Bonum Certa Men Certa

Links 19/3/2022: Raspberry Pi Project Ideas



  • GNU/Linux

    • Server

      • TechTargetNeed a replacement? Try these 5 Docker alternatives

        After more than a decade in use, Docker remains the de facto container standard because of its ability to integrate with a broad array of tools and platforms, such as Kubernetes. However, business changes at Docker and market forces have prompted organizations to search for new containerization options.

    • Kernel Space

      • LinuxiacAsahi Linux Reaches Alpha Milestone, Brings Linux to M1 Macs
        The development of Asahi Linux for Macs equipped with Apple chips is in full swing. For those of you unaware, Asahi Linux is a project and community dedicated to bringing Linux to Apple Silicon Macs, beginning with the 2020 M1 Mac Mini, MacBook Air, and MacBook Pro.

        As you know, the M1 is Apple’s custom Arm-based SoC which started showing on Macs in 2020 after ditching Intel’s x86 silicon chip. Because the M1 is Apple’s most powerful chip, it’s easy to see why developers are interested in porting Linux to it and running programs like Proton, which would turn the Mac into a powerful gaming PC.

      • LWNLinux 5.16.16
        I'm announcing the release of the 5.16.16 kernel.
        
        

        All users of the 5.16 kernel series must upgrade.

        The updated 5.16.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.16.y and can be browsed at the normal kernel.org git web browser: https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...

        thanks,

        greg k-h
      • LWNLinux 5.15.30
      • LWNLinux 5.10.107
      • LWNLinux 5.4.186
    • Applications

      • Linux LinksBest Free and Open Source Alternative to Apple Bonjour - LinuxLinks

        Apple, Microsoft, Alphabet (Google’s parent), Amazon and Facebook dominate the tech landscape. Their dominance is so broad they account for more than 20% of the S&P 500.

        There are many things to admire about Apple’s hardware and software. Apple make great looking (albeit expensive) hardware. Over the years key successes include the iPhone, iPad, iPod, and the MacBook Air. The company designs its own hardware and software. This gives them the power to make an operating system and suite of apps that are tailor-made and optimized for their hardware. Apple also operates the Apple Music and Apple TV media distribution platforms.

        Mac OS X is Apple’s proprietary operating system for its line of Macintosh computers. Its interface, known as Aqua, is highly polished and built on top of a BSD derivative (Darwin). There’s a whole raft of proprietary applications that are developed by Apple for their operating software. This software is not available for Linux and there’s no prospect of that position changing.

        In 2020, Apple began the Apple silicon transition, using self-designed, 64-bit ARM-based Apple M1 processors on new Mac computers. Maybe it’s the perfect time to move away from the proprietary world of Apple, and embrace the open source Linux scene.

      • Make Use OfSnap vs. AppImage vs. Flatpak: What Is the Difference and Which Is Best for You?

        Linux systems are popular for many reasons, but installing applications is not one of them. Apps in Linux are delivered as packages and come in all sorts of flavors. Packaging systems differ in terms of installation, usability, and update mechanisms.

        Below, we'll look at and compare three prominent package formats: Snap, AppImage, and Flatpak, all distro independent.

    • Instructionals/Technical

      • Make Use OfA Guide to MySQL for Beginners

        MySQL is an open-source relational database management system with support for Structured Query Language (SQL). It helps in the development of a wide range of web-based applications and online content. MySQL runs on all OS platforms like Linux/UNIX, macOS, Windows and is an important component of the LAMP stack.

        MySQL is one of the most popular database systems and many cloud providers offer it as part of their service. It uses commands with queries and data to perform tasks and functions by communicating with the database. This article covers the most commonly used MySQL statements that allow users to efficiently work with databases.

      • How to Run Grafana In a Docker Container – CloudSavvy IT

        Grafana is a leading observability platform for metrics visualization. It lets you build bespoke dashboards to surface meaningful insights from your application’s real-time data streams.

        Grafana’s a cloud-native application that’s ready to be launched on popular infrastructure providers, installed on your own hardware, or deployed as a standalone container. In this guide we’ll focus on the latter choice by using the official Grafana image to start an instance that runs in Docker.

      • ID RootHow To Install MariaDB on Manjaro 21 - idroot

        In this tutorial, we will show you how to install MariaDB on Manjaro 21. For those of you who didn’t know, MariaDB is a free and open-source relational database management system (DBMS) that is considered as a successor and replacement of MySQL DBMS. MariaDB is fully compatible with the MySQL database and is widely used as a database server in the LAMP and LEMP stack.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the MariaDB database on a Manjaro 21 (Ornara).

      • GNU Linux Debian 11 – how to upgrade php7 to php8.1 – logo
    • Desktop Environments/WMs

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Web Browsers

        • The Register UKThis browser-in-the-browser attack is perfect for phishing ● The Register

          A novel way of tricking people out of their passwords has left us wondering if there's a need to rethink how much we trust our web browsers to protect us and to accelerate efforts to close web security gaps.

          Earlier this week, an infosec researcher known as mr.d0x described a browser-in-the-browser (BitB) attack. It's a way to steal login credentials by simulating the little browser windows that Google, Microsoft, and other authentication service providers pop up that ask you for your username and password to continue. You've probably seen these windows: you click on something like a "Sign in with Microsoft" button on a website, and popup appears asking for your credentials to access your account or profile.

          Services like Google Sign-In will display a Google URL in the popup window navigation bar, which offers some reassurance that the login service is actually coming from a trusted company and not an unknown one. And bypassing defenses built into the user's browser to fool them into trusting a malicious page tends to be difficult in the absence of an exploitable vulnerability, thanks to browser security mechanisms including Content Security Policy settings and the Same-origin policy security model.

