In this tutorial, we will show you how to install Nmap on Fedora 38. Are you a Fedora 38 user looking to install and use Nmap for networking exploration and security auditing? Look no further as we guide you through the simple installation process and basic usage of Nmap on Fedora 38.
It’s been a while since I had this idea to leverage the power of WireGuard to self-host stuff at home. Even though I pay for a proper server somewhere in the world, there are some services that I don’t consider critical to put there, or that I consider too critical to host outside my home.
The start of my views is that encrypted NFS with Kerberos is different from IMAPS or encrypted SMTP because both of the latter are instances of '<X> over TLS', while encrypted NFS with Kerberos is its own bespoke, unique cryptographic protocol and implementation. I like '<X> over TLS' (provided that TLS identities are competently handled), because TLS is a well studied, reasonably well understood, and usually well implemented thing (if you use a common implementation, and everyone should). Bespoke cryptography is something I consider dangerous because historically it's had a rather bad track record (both in implementations and in protocols). A lot of effort from many people and hard lessons learned have gone into TLS, far more than into a niche bespoke system (which encrypted NFS with Kerberos definitely is).
As the age of data growth and sprawl continues to evolve, the demand for high-performance, secure, and scalable data storage solutions has become more critical than ever before. However, despite the rising need, the number of available options for meeting these requirements is dwindling. As a result, businesses and organizations are facing significant challenges in selecting the right solution that fits their specific needs and budget.
Fortunately, OpenZFS is emerging as a popular and excellent choice for building the storage backbone of any high-performance computing system. OpenZFS is an advanced file system and volume manager that offers robust features such as data compression, deduplication, and checksumming. These capabilities allow organizations to store, manage, and access their data efficiently, securely, and with the highest level of integrity.
Linux / UNIX supports device files that are stored in the /dev directory. These aren’t actual files, rather, they are special files or character devices that are representative of hardware devices attached to the system.
Some of the most commonly misunderstood device files are /dev/console, /dev/tty, and /dev/tty0. In this guide, we will explore the nuances that distinguish these three device files.
We want to share with you a note from our experience in converting a 320GB hard disk drive from MBR to GPT without data loss. We use gdisk, a famous tool by Roderick "Rodsbooks" Smith, and do several steps to finish it in a very quick time. Here's the results.
The complexities of managing a server can be daunting, especially if you are new to the field.
One of the most simple and easy ways to create a bootable USB drive for Linux is with Rufus, which will create a bootable drive in a matter of a few clicks.
If you can't find Figma for Linux on the official webpage, don't worry. We will show you how to install Figma on Linux distributions. Figma is a well-known web-based tool for digital collaboration and prototyping. UX Designers, developers, and business people use it to create interactive prototypes and share them with others.
unable to pair? before feeling like a fool, because it won't pair: fully charge the device (front led is green) Bluetooth pairing only works if the USB-to-analog mode is off via the switch on the side of the case....
ailed to auto mount an encrypted partition in Linux? Don't worry, there are several ways to manually mount a LUKS encrypted drive partition in Linux.
eksctl is a command line tool offered by Amazon for creating and managing Kubernetes clusters on Amazon Elastic Kubernetes Service (EKS). Using eksctl, users can easily deploy and scale containerized applications on AWS without the need for extensive manual configuration.
Warhammer 40,000: Boltgun has released on Steam and it works out of the box on Steam Deck and desktop Linux thanks to Proton 8. With thanks to€ Focus Entertainment for sending a pre-release key.
Update: Feral Interactive emailed me to correct the record that they're not actually doing a Linux port this time. They said the Creative Assembly FAQ post was incorrect. Feral are now doing macOS only.
The team working on the Nintendo Switch emulator yuzu have released some Early Access upgrades, this time around for the Steam Deck. With their Early Access updates, these are available to people who support development on Patreon before rolling out to all users in their main public releases.
Path of Titans is one I haven't checked on in some time, a dinosaur MMO survival game currently in development and it's looking pretty good. Still relatively early days for the game, but the content has been expanding on this quite nicely.
Seems to be quite a few games being fully done with lately. Monster Sanctuary from moi rai games and Team17 recently had the Relics of Chaos update and it's the last.
Remember Duke Nukem Forever? You would be forgiven if you don't. As usual though, modders to the rescue. With the release of the Duke It Out update for the Duke Nukem Forever: Restoration Project. This project has a simple goal: to complete Duke Nukem Forever as it was originally intended back in 2001.
That's it, the development and expansions to the hit city-builder Cities: Skylines are over with the release of Hotels & Retreats. With the developer moving onto the sequel.
We are proud to announce the second beta of Mageia 9. Since the release of beta 1 in February 2023 the Mageia team has worked to solve a number of stubborn issues and provide security fixes and new updates.
This year’s openSUSE Conference starts in about 72 hours and open-source enthusiasts, contributors and supporters are making their way to Nuremberg, Germany, for a collaborative community event.
Talks begin on May 26 at 9:30 a.m. Central European Time and the event will be streamed by c3voc; the stream link will be posted on events.opensuse.org before the event begins. The schedule lists plenty of talks ranging from an introduction to the Geeko Foundation to an introduction of the service-based Linux installer Agama.
The Security Profiles Operator (SPO) makes managing seccomp, SELinux and AppArmor profiles within Kubernetes easier than ever. It allows cluster administrators to define the profiles in a predefined custom resource YAML, which then gets distributed by the SPO into the whole cluster. Modification and removal of the security profiles are managed by the operator in the same way, but that’s a small subset of its capabilities.
Another core feature of the SPO is being able to stack seccomp profiles. This means that users can define a
baseProfileName
in the YAML specification, which then gets automatically resolved by the operator and combines the syscall rules. If a base profile has anotherbaseProfileName
, then the operator will recursively resolve the profiles up to a certain depth. A common use case is to define base profiles for low level container runtimes (like runc or crun) which then contain syscalls which are required in any case to run the container. Alternatively, application developers can define seccomp base profiles for their standard distribution containers and stack dedicated profiles for the application logic on top. This way developers can focus on maintaining seccomp profiles which are way simpler and scoped to the application logic, without having a need to take the whole infrastructure setup into account.But how to maintain those base profiles? For example, the amount of required syscalls for a runtime can change over its release cycle in the same way it can change for the main application. Base profiles have to be available in the same cluster, otherwise the main seccomp profile will fail to deploy. This means that they’re tightly coupled to the main application profiles, which acts against the main idea of base profiles. Distributing and managing them as plain files feels like an additional burden to solve.
This article introduces the new Red Hat Developer Hub and Janus project to address the challenges IT organizations face in the development process. A developer’s work can be fraught with disparate development systems and distributed teams, and organizations with multiple development teams often struggle with competing priorities, diverse tools and technologies, and establishing best practices.
These challenges make it difficult to quickly start development and adhere to multiple security and compliance standards. A unified platform that can consolidate these elements of the development process and foster internal collaboration will enable development teams to focus on rapidly enhancing code and functionality to efficiently build high-quality software.
Simplifying the inner loop for developers
A significant portion of the focus for the Red Hat Software Summit held in Boston this week are three core products designed to meet the growing demands for better software security and government regulations requiring enhanced application security across all industries.
Red Hat rolls out a new suite of tools and services to help mitigate vulnerabilities across every stage of the modern software supply chain.
