Bonum Certa Men Certa

Links 11/04/2022: MX-21.1 “Wildflower” and OS/2 Nostalgia



  • GNU/Linux

    • 9to5Linux9to5Linux Weekly Roundup: April 10th, 2022

       This week has been kinda slow in Linux news and releases, but we did got a new Firefox release with some Linux goodies, newer versions of the EndeavourOS and MX Linux distributions for our PCs, as well as a new Raspberry Pi OS release for our tiny single-board computers.

      On top of that, this week brought us a new fwupd release to keep our devices up-to-date and a new KDE Frameworks release with lots of cool improvements for our Plasma desktop installations. You can enjoy this and much more in 9to5Linux’s Linux weekly roundup for April 10th, 2022, below!

    • Instructionals/Technical

      • DTPygments style gallery

        The content below was created by pygsgallery.py which is included in my PicoPygments repository. It is inspired by this script which I found on this page. Most of the builtin styles don't define a default text color; whenever pygsgallery.py encounters such a situation, it adds one that is the complement of the background color.

      • Matt RickardEvery Unix Command Becomes a Startup

        The Unix philosophy is

        Write programs that do one thing and do it well.

        Write programs to work together.

        Write programs to handle text streams, because that is a universal interface.

        Many of these unix programs would later end up as wildly successful web companies. (This original observation comes from Chris Dixon back in 2014).

      • uni TorontoA Linux PAM setup and the problem of stopping authentication

        Suppose, not hypothetically, that you have a Linux system where SSH logins are authenticated with passwords and then a MFA challenge. This is implemented the only sensible way, with a PAM module to do MFA, such as the one from Duo; you add this PAM module to your setup along side the existing PAM stuff used for SSH logins. This is all easy to set up and there's plenty of documentation on it, but now you'd like to go the extra distance so that the login fails immediately if people get the password wrong, rather than going on to also do a (pointless) MFA challenge.

      • uni TorontoUnderstanding the effects of PAM module results ('controls' in PAM jargon)

        There are two forms for these controls; the 'historical' and still very common single-word form that uses things like 'required' and 'sufficient', and the newer, more detailed and complicated syntax. There are two descriptions of the meanings of the historical single-word forms in pam.conf; the somewhat informal main description, and then the potentially more explicit version that restates them in terms of the newer and more detailed syntax. All of this makes for a system that can be hard to understand and follow.

      • [Old] SSH Port Forwarding and the Command Cargo Cult

        Both of these use at least one option that is entirely redundant, and the second can cause ssh to fail to connect if you happen to be using password authentication. However, they seem to still persist in various articles about ssh port forwarding. I myself was using the first variation until just recently, and I figured I would write this up to inform others who might be still using these solutions.

      • Old VCRTonight we're gonna log on like it's 1979 (Telenet, Dialcom and The Source)

        Teletypes may have killed a lot of forests by emitting every line to hard copy instead of a screen, but there's something to be said for the permanence of paper, especially when people hang onto it for some reason. While getting duff units to build a functional Silent 700 Model 765 ASR teletype, which will of course be a future article, one of them was more interesting for what else it came with: a set of teletype transcripts of several users logging onto The Source, one of the earliest online services, and a complete photocopy of the service's user manual. So get out your copy of Pink Floyd's The Wall, start blasting "In The Flesh," and let's head back to 1979 and 1980 when these transcripts were printed. We'll talk a little bit about the service generally and then log on exactly as these people did — because the Silent 700 transcripts indeed show exactly what transpired and how they used them.

      • Linux HintHow to Enable_Disable Line Numbering in Vi

        Vi/vim text editor is popular for Linux users because of its many unique features. Developers and regular users use its many features, one of which is that Vi can enable/disable its line number. The line number is the essential feature of Vi text editors, primarily for programming.

        Since the editor in Vim/vi has many commands that use the line number for navigation, this is the reason the line number is even more critical for Vim/Vi. Knowing just the number of a specific line, you can quickly move the cursor on it. Now, we will discuss this feature on how to enable/disable line numbering in Vi.

      • How to Create VPC (Virtual Private Cloud) Network in GCP

        VPC is a virtual private cloud in public cloud like GCP (Google Cloud Platform) and AWS. In simple terms, VPC is a dedicated private network for your project in google cloud platform. It provides networking for virtual machines, containers and app engine.

        In this guide, we will learn how to create customize VPC network in GCP (Google Cloud Platform) step by step. Without any further delay, let’s jump into steps.

