Bonum Certa Men Certa

Links 27/07/2022: Absolute64 20220724 and G4Music



  • GNU/Linux

    • Desktop/Laptop

      • OpenSource.comMy honest review of the HP Dev One

        A few weeks ago, HP joined the bandwagon of major laptop manufacturers releasing a Linux-based laptop, the HP Dev One. The brand joins others such as Lenovo and Dell, offering a laptop with a pre-installed distribution of Linux in the US market. HP joined forces with smaller Linux-based laptop brand System76 to pre-install Pop!_OS as their distribution of choice on the device. Pop!_OS is a Ubuntu-based distribution, which System76 started (and is currently the primary maintainer) to maximize the features of its own laptops sold on its website.

        This article is a quick look at the HP Dev One, including first impressions of the hardware itself and running the pre-installed Pop!_OS and then Fedora on it after a few days. It is not about comparing them, just a few notes on how well they did on the HP Dev One.

      • Review: Framework’s next-gen Laptop follows through on its upgradeable promises [Ed: It calls itself "modular", but by default it comes with Windows, which is both malicious and in defiance of this company's mission]

        Framework isn't all-in on Linux to the same degree as System76, but it does specifically brag about the laptop's Linux support and its use of Linux-friendly internal hardware. The DIY Edition doesn't come with an OS, but Linux users are certainly one of its target audiences.

        Fedora 36 and Ubuntu 22.04 LTS should both support all of the new laptop's hardware out of the box, according to Framework, but for any distribution you use, you'll want to check the age of the Linux kernel it uses. To properly assign work between the E-cores and P-cores and get the best possible performance, you should try to run kernel version 5.16 or higher; that version provided some performance boosts for Alder Lake chips, but kernel 5.18 also introduces some improvements for the hybrid processors.

        That means you might run into issues with other versions of Linux that are based on older upstream distributions. Linux Mint, my preferred distro, is still based on Ubuntu 20.04 and ships with Linux kernel version 5.4. Even the "Edge" edition, meant to solve exactly this problem by pairing the current Mint version with a newer kernel, only ships with 5.13.

        Installing the Edge edition of Mint and then installing all updates (including an auto-update to kernel version 5.15, though you'll need to upgrade manually to get something newer) seemed to get most things working OK, including audio, networking, and graphics acceleration. But I had to install an additional package to get the fingerprint sensor working, and you'll still be missing Alder Lake-related improvements in newer kernels. Ubuntu 22.04 did work more smoothly out of the box, albeit still with an older 5.15 kernel.

    • Audiocasts/Shows [Video and games, some mintCast episode]

    • Kernel Space

      • uni TorontoSome pragmatic issues with Linux kernel mode setting on servers

        Modern Linux kernels want to do kernel mode setting (KMS). One of the consequences of KMS is that the 'text' console goes through modesetting during boot. On desktops, you don't usually use a text console and KMS is necessary anyway for your graphical desktop; if modesetting is broken, you won't get far. On servers the benefits are lower and the downsides larger; with KMS enabled, modesetting must work in order for you to have any text console. Lately, I've come to feel that there are some pragmatic issues that make KMS more problematic on servers than you might think.

    • Applications

      • Linux LinksG4Music - lightweight music player

         If you use a general purpose media player to access your music collection, you’re missing out on a wealth of features that can improve your listening experience. That’s why we recommend a dedicated music player. Linux offers a huge range to choose from which is why we put together this roundup to help save you time. But there are always new projects coming along.

        G4Music is billed as a beautiful, fast, fluent, lightweight music player.

        The software is written in Vala and uses GTK4, a cross-platform widget toolkit for creating graphical user interfaces. Before we put the software that its paces, let’s briefly run over installation.

      • MedevelHurrican Aware App: Get Notified about the United States Tropical Storms

        The Hurrican Aware App is a free open-source web application that track, collect, visualize and share information about the potential impacts of tropical storms in the United States.

        The app uses ArcGIS Living Atlas of the World, ArcGIS JavaScript API, D3.js for the map visualization and React.js.

    • Instructionals/Technical

      • uni TorontoZFS pool IO statistics (and vdev statistics) are based on physical disk IO

        Today I wound up re-learning something that I sort of already knew about the IO statistics about pools and vdevs that you can get through things such as zpool iostat. Namely, that at least for bytes read and written and the number of IO operations, these IO statistics are what I call physical IO statistics; they aggregate and sum up the underlying physical disk IO information.

      • Kev QuirkRevisiting the Web Analytics Rabbit Hole

        A little over a year ago, I removed all analytics from this site because it was sending me down a rabbit hole that I didn’t like. Here’s an update.

      • Björn WärmedalRe: Revisiting the Web Analytics Rabbit Hole

        In retrospect I realise that this is one reason it took me so many years to eventually set up a website (and gemini capsule) and start journaling semi-regularly. That thought of "what should I write about or publish that people will want to read". A fallacy, quite obvious to me now, unless you're peddling a product or marketing a corporation.

      • Jan Piet MensAn Ansible reference sheet

        The idea for an Ansible reference (or cheat) sheet was reborn last week at the Linuxhotel; a few students who knew they would be receiving a tmux mug as a gift when leaving asked why we don’t give out Ansible mugs.

      • uni TorontoThe state of getting per-pool IO statistics in ZFS on Linux as of version 2.1

        To get statistics today you have a number of options. First, you can pick through the zpool iostat manual page and run it by hand to generate copious output, although this doesn't give you access to all IO statistics available (for example, there are size histograms that aren't currently available). If you want things in a metrics system, the ZFS on Linux project provides zpool_influxdb as an official InfluxDB format metrics exporter, but when I looked at it I didn't really like using it with Prometheus. There's a native Prometheus zfs_exporter project, but it's explicitly marked experimental and in my opinion needs a number of changes to make it truly useful (for example, in its current state it only provides per-vdev statistics, although it's easy to hack the code a bit to report per-pool stats too).

      • VideoHow to install Regata OS 22.0.3 - Invidious

        In this video, I am going to show how to install Regata OS 22.0.3.

      • H2S MediaInstall Akaunting on Ubuntu 22.04 or 20.04 LTS

        Learn the command and steps to install the free open source accounting software – Akaunting on Ubuntu 22.04 LTS Jammy JellyFish to Ubuntu 20.04 LTS Focal Fossa.

        If you want to install Akaunting for a demo on a local server or for permanent purposes on a cloud/hosting VPS server then here is the tutorial to guide you on the steps for the installation of Akaunitng on Ubuntu, Debian and other similar Linux.

