Hardware support improvements coming for Linux 4.19 aren't limited to the x86 space but a lot of new ARM hardware support is also being introduced in this imminent kernel cycle.
While the Linux 4.19 kernel merge window isn't quite open yet -- it should open tonight, following the release of Linux 4.18 -- the new feature work is already staged. There is the for-next arm-soc.git branch.
The Linux 4.19 kernel updates for the Flash-Friendly File-System (F2FS) should bring much faster performance for multi-threaded sequential reads -- as much as multiple times faster.
Two years ago F2FS dropped its write-pages lock on the basis it could improve multi-threading performance... 4KB writes across 32 threads went up from 25 to 28MB/s on some tests done on the developer's hardware. While it was a minor win for multi-threaded writes, it turns out dropping the write-pages lock took a major toll on the multi-threaded read performance. Now with Linux 4.19, that write-pages lock is being restored.
Back in Linux 4.16 the SoundWire subsystem was added to the staging area as the MIPI standard for a low-power, two-wire sound bus that can support multiple audio streams and primarily utilized by small audio peripherals like IoT and mobile devices. With the next Linux kernel cycle, the SoundWire support is being improved upon.
Two new drivers had blob requests and were cleaned up (psp-dev crypto and icn8505 touchscreen), one was removed (atom isp), plenty needed adjustments.
There are some new firmware loading interfaces starting with firmware_request (rather than request_firmware). The deblob-check script was adjusted to look for uses thereof. firwmare_request_nowarn is one of the new interfaces, and it almost looks like we could use it, since it doesn't log any errors if the firmware is not there, but it still looks for and asks for non-Free Software, so I decided to disable it just like request_firmware.
Hot off the release of the upstream Linux 4.18 kernel, the GNU folks have released GNU Linux-libre 4.18-gnu that is their deblobbed version that strips out any "non-free" device driver support, removes the ability to load binary-only kernel modules and not being able to load firmware blobs either.
With the Linux-libre 4.18 release they had to clean-up some new drivers to fit their strict standards on code freedom, removed one more driver (Atom ISP), and make adjustments to other existing code.
One week late(r) and here we are - 4.18 is out there.
It was a very calm week, and arguably I could just have released on schedule last week, but we did have some minor updates. Mostly networking, but some vfs race fixes (mentioned in the rc8 announment as "pending") and a couple of driver fixes (scsi, networking, i2c). Some other minor random things (arm crypto fix, parisc memory ordering fix). Shortlog appended for the (few) details.
Some of these I was almost ready to just delay to until the next merge window, but they were marked for stable anyway, so it would just have caused more backporting. The vfs fixes are for old races that are really hard to hit (which is obviously why they are old and weren't noticed earlier). Some of them _have_ been seen in real life, some of them probably need explicit help to ever trigger (ie artificial delays just to show that "yes, this can actually happen in theory").
Anyway, with this, the merge window for 4.19 is obviously open, and I'll start pulling tomorrow. I already have a couple of dozen pull requests pending due to the one-week delay of 4.18, but keep them coming.
Linus
Linus has released the 4.18 kernel. "It was a very calm week, and arguably I could just have released on schedule last week, but we did have some minor updates.
Following the one week setback, the Linux 4.18 kernel is now officially available just a little more than two months since the cycle officially began.
Linux 4.18 is now shipping and the latest kernel carrying the continued "Merciless Moray" codename.
Adds more Spectre fixes, better power management and a hint of all-day-battery PCs.
Linux creator and lead developer Linus Torvalds has released a new version of the Linux kernel.
Version 4.18 went through eight release candidates – one more than usual – on its way to release.
The biggest change this time around is the omission of the Lustre filesystem, software popular in the high-performance computing community because it helps storage to scale.
Lustre’s developers emphasized work on the standalone version of the software and it was never fully-integrated with Linux, so this release dumped it.
The IBM System/390 "s390" architecture code has seen a number of improvements for Linux 4.19.
Highlights of the s390 code updates sent in today for the just-opened Linux 4.19 kernel merge window include:
Amazing news out of Variety, the entertainment website, this weekend: Hollywood is going open source. The Academy of Motion Picture Arts and Sciences — best known for ‘The Oscars’ award ceremony — has teamed up with the Linux Foundation to launch the Academy Software Foundation (ASWF).
Just over one month away is XDC2018 as the annual X.Org Developers' Conference where a variety of X.Org, Wayland, Mesa, Vulkan, and OpenGL talks will take place. This year's schedule is particularly packed and full of interesting information.
XDC2018 is being hosted in Spain and running from 26 to 28 September at the University of A Coruña. The proposal for talks at XDC2018 are now over and the proposed sessions can be found on this Wiki page. Below is a look at some of the interesting talks slated for this open-source graphics/driver conference next month.
It's SIGGRAPH week and AMD has used this annual graphics conference to announce the Radeon Pro WX 8200, which they are saying is able to offer the best workstation graphics card performance in the sub-$1,000 USD category.
The Radeon Pro WX 8200 is intended to be used for visualizations, VR, photo-realistic rendering, and other professional graphics workloads. The Pro WX 8200 features a High Bandwidth Cache Controller (HBCC), enhanced pixel engine on, ECC memory, and is built on their Vega GPU architecture. The WX 8200 features 8GB of HBM2 memory and the graphics card is rated for a 230 Watt TDP.
It's a busy week folks as besides the AMD Threadripper 2 performance embargo expiring, it is also SIGGRAPH 2018 week in Vancouver and as well the start of the Linux 4.19 kernel cycle... No longer under wraps are the Khronos announcements from this annual graphics conference. Continue reading to learn about the latest happenings for the various Khronos industry-standard APIs and efforts like Vulkan and OpenCL-Next.
As expected, the CPU temperature monitoring support within the "k10temp" hwmon driver has seen the patches sent in today to be updated for the AMD Threadripper 2900 series CPU support. These patches are going into the Linux 4.19 kernel merge window but slated to be back-ported to the currently supported stable kernel series.
The embargo has expired now for talking about Threadripper 2 performance figures... First up are our initial Threadripper 2950X Linux benchmarks. In this article are the most interesting metrics for this 16-core / 32-thread processor while in the just-published AMD Threadripper 2990WX Linux Benchmarks are a lot more figures complemented by the 2950X and other CPUs plus power consumption numbers, etc. This article is most useful if specifically focused on the performance of the Threadripper 2950X that comes in at $899 USD.
The 32-core / 64-thread AMD Threadripper 2990WX carries a 250 Watt TDP rating, thus the cooling performance is quite important especially if you don't want to hit any thermal throttling with this $1799 USD processor. Fortunately, the 2990WX doesn't require water cooling but actually can work quite well with high-end air heatsinks too. For adding some perspective on the cooling requirements of the Threadripper 2990WX, here are benchmarks of five heatsinks and two all-in-one water cooling systems.
Whether you are compiling a lot of code, rendering models with Blender, or running various scientific workloads with OpenMP or MPI, the AMD Threadripper 2990WX is capable of delivering immersive Linux performance with its 32-cores and 64 total threads. While coming in at $1800 USD, the AMD Threadripper 2990WX can deliver better performance than the more expensive Intel Core i9 7980XE. Beyond being mesmerized about the performance today with this high-end desktop/workstation processor with the many thread-happy Linux workloads we encounter daily, this 32-core Zen+ processor has us even more eager to see AMD's next-generation Zen2-based EPYC CPUs next year.
