𝕿𝖊𝖈𝖍𝖗𝖎𝖌𝖍𝖙𝖘 Bulletin for Tuesday, August 24, 2021 ┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅┅ Generated Wed 25 Aug 02:40:04 BST 2021 Created by Dr. Roy Schestowitz (𝚛𝚘𝚢 (at) 𝚜𝚌𝚑𝚎𝚜𝚝𝚘𝚠𝚒𝚝𝚣 (dot) 𝚌𝚘𝚖) Full hyperlinks for navigation omitted but are fully available in the originals The corresponding HTML versions are at 𝒕𝒆𝒄𝒉𝒓𝒊𝒈𝒉𝒕𝒔.𝒐𝒓𝒈 Latest in 𝒉𝒕𝒕𝒑://𝒕𝒆𝒄𝒉𝒓𝒊𝒈𝒉𝒕𝒔.𝒐𝒓𝒈/𝒕𝒙𝒕 and older bulletins can be found at 𝒉𝒕𝒕𝒑://𝒕𝒆𝒄𝒉𝒓𝒊𝒈𝒉𝒕𝒔.𝒐𝒓𝒈/𝒕𝒙𝒕-𝒂𝒓𝒄𝒉𝒊𝒗𝒆𝒔 Full IPFS index in 𝒉𝒕𝒕𝒑://𝒕𝒆𝒄𝒉𝒓𝒊𝒈𝒉𝒕𝒔.𝒐𝒓𝒈/𝒊𝒑𝒇𝒔 and as plain text in 𝒉𝒕𝒕𝒑://𝒕𝒆𝒄𝒉𝒓𝒊𝒈𝒉𝒕𝒔.𝒐𝒓𝒈/𝒊𝒑𝒇𝒔/𝒕𝒙𝒕 Gemini index for the day: gemini://gemini.techrights.org/2021/08/24/ ╒═══════════════════ 𝐑𝐄𝐂𝐄𝐍𝐓 𝐁𝐔𝐋𝐋𝐄𝐓𝐈𝐍𝐒 ════════════════════════════════════╕ Previous bulletins in IPFS (past 21 days, in chronological order): Qmeww9N1YnQ2Znw5A9zRvL5cLmS649Q6VCiDCx91X2ZJqo QmZG8SsTJ2EBg5zMrWS4NdoMh7QZt2TnLqG82m3jgLsAZd QmUBS5HzGuXErkfDwpHxMKeu8if7jt5YH6ph1UrqNMz1B4 QmSWfDrRGYcLy39sAw1ufjzyZqmJSUhgxqCS1mGSB3cgvL QmNxGTwQ4Jqei88THW4dMGEZoRKbJsm6pBPtpAahou3GQi QmXBU6oKqgN1Lsd8vCX9iBHiUi66fm8iL3uXsJgyh4LH33 QmW2EY2r5wFnfosCfi1BSdBM7GSdTj92HYk4q7e3g7b9WR QmSkz4YGj3vTuC8Q6t7fPmQkSbvtThba65AHUjyotSbHLW QmWZ187KL1KiuWZ2T69aUFqaDmvDMVo7e6ALsQCK58yNP1 QmY1VJmnrgnvD1UeZntn4kd7Q7Jkehp6eqZHBkGEiqnTdi QmaFyToU47jF5UkU2CTtva1HKGz8X6fJ9MiRnoN9EVF2PR QmfBw8KjEL4jUBLnCDfDMTME9vkCdKPKjn6wFninkuMEkV QmPdYmkA2hjyfyb9e14JCR2pZHcisLHLdZcWJARrrMyhgf Qmb89E6YUPLiH43tv6JNBD4QzFumg2nk2gABmYEbbPv2KP QmXVwu1HjvyJZ3HSFKoFGkBp26Y9G8sfvY6NBAe4KoK6Kp QmTLQpRMfp5Xuv2kMCWwSjxTme9kskdKXqZpqfxd5zsmov QmcubXjcuiSF5gQxJNabrv13YYnkPN8KBRSZhsg2QJcYJy QmRxveENRZAwTLnQcdiQ3CcBn7PwZvo2AFewmw5wDihmMW QmYmEgmfDVPvkfgUa7fsqSMDGZcBioYrEM8ofgP9Yru19n QmPu1rCtSaePMTdT5kGeHHLrZSeZxigNsCj2qnwNcQFhkV QmYGEn3vvtL9MNwJ6i1VEHszMRzevprL1qcHGvx2WA4383 ╒═══════════════════ 𝐈𝐍𝐃𝐄𝐗 ═══════════════════════════════════════════════════╕ ⦿ DRM: Defectis Repleta Machina | Techrights ⦿ EPO Exposé: The Besieged Baltic States – Part I – More Captured Delegates? | Techrights ⦿ [Meme] Internal Stacked Committees, Sponsored by Special Interests | Techrights ⦿ Expecting the Administrative Council of the European Patent Organisation to Actually Follow the Law... | Techrights ⦿ GNU/Linux Turns 38 Next Month | Techrights ⦿ IRC Proceedings: Monday, August 23, 2021 | Techrights ䷼ Bulletin articles (as HTML) to comment on (requires login): http://techrights.org/2021/08/24/defect-ridden-machines/#comments http://techrights.org/2021/08/24/epo-besieged-baltic-states/#comments http://techrights.org/2021/08/24/epo-internal-courts/#comments http://techrights.org/2021/08/24/epo-vs-basic-rights/#comments http://techrights.org/2021/08/24/gnu-hisory/#comments http://techrights.org/2021/08/24/irc-log-230821/#comments ䷞ Followed by Daily Links (assorted news picks curated and categorised): http://techrights.org/2021/08/24/clonezilla-live-2-7-3/#comments http://techrights.org/2021/08/24/gnome-41-beta/#comments http://techrights.org/2021/08/24/gnu-taler-0-8/#comments ䷩ 𝚕𝚒𝚗𝚎 64 ╒═══════════════════ 𝐀𝐑𝐓𝐈𝐂𝐋𝐄 ═════════════════════════════════════════════════╕ (ℹ) Images, hyperlinks and comments at http://techrights.org/2021/08/24/defect-ridden-machines/#comments Gemini version at gemini://gemini.techrights.org/2021/08/24/defect-ridden-machines/ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 08.24.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ Gemini_version_available_♊︎ ✐ DRM:_Defectis_Repleta_Machina⠀✐ Posted in DRM, Free/Libre_Software at 4:01 am by Dr. Roy Schestowitz By Alexandre Oliva and Fernanda G. Weiden 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇Candado⦈_ Summary: This article is a draft of a revised version of the one published in the ComCiência magazine on December 10, 2006 [ORG], translated by FSFLA’s translation team. As you start your brand new car to go to the beach, you realize it won't let you do it. Murphy's law can often make it seem like mechanical failures are nature's way of opposing your wishes. But what if the car manufacturer had reasoned that, by selling you a car that will take you to work but not to have fun at the beach, it would be able to sell you another car specifically for beach visits? “What's the distance from an electronic failure that gets a Thai official stuck in his automobile [BMW,BM2] to an anti-theft device that deliberately imprisons inside the car anyone not explicitly authorized, restraining her right to freedom of movement under the pretext of stopping a potential crime?”"The Right to Read" [R2R], published in the magazine Communications of the ACM (CACM), one of the best-regarded publications in computing, prophesied in 1996 the pervasive use of software and remote monitoring as tools to control access to knowledge and culture. In the article, textbooks and articles are only available electronically, and students are forbidden from sharing them with their colleagues; monitoring software on every computer, and severe penalties upon those that merely appear to be attempting to circumvent it, pretty much ensure compliance. After a mere 10 years, we may get the impression that the author got it both right and wrong. Access restrictions are indeed already present in some electronic textbooks and articles, but they have showed up far more often in the entertainment field, limiting access to music, movies, etc. Are we facing a problem even bigger and worse than the CACM article forecast? DRM, for Digital Restrictions Management, means any technique that seeks to artificially limit, by software, hardware or a combination thereof, the features of a digital device with regards to access or copying of digital content, so as to privilege whoever ultimately imposes the technique (e.g., not the DVD player manufacturer, but the movie industry), in detriment of whoever uses the device. Considering that nowadays microprocessors inhabit not only computers, but also cellular telephones, electronic games, sound, image and video devices, remote controls, credit cards, automobiles and even the keys that open them, it should be at least worrying that all this equipment may be programmed to turn against. What's the distance from an electronic failure that gets a Thai official stuck in his automobile [BMW,BM2] to an anti-theft device that deliberately imprisons inside the car anyone not explicitly authorized, restraining her right to freedom of movement under the pretext of stopping a potential crime? In spite of all resources used to keep potential invaders outside homes and cars, as far as we can tell there aren't any anti-theft devices that keep them in, should they succeed in breaking in. This is due in part to respect for invaders' rights, and in part for vendors' fear of imprisoning the device owner himself, his relatives or friends, or of causing them other kinds of physical or moral harm. DRM systems are portrayed by their proponents as anti-theft devices, similar to those available for homes and automobiles. Oddly, even people who'd never accept an anti-theft device that could imprison themselves are often willing to pay for the restraint on their freedoms imposed by DRM systems. The same publishers that are powerful enough to pressure customers to pay for the development and adoption of DRM systems also use that power to make authors sign contracts that let the publisher decide what restrictions to impose, all under the pretext of hindering unauthorized access and copying, that cause them alleged losses. The moral value of sharing, formerly taught at schools as something good for society, through incentives to sharing toys taken to classrooms, is slanderously labeled with a term that also refers to people who attack ships, stealing their cargoes and killing or enslaving their crews [MIC]. The confusion and bias of the term intellectual "property" [NIP], further elaborated in the Orwellian fallacy of copyright "protection" [WTA], turns people's attention away from the fact that copyright was created with the express purpose of growing the body of works available to the whole society, using, as incentive to creation, temporary and limited monopolies granted by society to their authors [EPI]. As a result of these misconceptions, the Brazilian population silently accepted the change to its copyright law, that up to 1998 permitted the creation of complete copies, for personal use, of works covered by copyright, so as to permit only copies of small portions [PNL]. Americans, in their turn, accepted a new delay in Mickey's entry in the public domain, with an extension of the copyright duration for another 20 years [CLG]. These are the first steps to the scenario described in the CACM article [R2R]. Unlike the practice for anti-theft devices, that are designed to respect the users, enabling them to activate or deactivate the system, and to respect even the rights of transgression suspects, DRM takes a far more aggressive posture, treating even the owner of the device as a criminal, without room for presumption or even proof of innocence. DRM takes control of the system away from the users' hands, since, just like the defective Thai car, it doesn't offer an option to turn the system off. Since, in the DRM case, the defect is deliberate [DlD], the control remains in third parties' hands, who use the devices you pay for to promote their interests to your own detriment. In fact, for DRM, you are the invader. But since you pay their bills, they want to keep you not outside, but rather inside, entertained and controlled [EeC]. DRM does not hesitate in trampling over your rights; not only international human rights [HRD,DlD,ADR], but also those guaranteed b copyright laws throughout the world, even restrictive ones like Brazil's [RDA]. Some examples of rights trampled over by DRM are: * copying a work that has fallen in the public domain; * copying a work, in full or in part, for personal use, study, criticism, legal proof, parody or accessibility; * participating in cultural life of the community, enjoying the arts and sharing in scientific advancement and its benefits; * being presumed innocent until proved guilty according to law in a public trial with all guarantees necessary for the defense; * holding opinions without interference and expressing them freely; * seeking, receiving and imparting information and ideas through any media and regardless of frontiers; * having one's privacy respected and protected by law against arbitrary interferences. In fact, these systems often collect information and send it to a remote controller, interfering arbitrarily with the user's privacy. In at least one of these cases, that got widely known, a DRM system developer did not hesitate in infringing third parties' copyrights to create a spying program, that installed itself, silently and automatically, in a computer in which a music CD containing it was loaded, and enabled the computer to be remotely controlled, without any option to remove or deactivate it [SNY]. Is it legitimate to disregard others' rights to try and seek bigger profits? DRM systems are implemented by combining software and hardware. There are several techniques; we cite but a few examples: * brutal quality degradation of video cassette recordings made out of DVD (Digital Versatile Disk) reproductions; * cryptography that prevents the reproduction of a DVD in any player, requiring multiple licenses to be able to play the same content anywhere in the world; * violation of the CD (Compact Disc) specification so as to make it difficult or impossible to play the songs in it on several CD players and general-purpose computers; * file formats that are secret or regulated by patents to limit the performance of the content to software or devices with artificially- restricted functionality; * authentication mechanisms between digital devices that prevent the propagation of high-quality digital signal to unauthorized devices [WVC], such as from the new high-definition DVD and digital TV standards to analog TVs and VCRs, or even more modern digital devices that refuse to restrain their users' freedoms. As ways to work around these artificial restrictions become public, enabling people to exercise their rights guaranteed by law, new ever-more-restrictive efforts take their place, in an attempt to avoid alleged losses that disregards actual losses imposed on society, not only because of the increased direct and indirect costs of equipments due to the imposition of unfair restrictions [WVC], but even more importantly because of the unfair restrictions themselves. Some of these efforts are in the legislative front: USA's Digital Millennium Copyright Act criminalizes the mere distribution of devices or publication of knowledge that enables people to bypass DRM. USA have tried to impose similar legislation on other countries with whom they sign "Free" Trade Agreements [TLC]. Laws that strengthen DRM turn its proponents into private legislators, with powers to unilaterally change contracts, by restricting access retroactively. Other efforts are in the judicial front: associations that claim to represent the interests of musical authors, but that in fact represent the interests of record labels, have spread fear by suing regular people, accusing them, without proof, of copyright violations [RLS,MdM]. The technical front is not ignored: a security architecture based on a combination of software and hardware, formerly called Trusted Computing, has been co-opted to serve not the interests of computer owners, but rather those of DRM systems [TCM], the reason why we prefer to call it Treacherous Computing [TcC,CTr]. This technique can be used to stop installation or execution of software, against the user's will, or even the creation or correction of such software; to selectively prevent the creation, access or preservation of certain files [IRM]. That is, to prevent a general-purpose computer from obeying user's commands, turning it into a limited entertainment platform, that puts on third parties' hands the decision on what, when and how the user can use or consume. Somewhat like the car programmed to not go to the beach, or the electronic books stored in computers in the CACM article. All these techniques do a lot to make law-abiding regular citizens' lives difficult, but they can't stop those who run their businesses based on commercialization of unauthorized copies. For the latter, the investment needed to work around the restrictions pays off, so all these restrictions end up missing their goal, while they limit and disrespect freedoms of most of the population. This disrespect is not new and, in fact, it has made room to make DRM techniques effective. Free Software [FSD], that respects users' freedoms to inspect the program, modify it or hire third parties to do so, and run the original or the modified program, without restrictions, when used to implement DRM techniques, renders them ineffective, since the user would have the power to disable artificial restrictions or add features that had been left out. As a result, laws that prohibit tools to bypass DRM have the effect of prohibiting Free Software for accessing published works. Software patents [SPE,NSP] are another threat to freedom that a few developed countries are trying to impose upon other countries. A legally-valid software patent, issued in a country that allows such patents, gives the patent holders the power to block, in that country, the development and distribution of software which implements the patented feature. If the companies in a DRM conspiracy have patents on some aspects of the decoding process, they can use these patents as another means to block software that can access the same works but without the restrictions. It shouldn't be surprising that the Free Software Foundation [FSF] and its sister organizations all over the world denounce the risks of these limitations to individual freedoms [DbD,DRi,EeC], and at the same time update the most widely used Free Software license in the world [Gv3,GPL,Gv1], such that it better defends software users' and developers' freedoms against these new threats. The GNU GPL is the license used by most components of the GNU operating system, and by the Linux kernel, the most common kernel used with the GNU operating system. (Most users unknowingly refer to this combination Linux, but that is properly speaking the name of the kernel alone [YGL].) Anyone who seeks knowledge or culture in digital formats has her rights threatened by DRM. In fact, the impossibility to preserve society's knowledge and culture in face of all these artificial limitations may cause our civilization to be seen in the future as a dark age, since, unless we can help it, all of our knowledge will have been stored in formats that, instead of ensuring its preservation, in the perfect conditions enabled by digital storage, seek to ensure its unavailability. "If consumers even know there's a DRM, what it is, and how it works, we've already failed," — Peter Lee, an executive at Disney [Eco] When you see the acronym DRM in a product's ad, remember that it's not a feature, it's a warning label. Remember that DRM stands for Defectis Repleta Machina, or Defect-Ridden Machine. So, when you get to make a choice, while purchasing movies, songs, electronic books, games, etc, between a form limited by DRM and an unlimited one, prefer the unlimited form, unless you can work around the DRM techniques. When there isn't such a choice, reject monopolized and restricted content, as well as the legal mechanisms, the equipment and the techniques that support them. Use your freedom of choice today, avoiding short- sighted decisions that empower interests that, should they prevail, will restrain any possibility of choice in the future. Spread the word on the risks and support campaigns that do it [DbD,DRi,EeC,BDV]. Join us in the Latin- American anti-DRM campaign, Entertained and Controlled, in the FSFLA [FLA] mailing list [A-D]. █ =============================================================================== We thank Richard M. Stallman, Eder L. Marques, Glauber de Oliveira Costa and Fernando Morato for their reviews and suggestions. =============================================================================== [R2R] http://www.gnu.org/philosophy/right-to-read.html [BMW] http://catless.ncl.ac.uk/Risks/22.73.html#subj4 [BM2] http://www.zdnetasia.com/news/hardware/0,39042972,39130270,00.htm [MIC] http://www.gnu.org/philosophy/misinterpreting-copyright.html [NIP] http://www.gnu.org/philosophy/not-ipr.xhtml (see also the discussion on Intellectual Property on the [WTA] page) [WTA] http://www.gnu.org/philosophy/words-to-avoid.html#Protection [EPI] http://www.fsfla.org/?q=en/node/128#1 [PNL] http://www.petitiononline.com/netlivre [CLG] http://www.cartacapital.com.br/ index.php?funcao=exibirMateria&id_materia=3446 (in Portuguese) [DlD] http://www.fsfla.org/?q=en/node/101 [EeC] http://www.entretidosecontrolados.org/ [HRD] http://www.unhchr.ch/udhr/lang/eng.htm [ADR] http://www.fsfla.org/?q=en/node/107 [RDA] https://www.planalto.gov.br/ccivil_03/Leis/L9610.htm, articles 46 to 48 (in Portuguese) [SNY] http://en.wikipedia.org/wiki/ 2005_Sony_BMG_CD_copy_protection_scandal#Copyright_violation_allegations [WVC] http://www.cs.auckland.ac.nz/~pgut001/pubs/vista_cost.txt is a good article overall, even if it falls prey of the "content protection" fallacy [WTA] and it mistakes Linux for an operating system name [YGL]. [TLC] http://www.fsfla.org/?q=en/node/117 [RLS] http://info.riaalawsuits.us/howriaa.htm [MdM] http://overmundo.com.br/overblog/inaugurado-o-marketing-do-medo (in Portuguese) [TCM] http://www.lafkon.net/tc/, with subtitles at http://www.lafkon.net/tc/ TC_derivatives.html [TcC] http://www.gnu.org/philosophy/can-you-trust.html [CTr] http://www.dicas-l.com.br/zonadecombate/zonadecombate_20061106 (in Portuguese) [IRM] http://www.informationweek.com/story/ showArticle.jhtml?articleID=196601781 [FSD] http://www.gnu.org/philosophy/free-sw.html [SPE] http://www.fsfeurope.org/projects/swpat [NSP] http://www.nosoftwarepatents.com/en/m/dangers/index.html [FSF] http://www.fsf.org/ [DbD] http://www.defectivebydesign.org/ [DRi] http://drm.info/ [Gv3] http://gplv3.fsf.org/ [GPL] http://www.gnu.org/copyleft/gpl.html [Gv1] http://www.gnu.org/copyleft/copying-1.0.html [YGL] http://www.gnu.org/gnu/why-gnu-linux.html [Eco] http://www.economist.com/displaystory.cfm?story_id=4342418 [BDV] http://badvista.fsf.org/ [FLA] http://www.fsfla.org/ [A-D] http://www.fsfla.org/cgi-bin/mailman/listinfo/anti-drm [ORG] http://www.comciencia.br/comciencia/?section=8&edicao=20&id=216 (in Portuguese) =============================================================================== Copyright 2006 Alexandre Oliva, Fernanda G. Weiden Copyright 2007 FSFLA Permission is granted to make and distribute verbatim copies of this entire document without royalty provided the copyright notice, this permission notice and the URL below are preserved. http://www.fsfla.org/blogs/lxo/draft/defectis-repleta-machina ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣿⣿⣿⣿⣿⣿⣿⣿⢿⣿⣿⣯⣿⢸⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⠿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⢿⣿⡆⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣀⣤⣤⣶⣷⣦⠀⠛⢿⣿⣿⣿⣿⣿⣿⣷⠈⠀⣿⣿⣿⢸⠀⠀⠀⠀⠀⣿⣿⣿⣿⡟⡓⣁⡏⢻⠳⣿⣿⣿⣿⣿⣿⣽⣿⣷⢿⡛⡛⢻⡝⢿⡂⢹⣿⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⣠⣤⣤⣴⣶⣴⣶⣿⣿⡿⠿⢟⣋⣿⣿⣿⠀⠀⠀⠀⠈⠉⢹⡿⣿⣿⡆⠀⣿⣿⣿⢸⡀⠀⠀⠀⢰⣿⣿⣿⣿⣿⣮⣾⠃⠈⢀⣾⣿⣿⣿⣿⣿⣿⡫⣻⢿⣿⡾⡁⠇⠀⠇⠈⢹⡆⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠐⠛⣛⣻⣿⣿⣿⣿⣿⣿⡿⠛⠛⠛⣿⣿⣷⠀⠀⠀⠀⠀⠀⣸⣿⣿⣿⡇⠀⢸⣿⣿⢸⡇⣠⣴⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣦⣄⣿⣿⣿⣿⣿⣿⣿⠁⠁⠫⣿⡤⠀⠀⠀⠀⠀⠀⡇⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠘⠷⠀⣿⣿⣿⣿⣿⣿⠘⠿⠿⠃⡀⠀⠀⢺⣿⣿⠀⠀⠀⠀⠉⣀⣿⣿⣿⣿⡇⠀⢸⢽⣿⢸⣿⣿⣿⣿⣿⣿⣿⣭⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⢠⣢⣤⣄⡀⠀⠀⠀⠀⠀⢠⡇⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⣾⡿⠃⠀⢻⣿⡀⠀⣀⣾⣿⡦⢀⣾⣿⣿⠀⠀⠀⠀⣴⣷⣏⣀⣠⠈⠃⠀⢸⢿⣿⣾⣿⡿⢻⣿⡿⣿⣯⣭⣭⣽⣻⣿⣿⣿⣿⣿⣛⣇⣈⣛⣿⣳⣟⣯⣝⡻⢿⡡⠀⠀⠀⠀⠸⡇⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠰⠟⢻⣤⣤⣬⣿⣷⣼⣷⣿⡟⣰⣿⣿⣿⣿⡀⠀⠀⠀⣾⣿⣿⣯⠄⠀⡄⠀⠈⢻⣻⣿⡿⣀⡞⢉⢼⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⠀⠀⠀⠀⠈⠇⠀⠀⠀⠀⠐⡇⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠸⠿⣿⣿⣿⣿⣿⣿⣿⣿⣟⠛⠻⣿⣿⡿⠇⠀⠀⠸⠿⣿⣿⣿⡤⣆⡇⠀⠀⢼⣿⣿⠳⣿⡇⠀⢘⣿⣿⣿⣿⣿⣿⣿⣿⣿⣭⣍⣭⣿⣿⡿⠿⠛⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⡇⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠷⢾⣷⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⢸⣿⡧⣟⡇⠀⢰⣿⣿⡟⠗⣿⠀⠀⢸⣿⣿⣿⣷⡿⣿⡏⣿⣿⣯⣿⣿⠀⣠⣆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⣈⠀⣷⣄⠀⠀⠀⠉⠉⠉⣉⣙⣛⣛⣻⠿⠟⠀⠀⠶⢦⢄⣸⣿⣷⣹⠇⢠⣺⣿⣿⡷⣶⡇⠀⠀⢸⣷⣿⣿⠃⠀⠀⢰⣿⣿⡿⣹⣿⠀⣿⣿⢇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠆⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠙⠻⣿⣿⣧⣶⣶⣶⣿⣿⣿⣿⣿⣿⣿⣶⣦⢠⠀⠀⢠⣶⣿⣿⣿⣿⣀⣼⣽⣿⣿⣾⣿⠃⠀⠀⢸⣿⢹⣿⣄⢀⠀⣼⣿⡿⡄⢹⡇⢰⣿⣿⢻⠀⠀⠀⠀⠀⠁⢄⠀⠀⠀⠐⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠈⠛⠿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣾⣶⣶⣿⣿⣿⣿⣿⣿⣿⣷⣿⣿⣇⣿⣿⠀⠀⠀⢸⣿⣾⣿⣿⠿⢷⣿⣿⣇⠉⣾⠀⢸⡏⡻⠉⠀⠀⠀⠀⠀⠀⠈⠀⠀⢀⠃⠀⠀⠀⠀⠀⠀⢀⣀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠛⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣘⣷⣶⣾⣟⣿⣿⣿⣧⣼⣿⣿⡘⢦⡏⠀⠾⢥⣘⡨⠀⠀⢀⣀⠀⠀⠀⠀⠀⡌⠀⠀⠀⠀⠀⢤⠄⠠⠽ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠉⠻⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣇⣿⣼⠃⢀⣀⠀⣀⡀⠀⠀⠀⠀⠈⠀⠠⢤⡞⠀⠀⠀⠀⠀⠀⠀⠛⠊⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢶⣄⠀⠑⢦⢍⠻⠿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣾⣿⣿⠠⣰⣤⣀⠈⠛⠁⠀⠀⠀⠀⠀⠀⠈⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⣿⣿⣷⣠⣜⢣⣤⣠⣈⠙⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣯⡾⣿⣻⣭⢃⠠⣅⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣴⣶⣶⡶⡤ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠸⣿⣿⣿⣿⣿⣿⣾⣿⣿⣿⣷⣬⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⢺⣿⣿⠃⠀⠍⠢⣕⢦⣢⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠙⠻⠛⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠐⡏⢹⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣟⣿⠯⠀⠀⠀⠄⠀⠈⢳⣟⣿⣦⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⡇⠸⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠂⠁⠀⠀⠀⠀⡄⠀⠀⠀⢻⠘⣿⣆⠀⠁⠀⠀⠀⠀⠀⠀⠁⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢠⣧⠀⣿⣿⣿⣿⣿⣿⣿⣿⠟⣿⡇⠀⢹⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡟⠀⠀⠀⠀⠀⠀⢄⡀⠀⠀⠈⡇⢸⣯⠀⢠⡄⠀⠀⠀⠀⠀⠒⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢹⣿⣆⣿⣿⣿⣿⣿⣿⣿⡏⠀⠀⡄⠀⢸⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠃⠀⠀⠀⠀⠀⠀⠀⠘⣆⢀⣠⡇⠀⠚⠀⣹⡇⠀⠀⠀⠀⠈⠉⠁⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠘⣿⣿⣿⣿⣿⣿⣿⣿⣿⠇⠀⠀⣧⠀⢸⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡟⠠⠀⠀⠀⠀⠀⠀⠀⠀⡁⢸⣿⢇⢳⠈⢐⣿⠃⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢿⣿⣼⣿⣿⣿⣿⣿⣿⡇⠀⠀⢹⡄⢸⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠇⠀⠀⢠⣤⠀⠀⠀⠤⢐⣡⣾⣯⠞⠁⣠⣿⡟⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⣿⢿⣿⣿⣿⣿⣿⣿⡇⠀⠀⣾⡇⢸⣿⣿⣿⣿⣿⡿⣿⣿⣿⣷⣹⡟⣽⢿⡿⣿⣿⣿⣿⣿⣿⣿⣿⡿⠀⣠⣶⡟⠙⠻⣦⣉⡛⣛⡛⠉⢁⢶⣰⢿⠟⠀⠀⠀⠀⠀⠀⠀⠀⠇⠂⣠ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢟⢸⣿⣿⣿⣿⣿⣿⣷⠀⠀⢸⡇⠘⡿⣿⣿⣹⣿⣯⣿⣿⣿⡿⣿⣿⣿⣾⣿⣾⢩⣿⣿⣿⣿⣿⣿⣷⣿⣿⣿⡇⠀⠀⠀⠉⠛⠻⠿⠿⠟⠛⠋⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⣾⣿⣿⣿⣿⣿⣿⣿⠀⠀⠸⣿⠀⡇⣿⡯⣋⢿⣿⣿⣿⡿⠙⢣⠋⠙⠛⠿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⠛⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠠⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢠⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⡷⠀⠈⡏⠻⢇⣿⣿⣿⣿⡟⢰⠘⠂⠀⠀⠀⠀⠉⢻⢿⢿⣿⣿⣿⠿⠋⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⡀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢻⣿⣿⣿⣿⣿⣿⣿⡆⠀⠀⠛⠀⠀⢷⢐⢐⡟⣿⣧⣿⣿⣿⡆⠃⠀⠀⠀⠀⠀⢸⠸⠁⠀⠐⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⣿⣿⣿⣿⣿⣿⣿⡇⠀⠀⠀⠀⠈⢸⢶⠀⡷⢹⢟⡟⣿⣿⠿⠀⠀⠀⠀⠀⠀⢸⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ䷩ 𝚕𝚒𝚗𝚎 546 ╒═══════════════════ 𝐀𝐑𝐓𝐈𝐂𝐋𝐄 ═════════════════════════════════════════════════╕ (ℹ) Images, hyperlinks and comments at http://techrights.org/2021/08/24/epo-besieged-baltic-states/#comments Gemini version at gemini://gemini.techrights.org/2021/08/24/epo-besieged-baltic-states/ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 08.24.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ Gemini_version_available_♊︎ ✐ EPO_Exposé:_The_Besieged_Baltic_States_–_Part_I_–_More_Captured_Delegates?⠀✐ Posted in Europe, Patents at 6:10 pm by Dr. Roy Schestowitz Series index: 1. You are here ☞ More Captured Delegates? 