      • LinuxTechiHow to Install VirtualBox on OpenSUSE Leap 15.4

        Hello Techies, In this guide, we will cover how to install VirtualBox on OpenSUSE Leap 15.4 step by step.

        VirtualBox is the virtualization software used at desktop level on both Linux and Windows operating system. It allows users to install and run multiple virtual machines (VMs) at the same time. Virtualbox is useful whenever users want to build their test environment on their laptop inside the virtual machines.

      • Linux CapableHow to Install Valentina on Ubuntu 22.04 LTS

        Valentina is a software package for creating clothing patterns distributed according to the open-source software model. The main idea of this concept is to combine modern technologies with traditional design methods. The main feature of Valentina, which qualitatively distinguishes it from other solutions for the fashion industry, is the work with parametric patterns. This allows you to create complex pattern shapes using a set of basic parameters.

        In addition, Valentina provides a wide range of tools for pattern creation, including automatic drawing tools, freehand drawing tools, and a library of ready-made templates. Thanks to these features, Valentina has become one of the most popular software packages for fashion designers and sewing professionals.

        The following tutorial will teach you how to install Valentina on Ubuntu 22.04 LTS Jammy Jellyfish using a LaunchPAD APT PPA with the command line terminal.

      • Red Hat OfficialLinux tool alternatives: 6 replacements for traditional favorites | Enable Sysadmin

        You've mastered a Linux tool, but that hard-earned knowledge came at the cost of frequent usage, reading the manual pages, and using a search engine to avoid the bad examples out there.

      • OpenSource.comHow I manage files from the Linux command line | Opensource.com

        Managing files in a graphical desktop like GNOME or KDE is an exercise in point-and-click. To move a file into a folder, you click and drag the icon to its new home. To remove a file, you drag it into the “Trash” icon. The graphical interface makes desktop computing easy to use.

        But we don't always interact with Linux systems with a graphical interface. If you work on a server, you likely need to use the command line to get around. Even desktop users like me might prefer to interact with their system through a terminal and command line.

      • TecAdminCheck if a script is running as root user in Linux – TecAdmin

        Sometimes the shell scripts are required to run as the root user to perform some tasks with administrator privileges. Generally, that tasks can be achieved with the Sudo commands. If in some cases you still need to force the user to run the script as the root user, you can add code to your script to check if the script is running with the root user or not.

      • CitizixHow to run Django and Postgres in docker-compose

        Django is a free and open-source, Python-based web framework that follows the model–template–views architectural pattern. Django advertises itself as “the web framework for perfectionists with deadlines” and “Django makes it easier to build better Web apps more quickly and with less code”. Django is known for the speed at which you can develop apps without compromising on robustness.

        Docker is an open platform that performs Operating System level virtualization also known as containerization. It makes it possible to build, ship, and run distributed applications in controlled environments with defined rules.

        Docker Compose is a tool for defining and running multi-container Docker applications. With Compose, you use a YAML file to configure your application’s services. Then, with a single command, you create and start all the services from your configuration.

      • Linux CapableHow to Install Google Chrome on Linux Mint 21 LTS

        Google Chrome is the most used Internet Explorer software on the earth. It is an excellent option for Linux Mint because it is faster than Firefox, the default installed browser on your desktop. Additionally, Chrome has a ton of features that make browsing the web a better experience. For example, Chrome has a built-in PDF viewer, making it easy to open PDFs without downloading them first. Chrome also has an incognito mode, allowing you to browse the web privately without saving your history or cookies. Finally, Chrome is synced with your Google account, so your bookmarks and passwords will be available on all your devices. Overall, Google Chrome is the best browser for Linux Mint users.

        In the following tutorial, you will learn how to install Google Chrome on Linux Mint 21 release series in three alternative ways: stable, beta, or unstable versions, along with some essential command tips for users.

      • ID RootHow To Install VeraCrypt on Ubuntu 22.04 LTS - idroot

        In this tutorial, we will show you how to install VeraCrypt on Ubuntu 22.04 LTS. For those of you who didn’t know, VeraCrypt is a free, open-source disk encryption tool. VeraCrypt is equipped with various encryption algorithms such as AES (Advanced Encryption Standard), Camelia, Kuznyechik, Serpent, and Twofish. It is available for Windows, Linux, and macOS.

        This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the VeraCrypt encryption tool on Ubuntu 22.04 (Jammy Jellyfish). You can follow the same instructions for Ubuntu 22.04 and any other Debian-based distribution like Linux Mint, Elementary OS, Pop!_OS, and more as well.

      • Linux CapableHow to Enable TCP BBR on Debian 11 Bullseye

        For years, the primary congestion control algorithms used on the internet were Reno and CUBIC. Both of these had their strengths and weaknesses, but they shared one major issue: they were not very effective at dealing with network bottlenecks. This led to a lot of wasted bandwidth and high latency, which was a major problem for Google and other companies that rely on the internet for their operations. However, Google has now found a way to overcome these issues with the new TCP Bottleneck Bandwidth and RRT (BBR) algorithm.

        This updated congestion control algorithm achieves significant bandwidth improvements, lowers latency, and is deployed by Google.com, Google Cloud Platform, Youtube, and others. Thanks to BBR, we can finally say goodbye to the old network bottleneck problems that have plagued us for so long.

        In the following tutorial, you will learn to enable TCP BBR on Debian 11 Bullseye using the command line terminal with some configurations and screenshots.

      • FOSSLinuxHow to install DIG on Debian 11 | FOSS Linux

        This short tutorial demonstrates how to install DIG on Debian 11 Bullseye. This tutorial also explains how to use this application to get DNS-related information.

      • Linux Shell TipsHow to Cut, Copy and Paste Text in Nano Editor

        The cut, copy, and paste file editing operations are key in the mastery of Linux file management. On a graphical text editor like LibreOffice Writer, the implementation of these file editing operations are a no-brainer.

        However, the nano text editor offers some file editing flexibility not evident in graphical file editors like LibreOffice Writer. For instance, it is easier to navigate to various file paths and open them via the nano editor than it is to achieve the same objective using a graphical text editor.

        This tutorial will show us how easy it is to achieve cut, copy, and paste text operations while using the nano text editor in Linux.

      • Linux Shell TipsHow to Undo and Redo in Nano Editor in Linux

        The nano text editor has a reputation for making life easier for most users on the journey of mastering the Linux operating system footprints. It is the perfect text editor to start with before adopting more advanced text editors like Vim.

