Bonum Certa Men Certa

Links 31/03/2022: MirageOS 4.0 and Shotcut 22.03.30

  • GNU/Linux

    • Server

      • Make Use OfHow to Turn Your Old Laptop Into a Plex Media Server

        Smart TVs are smart enough to stream 4K movies and TV shows from Over the Top or OTT platforms. However, if you have high-quality 4K ripped movies or TV shows you want to watch, it may not play. Even if it manages to play, you might have issues with the audio.

        We used an 8-year-old retired laptop that was lying around with a 100Mbps LAN port and converted it to a media server. And guess what, the 4K movies played flawlessly with surround sound audio on a TV over a Wi-Fi network.

        Here's how you can achieve the same results by installing Plex Media Server on your old laptop or PC.

    • Audiocasts/Shows

    • Kernel Space

      • MirageOS Announces Latest Release v4.0, dedicated to Lars Kurth - Xen Project

        The MirageOS Core Team is thrilled to announce the release of MirageOS 4.0. MirageOS is a library operating system that constructs unikernels for secure, high-performance, low-energy footprint applications across various hypervisor and embedded platforms. Since the first release of 2013, MirageOS has made steady progress towards deploying self-managed internet infrastructure. The project’s initial aim was to self-host as many services as possible to empower internet users to securely deploy infrastructure to own their data and take back control of their privacy. MirageOS can securely deploy static website hosting with “Let’s Encrypt” certificate provisioning and a secure SMTP stack with security extensions. MirageOS can also deploy decentralized communication infrastructure like Matrix, OpenVPN servers, and TLS tunnels to ensure data privacy or DNS(SEC) servers for better authentication.

      • The Register UKNew Linux kernel patch speeds up server shutdowns ● The Register

        A new Linux kernel patch from a Google engineer resolves a problem caused by a condition that many of us might quite like to experience – having too many NVMe drives.

        The problem is caused by the relatively long time it takes to properly shut down a drive: apparently, as much as four-and-a-half seconds.

        Remember Sun's X4500 storage server, originally codenamed Thumper? It was truly radical when it appeared: a 3U dual-processor server, but with a stonking 48 drive bays. These days Google has a bunch of boxes with a still-fairly-impressive 16 NVMe drives attached to each one. And when they have to reboot, they take a long time.

        If you have a storage server with 16 drives, that's 72 seconds of wasted time hanging around every time it reboots. Hardly an eon, but still annoying – because it's totally unnecessary.

      • Linux JournalWhat’s KernelCare?

         This article explains all that you need to know about KernelCare. But before studying about KernelCare, let’s do a quick recap of the Linux kernel. It’ll help you understand KernelCare better. The Linux kernel is the core part of Linux OS. It resides in memory and prompts the CPU what to do.

        Now let’s begin with today’s topic which is KernelCare. And if you’re a system administrator this article is going to present valuable information for you.

    • Applications

      • 9to5LinuxShotcut Video Editor Gets Multi-Threading for All Implicit Video Scaling and Some Video Filters

         Now backed by the latest and greatest FFmpeg 5.0 open-source multimedia framework, Shotcut 22.03.30 adds multi-threading support for all implicit video scaling, as well as for various video filters, including Blur: Box, Blur: Gaussian, Color Grading, Invert Colors, Mask: From File, Old Film: Grain, Old Film: Scratches, Old Film: Technocolor, Reflect, Sepia, Sketch, Spot Remover, Threshold, Vignette, and Wave.

    • Instructionals/Technical

      • KlaraLearn about the difference between enabling compression and the power of tuning it

        While basic advice for compression is simple—enable it!—recordsize is a more challenging topic. Before we can begin discussing how to tune it, let’s run through a quick refresher on what recordsize actually means.

      • Its FOSSHow to Add Accent Colors in Ubuntu 22.04

        Traditionally, Ubuntu has always used orange and aubergine accent colors. If you want to add a different color theme without changing the Yaru theme, the option is provided with a third party theme called Yaru colors.

        But this is changing with Ubuntu 22.04. Starting with the new upcoming LTS, you’ll be able to change the accent color of your Ubuntu desktop without any additional tool.

      • LateWebEasy Way To Install SciTE on Ubuntu 21.04 LTS

        SciTE is an easy-to-use text editor that has many features for programming. Its footprint size and functionality make it perfect for installing on any system, even if you don’t have experience with Scintilla or GTK.

      • ID RootHow To Install FlareGet on Ubuntu 20.04 LTS - idroot

        In this tutorial, we will show you how to install FlareGet on Ubuntu 20.04 LTS. For those of you who didn’t know, FlareGet is a popular open-source download manager and accelerator for Linux systems. It has some great features such as browser integration, threading, etc.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the FlareGet Download Manager on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.

