TechrightsSearch results for 'voice+recognition' (page 1 of 21) http://techrights.org Free Software Sentry – watching and reporting maneuvers of those threatened by software freedom Mon, 02 Jan 2017 07:42:12 +0000 en-US hourly 1 http://wordpress.org/?v=3.9.14 When EPO Vice-President, Who Will Resign Soon, Made a Mockery of the EPO http://techrights.org/2017/01/01/reversing-epo-roles/ http://techrights.org/2017/01/01/reversing-epo-roles/#comments Sun, 01 Jan 2017 17:00:29 +0000 http://techrights.org/?p=98117 This great search was powered by Search Unleashed.
Help to remove this message by getting the site owner to support this software.

Summary : Leaked letter from Willy Minnoye/management to the people who are supposed to oversee EPO management

W illy Minnoye is leaving quite soon (well before his term’s end) as he already gained great notoriety within the EPO when he became his master's voice on Dutch TV .

Minnoye’s blind loyalty to Battistelli is not news; maybe this kind of obedience is how he worked …

]]>
http://techrights.org/2017/01/01/reversing-epo-roles/feed/ 0
Links 13/12/2016: CoreOS Container Linux, CentOS Linux 7 http://techrights.org/2016/12/13/centos-linux-7/ http://techrights.org/2016/12/13/centos-linux-7/#comments Tue, 13 Dec 2016 11:03:50 +0000 http://techrights.org/?p=97418

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • 5 gifts under $50 for open-source geeks

    The weeks of December are flying by, and the new year is fast approaching. While it seems that sales begin earlier and earlier every year, some people (like me) put off gift buying until the last minute. Even if you’re a more responsible gift-giver, it can be hard to pinpoint what someone might like for Christmas or Hanukkah.

    If you’re shopping for an open-source geek in your life, but don’t have a ton of money to spend on hardware, there are a few stocking-stuffers and small gifts that can be had for under $50. Here are five affordable options to consider before shipping deadlines pass.

  • Google makes ‘Embedding Projector’ an open source project

    Data can be highly valuable, and no company knows that more than Google. It is constantly collecting a massive amount of it — it is pretty much how the company butters its bread. Data only has value when it can be used, however, meaning it must ultimately tell a story. In other words, collecting it is only the beginning.

    One of the best way to digest and present data is with visualizations and dashboards. Not everyone is a data scientist, so how you tell a story matters. Today, Google is making a rather nifty data visualization tool an open source project. Called “Embedding Projector”, it can show what the search giant calls “high-dimensional data”.

  • Kubernetes 1.5 comes to Windows Server 2016
  • Kubernetes 1.5 Brings Container Management to Windows

    New release of open-source Kubernetes container orchestration system adds initial support for Microsoft Windows Server and previews beta stateful application capabilities.

    The open-source Kubernetes container management system is moving forward with the release of Kubernetes 1.5 on December 15, bringing the platform to Microsoft Windows Server for the first time. The Kubernetes 1.5 milestone is the last major release of Kubernetes in 2016 and follows the 1.4 release that debuted on September 26.

  • A new way forward for power utilities: The Open Smart Grid Platform

    The Open Smart Grid Platform is an open, generic, scalable, and independent Internet of Things platform that enables municipalities and power distribution companies to easily control and monitor various public service objects with any application and with any communication infrastructure. It acts as a connecting link between web applications and smart devices, and it was built with utility requirements in mind (a strong security focus, reliability, use of international standards, etc). The platform was also built to fit with multiple use-cases from the ground up; it contains generic functions that are needed for managing and controlling a large number of devices, like authorizations, time synchronization, and configuration management.

  • Events

    • Plasma Meets Nextcloud

      At a meeting back in July in Stuttgart, KDE and Nextcloud developers discussed deeper integration between the respective communities. We’d like to share some of those ideas and, as always, invite anyone interested in participating to help make it happen!

    • Wednesday: Release Party in Berlin!

      On wednesday is our Nextcloud meetup and – Nextcloud 11 will be released, so let’s make it a release party! Bring some snacks if you like, let’s drink a beer or two, get our servers upgraded perhaps.

    • Help Move the Networking Industry Forward at Open Networking Summit 2017

      I am honored to join The Linux Foundation this month as General Manager of Open Source Networking & Orchestration. As I look at the last three decades, we (networking geeks) have always stepped up to stay ahead of major technology disruptions. Now we are at the next big revolution: open networking, fueled by open source communities.

  • SaaS/Back End

  • CMS

    • How Open Source CMS are Taking Over the World

      Content management systems are wide and varied. There are tons of them on the market, some are proprietary but a very large amount are created under an open source license. The reason for this is simple; it allows a small team of developers to become a bigger team by opening up their code to a wider community of users who may wish to contribute or provide enhancements.

      This is one of the greatest strengths that open source products have; the often large pools of available developers. Of course, like anything, there can be downsides as well but lately, we’ve seen more and more open source products become viable options for companies in search of stable, regularly updated platforms on which to run their businesses. Today, I’m going to share with you my thoughts on how open source CMS’ are taking over the world.

    • The three big CMS’: Which is right for your business?

      A platform that originally started as a home for blogging with 76.5 million blogs created since 2004, WordPress has advanced a great deal over the last decade and now powers over 25 per cent of websites across the world. There are a whole host of reasons why this platform is so popular with business owners and designers alike.

      It’s easy to set up and use for just about anyone who owns a computer. There’s no need to have much knowledge about coding as you can build a simple website from scratch using the thousands of templates and plug-ins available at your fingertips. It’s also cost-effective. It’s free to sign up and although some of the best templates and plug-ins come at cost, if you want to create a website for free you can.

      For designers, it’s an ideal CMS as bespoke websites can be built fast due to the ease of amending code. This means that they can be launched in a short period of time for clients, and any changes as the business evolves can be done quickly.

  • BSD

  • Public Services/Government

    • Can open source and open systems really open the door to healthier democracies?

      Many think technology can improve democracy and good governance. Open data and online platforms allow the public to participate more directly and gain greater transparency and accountability.

      This whole area of technology for improved governance could be worth $2bn over the next decade, according to Pablo Sarrias, CEO and founder of OpenSeneca.

      His company was set up by Telefónica Open Future and Barcelona-based electronic voting company Scytl, which has provided proprietory election technology for the 2016 US elections, among others.

  • Openness/Sharing/Collaboration

    • Italy’s eInvoice system to become open for all

      Italy is opening up its FatturaPA payments services. Starting in January, the system can also be used for free by companies to send invoices to other companies and citizens, who in turn can use the system to pay them.

    • How “open source” seed producers from the U.S. to India are changing global food production

      Frank Morton has been breeding lettuce since the 1980s. His company offers 114 varieties, among them Outredgeous, which last year became the first plant that NASA astronauts grew and ate in space. For nearly 20 years, Morton’s work was limited only by his imagination and by how many different kinds of lettuce he could get his hands on. But in the early 2000s, he started noticing more and more lettuces were patented, meaning he would not be able to use them for breeding. The patents weren’t just for different types of lettuce, but specific traits such as resistance to a disease, a particular shade of red or green, or curliness of the leaf. Such patents have increased in the years since, and are encroaching on a growing range of crops, from corn to carrots — a trend that has plant breeders, environmentalists and food security experts concerned about the future of the food production.

  • Programming/Development

  • Standards/Consortia

    • Apple, Microsoft notable absentees from new Global Virtual Reality Association

      VR headset manufacturers including Google, HTC VIVE, Facebook’s Oculus, Samsung, Acer Starbreeze and Sony Interactive Entertainment have come together to establish the Global Virtual Reality Association (GVRA).

      The association is a non-profit organisation for international VR headset manufacturers to promote the growth of the VR industry.

      According to the companies, the association will help develop best practices for the industry, as well as share them and foster dialogue between several stakeholders around the world.

Leftovers

  • Hardware

  • Health/Nutrition

    • Insiders: America’s largest chain of psych hospitals kidnaps people seeking care, drugs and holds them until they’re out of insurance

      Universal Health Services (UHS) is the largest chain of psychiatric facilities in the USA, with 2.5x more beds than its closest competitor, and dozens of whistleblowers from inside the company told a Buzzfeed reporter that they were pressured to find pretenses to lock up people who voluntarily presented for assessments, holding them against their will until their insurance ran out, with massive bonuses for executives who increased profits (and much smaller bonuses for execs who improved health outcomes for patients).

      UHS hospitals are incredibly profitable, running at 30-50% margins, and whistleblowers say these margins are attained by dropping staffing to unsafe levels and preferentially hiring underqualified and inexperienced people; while simultaneously packing in patients by bedding them in closets, in isolation cells, and on mattresses on the floors of day-rooms.

      Meanwhile, the whistleblowers say that patients in desperate need of care are refused admission, or are kicked out early, if they don’t have insurance. A large plurality of UHS’s patents are covered by tax-funded Medicare, and 10% of the company’s hospitals are currently under investigation for Medicare fraud. Patients say that their confinement has eaten into the days of mental health care they are entitled to under Medicare, meaning that if they end up in distress later that they will not be able to get care.

    • The People Who Sell You Legal Weed Don’t Know Enough About It

      When I first received my medical marijuana card, my visits to the local dispensary were generally long, drawn out affairs. The bud tenders on staff would meticulously walk me through each strain on display, describing in detail their psychoactive and somatic effects. As someone prone to cannabis-induced anxiety I eventually learned that strains with low THC and high CBD counts were what I needed, but it took a lot of trial and error to find the right strain of medicine. Although the bud tenders spoke with authority about the effects of their medicine, I would often find that the effects of the bud recommended for me didn’t at all match what the bud tender had told me.