        Since human is to error, we tend to make mistakes while editing our files on a Linux operating system environment. A native solution to errors that occur during file editing operations is to navigate to the position of the incorrect text using the keyboard arrow keys and subsequently apply the keyboard backspace key to fix the issue.

        However, when we master the implementation of undo and redo operations while working on a file opened with the nano text editor, it saves us a lot of valuable time that would be wasted trying to fix the edit issue via the keyboard navigation keys.

        This article will walk us through the implementation of the undo and redo file operation functions in a nano text editor in Linux.

      • UNIX CopHow to change the SSH port

        In this post, you will learn a simple but very useful trick that can help you in Linux administration. Today, you will learn how to change the SSH port.

      • Linux CapableHow to Install Tor Browser on Rocky Linux 9

        Tor, also referred to as The Onion Router, is open-source, free software that permits anonymous communication using online services like web surfing. The Tor network directs the web traffic through an accessible worldwide volunteer overlay network with over six thousand relays and continues to grow. Many users want to search out more ways to keep their information and activities anonymous or private online due to the increasing concerns over data and work snooping. However, users should be aware of both the advantages and disadvantages of using Tor before deciding whether or not it is the right tool for them.

        While Tor provides a high degree of anonymity, it is not perfect. Due to the way the network routes traffic, it can be slow, making it impractical for some uses. In addition, because traffic is encrypted, some sites that use anti-Tor measures can block all traffic from the network, preventing users from accessing them. Despite these drawbacks, Tor remains a popular tool for those seeking a higher degree of anonymity online.

        In the following tutorial, you will learn how to install Tor Browser on Rocky Linux 9 workstation desktop using Flatpak third-party package manager or downloading the browser manually and how to install it manually with tips on registering the application icon.

    • Games

      • EarthlyBuilding Pong in Your Terminal: Part One

        Pong is simple. There are only three sprites on screen, the level is always the same, and the game logic is pretty easy to code. This also seemed like a great project to help me start to wrap my head around Go routines and Channels, concepts that were completely new to me coming from Ruby and Python.

  • Distributions and Operating Systems

    • Barry KaulerLimine BIOS chainloading enhancements

      A couple of days ago, was working on what was planned to become Limine Installer version 1.2, when hit a snag with BIOS chainloading.

    • New Releases

      • Absolute64-20220724 released

        Some fixes... cleaned up Vivaldi installer a little, fixed a bunch of my image manipulation scripts to work properly with switch from imagemagick to graphicsmagick.

        Heavily edited idesktool to manipulate desktop/icons.

        Stripped down the installer for the ISO. Just auto-install. No more Slckware tweaks/prompts -- Just takes over hard drive and goes... Will GPT the drive if bios is set to launch UHCI, (and you set USB stick to GPT. I used Rufus on a Windows box.) If you MBR the stick and computer bios is MBR, Absolute installer will partition drive MBR and use lilo.

        In either case, the drive is repartitioned and anything on it is wiped.

    • BSD

      • Ruben SchadeResource use of FreeBSD desktop environments

        But it’s worth remembering that resource use is only one metric; a computer that’s turned off isn’t using anything! I imagine a chart with features plotted against memory: provided both scale linearly, it’s easy to pick something that hits the sweet spot for features you use, your available resources, and how much time and inclination you have to spend tinkering with a system.

        There’s also no shame in wanting something pretty, especially given how much some of us spend in front of these machines in our work and personal lives. Vermaden didn’t do this, but I see other people in the open source community poke fun at those who want something nice as well as functional. Technical specifications make something possible, but art makes life worth living. The fact we all have opinions about what that is, and what it should look like, is why we call it subjective.

    • Fedora Family / IBM

      • Its FOSS6 Tips and Tools to Enhance Your Flatpak Experience in Linux - It's FOSS

        Slowly and steadily, Flatpak has a growing acceptance in the desktop Linux world.

        It is well integrated into Fedora and many other distributions like Linux Mint, elementary, Solus, etc. prefer it over Ubuntu’s Snap.

        If you love using Flatpak applications, let me share a few tips, tools, and tweaks to make your Flatpak experience better and smoother.

    • Debian Family

      • 9to5LinuxNew Debian GNU/Linux 11 “Bullseye” Kernel Security Update Fixes 9 Vulnerabilities

         The new Debian GNU/Linux 11 Linux kernel security update comes one and a half months after the previous kernel security update and it’s here to fix a total of nine security vulnerabilities in the Linux 5.10 LTS kernel, which is the default kernel for Debian Bullseye users.

        Patched in this new kernel update is CVE-2021-33655, a security issue that could allow a user with access to a framebuffer console driver to cause a memory out-of-bounds write through the FBIOPUT_VSCREENINFO ioctl, and CVE-2022-2318, a use-after-free vulnerability found in the Amateur Radio X.25 PLP (Rose) support that may result in a denial of service attack.

    • Devices/Embedded

      • CNX Softwaremini PCIe module features Rockchip RK1808K SoC with 3.0 TOPS NPU

         Rockchip RK1808 SoC with a built-in 3.0 TOPS AI accelerator has been around since 2019, and we’ve seen it in USB compute sticks, SBCs, and even in Pine64 SoEdge-RK1808 SO-DIMM module, but somehow never in the more widely used M.2 or mPCIe form factors.

        Toybrick TB-RK1808M0 changes that and offers Rockchip RK1808K SoC coupled with 1GB RAM and an 8GB eMMC flash in a mini PCIe module that exposes USB 3.0, USB 2.0, UART, and GPIO signals.

    • Open Hardware/Modding

      • Andrew HutchingsROMulus demonstration on an Amiga 500

        I have created a demonstration video for ROMulus on the Amiga 500. For anyone interested in finding out more about this board more details are available here.

      • J PieperUpdated moteus test fixture

        Finally, the whole structure, including the top clamp is 3D printed now, which makes it potentially possible to do top probing and more easily adjust the dimensions.

        With this new fixture, my cycle time for a test is around 60s. At that point, the time spent in the test program is about the same as the time it takes to unpack and package up the boards, so it isn’t really the limiting factor any more.

    • Mobile Systems/Mobile Applications

  • Free, Libre, and Open Source Software

    • Obnam 0.8.0 - encrypting backup program

      I’ve just pushed out version 0.8.0 of Obnam, an encrypting backup program. Below are the release notes.

    • CERT NZ helps open source community with upgrade of Samba

      A collaboration between CERT NZ, Catalyst and the open source community has created a major update for Samba, making it more secure.