      • How to Install Battle.net on Ubuntu 22.04 Linux Desktop

        Blizzard makes some extremely popular PC games, and their Battle.net application is how gamers install those games on their systems and keep them up to date. The only problem is that Blizzard has neglected the Linux community by never porting their Battle.net application over to it. Fortunately, most of the games still work pretty well on Linux if you are using Wine. We’ll show you how to install Wine and run Battle.net on Ubuntu 22.04 Jammy Jellyfish in this tutorial.

        Before getting started, it’s a good idea to make sure that your system has the latest graphics drivers installed. This will make the games run smoother and save you a possible headache later on.

      • Linux CapableHow to Install/Enable FirewallD GUI on Fedora 36 Linux

        FirewallD is software that provides the system firewall feature to protect Fedora users from unwanted access by disabling and enabling ports, services, or protocols. However, for users that are used to an interface such as Graphical User Interface (GUI), then the command line may seem difficult at first glance because there’s no visual representation and who are not comfortable learning the command line terminal to the possibility of having an unsecured system.

        However, you can install the FirewallD GUI. This sleek and simple design program is a perfect match for those who want easy access to what’s going on in their system without having too many bells and whistles to distract them from maintaining security.

        In the following tutorial, you will learn how to install and enable FirewallD and install FirewallD GUI on Fedora 36 Linux using the command line terminal.

      • Linux CapableHow to Install Linux Kernel 5.17 or 5.4 LTS on Rocky Linux 8

        Rocky Linux, as many know, is a downstream version of RHEL, which often means it is incredibly stable but usually has very outdated packages in terms of features and not security updates. Currently, Rocky Linux features kernel 4.18, but some users may require a more recent kernel for purposes of better hardware compatibility, among many other things.

        ELREPO has both Linux Kernel Mainline LTS versions. The mainline version is the most recent stable release of the Linux Kernel, and the current LTS Kernel they are supporting is 5.4.

        The following tutorial will show you how to import the ELRepo kernel repository and install 5.17 or with the alternative 5.4 LTS kernel on Rocky Linux 8 Workstation or Server using the command line terminal.

      • Linux CapableHow to Install GCC Compiler on Ubuntu 22.04 LTS

        GCC, better known as The GNU Compiler Collection, is a set of compilers and development tools. Front ends such as C, C++, Objective-C, Fortran, Ada, Go, and D. GCC is open-source and is widely used as it was the original compiler for GNU and is currently used to compile the Linux Kernel along with many other projects.

        In the following tutorial, you will learn how to install GCC on Ubuntu 22.04 LTS Jammy Jellyfish desktop or headless server using the command line terminal with alternative installation options and handy hints to switch between GCC Compiler versions.

      • Linux CapableHow to Install OpenJDK 8 on Ubuntu 22.04 LTS

        Java is a general-purpose, class-based, object-oriented multipurpose programming language that is popular due to the design of having lesser implementation dependencies, meaning that the compiled Java code can be run on all platforms that support Java without the need for recompilation. Java is also fast, secure, and reliable, therefore. It is widely used for developing Java applications in laptops, data centers, game consoles, scientific supercomputers, cell phones, etc.

        The tutorial will look at installing the OpenJDK version instead of the default Oracle JDK. The difference between these two is licensing. OpenJDK is an entirely free, open-source Java with a GNU General Public License, and Oracle JDK requires a commercial license under the Oracle Binary Code License Agreement. Other differences are release schedules and other factors that come into play; however, performance is the same.

        In the following tutorial, you will learn how to install OpenJDK 8 LTS or better known as Java 8 LTS, on Ubuntu 22.04 LTS Jammy Jellyfish with the standard APT installation from Ubuntu’s repository along with the PPA version, which may suit some users better. The tutorial will also demonstrate how to switch Java alternative default versions.

      • Linux HintAnsible Reboot

        Rebooting essentially means restarting the system you are using. As we all know, while using any computer, there are many reasons you might want to restart or reboot it. Rebooting allows your system to reset. The temporary memory gets cleared and the system starts again. Rebooting can be done either through hardware or software. In this article, we will be discussing how you can reboot your computer through Ansible.

        As you may know, Ansible can be used to control your system and its resources. So, Ansible can be used to control the computer on which it is installed. So, among carrying out other basic functions, you can also use it to reboot your system. For this, you can use the Ansible reboot module.

      • Linux HintDual Boot Debian and Windows

        This tutorial explains how to install Debian and Windows with dual boot.

        This article is useful for Windows users or a clean disk to install both systems.