      • ASCII art of yourself
      • Print sensors data for your hardware Using cat, column, paste, sed
      • 9 Basic 'du' Command In Linux With Practical Examples | LinuxTeck

        In this article, we will discuss another popular command for the Linux/Unix platform. It is called 'du', which stands for "Disk Usage". It is a standard command used to estimate space usage (meaning, in the terminal we can find the exact size each directory and file takes up). There are multiple ways we can generate various types of output in Terminal using the 'du' command with various options. It is usually used by all System Administrators to find unwanted files, files with unused large sizes, or archive files that can be deleted/cleared in order to provide sufficient free space for servers.

      • Peter 'CzP' CzanikUsing the openSUSE Build Service to build software for POWER | Random thoughts of Peter 'CzP' Czanik

        My favorite and most used service for developers is the openSUSE Build Service (OBS). This is where I build syslog-ng packages first, before anywhere else. OBS is open source, highly flexible software to build software packages, and the instance at is free to use for anyone to build open source software. Best of all, it supports multiple architectures, including POWER.

    • Games

      • Old VCRprior-art-dept.: 5 letter words (Jim Butterfield's Jotto)

        I mentioned the Wordle craze, including the extant ports to the Commodore 64, in our KIMdle sorta-Wordle for the KIM-1. But the Commodore 64, and I suspect this was actually a PET game originally, had a five-letter word game before that. Jim Butterfield's Jotto isn't Wordle — it tells you merely how many letters matched — but it's undeniably an ancestor concept. Jotto appears in the Commodore 64 user's guide on page 145 and is believed to be public domain. It is reproduced in its entirety in this scanned image.

    • Distributions

      • SUSE/OpenSUSE

        • LWNOpenSUSE adopts a new code of conduct [] [Ed: Interesting comments there]

          The openSUSE project has announced the adoption of a new code of conduct: "We hope that by having a clear and concise Code of Conduct for the project, the openSUSE Community can continue to grow and prosper in the years to come".

      • IBM/Red Hat/Fedora

        • Red Hat OfficialRed Hat Satellite 6.10.4 has been released

          We are pleased to announce that Red Hat Satellite 6.10.4 is generally available as of March 29, 2022.

          Red Hat Satellite is part of the Red Hat Smart Management subscription that makes it easier for enterprises to manage patching, provisioning, and subscription management of Red Hat Enterprise Linux infrastructure.

      • Canonical/Ubuntu Family

        • UbuntuOpen source security coverage and compliance with Ubuntu Pro on public clouds | Ubuntu

          For businesses utilising public clouds, choosing an open source platform offers considerable advantages. Open source solutions can help reduce costs, provide access to the most leading-edge enterprise-grade features, and eliminate risks such as vendor lock-in, lack of support, or long-term security maintenance.

          Just like any other applications, open source solutions must be kept up-to-date and secure. Furthermore, organisations with industry-specific regulatory requirements can only utilise those solutions that meet compliance and hardening demands. These are the challenges that Ubuntu Pro is designed to solve. Ubuntu is already the world’s most popular Linux distribution and the most widely used operating system across major public clouds thanks to its ease-of-use, performance, and stability – with each Ubuntu LTS release benefiting from up to 5 years of standard security maintenance. Ubuntu Pro goes a step further by extending security coverage to the entire collection of software packages that ships with Ubuntu for 10 years, while also providing certified components to run across multiple compliance regimes spanning federal government, finance, healthcare, and more.

        • UbuntuThe Evolution of the Smart Home: Future Predictions [Part 3] | Ubuntu

          Matter, which I introduced in the previous blog of this series, is a new smart-home standard championed by the Connectivity Standards Alliance (CSA). It will certainly make a big splash, but widespread adoption will take time. While some companies will be able to update their devices to be Matter compatible, there are millions of devices in the field, and it’s likely that most cannot be upgraded. Companies that have already committed to another technology will face the decision of continuing to support their current devices, leaving them behind, or facing the increased costs of supporting both legacy devices and new Matter-compatible ones. Until Matter has proven itself as the new standard, this decision may not be clear-cut. Some companies may also see an advantage in retaining their proprietary technology, hoping their offerings are compelling enough to be a competitive advantage they can keep to themselves.

        • UbuntuThe State of IoT – March 2022 | Ubuntu

          The Connectivity Standards Alliance (CSA) recently announced a release in the delay of specification of Matter, the royalty-free connectivity standard suited for smart home devices. Formerly Project Connected Home over IP, or Project CHIP, Matter is an IPv6-based connectivity standard defining the application layer deployed on devices with Wi-Fi support, Thread, and Bluetooth Low Energy (BLE). Although the Matter specification is proprietary, i.e., licensed by the CSA, the code is open-source.

          Citing additional tests and the Alliance’s Specification Validation Event to date, Matter’s SDK will be feature complete this spring, with Version 0.9 of the specification available to all Alliance members towards mid-year. Earlier in the year at CES 2022, Matter made great strides in staking a claim in what had, so far, appeared to be a melting pot of incompatible devices.

    • Devices/Embedded

    • Free, Libre, and Open Source Software

      • Matt RickardThreat of the Hard Fork

        When there's a disagreement in open source projects, there's the potential for a fork. One set of developers disagrees with the direction of a project and creates a (often permanently) divergent version. This is the hard fork – and any open source project can be forked.