      Samba is an open source software suite used as an active directory domain controller, like Microsoft Active Directory.

      Samba is Free Software licensed under the GNU General Public License, and the Samba project is a member of the Software Freedom Conservancy.

      Since 1992, Samba has provided secure, stable and fast file and print services for all clients using the SMB/CIFS protocol, such as all versions of DOS and Windows, OS/2, Linux and many others.

    • Programming/Development

      • Daniel LemireRound a direction vector to an 8-way compass

        If you assume that the unit direction vector is in the first quadrant (both x and y are positive), then there is a direct way to compute the solution. Using 1/sqrt(2) or 0.7071 as the default solution, compare both x and y with cos(3*pi/8) and cos(pi/8), and only switch them to 1 or 0 if they are larger than cos(3*pi/8) or smaller than cos(pi/8). The full code looks as follows: [...]

      • Drew DeVaultCode review at the speed of email

        I’m a big proponent of the email workflow for patch submission and code review. I have previously published some content (How to use git.sr.ht’s send-email feature, Forks & pull requests vs email, git-send-email.io) which demonstrates the contributor side of this workflow, but it’s nice to illustrate the advantages of the maintainer workflow as well. For this purpose, I’ve recorded a short video demonstrating how I manage code review as an email-oriented maintainer.

      • Matt RickardDefensible Machine Learning Model Naming

        There's a curious case of a neural network for object recognition called YOLO – You Only Look Once. While many object detection models were two-pass (one for identifying bounding boxes, the other for classifying), YOLO was single-pass. This makes YOLO fast and small.

      • Bozhidar BatsovLeiningen Adds Support for nREPL's Unix Sockets

        The next release of Leiningen (likely 2.9.9) will include support for starting an nREPL server listening to an Unix domain socket. As a reminder - Unix domain sockets were one of the highlights of nREPL 0.9, which was released at the end of 2021.

      • Lawrence TrattWhat's the Most Portable Way to Include Binary Blobs in an Executable?

        I recently needed to include an arbitrary blob of data in an executable, in a manner that's easily ported across platforms. I soon discovered that there are various solutions to including blobs, but finding out what the trade-offs are has been a case of trial and error [1]. In this post I'm going to try and document the portability (or lack thereof...) of the solutions I've tried, give a rough idea of performance, and then explain why I'll probably use a combination of several solutions in the future.

      • ACMWhen Should a Black Box Be Transparent?

        We have been working with a third-party vendor that supplies a critical component of one of our systems. Because of supply-chain issues, they are trying to "upgrade" us to a newer version of this component, and they say it is a drop-in replacement for the old one. They keep saying this component should be seen as a black box, but in our testing, we found many differences between the original and the updated part. These are not just simple bugs but significant technology changes that underlie the system. It would be nice to treat this component as a drop-in replacement and not worry about this, but what I have seen thus far does not inspire confidence. I do see their point that the API is the same, but I somehow do not think this is sufficient. When is a component truly drop-in and when should I be more paranoid?

      • Git with Multiple E-Mail Addresses: And How I Make Sure to Commit with the Right One

        Only using each Git server on a computer dedicated for some line of work (company, private, school) is impractical for different reasons. I keep personal notes on discoveries I make when working for my job or for school, which I store in a private repository. Changing laptops just to write down that command line I already googled seven times is not practical, and just would make me to google it for the eighth time.

        Furthermore, I prefer to work on my stationary PC running Arch Linux (which I use as a daily driver, by the way) for school-related work, especially when it comes to making up programming examples; I'm just less efficient working on my Windows laptop.

      • Locking Engineering Principles

        For various reasons I spent the last two years way too much looking at code with terrible locking design and trying to rectify it, instead of a lot more actual building cool things. Symptomatic that the last post here on my neglected blog is also a rant on lockdep abuse.

        I tried to distill all the lessons learned into some training slides, and this two part is the writeup of the same. There are some GPU specific rules, but I think the key points should apply to at least apply to kernel drivers in general.

        The first part here lays out some principles, the second part builds a locking engineering design pattern hierarchy from the most easiest to understand and maintain to the most nightmare inducing approaches.

        Also with locking engineering I mean the general problem of protecting data structures against concurrent access by multiple threads and trying to ensure that each sufficiently consistent view of the data it reads and that the updates it commits won’t result in confusion. Of course it highly depends upon the precise requirements what exactly sufficiently consistent means, but figuring out these kind of questions is out of scope for this little series here.

      • Python

        • MedevelPicroscopy Turns your Raspberry Pi into a Digital Microscopy

          Picroscopy is a small Python web-application which is intended for usage with a Raspberry Pi as a microscopy solution.

          With the Raspberry Pi Camera mounted on a microscope, the Raspberry Pi provides a live video feed to its monitor via HDMI, while another machine can be used to control the setup via a web-based interface.

      • Shell/Bash/Zsh/Ksh

        • TecAdminYYYY-MM-DD format date in a Shell Script

          The Linux date command is used to get the current date and time. You can easily customize the results by using the arguments. In this how-to tutorial, you will learn to format the date as YYYY-MM-DD in the bash shell.

        • Jack FranklinRunning command line tasks in Neovim

          My daily workflow often involves repeatedly running tasks, whether that be build commands, unit tests, or some other scripts. My ideal workflow is to have a terminal split on the right hand side, and then be able to send tasks to it.

        • HowTo GeekHow to Manipulate Strings in Bash on Linux

          The Linux ecosystem is packed with fantastic tools for working with text and strings. These include awk, grep, sed, and cut. For any heavyweight text wrangling, these should be your go-to choices.

          Sometimes though, it’s convenient to use the shell’s built-in capabilities, especially when you’re writing a short and simple script. If your script is going to be shared with other people and it is going to run on their computers, using the standard Bash functionality means you don’t have to wonder about the presence or version of any of the other utilities.

          If you need the power of the dedicated utilities, then by all means use them. That’s what they’re there for. But often your script and Bash can get the job done on their own.

          Because they’re Bash built-ins, you can use them in scripts or on the command line. Using them in a terminal window is a fast and convenient way to prototype your commands and perfect the syntax. It avoids the edit, save, run, and debug cycle.

    • Standards/Consortia

      • Terence EdenThe (Mostly) Complete Unicode Spiral

        I present to you, dear reader, a spiral containing every Unicode 14 character in the GNU Unifont. Starting at the centre with the control characters, spiralling clockwise through the remnants of ASCII, and out across the entirety of the Basic Multi Lingual Plane. Then beyond into the esoteric mysteries of the Higher Planes2.

