Bonum Certa Men Certa

Links 19/3/2022: Raspberry Pi Project Ideas



  • GNU/Linux

    • Server

      • TechTargetNeed a replacement? Try these 5 Docker alternatives

        After more than a decade in use, Docker remains the de facto container standard because of its ability to integrate with a broad array of tools and platforms, such as Kubernetes. However, business changes at Docker and market forces have prompted organizations to search for new containerization options.

    • Kernel Space

      • LinuxiacAsahi Linux Reaches Alpha Milestone, Brings Linux to M1 Macs
        The development of Asahi Linux for Macs equipped with Apple chips is in full swing. For those of you unaware, Asahi Linux is a project and community dedicated to bringing Linux to Apple Silicon Macs, beginning with the 2020 M1 Mac Mini, MacBook Air, and MacBook Pro.

        As you know, the M1 is Apple’s custom Arm-based SoC which started showing on Macs in 2020 after ditching Intel’s x86 silicon chip. Because the M1 is Apple’s most powerful chip, it’s easy to see why developers are interested in porting Linux to it and running programs like Proton, which would turn the Mac into a powerful gaming PC.

      • LWNLinux 5.16.16
        I'm announcing the release of the 5.16.16 kernel.
        
        

        All users of the 5.16 kernel series must upgrade.

        The updated 5.16.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.16.y and can be browsed at the normal kernel.org git web browser: https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...

        thanks,

        greg k-h
      • LWNLinux 5.15.30
      • LWNLinux 5.10.107
      • LWNLinux 5.4.186
    • Applications

      • Linux LinksBest Free and Open Source Alternative to Apple Bonjour - LinuxLinks

        Apple, Microsoft, Alphabet (Google’s parent), Amazon and Facebook dominate the tech landscape. Their dominance is so broad they account for more than 20% of the S&P 500.

        There are many things to admire about Apple’s hardware and software. Apple make great looking (albeit expensive) hardware. Over the years key successes include the iPhone, iPad, iPod, and the MacBook Air. The company designs its own hardware and software. This gives them the power to make an operating system and suite of apps that are tailor-made and optimized for their hardware. Apple also operates the Apple Music and Apple TV media distribution platforms.

        Mac OS X is Apple’s proprietary operating system for its line of Macintosh computers. Its interface, known as Aqua, is highly polished and built on top of a BSD derivative (Darwin). There’s a whole raft of proprietary applications that are developed by Apple for their operating software. This software is not available for Linux and there’s no prospect of that position changing.

        In 2020, Apple began the Apple silicon transition, using self-designed, 64-bit ARM-based Apple M1 processors on new Mac computers. Maybe it’s the perfect time to move away from the proprietary world of Apple, and embrace the open source Linux scene.

      • Make Use OfSnap vs. AppImage vs. Flatpak: What Is the Difference and Which Is Best for You?

        Linux systems are popular for many reasons, but installing applications is not one of them. Apps in Linux are delivered as packages and come in all sorts of flavors. Packaging systems differ in terms of installation, usability, and update mechanisms.

        Below, we'll look at and compare three prominent package formats: Snap, AppImage, and Flatpak, all distro independent.

    • Instructionals/Technical

      • Make Use OfA Guide to MySQL for Beginners

        MySQL is an open-source relational database management system with support for Structured Query Language (SQL). It helps in the development of a wide range of web-based applications and online content. MySQL runs on all OS platforms like Linux/UNIX, macOS, Windows and is an important component of the LAMP stack.

        MySQL is one of the most popular database systems and many cloud providers offer it as part of their service. It uses commands with queries and data to perform tasks and functions by communicating with the database. This article covers the most commonly used MySQL statements that allow users to efficiently work with databases.

      • How to Run Grafana In a Docker Container – CloudSavvy IT

        Grafana is a leading observability platform for metrics visualization. It lets you build bespoke dashboards to surface meaningful insights from your application’s real-time data streams.

        Grafana’s a cloud-native application that’s ready to be launched on popular infrastructure providers, installed on your own hardware, or deployed as a standalone container. In this guide we’ll focus on the latter choice by using the official Grafana image to start an instance that runs in Docker.

      • ID RootHow To Install MariaDB on Manjaro 21 - idroot

        In this tutorial, we will show you how to install MariaDB on Manjaro 21. For those of you who didn’t know, MariaDB is a free and open-source relational database management system (DBMS) that is considered as a successor and replacement of MySQL DBMS. MariaDB is fully compatible with the MySQL database and is widely used as a database server in the LAMP and LEMP stack.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the MariaDB database on a Manjaro 21 (Ornara).

      • GNU Linux Debian 11 – how to upgrade php7 to php8.1 – logo
    • Desktop Environments/WMs

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Web Browsers

        • The Register UKThis browser-in-the-browser attack is perfect for phishing ● The Register

          A novel way of tricking people out of their passwords has left us wondering if there's a need to rethink how much we trust our web browsers to protect us and to accelerate efforts to close web security gaps.

          Earlier this week, an infosec researcher known as mr.d0x described a browser-in-the-browser (BitB) attack. It's a way to steal login credentials by simulating the little browser windows that Google, Microsoft, and other authentication service providers pop up that ask you for your username and password to continue. You've probably seen these windows: you click on something like a "Sign in with Microsoft" button on a website, and popup appears asking for your credentials to access your account or profile.

          Services like Google Sign-In will display a Google URL in the popup window navigation bar, which offers some reassurance that the login service is actually coming from a trusted company and not an unknown one. And bypassing defenses built into the user's browser to fool them into trusting a malicious page tends to be difficult in the absence of an exploitable vulnerability, thanks to browser security mechanisms including Content Security Policy settings and the Same-origin policy security model.

        • The Register UKBrave takes the spring out of creepy bounce tracking [Ed: Brave is not privacy but a belief system]

          Browser maker Brave has developed a new way to ground "bounce tracking," a sneaky technique for bypassing privacy defenses in order to track people across different websites.

          Bounce tracking, also known as redirect tracking, dates back at least to 2014 when ad companies were looking for ways to avoid third-party cookie blocking defenses.

          "Bounce tracking is a way for trackers to track you even if browser-level privacy protections are in place," explained Peter Snyder, senior director of privacy at Brave, on Tuesday.

