Russian government agencies, too, are switching from Microsoft's Windows to the Linux operating system, the Moscow Times reported last Friday. Developers of Russian systems based on the Linux open source operating system are also seeing more demand, Kommersant reported.
This week’s episode of Destination Linux, we’re going to be interviewing Christian Schaller and Lukas Tyrychtr about accessibility work being done in Linux. Then we will be discussing a new educational distro that would be perfect for your Chromebook. Plus, we have our tips/tricks and software picks. All this and more coming up right now on Destination Linux to keep those penguins marching!
Vim, the terminal text editor is back with a major update.
The Vim 9.0 release includes several tiny improvements along with a new script language (Vim9 script).
Here, let me highlight the key changes.
 Autodesk, Inc. is an American multinational software company that makes software products and services for the architecture, engineering, construction, product design, manufacturing, media, education, and entertainment industries. It bills itself as a “… leader in 3D design, engineering and entertainment software”.
The company was founded in 1982 by John Walker, who was a joint developer of the first versions of AutoCAD, the company’s best known software application. Autodesk is listed on the Nasdaq stock exchange, it has over 11,000 employees, and is headquartered in the San Francisco Bay Area.
While Autodesk develops many high quality applications they are proprietary software. And the vast majority of their products are not available for Linux. This series looks at the best free and open source alternatives.
 HPLIP 3.22.6 is here exactly two months after the HPLIP 3.22.4 release, which only added support for the Manjaro Linux 21.2 distribution and several new printers, to add support for more recent distributions, including Ubuntu 22.04 LTS, Fedora Linux 36, and MX Linux 21.1.
This means that you can now use your HP printer or scanner device on any of these new Fedora, Ubuntu or MX Linux distributions if you install the HP Linux Imaging and Printing 3.22.6 version.
Setting this up with Linux's policy based routing is straightforward and almost mechanical. However, the setup has a lot of moving parts and there's no current automation for it that I know of. You can build your own, of course, but then that means you're stuck maintaining and operating your own automation; at that point you (we) start asking if you (we) really need symmetric routing, or if it's just a nice to have thing.
I added code to John the Ripper to crack PDF owner passwords (JtR cracks PDF user passwords only).
While installation of RHEL 9, the installer recommends we choose a complex password and while making the password complex enough, the chances of forgetting our password are quite high. And things get even more complex when your user is not even added to the wheel group (which allows a normal user to elevate root privileges for a small amount of time).
This tutorial will guide you on how you can change your forgotten root password in 3 scenarios and we are quite sure that you’ll be able to recover your forgotten password at the end of this guide.
In this post, you will learn how to install ntopng in Ubuntu 22.04. This powerful network monitoring tool is a marvel that we can always install to take advantage of it.
/etc/aliases is a text file used to store email aliases on a Linux system. Email aliases are basically nicknames for email addresses. They allow you to send emails to a group of people using a single address, or to redirect emails from one address to another.
/etc/aliases are typically used to store aliases for the system’s mail server. However, it can also be used to store aliases for any other purpose.
For example, you could use /etc/aliases to create an alias for your own email address. This file is stored in the /etc directory, which is the standard location for system-wide configuration files. /etc/aliases are usually managed by the system administrator. However, you can also edit /etc/aliases yourself if you need to add or change an alias.
In this article, I will take you through the steps to install LXC (Linux containers) on RHEL/CentOS/Rocky Linux but before that let’s understand the first LXD. It is a free and open source next-generation system container and virtual machine manager. LXD provides a template that contains images of almost all the major Linux distributions. These images can be used to create Linux containers using the LXC utility. This is a CLI-based client utility provided by LXD. When running a virtual machine, LXD uses the hardware of the host system, but the kernel is provided by the virtual machine. Therefore, virtual machines can be used to run, for example, a different operating system.
You probably already know how to get your system’s IP address in Linux.
But how do you know the IP address of your router?
Web application penetration testing is a technique that aims at evaluating web applications and gathering information concerning the possible vulnerabilities and security flaws in the system. The technique involves a series of steps that include identifying vulnerabilities and gathering detailed information on how these vulnerabilities could compromise the web application and impact business.
GNU Nano is an editor that has a minimal learning curve and hence is widely used for beginner-level guides.
That doesn't mean that it is as easy to use for beginners as a graphical text editor. Why? because you still have to rely on the keyboard shortcuts to do the basic things such as save, undo, etc.
How about cut, copy and paste in Nano? Does it require specific keyboard shortcuts too?
Well, yes and no. You can use the mouse to copy-paste. There are also keyboard shortcuts for the same purpose. To cut, you must use shortcuts.
While updating packages in your system, you might not want to allow specific packages from transactions, such as updates, for various reasons, such as bugs or instability in the latest release.
Packages such as Kernel, PHP, MySql, Apache, Nginx, Python, etc., are regularly used on the running server. Updating them into unstable releases might lead to a catastrophe event.
Return to Monkey Island, the continuation of the story from he Secret of Monkey Island and Monkey Island 2: LeChuck’s Revenge now has a first gameplay trailer. With a return of series creator Ron Gilbert and developed in collaboration with Lucasfilm Games, it's certainly an exciting game to keep an eye on.
