The Linux kernel turns another year older on Saturday, August 25. Twenty-six years ago it may have felt to the creator and BDFL Linus Torvalds that Linux would only amount to satisfying the needs of one. But today we know it has changed the lives of many.
To celebrate, thirty of our readers share what their first Linux distro and installation was like. Some of their stories are magical, some maniacal. And, it's no surprise that the tension and passion of these Linux lovers is palpable.
The RISC-V open-source processor ISA support within the mainline kernel is getting into good shape, just a few releases after this new architecture port was originally added to the Linux Git tree.
The RISC-V code for Linux 4.19 includes the ISA-mandated timers and first-level interrupt controllers, which are needed to actually get user-space up and running. Besides the RISC-V first-level interrupt controller, Linux 4.19 also adds support for SiFive's platform-level interrupt controller that interfaces with the actual devices.
There is a lot of new feature work for the Kernel-based Virtual Machine (KVM) within the Linux 4.19 kernel.
The Linux "multi-function device" code updates were sent in overnight for the 4.19 kernel merge window with a few interesting additions.
Worth pointing out in the MFD subsystem for the Linux 4.19 kernel includes:
- The ChromeOS EC CEC driver being added. Google's embedded controller for ChromeOS devices is able to expose an HDMI CEC (Consumer Electronics Control) bus for interacting with HDMI-connected devices for controlling them via supported commands. The Linux kernel's HDMI CEC support has got into shape the past few kernel cycles and now the ChromeOS EC support can expose its HDMI CEC abilities with this new driver.
Testing, fuzzing, and other diagnostics have greatly increased the robustness of the Linux ecosystem, but embarrassing bugs still escape to end users. Furthermore, a million-year bug would happen several tens of times per day across Linux’s installed base (said to number more than 20 billion), so the best we can possibly do is hardly good enough.
Some interesting code updates were just recently put into the Linux 4.19 kernel merge window regarding “multi-function device” capabilities – mostly, this includes several new drivers and driver support, but perhaps most interesting is the ChromeOS EC CEC driver being added.
Google’s embedded controller for ChromeOS has been able to expose an HDMI CEC (Consumer Electronics Control) bus for interacting with HDMI-connected devices, which in turn is able to control them via supported commands. So now Linux kernel’s HDMI CEC support has been improved over the past few kernel cycles until now, which means that the ChromeOS EC support will be able to expose the HDMI CEC abilities utilizing the new driver added in this merge window.
The Linux 4.19 kernel merge window opened one week ago and there's been a lot of new features and improvements to be merged during this front-half of the merge period. If you are behind on your Phoronix reading, here's a look at the highlights for week one.
Hyperledger is the umbrella body for ten open source blockchain projects, all of which are cross-industry. So far, that is. Ledger Insights spoke to Hyperledger Executive Director, Brian Behlendorf, and explored the likelihood of industry-specific open source blockchains. Open source could significantly impact the governance of industry consortia and increase the pace of innovation.
For the health sector, there’s potential for an open source Electronic Health Record project. For supply chain it could be a provenance ledger for diamonds or luxury goods. Or a blockchain for bills of lading. In the case of insurance perhaps a policy ledger.
This past week we looked at the Windows 10 vs. Linux performance for AMD's just-launched Ryzen Threadripper 2990WX and given the interest from that then ran some Windows Server benchmarks to see if the performance of this 64-thread CPU would be more competitive to Linux. From those Windows vs. Linux tests there has been much speculation that the performance disparity is due to Windows scheduler being less optimized for high core/thread count processors and its NUMA awareness being less vetted than the Linux kernel. For getting a better idea, here are benchmarks of Windows Server 2019 preview versus Ubuntu Linux when testing varying thread/core counts for the AMD Threadripper 2990WX.
Toggled via the BIOS was SMT as well as various CCX configurations and each step of the way comparing the Windows Server 2019 Build 17733 performance to that of Ubuntu 18.04 LTS with the Linux 4.18 kernel in various multi-threaded benchmarks supported under both operating systems.
Last week L1 Terminal Fault (a.k.a. L1TF and Foreshadow) was made public as the latest set of speculative execution vulnerabilities affecting Intel processors. This Meltdown-like issue was met by same-day Linux kernel patches for mitigating the problem and does introduce another performance penalty but in this case is at least only limited to virtual machines. Last week I posted some initial L1TF-mitigated KVM-based VM benchmark results using a Core i7 CPU but the results for sharing today are using a much more powerful dual Xeon server.
For getting a better idea of the performance impact of mitigating L1TF/Foreshadow vulnerabilities I tested the Ubuntu patched kernel in a variety of configurations. First was the unmitigated Ubuntu 18.04 kernel, then Ubuntu 18.04 with the default out-of-the-box mitigation on the host and guest kernels, then having the host booted with the kernel parameter to force an L1D cache flush on every VMENTER rather than the default behavior of the conditional flushing, and then again when booting with l1tf=full for the full mitigation, which in the process also disables SMT/HT support.
With NVIDIA expected to announce the Turing-based GeForce RTX 2080 series today as part of their Gamescom press conference, here is a fresh look at the current NVIDIA Linux OpenGL/Vulkan performance with several Pascal graphics cards compared to AMD Polaris and Vega offerings. Additionally, with these latest Linux drivers, the current look at the performance-per-Watt.
It will be interesting to learn more about the GeForce RTX 2080 series in a short time, which will surely deliver significantly better performance and power efficiency improvements over the GeForce GTX 1000 "Pascal" hardware. But for a current look at how those cards are running under Linux, this morning are benchmarks for the GeForce GTX 1060, GTX 1070 Ti, GTX 1080, and GTX 1080 Ti while using the latest NVIDIA 396.51 graphics driver. For the competition on the AMD side was the Radeon RX Vega 64 and RX 580 (the GTX 1060 / RX 580 included in this article for a more mature look at the Linux driver support, namely for the AMDGPU+RADV/RadeonSI side). The Radeon tests were done with the latest Linux 4.18 AMDGPU DRM state and using Mesa 18.3-dev from the Oibaf PPA as of 19 August.
The last chess benchmark we’re going to look at is Crafty and again we’re measuring performance in nodes per second. Interestingly, the Core i9-7980XE wins out here and saw the biggest performance uplift when moving to Linux, a 5% performance increase was seen opposed to just 3% for the 2990WX and this made the Intel CPU 12% faster overall.
As our data grows (and some filesystems balloon to over 800GBs, with many small files) we have started seeing our night time backups continue through the morning, causing serious disk i/o problems as our users wake up and regular usage rises.
For years we have implemented a conservative backup policy - each server runs the backup twice: once via rdiff-backup to the onsite server with 10 days of increments kept. A second is an rsync to our offsite backup servers for disaster recovery.
Simple, I thought. I will change the rdiff-backup to the onsite server to use the ultra fast and simple rsync. Then, I'll use borgbackup to create an incremental backup from the onsite backup server to our off site backup servers. Piece of cake. And with each server only running one backup instead of two, they should complete in record time.
Except, some how the rsync backup to the onsite backup server was taking almost as long as the original rdiff-backup to the onsite server and rsync backup to the offsite server combined. What? I thought nothing was faster than the awesome simplicity of rsync, especially compared to the ancient python-based rdiff-backup, which hasn't had an upstream release since 2009.
Password Safe is an open-source KeePass-compatible password manager for Linux, designed specifically for use on the GNOME desktop.
The GIMP team has released a new point release today to GIMP 2.10 stable. While the version may not be indicative of significant changes, there are some prominent user-facing improvements with this release.
GIMP 2.10.6 brings long-awaited support foe vertical text layers! This should help East-Asian writing systems but also anyone else wanting to finally have vertical text.
Almost four months have passed since GIMP 2.10.0 release, and this is already the fourth version in the series, bringing you bug fixes, optimizations, and new features.
A brand-new point release for popular photo editing software GIMP has been released today, bringing GIMP to version 2.10.6 – this update doesn’t bring a whole load of significant features, but there are some great improvements and new functionalities.
For starters, GIMP 2.10.6 finally introduces support for vertical text (top to bottom), which has been a highly requested feature particularly for East-Asian writing systems. Thus, users can now set text in mixed orientation (as is typical in East-Asian vertical writing) or upright orientation (more common for Western vertical writing), with right-to-left, as well as left-to-right columns.
Here's popular applications on GNU/Linux available in AppImage format in August 2018. They are LibreOffice, Krita, Kdenlive, OpenShot, Synfig Studio, Inkscape, GIMP, VLC, Emacs, and some more. I list here either they are official (built by original project) or unofficial (built by individual contributor). If you see the name probono below, he is Simon Peter, the founding father of AppImage technology. You can run these AppImages on your GNU/Linux distros (or even test them on LiveCD session). Finally, by publishing this, I hope all the original developers insterested to provide AppImage versions officially. Enjoy!
GIMP 2.10.6 was released yesterday, just one and a half months after the previous release. Even though this stable branch is mostly for bug fixes, quite a few new features and improvements were added with this release, like support for vertical text, two new filters or vertical straightening.
GIMP 2.10.6 includes support for vertical text, especially useful for several East-Asian writing systems that use this type of writing, but also for easily inserting vertical text:
A new version of GIMP, the poplar open source image editor, has been made available for download. GIMP 2.10.6 arrives as the latest minor update in the 2.10.x stable release series, which made its debut earlier in the year.
Podcasts are a hugely popular form of “infotainment” these days, with almost any and every niche you can think of catered for with a show or a segment. If you’re not enjoying the wealth of podcasts out there, you’re really missing out. Podcasts provide you with the experience of a radio show, covering a wide range of topics ranging from gospel to science fiction to music and every thing in between. There are so many ways to enjoy your podcst. On mobile, popular apps such as PocketCast offer users a one-stop-shop for all the podcasts you can listen to. Many music streaming services like Apple Music and Spotify offer dedicated sections on Podcasts.
On August 20th, 2018, cPanel signed an agreement to be acquired by a group led by Oakley Capital (Oakley). The group also owns Plesk and SolusVM. This transaction will enable significant investment in new product and feature innovation and will support growth in headcount in Houston, Texas, USA where cPanel will continue to be headquartered.
If you think you have good aim and fast reflexes, Polygod is probably a good FPS for you to check out with single-player and online play.
Railway Empire - The Great Lakes is a new DLC out now that adds some interesting new content for the rail network sim.
Din's Legacy [Official Site] is promising some interesting gameplay features, along with full Linux support like their previous titles. Due sometime in the 4th quarter of 2018, it now has a trailer.
Hyperspace Dogfights impressed me when I took a look at it back in May and development is set to continue with a free content update next month.
Fictorum is an action RPG with destructible environments from Scraping Bottom Games, they said last year they planned a Linux version and it looks like it's now happening.
The tip comes from NuSuey/TuxDB where it showed a Linux content depot turning up recently. Checking SteamDB seems to indicate this is indeed true as of early this morning. When checking on their public roadmap, it seems they solved some issues they were having with a Linux version recently so this does indicate it's quite likely to release.
Time to set your week up by grabbing some fresh Linux games, here's a lot at some hot stuff on sale right now.
Not many games will allow you to build a flying Steampunk fortress, while you brace for impact as a massive flying Kraken smashes it to pieces - Airships: Conquer the Skies let's you do that.
Krush Kill 'N Destroy 1 and 2 are two classic real-time strategy titles from the 90's and a team of coders are looking to revive them using the open source OpenRA game engine.
Thanks to the power of OpenRA it will be open source, support Linux, Mac and Windows along with having online play, modding support and more. They don't currently have the source available for viewing yet, seems like that will come along with the first release.
KStars 2.9.8 is released for Windows, MacOS, and Linux. It is a hotfix release that contains bug fixes and stability improvements over the last release.