Brasero is a very simple disk burning GNOME app available for all Linux distributions. However, for sometime it has been removed from the standard Ubuntu OS images. The main reason behind is the low usage of DVD, CD storage mediums in recent times. However, if you still wants to burn some disks, erase or re-write some disks, you can still install Brasero in Ubuntu and other Linux distributions.
VLC is probably the best video player for Linux or any other operating system. I have been using VLC for years and it is still my favorite.
However, lately, I am more inclined towards minimalist applications with a clean UI. This is how came across MPV. I loved it so much that I added it in the list of best Ubuntu applications.
Today, we’ve got a somewhat non-conventional app for you and depending on how ready you are to jump on a new idea, you might just fall in love with it. This new idea is bundled in the form of Colibri, a browser that was not available for Linux until recently.
Colibri is a free, proprietary, secure, speed-efficient, and uncluttered browser designed to be unique and compact. Its major selling point is its tabless browsing interface which works with 3 main tabbed sections instead – Links, Lists, and Feeds.
BitTorrent, the company that created the BitTorrent protocol, designed it with the aim of making it easy to distribute large amounts of data effectively. The peer-to-peer (P2P) technology enables each person downloading the data also to serve that data to others (a process called “seeding”). This drastically reduces the load on a single server and has many uses aside from downloading pirated material.
So really, BitTorrent is merely a protocol—a tool that, in and of itself, is not at all illegal. It’s what you do with it that matters, just like owning a hammer isn’t illegal, but hitting someone over the head with it is. If you’re considering downloading copyrighted content, that’s illegal.
Vocal is a powerful, fast, and intuitive application that helps users find new podcasts, manage their libraries, and enjoy the best that independent audio and video publishing has to offer.
One of my hobbies is to collect information about where curl is used. The following car brands feature devices, infotainment and/or navigation systems that use curl - in one or more of their models.
These are all brands about which I've found information online (for example curl license information), received photos of or otherwise been handed information by what I consider reliable sources (like involved engineers).
Do you have curl in a device installed in another car brand?
Come November 7, cloud storage and synchronization provider Dropbox will drop support for any file system on Linux but ext4.
In fact, Dropbox announced that it will support only four file systems on desktop systems going forward. Company representative Jay revealed as much on the official Dropbox forum.
Slow compilation times are a perennial problem. There have been many attempts at caching and distributing the problem such as distcc and Icecream. The main bottleneck on both of these is that some work must be done on the "user's desktop" machine which is then transferred over the network. Depending on the implementation this may include things such as fully preprocessing the source file and then sending the result over the net (so it can be compiled on the worker machine without needing any system headers).
For those weekend Linux gamers, DXVK 0.65 is available today as the newest feature update to this library for running Direct3D 11 games under Wine via Vulkan.
DXVK [GitHub] continues to astound me in both the speed of development and just how much it can do. This Vulkan-based layer to provide D3D11 in Wine has matured with another new release.
The Wine project once again participated in Google Summer of Code (GSoC) for furthering their open-source agenda of better support for Windows programs on Linux and other operating systems.
The projects achieved this year were for better automated game benchmarks and implementing a subset of the concurrency namespace. (There also was a project originally listed for implementing missing bits of the Direct3D API, but that doesn't seen to have panned out and is no longer listed.)
Sometimes games get practically no attention which is such a shame, Bad Pad [Official Site] is one such game that deserves a little more as it's actually pretty good. It just left Early Access last week too, so if you're in the mood for a musical platformer that has a sprinkle of comedy and gore then it's one for you to take a good look at.
What's interesting about it isn't just that it pulls in elements from games like Super Meat Boy with both the difficulty, movement style and the gory deaths but also the metroidvania-style gameplay and the (pretty good) music that goes along with it to tell the story.
Are you as excited as I am about the news of Sir Patrick Stewart returning as Jean-Luc Picard in a new Star Trek series? Well, now you can nerd out in style with Stage 9 which let's you explore the Enterprise-D from Star Trek The Next Generation.
Sent in by a reader, who also happens to be one of the people working on it, Stage 9 aims to recreate the entirety (inside and out) of the Enterprise-D using Unreal Engine 4. They also gave me a little fun fact, that the Linux version seems to be more popular than the Mac version.
City of the Shroud, a real-time tactical RPG just recently launched on Steam and it turns out it's had a Linux demo build for testing for a long time, with hardly anyone stepping up to check it out.
This post on Steam, open since October 2016 seemed to have no one reply to it until June this year. Now it's actually getting some attention, the developer has actually put up a new build (make sure to use the newer build in that later post). To be clear, you don't need to own it to test it, as it's an external demo download.
Fancy having a team of robots you program with drag and drop AI fight in an arena? As that's exactly what you will be doing in Gladiabots.
It's been available on itch.io for a while, with it just now entering Early Access on Steam. Today, the developer put up a Linux version in an opt-in beta on Steam named "new-platforms". If you do try it, you can let them know how it runs in this post on Steam. The itch version has worked pretty well for me, but as usual your experience may vary.
Getting Over It with Bennett Foddy is a rather popular punishing climbing game, made as a tribute to Jazzuo's 2002 B-Game classic 'Sexy Hiking' and it now has a Linux build.
Originally, you needed to opt into a Beta to access it. Going by the posts in the announcement thread on Steam, it seems you might not need to opt into anything now.
Akademy 2018 got off to a wet start with rains accompanying all attendees pouring into Vienna for KDE's largest annual community conference. Although the Pre-Registration event was held on Day Zero (Friday the 10th) and it was a fun-filled affair, Akademy kicked off in earnest on Saturday, with talks, panels and demonstrations. Read on to find out about Day 1 of Akademy and all that transpired:
Day 2 of Akademy started with a wonderfully insightful keynote by Claudia Garad, the Executive Director of Wikimedia Austria. She focused her talk on some of the challenges that organizations like hers face when trying to bring about more inclusivity and diversity within their communities.
She emphasized the importance of making underrepresented communities feel more welcome and heard within the organization, then went on to speak about how she perceived KDE as being quite ahead of Wikimedia in some aspects, especially when it came to reaching these goals.
[...]
Meanwhile, David Edmundson was not only predicting where KDE's Plasma desktop would be going next, but also numbering the potential pitfalls it would have to avoid on its way getting there. One of the things in store for Plasma users is full browser integration.
Kai Uwe Broulik explained what is working (quite a lot), and how you will be able to control every aspect of your web browser with Plasma's integrated tools. Already working are controls for playback of videos and music on many popular sites using desktop widgets, including the likes of KDE Connect.
Talking of playing music, Camilo Higuita told us about the progress of VVAVE, a next generation audio player that is fully convergent (it integrates both with your Plasma desktop and on your mobile phone), and is but one part of Camilo's idea for an open audio streaming service.
So, my plans was always finish the full KDE1 port, and now on Akademy i have some time to get back to this pet project. Starting on Qt1 porting entirely to CMake because the experience on Qt2 was so good that i decided going back to that and do some of the same love on Qt1.
KDE 1 for that new port next. For now, i’m working on github, so https://github.com/heliocastro/qt1
With KDE Plasma 5 right now it turns out that if you have relied upon CPU-based software rendering, when hitting Plasma's lock-screen it would actually go CPU-wild -- as far as maxing out the CPU to 100% utilization, thereby consuming a lot of power and generating excess heat. That will be fixed for KDE Plasma 5.14.0.