  • Security

    • The sad tale of CVE-2015-1336

      Today I released man-db 2.7.6 (announcement, NEWS, git log), and uploaded it to Debian unstable. The major change in this release was a set of fixes for two security vulnerabilities, one of which affected all man-db installations since 2.3.12 (or 2.3.10-66 in Debian), and the other of which was specific to Debian and its derivatives.

      It’s probably obvious from the dates here that this has not been my finest hour in terms of responding to security issues in a timely fashion, and I apologise for that. Some of this is just the usual life reasons, which I shan’t bore you by reciting, but some of it has been that fixing this properly in man-db was genuinely rather complicated and delicate. Since I’ve previously advocated man-db over some of its competitors on the basis of a better security posture, I think it behooves me to write up a longer description.

    • Dear democracy, you need more hackers

      This is my write up from Nesta’s recent digital democracy day — I wasn’t planning to blog but it inspired me, so here you go.

      The day included two sessions; one focussed on local government and one in parliament focussed on, well, parliament. At the heart of each session were four fantastic presentations showcasing digital democracy projects from Iceland (Citizen’s Foundation —Gunnar Grímsson), Taiwan (Digital Minister — Audrey Tang), France (Cap Collectif — Nicolas Patte) and Brazil (Chamber of Deputies Hacker Lab — Cristiano Falia). Big thanks to Theo and the rest of the gang at Nesta for arranging :)

      My main thought following the day (there was so much — it’s been hard to boil it down…) is that there needs to be more capacity in our democracy to hack. Government can no longer rely on off the shelf solutions to meet democratic challenges but needs to experiment and adapt – something brilliantly illustrated by each of the four projects.

      [...]

      The tools are not much use if the institutions of democracy are unwilling or unable to respond to them. Nicholas Patte explained how it took a long time to convince the elected representatives in France about their crowd sourced legislation project but, with perseverance, they got there in the end.

      I loved that Taiwan has a ‘Minister of Hacking’ who can get things done at the highest level of government — her sage advice is that politicians can be asked to accept ‘those things they can live with’; compromise clearly plays a role.

    • Users Told Disconnect Certain Netgear Routers

      About this time I’m wondering if I’d even purchase a Netgear router.

      You’d think that with all of the fuss recently about the insecure Internet of things, especially when it comes to routers, that any router maker would be on top of it and patching vulnerabilities as soon as they’re discovered.

      Evidently not, as far as Netgear is concerned.

    • Busted Windows 8, 10 update blamed for breaking Brits’ DHCP

      Folks using Windows 10 and 8 on BT and Plusnet networks in the UK are being kicked offline by a mysterious software bug.

      Computers running the Microsoft operating systems are losing network connectivity due to what appears to be a problem with DHCP. Specifically, it seems some Windows 10 and 8 boxes can no longer reliably obtain LAN-side IP addresses and DNS server settings from their BT and Plusnet broadband routers, preventing them from reaching the internet and other devices on their networks.

      (The link between BT and Plusnet is that, while the latter bills itself as a friendly independent ISP, it’s really a subsidiary of the former.)

      BT and Plusnet told The Register Microsoft is investigating the blunder. Redmond also confirmed on Thursday in its support forum that it’s looking into the problem.

    • Containers in Production – Is Security a Barrier? A Dataset from Anchore

      Over the last week we have had the opportunity to work with an interesting set of data collected by Anchore (full disclosure: Anchore is a RedMonk client). Anchore collected this data by means of a user survey ran in conjunction with DevOps.com. While the number of respondents is relatively small, at 338, there are some interesting questions asked, and a number of data points which support wider trends we are seeing around container usage. With any data set of this nature, it is important to state that survey results strictly reflect the members of the DevOps.com community.

    • Security advisories for Monday
    • security things in Linux v4.9
    • Black Hats Leveraging PowerShell

      Those with long memories might remember that in 1996, Microsoft added support in the Internet Explorer browser for ActiveX controls. While this greatly expanded the functionality of the Internet, it also made the web a much less safe place, especially for the average user. The trouble was, ActiveX made it simple to download and install software with little or no input from users. Even those not old enough to remember have probably already figured out that this didn’t work out well.

    • A security lifetime every five years

      A long time ago, it wouldn’t be uncommon to have the same job at the same company for ten or twenty years. People loved their seniority, they loved their company, they loved everything staying the same. Stability was the name of the game. Why learn something new when you can retire in a few years?

      Well, a long time ago, was a long time ago. Things are quite a bit different now. If you’ve been doing the same thing at the same company for more than five years, there’s probably something wrong. Of course there are always exceptions to every rule, but I bet more than 80% of the people in their jobs for more than five years aren’t exceptions. It’s easy to get too comfortable, it’s also dangerous.

    • Hack of Saudi Arabia Exposes Middle East Cybersecurity Flaw

      More than a year after a drowned Syrian toddler washed up on a beach in Turkey, the tiny refugee’s body, captured in a photograph that shocked the world, reappeared on computer screens across Saudi Arabia — this time as a prelude to a cyberattack.

      The strike last month disabled thousands of computers across multiple government ministries in Saudi Arabia, a rare use of offensive cyberweapons aimed at destroying computers and erasing data. The attackers, who haven’t claimed responsibility, used the same malware that was employed in a 2012 assault against Saudi Arabian Oil Co., known as Saudi Aramco, and which destroyed 35,000 computers within hours.

    • London councils are reliant on unsupported Microsoft server software [Ed: Well, even if supported, still back doors in it. Abandon.]

      ALMOST 70 PER CENT of London councils are running unsupported server software, leaving them vulnerable to exploits for which there are no patches available.

      That’s according to backup firm Databarracks, which through a Freedom of Information (FoI) request revealed that 69 per cent of London councils are running out-of-date server software.

      The firm contacted all 32 London boroughs as well as the City of London and received responses from all.

      The data revealed that 63 per cent of London councils are still running Windows Server 2003, 51 per cent run SQL Server 2005 and 10 per cent still use Windows Server 2000 – none of which are still supported by Microsoft.

    • PwC sends ‘cease and desist’ letters to researchers who found critical flaw

      A security research firm has released details of a “critical” flaw in a security tool, despite being threatened with legal threats.

      Munich-based ESNC published a security advisory last week detailing how a remotely exploitable bug in a security tool, developed by auditing and tax giant PwC, could allow an attacker to gain unauthorized access to an affected SAP system.

  • Defence/Aggression

    • Houston man pleads guilty in mosque fire on Christmas Day

      A Houston man was sentenced Friday to four years in prison after pleading guilty to starting a fire at a mosque on Christmas Day.

      Gary Nathaniel Moore, 38 of Houston, was arrested last year in connection with a fire at 2 p.m. on Dec. 25 at a storefront mosque in the 1200 block of Wilcrest.

      Moore told investigators at the scene that he had attended the mosque for five years, coming five times per day to pray seven days per week, according to court records.

    • Man who posted pro-ISIS material and attacked ‘moderate Muslims’, labelling them ‘pure sell-outs and traitors’ is jailed

      An extremist has been jailed for two years for posting an Islamic State propaganda video on Facebook, despite claims he would find prison “a living nightmare”.

      Abdul Hamid, 31, who suffers from obsessive compulsive disorder, admitted posting the unedited four-minute video entitled No Respite, glorifying the terror group and its fighters.

      The Old Bailey heard that he had seen a short clip of the video in an online news report and believed it was not illegal to share it on social media at the time.

      But he later accepted that he had been “reckless” when he posted it in its entirety on Facebook, leading to it being viewed 465 times, “liked” 20 times and “shared” 34 times.

    • Donald Trump says ‘I don’t want China dictating to me’ signalling President-elect could abandon decades-old foreign policy

      Donald Trump has questioned whether the US should continue its support for the “One China” policy unless Beijing makes concessions on trade and other issues.

      “I don’t want China dictating to me”, he said while defending his recent phone call with Taiwanese President Tsai Ing-wen.

      In an interview with Fox News on Sunday, he said: “I don’t know why we have to be bound by a ‘One China’ policy unless we make a deal with China having to do with other things, including trade.”

      The President-elect was responding to a question about his phone conversation with Taiwanese President Tsai Ing-wen, which represented a break with decades of US diplomatic tradition that recognises Beijing as the sole representative of China.

    • Donald Trump Says He Doesn’t Need Daily Intelligence Briefings Because He’s a ‘Smart Person’

      The president-elect was interviewed on Fox News Sunday

      Donald Trump said he doesn’t need daily intelligence briefings because he’s a “smart person.”

      Trump, who currently receives the presidential daily brief just once a week, said in an interview with Fox News Sunday that he only requires the information if something has changed.

    • Syrian refugees mark one year anniversary of being welcomed to Canada

      Noura Alissa says she’s very grateful for the warm welcome she’s received in Canada, but admits the year since she arrived in Montreal from Syria has been more difficult than she expected.

      “Trying to find a job while learning French has been difficult, but I am trying,” the 25-year-old Syrian refugee said in English in an interview Sunday. She said the warm welcome she’s received from Canadians has helped ease the transition.

      It has been a year since Canada welcomed the first group of Syrians that the government flew out of refugee camps, and both political leaders and refugees marked the occasion over the weekend with a mixture of pride and an acknowledgment of the challenges that remain.

      Immigration Minister John McCallum said he would never forget joining Prime Minister Justin Trudeau and other cabinet ministers at Toronto’s Pearson airport on Dec. 10, 2015 to greet the first plane load of refugees.