      • SaaS/Back End/Databases

        • The Register UKIBM Cloudant ends backing of FoundationDB version of CouchDB ● The Register

          The IBM Cloudant software team has decided to pull the plug on its push to create a new database engine underlying Apache CouchDB, the NoSQL document store used by the BBC, Apple and atomic research facility CERN.

          In a post on the Apache list, Robert Newson, former IBM Cloudant employee and Apache CouchDB Project Management Committee member, explained that IBM Cloudant had supported a plan to "build a next-generation version of CouchDB using the FoundationDB database engine as its new base."

        • The Register UKMongoDB to terminate Russian SaaS accounts [Ed: It probably has no Russian customers or barely any (but this is a PR stunt)]

          NoSQL database challenger MongoDB has decided it won't sell its wares in Russia – not even its software-as-a-service offering.

      • Content Management Systems (CMS)

        • Make Use OfWordPress.com vs. WordPress.org: What's the Difference?

          Starting a new website? From writing raw code to using content management systems like WordPress or website builders like Squarespace, Wix, and Weebly, there are tons of ways to get your website up and running.

          The most popular tool these days, however, is WordPress. Once you’ve settled on using WordPress, you’ll have another choice to make. Should you use WordPress.com or WordPress.org?

          There isn’t a yes or no answer to this—but once you’ve read through this article, you’ll have the information you need to make an informed choice.

      • Openness/Sharing/Collaboration

        • Open Access/Content

          • NatureDataset of first appearances of the scholarly bibliographic references on Wikipedia articles

            Referencing scholarly documents as information sources on Wikipedia is important because it supports or improves the quality of Wikipedia content. Several studies have been conducted regarding scholarly references on Wikipedia; however, little is known of the editors and their edits contributing to add the scholarly references on Wikipedia. In this study, we develop a methodology to detect the oldest scholarly reference added to Wikipedia articles by which a certain paper is uniquely identifiable as the “first appearance of the scholarly reference.” We identified the first appearances of 923,894 scholarly references (611,119 unique DOIs) in 180,795 unique pages on English Wikipedia as of March 1, 2017 and stored them in the dataset. Moreover, we assessed the precision of the dataset, which was highly precise regardless of the research field. Finally, we demonstrate the potential of our dataset. This dataset is unique and attracts those who are interested in how the scholarly references on Wikipedia grew and which editors added them.

      • Programming/Development

    • Standards/Consortia

      • The Register UKAre we springing into a Y2K-class nightmare? [Ed: No, DST itself was the cause of many bugs and troubles. Throwing it out the window will, in due course, fix many issues and woes.]

        The US Senate has passed legislation aimed at making Daylight Saving Time permanent, leaving the country in the "spring forward" state from 2023.

        The practice of changing the clocks twice a year in the US dates back to the agrarian heyday of the early 1900s and has endured, despite regular grumbling. Clocks go forward an hour at the start of the year ("Spring forward") and go back towards the end ("Fall back"),a process that creates its own biannual chaos.

      • The Register UKITAM Forum launches standard for IT asset management ● The Register

        The ITAM Forum, the professional body for IT asset management, is in the final validation stage of an independent, globally recognized standard for understanding business technology assets.

        In a move designed to put admins in a stronger position when it comes to software license audits, the launch of the ISO/IEC 19770-1 certification scheme was developed by around 100 volunteering ITAM professionals and NEN, the Royal Netherlands Standardisation Institute.

      • uni HarvardStandardized APIs Could Finally Make It Easy to Exchange Health Records [Ed: As it stands at the moment, a lot of very sensitive data is being passed through nototrous espionage entities. Standards alone won't fix that.]

        Trying to access personal medical information has been an intermittent annoyance for most people in the United States — until Covid-19 came along with a reminder of what a mess it can be.

      • Quang Ninh, Vietnam Applies Electronic ISO-Standard Governance System
  • Leftovers

    • The Register UKDriver in Uber's self-driving car death goes on trial, says she feels 'betrayed'

      The name Rafaela Vasquez may not immediately be recogniseable, but the accident that ties her to the first-ever fatal self-driving car crash accident will be.

      Vasquez was the driver when one of Uber's autonomous test cars crashed into a woman walking her bike across the road at night in March 2018. Now nearly three years later, she is due to go on trial for negligent homicide, denies wrongdoing, and has spoken out for the first time.

    • IOTA Coordicide: Developer Hans Moog sees “breakthrough” on the way to decentralization - TheGWW.com

      In the official archive of IOTA, the term of “coordicide” was coined in November 2018 probably for the first time in a blog post . Under this working title, the IOTA Foundation has thus been working for years to abolish the central coordinator in Tanglenet and thus implement the iron principle of decentralization for cryptocurrencies in IOTA as well. Progress on Coordicide (IOTA 2.0) was announced at least as often as setbacks. Investors, meanwhile, increasingly understood that without decentralization, IOTA cannot stand a real chance with growth sectors of the crypto industry such as DeFi and smart contracts/DApps. Hans Moog, publicly perceived as the chief developer at IOTA, has now raised hopes for a happy ending via Twitter.

    • The Register UKAI drug algorithms can be flipped to invent bioweapons [Ed: Stop calling everything "Hey Hi"; some companies do so only to get patents on algorithms (it's a loophole by buzzwords)]

      AI algorithms designed to generate therapeutic drugs can be easily repurposed to invent lethal biochemical weapons, a US startup has warned.

      Experts have sounded alarm bells over the potential for machine-learning systems to be used for good and bad. Computer-vision tools can create digital art or deepfakes. Language models can produce poetry or toxic misinformation.

    • The AI beauty startup that champions transparency and inclusion [Ed: Buzzwords out of control.]
    • Public Schools in Telangana, India to Deploy AI [Ed: HEY HI nonsense again]
    • Science

      • Developing design tools for outer space structures - Purdue University News

        Achieving affordable space exploration will require lightweight structures for vehicles, solar arrays and antennas. Lightweight materials also will be used for components of structures like pressurized habitats, cryogenic tanks, landing gears and truss cages.

        The problem is that NASA envisions that many of those structures will be made from tailorable composite materials, but no design tool has been able to fully exploit the materials' full potential. AnalySwift LLC, a Purdue University-affiliated commercial software provider, and Wenbin Yu, a professor in Purdue’s School of Aeronautics and Astronautics, are conducting research to create one. Yu is the principal investigator. Liang Zhang of AnalySwift and Xin Liu of the University of Texas at Arlington are co-investigators.