At Akademy I’ve presented the current state of KDE Itinerary. Due to popular demand and since 25 minutes aren’t a whole lot of time I’ll try to write a few posts on this subject here too, beginning with how this all started.
When travelling regularly you probably have come across or are using the digital travel assistant features found on Android or iOS, or dedicated services for this like TripIt. Getting a unified itinerary rather than digging through ad-infested HTML emails for your departure gate, having a single place to look for your boarding pass rather than two dozen vendor apps and getting up to date information about changes to your trip are all very useful and convenient.
Most of this is available “for free”, that is you pay with your data rather than your money. In the extreme case (Google), you have those providers reading your entire email in order to extract your travel information.
On your next system upgrade you will receive all the latest versions of KDE’s Plasma, Applications and Frameworks, in addition to the usual package updates. There is a new series 18.08 out for for Applications, with improvements aimed at making your usability and productivity better, in addition to adding new features.
For more details and the full changelogs on KDE’s software releases, you can read the official announcements:
Plasma 5.13.4 Applications 18.08.0 Frameworks 5.49.0
Users of the Chakra GNU/Linux operating system can now install the latest KDE software, including KDE Plasma 5.13.4, KDE Applications 18.08, and KDE Frameworks 5.49 from the main repositories.
In early July 2018, Chakra GNU/Linux users have got their taste of the latest KDE Plasma 5.13 desktop environment, but now they can update their installations to the recently released KDE Plasma 5.13.4 point release, which brings more than 45 bug fixes and improvements.
Even with KDE's annual Akademy conference happening this past week in Vienna, KDE development has been going strong especially on the usability front. The Kate text editor and the KTextEditor component within KDE Frameworks 5 have been the largest benefactors of recent improvements.
This KDE text editing code now has support for disabling syntax highlighting entirely if preferred. When using syntax highlighting, there have been many KTextEditor enhancements to improve the experience as well as improvements to the highlighting for a variety of languages from JavaScript to YAML to AppArmor files.
During Akademy I once more was a bit disappointed how bad the project plugin of Kate can cope with out-of-source builds.
At work, we use in-source-builds, as we normally only build in one configuration and have no issues with left-overs in the source directories locally. For this use-case, the project plugin works really well. You have your project local terminal view and that allows you all normal things you need during work, e.g. building + using the git command line client for the version control work.
On the other side, with out-of-source builds, that no longer is that nice to use. Either you use the .kateproject generated by the “Kate – Ninja” or “Kate – Unix Makefiles” CMake generators, then your terminal defaults to the build directory, which allows building just fine, but no version control stuff, or you use the .kateproject (or auto-project creation) in the source directory, which doesn’t allow you to build nicely inside the terminal prompt of Kate. There are workaround for that, like having shell magic to switch between source and build directory with ease, but that all feels a bit unnatural.
Therefore, I added today a very simple “fix” for the issue: If you have a .kateproject that has a different base directory (the toplevel “directory” entry) than the directory the .kateproject file is located in, you will get two terminal tabs in the project view.
So, it has been a busy week of Qt and KDE hacking in the beautiful city of Vienna. Besides getting quite some of the Viennese staple food, schnitzel, it was an interesting adventure of getting smarter.
That day I also attended Plasma Mycroft BoF, in which Aditya told us about various new development and gave us High-Level Overview about working of Mycroft and also How can we make it easier for developers to make Mycroft skills!
I had an amazing time with the KDE community in Vienna this past week at Akademy. In fact it was my first Akademy despite contributing to KDE for so long, but Vienna was a great reason to make my first trip to Europe.
[...]
I led a BoF on this topic for kdesrc-build and participated in a few others as well. There’s a lot out there that we can do to improve our story here, in kdesrc-build and elsewhere, and I’m hopeful we can accomplish real improvement here over the next year. But it was also nice to see and hear a lot of the positive feedback our developers had about kdesrc-build.
The time for Akademy came this year as well, this year it was in the gorgeous Vienna, Austria. This year marks my 10th Akademy in a row, starting from my first one in Belgium in 2008. Talks have been awesome as usual, but what’s always awesome for me year by year is all the face to face conversation with so much diverse and smart people in out awesome KDE community.
This year I attended to my fourth Akademy, the annual KDE summit. The conference is always a good place to meet old and new KDE people. This year we had a lot of new faces showing up there, which is very good because new people might mean new ideas coming, more hands to work on KDE projects, and more mouths to spread our message From Brazil we had three new contributors attending for the first time, Lays, Caio and Eliakin, from a total of eight Brazilians who participated this year. I think we can count with Tomaz and Helio although they are living in Germany
Nothing that really annoys me. Krita is awesome and complete software! Maybe a couple of little things, but I don’t really use them. Like text tool, which is now getting better and better. And I’d like to be able to move the selection form not while selecting, but after it is selected.
Do you want another time and date format in the GNOME top bar than what is set in your default locale? The Clock Override extension for GNOME gives you full control of what and how time and data information is display in the top bar.
The GNOME Shell for Linux doesn’t provide a lot of customization options out of the box. GNOME really don’t believe that anyone would ever want to customize their beautiful desktop shell. They’ve taken their design-by-omitting-customization paradigm so far that they’ve even left out the ability to customize the date and time format. Fortunately, the GNOME Shell is quite extensible and users always do find a way to change things the way that they want them.
After dabbling a bit with OpenFace, I wanted to add similar face detection and recognition abilities to a typical Linux desktop photo app. So I discovered Shotwell, which is a photo manager for Gnome. Shotwell had a partial implementation of face detection (no recognition) which was under a build define and not enabled in the releases. With that code as the starting point, I started integrating the ideas from OpenFace into Shotwell.
GNOME.Asia Summit 2018 was co-hosted with COSCUP 2018 and openSUSE.Asia Summit in Taipei, Taiwan 11-12 August 2018.
I am very pleased to attend to GNOME Asia(again!) that took place at National Taiwan University of Science and Technology, Taipei this year. Its always great to see GNOME folks around, hanging out and have a social side of things. GNOME Asia was co-hosted with OpenSUSE Asia summit and COSCUP.
[...]
We had a GNOME BoF to address couple of issues around conferences: Mostly around standardization of conference organization, budget, effect of local team presence at potential conference venues etc.
They didn't make it out in time for last week's GNOME 3.29.91 release but updates to Mutter and GNOME Shell are now available in their near-final state ahead of the upcoming GNOME 3.30 desktop update.
At this point I have only set up YunoHost, created a few user accounts and installed a handful of applications. While I may play with it further, my main focus going into this trial was how well the framework of the distribution functions. That is: is it easy to install, how hard is it for new users to add services and accounts, and is it straight forward to keep the system up to date? Basically, I wanted to know whether I could give this distribution to someone who wanted to set up home-based network services for the first time and expect them to be able to use it. Based on my experiences so far with YunoHost, my answer is: probably.
The distribution does make it pretty easy to create user accounts and install web-based services. In fact, YunoHost does this quite well. The admin panel is very streamlined, uncluttered and easy to navigate and getting something like a game of Hextris or a media streaming service installed is about as easy as a few mouse clicks. Managing the firewall, monitoring the system and creating backups are nearly as easy. The administrator still needs to figure out how to get backup archives off the disk to another location for safe keeping, but the bulk of the work in backing up and restoring the operating system is done for us.
Where I feel the distribution runs into trouble is mostly little details, and a few general concepts. For example, asking the user to create an "admin" password but leaving the root password as the default is both likely to confuse people and leave a permanent security hole on the servers of most inexperienced hobbyist administrators. On the topic of accounts, it makes sense, from a security standpoint, to separate web accounts from system accounts. But, this means there may be some confusion as to why, once an account has been created, it cannot log into the system. Little concepts like this may throw new users and I don't feel these issues are well addressed by the documentation.
The first time through, the system installer failed during the partitioning section. It worked the second time though with the same settings, so I'm not sure if this is a semi-persistent bug or a one-time error with my system.
On the whole, YunoHost performs well. It's light on resources, it offers a lot of common network services home administrators will probably want and it is pretty easy to run and maintain. There are a few little wrinkles in the experience, but in general I found the distribution to be straight forward to use. For people looking to set up a home server, this is probably a good platform on which to build.
My first concert was in the mid-80s, when AC/DC came to the Providence Civic Center in Rhode Island, and it was glorious. Music fans who grew up in the 80s will fondly remember the birth of MTV, the emergence of the King of Pop and the heyday of rock-n-roll’s heavy metal gone mainstream era, when long hair and guitar riffs both flowed freely. So recently when Def Leppard joined Journey at Fenway Park in Boston for their 2018 joint tour, I knew I had to be there.
Metal also dominated the datacenter in the 80s and 90s, as mainframes and minicomputers made way for bare-metal servers running enterprise applications on UNIX and, soon after, open source Linux operating systems powered by Red Hat. Just like heavy metal eventually made way for the angst-filled grunge rock era of the 90s, so too did application provisioning on bare metal make way for the era of virtualization driven by VMWare – with subsequent VM sprawl and costly ELAs creating much angst to this day for many IT organizations.
In our previous blog, we saw how arbitrary code execution resulting from stack-buffer overflows can be partly mitigated by marking segments of memory as non-executable, a technology known as Execshield. However stack-buffer overflow exploits can still effectively overwrite the function return address, which leads to several interesting exploitation techniques like ret2libc, ret2gets, and ret2plt. With all of these methods, the function return address is overwritten and attacker controlled code is executed when the program control transfers to overwritten address on the stack.
Until Kubernetes Federation hits the prime time, a number of solutions have sprung up as stop gaps to address geographically dispersing multiple cluster endpoints: stretch clusters and multiple clusters across multiple datacenters. The following article discusses how to configure Keepalived for maximum uptime of HAproxy with multiple cluster endpoints. In the following documentation an HAproxy and Keepalived configuration will be discussed in detail to load balance to the cluster(s) endpoints.
In a production environment a Global server load balancing (GSLB) or Global Traffic Manager (GTM) would be used to give a differing IP address based on the originating location of the request. This would help to ensure traffic from Virginia or New York would get the closest location to the originating request.
A big part of the Red Hat Open Brand Project has been looking back at our past and examining our roots. It is important that we imbue the new symbol with as much shared meaning from our history and culture as possible. To represent ourselves, we have to understand our origins.
Before there was Shadowman, before there was a red fedora, before we were an enterprise technology company, and before we helped make open source a driving force of technology innovation, we had our name.
Flatpak 1.0 is the first version in a new stable release series. This new 1.x series is the successor to the 0.10.x series, which was first introduced in October 2017. 1.0 is the new standard Flatpak version, and distributions are recommended to update to it as soon as possible.
The following release notes describe the major changes since 0.10.0. For a complete overview of Flatpak, please see docs.flatpak.org.
Flatpak, the Linux application sandboxing and distribution framework, has reached version 1.0 stable. Compared to the previous stable series (0.10.x), the new version should have faster installation and updates, it allows marking applications as end-of-life, and it asks the user to confirm app permissions at install time, among other improvements.
Flatpak is a software utility for software deployment, package management, and application virtualization for Linux. Applications built with Flatpak can run on almost any Linux distribution. Flatpak applications run in a sandbox environment in which the applications are isolated from the rest of the system, and require permission from the user to access the user's files or access hardware devices.
The Flatpak Linux application sandboxing and distribution framework, formerly XDG-App, used for building and distributing conternized apps on Linux desktops, has hit today the 1.0 milestone.
After being in development for more than three years, the widely-used Flatpak Linux application sandboxing and distribution framework has finally reached the 1.0 version, which means that it's mature enough to be deployed and used in production environments for distributing and running Linux apps.