Red Hat today added a Red Hat Service Interconnect to its portfolio that is based on an open source Skupper.io project that enables Layer 7 networking between application components running on different platforms.
As containerization continues to gain popularity in the world of enterprise software development, there is also growing demand for tools and technologies that make container management more accessible and efficient. One such tool is Podman Desktop, which provides a user-friendly interface for managing containers and working with Kubernetes from a local machine (Figure 1).
We are pleased to announce that Proxmox
Proxmox develops powerful, yet easy-to-use open-source server software. The product portfolio from Proxmox, including server virtualization, backup, and email security, helps companies of any size, sector, or industry to simplify their IT infrastructures. The Proxmox solutions are based on the great Debian platform, and we are happy that we can give back to the community by sponsoring DebConf23.
With this commitment as Platinum Sponsor, Proxmox is contributing to make Debian and Free Software, helping to strengthen the community that continues to collaborate on Debian projects throughout the rest of the year.
Thank you very much Proxmox, for your support of DebConf23!
USB-4SERIAL is and Industrial grade -45+85C, Open Source Hardware USB-C type connector USB2.0 High speed to Four RS232 level or TTL level Serial ports. Port4 can be multiplexed between RS232 and RS485 current loop.
I recently wanted to find an easy way to transfer large files to my Archimedes A3010. In particular the data was on a CDROM image. I therefore wondered if there was a CDROM drive I could use with it. This led me to the Cumana Oscar drive. A drive which appears to be somewhat rare.
There are a million metrics you can use to track the health of a subscription software business like ours. Customer life-time value, cost of acquisition, cohort retention, revenue churn, net promoter score, funnel conversion rates, to name but a few. All useful calculations, but I can't tell you what bliss it's been to steer 37signals without them for twenty years.
The EuroBSDCon Program Committee is inviting BSD developers and users to submit innovative and original talk proposals not previously presented at other European conferences. Topics of interest to the conference include, but are not limited to applications, architecture, implementation, performance and security of BSD-based operating systems, as well as topics concerning the economic or organizational aspects of BSD use. Presentations are expected to be 45 minutes and are to be delivered in English.
Dan is stepping back from organizing BSDCan. I am taking over coordinating 2024.
Note I did not say “running.” Running an international conference is a job best accomplished by a team. A large team. Dan set up BSDCan 2023 with himself and Adam Thompson, and ran it with assistance from Dru Lavigne and Warren Block in registration, and Patrick McEvoy and Andrew Fengler in streaming. I am not nearly that tough.
Once again I’ve teamed up with my friends at Smashing Magazine ðŸË» to share with you everything I know about web accessibility testing! In this smashing workshop we’ll talk about automatic and manual testing, screen reader basics, Single Page Applications, Dev Tools, and more.
Sounds interesting? Great! Here are some more details about the workshop: [...]
It’s no secret that academic publishers are making fabulous profits by exploiting the work provided free of charge by researchers and funded by taxpayers. This is still happening, despite over two decades of efforts to move to a fairer system based on open access publishing. Now, over 40 of the top researchers in the field of imaging neuroscience have had enough: [...]
Even for R users like me that have built successful careers as a Data Scientist, Consultants, and Trainers.
Even for future data scientists that are just starting out trying to get a leg-up in the job market.
And even for old dogs that are doing the best to keep up with the ever-changing data science ecosystem (As I approach my 39th birthday, I guess I’d fall into this category now).
So why am I “all of a sudden” learning and promoting Python?
Recovering and reflashing a bricked board can be a tedious process. It often involves flashing an SD card to bring your device back up, and it gets worse if the board does not have an SD card slot to begin with. Thankfully, most embedded platforms almost always include some form of recovery via USB or UART, which usually involves sending a boot image to the platform’s ROM code. A few tools exist that leverage this functionality to offer quick recovery and reflashing via USB, such as STM32CubeProgrammer, SAM-BA or UUU. However, these tools are all vendor-specific, which means that developers working on various kinds of platforms have to switch between different tools and learn how to use each one.
To address this issue, Bootlin is happy to release today a new recovery and reflashing tool, called Snagboot, which intends to be a generic and open-source replacement to the vendor-specific tools mentioned earlier.
Bootlin has released a tool called Snagboot that is intended to help with the recovery of bricked embedded systems.
If you are someone who is currently uploading signatures, your package uploads will continue to succeed, but any PGP signatures will be silently ignored. If you are someone who is currently downloading PGP signatures, existing signatures SHOULD continue to be available 1, but no new signatures will be made available. The related API fields such as has_sig have all been hardcoded to always be False.
Historically, PyPI has supported uploading PGP signatures alongside the release artifacts in an attempt to provide some level of package signing. However, the approach used had long standing, documented issues which had previously lead us to deemphasize the support for PGP signatures over time by removing them from the PyPI web user interface.
The PyPI package archive has removed support for PGP signatures on packages.
Google has announced the release of the results of internal audits on a number of rust crates.
Many open-source projects at Google use Rust, a modern systems language designed for building reliable and efficient software. Google has been investing in the Rust community for a long time; we helped found the Rust Foundation, many Googlers work on upstream Rust as part of their job, and we financially support key Rust projects. Today, we're continuing our commitment to the open-source Rust community by aggregating and publishing audits for Rust crates that we use in open-source Google projects.
The collection, available at RTÃâ° Archives | Acetate Disc Collection (rte.ie), includes over 5,300 recordings made for RTÃâ° Radio between 1927 (see below) and 1970s and gives a fascinating and rare insight into the voices, sounds, topics and processes involved in the creation of early radio broadcasting at RTÃâ°.
Over the last three years, RTÃâ° Archives has been creating digital files from thousands of fragile acetate discs which contained the original recordings.
The recordings are now preserved for the long term thanks to the support of the Broadcasting Authority of Ireland, Archiving Scheme, which has now been incorporated into the recently established, Coimisiúin na Meán.
Attorneys general across the U.S. joined in a lawsuit Tuesday against a telecommunications company accused of making more than 7.5 billion robocalls to people on the national Do Not Call Registry.
The 141-page suit was filed in U.S. District Court in Phoenix against Avid Telecom, its owner Michael D. Lansky and company’s vice president Stacey S. Reeves.
Ultimately, it was DNA evidence found on a man's shirt used to restrain Sharron that confirmed him as the killer.
In 1975, the amount of DNA gathered at the scene was insufficient to be tested or used in court but it was kept over the years in the hope that it could someday be used to find a match for a suspect as technology improved.
As we’re approaching summer here in the Northern Hemisphere, thoughts naturally turn toward road trips. While most people do this in their car, the [Dangie Bros] built a 500 lb bike camper for their own take on the great American Road Trip.
Almost all entry-level physics courses, and even some well into a degree program, will have the student make some assumptions in order to avoid some complex topics later on. Most commonly this is something to the effect of “ignore the effects of wind resistance” which can make an otherwise simple question in math several orders of magnitude more difficult. At some point, though, wind resistance can’t be ignored any more like when building this remote-controlled car designed for extremely high speeds.