        • The Register UKBrave takes the spring out of creepy bounce tracking [Ed: Brave is not privacy but a belief system]

          Browser maker Brave has developed a new way to ground "bounce tracking," a sneaky technique for bypassing privacy defenses in order to track people across different websites.

          Bounce tracking, also known as redirect tracking, dates back at least to 2014 when ad companies were looking for ways to avoid third-party cookie blocking defenses.

          "Bounce tracking is a way for trackers to track you even if browser-level privacy protections are in place," explained Peter Snyder, senior director of privacy at Brave, on Tuesday.

      • SaaS/Back End/Databases

        • The Register UKIBM Cloudant ends backing of FoundationDB version of CouchDB ● The Register

          The IBM Cloudant software team has decided to pull the plug on its push to create a new database engine underlying Apache CouchDB, the NoSQL document store used by the BBC, Apple and atomic research facility CERN.

          In a post on the Apache list, Robert Newson, former IBM Cloudant employee and Apache CouchDB Project Management Committee member, explained that IBM Cloudant had supported a plan to "build a next-generation version of CouchDB using the FoundationDB database engine as its new base."

        • The Register UKMongoDB to terminate Russian SaaS accounts [Ed: It probably has no Russian customers or barely any (but this is a PR stunt)]

          NoSQL database challenger MongoDB has decided it won't sell its wares in Russia – not even its software-as-a-service offering.

      • Content Management Systems (CMS)

        • Make Use OfWordPress.com vs. WordPress.org: What's the Difference?

          Starting a new website? From writing raw code to using content management systems like WordPress or website builders like Squarespace, Wix, and Weebly, there are tons of ways to get your website up and running.

          The most popular tool these days, however, is WordPress. Once you’ve settled on using WordPress, you’ll have another choice to make. Should you use WordPress.com or WordPress.org?

          There isn’t a yes or no answer to this—but once you’ve read through this article, you’ll have the information you need to make an informed choice.

      • Openness/Sharing/Collaboration

        • Open Access/Content

          • NatureDataset of first appearances of the scholarly bibliographic references on Wikipedia articles

            Referencing scholarly documents as information sources on Wikipedia is important because it supports or improves the quality of Wikipedia content. Several studies have been conducted regarding scholarly references on Wikipedia; however, little is known of the editors and their edits contributing to add the scholarly references on Wikipedia. In this study, we develop a methodology to detect the oldest scholarly reference added to Wikipedia articles by which a certain paper is uniquely identifiable as the “first appearance of the scholarly reference.” We identified the first appearances of 923,894 scholarly references (611,119 unique DOIs) in 180,795 unique pages on English Wikipedia as of March 1, 2017 and stored them in the dataset. Moreover, we assessed the precision of the dataset, which was highly precise regardless of the research field. Finally, we demonstrate the potential of our dataset. This dataset is unique and attracts those who are interested in how the scholarly references on Wikipedia grew and which editors added them.

      • Programming/Development

    • Standards/Consortia

      • The Register UKAre we springing into a Y2K-class nightmare? [Ed: No, DST itself was the cause of many bugs and troubles. Throwing it out the window will, in due course, fix many issues and woes.]

        The US Senate has passed legislation aimed at making Daylight Saving Time permanent, leaving the country in the "spring forward" state from 2023.

        The practice of changing the clocks twice a year in the US dates back to the agrarian heyday of the early 1900s and has endured, despite regular grumbling. Clocks go forward an hour at the start of the year ("Spring forward") and go back towards the end ("Fall back"),a process that creates its own biannual chaos.

      • The Register UKITAM Forum launches standard for IT asset management ● The Register

        The ITAM Forum, the professional body for IT asset management, is in the final validation stage of an independent, globally recognized standard for understanding business technology assets.

        In a move designed to put admins in a stronger position when it comes to software license audits, the launch of the ISO/IEC 19770-1 certification scheme was developed by around 100 volunteering ITAM professionals and NEN, the Royal Netherlands Standardisation Institute.

      • uni HarvardStandardized APIs Could Finally Make It Easy to Exchange Health Records [Ed: As it stands at the moment, a lot of very sensitive data is being passed through nototrous espionage entities. Standards alone won't fix that.]

        Trying to access personal medical information has been an intermittent annoyance for most people in the United States — until Covid-19 came along with a reminder of what a mess it can be.

      • Quang Ninh, Vietnam Applies Electronic ISO-Standard Governance System
  • Leftovers

    • The Register UKDriver in Uber's self-driving car death goes on trial, says she feels 'betrayed'

      The name Rafaela Vasquez may not immediately be recogniseable, but the accident that ties her to the first-ever fatal self-driving car crash accident will be.

      Vasquez was the driver when one of Uber's autonomous test cars crashed into a woman walking her bike across the road at night in March 2018. Now nearly three years later, she is due to go on trial for negligent homicide, denies wrongdoing, and has spoken out for the first time.

    • IOTA Coordicide: Developer Hans Moog sees “breakthrough” on the way to decentralization - TheGWW.com

      In the official archive of IOTA, the term of “coordicide” was coined in November 2018 probably for the first time in a blog post . Under this working title, the IOTA Foundation has thus been working for years to abolish the central coordinator in Tanglenet and thus implement the iron principle of decentralization for cryptocurrencies in IOTA as well. Progress on Coordicide (IOTA 2.0) was announced at least as often as setbacks. Investors, meanwhile, increasingly understood that without decentralization, IOTA cannot stand a real chance with growth sectors of the crypto industry such as DeFi and smart contracts/DApps. Hans Moog, publicly perceived as the chief developer at IOTA, has now raised hopes for a happy ending via Twitter.