        'Getting forked' is as bad as it sounds. Developers, users, and all other sorts of resources are split. New users might be confused which project is the canonical project.

      • Web Browsers

        • Mozilla

          • Some non-production tools I wrote | William Durand

            This is a short article about 3 different tools I authored for my needs at Mozilla.

            I worked on AMO for almost 4 years and created various libraries like pino-mozlog, pino-devtools or an ESLint plugin to name a few. These libraries have been created either to improve our developer experience or to fulfill some production requirements.

            This isn’t the kind of projects I want to focus on in the rest of this article, though. Indeed, I also wrote “non-production” tools, i.e. some side projects to improve my day-to-day work. These tools have been extremely useful to me and, possibly, other individuals as well. I use most of them on a weekly basis and I maintain them on my own.

      • Programming/Development

        • Jim NielsenThere’s More to Design Than Data and Rationality

          While the author suggests there’s more to math than “rigour and proofs”, I tangentially suggest there’s more to design than data and rationality. Design can be much richer when intuition and the intangible is factored into decision making. Too often, design is boiled down to what appears to be a material science: create something—anything really—put metrics in place to measure its success, then determine its ultimate value by purely numerical outcomes.

        • Shell/Bash/Zsh/Ksh

          • Mapping with gnuplot, part 2

            The first part of this series appeared back in 2018. It describes how you can use gnuplot to build a simplified GIS. I wasn't intending to do any more with this idea, but I was tinkering with animated map GIFs of Tasmania and realised that the gnuplot approach had some advantages. This post and the next one explain what I did. You don't need to refer to that 2018 post, since I'll repeat and update the information here.

        • Java

          • Linux HintMutator Method in Java

            In the English dictionary, to mutate means to have a new form. And so, a mutator, though not found in the English dictionary, means something that causes a change into a new form. A private variable is a field or property of a class in Java. There is no predefined method called mutator in Java. Instead, a mutator is a method in a class, and this method is meant to change the value of a private variable of the class. By convention, the programmer should begin the method name with “set”. So the method may be something like setAge(), setPrice(), setName(), etc.

  • Leftovers

    • TechdirtNokia Busted Helping Russia’s FSB Spy On Citizens, Activists, Journalists

      Telecom giants are no strangers to helping governments spy on journalists, activists, and their own citizens. AT&T, for example, is effectively so bone-grafted to the NSA here in the States, you literally cannot physically tell where the government ends and the telecom giant begins.

    • [Old] BBCEricsson says it may have paid bribes to Islamic State terrorists

      Chief executive Borje Ekholm told a Swedish newspaper an internal probe started in 2019 had found serious failings by staff and contractors.

      Money was paid to access areas in Iraq that were controlled by IS, he told Dagens Industri.

    • France24Shareholders sanction Ericsson board over Iraq corruption

      Shareholders in Swedish telecom giant Ericsson on Tuesday sanctioned the company's board and chief executive over its handling of a corruption scandal involving possible payments to the Islamic State group in Iraq.

    • ReutersEricsson CEO faces investor ire over handling of Iraq probe

      Investors publicly rebuked Ericsson (ERICb.ST) Chief Executive Borje Ekholm and the telecom equipment maker's board on Tuesday over a scandal involving potential payments to Islamic State.

      Ekholm's handling of an internal probe into Ericsson's operations in Iraq has come under scrutiny after the U.S. Department of Justice (DoJ) said the company was in breach of a 2019 deferred prosecution agreement for failing to inform U.S. authorities of potential misconduct it had uncovered there.

    • Science

      • OracHere we go again: Is evidence-based medicine an “illusion”?

        One of the advantages of having been a blogger for over 17 years is that you start to get a sense of history and perspective. You see the same things (or similar things) pop up over and over again. Indeed, that’s one reason why I frequently say about antivaccine conspiracy theories in the age of COVID-19 that “everything old is new again” and “there is nothing new under the sun in antivaxland” (e.g., misusing and misrepresenting VAERS); none of the conspiracy theories that have popped up since COVID-19 hit and shocked and surprised my colleagues are new. I don’t want to dwell on that, because the current topic is more general (although certainly COVID-19 cranks are involved). I’m referring to attacks on evidence-based medicine (EBM) as an “illusion” or somehow hopelessly compromised, for whatever reason (most commonly, corruption by big pharma).

      • VOA NewsTowering Ice Volcanoes Identified on Surprisingly Vibrant Pluto

        Scientists said that these cryovolcanoes -- numbering perhaps 10 or more -- stand anywhere from 1 kilometer (six-tenths of a mile) to 7 kilometers (4-1/2 miles) tall. Unlike Earth volcanoes that spew gases and molten rock, this dwarf planet's cryovolcanoes extrude large amounts of ice -- apparently frozen water rather than some other frozen material -- that may have the consistency of toothpaste, they said.

    • Education

      • The NationAcross the Country, Faculty Fight to Defend Academic Freedom

        Worse than McCarthyism, which only targeted individual dissenters, today’s repressive measures invade the curriculum and the classroom and threaten to deprive students of the rigorous examination of real-world problems that citizens of a democratic society need. While these educational gag orders originally focused on K-12 education, colleges and universities have also come under attack. And professors are fighting back as never before.

