The Kubernetes community has been signing their container image-based artifacts since release v1.24. While the graduation of the corresponding enhancement from alpha to beta in v1.26 introduced signatures for the binary artifacts, other projects followed the approach by providing image signatures for their releases, too. This means that they either create the signatures within their own CI/CD pipelines, for example by using GitHub actions, or rely on the Kubernetes image promotion process to automatically sign the images by proposing pull requests to the k/k8s.io repository. A requirement for using this process is that the project is part of the kubernetes or kubernetes-sigs GitHub organization, so that they can utilize the community infrastructure for pushing images into staging buckets.
Assuming that a project now produces signed container image artifacts, how can one actually verify the signatures? It is possible to do it manually like outlined in the official Kubernetes documentation. The problem with this approach is that it involves no automation at all and should be only done for testing purposes. In production environments, tools like the sigstore policy-controller can help with the automation. These tools provide a higher level API by using Custom Resource Definitions (CRD) as well as an integrated admission controller and webhook to verify the signatures.
The general usage flow for an admission controller based verification is: [...]
While we wait to see what Red Hat's new source code policy does to RHEL rebuilds like RockyLinux and Alma Linux downstream, Linux 6.4 came out this week. [...]
The fifth conference on Power Management and Scheduling in the Linux Kernel (abbreviated "OSPM") was held on April 17 to 19 in Ancona, Italy. LWN was not there, unfortunately, but the attendees of the event have gotten together to write up summaries of the discussions that took place and LWN has the privilege of being able to publish them. Reports from the second day of the event appear below.
Kernel support for copy offload is a feature that has been floating around in limbo for a decade or more at this point; it has been implemented along the way, but never merged. The idea is that the host system can simply ask a block storage device to copy some data within the device and it will do so without further involving the host; instead of reading data into the host so that it can be written back out again, the device circumvents that process. At the 2023 Linux Storage, Filesystem, Memory-Management and BPF Summit, Nitesh Shetty led a storage and filesystem session to discuss the current status of a patch set that he and others have been working on, with an eye toward getting something merged fairly soon.
The overall concept of copy offload is that you issue a command to a device and it copies the data from one place on the device to another, though the copy can also be between NVMe namespaces on a device. The advantages are in saving CPU resources, PCI bandwidth, and, on fabrics, network bandwidth, because the copy stays local to the device. The first approach was from Martin Petersen in 2014, which was ioctl()-based; another, which was based on using two BIOs, was developed by Mikulas Patocka in 2015. The ioctl() approach had problems with scalability, Shetty said. Petocka's approach was compatible with the device mapper, but neither of the two patch sets gained any traction in the community.
Backporting fixes to stable kernels is an ongoing process that, in general, is handled by the stable maintainers or the developers of the fixes. However, due to some unhappiness in the XFS development community with the process of handling stable fixes for that filesystem, a different process has come about for backporting XFS patches to the stable kernels. The three developers doing that work, Leah Rumancik, Amir Goldstein, and Chandan Babu Rajendra, led a plenary session at the 2023 Linux Storage, Filesystem, Memory-Management and BPF Summit (with Rajendra participating remotely) to discuss that process.
Goldstein began by noting that each of the presenters is responsible for a different stable kernel; he does 5.10, Rumancik handles 5.15, and Rajendra is responsible for 5.4. The session was meant to be something of a case study, because other filesystems (and subsystems) have similar issues. He was "very happy to see" that stable maintainer Sasha Levin was present for the session so that he could offer his perspective as well.
The bcachefs filesystem, and the process for getting it upstream, were the topics of a session led remotely by Kent Overstreet, creator of bcachefs, at the 2023 Linux Storage, Filesystem, Memory-Management and BPF Summit. He has also discussed bcachefs in previous editions of the summit, first in 2018 and at last year's event; in both of those cases, the question of getting bcachefs merged into the mainline kernel came up, but that merge has not happened yet. This time around, though, Overstreet seemed closer than ever to being ready to actually start that process.
He began his talk by noting that he had been saying bcachefs is almost ready for merging for some time now; "now I'm saying, let's finally do it". He wanted to report on the status of the filesystem and on why it is ready now for upstreaming, but he wanted to use the bulk of the session to discuss the process of doing so. "It's a massive, 90,000-lines-of-code beast" that needs to get reviewed, so there is a need to figure out the process to do that review.
His goal with bcachefs is to have the "performance, reliability, scalability, and robustness of XFS with modern features". That's a high bar, and one that bcachefs has not yet reached, but "I think we're pretty far along". People are running bcachefs on 100TB filesystems "without any issues or complaints"; he is waiting for the first 1PB filesystem. "Snapshots scale beautifully", which is not true for Btrfs, based on user complaints, he said.