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇Baltic_flags⦈_ The Baltic States – far away from the Balkans, but just as susceptible to “capture”. Summary: “In the upcoming series we plan to take a look at the relationship between the national patent offices of the Baltic States and the European Patent Organisation.” Just like most of the countries in the Balkan peninsula, the Baltic States – Estonia, Lithuania and Latvia – are small countries which are at high risk of “capture” by rogue supranational organisations such as the EPO. From the geopolitical perspective, the Baltic States are situated on the fault- line between the Nordic, German and Russian spheres of influence. “From the geopolitical perspective, the Baltic States are situated on the fault-line between the Nordic, German and Russian spheres of influence.”In the eighteenth century, the territories of what are today Estonia, Lithuania and Latvia were swallowed up by the expanding Russian Empire and remained under Russian hegemony until the end of the first World War. After the collapse of Tsarist Russia and the Bolshevik Revolution of 1917, they enjoyed a brief period of precarious freedom until 1939 when they were once again swallowed up by Russia – this time the Soviet Union. Stalin’s annexation of the Baltic states was “agreed” with Nazi Germany under the terms of the “secret_protocol” to the Ribbentrop-Molotov Pact signed in August 1939. “Once they had regained their independence, these countries proceeded to re- establish various state institutions which had been abolished under Soviet rule, including their national patent offices.”After the end of the Second World War, the Russians held onto the Baltic States and they only succeeded in reclaiming their independence in 1991 as a result of the disintegration of the Soviet Union. Once they had regained their independence, these countries proceeded to re- establish various state institutions which had been abolished under Soviet rule, including their national patent offices. In the upcoming series we plan to take a look at the relationship between the national patent offices of the Baltic States and the European Patent Organisation. “In the upcoming series we plan to take a look at the relationship between the national patent offices of the Baltic States and the European Patent Organisation.”There are clear indications that these states belonged to the “large group of smaller countries” which Benoît_Battistelli had under his sway and which he was able to influence to the detriment of good governance and the rule of law at the EPO, as publicly_reported_by_the_Netherlands_delegation_back in_April_2017. Amongst other things, we hope to reveal some little known details of the “Baltic Crusade” conducted by Battistelli when he was running for the position of EPO President in 2009/2010. “Until now Enäjärvi’s role in EPO affairs has been a well-kept secret.”A key figure in this saga was the former Director-General of the Finnish Patents and Registrations Office, Martti Enäjärvi, who acted as a local “facilitator” to open doors for Battistelli in the Baltic region. Until now Enäjärvi’s role in EPO affairs has been a well-kept secret. Even many EPO insiders fail to appreciate the extent of his behind-the-scenes influence and his hidden contribution to EPO affairs over the last decade and a half. “In addition to this, we will also look at Enäjärvi’s close links to Battistelli’s successor at the EPO, António Campinos, formerly Executive Director of the EU trademark agency OHIM/EUIPO in Alicante.”The present series will endeavour to cast some badly needed light on these matters. Amongst other things, we plan to present an in-depth exposé of how Enäjärvi helped to pave the way for Battistelli’s power grab at the EPO. In addition to this, we will also look at Enäjärvi’s close links to Battistelli’s successor at the EPO, António_Campinos, formerly Executive Director of the EU trademark agency OHIM/EUIPO in Alicante. Stay tuned for more coming up shortly… █ ⣿⣿⣿⣿⣿⣿⣿⣿⠿⣿⡿⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⣟⣿⠩⢹⠹⣿⢻⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡟⠟⣟⠉⣻⠻⢻⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⡙⡟⠙⠉⣣⣕⡩⣥⣭⣽⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠿⢇⣳⣸⣥⣿⣾⣾⣾⣯⣧⣣⣥⢛⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠿⠧⠠⠶⠶⠶⠄⠼⠿⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⣿⣻⢾⡎⣿⢛⠮⢕⣊⢏⣷⣗⣦⢩⣮⡿⣾⣶⣛⣿⣿⣿⣿⣿⣿⣿⣿⣟⢾⢳⣾⣿⣿⠛⠛⢛⠛⠛⠛⣿⣿⣷⣿⢋⢘⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⢿⣽⣍⣮⠀⠀⠀⠇⠀⠀⠸⠀⠀⠀⠇⠀⠀⠀⡷⣽⣽⢿⣿⣿⣿⣿⣿⢯⣝⣻⣿⣿⣿⣿⠀⠐⣰⠨⢐⠀⣿⣿⣿⣿⣿⡭⣶⢿⣿⣿⣿⣿⣿⣿⣿⡉⠉⠋⢙⠀⠀⠀⠀⠀⠀⠀⠀⠀⡉⠙⠉⣹⣿⣿⣿⣿ ⣿⣿⡿⢣⣿⣾⠀⠀⢠⣤⣤⣤⣤⡀⠀⠀⠀⠀⠀⠀⣟⣿⡝⣿⣿⣿⣿⣿⡯⣍⣳⣿⣿⣿⣿⣿⡘⠑⠣⠤⣔⠱⣿⣿⣿⣿⣿⣷⣒⠋⣿⣿⣿⣿⣿⣿⣿⣿⡁⠂⢸⢠⠠⠀⢄⡄⠀⠀⠀⠀⠗⠀⣛⣿⣿⣿⣿⣿ ⣿⣷⣟⣯⣻⣿⠀⠀⢸⣿⣇⣀⣿⣿⠀⠀⠀⠀⠀⠀⣿⣾⣽⢾⣻⣿⣿⣿⠿⠦⣿⣿⣿⣿⣿⣿⣧⣀⠀⠀⢜⣴⣿⣿⣿⣿⣿⣿⣗⡿⢿⣿⣿⣿⣿⣿⣿⠟⠉⠀⠈⣼⡐⠀⠬⡅⢀⢢⠀⢠⠁⠊⠉⢿⣿⣿⣿⣿ ⣿⣽⢕⢿⣾⣿⠀⠀⢸⣿⡏⠉⠉⢡⣿⣿⡆⢀⣠⡆⣿⣟⣟⢸⣿⣿⣿⣿⣿⠿⡿⡿⡿⣿⣿⠿⠿⣿⣿⢿⡿⡿⣿⠿⣿⠿⠿⣿⣷⢾⣿⣿⣿⣿⣿⣿⣿⣿⠂⠀⢀⠒⣥⣸⣦⡅⣀⣀⡤⢆⡀⠀⠠⣾⣿⣿⣿⣿ ⣿⣷⣾⢶⡿⣿⠀⠀⠈⠉⠁⠀⠀⣾⡏⢸⣿⣿⣿⣧⣿⣯⡎⣷⣿⣿⣿⣿⣬⣤⣯⣤⣧⣿⣯⣧⣬⣼⣾⣼⣧⣿⣼⣤⣿⣤⣴⣿⣾⣾⣼⣿⣿⣿⣿⣿⣿⣿⣶⣶⡉⠀⠈⢁⣏⠟⣋⡀⠀⠀⣩⣶⣴⣿⣿⣿⣿⣿ ⣿⣿⣷⡬⢿⣿⡆⠀⠀⠀⠀⠀⣼⣿⣿⣟⣿⣿⡟⣼⣟⣽⢱⣿⣿⣿⣿⣿⣿⣿⣿⣿⠿⠿⣿⣿⣿⣿⡟⢟⣿⣿⣿⣿⡿⠿⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣧⣤⣶⣾⣿⣷⣶⣤⣼⣿⣿⣿⣿⣿⣿⣿⣿ ⣿⣿⣿⠛⠃⠹⣿⣆⠀⣠⣶⣿⣿⣿⣿⣿⣿⢟⣼⡿⠃⠑⢛⣿⣿⣿⣿⣿⣧⠙⠻⠿⠀⠀⠉⠉⣿⣿⡟⡺⣿⣿⡏⠉⠁⠀⠸⠿⠛⢡⣿⣿⣿⣿⣿⣿⡟⣛⡿⢿⠿⡿⡿⠿⡿⢿⣿⣛⡟⠛⠛⣿⢿⠿⣿⣿⣿⣿ ⣿⣿⣿⣧⡈⡠⠈⠻⢷⣯⡻⢿⣿⣿⠿⣫⣵⡿⠋⢁⠁⢠⣾⣿⣿⣿⣿⣿⣿⣧⠀⠀⠀⠀⠀⠀⣿⣿⡧⠾⣿⣿⡇⠀⠀⠀⠀⠀⢠⣿⣿⣿⣿⣿⣿⣿⣇⣷⣟⣻⣘⣘⣂⣧⣇⣿⣟⣛⣆⣇⣇⣇⣻⣘⣾⣿⣿⣿ ⣿⣿⣿⣿⣿⣦⣘⠘⡀⠈⠉⠓⡚⡒⠛⠉⡁⠂⠁⣢⣴⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⣄⠀⠀⠀⠀⣿⣿⣇⣂⣿⣿⡇⠀⠀⠀⢀⣴⣿⣿⣿⣿⣿⡟⡟⡿⡿⢿⢿⣿⠏⡿⣿⠿⣿⣿⢿⢿⢹⣿⣿⣿⢿⢻⢿⡿⣿⢿ ⣿⣿⣿⣿⣿⣿⣿⣷⣦⣤⣈⣃⣀⣀⣀⣠⣥⣶⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣶⣤⣤⣿⣿⣿⣿⣿⣿⣧⣤⣴⣾⣿⣿⣿⣿⣿⣿⣿⣧⣷⣧⣽⣨⣽⣭⣤⣭⣿⣴⣭⣿⣬⣼⣼⣿⣭⣯⣼⣼⣦⣧⣬⣼ ䷩ 𝚕𝚒𝚗𝚎 678 ╒═══════════════════ 𝐀𝐑𝐓𝐈𝐂𝐋𝐄 ═════════════════════════════════════════════════╕ (ℹ) Images, hyperlinks and comments at http://techrights.org/2021/08/24/epo-internal-courts/#comments Gemini version at gemini://gemini.techrights.org/2021/08/24/epo-internal-courts/ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 08.24.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ Gemini_version_available_♊︎ ✐ [Meme]_Internal_Stacked_Committees,_Sponsored_by_Special_Interests⠀✐ Posted in Europe, Patents at 2:35 pm by Dr. Roy Schestowitz 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇EPO_internal_court⦈_ Summary: There’s hardly even an illusion of justice left at the EPO ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣻⢈⣁⣍⣀⠀⣿⣿⣿⣿⣿⣻⡛⢽⡟⢫⡛⣿⠝⠻⡽⠚⢙⡒⢉⢳⡢⠐⡖⡢⢰⣒⢂⡖⡂⡄⣦⣖⣺⠳⣉⢺⣿⣿⣿⣿⣿⠐⠶⠶⠶⣿⣿⡇⣒⣶⣿⣿⣿⣷⣶⢰⣾⣿⣿⣿⣿⢸⣷ ⠿⠿⠿⠿⠿⠿⠿⠿⠿⠿⠈⠃⠒⠊⠀⠿⠿⠿⠿⠿⠵⠬⠫⠧⠾⠕⠭⠢⠤⠮⠆⠡⠬⠨⠪⠕⠤⠃⠱⠙⠠⠎⠇⠕⠽⠟⠃⠘⠼⠤⠿⠿⠿⢿⣿⣿⠀⢸⢸⢸⣿⣿⣷⣿⣿⡿⣿⣿⡿⣿⣾⡿⣿⡿⣿⣿⣾⣿ ⠀⣶⣶⣶⣶⣶⣿⣿⣿⣷⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣶⣾⣾⣾⢹⡟⣳⠛⢲⣿⣿⣷⣿⣾⣿⣷⣿⣷⣿⣷⣿⣿ ⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠟⠿⣧⣶⡹⣿⣿⣿⣿⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣮⢻⣿⣿⣿⣿⣿⣿⠀⣿⣿⣿⣿⣿⣿⠿⠿⣿⡿⠿⢿⣿⣿⣿⣿⣿⣿⣿⢸⣷⣿⣶⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⠀⣿⣿⣿⣿⡿⠿⠿⠿⠿⣿⣆⣿⣿⣿⣧⣿⣿⣿⣿⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⠉⠞⠶⣾⣿⣿⣿⣿⣿⣿⠀⣿⣿⣿⣿⣿⠇⠀⢸⡿⣿⠀⠀⢹⣿⣿⣿⣿⣿⣿⢸⣿⣿⣿⣿⣿⣿⡿⠋⠉⠉⣹⢿⣿⣿⣿⣿⣿ ⠀⢹⠻⢻⣿⠁⠀⠀⠀⠀⣿⣿⢿⣿⣿⠛⠟⣿⣿⣿⠀⣿⣿⣿⣿⣿⣿⣿⠃⠀⠀⡖⡖⠈⠙⣿⣿⣿⣿⣿⠀⣿⣿⣿⣿⣿⡄⠀⠸⣿⢃⠀⠀⣿⣿⣿⣿⣿⣿⣿⢸⣿⣿⣿⣿⣿⣿⠃⠀⠀⠀⠿⢻⣿⣿⣿⣿⣿ ⠀⠒⠒⠚⠛⠀⠀⠀⠀⠀⠁⠀⠘⣿⡏⠀⠀⠀⠉⠻⠀⣛⢛⣛⣛⣿⠟⠁⠀⠀⠀⠃⠁⠀⠀⢸⣿⣿⣿⣿⠀⣛⣛⡛⢛⡛⠀⠀⠀⡗⢻⡀⠀⠀⢿⣿⣿⣿⣿⣿⢸⣛⠛⢛⠿⣿⠛⠓⠀⠀⠀⠀⠘⠻⢿⣿⣿⣿ ⠀⣈⣉⣉⣉⣉⣀⣈⣁⣁⣁⣀⣊⣙⣁⣀⣀⣀⣀⣀⠀⣉⣉⣉⣉⣉⣀⣁⣁⣀⣀⣀⣀⣀⣀⣘⣛⣛⣛⣛⠀⣉⣉⣉⣈⣉⣉⣉⣁⣃⣘⣃⣀⣀⣘⣛⣛⣛⣛⣛⢸⣭⣭⣭⣭⣤⣬⣭⣬⣥⣤⣤⣤⣤⣤⣿⣿⣿ ⠀⣼⣦⣼⣿⣿⣿⣿⣿⣿⠿⠿⣿⣿⣿⣿⣿⣿⣿⣿⠀⡏⡽⠉⢹⣿⣿⣿⣿⣿⣿⣿⣍⠉⠻⣿⣿⣿⣿⣿⠀⡏⡽⠉⢹⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⢸⡏⡽⠉⢹⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⠀⣿⣿⣿⣿⣿⣿⣿⡟⠀⠀⢸⣿⣿⣿⣿⣿⣿⣿⣿⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⡿⠀⠀⣸⣿⣿⣿⣿⠀⣿⣿⣿⣿⣿⣿⡿⢻⣿⡏⠝⠛⠻⣿⣿⣿⣿⣿⣿⢸⣿⣿⣿⣿⣿⣿⣿⣿⠋⠉⠙⠻⣿⣿⣿⣿⣿ ⠀⣿⣿⣿⣿⣿⣿⡟⠁⠀⠀⠘⢿⣿⣿⣿⣿⣿⣿⣿⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡷⡆⠀⠀⣿⣿⣿⣿⣿⠀⣿⣿⣿⣿⣿⣿⠁⣿⣿⣷⠀⠀⠱⢹⣿⣿⣿⣿⣿⢸⣿⣿⣿⣿⣿⣿⣿⡃⠐⠺⠃⠀⣿⣿⣿⣿⣿ ⠀⣿⣿⣿⣿⣿⡿⠿⠀⠀⠀⠀⢀⡿⣿⣿⣿⣿⣿⣿⠀⣿⣿⣿⣿⣿⣿⡿⠿⠟⠙⣿⡇⠀⠀⠉⠛⠻⢿⣿⠀⣿⣿⣿⣿⣿⣿⠀⢿⣏⣁⠀⠀⠀⣸⣿⣿⣿⣿⣿⢸⣿⣿⣿⣿⣿⣿⣿⣷⣿⠚⠈⢹⣿⣿⣿⣿⣿ ⠀⢭⢭⣭⠭⠁⠀⠀⠠⠤⠀⢠⠜⠃⠀⠉⣿⣿⣿⣿⠀⣭⣭⣭⣽⣿⡏⠄⠀⠄⠀⠻⡇⠒⠀⠀⠀⠀⠀⢿⠀⣭⣭⣭⢩⣿⣿⣇⣾⣯⡏⠀⠀⠈⠉⠛⢿⣿⣿⣿⠈⣭⣭⣭⣭⣹⣿⣋⠉⠉⡀⠀⢠⠉⠙⠛⠻⢿ ⢠⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣭⣤⣤⣤⣤⣭⣭⣭⣭⠀⣤⢤⣤⢄⢀⣤⣀⠤⣤⣤⣤⣄⣤⣤⣤⣤⣤⣤⣬⠀⣤⣤⣤⣤⣤⣤⣬⣭⣭⣥⣤⣤⣤⣤⣤⣬⣭⣭⣭⠀⢤⡤⢤⣤⣤⠤⠄⠀⠀⠭⣤⣭⣤⣤⣤⣤⣤ ⢸⣧⣿⣤⣼⡿⠿⠿⠿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠌⢽⡇⡁⣶⣿⣿⡷⠎⢹⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⣧⣿⣤⣼⣿⣿⣿⣿⣿⣿⡿⠿⢿⣿⣿⣿⣿⣿⣿⠀⣾⣶⣾⣿⠁⢠⣾⣶⣄⣠⠙⣿⣿⣿⣿⣿⣿ ⢸⣿⣿⣿⣯⠜⠅⠀⠀⢼⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⢀⠚⠁⠀⣽⡉⠁⠀⠀⠘⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⢰⣿⣿⡆⣿⣿⣿⣿⣿⠀⣿⣿⣿⡿⠀⢸⣅⣼⡅⠉⠀⣿⣿⣿⣿⣿⣿ ⢸⣿⣿⣿⣆⡀⠀⠀⠀⣠⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠬⠤⣦⣼⣿⣿⡦⠀⠚⢸⣾⣿⣿⣿⣿⣿⣿⣿⣿⠀⣿⣿⣿⣿⣿⣿⣿⣿⠿⠟⣼⣿⡿⠴⣿⣿⣿⣿⣿⠀⣿⣿⣿⣿⣤⣤⣽⠏⠩⣧⣼⣿⣿⣿⣿⣿⣿ ⠸⣿⣿⣿⡿⠗⠀⠀⠀⠀⠈⠻⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠹⡃⠙⠁⠀⠀⠀⣷⣾⣿⣿⣿⣿⣿⣿⣿⣿⠀⣿⣿⣿⣿⣿⣿⡿⠀⠀⠀⣸⡽⡅⠀⠈⣿⣿⣿⣿⠀⢿⣿⣿⣿⠿⢿⡏⠃⢸⡿⢿⣿⣿⣿⣿⣿⣿ ⠀⠶⠒⠒⠂⠀⠂⠐⠰⠆⠀⠀⠘⢿⣿⣿⣿⠿⠿⠿⠀⠒⠐⠒⠒⠂⠒⠒⠒⠀⠀⠸⠿⠿⠿⠿⠿⠿⠿⠿⠀⠷⠶⠖⠺⠿⠿⠀⠀⠀⠀⣿⠇⠀⠀⠀⠘⠿⠿⠿⠀⠃⠒⠂⠀⠐⠘⠓⠂⠘⠀⠀⠀⠉⠛⠿⠿⠿ ⠀⠀⢀⣠⣴⣶⣶⣶⣶⣄⣠⣤⣄⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣠⣴⢶⣶⠀⠀⠀⣴⠶⣶⣂⡀⠀⠀⠀⠀⠀⣢⠆⢰⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⠀⠀⠀⠀⣠⡾⠿⢿⣿⣿⣶⣄⡀⠀⠀⠀⠀⠀ ⠀⠀⣿⣿⣿⣿⠋⢁⣶⣿⣿⣿⣿⣿⣦⠀⠀⠀⢤⣤⡀⠀⠀⢸⣿⣀⣺⣿⢀⠲⠺⠿⠖⣿⠿⠟⠐⠃⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⢟⣽⣯⣍⠉⠹⣿⣿⣿⣿⣿⠀⠀⠀⠀⢁⣴⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀ ⠀⠀⣼⠁⠀⠗⠀⢫⣿⣋⣛⡟⠛⣿⠟⠀⠀⠠⠜⠟⠁⠀⠀⠸⢿⣿⣿⣿⢿⡿⡄⣶⣾⣿⡆⠀⣿⠇⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⠘⣿⣟⡟⠀⠀⢿⣿⣿⣿⣿⠀⠀⠀⠀⠈⣭⣿⣉⣻⣿⣿⣿⡏⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⣀⠘⣿⣿⣿⢿⣿⣷⡗⠀⠀⢢⠀⠀⣤⠀⠀⠀⠀⠀⡴⠟⢘⣿⡄⠀⠘⢻⡟⣷⠀⡆⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣷⣄⣿⣿⡏⠀⣠⣾⣿⣿⣿⣿⠀⠀⠀⠀⠈⠯⠽⣿⣿⣿⣼⠌⠁⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠸⣷⠊⠀⠹⣿⣭⣽⣿⠟⠁⠀⠀⠀⠀⠀⠝⠀⠀⠀⠀⠐⠃⠀⢸⢿⡇⠀⠀⠈⠃⠉⢀⡁⠀⠀⠀⡛⡛⣛⠛⠻⠿⠿⠿⢿⡿⣿⡇⡐⠿⠿⠿⢿⣿⣿⠀⠀⠀⠀⠀⠳⠾⣿⠿⠟⠛⠈⠀⠀⠀⠀⠀⠀ ䷩ 𝚕𝚒𝚗𝚎 728 ╒═══════════════════ 𝐀𝐑𝐓𝐈𝐂𝐋𝐄 ═════════════════════════════════════════════════╕ (ℹ) Images, hyperlinks and comments at http://techrights.org/2021/08/24/epo-vs-basic-rights/#comments Gemini version at gemini://gemini.techrights.org/2021/08/24/epo-vs-basic-rights/ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 08.24.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ Gemini_version_available_♊︎ ✐ Expecting_the_Administrative_Council_of_the_European_Patent_Organisation_to Actually_Follow_the_Law…⠀✐ Posted in Courtroom, Europe, Law, Patents at 2:24 pm by Dr. Roy Schestowitz Video_download_link | md5sum 4449a20ad1a87e19292b30bd9031f5f5 http://techrights.org/videos/epo-ac-letter.webm Summary: The representatives of staff of the EPO, the Central Staff Committee (CSC), are approaching the Heads of Delegation of the Administrative Council of the European Patent Organisation along with their Chairman; they’re politely asking for better safeguards against systematic abuses of the law, including abolition of workers’ basic rights The Central Staff Committee (CSC) of the EPO has distributed a letter, an open letter, and readers of Techrights typically ensure that we too can see a copy. This letter only partly concerns the unlawful regulations of Benoît_Battistelli — regulations which António_Campinos continued to exploit while keeping 100% silent on the court’s outcome (he doesn’t seem to care what tribunals say unless those tribunals are controlled by him). “The intent is to raise awareness and garner sympathy from the Administrative Council of the European Patent Organisation (mostly a bunch of legal hacks rather than scientists).”The letter from the CSC mostly concerns the internal Appeals Committee, which was mentioned_earlier_this_year and several times last year. The intent is to raise awareness and garner sympathy from the Administrative Council of the European Patent Organisation (mostly a bunch of legal hacks rather than scientists). “On 7 July 2021,” the CSC said, “the Administrative Tribunal of the International Labour Organization (ILOAT) delivered several important Judgments on the rules governing the exercise of the right to strike at the EPO. The ILOAT found that virtually every single one of the strike rules blatantly and obviously violated the fundamental right to strike, that the President exceeded his competence when drawing up Circular No. 347 in 2013 and that the Circular is therefore unlawful in its entirety and is set aside. Already in 2015 a national court in The Hague, the so-called Gerechtshof, found that the EPO violated fundamental European rights. In view of the long list of violations of the fundamental right to strike identified by the ILOAT, the question can be raised of why a majority in the internal Appeals Committee (ApC) reached a completely opposite opinion, based on the same facts and arguments.” Then they spoke of the internal Appeals Committee (ApC). “The members of the ApC are laypersons. However, the Chair and Vice-Chairs are expected to possess the qualifications required for appointment to high judicial office or be lawyers with experience in the area of employment law acquired at national or international level (see Article 111(3) ServRegs). A reasonably objective and informed person might question whether they would at times give up their independence and impartiality. “The damage caused by the ApC’s massively wrong assessment of the strike rules and their application is considerable, both for the Organisation and for its staff. * The Organisation is now stigmatised in the public eye as an employer that has been violating fundamental rights of its staff for over eight years and has been depriving them of an important tool for collective bargaining. * Staff have also definitively lost confidence in the internal means of settling disputes. Much of the rest of the publication is included in letter form, as shown in the video above, and we’ve decided to replicate it as HTML so that it makes it into IPFS and Gemini space. European Patent Office | 80298 MUNICH | GERMANY Reference: sc21102cl – 0.3.1/1.3.1 Date: 13/08/2021 To the Chairman and the Heads of Delegation of the Administrative Council of the European Patent Organisation OPEN LETTER System for the settlement of disputes – Proposals for strengthening the Appeals Committee Dear Mr Chairman, Dear Heads of Delegation, On 7 July 2021, the Administrative Tribunal of the International Labour Organization (ILOAT) delivered several important Judgments on the rules governing the exercise of the right to strike at the European Patent Office1, introduced in 2013 with decision CA/D 5/13 and Circular No. 347, as well as on subsequent implementing decisions. ILOAT found that virtually every single one of the strike rules blatantly and obviously violated the fundamental right to strike, that the President exceeded his competence when drawing up Circular No. 347 and that the Circular is therefore unlawful in its entirety and is set aside2. The ILOAT furthermore ruled that a salary deduction for absence due to strike participation of 1/20th of the monthly remuneration per day of absence instead of 1/30th as for all other unpaid lawful absences was punitive3 and that the President had abused his power when applying the strike rules and through his interpretation of Circular No. 347, of which he was the author4, justifying high moral damages. Already in 2015 a national court in The Hague, the so-called Gerechtshof, found that the EPO violated fundamental European rights5. ____ 1 Judgments Nos. 4430 to 4435 2 Judgment No. 4430, consideration 16 and decision 3 Judgment No. 4435 4 Judgments Nos. 4432 to 4434 5 The decision of the Gerechtshof was later on set aside by the Dutch Supreme Court, the Hoge Raad, only on the ground that the Organisation could invoke its immunity from national jurisdiction and that the Dutch courts therefore have no jurisdiction (see Judgement of the Gerechtshof Den Haag). ===================================================================== Based on the same facts and arguments the internal Appeals Committee (ApC), by a majority, concluded in the underlying internal appeal procedures that the new strike rules as well as the salary deductions were lawful, that the President did not act ultra vires when laying down the strike rules in Circular No. 347 and that he did not abuse his powers in applying them6. The ILOAT found that the ApC had erred in all these points. In view of the long list of violations of the fundamental right to strike identified by the ILOAT7, this is remarkable and raises the question of why a majority in the ApC reached such an opposite opinion. The members of the ApC are laypersons. However, the Chair and Vice-Chairs are expected to possess the qualifications required for appointment to high judicial office or be lawyers with experience in the area of employment law acquired at national or international level, pursuant to Article 111 (3) ServRegs. A reasonably objective and informed person might question whether they would at times give up their independence and impartiality, codified in Article 112 ServRegs. The Staff Representation has already pointed out several times8 that the unilateral selection and appointment of the Chair and the Vice- Chairs by the President (Article 111(2)(a) ServRegs) does not ensure the required balance in the ApC and does not promote confidence in its opinions. The Staff Representation has therefore repeatedly requested to be involved in their selection and that the GCC be consulted on the appointments, to no avail9. Internal appeals are procedure where a Committee is composed with an equal number of members appointed by the President and by the Staff Representation, however with the Chair taking alone all procedural decisions (Article 111a(1) ServRegs), leading the debate and making sometimes the difference in the opinions. Therefore, a mutual agreement on their appointment is key for arriving at balanced opinions accepted by staff and for preventing from overloading ILOAT with complaints which could have easily been settled internally. This was the reason why the GAC10 had to be consulted on the appointment of the Chair and Vice-Chairs since the founding of the European Patent Organisation11 until 2013. However, with decisions CA/D 8/12 and 9/12 this consultation process was abolished and the Chair and Vice-Chairs have since then been unilaterally appointed by the President. ____ 6 Only in the internal appeals procedure underlying Judgment No. 4432 the ApC concluded that a postponement of a strike ballot had been unlawful, but despite the blatant abuse of power no moral damage was awarded. 7 See, in particular, Judgment Nos. 4430, cons.16 and 4435, cons.15 to 17 8 See for example the letter to the Administrative Council of 31 January 2020 9 Although Staff Representation has been granted an observer status in the last selection procedure for a new chair, this cannot be a substitute for being able to appoint members to the selection board and for the required consultation of staff representation in the GCC. 10 Replaced by the GCC with decision CA/D 2/14 11 Article 110(4) ServRegs, version 1977 (CA/D 9/77) ===================================================================== The damage caused by the ApC’s massively wrong assessment of the strike rules and their application is considerable, both for the Organisation and for its staff. The Organisation is now stigmatised in the public eye as an employer that has been violating_fundamental_rights_of_its_staff_for_over eight_years and has been depriving staff of an important_tool_for collective_bargaining, as their right to strike has been severely obstructed at a time when many fundamental reforms were pushed through (inter alia “social democracy”, the new career system, the new salary adjustment procedure, the new rules for the education allowance, …). Staff have also definitively lost_confidence in the internal means of settling disputes and will, in most cases, eventually file a complaint with the ILOAT for protecting their rights. In addition, there is a high risk that many other decisions in appeal cases were also based on opinions where the ApC erred in law. In view of the fundamental importance of legal certainty and legal peace and in order to restore staff’s confidence in the opinions of the ApC as soon as possible, and to prevent that disputes have to be settled outside the Organisation, we urge you that the Administrative Council takes steps to ensure that: • Staff Representation is allowed to appoint members to the selection board for the Chair and Vice-Chairs of the ApC, • the GCC is consulted prior to appointment of the Chair and Vice- Chairs, • no Chair or vice-Chair may be appointed who does not find consensus in the GCC. Yours sincerely, Alain Dumont Chairman of the Central Staff Committee cc.: President of the EPO Administrative Tribunal of the International Labour Organization In short, there seems to be a tendency to enshrine unlawful rules as “the law”; moreover, “there is a high risk that many other decisions in appeal cases were also based on opinions where the ApC erred in law.” This is by design; in the past we saw EPO dictators intervening when the ApC got it right; so, as usual, there’s not even any regard/respect to those appointed to assess legality within the EPO. █ ䷩ 𝚕𝚒𝚗𝚎 998 ╒═══════════════════ 𝐀𝐑𝐓𝐈𝐂𝐋𝐄 ═════════════════════════════════════════════════╕ (ℹ) Images, hyperlinks and comments at http://techrights.org/2021/08/24/gnu-hisory/#comments Gemini version at gemini://gemini.techrights.org/2021/08/24/gnu-hisory/ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 08.24.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ Gemini_version_available_♊︎ ✐ GNU/Linux_Turns_38_Next_Month⠀✐ Posted in Deception, GNU/Linux at 4:51 pm by Dr. Roy Schestowitz 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇Richard_M._Stallman_publishes_the_GNU_Manifesto⦈_ Summary: Watch_out_for_revisionism_and_distortion_of_history_(by_omissions_and misattributions) 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇GNU/Linux_turns_38⦈_ ⣀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⠀⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠰⡤⠀⠀⠀⠀⠀⠀⣴⣶⣤⠀⣀⣀⣤⣦⣤⡄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠉⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠉⠉⠁⠘⠿⠛⠛⠙⠿⠷⠶⠦⠤⠀⠀⠠⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⡀⡀⢀⡀⠀⡀⡀⠀⣄⡀⠀⠀⡀⠀⡄⠀⠀⠀⡄⠀⣀⢀⠀⢀⠀⢀⠀⠀⢀⢀⠀⢀⡀⡀⢀⡀⠀⡀⣠⠀⠀⡀⡀⠀⢀⡄⠀⠀⢀⡀⠀⣀⣀⠀⢀⠀⢀⢀⡄⢠⡀⠀⠀⠀⡀⡀⠀⠀⠀⡀⠀⣀⢀⢀ ⠀⠀⠀⠀⠀⠁⠀⠁⠀⠈⠁⠀⠁⠈⠁⠀⠁⠀⠁⠁⠀⠁⠁⠀⠈⠈⠀⠈⠀⠀⠈⠀⠈⠈⠀⠈⠀⠁⠈⠃⠀⠀⠉⠀⠀⠀⠁⠀⠈⠁⠁⠀⠈⠁⠀⠁⠉⠀⠈⠀⠀⠈⠁⠈⠁⠀⠀⠀⠈⠁⠀⠀⠀⠁⠀⠈⠁⠀ ⠀⠀⠀⠀⠀⠀⠀⢀⣀⠀⠀⡄⠀⢀⢀⠀⠀⡄⠀⠀⣀⠀⢀⡀⠀⡀⡄⠀⣄⠀⢀⢀⡀⠀⣤⠀⠀⠀⡄⡀⢀⣀⠀⢀⡄⠀⡄⠀⡀⣄⠀⡀⠀⡀⢀⣄⠀⢠⣀⠀⠀⢀⠀⢠⡀⢀⡀⠀⡀⠀⠀⢀⠀⠀⠀⠀⠀⡀ ⠀⠀⠀⠀⠈⠉⠀⠈⠁⠀⠈⠁⠀⠈⠉⠀⠀⠁⠁⠈⠙⠀⠀⠁⠀⠀⠁⠀⠉⠁⠈⠈⠁⠀⠉⠀⠀⠀⠁⠁⠈⠁⠀⠈⠁⠀⠁⠀⠀⠁⠀⠀⠀⠀⠀⠁⠀⠈⠀⠁⠀⠀⠀⠈⠀⠈⠁⠀⠉⠉⠀⠈⠁⠀⠀⠀⠀⠁ ⠀⠀⠀⠀⢀⡀⠀⠀⢀⡀⠀⣀⢠⠀⢀⡀⠀⣀⠀⡀⣀⢀⠀⢀⠀⠀⢀⠀⠀⠀⠀⠀⠀⠀⡀⠀⠀⣀⠀⠀⠀⠀⣀⠀⢀⠀⡀⠀⠀⡀⢀⠀⢀⡀⡀⠀⡄⡀⠀⢀⠀⠀⣀⠀⠀⣀⠀⠀⡀⠀⠀⢀⡀⠀⠀⢀⡀⠀ ⠀⠀⠀⠀⠈⠁⠈⠁⠀⠁⠀⠉⠉⠀⠈⠁⠀⠉⠀⠀⠀⠁⠀⠈⠈⠀⠈⠀⠀⠉⠀⠉⠀⠀⠁⠈⠀⠉⠀⠀⠀⠀⠙⠀⠀⠉⠁⠀⠀⠋⠈⠀⠈⠈⠁⠀⠁⠀⠀⠉⠀⠀⠉⠀⠀⠉⠀⠈⠁⠀⠀⠈⠁⠈⠀⠈⠀⠀ ⠀⠀⠀⠀⢀⢀⠀⢀⡀⠀⢠⡠⡀⠀⡀⠀⠀⣀⡀⡀⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠈⠀⠀⠈⠈⠀⠈⠈⠁⠀⠉⠁⠀⠉⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣶⣶⣶⣶⣶⣶⣶⣶⣾⣶⣶⣶⣶⣶⠆⢰⠀⠀⠀⠐⣶⣶ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡋⣺⠀⠀⠀⢠⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⣺⡀⠀⠀⠰⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠟⠉⠛⢻⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡟⢹⠀⠀⠀⠀⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡇⠀⢨⠖⢺⢿⣿⣿⣿⣿⢫⡭⠽⢿⡿⣿⣍⣻⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡗⢽⠀⠀⠀⠰⢿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠇⠀⠀⠄⠐⢸⣿⣿⣿⢏⠘⣗⣛⣛⣚⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣧⢼⠀⠀⠀⠀⣾⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⠀⠀⠀⠀⠀⠀⠉⢭⡷⢣⢸⣷⣶⣶⣒⣻⡇⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣯⢽⠀⠀⠀⠀⢽⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⡀⠀⢠⣤⣴⠞⠃⣬⣶⣿⢸⣗⣒⣒⣶⣿⡇⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡞⢽⠀⠀⠀⠈⢾⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡏⠀⠙⠉⠁⠀⠀⢸⣿⣿⣸⣖⣒⣲⣶⣾⡇⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡇⢸⠀⠀⠀⠀⣾⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⢸⣿⣇⣓⣀⣛⣻⣥⣟⣼⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⢸⠀⠀⠀⠀⢿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⡄⠀⠀⣿⣿⣿⣿⣿⣿⣾⣿⡛⢻⣛⣛⡛⢛⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡞⣺⠀⠀⠀⠀⢿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣶⣶⠌⠀⠀⢰⡇⠀⠀⠛⢿⣿⣿⣿⣿⣿⣷⣷⣶⣾⣶⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⢃⣺⠀⠀⠀⠐⢼⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣶⣾⣦⣤⣴⣤⣴⣤⣤⣤⣤⣮⣯⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠋⢸⠀⠀⠀⠀⢻⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠎⢺⠀⠀⠀⠀⢺⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡜⣸⠀⠀⠀⠀⣮⣿ ⣿⣇⣅⣩⣿⣈⣻⣏⣿⣸⣧⣁⣿⣇⣽⣚⣿⣇⣹⣏⣻⣿⣹⣿⣉⣿⣘⣿⣩⣿⣏⣹⣿⣻⣿⣨⣿⣿⣱⣸⣞⣟⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⠃⢸⠀⠀⠀⢀⣿⣿ ⣿⡿⡿⡿⡿⢿⡿⡿⣿⠿⣿⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣧⡃⢸⠀⠀⠀⢈⣿⣿ ⣿⣧⣼⣧⣤⣿⣧⣧⣦⣼⣥⣽⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠃⢽⠥⠄⡬⠰⣻⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⢔⢹⠁⠀⣯⠸⣿⣿ ⣿⣿⣿⣿⡿⣿⣿⣿⣿⣿⣿⡿⡿⣿⣿⢿⢿⣿⣿⢿⣿⣿⢿⡿⣿⣿⡿⡿⣿⡿⣿⣿⣿⢿⣿⢿⢿⣿⡿⣿⡿⡿⣿⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⠻⣿⣿⣿⣿⣿⣿⣿⡿⣄⢸⣀⣀⣗⢄⣿⣿ ⣿⣿⣿⣧⣾⣿⣯⣾⣯⣯⣿⣿⣽⣿⣿⣷⣾⣿⣿⣴⣿⣷⣷⣼⣷⣿⣾⣦⣿⣯⣾⣿⣾⣾⣯⣿⣾⣷⣮⣿⣿⣦⣯⣼⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⣫⣾⣷⣌⠻⣿⣿⣿⣿⣿⣿⠂⣸⣒⣒⣗⢁⣿⣿ ⣿⣏⣿⡿⣿⣟⣿⠿⣿⣿⡟⢻⣿⣿⣫⣿⢏⣻⣿⢻⣿⡟⣻⡿⣿⡙⣿⣿⣿⣿⠛⣿⣿⣟⢻⣿⣿⣿⡟⣿⣿⢟⢻⡿⣿⡟⠛⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⣫⣾⣿⣿⣿⣿⣷⣌⠻⣿⣿⣿⣿⢄⢸⣒⣒⣗⢩⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡿⢋⣼⣿⣿⣨⣀⣘⣀⣿⣿⣷⣌⠻⣿⣿⢅⢸⠒⠒⣗⢀⣿⣿ ⣿⣇⣸⣿⣽⣿⣽⣮⣀⣧⣿⣿⣟⣹⣿⣻⣿⣿⣉⣿⣯⣫⣽⣿⣿⣍⣿⣿⣿⣗⣿⣯⣟⢹⣿⣿⣿⣩⣻⣿⣿⣽⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⣌⠻⣿⡯⢹⢉⡏⡏⢹⣿⡿⢋⣴⣿⣿⠗⢸⠀⠀⡇⢅⣾⣿ ⣿⣿⠿⢿⣿⠿⣿⢿⣿⡿⠿⣿⣿⠿⣿⡿⢿⣿⡿⠿⣿⣿⡿⠿⢿⣿⡿⣿⡿⢿⣿⣿⢿⠿⣿⣿⣿⣿⠿⣿⣿⣿⢿⣿⠿⢿⣿⢿⣿⣿⣿⣿⣿⣿⣿⣿⣷⣌⠻⣿⣿⣿⣿⡿⢫⣴⣿⣿⣿⣿⢀⢸⠭⠭⡯⢅⣿⣿ ⣿⣿⣷⣿⣷⣿⣿⣽⣿⣷⣾⣾⣿⣿⣿⣿⣿⣿⣾⣾⣷⣿⣷⣶⣿⣿⣷⣿⣿⣿⣿⣷⣾⣴⣷⣿⣿⣿⣿⣷⣿⣿⣿⣿⣷⣾⣿⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⣌⠻⡿⢋⣴⣿⣿⣿⣿⣿⣿⡔⢸⠭⠭⡯⠠⣿⣿ ⣿⣿⡟⡻⣿⣿⡟⣿⡟⢹⣿⢻⣿⣿⡟⣿⡟⢻⡿⣿⣿⡟⢿⣿⣿⣿⡏⣿⣟⣿⣿⠛⣿⣿⣿⢹⣿⣿⡟⣿⣿⠛⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡇⢰⣿⣿⣿⣿⣿⣿⣿⣿⠖⢽⠭⠭⡯⢄⣿⣿ ⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡇⢸⣿⣿⣿⣿⣿⣿⣿⣿⣧⢸⠍⠉⡯⢬⣿⣿ ⣿⣏⣻⣟⡻⣽⣿⣗⣿⣯⣽⣏⣹⣿⣽⣿⣧⣿⣉⣽⣿⣩⣯⣿⣯⣟⣻⣯⣿⣸⣟⣝⣹⣿⣹⣾⣏⣿⣿⣹⣿⣿⣽⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡇⢸⣿⣿⣿⣿⣿⣿⣿⣿⡷⣺⡀⠀⣟⠀⣻⣿ ⣿⡿⢿⣿⡿⠿⣿⣿⣿⣿⣿⡿⢿⣿⡿⢿⣿⣿⠿⣿⡿⢿⣿⣿⣿⣿⢿⠿⠿⢻⣿⡿⡿⢿⣿⡿⢿⣿⡿⣿⣿⡿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⣶⣶⠆⣿⣿⣿⣿⣿⣿⣿⡯⣺⣒⣒⣗⠀⣿⣿ ⣿⣿⣿⣿⣧⣶⣿⣿⣿⣾⣿⣾⣷⣿⣷⣾⣿⣿⣷⣿⣿⣷⣿⣯⣿⣷⣿⣶⣿⣾⣿⣾⣶⣿⣿⣿⣾⣿⣾⣿⣿⣷⣿⣷⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣷⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣿⣿⣿⣇⣺⣒⣒⣗⢈⢼⣿ ⣿⣯⣻⣟⢻⣿⢻⣿⡟⢹⣿⣛⣿⣯⣟⣿⣿⢹⡟⢙⣟⣿⣿⣽⢹⣿⢻⣿⣿⠋⣿⣿⣿⣿⡋⣟⣿⡟⢻⡿⣛⡟⣻⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⢝⢺⣒⣒⣗⠀⣿⣿ ⣿⣿⣿⣿⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡭⢸⠀⠀⡷⠠⣿⣿ ⣿⣟⣿⣿⣃⣻⣿⣉⣽⣿⣹⣾⣿⣵⣯⣿⣯⣹⣟⣯⣫⣟⣯⣿⣸⣿⣟⣿⣿⣻⣛⣿⣿⣡⣿⣮⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡇⢸⠤⠤⡯⠀⣿⣿ ⣿⡿⢿⣿⡿⢿⣿⣿⡿⢿⣿⡿⢿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⢿⢸⠭⠭⡯⠀⣻⣿ ⣿⣿⣿⣿⣾⣾⣷⣿⣷⣾⣿⣿⣾⣿⣷⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡎⢸⠭⠭⡯⠀⣿⣿ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣀⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣤⣄⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣴⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣦⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣼⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣧⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣶⣶⣶⣶⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣶⣶⣶⣶⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠠⣤⣤⣤⣤⣤⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣤⣤⣤⣤⣤⠄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⢻⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡟⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣽⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣯⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣴⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣦⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢻⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⡟⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠻⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠟⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠉⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠛⠉⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⡀⡀⠀⣀⣀⠀⢀⣀⡀⢀⡀⠀⣀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣠⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣀⠀⠀⣀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢰⢳⠇⠈⢁⣼⠃⣾⣀⣿⠀⢻⣰⠏⢀⡴⢦⡀⠴⢲⡄⢰⠴⢠⡖⠦⠀⡴⠲⡄⢺⡗⣴⠀⠐⢰⡖⠚⣦⢰⡆⢰⡆⣿⠀⠀⢰⠀⡦⠲⡆⢰⡄⢰⠀⢦⣰⠆⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⡹⢹⠉⠠⣄⣼⠇⠻⣄⡿⠀⠀⣿⠀⠸⢯⣩⠁⢿⡹⡇⢸⠀⠠⣍⡻⠈⢧⣠⠏⢸⡇⢷⡀⣰⢾⡇⠀⣿⠸⣧⡼⡇⣿⣤⡄⢸⠀⡇⠀⡇⠸⣇⢼⠀⡼⢻⡄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⣶⡆⠀⠀⢰⠀⡀⢀⢰⣀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⠛⠛⠛⠛⠛⠛⠛⢻⣿⡇⠀⠀⠘⠀⠀⠀⠘⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣤⣤⠀⠀⠀⠀⠀⠀⠀⢸⣿⡇⠀⠀⠀⠄⠀⠀⡄⢠⠀⡄⠠⠀⡄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⠀⠀⠀⠀⠀⠀⠀⢸⣿⡇⠀⠀⠀⠀⠍⠄⠣⠈⠀⠇⠠⠀⠇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⠀⠀⠀⠀⠀⠀⠀⢸⣿⡇⠀⢀⣀⠀⠀⠀⠀⠀⡀⠀⢀⢀⡀⠀⢀⠀⣀⡀⠀⠀⡀⢀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣿⣿⣿⣿⣿⣿⣿⠀⣿⣿⣿⡇⠀⢸⠀⢸⠀⢸⠀⠀⡇⠐⢸⠀⠀⡁⠄⢆⢸⠀⡷⠀⢈⢸⠠⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠀⠀⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠈⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ䷩ 𝚕𝚒𝚗𝚎 1121 ╒═══════════════════ 𝐀𝐑𝐓𝐈𝐂𝐋𝐄 ═════════════════════════════════════════════════╕ (ℹ) Images, hyperlinks and comments at http://techrights.org/2021/08/24/irc-log-230821/#comments Gemini version at gemini://gemini.techrights.org/2021/08/24/irc-log-230821/ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 08.24.