    • Hardware

      • The Register UKIf you want to connect GPUs direct to SSDs for a speed boost, this could be it

        Nvidia, IBM, and university collaborators have a developed an architecture they say will provide fast fine-grain access to large amounts of data storage for GPU-accelerated applications, such as analytics and machine-learning training.

        Dubbed Big accelerator Memory, aka BaM, this is an interesting attempt to reduce the reliance of Nvidia graphics processors and similar hardware accelerators on general-purpose chips when it comes to accessing storage, which could improve capacity and performance.

      • The Register UKFord to sell unfinished Explorers as chip shortage bites

        Good news for those kept out of the seat of a new Ford Explorer by the chip shortage: you can get one now, with a slight catch.

        Speaking at a meeting of the National Automotive Dealers Association, Ford VP of sales Andrew Frick said his automaker was planning to ship Ford Explorers without rear seat HVAC controls. Luckily for children and pets, heat and air conditioning for the rear of the vehicle can still be controlled from the front.

        Buyers who decide to skip the wait will get an unspecified price break on a new Explorer, where they'll find a flat panel installed in place of the regular rear seat heating and cooling knobs.

      • The Register UKArm to drop up to 15 percent of staff – about 1,000 people [Ed: When you over-speculate about future success]

        Chip designer and licensor to the stars, Arm, has reportedly dropped around 1,000 workers onto unemployment queues.

        An email to staff from Arm CEO Rene Haas, seen and reported by the UK's Daily Telegraph, states: "To stay competitive, we need to remove duplication of work now that we are one Arm; stop work that is no longer critical to our future success; and think about how we get work done."

        Haas, who has been in the chief exec's chair for about a month, added Arm needs "to be more disciplined about our costs and where we're investing."

        "I write this knowing that although it is the right thing to do for Arm’s future, this is not going to be easy," he added.

        Between 12 and 15 per cent of staff will be let go as a result globally. The biz employs 6,400 worldwide.

      • The Register UKChina's top tech city, Shenzhen, locks down completely for at least a week

        The Chinese city of Shenzhen – the nation's tech hub – has gone into a week-long lockdown intended to slow an outbreak of COVID-19, and sent the world's tech-dependent industries into a whirlwind of worry about the impact on supply chains.

        [...]

        This matters because Shenzhen is a hub for China's technology and logistics industries. The city is home to Huawei, Tencent, and many other large tech companies - including Taiwan's Foxconn which has reportedly shut a pair factories at which iPhones are made. The famed Huaqiang Electronics World – a sprawling mall specializing in electronics components and accompanying online marketplace – is a top-tier sourcing option for any manufacturer. And plenty of manufacturers can be found in and around Shenzhen.

      • The Register UKStartups bag billions to fill gaps left by chip world giants

        Venture capitalists funneled billions into semiconductor startups in 2021, we're told, targeting designers of machine-learning technologies that fulfill specific or niche needs.

      • The Register UKChina's chip-making ambitions face setbacks ● The Register

        Trade restrictions, sanctions, and other challenges are putting a dampener on China's ambition to become a chip manufacturing hot spot.

        Research firm IC Insights is projecting the Chinese semiconductor foundry market share to remain flat through 2026, while rival manufacturers in the US, Taiwan, Korea, and other countries grow.

        Chip makers in China held an 8.5 percent market share in 2021 by revenue, and that will grow to just 8.8 percent in 2026.

    • Health/Nutrition/Agriculture

      • 'We took it to the real world€ and it worked': Rapid Zika testing platform clears hurdle with Brazil trial

        An international team of researchers, led by experts from the University of Toronto’s Leslie Dan Faculty of Pharmacy, has conducted one of the first field trials for a synthetic biology-based diagnostic platform that could provide rapid, de-centralized and low-cost patient testing for infectious diseases such as the Zika virus.

        The work, conducted on-site in Latin America, revealed the potential for the cell-free synthetic biology tools and companion hardware. Published in Nature Biomedical Engineering, the study’s results show that the novel diagnostic platform has analytical specificity and sensitivity equivalent to a U.S. Centres for Disease Control (CDC) PCR test for Zika and a diagnostic accuracy of 98.5 per cent with 268 patient samples collected in Recife, Brazil.

        The platform is also programmable and can be similarly applied to detect any pathogen sequence. In addition to validating highly accurate diagnostic results for Zika, the team also achieved similar diagnostic performance for chikungunya virus, another mosquito-borne arbovirus.

    • Integrity/Availability

      • Proprietary

        • The Register UKOpenness of Oracle licensing and audit tools questioned [Ed: Proprietary software has nothing to do with "openness"]

          Oracle customers can only use its licensing tools after the company has started to talk to them about software audits or offered license advice. Meanwhile, third-party tools that have been verified by Oracle do not help users in terms of license compliance.

        • The Register UKCISOs face 'perfect storm' of ransomware and state-supported cybercrime [Ed: This is primarily a Microsoft issue; ransomware affects Windows over 90% or over 95% of the time, depending on which companies surveys that]

          With not just ransomware gangs raiding network after network, but nation states consciously turning a blind eye to it, today's chief information security officers are caught in a "perfect storm," says Cybereason CSO Sam Curry.

        • The Register UKAMD confirms Ryzen chips' stuttering performance on Windows 10, 11 [Ed: Windows is technically worse than GNU/Linux, but Microsoft makes up for it by bribing everyone and resorting to other forms of corruption]

          AMD has confirmed there is a performance problem with some of its Zen-family processors and Microsoft's operating systems.

          Reports of stuttering performance under Windows 10 and 11 on some Ryzen systems have been rumbling for a while now and it appears the problem is lurking within Firmware Trusted Platform Module (fTPM) used in a number of AMD's chips.

        • The Register UKSingapore uncovers four critical vulnerabilities in Riverbed software

          Specifically, the insecure code is in Dynamic Sampling Agent, which is the collection component of AppInternals. Versions affected, according to a CVE record, include 10.x, versions prior to 12.13.0, and versions prior to 11.8.8. Aternity's advisory about the security holes is locked behind a customer login page. We've asked the vendor for more information.