Love your classic Zelda-like adventures? Elementallis looks like a great one to keep an eye on with some interesting elemental magic involved. Funded thanks to Kickstarter a while ago, it's coming to Linux with Native support and there's a demo available.
Pocket Wheels looks like what you could imagine in your mind when playing with toy cars as a child and it's on the way to Linux with Native support.
Blending the frantic action from the Overcooked series with inspiration taken from Studio Ghibli film Spirited Away, the upcoming Linux Native game Onsen Master looks like fun.
Love your musical games and want to get into the rhythm? Fech The Ferret looks like a pretty clever blending of ideas.
A fresh Steam Deck Client Update is out now pulling in some rather useful sounding bug fixes. They've actually slowed down a little on the updates now, which is actually good to see so hopefully there's something a little bigger cooking in the Valve oven once again.
Christian Ludwig "wrote a tool to statically analyze spl(9) kernel locking in OpenBSD. It even found some bugs."
In this article I want to show how we can analyze the OpenBSD kernel with domain-specific knowledge of spl(9) locking primitives, to find programming errors.
This work was sponsored by Genua GmbH. Genua uses OpenBSD as a basis of many of their products. They allow developers to have a retreat twice a year for one week to hack on their own projects. This work is a result of it.
Developed by Red Hat, Red Hat Enterprise Linux, colloquially abbreviated as RHEL, is a commercial opensource Linux distribution tailored for the enterprise market. It is available for both server and desktop versions. For servers, it is available for x86-64, IBM Z, ARM64, and Power ISA. For the desktop version, it is avaiable for the x86-64 architecture.
The Upstream project on which Red Hat Enterprise Linux major releases are based is Fedora Linux. This is where crucial OS innovations are introduced and thoroughly tested.
There have been some remediations for some issues with the MQSeries message queuing middleware for the IBM i platform, including IBM MQ Version 9.2.4 CD and IBM MQ Version 9.2.5 CD. You can find out more here. As for remediation or fixes, this issue was resolved under APAR IT40453. Upgrade to IBM MQ Version 9.3, there are no workarounds and mitigations.
Infor is no longer developing an on-premise and containerized version of M3, its ERP system that’s popular with IBM i customers. While the CM3 project is apparently dead, the company is working to certify the latest release of the ERP system on IBM i version 7.5, IT Jungle has learned.
IBM i shops that are concerned about ransomware attacks may be interested in a new release of PowerTech Antivirus from HelpSystems, which can automatically detect ransomware activity on the IBM i system and block it before it can cause damage. There’s also a nifty new “canary file” feature that will hopefully keep IBM i users from falling down the coal mine.
Along with the usual bug fixing, maintenance, and upstream version enablement work that goes into every Charmed Ceph release, we also worked on a number of new features in this cycle.
At this year’s Automobil-Elektronik Kongress, BMW announced plans to adopt Google’s Android Automotive OS (AAOS) beginning from March 2023.
The German carmaker isn’t providing a lot of details for now, but it did say that certain models will get AAOS “for the first time as a second technological approach alongside the current Linux-based variant,” the latter being the current BMW Operating System 8 that was first introduced last March.
ICOP recently released a 3.5” Single Board Computer (SBC) that implements the 32-bit Vortex86DX3 System on Chip (SoC). The VDX3-6726 SBC was designed with comprehensive backwards compatibility to support older software and extend the life cycle of existing products without the need of complex redesign.
The VDX3-6726 is built around the single core Vortex86DX3 with a maximum processor frequency up to 1GHz and 1GB of DDR3 onboard. According to ICOP, this SBC was designed to replace mainly aging AMD LX800 equivalents and it consumes less power in comparison.€
[...] This update includes Shawn Mulligan's Sony Clié key patch (thanks!) plus more aggressive memory management and menu compression, which should not only increase the number and length of documents that 68K Palms with their pathetic dynamic heaps can view but also cut down on the fatal Plua-generated "out of memory" errors that our memory heuristics failed to anticipate. [...]
Which brings me to Vivaldi, the hot young single new to town in my increasingly tortured metaphor. Vivaldi reminds me a lot of what Firefox was back when I was in college: a browser designed with power users in mind, includes a ton of tools and options for tweaking, and it doesn’t mind one bit if you feel like adding on some more. It’s far from perfect, especially when it comes to moving tabs around, but it’s well worth checking out. For a more in-depth look at switching from Chrome to Vivaldi, check out Mark Hachman’s great write-up on the topic.
But I’m here to talk about that one particular tool I can’t live without. I’ve tried Vivaldi at least twice in the past, the most recent being about a year ago, at which point it still didn’t have that essential (for me, at least) shortcut tool. Or maybe it did, and I just didn’t dig around enough to find it: you have to right-click on the active tab, then click. Either way, it’s working, and I can replicate my meticulous collection of websites masquerading as individual apps. Huzzah!
Release highlights of open-source email client Thunderbird 102 which brings revamped UI, fresh icons, Matrix chat support and more.
We have already talked about the features coming to Thunderbird 102. And, if you have read that, it is time to experience those exciting features!
Yes, Thunderbird 102 is now available to download (right around the time of the Mozilla Firefox 102 release).