  • Leftovers

    • Ruben SchadeTech you like that’s gone

      Lucas Holt asked what tech people liked that’s gone. I never miss an opportunity to engage in some tech nostalgia, so here’s a selection of mine: [...]

    • ReutersPowerful 7.1 earthquake strikes Philippines; at least one dead

      A powerful 7.1 magnitude earthquake struck the Philippine island of Luzon on Wednesday killing at least one person and damaging buildings in the northern Abra province and sending strong tremors through the capital, Manila.

      A 25-year-old man was killed by falling debris, said Abra Vice Governor Joy Bernos, when the quake struck about 11 km (six miles) southeast of Dolores town at a shallow depth of 10 km (6 miles), according to U.S. Geological Survey data.

    • Hardware

    • Health/Nutrition/Agriculture

    • Proprietary

      • A Burger Without Heinz

        I can’t help but wonder if, in the minds of many reviewers, MacBooks were PCs so long as they used Intel, and therefore they stopped being PCs once Apple switched to using their own silicon.

      • The VergeNPM users can now connect a Twitter account as a recovery method

        Developers who use NPM, the popular JavaScript package manager, will now be able to connect their Twitter and GitHub accounts to the software as a recovery method.

    • Pseudo-Open Source

      • Openwashing

        • Luis Villa: Book Notes: Summer 2022 (burnout and the good life) [Ed: Tidelift is connected to Microsoft]

          Those of you who have emailed my work address lately will have noticed I’m also on sabbatical this summer, because after five years of focus on Tidelift I’m feeling pretty burnt out. This is not a criticism of Tidelift: it’s a great team; I’m very proud of what we are doing; and I will be going back shortly. But a big theme of the summer has been to think about what I want to do, and how that intersects with Tidelift—so that when I come back I’ll be both a strong contributor, and a happy and healthy contributor.

          [....]

          Good: it helped me ask “what the hell am I doing” in much better ways. Two key tricks to this: asking it in a ten year timeframe, and using a bunch of neat futurist-y brainstorming techniques to help think genuinely outside of the box. For this reason I think it might end up being, in ten years, the most influential “self-help” book I ever read.

          Bad: it’s a classic “this book should have been an article”, and it is the first time I’ve thought “this book should have been an app”—the structured brainstorming exercises could have been much more impactful if guided with even minimal software. There actually is a companion(?) pay-to-enter community, which so far I’ve really enjoyed—if I stick with it, and find value, I suspect in the future I’ll recommend joining that community rather than reading the book.

          Other big failure(?): it focuses a lot on What Is Going On In The World and How You Can Change It, when one of my takeaways from Malesic’s burnout book was to focus less on The World and more on the concrete people and places around me. The book’s techniques are still helpful for this, which is why I think it’ll be impactful for me, but I think it’d be a better book if its examples and analysis also drilled down on the personal.

        • ZDNetCloudify partners with ServiceNow for business cloud automation [Ed: The coin-operated SJVN is writing spammy ads now. How low he has sunk.]

          Clouds can really help your business. If, and it's a big if, you can get it to work for you. That's where companies such as Cloudify, with its open source business-to-business (B2B) e-commerce platform, come in. Now, to make it more powerful, you can use the Cloudify infrastructure automation platform with ServiceNow IT Operations Management (ITOM), part of the digital workflow of its Now Platform.

    • Security

      • EclypsiumFirmware Security Realizations - Part 1 - Secure Boot and DBX - Eclypsium

        One of the first findings brought to my attention was that Secure Boot was not enabled. After shaming myself, I remembered that in the past, installation instructions for most Linux distributions recommended disabling Secure Boot prior to installation. Not wanting to complicate installations any further I went into the BIOS/UEFI settings and disabled Secure Boot, then installed my Linux distribution of choice (sometimes that was POP_OS! And more recently Ubuntu). Once the installation was completed, I had not gone back and researched how to achieve better security using Secure Boot.

        This brought forth one of my first questions: Why did most Linux distributions state that Secure Boot should be disabled? It turns out Linux distributions had not completed the process to get all of the required binaries signed that allow a computer to boot securely. With there being so many Linux distributions this proved to be quite the challenge. It was only in the past 2-3 years that many distributions have moved to enable Secure Boot by default. Understanding what needs to be done in order to support Secure Boot leads us pretty deep down a rabbit hole, which begins with first understanding how Secure Boot works.

        A good starting point is to read some of the previous research on vulnerabilities related to Secure Boot. Eclypsium researchers have presented on Secure Boot dating as far back as 2013 at Black Hat USA in a talk titled “A Tale of One Software Bypass of Windows 8 Secure Boot” and again in 2014 at Defcon “Summary of Attacks Against BIOS and Secure Boot“.

      • Newly found Lightning Framework offers a plethora of Linux hacking capabilities [Ed: Microsoft propagandists still try to conflate malware with "backdoors", which is something Windows has by design; this is misleading, borderline defamatory. Unlike Windows, Linux does not have back doors and zero-days ignored by the vendor (Microsoft) for months, so for this malware to get to the system something dumb needs to happen. With Windows, there are back doors. With Linux, however, you need to first get in somehow. The media fails to mention this.]
      • New Very Powerful All in One Linux Malware [Ed: Anything to darken the brand "Linux", just because it is capable of running malicious programs too]
      • Dev DiscourseShould I Use Linux VPS Or Windows VPS | Technology

        For corporate and commercial projects, it is better to choose Linux, which confidently leads by the parameter "security".

      • Red HatSaaS security in Kubernetes environments: A layered approach | Red Hat Developer

        Security is especially critical for Software-as-a-Service (SaaS) environments, where the platform is used by many different people who need the confidence that their data is stored safely and kept private from unrelated users. This article focuses on security concerns for containers on your SaaS deployment running in Kubernetes environments such as Red Hat OpenShift. The article is the fifth in a series called the SaaS architecture checklist that covers the software and deployment considerations for SaaS applications.

      • Privacy/Surveillance

        • The HillDaughter of imprisoned ‘Hotel Rwanda’ hero to testify on spyware at House hearing

          In February 2021, forensic analysis by Amnesty International and Citizen Lab revealed that Kanimba had been surveilled, allegedly by the Rwandan government, with her phone infected with the Israeli NSO Group’s spyware Pegasus as early as a month after her father’s kidnapping.

          Pegasus spyware has been connected with several instances of hacking and surveillance by governments targeting dissidents, journalists and political opponents, resulting in the NSO Group being blacklisted by the US.