        The tutorial gives optional instructions to prepare a Windows disk space to add Debian Linux and covers the Linux posterior installation to support dual boot. It does not cover the Windows installation process but instructions to make your Windows support adding Debian if you do not have an additional free disk for Linux.

    • Distributions

      • Matt RickardPlan9: Everything is (Really) a File

        One defining trait of Unix is that, in principle, everything is a file. This simplicity in design means that the same tools and APIs can be used for all sorts of things – managing physical devices like keyboards and mice (devfs), accessing kernel and process information (procfs), and of course your run-of-the-mill normal files. Yet, as surface area grew, syscalls and other APIs grew into implementations.

        Plan9 is one implementation that tried to generalize the Unix principle of "everything as a file" to everything, including things like computing and network resources. It was designed at Bell Labs by Ken Thompson (Unix, B, UTF-8, grep, and Go) and Rob Pike (Unix, UTF-8, Go) and others who worked on Unix. The OS has two design philosophies: (1) a simple messaging-oriented file system protocol (9P), and (2) a per-process name space.

      • New Releases

        • Trend OceansMX-21.1 “Wildflower” based on Debian 11 without systemd support

           The MX development team has released MX-21.1 with Debian 11.3 as a base OS, and this is the first release after the EOL (END OF LIFE CYCLE) of Linux kernel 5.14, where you can find the 5.16 kernel in XFCE AHS editions.

          Compared to other MX variants, you will still find the 5.10 Linux kernel to use in their mainline editions for the sake of stability. And this is the first release where you can test Debian 11 (Buster) without the systemd service.

      • Debian Family

        • Tom's HardwareRaspberry Pi OS Loses Default ‘Pi’ User for Security

          Today the official Raspberry Pi blog released a post detailing changes from the latest update to Raspberry Pi OS Bullseye. The biggest change is in the user account creation process which will no longer feature a default username, adding an extra layer of security for users by providing them an opportunity to create a custom username from the start.

    • Devices/Embedded

      • Open Hardware/Modding

        • Tom's HardwareRaspberry Pi and Raspberry Pi Pico Team Up for Robot Lawnmower Project

          This may look like a normal robot lawnmower, the sort that trundles mindlessly around suburban lawns all over the country, but OpenMower is more than that, thanks to the clever use of two Raspberry Pi boards. The brainchild of German tech entrepreneur Clemens Elflein, and reported on by Hackster, OpenMower upgrades the internals of a standard robot mower to make it smarter using a Raspberry Pi 4, and the $4 Raspberry Pi Pico.

        • Ken ShirriffReverse-engineering the LM185 voltage reference chip and its bandgap reference

          Many circuits, such as a computer power supply or a phone charger, require a stable voltage reference, but it's harder than you might expect to keep a voltage stable when the temperature changes. One integrated circuit that does this is the LM185.1 I looked at the die of this chip and found some interesting features. The same silicon die is used for three different integrated circuits, using tiny internal fuses to change its functionality. The chip uses a special circuit called the bandgap reference to keep the voltage stable even if the temperature changes. In this blog post, I'll discuss the circuitry of the LM185 and its implementation in silicon.

      • Mobile Systems/Mobile Applications

    • Free, Libre, and Open Source Software

      • Web Browsers

      • Programming/Development

        • What might degrowth computing look like?

          The past few years have seen various attempts within computing, programming and hacker communities to apply ‘degrowth’ principles to their work – i.e. sketching out ways to de-couple digital technology from the growth-focused imperatives of capitalist societies. These efforts have so far progressed in a piecemeal manner, led by assorted groups with broad interests around ‘radically sustainable computing’ (Heikkilä 2021). The hope, of course, is that these initial developments might signal the beginnings of mainstream change.

          One area of interest involves what has been labelled ‘Collapse Informatics’. This explores ‘preparedness’ approaches to computing – i.e. building systems in the abundant present that might later prove durable during subsequent times of scarcity. Allied to this is the notion of ‘Permacomputing’, advocating the application of permaculture principles to the digital domain. Here, interests centre on developing ways in which computing can be sustained through practices of re-use, repair, maintenance and non-waste. Crucially, permacomputing stresses the need to develop digital technologies that are drastically less reliant on artificial energy, and designed in ways that acknowledge their interdependence with natural systems.

        • RlangBayesian Estimation by using rjags Package

          This post shows how to use rjags R package to perform Bayesian MCMC estimation with multiple linear regression example. This is an easy tool for Bayesian analysis for us only if we understand the meaning of hyper-parameters of various prior distributions and use them without hesitation. \(\blacksquare\)

  • Leftovers

    • IT WireDon't want to be abused online? Simple, stay away from social media

      Facebook, Twitter, Instagram, TikTok – you name it, they are all concerned with the bottom line. If they do react to Ahmed and others of his ilk who mouth such sanctimonious rantings, it is because they want to appear to be good corporate citizens.