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ Gemini_version_available_♊︎ ✐ IRC_Proceedings:_Monday,_August_23,_2021⠀✐ Posted in IRC_Logs at 2:13 am by Needs Sunlight Also available via the Gemini protocol at: * gemini://gemini.techrights.org/tr_text_version/irc-log-techrights- 230821.txt * gemini://gemini.techrights.org/tr_text_version/irc-log-230821.txt * gemini://gemini.techrights.org/tr_text_version/irc-log-social-230821.txt * gemini://gemini.techrights.org/tr_text_version/irc-log-techbytes- 230821.txt 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇H 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇HTML5_logs⦈_ #techrights_log_as_HTML5 #boycottnovell_log_as_HTML5 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇H 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇HTML5_logs⦈_ #boycottnovell-social_log_as_HTML5 #techbytes_log_as_HTML5 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇t 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇text_logs⦈_ #techrights_log_as_text #boycottnovell_log_as_text 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇t 🄸🄼🄰🄶🄴_🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽_⦇text_logs⦈_ #boycottnovell-social_log_as_text #techbytes_log_as_text Enter_the_IRC_channels_now =============================================================================== § IPFS Mirrors⠀➾ CID Description Object type IRC log for  QmUHqzQmhLxc8sJMgBSmB2kw7rXWt2r3sTU8FS3ecTLYfM #boycottnovell 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇HTML5 logs⦈ (full IRC log as HTML) IRC log for #boycottnovell  QmRw3Zk99EfyNqpZcm17ACiBwst9FWGm7JW2WE7GyeU9Pj (full IRC log 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇text logs⦈ as plain/ASCII text) IRC log for #boycottnovell-  Qme4b2zriqAenJNvRyiwbEdQ1JVaeLjdyQwFp1Tsbysm1Z social 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇HTML5 logs⦈ (full IRC log as HTML) IRC log for #boycottnovell-  QmX5BZ5oiW6GN1SeswuV1gndqYzEemB9sTFatRc58e9c52 social 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇text logs⦈ (full IRC log as plain/ASCII text) IRC log for  QmYGAct1ZL5tMF2Ct4pn8pJf7HBhyzp58nFDS7yXtqay3s #techbytes 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇HTML5 logs⦈ (full IRC log as HTML) IRC log for #techbytes  QmezyndoJfh4hv7CLEjcmK9Fdfe3MbgHYuJL9epL9yDxTz (full IRC log 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇text logs⦈ as plain/ASCII text) IRC log for  QmP8ND2SvtpeopU97c4MF3KTSG1kXUqw5EmSXabHcnzu1G #techrights 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇HTML5 logs⦈ (full IRC log as HTML) IRC log for #techrights  QmWS5hCoAtaLBzSGckFzCwwzjTEsNWyLV2nWM6KfJ7TwiN (full IRC log 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇text logs⦈ as plain/ASCII text) 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇IPFS logo⦈ § Bulletin for Yesterday⠀➾ Local_copy | CID (IPFS): QmYGEn3vvtL9MNwJ6i1VEHszMRzevprL1qcHGvx2WA4383 ䷩ 𝚕𝚒𝚗𝚎 1247 ╒═══════════════════ 𝐃𝐀𝐈𝐋𝐘 𝐋𝐈𝐍𝐊𝐒 ═════════════════════════════════════════════╕ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 08.24.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ Gemini_version_available_♊︎ ✐ Links_24/8/2021:_Escuelas_Linux_7.1_and_Clonezilla_Live_2.7.3⠀✐ Posted in News_Roundup at 5:31 pm by Dr. Roy Schestowitz 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇GNOME bluefish⦈ § Contents⠀➾ * GNU/Linux o Distributions o Devices/Embedded * Free_Software/Open_Source * Leftovers * § GNU/Linux⠀➾ o § Audiocasts/Shows⠀➾ # ⚓ WOW!_Borderlands_3_with_AMD_FSR_on_Linux_–_Invidious⠀⇛ I’ve gone down the AMD FSR rabbit hole, and I am a happy Linux gamer! Before I kick off the FSR deep dive and guide, here’s a look at how it makes a meaningful difference on 2 different PCs! # ⚓ Enterprise_Linux_Security_–_Episode_02:_Attack_Vectors_– Invidious⠀⇛ Regardless of your role in your company, understanding the various types of attack vectors is extremely important. In this episode of Enterprise Linux Security, Jay and Joao discuss the most common attack vectors that are used today, which will set the foundation for future episodes. # ⚓ Debian_11_Quick_overview_#Shorts_–_Invidious⠀⇛ The Debian Project is an association of individuals who have made common cause to create a free operating system. This operating system is called Debian. Debian systems currently use the Linux kernel. Linux is a completely free piece of software started by Linus Torvalds and supported by thousands of programmers worldwide. Of course, the thing that people want is application software: programs to help them get what they want to do done, from editing documents to running a business to playing games to writing more software. Debian comes with over 50,000 packages (precompiled software that is bundled up in a nice format for easy installation on your machine) – all of it free. It’s a bit like a tower. At the base is the kernel. On top of that are all the basic tools. Next is all the software that you run on the computer. At the top of the tower is Debian — carefully organizing and fitting everything so it all works together. o § Kernel Space⠀➾ # ⚓ Linux_turns_30 [Ed: GNU/Linux is nearly 38; at least this article mentions_the_GPL,_GNU_and_Stallman]⠀⇛ Something happened back in 1991 that dramatically changed the future of computing. Linus Torvalds, a Finnish-American software engineer, released the Linux kernel and the second version of the GNU General Public License (GPLv2). A good portion of the technology we use today would not be what it is had this not happened. It all started on August 25th of that year when Torvalds announced in a usenet post that he was working on a free OS and that it would be ready within a few months. He also said it “won’t be big and professional like gnu,” but that wasn’t exactly how things turned out! o § Applications⠀➾ # ⚓ Psst_–_New_Native_Spotify_App_for_Linux,_Built_in_Rust_& GTK⠀⇛ For those don’t like Electron apps, ‘Psst’ is a new GTK client for the Spotify music service. Since the official Spotify app for Linux is a web app running via Chromium engine, native Linux apps may be preferred. And ‘Psst’ is a free open-source app written in Rust programming language with GTK framework for user interface. Besides Linux, it also works on Windows and macOS. o § Instructionals/Technical⠀➾ # ⚓ How_To_Install_Parallels_Plesk_Panel_on_CentOS_&_RHEL_8_– Unixcop⠀⇛ Plesk Panel is a commercial web hosting and server data center automation software. In this article, you will learn how to install Plesk Obsidian on CentOS / RHEL 8. It’s a centralized Control Panel. You can build and manage multiple sites from a single dashboard. You can also run updates, monitor performance and onboard new prospects all from the same place. # ⚓ How_to_set_up_and_use_the_Fragments_BitTorrent_Client_on Linux⠀⇛ Are you looking for an easy-to-use, beautiful BitTorrent client for the Gnome desktop? Check out Fragments! It’s a simple, useful GTK3-based torrent client for Gnome. Here’s how to set it up on your system. Notice: AddictiveTips in no way condones the download of illegal content with the Fragment torrent client. Only use this program to download legal files, such as Linux distribution or other open-source software apps. # ⚓ How_to_Instantly_Log_Out_of_Ubuntu_From_a_Terminal_–_OMG! Ubuntu!⠀⇛ There are a several ways to log out of an Ubuntu desktop session you’re using, but most are so obvious you don’t need a guide that points them out to you! But what you may not know is how to logout of Ubuntu from a terminal (or log out of GNOME on any Linux distro that uses it). I didn’t until around a minute ago. # ⚓ How_to_install_and_use_Backports_in_Debian_11_Bullseye_– Linux_Shout⠀⇛ The applications installed in the stable version of Debian don’t get new version updates immediately to maintain the high stability of the system. However, that is not the case with the security updates maintained by the Debian security team. So, what to do to get the new features for installed software because it is not possible for us to compile each software manually to achieve its latest version. This is exactly where the backports come into play. # ⚓ Deploy_this_powerful_open-source_invoicing_system_to_your data_center_–_TechRepublic⠀⇛ Recently, I realized I was having to work too hard to invoice all of my various clients. I’d been using the same old spreadsheets for years, but it was getting a bit too cumbersome to deal with. I could have turned to a commercial platform for this, but given open-source was my jam, I figured it would be even better to find a solid solution for my on-premise virtual data center. Turns out, there’s a rock-solid tool, called Invoice Plane, that’s just the ticket. Invoice Plane includes the necessary features for you to manage invoices, such as easy invoicing, customer management, payment tracking and quotations. It might not have all of the bells and whistles associated with larger, commercial tools, but of the open-source options I’ve found, this is (by far) the best. # ⚓ OpenGL_Error_After_Upgrade_on_Ubuntu,_Game_on_Steam_Won’t Run!_–_Fosslicious⠀⇛ This happened when I finished upgrading Ubuntu 20.04. On the list of updates, there is an update of Mesa to the version provided in the Ubuntu repositories. However, after the upgrade, All games running on Wine and Proton can’t open properly. When opening game with Wine via terminal, there is information: X Error of failed request: GLXBadFBConfig. So, the problem is that all games can’t run on Wine and Proton. I tried searching the forums and saw some Ubuntu users’ posts with the same problem. However, none of them could solve this problem on my computer. This makes me frustrated and regrets why I have to upgrade Mesa, if the package will error on my laptop. # ⚓ Connecting_a_Wireless_Adapter_To_Kali_Linux_Virtual Machine⠀⇛ In “Network hacking,” most people get confused when talking about Network adapters and Network cards. Most don’t know what they are, why we need them, and how to select the best adapter since we have so many brands and models available in the market. A wireless adapter is a device that you connect to your computer via the USB port, and it allows you to connect to WiFi networks and communicate with other devices on the network. o § Desktop Environments/WMs⠀➾ # § K Desktop Environment/KDE SC/Qt⠀➾ # ⚓ Ezike_Ebuka:_Week_10_11_kdesoc⠀⇛ As the end of google summer of code draws near most of the time is used to write test, fix bugs and possibly add new printers. For classes that works with OS paths, i had to make the path consisistent between operating systems see the commit below. # § GNOME Desktop/GTK⠀➾ # ⚓ HighContrast_Variants_For_Adwaita-Qt⠀⇛ In the past we used to have a completely different project to cover HighContrast variants of GTK Adwaita theme. This was all implemented as Highcontrast-qt, a project nobody has touched for 6 years. You can imagine how it looks like these days when you compare it to what we have now. I think even GTK variant of HighContrast was a completely separate theme back then, while today days it’s just Adwaita with a different set of colors. Since GTK made the new HighContrast theme with just few modifications to the original Adwaita theme, I decided to use same approach and have Adwaita-qt to provide all four variants as well (Adwaita, Adwaita-dark, HighContrast and HighContrastInverse). While this looks like a simple thing to do, as you just need to add additional color palette, it was a pain to do it in Adwaita-qt. The reason is that Adwaita-qt is full of hardcoded color definitions, where all of them were randomly taken from GTK Adwaita stylesheets. Everytime something changed in GTK Adwaita, we would have to manually pick the change and replace the changed color value on our side. This was not really sustainable, especially when I wanted to have four different variants. # ⚓ No_place_like_GNOME:_41_is_in_beta,_features_frozen for_forthcoming_release⠀⇛ he next release of the GNOME desktop, version 41, is now in beta and its features and API are frozen. GNOME 40 was released in March and, despite the huge leap in version number, was not intended to radically different from the 3.x line in the same way as GNOME 2 and 3 were. “Radical technological and design changes are too disruptive for maintainers, users, and developers,” said Emmanuele Bassi from the GNOME Team. He expressed the view that 4.0 would be perceived as more different than 40, which was intended to express merely that this was roughly the 40th release of GNOME (actually the 41st according to Bassi). Version 40 did, nevertheless, introduce quite a few changes to app-launching and navigation, as well as for the core apps. There is also an associated update of GTK (GNOME Toolkit) to version 4.x and the combination justified some caution before moving, such as from Canonical developer Sebastien Bacher who declared in January that “there are quite some moving parts in GNOME 40,” considering both the new shell design and GTK4, concluding that Ubuntu would stick to GTK3 and GNOME 3.38 for version 21.04. o § Distributions⠀➾ # ⚓ Educational_Distro_Escuelas_Linux_7.1_Comes_with_Linux Kernel_5.11,_Updated_Apps⠀⇛ Escuelas Linux 7.1 comes only one and a half months after the major Escuelas Linux 7.0 release and introduces a newer kernel, Linux 5.11, from the upcoming Ubuntu 20.04.3 LTS (Focal Fossa) point release. Of course, Escuelas Linux 7.1 is still derived from Bodhi Linux 6.0 and uses the latest Moksha (version 0.3.3-13) graphical desktop environment. Updated educational apps in Escuelas Linux 7.1 include Blender 2.93.3 3D modeling software, eXe Learning 2.6 software for creating educational interactive web content, GeoGebra 5.0.650 interactive geometry, algebra, statistics and calculus application, Inkscape 1.1.1 vector graphics editor, LiveCode 9.6.3 and Scratch Desktop 3.25 IDEs, LibreOffice 7.2 office suite, and Veyon 4.5.6 computer monitoring and classroom management tool. # § New Releases⠀➾ # ⚓ Clonezilla_Live_2.7.3_Disk_Cloning/Imaging_Tool Released_with_Various_Improvements⠀⇛ Coming almost three months after Clonezilla Live 2.7.2, the Clonezilla Live 2.7.3 release is here with an up-to-date package base that was synced with the Debian Sid (Unstable) software repository as of August 17th, 2021, an a newer kernel based on Linux 5.10.46 LTS. Clonezilla Live 2.7.3 is not a major release, but it includes some important improvements to make your disk cloning/imaging experience better. For example, it introduces a mechanism in the ocs-clean-disk-part-fs (formerly ocs-clean-part-fs) tool to clean the RAID metadata in disk, a new program to expand LVM (Logical Volume Manager) called ocs-expand-lvm, as well as support for mounting BitLocker (Windows 10) devices as image repositories. # § Screenshots/Screencasts⠀➾ # ⚓ SparkyLinux_6.0⠀⇛ Today we are looking at SparkyLinux 6.0, KDE. It comes with Linux Kernel 5.10, KDE Plasma 5.20, and uses about 1GB of ram when idling. Enjoy! # ⚓ KaOS_2021.08_Run_Through_–_Invidious⠀⇛ In this video, we are looking at KaOS 2021.08. Enjoy! # § SUSE/OpenSUSE⠀➾ # ⚓ Wayland_Display_Server_on_openSUSE_Tumbleweed_in 2021⠀⇛ I became aware of the Wayland Display Server project in 2012 when I was playing with using DisplayLink on openSUSE. I was told that when Wayland is released, it would fix my woes. Nine years later, it was time to give Wayland an honest go with openSUSE again. The impetus behind it was curiosity since it is in the news a lot and I have heard so many good things about it. Making the switch on openSUSE running KDE Plasma was as easy as selecting a drop down on the login screen and using the “Wayland” session instead of the X11 session. For the most part, the experience looked the same to my non-picky eyes. Though, I can say, there was something subtly smoother about the interface. Making sure I wasn’t crazy, I went back and forth between X11 and Wayland and sure enough, there is a kind of smoothness to Wayland. # ⚓ SUSE_Linux_Enterprise_Server_15_SP2_is_Now_EAL_4+ Level_Certified_for_IBM_Z,_Arm,_and_x86-64⠀⇛ SUSE has announced that its flagship Linux distribution has earned Common Criteria EAL 4+ certification. SUSE Linux Enterprise Server (SLES) 15 SP2 is now EAL 4+ level certified for IBM Z, Arm, and x86-64 architectures, signifying compliance with the demanding security requirements for mission- critical infrastructure. SUSE’s Common Criteria EAL 4+ software supply chain certification includes secure production, delivery of updates, and protection of critical digital assets. # ⚓ ‘When_You_Come_to_a_Fork_in_the_Road,_TAKE_IT!’⠀⇛ For close to 30 years, SUSE has excelled at helping businesses choose an Open path. From the industry’s most adaptable Enterprise Linux to a leading Container Management solution providing full management of all Kubernetes distributions, SUSE enables customers to choose the right combination of technology and solutions to ensure their business success. To provide our customers with choice, SUSE has led enablement of and works across all major processor instruction set architectures (ISAs). As such, SUSE Linux Enterprise Server is available across x86_64, arm64, POWER and z/Architecture today with our container management solutions expanding its availability (currently on x86_64 and arm64) to include IBM ISAs as well. (See associated blog post by my colleague Michael Friesenegger for more details on Rancher on IBM System Z and LinuxONE). # § Debian Family⠀➾ # ⚓ Top_12_Things_To_Do_After_Installing_Debian_11_ (Bullseye)⠀⇛ Good news for Debian users as Debian 11 was released a few days back. Code name “Bullseye”, Debian 11 comes packed with lots of goodies and exciting new updates. Debian is one of the best Linux distros available, but you need to spend some time to customize Debian according to your requirement. If you haven’t installed Debian 11 yet, please take a look at our “How to Install Debian 11 Step by Step” in your system. In this article, we’ll look at the top 12 things to do after installing Debian 11 (Bullseye). # ⚓ The_mystery_of_Bullseye_wi-fi_device_not_ready⠀⇛ What about other Bullseye-based pups? Puppy Forum member ‘josejp2424′ has created DevuanPup, built with the Chimaera release of devuan — which is the same as Debian Bullseye, just without systemd. # ⚓ DebConf21_Kicks_Off_Online_For_Annual_Debian Conference_–_Phoronix⠀⇛ DebConf21 officially got underway this morning with being a second year of this annual Debian conference being held exclusively online due to the ongoing COVID- 19 pandemic. DebConf21 has an action-packed week of talks around Debian Linux and related open-source projects. This time around the event is happening just days after the release of Debian 11. # § Canonical/Ubuntu Family⠀➾ # ⚓ Early_Ubuntu_21.10_Performance_Is_Looking_Good_– Especially_For_Radeon_Graphics⠀⇛ While there is still two months to go until the Ubuntu 21.10 “Impish Indri” release, since the feature freeze has now begun I’ve started some early testing of this next Ubuntu release. So far things are looking good as a nice upgrade over Ubuntu 21.04 and prior. Here is the first round of Ubuntu 21.04 vs. 21.10 development tests using an AMD Ryzen 9 5950X with Radeon RX 5700 XT graphics. # ⚓ Atresmedia_modernises_Spain’s_most_popular_streaming platform_with_Canonical_Charmed_Kubernetes_|_Ubuntu⠀⇛ The streaming service for the leading communication group in Spain leaves behind outdated applications and adopts a microservices architecture enabled by Canonical. SPAIN, August 24, 2021— Canonical, the publisher of Ubuntu, announces that Atresmedia, the leading company in the Over- The-Top (OTT) services market in Spain, selected its Charmed Kubernetes to build a new microservice-based architecture for the communication group’s streaming platform, ATRESplayer. Despite the strong presence of competitors from all over the world, ATRESplayer is the most popular streaming platform in Spain, with more than 8.6 million registered, offering quality content such as La Casa de Papel (Money Heist), #LUIMELIA, Veneno and many more. Having a monolithic architecture in environments that couldn’t be upgraded easily, became a significant drawback for ATRESplayer. The architecture prevented Atresmedia’s content management solution from operating effectively and only offered limited scalability, making it difficult for the streaming platform to cope with peaks in demand during live broadcasts that generate high traffic. o § Devices/Embedded⠀➾ # ⚓ RPi_CM4_powered,_15.6-inch_AiO_offers_optional_NVMe⠀⇛ Chipsee’s $339 “AIO-CM4-156” system runs on a Raspberry Pi CM4 and offers a 15.6-inch, HD display with protected glass and optional touch support plus GbE, HDMI, 2x USB 3.0, NVMe-ready M.2, and 40- pin GPIO. Earlier this year, Chipsee launched a $239, 10.1- inch All-In-One Pi (AIO-CM4-101) computer built around the Raspberry Pi Compute Module 4. Now it has introduced another CM4-based All-in-One system. The $339 AIO-CM4-156 moves up to a 15.6-inch display and unlike the earlier model offers USB 3.0 and NVMe support. The computer is preloaded with Raspberry Pi OS (Raspbian) and includes all necessary drivers. # ⚓ Predicting_a_lithium-ion_battery’s_life_cycle_with_tinyML_| Arduino_Blog⠀⇛ Nothing is perhaps more frustrating than suddenly discovering your favorite battery-powered device has shut down due to a lack of charge, and because almost no one finds joy in calculating how long it will live based on current consumption levels/time used, there must be a better way. This problem is what inspired Manivannan S. to create a small project that can predict when a battery is about to go flat using the “magic” of machine learning and a voltage sensor. The circuit for the project is quite basic, consisting of an Arduino Nano 33 BLE Sense, a 125 ohm rheostat, a voltage sensing module, and finally the rechargeable 18650 Li-ion cell. The discharge current of the battery was set at 1 ampere with the rheostat, at which time the voltage output was sampled continuously for 30 minutes at a rate of one reading per minute. This data was imported into Edge Impulse’s Studio and used to train a regression model that can predict the estimated voltage and therefore also the capacity remaining. # ⚓ Tiger_Lake_signage_player_can_drive_quad_4K_or_single_8K displays⠀⇛ Ibase’s fanless, Linux-ready “SI-654-N” signage player runs on an 11th Gen CPU with up to 64GB DDR4, 2x GbE, 3x USB 3.1 Gen2, 3x M.2, and 4x HDMI ports with audio, EDID, and CEC. Ibase announced a digital signage player based on Intel’s 11th Gen Tiger Lake UP3 platform that follows its 8th Gen Whiskey Lake based SI-642-N. The SI-654-N features quad display support via 4x HDMI 2.0 ports and runs Ubuntu or Win 10 IoT Enterprise along with Ibase’s iSMART intelligent energy-saving and Observer remote monitoring software. # ⚓ Wacom_CTL_472:_I_Finally_Bought_A_Drawing_Tablet!_– Invidious⠀⇛ I’ve been wanting to buy a drawing tablet for a really long time and I finally bought myself a wacom ctl 472, mainly because it’s a great tablet but just as importantly it works amazingly under linux. I like to play a bit of Osu, I wanted to get into digital art so it made sense to finally get one. # ⚓ Coin_cell-powered_OpenThread_sensor_board_can_send_data every_20_seconds_for_three_years⠀⇛ Monkey Store’s Thread Sensor Tag is a pressure, humidity, temperature, and light sensor that connects to the OpenThread network, and is capable of transmitting MQTT/UDP data every 20 seconds over a period of around three years from a single coin cell battery. As a reminder, OpenThread is an implementation of the Thread IoT network protocol that was unveiled in 2016 by Nest Labs (now Google/Alphabet). This has not been widely used so far, but we did write about MKR SharkyPro development board with OpenThread support via STMicro STM32WB5MMG wireless module earlier this year, and Monkey Store is telling us both Google and Apple are working on devices with support for the IoT protocol. # § Mobile Systems/Mobile Applications⠀➾ # ⚓ Samsung_Galaxy_Watch_4_review:_The_standard_for Android_smartwatches_|_CNN_Underscored⠀⇛ # ⚓ Samsung_users_get_a_taste_of_Google’s_new_Material You_design_for_Android_12_–_SamMobile⠀⇛ # ⚓ Which_OnePlus_Phones_Will_Get_the_Android_12 Update?