"Flatpak 1.0 is the first version in a new stable release series. This new 1.x series is the successor to the 0.10.x series, which was first introduced in October 2017. 1.0 is the new standard Flatpak version, and distributions are recommended to update to it as soon as possible," said developer Alexander Larsson.
The 1.0 release of the Flatpak application distribution system is out. There are a number of performance improvements, the ability to mark applications as being at end-of-life, up-front confirmation of requested permissions, and more. "Apps can now request access the host SSH agent to securely access remote servers or Git repositories."
Are you worried about a few huge corporations controlling the web? Don’t like censorship on centralized social media sites like facebook and twitter? You need to decentralize! The internet was designed to be decentralized. Many common activities, from social media to email to voice calls, don’t actually require a centralized service.
The basic requirement for any peer to peer application is that the peers be able to reach each other. This is impossible today for most people using IP4 behind NAT (as with most household routers). The IP4 address space was exhausted over a decade ago. Most people are in “IP4 NAT Jail.”
Your device is assigned a private IP, and translated to the public IP by the router. Without port forwarding to a specific private IP, incoming TCP connections or UDP sessions can’t tell where to forward to, and are dropped. As a result, nothing can connect to your device. You must connect to various public servers to do anything. IP4 NAT Jail forces centralization.
Coming just two months after the Deepin 15.6 release that introduced new Light and Dark themes, Deepin 15.7 is now available with a focus on performance. It smaller ISO size by removing unnecessary components and optimizing the core system structure, better power optimization for laptops for up to 20 percent battery life, and improved memory usage.
"Deepin 15.7 has made a series of adjustments and optimizations in memory usage. In the standard configuration, the boot memory has decreased from 1.1G to 830M, and reduced to less than 800M on a discrete graphics card," wrote the devs in today's announcement, where they compared the memory consumptions of Deepin 15.7, Deepin 15.6 and other operating systems on the same computer.
We've been waiting for this moment for a couple of weeks now and we're proud to be the first to report that the Yaru theme developed by various members of the Ubuntu Linux community has now finally been enabled by default in the daily builds of the Ubuntu 18.10 (Cosmic Cuttlefish) operating system.
Of course, we immediately took a screenshot tour of the Yaru theme on today's Ubuntu 18.10 (Cosmic Cuttlefish) daily build so we can show you how great it looks. We think it's a professional theme that matures Ubuntu to the next level, and it is definitely a step in the right direction for the look and feel of the Ubuntu Desktop.
The kernel security update addressed both the L1 Terminal Fault vulnerabilities, as well as two other security flaws (CVE-2018-5390 and CVE-2018-5391) discovered by Juha-Matti Tilli in Linux kernel's TCP and IP implementations, which could allow remote attackers to cause a denial of service.
Unfortunately, on Ubuntu 14.04 LTS (Trusty Tahr) systems, users reported that the mitigations also introduced a regression in the Linux kernel packages, which could cause kernel panics for some users that booted the OS in certain desktop environments.
Ubuntu has a striking new look in the latest daily builds of Ubuntu 18.10 ‘Cosmic Cuttlefish’. The community created Yaru GTK theme and the Suru icon theme are now part of the default image and set as the default GTK and GNOME Shell theme. Unexpected? In shock?
Ubuntu Kylin 18.04 LTS is the latest version of Ubuntu Kylin. As part of Ubuntu 18.04 Flavor, this release ships with UKUI desktop environment 1.0 series. Linux kernel has been updated to 4.15. Besides, all the special software and the jointly developed software are updated to the new version, including Kylin Assistant, Ubuntu Kylin Software Center, Kylin Video, Youker Weather, Sougou Pinyin and WPS Office. Especially, Electronic Wechat and Burner have been added to the default normal install for better user experience in work and entertainment.
WPS Office is a suite of software which is made up of three primary components: WPS Writer, WPS Presentation, and WPS Spreadsheet. Ubuntu Kylin team is working with Kingsoft Corp to continue providing WPS for Ubuntu Kylin users for free. Foxit reader is based on the Foxit for Linux and designed for Chinese user to be simple during installation. It provides a way to view, create and sign PDF files, and add annotations to them.
Marcel Thürmer has posted schematics for building a two-layer, Linux-ready “Blueberry Pi” SBC with a solderable, Cortex-A7 Allwinner V3 with 64MB RAM, plus WiFi/BT, Ethernet, USB, RGB, MIPI-CSI, and a 26-pin RPi header.
Hardware developer Marcel Thürmer has gone to Hackaday to announce the release of open schematics for DIYers to build a Linux hacker board called the Blueberry Pi . The open-spec SBC project, which was further revealed on Hackster.io, eases the path for hobbyists by using a simple 2-layer design — compared to 6x layers on the Raspberry Pi — and by incorporating a highly integrated Allwinner V3 SoC.
Healthcare is experiencing a revolution. In a tightly regulated and ancient industry, the use of free and open source software make it uniquely positioned to see a great deal of progress.
I work at a scrappy healthcare startup where cost savings are a top priority. Our primary challenge is how to safely and efficiently manage personally identifying information (PII), like names, addresses, insurance information, etc., and personal health information (PHI), like the reason for a recent clinical visit, under the regulations of the Health Insurance Portability and Accountability Act of 1996, HIPAA, which became mandatory in the United States in 2003.
Branded TransmogrifAI, the AutoML library is less than 10 lines of Scala code written on top of Apache Spark, and can be used by developers looking to train machine learning models to predict customer behaviour without having to use a large data set for training.
It would be an understatement to say that artificial intelligence (AI) is much in the news these days. It's widely viewed as likely to usher in the next big step-change in computing, but a recent interesting development in the field has particular implications for open source. It concerns the rise of "ethical" AI.
In October 2016, the White House Office of Science and Technology Policy, the European Parliament's Committee on Legal Affairs and, in the UK, the House of Commons' Science and Technology Committee, all released reports on how to prepare for the future of AI, with ethical issues being an important component of those reports. At the beginning of last year, the Asilomar AI Principles were published, followed by the Montreal Declaration for a Responsible Development of Artificial Intelligence, announced in November 2017.
Abstract discussions of what ethical AI might or should mean became very real in March 2018. It was revealed then that Google had won a share of the contract for the Pentagon's Project Maven, which uses artificial intelligence to interpret huge quantities of video images collected by aerial drones in order to improve the targeting of subsequent drone strikes. When this became known, it caused a firestorm at Google. Thousands of people there signed an internal petition addressed to the company's CEO, Sundar Pichai, asking him to cancel the project. Hundreds of researchers and academics sent an open letter supporting them, and some Google employees resigned in protest.
At last, R1/beta1 is nearly upon us. As I’ve already explained on the mailing list, only two non-“task” issues remain in the beta1 milestone, and I have prototype solutions for both. The buildbot and other major services have been rehabilitated and will need only minor tweaking to handle the new branch, and mmlr has been massaging the HaikuPorter buildmaster so that it, too, can handle the new branch, though that work is not quite finished yet.
It's been five years since the last Haiku OS alpha release for their inaugural "R1" release but next month it looks like this first beta will be released, sixteen years after this BeOS-inspired open-source operating system started development.
Following our POWER9 Linux benchmarks earlier this year, IBM POWER engineers have continued exploring various areas for optimization within the interesting open-source workloads tested. Another batch of optimizations are pending for various projects.
Earlier this month, I attended DevConf.in 2018 conference in Bengaluru, KA, India. It was sort of culmination of a cohesive team play that began for me at DevConf.cz 2018 in Brno, CZ. I say sort of because the team is already gearing up for DevConf.in 2019.
Today, Mozilla is filing our brief in Mozilla v. FCC – alongside other companies, trade groups, states, and organizations – to defend net neutrality rules against the FCC’s rollback that went into effect early this year. For the first time in the history of the public internet, the FCC has disavowed interest and authority to protect users from ISPs, who have both the incentives and means to interfere with how we access online content.
We are proud to be a leader in the fight for net neutrality both through our legal challenge in Mozilla v. FCC and through our deep work in education and advocacy for an open, equal, accessible internet. Users need to know that their access to the internet is not being blocked, throttled, or discriminated against. That means that the FCC needs to accept statutory responsibility in protecting those user rights — a responsibility that every previous FCC has supported until now. That’s why we’re suing to stop them from abdicating their regulatory role in protecting the qualities that have made the internet the most important communications platform in history.
This case is about your rights to access content and services online without your ISP blocking, throttling, or discriminating against your favorite services. Unfortunately, the FCC made this a political issue and followed party-lines rather than protecting your right to an open internet in the US. Our brief highlights how this decision is just completely flawed...
The Snippets Service allows Mozilla to communicate with Firefox users directly by placing a snippet of text and an image on their new tab page. Snippets share exciting news from the Mozilla World, useful tips and tricks based on user activity and sometimes jokes.
To achieve personalized, activity based messaging in a privacy respecting and efficient manner, the service creates a Bundle of Snippets per locale. Bundles are HTML documents that contain all Snippets targeted to a group of users, including their Style-Sheets, images, metadata and the JS decision engine.
The Bundle is transferred to the client where the locally executed decision engine selects a snippet to display. A carefully designed system with multiple levels of caching takes care of the delivery. One layer of caching is a CloudFront CDN.
How do you close an web extension popout-winndow (the small window that appears when you click on on extension’s toolbar button)? On the desktop, all you need is a simple window.close(). Because of the limited available screen space Firefox on Android have popout-tabs instead of popout-windows. Users can dismiss these tabs by pressing the back button, closing them manually, or switching to another tab. However, they’re deceptively difficult to close pragmatically.
This article was last verified for Firefox 61, and applies to Firefox for Android versions 57 and newer.
It’s common for web extension popout-windows to close themselves after the user has completed an action in them. While many web extensions work on Firefox for Android, users often have to manually close the popout-tabs on their own.
Quantum computing has the potential to be a revolutionary technology. From the first applications in cryptography and database search to more modern quantum applications across simulation, optimization, and machine learning. This promise has led industrial, government, and academic efforts in quantum computing to grow globally. Posted jobs in the field have grown 6 fold in the last two years. Quantum computing hardware and platforms, designed by startups and tech giants alike, continue to improve. Now there are new opportunities to discover how to best program and use these new machines. As I wrote last year: the first quantum computers will need smart software.
Quantum computing also remains a place where small teams and open research projects can make a big difference. The open nature is important as Open Source software has the lowest barriers for others to understand, share and build upon existing projects. In a new field that needs to grow, this rapid sharing and development is especially important. I’ve experienced this myself through leading the Open Source Forest project at Rigetti Computing and also by watching the growing ecosystem of open projects like QISKit, OpenFermion, ProjectQ, Strawberry Fields, XaCC, Cirq, and many others. The hackathons and community efforts from around the world are inspiring.
SiFive, the leading provider of commercial RISC-V processor IP, today announced the first open-source RISC-V-based SoC platform for edge inference applications based on NVIDIA's Deep Learning Accelerator (NVDLA) technology.
FOAAS upstream recently went to release 2.0.0, so here we are catching up bringing you all the new accessors from FOAAS 2.0.0: bag(), equity(), fts(), ing(), particular(), ridiculous(), and shit(). We also added off_with() which was missing previously. Documentation and tests were updated. The screenshot shows an example of the new functions.
One of the key ideas of DevOps is infrastructure-as-code—having the infrastructure for your delivery/deployment pipeline expressed in code—just as the products that flow it.
Intel stopped developing their Beignet open-source Linux OpenCL driver in February to concentrate all efforts now around their new Intel OpenCL NEO platform. But commits landed today with a few improvements for those still using Beignet.
Independent contributor to the Beignet OpenCL stack Rebecca Palmer submitted a number of patches recently that were added to mainline Beignet, the first commits to this OpenCL library since early February.