        Displaying an unprecedented solidarity, the academic community is mobilizing to confront what its members rightly perceive as an existential assault on their professional work and values. Faculty organizations, learned societies, even student groups are forming new coalitions and strengthening old ones as they engage in collective action to stem the tide of repressive legislation—and stiffen the spines of university administrators.

    • Hardware

      • The Register UKArm says devs need better multi-architecture support ● The Register

        Arm says heterogeneous compute architectures – those with a mix of CPUs, GPUs, DPUs, and other processor types – pose a challenge for software developers, and greater multi-architecture support is needed to address this.

        Specialized processing, as the chip designer refers to it, will likely succeed Moore's Law for driving innovation. System builders will focus on attributes such as performance, efficiency, and optimization for the task at hand rather than clock speed when combining CPUs, GPUs, DPUs, and other devices, Arm said.

        But this specialized processing model upends business as usual for software developers, according to Bhumik Patel, Arm's Director for Software Ecosystem Development. He says in a blog post that the answer is to enable a frictionless experience for developers to achieve multi-architecture support for the software they code.

    • Integrity/Availability

      • Proprietary

        • ABCSatellite modems nexus of worst cyberattack of Ukraine war

          A malicious software command that immediately crippled tens of thousands of modems across Europe anchored the cyberattack on a satellite network used by Ukraine’s government and military just as Russia invaded, the satellite owner disclosed Wednesday.

          The owner, U.S.-based Viasat, issued a statement providing details for the first time of how the most serious known cyberattack of the Russia-Ukraine war unfolded. The wide-ranging attack affected users from Poland to France, getting quick notice by knocking off remote access to thousands of wind turbines in central Europe.

        • Redmond MagazineGlobant Apparently [Cracked] by Lapsus Gang

          The Luxembourg-based company, with offices in 18 countries worldwide, didn't mention Lapsus$ in its Wednesday announcement. It just stated that there had been "unauthorized access" to "a limited section of company's code repository," which was associated with "a very limited number of clients." The clients weren't named, but Globant didn't find "any evidence that other areas of our infrastructure systems or those of our clients were affected."

        • IT WireLapsus$ breaches software consultancy firm Globant, steals source code

          The company did not blame any particular entity for the breach, but the Lapsus$ group, which has been in the news recently, claimed on its Telegram channel on Wednesday that it has broken into Globant's servers and filched some 70GB of customer source code.

          The Globant statement said: "According to our current analysis, the information that was accessed was limited to certain source code and project-related documentation for a very limited number of clients.

        • uni TorontoWe need a way to scan Microsoft Office files for malware

          Right now one issue is the same one we had with attachment types, where we didn't know what sort of attachments our users got, both in legitimate email and in spam. Today we don't know what sorts of things are in the Microsoft Office files our users receive. How prevalent are macros, embedded OLE objects, macros with suspicious attributes, and so on? Since it seems unlikely we'll be able to get a Microsoft Office scanning tool (either open source or commercial) that gives us a carefully curated 'good' or 'bad' answer, we're going to have to work that out based on our usage patterns, and that means learning what the usage patterns are.

        • TheGrugqKGB Fail Belarus Rail, the tale. [iophk: Windows TCO]

          On March 25th the Belarus railway system was sabotaged (again) as part of the ongoing campaign by partisans to hamper Putins war effort. These attacks have been ongoing since at least earlier this year, when the Cyber Partisans (BCP) hacked the railway’s network and began trashing it. First in a ransomware attack, and then in subsequent attacks by wiping critical hardware.

        • Security

          • CISAFBI Releases PIN on Phishing Campaign against U.S. Election Officials | CISA

            The Federal Bureau of Investigation (FBI) has released a Private Industry Notification (PIN) to warn U.S. election and other state and local government officials about invoice-themed phishing emails that could be used to harvest officials’ login credentials.

          • LWNSecurity updates for Wednesday []

            Security updates have been issued by CentOS (expat, firefox, httpd, openssl, and thunderbird), Debian (cacti), Fedora (kernel, rsh, unrealircd, and xen), Mageia (kernel and kernel-linus), openSUSE (apache2, java-1_8_0-ibm, kernel, openvpn, and protobuf), Oracle (openssl), Red Hat (httpd:2.4, kernel, kpatch-patch, and openssl), SUSE (apache2, java-1_7_1-ibm, java-1_8_0-ibm, kernel, openvpn, protobuf, and zlib), and Ubuntu (chromium-browser and paramiko).

          • The Hacker Mind: Follow The Rabbit

            Researchers Nir Ohfeld and Sagi Tzadik join The Hacker Mind to talk about their presentation at Black Hat Europe 2021 on the ChaosDB vulnerability. It’s about how they started with a deliberately misconfigured version of CosmosDB and ended up with complete unrestricted access to the accounts and the databases of thousands of Microsoft Azure customers.