In science fiction movies, communicating with aliens is easy. In real life, though, we think it will be tough. Today, you’ll get your chance to see how tough when a SETI project uses the European Space Agency’s ExoMars Trace Gas Orbiter to send a simulated alien message to the Earth. The transmission is scheduled to happen at 1900 UTC and, of course, the signal will take about 16 minutes to arrive here on planet Earth. You can see a video about the project, A Sign in Space,€ below.
Sometimes it starts with a violent threat written in graffiti on a school wall.
When heavily armed extremists arrive on motorcycles, the terror ensues — teachers are shot, kidnapped, raped. Some are executed in front of the children. School buildings are set on fire. Some are burned beyond repair.
Violent extremists in the Sahel have declared war on education. Their target is not just teachers and children but the fabric of society.
QEMU has emulation of several machines. One of them is “sbsa-ref” which stands for SBSA Reference Platform. The Arm server in simpler words.
In past I worked on it when my help was needed. We have CI jobs which run some tests (SBSA ACS, BSA ACS) and do some checks to see how we are with SBSA compliance.
While the Commodore 64 was an immensely popular computer for its time, and still remains a strong favorite within the retrocomputing community, there’s a reason we’re not using modern Commodore-branded computers today. Intense competition, company mismanagement, and advancing beyond 8-bit computers too late in the game all led to the company’s eventual downfall. But if you’re still a Commodore enthusiast and always wished you were able to get an upgraded C64, you might want to take a look at the Commander X16, a modern take on this classic computer.
Gyroscopes are one of those physics phenomena that are a means to many ends, but can also enjoyed as a fascinating object in their own right. Case and point being [Hyperspace Pirate]’s tightrope-balancing crawler in the video after the break.
For those of us who don’t do it every day, handling sheet metal can be a nerve-wracking affair. Sheet metal is thin, heavy, and sharp, and one wrong move while handling it can have much the same result as other such objects, like guillotine blades. If only there was a way to lessen the danger.
The former prime minister was fined last year while still the head of government for breaking Covid rules in 2020, one of a series of scandals that eventually led to his resignation.
Supreme Court Justice Neil Gorsuch highlights a vital lesson from the COVID-19 pandemic.
Searching for people with cognitive disabilities presents special challenges. Can we solve them?
The study suggests that worldwide some six percent of social media users have a problem, and about 30 percent of school pupils are intensive users of social media.
Today, United States Surgeon General Dr. Vivek Murthy released a new Surgeon General’s Advisory on Social Media and Youth Mental Health. While social media may offer some benefits, there are ample indicators that social media can also pose a risk of harm to the mental health and well-being of children and adolescents. Social media use by young people is nearly universal, with up to 95% of young people ages 13-17 reporting using a social media platform and more than a third saying they use social media “almost constantly.”
With adolescence and childhood representing a critical stage in brain development that can make young people more vulnerable to harms from social media, the Surgeon General is issuing a call for urgent action by policymakers, technology companies, researchers, families, and young people alike to gain a better understanding of the full impact of social media use, maximize the benefits and minimize the harms of social media platforms, and create safer, healthier online environments to protect children. The Surgeon General’s Advisory is a part of the Department of Health and Human Services’ (HHS) ongoing efforts to support President Joe Biden’s whole-of-government strategy to transform mental health care for all Americans.
“We are in the middle of a national youth mental health crisis, and I am concerned that social media is an important driver of that crisis—one that we must urgently address,” Murthy says in the report, pointing to the [Internet]’s tendency to isolate young adults.
The advisory highlights several common scenarios on social media that can harm the adolescent psyche, including exposure to graphic and harmful content and cyberbullying. Social media can also contribute to eating disorders and low self-esteem, especially for teenage girls.
Echoing countless studies on the subject, the U.S. Surgeon General said in a report released today that social media could be playing a significant role in a mental health crisis affecting the youth of America today.
In a 19-page report, Dr. Vivek Murthy said it’s too early to understand fully just how harmful social media is to the young. Still, he added, “There are ample indicators that social media can also have a profound risk of harm to the mental health and well-being of children and adolescents.”
"Much of the evidence we do have indicates that there is enough reason to be deeply concerned about the risk of harm social media poses. For example, adolescents who spend >3 hours per day on social media face double the risk of developing symptoms of depression and anxiety."
“I recognize technology companies have taken steps to try to make their platforms healthier and safer, but it’s simply not enough,” Mr. Murthy told The Associated Press in an interview. “You can just look at the age requirements, where platforms have said 13 is the age at which people can start using their platforms. Yet 40% of kids 8 through 12 are on social media. How does that happen if you’re actually enforcing your policies?”
To comply with federal regulation, social media companies already ban kids under 13 from signing up to their platforms – but children have been shown to easily get around the bans, both with and without their parents’ consent.
So what can parents and young people do now? The surgeon general has some tips.
“Our children and adolescents don’t have the luxury of waiting years until we know the full extent of social media’s impact,” Murthy said in an advisory released on Tuesday. “Their childhoods and development are happening now.”
The New York Times asked Dr. Small and other experts in adolescent development for a few practical questions that parents should consider when evaluating their children’s social media use.
In the suburbs of Maryland, Dr. Jeffery Dormu’s presence is hard to miss. He’s a regular on the local TV station, which has featured him and his practice five times over the past five years. And he smiles down from an electronic billboard outside a three-story vascular center he calls The Watcher. “It has a biblical reference, which is to watch over the community,” he said at its 2018 opening. In response to the country’s “tragedy of cardiovascular disease,” the center trademarked the phrase “vascular devastation,” a slogan frequently invoked in its marketing, along with a claim to have “saved over 34,000 lives and limbs.”
Dormu and his group, the Minimally Invasive Vascular Center, have been a magnet for people with leg pain who worry they have peripheral artery disease, a condition that afflicts more than 6.5 million Americans and happens when fatty deposits narrow the arteries and block blood from flowing to the legs.
For those looking to deceive the eye, a new tool is at hand. On May 23, Adobe launched a beta version of Photoshop that uses generative artificial intelligence. The latest release has a function called “generative fill” that lets the user manipulate an image through text prompts. Adobe bills the new tool as a designer’s “creative co-pilot.”
Adobe has launched Generative Fill, which, it says, will help Photoshop subscribers create images with a simple text prompt.
Across the country, spring graduation season highlights the swiftly tilting academic landscape. Cap-and-gown roll calls for computer science and other technology-centered disciplines are becoming ever lengthier, and for the humanities, ever shorter.
The White House said on Tuesday it would ask workers how their employers use artificial intelligence (AI) to monitor them, as it allocates federal investments in the technology, which is expected to change the nature of work.
The White House will hold a listening session with workers to understand their experience with employers' use of automated technologies for surveillance, monitoring and evaluation. The call will include gig work experts, researchers, and policymakers.
The parent company of Tufts Health Plan and Harvard Pilgrim Health Care said on Tuesday that cyber criminals had likely copied and taken data from Harvard Pilgrim’s systems between March 28 and April 17, and that it has begun to notify subscribers their information may have been compromised.
Security updates have been issued by Debian (node-nth-check), Mageia (mariadb and python-reportlab), Slackware (c-ares), SUSE (geoipupdate and qt6-svg), and Ubuntu (linux, linux-aws, linux-azure, linux-azure-5.4, linux-gcp, linux-gcp-5.4, linux-gke, linux-gkeop, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-bluefield, linux-gcp, linux-hwe, linux-raspi2, linux-snapdragon, and linux-gcp, linux-hwe-5.19).