    • Lockheed Martin shares suffer after Trump F-35 tweet

      Shares in Lockheed Martin have fallen after President-elect Donald Trump said he would cut the cost of its F-35 Joint Strike Fighter after taking office.

      He tweeted: “F-35 program and cost is out of control. Billions of dollars can and will be saved on military (and other) purchases after January 20.”

      The F-35 is the Pentagon’s most expensive weapons programme, costing about $400bn (£316bn).

      Lockheed shares were down 4.2% at $248.51 in morning trading.

    • Transition Adviser Peter Thiel Could Directly Profit From Mass Deportations

      Palantir Technologies, the data mining company co-founded by billionaire and Trump transition advisor Peter Thiel, will likely assist the Trump Administration in its efforts to track and collect intelligence on immigrants, according to a review of public records by The Intercept. Since 2011, the Immigration and Customs Enforcement agency’s Office of Homeland Security Investigations (HSI) has paid Palantir tens of millions of dollars to help construct and operate a complex intelligence system called FALCON, which allows ICE to store, search, and analyze troves of data that include family relationships, employment information, immigration history, criminal records, and home and work addresses.

      In a separate multi-million-dollar contract signed in 2014, Thiel’s $20 billion company is building a complex case management system for ICE’s HSI, which processes tens of thousands of civil and criminal cases each year.

    • Saudi arms money is running out

      Saudi Arabia is certainly fighting proxy wars in the Middle East (Allies rally to Johnson over Saudi gaffe, 9 December), as well as promoting its form of Islam in many countries around the world. But it is not just for their oil and for their lucrative custom, for as long as they can pay, that we court Saudi Arabia. We were friendly with the Shah of Persia and selling him aircraft only weeks before he fled his country. The west found itself needing the stability the Saudi regime provides in the region.

      But it can now be predicted that all of this will end – perhaps soon – and that things will become catastrophically worse in the region. Saudi Arabia is running out of money and, despite protestations and efforts to prevent it, the momentum towards bankruptcy seems unstoppable. Saudi’s cash flow is depleted by low oil prices and by steadily decreasing demand for oil from that area. If the House of Saud suddenly falls, as did the Shah, religious revolutionaries of many shades will clash for power and seize the country’s massive stock of armaments. Client states will be left penniless and exposed.

    • Escaped Isis sex-slave Nadia Murad urges EU to recognise Yazidi genocide

      Escaped Isis sex slave Nadia Murad has called on the EU to recognise the Jihadi group’s ongoing genocide against the Yazidi people.

      Ms Murad said the EU must work to prosecute members of Isis and establish a safe zone to protect vulnerable minorities.

      She has been awarded the Sakharov Prize for Freedom of Thought along with Lamya Haji Bashar, another Yazidi woman who was also captured by Isis when the group launched a major assault across northern Iraq in 2014.

      They escaped after several months of enslavement and now campaign for Yazidi women.

  • Environment/Energy/Wildlife/Nature

    • Methane surge needs ‘urgent attention’

      Scientists say they are concerned at the rate at which methane in the atmosphere is now rising.

      After a period of relative stagnation in the 2000s, the concentration of the gas has surged.

      Methane (CH4) is a smaller component than carbon dioxide (CO2) but drives a more potent greenhouse effect.

      Researchers warn that efforts to tackle climate change will be undermined unless CH4 is also brought under tighter control.

      “CO2 is still the dominant target for mitigation, for good reason. But we run the risk if we lose sight of methane of offsetting the gains we might make in bringing down levels of carbon dioxide,” said Robert Jackson from Stanford University, US.

      Prof Jackson was speaking ahead of this week’s American Geophysical Union (AGU) meeting in San Francisco where methane trends will be a major point of discussion.

    • Jill Stein says Standing Rock decision buys time but more work needs to be done

      In an interview with Jorge Ramos, Dr. Jill Stein weighed in on the recent Standing Rock decision, Trump voters, and her recount efforts.

    • Trump says ‘nobody really knows’ if climate change is real

      President-elect Donald Trump said Sunday that “nobody really knows” whether climate change is real and that he is “studying” whether the United States should withdraw from the global warming agreement struck in Paris a year ago.

      In an interview with “Fox News Sunday” host Chris Wallace, Trump said he’s “very open-minded” on whether climate change is underway but has serious concerns about how President Obama’s efforts to cut carbon emissions have undercut America’s global competitiveness.

      “I’m still open-minded. Nobody really knows,” Trump said. “Look, I’m somebody that gets it, and nobody really knows. It’s not something that’s so hard and fast. I do know this: Other countries are eating our lunch.”

    • Inside Exxon’s Great Climate Cover-Up: From Early Climate Change Researcher to Epic Climate Denier

      With President-elect Donald Trump expected to nominate ExxonMobil CEO Rex Tillerson as secretary of state, we look back at the investigative series by the Pulitzer Prize-winning news organization InsideClimate News, which revealed Exxon knew that fossil fuels cause global warming as early as the 1970s but hid that information from the public. We speak to Neela Banerjee of InsideClimate News and former Exxon scientist Ed Garvey.

    • Pipeline spills 176,000 gallons of crude into creek about 150 miles from Dakota Access protest camp

      A pipeline leak has spilled tens of thousands of gallons of crude oil into a North Dakota creek roughly two and a half hours from Cannon Ball, where protesters are camped out in opposition to the Dakota Access pipeline.

      Members of the Standing Rock Sioux and other tribes, as well as environmentalists from around the country, have fought the pipeline project on the grounds that it crosses beneath a lake that provides drinking water to native Americans. They say the route beneath Lake Oahe puts the water source in jeopardy and would destroy sacred land.

    • Trump’s transition: sceptics guide every agency dealing with climate change

      The heads of Donald Trump’s transition teams for Nasa, the Environmental Protection Agency, the Department of the Interior and the Department of Energy, as well as his nominees to lead the EPA and the Department of the Interior, all question the science of human-caused climate change, in a signal of the president-elect’s determination to embark upon an aggressively pro-fossil fuels agenda.

      Trump has assembled a transition team in which at least nine senior members deny basic scientific understanding that the planet is warming due to the burning of carbon and other human activity. These include the transition heads of all the key agencies responsible for either monitoring or dealing with climate change. None of these transition heads have any background in climate science.

    • Donald Trump ‘will violate US Constitution on first day of presidency’ due to business interests

      Donald Trump is on course to violate the US Constitution on day one of his presidency after insisting he will not relinquish ownership of his businesses while in office.

      The US President-elect confirmed during a Fox News Sunday interview that he will hand the management of his companies to his children but will not give up ownership of the businesses.

      Mr Trump said: “When I ran, everybody knew that I was a very big owner of real estate all over the world.”

    • Trump’s pick for interior secretary could open up federal land to oil and gas drilling

      President-elect Donald Trump is expected to pick Rep. Cathy McMorris Rodgers (R-WA) to lead the Interior Department, according to The New York Times. If confirmed by the Senate, she’s expected to open up federal land and waters to oil, gas, and coal extraction, as well as undo environmental policies approved under the Obama administration.

      Rodgers is the highest-ranking Republican woman in the House of Representatives. She was also appointed to serve as vice chair of Trump’s transition team. Since she was first elected to Congress in 2004, Rodgers supported legislation to open up the Atlantic Ocean to oil and natural-gas drilling and to prevent the Department of the Interior from regulating fracking, according to The Wall Street Journal. In the state of Washington, Rodgers has promoted the use of hydropower, a renewable energy source.

  • Finance

    • Venezuela pulls 100-bolivar note from circulation to ‘beat mafia’

      The Venezuelan government is to withdraw its largest banknote from circulation in its latest attempt to tackle the world’s worst inflation crisis.

      President Nicolás Maduro said on Sunday that the 100-bolivar note, which is currently worth only two US cents (1.6p) on the black market, will be withdrawn on Wednesday. Venezuelans will then have 10 days to exchange the notes at the central bank.

    • Amazon accused of ‘intolerable conditions’ at Scottish warehouse

      Amazon has been accused of creating “intolerable working conditions” after allegations that workers have been penalised for sick days and that some are camping near one of its warehouses to save money commuting to work.

      Willie Rennie, the Liberal Democrat leader in Scotland, said Amazon should be “ashamed” that workers at its warehouse in Dunfermline have chosen to camp outside in the winter.

      He made the comments after the the Courier newspaper published photographs of tents near the site that it said were being lived in by Amazon workers. It said at least three tents were pitched close to the warehouse by the M90 in Dunfermline and that a man living in one of them had said he was an employee who usually lives in Perth.

      A Sunday Times investigation found that temporary workers at the warehouse were being penalised for taking time off sick and put under pressure to hit targets for picking orders. It also claimed that although workers could walk up to 10 miles a day doing their jobs, water dispensers were regularly empty.

    • The war on cash being justified as “necessary against organized crime” is the worst excuse ever

      There is a “war on cash” going on from the central banks, trying to reduce the usage (and personal storage) of cash. This is something that makes sense as a power move against the common people in a time of forced negative interest rates, but it is a shocking reduction of liberty and privacy (of finance), not to mention that the official justifications don’t hold a shred of water. What’s really behind this trend?

      Would you like your government to have more insight into your personal finances than you have yourself? That’s where we’re heading with the ongoing “war on cash” – into a world where every transaction is not just loggable by the government (or a government-coerced agent), but where you can also be held responsible for anything and everything you buy and sell.

      There’s both a carrot and a stick in this scheme of making everything traceable and trackable. The stick consists of outright bans on cash transactions – several European countries have banned cash transactions exceeding 1,000 euros. Uruguay has banned cash transactions over $5,000. Even Switzerland has proposed banning cash transactions over 100,000 Swiss francs (admittedly a high number, but once a government declares a right to ban cash transactions, the number is a matter of degree and not principle).