Darrick Wong has been doing work on XFS online repair for a number of years and things are getting to the point where most of the filesystem-internal work has been completed and is under review. The work remaining mostly concerns the user-space side to set up a periodic scan and repair cycle, so he wanted to discuss what user space needs from this kind of feature in a filesystem session at the 2023 Linux Storage, Filesystem, Memory-Management and BPF Summit that he led remotely. The session may not have gone quite as he hoped, as it got somewhat derailed by topics that spilled over from the earlier session on unprivileged image mounts.
His current patch set for XFS online repair is "out for review on Dave Chinner's laptop right now", so it is time to start talking about the missing pieces. That means that he will be talking more about user space than he would normally; there is a user-space driver program that controls how often the online fsck mechanism runs. There is nothing yet for notifying user space of problems that were found by an online fsck pass, nor is there a daemon monitoring for notifications to do anything about them, such as to issue repair requests. There is no good infrastructure in the kernel for handling and dispatching such things, he said.
The C language does not provide the sort of resource-management features found in more recent languages. As a result, bugs involving leaked memory or failure to release a lock are relatively common in programs written in C — including the kernel. The kernel project has never limited itself to the language features found in the C standard, though; kernel developers will happily use extensions provided by compilers if they prove helpful. It looks like a relatively simple compiler-provided feature may lead to a significant change in some common kernel coding patterns.
Valve is working to improve gaming on Linux platforms, and recently hired a developer who was crucial to bringing Linux to Apple Silicon.
Alyssa Rosenzweig has recently made an update to their resume, mentioning their current work at Valve as a contractor. In their role, Rosenzweig was focused on enhancing Linux gaming by developing graphics drivers for upstream integration.
There are not many open-source eBook reader operating systems in the market. Most eBook readers use proprietary OS by their manufacturers. InkBox is an open-source, Qt-based eBook reader for Kobo eBook devices which also comes with a full-featured operating system called InkBox OS.
The long-awaited arrival of InkBox OS 2.0, the operating system designed to replace standard firmware on Kobo and Kindle e-readers, is finally here. Built upon the solid foundation of Alpine Linux 3.10, InkBox OS 2.0 introduces a range of exciting features and enhancements. With its user-friendly interface and optimal e-paper screen optimization, this update is set to redefine your eBook reading experience.
Showing many companies how open source can be seriously successful, Blender version 3.6 is out now and it's a long-term support release so it would be good to upgrade and stick with it for a while.
I have come to think that this is a bad idea and that you should configure your mail submission server to strip User-Agent (and probably also X-Mailer). First off, leaving this header in leaks information about your users to various people. With the way that the Internet has evolved, hiding this information is now the right answer, much like hiding user IPs turned out to be the right call. If you need to know client and device usage information for your own purposes, log the header value before you delete it (but understand that not all clients may add it in the first place).
(This information leaks not just to the people who your users send email to, but also to the people who operate the receiving email servers. These days that often means Google and Microsoft.)
Today in Tedium: My favorite sound in computing is one that I haven’t actually had to use on a computer in nearly 20 years. The modem was a connection to a world outside of my own, and to get that connection required hearing the sounds of a loud, abrasive handshake that could easily be mistaken for Lou Reed’s Metal Machine Music. I’d like to compare it to another kind of sound for a little bit—the noise of a “straight key” used for a telegraph. Both technologies, despite more than a century in age difference, seemingly turned data into sound, then into electrical pulses, and back into sound again. It’s no wonder, then, that you can actually trace the roots of the modem back to the telegraph, and later the teletype machine. Data and wires, simply put, go way back. And it’s not the only example of the telegraph’s quiet influence on modern computing. Today’s Tedium draws a line between the modern computer and the pulses that inspired it. — Ernie @ Tedium
Learning how to use groups is essential if you want to give users permission to read files, modify them, or create their own.€ €
In this comprehensive tutorial, we walk you through the process of adding users to and removing them from a group in Linux.€
Vim is the text editor that made me highly productive in writing code and editing system configuration files. Something to speed you up even more is auto-complete.
Eclipse is a free integrated development environment IDE that is used by programmers around to write software mostly in Java but also in other major programming languages via Eclipse plugins.
The latest release of Eclipse IDE 2023ââ¬â06 doesn’t come with pre-build binary packages specific for Debian-based Linux distributions. Instead, you can install Eclipse IDE in Ubuntu or Debian-based Linux distributions via the compressed installer file.
Roughly four out of every five internet users encountered internet censorship in 2022.€
But not every user hits a virtual wall when attempting to access a website or online service for the same reason. Besides content regulations, geopolitics and company policies also influence website restrictions.€
http_access allow allowed_network
https_proxy=https://username:[email€ protected]:port/
ftp_proxy=ftp://username:[email€ protected]:port/
Proxies, in their various forms, serve as vital intermediaries between your network and the websites or services you access. When it comes to choosing the right proxy for your needs, considerations such as privacy, anonymity, speed and connection stability come into play. If you’re using Linux or Unix systems, you have the advantage of flexibility and compatibility with a wide range of proxy options. For privacy-conscious users or those engaged in data collection, proxies like residential proxies can provide a more authentic and anonymous browsing experience.€
On the other hand, if your focus is on optimizing speed and connection performance, dedicated datacenter proxies are often the preferred choice. Linux and Unix users can easily configure and manage these proxies, leveraging the operating system’s robust networking capabilities. By understanding the unique advantages that Linux or Unix can offer in terms of proxy compatibility, you can choose the most suitable proxy type for your specific use case, whether it’s privacy-oriented tasks, high-speed activities like gaming or automation tasks. We look at the difference between residential and dedicated datacenter proxies, like the options Smartproxy offers.