A 28-year-old United Kingdom man from Fleetwood, Hertfordshire, has been convicted of unauthorized computer access with criminal intent and blackmailing his employer.
A press release published yesterday by the South East Regional Organised Crime Unit (SEROCU) explains that in February 2018, the convicted man, Ashley Liles, worked as an IT Security Analyst at an Oxford-based company that suffered a ransomware attack.
Point32Health says current and former members of Harvard Pilgrim Health Care may have been affected
On April 11, DataBreaches reported that a breach involving NCB Management had affected 494,969 Bank of America customers with past-due credit card accounts. At first glance, it appeared that the Pennsylvania collections firm had reported the breach to the Maine Attorney General’s Office, but closer attention revealed that it was Bank of America’s external counsel who had notified Maine. And after reviewing the sample letter to consumers more, DataBreaches began to suspect that Bank of America had written the letter that went out over NCB’s unsigned signature. The more DataBreaches looked at the situation and letter, the more questions it raised about whether the half a million Bank of America customers were only a subset of a much larger pool of breach victims, and whether this had been a hack where NCB paid some ransom to get “assurances.”
The SECOP II platform is a transactional platform with accounts for state entities and contractors used for submitting, evaluating, and awarding contracts. On May 3, La Agencia Nacional de Contratación Pública – Colombia Compra Eficiente reported a cyberattack on its SECOP II platform.
[...]
Clarin reported that a letter the agency sent its employees called it a ransomware attack. “Now, to release the systems, the hackers would be demanding no more and no less than a sum of 2.5 million dollars,” the agency wrote.
In a shocking turn of events, the Insurance Information Bureau of India (IIB) fell victim to a ransomware attack on April 2, 2023. The attack left nearly 30 server systems encrypted, rendering the agency’s data inaccessible.
Initially, IIB officials chose to keep the attack under wraps. However, as the severity of the situation became apparent, they eventually filed a complaint with the Cyberabad police. The investigation conducted by the police has identified the hackers responsible for the attack as a group from Russia.
Rheinmetall confirms being hit by Black Basta ransomware group, but says its military business is not affected.
Google introduces Mobile VRP bug bounty program for vulnerabilities in its mobile applications.
Read the official announcement on the PyPI blog as well! For the past year, we’ve worked with the Python Package Index to add a new, more secure authentication method called “trusted publishing.”
MikroTik patches a major security defect in its RouterOS product a full five months after it was exploited at Pwn2Own Toronto.
A credential phishing campaign using the legitimate SuperMailer newsletter distribution app has doubled in size each month since January 2023.
With proactive steps to move toward Zero Trust, technology leaders can leverage an old, yet new, idea that must become the security norm.
Iranian threat actors use a Windows kernel driver called ‘Wintapix’ in attacks against Middle East targets.
The newly detailed GoldenJackal APT has been targeting government and diplomatic entities in the Middle East and South Asia since 2019.
Coming up soon, the government faces an expiration data for its Section 702 surveillance powers.
In 2014, the Supreme Court ruled that law enforcement officers need a warrant if they want to search people’s cell phones. Since that day nearly nine years ago, no federal court has managed to make that ruling stick at our nation’s borders, which have been declared Not-Quite-the-United-States when it comes to our rights.
Police must get permission from the cameras' owners, though crucially they don't need to obtain a warrant. While businesses did grant officers live access to their surveillance cameras ahead of an anticipated march, the police said it didn't use the real-time feeds in the end.
ADF STAFF While Sudan’s rival generals fight to become the country’s chief military power, Russia and its proxy, the Wagner Group, have courted both sides of the conflict to remain in the good graces of whoever comes out on top.
Wednesday marks one year since an 18-year-old gunman armed with a semiautomatic AR-15 rifle entered his former elementary school in Uvalde, Texas, and shot dead 19 children between the ages of 9 and 11 and two of their teachers, as nearly 400 officers rushed to Robb Elementary School but took 77 minutes to confront the gunman. Investigators later found officers “failed to prioritize saving innocent lives over their own safety.” More than 1,000 incidents involving firearms have shaken America’s schools since 2018 — a dramatic increase over any similar period since at least 1970, according to the K-12 School Shooting Database. We discuss this uniquely American epidemic with Pulitzer Prize-winning journalist Maria Hinojosa, the founder of Futuro Media and host of Latino USA. She anchors the upcoming Frontline, Futuro Media and Texas Tribune co-production, After Uvalde: Guns, Grief & Texas.
The G20 meeting, which begins in Kashmir on Monday, will highlight the beauty of this legendary land. China is boycotting the meeting in order to tease India, which has been protesting its expansionist hegemony in South Asia. Turkey, Egypt, and Saudi Arabia have joined in solidarity with India's adversary and their ally, Pakistan.
Regardless of their reservations, the remaining sixteen countries and European Union guests are participating well. These detractors' non-participation is insignificant and meaningless, as otherwise they would have preferred firsthand knowledge of Kashmir and have their perspective clarified by participating.
If the political establishment wanted to calm rising tensions in the country, they chose the wrong person. The new army chief, the effective ruler in Pakistan, was viewed as hostile to Khan. In the weeks leading up to November Khan had accused Munir, along with his allies, of meddling in politics and plotting against the former prime minister. In 2019, for reasons that remain unclear, Khan removed Munir as head of the ISI spy agency after only eight months in the post. I thought in November that were Shehbaz Sharif to select Munir, the prospect for political and social stability was unlikely. Everyone would see it as a statement of open war against Khan and his Pakistan Tehreek-e-Insaf (PTI) party. Khan would have to respond. By December civil war seemed to loom.
Sergey Aksyonov, the Kremlin-appointed governor of annexed Crimea, said that traffic was closed on the Kerch Strait Bridge for several hours on Wednesday morning “due to exercises being carried out in the area.”
Russia’s Belgorod region came under attack by a “large number” of drones on Tuesday night, according to the region’s governor, Vyacheslav Gladkov.
Belgorod governor Vyacheslav Gladkov said during a livestream on Russian social media network VKontakte that he has many questions for Russia’s Defense Ministry regarding yesterday’s armed attack on the border region.
A man carrying explosives tried to enter Russia’s Rostov region from the territory of the Russian-annexed “Donetsk People’s Republic” on Wednesday, according to the Telegram channels Baza, Mash, and Shot.
Putin spokesman Dmitry Peskov told journalists Wednesday that Russia shares the West’s view that the war in Ukraine should not become a frozen conflict.
Human rights activist Bakhrom Khamroev has been sentenced to 14 years in a penal colony for “justifying terrorism” and “organizing the activities of a terrorist organization,” reports the human rights organization Memorial.
Russia’s State Duma approved an amendment to a law on the procedure for entering and departing Russia that requires those conscripted into military or alternative civilian service to hand over their passports. According to the amendment, passports must be handed over to the Russian authorities within five days of receiving the conscription notice.
Not so long ago, political analysts were speaking of the “G-2”—that is, of a potential working alliance between the United States and China aimed at managing global problems for their mutual benefit. Such a collaborative twosome was seen as potentially even more powerful than the G-7 group of leading Western economies. As former Undersecretary of the Treasury C. Fred Bergsten, who originally imagined such a partnership, wrote in 2008, “The basic idea would be to develop a G-2 between the United States and China to steer the global governance process.”