          • CISAGoogle Releases Security Updates for Chrome | CISA

            Google has released Chrome version 100.0.4896.60 for Windows, Mac, and Linux. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system.

          • Security WeekFederal Agencies Instructed to Patch New Chrome Zero-Day | SecurityWeek.Com

            The US Cybersecurity and Infrastructure Security Agency (CISA) has warned federal agencies about an actively exploited zero-day vulnerability in Google’s Chrome browser.

            Tracked as CVE-2022-1096, the high-severity security hole was identified in Chrome’s V8 JavaScript engine and impacts all Chromium-based browsers.

            Google issued an emergency fix for this bug on Friday, and Microsoft followed suit the next day, updating its Chromium-based Edge browser.

          • Privacy/Surveillance

    • Defence/Aggression

      • FAIRDepicting Putin as ‘Madman’ Eliminates Need for Diplomacy

        Even before Russia invaded Ukraine, Western media have depicted Russian President Vladimir Putin as an irrational—perhaps mentally ill—leader who cannot be reasoned or bargained with. Such portrayals have only intensified as the Ukraine crisis came to dominate the news agenda.

      • Digital First MediaFBI agents raid home as death threats target Whitmer kidnap case judge, lawyers

        FBI agents have raided a Hazel Park home while investigating threats to the judge and defense lawyers in the Gov. Gretchen Whitmer kidnapping conspiracy trial, The Detroit News has learned.

        Agents are investigating threats directed at several people, including Chief U.S. District Judge Robert Jonker and defense lawyers Josh Blanchard and Christopher Gibbons, according to two sources familiar with the investigation who were not authorized to speak publicly about the probe. Jonker is presiding over the trial and the attorneys represent accused plot ringleaders Barry Croft and Adam Fox, respectively.

      • NBCFBI raids Michigan home after reported threats to judge, lawyers in Gov. Whitmer kidnapping case

        Jonker is presiding over the Grand Rapids trial of accused plot ringleaders Barry Croft and Adam Fox, and Blanchard and Gibbons are their attorneys.

        A law enforcement official confirmed to NBC News that it was Jonker, Blanchard and Gibbons who received threats.

      • VOA NewsTrial Opens of IS Suspect Accused of Kidnap, Murder of Americans

        El Shafee Elsheikh, a British citizen, is charged with involvement in the killings of American journalists James Foley and Steven Sotloff and aid workers Peter Kassig and Kayla Mueller.

      • NPRTrump White House phone records show 7-hour gap on Jan. 6

        The documents reported by The Washington Post and CBS reflect a call that Trump had with then-Sen. David Perdue, R-Ga., at 11:06 a.m., with the next call listed at 6:54 p.m. through the White House switchboard to get Trump aide Dan Scavino on the phone.

        Some details of that day's phone calls listed in the log — and some of those missing from the log — have also been previously reported.

      • CNNTrump brazenly asks Putin to release dirt about Biden's family

        The clip of Trump asking Putin for help was published by a news website founded by John Solomon, a pro-Trump journalist whose previous coverage about the Bidens' ties to Ukraine has been discredited. He told CNN that the interview was taped on Monday at Mar-a-Lago.

      • How to quickly end the war in Ukraine with $10 laser pointers

        Though outdoor laser pointer pictures are usually shot at night so the beam is easier to see, they can do just as much damage during the day. In the United States, the actions I am proposing are against the law and can result in jail time plus an $11,000 fine per incident. But in the case of Ukraine, this is war and saving the nation is worth the risk and the effort.

      • MedforthAfghan migrant commits deadly attack in Villeurbanne, France, on people who “do not read the Quran”: judges declare him criminally not liable for punishment

        Translation: In two hours, it will be exactly two years since Timothy Bonnet was stabbed to death in the street by Afghan migrant Sultan Marmed Niazi “because he did not read the Quran”.

      • The Tribune INEx-journalist among 2 terrorists killed in Srinagar encounter

        Two terrorists killed in an encounter between terrorists and security forces at Rainawari area in Central Kashmir's Srinagar district have been identified as Rayees Ahmad Bhat and Hilal Ahmad Rah, officials said on Wednesday.

        Police said Rayees Ahmad Bhat had been a journalist previously running an online news portal while Hilal Ahmad Rah, a categorised terrorist, belonged to Bijbehara in South Kashmir.

      • VOA NewsBritish Judges Quit Hong Kong Court Over Beijing-Imposed National Security Law

        Two senior British judges resigned from Hong Kong's highest court on Wednesday as part of a broader British rebuke of the territory's claim that its courts are independent of political interference.

        In a prepared statement released by Lord Robert Reed and his colleague Lord Patrick Hodge, the judges cited the territory's Beijing-imposed National Security Law (NSL) as central to their decision, which followed discussions with Dominic Raab, the U.K. lord chancellor and justice secretary.

    • Environment

      • New York TimesSoda and Beer Companies Are Ditching Plastic Six-Pack Rings

        The changes are taking different forms — from cardboard to six-pack rings made with leftover barley straw. While the transitions can be a step toward sustainability, some experts say that simply switching to different packaging material could be the wrong solution or not enough, and that more plastic needs to be recycled and remade.