        • Perfect Dark director leaves The Initiative [Ed: Microsoft kills everything it touches]
        • The Register UKSAP community website leaks member data to savvy users [Ed: SAP is not a community but a malicious proprietary software company that leaks out details of its serfs]

          A website for SAP's Customer Influence programs is exposing member data, creating the possibility for targeted social-engineering attacks.

          At the time of publication, the website is no longer accessible.

          The programs are designed to help customers and long-standing users make suggestions to SAP about how it can improve its products and add new features. Ideas for future development can be submitted, debated, and voted on before being taken up by the German software giant.

        • The Register UKGoogle Maps stopped working properly for hours ● The Register

          Google Maps Platform services went missing for a few hours on Friday as various APIs fell over.

          Around 0847 am PDT (1347 UTC), users of Google Maps Platform services began reporting problems. These surfaced on crowdsourced reporting sites like DownDetector.com and on the Maps Platform Status Page.

        • The Register UKUK criminal defense lawyer hadn't patched when ransomware hit [Ed: Microsoft TCO in action]

          Criminal defense law firm Tuckers Solicitors is facing a fine from the UK's data watchdog for failing to properly secure data that included information on case proceedings which was scooped up in a ransomware attack in 2020.

          [...]

          The Microsoft Exchange server was out of action and two days' worth of emails were lost, as detailed by the company blog at the time.

        • IT WireKaspersky CEO says no evidence for German warning about his firm [Ed: With proprietary software there is never evidence because it is secret and thus, by default, untrustworthy. Germany should be banning all software software, no matter its nationality.]

          A warning by the German Federal Office of Information Security against the use of Kaspersky products had no technical advice or objective evidence to back it up, the chief executive of the Russian security firm says.

        • The Register UKNew US law: Cyberattacks to be reported within 72 hours [Ed: They wrongly assume that each attack means a breach; this is the Microsoft mindset because its software is unsafe by design.]

          A US bill that would require critical infrastructure operators to report cyberattacks within 72 hours is headed to President Joe Biden's desk to be signed into law.

        • The Register UKCafePress fined for covering up 2019 customer info leak [Ed: When you outsource your shop]

          The FTC wants the former owner of CafePress to cough up $500,000 after the customizable merch bazaar not only tried to cover up a major computer security breach involving millions of netizens, it failed to safeguard customers' personal information.

          In a complaint [PDF] filed against CafePress former owner Residual Pumpkin Entity and PlanetArt, which bought the platform in 2020, the FTC alleges multiple instances of shoddy security practices at the online biz. In a settlement proposed by the US watchdog, Residual Pumpkin will pay up the half-million dollars.

        • The Register UKAzure flaw allowed users to control others' accounts [Ed: Only fools use clown computing. The biggest of fools choose Microsoft for that.]

          Microsoft has acknowledged the existence of a flaw in its Azure cloud computing service that allowed users full access to other users' accounts.

          The flaw was dubbed “AutoWarp” by Orca Security, which discovered and reported it.

          The vulnerability only impacted users of the Azure Automation Service. That service allows Azure users to use PowerShell or Python to write runbooks that automate many actions within Azure. "Trigger automation from ITSM, DevOps and monitoring systems to fulfil requests and ensure continuous delivery and management," suggests Microsoft’s product info page.

          The Automation Service doesn't let just anyone initiate actions on your Azure rig: you need to link it to a managed identity that has the relevant permissions.

        • The Register UKMicrosoft patches critical remote-code-exec hole in Exchange Server and others [Ed: Far more coverage about local privilege escalation in Linux than "remote-code-exec" in Microsoft (yes, remote; you don't need a user account)]
        • The Register UKMicrosoft slides ads into Windows Insiders' File Explorer [Ed: How to make Windows users even more brainwashed and dumber]

          Microsoft appears to be experimenting with more adverts in Windows 11 after eagle-eyed Insider users spotted helpful hints turning up in File Explorer.

          Windows Insider Florian posted a screenshot of the ads, and other unpaid testers said they noticed similar hints lurking in the Dev Channel build, with one ad suggesting users visit Microsoft's Office website to look at PowerPoint templates.

          Our sacrificial Dev Channel machine (currently running 22572.201 – yet another servicing pipeline test) does not show the messages, suggesting that Microsoft is performing some sort of A/B testing and we're simply not on the list.

        • The Register UKMicrosoft fixes OneDrive file reset bug on Windows ● The Register

          Lurking within this month's Patch Tuesday batch of updates is a fix for a Windows issue in which locally synchronized OneDrive data was not always deleted during a reset.

          The bug, which turned up in the Windows release health dashboard in February, is an ironic one, considering the disastrous October 2018 roll out of Windows 10, which infamously gave users extra disk space by quietly wiping their data.

          This latest issue, which hit both Windows 10 and 11, manifested for some users by letting locally synced OneDrive data linger even when a user selected the "remove everything" option during a reset. More seriously for administrators, the issue could also occur after a remote reset initiated by a Mobile Device Management (MDM) application (such as Intune, itself the subject of some news this week), thus defeating the point of the function.

        • Pseudo-Open Source

        • Security

          • InfoQSecuring the Open-Source Software Supply Chain [Ed: Brian Fox never talks about actual back doors in proprietary software; his company is basing its existence on spreading fear of Free software]

            Recent findings by security researchers at SonarSource showed multiple security vulnerabilities in popular package managers, including Pip, Yarn, Composer, and others. Package managers, though, are not the only weak link in the open source security chain. InfoQ has spoken with Sonatype CTO Brian Fox.

          • The HinduCareer in Ethical Hacking - The Hindu

            When we hear the term “hacking”, the first thing that comes to mind is that it is criminal. However, ethical or white hat hackers employ their expertise to discover and fix vulnerabilities and security hazards in a computer system. Today, it is critical to safeguard vital data held on electronic devices such as computers, smartphones, tablets, and so on. Ethical hacking may be an effective tool against cyber attackers in this regard. Ethical hacking is defined as hacking done with the authorisation of the network's owners.