    • Yik Yak fires 30 of 50 employees, still has no business model

      In a move that seemed all-too predictable, Yik Yak has fired more than half of its staff. According to the Atlanta Journal-Constitution, the local startup laid off 30 of its 50 employees on Thursday.

      Since it began in 2013, the company behind the purportedly anonymous messaging app has never had, and still doesn’t have, any obvious source of meaningful revenue. Yet somehow, Yik Yak was valued by venture capitalists at $400 million in December 2014 after Sequoia Capital invested $62 million.

    • Japan ratifies TPP trade pact to fly the flag for free trade

      Japan on Friday ratified the Trans-Pacific Partnership, a free-trade pact aimed at linking a dozen Pacific Rim nations, hoping it will one day take effect despite President-elect Donald Trump’s pledge that the United States will withdraw from it.

      The TPP, which aims to cut trade barriers in some of Asia’s fastest-growing economies but does not include China, can not take effect without the United States.

      The deal, which has been five years in the making, requires ratification by at least six countries accounting for 85 percent of the combined gross domestic product of the member nations.

      Given the sheer size of the American economy, the deal cannot go ahead without U.S. participation.

    • Committee Report: Provisions in TPP expose Australia to unnecessary risk

      I am glad to have this opportunity to make some remarks about Report 165: Trans-Pacific Partnership Agreementof the Joint Standing Committee on Treaties. I am a member of that committee and I am a new member of this place. I begin by observing that the committee process was both instructive and constructive.

      I thank the Chair, the member for Fadden, for the way he guided us through the process and, of course, my fellow Labor members of the committee for the way they approached the evidence and the submissions that we received in hearings.

      The report enables ratification of the TPP to occur, and that report was tabled yesterday. The timing is little bit strange, considering the circumstances that confront us. Since 8 November and the success of President-elect Trump, it has become clear that the United States has no present intention of ratifying the TPP, and without the United States in the TPP it will not come into force. On that basis, Labor members of the Joint Standing Committee on Treaties thought it would be prudent to move the reporting date to the new year so that those developments in the United States could unfold. They were also mindful that there is an inquiry afoot in the other place that does not report until the first week of the new parliamentary year. That was not the mood of the majority of the committee. Obviously the report has been tabled and presumably ratification will ensue.

    • Four EU states among world’s worst tax havens

      Cyprus, Ireland, Luxembourg, and the Netherlands are listed among the top 15 global corporate tax havens, according to a new report from aid agency Oxfam.

      The report out on Monday (12 December) claims that the member states contribute to helping big businesses dodge tax on a massive scale, despite EU and other efforts to crack down on the practice.

      Bermuda tops the list of the 15 followed by the Cayman Islands and the Netherlands. Ireland ranks 6, followed by Luxembourg (7) and Cyprus (10). The British Virgin islands, Jersey and the Bahamas are also listed.

    • Trump’s Labor Pick, Fast-Food CEO Andrew Puzder, Opposes Minimum Wage Increase & Paid Sick Leave

      President-elect Donald Trump has picked fast-food CEO Andrew Puzder to become the next secretary of labor. Puzder is a longtime Republican donor who has been a vocal critic of raising the minimum wage, the Fight for 15 movement, expansion of overtime pay, paid sick leave and the Affordable Care Act. Puzder is also an anti-choice activist who has been accused of domestic violence. We get response from labor leader Mary Kay Henry, president of the Service Employees International Union, which represents over 2 million workers.

    • Trump taps Goldman Sachs president for top economic adviser

      President-elect Donald Trump has selected Gary Cohn, the president and chief operating officer of Goldman Sachs, to serve as assistant to the president for economic policy and director of the national economic council.

      “As my top economic advisor, Gary Cohn is going to put his talents as a highly successful businessman to work for the American people,” Trump said in a statement. “He will help craft economic policies that will grow wages for our workers, stop the exodus of jobs overseas and create many great new opportunities for Americans who have been struggling. He fully understands the economy and will use all of his vast knowledge and experience to make sure the American people start winning again.”

    • The Internet Governance Forum Wakes Up to Trade

      The Internet Governance Forum (IGF) is a multi-stakeholder community that discusses a broad range of Internet issues, and seeks to identify possible shared solutions to current challenges. This year was the first year in which the spotlight fell on the use of trade agreements to make rules for the Internet behind closed doors, and a broad consensus emerged that this needs to change.

      In an unprecedented focus on this issue, there were three separate workshops held on the topic—an EFF-organized workshop on the disconnect between trade agreements and the Internet’s multi-stakeholder governance model, two more specific workshops on the Trans-Pacific Partnership (TPP) and on the Trade in Services Agreement (TISA), and finally a high-profile plenary session that was translated into the six United Nations languages and included on its panel two former trade negotiators, a Member of the European Parliament, and two private sector representatives, as well as speakers from EFF and Public Citizen.

    • Apple CEO Tim Cook Cook invited to event regarding the European Commission tax ruling

      Apple CEO Tim Cook may have a busy travel schedule over the next several weeks. He’s apparently attending a “tech summit” at Trump Tower this week. And an Oireachtas committee has expressed confidence that Cook will accept an invitation to respond to the European Commission tax ruling which has cost his company €13 billion, according to the Irish Times.

    • Apple CEO invited to attend tax ruling hearing in Dublin

      An Oireachtas committee has expressed confidence that Apple’s Tim Cook will accept an invitation to respond to the European Commission tax ruling which has cost his company €13 billion.

      John McGuinness, chairman of the Oireachtas all-party Finance Committee has written to the global technology company’s chief executive in California inviting him to attend a hearing next month, along with other senior executives.

    • Irish legislature invites Tim Cook, other Apple execs to hearing on $14.5B EU tax ruling

      An Irish legislative committee is reportedly optimistic that Apple CEO Tim Cook will accept an invitation to attend a late January hearing, which will examine the European Commission’s ruling that Ireland must collect $14.5 billion in back taxes from the iPhone maker.

    • Apple’s Tim Cook among tech executives meeting with Donald Trump on Wednesday – report
    • Traders scheme to cash in on Trump tweets

      President-elect Donald Trump issued a single tweet blasting defense contractor Lockheed Martin Corp. at 8:30 a.m. on Monday. By lunchtime, he had wiped $4 billion off the company’s market value.

      Wall Street traders began dumping the company’s stock after Trump criticized its fighter jet program: “The F-35 program and cost is out of control,” he tweeted. “Billions of dollars can and will be saved on military (and other) purchases after January 20th.”

    • ECB’s quantitative easing programme investing billions in fossil fuels

      The European Central Bank’s (ECB) quantitative easing programme is systematically investing billions of euros in the oil, gas and auto industries, according to a new analysis.

      The ECB has already purchased €46bn (£39bn) of corporate bonds since last June in a bid to boost flagging eurozone growth rates, a figure that some analysts expect to rise to €125bn by next September. On Thursday the bank said it would extend the scheme until 2018.

      But an EU pledge to cut its carbon emissions by at least 80% by mid-century could be undermined by the asset purchasing scheme, according to investments revealed in an analysis of the bank’s international security identification numbers (ISINs) by campaign group Corporate Europe Observatory.

  • AstroTurf/Lobbying/Politics

    • The Craven Power Politics of Mitch McConnell

      He blocked a bipartisan statement on Russian hacking before the election, but now belatedly joins senators asking for a probe.

    • Did the Russians “hack” the election? A look at the established facts [Ed: CrowdStrike are like a Microsoft proxy [1, 2]. Largely responsible for dangerous Russia blaming]

      “CrowdStrike’s Falcon endpoint technology did catch the adversaries in the act,” said Dmitri Alperovitch, chief technology officer of Crowdstrike. “When the DNC brought us in to conduct an investigation in May 2016, we deployed this technology on every system within DNC’s corporate network and were able to watch everything that the adversaries were doing while we were working on a full remediation plan to remove them from the network.”

    • Alphabet’s Page, Schmidt Said to Attend Trump Tech Meeting

      Page, chief executive officer of the Google parent company, and Schmidt, the chairman, plan to be at the meeting, a person familiar with the decision said late Friday. The person asked not to be identified because the decisions were not public. An Alphabet spokeswoman did not return a request for comment.

    • Trump says CIA report that Russia helped his electoral win is “ridiculous”

      On Friday evening, The Washington Post reported that the CIA has “concluded in a secret assessment that Russia intervened in the 2016 election to help Donald Trump win the presidency, rather than just to undermine confidence in the US electoral system, according to officials briefed on the matter.”

    • What Trump said about Apple, Alphabet and Facebook — the tech companies he’s meeting next week

      In case you missed it: President-elect Donald Trump’s transition team is convening a tech summit at Trump Tower next week, and top execs from Apple, Alphabet, Facebook and more are attending.

      As one person familiar with the summit plans told my boss, Recode’s Kara Swisher, “Look, this is obviously a circus.” So, let’s do some social media-searching acrobatics and see what Trump has said about these companies.

    • All TV Will Be Trump TV

      Remember the good old days when the media were certain that after Donald Trump lost the election he’d launch his own television channel? Son-in-law Jared Kushner met with media dealmakers to lay the groundwork, and a small alt-shop called Right Side Broadcasting Network earned the nickname “Trump TV” by producing post-debate analysis on Donald’s Facebook page. There was even excited speculation that Bill O’Reilly and Sean Hannity would bail on Fox News to join their old boss Roger Ailes at an all-Trump-all-the-time, sexual-harassment-friendly workplace.