As reported by iCulture, an iPad battery almost exploded at Apple’s Amsterdam Store and injured three employees due to harmful fumes released into the air. This is one of a kind incident as we haven’t heard any news of an explosion in iPad’s battery in the past. However, there have been several similar incidents involving iPhones.
Americans love chicken, but it doesn’t always love us back. We eat way more of it than any other meat, and it triggers more foodborne disease outbreak-related illnesses than any other food, according to a recent report from the Centers for Disease Control and Prevention. The main reason it makes people sick is because it carries salmonella.
That 14-page document includes an acknowledgment by the city that it is in violation of the state Safe Drinking Water Act because of unresolved problems, including not having a manager dedicated to preventing sewage from contaminating drinking water.
Lead, asbestos, poisonous insecticides, fossil-fuel emissions, and many other toxic pollutants contaminate our air, water, food, and homes. Children are much more vulnerable to these toxic substances than adults. Their central-nervous, immune, and other systems are still undeveloped, and exposure to toxic substances can cause irreversible damage; a child’s lungs are particularly sensitive. Even a fetus is at risk if a woman is exposed to toxins during pregnancy.
A study by the European Transport & Environment association published on Friday confirmed that spending a few days in various popular European capitals is equivalent to smoking between one and four cigarettes.
In a landmark case, a Californian jury found that Monsanto knew its Roundup and RangerPro weedkillers were dangerous and failed to warn consumers.
Can you remember the last time you cleaned your phone? Last week? Month? Never? Well, you’re not alone.
More than a third of Brits have admitted to never cleaning their smartphones and only 1 in 20 clean their phones every six months or less. That’s a whole lot of people not regularly cleaning their phones!
But maybe you’d be reaching for the cleaning supplies more often if you knew just how dirty your smartphone really is.
But according to Indian news outlet Dailypionneer.com, there was a second attack carried out on August 13, when the Cosmos Bank hackers transferred nearly $2 million to the account of ALM Trading Limited at Hang Seng Bank in Hong Kong.
A sobering caveat: If a skilled SIM hijacker targets you, there’s realistically not much you can do to stop them, says Allison Nixon, threat research at security firm Flashpoint. “In most of the cases that we’ve seen, a sufficiently determined attacker can take over someone’s online footprint,” she says.
That’s because ultimately, the machinations behind SIM swaps are largely out of your control. [...]
Josh and Kurt talk about Black Hat and Defcon and how unexciting they have become. What happened with hotels at Defcon, and more importantly how many security policies have 2nd and 3rd level effects we often can't foresee. We end with important information about pizza, bananas, and can openers.
Around 80 cars were set on fire and a further 40 vandalized in the city of Gothenburg in western Sweden on Monday night, according to Hans Lippens, police spokesman for the country's western region.
It is not unusual for such attacks to take place in Sweden in the week before schools reopen after the summer holiday [...]
More than 80 cars were set ablaze in cities across southwestern Sweden overnight as groups of masked youths threw stones and started fires in what may have been a coordinated action.
A police spokesperson also told TT : "We know from experience that these kinds of fires more often happen the week before schools start than other weeks.”
Several officers based at the Malaysian Embassy in Washington will be called up in the investigation into the leaked letter to the United States’ Central Intelligence Agency, says the Inspector-General of Police.
Tan Sri Mohamad Fuzi Harun said so far, police had recorded the statements of several persons of interest, including Datuk Hasanah Abdul Hamid, the former Malaysian External Intelligence Organisation (MEIO) chief.
“We will wait for the officers based in Washington to return and we will record their statements.
“The investigation involves the leaked letter and other relevant police reports on the matter,” he told reporters after attending the Bukit Aman monthly assembly yesterday.
It was reported that on July 31, the veracity of the letter was confirmed by Hasanah’s lawyer Datuk Shahar€udin Ali, who said that this fell under the Official Secrets Act.
Russian air defense assets in Syria have downed 45 drones targeting their main base in the country, its military said Thursday, after an attack by the Islamic State of Iraq and the Levant militant group on a Syrian Army base a day earlier killed seven troops.
The Russian Defense Ministry spokesman, Maj. Gen. Igor Konashenkov, said that five of them were shot down in the last three days near the Hemeimeem Air Base. The base in the province of Latakia serves as the main hub for Russian operations in Syria.
Although the former CIA director enjoyed a lot of support from his former colleagues in the intelligence community after US President Donald Trump stripped him of his security clearance, the news also caused a stir among a number of widely known special operations stars, who suggested Brennan deserved it and even got off cheap.
“He is lucky the security clearance is all he is getting away with,” Kris “Tanto” Paronto, a former Army Ranger and private security staffer who fought back during the 2012 Benghazi terror attack as part of the CIA team, told Fox News in an interview on Friday.
Benghazi terror attack survivor Kris Paronto made it clear this week that he won’t be defending former CIA director John Brennan anytime soon.
The former Army Ranger and CIA contractor who lived to tell the tale of the Sept. 11, 2012 terrorist attacks in Benghazi, Libya, said Mr. Brennan essentially got off easy when President Trump revoked his security clearance.
Mr. Paronto lost his security clearance years ago for telling his account of the attack.
Amb. Christopher Stevens, foreign service officer Sean Smith, and CIA contractors Tyrone S. Woods and Glen Doherty were killed during the siege on a CIA compound.
A new report has described how a catastrophic failure on the part of the Central Intelligence Agency, combined with the Chinese government’s steadily more sophisticated internet monitoring capabilities, led to the dramatic collapse of an American intelligence network in China and the executions of dozens of spies and their associates. The incident is just one example of how authorities in Beijing are overseeing the creation of an ever more effective police state, complete with technology and tactics straight out of a certain genre of near-future science fiction movie.
Earlier in August 2018, Foreign Policy revealed how Chinese state security officials were able to completely dismantle a CIA-run intelligence operation over the course of two years, beginning in 2010. The New York Times first broke the news of the debacle in 2017, but its sources either did not disclose or did not know exactly what had happened or the true scale of China’s response. In May 2018, U.S. officials charged former CIA officer Jerry Chun Shing Lee with conspiracy to commit espionage over the affair, nearly five months after indicting him for retaining classified information.
There's no such thing as summer vacation in security, and researchers started off this week by disclosing a problematic flaw in Intel processors that undermines the company's so-called secure enclave offering, and potentially other capabilities like virtual machines. A different group of analysts realized that they could potentially take a power grid down by conscripting air conditioners, water heaters, and other devices into a botnet and coordinating a massive power draw. And yet another research team exposed risks in how developers manage app storage on Android. Plus, an analysis of five body camera models found that the devices are deeply insecure and vulnerable to an array of attacks, including the troubling potential for footage manipulation.
Activists in Syria are establishing a sensor network to give civilians advanced warning about airstrikes, invisible mouse clicks (called "synthetic clicks") could let malware onto macOS devices, and vulnerabilities in fax machines are putting lots of corporate networks at risk—even in 2018. Meanwhile, WIRED analyzed seven Fortnite imposter apps and found all the malware and general sketchy junk you'd expect, and researchers are developing methods for tracking and identifying hackers through behavioral patterns.
They thought they were invincible. Starting in 2010 and lasting for two years, Chinese authorities dismantled the CIA’s network of assets in their country. Some sources fled, while others were given large sums of cash and left behind. But no one detained by Chinese intelligence survived. Now it’s thought that China was able to crack into the CIA’s online communication system. Agents in China have reportedly reverted to older methods of spycraft like meeting in person, with some intelligence experts wondering if internet-based systems can ever be counted on again.
However, that significant breach of security does not account for everyone killed by the Chinese during the two-year span of time. Instead, it seems likely that Chinese intelligence officers used the network identified through the communications platform to identify working assets and agents, then followed them to identify others that were not a part of the system breach. It remains unclear how Chinese authorities gained access to the system, though it could potentially have happened in a number of ways.
There’s a high likelihood a former CIA officer named Jerry Chun Shing Lee aided the Chinese in gaining access. He was indicted on espionage charges earlier this year after it was revealed that he had accepted hundreds of thousands of dollars worth of payments from the Chinese government, however, the CIA’s use of a communications platform originally designed for operations in the Middle East shares some of the blame. As compared to China, the Middle East is not a heavily contested digital environment. China’s strict control over its own population, particularly in the digital sphere, makes the use of such a system a questionable decision at best.
"It migrated to countries with sophisticated counterintelligence operations, like China," an official said.
"The attitude was that we've got this, we're untouchable."
Intelligence officers and their sources were able to communicate with each other using ordinary laptops or desktop computers connected to the internet, marking a stark departure from some of the more traditional methods of covert communication.
This "throwaway" encrypted program, which was assumed to be untraceable and separate from the CIA's main communication line, was reportedly used for new spies as a safety measure in case they double-crossed the agency.
A senior figure of the outlawed Kurdistan Workers’ Party (PKK) was killed in a joint operation by the Turkish military and the National Intelligence Organization (MðT) backed by unmanned aerial vehicles in the northern Iraqi town of Sinjar on Aug. 15.
ðsmail Ãâzden—codenamed Mam “Uncle” Zaki Shingali—was reportedly responsible for the group’s activities in the Sinjar town and was also a member of the group’s so-called “executive council.” Ãâzden was reported to have been in charge of the PKK’s illegal drug and arms trafficking in the region.
During the American Civil War, in which 620,000 people were slaughtered on the battlefields alone and hundreds of thousands more injured, the organization of the Roman Catholic Church in the American north and south remained united throughout the war and after.
The same cannot be said for the four-year-old civil war in Ukraine, which has deepened existing divisions among Orthodox Christians in the country.
Tensions are rising to the point that the Ukrainian government has been accused of suppressing the celebration of the 1030th anniversary of the coming of Christianity to ancient Rus, the proto-state of Eastern Slavs, which included the territories of modern Ukraine, Russia and Belarus. The government is being blamed for involvement in an effort to eliminate the original historic church of the Ukrainian Orthodox Church of the Moscow Patriarchate (UOC-MP), because of its affiliation with Russia and the word “Moscow” in its name.
The UOC-MP currently includes more than 12,000 of about 18,000 parishes in Ukraine, and is headed by Ukrainian Metropolitan Onuphrius, under the higher spiritual authority of Patriarch Kirill of Moscow and All Rus, seated in Moscow.
On July 27, a solemn march celebrating the 1030th anniversary of the baptism of Rus by Prince Vladimir the Great of Kiev in 988 AD drew 250,000 faithful of the UOC-MP in Kiev despite the attempt to sabotage it by the U.S.-backed Ukrainian government of President Petro Poroshenko. According to numerous testimonies by UOC-MP’s priests, published in the Ukrainian press, transportation was cut off from outlying parishes and believers were intimidated.
Last month, an article by Fair.org went viral in republications by popular alternative media outlets ranging from Salon to Zero Hedge to Alternet to Truthdig, among many others. The article was initially titled “ACTION ALERT: It’s Been Over a Year Since MSNBC Has Mentioned US War in Yemen”, but many subsequent republications went with variations on the more attention-grabbing headline, “MSNBC has done 455 Stormy Daniels segments in the last year — but none on U.S. war in Yemen”.
[...]
Ever since the Saudi-led assault on Yemen began in March of 2015, alternative media outlets everywhere have been repeatedly and aggressively decrying the mainstream media in the US and UK for their spectacular failure to adequately and accurately cover the violence and humanitarian disaster with appropriate reporting on who is responsible for it. After the 2016 US election, journalist Michael Tracey wrote an essay documenting how throughout the entire year and a half that Americans were pummeled with updates from the mass media about candidates and their campaigns, not one single question about Yemen was ever asked by any mainstream outlet of any candidate.