          • Hindustan TimesCyberattack on Israel! Government websites crash [Ed: The article mentions Shadow Brokers; it's the cost of using Microsoft Windows]
          • The Register UKNASA in 'serious jeopardy' due to big black hole in security ● The Register

            And that's a worry, because in 2021 NASA's auditor found "incidents of improper use of NASA IT systems had increased from 249 in 2017 to 1,103 in 2020 – a 343 per cent growth; the most prevalent error was failing to protect Sensitive but unclassified (SBU) information."

          • The Register UKChina thrilled it captured already-leaked NSA cyber-weapon [Ed: NSA and its partners, like Microsoft, are the world's biggest threat to security because they actively undermine it]

            China claims it has obtained malware used by the NSA to steal files, monitor and redirect network traffic, and remotely control computers to spy on foreign targets.

            The software nasty, dubbed NOPEN, is built to commandeer selected Unix and Linux systems, according to Chinese Communist Party tabloid Global Times, which today cited a report it got exclusively from China's National Computer Virus Emergency Response Center.

            Trouble is, NOPEN was among the files publicly leaked in 2016 by the Shadow Brokers. If you can recall back that far, the Shadow Brokers stole and dumped online malware developed by the NSA's Equation Group.

          • Exclusive: China captures powerful US NSA cyberspy tool [Ed: By undermining the security of everything the US has weaponised all of technology and other countries can take advantage]

            China captured a spy tool deployed by the US National Security Agency, which is capable of lurking in a victim's computer to access sensitive information and was found to have controlled global internet equipment and stole large amounts of users' information, according to a report the Global Times obtained from the National Computer Virus Emergency Response Center exclusively on Monday.

            According to the report, the Trojan horse, "NOPEN," is a remote control tool for Unix/Linux computer systems. It is mainly used for stealing files, accessing systems, redirecting network communication, and viewing a target device's information.

          • A first look at threat intelligence and threat hunting tools | WeLiveSecurity

            An overview of some of the most popular open-source tools for threat intelligence and threat hunting

          • The Register UKAnother data-leaking Spectre bug found, smashes Intel, Arm defenses

            Intel this month published an advisory to address a novel Spectre v2 vulnerability in its processors that can be exploited by malware to steal data from memory that should otherwise be off limits.

            Arm said a number of its processor cores are also affected by this security flaw, and like Intel, its hardware defenses can't block it outright, leaving developers to implement software-level mitigations.

          • CSODeveloper sabotages own npm module prompting open-source supply chain security questions [Ed: Misses the point that Microsoft was shipping this malware]

            The node-ipc developer attempt to protest Russia's attack on Ukraine has the unintended consequence of casting more doubt in software supply chain integrity.

          • The Register UKExotic Lily is a business-like access broker for ransomware gangs [Ed: Microsoft Windows TCO]

            TAG initially detected Exotic Lily – which the researchers describe as a "resourceful, financially motivated threat actor" – in September 2021 exploiting a zero-day flaw in Microsoft MSHTML (tracked as CVE-2021-40444). Further investigation discovered that the group was acting as an IAB working with a Russian gang known as FIN12 by cybersecurity vendors Mandiant and FireEye, Wizard Spider by CrowdStrike, and DEV-0193 by Microsoft.

          • The Register UKLinux botnet exploits Log4j flaw to hijack Arm, x86 systems [Ed: If you refused to patch your system for over 3 months]

            Researchers at Chinese internet security company Qihoo's 360's Network Security Research Lab discovered the botnet family, which they dubbed B1txor20, as it was infecting hosts via the Log4j vulnerability. It primarily targets Linux Arm and 64-bit x86 systems. Compromised devices are commandeered, and brought into the network as remote-control bots, hence the term botnet.

          • The Register UKCyclops Blink malware sets up shop in ASUS routers ● The Register

            It's not clear exactly right now how the malware gets onto a device, though it probably involves exploiting a default admin password to gain access via an enabled remote management service. According to Trend Micro's Cyclops Blink technical analysis, once the modular malware, written in C, has been injected into the gateway and is running, it sets itself up and renames its process to "[ktest]" presumably to appear as a Linux kernel thread.

          • The Register UKOpenSSL patches crash-me bug triggered by rogue certs

            A bug in OpenSSL certificate parsing leaves systems open to denial-of-service attacks from anyone wielding an explicit curve.

            The vulnerability stems from a bug in the BN_mod_sqrt() function, which the OpenSSL team said is used to parse certificates that "contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form." As it turns out, all you need to do to trigger an infinite loop in BN_mod_sqrt() is hand an OpenSSL-based application or service a certificate with invalid explicit curve parameters.

            This parsing happens prior to verification of the certificate's signature. Slip a bad certificate to any app or server using BN_mod_sqrt() to parse certs, and the software will get caught in the loop and stop working.

          • The Register UKReg reader blasts Virgin Media's email password policy ● The Register

            A Register reader has raised concerns over UK ISP Virgin Media's password policies after discovering he couldn't set a password longer than 10 characters or one that includes non-alphanumeric characters.

            Our reader Nick told us he was facing repeated attempts to take control of an @virgin.net email account he owns – adding that the company's password policy left him vulnerable to what he described as a sustained brute-forcing attack.

          • The Register UKQuantum computing cybersecurity research gets $715k grant ● The Register

            America's National Science Foundation has signaled yet again how important it thinks quantum computing is with a six-figure grant to Penn State.

            The $715,000 grant is heading to Swaroop Ghosh, associate professor at Penn State School of Electrical Engineering and Computer Science. Ghosh plans to use the funding to close gaps in quantum computing security and create a post-secondary quantum computing curriculum.

          • Fear, Uncertainty, Doubt/Fear-mongering/Dramatisation

          • Privacy/Surveillance

            • IT WireOpen slather as ABC leaks data to Google, Facebook, Tealium et al

              The ABC's claim to being the most trusted news site in Australia has come under serious doubt following the release of a video that shows how the data of users, logged in or not, is being leaked to a number of commercial outlets.

              Researcher Vanessa Teague, one of the few technical experts to raise objections to the ABC's imposition of logins for iview users, pointed out on Wednesday that the ABC news website was also leaking data to the likes of Google, Facebook, Chartbeat and Tealium.

            • The Register UKRussia labels Meta an 'extremist' organization, bans Instagram

              Russia's Investigative Committee, the nation's peak criminal and anti-corruption investigation body, has opened a probe into whether Meta is an extremist organization.