Sumerian writings and Egyptian hieroglyphs have one thing in common — both use pictorial signs to represent events, thoughts, or abstract ideas. The Sumerian language is said to be the oldest written language in existence, first attested about 3100 BCE in Southern Mesopotamia (currently Iraq). Hieroglyphs were the writing system used by ancient Egyptians. They date back to a similar time period. But what is so special about them? Well, they represent the time when man decided to keep written records for all the events taking place. Records prior to that were kept verbally, passed on from generation to generation in the form of songs or stories. However, note that keeping a record of events has always been important in the history of mankind.
Linux users tend to use several technical jargon that originated from when the kernel was developed. Take Hostname as an example, which is a technical term for your PC’s name. Now, if you’ve been using computers and other smart gadgets, it’s easy to take a guess. But if you are a novice Linux user, changing the “hostname” might sound like a complicated adventure, but we’re here to help you. In this guide, let’s look at how to change the hostname in Linux.
In Linux, every user is part of a collection known as a “group.” And for efficient system management, it is advised to regularly list and check all groups for the presence of any suspicious users. In this article, we will discuss the best methods to list all groups in your Linux system.
PuTTY is a great tool for connecting between systems of different types. In case you’re not familiar with the tool, the name has no connection to Silly Putty. Instead, the capitalization of the TTY part of the name suggests its connection with the acronym tty. It provides an easy way to log into a Linux system from Windows as well as many other systems.
Say you want to log into your Linux system from a Windows system. This tool will allow you to set up a connection (IP address, host name, etc.) and control the size, colors and font to be used. This post explains how to set PuTTY up to optimize your view of the Linux command line. PuTTY was actually born on Windows to make this kind of connection possible.
Have little time? Always on the go? Need a refresher of recent Steam Deck news? Got you covered here, come get your little fix. I know how you feel€ — there's simply not enough hours in the day right? You have to work, see friends and family and somehow make time to play games for yourself and not get left in the dust for news.
Finally, another Aliens game to sink my teeth into. I've been playing Aliens: Dark Descent and overall I'm pretty damn happy with the experience. Played on Linux desktop (Fedora KDE) and Steam Deck with Proton Experimental, overall it's scratched an itch I've had since blasting through XCOM 2.
After a bit of a development hiccup changing developers after the crowdfunding campaign, One Lonely Outpost has hit Early Access with Linux support planned later. Originally being developed by€ Aurorian Studios, they announced their publisher€ Freedom Games was taking over development back in September 2022.
Developer Sotenbox recently put up a trailer for Planetary Life, a pretty neat looking entry into the evolution simulation genre. Made with Godot Engine, it should have no problems running nicely on Linux machines.
Another chance for you to pick up a few sweet games while also saving your pennies. The itch.io Summer Selects Bundle 2023 is live. This time around the choices are pretty good and a few of the games included are true gems, some that get often overlooked amongst the crowd. So here's what you can get.
For Steam Deck and Linux desktop, Valve has released another Proton Experimental upgrade focusing on fixing up bugs and regressions. They only just released an update for Proton Experimental on June 24th€ but they're back again because more regressions are being found.
As soon as I was done with my review of the Asus ROG Ally, I grabbed my best USB stick and started looking for ISOs to download.
Windows is, of course, the main highway to most PC gaming, but it's also (as detailed in the review) not yet built to work well on a 7-inch gaming handheld. The ROG Ally ships with Windows (Home) installed and a bunch of Asus software, but it is still, at heart, a PC. With effort, you can get into the BIOS, disable Secure Boot, plug in a USB stick, and boot a USB stick with a live Linux distribution on it.
Yes, Zorin OS has finally delivered on the distro’s most requested feature.
The new Zorin OS Upgrader tool, as I’m sure you can guess from the name alone, makes it possible to directly upgrade to new major versions of Zorin OS (e.g., Zorin OS 15 to Zorin OS 16) as well as Zorin OS editions (e.g., Zorin OS Core to Zorin OS Pro).
Running a Linux distribution on Arm-based single-board computers (SBCs) is still not as easy as on x86 systems because many Arm devices require a vendor-supplied kernel, a patched bootloader, and other device-specific components. One distribution that addresses this problem is Armbian, which offers Debian- and Ubuntu-based distributions for many devices. The headline feature in the recent release, Armbian 23.05, which came at the end of May, is a major rework of the build framework that has been made faster and more reliable after three years of development.