This is of course outrageous, but because of how media coverage works, mainstream attention was never drawn to the problem. It hasn’t been a total media blackout, but because it only turns up in mainstream media reports every once in a while with little if any emphasis being placed on who is behind the devastation, it occupies a very peripheral place in western consciousness. The average American would probably be able to tell you that some parts of their government appear to be concerned about Russia, Syria, Iran and North Korea, because those rival nations have been the subject of intense mass media coverage, but if you asked them about Yemen you’d likely be told something like “I think there’s some kind of humanitarian crisis there?”, if anything.
A congressman who doubts that Russia hacked Democratic emails during the 2016 election has been unable to speak with President Trump despite a full year attempting to broker a pardon for WikiLeaks editor Julian Assange in exchange for information disproving Russian culpability.
It’s unclear why exactly the White House has kept Rep. Dana Rohrabacher, R-Calif., at an arm’s length, and whether the decision is an example of uncharacteristic restraint by Trump or a result of interference by deputies fearing reputational or legal hazards.
Rohrabacher told the Washington Examiner he believes that fear of special counsel Robert Mueller's Russia investigation has prevented the conversation from happening.
"Assange assured me the Russian government was not responsible for the hacking and distribution of the DNC emails during the 2016 election. Assange told me he had hard evidence to prove that case, and there are highly qualified retired intelligence officers who back up his claim,” Rohrabacher said.
housands of new documents from Project MKUltra, the Central Intelligence Agency’s mid-century mind control program, will soon be released. The new records include 4,358 undisclosed pages regarding MKUltra’s “behavior modification” efforts.
John Greenewald, founder of The Black Vault, a site specializing in declassified government records obtained via Freedom of Information Act (FOIA) requests, first uploaded MKUltra documents in 2004—tens of thousands of pages, spread over four CD-ROMs. The document index alone is 85 pages.
John Greenewald of Black Vault, a website that publishes government documents, appealed to the internet for help after the agency refused to waive the $425 fee it was demanding to release the documents. Greenewald, who has been filing FOIA requests for two decades, had previously published files on MKUltra, a program best known for dosing individuals with drugs like LSD to research mind control. The program was shut down, and the documents were reportedly destroyed in 1973 at the order of then-director Richard Helms, but some were eventually released.
In the prologue of this series, we saw the breathtaking scope of Mueller’s dishonesty regarding the behavior and motives of one of them: the mysterious “Guccifer 2.0” (G2), who emerged online to take credit for the now-infamous Russian hack of the Democratic National Committee’s servers just one day after the Washington Post broke the story with the headline: “Russian government hackers penetrated DNC, stole opposition research on Trump.”
Authorities in South Sumatra province detected 198 fire hotspots across the province in July, most of them in districts with a long history forest fires. These include the districts of Ogan Komering Ilir and Ogan Ilir, both close to the provincial capital, Palembang, which is co-hosting this year’s Asian Games. Tens of thousands of athletes, officials and visitors from 45 countries are expected to attend the Games, which Jakarta is also co-hosting.
Red tides occur across the globe and are caused by a variety of algal species. The microorganism behind Florida’s outbreak is Karenia brevis, a marine dinoflagellate that releases brevetoxins, neurotoxic compounds that can be lethal to wildlife and cause neurological, respiratory, and gastrointestinal problems in humans. This year’s blooms have left hundreds of animals, including fish, turtles, and manatees, dead on the state’s shores.
The outbreak shows no signs of abating anytime soon. “We’re entering into what’s typically the bloom season,” says Marc Suddleson, the program manager for the National Oceanic and Atmospheric Association’s (NOAA) Harmful Algal Blooms Program. “[So] it’s possible that conditions will favor [its] persistence throughout the end of the summer into early fall.”
The Democratic National Committee (DNC) overwhelmingly passed a resolution on Friday evening saying it welcomes donations from fossil fuel industry workers and “employers’ political action committees.”
Critics of the newly passed resolution are calling it a reversal of the DNC’s recently adopted ban on accepting donations from fossil fuel companies’ political organizations.
Usually, if a prescribed burn gets out of control, it’s due to inexperience. But among the Karuk, Yurok, and Hupa, fire knowledge is deep—and now that laws are changing, that knowledge can finally be applied. Preston attends a yearly managed-fire training program, TREX, in her small hometown of Orleans. The two-week program attracts about 80 to 100 participants, who learn to spray water, create fire buffers, and determine safe temperature and wind conditions for managed fires. At the end, the teams conduct a prescribed burn on a few hundred acres of forest. Trained youth teach their new skills to their parents, filling in generational gaps where traditions were lost (federal policies separated Karuk children from their families for “re-education” in the early 1900s).
This baneful jurist will be deciding whether the U.S. Army Corps of Engineers adequately considered the detrimental effects on the Standing Rock Sioux and the Cheyenne River Sioux Tribes of the approval of the Dakota Access Pipeline (DAPL).
Native American tribes that tried to block the Dakota Access oil pipeline during a months-long standoff with authorities in North Dakota more than a year ago are carrying on their fight in federal court, in what they contend is a symbol of their ongoing struggle for tribal sovereignty.
Last month, TransCanada told the Cheyenne River Sioux and several other First Nations in a letter that the company is preparing to place machinery along the pipeline's route for a 2019 construction start date.
It’s understandable, then, that New Yorkers are not looking kindly upon a new fracked-gas pipeline that’s proposed to snake its way mere miles from the same areas hardest hit by Hurricane Sandy. Banding together in a coalition of environmental groups and local communities, they are now organizing to prevent the construction of the Northeast Supply Enhancement pipeline.
A baby orangutan - whose mother is presumed dead - has been rescued by heroic locals after being found weeping alone in the jungle.
A plantation worker called Rahman found the adorable ape crying in the bushes and reported the discovery to his manager.
Thinking the baby's mother would return to retrieve him, they left him where he was but when they went back the next day they were upset to discover he was still in the same place, all alone.
A team from International Animal Rescue (IAR) and members of the Natural Resources Conservation Centre (BKSDA) in West Borneo travelled to the oil palm plantation in Tanjung Pasar Village in Ketapang District where Rahman and his co-workers were waiting to hand the baby over.
The Interior Department’s internal watchdog said it closed its investigation into alleged censorship of a National Park Service (NPS) report because it was released without edits.
Reveal reported in April that Trump administration officials had removed mentions of climate change from a draft report examining the impact to NPS sites from sea-level rise and storm surges.
That prompted Interior’s Office of the Inspector General (OIG) to investigate, after five House Democrats, led by House Natural Resources Committee ranking member Raúl Grijalva (D-Ariz.), asked for the probe.
The Interior Department's Office of Inspector General has dropped its investigation into allegations that the National Park Service censored a climate change report.
Psychologists, sleep laboratories and fertility clinics have raised concerns about the mental and physical toll wrought by the frenetic work schedule. Insomnia, depression and suicidal tendencies are rampant symptoms, said Dr. S. Kalyanasundaram, a well-known psychiatrist who sees many technology workers in his thriving south Bangalore practice. “These days I see many 25- and 28-year-olds suffering heart attacks, something I haven’t seen in my four decades in this field,” he said.
The doctor said all of his Saturday appointments are reserved for tech workers and often booked months in advance.
On Thursday, Erdogan said “If they have their dollar, we have the people, we have Allah.”
The prison economy rests on an opaque, often unaccountable economic infrastructure, with its own private-equity financiers, holding companies, and multinational executives. Since the financial transactions driving incarceration are typically private and unregulated, according to CAP director Bianca Tylek, their analysis aims “to help people understand just how big this space is,” particularly because, often, “companies spend their money in a way to further entrench or expand the use of our criminal-legal system, and who it ends up touching.”
On August 16, Twitter shuttered two legacy APIs that it had announced would be removed earlier this year. Developers of a number of popular third-party Twitter clients warned that the shutdown of the User Streams and Site Streams APIs would negatively affect users of their apps and, as a #BreakingMyTwitter backlash evidences, it turns out they were right.
One app, Tweetbot for iOS, for instance, no longer supports automatic timeline refreshing, and push notifications for events such as likes and follows, have been removed. Tweetbot's maker, Tapbots, removed its Twitter client app for Apple Watch entirely.
Twitter’s efforts to clean up its platform often feels like a drop in the ocean, and now its CEO finally seems to be acknowledging this fact.
In an interview with CNN, Chief Executive Jack Dorsey said that the company is working to clean up the toxic atmosphere created by individuals on the platform.
Here’s what Mastodon is: an open-source, community-run microblogging website. It lets you post “toots,” and you can “boost” other users’ posts. It’s mostly like Twitter, but instead of living in one place, the social network lives in different chunks, called “instances,” each with its own rules and administrators. That’s what makes up a “federation,” and it protects the integrity of the service—there is no single, central server. So, if one instance stops paying for their [I]nternet or forgets to re-up their URL, the rest are unharmed in their semi-permeable silos.
Here’s the $64,000 question for our time: how did digital technologies go from being instruments for spreading democracy to tools for undermining it? Or, to put it a different way, how did social media go from empowering free speech to becoming a cornerstone of authoritarian power?
Later, he added, "We have to understand first the problem we're trying to solve, like what incentives we actually want to drive; not just what we want to remove, but what we want to drive." But he said he knows he wants incentives "that encourage people to talk and to have healthy conversation."
British Ambassador Catriona Laing reportedly asked VP Chiwenga if Zanu-PF would agree to coalition government.
Laing apparently asked the question this past week at a meeting to discuss the Electoral outcome and post-election violence which was also attended by EU Ambassador Philippe Van Damme.
Those who defend the indefensible are fools and Zanu PF apologists are some of the biggest fools there is. Give a fool a long rope and he will hang himself, so goes the adage. Bishop Lazarus, a seasoned Zanu PF apologist and Zimpaper columnist, has used all the space granted him in Sunday Mail to hang himself.
A GROUP of NGOs is contriving reports of State-sanctioned post-election human rights abuses in an effort to get Western countries to pressure President-elect Emmerson Mnangagwa into forming a "Government of National Unity" with opposition parties.
Under the ambit of the Zimbabwe Human Rights Forum, the NGOs last week generated a "2018 Post-Election Violence Monitoring Report", which claims to document violence against opposition supporters by State agents, Zanu-PF supporters and traditional chiefs. The allegations were not supported by any specifics, and many of them are based on social media rumours.
Chamisa has shown that he is a bad loser and so how can this bad loser become a useful partner? Albert Einstein would say: "Whoever is careless with the truth in small matters cannot be trusted with important matters."
"And those who were seen dancing were thought to be insane by those who could not hear the music," Friedrich Nietzsche would say as the urbanites and the rural folk in Zimbabwe continue mocking each other after the July 30 elections. Soon we will know kuti mapenzi ndivanani. They tell me Tendai "Mr Fake Bravado" Biti ran like a rat as he tried to evade arrest by Zimbabwean police at Chirundu Border Post. Kwanzi Biti wakazhamba sepwere achitiza. This man is a sickening coward. Ko wotizeiko futi nhai Biti?
Pakistan's cricket star-turned-politician Imran Khan was sworn in as prime minister on Saturday despite protests by opposition parties, which accuse the security services of intervening on his behalf in last month's elections.
Khan' s Tehreek-e-Insaf party won the most seats in the July 25 national elections but fell short of an outright majority. It allied with independents to form a coalition, and Khan was elected by the National Assembly on Friday. Khan had campaigned on promises to combat Pakistan's endemic corruption and break powerful landowners' monopoly on political power.
As the editor of the JFK Facts blog, I try not to spend a lot of time on stupid conspiracy theories, but given widespread ignorance and confusion on the subject, unpleasant journalist duty often calls.