      They are not intent on driving people away; they know that numbers are what guarantee their profits. But they also know that mass movement of people is rare, unless someone comes up with a competing site. Given the scale at which they operate, such sites are unlikely to be built now. Humans beings are still very much creatures of habit.

    • OS/2
    • OS/2

      It's yet another year, it's already April, and I haven't written anything here for a long time. Sorry for that. Life kept my busy, but that's a lame excuse I guess.

      Lately, I've been playing with OS/2 again. Last time I used OS/2 was back in the 90s, when I had installed it as my only operating system on my PC. I think this was around 1995, and I was using OS2 Warp 3 then. Some friends of mine were running a computer shop, and a single boxed version of OS/2 was collecting dust on the top shelf behind the counter. I could not resist, so I gave it a try.

      I can't recall a lot of the software I used, besides the gopher client and a web browser (I'm pretty sure it was the IBM Web Explorer at that time). I also remember spending quite some time trying to find a driver for my graphics card. OS/2 performed so much better on my PC than Windows. And also, it provided both Win 3.11 and DOS at the same time. I really loved that system.

      A year later, in late 1996, I switched operating system to Linux, and I never looked back since then. So I never saw or used Warp 4.52, IBMs last release of OS/2. My bank was still using OS/2 everywhere, but that must have been one of my last thoughts about OS/2.

      I surely never heard about eComStation (The successor of OS/2 Warp 4.52). And neither about ArcaOS, which is the latest version of the OS/2 based system, with its latest release published just before christmas in 2021.

    • Modules and Toolboxes



      Date of Expiration is such an amazing module in spite of the tech theme. A module with a map this quality, encounter tables this rich, and cross-references this thorough… one of the top adventures I’ve ever ran.

      I was comparing Date of Expiration, Ruins of the Grendleroot, and Scarlet Citadel. DoE has everything spelled out and ready to run, is super blorby and tight and also really well organized. Scarlet Citadel, I was so hyped for (I posted that photo of me holding up the book) but the book is so verbose and has plenty of real really handwavy “DM decides” sections.

    • The Art that Broke the Mold

      I ended up really liking both seasons of Anita’s feminist video game show that she did with McIntosh. I was watching the episodes as they were released and they helped me get back into gaming with her encouragement to both enjoy and criticize media, which helped me to enjoy the good parts of these these disturbing games.

      I was surprised that I liked them as much since I had thought (I wasn’t a crowdfunding backer); her first show (about tropes generally, not just games) was basic and overly 101 and “doesn’t everyone know this?” (Gamergate showed how very, very wrong I was about that, and now I think that show was good since those “101” basic points was not was universally agreed-upon and known as I believed.)

      But tonight I’m rewatching (I also saw it when it first came out) this breadtube essay on Blazing Saddles and I’m thinking how much more successful Anita’s points would’ve been conveyed with a similar formula: absolutely gush over a piece of classic media and use it to explain points in a positive way. People like liking things and like hearing why the movie or game is good, actually, and how groundbreaking it was and how it illuminated the kyriachal structures.

    • Hardware

      • HackadayBoards For Playful Exploration Of Digital Protocols

        Teaching people efficiently isn’t limited to transmitting material from one head to another — it’s also about conveying the principles that got us there. [Mara Bos] shows us a toolkit (Twitter, nitter link) that you can arm your students with, creating a small playground where, given a set of constraints, they can invent and figure communication protocols out on their own.

      • HackadayRobotic Boat Rides High On PVC Pipe Pontoons

        If you want to build your own rover, there’s plenty of cheap RC trucks out there that will provide a serviceable chassis to work with. Looking to go airborne with a custom drone? Thanks to the immense popularity of first-person view (FPV) flying, you’ll find a nearly infinite variety of affordable fixed wing and quadcopter platforms out there to chose from. But when it comes to robotic watercraft, the turn-key options aren’t nearly as plentiful; the toys are all too small, and the commercial options are priced for entities that have an R&D budget to burn. For amateur aquatic explorers, creativity is the name of the game.

      • HackadayA Super Simple DIY Ozone Generator

        [Advanced Tinkering] needed a source of fresh ozone for some future chemistry related projects, and since buying an off-the-shelf unit would be, well, just plain boring, it was obvious what to do (Video, embedded below).