Many Arm-based SBCs and development boards support Linux, but often the board manufacturer provides a heavily patched Linux kernel upon release and doesn't maintain it for long. Not all manufacturers are like the creator of the Raspberry Pi that still supports the 11-year-old first model in the latest Raspberry Pi OS. Consequently, many users of other Arm SBCs end up with an outdated, unsupported kernel or a Linux distribution based on an end-of-life Debian version. The Armbian developers attempt to salvage these devices by porting the vendor's patches to newer Linux kernels and supporting the devices in their Linux distribution as long as it's viable.
The Armbian project began in 2013 as a hobby project by Igor PeÃÂovnik, when he created a script to build a Debian image for the Cubieboard SBC. While he was fixing problems and learning how to improve software support for the board, others joined him on the Cubieboard forums. By 2014, the project got its own web site and the name Armbian; the project's goal has evolved to provide a Debian image for various Arm SBCs.
The corporate license experts I talked to said the threat of termination of a subscription would not trigger the 'no restrictions' clause of the GPLv2, which deals with a copyright, not a contract.
This year’s Red Hat Summit took place in Boston, Massachusetts and was an opportunity for Red Hat customers and partners to learn, collaborate and gather together to shape the future of enterprise technology.€
Not only did event attendees improve their knowledge through hands-on labs and one-on-one discussions with Red Hat subject matter experts, they also had a chance to provide feedback about their experience with Red Hat products. Through journey-mapping activities in the Experience Zone section of the Summit Expo Hall, to in-person roundtable interviews at our Executive Briefing Center (EBC), customers and partners had a number of opportunities to make sure their voice was heard.€
In this blog post, I look at the life cycle of SAP infrastructure and an upcoming call to action regarding SAP modernization. IT departments must adhere to policies in regulated and restricted environments, such as traceability through data traffic logging with access to provisioned services or data access.
Here, I describe an architecture that introduces a fully automated SAP environment modernization across the entire life cycle—including Day 2 operations—that can help reduce infrastructure and labor costs.
On July 20, 2023, Ubuntu 22.10 (Kinetic Kudo) will no longer be supported. Users of that release are encouraged to either upgrade to the next non-LTS release (23.04) or do a fresh install of the latest LTS release (22.04.2).
One thing to keep in mind is that the latest non-LTS release (23.04) is only supported through January 2024. But that's the way of the Ubuntu non-LTS releases. Because of that, it might behoove you to migrate to the latest LTS release, which enjoys support through April 2032.
In today’s digital landscape, organisations of all sizes have expanded their presence in the cloud. But with this expansion comes a significant increase in the attack surface, making security a top concern. In this blog, we will dive into the exciting world of cloud cyber security, and explore a stronger approach to securing your workloads with the help of Ubuntu.
With the number of IoT devices on track to exceed 30 billion within the next couple of years, CIS has created a resource that will help IoT vendors ease the process of building in security by design and by default.
It’s really weird to think back to eleven years ago and the modest ambitions that Raspberry Pi founders Eben and Liz Upton had for a green, credit card-sized thing designed to get a few thousand more UK school children into computing. Fast forward to now, and we’re in every single primary school in Malaysia’s largest state.
Based on the Renesas RA4M1 microcontroller, the new Arduino UNO R4 boasts 16x the RAM, 8x the flash, and a much faster CPU compared to the previous UNO R3. This means that unlike its predecessor, the R4 is capable of running machine learning at the edge to perform inferencing of incoming data. With this fact in mind, Roni Bandini wanted to leverage his UNO R4 Minima by training a model to predict the likelihood of a FIFA team winning their match.
The driving module behind this project is a GGreg20_V3 Geiger counter module. This device is able to detect radiation levels with data that can be read by separate modules like a Raspberry Pi Pico W. In this case, Sboger is using ESPHome to receive data from the Pico W and process it into a useful gauge graphic.
The ESP32 series from Espressif have been a successful line of products, offering a powerful microcontroller with on-chip wireless networking. There’s a snag though in their practice of calling all of them ESP32s despite wildly varying specifications and even different processor cores, such that it’s easy to lose track of exactly what the chip in front of you can do. [Bitluni] was faced with updating his VGA library to include a newer variant, and was pleasantly surprised to find that it includes a far more capable display peripheral which enables significantly higher resolutions than previously.
Waveshare Electronics recently featured a computer module that combines versatile features with a compact form factor. The Core3566 integrates a Rockchip RK3566 processor running at 1.8GHz and a 0.8 Neural Processing Unit.
Aries Embedded recently launched the MSMP1 that meets the Open Standard Module (OSM) guidelines. This embedded product is built upon the architecture of STMicroelectronics STM32MP1 family and offers a robust computing solution with single/dual Cortex-A7 cores along with a Cortex-M4 coprocessor.
The upcoming Pixel 8 phones could include a feature that might totally disrupt the desktop and laptop space and greatly benefit consumers.