Zero trust has been on my radar for almost a decade, as it was part of the environment that enabled network virtualization to take off. We’ve told that story briefly in our SDN book — the rise of microsegmentation as a widespread use case was arguably the critical step that took network virtualization from a niche technology to the mainstream. The term goes back at least to 2009, when it was coined by Forrester analyst John Kindervag and it is possible to draw a line back from there to the principle of least privilege as framed by Saltzer and Schroeder in 1975. That principle states:
“Every program and every user of the system should operate using the least set of privileges necessary to complete the job.”
Historically, Lighthouse has analyzed the cold pageload of a page only. Clicking the “Generate report” button reloads the page before Lighthouse runs its tests. This can be problematic when you want to run tests on parts of the UI that are only visible when the user interacts with it. For example, a fly-out navigation, a modal window, or the content in a disclosure widget.
That has changed with Lighthouse v10. A new experimental feature in Chrome DevTools allows us now to analyze the page in a particular state. Here’s an example: [...]
I’ve been thinking a lot recently about Single-Page Apps (SPAs) and Multi-Page Apps (MPAs). I’ve been thinking about how MPAs have improved over the years, and where SPAs still have an edge. I’ve been thinking about how complexity creeps into software, and why a developer may choose a more complex but powerful technology at the expense of a simpler but less capable technology.
I think this core dilemma – complexity vs simplicity, capability vs maintainability – is at the heart of a lot of the debates about web app architecture. Unfortunately, these debates are so often tied up in other factors (a kind of web dev culture war, Twitter-stoked conflicts, maybe even a generational gap) that it can be hard to see clearly what the debate is even about.
Everything in it has a reason, of course, but the end result is that you get a weird mix where the order matters for some args and not for others PLUS there are imperative arguments: [...]
The second generation of version control systems introduced project-level concepts like repositories and new ways to collaborate – merging as an alternative to locking, branches, and networked file systems.
Some of the most popular VCSs in the second generation were CVS, ClearCase, and Perforce.
The problem €· As described in a (pretty short) previous episode of this Diary, Quamina matches Patterns to Events, which are flattened into field-name/value pairs for the purpose. We try to match field names and values from Events to those offered in a Pattern. Matching names is easy, they’re immutable strings both in Events and Patterns, and thus the following suffices.
Hardening Schools and Arming Teachers Is the Wrong Approach.
I did some research and played with some gear, and, well, where I've landed is Fujifilm, right back where I was from 2005 through 2008. I started off with an X100V a few months ago as a compact, carry-everywhere camera to take pictures of my son with9, and a few weeks ago I decided to trade in all of my m43 gear to the local camera shop10 and get an X-T4 as an interchangeable-lens "big camera"11. Something just clicked with me and the manual controls really make sense to me now — why would you ever want a PASM dial when you can just have an aperture ring with an A setting and a shutter dial with an A setting?
Arm has unveiled the new Immortalis family of flagship GPUs with support for hardware-based ray tracing starting with the Immortalis-G715 GPU, as well as two new premium Mali GPUs namely Arm Mali-G615 and Mali-G715.
Software-based ray tracing was already implemented on Arm Mali G710 on SoC’s such as the MediaTek Dimensity 9000, but the hardware-based ray tracing in the Immortalis-G715 delivers over 300 percent performance improvements, and only uses 4% of the shader core area. This will be mostly used in games to generate realistic lighting and shadows as can be seen in the “before vs after” video demo below.
The new Arm-based HPE ProLiant RL300 Gen11 is a single-socket system that incorporates the Ampere Altra and Ampere Altra Max cloud-native processors. The new chip contains 128 cores and is designed to take advantage of the energy saving capabilities of the Arm processor, the company said during its HPE Discover conference this week.
Hewlett Packard Enterprise has been an early and enthusiastic supporter of alternate processor architectures outside of the standard Xeon X86 CPUs that comprise the vast majority of its revenues and shipments, particularly with Arm server chips starting in 2011.
The cases reflect a growing tension between the solar industry and rural county officials who fear solar will diminish property values, destroy agricultural landscapes and potentially harm livestock.
The company mentioned that users who wish to keep a copy of their Hangouts data to use Google Takeout -- to download their data before Hangouts is no longer available in November 2022.
As for users who use Hangouts in Gmail on the web, Google says it won’t start prompting users to make the switch to Chat until July. Hangouts will remain usable on its desktop site until November, and Google says it will warn users “at least one month” in advance before it starts pointing the Hangouts site to Chat.
Like most cloud and local environments, Microsoft Azure also acts as an attack vector for malicious actors. Since a security flaw in Azure can potentially impact millions of consumers, it is essential that Microsoft patches such problems in a timely manner. Now, the company has revealed details about one such issue that it recently patched in Azure Service Fabric.
Imagine…
Last night, lightning struck our house and burned it down. I escaped wearing only my nightclothes.
In an instant, everything was vaporised. Laptop? Cinders. Phone? Ashes. Home server? A smouldering wreck. Yubikey? A charred chunk of gristle.
This presents something of a problem.