Since May has been a bug report about the KScreenLocker greeter process going to 100% CPU usage and needing to wait 5~10 seconds after entering the user password before the screen would actually unlock. Several others also reported similar issues of this lock-screen managing to consume a lot of the CPU resources, including on ARM boards and older hardware.
As part of Google Summer of Code 2018, I worked on the project Pitivi: UI Polishing. This is my final report to showcase the work that I have done during the program.
If you have been less than satisfied with the user-interface of the Pitivi non-linear open-source video editor for Linux, you may want to try out their next release.
Student developer Harish Fulara spent his summer working on polishing the open-source video editor's interface as part of Google Summer of Code 2018.
There are new iso images of SparkyLinux 5.5 Release Candidate available to download. Sparky 5 follows rolling release model and is based on Debian testing “Buster”.
ISO images of Sparky 5.5 RC provides bug fixing found in the 5.5 dev20180725 release.
SparkyLinux has just released new testing images of its SparkyLinux 5.5-dev20180726, the version based upon the Debian testing of “Buster.” The images released provide users a sneak peak into the updates and changes to expect from the upcoming release of the operating system.
SparkyLinux is the GNU Linux distribution created atop the Debian distribution. It is a quick and lightweight fully customizable operating system created around the Openbox window manager. The operating system comes in different varieties that are specifically designed to cater to the needs of different kinds of users of the product such as developers, entrepreneurs, and students.
Congratulations to security researcher and Gentoo developer Hanno Böck and his co-authors Juraj Somorovsky and Craig Young for winning one of this year’s coveted Pwnie awards!
s last year, there will be a Gentoo booth again at the upcoming FrOSCon “Free and Open Source Conference” in St. Augustin near Bonn! Visitors can meet Gentoo developers to ask any question, get Gentoo swag, and prepare, configure, and compile their own Gentoo buttons.
Chitkara University today announced its new collaboration with Red Hat Academy to offer open source certification programs to engineering students. In association with Red Hat, the world's leading provider of open source, enterprise IT solutions, Chitkara University is gearing up to offer certification programs in Cloud, Linux, Middleware, Storage and Virtualization technologies.
Hello folks. Today I'll highlight some of the features and differences between the two popular Linux distros; Ubuntu 18.04 and Fedora 28. Each has their own package management; Ubuntu uses DEB while Fedora uses RPM, but both of them features the same Desktop Environment (GNOME) and aims to provide quality desktop experience for the Linux users.
Inspired by bex’s “Slice of cake” updates, I present to the community this report of what has happened in Fedora Program Management this week. (Well, last week, since I didn’t publish on time because I was busy with Flock.)
So I'm slowly recovering from my yearly dose of full-on Debian! :-) DebConf is always fun, and this year in Hsinchu was no different. After so many years in the project, and so many DebConfs (13, I think!) it has become unmissable for me. It's more like a family gathering than a work meeting. In amongst the great talks and the fun hacking sessions, I love catching up with people. Whether it's Bdale telling me about his fun on-track exploits or Stuart sharing stories of life in an Australian university, it's awesome to meet up with good friends every year, old and new.
A few things happened to the testing image, thanks to Steve McIntire, myself, and … some debconf18 foo!
I visited the www.elivecd.org, the page that houses Elive. This is one Linux distro that caught my eye in 2009 and that I have been following ever since.
The site is being redecorated and renovated, which is a great change to reflect the polished nature of the distro that Thanatermesis (Samuel Flores Baggen) crafts there.
We are fortunate enough to have a huge choice of single-board computers before us, not just those with a bare-metal microcontroller, but also those capable of running fully-fledged general purpose operating systems such as GNU/Linux. The Raspberry Pi is probably the best known of this latter crop of boards, and it has spawned a host of competitors with similarly fruity names. With an entire cornucopia to choose from, it takes a bit more than evoking a berry to catch our attention. The form factors are becoming established and the usual SoCs are pretty well covered already, show us something we haven’t seen before!
[Marcel Thürmer] may have managed that feat, with his Blueberry Pi. On the face of it this is just Yet Another SBC With A Fruity Pi Name, but what caught our attention is that unlike all the others, this is one you can build yourself if you want. It’s entirely open-source, but it differs from other boards that release their files to the world in that it manages to keep construction within the realm of what is possible on the bench rather than the pick-and-place. He’s done this by choosing an Alwinner V3, an SoC originally produced for the action camera market that is available in a readily-solderable TQFP package. It’s a choice that has allowed him to pull off another constructor-friendly feat: the board is only two layers, so it won’t break the bank to have it made.
A few days ago, I wondered if there are any privacy respecting health monitors and/or fitness trackers available for sale these days. I would like to buy one, but do not want to share my personal data with strangers, nor be forced to have a mobile phone to get data out of the unit. I've received some ideas, and would like to share them with you. One interesting data point was a pointer to a Free Software app for Android named Gadgetbridge. It provide cloudless collection and storing of data from a variety of trackers. Its list of supported devices is a good indicator for units where the protocol is fairly open, as it is obviously being handled by Free Software. Other units are reportedly encrypting the collected information with their own public key, making sure only the vendor cloud service is able to extract data from the unit. The people contacting me about Gadgetbirde said they were using Amazfit Bip and Xiaomi Band 3.
The device is still known as Pepito, but the smartphone seems to be almost ready for commercial debut. However, instead of embracing the modern large-display smartphone phenomenon, the revived Palm will stick to its core principles — smaller and pocketable phones. Therefore, if the leaks are to be believed, then the Palm Pepito will sport a 3.3-inch touchscreen display with 720p picture resolution. It will be powered by Qualcomm’s Snapdragon 435 processor paired with 3GB of RAM and 32GB of internal storage.
Now that Android Pie is live, the first thing that comes to our mind is when my Android device will receive the new update. The exciting new features of Android P and the whole gesture navigation thing is not something anyone would want to miss.
The Mate series have generally been Huawei’s flagship phablet series. The Mate 10 did great with consumers and reviewers alike. Infact Huawei also came out with the Mate 10 lite which had Huawei’s own Kirin 659 chip. The Kirin 659 chip at the time performed somewhat similar to the Snapdragon 625.
“Information wants to be free” goes the slogan of the social movement encouraging open-source software, file sharing and a permissive legal environment for modifying and distributing the creative works in the form of open content or free content by using the internet and other forms of media. The free software and open access movements are among the most important developments after the rise of the world wide web. Swartz was not the only internet activist who believed in the concept of an open and free internet. There were people like Richard Stallman, who gave birth to the term “free software”, free as in freedom, not free as in no cost.
The aura of the information age is not just about new ideas but about a shift in the paradigms of communication and control. In this age of digital feudalism, we do not actually own the products we buy, but we are merely granted limited use of them as long as we continue to pay the rent. The radical expansion of intellectual property (IP) rights threatens to reach the point where they suppress any and all other rights of the individual and society. The current copyright laws have hindered creativity and resulted in a read-only internet culture in which we only consume information/content, despite technology advances that make it easy to create and contribute to culture. Copyright law doesn’t extend neatly to the digital world and the digital rights management tools the industry is endeavouring to develop to maintain copyright control are dampening the growth of a rich read-or-write culture.