When Wisam Rafeedie was imprisoned in Askalan prison, he received a letter from the Palestinian prisoners’ movement leadership in Nafha prison that contained a curriculum for prisoners. Rafeedie was surprised to find his own novel, The Trinity of Fundamentals, listed in that curriculum. The Trinity of Fundamentals is a fictionalized account of his nine years of hiding from the Occupation in Palestine, which ended in his capture in 1991. He wrote it during his imprisonment at Naqab prison in 1993, a few years after he was captured by the Israeli occupation army. Throughout the process of writing his novel, Rafeedie distributed excerpts of it through the clandestine system of circulation established by the prisoners, which moved materials and information across cells; various sections were transferred via pieces of bread dough or pill capsules that were thrown across cells. Eventually, his attempts to smuggle his novel out of the prison through this method was thwarted by the interception of the prison guards who subsequently confiscated it the year it was completed.
European Commission Press release Brussels, 23 May 2023 The European Commission has approved an approximately €1 billion (PLN 4.7 billion) Polish scheme to support the liquidity of agricultural producers in the context of Russia's war against Ukraine.
European Commission Speech Brussels, 23 May 2023 Without improving biodiversity and getting to stronger and more resilient ecosystems, it will simply not be possible to guarantee that food production prospers, or bioeconomy and farmers livelihoods, let alone reach climate neutrality.
The candy producer “Pobeda” has been excluded from certain supply chains in Latvia and is ready to change its name after the news circulating in the media in March€ about the company's possible assistance to Russian soldiers in Ukraine, the Ventspils City Council told Latvian Radio on May 23.
On May 30, Latvian central bank (Latvijas Banka, LB)€ will issue a special 2-euro commemorative coin dedicated to Ukrainian sunflowers€ – a symbol of peace and freedom, LB said in a release on May 23.
Russian troops and security forces quashed an alleged cross-border raid from Ukraine in what appeared to be one of the most serious cross-border attacks since the war began. Russia's Defense Ministry claimed to have killed more than 70 attackers in a battle that lasted around 24 hours. Moscow blamed the raid that began Monday on Ukrainian military saboteurs. Kyiv portrayed it as an uprising against the Kremlin by Russian partisans. It was impossible to reconcile the two versions or to say with any certainty who was behind the attack or what the aims were. The battle took place in the Belgorod region, which is a Russian military hub with fuel and ammunition depots.
In the past several days, four separate events have occurred that, each in a significant way, signal the need for concern in the US.
When the smoke finally clears, President Biden’s Ukraine debacle will go down – along with Afghanistan and Iraq – as one of the greatest foreign policy disasters in US history. Hundreds of thousands have been killed on both sides in the service of the US neocons’ long standing desire to “regime change” Russia.
This week's unprecedented cross-border raid into Russia's Belgorod Oblast could be part of Ukrainian shaping operations designed to stretch the Russian military ahead of a coming counteroffensive, writes Peter Dickinson.
Ukraine's coming counteroffensive has a great chance of succeeding due to a number of factors including superior leadership, equipment upgrades, and strong morale, writes Richard D. Hooker, Jr.
China, Iran, Belarus, and Armenia all have different motivations for backing the Kremlin, but they are united by a common fear of what a Russian defeat in Ukraine might mean for their own countries, writes Taras Kuzio.
This issue brief evaluates membership and other security options for the alliance and its members to consider with regards to Ukraine, from formal actions by NATO as a whole to collective or individualized efforts by member nations.
Russia will achieve all its goals in Ukraine either through its "special military operation" or through other means, state TASS news agency cited Kremlin spokesman Dmitry Peskov as saying on Wednesday. During a meeting in Beijing, Chinese Premier Li Qiang told his Russian counterpart Mikhail Mishustin that China was willing to take its cooperation with Russia to a "new level."
The EU has imposed restrictions on Russians travelling to Europe following the invasion of Ukraine, with some countries – notably€ Estonia, Latvia, Lithuania, Finland, Poland and the Czech Republic – imposing an outright ban.€ The constraints have opened up new markets around the world for Russia’s billion-dollar tourism industry.
After ten months of bloody and intense fighting, Ukrainian army brigades have retaken some land around the outskirts of Bakhmut in the country’s east. Our reporters went to meet one brigade stationed on the edge of the city who are determined to carry on fighting back.
Report by Catherine Norris Trent, Johan Bodin, Dmytro Kovalchuck, Catalina Gomez Angel, Orest Haladzun.
Training Ukrainian pilots to fly US-built F-16 fighter jets does not make NATO "a party to the conflict", alliance chief Jens Stoltenberg said on Tuesday, although he added that it would send the message that NATO is "there for the long term”. Poland's defence minister said later in the day that his country was ready to train the Ukrainian pilots. Read our live blog to see how all the day's events unfolded.€ All times are Paris time (GMT+2).
In the wake of a damning UN report linking Russian mercenaries to a Malian massacre, the US State Department has said the Wagner Group may be using Mali as a secret arms depot to bolster Russian forces in Ukraine.€
The Russian Investigative Committee (RIC) announced an investigation Tuesday into alleged terrorist attacks in the Belgorod, Russia–close to the Russia-Ukraine border. A separatist group, known as the Freedom of Russia Legion, have claimed responsibility for Monday’s incursion onto Russian soil. The Ukrainian government denies any involvement.
Russian shelling of Ukraine's southern Kherson region has killed two civilians and wounded three, a regional official said on May 24, as the Ukrainian military said the battle for the eastern city of Bakhmut was still under way.
Russia and China are set to sign a set of bilateral agreements on May 24 during the Russian prime minister's trip to Beijing as the two giant neighbors pledge closer cooperation even as the West remains critical of their ties amid the war in Ukraine.
The Ukrainian port of Pivdenniy has halted operations because Russia is not allowing ships to enter it, in effect cutting it out of a deal allowing safe Black Sea grain exports, a Ukrainian official said.
German Defense Minister Boris Pistorius criticized Hungary for blocking further military aid to Ukraine at a meeting of EU defense ministers in Brussels on May 23.
The Czech state-run Mero energy firm said on May 23 it has signed a deal to end the country's dependence on Russian oil, more than a year into Moscow's invasion of Ukraine.
Kazakhstan's Foreign Ministry has defended its decision to reject the nomination by Kyiv of Serhiy Hayday, ex-chief of the military administration of Ukraine's Luhansk region, parts of which are under Russian-backed separatists' control, to the post of Ukraine’s ambassador to Kazakhstan.
A Ukrainian Armed Forces "sabotage and reconnaissance group" broke into the Belgorod region on Monday.
Russia is integrating its military draft with its digitized, pervasive bureaucracy. That could make new mobilizations for its war in Ukraine more efficient – and much harder to evade.
Training Ukrainian pilots in flying U.S.-built F-16 fighter jets does not make NATO a party to the conflict, the alliance's chief Jens Stoltenberg said on May 23.
The cross-border attacks by fighters aligned with Ukraine were an effort to force Russia’s military to divert troops from the front line, an official said.
At least three of what appeared to be American-made tactical vehicles known as MRAPs were part of the cross-border attack. According to visual evidence, Russia captured two of them.