      • HackadayThis 3.5mm Cable Distorts Signals, Hides Audio-Filtering Circuit

        [Avian]’s dad got a new ham radio transceiver with a 3.5 mm jack, and his pile-of-cables got him a headphone cable from Bose headphones. He built a DB9 to 3.5 mm adapter with that one – and it failed to let data through, outputting distorted garbage of a waveform instead. With a function generator and an oscilloscope, [Avian] plotted the frequency response of the cable, which turned out to be quite far from a straight line. What was up?

      • HackadayA Turbocharged Robot Mop To Save Your Date

        Cleaning robots are great and all, but they don’t really excel when it comes to speed. If your room looks like a pigsty and your Tinder date is arriving in twenty minutes, you’ll need more than a Roomba to make a good impression. [Luis Marx] ran into this exact problem and decided to solve it by building the world’s fastest cleaning robot (video, embedded below).

      • HackadayRetrotechtacular: A DIY Television For Very Early Adopters

        By our very nature, hackers tend to get on the bandwagon of new technology pretty quickly. When something gee-whiz comes along, it’s folks like us who try it out, even if that means climbing steep learning curves or putting together odd bits of technology rather than waiting for the slicker products that will come out if the new thing takes off. But building your own television receiver in 1933 was probably pushing the envelope for even the earliest of adopters.

    • Health/Nutrition/Agriculture

    • Integrity/Availability

      • Proprietary

        • SANSWindows MetaStealer Malware

          Since Wednesday 2022-03-30, at least 16 samples of a specific Excel file have been submitted to VirusTotal.

          These malicious Excel files are distributed as email attachments.

        • ZimbabweThe crazy drama behind the High Court ruling ZIMDEF’s SAP software tender is illegal

          In early 2021 the Zimbabwe Manpower Development Fund (ZIMDEF) called for companies to bid to provide it with Systems Applications and Products (SAP) software. Companies made their bids and ZIMDEF picked one, Tano Digital Solutions, and thought that would be the end of that.

          Nope, it’s never that simple. One company challenged the awarding of the tender to Tano and the High Court of Zimbabwe upheld it. Effectively ruling that the tender award was illegal.

        • Security

          • Privacy/Surveillance

            • Jeffrey PaulApple is Still Tracking You Without Consent

              In the current version of macOS, Monterey, on every system update on a system containing an M1 chip, such as all the new shiny/fast ARM (“Apple Silicon”) macs, the update process phones home to Apple to obtain a special boot signature, known in Apple jargon as a “ticket”.

    • Defence/Aggression

      • VOA NewsFormer Hostages Unmask Islamic State 'Beatle' at US Trial

        They were turned over to U.S. forces in Iraq and flown to the United States to face charges of hostage-taking, conspiracy to murder U.S. citizens and supporting a foreign terrorist organization.

        Elsheikh is charged with the murders of American freelance journalists James Foley and Steven Sotloff and aid workers Kayla Mueller and Peter Kassig and suspected of the kidnapping of nearly 20 other Westerners.

      • ANF News‘ISIS attack in Hesekê directed by the Turkish state’

        The attempted storming of the detention center for ISIS prisoners in Hesekê was supported by the Turkish state. According to the statements of a captured ISIS member, the preparations were made in the Turkish occupied zone in northern Syria.

    • Environment

      • Energy

        • Common DreamsOpinion | What You Really Need to Know About the Latest IPCC Climate Report

          The world’s top climate scientists just delivered their rescue plan for humanity, directly to our governments. The Working Group III Report contribution to Sixth Assessment Report from the Intergovernmental Panel on Climate Change (IPCC) focuses on how to reduce further warming and follows the first two reports of the assessment, on the physical science and climate change impacts. It’s a thick report on climate solutions that can and must be put into action right now.

        • Common DreamsWest Virginians Lead Blockade of Coal Plant That Made Manchin Rich

          Organizers of the "Coal Baron Blockade" protest which targeted right-wing Democratic Sen. Joe Manchin's coal empire Saturday afternoon reported that state police almost immediately began arresting campaigners who assembled in Grant Town, West Virginia.

          "Sen. Joe Manchin's policies hurt poor people and hurt our environment so deeply that activists are ready to put themselves on the line," tweeted the Poor People's Campaign, which joined grassroots group West Virginia Rising and other organizations in the blockade.

        • Bert HubertDutch Electrical Power Numbers part 2

          In an earlier post I presented a naive model for estimating Dutch electrical solar power generation numbers. It turns out that the Dutch electrical power generation numbers are an even bigger mess than I appreciated.