We need to bring that open-source mentality to the content layer. Two-thirds of all websites run on open-source software, but most of the premium academic resources remain closed behind digital gates. The Directory of Open Access Journals reports that nearly 4,000 publications are available to the masses via the internet, a number that grows rapidly each year. It is essential to liberate data, liberate knowledge — especially data that taxpayers have already paid for.
Thanks to the Free Culture movement, vast knowledge repositories like Wikipedia and Stack Exchange and open access efforts like the science article sharing site arXiv.org have flourished as they permit content to be re-used for free and built upon, and many major websites offer Creative Commons (CC) licensing as part of their user interfaces (UI). In 2012, Google launched a worldwide campaign named Take Action for building a free and open world wide web. Here is the kernel of Google’s argument: “A free and open world depends on a free and open internet. Governments alone, working behind closed doors, should not direct its future. The billions of people around the globe who use the internet should have a voice”.
Tesla has also directly communicated with hackers to improve its vehicles’ software. Back in 2016, Keen Security Lab, a white hat hacker group based in China, was able to remotely hack a Model S through a compromised WiFi hotspot, conducting one of the first known instances of a Tesla being hacked. Keen Security Lab contacted Tesla after they successfully compromised the electric car, and Tesla promptly pushed an update to address the vulnerability.
Believing he has the best solution, Elon Musk plans to make Tesla’s vehicle security software open source so other automakers can adopt the technology for "a safe self-driving future for all." On top of "specialized encryption" for "multiple sub-systems," future Tesla vehicles will ensure drivers always have "override authority" in the event their cars become "wacky."
One of the biggest advantages of open sourcing your software is allowing the independent security researchers to access the code and spot the vulnerabilities that might go unnoticed during the internal auditing.
According to the Electrek, with the rise of autonomous driving and car networking technology, the risk of malicious attacks on cars increased. Tesla CEO Elon Musk believes that the company’s car safety software is the best solution, and he plans to open source car safety software to other automakers for a safer autopilot future.
Musk has publicly expressed concern about hackers attacking car systems. He said that fully blocking ” hacking” is Tesla’s primary security task.
In the past Musk has stated that preventing a fleet-wide hack is Tesla’s top security priority “I think one of the biggest concerns for autonomous vehicles is somebody achieving a fleet-wide hack,” on which he elaborated by saying “in principle, if someone was able to say, hack all the autonomous Teslas, they could – just as a prank – say ‘send them all to Rhode Island’ from across the United States… and that would be the end of Tesla and there would be a lot of angry people in Rhode Island!”
Tesla CEO Elon Musk has voiced his intention to release the source code for Tesla’s car security software in an effort to improve the security of future self-driving cars.
Siddarth Sthalekar explains how Sacred Capital is using blockchain build a system of reputational wealth.
Open source log file analytics specialist InfluxData is insistent that we should take a ‘metrics first’ approach to log analysis.
The company says believes in a metrics first approach that provides developers with the means to ingest, correlate and visualise all time series data at three levels:
TenFourFox Feature Parity Release 9 beta 2 is now available (downloads, hashes, release notes). This version tightens up the geometry on the date/time pickers a little, adds some more hosts to basic adblock, fixes a rare but easily wallpapered crash bug and further tunes up hash tables using a small patch from Firefox 63 (!). I am looking at a new JavaScript issue which does not appear to be a regression, but I'd like to fix it anyway since it may affect other sites. However, I'm not sure if this is going to make FPR9 final, which is still scheduled on or about September 4 due to the American Labor Day holiday on the usual Monday.
The latest LibreOffice 6.1 has been released at 8 August 2018 with a bunch of improvements and you can install it on any GNU/Linux distro if you download the AppImage version. As you may know, application in AppImage format is "portable", you do not need to install anything in your OS except give it permission and double-click it! Here's how to download and run it regardless your GNU/Linux distro. Enjoy!
One of the most recent additions to the DistroWatch database is NomadBSD. According to the NomadBSD website: "NomadBSD is a 64-bit live system for USB flash drives, based on FreeBSD. Together with automatic hardware detection and setup, it is configured to be used as a desktop system that works out of the box, but can also be used for data recovery."
The latest release of NomadBSD (or simply "Nomad", as I will refer to the project in this review) is version 1.1. It is based on FreeBSD 11.2 and is offered in two builds, one for generic personal computers and one for Macbooks. The release announcement mentions version 1.1 offers improved video driver support for Intel and AMD cards. The operating system ships with Octopkg for graphical package management and the system should automatically detect, and work with, VirtualBox environments.
Nomad 1.1 is available as a 2GB download, which we then decompress to produce a 4GB file which can be written to a USB thumb drive. There is no optical media build of Nomad as it is designed to be run entirely from the USB drive, and write data persistently to the drive, rather than simply being installed from the USB media.
libtls is shipped as part of libressl with OpenBSD. It is designed to be simpler to use than other C based tls interfaces (especially native OpenSSL) to do "normal" things with TLS in programs.
Who doesn’t like to fine-tuning their images and the perfect way for a lot of users is to opt for popular image editing tools. While the count of these offerings is continuing excessively, we are here to talk specifically about GIMP or (the GNU Image Manipulation Program). The free alternative to Adobe Photoshop is no less than its counterparts owing to the set of features it offers to the users.
The professional is there for the users for adding the perfect shades of color, texture, and highlights in the image. It is a tool that you can use for developing your photos from the scratch. Use the tool for professional quality effect and you will have a whole new set of images to flaunt before others.
Musicians searching for a compact music production box may be interested in a Raspberry Pi based open source device called the OTTO which has this week been featured on the Hackaday website. The portable synthesiser workstation created by Topisani started as a clone of the well-known Teenage Engineering OP-1. However over time Topisani has pushed the music box in a new direction and is currently designing a new user interface while still maintaining the small form factor inspiration of the OP-1.
Protocolbuffer Binary Format(.pbf) and Mapbox Vector Tiles(.mvt) are two popular formats for sharing map data. Prior to this GSoC project, the iD editor in OSM supported GPX data. GPX is an XML schema designed as a common GPS data format for software applications. It can be used to describe waypoints, tracks, and routes.
Shan He may hold Silicon Valley's most meta job.
"When I started out, I was building maps. Then I moved on to build tools to build maps, and now I'm doing tools to do tools that build maps."
He, who dumped brick-and-mortar architecture studies for computational design, joined Uber as founding member of the data visualization team in 2014. She went on to construct Kepler.gl, a tool that helps make "beautiful maps in like 10 seconds"—without any coding. Built using the deck.gl WebGL data visualization framework, the ride-sharing company recently open sourced the geospatial toolbox that can be used with QGIS, Carto, and Mapbox Studio. Given its origins, it's easy to see why Kepler excels at large-scale visualizations centering on geolocations.
Just like a painter or author, programmers tend to have their unique style in which they code. As they line up thousands of lines of code, they leave behind a sort of personal “signature” in it.
Adshir is announcing that it can demonstrate the holy grail of computer graphics: real-time ray tracing on mobile devices. That means that it can show physically accurate computer animations in real time on mobile devices, such as tablets and smartphones.
Ray tracing has been possible in high-end computer-animated movies, such as Pixar films, but those films sometime require months of computer processing in high-performance data centers before the animations can be properly rendered. Doing this kind of task in real time requires much more processing, and Adshir’s announcement bodes well for real-time applications, such as realistic games and other interactive apps.