⠀⇛ # ⚓ Unlocked_Galaxy_A20_Units_In_The_US_Are_Getting Android_11⠀⇛ # ⚓ Snapchat_Dark_mode_for_Android_phones:_Here’s_how_to get_the_feature⠀⇛ # ⚓ How_to_check_battery_health_on_your_Android_phone_– Phandroid⠀⇛ # ⚓ Room_Remote_Comes_to_Teams_Rooms_on_Android_–_UC Today⠀⇛ o § Free, Libre, and Open Source Software⠀➾ # ⚓ Haiku_activity_report_–_Summer_2021⠀⇛ Hi there, let’s do another activity report! You may have noticed that there were a lot of news since the previous one, but here’s a recap in case you missed it: a new beta release, the celebration of the 20th birthday of the Haiku project, the end of Google Summer of Code (final evaluations are being filled in as I write this), and also news from the promotion team which was re-launched a few months ago and is working on various things (read their own report for more details). What’s nice for me is that this was all already covered by various articles, which means I can focus on what I know best, and take a look at what’s happening in the git repository with the code. This report covers hrev55224-55342. # ⚓ Haiku_OS_Gets_TRIM_Working_For_SSDs,_Continues_Bringing_Up RISC-V_Support_–_Phoronix⠀⇛ The Haiku open-source operating system project that continues advancing as the virtual successor to BeOS has been enjoying a successful summer. Along with Haiku R1 Beta 3 having been released at the end of July, there has been a lot of other activity this summer. The Haiku project just published their 2021 summer recap with some of the highlights including: # § Web Browsers⠀➾ # § Mozilla⠀➾ # ⚓ Henri_Sivonen:_The_Text_Encoding_Submenu_Is Gone⠀⇛ Firefox 91 was released two weeks ago. This is the first release that does not have a Text Encoding submenu. Instead, the submenu has been replaced with a single menu item called to Repair Text Encoding. It performs the action that was previously performed by the item Automatic in the Text Encoding submenu: It runs chardetng with UTF-8 as a permitted outcome and ignoring the top- level domain. The Repair Text Encoding menu item is in the View menu, which is hidden by default on Windows and Linux. The action is also available as an optional toolbar button (invoke the context menu on empty space in the toolbar and choose Customize Toolbar…). On Windows and Linux, you can invoke the menu item from the keyboard by pressing the v key while holding the alt key and then pressing the c key. (The keys may vary with the localization.) # ⚓ Mozilla_Performance_Blog:_Performance_Sheriff Newsletter_(July_2021)⠀⇛ In July there were 105 alerts generated, resulting in 20 regression bugs being filed on average 6.6 days after the regressing change landed. Welcome to the July 2021 edition of the performance sheriffing newsletter. Here you’ll find the usual summary of our sheriffing efficiency metrics, followed by some details on how we’re growing the test engineering team. If you’re interested (and if you have access) you can view the full dashboard. # ⚓ Here’s_what_I_learned_from_reading_dozens_of essays_about_the_internet⠀⇛ This past graduation season, Mozilla’s Pocket teamed up with Her Campus for The Future Connection, a writing contest for college students to reflect on what it’s like to come of age in a “hyper-online and always-connected world.” While this isn’t a new concept for them — this generation, including our essay contest winner, Ester Omole, were born into a digital society — the postponement and outright cancelation of in-person graduations and prom- nights because of COVID-19, made the last truly “offline” rites of passage to adulthood into virtual events. # § SaaS/Back End/Databases⠀➾ # ⚓ PostgreSQL:_New_pg_msvc_generator_tool_available⠀⇛ I’m pleased to announce the release of pg_msvc_generator, version 1.0.0 beta. pg_msvc_generator is a new tool created to help extension authors to provide Windows versions of their extensions. It’s written in Perl and is open source with a PostgreSQL license. You can refer to the project’s README for a complete description, or the bug tracker if you experience any problem. # § Productivity Software/LibreOffice/Calligra⠀➾ # ⚓ Hypra_joins_the_Advisory_Board_of_The_Document Foundation⠀⇛ Hypra is a French social-impact company with a specific competence in hardware and free software accessibility. Its mission is to make IT accessible to everyone – especially seniors, people with disabilities and first- time users – through a universal design approach. By relying mainly on free software, Hypra is giving back users full control over their personal data, and making them part of a global project for a “digital common good”. Hypra was founded in 2015 by Corentin Voiseux and Jean-Philippe Mengual, and is based in Paris. The company provides hardware solutions for seniors and people with disabilities, supported with training and technical assistance, and enterprise solutions to facilitate the integration of people with disabilities into the business world. # § Programming/Development⠀➾ # ⚓ Rewriting_My_Website_In_Org_Mode_–_Invidious⠀⇛ In the last few days, I spent some time rewriting my website. I wanted to move over to a completely Emacs/Org-based website where I write everything in Org mode and then use Org Publish to convert everything to HTML. This is fantastic since I write everything in Org. All of my past show notes that I wrote in Org can now be easily added to my website. # § Perl/Raku⠀➾ # ⚓ gfldex:_Dynamic_declaration⠀⇛ Shortly after my last blog post, Stashes raised a question. Coincidence? Conspiracy? You decide! Anyway, the EVAL caught my eye, because with it we can dynamically create compile time constructs such as a package. # § Shell/Bash/Zsh/Ksh⠀➾ # ⚓ zbarimg_and_blurry_QR_codes⠀⇛ This is a tinkering post about zbarimg (from the zbar suite of barcode tools) and its ability to read QR code images. Because there are so many possible ways to produce an image of a QR code, I decided to start with a readable image and progressively degrade it, to see what happened. * § Leftovers⠀➾ o § Integrity/Availability⠀➾ # § Proprietary⠀➾ # § Security⠀➾ # ⚓ FluBot_Android_malware_now_targets_UK_banks⠀⇛ FluBot has built up a community of compromised Android phones in the UK since April and in the past 24 hours has commenced monetising them by sending overlays for British Banks. FluBot first appeared in 2020, targeting mainly Spanish banks, but recently it has spread its reach, with Australian, German and Polish banks all affected within the last few weeks. UK banks are now firmly in its sights, with HSBC and Santander the first to be affected, and Lloyds and Halifax following shortly after. # ⚓ Security_updates_for_Tuesday⠀⇛ Security updates have been issued by Debian (ledgersmb, tnef, and tor), Fedora (nodejs-underscore and tor), openSUSE (aws-cli, python-boto3, python-botocore,, fetchmail, firefox, and isync), SUSE (aws-cli, python- boto3, python-botocore, python- service_identity, python-trustme, python-urllib3 and python-PyYAML), and Ubuntu (linux-aws-5.8, linux-azure-5.8, linux-gcp-5.8, linux-oracle-5.8). # ⚓ Red_Hat_Announces_Second_FIPS_140-2_Validation for_RHEL_8_–_Database_Trends_and_Applications⠀⇛ Red Hat has announced the renewal of the Federal Information Processing Standard 140-2 (FIPS 140-2) security validation for Red Hat Enterprise Linux 8.2. As the second FIPS certification for the Red Hat Enterprise Linux 8 platform, the company says this validation indicates Red Hat’s leadership and commitment to providing a more secure backbone for the innovation of open hybrid cloud. # ⚓ ISTIO-SECURITY-2021-008⠀⇛ Envoy, and subsequently Istio, is vulnerable to six newly discovered vulnerabilities (note that Envoy’s CVE- 2021-32779 is merged with Istio’s CVE- 2021-39156)… # ⚓ Istio_/_Announcing_Istio_1.9.8⠀⇛ This release fixes the security vulnerabilities described in our August 24th post, ISTIO-SECURITY-2021-008 as well as a few minor bug fixes to improve robustness. This release note describes what’s different between Istio 1.9.7 and 1.9.8. # ⚓ Istio_/_Announcing_Istio_1.11.1⠀⇛ This release fixes the security vulnerabilities described in our August 24th post, ISTIO-SECURITY-2021-008. This release note describes what’s different between Istio 1.11.0 and 1.11.1. # ⚓ Istio_/_Announcing_Istio_1.10.4⠀⇛ This release fixes the security vulnerabilities described in our August 24th post, ISTIO-SECURITY-2021-008 as well as a few minor bug fixes to improve robustness. This release note describes what’s different between Istio 1.10.3 and 1.10.4. # ⚓ Hackers_Could_Increase_Medication_Doses_Through Infusion_Pump_Flaws⠀⇛ # ⚓ Samsung_can_remotely_disable_their_TVs worldwide_using_TV_Block⠀⇛ # ⚓ Samsung:_We_will_remotely_brick_smart_TVs looted_from_our_warehouse⠀⇛ o § Defence/Aggression⠀➾ # ⚓ The_Father,_The_Son,_and_The_Mencius_Moldbug⠀⇛ Norman Yarvin’s Yarchive.net has instructions to help you make, design or/and detonate dry ice bombs, ammonium nitrate, H-6 (aluminized explosives), fertilizer bombs, thermite, TNT, and nitroglycerine, just to name a few. These “insightful” posts that Norman has taken the time to save forever were not written by anonymous anarchists, either. Rather, these posts were written by experts such as Arno Hahma, who now works for German missile company Dhiel BGT Defence; Gerald “Jerry” Hurst, the chemist, explosive expert, defence contractor, and inventor of a binary explosive device known as the Kinepak; and Timothy Melton, who is now a Deputy at Oklahoma County Sheriff’s Office as well as member of the bomb squad and part of the Technology Services Unit. The experts on Usenet discussed in detail about how to make explosives and how to detonate them under such subject headings as: “Homemade Bomb Recipe for Prisoners”, “Booby Traps”, and “Napalm Recipe (Use Extreme Caution)”. After Usenet boomed in the 1980s, it was no longer just a select few professionals with access to this information. On 26 December 2000, a man named Michael McDermott shot and killed 7 co-workers at a tech company called Edgewater based in Wakefield, Massachusetts. McDermott claimed that God had agreed to give him a soul if he travelled through time and killed Hitler and his top men to stop the Holocaust from happening. His computers, which were seized after the Wakefield Massacre, showed McDermott had purchased a clinical textbook on malingering and searched the Internet for materials on “how to fake mental illness.” McDermott was also a regular on the more alternative Usenet newsgroups, posting under the name “Mucko”. Mucko posted 23 times to alt.engr.explosives, 5 times to alt.tasteless.jokes, and 3 times to alt.humor. It was also noted on Gwern.net that “he says nothing interesting”. Even though McDermott didn’t really add anything of note to the online discussions on Usenet, the Usenet newsgroups like alt.engr.explosives saw experts in explosives give tactical training and advice to anyone who had internet access. Directly after the Wakefield Massacre took place, George Herbert, the author of the Pipe Bomb posts archived on Yarchive.net, discussed the press coverage of the shooting and the fact that Michael “Mucko” McDermott had been a regular visitor to their alt.engr.explosives Usenet newsgroup. He stated that “It has always been a struggle in this group for the professionals and serious safe amateurs present to carry on discussions without providing useful information to the dangerous uneducated amateur pyros and those with malign intent. Those readers have always been literally and figuratively looking over our shoulders as we participate here. Every time I post, I think ‘Is what I am posting here going to lead some kid to blow himself up, or someone to blow someone else up on purpose?’” Regarding McDermott’s posts, George Herbert goes on to say: “My reading of those posts indicates that McDermott came to Usenet with fairly extensive prior knowledge of at least some aspects of explosives (chemical compounds used in professional and military explosives, some of their detailed characteristics).” George Herbert would finish his piece by saying, “I think that, in retrospect, I see no evidence that McDermott showed signs of being dangerous or violent, anything at the time as other than just another newsgroup user. Usenet doesn’t always offer a good window into people’s souls.” Where Usenet may not be a good window into people’s souls, personal Usenet Archives such as Yarchive.net can be a good window into people’s interests. o § Monopolies⠀➾ # § Patents⠀➾ # ⚓ Carve_outs_and_Causation:_Moving_Away_From Hypothetical_Hatch-Waxman_Infringement⠀⇛ The Hatch-Waxman Act allows the FDA to permit a generic version of a branded product, which is partially patent protected, to come to market if the generic manufacturer “carves out” the patent-protected indication from its label. The scope of protection from a finding of induced infringement afforded to generic manufacturers by this “skinny label” provision has, however, engendered significant debate. In two recent decisions, the U.S. Court of Appeals for the Federal Circuit and the Delaware District Court have addressed this very important issue. Both decisions are particularly noteworthy as they do not involve the more typical Hatch-Waxman case, which requires an analysis of a hypothetical post-FDA approval world wherein the generic product can be marketed. Instead, the generic products at issue in these cases were FDA approved and being sold, and that has triggered a discussion regarding causation and opened the doors to novel claims of infringement. # ⚓ A_Nose_of_Wax_and_Splitting_Hairs⠀⇛ CommScope and Dali are competing in the wireless communications infrastructure market. Both of the parties are making distributed antenna systems that allow for seamless wireless communications within a wide area. CommScope has 30,000 employees and is a Goliath. Although Dali’s CEO Albert Lee has no sling+pebble, he does have a potential secret weapon. Lee is a former patent attorney. The two companies have been battling in court and before the PTAB for the past several years. In 2019, CommScope sued Dali for patent infringement (asserting five different patents); Dali counterclaimed asserting two of its own patents. A jury agreed, and found that both sides were infringing. N.D.Tex. Chief Judge Lynn denied the cross-JMOL motions and entered judgment. Dali gets $9 million and CommScope gets $6 million and a permanent injunction against sales of particular distributed antenna systems. On appeal, the Federal Circuit has reversed in- part – finding no infringement of Dali’s ‘521 patent. [...] Here, the court bolstered its non- infringement conclusion by looking at the patentee’s arguments regarding anticipation. # ⚓ Analysis_of_the_Decision_(23.06.2021)_of_the_German Federal_Constitutional_Court_regarding_UPC_Agreement [Ed: Team UPC basically... Kather Augenstein Rechtsanwälte PartGmbB]⠀⇛ # ⚓ Ericsson_settles_patent_dispute_with_TCL⠀⇛ # ⚓ SolarEdge_and_Hogan_Lovells_destroy_another_of_SMA Solar’s_patents [Ed: Latest of many fake patents from the corrupt EPO; patent_quality_waning]⠀⇛ The patent dispute between SolarEdge and SMA Solar Technology concerns inverter technology for solar energy systems – a growing market worldwide. In mid-August, the Federal Patent Court struck down SMA Solar’s European patent EP 2228895 B1. The judges have not yet provided detailed reasoning for the ruling (case ID: 6 Ni 14/ 19). According to the oral hearing, a lack of inventive step could have been the decisive factor. The Federal Patent Court judges had already revoked SMA Solar Technology’s EP 1610452 B1 last October. SMA Solar Technology appealed against this decision. That patent protects inverters with cooling units for cooling electronic components (case ID: 6 Ni 15/19). EP 2228895 B1 in the current case protects an inverter with an isolation point. Inverters ensure that the direct current produced by photovoltaic systems is converted into alternating current. This step is necessary for when the electricity is fed into the power grid or used in the home. # § Software Patents⠀➾ # ⚓ Sky_avoid_voice_recognition_patent_infringement with_invalidity_ruling⠀⇛ # ⚓ $5,000_Awarded_for_SaveItSafe_prior_art⠀⇛ Unified is pleased to announce PATROLL crowdsourcing contest winner, Erica Ghironi, who received a cash prize of $5,000 for her prior art submission for U.S. Patent 8,929,552. The patent owner is SaveItSafe, LLC, an NPE. The ’552 patent relates to securement of electronic information and cryptographic keys. SaveItSafe asserted the ’552 patent against Oracle and Ultra Electronics Holdings in the Western District of Texas. However, the prior owner, No Magic, Inc., previously asserted the patent against Futurex, Atos IT Solutions and Services, SafeNet, Townsend Security, and Thales e-Security in 2015 through 2017. Litigation history can be found here. # § Copyrights⠀➾ # ⚓ Book_Review:_Art_and_Copyright [Ed: We need artists, not lawyers, to wrote about copyrights]⠀⇛ This book review of Art and Copyright by Simon Stokes (Partner at Blake Morgan) is kindly provided to you by Alexander Herman, Assistant Director, at the Institute of Art and Law and co-directs the Art, Business and Law LLM developed with the Centre for Commercial Law Studies at Queen Mary University of London. He teaches regularly on copyright. On 30 September, his new book Restitution: The Return of Cultural Artefacts will be published by Lund Humphries. Here is what Alexander has to say: It was a delight to learn last year that Simon Stokes, copyright solicitor at Blake Morgan in London, was working on a third edition of his eminently useful Art and Copyright. The book was released this year by Hart Publishing, an imprint of Bloomsbury, and one does not need to progress deep into the book to appreciate the wisdom behind the revision. [...] The new edition of Stokes’s classic work makes a welcome addition to any library. It brings into play all the developments of the past decade, overlaid neatly onto the bedrock of the two earlier editions. It is easily accessible for anyone working in the art sector without a legal background, whose work nevertheless requires an understanding of the essential elements of IP. This would include museum registrars, curators, archivists, contemporary art gallery managers, art agents, art dealers and artwork photographers. Yet there is enough legal depth to satisfy the lawyer as well. And let us not forget the artists – with new art forms and digital reproduction now so prevalent, there is no better time for creators to familiarise themselves with the rights they hold in works, as well as any limitations on those rights. This book will help them through. ䷩ 𝚕𝚒𝚗𝚎 2657 ╒═══════════════════ 𝐃𝐀𝐈𝐋𝐘 𝐋𝐈𝐍𝐊𝐒 ═════════════════════════════════════════════╕ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 08.24.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ Gemini_version_available_♊︎ ✐ Links_24/8/2021:_GNOME_41_Beta_and_KaOS_2021.0_Screencasts⠀✐ Posted in News_Roundup at 5:10 am by Dr. Roy Schestowitz 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇GNOME bluefish⦈ § Contents⠀➾ * GNU/Linux o Distributions o Devices/Embedded * Free_Software/Open_Source * Leftovers * § GNU/Linux⠀➾ o § Desktop/Laptop⠀➾ # ⚓ Vincent_Bernat:_ThinkPad_X1_Carbon_(Gen_7):_2_years_later⠀⇛ The BIOS can be updated directly from Linux, thanks to the Linux Vendor Firmware Service. [...] In summary, this is a fine laptop plagued with a bad keyboard. o § Audiocasts/Shows⠀➾ # ⚓ Late_Night_Linux_–_Episode_139⠀⇛ What we all thought about the open and federated Twitter alternative Mastodon, plus your feedback about the new user experience, and why Graham and Joe don’t use Linux for making music. # ⚓ Most_Stable_Linux_Distros_Are_Really_Semi_Rolling!_– Invidious⠀⇛ Typically we split up linux distros into rolling and stable releases but in reality there are very few distros which are actually stable releases, the vast majority of these are actually known as a semi rolling release and I’d like to see the correct term used. # ⚓ Destination_Linux_240:_30_Years_of_Linux_&_What_Linux_Means To_Us⠀⇛ This week’s episode of Destination Linux, we’re going to celebrate 30 Years of Linux starting with “What Linux Means To Us” discussion. Then we’re going to have Philip Müller from Manjaro on to discuss their latest 21.1 release. Plus we’ve also got our famous tips, tricks and software picks. All of this and so much more this week on Destination Linux. So whether you’re brand new to Linux and open source or a guru of sudo. This is the podcast for you. o § Instructionals/Technical⠀➾ # ⚓ What_we’ll_likely_do_when_Linux_distributions_drop_Python_2 entirely⠀⇛ Currently, Linux distributions claim that they want to stop including even a minimal Python 2 at some point, although when that will be isn’t clear (the latest Debian and Ubuntu in development versions both seem to still include it). Since we have any number of perfectly functional small Python 2 programs used in managing our systems (and no particular time or enthusiasm for porting them all to Python 3), this presents a potential future problem, never mind the disruption for our users (who may also have such programs). Thus, it seems likely that we will roll our own version of Python 2 even after Linux distributions stop doing so. # ⚓ SSH_quoting⠀⇛ A while back there was a thread on one of our company mailing lists about SSH quoting, and I posted a long answer to it. Since then a few people have asked me questions that caused me to reach for it, so I thought it might be helpful if I were to anonymize the original question and post my answer here. # ⚓ How_to_install_MCreator_on_a_Chromebook⠀⇛ Today we are looking at how to install MCreator on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below. # ⚓ How_To_Install_MariaDB_on_Debian_11_–_idroot⠀⇛ In this tutorial, we will show you how to install MariaDB on Debian 11. For those of you who didn’t know, MariaDB is a popular open-source relational database, developed by MySQL developers. Unlike MySQL, MariaDB was meant to be totally free for use. The original creators of MySQL developed MariaDB in response to fears that MySQL will suddenly become a paid service due to Oracle acquiring. With its history of doing similar tactics, the developers behind MariaDB have promised to keep it open source and free from such fears as what has happened to MySQL. This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by- step installation of the MariaDB database on a Debian 11 (Bullseye). # ⚓ How_to_Create_Database_in_MySQL_a_Complete_Guide_2021⠀⇛ As you know MySQL is the most popular and open- source relational database management system. If you don’t have MySQL installed on your Linux machine then read another article “How to install MySQL in Ubuntu 19.04“. Remember one more thing, this is important MySQL must be installed in your system. If you don’t have, then where will you create a database?. Many People in the world start running the command, without knowing the basic requirement. And last they will blam to writer or trainer. If you are an administrative user (the minimum privilege required to create a new database is CREATE) or with a root user account then you can run all commands. You can read the article on “How to create a user in MySQL”. In this tutorial, I will cover How to create database in MySQL, create the database if not exists, show all database, select database for starting work, and use of mysqladmin and more. This article is good for beginners. # ⚓ How_to_Enable_SSH_on_Debian_11⠀⇛ SSH is a network protocol for secure communication between a client and a server. This enables you to remotely connect to your Debian machine to perform commands, file transfer, or administrative tasks. SSH provides strong authentication using passwords and public key authentication. Once the connection is established, the data that is transmitted is encrypted. In this tutorial, we learn how to enable SSH on a Debian Desktop system. # ⚓ How_to_Install_and_Use_Tmux_(Terminal_Multiplexer)_in Linux⠀⇛ As the naming convention suggests, tmux is indeed a terminal multiplexer. Linux users that are used to server-based or terminal-based OS environments mostly find themselves opening more than one terminal instance while running programs. With tmux, it is possible to limit your Linux OS interactions to a single terminal. The tmux command flexibility makes it possible to switch between a user or system programs. You can detach from these programs and keep them running on the Linux system background and also re-attach them back to the same command line instance or a different terminal. # ⚓ How_to_Install_the_Latest_MySQL_8_on_Debian_11⠀⇛ MySQL is a relational database management system based on SQL (Structured Query Language). It is one of the most widely used database software for several well-known applications that utilize it. MySQL is used for data warehousing, e-commerce, and logging applications, but its most used feature is web database storage and management. Debian 11 comes with MySQL in its repository, however as many know, Debian stable provides only security updates for its releases in line with keeping its stable build essentially stable. This has great benefits but some drawbacks; in the tutorial, you will learn how to install MySQL 8 for Debian 11. # ⚓ How_to_Kill_Linux_Process_Using_Kill,_Pkill,_and_Killall⠀⇛ Linux Operating System comes with a kill command to terminate a process. The command makes it possible to continue running the server without the need to reboot after a major change/update. Here comes the great power of Linux and this is one of the reasons, why Linux is running on 96.4% of servers, on the planet. Kill command sends a signal, a specified signal to a currently running process. The kill command can be executed in a number of ways, directly or from a shell script. # ⚓ How_to_Mine_Etherum_in_2021:_Beginner’s_Guide⠀⇛ Etherium mining is