    • The Register UKAI drug algorithms can be flipped to invent bioweapons [Ed: Stop calling everything "Hey Hi"; some companies do so only to get patents on algorithms (it's a loophole by buzzwords)]

      AI algorithms designed to generate therapeutic drugs can be easily repurposed to invent lethal biochemical weapons, a US startup has warned.

      Experts have sounded alarm bells over the potential for machine-learning systems to be used for good and bad. Computer-vision tools can create digital art or deepfakes. Language models can produce poetry or toxic misinformation.

    • The AI beauty startup that champions transparency and inclusion [Ed: Buzzwords out of control.]
    • Public Schools in Telangana, India to Deploy AI [Ed: HEY HI nonsense again]
    • Science

      • Developing design tools for outer space structures - Purdue University News

        Achieving affordable space exploration will require lightweight structures for vehicles, solar arrays and antennas. Lightweight materials also will be used for components of structures like pressurized habitats, cryogenic tanks, landing gears and truss cages.

        The problem is that NASA envisions that many of those structures will be made from tailorable composite materials, but no design tool has been able to fully exploit the materials' full potential. AnalySwift LLC, a Purdue University-affiliated commercial software provider, and Wenbin Yu, a professor in Purdue’s School of Aeronautics and Astronautics, are conducting research to create one. Yu is the principal investigator. Liang Zhang of AnalySwift and Xin Liu of the University of Texas at Arlington are co-investigators.

    • Hardware

      • The Register UKIf you want to connect GPUs direct to SSDs for a speed boost, this could be it

        Nvidia, IBM, and university collaborators have a developed an architecture they say will provide fast fine-grain access to large amounts of data storage for GPU-accelerated applications, such as analytics and machine-learning training.

        Dubbed Big accelerator Memory, aka BaM, this is an interesting attempt to reduce the reliance of Nvidia graphics processors and similar hardware accelerators on general-purpose chips when it comes to accessing storage, which could improve capacity and performance.

      • The Register UKFord to sell unfinished Explorers as chip shortage bites

        Good news for those kept out of the seat of a new Ford Explorer by the chip shortage: you can get one now, with a slight catch.

        Speaking at a meeting of the National Automotive Dealers Association, Ford VP of sales Andrew Frick said his automaker was planning to ship Ford Explorers without rear seat HVAC controls. Luckily for children and pets, heat and air conditioning for the rear of the vehicle can still be controlled from the front.

        Buyers who decide to skip the wait will get an unspecified price break on a new Explorer, where they'll find a flat panel installed in place of the regular rear seat heating and cooling knobs.

      • The Register UKArm to drop up to 15 percent of staff – about 1,000 people [Ed: When you over-speculate about future success]

        Chip designer and licensor to the stars, Arm, has reportedly dropped around 1,000 workers onto unemployment queues.

        An email to staff from Arm CEO Rene Haas, seen and reported by the UK's Daily Telegraph, states: "To stay competitive, we need to remove duplication of work now that we are one Arm; stop work that is no longer critical to our future success; and think about how we get work done."

        Haas, who has been in the chief exec's chair for about a month, added Arm needs "to be more disciplined about our costs and where we're investing."

        "I write this knowing that although it is the right thing to do for Arm’s future, this is not going to be easy," he added.

        Between 12 and 15 per cent of staff will be let go as a result globally. The biz employs 6,400 worldwide.

      • The Register UKChina's top tech city, Shenzhen, locks down completely for at least a week

        The Chinese city of Shenzhen – the nation's tech hub – has gone into a week-long lockdown intended to slow an outbreak of COVID-19, and sent the world's tech-dependent industries into a whirlwind of worry about the impact on supply chains.

        [...]

        This matters because Shenzhen is a hub for China's technology and logistics industries. The city is home to Huawei, Tencent, and many other large tech companies - including Taiwan's Foxconn which has reportedly shut a pair factories at which iPhones are made. The famed Huaqiang Electronics World – a sprawling mall specializing in electronics components and accompanying online marketplace – is a top-tier sourcing option for any manufacturer. And plenty of manufacturers can be found in and around Shenzhen.

      • The Register UKStartups bag billions to fill gaps left by chip world giants

        Venture capitalists funneled billions into semiconductor startups in 2021, we're told, targeting designers of machine-learning technologies that fulfill specific or niche needs.

      • The Register UKChina's chip-making ambitions face setbacks ● The Register

        Trade restrictions, sanctions, and other challenges are putting a dampener on China's ambition to become a chip manufacturing hot spot.

        Research firm IC Insights is projecting the Chinese semiconductor foundry market share to remain flat through 2026, while rival manufacturers in the US, Taiwan, Korea, and other countries grow.

        Chip makers in China held an 8.5 percent market share in 2021 by revenue, and that will grow to just 8.8 percent in 2026.

    • Health/Nutrition/Agriculture

      • 'We took it to the real world€ and it worked': Rapid Zika testing platform clears hurdle with Brazil trial

        An international team of researchers, led by experts from the University of Toronto’s Leslie Dan Faculty of Pharmacy, has conducted one of the first field trials for a synthetic biology-based diagnostic platform that could provide rapid, de-centralized and low-cost patient testing for infectious diseases such as the Zika virus.

        The work, conducted on-site in Latin America, revealed the potential for the cell-free synthetic biology tools and companion hardware. Published in Nature Biomedical Engineering, the study’s results show that the novel diagnostic platform has analytical specificity and sensitivity equivalent to a U.S. Centres for Disease Control (CDC) PCR test for Zika and a diagnostic accuracy of 98.5 per cent with 268 patient samples collected in Recife, Brazil.