In order to recover my digital life, I need to be able to log in to things. This means I need to know my usernames (easy) and my passwords (hard). All my passwords are stored in a Password Manager. I can remember the password to that. But logging in to the manager also requires a 2FA code. Which is generated by my phone.
The fixes for a number of VPN issues that have been plaguing some Windows versions since this month’s Patch Tuesday are coming. Microsoft has finally confirmed that last month’s Patch Tuesday introduced connectivity issues on servers with Routing and Remote Access Service (RRAS) enabled, noting that client endpoints could also struggle to connect to these servers, experiencing connection drops. The fixes will most probably be arriving as part of July’s Patch Tuesday, meaning affected users will need to exercise just a little more patience.
In Telegram Messenger LLP and Telegram Messenger Inc. v. Russia, the company behind the popular messaging app Telegram refused to hand over confidential private user information to the Russian Federal Security Service. A Russian court subsequently convicted, fined, and briefly blocked internet access to Telegram. Following those actions, Telegram asked the ECtHR to find violations of its right to free expression, right to fair trial, and right to adequate legal remedies.€ €
EFF and our partners filed an amicus brief before the ECtHR, asking the ECtHR to safeguard encrypted online communications. Electronic communications have long become one of the main avenues of seeking and receiving information, and participating in activities and discussions, including on issues of political and social importance. Free expression rights are at stake, both for the individuals that use encrypted electronic messaging applications, and the intermediaries that offer them.€ €
As the UN Special Rapporteur on the Freedom of Opinion and Expression noted in his 2015 report, privacy is a “gateway for freedom of opinion and expression.” Encryption is key to free and safe communications, particularly for journalists, human rights defenders, lawyers, activists, and dissidents. That is why we invited the ECtHR to consider the risks to Internet users in Ukraine, and activists in Russia, if their private communications or their identities were revealed to the Russian authorities in the course of the current conflict.
Reproductive health advocates are urging Congress to pass the My Body, My Data Act, which will prevent consumer data that is related to reproductive health from being used as criminal evidence. Protecting how sensitive personal information is collected and stored online is critical to combating anti-abortion laws, says Daly Barnett, staff technologist at the Electronic Frontier Foundation. Barnett also shares practical advice for securing your online privacy now, such as utilizing encryption and creating a culture of consent. “Privacy should just be a default for people,” says Barnett. “It shouldn’t be something that the end users have to fight for, especially when the data is potentially dangerous, that could be used as criminal evidence.”
While largely unproven, the new Chinese technologies, detailed in procurement and other documents reviewed by The New York Times, further extend the boundaries of social and political controls and integrate them ever deeper into people’s lives. At their most basic, they justify suffocating surveillance and violate privacy, while in the extreme they risk automating systemic discrimination and political repression.
The final thing the technician was supposed to do after a shift last week was clear the USB sticks of their confidential information. Instead, once he had transferred the data, he dropped the tiny storage devices into his bag and headed to an izakaya. There, he spent about three hours drinking sake with three colleagues, then stumbled into the streets before eventually passing out.
By the time he woke up around 3 a.m. last Wednesday, his bag — containing the two USB drives, one of them a backup device with the same information — was gone. So was his precise memory of what had happened.
Also missing, embarrassed officials in Amagasaki, an industrial city northwest of Osaka, explained at a news conference, were the names, birthdays and ID numbers of about 460,000 people: the entire population of the city. Their home addresses and bank details were in the trove of data, too.
I’ve written about thisââ¬â°—ââ¬â°e.g. here and hereââ¬â°—ââ¬â°but because I consider it one of the single most important things to know about iOS, I should write about it more often. Even if you’re not the sort of person who typically shares iPhone tips with your friends and relatives, this is one that you should spread the word about.
The problem is this: if you use Face ID or Touch ID on your device (and you almost certainly should), what happens if law enforcement (or anyone else for that matter) takes your device and physically forces you to unlock it biometrically? There is some legal precedent supporting the notion that police can force you to do this, but can’t force you to provide them with a passcode or passphrase.
Here are two essential things everyone should know.
The only logical explanation was that Microsoft was sharing email data (links included) with Bing for indexing. We all know that these ESPs harvest our data, but surely they don’t index private email content…right?
In other words, they weren’t having any of it. Now, my child isn’t a representative sample of the population by any stretch. But the fact that a 15-year-old was so quickly able to pinpoint how creepy this example is and express their horror within just moments of hearing about it had me wondering what, exactly, the folks at Amazon were thinking.
A century ago, the October Revolution of 1917 and the Civil War that followed it generated a vast wave of Russian exiles…
That was the signal on January 6 from the man who, as Thompson said at the opening of these hearings, was at the center of a conspiracy to launch a coup against the United States. There will be more testimony from more Republicans with close ties to Trump that will detail the former president’s wrongdoing, but the proof and the evidence is accumulating for the Department of Justice to charge Trump and his top aides with seditious conspiracy to overturn the results of an election and illegitimately maintain Trump’s tenure as president. Hutchinson’s testimony may inspire more aides and allies of the former president to step up, as Thompson and Cheney urged them to do on Tuesday. But it is now clear that January 6th Committee member Adam Kinzinger (R-Ill.) was right when he said last week, “I think what we’re presenting before the American people certainly would rise to a level of criminal involvement by a president.”