an excellent way for people with high-end graphics cards to earn some cash while sleeping – at least until the eth2 rolls out completely. Even after the recent crypto dip, Etherium’s value has been up considerably. Not to mention the congestion on the Ethereum network has been driving up gas fees. All this means Etherium mining is still a profitable business in 2021. In this comprehensive guide for beginners, we will dive deep into the features of Ethereum mining, what makes it different from Bitcoin mining, and how you can get started. We will also discuss everything you need to consider before investing your hard-earned cash in Ethereum mining, such as software, hardware, and online mining forums/ community. So, grab a cup of coffee and read on! # ⚓ How_to_Rename_a_File_in_Linux_with_Examples,_beginner’s guide_2021⠀⇛ Do you not like the name of any file or directory? Do you want to change it? Do you want to give new name to file or directory? If you don’t know how to rename a file in Linux then this article is helpful for you. When you read complete article, You will learn about move and change name of files. You must read warnings mentioned in the article. Cautions make you perfect, and save you from disaster happen by using wrong command. # ⚓ How_to_Script_ssh_Login_with_Passwords⠀⇛ This tutorial explains how to automatically login with a password when connecting to ssh. After reading this tutorial, you’ll know how to implement a script to automatically login with passwords to connect to ssh. Additionally, you’ll find instructions for automatic ssh password login using the sshpass tool. Finally, this tutorial explains how to connect without a password with public key authentication. # ⚓ How_to_Share_ZFS_Volumes_via_iSCSI⠀⇛ ZFS volumes are block storage devices that work like any other storage device (HDD/SSD). You can create partition tables, create new partitions, format these partitions, create filesystems, and mount them on your computer. You can also share ZFS volumes via the iSCSI protocol and access them from remote computers. In this article, I am going to show you how to share ZFS volumes via iSCSI and access them from remote computers. I will be using the Ubuntu 20.04 LTS operating system for the demonstration. However, the steps shown in this article should also work on other Linux distributions with some adjustments. Let’s get started. # ⚓ How_to_include_options_in_your_Bash_shell_scripts_| Opensource.com⠀⇛ Terminal commands usually have options or switches, which you can use to modify how the command does what it does. Options are included in the POSIX specification for command-line interfaces. It’s also a time-honored convention established with the earliest UNIX applications, so it’s good to know how to include them in your Bash scripts when you’re creating your own commands. # ⚓ How_to_use_mkdir_command_to_create_a_directory_in_Linux Guide_2020⠀⇛ If you are looking at how to make a directory in Linux then you are at the right place, use mkdir command to create a directory in Linux by using the terminal. You are using a graphical interface to create a folder in windows, but you must use the command to create a folder in Linux. I will teach you to create a new directory, multiple directories, a directory with full permission, etc. o § Desktop Environments/WMs⠀➾ # § GNOME Desktop/GTK⠀➾ # ⚓ GNOME_41_Desktop_Environment_Enters_Beta_Testing_with New_Apps,_Better_Wayland_Support⠀⇛ GNOME 41 will be the first major update to the popular desktop environment since the release of GNOME 40 with its redesigned Activities Overview, and promises new apps, new features, as well as numerous improvements and bug fixes. Highlights of GNOME 41 include a new Calls app that acts as a phone dialer and call handler, mostly useful for mobile devices but capable of doing VoIP calls too, and support for the GDM login manager to allow Wayland user sessions even if the login screen is on X.Org, as well as for single GPU vendor NVIDIA machines. # ⚓ GNOME_41_Beta_Released_With_“Calls”_SIP/VoIP_Support, Wayland_Improvements_–_Phoronix⠀⇛ The GNOME 41 beta is now available ahead of next month’s official half-year update to this open-source desktop environment. There is a lot that’s been queued up for GNOME 41 beta. Below is a look at the highlights of the lengthy changes for this beta milestone. # ⚓ GNOME_41.beta_released!⠀⇛ Hello, GNOME 41.beta is now available. It also marks the start of the UI, feature and API freezes (collectively known as The Freeze). Any string changes need to be announced to the i18n mailing list in advance of the string freeze which should start next weekend. If you'd like to target the GNOME 41 platform, this is the best time to start testing your apps or extensions. You can use the 41beta branch of the flatpak runtimes, which is now available on Flathub beta. This branch is based on the 21.08 branch of freedesktop-sdk and as such has quite a few ABI breaks. In addition, this release removed zenity and librest. The additions of this release are libmanette and sysprof-capture. The release team has agreed to pre-announce removals at least one cycle in advance. Starting with GNOME 42, all removals have to be announced at least one cycle in advance. As such, the following are deprecated and will be removed in a future release: clutter and friends (cogl, clutter-gtk and clutter-gst) and libsoup version 2.x (to be replaced with version 3.x). An installer image is also available for testing and porting extensions https://os.gnome.org/download/41.beta/ gnome_os_installer_41.beta.iso This is meant to be installed in a virtual machine with EFI support (such as the GNOME Boxes version available on Flathub). You can also try to install it on bare metal but be warned that hardware support is very limited. If you want to compile GNOME 41.beta yourself, you can use the official BuildStream project snapshot: https://download.gnome.org/teams/releng/ 41.beta/gnome-41.beta.tar.xz The list of updated modules and changes is available here: https://download.gnome.org/core/41/41.beta/ NEWS The source packages are available here: https://download.gnome.org/core/41/41.beta/ sources/ # ⚓ GNOME_41_beta_is_here_—_the_best_Linux_desktop environment_is_getting_better⠀⇛ There are a lot of great desktop environments for Linux, such as Cinnamon, KDE Plasma, and Xfce to name a few. With that said, only one can be the best, and that is GNOME. If you prefer a different environment, you are simply wrong or ignorant on the subject. You know what? That’s fine. As they say, ignorance is bliss, so if you are happy not using GNOME, more power to you. For those of us superior Linux users that prefer GNOME, it is time to get excited. You see, as of today, the GNOME 41 Beta is officially here! Keep in mind, the Beta tag is quite literal — unless you are a Beta tester or Linux developer, you shouldn’t be bothering with it just yet. o § Distributions⠀➾ # ⚓ The_8_Best_Linux_Distributions_for_Penetration_Testing⠀⇛ Linux users have a plethora of free operating systems when it comes to penetration testing and digital forensics. The world of ethical hacking has continued to evolve, which is probably one of the reasons why many people find themselves being attracted to these auditing fields. To serve this purpose, several Linux distros and software are available for forensic investigation, ethical hacking, and penetration testing. If you are an advanced Linux user looking to flex your brain muscles and get the ball rolling, it’s time for you to check some of these cybersecurity- related Linux distros. # § Screenshots/Screencasts⠀➾ # ⚓ KaOS_2021.08_Run_Through_–_Invidious⠀⇛ In this video, we are looking at KaOS 2021.08. # ⚓ KaOS_2021.0⠀⇛ Today we are looking at KaOS 2021.08. It comes with Linux Kernel 5.13, KDE Plasma 5.22, and uses about 1.5GB of ram when idling. Enjoy! # § Canonical/Ubuntu Family⠀➾ # ⚓ Ubuntu_Weekly_Newsletter_Issue_697⠀⇛ Welcome to the Ubuntu Weekly Newsletter, Issue 697 for the week of August 15 – 21, 2021. o § Devices/Embedded⠀➾ # ⚓ PineNote_E_Ink_tablet:_pen_latency_demo_[@thepine64]⠀⇛ The upcoming PineNote tablet with a RK3566 processor, an E Ink display and planned support for software using a mainline Linux kernel, will also support pressure-sensitive input from a digital pen. Here’s a short video showing off the latency of pen input. # § Open Hardware/Modding⠀➾ # ⚓ Recycle_your_old_Raspberry_Pi_boards_with_OKdo⠀⇛ # § Mobile Systems/Mobile Applications⠀➾ # ⚓ Google’s_new_Android_12_feature_lets_users_control_UI with_face_gestures,_SCIENCE_&_TECH_News_|_wionews.com⠀⇛ # ⚓ Google_Tasks_redesign_adds_tabs_for_quick_list switching_–_9to5Google⠀⇛ # ⚓ (Updated)_The_Most_Exciting_Games_You_can_Pre- Register_for_on_Android_Right_Now_–_Droid_Gamers⠀⇛ # ⚓ 6_Best_GBA_ROM_Emulators_for_Android_Devices⠀⇛ # ⚓ Best_Android_app_deals_of_the_day:_Swiftly_switch Pro,_911_Operator,_Network_Analyzer_Pro,_more_– 9to5Toys⠀⇛ # ⚓ 10_Best_Handwriting_Apps_To_Take_Notes_With_Stylus_On Android⠀⇛ # ⚓ Some_Material_You_elements_are_showing_up_on_older versions_of_Android⠀⇛ # ⚓ The_‘Joker’_virus_has_returned_to_Android:_empty_your bank_accounts_without_you_noticing_it_and_it_is_hidden in_these_apps_on_the_Google_Play_Store⠀⇛ # ⚓ Motorola_Certifies_Six_Additional_Android_Devices with_ioXt_Alliance_|_Business_Wire⠀⇛ # ⚓ SVP_is_a_new_video_player_for_Android_that_makes videos_look_smoother⠀⇛ o § Free, Libre, and Open Source Software⠀➾ # § Web Browsers⠀➾ # ⚓ Perceived_Relations_Between_Gopher_Gemini_And_HTTP⠀⇛ I present my perceptions of Gemini and Gopher, and how they seem to be all somewhat overlapping, and then give my two cents for people to fight over. The piece is structured so the focus is Gemini (as it’s the subject of the day) compared to HTTP and Gopher. It’s not necessary to read sections which don’t align with your interests. # § Mozilla⠀➾ # ⚓ Firefox_follows_Chrome_and_prepares_to_block insecure_downloads⠀⇛ Called mixed content downloaded blocking, the feature works by blocking file downloads initiated from an encrypted HTTPS page but which actually take place via an unencrypted HTTP channel. # ⚓ Mozilla_Firefox_will_also_block_insecure downloads_on_HTTPS_pages⠀⇛ According to references in Mozilla’s bug tracker, the feature is planned to be generally available with Firefox 92. That’s the next major update for Firefox, and it’s currently planned for September 7. It’s already available in experimental versions of Firefox, though, and you can also enable it in the stable release via a flag. Simply go to about:config and search for dom.block_download_insecure. Setting this value to true will enable mixed content download blocking. # ⚓ OpenPOWER_Firefox_JIT_update⠀⇛ As of this afternoon, the Baseline Interpreter-only form of the OpenPOWER JIT (64-bit little-endian) now passes all of the JIT tests except for the Wasm ones, which are being actively worked on. Remember, this is just the first of the three phases and we need all three for the full benefit, but it already yields a noticeable boost in my internal tests over the C++ interpreter. The MVP is Baseline Interpreter and Wasm, so once it passes the Wasm tests as well, it’s time to pull it current with 91ESR. You can help. # § CMS⠀➾ # ⚓ WP_Briefing:_Episode_15:_A_Very_WordPress_Blooper⠀⇛ Ever wonder what it’s like behind the scenes of WP Briefing? Listen in on this episode for a little levity and Josepha’s bloopers. # § Programming/Development⠀➾ # ⚓ If_Conditions_in_Ruby⠀⇛ Decision-making is a base factor in programming and human life. They allow us to perform certain actions when a condition fits a specific scope. In this tutorial, we will focus on how to implement condition statements in Ruby programming language. Using Ruby conditionals, we can check for a specific condition and take a specified action based on the result. The simplest way to make a single decision in Ruby is to implement an if statement. # ⚓ Let’s_write_a_compiler,_part_7:_Arrays⠀⇛ Arrays are an important feature for our language and compiler. Not defined in the original PL/0 specification but later added in its successor language, Oberon-0, arrays allow us to carve out pre-defined regions of memory of any arbitrary size to be used as we see fit. Because the original PL/0 language has no concept of arrays, we are free to define our own syntax for them. These are our challenges for today: choosing a syntax for arrays, implementing that syntax, and allowing array identifiers to be used just the same as the TOK_VAR identifiers we already have. # § Python⠀➾ # ⚓ How_to_Use_Frozenset_Objects_in_Python⠀⇛ This article will cover a guide on using the “frozenset” function in Python that returns a new frozenset type Python object. These objects are similar to set objects available in Python with some key differences. All code samples in this article are tested with Python 3.9.5 on Ubuntu 21.04. # ⚓ How_to_Use_the_Tokenize_Module_in_Python⠀⇛ This article will cover a guide on using the “Tokenize” module in Python. The tokenize module can be used to segment or divide the text into small pieces in various ways. You can use these segments in Python applications that use machine learning, natural language processing, and artificial intelligence algorithms. All the code samples in this article are tested with Python 3.9.5 on Ubuntu 21.04. # § Shell/Bash/Zsh/Ksh⠀➾ # ⚓ How_to_Use_Boolean_Value_in_Bash⠀⇛ The boolean value can contain two types of data. These are True or 1 and False or 0. Bash does not support Boolean values, but any bash variable can contain 0 or “true” and 1 or “false“. The logical boolean operators are supported by bash. The boolean value is required to use when the script needs to generate the output based on the True or False value of a variable. The way to declare and use boolean values in the bash script has shown in this tutorial. # § DB⠀➾ # ⚓ PostgreSQL_Union_All_Query⠀⇛ This tutorial will show you how to use PostgreSQL Union and Union All queries to combine results from select statements. # ⚓ PostgreSQL_Limit_Clause⠀⇛ Let’s discuss the ins and outs of using the PostgreSQL LIMIT clause to limit the output to a specified value. Although the LIMIT clause is an optional statement, it is very handy when you do not want a query to return thousands and thousands of records. # ⚓ PostgreSQL_Grant_Privileges⠀⇛ In PostgreSQL, a user must have the LOGIN privilege to log into the database. However, explicit permissions must be assigned to perform database operations, including selecting tables, columns, and records. The PostgreSQL GRANT query allows you to modify privileges for users on database objects such as tables, columns, views, functions, schemas, and more. This tutorial will walk you through using the PostgreSQL GRANT command to modify privileges for various database objects. # ⚓ PostgreSQL_Functions⠀⇛ PostgreSQL is a powerful and easy-to- use database management system that provides secure, fast, and very intuitive features, allowing you to focus on the data and not the query syntax. One way PostgreSQL makes its usage very easy is the functionality of pre- defined functions. These functions allow you to call them and pass the required arguments to get an output. In this post, we will give you a cheat sheet of the most common PostgreSQL functions and even show you how to define custom ones if needed. # ⚓ PostgreSQL_Count_Function⠀⇛ In most cases, when working with databases, our interest is the actual records stored in the database. However, an instance may occur where we need to determine the number of records in a specific column or entire table. To achieve this, we can define a custom function or use the built-in count function. In this guide, we will discuss the count function and various examples of how to use it. # ⚓ MySQL_IN_Clause⠀⇛ This tutorial will discuss using the MySQL IN query to check if a specific value is within a set of values, which is useful in replacing a set of OR operators. * § Leftovers⠀➾ o ⚓ Web_of_Connections⠀⇛ A popular song lyric from 1927 ran: “I’ve danced with a man, who’s danced with a girl, who’s danced with the Prince of Wales.” The poet Allen Ginsberg liked to boast that a line of three intermediate lovers connected him back to his idol, Walt Whitman. Well before the development of social media, the 1993 film Six Degrees of Separation made many of us aware of just how few steps it takes to connect you, or me, to millions of others around the globe. o § Science⠀➾ # ⚓ The_August_2021_full_moon_is,_somehow,_a_Blue_Moon._Here’s why.⠀⇛ That explanation said that the full moon “usually comes full 12 times in a year, three times for each season.” Occasionally, however, there will come a year when there are 13 full moons, not the usual 12. The almanac explanation continued: “This was considered a very unfortunate circumstance … and it upset the regular arrangement of church festivals. For this reason 13 came to be considered an unlucky number.” And with that extra full moon, it also meant that one of the four seasons that year would contain four full moons instead of the usual three. When a particular season has four full moons the third was apparently called a Blue Moon so that the fourth and final one can continue to be called the “late moon.” o § Education⠀➾ # ⚓ In_First_‘Fatwa’,_Taliban_Ban_Co-education_in_Afghanistan’s Herat;_Call_it_‘Root_of_All_Evils’⠀⇛ Taliban officials on Saturday issued their first ‘fatwa’ in Afghanistan, banning co-education in government and private universities in the restive Herat province, describing it as the ‘root of all evils in society’ validating fears that the country will undergo major ‘regressive’ changes despite their promises. The announcement comes as the terror group vowed to respect women’s rights in Afghanistan. The decision was taken after a meeting between varsity professors, owners of private institutions, and Taliban authorities, Khaama Press News Agency reported on Saturday. o § Health/Nutrition⠀➾ # ⚓ Once_Secret_Prices_Expose_‘Irrational_and_Cruel’_Nature_of US_Healthcare_System⠀⇛ “Keep these prices in mind the next time you see a report…that tries to figure out whether a particular single payer plan’s reimbursement rate would be unworkable.” —Matt Bruenig, People’s Policy Project “It was the most convoluted, useless process,” Eichelberger, told the Times. # ⚓ NYC_to_Require_Teachers,_School_Staff_to_Get_Vaccinated Starting_Next_Month⠀⇛ # ⚓ Key_‘Milestone’_in_Pandemic_Fight_as_FDA_Grants_Full Approval_to_Pfizer’s_Covid_Vaccine⠀⇛ The U.S. Food and Drug Administration on Monday granted full approval to the Pfizer-BioNTech coronavirus vaccine for people who are 16 years of age or older, a long-awaited step that came as Covid-19 cases and hospitalizations are rising sharply across the country—particularly in undervaccinated regions. Some public health experts have argued that the FDA’s decision to issue a final seal of approval for the Pfizer vaccine—which until Monday had been administered under emergency authorization—could be helpful in easing hesitancy among those who have yet to get vaccinated against the coronavirus, which has killed more than 628,000 people in the U.S. # ⚓ The_Sub-Prime_of_Ms._Jane_Brody:_Still_Ignoring_the_Science on_Medical_Marijuana⠀⇛ Big Pharma has had good reason to fund the longterm effort to divert and choke off the medical marijuana movement. If US doctors had been routinely recommending cannabis instead of SSRIs like Zoloft to treat depression all these years, the bottom would have fallen out of the anti- depressant market. Instead, sales continue to soar. According to the CDC, “During 2015–2018, 13.2% of adults aged 18 and over used antidepressant medications in the past 30 days… Use was highest among women aged 60 and over (24.3%).” A small example of Big Pharma’s success was provided by Jane Brody’s August 2 column on Irritable Bowel Syndrome (IBS), Brody has been the New York Times “Personal Health” columnist since 1976. An influencer before they had a word for it, she anchors the Tuesday Science Section with a half-page column on page 7. # ⚓ Are_Bans_Against_School_Mask_Mandates_Against_the_Law?⠀⇛ My son, a 14-year-old autistic boy with Down syndrome, has the right to be educated thanks to federal civil rights legislation passed in the 1970s and updated in the years since. These laws promise him a free and appropriate education in the least restrictive environment adapted, within reason, to his needs. # ⚓ The_Virus_and_the_Storm⠀⇛ It was supposed to be homecoming concert For New York City 60,000 people crowded Central Park To celebrate New York City’s Return to normal cultural life After a year and a half of COVID-19 shutdowns Barry Manilow began to sing his 1980 song “I Made It Through The Rain” “We dreamers have our ways Of facing rainy days And somehow we survive We keep the feeling warm Protect them from the storm Until our time arrives” The Delta Variant said to Hurricane Henri “I just finished my all-you-can-eat buffet. Now it’s your turn.” Hurricane Henri said, “Yeah, I’ve heard enough of his singing. Let’s shut this thing down.” Four to five inches of rain began to flood Central Park And people got soaking wet as they ran screaming To get out of the rain. The concert never resumed. August 21, 2021. # ⚓ Republicans_Rush_to_Squash_Local_Control_in_Fight_Against COVID⠀⇛ # ⚓ Pfizer_Vaccine_Gets_Full_FDA_Approval,_Potentially Triggering_Mandates⠀⇛ # ⚓ FL’s_Capital_City_to_Have_School_Mask_Rules,_Defying DeSantis’s_Anti-Mask_Order⠀⇛ # ⚓ Facebook’s_Most_Viewed_Article_In_Early_2021_Raised_Doubt About_COVID_Vaccine⠀⇛ The social media giant prepared the report about the most widely viewed posts on its platform from January through March of 2021, but decided not to publish it “because there were key fixes to the system we wanted to make,” spokesperson Andy Stone tweeted on Saturday. # ⚓ Geert_Vanden_Bossche_is_back_and_still_blaming_vaccines_for COVID-19_variants⠀⇛ I was perusing the in box of my account for this blog a week ago, when I came across a bit of what I like to call “fan mail.” No, this wasn’t hate mail (which is what a lot of my “fan mail” consists of), but rather an email of the “Won’t you reconsider what you wrote about a crank?” variety. Today, I decided finally to answer, but publicly. The crank is Geert Vanden Bossche, whom I first wrote about in March in the context of an open letter by him that had gone viral warning of global catastrophe if the mass vaccination campaign against COVID-19 were not stopped. The reason for his warning was a prediction that mass vaccination would select for more dangerous variants of SARS-CoV-2, the virus that causes COVID-19. This led a reader (whose name I will not reveal) to ask me whether, in light of the much more transmissible (and possibly more virulent) Delta variant that’s been spreading across the US like proverbial wildfire over the last few of months, I might want to “reconsider” my previous criticism of Vanden Bossche: o § Integrity/Availability⠀➾ # § Proprietary⠀➾ # ⚓ .docx_With_Embedded_EXE⠀⇛ What is hiding in this maldoc, is just 2 embedded files: [...] # ⚓ Finland’s_Nokia_wins_5G_order_for_three_European markets⠀⇛ Finnish telecom gear maker Nokia (NOKIA.HE) said on Monday it had won a 5G network order from A1 Telekom Austria Group for operations in Bulgaria, Serbia, and Slovenia. # ⚓ Hillicon_Valley:_Millions_exposed_due_to_Microsoft misconfiguration⠀⇛ Data from private companies was also exposed, including from various other Microsoft groups, Ford, American Airlines and J.B. Hunt. Data exposed included COVID-19 contact tracing, vaccination appointments, Social Security numbers, employee IDs and other personal information on millions of individuals. # § Security⠀➾ # ⚓ Get_paid_to_improve_Linux_and_open-source security_|_ZDNet⠀⇛ To help remedy this, David A. Wheeler, the LF’s director of Open Source Supply Chain Security, recently revealed the LF or its related foundations and projects directly fund people to do security work. Here’s how it works. # ⚓ What_You_Need_to_Know_About_Linux_Rootkits [Ed: Overlooks the fact that those rootkits need to get there in the first place; for this, the system needs to be compromised in the first place. This is just a stealth thing.]