          Kanimba says her phone was tracked during meetings and communications with foreign officials as she advocated for her father’s release.

        • NPRAmazon buying One Medical is only its most recent dive into the health care industry

          One Medical is a membership-based primary care practice with nearly 200 locations across the country that also offers virtual services. The company had roughly 767,000 member patients as of May.

        • [Old] NYOBSecond € 20 Mio Fine for Clearview AI

          The Greek data protection authority has fined the company Clearview AI €20 million. The company that sells facial recognition software to law enforcement agencies in the U.S. is no longer allowed to process biometric data on individuals in Greece and must delete all existing data.

        • Ish SookunHow much space is required to store 2 mins of data captured from all [Internet] traffic in Mauritius?

          The question above is straight-forward and the answer lies in the bandwidth that we, Mauritians, consume. In order to learn about the bandwidth consumption, I checked the ICT report published by Statistics Mauritius.

        • Adriaan ZhangDetecting Users' DNS Resolvers

          Let's say someone has visited your website; is it possible to determine what DNS resolvers their computer is configured to use?

          Well, yes. Of course you can! This blogpost wouldn't be very long if the answer was no. Let's find out how. But before we begin...

          You'll need JavaScript for this to work.

        • MakeTech EasierCongress Joins the Fight Against Foreign Spyware

          Part of what makes it hard to put an end to hacking is that there’s just so much of it. There’s a “ware” for everything: malware, ransomware, and even spyware. With this overabundance, the U.S. Congress is finally going to start looking into foreign spyware, specifically Pegasus.

        • TruthOutICE Is Using Data From LexisNexis to Skirt Sanctuary Laws and Deport Immigrants
      • Confidentiality

      • Krebs On SecurityA Retrospective on the 2015 Ashley Madison Breach

        It’s been seven years since the online cheating site AshleyMadison.com was hacked and highly sensitive data about its users posted online. The leak led to the public shaming and extortion of many Ashley Madison users, and to at least two suicides. To date, little is publicly known about the perpetrators or the true motivation for the attack. But a recent review of Ashley Madison mentions across Russian cybercrime forums and far-right websites in the months leading up to the hack revealed some previously unreported details that may deserve further scrutiny.

  • Defence/Aggression

    • Broadband BreakfastU.S. Must Go on Offensive to Address Cybersecurity Issues

      The United States needs to adopt a more offensive cybersecurity posture to survive in an evolving digital world by enacting sanctions against malicious states, developing artificial intelligence capabilities to identify possible cyberthreats, and engaging in diplomacy to deter cyberattacks before they initiate, said experts at an Internet Governance Forum event on Thursday.

    • VOA NewsSenate Report Alleges Chinese Effort to Infiltrate Federal Reserve

      The report by members of the Republican minority of the Senate Homeland Security and Governmental Affairs Committee alleges that China has used promises of lucrative teaching and research contracts to try to entice economists working at more than half of the system's 12 Federal Reserve Banks to share nonpublic information about economic forecasts and monetary policy decisions with Chinese officials.

      China's goal, according to the report, is to "supplant the U.S. as the global economic leader and end the U.S. dollar's status as the world's primary reserve currency."

    • Foreign PolicyWhy You Shouldn’t Use Conditioner After a Nuclear Attack

      Earlier this month, the city of New York released a short video, seemingly out of the blue, informing residents what to do in the event of a nuclear attack. The 90-second video—which opens with the line, “So, there’s been a nuclear attack. Don’t ask me how or why, just know that the big one has hit. OK?”—left many New Yorkers scratching their heads.

      In defending the video as “a very proactive step,” New York City Mayor Eric Adams acknowledged that the public safety announcement had come in response to the changing nature of the global security environment with Russia’s invasion of Ukraine.

    • TruthOutSince Jan. 6 Attack, Corporations Have Given $21.5 Million to “Sedition Caucus”
    • TruthOutUvalde School District to Abbott: Call Special Session on Raising Gun-Buying Age
  • Environment

    • JoinupWatching the earth system (our planet)

      In particular, the Digital Earth Viewer, which is open source and licensed under the EUPL, is a web application for spatiotemporal contextualization and visualization of heterogeneous data sources. It was developed with the goal of enabling real-time exploration of geoscientific data sets across spatial and temporal scales. To this end, it is capable of ingesting data from a large variety of types that are usually found in the geosciences, and it deploys a user interface, which allows for interactive visual analysis. At the same time, online and offline deployment, cross-platform implementation, and a comprehensive graphical user interface are all capabilities that make the Digital Earth Viewer particularly accessible to scientific users.

    • Teen VogueYouth-Led Climate Change Lawsuits Are a Tactic to Hold Governments Responsible

      The youth plaintiffs in the case, Held, v. State of Montana, are represented by the Oregon-based nonprofit law firm Our Children’s Trust, an organization that has brought multiple youth climate suits, most notably Juliana v. United States, a 2015 case in which 21 young people sued the federal government for knowingly and extensively contributing to climate change and with these actions violating their constitutional rights.

      But this is the first time that a case of this nature has been allowed to enter the trial phase, which will likely begin in early summer 2023. Advocates say the trial is a landmark opportunity to hold a governing body accountable for its role in perpetuating climate change and to establish a plan for remedy and relief. If successful, it also lays the groundwork for the courts to rule in favor of young people in future climate lawsuits.

    • The EconomistWhat to read to understand the burning of the American West

      It is hard to understand wildfires in the western states without first learning about the arid nature of the region. There remains no better book on water in the West than Marc Reisner’s “Cadillac Desert”, from 1986. It is a sprawling history of how the Bureau of Reclamation made the modern West possible by erecting a vast network of dams, reservoirs and pipelines to carry water from wet places to dry ones. But the bureau’s frenetic construction enabled the overuse of western rivers by cities and farms, and so further parched the landscape. Water policy can be impenetrable. Yet Reisner brings the complicated story to life by introducing readers to characters such as the “Renaissance man” who explored the length of the Colorado River, and the politicians who stole the water that allowed Los Angeles to blossom.

    • Energy

      • ScheerpostThe Enduring Tyranny of Oil

        At the moment, world oil production is€ hovering at around 100 million barrels daily and is projected to€ reach€ 109 million barrels by 2030, 117 million by 2040, and a jaw-dropping 126 million by 2050. So much, in other words, for “peak oil” and a swift transition to green energy.