Kinzinger said that before Hutchinson testified. Now, Hutchinson has pulled the threads together.
Reacting to the incident, BJP leader Amit Malviya said, “Two Muslim men behead Kanhaiya Lal, a Hindu shopkeeper, inside his shop in Udaipur. They then release a video of the act and another owning up the crime, brandishing machetes used and vow to kill Prime Minister Modi. Ashok Gehlot, however, has promised “thorough” investigation...”
One can be confident that Turkey will use all its political, economic and military capabilities to achieve its goals for 2023 (100th foundation day of the republic) and realise the "vision for 2053" (600th anniversary of the Ottoman conquest of Constantinople), Erdoßan said, referring to his dream of a Grand Turk-Islamist empire. He also said that the "operations to redeem" the border with Iraq from "terrorist attacks" - meaning Turkey's invasion of southern Kurdistan, which has been ongoing since mid-April - would continue successfully. The "new offensives" in Syria will be launched when all "weaknesses in the security corridor" have been eliminated, he stated.
China commands the world’s largest distant-water fishing fleet (DWF), has the world’s worst illegal, unreported and unregulated (IUU) fishing record, and its crews are known to abuse foreign workers, according to the Environmental Justice Foundation (EJF).
An EJF report released in March offers the first global analysis of China’s DWF. It was based on an analysis of China’s own limited fisheries data, which the nation made available in recent years. China’s fishing fleet has targeted African waters, especially the Gulf of Guinea, for decades.
As of now, the top line defense budget figure is an astounding $847 billion, designed to counter inflation; the Russian invasion of Ukraine; and the Pentagon’s unwillingness to fund unneeded weapons systems.€ Russia’s official defense spending in 2021 amounted to less than $65 billion, according to the Stockholm International Peace Research Institute, which provides authoritative data and analysis on military spending and armed conflict.€ Russia’s pathetic military performance in Ukraine over the past four months argues against any increase in the Pentagon’s budget.
The bipartisan frenzy for additional military spending was reflected in the remarks of Senate committee chairman Jack Reed (D/RI), who argued that the inflation demanded greater spending, and ranking member Jim Inhofe (R/OK), who said the defense bill was “everything I hoped for.”€ And why not?€ The entire global community spends about $2 trillion on defense, and the United States represents more than half of that figure when you add the military costs in the budgets of the intelligence community, the Veterans’ Administration, the Department of Energy, and the Department of Homeland Security.€ This year’s defense bill is even named for Inhofe, who is retiring at the end of the 117th Congress, following 30 years of boosting defense spending in the Senate.
The basic story is that cold wars cost money, lots of it. If we spend large sums of money building up our military to meet the challenge of our Cold War adversary, we won’t have the money needed to address climate change. It’s sort of like if you spend your whole paycheck on gambling and alcohol, you won’t have money to pay the rent and for your kids’ college education.
To get an idea of what is at stake, we are currently projected to spend an average of 3.0 percent of GDP on the military budget over the next decade. During Reagan’s Cold War buildup in the 1980s, military spending peaked at more than 6.0 percent of GDP. Spending went to over 9.0 percent of GDP when we had actually hot wars in Vietnam and Korea.
Protesters claimed that NATO was responsible for various wars, from Yugoslavia to Libya, and is pushing for an arms race across the globe. They demanded that NATO be disbanded to ensure peace and s…
NATO Secretary-General Jens Stoltenberg€ announced Monday€ that the alliance will increase its high-readiness…
Yet as with other claims made by Russia, such as in Bucha and Kramotorsk earlier in the war, these do not appear to be supported by the available open source evidence and videos from the scene.
They then analyzed that 2,000 year sample for two different markers: the first, a lipid, known as BrGDGT, can be used to reconstruct temperature. “If you have a complete enough record, you can directly link the changing structures of the lipids to changing temperature,” says Isla Castañeda, professor of geosciences at UMass Amherst and one of the paper’s co-authors.
A second marker, derived from the waxy coating on plant leaves, can be used to determine the rates at which the grasses and other livestock-sustaining plants lost water due to evaporation. It is therefore an indicator of how dry conditions were.
The journals were written during voyages made around the world – with the oldest record dating back to 1675.
The organisations will compare past weather events to predict weather events, helping us to understand climate change and what to expect in the future.
Finnish and Estonian electricity grid operators, Fingrid and Elering, have signed a letter of intent to begin planning the construction of a third subsea cable connection between the countries, Fingrid announced in a statement on Tuesday.
Once completed the EstLink 3 connection beneath the Gulf of Finland will have an estimated capacity of between 700 to 1,000 megawatts, according to the company.
The federal agency charged with overseeing historic preservation policy has expressed concern that a Louisiana industrial project could inflict harm on African American historic sites. The move follows a ProPublica investigation that found an archeological consulting firm had gutted a report to the Army Corps of Engineers that originally detailed that harm.
In a letter sent last week to the Army Corps, the Advisory Council on Historic Preservation said it is aware that the report commissioned by the developer of the project “has been challenged by the original author of the report.” It went on to state: “The ACHP requests that the Corps clarify how it will address this issue.” The Corps is considering a permit application from the project’s developer.