In the fast-moving open-source world, programs can come and go quickly; a tool that has many users today can easily be eclipsed by something better next week. Even in this environment, though, some programs endure for a long time. As an example, consider the PostgreSQL database system, which traces its history back to 1986. Making fundamental changes to a large code base with that much history is never an easy task. As fundamental changes go, moving PostgreSQL away from its process-oriented model is not a small one, but it is one that the project is considering seriously.
A PostgreSQL instance runs as a large set of cooperating processes, including one for each connected client. These processes communicate through a number of shared-memory regions using an elaborate library that enables the creation of complex data structures in a setting where not all processes have the same memory mapped at the same address. This model has served the project well for many years, but the world has changed a lot over the history of this project. As a result, PostgreSQL developers are increasingly thinking that it may be time to make a change.
But here’s the galaxy-brain realisation: my experience is if you ask enough times, almost everything ends up being caused by a whom, not a what. This is an entirely different kettle of fish, with it’s own set of challenges. A question about why a package wasn’t updated may eventually lead to management rejecting a funding proposal, which is outside the purview of an employee to address. This sucks, because guess who gets prescribed blame! Rachel touches on scapegoating in her post too.
Postmedia says the discussions so far are non-binding but that the proposed merger would see an even division of voting rights. Postmedia shareholders would hold a 56 per cent economic interest and Nordstar would hold 44 per cent. Nordstar would retain a 65 per cent interest in Toronto Star Inc.
Bitove, owner of Nordstar, would be chairman of the merged entity, and Andrew MacLeod, chief executive of Postmedia, would be CEO.
This blog post is a technical companion to the video I released last month: "My solution for Mobile digital-painting on GNU/Linux
You can watch this video on:
Peertube: https://peertube.touhoppai.moe/w/oU74hKW7xGuAfVjrL4Kkoi
Youtube: https://youtu.be/bIJ0yYDOHrw
I'm going to give you my installation tips here to save you some time: [...]
The 16:10 aspect ratio of the 16-inch display offers more vertical screen space, making it ideal for multitasking. The 2560 x 1600 resolution should make it a good choice for both photo and video editing. Gamers haven't been forgotten either, with the display supporting NVIDIA's G-SYNC and a 240Hz refresh rate.
Reddit is pressuring moderators who have set their subreddits to private to reopen their communities this week, according to messages seen by The Verge. The company has given moderators deadlines to lay out their plans for reopening but said that they can’t stay closed.
The timeframes given generally indicate a deadline of sometime Thursday afternoon. Reddit was vague about the exact repercussions but seemed to suggest this was the final warning stage.
While I do think servers should be FOSS and I do agree with the Franklin Street Statement, I was still reading Twitter and Tumblr and Blogspot and Angelfire and Geocities over RSS as if they were any other server. I think there is a mile of difference between those kinds of proprietary-backend, open-protocol–frontend sites vs a “log-in only” site like Instagram or Facebook or Google Plus.
According to the report, app founder and CEO Abraham Shafi repeatedly claimed over the course of several years that the app boasted roughly 20 million users. The company raised nearly $200 million from the likes of SoftBank's Vision Fund and Peter Thiel's Founders Fund, among others.
Following a series of reports by The Information, which questioned the app's advertised number of users, the company's board of investors suspended Shafi and launched an investigation, ultimately revealing that IRL user figures were almost entirely fudged. As a result, the app is to shut down entirely, and capital is to be returned to investors.
Oracle is also spending "billions" of dollars on Nvidia chips but even more on central processor units (CPUs) from Ampere Computing, a chip startup it has invested in, and Advanced Micro Device Inc, Ellison said at an Ampere event.
Security updates have been issued by Mageia (docker-docker-registry, libcap, libx11, mediawiki, python-requests, python-tornado, sofia-sip, sqlite, and xonotic), Red Hat (kernel, kernel-rt, kpatch-patch, libssh, libtiff, python27:2.7, python39:3.9, python39-devel:3.9, ruby:2.7, sqlite, systemd, and virt:rhel, virt-devel:rhel), SUSE (bind, cosign, guile1, lilypond, keepass, kubernetes1.24, nodejs16, nodejs18, phpMyAdmin, and sqlite3), and Ubuntu (etcd).
HHS has announced another Security Rule enforcement action. This one involves iHealth Solutions (dba Advantum Health), a business associate. The incident involved an unsecured server where protected health information of patients was exfiltrated. The iHealth incident had been discovered by Kromtech Security and was first reported by DataBreaches on May 9, 2017. On May 10, DataBreaches reported and discussed iHealth’s response and statement. To DataBreaches’ surprise and irritation, on May 12, this site received legal threat letters from the hospital involved and iHealth. Lawyers at Covington and Burling jumped in to let the threatening parties know that their threats were … shall we say “inappropriate?”
On June 24, DataBreaches reported that the National Student Clearinghouse was one of the victims of the MOVEit breach by Clop, In that report, DataBreaches stated that the clearinghouse’s statements to date had not indicated whether they had paid any ransom demand, but DataBreaches had learned that their name had been removed from Clop’s leak site, which is often an indication that a victim paid.