          It appears that “everyone knows” that the numbers are confusing and incomplete but somehow just how incomplete the numbers are isn’t written down anywhere.

          So I’ll give it a shot.

        • [Old] Breaking the cycle of digital dependency (notes on Agnew 2020)

          While there is growing awareness that the over-use of digital technologies is a contributing factor in environmental collapse, it nevertheless seems utterly impossible to change. How can I continue to function without a smartphone? How can I keep in contact with distant family and friends without Facebook? Any efforts to establish alternate climate-friendly ways of living over the next few decades therefore need to address this impasse … in short, how can affluent global North societies break their destructive cycle of mass over-consumption of digital technologies?

      • Wildlife/Nature

        • FuturismScientist Says Mushrooms Have A Language They Use To Talk To Each Other

          A scientist from the University of the West of England says the electrical impulses mushrooms send out may be a form of communication used to talk to each other.

          Professor Andrew Adamatzky published his research yesterday in the journal Royal Society Open Science. Adamatzky put electrodes in soil that had mycelium, the “root” of the fungi, as well as into the fruiting body of the mushrooms themselves, which is the part that grows above the ground. He used enoki, caterpillar, split gill and ghost mushrooms, and analyzed the electrical activity each one gave off. He found evidence, he told The Guardian, of a mysterious mushroom language that could have as many as 50 words.

    • AstroTurf/Lobbying/Politics

      • TruthOutOutside Spending Jumps for Local Candidates Who Cast Doubt on 2020 Election
      • BBCPutin's mysterious Facebook 'superfans' on a mission

        Russia's invasion of Ukraine has been widely condemned in many parts of the world, but a network of Facebook groups run by people with obscure motivations would like to change perceptions of the country's leader.

      • Rolling StoneHow Joe Manchin Knifed the Democrats — and Bailed on Saving Democracy

        Rolling Stone interviewed more than 30 key figures inside and outside of Congress to understand how the most ambitious voting-rights bill in generations and the Democratic Party’s main policy response to the Jan. 6 insurrection ended in failure. The blame for this defeat, sources say, lies with multiple parties: Manchin either strung along his party for months with no intention of actually supporting the reforms or gave indications to his colleagues that he was on board only to reverse his position on multiple occasions. Senate Democrats, meanwhile, miscalculated that if they could flip Manchin, another swing vote, Kyrsten Sinema of Arizona, would follow his lead. As for the White House, these sources say, President Biden — despite saying as a candidate that “one of the first things I’ll do as president” is restore the Voting Rights Act — never seemed fully committed to passing voting-rights legislation. When Biden, who had vowed to run an “FDR-sized presidency,” did inject himself into the negotiations late in the fight, his contributions did more harm than good.

      • Sword and Scimitar “Gives a More Complete Account of the Troubled History between Islam and Christianity than Is Generally Available”

        Throughout the book Ibrahim emphasizes the widespread practice of enslaving the conquered Christians. Muslim accounts mention the preference for fair skinned women. This went on from the 7th through the 19th centuries. Over a three century period beginning in the mid-15th century about 3 million Slavs—Poles, Lithuanians, Russians and Ukrainians—were enslaved.

        Overall, Ibrahim has given a more complete account of the troubled history between Islam and Christianity than is generally available. His focus on how the combatants primarily viewed the struggle as a religious war is especially useful in a period when such phenomenon in the West is viewed through a secular lens, and it helps explain the views of contemporary jihadists. In a time when more general accounts are likely to narrowly focus on the Crusades and Western colonialism, Ibrahim’s important book explains the origins of both.

    • Misinformation/Disinformation

      • ABCPoland-Ukraine ties seen as target of Russian disinformation

        “The Russian efforts to sow divisions between the Poles and Ukrainians, particularly by means of exploiting historical issues, are as old as time,” said Stanislaw Zaryn, the spokesman for Poland’s security services.

        “Russia has redoubled them since the war began,” he said. “And they are more dangerous now because the war is going on and it can affect more people than before."

    • Censorship/Free Speech

    • Freedom of Information/Freedom of the Press

      • Protesters mark third anniversary of Julian Assange’s arrest

        Monday marks three years since his arrest and detention in the prison while the United States continues with legal moves to extradite him.

      • SBSIt's been three years since Julian Assange was imprisoned. Advocates say it's time to let him go

        The three-year anniversary of WikiLeaks founder Julian Assange's arrest is spurring a renewed push for Australia to step up diplomatic efforts to secure his release.