      This new, Breitbart-flavored media empire would, many of us feared, make Trump’s birther campaign to delegitimize President Obama look like a dress rehearsal and Fox look like a poodle. Trump TV would not only hound President Hillary Clinton 24/7, with pitchfork demands for her head, it would operate as a government in exile, in your living room and on your handheld device—menacing, unaccountable, and, most frighteningly, more entertaining than anything the official administration could muster.

    • Recounts should be the norm, not the exception

      Jill Stein, her supporters and a group of experts struggled mightily to get proper recounts in Wisconsin, Pennsylvania and Michigan. They were accused of paranoia and of simply wasting time.

      Why is it so difficult, and so controversial, to get the results of a U.S. presidential election inspected and verified? Audits should be mandatory in all states; in fact, they’re part of the foundation of a healthy democracy.

      Recounts not only are important for finding proof that voting machines were misconfigured or hacked. In a meaningful recount, evidence representing the voter’s intent is compared against the published vote totals. Even if a recount proves that everything went as intended, it’s a way to reassure the public — especially the losing side — that the announced winner of the election is legitimate.

    • Electoral college members demand information on Russian election interference before Donald Trump vote

      Ten members of the electoral college have requested more information from intelligence officials on the relationship between President-elect Donald Trump and Russia.

      The electoral college addressed an open letter to Director of National Intelligence James Clapper prior to their 19 December vote that would finalise the election results.

    • Wisconsin recount confirms Trump’s win

      The results of the Wisconsin recount were finalized Monday, reaffirming Donald Trump’s victory in the traditionally blue state.

      The Associated Press reported Monday afternoon that Trump actually picked up 162 additional votes, keeping his margin of victory around 22,000 over Democrat Hillary Clinton.

      The final results, certified by the Wisconsin Elections Commission, changed by fewer than 1,800 votes.

    • Donald Trump Certified as Winner in Wisconsin, Following Recount

      President-elect Donald Trump was certified the winner of the Wisconsin presidential race on Monday after a statewide recount failed to produce evidence of widespread irregularities or miscounted ballots.

    • Trump promises ‘no new deals’ while president, Ivanka won’t manage company

      Donald Trump is promising to refrain from launching any new business deals during his time in the White House, and the president-elect also said late Monday night he plans to hand over operations of his sprawling company to his two adult sons but not his oldest daughter, Ivanka.

      The businessman offered details on the future of his financial empire via Twitter through a series of late night posts. The tweets came just hours after his aides confirmed a delay to his planned Thursday “major news conference” that was being billed as a chance for Trump to explain how he’d disentangle himself from his business arrangements.

    • Critics of Trump’s nasty Twitter attacks miss the point

      When a local union chief pointed out the errors in Donald Trump’s claims about saving jobs at the Carrier air conditioning plant in Indiana, it didn’t take long for the President-elect to attack him on Twitter, where he has 17 million followers.

      “Chuck Jones, who is President of United Steelworkers 1999, has done a terrible job representing workers. No wonder companies flee country!” Next Jones received a flood of angry anonymous calls, including death threats.

  • Censorship/Free Speech

    • Terror Scanning Database For Social Media Raises More Questions than Answers

      On Monday, Facebook, Microsoft, Twitter, and YouTube announced a new partnership to create a “shared industry database” that identifies “content that promotes terrorism.” Each company will use the database to find “violent terrorist imagery or terrorist recruitment videos or images” on their platforms, and remove the content according to their own policies.

      The exact technology involved isn’t new. The newly announced partnership is likely modeled after what companies already do with child pornography. But the application of this technology to “terrorist content” raises many questions. Who is going to decide whether something promotes terrorism or not? Is a technology that fights child porn appropriate for addressing this particular problem? And most troubling of all—is there even a problem to be solved? Four tech companies may have just signed onto developing a more robust censorship and surveillance system based on a narrative of online radicalization that isn’t well-supported by empirical evidence.

    • Another Viewpoint: Slippery slope of censorship

      Pressured by governments around the world, four companies operating some of the world’s most popular internet sites and services — Facebook, Twitter, Google’s YouTube and Microsoft — announced last week a joint effort to censor “violent terrorist imagery or terrorist recruitment videos or images.”

    • 2016: the year Facebook became the bad guy

      Mark Zuckerberg started 2016 with a cookie cutter message of hope. “As the world faces new challenges and opportunities, may we all find the courage to keep making progress and making all our days count,” he wrote on his Facebook wall on 1 January. He and his wife, Priscilla Chan, had just had their daughter, Max, and had been sharing warm and fuzzy photos of gingerbread houses and their dreadlocked dog Beast over the holiday season.

      Then 2016 happened. As the year unfurled, Facebook had to deal with a string of controversies and blunders, not limited to: being accused of imperialism in India, censorship of historical photos, and livestreaming footage of human rights violations. Not to mention misreported advertising metrics and the increasingly desperate cloning of rival Snapchat’s core features. Things came to a head in November, when the social network was accused of influencing the US presidential election through politically polarized filter bubbles and a failure to tackle the spread of misinformation. The icing on the already unpalatable cake was Pope Francis last week declaring that fake news is a sin.

    • Facebook Is Looking to Hire a 20-Year Media Veteran to Help it Rethink News

      The company faced sharp criticism for its role in spreading fake news stories during the U.S. presidential election

      Facebook wants to develop closer ties with the media industry.

      A recently posted “Head of News Partnerships” job listing seeks someone with more than 20 years of experience in news to be the “public-facing voice of Facebook and its role in the news ecosystem.”

  • Privacy/Surveillance

    • German Government Knew About NSA Espionage on Its Soil Since 2001

      New secret dossiers of the German government published by WikiLeaks last week revealed that the Federal Government under Chancellor Gerhard Schröder was informed – “very early and in detail” – about espionage operations of the US and Great Britain on German soil.

    • What Is Carly Fiorina’s Stance On The NSA? She & The Agency Go Way Back

      President-elect Donald Trump is reportedly considering his former campaign rival Carly Fiorina to serve as director of national intelligence, according to the New York Times. Like Trump, Fiorina’s career has primarily been in business, but she also spent two years as chair of the Central Intelligence Agency’s External Advisory Board. During her presidential bid, Fiorina revealed her close relationship with the NSA and CIA while she was still CEO of Hewlett-Packard. If Trump does indeed hire Fiorina for his cabinet, we can expect her to continue aiding the NSA’s spying activities.

    • Trump eyes Carly ‘fact-free’ Fiorina as potential NSA chief

      Donald Trump and Carly Fiorina share a penchant for a loose association with the truth that just might make Fiorina the perfect person to head the National Security Agency under Trump. The two met Monday to discuss the matter and decided that China is a huge threat to the U.S. Russia, not so much.

    • Exclusive: Face-to-face with Edward Snowden in Moscow on Trump, Putin and dwindling hopes of a presidential pardon

      In an exclusive interview with Yahoo Global News Anchor Katie Couric in Russia, Edward Snowden, the fugitive former NSA contractor who leaked information about U.S. surveillance activities, talks about Putin, life in Russia with his longtime girlfriend and the possibility of returning to the U.S. to face justice in a Trump administration.

    • Tor Project Releases Sandboxed Tor Browser 0.0.2

      The non-profit organization behind TOR – the largest online anonymity network that allows people to hide their real identity online – has launched an early alpha version of Sandboxed Tor Browser 0.0.2.

      Yes, the Tor Project is working on a sandboxed version of the Tor Browser that would isolate the Tor Browser from other processes of the operating system and limit its ability to interact or query low-level APIs that can lead to the exposure of real IP addresses, MAC addresses, computer name, and more.

    • Finnish police want to use surveillance camera face recognition tech

      Finnish law enforcement officials say they want police to be able to acquire and use facial recognition technologies which would help them identify people more easily from the vast amount of images that its network of surveillance cameras provide. A working group at Finland’s National Police Board is examining the constitutionality of implementing facial recognition tech – as well as what setting up such a system would cost.

  • Civil Rights/Policing

    • “Each of us is a treasure”: Edward Snowden writes a letter to a girl living with albinism in Malawi

      Edward Snowden wrote a letter to Annie Alfred, a 10-year-old child living with albinism in Malawi.

      Alfred is one of 7,000-10,000 people in Malawi who have albinism, an inherited skin condition that leads to the absence of pigment in the skin and color. In Malawi, and in some other countries in Africa, albinos live in fear of being targeted for their body parts because of a belief they contain magical powers that bring wealth, good luck and cure HIV.

    • Montreal lawyers urge Ottawa to help asylum-seekers who housed Snowden

      A group of Montreal lawyers is urging the Canadian government to help impoverished asylum-seekers in Hong Kong who say they have faced harassment for having housed whistleblower and American fugitive Edward Snowden.

      The lawyers have launched a Canadian organization named For the Refugees to raise money for the families and to lobby Ottawa to give them sanctuary as they come under pressure in Hong Kong – a jurisdiction known for being tough on asylum-seekers.

      Since the refugees’ involvement with Mr. Snowden rose to global prominence this fall – including in scenes in a recent Oliver Stone film on the fugitive – they say they’ve been questioned on Mr. Snowden by welfare authorities, seen welfare benefits cut and had visits from police.

    • ‘Non-Muslims meddling in Islamic laws a threat to Muslims’

      Non-Muslims interfering with state Islamic laws are a threat to the Muslims who make up the majority of the country’s population, says PAS leader Khairuddin Aman Razali.

    • Syrian teen kicked off Berlin tram for food, not headscarf

      On Wednesday a Syrian teenager reported she had been kicked off Berlin public transport for wearing a headscarf. It now appears that was a misunderstanding.