Times photographers have been documenting Ukraine’s defense of the Eastern city since May 2022.
Russia’s Defense Ministry said it had pushed pro-Ukrainian fighters back across the border, but the group that claimed responsibility for the incursion said its attacks were continuing.
Beijing and Moscow are holding visits this week as alarm grows in China that Western countries backing Ukraine are turning their attention to Asia.
Russian Prime Minister Mikhail Mishustin has arrived in China, Moscow’s foreign ministry said, for a visit in which he will meet with President Xi Jinping and ink a series of deals on infrastructure and trade.
The U.S. defense chief first asked Biden officials to support the plan after meeting with European allies. He made his pitch to President Biden last week.
A court in Moscow has extended the pretrial detention of Evan Gershkovich, a U.S. reporter for The Wall Street Journal, arrested in Russia in March on spying charges that he, his newspaper, and the U.S. government have strongly denied.
Moscow’s Lefortovo District Court extended the arrest of reporter Evan Gershkovich until August 30. Gershkovich, who is a reporter for the Wall Street Journal, has been charged with espionage. The court decision was made in a closed hearing since the evidence in the case is classified.
On May 23, Russia’s Defense Ministry reported “the defeat of Ukrainian terrorist formations,” which it said “invaded” the Belgorod Region a day before.
Evan Gershkovich, was detained in the Russian city of Yekaterinburg in late March on charges of espionage.
The Wall Street Journal reporter Evan Gershkovich has been held at the notoriously harsh Lefortovo jail since his arrest on March 29 during a reporting trip to the central Russian city of Yekaterinburg.
A Russian court has extended the arrest of Wall Street Journal reporter Evan Gershkovich by three months. The decision came in a closed-door hearing emblematic of the secrecy that has marked the case against the first U.S. correspondent since the Cold War to be detained in Russia on spying charges. Gershkovich, an American citizen, was ordered held until Aug. 30. He was arrested in March on espionage charges on a reporting trip in Russia. He, his employer and the U.S. government have denied the charges. The U.S. government has declared Gershkovich to be “wrongfully detained” and demanded his immediate release. He’s being held in Moscow’s Lefortovo prison.
The unit has taken responsibility for a rare assault in Russian territory, and a member says it is just the beginning.
Ukrainian pilots have a lot to learn before they can start using U.S.-made fighter jets, but experts say it might take less time than once thought.
Members of the Russian Volunteer Corps include a guy arrested for spreading the Christchurch Shooter’s Manifesto and the founder of a neo-Nazi death metal festival.
Prime Minister Mikhail Mishustin held talks with Chinese Premier Li Qiang and was due to meet with President Xi Jinping.
Minister of Agriculture Didzis à  mits (United List) is the only member of the government who still has not received official clearance to work with state secrets, Latvian Radio reported May 22.
Investigative developments in the stolen document case reported out in the last several weeks have suggested that this investigation may not be the obstruction investigation everyone is treating it as.€ Jack Smith may only get to obstruction via a conspiracy to hoard classified documents.€
Failing to achieve net zero by 2050 would not just be a human and environmental catastrophe. It would be an economic one. Business as usual, leading to warming of 2€°C or 3€°C, would break the foundation of the financial system and risk major economic collapse. The adverse impacts of extreme weather events will undermine the ability of insurance companies to evaluate risk, with hurricanes, bush fires and droughts causing entire business models to fail. The consequence is that insurers would set the price for cover at increasingly unaffordable rates. With assets uninsurable, banks will be unable to offer security for loans such as mortgages, and without insurance or banking functioning as before, the entire financial system that today generates so much capital could fail.
Guam is "expected to take a direct hit" from Typhoon Mawar after strengthening into a dangerous Category 4 storm in the Pacific Tuesday, the National Weather Service office in the U.S. territory warns.
The latest: The eye of the storm was on track to pass Wednesday evening local time over central or northern Guam, which has a 168,000-strong population and is home to three U.S. military bases. NWS Guam issued a flash flood warning for the entire island through at least Thursday morning due to heavy rainfall.
The Finnish company Gasum terminated its contract with Russia’s state-owned gas monopoly Gazprom. According to Kommersant, Finland’s state-owned energy provider is the first European company to have terminated a long-term contract with Gazprom. The contract between Gasum and Gazprom was set to expire in 2031.
In a sweeping effort to cut transport emissions, France formally banned short-distance domestic flights where train travel—a greener alternative—is possible. The ban, which took effect on May 23, is part of an environmental effort that’s been in the works for two years.
In 2021, French lawmakers voted to prohibit domestic flights between cities where passengers can travel by train in two-and-a-half hours or less. But that law required European Union approval before it could go into effect.
Below the fold I examine how this earliest cryptocurrency story changed.
Think of Nakamoto's as a world where dollar bills migrated from under one person's mattress to under another person's. Even Nakamoto understood that, in a world where mattresses had cost-free pseudonyms, this wouldn't work. He anticipated part of Amir Kafshdar Goharshady's Irrationality, Extortion, or Trusted Third-parties: Why it is Impossible to Buy and Sell Physical Goods Securely on the Blockchain by writing: [...]
But fear not, aviation enthusiasts! Introducing the wavy inner wall (WIW) treatment, a cutting-edge method designed to combat jet noise head-on.
An oil and gas company run by a leading Conservative Party donor has been awarded licences to explore carbon dioxide storage under the North Sea, sparking accusations that the government is putting the interests of “its friends in the oil and gas business” ahead of the public interest.
On Thursday (18 May), EnQuest announced plans to develop a “low-cost carbon megastore” after winning four out of 20 available carbon capture and storage (CCS) licences, the first of their kind in Europe. The firm already holds dozens of licences for North Sea oil and gas exploration.
Since sound is the primary sense used by most ocean life, disruptions to the natural noise levels in the ocean from human activities can be particularly problematic for marine life. [DW Planet A] has a video describing some of the ways we can mitigate these disruptions to our friends under the sea.
The Administration is examining all its options to avoid a technical default should there be no agreement by the “X-Date.”
The Budapest Metropolitan Police has issued a warning about criminals targeting foreigners using ATMs in central Budapest.
Congress’s ongoing debt ceiling standoff has left the Democratic base asking a familiar question: Why are the party’s leaders such absolute cowards?
Most of us wouldn’t argue that private companies can’t run their businesses the way they prefer. The gold standard has been the right to refuse service to anyone — something that covers everything from refusing paper checks from certain customers to booting people off social media services for refusing to stop behaving like inveterate assholes.
A justice who frequently struggles to see injustice and cruelty in the present will surely struggle to see injustice and cruelty in the past.
A sweeping anti-immigrant crackdown is underway in Florida by Republican Governor Ron DeSantis, who is expected to enter the race for the 2024 Republican presidential nomination this week. SB 1718 is set to take effect July 1, but has already led to walkouts by immigrant workers. It bans people who are undocumented from using driver’s licenses issued in other states, and prohibits state ID cards to be issued to them. It also requires hospitals that accept Medicaid to ask about citizenship during intake, and expands requirements for employers to use the federal E-Verify system to check the immigration status of their workers. “SB 1718 has been the harshest immigration bill that we have seen,” says Florida immigration attorney Andrea Reyes. We also speak with historian Geraldo Cadava, who says DeSantis’s policies may not “translate nationally,” given Florida’s unique demographics and gerrymandered political system. Reyes is featured in a new piece for The New Yorker by Cadava, “Florida’s Right Turn on Immigration.”