        The platform is also programmable and can be similarly applied to detect any pathogen sequence. In addition to validating highly accurate diagnostic results for Zika, the team also achieved similar diagnostic performance for chikungunya virus, another mosquito-borne arbovirus.

    • Integrity/Availability

      • Proprietary

        • The Register UKOpenness of Oracle licensing and audit tools questioned [Ed: Proprietary software has nothing to do with "openness"]

          Oracle customers can only use its licensing tools after the company has started to talk to them about software audits or offered license advice. Meanwhile, third-party tools that have been verified by Oracle do not help users in terms of license compliance.

        • The Register UKCISOs face 'perfect storm' of ransomware and state-supported cybercrime [Ed: This is primarily a Microsoft issue; ransomware affects Windows over 90% or over 95% of the time, depending on which companies surveys that]

          With not just ransomware gangs raiding network after network, but nation states consciously turning a blind eye to it, today's chief information security officers are caught in a "perfect storm," says Cybereason CSO Sam Curry.

        • The Register UKAMD confirms Ryzen chips' stuttering performance on Windows 10, 11 [Ed: Windows is technically worse than GNU/Linux, but Microsoft makes up for it by bribing everyone and resorting to other forms of corruption]

          AMD has confirmed there is a performance problem with some of its Zen-family processors and Microsoft's operating systems.

          Reports of stuttering performance under Windows 10 and 11 on some Ryzen systems have been rumbling for a while now and it appears the problem is lurking within Firmware Trusted Platform Module (fTPM) used in a number of AMD's chips.

        • The Register UKSingapore uncovers four critical vulnerabilities in Riverbed software

          Specifically, the insecure code is in Dynamic Sampling Agent, which is the collection component of AppInternals. Versions affected, according to a CVE record, include 10.x, versions prior to 12.13.0, and versions prior to 11.8.8. Aternity's advisory about the security holes is locked behind a customer login page. We've asked the vendor for more information.

        • Perfect Dark director leaves The Initiative [Ed: Microsoft kills everything it touches]
        • The Register UKSAP community website leaks member data to savvy users [Ed: SAP is not a community but a malicious proprietary software company that leaks out details of its serfs]

          A website for SAP's Customer Influence programs is exposing member data, creating the possibility for targeted social-engineering attacks.

          At the time of publication, the website is no longer accessible.

          The programs are designed to help customers and long-standing users make suggestions to SAP about how it can improve its products and add new features. Ideas for future development can be submitted, debated, and voted on before being taken up by the German software giant.

        • The Register UKGoogle Maps stopped working properly for hours ● The Register

          Google Maps Platform services went missing for a few hours on Friday as various APIs fell over.

          Around 0847 am PDT (1347 UTC), users of Google Maps Platform services began reporting problems. These surfaced on crowdsourced reporting sites like DownDetector.com and on the Maps Platform Status Page.

        • The Register UKUK criminal defense lawyer hadn't patched when ransomware hit [Ed: Microsoft TCO in action]

          Criminal defense law firm Tuckers Solicitors is facing a fine from the UK's data watchdog for failing to properly secure data that included information on case proceedings which was scooped up in a ransomware attack in 2020.

          [...]

          The Microsoft Exchange server was out of action and two days' worth of emails were lost, as detailed by the company blog at the time.

        • IT WireKaspersky CEO says no evidence for German warning about his firm [Ed: With proprietary software there is never evidence because it is secret and thus, by default, untrustworthy. Germany should be banning all software software, no matter its nationality.]

          A warning by the German Federal Office of Information Security against the use of Kaspersky products had no technical advice or objective evidence to back it up, the chief executive of the Russian security firm says.

        • The Register UKNew US law: Cyberattacks to be reported within 72 hours [Ed: They wrongly assume that each attack means a breach; this is the Microsoft mindset because its software is unsafe by design.]

          A US bill that would require critical infrastructure operators to report cyberattacks within 72 hours is headed to President Joe Biden's desk to be signed into law.

        • The Register UKCafePress fined for covering up 2019 customer info leak [Ed: When you outsource your shop]

          The FTC wants the former owner of CafePress to cough up $500,000 after the customizable merch bazaar not only tried to cover up a major computer security breach involving millions of netizens, it failed to safeguard customers' personal information.

          In a complaint [PDF] filed against CafePress former owner Residual Pumpkin Entity and PlanetArt, which bought the platform in 2020, the FTC alleges multiple instances of shoddy security practices at the online biz. In a settlement proposed by the US watchdog, Residual Pumpkin will pay up the half-million dollars.

        • The Register UKAzure flaw allowed users to control others' accounts [Ed: Only fools use clown computing. The biggest of fools choose Microsoft for that.]

          Microsoft has acknowledged the existence of a flaw in its Azure cloud computing service that allowed users full access to other users' accounts.

          The flaw was dubbed “AutoWarp” by Orca Security, which discovered and reported it.

          The vulnerability only impacted users of the Azure Automation Service. That service allows Azure users to use PowerShell or Python to write runbooks that automate many actions within Azure. "Trigger automation from ITSM, DevOps and monitoring systems to fulfil requests and ensure continuous delivery and management," suggests Microsoft’s product info page.

          The Automation Service doesn't let just anyone initiate actions on your Azure rig: you need to link it to a managed identity that has the relevant permissions.

        • The Register UKMicrosoft patches critical remote-code-exec hole in Exchange Server and others [Ed: Far more coverage about local privilege escalation in Linux than "remote-code-exec" in Microsoft (yes, remote; you don't need a user account)]
        • The Register UKMicrosoft slides ads into Windows Insiders' File Explorer [Ed: How to make Windows users even more brainwashed and dumber]

          Microsoft appears to be experimenting with more adverts in Windows 11 after eagle-eyed Insider users spotted helpful hints turning up in File Explorer.