      The 14-year-old had told authorities that the bus driver had refused to leave the tram stop, instead announcing over the loudspeaker that he would not drive anyone wearing a headscarf.

      She added that she left the tram confused after receiving no support from other passengers.

    • RSF urges Boris Johnson to raise case of jailed blogger Raif Badawi during Saudi Arabia visit

      I am writing on behalf of Reporters Without Borders (RSF) regarding your visit to Saudi Arabia. We have serious concerns about the press freedom situation in the country, in particular the case of jailed blogger Raif Badawi. We ask that you take the opportunity to raise Badawi’s case, the cases of other jailed journalists and citizen journalists, and the broader dire press freedom climate in the country, at the highest possible levels during your visit.

      Saudi Arabia is currently ranked of 165th out of 180 countries in RSF’s World Press Freedom Index, and has consistently ranked among the world’s worst regimes for press freedom since the Index was established in 2002. The King of Saudi Arabia, Salman bin Abdelaziz Al Saud, has been on RSF’s list of ‘predators of press freedom’ since he succeeded his brother Abdullah as king in 2015. Salman has embodied the heritage of a dynasty that has always been hostile to media freedom

    • Saudi police arrest young woman for removing abaya

      Saudi police detained a young woman for violating modesty rules after she removed her abaya, the loose-fitting, full-length robes women are required to wear, on a main street in the capital Riyadh, local media reported on Monday.

      The conservative Muslim country enforces a strict dress code for women in public, bans them from driving and prohibits the mixing of sexes.

      The Arabic-language al-Sharq newspaper reported that the woman was detained after a complaint was filed by the religious police.

    • Moment documentary maker ‘is punched, kicked and choked by five migrants’ after entering ‘no-go’ zone in Swedish city

      This is the moment a documentary maker says he was punched, kicked and choked by five migrants after entering a ‘no-go’ zone in Stockholm.

      US producer Ami Horowitz travelled to the Swedish capital to examine the effects of immigration in the country.

      But after entering the Husby area of the city, he claims he was immediately set upon by a gang of men who took objection to him filming.

      A sound recording captures the moment he says he was set upon in an ‘unprovoked attack’ before being dragged off to a nearby building.

    • Charity warns of FGM ‘parties’ taking place in England

      Girls are being taken to female genital mutilation (FGM) “parties” in cities across England, a charity has warned.

      The Black Health Initiative in Leeds says midwives from Africa are being flown into the country to carry out the illegal practice.

      West Yorkshire Police said they were aware girls were being subjected to FGM locally.

      Latest NHS figures show more than 8,000 women across England have recently been identified as being victims of FGM.

    • More than 4,000,000 attempts to read US law have failed since a court ordered Public Resource to take it down

      Rogue archivist Carl Malamud writes, “In keeping with best practices for major Internet providers to issue periodic transparency reports, Public Resource would like to issue two reports.

      “First, our National Security Letter canary is still alive. If we receive such a letter in the future, we will kill the canary and you will not see this report next year.

      “Second, due to ongoing litigation in the case of American Society for Testing and Materials et al v. Public.Resource.Org, Inc. currently pending in the United States District Court for the District of Columbia, we have issued 4,063,455 HTTP 451 error messages for attempting to access standards from ASTM, NFPA, and ASHRAE. These documents are all incorporated into federal and state law and include such vital public safety documents as the National Electrical Code, which is the law in all 50 states. The HTTP 451 error message is issued when a document is Unavailable For Legal Reasons.

      “During the term of the ongoing litigation over our right to post public safety standards that are part of the law, the Court has asked us to remove these documents from public view, so any attempts to access these documents will throw an HTTP 451 error and you are redirected to our access denied page. For example, if you try to read ASTM D3559: Standard Test Methods for Lead in Water — which is mandated by the authorities in the Code of Federal Regulations (40 CFR 136) and is applicable to the testing of water in communities such as Flint, Michigan—we will not allow you to view this document, neither as a scan of the original paper document, nor as an HTML document with SVG graphics which is accessible to people with visual impairements.

    • Backpage executives beat pimping charges, case dismissed

      Last month, a California judge tentatively ruled that he would dismiss charges lodged by California’s attorney general against Backpage.com’s chief executive and two of its former owners. The tables seemed to turn after a November 16 hearing in which Sacramento County Superior Court Judge Michael Bowman decided against following his tentative ruling. But on Friday, the judge issued a final order that virtually mirrored the earlier one: charges dismissed.

    • Columbia’s Graduate Student Union Is a Nationwide First

      While labor faces a shaky ground under the Trump administration, a landmark union win has widened the horizons for worker organizing on college campuses nationwide. The graduate student workers at Columbia have voted to unionize. The 1,602-623-margin victory means that the 3,500-strong union became the first private-university graduate-student union established through a formal National Labor Relations Board (NLRB) election, following a breakthrough ruling by the board recognizing their employee rights. As the official Graduate Workers of Columbia–United Auto Workers Union, teaching and research assistants can push forward a nationwide wave of unionization efforts at both public and private higher-education institutions.

  • Internet Policy/Net Neutrality

    • Internet Governance Forum: Embarking On Post-IANA Transition And Taking On Trade

      The first edition of the renewed Internet Governance Forum (IGF) last week tried its all not to become just another internet governance conference, with new formats and the taking on of one big topic that so far had evaded the “multi-stakeholder” approach: trade negotiations. But it also angered some by making its big dinner an invitation-only event, for governments and friends.

    • Council of Ministers approve WiFi4EU

      On 5 December, Europe’s telecom ministers approved the European Commission’s plans to offer WiFi in towns, cities and villages across Europe. The EC proposed the WiFi4EU project in September.

      Wifi4EU was announced by President of the European Commission, Jean-Claude Juncker, saying: “Everyone benefiting from connectivity means that it should not matter where you live or how much you earn. So we propose today to equip every European village and every city with free wireless internet access around the main centres of public life by 2020.”

    • Malta adds 80 public Wifi hotspots

      Malta’s Information Technology Agency (MITA) has opened 80 public wireless Internet access points at government buildings. On 5 December, the Wifi hotspots were officially unveiled in a ceremony at the Education Department. The Wifi hotspots are one of the components of Malta’s National Digital Strategy – Digital Malta.

      Users that want to access the Internet at these government buildings simply connect to the Wifi hotpots, MITA announced last week, and accept the public access service’s terms and conditions.

  • Intellectual Monopolies

    • A Look At The UNAIDS Board Debate On IP And Medicines; Outcome Fell Short For Some

      The discussion on intellectual property-related barriers to access to medicines was one of the most contentious points of the 39th meeting of the UNAIDS governing board last week. After hours of negotiations, the board agreed that the organisation will keep working on the issue. But developing countries and civil society would have preferred a stronger mandate, according to representatives.

    • Copyrights

      • Commercial sites must check all their links for piracy, rules Hamburg court

        In the latest case, a Hamburg court ruled that the operator of a website violated on copyright by publishing a link to material that was infringing, even though the site operator was unaware of this fact. As Ars reported in September, an earlier judgment from the Court of Justice of the European Union (CJEU) held that posting hyperlinks to pirated copies of material isn’t illegal provided it is done without knowledge that they are unauthorised versions, and it is not carried out for financial gain.

        The CJEU had said that “when the posting of hyperlinks is carried out for profit, it can be expected that the person who posted such a link carries out the necessary checks to ensure that the work concerned is not illegally published on the website to which those hyperlinks lead.” But it did not specify what constituted “carried out for profit.”

        Reda explained to Ars how, in her view, the German ruling had gone beyond the CJEU, and why it’s a problem: “The Hamburg court took a very drastic interpretation of this already problematic ruling and decided that even if a link does not serve a commercial purpose in itself, but is posted on a commercial website, the linking party is liable for a copyright infringement on the website it links to.”

]]>
http://techrights.org/2016/12/13/centos-linux-7/feed/ 0
Links 10/12/2016: KDE neon User LTS Edition, AsteroidOS in Headlines Again http://techrights.org/2016/12/10/asteroidos-in-headlines-again/ http://techrights.org/2016/12/10/asteroidos-in-headlines-again/#comments Sat, 10 Dec 2016 23:15:44 +0000 http://techrights.org/?p=97368

GNOME bluefish

Contents

GNU/Linux

  • 5 Things To Expect From The World Of Linux In 2017

    Linux has come out of oblivion to become a mainstream technology today – making its presence felt in the world of marketing, finance, operations and in every other domain. The New Year 2017, should hold promise for Linux, as Bryan Lunduke said recently. There will be some crucial outcomes of the Linux Foundation-Microsoft partnership as well, which made waves in the tech circles the world over. From the predictions available, there will be increased focus on some areas, while the others will witness a lot of trial and error, and even predictive failure, for that matter.

  • Desktop

    • The Libreboot C201 from Minifree is really really really ridiculously open source

      Open source laptops – ones not running any commercial software whatsoever – have been the holy grail for free software fans for years. Now, with the introduction of libreboot, a truly open source boot firmware, the dream is close to fruition.

      The $730 laptop is a bog standard piece of hardware but it contains only open source software. The OS, Debian, is completely open source and to avoid closed software the company has added an Atheros Wi-Fi dongle with open source drivers rather than use the built-in Wi-Fi chip.

  • Server

    • Docker 1.13.0 Just Around the Corner as Docker 1.12.4 Enters Development

      Victor Vieux from the open source Docker app container engine released new development versions of the upcoming Docker 1.13.0 major milestone and Docker 1.12.4 maintenance update for the current stable series.