              The move follows Meta's decision last week to relax rules about exhortations to commit violence posted to its Facebook and Instagram properties – but only within Ukraine.

            • The Register UKHear us out: Smartphone lidar can test blood, milk

              Could the light detection and ranging (lidar) sensors in your future smartphone take the place of laboratory equipment in health and food safety applications? It's looking like a possibility.

              Researchers at the University of Washington reckon handset lidar can determine fluid properties, sparing you from having to use expensive lab gear. The amount of liquid needed for a smartphone lidar test is significantly less than that for a medical lab, too, they said.

            • Five fascinating inventions by schoolchildren [Ed: Surveillance creeps in. See photo.]

              The Aliartos Vocational Night School employs a central system designed by its students that makes sure physical distancing rules are being observed.

    • Environment

      • Wildlife/Nature

        • Orcas’ Scars Tell a Story

          When southern resident killer whales off the coast of British Columbia and Washington state surface for breath, they show off pointy dorsal fins and their iconic black-and-white colouration. But a closer inspection can reveal white scars scratched onto their otherwise sleek backs. These scars are from bite marks — “tooth rakes” — inflicted during skirmishes with other killer whales.

    • Finance

      • The Register UKFujitsu: Dumping older workers will wipe out quarter of forecast profit

        Fujitsu has warned investors its full-year profits will fall 23.6 per cent below previous forecasts because it's extended an offer for older workers to leave in favor of youngsters more likely to deliver the DX, or "digital experience," customers demand.

        A Tuesday announcement was uncommonly blunt about the Japanese giant's intentions, stating: "As part of its human resources initiatives to strengthen its status as a DX company, Fujitsu will temporarily expand its 'Self-Produce Support System' to support employees seeking career course redirection outside of the Fujitsu Group."

        Only staffers aged 50 or over are eligible for the offer of "career course redirection." Fujitsu says 3,031 people have already applied for the scheme as of February 28. Most are executives or workers who have been rehired after already retiring once.

      • Chronicle Of Higher EducationThe Money Pit [Ed: There's more money in misleading people than in educating them properly]

        Nothing seemed amiss to McKenna Schramm when Ohio Valley University recruited her to run track. The campus tour had all the standard trappings: a walk-through of the dorms, a stop at the cafeteria, and a visit to the campus chapel. The admissions letter, dated January 8, 2020, looked a lot like the ones she’d received from other colleges.

    • Censorship/Free Speech

      • NewYorkTimesFirst Amendment Scholars Want to See the Media Lose These Cases - The New York Times

        The lawyers and First Amendment scholars who have made it their life’s work to defend the well-established but newly threatened constitutional protections for journalists don’t usually root for the media to lose in court.

        But that’s what is happening with a series of recent defamation lawsuits against right-wing outlets that legal experts say could be the most significant libel litigation in recent memory.

        The suits, which are being argued in several state and federal courts, accuse Project Veritas, Fox News, The Gateway Pundit, One America News and others of intentionally promoting and profiting from false claims of voter fraud during the 2020 election, and of smearing innocent civil servants and businesses in the process.

      • TechRadarThe Russian exile who found a way past Putin's internet firewall | TechRadar

        Aleksandr Litreev wants to preserve access to the free and open internet for people living under authoritarian rule.

    • Civil Rights/Policing

      • NewYorkTimesCourt Declares Isaiah Andrews Wrongfully Imprisoned for 45 Years - The New York Times

        The official declaration this week means that Isaiah Andrews, 84, can seek damages from the State of Ohio for spending more than half his life in prison after being wrongly convicted of killing his wife.

      • The Register UKChina declares a new era of digitization has begun [Ed: Oppression is going digital, and not just in China]

        A document posted by the Cyberspace Administration of China (CAC) quotes Xi as saying "informatization has brought a once-in-a-lifetime opportunity to the Chinese nation" and outlines a range of digital transformation tasks that must be achieved under the 14th five year plan (2021–2026) to achieve the desired level of digitization.

    • Internet Policy/Net Neutrality

      • The Register UKInternet backbone Cogent cuts Russia connectivity

        Cogent Communications will pull the plug on its connectivity to customers in Russia in response to President Putin's invasion of Ukraine.

        The US-based biz is one of the planet's largest internet backbones – the freeways of the internet – and says it carries roughly a quarter of global 'net traffic.

        Its clients range from small businesses to mobile carriers and broadband ISPs. Cogent's role is to pipe hundreds of terabits of your internet data around the world every second. Russian state-owned Rostelecom is among the dozens of customers Cogent has in the country.

      • The Register UKNominet suspends 'single digit' number of Russian dot-UK domain registrars [Ed: The integrity of the Internet is under attack]

        Nominet, the dot-UK domain registry, has announced that it will suspend services for Russian web domain registrars – and the British government says it "welcomes" the action.

        Suspension will prevent the registrars from managing or renewing dot-UK domains they own or control.

        "We are not accepting registrations from registrars in Russia – we are suspending the relevant tags. To avoid compromising outlets for expression outside the control of the regime, the very small number of domains with Russian address details will continue to operate as normal," said the organisation in a statement on its website.

      • The Register UKRussia hasn't yet enabled its splinternet amid Ukraine war ● The Register

        Russia has reportedly blocked access to Western media outlets including the BBC to netizens within its borders, as suspicions rise that the country has begun implementing a "splinternet" plan to seal itself off from the wider internet.

        This morning the British state broadcaster declared it had been blocked from inside Russia, using also-blocked Twitter to spread the news among Westerners, and signposted web users to a long-forgotten Tor mirror of itself. The BBC launched two new shortwave frequencies in the region earlier this week to broadcast four hours of World Service English news a day. These frequencies can be received clearly in Kyiv and parts of Russia.

        The Beeb is not alone; other Western news outlets including Germany's Deutsche Welle, Voice of America, US-sponsored Radio Free Europe and others have also been blocked.

        Although the Reuters financial newswire cited an order of Roskomnadzor, the Russian equivalent of Britain's Ofcom media regulator, the Roskomnadzor blocked site checker returned no information about BBC.com when checked by The Register at the time of writing.

        [...]

        Tor is designed to frustrate censorship by bouncing user traffic through a number of relay nodes, disguising its true origins and destinations. Should the Russians try and shut down Western Tor-hosted websites, they're likely to fail – but previous efforts to arrest local exit node operators have borne some fruit.