The Centre has granted Twitter India “one last opportunity” to comply with the country’s Information Technology Rules by July 4 or risk losing its immunity as an intermediary, people directly aware of the development told ET.
The Ministry of Electronics and Information Technology’s (MeitY) action follows Twitter’s “repeated failures to act on the content take-down notices sent under Section 69 A of the IT Act” as well as on “non-compliance notices issued for not taking the content down,” officials in the know told ET.
In the notice sent on Monday—which has been reviewed by ET—the ministry pointed out that the microblogging platform failed to comply with notices sent on June 6 and June 9.
The Information Technology and Innovation Foundation — a think tank backed by Apple, Microsoft, and Uber — answers that democracies, unlike authoritarian states, would never abuse technology: “Authoritarian nations will use technology for authoritarian purposes. Democratic nations will use them for legitimate and civil-liberty-protecting purposes.”
This kind of black-and-white thinking creates a self-reinforcing logic: when democratic states and their tech companies engage in surveillance, we can assume that it is for the cause of freedom, but when authoritarian states do it, it is for the purpose of social control. Was the NSA listening in on Angela Merkel’s phone calls a triumph of representative government? Are YouTube’s efforts to deplatform Palestinian activists justified by the will of the majority? Is Facebook facilitating genocide in Myanmar and Ethiopia “what democracy looks like”? Apparently so.
In truth, spying on people and stealing their data is abhorrent regardless of the nature of the government performing or sanctioning that surveillance. Regrettably, surveillance capitalism has become a driving force in the global economy. Across the world’s democracies, republics, oligarchies, monarchies, theocracies, and dictatorships, accumulating data for profit has become the modus operandi of many companies.
We look at the fight for privacy rights in a post-Roe America amid concerns that anti-abortion activists could use identifying data from online platforms like Facebook to target abortion seekers. Investigative reporter Grace Oldham describes how this data is already being used by medically unlicensed “crisis pregnancy centers” that actively lure patients to discourage them from seeking abortions. These anti-abortion clinics put people who are considering an abortion at risk to misinformation on reproductive health, or worse, open them to criminal prosecution, says Oldham, whose recent report for Reveal is headlined “Facebook and Anti-Abortion Clinics Are Collecting Highly Sensitive Info on Would-Be Patients.”
The first of these legs was, of course, the country’s economic strength, which gave it the ability to accomplish astonishing feats. During World War II, this meant producing a staggering 122 aircraft carriers, as well as airplanes in correspondingly great quantities. Broad-shouldered efforts like these armed not only U.S. forces but also those of its allies, including the Soviet Union, helping to ensure the defeat of Japan and Germany. Once peace was won, American wealth famously underwrote recovery in Europe and Asia, including among its just-defeated principal adversaries.
Lithuania’s acting director of the National Cyber Security Centre, Jonas Skardinskas, said the disruption was an ongoing distributed denial of service (DDoS) attack that targeted the country’s Secure National Data Transfer as well as other governmental institutions and private companies.
The cyberattacks follow a decision by Lithuania to restrict the transit of steel and ferrous metals to Kaliningrad, a Russian exclave on the Baltic Sea that can only be accessed by land through Lithuania or Poland. Lithuania restricted the goods because of European Union sanctions, but the decision enraged the Kremlin, who denounced the move as unprecedented and unlawful.
IT system disruptions have caused delays in passport issuance in Lithuania, Evelina Gudzinskaite, director of the Migration Department, confirmed to BNS on Monday.
Some Lithuanian public agencies and companies have been the targets of cyber-attacks since last week.
Gudzinskaite did not confirm to BNS that the disruption was due to an attack, but said that information about the incident had been sent to the Information Technology and Communications Department under the Interior Ministry.
Why it matters: Ressa, a Filipino American co-founder of news organization Rappler, says the next wave of elections around the world, including the U.S. midterms in November, provides another opportunity for social media to spread disinformation, divide people against one another and incite violence.
Tech Review quotes people saying that it’s unlikely (for now) that Beijing will require everyone to pre-review every comment (recognizing that’s likely to be impossible), but that it will put pressure on sites to be much more proactive, and that it could force this “feature” to be used on highly controversial topics.
It does seem that a straightforward reading of the law is that it requires sites to at least build out the functionality to pre-approve all comments if need be, even if it does not need to be on all the time.
There are some other features in the new regulations, including granting more power to who can block comments, suggesting that content creators themselves will have more power to censor comments in response to their content (rather than relying on the service’s in-house censors to do so).
The victim, a tailor named Kanhaiya Lal, was killed in Udaipur district on Tuesday by two Muslim men, who filmed the act and posted it online.
They claimed the act was in retaliation for the victim's support for controversial remarks made by a politician on the Prophet Muhammad.
Following the Supreme Court’s overturning of Roe v. Wade on Friday, social media users have shared posts offering to mail abortion pills to people whose access to abortion has been stripped away or will be soon.
But users are finding their offers quickly removed or restricted, as reported by Motherboard and the Associated Press. A test Facebook post by an AP reporter offering to mail abortion pills was removed within one minute. A test by a Verge reporter yielded similar results, with a post offering abortion pills being flagged within two minutes.