        The 50-year-old Australian was dragged from London's Ecuador Embassy on 11 April 2019 to face extradition to the United States on espionage charges over WikiLeaks' release of confidential US military records and diplomatic cables.

      • La Prensa LatinaEcuador raids office of Swedish computer scientist friend of Assange

        Ecuadorian authorities Friday raided the office of Swedish cyber security expert Ola Bini, WikiLeaks founder Julian Assange’s friend, facing allegations of illegal access to computer systems of the South American country.

        Bini, the 39-year-old founder of the non-profit organization Center for Digital Autonomy (CAD) in Quito, is accused of trying to access information from the computers of state oil company Petroecuador and an intelligence office.

        Bini’s lawyer, Carlos Soria, told EFE that the raid by the police and agents from the prosecutor’s office was without any court orders.

      • ReasonAre Newsletters the Future of Free Speech?

        We're not strictly anti-algorithm. Algorithms are like equations, right? They appear all over the place and do different things. But we're very skeptical about the consequences of organizing the media ecosystem around engagement.

        You guys have said that algorithms as used by Facebook, YouTube, or Twitter produce and incentivize cheap conflicts.

        I don't think it's the algorithms that do that; it's their business models. These artificial intelligences arise to maximally serve the business model. The thing that the business model needs is total monopolization of your attention. Then the way that they do that is by creating these addictive experiences that amplify the most engaging stuff.

    • Civil Rights/Policing

    • Monopolies

      • Patents

        • Software Patents

          • Fat Statz patent held invalid

            On April 4, 2022, the Patent Trial and Appeal Board (PTAB) issued the public version of a final written decision in Unified Patents, LLC v. Fat Statz, LLC holding all of the challenged claims of U.S. Patent 9,757,066 unpatentable and denying the patent owner’s motion to amend. The ’066 patent is generally directed to a behavior management system that allows users to track and compare fitness and health-related data. The ‘066 patent was asserted against Samsung in early 2020.

          • $2,000 for Linfo IP '132 prior art

            On March 24, 2022, Unified Patents added a new PATROLL contest, with a $2,000 cash prize, seeking prior art on at least claim 1 of U.S. Patent 9,674,132, owned by Linfo IP LLC, an NPE and subsidiary of Dynamic IP Deals, LLC. The '132 patent generally relates to a user interface for managing emails and other message communications and are disclosed as solutions for reducing confusion and avoiding mistakes in communications when replying to a message with multiple recipients.

      • Copyrights

        • Torrent FreakPopular Torrent Site Lists MPA's Content Protection Chief as Owner

          Most pirate sites try not to grab the attention of rightsholders and anti-piracy groups. Spanish torrent site DonTorrent is clearly not on that list because it openly taunts the Motion Picture Association. The site lists MPA's Chief of Global Content Protection Jan Van Voorn as the 'official' owner in its legal disclaimer.



Recent Techrights' Posts

Workers' Right to Disconnect Won't Matter If Such a Right Isn't Properly Enforced
I was always "on-call" and my main role or function was being "on-call" in case of incidents
A Discussion About Suicides in Science and Technology (Including Debian and the European Patent Office)
In Debian, there is a long history of deaths, suicides, and mysterious disappearances
Federal News Network is Corrupt, It Runs Propaganda Pieces for Microsoft
Federal News Network used to be OK some years ago
Hard Evidence Reinforces Suspicion That Mark Shuttleworth May Have Worked Volunteers to Death
Today we start re-publishing articles that contain unaltered E-mails
 