⠀⇛ Rootkits are an effective way for attackers to hide their tracks and keep access to the machines over which they have gained control. Read on to learn about rootkits, how to detect them and how to prevent them from being installed on your system in the first place. # § Privacy/Surveillance⠀➾ # ⚓ ACLU_Advocate_Reining_in_Government_Use of_Face_Surveillance,_Champion_of_Privacy Rights_Research,_and_Data_Security_Trainer Protecting_Black_Communities_Named Recipients_of_EFF’s_Pioneer_Award⠀⇛ # ⚓ Researchers_Who_Built_Similar_System Explain_Why_Apple’s_CSAM_Scanning_System_Is Dangerous⠀⇛ Jonathan Mayer, a Princeton University professor and former chief technologist at the FTC, is one of the smartest people I know. Every time I’ve spoken with him I feel like I learn something. He’s now written a quite interesting article for the Washington Post noting how he, and a graduate researcher at Princeton, Anunay Kulshrestha, actually built a CSAM scanning system similar to the one that Apple recently announced, which has security experts up in arms over the risks inherent to the approach. # ⚓ atracids⠀⇛ which reminded of a speech by my daughter in which she denounced surveillance capitalism and privacy abuses through software with pictures of Big Bad Wolf disguised as Little Red Riding Hood’s grandma with sentences like Aral’s citation, and of the witch offering Snow White a poisoned Apple, of Jack climbing the beanstalk and meeting the Giant on the Clouds, and of Rapunzel seeing the world only through the tower Windows. Shortly thereafter, she demanded to switch schools, because her school was rolling out Google for Ad-ucation (her term) and she couldn’t take that any more. # § Confidentiality⠀➾ # ⚓ T-Mobile_breach_hits_53_million customers_as_probe_finds_wider impact⠀⇛ In its latest update, which comes days after the U.S. Federal Communications Commission (FCC) opened an investigation into the breach, T-Mobile revealed it had identified 5.3 million additional wireless subscribers who were impacted by the breach as well as 667,000 more accounts of former customers. The data includes addresses, dates of birth and phone numbers of customers, the company said, adding that it had no indication that the accessed data contained financial information such as credit card or other payment data. o § Defence/Aggression⠀➾ # ⚓ Investigation_Of_ShotSpotter’s_Practices_Is_Raising Questions_The_Company’s_Angry_Statement_Really_Doesn’t Answer⠀⇛ Earlier this month, another courtroom challenge of evidence exposed another questionable alteration of a gunshot report by law enforcement tech supplier, ShotSpotter. In 2018, a man shot by police officers claimed in his lawsuit that ShotSpotter altered gunshot detection records at the request of law enforcement to back up the officers’ narrative — one that claimed he had shot at them first. No gun was ever recovered and the number of shots originally detected by ShotSpotter matched the number fired by officers, leaving them at least one shot short of their “he shot first” story. # ⚓ Biden’s_Botched_Withdrawal_From_Afghanistan_is_Consistent With_Two_Decades_of_America’s_Missteps_There⠀⇛ Republicans predictably jumped on this demonstrable foreign policy failure, neglecting to mention that it was Biden’s predecessor Donald Trump who laid the groundwork for the withdrawal of U.S. troops and worked with the Taliban to do so. Senate Minority Leader Mitch McConnell (R-KY) expostulated, “This debacle was not only foreseeable, it was foreseen,” as if Trump would have done any better as a second-term president. Trump’s former Secretary of State Mike Pompeo in an interview on Fox News with Chris Wallace chimed in, saying, “It looks like the Biden administration has just failed in its execution of its own plan,” even though of course the Democratic president was essentially carrying out Trump’s plan. The Republican National Committee has now deleted a page on its website that had celebrated Trump’s dealings with the Taliban, perhaps hoping no one would notice. The corporate media was equally unforgiving of Biden. The Washington Post’s editorial board issued a scathing opinion blaming Biden for any future deaths, saying that the U.S. “assumed at least partial responsibility for all Afghans. Leaving them now means walking away from that responsibility.” The Post also worried about America’s global prestige, saying, “at risk is the United States’ reputation as a partner, as would-be allies around the world watch and calculate the value of an American commitment.” # ⚓ After_Vietnam,_Iraq_and_Afghanistan,_Is_It_Credible_to Trust_the_Intel_Agencies_on_Wuhan?⠀⇛ On May 26, these words should have poured forth from the White House Press Corps and the mainstream Commentariat when Joe Biden declared that he was placing the question of Covid-19’s origins securely in the hands of the “National Intel Agencies.”  They were to report back in 90 days. Have not the Intel Agencies been up to their eyeballs in deception about the “Global War on Terror” for the past 20 plus years?  Must we really remind the press and commentariat of the scandal of the Weapons of Mass Destruction hyped by the Intel Agencies to bamboozle a highly skeptical public into the War on Iraq? # ⚓ ‘The_Answer_Is_No’:_Taliban_Reject_Idea_of_US_Extending Exit_Deadline⠀⇛ Taliban leaders on Monday said they will not accept any effort by the Biden administration to extend its August 31 deadline for the U.S. withdrawal from Afghanistan, warning that such a move would be certain to “provoke a reaction.” “If the U.S. or U.K. were to seek additional time to continue evacuations—the answer is no,” Taliban spokesman Suhail Shaheen told Sky News in an interview Monday. “Or there would be consequences.” # ⚓ The_Myth_of_Empire_and_the_Real_Message_of_Dune⠀⇛ Over the last few days, I have been thinking a lot about this book, as well as the movie adaptations. When Westerners (see: Americans, Canadians, Europeans, Brits, Australians) see Dune this fall, I wonder if any of them will have any idea that Arrakis is a perfect symbol for Afghanistan (or even Iraq, or Bolivia, etc.). Or that the much coveted and fought over “spice” is code for opium (or oil, or lithium, or whatever the Empire and its imperial houses demand or wish to control). Or that the imperial bad guys in the film, complete with their noble houses, obscene material wealth and military might, are symbolic of their own governments, corporate powers and armed forces? Of course, the same questions could be asked about other modern cinematic epics, from Star Wars to Avatar, even The Hunger Games. Despite the obfuscation of Hollywood and its unholy alliances with the Pentagon, the underlying mythic message remains, if even as a whisper largely drowned out by the latest computer-generated effects and Pentagon approved technology. An empire brutally forces its hegemony on the poorest and most maligned peoples. These people happen to sit on a vast wealth of minerals or resources or “spice.” And many of them resist the brutal incursion onto their lands. But it always seems lost on the audience that should get the message the loudest and the clearest. There is a disconnect with most Western audiences when it comes to the reality of their government’s foreign policies and military aggressions in the Global South. How much of the propaganda have Westerners swallowed? # ⚓ Opinion_|_Star_Trek:_Anti-Imperialist_Doctrine⠀⇛ On February 9, 1967, hours after the US Air Force pounded Haiphong Harbor and several Vietnamese airfields, NBC television screened a politically momentous episode of Star Trek. Entitled “The Return of the Archons,” the episode marks the debut of the Prime Directive – the supreme law of the fictional United Federation of Planets, and its Starfleet, banning any and all purposeful interference with alien people, civilizations, and cultures. Devised in 1966, as President Lyndon B. Johnson was sending another 100,000 troops into Vietnam, the Prime Directive constituted a direct, though well-camouflaged, ideological challenge to what the US government was up to. # ⚓ In_Must-Watch_Rant,_Mehdi_Hasan_Rips_War_Hawks_for Lecturing_World_on_Afghan_Exit⠀⇛ In a brief and fiery monologue on national television Sunday night, MSNBC host Mehdi Hasan took aim at the journalists, hawkish politicians, and defense industry-funded ex-military officials who are currently denouncing the ongoing U.S. withdrawal from Afghanistan after playing an integral role in launching—and lying on behalf of—the catastrophic 20-year war that set the stage for the chaotic departure. “Our newspaper op-ed pages, our TV screens are filled with people who got it wrong still trying to lecture the rest of us about what should happen now in Afghanistan,” Hasan said in the “60-second rant” segment of his weekend show. # ⚓ The_Poison_of_Nationalism⠀⇛ The ideal of a post-cold war tolerant world where resources (including food and water), are shared equitably, governments cooperate and borders soften has been usurped by rabid intolerance and racism, wall building, flag waving, cruel unjust immigration policies and violent policing of migrants and migrant routes. Rather than addressing issues and tackling underlying causes the ardent nationalist blames some group or other, ethnic, religious or national. Love, distorted but potent, and hate sustain the monster: Love and corrupted pride of nation and ‘our way of life’, seen among the flag wavers as somehow superior; hatred of ‘strangers’, and hatred of change to that which is familiar. It is an insular reactionary movement of introspection and division based on false and petty notions of difference: skin color, religion, language, culture, even food. # ⚓ Opinion_|_Despite_Trillions_Spent,_the_US_Military_Hasn’t Won_a_Real_War_Since_1945⠀⇛ The United States emerged from its victory in World War II as the world’s preeminent superpower. Its annual military budget—about three-quarters of a trillion dollars a year—exceeds the aggregate of the next ten countries in the world. # ⚓ Far_Right_Groups_Tied_to_Jan._6_Attack_Reporters_and_Others at_Anti-Mask_Rally⠀⇛ # ⚓ Media_Rediscover_Afghan_Women_Only_When_US_Leaves⠀⇛ Just as US corporate news media “discovered” Afghan women’s rights only when the US was angling for invasion, their since-forgotten interest returned with a vengeance as US troops exited the country. # ⚓ The_US_and_UK_Got_Things_So_Wrong_in_Afghanistan_Because They_do_Not_Understand_the_Afghan_Way_of_War⠀⇛ The Afghan way of war has created confusion among foreign political and military leaders in the past 20 years, but never more so than during the past few weeks as the Taliban swept through the country, capturing city after city without facing serious resistance. Intelligence agencies had generally assured western leaders that the Afghan government had the soldiers and weapons to make a fight of it. They did so, even after president Joe Biden announced on 14 April that all American troops would be out of Afghanistan by the 20th anniversary of 9/11. Biden said that a Taliban victory was not “inevitable” and Boris Johnson added that the Taliban had “no military path to victory”. Experienced politicians do not make such confident predictions unless their intelligence chiefs have been telling them the same thing. # ⚓ Will_Americans_Who_Were_Right_on_Afghanistan_Still_Be Ignored?⠀⇛ That decision set in motion a cycle of violence and chaos that no subsequent U.S. policy or military strategy could resolve over the next 20 years, in Afghanistan, Iraq or any of the other countries swept up in America’s post-9/11 wars. While Americans were reeling in shock at the images of airliners crashing into buildings on September 11, 2001, Defense Secretary Rumsfeld held a meeting in an intact part of the Pentagon. Undersecretary Cambone’s notes from that meeting spell out how quickly and blindly U.S. officials prepared to plunge our nation into graveyards of empire in Afghanistan, Iraq and beyond. # ⚓ Why_We_Lost_in_Afghanistan⠀⇛ “The soul of [an] army can’t be breathed into the army by a foreign military power or a foreign military force on the ground.” Any inquiry into why the American enterprise in Afghanistan ended in abject failure should begin with this cogent observation by retired Lt. Gen. Karl Eikenberry, who commanded all US forces in Afghanistan and subsequently served as US ambassador in Kabul. “Only the Afghans,” Eikenberry emphasized “can give their army a soul and its identity.” # ⚓ Guam_Was_Ready_to_Help_Relocate_Afghans._Biden_Ghosted.⠀⇛ Hagåtña, Guam—Before the Taliban toppled the US- backed government of Afghanistan, refugee advocates and government insiders had been calling on President Joe Biden to take steps to evacuate Afghans at risk of violence. They offered resources, ideas, and expertise, but for months they received no response. The State Department sluggishly issued “special immigrant visas” for those who had helped the US military, seemingly with no plan for what to do with the tens of thousands of SIV applicants—and those facing persecution who don’t fall under SIV parameters—who would be stranded in Afghanistan when the US troops were gone. This article was published with support from Columbia University’s Ira A. Lipman Center for Journalism and Civil and Human Rights. # ⚓ Invasion_of_the_US_Capitol⠀⇛ # ⚓ Proud_Boys_&_Far-Right_Groups_Tied_to_Jan._6_Attack Reporters_&_Others_at_Anti-Mask,_Anti-Vax_Rally⠀⇛ As COVID-19 cases surge in the United States, anti- mask and anti-vaccine protests are continuing nationwide, with some turning violent. In a shocking story out of California, at least one person was stabbed and two journalists were attacked while covering an anti-vaccine, anti-mask demonstration outside Los Angeles City Hall on Saturday, August 14. The protest was attended by members of the Proud Boys and other right-wing groups. A Southern California mortgage broker named Tony Moon, who also participated in the deadly January 6 insurrection at the U.S. Capitol, was videotaped attacking the independent journalist Tina-Desiree Berg. “He started screaming ‘Unmask them all!’ He ripped my mask off and manhandled me,” says Berg, a reporter at Status Coup News in Los Angeles, who describes how the same people have been involved in violent protests nationwide. “This is a group that has been traveling around … and they instigate violence wherever they go.” # ⚓ The_Taliban’s_Resurgence_Was_Years_in_Making_&_Aided_by Trump,_Who_Sidelined_Afghan_Gov’t_in_Talks⠀⇛ Concern is growing over a broader humanitarian crisis across Afghanistan as people continue to crowd the Kabul airport to flee after the Taliban takeover of the country. The World Health Organization says about one-half of Afghanistan’s population, including nearly 10 million children, already need humanitarian assistance, and the numbers are expected to soar as Afghanistan’s economic crisis intensifies. The Taliban is now under intense pressure, says Emran Feroz, an Austro-Afghan journalist and author. “They know that any kind of Afghan state in future will be dependent on foreign money, which includes American money; otherwise, the people of Afghanistan and the state itself cannot survive,” says Feroz. “The Taliban must be really pragmatic and try to find a way to build a very inclusive government within a short time, because otherwise they will have a lot of problems.” # ⚓ MintPress_News_Confronts_Senator_Cruz_on_Murderous_US Sanctions⠀⇛ On Saturday, MintPress News’ Ben Rubinstein ran into Senator Ted Cruz at Las Vegas’ McCarran International Airport. Recognizing the senator’s long-standing support for economic warfare on the Global South via unilateral coercive measures, or sanctions, Rubinstein jumped at the chance to confront Cruz. # ⚓ Expanding_the_Military_Draft_Is_Not_Feminism._Abolishing Draft_Registration_Is.⠀⇛ # ⚓ Some_Taliban_websites_go_offline_amid_broader_tech crackdown⠀⇛ The downed websites come amid a growing crackdown from some tech companies on the Taliban. Throughout the week, the Taliban have used WhatsApp groups in Afghanistan to help relay messages about their government takeover. But some Taliban WhatsApp groups have recently disappeared, according to SITE, a private intelligence firm that tracks extremist groups. # ⚓ UK:_During_the_half-time_interval_at_the_home_game_of_the Blackburn_Rovers_football_team,_the_stadium_announcer_calls on_Muslims_to_pray!⠀⇛ On August 10, when Lancashire Rovers were playing against Morecambe, the stadium announcer cordially invited all Muslims who wished to go to the designated prayer room to perform Salat Maghrib (prayer just after sunset). Note that at the entrance to the Rovers Stadium “multi-faith prayer room”, which consists of a room for men and a room for women, it is advised to take off one’s shoes…. # ⚓ Nigerian_Gunmen_Free_15_More_Abducted_Baptist_Students⠀⇛ Around 1,000 students have been kidnapped since December after gangs started to target schools and colleges. Most have been released after negotiations, but scores are still being held in forest camps. # ⚓ Spike_Lee_Says_He_Still_Has_‘Questions’_About_What_Happened on_9/11⠀⇛ The four-part docuseries, which weaves together stories, memories and insights of New York’s greatest challenges in the 21st century, premiered on Aug. 22 on HBO and HBO Max. For the series, Lee conducted over 200 interviews with first responders, politicians, journalists and Lee’s own family and friends. Featured interviewees offering first-hand accounts include Jon Stewart, Rosie Perez, Jeffrey Wright, John Turturro, Chuck Schumer, Bill De Blasio, Alexandria Ocasio-Cortez and more. o § Environment⠀➾ # ⚓ Beyond_Science:_Art_and_the_Environment⠀⇛ # ⚓ Forest_people_offer_the_best_hope_of_saving_them⠀⇛ Trees are vital for solving the climate crisis. But there’s nothing simple about the forested world, as forest people know. # ⚓ ‘Extreme_Weather’_Ads_Target_Democrats_Defending_Fossil Fuel_Subsidies⠀⇛ More than two dozen advocacy groups launched “extreme weather ads” in five state newspapers on Monday to pressure right-wing Senate Democrats to stop giving taxpayer money to the oil, gas, and coal companies most responsible for the climate emergency. “It’s time for Congress to stop taking over $15 billion from hardworking Americans and giving it to billionaire fossil fuel CEOs.”—Anusha Narayanan, Greenpeace # ⚓ Global_Warming’s_Walking_Dead⠀⇛ Today, it is a time when NASA is able to present its data without having to be afraid to get its budget cut by conservative politicians for using the words “global warming”. Yet, conservatives and right-wing populists are all too eager to replay the Galileo Galilei vs. Catholic Church power struggle in which, the world’s foremost astronomer had the knowledge but the church had the power and the instruments of torture. As the journal Nature said on the IPCC climate report, earth is warmer than it’s been in 125,000 years. Collectively, the 7.9bn people on earth have moved earth into what we know as Anthropocene – the geological epoch dating from the time when human beings began to make a significant impact on earth’s geology and ecosystems. Some set the Anthropocene’s starting date as the early 1950s – the beginning of routine above-ground atomic testing. Anthropocene means rampant global warming. # ⚓ Extinction_Rebellion_Blockade_Central_London_Street_to_Kick Off_Fortnight_of_Protests⠀⇛ Hundreds of climate activists are occupying a busy street in central London today in the first of two weeks of protest against the UK financial sector’s continued investment in fossil fuels. The environmental campaign group Extinction Rebellion (XR) has erected a large pink “crisis table” at the junction of Long Acre and St Martins- In-the-Fields in Covent Garden. Stay up to date with DeSmog news and alerts # ⚓ Opinion_|_Carbon_Dividends_Provide_a_Win-Win_Solution_for People_and_the_Climate⠀⇛ Win-win solutions that bring tangible benefits in the present generation while safeguarding the planet for future generations can broaden public support for policies to fight climate change. This is the political intuition behind the Green New Deal, which reframes climate policy as an opportunity to reboot the economy and create millions of jobs. The same logic applies to carbon dividends, a strategy that puts a price on carbon emissions and returns the money straight to the people. # § Energy⠀➾ # ⚓ 15_Insurers_Drop_Trans_Mountain_Pipeline_After Grassroots_Pressure⠀⇛ # ⚓ As_Subsidies_Roll_in,_the_Fossil_Fuel_Industry_Is Winning_Efforts_to_Cast_Blue_Hydrogen_as_a_‘Clean’ Fuel⠀⇛ As global efforts to ramp up the hydrogen industry gain support with big government subsidies, new research casts increasing doubt on the climate credentials of the main recipient of that support, so-called “blue” hydrogen, which is extracted from natural gas and paired with carbon capture technology.  Hydrogen, an energy carrier proposed for helping transition the world away from fossil fuels, is well-suited for the oil and gas industry’s public relations machine. The industry, a major player in the main lobbying group, the Hydrogen Council, can run ads and talk about moving toward green hydrogen, which is produced from water using renewable energy, while working in the interim to get the world hooked on blue hydrogen. Blue hydrogen is made from natural gas, which is mostly methane, using electricity generated by burning more gas, and hydrogen is considered “blue” (rather than “gray”) when its carbon emissions are sequestered. The process uses lots of energy and releases carbon dioxide, plus, the natural gas supply chain is known to leak the powerful greenhouse gas methane.  Stay up to date with DeSmog news and alerts # ⚓ Tallinn’s_train_stations_missing_bicycle_parking lots⠀⇛ People taking trains often use bicycles as a means to get to the train station and leaving bicycles at the station would be a comfortable way of transportation. In many larger Tallinn train stations, such as Ülemiste, Kitseküla or Balti jaam, there is no option to do so, however, ETV’s daily affairs show “Aktuaalne kaamera” reported on Sunday. o § Finance⠀➾ # ⚓ In_Win_for_Gig_Workers,_Judge_Rules_California’s_Prop_22 Unconstitutional⠀⇛ # ⚓ Opinion_|_A_Victory_for_Gig_Workers_as_California_Rules Uber_Can’t_Hack_Labor_Laws⠀⇛ Gig workers have won an important victory in California’s courts. On August 20, a judge ruled that a ballot initiative by Uber, Lyft, and DoorDash aimed at creating a permanent precarious workforce was unconstitutional. The decision is a major blow to the platform companies, which spent well over $200 million last year on Prop 22 to overturn a state law extending employee rights to most California gig workers. # ⚓ Understanding_The_California_Ruling_That_Said_Prop_22,_The Gig_Worker_Ballot_Initiative,_Was_Unconstitutional⠀⇛ Opponents of Uber et al. have been cheering the recent California court decision declaring Proposition 22 unconstitutional. Proposition 22 was a ballot measure passed to override significant parts of the legislature’s AB 5 bill, which affected all sorts of untraditional employment arrangements, including those of “gig workers.” Some people unhappy with the policy effects of Proposition 22 then sued to challenge its validity under the California Constitution. And, at least initially, have won. # ⚓ Explaining_21st-Century_Capitalism_in_a_Way_Everyone_Can Understand⠀⇛ Capitalism is just one particular way of—a system for—organizing the production and distribution of goods and services. It differs from other systems such as slavery and feudalism but also shares some similarities with them. Capitalism, like slavery and feudalism, divides those engaged with the production and distribution of goods and services into two groups, one small and the other large. Slavery had masters (few) and enslaved people (many), while feudalism divided the groups into lords (few) and serfs (many). Employers are capitalism’s smaller group. They control, direct, and oversee the economic system. The employers use production and distribution to grow their wealth. Capital is wealth engaged in self-expansion. As the systemic agents who are socially positioned to perform that expansion, employers are capitalists. Capitalism’s much larger group comprises the employees (or workers). As the majority in the system’s workplaces, they do most of the work. Employees are divided into two groups. One group, often called “productive workers,” are those directly involved in producing goods or services. In a company that produces chairs, for example, they are the makers of the chairs (people directly transforming wood into chairs). The second group of employees, often called “unproductive workers,” are not directly involved in contributing to the workplace’s output. Rather, unproductive workers provide the conditions and the context that enable the productive workers to directly produce the output. Examples of unproductive workers in a workplace include clerks who keep records and sales and purchasing departments’ employees who secure inputs and market outputs. # ⚓ Sex_workers_made_OnlyFans_valuable_—_then_it_sold_them out⠀⇛ In 2019, OnlyFans, a content subscription platform founded three years prior, had about 120,000 creators registered with the site. But after the pandemic left millions of people out of work and sex workers unable to safely meet with clients in person, people flocked to the platform, which was already well-known for its adult content. By the end of 2020, OnlyFans boasted 1 million creators and 90 million users. o § AstroTurf/Lobbying/Politics⠀➾ # ⚓ Opinion_|_Will_Senate_Democrats_Stoop_to_Confirming_Rahm Emanuel_as_Ambassador?⠀⇛ When President Biden announced late Friday afternoon that he will nominate Rahm Emanuel to be the U.S. ambassador to Japan, the timing just before the weekend was clearly intended to minimize attention to the swift rebukes that were sure to come. # ⚓ Opinion_|_Our_Progressive_Agenda_Is_Popular_and_Our Candidates_Can_Win⠀⇛ Progressive policies are popular. Progressive candidates are winning. But you would not know that after the establishment takeover in the op-ed pages and political pieces following former state Sen. Nina Turner’s (D) loss in the Ohio special primary election.  # ⚓ The_Fall_of_the_House_of_Cuomo_–_Lessons_Unlearned⠀⇛ First, the comparisons: Former President Donald J. Trump must be chuckling. As the worst sexual predator to rule the White House, he must be wondering about the “weak” (his word) loser who quit while protesting his actions were innocent. Trump, the rapacious, super sexual assaulter, physically pushed women around, boasted about his prowess, and bragged about his seizures of women’s private parts. He also paid hush money to prostitutes in violation of campaign laws during his 2016 presidential campaign. Yet the Democrats, led by Senator Kirsten Gillibrand (D-NY), hounded Senator Al Franken out from the Senate before his requested investigations by the U.S. Senate Select Committee on Ethics began its inquiry for alleged sexual harassment. Franken’s actions were not Trump-like by any measure and occurred before Franken even ran for office. The women who worked for him, past and present, voluntarily came forward to vouch for Franken as a Senate champion both of women and of consumer rights. # ⚓ Primary_Challenger_Hits_Henry_Cuellar_for_Trying_to_Tank Biden_Agenda⠀⇛ Jessica Cisneros, a Democratic candidate for U.S. Congress in Texas’ 28th district, on Monday slammed the district’s incumbent Democratic Congressman Henry Cuellar for being willing to obstruct his own party’s effort to expand Medicare, establish a pathway to citizenship, and fight the climate crisis. “It is sad to see Henry Cuellar work so hard to stand in the way of improving the lives of everyday South Texans.”