          Windows Insider Florian posted a screenshot of the ads, and other unpaid testers said they noticed similar hints lurking in the Dev Channel build, with one ad suggesting users visit Microsoft's Office website to look at PowerPoint templates.

          Our sacrificial Dev Channel machine (currently running 22572.201 – yet another servicing pipeline test) does not show the messages, suggesting that Microsoft is performing some sort of A/B testing and we're simply not on the list.

        • The Register UKMicrosoft fixes OneDrive file reset bug on Windows ● The Register

          Lurking within this month's Patch Tuesday batch of updates is a fix for a Windows issue in which locally synchronized OneDrive data was not always deleted during a reset.

          The bug, which turned up in the Windows release health dashboard in February, is an ironic one, considering the disastrous October 2018 roll out of Windows 10, which infamously gave users extra disk space by quietly wiping their data.

          This latest issue, which hit both Windows 10 and 11, manifested for some users by letting locally synced OneDrive data linger even when a user selected the "remove everything" option during a reset. More seriously for administrators, the issue could also occur after a remote reset initiated by a Mobile Device Management (MDM) application (such as Intune, itself the subject of some news this week), thus defeating the point of the function.

        • Pseudo-Open Source

        • Security

          • InfoQSecuring the Open-Source Software Supply Chain [Ed: Brian Fox never talks about actual back doors in proprietary software; his company is basing its existence on spreading fear of Free software]

            Recent findings by security researchers at SonarSource showed multiple security vulnerabilities in popular package managers, including Pip, Yarn, Composer, and others. Package managers, though, are not the only weak link in the open source security chain. InfoQ has spoken with Sonatype CTO Brian Fox.

          • The HinduCareer in Ethical Hacking - The Hindu

            When we hear the term “hacking”, the first thing that comes to mind is that it is criminal. However, ethical or white hat hackers employ their expertise to discover and fix vulnerabilities and security hazards in a computer system. Today, it is critical to safeguard vital data held on electronic devices such as computers, smartphones, tablets, and so on. Ethical hacking may be an effective tool against cyber attackers in this regard. Ethical hacking is defined as hacking done with the authorisation of the network's owners.

          • Hindustan TimesCyberattack on Israel! Government websites crash [Ed: The article mentions Shadow Brokers; it's the cost of using Microsoft Windows]
          • The Register UKNASA in 'serious jeopardy' due to big black hole in security ● The Register

            And that's a worry, because in 2021 NASA's auditor found "incidents of improper use of NASA IT systems had increased from 249 in 2017 to 1,103 in 2020 – a 343 per cent growth; the most prevalent error was failing to protect Sensitive but unclassified (SBU) information."

          • The Register UKChina thrilled it captured already-leaked NSA cyber-weapon [Ed: NSA and its partners, like Microsoft, are the world's biggest threat to security because they actively undermine it]

            China claims it has obtained malware used by the NSA to steal files, monitor and redirect network traffic, and remotely control computers to spy on foreign targets.

            The software nasty, dubbed NOPEN, is built to commandeer selected Unix and Linux systems, according to Chinese Communist Party tabloid Global Times, which today cited a report it got exclusively from China's National Computer Virus Emergency Response Center.

            Trouble is, NOPEN was among the files publicly leaked in 2016 by the Shadow Brokers. If you can recall back that far, the Shadow Brokers stole and dumped online malware developed by the NSA's Equation Group.

          • Exclusive: China captures powerful US NSA cyberspy tool [Ed: By undermining the security of everything the US has weaponised all of technology and other countries can take advantage]

            China captured a spy tool deployed by the US National Security Agency, which is capable of lurking in a victim's computer to access sensitive information and was found to have controlled global internet equipment and stole large amounts of users' information, according to a report the Global Times obtained from the National Computer Virus Emergency Response Center exclusively on Monday.

            According to the report, the Trojan horse, "NOPEN," is a remote control tool for Unix/Linux computer systems. It is mainly used for stealing files, accessing systems, redirecting network communication, and viewing a target device's information.

          • A first look at threat intelligence and threat hunting tools | WeLiveSecurity

            An overview of some of the most popular open-source tools for threat intelligence and threat hunting

          • The Register UKAnother data-leaking Spectre bug found, smashes Intel, Arm defenses

            Intel this month published an advisory to address a novel Spectre v2 vulnerability in its processors that can be exploited by malware to steal data from memory that should otherwise be off limits.

            Arm said a number of its processor cores are also affected by this security flaw, and like Intel, its hardware defenses can't block it outright, leaving developers to implement software-level mitigations.

          • CSODeveloper sabotages own npm module prompting open-source supply chain security questions [Ed: Misses the point that Microsoft was shipping this malware]

            The node-ipc developer attempt to protest Russia's attack on Ukraine has the unintended consequence of casting more doubt in software supply chain integrity.

          • The Register UKExotic Lily is a business-like access broker for ransomware gangs [Ed: Microsoft Windows TCO]

            TAG initially detected Exotic Lily – which the researchers describe as a "resourceful, financially motivated threat actor" – in September 2021 exploiting a zero-day flaw in Microsoft MSHTML (tracked as CVE-2021-40444). Further investigation discovered that the group was acting as an IAB working with a Russian gang known as FIN12 by cybersecurity vendors Mandiant and FireEye, Wizard Spider by CrowdStrike, and DEV-0193 by Microsoft.

          • The Register UKLinux botnet exploits Log4j flaw to hijack Arm, x86 systems [Ed: If you refused to patch your system for over 3 months]

            Researchers at Chinese internet security company Qihoo's 360's Network Security Research Lab discovered the botnet family, which they dubbed B1txor20, as it was infecting hosts via the Log4j vulnerability. It primarily targets Linux Arm and 64-bit x86 systems. Compromised devices are commandeered, and brought into the network as remote-control bots, hence the term botnet.