Frans Pop suicide and Ubuntu grievances
Reprinted with permission from disguised.work
Links 30/04/2024: More Google Layoffs (Wide-Ranging)
Links for the day
Fresh Rumours of Impending Mass Layoffs at IBM Red Hat
"IBM filed a W.A.R.N with the state of North Carolina. That only means one thing."
Mark Shuttleworth's (MS's) Canonical is Promoting Microsoft This Week (Surveillance Slanted as 'Confidential')
Who runs Canonical these days? Why does Canonical help sell Windows?
What Mark Shuttleworth and Canonical Can to Remedy the Damage Done to Frans Pop's Family
Mr. Shuttleworth and Canonical as a company can at the very least apologise for putting undue pressure
Amnesty International & Debian Day suicides comparison
Reprinted with permission from disguised.work
[Meme] A Way to Get No Real Work Done
Walter White looking at phone: Your changes could not be saved to device
Modern Measures of 'Productivity' Boil Down to Time Wasting and Misguided Measurements/Yardsticks
People are forgetting the value of nature and other human beings
Countries That Beat the United States at RSF's World Press Freedom Index (After US Plunged Some More)
The United States (US) was 17 when these rankings started in 2002
Record Productivity and Preserving People's Past on the Net
We're very productive these days, partly owing to online news slowing down (less time spent on curating Daily Links)
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Monday, April 29, 2024
IRC logs for Monday, April 29, 2024
Links 30/04/2024: Malaysian and Russian Governments Crack Down on Journalists
Links for the day
Frans Pop Debian Day suicide, Ubuntu, Google and the DEP-5 machine-readable copyright file
Reprinted with permission from disguised.work
Axel Beckert (ETH Zurich), the mentality of sexual violence on campus
Reprinted with permission from Daniel Pocock
[Meme] Russian Reversal
Mark Shuttleworth: In Soviet Russia's spacecraft... Man exploits peasants
Frans Pop & Debian suicide denial
Reprinted with permission from disguised.work
The Real Threats to Society Include Software Patents and the Corporations That Promote Them
The OIN issue isn't a new one and many recognise this by now
Links 30/04/2024: OpenBSD and Enterprise Cloaking Device
Links for the day
Microsoft Still Owes Over 100 Billion Dollars and It Cannot be Paid Back Using 'Goodwill'
Meanwhile, Microsoft's cash at hand (in the bank) nearly halved in the past year.
[Teaser] Ubuntu Cover-up After Death
Attack the messenger
The Cyber Show Explains What CCTV is About
CCTV does not typically resolve crime
[Video] Ignore Buzzwords and Pay Attention to Attacks on Software Developers
AI in the Machine Learning sense is nothing new
Outline of Themes to Cover in the Coming Weeks
We're accelerating coverage and increasing focus on suppressed topics
[Video] Not Everyone Claiming to Protect the Vulnerable is Being Honest
"Diversity" bursaries aren't always what they seem to be
[Video] Enshittification of the Media, of the Web, and of Computing in General
It manifests itself in altered conditions and expectations
[Meme] Write Code 100% of the Time
IBM: Produce code for us till we buy the community... And never use "bad words" like "master" and "slave" (pioneered by IBM itself in the computing context)
[Video] How Much Will It Take for Most People to Realise "Open Source" Became Just Openwashing (Proprietary Giants Exploiting Cost-Free or Unpaid 'Human Resources')?
turning "Open Source" into proprietary software
Freedom of Speech... Let's Ban All Software Freedom Speeches?
There's a moral panic over people trying to actually control their computing
Richard Stallman's Talk in Spain Canceled (at Short Notice)
So it seems to have been canceled very fast
Links 29/04/2024: "AI" Hype Deflated, Economies Slow Down Further
Links for the day
Gemini Links 29/04/2024: Gopher Experiment and Profectus Alpha 0.9
Links for the day
[Video] Why Microsoft is by Far the Biggest Foe of Computer Security (Clue: It Profits From Security Failings)
Microsoft is infiltrating policy-making bodies, ensuring real security is never pursued
Debian 'Cabal' (via SPI) Tried to Silence or 'Cancel' Daniel Pocock at DNS Level. It Didn't Work. It Backfired as the Material Received Even More Visibility.
know the truth about modern slavery
Lucas Nussbaum & Debian attempted exploit of OVH Hosting insider
Reprinted with permission from disguised.work
Software in the Public Interest (SPI) is Not a Friend of Freedom
We'll shortly reproduce two older articles from disguised.work
Harassment Against My Wife Continues
Drug addict versus family of Techrights authors
Syria, John Lennon & Debian WIPO panel appointed
Reprinted with permission from disguised.work
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, April 28, 2024
IRC logs for Sunday, April 28, 2024
[Video] GNU and Linux Everywhere (Except by Name)
In a sense, Linux already has over 50% of the world's "OS" market
[Video] Canonical Isn't (No Longer) Serious About Making GNU/Linux Succeed in Desktops/Laptops
Some of the notorious (or "controversial") policies of Canonical have been covered here for years
[Video] What We've Learned About Debian From Emeritus Debian Developer Daniel Pocock
pressure had been put on us (by Debian people and their employer/s) and as a result we did not republish Debian material for a number of years
Bruce Perens & Debian public domain trademark promise
Reprinted with permission from disguised.work
Links 28/04/2024: Shareholders Worry "AI" Hype Brings No Income, Money Down the Drain
Links for the day
Lawyer won't lie for Molly de Blanc & Chris Lamb (mollamby)
Reprinted with permission from disguised.work
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, April 27, 2024
IRC logs for Saturday, April 27, 2024