The sale, gifting, and transfer of firearms and marijuana are also prohibited under the same section of Meta’s restricted goods policy that bans pharmaceuticals. Yet test posts by the AP that offered to mail guns and weed were not removed; a similar test by The Verge offering to mail cannabis wasn’t immediately removed by Facebook.
“We’re hearing that people around the world are seeing our ‘sensitivity screens’ on many different types of content when they shouldn’t be. We’re looking into this bug and working on a fix now,” the Instagram communications team tweeted.
Members of 10 several journalism groups attended the demonstration organized by the Confederation of Progressive Trade Unions of Turkey (DðSK) Press Union in à žià Ÿhane in ðstanbul's Beyoßlu district.
They opened a banner that read, "No to the law of silencing, intimidation and incarceration! The press is free, it cannot be censored."
The bill that passed the parliament's Justice Committee last week introduces prison sentences of up to three years for spreading disinformation. It also expands the authority of the Presidency Communications Directorate on news outlets.
Chinese censors scrambled to delete what appears to be a misleading quote by a senior Communist Party official published in state media Monday, which claimed the "zero-Covid" policy would remain in place in Beijing "for the next five years," in an effort to tame an online backlash.
The EU proposal would undo 20 years of progress in securing communications, while employing a set of technologies unlikely to achieve its stated goals. Even worse, the solutions it proposes for handling CSAM would create national security risks by weakening the best tool available for securing communications, end-to-end encryption, and defining a mission without the technology to accomplish it.
Almost immediately, Facebook and Instagram began removing some of these posts, just as millions across the U.S. were searching for clarity around abortion access. General mentions of abortion pills, as well as posts mentioning specific versions such as mifepristone and misoprostol, suddenly spiked Friday morning across Twitter, Facebook, Reddit and TV broadcasts, according to an analysis by the media intelligence firm Zignal Labs.
By Sunday, Zignal had counted more than 250,000 such mentions.
Morningstar has also hit some bumps along the way, which further compounds her point about passion superseding all else. While she is able to earn money from her craft, her revenue streams are more limited than most. She no longer earns any income from YouTube or TikTok — her guess is that this is because of how she dresses — although still sees the platforms as valuable ways to advertise her other work streams like commercial smithing and modeling.
The Turkish state considers the wearing of the Kurdish national colours as "terror propaganda". This is proven once again by the prison sentence against 67-year-old Kurdish woman Menci Orman. Orman and her daughter à žahide Orman Ãâzek were charged with "terror propaganda" for wearing green-yellow-red scarves at the Newroz celebrations in 2015 and 2022 respectively. The trial at the Third Hevay Penal Court in Hatay began with a demand for the defendants' acquittal. Her lawyer reported that Orman was questioned after her detention without a translator or lawyer, although she does not understand Turkish. The court nevertheless considered the fact that Orman held up a scarf in the Kurdish colours as "terror propaganda" and sentenced her to ten years in prison.
The incident took place in the wake of a Facebook post by a Hindu student who shared a photo of Indian BJP leader Nupur Sharma, who has been criticised for her remarks on Prophet Muhammad.
According to locals, some Muslim students asked the Hindu student to delete the post after he went to the college.
Tension mounted when rumours spread that acting Principal Swapan Kumar Biswas took the Hindu student's side. Angry Muslim locals and students set the motorcycles of the principal and two teachers on fire. The mob also clashed with police.
A video of the incident showed the locals and students putting a garland of shoes around Swapan's neck, accusing him of belittling Islam.
In a decision riddled with lies, the Supreme Court rules that a football coach can, should they choose, become a dictator-priest.
When former BBC undercover journalist Lisa Brinkworth met with her lawyers in Paris last September, they revealed some quite startling news. The 55-year-old – who has spent the past two decades trying to expose allegations of rape and sexual abuse in the fashion industry – was informed that when Jill Dando was murdered in 1999, it may have been she who was the intended target.
Some FRANCE 24 programming will be disrupted on Tuesday due to a strike across France’s state broadcasting sector over President Emmanuel Macron’s plan to abolish the TV licence fee and fund public media broadcasters through general taxation. Media unions say Macron’s proposal will undermine the independence of public service media and could lead to budget cuts.
"The ruling power, which is trying to reinforce its power through elections and warmongering, aims to intimidate the media that it cannot control," she said. "For these exact reasons, on June 8, a day that will go down in history as a shame and disgrace, 20 Kurdish laborers of the free press were detained. After eight days in detention, our 16 friends were arrested unfairly and unlawfully. As if it wasn't enough, the pro-government media targeted our friends with mise-en-scenes and fiction.
"We won't explain that our friends are journalists, because they were arrested because they are journalists. The operation carried out with baseless claims and mise-en-scene is obvious. What is being targeted is not only our friends, it's not only their freedom and journalism, or journalism itself! It's much more than that!"
Prince Mohammed bin Salman, of Saudi Arabia, visited Turkey yesterday (June 22) for the first time since the murder of The Washington Post columnist Jamal Khashoggi in 2018 at the kingdom's consulate in ðstanbul.