DataBreaches emailed the clearinghouse on June 23 to ask for some straight answers about whether the clearinghouse had paid any ransom demand. They didn’t reply. DataBreaches repeated the inquiry on June 25. Again, there was no reply.
The Oklahoma State Medical Board has filed a complaint against a local doctor who claims her clinic was the target of a cyber attack, leaving former patients unable to get their medical records.
“It just makes me sick, what she has done to so many people and and seemingly doesn’t care,” said Amber Godfrey, a former patient.
Godfrey suffers from severe allergies. She went to Dr. Amy Darter at the Oklahoma Institute of Allergy Asthma and Immunology for treatment. If she doesn’t get her regular scheduled shots, it’s hard for her to breathe.
For months, the doors of the clinic have been closed with signs that said they’ve been hit by a cyber attack.
This data ultimately contains profoundly personal information about an individual, such as their sexual orientation, gender identity, mental health, genetic information, and lifestyle choices. Protection of this information is critical as individuals may face discrimination if it is revealed publicly. Discrimination based on sexual orientation has a long history, and Poland and Hungary recently passed laws curtailing the rights of LGBTQ+ individuals. Abortion is illegal in all cases in Malta and highly restricted in Poland. An activist in Poland is currently facing up to three years in prison for helping a woman access abortion pills. There is still a tremendous stigma around mental health issues in many locales. Revelations of mental illnesses can lead to discrimination in housing and employment.
The stalkerware company LetMeSpy has been [breached]: [...]
The phone monitoring app, which is used to spy on thousands of people using Android phones around the world, said in a notice on its login page that on June 21, “a security incident occurred involving obtaining unauthorized access to the data of website usersââ¬â¹Ã¢â¬â¹.”
“As a result of the attack, the criminals gained access to e-mail addresses, telephone numbers and the content of messages collected on accounts,” the notice read.
Following a noyb complaint and litigation over inactivity, the Swedish Data Protection Authoirty (IMY) has issued a fine of 58 Mln Swedish Crown (about € 5 Million) against Spotify. While users have a right to get access to all their data and information on the use of their data, Spotify did not fully comply with this obligation. The IMY was in charge of the case because Spotify has its main establishment in Sweden. The noyb complaint was joined with a complaint filed in the Netherlands by Bits of Freedom.
Regarding military operations, two in particular – Harbin Zuma, led by the MNJTF, and Desert Sanity, led by the Nigerian Army – are putting the violent extremists in a difficult position. The extremists are increasingly retaliating with IEDs. On 14 May, MNJTF troops were hit by a double IED attack as they advanced towards an Islamic State West Africa Province (ISWAP) camp in Tunbum Reza. Just two weeks earlier, on 29 April, Operation Desert Sanity troops recovered numerous IEDs intended to halt their advance in areas surrounding Ubaka in the Sambisa Forest.
In addition, the insurgents were said to be planning to disrupt Nigeria’s electoral processes on 25 February and 11 March. However, the Nigerian Army had been preparing to contain this threat, which made it difficult for the insurgents to operate in the country during this period. IEDs intended for attacks were detonated in Cameroon, which is easily accessible given its porous borders.
Last year, the country was engrossed by a legal battle sparked by efforts by the city of Grenoble to authorise the "burkini" -- a full-covering bathing suit worn by some Muslim women -- in municipal swimming pools.
The Constitutional Council eventually ruled in favour of upholding a ban on the outfit.
The planned data centre in Vihti's Rosti Business Park is part of Microsoft's data centre area concept. When completed, it will consist of three separate and independently operating data centres that are synchronised with each other.
Two other data centres are planned for Espoo and Kirkkonummi.
Several of the creators who acted as the public face of the class action suit revealed TikTok had covered their legal expenses in a New York Times article published Tuesday evening. The creators claim TikTok bankrolled the suit but didn’t directly pay them for their involvement. Each of the creators listed on the suit have grown successful businesses and communities on the app. If Montana’s law is allowed to take effect in January 2024, their lives could be radically upended. Carly Goddard, a young mother and one of the influencers involved, told Gizmodo she would have to pack up and leave the state if the ban becomes law.
Rightly, there’s been an outpouring of tributes to Daniel Ellsberg following the announcement of his death last Friday, aged 92. His leaking of the Pentagon Papers in 1971 revealed that Washington officials had systematically lied for decades about US military conduct in Vietnam.
It’s anyone’s guess how elite media square their supposed honoring of Ellsberg with their hagiography of undying goblin Henry Kissinger, who called Ellsberg, based on the exact actions the press now suggest they salute, the “most dangerous man in America.”
And certainly don’t ask how their respect for Ellsberg relates to their collective sniffing at living whistleblowers like Chelsea Manning, Edward Snowden or Julian Assange.
Corporate media would like you to glide past their not-coherent stance on whistleblowers, how they can accept trophies for printing their revelations while consigning them to invisibility, and worse, for revealing them.
Daniel Ellsberg had questions about that, and we should keep those questions alive.