      • MIT Technology ReviewA US oil-drilling hotspot is kicking out far more methane than we thought

        One of the largest and fastest-growing oil production sites in the US is emitting far more methane than previously measured. It’s well known that oil and natural-gas production is a significant source of the powerful greenhouse gas: methane that is trapped underground leaks out from wells and pipelines, and it can also be released intentionally through venting and flaring, or burning. But an aerial survey of the Permian Basin in New Mexico revealed more leakage than even the highest estimates had suggested to date.

      • Energy

    • AstroTurf/Lobbying/Politics

      • The HillRegulatory enforcement is our best weapon against cyberwar [iophk: Windows TCO]

        The executive order was an excellent first step in the right direction. It required the National Institute of Standards and Technology (NIST), in collaboration with industry and other partners, to develop a new framework to improve the security and integrity of the technology supply chain. As a direct response, in February 2022, NIST published Recommended Criteria for Cybersecurity Labeling of Consumer IoT Products and Recommended Criteria for Cybersecurity Labeling of Consumer Software. The publications recommended cybersecurity labeling for consumer software and consumer internet connected devices that will give the public a clear indication of whether a device or software meets cybersecurity criteria.

      • Hollywood ReporterTikTok “Deeply Concerned” by Facebook’s Paid Campaign to Promote Negative Coverage of Social App

        As reported by The Washington Post, Meta has paid a “right of center” marketing firm, Targeted Victory, to lead a campaign that has included placing op-eds and letters to the editor in local papers to promote anti-TikTok sentiment, especially when it comes to children using the app.

        Targeted Victory allegedly worked with local operatives to promote the negative coverage around purported trends on TikTok harming children to compel lawmakers to take action; the firm also sought to promote positive coverage about Meta and use the anti-TikTok pieces to deflect from government antitrust and privacy concerns leveled against the Facebook parent company, according to the Post‘s reporting.

      • The VergeFacebook funded anti-TikTok campaign through GOP firm

        Facebook’s parent company, Meta, has been paying one of the most prominent Republican consulting firms to run a nationwide campaign to sow distrust about one of the company’s top competitors, TikTok, according to a new report from The Washington Post on Wednesday.

        The firm, Targeted Victory, reportedly planted op-eds and letters to the editor in major local and regional newspapers across the country. A Targeted Victory director told staff that the firm needed to “get the message out that while Meta is the current punching bag, TikTok is the real threat especially as a foreign owned app that is #1 in sharing data that young teens are using,” according to emails obtained by The Post.

      • BBCWhy 'burner phones' are the talk of Washington

        In a statement to the Washington Post, Mr Trump said that he had never heard of the term "burner phone" and had no idea what it was.

        His assertion was quickly contradicted by John Bolton, the president's former national security advisor, who told CBS News that he and Mr Trump had spoken in the past of how burner phones could allow people to avoid having their calls scrutinised.

    • Misinformation/Disinformation

      • CS MonitorHow China uses influencers to build a propaganda network

        As China continues to assert its economic might, it is using the global social media ecosystem to expand its already formidable influence. The country has quietly built a network of social media personalities who parrot the government’s perspective in posts seen by hundreds of thousands of people, operating in virtual lockstep as they promote China’s virtues, deflect international criticism of its human rights abuses, and advance Beijing’s talking points on world affairs like Russia’s war against Ukraine.

        Some of China’s state-affiliated reporters have posited themselves as trendy Instagram influencers or bloggers. The country has also hired firms to recruit influencers to deliver carefully crafted messages that boost its image to social media users.

    • Censorship/Free Speech

      • Mint Press NewsNoam Chomsky, Cornel West, Naomi Klein Join Over 100 Academics Denouncing The Israel lobby’s Attempt To Cancel Lowkey

        The worldwide campaign of support for hip hop artist and political campaigner Lowkey is growing. Following the publication of Monday’s open letter backing the British-Iraqi rapper’s right to freedom of speech, more than 100 academics, journalists and other public figures have signed a letter of public support, denouncing what they see as a “coordinated smear campaign to demonize, defame and deplatform him.”

      • IGNDisney+ Is Censoring Some Violence in Falcon & Winter Soldier Series - IGN The Fix: Entertainment

        In Marvel news, even with the TV-MA Netflix Marvel shows on Disney Plus, it appears there's censorship happening on The Falcon and The Winter Soldier. [...]

      • VOA NewsBurundi Lifts Ban on BBC After Almost 3 Years

        Burundi's media authority announced Wednesday that it would lift a nationwide ban on the British Broadcasting Corporation (BBC), nearly three years after the broadcaster was forced to stop operating in the East African country.

        The National Communication Council withdrew the license for the broadcasting giant in 2019, accusing it of breaching press laws and unprofessional conduct.