Speaking at DEFCON 26 in Las Vegas on the subject of “Securing our Nation's Election Infrastructure”, Jeanette Manfra, assistant secretary, Office of Cybersecurity and Communications from the Department of Homeland Security stressed the need for public and private sector collaboration.
She said that “instead of thinking of individual risk and your own part, try to think about enterprise and government as a whole.”
In terms of critical infrastructure, Manfra said that this is “purely voluntary in the private sector” and includes “everyone working for yourself or your company, and this includes academic institutions and the broader private and public partnership to work together to figure our critical infrastructure.”
She went on to talk about the concept of collective defense, saying that government is “one player in the community,” and with companies and citizens on the front line with government sectors “we have to share information and be transparent and build trust with individuals and entities that we have not done before.”
We've only seen the beginning of what artificial intelligence can do for information security.
Alan Turing is famous for several reasons, one of which is that he cracked the Nazis' seemingly unbreakable Enigma machine code during World War II. Later in life, Turing also devised what would become known as the Turing test for determining whether a computer was "intelligent" — what we would now call artificial intelligence (AI). Turing believed that if a person couldn't tell the difference between a computer and a human in a conversation, then that computer was displaying AI.
AI and information security have been intertwined practically since the birth of the modern computer in the mid-20th century. For today's enterprises, the relationship can generally be broken down into three categories: incident detection, incident response, and situational awareness — i.e., helping a business understand its vulnerabilities before an incident occurs. IT infrastructure has grown so complex since Turing's era that it can be months before personnel notice an intrusion.
Researchers at cyber security outfit Project Insecurity discovered dozens of security bugs in the OpenEMR system, which is described as the “most popular open source electronic health records and medical practice management solution”.
Many of the flaws were classified as being of high severity, leaving patient records and other sensitive information within easy reach of would-be hackers.
One critical flaw meant that an unauthenticated user was able to bypass the patient portal login simply by navigating to the registration page and modifying the URL, Project Insecurity reported in its findings.
Defcon 2018, one of the most popular hacking conferences, is going on in Las Vegas. The conference, every year, sees famous hackers from around the world exhibiting their skills.
This year, an 11-year-old shook the whole United States after he hacked and altered election results on a replica of Florida state election website within just 10 minutes.
As DEFCON 26 attendees begin to gather in Las Vegas this week, the National Association of Secretaries of State (NASS) would like to address the Voting Machine Hacking Village events. While we applaud the goal of DEFCON attendees to find and report vulnerabilities in election systems it is important to point out states have been hard at work with their own information technology teams, the Department of Homeland Security (DHS), the Elections Infrastructure Information Sharing and Analysis Center (EI-ISAC), the private sector, the National Guard and universities to enhance and reinforce their cyber postures with penetration testing, risk and vulnerability assessments and many other tools.
The popup that asks user’s permission to grant or deny the access appears despite getting the approval from synthetic clicks. If this happens, the user will get alert automatically. To this, Wardle says that the malware could wait for the inactivity when the user is not sitting in front of the system to notice the permission granted from synthetic clicks. It is also possible that malware could lower the brightness of the screen during that moment to make it almost unnoticeable for the users.
In the 2018 Stack Overflow Developers’ Survey they asked whether developers felt ultimately responsible for unethical usage of their own code. 80% said no. They presumably left it in the hands of boards, shareholders and Product Owners.
Terrorist attempt, paparazzi, intrusive droner, or unaware tourist? Whoever conducted a drone flight near the summer residence of French President Macron lost their drone, as the secret service managed to jam the aircraft before it crashed into the sea.
The Agence France-Presse reported on August 6 that an unknown type of drone flew over the Fort de Brégançon, the official summer retreat of French presidents since the 60s, located on the French Riviera, 20 miles west of Saint-Tropez. President Emmanuel Macron and his wife are currently on vacation in the Fort, but the presence of the president at the time of the incident has not been confirmed. The area is officially marked as a no-fly zone by the French authority (zone R60 and R64A1), but surprisingly, a quick look at the no-fly zone map of DJI reveals that the area is not restricted by geofencing (the model of drone is still unknown at this point). Ironically, the no-fly zones were first introduced by DJI in 2015 after an inebriated intelligence employee crashed his DJI Phantom on the lawn of the White House.
On the bad days, I think my job must be one of the hardest in the world. My country, Yemen, is in the midst of civil war. My government is fighting two extremist groups: al-Qaida and the Houthis. As the minister of human rights, it is my responsibility to ensure that the fundamental rights of Yemenis, spelled out in our constitution, are protected.
The Montenegrin authorities issued an international warrant for the arrest of former CIA agent Joseph Assad. Reported by the Associated Press.
He is suspected of involvement in the attempted coup in Montenegro during the elections of 16 October 2016.
Montenegro on Thursday issued an international arrest warrant for a former CIA agent for alleged involvement in what the government said was a failed pro-Russia coup designed to prevent the Balkan country's NATO membership.
With the proliferation of consumer-grade drones in recent years, there have been a number of influential voices within the security industry who have expressed concern over the potential threats posed by unmanned aerial vehicles (UAVs) in the wrong hands. From close encounters with jetliners to their use as weapons on the battlefields of the Middle East, the destructive capabilities of drones have already been well-demonstrated in real-world scenarios.
If these malicious use cases weren’t bad enough, security practitioners can now count drones as tools that can be leveraged for targeted assassination attempts after a group of conspirators attempted to kill Nicolas Maduro, the much-maligned president of Venezuela, using UAVs outfitted with plastic explosives on Sunday. According to reports, security officials were able to bring the drones down using radio signal jamming technology. Although no one was killed in the incident, seven soldiers were wounded, including three who were seriously injured.
According to a confidential Israeli military police report obtained by The Intercept, four cousins were killed in two separate drone strikes after they were mistaken for Hamas fighters
A security officer was killed in an exchange of fire with terrorists in the Jordan’s capital Amman, government officials said late on Saturday.
Minister of State for Media Affairs Jumana Ghunaimat said the terrorists hiding in a building in Al Salt city opened fire on security forces who were chasing them.
The air attack, according to the statement, was conducted on a tip off early Sunday, killing the commander and injuring three of his guards.
Russia's military said it had shot down a drone that came close to its Syrian air base at Hmeimim on Saturday and was launched from the Idlib "de-escalation" zone controlled by what Moscow calls "illegal military groups", TASS agency reported.
The drone caused no casualties or damage, and the Hmeimim air base is operating as normal, the agency said.
On Sunday, Syrian opposition activists say an explosion in the country’s north has killed at least 18 people and wounded many others. The cause of the blast wasn’t immediately known.
Prosecutors in Montenegro have called for the arrest of a former CIA officer, accusing him of involvement in an alleged Russian-backed coup attempt in 2016.
The former CIA operative, Joseph Assad, has rejected the charges, saying he had been in Montenegro to provide personal security advice to a western political consultant, and calling on the US to reject any extradition request.
“This is a deception campaign against a loyal American who had no role in any crimes or coup in Montenegro,” Assad said in a statement issued on Saturday through his lawyer.
The accusation against Assad is the latest twist in a convoluted year-long trial in the Montenegrin capital, Podgorica, of 14 suspected coup plotters, including two Russians, nine Serbs and three Montenegrins accused of a conspiracy to bring down the country’s pro-Nato government and assassinate its then prime minister Milo ÃÂjukanović.