France is being badly hit by climate change, is not prepared for its effects and is failing to sufficiently reduce its emissions, an independent climate body warned Wednesday.
Stadler is the first Volkswagen (VLKAF) board member to be sentenced in the affair, some four years after German prosecutors laid fraud charges against the executive. He entered a plea bargain with the court, confessing to his crimes in order to avoid spending time in jail. His sentence has been suspended for three years.
The ex-boss was fined 1.1 million euros ($1.20 million), which will go to the state treasury and non-governmental organisations, the court said.
He is the first top manager to be tried and convicted as part of Dieselgate.
German carmaker Volkswagen and its Audi subsidiary admitted at the time to using cheat software so their cars appeared less polluting in tests.
Transit projects in the United States come with astronomical price tags compared with similar projects done in other countries. But where exactly are the high costs coming from? Today, we take a trip to one of the most expensive subway stations in the world and get to the bottom of why American transit is so expensive to build.
Kajaani is crowdsourcing an inspection of the city's cycle routes, with cyclists asked to download a mobile phone game with cash rewards.
The mobile game is a fun and effective way to invite residents to survey the state of the streets, said the Kajaani city engineer Matti Jousiainen. The game launches on Saturday 1 July at 10 am and is open to everyone.
The package of European Commission reforms, which update decade-old rules, seek to prise open a payments market long dominated by banks and US duo Visa and Mastercard that are now being challenged by 'fintechs' offering rival services.
The move to create a digital version of the single currency began in 2020 when European Central Bank (ECB) President Christine Lagarde suggested the idea and the Frankfurt-based body launched a public consultation.
However, end-to-end encryption is currently under attack by prosecutors and legislators in France, the EU, the UK and the US. We are asked to choose, as a society: do we accept a future in which our private mail and communication can be intercepted anytime, in which we are treated as potential suspects?
After Musk acquired Twitter in October, the social media firm faced months of chaos, including layoffs of thousands of employees, criticism over lax content moderation, and an exodus of many advertisers who did not want their ads appearing next to inappropriate content.
The research found that people were 3% less likely to spot false tweets generated by AI than those written by humans.
That credibility gap, while small, is concerning given that the problem of AI-generated disinformation seems poised to grow significantly, says Giovanni Spitale, the researcher at the University of Zurich who led the study, which appeared in Science Advances today.
According to draft legislation before the National People's Congress, schools and organizations involving children and young people have a duty to carry out ideological and political education, including the Communist Party's official version of history, national symbols, "national unity" and "national security," state media reported this week.
A Twitter account purporting to belong to new Foreign Minister Giorgos Gerapetritis proved to be a hoax on Wednesday. The account seems to have been created by Italian hoaxer and journalist Tommasso Debenedetti.
This is the new reality in post-coup Myanmar, where backers of the military regime regularly scour the internet for any posts they deem critical of the junta before using Telegram to report them to the authorities, activists say.
Telegram has become a “form of military intelligence,” said Yangon-based protest leader Nang Lin.
“It may look like ordinary citizens are reporting people who oppose the military, but that’s not true,” he said. “It’s the work of their informers. It’s one of the junta’s intelligence mechanisms. In other words, it's just one of many attempts designed to instill fear in the people.”
Eu held that the editors should not be convicted for sedition as they sincerely believed their actions were deemed lawful at the time.
He also allegedly advocated Taiwan independence and Hong Kong independence, and “desecrated” the national flag and national anthem.
National security police searched the man’s home and office with a court warrant, where officers seized electronic devices that were used to publish the “seditious messages.”
He also allegedly advocated Taiwan independence and Hong Kong independence, and “desecrated” the national flag and national anthem.
National security police searched the man’s home and office with a court warrant, where officers seized electronic devices that were used to publish the “seditious messages.”
Despite profound criticism by civil society (ICCL, Amnesty, EDRi, BEUC) and hard push back in the Irish Parliament, Ireland has passed a law that will allow the Irish Data Protection Commission (DPC) to criminalize anyone sharing information about pending procedures. While the law is not clear and likely unconstitutional, it will be a tool to further terrorize complainants when they speak up against the Irish DPC. The law was requested by the DPC and aims at silencing non-profits. Despite the passing of this "lex noyb", noyb will not limit legitimate public speech about cases it is engaged in.
On Monday, June 26, police detained Yanardaß, chief editor for the critical online outlet and TV broadcaster TELE1, at the Istanbul studios of his outlet, after he criticized authorities over the prison conditions of Abdullah Ãâcalan, the convicted leader of the outlawed Kurdistan Workers’ Party, or PKK, which Turkey considers as a terrorist organization.
On Tuesday, an Istanbul court ordered his formal arrest pending an investigation into charges of “making propaganda” for a terrorist organization.
Summarising the material it collected, Der Spiegel writes: “At one point, a lawyer in London lost her laptop; at another, a journalist researching Assange’s case had medical data stolen. The office of Assange’s Spanish defence lawyers was broken into in a bizarre way. In Ecuador, a Swedish software developer has been held in the country for nearly four years on flimsy grounds. Elsewhere, Assange supporters who prefer to remain anonymous reported similar spooky incidents.