James contends that a case of mistaken identity and less-than-thorough police work ruined his life, adding that detectives did not follow up with witnesses’ claims that would have cleared his name. When he was arrested months after the murder, police used that he could not remember where he was on the night of the crime against him.
After the victory on Staten Island, Amazon workers across the country have expressed interest in organizing a union. The latest site for potential unionization: the SDF1 Amazon facility in Campbellsville, Kentucky.
The former Minneapolis police officer who fatally shot an unarmed woman who called 911 to report a possible sexual assault in the alley behind her home is scheduled to be released from prison, months after his murder conviction was overturned and he was resentenced on a lesser charge.
A former Minneapolis police officer who fatally shot an unarmed Australian woman who called 911 to report a possible sexual assault in the alley behind her home has been released from prison on parole.
It comes months after his murder conviction was overturned and he was re-sentenced on a lesser charge.
Noor was initially convicted of third-degree murder and manslaughter in the 2017 fatal shooting of Justine Ruszczyk Damond, a 40-year-old dual U.S.-Australian citizen and yoga teacher. But last year, the Minnesota Supreme Court tossed out his murder conviction and 12€½-year sentence, saying the murder charge didn't apply to the circumstances of this case.
He was resentenced to four years and nine months on the manslaughter charge.
Damond’s stepmother, Maryan Heffernan, said in a phone interview this month that the timing of Noor’s release — so close to the anniversary of her death — was painful.
“We’re very disappointed. But we’re not surprised. We’ve been watching events in Minneapolis from miles away and we’re still bewildered about the charge being dropped and we’re still bewildered about the culture of the Minneapolis Police Department,” Heffernan said.
Noor was initially convicted of third-degree murder and manslaughter, but last year the Minnesota Supreme Court tossed out his murder conviction and 12 1/2-year sentence, saying that charge didn’t apply to the case. He was resentenced to four years and nine months on the manslaughter charge.
The Minneapolis Police Department has long held a reputation for acting with impunity.
Minneapolis residents had been outraged when Philando Castile was shot dead after a routine traffic stop, a year before Ms Ruszczyk's death.
Sadly, my home country Sweden still cannot protect their women from rape. In the past week three men were sentenced for gang raping a handicapped girl – one assailant got 4 years the other two 2 years prison term. Another man was sentenced to 4 years for repeatedly raping his daughter. At the same time another man was sentenced for selling recreational drugs on the internet: 11 years in prison. Sweden has the highest rate of rape per capita in Europe and one of the highest in the world.
A former imam who officiated the wedding of a 14-year-old girl to a man 20 years her senior has been deemed an unfit and improper person to solemnise marriages, a tribunal has upheld.
An anti-Israel activist who shared a number of social media posts with anti-Semitic content has campaigned with multiple Democrats over the past year.
Is raising money to send pregnant people to another state to get an abortion aiding and abetting? We speak to Kamyon Conner, executive director of the Texas Equal Access Fund, the first Black woman to head the organization, about how Texas Attorney General Ken Paxton has threatened to prosecute anyone violating a statewide abortion ban that was passed in the 1920s and never repealed. Lawmakers are also introducing bills to restrict FDA-approved abortion pills delivered through the mail. This heavily policed environment has placed pro-abortion organizations on high alert even as their work becomes more in demand. “Our abortion fund specifically is on the radar of anti-abortion extremists and our conservative elected officials,” says Conner.
By Double Down News
“We need to end Title 42 and fix our broken immigration system so these unimaginable tragedies stop happening,” said Rep. Chuy García. “People fleeing violence and poverty deserve…
At least 46 migrants were found dead Monday inside a sweltering tractor-trailer in Texas in one of the deadliest tragedies in recent decades. It comes as the Biden administration continues to enforce harsh border policies blocking most people from safely entering through ports of entry along the U.S.-Mexico border. Unless Biden revokes punitive immigration policies, “this is going to create more migrants dying in more unprecedented numbers,” says Fernando García, executive director of the El Paso-based Border Network for Human Rights.
We recently wrote to the Telecom Regulatory Authority of India (TRAI) and the Department of Telecommunications (DoT) about net neutrality. In our letter to TRAI, we expressed our sincere appreciation for actions taken to uphold net neutrality in India. In our letter to DoT, we conveyed our concerns with regard to the steps that still need to be taken to protect and uphold net neutrality.
The Department of Justice and Homeland Security Investigations (HSI) have just announced the seizure of six music piracy domains. The seizures were straightforward due to Verisign and GoDaddy being American companies. However, additional facts regarding these seizures, including on whose behalf they were supposedly carried out, raise key issues that don't make much sense.
In a landmark case, Kenya's High Court approved a permanent injunction that requires local ISPs to block 44 sports streaming sites. The case was filed by entertainment giant MultiChoice, which owns the broadcast rights to popular sports events. A proposal to repeal the applicable law was submitted in Parliament last year, but that ultimately failed.
Coming up with languages like C++ and Delphi and Java, my mind was kinda blown when I first saw Scheme.
You could just put (print "Hello word") in a file and that worked. That’s the start and end of it. Implicit name space declaration, return type, argument type, return values, main argument. No need for the Black Maria, goodbye to the Brixton sun.