          • The Register UKCyclops Blink malware sets up shop in ASUS routers ● The Register

            It's not clear exactly right now how the malware gets onto a device, though it probably involves exploiting a default admin password to gain access via an enabled remote management service. According to Trend Micro's Cyclops Blink technical analysis, once the modular malware, written in C, has been injected into the gateway and is running, it sets itself up and renames its process to "[ktest]" presumably to appear as a Linux kernel thread.

          • The Register UKOpenSSL patches crash-me bug triggered by rogue certs

            A bug in OpenSSL certificate parsing leaves systems open to denial-of-service attacks from anyone wielding an explicit curve.

            The vulnerability stems from a bug in the BN_mod_sqrt() function, which the OpenSSL team said is used to parse certificates that "contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form." As it turns out, all you need to do to trigger an infinite loop in BN_mod_sqrt() is hand an OpenSSL-based application or service a certificate with invalid explicit curve parameters.

            This parsing happens prior to verification of the certificate's signature. Slip a bad certificate to any app or server using BN_mod_sqrt() to parse certs, and the software will get caught in the loop and stop working.

          • The Register UKReg reader blasts Virgin Media's email password policy ● The Register

            A Register reader has raised concerns over UK ISP Virgin Media's password policies after discovering he couldn't set a password longer than 10 characters or one that includes non-alphanumeric characters.

            Our reader Nick told us he was facing repeated attempts to take control of an @virgin.net email account he owns – adding that the company's password policy left him vulnerable to what he described as a sustained brute-forcing attack.

          • The Register UKQuantum computing cybersecurity research gets $715k grant ● The Register

            America's National Science Foundation has signaled yet again how important it thinks quantum computing is with a six-figure grant to Penn State.

            The $715,000 grant is heading to Swaroop Ghosh, associate professor at Penn State School of Electrical Engineering and Computer Science. Ghosh plans to use the funding to close gaps in quantum computing security and create a post-secondary quantum computing curriculum.

          • Fear, Uncertainty, Doubt/Fear-mongering/Dramatisation

          • Privacy/Surveillance

            • IT WireOpen slather as ABC leaks data to Google, Facebook, Tealium et al

              The ABC's claim to being the most trusted news site in Australia has come under serious doubt following the release of a video that shows how the data of users, logged in or not, is being leaked to a number of commercial outlets.

              Researcher Vanessa Teague, one of the few technical experts to raise objections to the ABC's imposition of logins for iview users, pointed out on Wednesday that the ABC news website was also leaking data to the likes of Google, Facebook, Chartbeat and Tealium.

            • The Register UKRussia labels Meta an 'extremist' organization, bans Instagram

              Russia's Investigative Committee, the nation's peak criminal and anti-corruption investigation body, has opened a probe into whether Meta is an extremist organization.

              The move follows Meta's decision last week to relax rules about exhortations to commit violence posted to its Facebook and Instagram properties – but only within Ukraine.

            • The Register UKHear us out: Smartphone lidar can test blood, milk

              Could the light detection and ranging (lidar) sensors in your future smartphone take the place of laboratory equipment in health and food safety applications? It's looking like a possibility.

              Researchers at the University of Washington reckon handset lidar can determine fluid properties, sparing you from having to use expensive lab gear. The amount of liquid needed for a smartphone lidar test is significantly less than that for a medical lab, too, they said.

            • Five fascinating inventions by schoolchildren [Ed: Surveillance creeps in. See photo.]

              The Aliartos Vocational Night School employs a central system designed by its students that makes sure physical distancing rules are being observed.

    • Environment

      • Wildlife/Nature

        • Orcas’ Scars Tell a Story

          When southern resident killer whales off the coast of British Columbia and Washington state surface for breath, they show off pointy dorsal fins and their iconic black-and-white colouration. But a closer inspection can reveal white scars scratched onto their otherwise sleek backs. These scars are from bite marks — “tooth rakes” — inflicted during skirmishes with other killer whales.

    • Finance

      • The Register UKFujitsu: Dumping older workers will wipe out quarter of forecast profit

        Fujitsu has warned investors its full-year profits will fall 23.6 per cent below previous forecasts because it's extended an offer for older workers to leave in favor of youngsters more likely to deliver the DX, or "digital experience," customers demand.

        A Tuesday announcement was uncommonly blunt about the Japanese giant's intentions, stating: "As part of its human resources initiatives to strengthen its status as a DX company, Fujitsu will temporarily expand its 'Self-Produce Support System' to support employees seeking career course redirection outside of the Fujitsu Group."

        Only staffers aged 50 or over are eligible for the offer of "career course redirection." Fujitsu says 3,031 people have already applied for the scheme as of February 28. Most are executives or workers who have been rehired after already retiring once.

      • Chronicle Of Higher EducationThe Money Pit [Ed: There's more money in misleading people than in educating them properly]

        Nothing seemed amiss to McKenna Schramm when Ohio Valley University recruited her to run track. The campus tour had all the standard trappings: a walk-through of the dorms, a stop at the cafeteria, and a visit to the campus chapel. The admissions letter, dated January 8, 2020, looked a lot like the ones she’d received from other colleges.

    • Censorship/Free Speech

      • NewYorkTimesFirst Amendment Scholars Want to See the Media Lose These Cases - The New York Times

        The lawyers and First Amendment scholars who have made it their life’s work to defend the well-established but newly threatened constitutional protections for journalists don’t usually root for the media to lose in court.