      • VOA NewsUS Public School Libraries Pressured to Remove Certain Books

        Public school districts in multiple U.S. states are grappling with — and, in some cases, acquiescing to — demands by small but vocal groups of parents to rid school libraries of certain books about sexual minorities and racism in America. The desire of some parents to shield students from what they regard as immoral, sexually explicit or racially contentious content is drawing a sharp reaction from defenders of the free flow of ideas and information.

      • BBCColchester grammar teacher suspended over Prophet Muhammad mug

        "At this time we are looking into the matter. While we cannot comment on individuals, this will be reviewed in line with our policies and procedures and the appropriate robust action taken as necessary."

      • New York TimesBangladesh Sentences 4 to Death for Blogger’s Murder

        The killings sent a chilling message to secular bloggers in Bangladesh, where a bitter cultural battle has raged over whether the country is, or should be, a Muslim state.

      • David Revoy[Reposted] How proprietary social-medias are shaping the future of Pepper&Carrot

        Here is a longer than usual blog-post to share with you what I have in mind since the start 2022 and what I have been working on. All started after I have realized that many part of Pepper&Carrot were still designed for Internet as it was when I started the project in 2014 and forgot to evolve and embrace the new rules of the Internet as set by the giant proprietary social-medias of 2022. I'll try to explain at first my diagnosis, and then explain how I plan to adapt and changes I'll put into action.

    • Civil Rights/Policing

      • Site36Digital justice: German state of Baden-Württemberg launches „electronic criminal file“

        From 2026, electronic legal transactions should be possible completely without paper, but this could cause problems for defendants in custody.

      • The HillApple, Meta turned over user data to [frauds] using forged requests: report

        Apple and Facebook parent company Meta turned over user data last year to [frauds] pretending to be law enforcement officials, Bloomberg reported, citing three people familiar with the matter.

        The companies provided user details such as addresses, phone numbers and IP addresses in mid-2021 to the [frauds], sources told Bloomberg. The [frauds] had requested the information via forged "emergency data requests," which do not require court approval like typical warrants or subpoenas do.

        It's unclear how much data was turned over.

      • VOA NewsIran Again Bans Women from Soccer Stadium

        Iran has once again denied women entry to a soccer stadium to watch an international match, leaving hundreds of ticketed fans locked out, Iranian media said Wednesday.

        The World Cup qualifier against Lebanon on Tuesday night, won 2-0 by Iran, was played at the Imam Reza stadium in the northeastern city of Mashhad.

      • ReasonHe Disarmed a Gun-Wielding Menace in a San Jose Taqueria. Then the Cops Shot Him.

        Police won't release body cam footage of disputed incident for 45 days. Kaun Green may have saved some lives. When a brawl broke out in a San Jose, California, restaurant last weekend, the 20-year-old Contra Costa City College student and football player was able to get a gun away from one of the men who had started the fight.

        For his good deed, Green wound up being shot multiple times by local police.

      • Christian TodayNigeria may become the next Rwanda, warns report into violence against Christians

        The Joint Visit Report from HART, the International Organisation for Peace Building and Social Justice UK (PSJ-UK) and Christian Solidarity International (CSI) said that the perpetrators of these attacks "are rarely, if ever, brought to justice".

        In her foreword to the report, "Breaking Point in central Nigeria? Terror and Mass Displacement in the Middle Belt", Baroness Cox said she had visited Nigeria many times, but during her visit earlier this month she was advised for the first time to fly from the Nigerian capital, Abuja, to Jos, the capital of the Plateau state, rather than travel by road.

        This was "due to the increased frequency of killings and kidnappings – another indication that security is worsening in central states".

      • France24Iranian town removes statue of woman for un-Islamic dress

        The latest target of Iran’s compulsory hijab law: a statue recently installed on a street in Gorgan, in the northeast of the country. On March 25, city officials removed the sculpture because of a woman whose veil and dress was deemed inappropriate.

      • AccessNowLooming curbs on Tunisian civil society must be stopped - Access Now

        Tunisian authorities should immediately scrap plans for new restrictions on civil society organizations, 13 Tunisian and international rights groups said today.Those plans, if carried out, would reverse a major gain for freedom of association following the country’s 2011 revolution. They would constitute another blow to human rights safeguards by President Kais Saied since his July 2021 power grab.“Tunisians know from experience the dangers that restrictive laws can pose to civil society and public debate,” said Amna Guellali, Deputy Regional Director for the Middle East and North Africa at Amnesty International. “During the deeply repressive Ben Ali era, the authorities used restrictive regulations on associations and cumbersome administrative procedures as key tools to smother dissent.” A draft law to regulate civil society organizations was recently leaked. It would give government authorities overly broad powers and discretion to interfere with the way civil society organizations are formed, their functions and operations, their funding, and their ability to speak publicly about their work and to express their views.In a videotaped speech on February 24, President Saied accused civil society organizations of serving foreign interests and trying to meddle in Tunisian politics, and said he intended to ban all funding for such groups from abroad.“In the 10 years since Ben Ali’s ouster, nongovernmental organizations in Tunisia have played a crucial role in providing essential services to the public and holding the government accountable,” said Eric Goldstein, deputy Middle East and North Africa director at Human Rights Watch. “Their work should be promoted and protected rather than threatened.”Under Decree-Law 2011-88, both Tunisians and resident foreigners may freely establish civil society organizations, carry out a broad range of activities, lobby the authorities regarding laws and policies, speak publicly about their work and opinions, and receive foreign funding without government authorization.The authorities have not formally confirmed that they are amending the existing law, nor have they released a draft law, and it remains unclear whether it has been modified since being leaked. Draft laws in Tunisia have not been made public or subject to formal debate by parliament since President Saied suspended the body on July 25, 2021. Under a presidential decree issued on September 22, 2021, all laws are currently enacted as decree-laws issued by the president.