Former operative Joseph Assad was a security adviser to Aron Shaviv, an Israeli-British consultant who was assisting a pro-Kremlin party in country's 2016 elections
In a bizarre twist concerning a convoluted year-long trial into an alleged 2016 Montenegrin coup plot, which Podgorica claims involved "Russian state agencies," Montenegrin prosecutors have called for the arrest of a former CIA officer they say was involved.
[...]
According to the former agent, the only "conspiracy" in the coup plot case was one by authorities against the Democratic Front, a Montenegrin opposition alliance, which Podgorica has accused of involvement in the alleged coup plot.
In a statement, Assad implied that the coup plot case had been turned into a political circus, pointing to the prosecution's destruction of evidence, and other issues, such as the release of an individual earlier claimed to be the plot's leader.
The DNC filed a motion last month in federal court in Manhattan asking for permission to serve the lawsuit to WikiLeaks on the social media platform, which the DNC argued the group remains active, CBS reported at the time. The judge approved of the method.
A Twitter account associated with the law firm Cohen Milstein Sellers & Toll was established Friday. The account wrote to WikiLeaks that it was being served with several legal documents.
A spokesman for the law firm directed the Washington Examiner to a spokeswoman for the DNC, who confirmed the account was associated with the law firm.
The Democratic National Committee (DNC) has officially served its lawsuit to WikiLeaks through the unconventional means of Twitter.
The suit, which alleges that the Russian government, the Trump campaign, and WikiLeaks conspired to influence the 2016 presidential election in favour of Donald Trump was filed last April. However, due to the group’s elusive nature, lawyers were unable to officially serve the whistleblowing organization.
[...]
Earlier this week, its founder Julian Assange was called to testify before the US Senate Intelligence Committee - an offer that WikiLeaks say is being considered.The letter was delivered to the Ecuadorian Embassy in London, where Assange has been living since he was granted asylum six years ago.
The US government must guarantee Julian Assange's security if he agrees to give a testimony in the case of alleged Russian meddling in the US elections. This according to the WikiLeaks founder's lawyer Jennifer Robinson. Ms Robinson said that the request by the US Senate Select Committee indicates US interest in Mr Assange's testimony. Earlier, the US Senate Intelligence Committee requested the whistleblower to testify on the purported Russian meddling. Radio Sputnik discussed the ultimate motive behind the request by the US Senate Intelligence Committee for Julian Assange to testify in its probe into Russia’s alleged 2016 election tampering with journalist and documentary filmmaker John Pilger.
It was signed by Chairman Richard Burr (R) and Vice Chairman Mark Warner (D).
WikiLeaks’ tweet says the letter was “delivered via the U.S. Embassy in London,” addressed to Assange at the Ecuador Embassy in London.
Special counsel Robert Mueller has subpoenaed an associate of Wikileaks founder Julian Assange and longtime Republican operative Roger Stone to appear before a grand jury next month.
In a very unusual move, WikiLeaks has been subpoenaed via Twitter. In a tweet on Friday, a law firm representing the Democratic National Convention in its civil lawsuit against WikiLeaks and other defendants served legal documents formally notifying the non-profit that it is being sued. The lawsuit also names a long list of other people and organizations, including the Russian government and Donald Trump’s presidential campaign, that the DNC claims worked together to sway the 2016 election in Trump’s favor.
A botched power play by Julian Assange has led to a split within a key organization supporting whistleblowers and leaves the WikiLeaks founder more isolated than ever among his core constituency of radical transparency activists.
Assange has grown furious at a one-time ally with substantial moral authority within their movement: the journalist and activist Barrett Brown.
August 16 will mark six years to the day since WikiLeaks editor Julian Assange was granted political asylum by the Ecuadorian government, after seeking refuge in Ecuador’s London Embassy on June 19, 2012.
In recent months, Ecuadorian President Lenín Moreno, who is seeking closer relations with Washington and US investment, has stepped up moves to remove Assange from Ecuador’s Embassy in London. In a tweet and television interview August 6, Moreno declared he will “take measures” against Assange unless he stops “intervening” in the politics and affairs of countries.
[...]
“The world is not a safe place. They want to cover up the violations of human rights by the United States that Julian Assange has exposed. The UK is killing democracy and consequently has no right to lecture the developing countries on these issues. They have an 18th century mentality.
“We live in a digital age where information can be exchanged freely. That is what democracy is meant to be about.
“The UK is following Trump on everything. This is bad. He denies global warming and argues for trade war. There is the danger we will be dragged into further wars.
“Under Obama the wars continued. His drone killings claimed the lives of hundreds of innocent civilians. The US is backing Saudi Arabia in its war against Yemen. The Saudi rulers are worse than Saddam Hussein. This whole mess has got to stop.”
Stephen, a self-employed gardener, was critical of the silence of Jeremy Corbyn and the officially designated left.
While working in tropical crop research in east Africa in the late 1960s I got interested in issues of resource conflict over food, energy, and strategic commodities. It was a bit of a change from my own science background in plant pathology, and one result was that I hoped in the future to work more in the field of environmental security.
Back in the UK in 1971, I was lucky to do this by getting a post at one of those newly designated and expanded urban technology colleges, the polytechnics. This was a period of relatively well-funded educational initiatives, included the pioneering Open University, that owed a lot to the Labour government of 1964-70.
[....]
By the end of the decade, climate change was entering the political agenda, at least in a small way, as new climate models were beginning to confirm early fears. The idea of global impacts was supported in 1983 by confirmation of the specific problem of CFC damage to the ozone layer. Since that threat was so substantial and immediate, and because CFCs could be replaced quite easily, the “ozone-hole” issue resulted in rapid action in the form of the Montreal protocol of 1987. That said, three decades on the problem is only just receding in severity.
Rep. Keith Ellison (D-Minn.) on Sunday denied allegations that he had abused an ex-girlfriend — allegations which surfaced after the woman’s son posted about the alleged incident on Facebook.
Our politics continue to go in full cycles, but our dreams are stalled. It is either we are cursed or we are just stupid.
A fellow named Duncan Campbell, who many years ago reported on UK officialdom, clearly has had too much free time lately. He has concluded that VIPS is working for the Russians — perhaps as useful idiots...
Supreme Court nominee Brett Kavanaugh accrued as much as $200,000 in debt buying tickets to Washington Nationals baseball games.
White House spokesman Raj Shah told The Washington Post that Kavanaugh would go to games with a “handful” of friends. These friends then reimbursed him for the tickets, the White House says, and the debts have been paid off.
But the White House and Kavanaugh are not answering questions about what happened. Who did Kavanaugh buy tickets for? How did they reimburse him? Was this properly disclosed? And how was all of this treated for tax purposes?
Kavanaugh is up for one of the most powerful positions in the land. A lifelong position.
We think it’s important to figure out as much as we can about a nominee’s background before he is confirmed. So we’re turning to you.
Manigault Newman unveiled the 20-second audio clip on Sunday, depicting Kelly firing her inside the Situation Room — the highly sensitive space where phones and electronic devices are prohibited for security reasons.
Ned Price, a former Obama special assistant and CIA official, tweeted that it wouldn’t be that difficult to sneak a phone into the office because the system is “built on trust."
“Those are supposed to be the finest public servants we have,” Price tweeted. “The WH wasn’t signed for the Omarosas of the world. Sad we now have to accommodate them.”