The Hungarian ambassador in Vienna says that he was not summoned to the Austrian Foreign Ministry, but rather invited for consultations after the Austrians learned that Hungary had released foreign migrant smugglers and urged them to leave the country within 72 hours.
According to a study conducted by the Finnish Business and Policy Forum (EVA), over half of Finns consider Finland's geographical location, proximity to Russia, cost of living, and taxation as barriers to immigration. The findings were derived from EVA's Values and Attitudes Study, which presented a list of 26 factors that could either attract or hinder immigration to the country.
From the perspective of policymakers, issues that can be influenced through policy measures are of greater interest than Finland's geographical location and weather conditions.
North Korea oversees thousands of IT workers globally, primarily located in China and Russia.
An Armenian court is to consider on May 24 the extradition of Chechen Salman Mukayev to Russia.
The coverage in the mainstream media of the Durham Report puts another nail in the coffin of the Russiagate Hoax, if another were needed after the total collapse of the Mueller investigation. The response to Durham’s report in much of the mainstream media varied from silence to attempts to discredit the report.
Special counsel Jack Smith is wrapping up his criminal investigation into whether former President Trump mishandled classified documents, having interviewed virtually every employee at his Mar-a-Lago home, the Wall Street Journal reports.
On 25 May 2018, the GDPR came into force. While the contents of EU data protection rules stayed largely the same, the alleged big change was the GDPR's strict enforcement. 5 years later, national authorities and courts largely leave the European legislator in the lurch – despite a budget of more than €330 million in 2022.
noyb provides the following resources on the 5 year anniversary: [...]
Oracle's association with TikTok stems from efforts under the Trump administration to force owner ByteDance to sell the US stake to an American company. In the twilight of Trump's presidential tenure, the US government lost a legal decision in its efforts to force the video app biz to sell its US interests.
Lt. Gen. Timothy Haugh has been nominated by President Biden as the next leader of U.S. Cyber Command, an Air Force official confirmed to DefenseScoop.
Haugh, currently the Cyber Command’s deputy commander, would be the first Air Force officer to lead Cybercom, as the first three commanders were Army, Navy and Army. In the dual-hatted role, he would also head the National Security Agency.
Earlier this month, the CRTC issued the first three of what may become at least nine public consultations on Bill C-11. As I lamented in a post on the consultations, “with short timelines, no resources or support mechanisms for new groups and entities interested in participating, and the absence of the policy direction, this is not a serious attempt to fully engage in Canadians.” A wide range of Canadian cultural, consumer, and independent groups have now escalated the issue by formally asking the CRTC to extend its submission period to late July rather than the current June deadlines. The request, which comes from groups that have both supported and criticized Bill C-11, should be a no-brainer given the absurdly short deadlines that severely limit the ability of many groups to effectively participate in the Bill C-11 consultation process.
The extension request points to three concerns: [...]
There is mounting evidence that corporate profiteering is playing a key role in the latest wave of inflation, with profit margins soaring while real wages continue to fall. To fight inflation, we have to tackle corporate greed.
About 10 months after axing roughly one-fifth of its global workforce – and 10 weeks following Eliah Seton’s start as CEO – SoundCloud has announced plans to cut another eight percent of employees.
Early last year, I visited a local Labour Party in England’s Midlands. As Covid lockdowns battered the area’s most vulnerable, Labour organizers in Broxtowe, in Nottinghamshire, pulled together to help out. They started a food bank. They worked with a local youth football club to set up a community center. They kept knocking on doors in the most deprived neighborhoods, checking in, showing up, making sure people were OK. It all seemed like the model of a local Labour party: nurturing community and seeding trust among people long abandoned by a remote political class, in this marginal seat held by the ruling Conservative Party since 2010. But this year all that local work was shut down—by the Labour Party.
"At the meeting, the delegation was informed about ongoing cases related to the airport, as well as other companies' cases related to the current business environment in Hungary," Budapest Airport told Hvg.hu about the business meeting, where members of the European Parliament's Committee on Budgetary Control met with representatives of multinational companies operating in Hungary last week.
The European Parliament (EP) may adopt a resolution declaring the Orbán-government unfit to hold the rotating presidency of the Council of the EU, Népszava reports.
The halting promise of democratic reform in the Arab world is facing new challenges—particularly in Tunisia. The North African country was among the earliest regional powers to help touch off what would become known as the Arab Spring of 2011, when it toppled the nasty dictatorship of Zine El Abidine Ben Ali, who had been in power for nearly 25 years, in the movement known alternately as the Jasmine Revolution, or the Revolution of Dignity.
The facts of John Fetterman’s hospitalization for depression are well-known. In May 2022, during the Democratic primary for the US Senate in Pennsylvania, the then 52-year-old announced that he had suffered a stroke. Fetterman won the primary, and after a few months recuperating, he returned to the campaign trail and beat out TV personality Dr. Mehmet Oz in an ugly, hard-fought race. In January, he was sworn in to the US Senate, and the next month he announced that he was checking into Walter Reed National Military Medical Center to receive treatment for “severe” depression. He stayed for 44 days before checking out in March. He returned to the Senate in April.
Last Tuesday, former city council member Cherelle Parker won the Democratic primary in Philadelphia’s mayoral race—prevailing over a crowded field, including her fellow city council alumna Helen Gym. Gym had received a wave of endorsements from progressive leaders and organizations, like Bernie Sanders, Alexandria Ocasio-Cortez, and the Working Families Party, but ultimately came up short.
TikTok sued the state of Montana on Monday over the state’s recently enacted ban, which prohibits TikTok from operating within Montana. The lawsuit alleges Montana’s ban violates the US Constitution’s First Amendment, which protects Americans’ right to free speech.
To recap: due to unsubstantiated fear-mongering about TikTok, the lack of a real federal privacy law, and a weird obsession with China, Montana passed a blatantly unconstitutional law banning TikTok in the state. Last week, governor Greg Gianforte signed the bill into law and we predicted his doing so would cost Montana taxpayers a ton of money for the lawsuits they would soon have to deal with. The same day that the law was signed, a group of TikTok users sued the state.
By Talek Harris TikTok is confident of stopping a ban in the US state of Montana, its CEO said on Tuesday, after the Chinese-owned social media app launched a legal challenge.
TikTok is now suing Montana over legislation that bans the app across the state. Montana is suddenly facing legal challenges from both TikTok creators and the platform itself. The company filed its lawsuit in the U.S. District Court for the District of Montana on Monday, seeking to have the law reversed.
U.S. Surgeon General Vivek Murthy issuing a warning today that social media poses a threat to kids' mental health, escalating calls for new safeguards aimed at minors.
Why it matters: The advisory adds to scrutiny over the effects of excessive use and harmful content, which has been blamed for consequences ranging from disrupting kids' sleep to promoting suicidal thoughts.
Social media company TikTok Inc. filed a lawsuit Monday seeking to overturn Montana's first-in-the-nation ban on the video sharing app, arguing the law is an unconstitutional violation of free speech rights and is based on “unfounded speculation” that the Chinese government could access users' data.