    • Monopolies

      • VarietyApple Will Let Content Apps Like Netflix, Spotify Link to Their Websites to Sign Up Users

        In a small but notable change, digital media providers with “reader” apps in Apple’s App Store — such as Netflix and Spotify — will now be able to provide links in their iOS apps to let customers sign up for and manage accounts on the companies’ own websites.

        Previously, Apple prohibited app developers from including any links to account sign-up pages. For purchases made within the app itself, Apple will still require developers to use Apple’s in-app payment system — under which Apple takes a 30% cut of subscriptions in year one, with that dropping to 15% starting in the second year. (Netflix and Spotify, among others, do not allow such in-app payments.)

      • Copyrights

        • Bjoern BrembsWhy Publication Services Must Not Be Negotiated

          This emphasis on competition refers back to the simple fact that as content (rather than service) providers, legacy publishers currently enjoy monopolies on their content, as, e.g., the European Commission has long recognized: In at least two market analyses, one dating as far back as 2003 and one from 2015, the EC acknowledges the lack of a genuine market due to the lack of substitutability: [...]

        • EFFDigital Rights Updates with EFFector 34.2

          Make sure you never miss an issue by signing up by email to receive EFFector as soon as it's posted! Since 1990 EFF has published EFFector to help keep readers on the bleeding edge of their digital rights. We know that the intersection of technology, civil liberties, human rights, and the law can be complicated, so EFFector is a great way to stay on top of things. The newsletter is chock full of links to updates, announcements, blog posts, and other stories to help keep readers—and now listeners—up to date on the movement to protect online privacy and free expression.€ 

Recent Techrights' Posts

[Video] The Media Facilitates Microsoft's Abuse, Bribes, and Growing Threats to National Security
The failure of the media to properly and independently explain what's happening will continue to doom the media
[Video] The Next Ten Years of Techrights in a World With Changing Threats and Technological Landscapes (or Trends That Are Buzzwords/Cargo Cults)
The video of today talks about the site's (and capsule's plan) for the future
Wikipedia is Vandalism, Brought to You by Microsoft and Bill Gates
Reprinted with permission from Ryan Farmer
Lennart Poettering and Fellow Microsofters Turn GNU/Linux Into Windows, Expect Poor Reliability With systemd-bsod
turning Linux into Microsoft Windows
The Effort to Silence (Squash) GNU/Linux Advocates and Press Coverage
If nobody even mentions it anymore, does it still exist?
Links 07/12/2023: Climate Events Occupied by Their Enemy, Workers Going on Strike
Links for the day
IRC Proceedings: Wednesday, December 06, 2023
IRC logs for Wednesday, December 06, 2023
A Googlebombing Campaign Targeting "Gemini" Takes on E-mail, Too
Google can do Googlebombing too (the term is even named after it)
[Video] Microsoft Without a So-called 'Common Carrier' (Windows Monoculture)
Windows Has Fallen
[Video] To Combat Efforts to Cancel or Kill the Career (and Reputation) of the People Who Made GNU/Linux We Must Rally the Community
nobody speaks better for projects and for licences than their own founders
Rumour: Major Finance Layoffs at Microsoft Next Week
If the rumour is true, we'll be hearing barely anything from the mainstream media next week
Links 07/12/2023: More EPO Patents Squashed, More Pfizer COVID-19 Vaccine "Glitches" Found
Links for the day
Still Not 'Canceled'
Ted Ts'o, Jan Kara, Linus Torvalds last month
Google is Googlebombing the Term "Gemini"
Could Google not pick a name that's already "taken"?
Links 06/12/2023: Bitcoin Rebound, China Downgraded by American Firm, Yahoo! Layoffs Again
Links for the day
Over at Tux Machines...
GNU/Linux news
Shooting the Messenger Using Bribes and Secrecy Bonds
We seem to live in a world where accountability for the rich and well-connected barely exists anymore
The Myth of an Aging (or Dying) GNU/Linux Leadership
Self-fulfilling prophecies as a tactic?
Links 06/12/2023: Many More December Layoffs
Links for the day
IRC Proceedings: Tuesday, December 05, 2023
IRC logs for Tuesday, December 05, 2023
PipeWire 1.0: Linux audio comes of age
Once upon a time, serious audio users like musicians and audio engineers had real trouble with Linux
This is How 'Linux' Foundation Presents Linux to the World
Right now it even picks Windows over Linux in some cases