Image Comics has announced a variant cover program in September to benefit the Comic Book Legal Defense Fund. All proceeds from the variant cover campaign will help support CBLDF's legal work on behalf of comics creators, retailers, educators and readers. Each title will have two variant covers, one censored and one uncensored.
Spearheaded by HACK/SLASH creator Tim Seeley and Image Comics' Publisher Eric Stephenson, this benefit includes contributions from Skottie Young, Mirka Andolfo, Howard Chaykin, Justin Greenwood, Geoffo, Ryan Browne, Wook-Jin Clarke, David Rubín, Martin Morazzo, Mark Torres, Danny Luckert, and Seeley himself.
Image Comics has announced a limited run of variant covers in support of free-speech advocacy group The Comic Book Legal Defense Fund (CBLDF).
Tim Seeley, the man behind HACK/SLASH, and Image publisher Eric Stephenson have joined forces and rounded up a selection of both censored and uncensored covers for titles including The Last Siege, Bully Wars, Curse Words, Unnatural and many more.
A browser extension that acted as an anti-censorship tool for 185,000 people has been kicked out of the Chrome store by Google. The open source Ahoy! tool facilitated access to more than 1,700 blocked sites but is now under threat. Despite several requests, Google has provided no reason for its decision.
I was asked a week ago a question to the tune of, "How do you think we can help our children and the next generation to understand the dignity of the human person, to reverse the trends of popular culture?"
I think it begins with the media because there is not a bigger influence in the modern day than the media.
When it comes to private censorship, of course, that isn’t the case. Policies are created by executives, sometimes with additional consultations with external experts, but are nonetheless top-down and authoritarian in nature. And so, when Twitter makes a decision about what constitutes ‘healthy public conversation’ or a ‘bad-faith actor,’ we should question those definitions and how those decisions are made, even when we agree with them.
Sometime between March and June, Medium, a publishing platform ubiquitous in the blockchain sphere, updated a page called "Cryptocurrencies on Medium." (ETHNews reached out to Medium for this article but did not receive a reply.)
In the post, the publisher sets out rules "for companies announcing ICOs, coins or tokens." A quick reading of the guidelines suggests that Medium wanted to curtail fraud. Article posters, for instance, were told they must verify their email address and provide contact information on their website.
Not for the first time, Alex Jones finds himself at the center of a controversy over internet censorship. The radio show host and conspiracy theorist has alleged the US Government orchestrates school shootings and ‘white genocide’; that Michelle Obama is a man; and that the Pentagon is secretly pumping chemicals into the water to turn the population gay.
But this week, Facebook, iTunes, Spotify, and YouTube said they had had enough. Jones has been banned from their platforms for infringing policies on hate speech. Resisting calls to follow suit, Twitter refused to block Jones, citing a commitment to a “healthy conversational environment”.
The Chinese government has repeatedly resorted to using nationalism whenever it felt threatened or weak over the last few decades. They also exploited nationalism to gain domestic support for prominent foreign policy directions, especially when it came to Japan, Taiwan and the United States.
However, in recent years, nationalism is being cultivated in order to gain support for domestic policies. In a post-ideological political environment, the Chinese Communist Party (CCP) has had to resort to nationalism in order to rally the masses in support of its policies.
In his post-victory speech, Imran Khan expressed his admiration for China, and said he would send a team there to learn from our neighbour’s experience.
Since he has also announced an austerity policy, I thought I’d save the next government a lot of time and money by letting Khan know how China got to where it is. The first thing to remember is that the country is a one-party dictatorship that appears to brook no opposition.
In fact, I’m sure President Xi Jinping was probably mystified when he had to postpone his visit to Islamabad in 2014 because Imran Khan and Tahirul Qadri had locked down the capital in a months-long sit-in. In China, anybody attempting something similar would be thrown into jail before he could say “Naya Pakistan!”
The founder of an online Christian ministry says Facebook is censoring his live videos for being critical of same-sex marriage, but the social media giant says it doesn't know why his videos are expiring.
Pastor Rich Penkoski, who runs the Facebook page "Warriors for Christ" and has made enemies in the LGBT community for voicing his strong opposition to the LGBT agenda, has voiced his concerns with Facebook officials about the consistent removal of his live videos.
A Nigerian radio station has been fined for broadcasting "vulgar lyrics" in Nigerian rapper Falz 'This is Nigeria' viral hit song. The song has "indecent and vulgar" lyrics, Nigeria's National Broadcasting Commission (NBC) said in a letter to the radio station. Falz 'This is Nigeria' hit song has more than 12 million views on Youtube and has been hailed for its searing political commentary on Nigeria's challenges.
Disney’s Christopher Robin could be the latest victim of China’s ongoing battle with Winnie the Pooh, the portly, honey-loving bear created by Aââ¬â°A Milne. The film has been denied a release in Chinese cinemas, with censors in the country giving no official reason for the decision.
China does operate a strict quota on how many foreign films are allowed to be released in cinemas each year, which could explain the film’s absence, but equally, the film could have fallen victim to an ongoing campaign to keep the bubbly yellow bear out of the media ever since memes began to surface comparing Milne’s loveable ursine buddy to Chinese President Xi Jinping.
In 2015, political analyst Global Risk Insights declared a photo of President Xi in a motorcade, with Winnie in a toy car riding alongside, as €“China’s most censored photo”, and €China’s opposition has since taken to comparing the two figures with some gusto, resulting in a de facto ban from Chinese state media on images of the bear, including on China’s equivalent of Twitter, Weibo.
Alex Jones has drawn millions of people to his Infowars brand by promoting conspiracy theories and noxious bigotry; he monetizes his following by selling survivalist gear and dietary supplements such as the testosterone booster Alpha Power. (“Infowarriors and Patriots of the world know that it takes real vitality to push back in the fight against the globalist agenda.”) Like President Trump, Infowars has updated for the digital era the timeworn populist tactic of manufacturing controversy to attain influence. Last week, after Apple, Facebook, and Google removed some of Infowars’ content from their platforms, Jones attracted even more attention; he described himself as the victim of “a war on free speech.” He urged his fans to back him by buying more of his stuff. (Downloads of the Infowars app soared.)
In the run up to the midterm elections, Senator Chris Murphy, ironically in a tweet, demanded social media censor more aggressively for the “survival of our democracy,” implying those companies can act as proxies for those still held back by the First Amendment. We already know the companies involved can censor. The debate is over what happens when they do.
Twitter said Friday that the accounts belonging to far-right conspiracy theorist Alex Jones and his fringe media organization InfoWars would, for now, remain online, one day after a CNN investigation found that Jones' Twitter accounts appeared to have repeatedly violated the company's rules.
A Twitter spokesperson said that the company concluded that of the more than a dozen tweets included in CNN's Thursday report, seven were found to have violated Twitter's rules. Twitter would have required those tweets to be deleted, if they were to have remained up.
But after CNN's investigation was published, the tweets cited in it were almost immediately deleted from the social media website. Jones said on his program Friday that he had instructed his staff to do so and "take the super high road," though he contested whether the tweets violated any Twitter rules.
Alex Jones is a fool. He has always been a fool. That is no reason whatsoever to censor him. There are a lot of fools around, after all. The people who defend censoring ideas are also fools (that goes for government censorship and corporate censorship). All of them. From Marxist dictators right down to the rich Hollywood elites who like to wine and dine Marxist dictators.