President Recep Tayyip Erdoßan has acknowledged that a video he presented during his election rallies about his opponent's alleged collaboration with the outlawed Kurdistan Workers' Party (PKK) may be "manipulated."
Kemal Kñlñçdaroßlu mounts a serious challenge to Erdoßan’s presidency in Turkey as the election heads to a runoff. Student housing presents a growing problem across Europe. In our culture segment, the French play ‘Daddy’ delves into the seedy world of online grooming.
Over the last few years, there’s been a lot of fretting among the media, politicians, and others about how “deep fakes” would have a major impact on events, with faked imagery, audio, and video creating havoc on news events and political campaigns. Back in 2019, we had published a story suggesting that people calm down a little. As we noted, similar fears had come about before, including in the early 1990s with the introduction of Photoshop. Similar predictions were made about how disastrous this would be for “truth.”
I don’t want my channel to appear in a platform that thinks it’s OK to let these things stand. Yes, YouTube also has some pretty weird and offensive crap, but they DO remove it when it’s brought up t their attention. They don’t try and defend it.
So, while I don’t agree with YouTube’s stance on moderation, I also find it way less problematic than Odysee’s. Let’s put it this way: YouTube’s money-driven “morals” don’t have the potential to spread hate.
The platform, whose owner, LBRY Inc, is currently being sued by the Securities and Exchange Commission for trading in unregistered securities, has been increasingly popular with extremists who have been banned from other platforms, and who are attracted by Odysee’s cryptocurrency-based monetization program.
The emails, sent in error to a user who had been complaining about neo-Nazi content on the platform, suggest that the platform is not doing as much as it can to restrict extremists.
I’m afraid I have some bad news. After ten years of publishing, The Nib is going to close down this summer. The new issue of our magazine, the Future issue, will be our last. We will continue to publish online every weekday through August and then shut down.
“CPJ strongly condemns the extension of the detention of Evan Gershkovich, who has already been held in a Russian prison for nearly two months for simply doing his job as a journalist,” said Gulnoza Said, CPJ’s Europe and Central Asia program coordinator, in New York. “Russian authorities should immediately release Gershkovich, drop all charges against him, and stop prosecuting members of the press for their work.”
Tuesday’s court hearing wasn’t announced in advance, and the entire case has been wrapped in secrecy.
Russian authorities haven’t detailed what — if any — evidence they have gathered to support the espionage charges. Various legal proceedings have been closed to the media, and no details immediately emerged about whether Gershkovich or U.S. Embassy representatives attended Tuesday’s hearing or what was said. Tass said the session was closed because the reporter was accused of possession of “secret materials.”
In April, Congolese authorities enacted new laws governing the press and online activity, according to multiple media reports and CPJ’s review of the legislation. The latest press law contains sections that enable authorities to criminally prosecute journalists for their work, including for sharing “false news.” Under the new digital code, authorities are granted powers to imprison journalists for sharing information electronically.
Stan Grant, an Indigenous journalist, was attacked on social media after talking during coronation coverage about the brutality of colonialism.
Real Madrid forward€ Vinicius€ Jr's red card€ in Sunday's LaLiga match at Valencia, in which he was also racially abused, has€ been rescinded,€ the Spanish Football Federation (RFEF) said on Tuesday.
Spanish police arrested seven people Tuesday over two incidents of racial abuse targeting Real Madrid's Brazilian star Vinicius Junior, including one this weekend that sparked an international outcry.
The Brazilian player was subjected to racist insults during a match in which haters yelled at him "Monkey" alluding to his skin color.
According to reports on social media accounts published on May 23, some of the most well-known female political prisoners, including Sepideh Gholian, Bahareh Hedayat, Faezeh Hashemi, and Narges Mohammadi, participated in a rare political protest inside the prison, with each issuing statements condemning the wave of executions.
The group was enjoying Kurdish music on the Moda shoreline and partcipating in traditional halay dance. The atmosphere quickly turned tense when the police intervened, initially confiscating the group's speakers. As tensions escalated, the police resorted to using pepper spray to disperse the crowd.
It’s not hard to see how the financial pressures on people have accumulated. Energy prices surged last year and even with expected reductions in the price cap will remain 60 per cent higher for households than 18 months ago. Food prices have risen by 19.2 per cent over the last year, their fastest pace for 45 years. Into the middle of this inflationary surge, Britain’s broadband providers, dominated by just three major companies, have increased their prices by up to 14 per cent – on top of 9-10 per cent increases last year.
These higher costs were already having an effect. Ofcom’s affordability survey found that three in ten households reported difficulties in paying for broadband even before the latest price hike. Given a choice between remaining socially active and being able to eat, of course people will prioritise. Some may be able to soften the blow with mobile [Internet] access. But how pathetic that in the sixth largest economy in the world we should be forcing people to make this kind of choice.
It often feels like not a day goes by without some new story about how San Francisco is in crisis. From Fox News to The New York Times, the national media is laser-focused on highlighting every step of the city’s supposed descent into crime-fueled anarchy.
Well, well, the “Taco Tuesday” battle appears to be heating up quickly. After years of holding and policing its trademark for “Taco Tuesday,” chain Taco John’s has found itself in a battle with Taco Bell, which is petitioning the trademark office to rescind its rival’s mark due to it becoming generic. I noted in that last battle that NBA mega-star LeBron James, himself apparently a huge fan on social media of celebrating taco Tuesdays, attempted to get a trademark for the phrase for himself. When that was denied, part of the reason the USPTO gave was that the term was too generic to be trademarked. Had LeBron wanted to press the issue, he could have used that as a weapon to push the Trademark Office to rescind Taco John’s mark.
Le Monde CEO Louis Dreyfus described the arrival of generative AI as an "emergency" for the industry.
\
An estimated 17 percent of people in Finland aged 15-74 years old said that they download or stream films and TV programmes from unauthorised sources. Content piracy in the Nordic countries has increased in particular amongst the 15-24 year old age group over the past year.
These are the basic facts: In 1981, Newsweek commissioned Lynn Goldsmith to take a series of photos of Prince. In 1984, she licensed one of those photos to Conde Nast for artist Andy Warhol to use as a “reference photo” to create his own portrait of the musician. Warhol created a series in various colors and the magazine chose one of these portraits to illustrate a piece on Prince. In 2016, the Andy Warhol Foundation gave Conde Nast a license to use a different portrait in the series (“Orange Prince”) for use in a special tribute magazine dedicated to Prince. Goldsmith demanded compensation. AWF sought a declaration that Warhol’s portraits made fair use of Goldsmith’s photo and, therefore, it had every right to license the resulting work. A district court said yes, the Second Circuit disagreed, and AWF appealed. Along the way most of the claims and questions were dropped, leaving the Supreme Court with one narrow but important question: whether the first fair use factor—the “purpose and character” of the use—weighed in AWF’s favor or Goldsmith’s.
As a reminder, fair use is the idea that there are certain ways that you can use a piece of copyrighted work regardless of whether you have the rightsholder’s permission, and it's determined by a balancing test that considers four factors—
Dutch fiscal police have carried out a large-scale raid that appears to have taken down one of Europe's largest IPTV operations servicing more than a million users. No services or companies are being named but according to local anti-piracy outfit BREIN, the targeted organization sold access via third-party resellers. Meanwhile, Dutch data center Globe went completely dark.