      The third Release Candidate (RC) version of Docker 1.13.0 arrived a couple of days ago with numerous minor tweaks and fixes to polish the software before it’s tagged as ready for production and hits the streets, which should happen in the coming weeks. Docker 1.13.0 RC3 comes two after the release of the second RC build.

    • Pet Containers: You’re Not Doing it Wrong

      The conventional wisdom of Linux containers is that each service should run in its own container. Containers should be stateless and have short lifecycles. You should build a container once, and replace it when you need to update its contents rather than updating it interactively. Most importantly, your containers should be disposable and pets are decidedly not disposable. Thus the conventional wisdom is if your containers are pets, you’re doing it wrong. I’m here to gently disagree with that, and say that you should feel free to put your pets in containers if it works for you.

    • Best Open Source Hosting Control Panels

      Most website owners use web hosting control panels to manage their hosting environment. The fact is, the control panel facilitates the server administration and allows users to manage multiple websites without hiring an expert. Today, with so many options available, you don’t have to be a command line guru in order to host a simple website. All you need is a server and a web hosting control panel. There are paid control panels like WHM/cPanel or DirectAdmin which are very powerful, but if you don’t like to pay for a control panel you can simply choose one of the open source alternatives. In this guide, we will present to you some of the most popular open source hosting control panels.

    • ZEPL Announces $4.1M Funding to Accelerate Innovation and Adoption of Apache Zeppelin For End-to-End Analytics Workflow
    • Apache Zeppelin Gets Commercial Backing from ZEPL

      NFlabs rebrands as ZEPL and announces $4.1M in funding in support of open-source Apache Zeppelin data analytics project.

      The open-source Apache Zeppelin project is an increasingly popular, web-based notebook for interactive data analytics that directly integrates with the Apache Spark project for Big Data analytics. Among the commercial backers of Zeppelin is ZEPL, formerly known as NFLabs. On December 8, the newly branded ZEPL announced that it has raised $4.1 million in an initial funding round.

      The funding round was led by Vertex Ventures and it included the participation of Translink Capital, Specialized Types and Big Basin Capital. The funding is set to be used to help ZEPL build a successful business model. Sejun Ra, co-founder and CEO at ZEPL said that the plan for the new money to help his company build and develop a single platform for end-to-end data analytics workflow.

    • New Amazon Web Services Region Opens in Canada

      Amazon launches AWS Canada (Central) Region in Montreal, extending Amazon’s cloud infrastructure to 15 regions and 40 availability zones around the world.

      At long last, the cloud is coming to Canada. Amazon Web Services (AWS) announced on December 8, the official launch of the new AWS Canada (Central) Region, providing cloud infrastructure from data centers in Montreal, Quebec. The new AWS region is set to help serve customers in Canada with Amazon already highlighting a number of well-known organizations including National Bank of Canada, Porter Airlines and clothing retailer Lululemon.

    • MEF, TM Forum Unite With Open Source Groups on Network Vision

      MEF Thursday announced the release of a new white paper – “An Industry Initiative For Third Generation Network and Services“ – spearheaded by MEF and co-authored by ON.Lab, ONOS, OPEN-O, OpenDaylight (ODL), the Open Networking Foundation (ONF), Open Platform for NFV (OPNFV), and TM Forum. The white paper describes an industry vision for the evolution and transformation of network connectivity services and the networks used to deliver them. MEF refers to this vision as the “Third Network,” which combines the agility and ubiquity of the Internet with the performance and security of CE 2.0 (Carrier Ethernet 2.0) networks.

    • The New Role of Assurance for Virtualized Networks

      For as long as any of us can remember, fulfillment and assurance were two independent processes, mostly because they were conceived, operated and purchased by separate departments. As Alfred D. Chandler demonstrated in his classic book “Strategy and Structure,” operations and even business structure follow organizational charts and vice-versa. Fulfillment and assurance are no exceptions, with those organizations driving processes and supporting software purchases. While many know that its not ideal, the situation has mostly worked.

  • Kernel Space

    • Linux 4.8.13

      I’m announcing the release of the 4.8.13 kernel.

      All users of the 4.8 kernel series must upgrade.

      The updated 4.8.y git tree can be found at:
      git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.8.y
      and can be browsed at the normal kernel.org git web browser:

      http://git.kernel.org/?p=linux/kernel/git/stable/linux-st…

    • Linux 4.4.37
    • Linux Kernel 4.4.37 LTS Is a Minor Patch with AArch64 Changes, Updated Drivers
    • Linux Kernel 4.8.13 Launches with ARM64 and AMDGPU Improvements, KVM Fixes

      A few moments ago, renowned Linux kernel maintainer Greg Kroah-Hartman had the pleasure of announcing the general availability of the Linux kernel 4.8.13 and Linux kernel 4.4.37 LTS maintenance updates.

      While many rolling GNU/Linux distributions have just received the Linux 4.8.12 kernel, it looks like Linux kernel 4.8.13 is now available with more improvements and bug fixes, but it’s not a major milestone. According to the appended shortlog and the diff since last week’s Linux 4.8.12 kernel release, a total of 46 files were changed, with 214 insertions and 95 deletions.

    • Linux Foundation adds an open source networking specialist to the team

      In recognition of the increasingly central role open source technology has played for the networking sector, the Linux Foundation today named Arpit Joshipura as its general manager for networking and orchestration.

      Joshipura, a veteran tech executive who has worked at Dell, Ericsson, and Nortel, among others, is considered by the organization to be a foundational contributor to open source software in general and networking in particular. Currently, he’s the chief marketing officer for Prevoty, an application security startup in Los Angeles.

    • The Linux Foundation Appoints Veteran Networking Professional as General Manager, Networking & Orchestration
    • Three serious Linux kernel security holes patched

      The good news is developers are looking very closely at Linux’s core code for possible security holes. The bad news is they’re finding them.

      At least the best news is that they’re fixing them as soon as they’re uncovered.

      The latest three kernel vulnerabilities are designated CVE-2016-8655, CVE-2016-6480, and CVE-2016-6828. Of these, CVE-2016-8655 is the worst of the bunch. It enables local users, which can include remote users with virtual and cloud-based Linux instances, to crash the system or run arbitrary code as root.

    • At Long Last, Linux Gets Dynamic Tracing

      When the Linux kernel version 4.9 will be released next week, it will come with the last pieces needed to offer to some long-awaited dynamic thread-tracing capabilities.

      As the keepers of monitoring and debugging software start using these new kernel calls, some of which have been added to the Linux kernel over the last two years, they will be able to offer much more nuanced, and easier to deploy, system performance tools, noted Brendan Gregg, a Netflix performance systems engineer and author of DTrace Tools, in a presentation at the USENIX LISA 2016 conference, taking place this week in Boston.

    • It’s Been A Quiet Year-End For BUS1, The Proposed In-Kernel IPC For Linux

      With the Linux 4.10 kernel merge window expected to open this weekend, I was digging around to see whether there was anything new on the BUS1 front and whether we might see it for the next kernel cycle.

      While I have yet to see any official communication from the BUS1 developers, it doesn’t look like it’s happening for BUS1. In fact, it’s been a rather quiet past few weeks for these developers working on this in-kernel IPC mechanism to succeed the never-merged KDBUS.

    • Intel Working On 5-Level Paging To Increase Linux Virtual/Physical Address Space
    • IBM building blockchain ecosystem

      IBM believes blockchain technology, with its capability to create an essentially immutable ledger of digital events, will alter the way whole industries conduct transactions. To make that happen, Big Blue asserts, requires a complete ecosystem of industry players working together.

      To that end, IBM today said it is building a blockchain ecosystem, complete with a revenue sharing program, to accelerate the growth of networks on the Linux Foundation’s Hyperledger Fabric. IBM envisions the ecosystem as an open environment that allows organizations to collaborate using the Hyperledger Fabric.

    • Graphics Stack

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • KDE neon User LTS Edition Out Now

        KDE Plasma 5.8 is designated an LTS edition with bugfixes and new releases being made for 18 months (rather than the normal four months). This will please a category of user who don’t want new features on their desktop but do want it to keep working and bugs to be removed. Because Neon aims to service Plasma and its users in every way we have now created the KDE neon User LTS Edition.

      • neon User LTS, openSUSE Upgrades, Best Distro Poll

        Jonathon Riddell today announced a new release of KDE Plasma flagship neon, KDE neon Long Term Supported. neon LTS features Plasma 5.8 and will not change to 5.9. Elsewhere, two users shared their methods for upgrading from openSUSE Leap 42.1 to 42.2 and Tumbleweed received several interesting updates this week. Dedoimedo posted a best distro poll and Sourceforge said watch out for your project founder’s “mentality.”

      • KDE Neon User LTS Edition Released, Powered By Plasma 5.8

        Jonathan Riddell has announced the KDE Neon User LTS Edition availability. Rather than tracking the bleeding-edge KDE developments as KDE Neon traditionally does, the User LTS Edition tracks Plasma 5.8 LTS.

      • KDE e.V. Community Report – 2nd Half of 2015

        The KDE e.V. community report for the second half of 2015 is now available. It presents a survey of all the activities and events carried out, supported, and funded by KDE e.V. in that period, as well as the reporting of major conferences that KDE has been involved in.

  • Distributions

    • Antivirus Live CD 21.0-0.99.2 Helps You Protect Your Computer Against Viruses

      4MLinux developer Zbigniew Konojacki proudly informs Softpedia today about the general availability of the Antivirus Live CD 21.0-0.99.2 bootable ISO image for scanning computers for viruses and other malware.

    • Best distro of 2016 poll

      Time for you to express yourselves. It’s been another year full of ups and downs, good distros and bad distros. Or if I may borrow a quote from a movie, Aladeen distros and Aladeen distros. Indeed.