True democratic choice depends upon the free flow of information and ideas. Censorship is always and everywhere an attack on both human dignity and democracy itself. How then could silencing dissidents be defending democracy, as many mainstream media talking heads claim?
The recent exposure of the TSA's "Quiet Skies" program by the Boston Globe is leading to more terrorist watchlist litigation. The "Quiet Skies" program sends air marshals all over the US to watch travelers swallow, shop, use the restroom, and stare at things. It's suspicionless surveillance even the air marshals disagree with, with some quoted by the Globe calling the program a worthless waste of tax dollars, if not just a vehicle for repeated Constitutional violations.
The Council of American-Islamic Relations (CAIR) is using this information in two of its lawsuits against the government. Its lawsuit against the Terrorist Screening Center -- which originated in 2016 -- will hopefully be aided by the Globe's reporting. A motion to compel discovery [PDF] seeks details on the program for use in this litigation. The filing notes the government continues to hide information about its many watchlists from the plaintiffs it represents, forcing it to rely on leaked documents to obtain information it has already requested from the government.
Reality Winner, who pleaded guilty in June to leaking top-secret government documents about Russian meddling in the 2016 election, is scheduled to be sentenced in a federal court in Augusta on Aug. 23.
The first leaker to be prosecuted by the Trump administration, the former National Security Agency contractor’s plea agreement with prosecutors calls for her to serve five years and three months behind bars plus three years of supervised release.
The problem confronting Mr. Frankle, as well as thousands of travelers, is that few companies participating in the program, called the Traveler Verification Service, give explicit guarantees that passengers’ facial recognition data will be protected.
And even though the program is run by the Department of Homeland Security, federal officials say they have placed no limits on how participating companies — mostly airlines but also cruise lines — can use that data or store it, opening up travelers’ most personal information to potential misuse and abuse such as being sold or used to track passengers’ whereabouts.
Also, while we often think of “sharing” in the context of social media and the Internet, it can also be helpful to consider more analog applications, like updating relatives in phone calls or sharing pictures and home movies when they come to visit. Thinking about analog sharing can be an important exercise in itself – in an earlier series of blog posts, PIA’s former Head of Privacy, Rick Falkvinge discussed how in the transition from analog to digital, our children are losing some fundamental rights when it comes to privacy.
Regardless of how much or how little your child engages with the Internet, there are some steps that you can take to help your child understand their privacy rights and feel agency in how they present themselves to the world. Below, we’ve included some suggestions for helping your child analyze and think critically about how and what they share with others.
The extreme torture of a suspected al-Qaeda terrorist, including waterboarding, forced nudity and a “walling technique,” have been detailed in newly declassified cables sent by a current CIA director Gina Haspel.
The cables, sent by Haspel to agency headquarters in late 2002, reveal the torture of suspect Abd al-Rahim al-Nashiri at the secret US detention facility in Thailand. The CIA believed the Saudi Arabian suspect was involved in the planning of the USS Cole bombing in Yemen in 2000 and believed he knew about other planned attacks.
The cables, most of which were either written or authorised by Haspel, reveal Nashiri’s weeks-long interrogation included waterboarding, forced nudity, shackling, being slammed against walls, confined in a small box and enduring mock executions.
In late November 2002, C.I.A. interrogators at a secret prison in Thailand warned a Qaeda suspect that he had to “suffer the consequences of his deception.”
As interrogators splashed water on the chest of the man, Abd al-Rahim al-Nashiri, he pleaded that he was trying to recall more information, according to a newly released C.I.A. cable. As he cried, the cable reports, the “water treatment was applied.”
The “water treatment” was bureaucratic jargon for waterboarding, and 11 newly released top-secret cables from the time that Gina Haspel, now the C.I.A. director, oversaw the base provide at times graphic detail on the techniques the agency used to brutally interrogate Qaeda captives. Agency leaders and officers were racing to uncover what they feared were large-scale plots against the United States in the chaotic months and years after the Sept. 11 attacks.
Newly declassified documents released Friday graphically describe how an accused Al Qaeda operative was stripped naked, repeatedly slammed against walls, waterboarded and confined in boxes for hours at a covert detention site that CIA Director Gina Haspel briefly oversaw after 9/11.
The harsh treatment of Abd al-Rahim al-Nashiri at the secret lockup in Thailand has been revealed before, and came under the spotlight during Haspel's contentious Senate confirmation this spring.
There's several reasons that the hype surrounding Google Fiber has stalled; most notably Alphabet executives growing weary of the slow pace and high costs of traditional fiber deployments (something they should have understood going in). But another major obstacle for Google Fiber was the boring old utility pole. Google Fiber attempted expansion in numerous cities like Nashville and Louisville, but ran face first into an antiquated utility pole attachment process that traditionally favored incumbent operators, and lawyers for AT&T and Comcast, who were eager to sue to keep their dominance intact.
As it stands, when a new competitor tries to enter a market, it needs to contact each individual ISP to have them move their own utility pole gear. This convoluted and bureaucratic process can take months, and incumbent ISPs (which often own the poles in question) have a long and proud history of then slowing things down even further by intentionally dragging their feet. After all, the very last thing purportedly "free market" adoring entities like AT&T and Comcast want to deal with is honest to goodness competition.
To help fix this problem, Google Fiber and several other companies proposed new "one touch make ready" rules that would dramatically streamline the pole attachment process. Under this proposal, just one licensed and insured contractor would be allowed to move any company's gear, provided they give advanced notice. When several cities tried to pass such rules regionally, they found themselves on the receiving end of lawsuits by AT&T and Comcast.
South Korea’s Electronics and Telecommunications Research Institute (ETRI) looks to have gotten a pair of monetisation efforts off the ground over the past couple of weeks. The new initiatives come over a year after a previous campaign was brought to an end with an unfavourable ruling on standing.
The Court of Appeal overturned the Patents Court decision to strike out Glaxo Group’s (GSK’s) claim for an Arrow declaration in proceedings concerning a number of patents relating to dry powder inhaler formulations used in the treatment of respiratory diseases.
On Thursday, August 9th, San Diego, CA-based semiconductor developer Qualcomm Inc. announced that it reached a mutually agreed settlement with the Taiwan Fair Trade Commission (TFTC) which greatly reduces the financial penalty assessed to Qualcomm by the TFTC for antitrust issues. Although the TFTC will retain about $93 million USD in fines which have been paid by Qualcomm through July, the settlement eliminates the remainder of the original fine valued at $773 million USD and issued by Taiwan’s fair trade regulator last October.
Of the total 1086 patent applications published in the journal last week, Delhi, Mumbai, Chennai, Bangalore, Hyderabad and Kolkata have contributed a total of 116 applications. The total applications from each of the previously mentioned cities are as follows – 40 applications from Mumbai, 24 applications from Bangalore, 19 applications from Chennai, 14 applications from Hyderabad, 11 applications from Delhi and 8 applications from Kolkata.
This week and after 18 years of service, EmuParadise terminated all retro game downloads in response to a Nintendo lawsuit targeting two other download portals. While Nintendo might see this as a big win, the Japanese gaming giant - which has turned out some of the best titles of all time - doesn't seem to understand that this is a movement that will never be tamed.
The Belarusian Internet provider Velcom has announced that mobile subscribers will no longer be able to use BitTorrent freely on its "unlimited" plan. No specific reason is provided, but it's likely that avid torrent users are causing too much overhead.