        Tor exit relays have long been a target, not only for law enforcement agencies in the West as well as authoritarian countries, but also those who would log and track exit node users – and, inevitably, cryptocurrency scammers.

    • Digital Restrictions (DRM)

      • The Register UKDeere unlawfully withholds repair tools and info, FTC told ● The Register

        Twelve farm labor, advocacy, and repair groups filed a complaint last week with the US Federal Trade Commission claiming that agricultural equipment maker Deere & Company has unlawfully refused to provide the software and technical data necessary to repair its machinery.

        The groups include National Farmers Union, Iowa Farmers Union, Missouri Farmers Union, Montana Farmers Union, Nebraska Farmers Union, Ohio Farmers Union, Wisconsin Farmers Union, Farm Action, the U.S. Public Interest Research Group, the Illinois Public Interest Research Group, the Digital Right to Repair Coalition, and iFixit.

    • Monopolies

      • The Register UKTaiwan rounds up 60 Chinese tech workers on suspicion of poaching tech and people

        Taiwan's Ministry of Justice has tasked its Investigation Bureau to conduct a series of raids around the island and hauled in 60 Chinese nationals suspected of lifting trade secrets or poaching talent from China-owned firms.

        The raids took place on Wednesday March 9, with over 100 investigators dispatched to 14 locations in four Taiwanese cities. Some of the companies searched include Advanced Manufacturing EDA Co., Bouson International, Vimicro, Beijing Yinxing Technology, VeriSilicon, Analogix Semiconductor, Key Technology, and GLC Semiconductor.

      • The Register UKITC judge recommends banning toner imports that infringe Canon's IP [Ed: Canon has no "IP"; the media uses propaganda terms]

        A bunch of toner manufacturers and sellers have infringed on Japanese electronics outfit Canon's patents, according to an initial finding from the US International Trade Commission (ITC), with a judge recommending imports of their products be banned.

        The notice [PDF] from an administrative law judge this week said an Initial Determination (ID) was made on Tuesday 15 March, finding that "certain toner supply containers" violated Section 337.



Recent Techrights' Posts

Windows in Åland Islands: From 100% to Less Than Half
Åland Islands lost the sense of urgency to move to GNU/Linux
Not Just Slow News But Also Late News (Julian Assange Landing in Thailand)
Why did AP take so long (nearly a week) to release these?
[Meme] Smart Alec Poettering
How many Microsofters can the Debian Project withstand?
Getting Rid of Microsoft Does Not Go Far Enough
Microsoft already has many problems. One day Microsoft won't exist anymore. But that does not guarantee users' freedom.
Alyssa Rosenzweig's LibrePlanet Talk About Freeing the Apple GPU
Alyssa Rosenzweig is the graphics witch behind the reverse-engineered drivers for the Apple GPU. She previously led Panfrost, the free drivers for Arm Mali GPUs powering devices like the Pinebook Pro. She graduated in 2023 with a Computer Science degree from the University of Toronto and now writes free software full-time.
Links 30/06/2024: LLMs Under Fire and Dictatorship of the Old
Links for the day
[Meme] Walking Outside the Guardrails of the Walled Gardens Built by Monopolies
So-called "advertiser-unfriendly" material was never a problem for Wikileaks
 