Who killed JFK? The Federal Reserve? Nah. The Secret Service man? A hoax. Ted Cruz’s father? Pure B.S. George H.W. Bush? Heavy breathing is not the same as credible evidence. On a recent Black Vault podcast, the most common JFK question I heard was, “Was Kennedy assassinated because of his interest in UFOs?” Um, no, he was not.
Which brings me to QAnon, the imaginative conspiracy theorist now dominating the internet, attracting followersof President Trump, and obsessing the Washington Post, which has published a dozen articles about QAnon in the span of four days. Like many conspiracy theories, the QAnon fever dream can be traced back to the assassination of JFK.
And the reality is actually much worse than Dawkins tweet suggests. Of the ten Muslim Nobel Prize winners, only two are in hard science. Six are in the controversial peace category and two are in literature. Furthermore, Orhan Pamuk, winner in the literature category, claims to be a “cultural Muslim”,
As Ayaan Hirsi Ali, who’s also been smeared by the SPLC as an “anti-Muslim extremist,” has noted, the group these days is invested more in “profiting off the anxieties and white guilt of Northern liberals” than in actually upholding civil rights.
What hope is there that we – the public – can have a frank, open-ended discussion about some of the huge societal challenges we face – such as problems of fractured communities and cities in which inhabitants live segregated lives – if even one of the U.K.’s most powerful men gets denounced as a pariah for writing a provocative column about religious dress? We are effectively telling ordinary citizens who may, for example, want to explore through open discussion what drives British-Asian youth to blow their peers to smithereens, or trek to Syria and film themselves beheading fellow Westerners: “You can’t discuss that.”
WeChat users in China have come up with creative ways to circumvent censorship, and one of the more effective methods they’ve discovered seems to be sharing images instead of text, which can be easily caught by censors. In the case of China’s #MeToo movement, which authorities tried to shut down, social-media users decided to share a university student’s censored letter by posting images of it upside down in hopes of dodging the country’s filters.
It’s an ongoing mystery how censorship works on WeChat, which appears to affect only those accounts that are linked to mainland phone numbers. But new research from Citizen Lab, a research group at the University of Toronto, is offering some clues on getting around it.
Influential publisher John Calder, who championed avant-garde authors and battled censorship, has died, a colleague said Wednesday. He was 91.
Alessandro Gallenzi of Alma Books said Calder died on Monday at Edinburgh's Western General Hospital after several weeks of declining health.
Born in Montreal in 1927 to a Canadian mother and a Scottish father, Calder worked in the family timber business before founding the London-based Calder Publications in 1949. It published European writers including Anton Chekhov, Leo Tolstoy and Emile Zola, as well as modern authors - notably Samuel Beckett, whom Calder considered "the greatest of 20th-century writers."
Deputy minister of communications, Pinky Kekana, has reiterated that the Films and Publications Amendment Bill is not about censoring society, but is instead about rooting out the possession and distribution of child pornography.
“The bill does not concern itself with what citizens may publish on social media. However, it empowers the Film and Publication Board (FPB) to facilitate the removal of child pornography wherever it is published,” Kekana said.
Presenting the Films and Publications Amendment Bill to the National Council of Provinces (NCOP) on Wednesday, Kekana noted that from its conception, the FPB was not meant to ban any films or publication but furnish members of society with information about the nature and substance of the content they are about to consume.
Unlikely as this now may seem, there was a time, not long ago, when you couldn’t say anything naughty on a record. In fact, you couldn’t even imply anything naughty unless you were especially clever about it. Once upon a time, music censorship was so severe that even using the word “damn” in a song would invite trouble. Just ask The Kingston Trio, who didn’t give one about a “Greenback a-dollar” and had to cover the word with a loud guitar strum. Even a thing of beauty such as The Beach Boys’ ‘God Only Knows’ was banned by many radio stations, with the Lord’s name being too sacred for use in a mere pop song.
[...]
Remember what that dead man did in The Rolling Stones’ ‘Start Me Up’? Bogan says she’s the one that made him do it. But nobody could put that on a record in the 30s. (Fortunately, someone had the foresight to roll tape so it could be issued on CD decades later.) Ditto a performance the likes of Jelly Roll Morton’s ‘Murder Ballad’, a tale so long and depraved that it takes up seven sides of an acetate. It didn’t stand a chance of getting released during an era when music censorship was at its height, but it does give you a taste of the kind of talk Morton heard while working in the Storyville brothels of New Orleans’ red-light district.
So much for the vaunted First Amendment. While judges are welcome to deliver instructions about what can or cannot be printed (provided they don't mind violating the First Amendment 90% of the time), there's no reason to hand out these instructions to document recipients in public records lawsuits like this one. That's why redaction exists: so public entities can fulfill their public records obligations while withholding information that qualifies for exemptions or to comply with privacy laws. If the respondent screws up the redaction, there's no legal obligation for new agencies or any other records requester to pretend what wasn't supposed to be accessible isn't accessible. The burden is on the government to perform its job correctly.
No laws were violated by the Sun Sentinel's discussion of parts of the document that were supposed to be withheld. It acquired the document lawfully -- in fact, as a result of this court's order -- and discovered the redaction technique used didn't actually redact anything. Parts of what was withheld by the school shows the Broward County School Board mishandled some of its interactions with the Parkland shooter. This obviously was of great interest to the public, so there's no question that part weighs heavily in the favor of the paper's First Amendment rights.
What's worse is the judge stated in court the Sun Sentinel did something devious to expose the supposedly-redacted information, when it was actually the Broward County School Board that failed to do its job properly.
Beijing's increasing intervention in the internet sector has raised pressure on Chinese businesses ranging from game producers to live-streaming sites, a chilling effect that also may hamper attempts by Facebook and Google to enter the world's largest internet market.
Hong Kong-listed Tencent Holdings reported its first decline in quarterly profit in nearly 13 years on Wednesday, as state regulators failed to grant approval for in-game purchases involving the company's new hit video game, "PlayerUnknown's Battlegrounds Mobile." Online games contribute roughly 40% of Tencent's revenue.
Shares of Tencent slumped accordingly as investors worried about its future growth, wiping out 93.24 billion Hong Kong dollars ($11.9 billion) in market value during Thursday morning's trading.
Despicable people and their ideas have always existed, though it is essentially a quick summary of the whole point of free speech to remind that at different times in our history speaking out against slavery, against war, against one president or another, have all been seen as despicable. Restrictions on free speech have been used to ban great literature, books about women’s reproductive health, and photos once deemed “pornopgraphic” now displayed as art. Someone will always find an idea or word offensive. Allowing that person to judge for all of us has never proven to be on the right side of history.
The arrival in 2017 of neo-nazis, alt-right, white supremacists, racists, and the many flavors of ‘phobes is sadly nothing new. The current poster children for hate, Richard Spencer, Milo Yiannopoulos, Ann Coulter, and Charles Murray, are no one new either (Coulter’s first book came out in 1998; Murray published his loathed book on welfare in 1984 and both have spoken publicly ever since.) What does seem to be new is that their opposition — the antifa, the anti-fascists — is now aggressively embracing many of the same tools once used to try and stop the anti-war movement, feminists, and other progressive groups in the past. The justification is Everything Is Different since November’s election, and the old rules not only don’t apply, but that wishy-washy democratic ideals of free speech are now a threat to democracy.
Recently, Apple, Spotify, Facebook, and YouTube (owned by Google's parent, Alphabet) almost simultaneously tried to erase Infowars from existence (so-called deplatforming). Libertarians and some Republican candidates for the U.S. Congress in the 2018 elections were similarly excommunicated soon after. In a week, numerous conservatives got permanently banned from Twitter.
After dilly-dallying over not banning the InfoWars handle and the handle of its founder Alex Jones, and this is after the rest of the tech world had banned them, Twitter has now handed out a 7-day suspension to the handle. The reason for banning the account now is that Jones was found to be in violation of Twitter's content policy. The New York Times reported that Jones tweeted a link to a video calling for supporters to get their “battle rifles” ready against media and others.
The account has not been banned, but only the controversial tweet has been asked to be deleted. As per Twitter's policy, while Jones can browse and send direct messages to his followers, he will not be able to tweet, retweet, or like anything for a week. While this punishment seems mild as compared to the blackout of Jones on other social media platforms, online chatter about Twitter being biased against right-wing and conservative parties is back on.
In an series of early Saturday morning tweets, the president went after social media platforms for "totally discriminating against Republican/Conservative voices," arguing "Let everybody participate, good & bad, and we will all just have to figure it out!"
We have no doubt that if Congressman Lantos were here today he would admonish Google with the same words he used with tech giants in 2007. As the organization that bears his name and legacy, we call on Google not to act as “moral pygmies,” and rather than collaborate with China in the repression of its citizens, dedicate $10 million annually to support technologies that safely and anonymously circumvent the firewalls behind which the Chinese government holds them captive. Deploying a small portion of its vast wealth to help those imprisoned behind the digital walls of the 21st century would be an affirmative step beyond “don’t be evil” to show that Google actually seeks to “do the right thing.”
Some 1,400 Google employees have reportedly signed a letter protesting the company's top-secret censorship project for China.
The New York Times says that the employees are unhappy with the "urgent moral and ethical issues" raised by Google's role in the venture.
"Currently we do not have the information required to make ethically-informed decisions about our work, our projects, and our employment," reads the letter.
The project, dubbed Dragonfly, involves the company building a special version of Google that blocks certain websites or keywords related to topics such as democracy and religion.
Scores of scientists working for the federal government say that under the Trump administration, political concerns outweigh scientific rigor and budget cuts hamper their mission, a new survey shows.
Scientists also said they censor their own work to avoid getting in trouble, according to the survey released Tuesday. Sponsored by the liberal-leaning Union of Concerned Scientists and conducted by Iowa State University, the survey concludes that scientists fear speaking up – particularly about climate change, which President Donald Trump has dismissed as a "hoax" created by China to gain a competitive edge.
Federally employed scientists are raising concerns about the way that the Trump administration has been silencing, repressing and sidelining science and its messengers.
From the outside looking in, it seems pretty obvious that the Trump administration has very little time for the government's science agencies or their scientists.
In fact, the Trump administration's disregard for science has been so overwhelming that Columbia Law School started tracking every single way the government has silenced science in the past year and a half. The running list already has over 150 examples listed.
But with only a few whistleblowers willing to risk their necks to report violations of scientific integrity, there hasn't been much information on what this suppression looks like from the inside.
A Facebook page containing pro-Palestinian posts has been taken down by the social media giant. The latest in a string of pages removed by Facebook, it has renewed claims of “censorship” against the company.
The closure of the Occupy London page, which has garnered more than 150k followers since its opening in 2011, follows the “continual removal of posts related to Palestine”, an Occupy London spokesperson told The Canary.
Facebook has announced that it has withdrawn the English accounts from TeleSur, a pan-American television channel.
On August 7, 2018, Mark Zuckerberg, Facebook’s director, personally coordinated with Apple, Google, Spotify and YouTube (but not Twitter) the deletion of Alex Jones and InfoWars accounts for "conspiracy". He also wants to suppress "communist propaganda" (sic).
Created at the initiative of President Hugo Chávez, TeleSur was a public continuous news channel shared by Argentina, Bolivia, Cuba, Ecuador, Uruguay and Venezuela. However, in recent years, Argentina and Ecuador have pulled out.
In 2005, following the Axis for Peace Congress organized by Thierry Meyssan in Brussels, TeleSur, then headed by Aram Aharonian, envisioned a partnership with Al-Jazeera. But it was at this point that the Qatari chain changed its editorial line to become the spokesperson for the Muslim Brotherhood. Since then, an agreement has been concluded with Angola, Guinea Bissau and Mozambique for programs in Portuguese, and a program exchange is being conducted with the Lebanese channel Al-Mayadeen.