      • TruthOutWorld Oil Production Is Rising, With No End in Sight
  • Finance

  • AstroTurf/Lobbying/Politics

    • The VergeZuckerberg says Meta and Apple are in ‘very deep, philosophical competition’ to build the metaverse

      Mark Zuckerberg believes that Apple and his company are in a “very deep, philosophical competition” to build the metaverse, suggesting the two tech giants are ready to butt heads in selling hardware for augmented and virtual reality.

      The Meta CEO told employees earlier this month that they were competing with Apple to determine “what direction the internet should go in,” according to a recording of his comments during an internal all-hands meeting obtained by The Verge. He said that Meta would position itself as the more open, cheaper alternative to Apple, which is expected to announce its first AR headset as soon as later this year.

    • The HillSenate panel turns to kids’ online safety

      Two bills that would revamp how tech companies cater to and obtain data from young users will be in the spotlight Wednesday as a Senate panel debates how to update laws designed before the rise of social media.

      The markup has been long awaited by critics who say the existing regulations are no longer adequate for a generation raised on the internet. Support for the issue has snowballed since a Facebook whistleblower leaked bombshell internal documents last year.

    • ScheerpostPatrick Lawrence: 21st Century Order

      As a piece of the new world order that is under construction, Putin’s trip to Tehran last week was of singular importance.

    • VarietyTwitter Spent $33 Million on Elon Musk Deal in Q2, Sets Date for Shareholder Vote on Transaction

      Twitter revealed the expenses in its 10-Q filing Tuesday with the SEC. Other than the $33.1 million in “transaction expenses” associated with Musk’s proposed takeover, “the terms of the Merger Agreement did not impact the Company’s consolidated financial statements,” the company said.

    • Democracy NowPuerto Rico: House Dems Criticized over Handling of Bill to Let Residents Choose Status of Territory

      Lawmakers in the House of Representatives have introduced the Puerto Rico Status Act, which would allow residents of the longtime U.S. colony to begin the process of self-determination and decide on the island’s territorial status. The bill sets up three options for residents to choose from in a referendum — U.S. statehood, independence or sovereignty in free association with the United States — and commits Congress to abide by the results. We speak to San Juan’s former Mayor Carmen Yulín Cruz about the shortcomings of the bill, which she says lacks clarity on what each status would mean for Puerto Ricans. Among the concerns are whether Spanish would be taught as a primary language in government-funded public schools. Many do not understand “the rush to do it and, in doing so, not allowing the Puerto Rican people to have all the information to exercise their freedom to choose,” says Cruz.

    • Counter PunchA Tough Week for the Trumpers

      It’s easy to recall how€ Trump claimed global warming was a “Chinese hoax”€ that, according to his twisted view of the world, was intended to give China an economic advantage over the U.S. Apparently the idea that some of our political leaders€ —€ and certainly the majority of our citizens€ —€ desperately want to take action to address the climate crisis is antithetical to the “take it all while you can get it”€ self-acknowledged greed of the former president.

      But the “chickens have come home to roost” on that issue€ —€ and it’s so hot they’re laying hard-boiled eggs.€ The airports in Britain (which is an island in the middle of the ocean) had to be shut down because the runways were melting€ in the hottest temperatures ever recorded there. So were the roads€ —€ and the railways were closed because the tracks are warping in the extreme triple digit heat. And they’re wrapping the London Bridge in tin foil because the cast iron is cracking in the heat.

  • Censorship/Free Speech

    • Central Bucks approves library policy some view as book ban

      The policy sets criteria for the selection, removal and replacement of books. School officials said it doesn’t seek to censor any particular community, pointing to safeguards like a protection for “classics” and replacing removed books with new ones that touch on similar subject matter but without age-inappropriate content.

  • Freedom of Information / Freedom of the Press

    • VOA NewsExiled Journalists Take on Corruption, Disinformation

      Newsroom raids, a website ban and a team reporting from exile are no obstacle for the independent Belarusian Investigative Center.

      Founded in 2018, BIC specializes in news analysis, fighting disinformation and exposing wrongdoing.

      Its award-winning journalism has uncovered corruption in the pharmaceutical industry, sanction-breaking exports of petroleum, and shady real estate deals by oligarchs.

      In April, BIC became part of the Organized Crime and Corruption Reporting Project (OCCRP).

  • Civil Rights/Policing

  • Digital Restrictions (DRM)

    • The dangers of Microsoft Pluton

      In upcoming Intel, Qualcomm, and AMD processors, there is going to be a new chip, built-in to the CPU/SoC silicon die, co-developed by Microsoft and AMD called the Pluton. Originally developed for the Xbox One as well as the Azure Sphere, the Pluton is a new security (cynical reader: DRM) chip that will soon be included in all new Windows PCs, and is already shipping in mobile Ryzen 6000 chips.

      This new chip was announced by Microsoft in 2020, however details of what it was actually capable of, and what it actually means for the Windows ecosystem were kept frustratingly vague. Now with Pluton rolling out in some AMD chips, it is possible to put together a cohesive story of what Pluton can do from several disparate sources.

      Because Microsoft’s details are sparse, this article will attempt to summarize all that we now know regarding Pluton. It may contain inaccuracies or speculation, but any potential inaccuracy or speculation will be called out where possible.

    • DeSmogClimate ‘Leader’ Netflix Donated to Pro-Pipeline, Koch-Supported Think Tank

      Netflix gives every impression of being one of the world’s most climate friendly corporations.€ 

      The streaming company responsible for the blockbuster climate movie “Don’t Look Up” starring Leonardo DiCaprio and Jennifer Lawrence plans to slash or offset all of its corporate greenhouse gas emissions by the end of 2022, a goal known as net-zero.

  • Monopolies

  • Gemini* and Gopher

    • Personal

      • Mediterranean without Borders

        Unconventional forms of representation like this, serve to make you pay attention to what is actually represented. In this case, it really made it clear to me how interconnected the mediterranean is (and was historically).

      • Ill after the trip



        Hoo boy am I feelign sick. I’ve had a fever of about 100℉ for 2 days give or take. I think it’s from the buza I drank in BiaÅ‚ystok, or perhaps it was something I ate.

        I went to the doctor, and the prognosis was good, tho I still feel sick. I’ll get over this soon, hopefully. Gotta drink a bunch of Gatorade lol.

        Concerningly, a number of participants tested positive for coronavirus after the conference. I tested negatively, and I’m praying that the others recover swiftly.