“That they are connected cannot be proven. Nor has it been possible to determine the authors beyond doubt in any case so far. It could be a matter of coincidences. ‘But who is to believe that?’ asks Assange’s lawyer Aitor Martínez, who is certain that it is a concerted campaign by U.S. authorities, whose often dubious methods WikiLeaks has exposed quite a few times. ‘It’s a vendetta against Julian Assange,’ says the Spaniard. And the focus is not only on companions and family members of Assange, but also on lawyers and journalists, who by law should be particularly protected from wiretapping.”
Several case studies are provided.
Reuters parent company Thomson Reuters has acquired Imagen, a digital content asset management company, for an undisclosed sum.
Imagen owns video distribution platform Screenocean and runs digital content libraries serving clients including Premier League football and Major League Baseball. The company will become part of the Reuters News division.
Two sisters have told an Australian court that being sexually abused by their Jewish school's principal broke their ability to trust forever and is painful to remember. Malka Leifer was convicted of rape and other crimes in April after years of fighting her extradition from Israel. She watched intently Wednesday as the two sisters read victim impact statements at her sentencing hearing. Prosecutors said Leifer abused them between 2003 and 2007 at the ultra-Orthodox girl's school in Melbourne and other locations. The hearing is expected to continue Thursday and she likely will be sentenced later. Leifer was convicted of six charges of rape, each carrying up to 25 years in prison.
The Committee to Protect Journalists joined 19 other journalists organizations and press freedom, human rights, and freedom of expression groups in a joint statement on June 28, 2023, urging the European Union to prioritize media freedom and human rights in dealings with Turkey, following May elections in which President Recep Tayyip Erdoßan and his Justice and Development Party-led alliance remained in power.
It wasn’t until after his death that it was determined he had told the truth. These vintage photos captured the grave markers from the mid of the century; and the last image in the bottom is the current. The epitaphs on these markers serve as an exoneration of Johnson. He is buried in the Boothill Cemetery in Tombstone, Arizona.
During the 21st ðstanbul Pride Parade on Sunday, more than 100 individuals were detained, including five people from Iran, Libya, Russia, Portugal, and Australia.
The individual from Iran now faces the risk of deportation, and they could potentially be sentenced to death if returned to their home country.
Fourthly, the Taliban tighten repression, regularly does not respect human rights, and harshly cracks down on opponents of their ideology and regime. The Taliban actively and systematically violate the rights of national minorities and women of Afghanistan. UNAMA experts report “arbitrary arrests and detentions of journalists, human rights defenders and protesters.” There were 160 extrajudicial executions, 178 unjustified arrests, and 56 cases of former Afghan military and Government employees being tortured. In addition, 2106 victims were registered among ethnic and religious minorities (700 killed, 1406 wounded).
A video of Pakistan Prime Minister Shehbaz Sharif taking an umbrella from a female officer escorting him and abandoning her in the rain has gone viral. [...]
But don’t get too excited. The New York Times is here to tell you that inflation is still a problem, and more suffering for the working class is the solution.
Afterward, the participant's videos are inspected and a computer vision model will analyse them to identify any surface cracks. The City of Kajaani has already completed a similar project mapping out the area's road conditions using CrowdSorsa.
Similar crowdsourced cycle lane inspections are also taking place in Forssa, Joensuu, Kirkkonummi, Parainen, and Ylöjärvi.
Rockefeller hired a German chemist, Herman Frasch, to figure out how to make this oil useful. In 1887, Frasch patented a process to eliminate sulfur from the Lima oils. Overnight, Rcokefeller’s 40-million barrel stock of cheap Lima oil skyrocketed in value.
Back in January, Walled Culture wrote about an interesting initiative by the German online audio distribution platform and music sharing service SoundCloud, with its Fan-Powered Royalties (FPR) approach. At the time, we noted that it was a kind of halfway house to the true fans idea this blog has promoted many times.
We also pointed out that one of the major benefits of the FPR approach is that it provides detailed information about an artist’s true fans, which in turn allows more income to be generated from that audience segment, through targeted marketing of concerts, products and services. It seems that SoundCloud has understood this, as evidenced by its new “Fans” service, now open to some 50,000 artists, which builds on its earlier FPR move. Here’s how SoundCloud describes the idea: [...]
A man who shared copies of more than a thousand eBooks and articles obtained from a paywalled news site has been handed a six-month suspended sentence by a court in Denmark. Prosecutions for sharing paywalled articles are extremely rare but in this case supported by a laundry list of additional offenses including fraud and movie piracy.
To combat spam and scammers, The Pirate Bay closed its doors to new members in May 2019. This temporary measure stayed in place much longer than expected but, starting this week, the notorious torrent site has reopened registrations. There's one crucial caveat; prospective members must be manually approved by the site's moderators.