Following months of complaints by journalists and media watchdogs that Pakistan is imposing censorship and cracking down on independent news media, Islamabad is now threatening to shut down the social media website Twitter.
On August 16, a senior Pakistani official told Radio Mashaal that authorities would block Twitter if it fails to cooperate with Islamabad's concerns over material that it says violates its laws and customs.
Nisar Ahmed, the director general of internet policy and web analysis at the Pakistan Telecommunication Authority (PTA) said they are “pushed to make this decision” due to “negligible cooperation” from Twitter.
Citing terrorism threats, Ahmed said, “There are some things that are unlawful according to our customs, values, and laws, and those are required to be removed.”
Call 2018 the “Year of Deplatforming.” The internet was once celebrated for allowing fresh new voices to escape the control of gatekeepers. But this year, the internet giants decided to slam the gates on a number of people and ideas they don’t like. If you rely on someone else’s platform to express unpopular ideas, especially ideas on the right, you’re now at risk. This raises troubling questions, not only for free speech but for the future of American politics and media.
Only five years back, typing “Bomb-making Instructions” on Google would have given you a detailed itinerary on how you can make lethal weapons at home. But times have changed; getting access to extreme content is now getting more difficult.
Anyway, Google wouldn’t want to face another massive fine from EU regulators. But, on the other side, social media websites have remained inefficient in tracking down terrorist content on their sites, ever after back-to-back warnings from the European Union.
California enacted a data privacy law less than two months ago, and business groups already are urging the legislature to gut some of its most important protections. EFF and our privacy allies are fighting back.
On June 28, California enacted the Consumer Privacy Act (S.B. 375). It seeks to protect the data privacy of technology users and others by imposing new rules on companies that gather, use, and share personal data. As we have explained, while this law is a step forward, it also has important flaws that must be fixed. The law does not go into effect until January 2020, which means privacy advocates like EFF have 18 months to fix those flaws and strengthen it.
However, some are attempting to use this window of time to undermine the privacy protections in the law. Already, dozens of business groups, led by the California Chamber of Commerce, have asked legislators for immediate and far-reaching changes that would terminate many of the law’s critical safeguards.
The privacy and social justice communities quickly pushed back, urging legislators to reject the Chamber’s ill-considered proposals.
Most importantly, many of the Chamber’s proposals would harm the data privacy of 40 million Californians. For example, the Act creates a “right to know,” meaning a right for users to learn the “specific pieces” of personal information that a company has collected about them. The Chamber would delete this term, leaving users with a far weaker right to learn what general “categories” of information a company collected about them. This is not enough. For example, users should be able to learn exactly what information about their browsing history was harvested by a company—not just that the company monitored their browsing history.
Calls via Messenger are still in a gray area. Facebook claims calls are end-to-end encrypted so it cannot -- without completely altering the underlying software -- assist with an interception. Regular messages via Facebook's services can still be decrypted by the company but voice calls appear to be out of its reach.
Obviously, the government would very much like a favorable ruling from a federal judge. An order to alter this service to allow interception or collection could then be used against a number of other services offering end-to-end encryption.
It's unknown what legal options Facebook has pursued, but it does have a First Amendment argument to deploy, if nothing else. If code is speech -- an idea that does have legal precedent -- the burden falls on the government to explain why it so badly needs to violate a Constitutional right with its interception request.
This is a case worth watching. However, unlike the DOJ's very public battle with Apple in the San Bernardino case, there's nothing to see. I'm sure Facebook has filed motions to have court documents unsealed -- if only to draw more attention to this case -- but the Reuters article says there are currently no visible documents on the docket. (The docket may be sealed as well.) There is clearly public interest in this case, so the presumption of openness should apply. So far, that hasn't worked out too well for the public. And if the DOJ gets what it wants, that's not going to work out too well for the public either.
The National Security Agency successfully broke the encryption on a number of “high potential” virtual private networks, including those of media organization Al Jazeera, the Iraqi military and internet service organizations, and a number of airline reservation systems, according to a March 2006 NSA document.
A virtual private network, or VPN, uses an encrypted connection to enable users to go over the internet and connect to a private network, such as a corporate intranet. This allows an organization’s staff to access internal services like file-sharing servers or private wikis without having to physically be in the office.
The National Security Agency (NSA), a US intelligence agency tasked with collecting data for foreign and counter intelligence operations, broke into the encrypted network of the Al Jazeera Media Network and several others in 2006, according to a report by US media.
A document provided to The Intercept by NSA whistle-blower Edward Snowden shows that the NSA cracked Al Jazeera's Virtual Private Network (VPN), an encrypted tunnel used to secure internet traffic.
"Recently, NSA has decrypted a number of interesting targets ... deemed by product lines to have high potential as sources of intelligence," the document states, which is then followed by a list of targets.
That list includes Al Jazeera, the Iraqi Ministry of Defence and Interior, the Iraqi state internet provider and four airlines from Russia, Paraguay and Iran.
In the northernmost place in the United States, Point Barrow, Alaska, a National Security Agency collection site has allowed analysts to observe Russia’s military buildup 24/7, as melting Arctic ice opens a new conflict zone. The NSA has also monitored a dispute between India and Pakistan over access to the Indus River system, which is fed by glaciers high in the Himalayas, now shrinking. And as fisheries are facing increasing pressure from seas whose currents and temperatures have already been altered significantly by climate change, the NSA has listened in on phone conversations and monitored the movement of fishing boats engaged in potentially illegal practices that threaten dwindling stocks.
Previously unreleased documents leaked by former NSA contractor Edward Snowden show how the agency has gathered intelligence meant to support U.S. interests related to environmental disasters, conflicts, and resources. In the coming years, greenhouse gas pollution caused by the burning of fossil fuels will increase the frequency of ecological crises and conflicts over natural resources. The documents provide a window into the role the United States’s most sprawling international surveillance agency will play in an altered world.
The documents show that although the NSA’s interest in environmental issues is limited, it’s wide-reaching and has grown over the years. Unsurprisingly, the agency is driven not by an imperative to avoid climate-induced ecological crises, but by a need to respond to such crises as they threaten U.S. political and economic interests or explode into violent clashes.
You know the type.
Middle-aged, male, tired of his job. He’s been around for ages and moans about how things were done 10 times better back in the day. Every so often, he snaps pointlessly at a co-worker. He’s the office curmudgeon. It’s time for him to go, and he probably realizes it.
Workplace grouches are usually ignored or fired, but the National Security Agency gave a unique platform to one of its own. In the mid-aughts, in an internal newsletter, the NSA published a series of articles by Rahe Clancy, an eavesdropper disillusioned with what the agency had become and what he was doing there. It’s not that Clancy disliked spying on people or governments — he supported the collection of signals intelligence, or SIGINT — but he felt that the NSA had lost its way.
After 30 years on the job, he wrote, “I found myself turning into a SIGINT Curmudgeon.” In 2005, he published his coming-out article for the newsletter, SIDtoday, which was targeted at the agency’s core Signals Intelligence Directorate. Clancy wrote that he was particularly worried about the future of his area of expertise, known as “collection,” through which the NSA intercepts and downloads a variety of transmissions, both earthbound and from satellites. “I was convinced,” he continued, “that collection was a dying career field and that NSA management was hastening its demise through neglect.” Clancy was writing for a distinctive audience — the thousands of eavesdroppers, hackers, and analysts who worked for the NSA. His articles for SIDtoday, posted on a secure computer network, were provided to The Intercept by whistleblower Edward Snowden.
It began not by tapping enemy insurgents’ phones or capturing their emails, but by following the money.
When the National Security Agency discovered that Iran may have been buying computer chips from the United States, routing them through a U.S. ally, and potentially supplying them to detonate bombs against U.S. forces in Iraq and Afghanistan, it credited so-called economic intelligence with the find.
And the solution was not a death blow delivered by the military, but rather a new regulation on the export of certain technologies via the Commerce Department, which the spy agency said would end up “saving American and coalition lives.”
If you are following me on Twitter, you have already seen a lot of (re)tweets related to Aadhaar. For the people first time hearing this term, it is a 12 digit unique identification number provided by the Unique Identification Authority of India (UIDAI). It is also the world’s largest bio-metric ID system. It is supposed to be a voluntary service.
From the very beginning, this project tried to hide the details from the Indian citizens. Let it be privacy advocates or security researchers or human rights activists, everyone predicted that this will become a monster, a mass surveillance system, a tool of choice of the power hungry dictators.
While behavioral biometrics are nothing new, the availability of affordable computing power and the vast array of sensors available on modern smartphones have led to a wide increase in its usage, according to an excellent article by Stacy Cowley published by the New York Times this week. In addition to providing an overview of the technology and how it’s being used, the author highlights three main areas of concern for the privacy-conscious user:
In most countries, there are no laws governing the collection and use of biometric behavioral data.
Even Europe’s new privacy rules have exemptions for security and fraud prevention. A new digital privacy law in California includes behavioral biometrics on the list of tracking technologies companies must disclose if they collect, but it does not take effect until 2020.
This struggle will continue as long as police unions refuse to accept any accountability for the actions of their members. Perhaps, however, if the police unions are that upset, there are actions that they could take that would be more effective than having their members call for refunds and renounce the Dolphins organization. As one person tweeted to me, a gentleman by the name of Bones McKenzie, if police truly wanted to show their dissent, they should actually show up to the games… and take a knee.
White-nationalist rallies are calls for genocide, and must be treated as such.
“I made it clear that the solution to our problems as Muslims, and the problem of Palestine, is the establishment of the Islamic State, the Caliphate,” he said. “The Caliphate will fight our enemy and will liberate Palestine, Allah willing, and will eliminate that colonialist state of Israel.”
In Sweden, imported Middle Eastern anti-Semitism is funded by taxpayer money, so when scandals occur, they are often addressed by the same people who have participated in spreading its message.
No effective actions are currently being taken against the spread of anti-Semitism in Sweden.
“I told him I had a glass of wine on the flight. It was given to me free by Emirates Airlines staff,” she told the Mail Oline.
The officer said possession of alcohol — even if consumed — was a crime in the United Arab Emirates and after Dr Holman began filming him for evidence she was swarmed by armed police.
Declassified cables released last Friday provide irrefutable evidence that the current CIA director, Gina Haspel, played a direct role in the torture of detainees at a CIA black site in Thailand in 2002. The National Security Archive obtained the documents through a Freedom of Information Act lawsuit. Haspel was chief of base at “Detention Site Green” (also known as “Cat’s Eye”) and either wrote or authorized the cables.
The publication of the damning cables was given short shrift by the corporate media. The New York Times and the Washington Post each published only one article on the story in their August 10 editions. Both newspapers placed the story on their inside pages and buried it thereafter.
Haspel, tapped by Trump earlier this year to succeed Mike Pompeo, who was promoted to secretary of state, served as acting director beginning last April 26 and became director on May 26. The Democrats supplied the necessary votes to assure her confirmation by the Senate following hearings in May. The Senate Select Committee on Intelligence hearings on Haspel’s nomination provided a revealing exposure of the criminality of the US intelligence apparatus as well as the disintegration of bourgeois democratic processes in the United States.
The hearing was characterized by gushing tributes by both Democrats and Republicans for the work of an agency long ago dubbed “Murder, Inc.” for its crimes around the world, including the organization of political assassinations, the creation of terrorist armies and the orchestration of fascist-military coups.
It was shortly after 9 p.m. on Aug. 8 when a private sanitation truck headed up East 169th Street in the Bronx and drove into oncoming traffic. The truck smashed head-on into a sedan, sending it 25 feet down the block and into another parked car, triggering the sedan’s airbags, according to the police report. The garbage truck wound up crashing into a second parked car before coming to a stop.