    • Technical

      • Vapad 0.1.0 prerelease

        So one of the Linux distros that I used a lot in my early days was Puppy Linux. Around the time I started with it, Puppy had two graphical text editors, Leafpad and Beaver. Leafpad was basically what you'd get if you were copying Notepad's interface using Gtk+. It's extremely simple and no frills. Even after moving away from Puppy, I continued to install Leafpad on whatever system I was on and made sure that it was the program used to open any text file when clicked on in a file manager. I did this for a rather long time, until I sat down and actually learned Vim.

        Xfce at some point adopted the Leafpad codebase and began improving upon it as their Mousepad editor. Mousepad initially only added tabs, and then syntax highlighting. And then, after a while, a funny thing happened

      • Building out a SOC

        I wrote this out for a HARO request, and figured it was worth posting the whole thing, because this stuff is getting done poorly everywhere!

      • PICO-8 and TIC-80

        Then I remembered the fantasy consoles PICO-8 and TIC-80.

        I bought PICO-8 a few years ago and played a few games. They're really small, but many are fun. And the source always comes with the game, which is quite a nice culture really.

        When it comes to fantasy consoles I heard that there was an alternative: TIC-80. This was recommended to me on the basis that it's open source, unlike PICO-8.

        I'm probably going to install both on my console. Since I've already bought PICO-8 it makes sense to use it, and TIC-80 is free anyway.

      • Internet/Gemini

        • beyond spartan

          I have working Gemini and Spartan server implementations under my belt now[1], and having spent some time seeking out Spartan-hosted content via clients that make it easy to traverse both geminispace and sparta it's a pretty good experience.

          The only things I think I can feel missing in sparta which gemini makes a non-issue are user sessions of some sort, allowing specific interactivity, and protocol-level resiliance to bad actors on the network. In Gemini, both of these tasks are accomplished via TLS.

        • Running gemserv under proot

          I want to run gemserv in a simple container for process isolation from the main filesystem. The simplest container technique is 'chroot', which lets you run a process with a virtual root filesystem, or 'proot', which does similar but doesn't require root any privileges. Since gemserv itself doesn't require root privileges, and 'proot' does everything I need, that's what I'll use in this instance.

          The main benefit of all this is security, since it limits what can be seen by at attacker if the server is compromised in some way. It's not particularly strong security, but it's enough to mitigate the reach of many simple attacks, like those we saw in gemserv when dereferencing relative paths.

      • Programming

        • Call-tables and Medea

          Here’s a simple way to write JSON from call-tables. It’s very unoptimal for now since it uses an intermediate representation instead of writing directly...


* Gemini (Primer) links can be opened using Gemini software. It's like the World Wide Web but a lot lighter.



Recent Techrights' Posts

On Groupthink, Mindless 'Sheep', and Toxic Online Cults
This week, treat yourself to a life free of social control media
BetaNews is Run and Written by Bots That Make Clickbait
At least one author is doing this
Technology: rights or responsibilities? - Part VIII
By Dr. Andy Farnell
GNU/Linux Reaches All-Time High in Europe (at 6%)
many in Europe chose to explore something else, something freedom-respecting
 
Links 25/11/2024: Climate News, Daniel Pocock Receives a Fake/Fraudulent €17,000 Electricity Bill
Links for the day
[Meme] Microsoft: Our "Hey Hi" Hype is Going So Well That We Have MASS Layoffs Every Month. Makes Sense?
Contradiction
Latest Mass Layoffs at Microsoft Are Confirmed, Bing and Vista 11 Losing Market Share
They tried to hide this. They misuse NDAs.
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, November 24, 2024
IRC logs for Sunday, November 24, 2024
Gemini Links 25/11/2024: Purity and Cory Doctorow's Ulysses Pact, Smolnet Portal and SGI
Links for the day
Patents Against Energy Sources That Reduce Pollution
this EV space (not just charging) is a patent mine field and it has long been that way
DARPA’s Information Innovation Office, Howard Shrobe, Values Compartmentalisation But Loses the Opportunity to Promote GNU/Linux and BSDs
All in all, he misses an opportunity
Wayland is an Alternative to X
the alternative to X (as in Twitter) isn't social control media but something like IRC
BetaNews, Desperate for Clicks, is Pushing Donald Trump Spam Created by LLMs (Slop)
Big clap to Brian Fagioli for stuffing a "tech" site with Trump spam (not the first time he uses LLMs to do this)
[Meme] Social Control Media Bliss
"My tree is bigger than yours"
Links 24/11/2024: More IMF Bailouts and Net Client Freedom
Links for the day
Gemini Links 24/11/2024: Being a Student and Digital Downsizing
Links for the day
Techrights' Statement on Code of Censorship (CoC) and Kent Overstreet: This Was the Real Purpose of Censorship Agreements All Along
Bombing people is OK (if you sponsor the key organisations), opposing bombings is not (a CoC in a nutshell)
[Meme] The Most Liberal Company
"Insurrection? What insurrection?"
apple.com Traffic Down Over 7%, Says One Spyware Firm; Apple's Liabilities Increased Over 6% to $308,030,000,000
Apple is also about 120 billion dollars in debt
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, November 23, 2024
IRC logs for Saturday, November 23, 2024
[Meme] GAFAMfox
Mozilla Firefox in a state of extreme distress
Google Can Kill Mozilla Any Time It Wants
That gives Google far too much power over its rival... There are already many sites that refuse to work with Firefox or explicitly say Firefox isn't supported
Free (as in Freedom) Software Helps Tackle the Software Liability Issue, It Lets Users Exercise Greater Control Over Programs
Microsofters have been trying to ban or exclude Free software
In the US, Patent Laws Are Up for Sale
This problem is a lot bigger than just patents
ESET Finds Rootkits, Does Not Explain How They Get Installed, Media Says It Means "Previously Unknown Linux Backdoors" (Useful Distraction From CALEA and CALEA2)
FUD watch
Techdirt Loses Its Objectivity in Pursuit of Money
The more concerning aspects are coverage of GAFAM and Microsoft in particular
Links 23/11/2024: Press Sold to Vultures, New LLM Blunders
Links for the day
Links 23/11/2024: "Relationship with Oneself" and Yretek.com is Back
Links for the day
Links 23/11/2024: "Real World" Cracked and UK Online Safety Act is Law
Links for the day
Links 23/11/2024: Celebrating Proprietary Bluesky (False Choice, Same Issues) and Software Patents Squashed
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, November 22, 2024
IRC logs for Friday, November 22, 2024
Gemini Links 23/11/2024: 150 Day Streak in Duolingo and ICBMs
Links for the day