—Jessica Cisneros # ⚓ Buffalo’s_Democratic_Establishment_Still_Trying_to_Defeat Socialist_India_Walton⠀⇛ “I can promise every person in Buffalo that if I lost the primary, I wouldn’t be trying to change election laws and work with Republicans to override the will of Buffalonians.”—India Walton # ⚓ Bernie_Sanders’s_Third_Campaign⠀⇛ Burlington, Vt.—Bernie Sanders does not want to be mistaken for an optimist. “I’m a glass-half-empty kind of guy,” he grumbles, as he works his way through the stacks of budget documents that are strewn across the desk in his spartan office on the third floor of a 123-year-old red-brick building on the north end of downtown Burlington. That’s the image he’s fashioned for himself across five decades of political campaigning, and he’s comfortable with it. But the thing is, for all his genuine cynicism about the political and governing mechanisms he has long decried as corrupt, Sanders keeps erring on the side of what the writer Rebecca Solnit refers to as “hope in the dark.” He’s willing to take chances in order to push the boundaries of the possible: to run for and secure a seat in the US Senate as an independent, to bid for the presidency as a democratic socialist, to propose a political revolution. So it shouldn’t come as a surprise that—from his recently acquired position of prominence and power as chair of the Senate Budget Committee—Sanders has launched a new campaign to achieve “the most progressive moment since the New Deal.” For Sanders, this is an urgent mission that is about much more than the proposals outlined in the budget plan he joined Senate majority leader Chuck Schumer in outlining on August 9. It is a necessary struggle to address the simmering frustration with politics as usual that Donald Trump and his Republican allies have exploited to advance an antidemocratic and increasingly authoritarian agenda. # ⚓ The_Biggest_Gamble_of_Nancy_Pelosi’s_Life⠀⇛ # ⚓ Right-Wing_Dems_Begin_to_Cave_as_Progressives_Hold_Their Ground_on_Reconciliation_Vote⠀⇛ An effort by nine conservative House Democrats to force a quick vote on a bipartisan infrastructure bill reportedly began to collapse over the weekend as progressive lawmakers—and Speaker Nancy Pelosi—made clear that they would not allow the legislation to advance until the Senate also passes a sweeping reconciliation package, a centerpiece of the majority party’s agenda. Earlier this month, Rep. Josh Gottheimer (D-N.J.) and eight other Democrats sent a letter to Pelosi (D-Calif.) threatening to vote down a $3.5 trillion budget resolution—a measure that sets the stage for the reconciliation package—unless the House first passes a $550 billion bipartisan infrastructure bill that the Senate approved on August 11. Their stance won the support of powerful actors in Washington, most prominently the U.S. Chamber of Commerce, the biggest-spending corporate lobbying organization in the country. # ⚓ Afghanistan:_the_Miserable_Performance_Of_The_Mainstream Media⠀⇛ The editorial boards and oped writers of our mainstream media in discussing the war, continue to cite “enduring American faith in the values of freedom and democracy” as the underlying purpose of our effort.  The New York Times, in fact, cited the “purity of U.S. values” such as civil rights, religious tolerance, and women’s empowerment as a justification for our occupation of Afghanistan. Although the U.S. press praises our benighted efforts at nation building, the Soviet Union actually built more hydroelectric dams, tunnels, and bridges in Afghanistan than the United States has.  This includes the Friendship Bridge that provided an exit ramp for the Afghan military.  Moscow also educated about 200,000 Afghan engineers, military officers, and administrators, which allowed the Najibullah government to hang on for several years in the wake of the Soviet withdrawal in 1989.  The Ghani government didn’t last for 24 hours after our withdrawal. # ⚓ Dennis_Kucinich_and_Lisa_Wells_–_The_Project_Censored_Show, Uncategorized⠀⇛ Dennis Kucinich, of Ohio, served eight terms in the US House of Representatives, and twice ran for President. # ⚓ Apple’s_Tim_Cook,_Microsoft’s_Satya_Nadella_Plan_to_Visit White_House⠀⇛ Apple’s Tim Cook, Microsoft’s Satya Nadella and Amazon’s Andy Jassy plan to attend the event scheduled for Wednesday afternoon, according to people familiar with the matter. # ⚓ Joe_Biden_reportedly_hosting_cybersecurity_meeting_with_Tim Cook,_Satya_Nadella,_and_Andy_Jassy_attending⠀⇛ Apple, Microsoft, Google, Amazon, IBM, JPMorgan, and Southern Company all declined to comment to Bloomberg, and a Southern Company spokesperson declined to comment to The Verge. The other companies and the White House have not replied to requests for comment from The Verge. o § Censorship/Free Speech⠀➾ # ⚓ Ninth_Circuit_Affirms_MSNBC’s_Anti-SLAPP_Motion_Against_OAN Network’s_Bullshit_Defamation_Lawsuit⠀⇛ One America News (OAN) — a “news” network apparently more “fair and balanced” than the extremely right-leaning Fox News — sued MSNBC commentator Rachel Maddow for (factually) insinuating one of OAN’s reporters had a side gig working for the Russian government. The OAN reporter, Kristian Rouz, also worked for Sputnik, the government-controlled Russian news outlet. # ⚓ Kuwait_removes_‘un-Islamic’_statue_of_Aphrodite_from_shop display⠀⇛ Kuwait removed a statue of an ancient Greek goddess from a store after shoppers claimed the image contradicted the Gulf state’s Islamic values. A shop in the country’s 360 Mall displayed a statue of Aphrodite, the ancient Greek goddess of love and beauty, which was taken down by the ministry of commerce after complaints on Kuwaiti social media. # ⚓ Rising_violence_against_women_claims_two_lives_in_Karachi⠀⇛ A man threw acid on his former wife in the Baldia Town neighbourhood on Saturday reportedly over posting videos on TikTok. Police detained the suspect’s father and launched a search for the fleeing man. Sindh’s governor also took notice of the incident. # ⚓ ICE_Deported_Him_After_His_Movie_Came_Out._Now_He’s_Testing The_Limits_Of_Free_Speech⠀⇛ “They didn’t like that the film had come out,” Rojas told NPR in Spanish through an interpreter. “If I would have shown up at the Miami Film Festival, I was going to talk a lot. And they wanted to avoid that. So they silenced me.” o § Freedom of Information/Freedom of the Press⠀➾ # ⚓ Statement_On_Receiving_The_Serena_Shim_Award_For Uncompromised_Integrity_In_Journalism⠀⇛ Kevin Gosztola was awarded the Serena Shim Award for Uncompromised Integrity in Journalism for his work thus far on WikiLeaks founder Julian Assange’s case. The Association for Investment in Popular Action Committees, based in California, is an antiwar group that gives the award to those whose work is “deemed important, courageous, and relentless in pursuit of truth, however inconvenient it may be to those who use deception for political gain.” “Thank you for this award,” Gosztola said. “It validates the commitment I have to covering a case that has widespread implications for truth-tellers and freedom of the press. My coverage will not stop until the United States government is no longer trying to bring a publisher to the U.S. for a trial. ” Gosztola joins an esteemed group of independent journalists and organizations that have previously received the award including: Max Blumenthal, Glen Ford, Danny Haiphong, Caitlin Johnstone, Rania Khalek, Margaret Kimberley, Aaron Maté, Ben Norton, Gareth Porter, Black Agenda Report, Consortium News, The Grayzone, MintPress News, and Venezuela Analysis. In fact, Julian Assange previously received the award. All of these people or organizations are in some way, shape, or form scorned by think tank members or staff of outfits that receive funds from U.S. government-affiliated institutions, military and security contractors, or private companies in the banking or oil and gas industry. They are despised because they are effective in challenging the warfare state. What this award amounts to is a much needed but rare form of solidarity that will make it possible for Gosztola’s independent journalism on Assange and other truth-tellers, who are treated as enemies of the United States, to continue. o § Civil Rights/Policing⠀➾ # ⚓ 1984_in_2021:_We’re_Doing_Big_Brother’s_Job_for_Him⠀⇛ Disturbing, yes, but a prediction fail on Orwell’s part. The political class’s openly stated desire for a Ministry of Truth to suppress “misinformation” on social media notwithstanding, there’s little evidence that it needs any such brute mechanism to let it have its way with the facts. Circa 2021, mainstream media spend most of their ink and bandwidth uncritically regurgitating, and affirming their faith in, the political establishment’s preferred narrative of the moment. # ⚓ Opinion_|_We_Reject_the_Right-Wing_Attacks_on_Racial Justice_and_Our_Classrooms⠀⇛ As of the middle of August, more than two dozen states have introduced—and 11 states have enacted—bills or rules to restrict the teaching of history and contemporary social realities. Right- wing activists have mounted similar attacks at school board meetings throughout the country. This stunning barrage of legislation and policies aims to ban teaching critical race theory (CRT), and supposedly “divisive topics” in the curriculum. # ⚓ How_Will_the_UK’s_Nationality_and_Borders_Bill_Affect Migration_Across_the_English_Channel?⠀⇛ I attempt to put myself in the shoes of those desperate asylum seekers who put their life on the line knowing they may not make it to their destination. Unfortunately, while you, as a reader, and I, as a writer, and those policymakers in our safe place have the option to choose sides, the sea does not. The sea does not care where you come from or who you are; the sea does not discriminate; and the sea can kill, particularly those in those fragile boats. These asylum seekers are heroes fleeing persecution, oppressive governments, and, in many cases, wars in search of protection, security, and a better life. These asylum seekers are actual heroes, but if the current bill is passed, they will become criminals the moment they arrive in the UK. # ⚓ Truth_and_Justification:_On_the_Cruelties_Against Indigenous_People⠀⇛ “Kill the Indian, save the man,” proclaimed Richard Henry Pratt, a veteran officer of the Indian Wars and follower of Gen. George Custer. Pratt was describing the true mission of the Carlisle Indian Industrial School in Pennsylvania, which opened on a former Army base in 1879. By 1900, there were 150 such schools across the United States, all dedicated to eradicating the culture, language, and customs of Indigenous children. Europeans sailed across the Atlantic to “discover” the so-called New World, and they kidnapped our siblings, parents, aunts, uncles, grandparents, and great- grandparents. In these schools, our names were changed, our heads were shaved, and our clothes and other belongings were taken from us. Our families endured enormous physical, emotional, psychological, spiritual, and sexual abuse. And it’s not ancient history; we live with survivors of those schools. # ⚓ He_Admitted_to_a_Rape_41_Years_After_the_Fact._For_One Survivor:_“It’s_the_Most_Freeing_Experience_in_the_World”⠀⇛ Julienne Wood was walking through the aisles of Costco this June when a college friend rang her up. “Jules, where are you?” asked her friend, out of breath and barely able to speak. “I have something REALLY BIG to tell you. … You’re gonna finally get answers you’ve been looking for. … I sent you a series of articles from ProPublica. … It’s big — way, way bigger than we thought.” # ⚓ Why_Americans_hate_and_fear_the_poor:_Joanne_Samuel Goldblum_on_the_price_of_inequality⠀⇛ The Institute for Policy Studies recently reported on how the world’s richest people have profited from the human misery of the coronavirus pandemic while returning little if anything to the common good: [...] # ⚓ EXPOSED:_Western_Females_Groomed_to_Embrace_Islamic_Garb_as Afghani_Females_Shot_for_Improper_Attire_(Video)⠀⇛ Muslims have launched a sharia propaganda campaign aimed at veiling non-Muslim western girls using TikTok. The video-sharing platform has already been under scrutiny for its illegal use of data about children and ties to the Chinese government. Young women in German and Austrian cities are approached by Muslims who offer to “restyle” them with Hijabs and Islamic body coverings. Muslims film the young western girl’s “hijabi transformations” then post them on their TikTok channel. The channel is linked to an online Hijab store. The videos are inundated with comments by hundreds or thousands of what appear to be Muslim men, praising the girls for their beautiful Islamic transformation. The videos are being celebrated among radical Muslim circles. This embracement and glamorization of Islamic headwear and bodywear are helping to advances sharia in Germany, Austria, and the West. Cultural jihad is the attempt to change and subvert Western culture from within, or more simply put: to Islamize it. Sharia fashionwear is an example of a cultural and civilizational jihad   and the submission of Western non-Muslim women to that jihad. # ⚓ Taliban_‘going_door_to_door’_marking_those_of_prominent women⠀⇛ “Just an hour ago, I received an update from Kabul where they are going house to house searching for women who were activists, women who were bloggers, YouTubers, any women who had a role in the development of civil society in Afghanistan,’ she told Women’s Hour. “They are going door to door targeting those women and marking the doors with bright pink or bright- coloured paint to ensure ‘this is the house we need to come back to and do something about them’.” # ⚓ Police_killed_a_Black_Army_veteran_outside_his_home._His family_wants_answers.⠀⇛ She said she believes that because of her brother’s race, police took no measures to de-escalate the situation. o § Internet Policy/Net Neutrality⠀➾ # ⚓ Court_Slaps_Down_Ajit_Pai’s_Lazy_FCC_Ruling_On_5G_Safety, Likely_Fueling_Conspiracy_Theorists⠀⇛ To be clear, there’s absolutely no evidence that 5G wireless technology poses a meaningful impact to human health. Most of the conspiracy theorists that claim otherwise have a head full of pebbles, and are uniformly basing those claims on misinterpreted evidence or absolute gibberish. That doesn’t mean that you don’t want to continue studying cellular technology’s impact on the human body, or adjust your safety standards when the scientific evidence warrants. # ⚓ The_Law_Bytes_Podcast,_Episode_99:_“They_Just_Seemed_Not_to Listen_to_Any_of_Us”_–_Cynthia_Khoo_on_the_Canadian Government’s_Online_Harms_Consultation⠀⇛ Credits: Canada 2020, Democracy in the Digital Age: Addressing Online Harms o § Monopolies⠀➾ # ⚓ NY_Times_And_Washington_Post_Criticize_Facebook_Because_The Chicago_Tribune_Had_A_Terrible_Headline⠀⇛ I’m going to try, once again, to do that stupid thing where I try to express a nuanced point on the internet, where there’s a high likelihood of it being misunderstood. So, consider this opening a warning that you should read this entire article to try to get at the larger point. # § Patents⠀➾ # ⚓ Unilin_Granted_Patent_on_Digital_Structuring Technologies_in_Europe [Ed: Unilin seems not aware that the ‘European’ Patent Office is granting lots of fake patents these days, not_caring_about_quality_or validity]⠀⇛ Waregem, Belgium, August 23, 2021-The European Patent Office will grant a new European Patent on Unilin Technologies’ digital structuring technologies. The specific patent EP 3 381 710 will further extend Unilin Technologies’ patent portfolio on “digital structure technologies” for panels. # § Copyrights⠀➾ # ⚓ Aerosmith_Hands_Entire_Catalog_to_Universal_Music Group⠀⇛ Since Aerosmith’s founding 50 years ago, the group has gone on to sell more than 150 million albums around the world. Universal says the group are “the best-selling American hard rock band of all time”. # ⚓ The_Pirate_Bay_Earned_Millions_in_Bitcoin_Donations_ (If_it_HODLed)⠀⇛ The Pirate Bay continues to receive a steady stream of Bitcoin donations. Over the past year, these added up to roughly $10 per day, which isn’t a life-changing amount. However, if the site had kept all bitcoins received over the years, it would now be sitting on a pile of more than $6 million in Bitcoin. # ⚓ Two_DJ_Music_Piracy_Cases_Five_Years_Apart,_Two_Very Different_Outcomes⠀⇛ Dutch anti-piracy group BREIN says it has shut down a music piracy service that offered an illegal pool of 350,000 tracks in exchange for an annual payment of 250 euros. That matter has now ended in a cash settlement but five years ago, a man who provided a similar service in the UK with a not-for-profit motive, was jailed for a year. # ⚓ Meet_the_CC_Summit_Presenter:_Leo_Cunha⠀⇛ Leo is a seasoned systems architect and education technology executive with over 30 years of progressively challenging experience in management, leadership, and the design and development of mission critical software systems for education. ䷩ 𝚕𝚒𝚗𝚎 5273 ╒═══════════════════ 𝐃𝐀𝐈𝐋𝐘 𝐋𝐈𝐍𝐊𝐒 ═════════════════════════════════════════════╕ ⠀⌧ █▇▆▅▄▃▂▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁ 08.24.21⠀▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▁▂▃▄▅▆▇█ ⌧ Gemini_version_available_♊︎ ✐ Links_24/8/2021:_GNU_Taler_0.8_and_Beta_of_MX_Linux_21⠀✐ Posted in News_Roundup at 12:34 pm by Dr. Roy Schestowitz 🄸🄼🄰🄶🄴 🄳🄴🅂🄲🅁🄸🄿🅃🄸🄾🄽 ⦇GNOME bluefish⦈ § Contents⠀➾ * GNU/Linux o Distributions o Devices/Embedded * Free_Software/Open_Source * Leftovers * § GNU/Linux⠀➾ o § Kernel Space⠀➾ # ⚓ Linux_Kernel_Changes_Proposed_So_Intel_TDX_KVM_Guests_Avoid Crashing_The_Host_–_Phoronix⠀⇛ Shortly after Intel’s TDX whitepaper was made public last year for better protecting virtual machines, Intel open-source engineers began posting support patches for bringing up Trust Domain Extensions under Linux. That work remains ongoing and now further Linux kernel infrastructure work is pending to better deal with the notion of guest private memory afforded by TDX. Intel Trust Domain Extensions (TDX) allow for better hardware isolation between virtual machines and the VMM/hypervisor. TDX introduces a secure arbitration mode, multi-key total memory encryption, remote attestation, and other features. TDX is expected with next-gen Xeon Sapphire Rapids CPUs. # ⚓ HSE_2.0_Open-Source_Storage_Engine_Is_On_The_Way_From Micron⠀⇛ Announced back in April of 2020 was Micron’s HSE as an open-source storage engine optimized for solid- state drives and persistent memory. After quickly crossing the v1.0 milestone and working its way up to HSE 1.9 at the end of last year, there hasn’t been any updates since. Fortunately, the project is still alive and HSE 2.0 is on the way. The Heterogeneous-Memory Storage Engine (HSE) is designed for SSDs and persistent memory and to be useful for HPC, machine learning, IoT, and other key-value store use-cases. HSE is much faster than the likes of RocksDB and MongoDB on modern, speedy storage products — such as those from Micron. # § Graphics Stack⠀➾ # ⚓ AMDVLK_2021.Q3.5_Released_With_Radeon_RX_6600_XT Support_–_Phoronix⠀⇛ AMDVLK 2021.Q3.5 is out as the newest snapshot for this open-source AMD Radeon Vulkan Linux driver. AMDVLK 2021.Q3.5 adds Navi 23 GPU support, adds a setting to override the bin size calculation, and fixes additional Vulkan CTS failures. The Navi 23 support is for the Radeon RX 6600 XT that launched earlier this month. The Mesa RADV driver and packaged Radeon Software for Linux Vulkan drivers have already supported this new RDNA2 GPU while AMDVLK has been late to the party in supporting this mid-range graphics card. Thankfully today that changed with this new AMDVLK code drop. # ⚓ AMD’s_Open-Source_Mesa_Driver_Continues_To_Be Ruthlessly_Optimized_For_Workstation_Performance_– Phoronix⠀⇛ One of the areas where AMD’s long-standing “PRO” OpenGL driver has generally held an advantage over RadeonSI Gallium3D has been around workstation software but that has been changing. Over the past year there have been AMD developers working on making major optimizations for SPECViewPerf workloads, lowering the driver overhead, and other improvements for workstation OpenGL software. # ⚓ NVIDIA_DLSS_for_Proton_+_Linux_with_DirectX_11_/_12 lands_in_September_|_GamingOnLinux⠀⇛ NVIDIA announced today an expansion of RTX and DLSS for plenty of Windows games, and for Linux users there’s something exciting coming too: NVIDIA will hook up DLSS with DirectX 11 and 12 with Proton in September. What is DLSS? NVIDIA DLSS (Deep Learning Super Sampling) is an AI-powered rendering tech to help increase performance for NVIDIA GPUs using their dedicated Tensor Core AI processors. It helps to boost framerates by rendering frames at a lower resolution and then it’s made to look much crispier using deep learning. o § Instructionals/Technical⠀➾ # ⚓ How_to_Find_the_IP_Address_in_Linux⠀⇛ An IP address is a unique address that identifies a device on the internet or a local private network. Every computer in the network requires its own unique IP address to get identified. There are two different IP addresses: private and public. A computer can be assigned private IPs or public IP or both. A public IP is an address that is exposed to the internet. Devices that are assigned public IP can be accessed from the internet. Whereas private IP is accessible to a local internal network. In this tutorial, we learn the different ways to find the IP Address of a Linux system. # ⚓ How_to_Install_Icinga_2_Monitoring_Tool_on_CentOS_8⠀⇛ Monitoring is one of the most important components of the server infrastructure and data center. It will help you to detect problems and issues that will occur on your servers so you can solve that issues faster. There are some open-source monitoring tools available out there, and one of the most popular is ‘Icinga 2′. Icinga is created as a fork of the popular Nagios monitoring tool and now has been rewritten from scratch in C++. As fork from the Nagios project, Icinga has come with additional tools and features, including the icinga director, icinga modules, and icinga plugins. Also, it has support for distributed monitoring that allows you to manage multiple Icinga instances from one dashboard. In this tutorial, we will show you step-by-step how to install and configure Icinga2 with Apache2 and MariaDB on CentOS 8 server. # ⚓ How_to_organize_your_lists_in_Linux_with_Dynalist⠀⇛ Do you have a habit of creating to-do lists or idea lists on a notepad on your Linux PC? If so, there’s a better way to go about it. Introducing Dynalist: an excellent note-taking editor for Linux. Here’s how to use it on Linux. # ⚓ How_to_play_Splitgate_(Beta)_on_Linux⠀⇛ Splitgate is a PVP game that the developer says is “Halo meets Portal.” In the game, users can portal with a portal gun while defeating enemies with various weapons. The game is in Beta, so it can be unstable. However, it is free to play. Here’s how to enjoy Splitgate on Linux! # ⚓ How_to_install_SolveSpace_on_Linux⠀⇛ SolveSpace is an open-source, parametric 2d and 3d CAD software suite for Linux, Mac, and Windows. SolveSpace has a lot of exciting features that CAD modelers will love. In this guide, we’ll show you how to install SolveSpace on Linux. # ⚓ How_To_Set_Or_Change_Hostname_In_Debian_11_Bullseye_– OSTechNix⠀⇛ The other day I upgraded my Debian 10 buster system to Debian 11 bullseye. The upgrade was smooth and easy! Now, I want to update the old hostname in Debian 11 system. In this brief guide, let me explain how to set or change hostname in Debian 11 bullseye system from commandline. # ⚓ How_to_use_RustDesk_on_Linux⠀⇛ RustDesk is an excellent, open-source remote desktop application. It is similar to Teamviewer and Anydesk. However, it is better as it allows users to host their own connection server if they choose (it is not required, though). Here’s how to use RustDesk on Linux. # ⚓ How_to_play_Divinity:_Original_Sin_2_on_Linux⠀⇛ Divinity: Original Sin 2 is an RPG video game developed and published by Larian Studios. It is the sequel for Divinity: Original Sin 1. In the game, players can play solo or with three friends. The game is very similar to Dungeons & Dragons and is known for its in-depth RPG mechanics. Here’s how to play it on Linux. # ⚓ How_To_Install_GlassFish_on_AlmaLinux_8_–_idroot⠀⇛ In this tutorial, we will show you how to install GlassFish on AlmaLinux 8. For those of you who didn’t know, GlassFish is an open-source application server for the Java EE platform. GlassFish project is initially started by Sun Microsystem and is now sponsored by Oracle Corporation. GlassFish allows developers to create applications for enterprises that are portable, scalable, and that integrate with legacy technologies. This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the GlassFish on AlmaLinux 8. You can follow the same instructions for Rocky Linux. # ⚓ How_To_Enable_Hibernation_On_Ubuntu_(When_Using_A_Swap File)_–_Linux_Uprising_Blog⠀⇛ This article explains how to enable hibernation using systemd on Ubuntu when using a swap file (which is default for Ubuntu at least since version 18.04). My laptop’s battery drains quite fast while it’s sleeping. I’ve tried some solutions / workarounds, like this one (except for me the problem wasn’t that the laptop was losing half its energy overnight, but all of it in only a few hours), but to no avail. So I decided to enable the hibernate option (suspend to disk) and use that instead of the default sleep option (suspend to RAM), because it uses less power, so the laptop battery is not drained while not in use, albeit taking a bit longer to wake up from hibernation than from sleep. So here’s how to do that. The instructions below may work on other Linux distributions, but I only tested this on Ubuntu (it should work in the exact same way on any Debian- based and Ubuntu-based Linux distributions, including Pop!