        But that’s what is happening with a series of recent defamation lawsuits against right-wing outlets that legal experts say could be the most significant libel litigation in recent memory.

        The suits, which are being argued in several state and federal courts, accuse Project Veritas, Fox News, The Gateway Pundit, One America News and others of intentionally promoting and profiting from false claims of voter fraud during the 2020 election, and of smearing innocent civil servants and businesses in the process.

      • TechRadarThe Russian exile who found a way past Putin's internet firewall | TechRadar

        Aleksandr Litreev wants to preserve access to the free and open internet for people living under authoritarian rule.

    • Civil Rights/Policing

      • NewYorkTimesCourt Declares Isaiah Andrews Wrongfully Imprisoned for 45 Years - The New York Times

        The official declaration this week means that Isaiah Andrews, 84, can seek damages from the State of Ohio for spending more than half his life in prison after being wrongly convicted of killing his wife.

      • The Register UKChina declares a new era of digitization has begun [Ed: Oppression is going digital, and not just in China]

        A document posted by the Cyberspace Administration of China (CAC) quotes Xi as saying "informatization has brought a once-in-a-lifetime opportunity to the Chinese nation" and outlines a range of digital transformation tasks that must be achieved under the 14th five year plan (2021–2026) to achieve the desired level of digitization.

    • Internet Policy/Net Neutrality

      • The Register UKInternet backbone Cogent cuts Russia connectivity

        Cogent Communications will pull the plug on its connectivity to customers in Russia in response to President Putin's invasion of Ukraine.

        The US-based biz is one of the planet's largest internet backbones – the freeways of the internet – and says it carries roughly a quarter of global 'net traffic.

        Its clients range from small businesses to mobile carriers and broadband ISPs. Cogent's role is to pipe hundreds of terabits of your internet data around the world every second. Russian state-owned Rostelecom is among the dozens of customers Cogent has in the country.

      • The Register UKNominet suspends 'single digit' number of Russian dot-UK domain registrars [Ed: The integrity of the Internet is under attack]

        Nominet, the dot-UK domain registry, has announced that it will suspend services for Russian web domain registrars – and the British government says it "welcomes" the action.

        Suspension will prevent the registrars from managing or renewing dot-UK domains they own or control.

        "We are not accepting registrations from registrars in Russia – we are suspending the relevant tags. To avoid compromising outlets for expression outside the control of the regime, the very small number of domains with Russian address details will continue to operate as normal," said the organisation in a statement on its website.

      • The Register UKRussia hasn't yet enabled its splinternet amid Ukraine war ● The Register

        Russia has reportedly blocked access to Western media outlets including the BBC to netizens within its borders, as suspicions rise that the country has begun implementing a "splinternet" plan to seal itself off from the wider internet.

        This morning the British state broadcaster declared it had been blocked from inside Russia, using also-blocked Twitter to spread the news among Westerners, and signposted web users to a long-forgotten Tor mirror of itself. The BBC launched two new shortwave frequencies in the region earlier this week to broadcast four hours of World Service English news a day. These frequencies can be received clearly in Kyiv and parts of Russia.

        The Beeb is not alone; other Western news outlets including Germany's Deutsche Welle, Voice of America, US-sponsored Radio Free Europe and others have also been blocked.

        Although the Reuters financial newswire cited an order of Roskomnadzor, the Russian equivalent of Britain's Ofcom media regulator, the Roskomnadzor blocked site checker returned no information about BBC.com when checked by The Register at the time of writing.

        [...]

        Tor is designed to frustrate censorship by bouncing user traffic through a number of relay nodes, disguising its true origins and destinations. Should the Russians try and shut down Western Tor-hosted websites, they're likely to fail – but previous efforts to arrest local exit node operators have borne some fruit.

        Tor exit relays have long been a target, not only for law enforcement agencies in the West as well as authoritarian countries, but also those who would log and track exit node users – and, inevitably, cryptocurrency scammers.

    • Digital Restrictions (DRM)

      • The Register UKDeere unlawfully withholds repair tools and info, FTC told ● The Register

        Twelve farm labor, advocacy, and repair groups filed a complaint last week with the US Federal Trade Commission claiming that agricultural equipment maker Deere & Company has unlawfully refused to provide the software and technical data necessary to repair its machinery.

        The groups include National Farmers Union, Iowa Farmers Union, Missouri Farmers Union, Montana Farmers Union, Nebraska Farmers Union, Ohio Farmers Union, Wisconsin Farmers Union, Farm Action, the U.S. Public Interest Research Group, the Illinois Public Interest Research Group, the Digital Right to Repair Coalition, and iFixit.

    • Monopolies

      • The Register UKTaiwan rounds up 60 Chinese tech workers on suspicion of poaching tech and people

        Taiwan's Ministry of Justice has tasked its Investigation Bureau to conduct a series of raids around the island and hauled in 60 Chinese nationals suspected of lifting trade secrets or poaching talent from China-owned firms.

        The raids took place on Wednesday March 9, with over 100 investigators dispatched to 14 locations in four Taiwanese cities. Some of the companies searched include Advanced Manufacturing EDA Co., Bouson International, Vimicro, Beijing Yinxing Technology, VeriSilicon, Analogix Semiconductor, Key Technology, and GLC Semiconductor.

      • The Register UKITC judge recommends banning toner imports that infringe Canon's IP [Ed: Canon has no "IP"; the media uses propaganda terms]

        A bunch of toner manufacturers and sellers have infringed on Japanese electronics outfit Canon's patents, according to an initial finding from the US International Trade Commission (ITC), with a judge recommending imports of their products be banned.

        The notice [PDF] from an administrative law judge this week said an Initial Determination (ID) was made on Tuesday 15 March, finding that "certain toner supply containers" violated Section 337.