Bystanders began to gather. Someone called 911. A New York City Fire Department ambulance was dispatched, police records show.
Soon, a man emerged from the cab of the garbage truck. The vehicle belonged to Sanitation Salvage, one of the largest private trash haulers in the city, whose safety record and wider operations are being investigated. The man, it turns out, never should have been driving the truck.
There are some people now trying to argue that you should be critical of the burka but without using critical language. And that mocking people’s religious choices – no matter how extreme – is tantamount to racism. Did gay rights campaigners tread on eggshells about Christian beliefs when they argued for legalising gay marriage? Were feminist politicians in the UK supersensitive about Catholic beliefs during the abortion debate in Ireland? No, they disagreed powerfully, sometimes offensively, in a bid to persuade the public of their views. Mockery of religious practices is not everyone’s choice of tactic, but to act like it is beyond the pale is disingenuous and hypocritical.
On August 1, Saddam again quarrelled with a man while shopping with Samira. He decided he couldn't take it any more and bought a knife to kill her. The night passed and he had another idea.
Why kill her when he could sell her to a brothel in Delhi, he thought.
Reuniting the kidnapped Yazidis with their families and bringing the perpetrators to justice should be a priority of civilized governments worldwide, not only to help stop the persecution and enslavement of Yazidis, but also to defeat jihad.
The question is: Should Turkey, with the path it is on, even remain a member of NATO?
The South Florida Sun Sentinel's reporting on sensitive information about Parkland school shooter Nikolas Cruz was "shameful," a circuit court judge said yesterday.
Earlier this month, the Sun Sentinel obtained a confidential Broward County School Board report on Cruz, who murdered 17 people at Marjory Stoneman Douglas High School, which he used to attend, on February 14. As Reason's Robby Soave noted, the report showed that Cruz was entitled to special needs assistance while attending Stoneman Douglas, but the school never provided him with the help he needed.
The Sun Sentinel was not supposed to have access to much of Cruz's confidential information. In compliance with a court order, the school board redacted two-thirds of the report on his background. But the newspaper figured out that by copying and pasting the report into a separate file, it could read the blacked-out portions. The Sun Sentinel then published the report in full.
In response, the school board asked Judge Elizabeth Scherer of the 17th Judicial Circuit Court in Broward County to hold the newspaper in contempt. Yesterday, in addition to saying she would consider the request, Scherer blasted the Sun Sentinel's reporting as "shameful."
Jailed for a over year since her leak of a classified intelligence report, Reality Winner faces sentencing next week for a crime that has led some to hail her bravery and others to brand her a traitor.
“At the time of the offense, Reality was an impetuous twenty-five year old, in her first full-time ‘real’ job since being honorably discharged from the military,” Winner’s Aug. 15 sentencing memorandum states. “She acknowledges responsibility for her singular and serious act, recognizes the severity of it, and is prepared to accept her punishment. But, Reality is not a terrorist. Despite the rhetoric that has flowed freely throughout this case, she is not a hater of her country or its people — she is quite the opposite.”
A Georgia woman who mailed a secret U.S. report to a news organization faces the "longest sentence" ever behind bars for a federal crime involving leaks to the news media, prosecutors said in a court filing.
Former National Security Agency contractor Reality Winner, 26, is scheduled to be sentenced Aug. 23 by a U.S. District Court judge in Augusta. She pleaded guilty in June to a single count of transmitting national security information when she worked as a translator at an NSA facility in Augusta.
International Day Against DRM (IDAD) is coming up! In just under a month, on September 18th, we'll be celebrating what the world could look like without DRM. We need your help to make sure the messages gets all the attention it needs.
We've been working hard preparing for IDAD 2018, and hope you will join us for this year's action.
Last month, in Endo Pharmaceuticals Solutions, Inc. v. Custopharm Inc., the Federal Circuit affirmed a decision by the U.S. District Court for the District of Delaware finding that Defendant-Appellant Custopharm Inc. had not proven that claim 2 of U.S. Patent No. 7,718,640 or claim 18 of U.S. Patent No. 8,338,395 were invalid as obvious under 35 U.S.C. ۤ 103. The '640 and '395 patents are owned by Plaintiffs-Appellees Bayer Intellectual Property GmbH and Bayer Pharma AG.
Seeking approval to market a generic version of Aveed€®, a long-acting injectable testosterone replacement therapy for men suffering from physiologically low levels of testosterone, for which Plaintiff-Appellee Endo Pharmaceuticals Solutions, Inc. holds the approved New Drug Application, Paddock Laboratories, LLC (Custopharm's predecessor-in-interest) filed an Abbreviated New Drug Application (ANDA) with the FDA. In response to that filing, Endo and Bayer brought an action for infringement of the '640 and '395 patents. During the proceedings, Custopharm stipulated to infringement, and Endo and Bayer limited their asserted claims to claim 2 of the '640 patent and claim 18 of the '395 patent.
This draft of a chapter in a compilation addressing architectural appropriation examines patents on architectural designs issued over the last century and a half to flesh out the surprisingly expansive legal standard for what constitutes a patentable design at the United States Patent and Trademark Office (PTO). Architectural patents are not limited to innovative construction technologies. Innovative dispositions of space – that is, novel arrangements of the programmatic spaces as represented in floor plans, sections, or their three-dimensional equivalents – can also be patented. They are functional technologies that “do” something, not simply copyrightable artistic works, because they have programmatic affordances: they allow some human behaviors and patterns of human activity to occur more easily than others.
Patent classification systems and upper-level grouping have been widely used but are insufficiently documented. This article provides an overview of the major patent classification systems and the basic ideas behind technological categorization of patent classes. I then point out a few recent institutional changes that disproportionately affect patents in specific categories and alternative categorization used in the patent examination process. Finally, I include a user-written update of NBER patent technological categorization based on the last edition of U.S. patent classification, following the logic in Hall, Jaffe, and Trajtenberg (2001).
For competing firms, a patent settlement provides a rare opportunity to write an agreement that forestalls competition without transparently violating the antitrust laws. Problematically, such agreements are highly profitable for reasons that have nothing to do with resolving a patent dispute. Thus, even if the firms think the patent is very likely invalid or noninfringed, they prefer to restrain competition to monopoly and share in the proceeds. In response, antitrust has recently come to focus on how the settlement’s competitive effects compare to the expected result of foregone patent litigation, which seemingly requires some assessment of the likelihood that the patentee would have prevailed. But this “case-within-a-case” approach leads to major complications in practice. Indeed, outside of one well-known settlement format—so-called “pay-for-delay” agreements—how to administer this burgeoning antitrust standard remains an open question.
How has US patenting changed over the past 230 years? Inspired by the announcement that the USPTO has just issued its 10 millionth patent, litigation supremo Andrew Waugh QC has delved into the inventions behind the statistics. The Constitution of The United States of America (then 13 states of New Hampshire, Massachusetts, Rhode Island, Connecticut, New York, New Jersey, Pennsylvania, Delaware, Maryland, Virginia, Georgia, North Carolina and South Carolina) was negotiated in Pennsylvania between May to September 1787. It was engrossed on parchment and sent to Congress on 18th September 1787 and Section 8 of Article 1 of the Constitution provided that “The Congress shall have Power.....To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries”.
Andrew has looked at the first US patent ever (both of them, read more and you’ll understand) and number 1 million, 2 million and so forth to see what technology was around, and how fast patenting has accelerated during its existence.
From a process for making pot ash through vehicle tyres, ethanol production and, inevitably, data processing, the documents are remarkably representative of how technology has developed. Interestingly, the fastest million patents were granted between 2011 and 2013 (this is between patent number 8 million and patent number 9 million) – the next million took 5 years – two and half times longer. There has been talk of a slowdown in patenting, but this is a pretty clear statistic that either filing or granting has slowed down. Andrew’s review is not really about the numerical variation, more a celebration of two centuries of patenting, but it provides food for thought in many ways - and some light-hearted summer reading if you want a break from your beach novel. Over to Andrew.
Syneo recently received a patent in China for its Servo Electric Press Two-Stage Force technology. The patent gives the company the rights to use its two-stage force measuring system in manual electric press and automatic electric press (press-fit) machine applications.
The patent protects the company’s technology that is featured in the two-stage force measuring system that enhances press force resolution and sensitivity in force curves of pin pressing applications in electronic manufacturing and printed circuit board assembly.
Following remand, the court denied plaintiff's motion to reinstate its award of attorney fees under 35 U.S.C. ۤ 285 because of plaintiff's own misconduct in seeking a TRO.
Patients around the world, in developing and developed countries, are encountering barriers to access to affordable medical products, in part due to patents and resulting high prices. This is occurring despite longstanding protections built into international trade rules to allow smaller economies to act on behalf of their people and make such medical products available regardless of patents. These protections are often referred to as flexibilities in the 1994 World Trade Organization Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS). The prevailing view is that knowledge, understanding and use of them remains limited among policymakers and many potential beneficiaries, even as patent-strong nations and their industries work to narrow the reach and ability to use these flexibilities.
A recent report sheds new light on the patent estates protecting the US’s best-selling drugs. Revealing that over 100 applications are made on average for patents relating to blockbuster drugs, with dozens of assets being granted, the study makes plain the scale of the legal challenge facing many biosimilar producers seeking to launch their products. Released at a time of intense political controversy surrounding the high medical costs faced by patients in the US, it is also bound to fuel further discussion about the future of legal monopolies in the country.
Recent USPTO assignments data shows the first known third-party IP acquisition by Amperex Technology Limited (ATL), a Hong Kong-based maker of lithium-ion batteries. According to the filing, Alphabet unit Google dealt 139 former Motorola assets to the company after first advertising them for sale back in 2015. IAM readers may remember ATL from a story we published last year on the increasing patent enforcement activity in the fiercely competitive lithium ion battery industry, which supplies everything from electric cars to handheld electronics. ATL has a somewhat murky relationship to Contemporary Amperex Technology Limited (CATL), the world’s largest producer of electric vehicle batteries.
In the case of Sex Style v. Abutbul, the plaintiff, a producer of pornographic movies, sued the defendant, an individual who operates an adult website, for copyright infringement. It was alleged that the defendant’s website provided links without authorization to 15 pornographic movies. While the court ruled that the movies are entitled to copyright protection, it declined awarding statutory damages for infringement on the ground of such content, being obscene, was therefore illegal.
At the beginning of its analysis, the court determined that the movies are pornographic (rather than being merely erotic), based simply on the plaintiff‘s statement of claim and without further discussion. After a (very) brief discussion on the copyrightability of the movies, which the court concluded in the positive, the court then turned to the question of whether the copyright in the movies is enforceable in light of the nature of their contents. To address this question, the court relies on the Israel Penal Law, 1977, which prohibits the publication of “obscene” content.
After fighting for years, it appears that Paul Hansmeier realized he was cooked. On Friday, he pleaded guilty to various fraud and money laundering charges related to his copyright trolling under the Prenda name. Hansmeier, of course, was one of the two "masterminds" (and I use that term loosely) behind Prenda along with John Steele, who pleaded guilty last year, and was set to be a witness against Hansmeier, who came up with some colorfully ludicrous theories to try to talk his way out of these charges.
If you don't recall, Hansmeier and Steele started out as garden variety copyright trolls, suing tons of people and shaking them down for money, but they kept expanding the scam, to the point that they were setting up bogus honeypots with content they themselves uploaded to get IP addresses to shake down (with hilariously dumb attempts to cover up that it was them). They also set up fake shell companies as their own "clients" which didn't go over well in court. That's not even getting to the way that Steele and Hansmeier were clearly the beneficiaries of these shakedowns, or the fact that they tried to hide the money. And do we even mention the outright lying in court?