_OS, etc.). On non Debian-based Linux distributions you may need to use different commands for updating GRUB 2 (step 4) and regenerating initramfs (step 6) as these are Debian-specific commands. # ⚓ How_to_Install_Brave_Browser_on_Debian_11⠀⇛ Brave is a free and open-source web browser developed by Brave Software, Inc. based on the Chromium web browser. Brave is a privacy-focused Internet web browser, which distinguishes itself from other browsers by automatically blocking online advertisements and website trackers in its default settings. Brave has claimed its browser puts less strain on your computer’s performance than Google Chrome, regardless of how much you ask of it. Even with multiple tabs open at once, Brave uses less memory than Google Chrome-like, up to 66% less. # ⚓ How_to_Install_Fail2ban_with_Firewalld_on_Rocky_Linux_8⠀⇛ Fail2ban is an intrusion prevention software framework that protects computer servers from primarily brute-force attacks, banning bad user agents, banning URL scanners, and much more. Fail2ban achieves this by reading access/error logs of your server or web applications. Fail2ban is coded in the python programming language. The guide will give a rundown on installing Fail2ban on Rocky Linux 8 and some basic setup and tips. o § Games⠀➾ # ⚓ GOverlay_just_got_an_awesome_update_to_make_editing MangoHud_even_easier_|_GamingOnLinux⠀⇛ GOverlay, the open source app for managing various Linux gaming overlays just got a fantastic upgrade, with it now having a live OpenGL preview for MangoHud. MangoHud is awesome but configuring it by hand is a bit of a nuisance, diving into text files and remembering all the different options. GOverlay gives you simple checkboxes and dropdowns to adjust your overlay and now you only need to tap a button to update a real-time preview. Nothing external needed now and it makes everything even simpler – exactly what we love to see. # ⚓ Aliens:_Fireteam_Elite_is_out_and_works_right_away_on_Linux with_Proton_|_GamingOnLinux⠀⇛ Aliens: Fireteam Elite from Cold Iron Studios is a brand new co-op third-person shooter, which is out officially today and it works right away on Linux with Steam Play Proton. Note: key personally purchased. Since I am an absolute fanatic when it comes to the Alien franchise, I couldn’t pass up this opportunity. Not only that, we don’t get a lot of good online shooters that work on Linux with so many blocked by anti-cheat. Thankfully this is one game that seems to just work. Testing with the latest Proton 6.3-6, everything appears to work out of the box. # ⚓ Office_Point_Rescue_–_Out_the_Office_is_a_wonderful_homage to_retro_shooters_|_GamingOnLinux⠀⇛ If you loved going to arcades to play shooters when you were younger, or you loved the classic console first-person shooters you should check out the new Office Point Rescue – Out the Office. Developed by Magellanic Games, it’s their first full-length title following on from multiple smaller free retro games released on itch.io. This is actually a follow-on from Office Point Rescue – Deja Vu, which acts as the first free chapter so you can get a feel for it by playing that first. This is much bigger though, with a lot more varied content. “Continuing on from the terrorist incident at the Emeraldalo Corporation’s headquarters, Agent Foldon uncovers schemes and projects far more horrific than could be imagined. All was not what it seemed at, or rather below, EMC’s headquarters.” # ⚓ Sci-fi_colony_management_sim_Stardeus_has_hit_the Kickstarter_goal_and_then_some_|_GamingOnLinux⠀⇛ Stardeus is an exciting looking game coming from developer Kodo Linija and the good news is that it’s managed to hit the funding goal on the recent Kickstarter. Inspired by the likes of RimWorld, Factorio, Dwarf Fortress, Oxygen Not Included, Prison Architect and FTL it certainly has plenty to live up to. With 21 days still to go the initial £12,000 was pretty low and with such a grand idea, it was clear it was going to be a success. There’s a demo too available on itch.io and Steam which has certainly helped. It’s one thing to have a good idea and a flashy video but if you’re a mostly unknown name it can be difficult to pull people in. After over a year in development the developer said part of the reason for the Kickstarter was publicity for the demo to help feedback. # ⚓ Stardew_Valley_just_became_an_esport_with_a_$40,000 tournament_in_September_|_GamingOnLinux⠀⇛ I still can’t quite believe it’s real but it really is. The casual farming game Stardew Valley just became something of an esport with a new competition with a $40,000 prize. Stardew creator Eric “ConcernedApe” Barone has teamed up with Zach “Unsurpassable Z” Hartman to host the tournament which will be live on Hartman’s Twitch channel on September 4 starting at 09:00 PST / 16:00 UTC. It’s a celebration of the game and some of the top speedrunners and creators in the community. For a game that’s supposed to be about chilling- out, doing a little farming and possible a little romance, having a competitive event might seem a little odd but quite probably thoroughly entertaining too thanks to over 100 challenges that have been set for the event. Instead of trying to speedrun through, each team has a few hours to complete as many of the challenges as possible with each worth a different amount of points. There will also be additional challenges thrown in every 30 minutes that teams won’t know until they happen. o § Desktop Environments/WMs⠀➾ # § K Desktop Environment/KDE SC/Qt⠀➾ # ⚓ OBS_builds_of_KDE/Plasma_for_Debian/Bullseye_– Testing_–_Unstable⠀⇛ With the release of Debian/Bullseye last week, we can now support the stable Debian release (Bullseye) as well as Testing and Unstable releases with our build of KDE/ Plasma (frameworks, plasma, gears, related programs) on the OBS builds. We used this switch to also consistently support three architectures: amd64, i386, and aarch64. # § GNOME Desktop/GTK⠀➾ # ⚓ GNOME_41_Beta_is_Now_Available_For_Linux–Here_Are_the Updated_Packages⠀⇛ GNOME Project announced that its newest beta version will now soon become available for Linux testers. The GNOME 41 public beta is set to be available on Sept. 2. GNOME Project unveiled that the newest beta 41 is now available. Here are the features that Linux users should know. According to a report by 9to5Linux on Tuesday, Aug.24, the release of GNOME 41 was the first update that the project developer created since GNOME 41. The team said that the beta will introduce several improvements, including bug fixes, new features, and applications. # ⚓ GNOME_41_Beta_Introduces_SIP/VoIP_Support_with Significant_Updates_to_Applications_–_It’s_FOSS_News⠀⇛ While GNOME 40 was a significant upgrade, GNOME 41 is the next version bump with several improvements and new feature support. It should be available as a stable release next month. Now, the beta version is available for public testing. [...] Considering its official release announcements, let me mention a few essential changes. Start with GNOME 41; you can now manage your SIP (Session Initiation Protocol) account using the UI. You can easily place VoIP calls using the dial pad right from the system. Even though this is not something, every user needs, you may want to opt for a SIP account if you need to cut costs with international calls. GNOME 41 will make it easy for you to integrate the account and use it from the get-go. # ⚓ Apple_M1_Now_Boots_Gnome_Desktop_on_Debian_Linux⠀⇛ In an important update from the battle to tame the Apple M1 chip into running Linux natively, as noticed by The Register, graphics developer Alyssa Rosenzweig, along with her Asahi Linux colleagues, has managed to get the Gnome Shell running on the bare metal, albeit without GPU acceleration. o § Distributions⠀➾ # § New Releases⠀➾ # ⚓ MX_Linux_21_KDE_Plasma_Edition_Is_Now_Available_for Beta_Testing_with_Plasma_5.20_Desktop⠀⇛ Last week, I told you about the Xfce and Fluxbox beta releases of the forthcoming MX Linux 21 “Wildflower” distribution, which will be based on the recently released Debian GNU/Linux 11 “Bullseye” operating system series and the long-term supported Linux 5.10 LTS kernel series. And now, the KDE Plasma edition is ready for testing too, based on the AHS (Advanced Hardware Support) images of MX Linux 21 KDE and available only for 64-bit computers. The KDE Plasma edition ships with the Plasma 5.20 desktop environment series, more precisely the 5.20.5 point release. # ⚓ MX_Linux_21_With_Fluxbox_is_a_New_Edition_Available for_Beta_Testing⠀⇛ The MX Linux community is preparing for a new release in the MX Linux 21 series. This release will be based on the freshly released Debian 11 “Bullseye” and MX components. Unlike previous releases, the Fluxbox edition will be available as a separate ISO file along with the XFCE and KDE desktop editions. The new Fluxbox edition is a good addition to the series with a lower resource requirement. Let’s take a look at what MX Linux 21 with a customized Fluxbox desktop offers. # § IBM/Red Hat/Fedora⠀➾ # ⚓ Enabling_Simple_Content_Access_and_registering_to_Red Hat_Insights_with_Subscription_Manager⠀⇛ Simple Content Access (SCA) allows you to access Red Hat software content without attaching a subscription to a particular system or environment. Separating subscriptions and content management makes it easier for admins to fully utilize their RHEL subscriptions efficiently. In this three-part series, we will cover how to enable Simple Content Access and register your systems to Red Hat Insights and how to view your Red Hat Enterprise Linux (RHEL) systems in the Red Hat Customer Portal. We’ll also cover how to create custom tags to use tag filtering in Red Hat Insights to support more refined views of your RHEL environments. # ⚓ Building_a_DevSecOps_culture_and_shifting_security left⠀⇛ There is an old saying that you can pick only two of the following traits: good, fast, and cheap. If you choose a good and fast path, it will be expensive. If you choose good and cheap, it will take time to get it delivered. Lastly, the fast and cheap selection will yield poor quality. Over the past decade, companies have embraced DevOps methodologies, and understand the tough selection between the three traits. Tool selection is extremely important to implement a DevOps culture, although it will require more than just the perfect tool. Successfully implementing DevOps, as a culture and practice, is predicated on automation. Efficient automation is how a company like Etsy does 50 deployments per day. This speed of development and deployment has some obvious advantages—bugs don’t live in production very long because rapid development and deployment replaces them very quickly with corrected code. You can also introduce new features quickly without having to wait for long development cycles to create a complete package. A new feature can be developed and deployed while other features are being developed alongside. # ⚓ Exploring_our_bugs,_part_2:_resolution_–_Fedora Community_Blog⠀⇛ This is this second part of a series I promised during my Nest With Fedora talk (also called “Exploring Our Bugs”). In this post, I’ll analyzing the bug report resolutions from Fedora Linux 19 to Fedora Linux 32. If you want to do your own analysis, the Jupyter notebook and source data are available on Pagure. These posts are not written to advocate any specific changes or policies. In fact, they may ask more questions than they answer. # ⚓ 4_IT_automation_myths_dispelled_|_Enable_Sysadmin⠀⇛ If it takes more time to automate a certain task than simply to accomplish the job manually, it is not worth automating. You are likely to get resistance from your peers or management about automating tasks based on time savings. In reality, every job you do as an engineer is worth automating, but you have to be cognizant of the time and deliverables. When certain tasks appear to be not worth automating, I have often found that what is actually meant is that it’s just not possible to automate it at this time. However, in the future, your objective should be to automate the task—you are likely to get less resistance from your team if you keep this perspective. Just make sure to communicate the automation proposal in a way that meets your immediate goals and improves future effectiveness. # ⚓ Game_telemetry_with_Kafka_Streams_and_Quarkus,_Part_1 |_Red_Hat_Developer⠀⇛ Apache Kafka makes it possible to run a variety of analytics on large-scale data. This is the first half of a two-part article that employs one of Kafka’s most popular projects, the Kafka Streams API, to analyze data from an online interactive game. # ⚓ Remote_work:_4_misconceptions_about_workplace_re- entry_|_The_Enterprisers_Project⠀⇛ When COVID forced the world to quickly adapt to a remote work environment, many of us thought that we were facing our biggest workforce challenge. But as leaders and employees grapple with how to move forward post-pandemic, we’re quickly realizing that our greatest obstacle may well be re-entry into the workplace. From the very beginning of the pandemic, we knew work would never look the same, and discussions surrounding “back to normal” quickly changed to “the new normal.” But as much as we’ve hyped this concept, no one has been able to define it: Employers are struggling to outline what expectations they should have for employees, who in turn are wondering how they will adjust, again, and rework their schedules to accommodate their employer’s expectations. On top of all this, many people are reexamining what a successful career looks like and are trading cutthroat, always-on jobs for roles that allow for more flexibility and meaning – a trend that’s becoming known as the “Great Resignation.” # § Canonical/Ubuntu Family⠀➾ # ⚓ Icons_Look_too_Small?_Enable_Fractional_Scaling_to Enjoy_Your_HiDPI_4K_Screen_in_Ubuntu_Linux⠀⇛ A few months ago, I bought a Dell XPS laptop with a 4K UHD screen. The screen resolution is 3840×2400 resolution with a 16:10 aspect ratio. When I was installing Ubuntu on it, everything looked so small. The desktop icons, applications, menus, items in the top panel, everything. It’s because the screen has too many pixels but the desktop icons and rest of the elements remain the same in size (as on a regular screen of 1920×1080). Hence, they look too small on the HiDPI screen. o § Devices/Embedded⠀➾ # § Open Hardware/Modding⠀➾ # ⚓ Power_of_Python_for_Arduino_Nano_RP2040_Connect_and Nano_33_BLE⠀⇛ Python support for three of the hottest Arduino boards out there is now yours. Through our partnership with OpenMV, the Nano RP2040 Connect, Nano 33 BLE and Nano 33 BLE Sense can now be programmed with the popular MicroPython language. Which means you get OpenMV’s powerful computer vision and machine learning capabilities thrown in. # ⚓ An_ESP32-based_BBC_Micro:bit_clone_–_Meet_Mbits_–_CNX Software⠀⇛ A few years ago, we noted a BBC Micro:bit clone based on ESP32 WiSoC with Banana Pi ‘s BPI:bit board with an array of 25 RGB LEDs and WiFi & Bluetooth LE connectivity. There’s now another such clone with Elecrow Mbits designed in a way that resembles the BBC Micro:bit v2 board, but replacing the Nordic Semi nRF52833 2.4GHz/BLE SoC with the ESP32 dual-core wireless chip with support for both WiFi and BLE. # ⚓ This_electronic_arrow_spine_tester_measures_arrow consistency_|_Arduino_Blog⠀⇛ Repeatability requires consistency. This principle even applies to archery. If you want to hit the bullseye on every shot, you have to draw the string with consistent force, keep your stance consistent, and so on. You also want your arrows to be as consistent as possible. One major factor that goes into an arrow’s consistency is the stiffness of the shaft, called the spine rating. This electronic tester makes it easy to measure that. The simplest and most common way to determine an arrow’s spine rating is to place the arrow on two supports — one near the head and one near the fletching. You then hang a weight from the middle of the shaft and measure how much it bends. More sophisticated mechanical testers include a dial, similar to what you’d see on a torque wrench. This electronic tester follows the same principles, but provides digital precision. # ⚓ Vital_Care_is_an_Arduino-based_device_for_the continuous_monitoring_of_vital_signs_|_Arduino_Blog⠀⇛ It is probably well known by now that COVID- 19 can cause serious side effects in people that last for months at time, meaning that recovering from the disease can be an arduous process. Some symptoms include trouble breathing, heart inflammation, and blood clotting, so being able to track these conditions as they progress is vital to ensuring ongoing safety for a patient. In response, Kamrul Hussain created the Vital Care project and entered it into element14’s Design for a Cause 2021 contest, where makers were challenged to use the Arduino Nano 33 IoT in some way for the good of humanity. # § Mobile Systems/Mobile Applications⠀➾ # ⚓ Google’s_new_Android_12_accessibility_feature_lets users_control_phone_with_face_gestures⠀⇛ # ⚓ How_to_make_Android_12’s_device_control_panel_easier to_access_–_The_Verge⠀⇛ # ⚓ How_to_use_Android_12’s_clever_new_auto-rotate_system –_The_Verge⠀⇛ # ⚓ Android_12:_How_to_turn_on_auto-rotate_with_face detection⠀⇛ # ⚓ How_to_Get_ROG_Phone_5s_Live_Wallpapers_on_Any Android_Phone_|_Beebom⠀⇛ # ⚓ How_to_Use_Android_Phone_as_Mouse,_Webcam_or_Second Display⠀⇛ # ⚓ Samsung’s_August_2021_update_comes_to_the_Galaxy_S21 series_on_AT&T_and_T-Mobile⠀⇛ # ⚓ Samsung_offers_iPhone_owners_huge_incentive_to_switch to_Android_|_Express.co.uk⠀⇛ # ⚓ Belgian_Police_warns_smartphone_users:_The_Joker virus_is_back_with_these_8_Android_apps_–_Times_of India⠀⇛ # ⚓ Poll:_What_would_it_take_for_you_to_leave_Android?_– Android_Authority⠀⇛ # ⚓ Hisense_U8G_Review_(2021):_The_Best_Affordable Android_TV_|_WIRED⠀⇛ # ⚓ Allente_completes_integration_of_Google’s_Common Broadcast_Stack_for_Android_TV_–_Digital_TV_Europe⠀⇛ # ⚓ Android_UI_through_the_ages:_From_Droid_Sans_to Material_You_|_Android_Central⠀⇛ # ⚓ Introducing_Skyy_10.8″_Android_tablet_with_the_most advanced_Glasses-Free_3D_Optics_ever_available_on_a consumer_device,_a_technological_breakthrough_between USA,_China_and_Jamaica⠀⇛ # ⚓ SVP_Is_A_New_Video_Player_For_Android_That_Includes MEMC_Support⠀⇛ # ⚓ Android_12_open_beta_download:_Check_list_of compatible_devices,_how_to_install_Android_12_open_beta on_your_phone_|_Zee_Business⠀⇛ # ⚓ Unlocked_Samsung_Galaxy_A20_is_getting_Android_11- based_One_UI_3.1_in_the_US_–_GSMArena.com_news⠀⇛ # ⚓ Motorola_Android_11_update:_List_of_eligible_devices &_release_date⠀⇛ # ⚓ OnePlus_has_updated_these_phones_to_Android_11_– 9to5Google⠀⇛ # ⚓ Rogers,_TELUS,_Fido,_Koodo,_&_Bell_Android_11_update tracker⠀⇛ # ⚓ Uninstall_these_malicious_fake_apps_from_your_Android phone_now!_–_PhoneArena⠀⇛ # ⚓ Annoyed_by_Android_clutter?_HarmonyOS_offers_a_great solution⠀⇛ # ⚓ How_to_Clear_Cookies_on_Android_|_Tech_Times⠀⇛ # ⚓ How_to_use_your_Android_phone_as_a_webcam_for streaming_and_video_calls_|_Business_Insider_India⠀⇛ # ⚓ Here’s_how_you_feel_about_ads_in_Android_skins_and pre-loaded_apps⠀⇛ o § Free, Libre, and Open Source Software⠀➾ # ⚓ Intel_Releases_OSPray_Studio_0.8⠀⇛ One year ago to the day Intel announced OSPray Studio as a scene graph application for rendering glTF assets and other 3D models. OSPray Studio is built off their OSPray ray-tracing engine that they’ve been working on for years. These Intel efforts are all part of their oneAPI initiative and today happens to mark a shiny new feature release. # § FSF⠀➾ # § GNU Projects⠀➾ # ⚓ Drop-in_replacements_for_Core_Utilities⠀⇛ The GNU Core Utilities or coreutils is a package of GNU software containing implementations for many of the basic tools, such as cat, ls, and rm, which are used on Unix-like operating systems. Every day, we use many command-line tools to manage our systems, and perform basic tasks. Many of the programs provided by coreutils are staples in our daily life. Over the years, these tools have been updated and ported to other systems, but they still retain many of their original traits. Alternative implementation packages, with a slightly different scope and focus, or license. For example, GPLv2- licensed BusyBox and BSD-licensed Toybox are available for use in embedded devices. There also a project called uutils-coreutils which seeks to write cross-platform CLI utilities in Rust. It aims for high compatibility with coreutils. Adoption of the tools hasn’t spread to production environments. There’s also an alternative to coreutils using software from FreeBSD but compatibility is low, user adoption is very low, and like uutils-coreutils it’s missing many commands. # ⚓ 2021-9:_GNU_Taler_v0.8_released⠀⇛ We are happy to announce the release of GNU Taler v0.8. We have addressed over 400 individual issues, our bug tracker has the full list. # § Programming/Development⠀➾ # ⚓ Solve_the_repository_impedance_mismatch_in_CI/CD_| Opensource.com⠀⇛ An impedance mismatch in software architecture happens when there’s a set of conceptual and technical difficulties between two components. It’s actually a term borrowed from electrical engineering, where the impedance of electrical input and output must match for the circuit to work. In software development, an impedance mismatch exists between images stored in an image repository and its deployment descriptors stored in the SCM. How do you know whether the deployment descriptors stored in the SCM are actually meant for the image in question? The two repositories don’t track the data they hold the same way, so matching an image (an immutable binary stored individually in an image repository) to its specific deployment descriptors (text files stored as a series of changes in Git) isn’t straightforward. # ⚓ Arm_Posts_New_GCC_Compiler_Patches_Due_To_New Vulnerability_Affecting_ARMv8-M_TrustZone_–_Phoronix⠀⇛ Made public on Monday was CVE-2021-35465 as a new security vulnerability affecting various Arm products. For unmitigated (ARMv8-M) hardware, Arm has posted a series of GCC compiler patches for working around the issue. CVE-2021-35465 is this new Arm processor vulnerability affecting a subset of their designs — particularly ARMv8-M and ARMv8.1- M products for micro-controllers and other embedded use-cases for TrustZone and more. # § Shell/Bash/Zsh/Ksh⠀➾ # ⚓ Choosing_and_changing_your_Linux_shell⠀⇛ There are quite a few shells on Linux system and more that can be easily added. This post examines some of the more popular shells, how they differ and the files that contribute to their configuration. The default shell on most Linux systems is bash. Unless you make an effort, any user accounts added to the system will be assigned bash as their login shell. Bash has been around since 1989 and was meant to replace the Bourne shell (sh). In fact, if you take a look at /bin/sh, you’ll probably find that it’s nothing more than a symbolic link to /bin/bash. * § Leftovers⠀➾ o ⚓ The_lazy_audiophile⠀⇛ Whenever I mention that next to my regular headphones, I also use a pair of Bluetooth headphones, people swear at me, claiming that it substantially degrades sound quality. Yes, that is right. And to add insult to injury, I even use active noise canceling, which changes the original sound even more. But who cares when it is just background music, so I can concentrate on my work when people are talking around me? It does its job: keeps the noise out. Of course I switch to my studio headphones as soon as I want to focus on the music itself. But when it comes to background music, Bluetooth is a lot more comfortable. o § Integrity/Availability⠀➾ # § Proprietary⠀➾ # ⚓ CloudChomp_Adds_Discovery_for_Secure_Shell_for_Linux Machines⠀⇛ CloudChomp, Inc., a leader in AWS cloud migration planning and discovery solutions and an Advanced Technology Partner in the Amazon Web Services (AWS) Partner Network (APN), announces their latest release which includes support for Secure Shell (SSH), a secure cryptographic protocol. SSH will be the primary data collection standard for stand-alone Linux machines and will supplement the data collected from vCenter for Linux machines to include application discovery and application dependency mapping. # § Security⠀➾ # ⚓ 13_million_malware_attacks_on_Linux_seen_in wild [Ed: It's hardly about the "Linux" kernel and these "attacks" are not successful one]⠀⇛ Cryptominers, web shells and ransomware are the most common varieties of malwares targeting Linux systems, thanks to its prevalence as the backbone of most public cloud services # ⚓ Report_Details_Linux_Threat_Landscape [Ed: Of course “FOSSlife Team” had to amplify this marketing/sales pitch as well⠀⇛ # ⚓ Linux_cloud_environments_face_an_onslaught_of malware_attacks [Ed: Mayank Sharma the latest to parrot this self-promotional FUD of an insecurity firm]⠀⇛ # ⚓ New_Linux_malware_family_evades_antivirus detection [Ed: Mayank Sharma seems to have chosen a focus on "Linux" fear-mongering rather than news; pushing AV nonsense, which is proprietary software]⠀⇛ Cybersecurity researchers have uncovered severalmalicious Linux binaries that have successfully managed to sneak past most antivirus products. # ⚓ 38_million_records_exposed,_Microsoft_Power Apps_blamed⠀⇛ Thousands of web apps left sensitive data exposed online due to misconfigured settings for Microsoft Power Apps. Thirty-eight million records appeared online, including social security numbers, COVID-19 vaccination statuses, home addresses, and phone numbers. American Airlines, J.B. Hunt, Microsoft, and several government bodies are among the affected organizations. UpGuard notified 47 entities regarding the data exposure and reached out to Microsoft about it as well (via WIRED). The data leaks came as a result of organizations using Microsoft’s Power Apps. These can be used to create websites and to manage data, but if misconfigured can result in security risks. Power Apps can be used to manage data that organizations would like to have public, such as the locations of vaccination centers, as well as data that should remain private, such as Social Security numbers. The default settings for Power Apps left data publicly accessible until a recent change from Microsoft. ╘══════════════════════════════════════════════════════════════════════════════╛ ¶ Lines in total: 6547 ➮ Generation completed at 02:41, i.e. 67 seconds to (re)generate ⟲