200 This Week
Monday started with 40 articles/pages and this is #200
Press Complicity and Public Apathy All Along Enabled 14 Years of Illegal, Arbitrary Detention and Coercion Into Plea Bargain of Julian Assange on Brink of Death
They basically blackmailed him into letting the US 'win' the argument
At the End Journalism a Crime (If It Involves Accessing or Gaining Access to Documents Marked "Confidential" or "Classified" by Those Looking to Hide Their Misconduct/Crimes)
At least in the US, especially where the imperialism is at stake
Links 30/06/2024: Tensions in Korea and Japan, Criminalisation of Sleeping Outdoors
Links for the day
100% Slop/Spam From linuxsecurity.com
This is the kind of stuff that's killing the Web faster
Gemini Links 30/06/2024: Murdoch and Ideal OS
Links for the day
In the First 6 Months of 2024 Thailand Moved to GNU/Linux, Not to Windows Vista 11
maybe users moved from Vista 10 and 11 to GNU/Linux, seeing where Microsoft was heading with forced hardware "upgrades"
Eko K. A. Owen, New Outreach and Communications Coordinator for the FSF
Nice to see many new additions to the FSF's team
Microsoft Has Slaves and Enablers, Not Partners
Obligatory meme too
Tobias Platen Covered Freedom-To-Play Games in LibrePlanet 2024
Freedom-To-Play games using Taler
[Meme] Opening a 'Webapp' With 'Only' 4 GB of RAM
Until 2020 none of my PCs ever had more than 2 GB of RAM
Destination 'Five Percent'
We reckon GNU/Linux can break the 5% barrier some time by the end of this year, even without counting Chromebooks
A Crisis of Online Journalism
Almost a week ago a journalist was forced to plead guilty for an act of journalism
Germany One of Many Countries Where Microsoft's Bing Lost Market Share After All That LLM Nonsense (Bing Chat and Further Rebrands/Renames)
openai.com traffic plunged 60% last month
Microsoft’s Latest Antitrust Scrutiny
4 new stories
Microsoft Layoffs, Mass Plagiarism, and More
outrage included
GNU/Linux Climbed 0.25% This Month (in statCounter)
Around midday on Tuesday we'll start seeing preliminary data for July
Ilya Gulko Introduces Pollyanna
"Pollyanna is a web framework that makes it easy to create your own libre social space, such as a social network or blog."
'FSFE': Underage Labour, GAFAM Fronting, and Identity Theft to Undermine the FSF's Current Fundraiser
looking to raise funds at the same time as the FSF
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, June 29, 2024
IRC logs for Saturday, June 29, 2024
Links 29/06/2024: Astronauts at Risk, Ukraine Updates
Links for the day
Fedora and Red Hat Leftovers
mostly redhat.com
Microsoft is Now Googlebombing or Spamming 'Open Source' and 'Linux' to Promote Proprietary Surveillance, Azure
Notice the title and the image, what's being promoted etc.
Seychelles: GNU/Linux Doing OK
Seychelles cannot be considered poor
This War Crime Footage, Nothing Political Per Se, Is What They Made Julian Assange Plead Guilty To (War Criminals Not Convicted, Only Those Who Expose Them)
Wikileaks' Julian Assange: Exposing the US Military Crimes
Gemini Protocol Isn't Even Remotely "Dead"
"Lupa knows of 505,000 (half a million!) working Gemini URLs at present, up from about 425,000 this time last year"
About 10 New Free Software Foundation (FSF) Members Per Day
The total changed from 46 to 47 while typing the article
20 Years Passed, Let's Go Even Faster Now
We are hoping to bring more original stories
Vista 11 Adoption Unusually Low in Germany and It's Going Down, Not Up
This is not happening only in Germany
Kevin Korte on Computers Being Allowed to Make Decisions Based on Cryptic Algorithms and Proprietary/Secret Data
It uses buzzwords where none are needed
[Meme] Garbage In, Garbage Out (linuxsecurity.com)
It is neither Linux nor security, just chatbot-generated slop
Microsoft-Invaded CISA Spreads Anti-Free Software FUD (as If Proprietary Software Has No Memory Safety Issues), Brittany Day Uses Chatbots to Amplify and Permutate the Microsoft FUD
linuxsecurity.com became an anti-Linux spam site
Microsoft Laying Off Staff in an Act of Retaliation and Union-Busting
retaliatory layoffs at Microsoft
Gemini Links 29/06/2024: Content Drowning in 'Goo' and LLM Slop
Links for the day
Windows Lost Almost 92% Market Share in Egypt
From over 99% to just over 7%
In Ecuador, GNU/Linux Adoption Surged From Under 1% to Over 4% in About 3 Years
Not even counting Chromebooks
LibrePlanet: Cultivating Backups (of Recordings)
an appeal to recover some of these talks
Microsoft/Windows Machines Are Turned Off (or Windows Deleted/Decommissioned) in Web Servers, as the "Market Share" Collapse Continues
Taking full history into account, this is a decrease of over 90% in some cases
Corwin Brust Hosting Freedom: A Behind-the-scenes Tour With the GNU Savannah Hackers
"the "smiling faces" behind it."
Android at 90% or More in Chad
Windows below 2%
David Wilson: Cultivating a Welcoming Free Software Community That Lasts
"a feeling of shared ownership for all users."
Julian Assange Might Continue Wikileaks, But Certainly Not Yet (Recovery Time Needed)
And probably at a symbolic capacity only
Bringing in 12 Santas and Taking 13 Out (Old Interview With Julian Assange)
Julian Assange's life inside the Ecuadorian embassy
Neil Plotnick on GNU/Linux in the High School Classroom
uploaded to the LibrePlanet instance of MediaGoblin
Asia Appears to be Fastest to Adopt GNU/Linux
the home of a considerable majority of the world's population
Alexandre Oliva's LibrePlanet 2024 Talk About "Software Enshittification"
in spite of technical difficulties encountered while recording
What They Used to Do With Mono They Now Do With Systemd (Lower and Deeper Down Than Userspace)
Now we have a project started primarily by Red Hat (and managed by Microsoft GitHub, which is proprietary) being managed by Microsoft and primarily serving Microsoft and IBM
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, June 28, 2024
IRC logs for Friday, June 28, 2024
Links 28/06/2024: Kangaroo Courts and Patents Spam, EFF Still Fighting for CPC's TikTok (a Digital Weapon)
Links for the day
Links 28/06/2024: Overton window and Polarization
Links for the day
[Meme] In 50 Years...
Microsoft's Vista 11 will take 50 years to be fully adopted
Only About 1 in 8 Russian Windows Users is Using Vista 11
it looks like over the past 12 months Vista 11 hardly grew and it remains very low at around 12% of Windows usage in Russia
Links 28/06/2024: More Attacks on the Press, More Censorship in Russia
Links for the day
Gemini Links 28/06/2024: Christmas Prematurely, Self-hosting
Links for the day
IBM: So Long, Suckers. Your Free OS is Now Proprietary. Pay IBM or Else.
almost exactly a year after turning RHEL into proprietary software
Vista 11 is Doomed and Despite Lack of Adoption Microsoft Already Speaks of Vapourware ("12")
"Microsoft has pulled a Windows 11 update after users reported boot loops and startup failures."
ChromeOS Reaches Highest Share in Years at the World's Most Populous Nation, Windows Now at All-Time Low of 13%
We're talking about India today
[Video] "It Is Incredible That Julian Assange Survives"
There was a positive and mutual relationship between Wikileaks and Dr Jill Stein
Never Assume That Because the Law Exists the Powerful Will Follow the Law
Who's going to hold them accountable now?
Nearly a Month Has Passed and Nobody at the Debian Project Even Attempted to Explain What Seems Like Back-dooring of Debian (and Hundreds of Distros That Are Debian-Derived)
I can cynically guess that only matters when a user with a Chinese name does it
[Video] Julian Assange Explains Wikileaks' Logistics
predating indefinite detention
IBM Was Never the "Good Guy", Just a Self-Serving and Opportunistic Money- and Power-Hungry Monopolist, Living Off of Taxpayers' Money (Government Contracts)
The Nazi Party of Germany was its second-biggest client at one point and now it's looking to profit from the work of slaves
"I Hated Working at IBM. They Were the Most Unfriendly People."
Don't forget what Watson the son did to a poor woman on a plane
State of the News (and Depletion of Journalism Online, Not Just Offline)
Newspapers are not coming back and the Web is not coming back either
GNU/Linux Consolidates in North America
Android rising a lot this year, too
[Meme] More Monopolies Granted While Patent Examiners Die (Overworking for Less Compensation)
Work more; Get less
Staff Union of the EPO (SUEPO) is Taking the New Pension Scheme (NPS) to an International Tribunal (ILOAT)
SUEPO wants more EPO staff to participate in collective action
Stella Assange and the Legal Team Speak to the Media a Day After WikiLeaks Founder Julian Assange Arrives in Australia
Published yesterday by a number of mainstream publishers
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Thursday, June 27, 2024
IRC logs for Thursday, June 27, 2024
RIP Daniel Bristot de Oliveira, Red Hat death
Reprinted with permission from Daniel Pocock