Recent Techrights' Posts

Deny the Shopping Holiday, Celebrate the Real Holiday
Buy Nothing Day
The Linux Foundation (Fronting for Microsoft and Bill Gates, Not Linux) Makes Cyberspace Less Secure
Security is not the goal
[Meme] The Most Important Things When Committing Crimes
pronouns
 
CNX Software Selling Out to Microsoft For Deny Friday
Hardly the first time they do this
Links 28/11/2024: F.T.C. Launches Antitrust Investigation Into Microsoft, Bluesky Concerns
Links for the day
Gemini Links 28/11/2024: Fighting Evil and Games With “Content”
Links for the day
Microsoft Canonical: Proprietary Spyware in 'Community' Clothing
Some years ago Canonical decided to restore the mere appearance of being run like a democracy or a community
Stories About Microsoft and "Hey Hi" (LLMs Actually) 'Written' by Microsoft "Hey Hi" Chatbots With 'Linux' Thrown in for SEO Purposes
self-promotional Microsoft nonsense
Links 28/11/2024: Pakistan Turmoil, TuxCare Changes, and More 'Open'AI Problems
Links for the day
Links 28/11/2024: Privacy, DNS, and Python
Links for the day
[Meme] When Social Control Media is Over
Any deathbed regrets?
Death of Human Interaction
How much are future generations being "damaged" by premature introduction of skinnerboxes and, perhaps more importantly, is there any "safe" age?
Dr. Andy Farnell: "Electronic Voting" is a Solution to a Problem That Doesn't Exist
The arguments are similar to ones that we've made for years
The EPO's General Consultative Committee (GCC) Meeting Last Month Sought to Remove Genders (But It's Nearly Impossible in French and German)
there are so many major problems at the EPO; this one seems like a minor distraction and perhaps one that suits corrupt management (misdirection of anger)
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Wednesday, November 27, 2024
IRC logs for Wednesday, November 27, 2024
Links 27/11/2024: “Writing Month”, "Cybertorture", and Qualcomm Trouble
Links for the day
Gemini Links 27/11/2024: How the Exoteric Relates to the Esoteric, a Look at BASIC
Links for the day
Materialistic Culture of Fake Possessions and Fake Popularity
Fake popularity is part of a "chicken and egg" thing
If the Reputation of the European Union for Rule of Law Has Diminished, Blame EPO and the German (Also the Dutch) Government for Facilitating It
We'll soon publish some new EPO material
[Meme] Same Thing, Different Job Title
"Server sysadmin; Clown computing consultant"
Imagine Patents on Musical Compositions and Cooking Recipes
The very existence of software patents must come to an end
"Latest Technology News" in BetaNews is Press Release SPAM (or LLM Slop, Marketing, Fake 'Review')
What they call "reviews" are just ads
[Meme] Kramer is Done
Devuan is turning 10
There Are More Devuan-Based Distros of GNU/Linux Each Year
"The Veteran Unix Admin collective salutes you"
Go Offline for a Bit
yup!
Windows Falls to All-Time Low (12%) in Gabon
Gabon's data from statCounter shows this
[Meme] When Words Come to Mean the Opposite
"Keep the 'dumb' stuff, be smart about it"
In Defence of Analog (Sometimes Digital and/or "Smart" is Objectively a Lot Worse)
This past weekend (2-3 days) I spent a few hours per day saving us 250 - 400 pounds in repair bills
It Takes Microsoft Over a Day to Restore 'Microsoft 365' (360, 5 Days of Downtime)
Microsoft/Windows TCO will always be huge
[Meme] In Some Countries, Android (Linux) is Already 'the Standard'
"Wait. Sorry, we don't do Windows here, we barely use laptops."
In Gambia, According to statCounter, Windows "Market Share" is Down to 3%
in some countries Windows is already down to 1%
In Defence of CDs...
Let's say that some environmentalists focus only on visible things like plastics
This Holiday Season Dump Companies That Offload Everything to Skinnerbox "Apps", Un-Encrypted E-mail, and 'Webapps' (Proprietary JS Applications in 'Web Site' Clothing)
bot disservice
The Web is Becoming Social Control Media Junk and Fake Text Crafted by Machines (Boosted by Social Control Media via Bots Which Game Visibility/Popularity)
The misinformation machines are being increasingly automated to promote dictators and bigots
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Tuesday, November 26, 2024
IRC logs for Tuesday, November 26, 2024
When Social Control Media in the European Union is Controlled by BRICS
Who controls TikTok?
Links 27/11/2024: Zoom Waning (Stock Falls), More Microsoft Shutdowns, and European Commission Flags Bluesky for Breaches
Links for the day
Gemini Links 26/11/2024: Disease, Vibrations, and Grief
Links for the day
Links 26/11/2024: Microsoft 360 Users Report Outages, Attacks on Journalists Plentiful Worldwide
Links for the day
Same Month Judge Suggests Selling Chrome (Compelling Google to Give It Away) Chrome Surpasses Two-Thirds of "The Market", Based on Surveyor
tackling Google's browser monoculture is still a priority
[Meme] Trying to Terrorise Critics
How Microsofters roll...
Illegitimi Non Carborundum
If you try to suppress our publication, we'll not just bark back but also bite
Why This Site Became "Simple" a Year Ago
Light is good, heavy is bad
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, November 25, 2024
IRC logs for Monday, November 25, 2024
Links 26/11/2024: International Microsoft Outages, Microsoft Mass Layoffs Bigger Than Reported Last Friday
Links for the day, Deutsche Welle and CBC focus
Gemini Links 26/11/2024: Not Pagan, Emacs Wiki, and More
Links for the day