out that any Senate Intelligence Committee member who prepared for the hearing already knew the answer, I was “escorted out,” man handled and charged with disrupting Congress and resisting arrest.
OFFICIALLY REGISTERED AS business charter jets, two aircraft based at North Carolina’s rural Johnston County Airport—a Gulfstream V and a Boeing 737 with the original tail numbers N379P and N313P—secretly conducted some ghastly “business.”
They were U.S. “torture taxis” in the years after the Sept. 11 terrorist attacks.
Playing a key role in the CIA’s “extraordinary rendition,” detention, and interrogation program, the two aircraft flew at least 34 separate “rendition circuits” that resulted in the kidnapping, imprisonment, and torture of at least 49 individuals, according to the U.K.-based Rendition Project, a coalition of academics, human rights investigators, legal teams, and investigative journalists who waded through reams of data, including falsified and redacted flight plans and other reports, to uncover the truth about the CIA program and its victims.
[...]
The commission against torture is following the lead of previous truth commissions, including its own state’s Greensboro Truth and Reconciliation Commission and another focused on the 1898 Wilmington race riot—both of whose members and staff provided advice. The independent, nongovernmental torture commission held public hearings in November and December to investigate and encourage public debate about the role North Carolina played in facilitating the U.S. torture program between 2001 and 2006.
The most famous kitty in spy history is probably the white Persian of James Bond flicks. The image of a faceless villain stroking the cat in the early 1960s films is now a meme (see: Inspector Gadget, Austin Powers). Lesser known is the cat whom, during the same decade, the CIA attempted to turn into a spy.
“Operation Acoustic Kitty” was a secret plan to turn cats into portable spying devices. However, the CIA only ever produced one Acoustic Kitty because it abandoned the project after a test with this cat went horribly wrong.
The Acoustic Kitty was a sort of feline-android hybrid—a cyborg cat. A surgeon implanted a microphone in its ear and a radio transmitter at the base of its skull. The surgeon also wove an antenna into the cat’s fur, writes science journalist Emily Anthes in Frankenstein’s Cat: Cuddling Up to Biotech’s Brave New Beasts.
Iran has arrested dozens of people, including Instagram models and beauty salon owners, for posting photos online, in the latest crackdown against “immoral” behaviour.
More than 40 people, including at least eight women, have been rounded up in the southern port city of Bandar Abbas, 630 miles south of Tehran, according the official IRNA news agency.
This is not to say there were no criticisms of digital technology a decade ago or that there are no positive voices today. But the balance of opinion has shifted in a short time from a generally rosy outlook to a frequently doom-laden one.
For a year, the FCC has alleged that the site got hit by a cyberattack. Well, a report from the FCC’s own inspector general this week found that there was none.
As FCC chairman since 2017, Pai has kept the standard at 25Mbps/3Mbps despite calls to raise it from Democratic Commissioner Jessica Rosenworcel. This week, he proposed keeping the standard the same for another year.
The Twitter reaction was “lol what,” and even the cryptocurrency press ignored it — but there’s more to this than slapping on a buzzword, and it’s not good. They seem to think they can advance the cause of Digital Rights Management (DRM) for JPEG images — automated copy protection and access control — with a bit of applied blockchain. And that this will make DRM work — rather than be an idea that fundamentally doesn’t work, despite sounding interesting and potentially useful to some people.
The Court ordered a twelve month stay of the injunction granted when it found one of Boston’s patents concerning a transcatheter heart valve (THV) valid and infringed by Edwards’ medical device, in order to allow for the re-training of clinicians to use non-infringing THVs.
Intellectual property might seem esoteric, but it's important to protect it like you would any other asset. To do so, you'll need to understand some basics about intellectual property rights first.
Two of the most common forms of intellectual property protections are the copyright and the trademark. While the two are often confused, they protect very different types of intellectual property. Learning the differences, and how you can use both to protect your own creative output, is essential to securing your assets.
The FCJ confirmed that the cited prior art should, generally, provide concrete suggestions, hints or at least provide other reasons beyond the recognisability of the technical problem to seek the solution to a technical problem in the way as presented in the patent.
A little more than one year ago, the U.S. Supreme Court struck down the Lanham Act’s disparagement clause as unconstitutional in Matal v. Tam, 137 S. Ct. 1744 (June 19, 2017). The case involved Asian-American dance-rock band The Slants, who sought “to ‘reclaim’ and ‘take ownership’ of stereotypes about people of Asian ethnicity.” The U.S. Patent and Trademark Office rejected the band’s application to register its name under Section 2(a) of the Lanham Act, finding that the mark “[c]onsists of . . . matter which may disparage . . . persons, living or dead, institutions, beliefs, or national symbols, or bring them into contempt.” After the case made its way through the court system, the Supreme Court unanimously struck down the disparagement clause as viewpoint discrimination in violation of the First Amendment’s free speech clause. This article explores Tam’s impact over the past year and related developments on the horizon.
A Dutch-based developer and Kodi addon repository administrator has shut down his operation following threats from anti-piracy outfit BREIN. Due to the XvBMC-NL repo offering addons including Covenant and IPTV Bonanza, BREIN accused its operator of facilitating access to infringing content. He is now required to sign an abstention agreement and pay a settlement of 2,500 euros.
Intercept Music’s highly organized tools and artist-focused systems empower musicians to build quality fan bases in a short time, leaving them more time to focus on their art. The cornerstone of Intercept Music is its sophisticated social media scheduling system, which not only integrates posts across multiple social networks, but also offers a balance of content to keep the fan base engaged and growing. The powerful software also enables artists to market music, promote shows and sell merchandise, as well as connect to industry professionals, all at the touch of a button.
We’ve stopped the train – but the job is not finished: Now we must put it on the right track.
Decision Day: September 12th
Founded in 2003 by a group of hackers and activists, The Pirate Bay aimed to bring file-sharing to the masses. In the fifteen years that followed, the site transformed from a small community to Hollywood's resilient arch-rival, serving millions of users. And that's not the only thing that changed.