      The rules are very similar to what we did in years gone past. I will conduct my own annual contest best thingie wossname, with a sprinkling of KDE, Xfce and other desktops, having their separate forays. But then, I will incorporate your ideas and thoughts into the final verdict, much like the 2015 best distro nomination. Let us.

    • PCLinuxOS/Mageia/Mandriva Family

      • ROSA Desktop Fresh R8 Plasma 5: is it near-perfect?

        ROSA is a Linux distribution forked some time ago from Mandriva Linux by a team of Russian developers, Rosa Lab, or officially LLC NTC-IT ROSA.

        I reviewed their distributions several times: ROSA KDE R7, ROSA Desktop 2012 and even interviewed the ROSA team.

        The most recent release of ROSA is now ROSA Desktop Fresh R8, which is available in several flavours: MATE, GNOME 3, KDE 4 and Plasma 5. I decided to try the Plasma 5 edition of this distribution, especially as my interest to Plasma increased after the good impression Kubuntu 16.10 left on me.

        There are links to the ISO images available on the ROSA download page, and I used it to get my own version of this Linux distribution. The size of ROSA Desktop Fresh R8 Plasma 5 64-bit image is 1.9 Gb. The dd command helped me to “burn” the image to the USB stick.

        So, the USB drive is attached to my Toshiba Satellite L500-19X laptop. Reboot. Choose to boot from USB. Let’s go!

    • Arch Family

      • Manjaro Deepin 16.10.3 released

        Manjaro Deepin is an edition of Manjaro Linux that uses the Deepin Desktop Environment, which is a desktop environment that originated from the Deepin Linux, a desktop distribution that’s based on Ubuntu.

        The main edition of Manjaro uses the K Desktop Environment (KDE). Manjaro Deepin is just one of many community-supported desktop environments available to users of the Arch Linux-based desktop distribution. The others are: Budgie, Cinnamon, GNOME 3, i3, LXQt and MATE.

    • OpenSUSE/SUSE

      • openSUSE Says Goodbye to AMD/ATI Catalyst (fglrx) Proprietary Graphics Drivers

        openSUSE developer Bruno Friedmann, informed the community of the openSUSE Linux operating system about the fact that he’s planning to remove the old ATI/AMD Catalyst (also known as fglrx) proprietary graphics drivers.

      • openSUSE Tumbleweed Users Get Git 2.11, Xfce 4.12.3, FFmpeg 3.2.1 & Mesa 13.0.2

        openSUSE’s Douglas DeMaio reports on the latest Open Source and GNU/Linux technologies that landed in the repositories of the openSUSE Tumbleweed rolling operating system.

      • Git, Kernels, LightDM, More update in Tumbleweed

        Topping the list of updates for snapshot 20161129 was the update to Light Display Manager 1.21.1, which added an Application Programming Interface (API) version to the greeter-daemon protocol for future enhancements. Other updates in the snapshot include openVPN, which added a recommended utility for network and traffic protocols, and subpackages for systemd relevant for 32-bit users. Desktop manager xfdesktop updated to version 4.12.3 and introduced rotating wallpaper images if the images contain rotation information.

        The programming language vala, which aims to bring modern programming language features to GNOME developers without imposing any additional runtime requirements, updated in the 20161129 and 20161201 snapshots.

      • openSUSE Leap 42.1 upgrade to Leap 42.2
      • openSUSE Tumbleweed – Review of the Week 2016/49

        I’m sure nobody doubted it, but Tumbleweed is back on the roll! And in fact, we did the impossible and released 8 snapshots in a week. This review will cover {1201..1208}.

    • Slackware Family

      • Based on Slackware 14.2, Absolute 14.2.2 Linux Is Out with Updated Kernel, X.Org

        Paul Sherman, the developer of the Absolute Linux distribution based on Slackware, has announced the availability of the second point release to the stable Absolute 14.2 series.

        Absolute 14.2 launched in mid-September 2016, and it’s based on the latest and most advanced Slackware 14.2 operating system, but from time to time there’s need for updated installation medium in case you want to deploy the OS on new computers without the need to download any updates. That’s why Absolute 14.2.2 is here, bundled with all the latest kernel and graphics stack updates released for Slackware 14.2 since its July launch.

    • Red Hat Family

    • Debian Family

    • Devices/Embedded

      • ST launches sensor module and open source dev kit

        ST unveiled a Cortex-M4F based “SensorTile” sensor and BLE module plus an open source dev kit that adds audio, micro-USB, and an Arduino-like interface.

        STMicroelectronics (ST) announced its SensorTile sensor module at its developer conference in October where it was one of the highlights of the show. Now the company has officially launched the 14 x 14mm SensorTile module along with an open source “STEVAL-STLKT01V1” development kit. The kit can be used for developing wearables, gaming accessories, smart-home, and other Internet of Things devices.

      • Open Source Smartwatch Operating System AteroidOS Alpha 1.0 Released (video)
      • With Android Wear critical, open source AsteroidOS offers smartwatches a life line
      • AsteroidOS is an Open Source OS for Smartwatches

        Florent Revest is a French computer science student who has been working on an open source operating system for smartwatches for the last two years. Yesterday, he officially launched version 1 of the alpha for AsteroidOS.

        The goal for the platform was to create something that gave smartwatch owners more control over their privacy, as well as the hardware they purchased.

        Florent feels that the current proprietary platforms do not guarantee this, and this was the basis for AsteroidOS. He wanted his open source smartwatch operating system to provide freedom with free software, more privacy than other wearable platforms offer, interoperability so it could communicate with other devices, modularity that enabled the user to tweak and change the OS as they see fit, the ability to port the software to as many devices as possible, and gathering a community who is passionate about the platform.

      • AsteroidOS Brings Open Source Functionality To Smartwatches

        Smartwatches may not have taken off like companies were hoping, but they have come quite far in terms of what they can offer and what sorts of features are available for the many different models of smartwatches that are out there. Even with the updated functionality of options like Samsung’s Gear S lineup and Android Wear platforms, though, smartwatches can still feel a little bit limiting, and part of this undoubtedly includes the reason that the operating systems aren’t as open as platforms like Android. That is now changing thanks to a platform called AsteroidOS which is an open source operating system for smartwatches.

      • AsteroidOS alpha release gives Android Wear smartwatches a new hope
      • AsteroidOS is an alternative open source OS for your Android Wear device
      • Mini Apollo Lake module takes the heat — and the cold

        Congatec’s “Conga-MA5” is a Linux-ready COM Express Compact Type 10 Mini module with Apollo Lake SoCs, up to 128GB eMMC 5.1, and -40 to 85°C support.

        Congatec was one of the first embedded vendors to announce computer-on-modules based on Intel’s Atom E3900 and other Apollo Lake Pentium and Celeron SoCs. The offerings included a Qseven module, a SMARC 2.0 module, and a COM Express Compact Type 6 Conga-TCA5. The company has now followed up with a COM Express Compact Type 10 Mini Conga-MA5 module.

      • Conexant voice board lets you summon Alexa from a Raspberry Pi

        Conexant and Amazon have launched an Alexa Voice Service development kit for the Raspberry Pi 3. The kit includes a Conexant AudioSmart CX20921 voice board.

        Since Amazon opened up access to its Alexa Voice Service (AVS) agent inside the Amazon Echo smart speaker/IoT hub, including an open source port to the Raspberry Pi, several projects have emerged for creating Echo-like devices built around the RPi. For example, earlier this year, a Novaspirit Tech hack along these lines was promoted by the Raspberry Pi blog. Now Conexant Systems and Amazon have teamed up on a higher end “AudioSmart 2-mic Development Kit” for the RPi that’s designed specifically for voice-controlled smart home IoT functionality.

      • New Smartwatch OS Debuts on GitHub

        Can a new smartwatch operating system based on Linux breathe some new life into the smart wearables market? Florent Revest hopes so.

        Revest, a French computer science student, on Wednesday announced the alpha release of AsteroidOS, an open source operating system that will run on several Android smartwatch models.

        “Many users believe that the current proprietary platforms can not guarantee a satisfactory level of control over their privacy and hardware,” noted Revest, who has been working on his OS for two years. “Hence, I noticed a need for an open wearable platform and AsteroidOS is my attempt to address this issue.”

      • Rugged EBX single board computer sets off on the Bay Trail

        VersaLogic’s Linux-friendly, EBX style “Viper” SBC offers a Bay Trail Atom E3800, up to 16GB DDR3L, -40 to 85°C support, and MIL-STD-202G ruggedization.

      • Upcoming Retro Console Promises To Play Almost All Classic Games Across All Consoles, Supports 4K
      • RetroEngine Sigma release date, specs, latest news: Crowd-funded retro gaming device can emulate 28 different consoles
      • Doyodo RetroEngine Sigma Release Date, News & Update: Linux-Powered Emulation Console For Classic Games Soon To Launch!

        Doyodo has launched a mini-console RetroEngine Sigma that can run classic video games and soon to release in the market. The mini-console is said to directly compete with Nintendo’s NES Classic Edition console.

        Doyodo, a design company has introduced its crowd funding campaign console called RetroEngine Sigma. The mini-console is also a plug-and-play media player that is capable of running thousands of classic video games using an emulator.

      • Make Raspberry Pi Portable With 5-inch Touch Screen

        You can be your own Geordi La Forge and build yourself a fully capable GNU/Linux pocket computer with this uber inexpensive five-inch touch screen and a Raspberry Pi.

      • Phones

        Free Software/Open Source

        • Apache Zeppelin open-source analytics startup reveals new name, fresh funding

          The team behind the Apache Zeppelin open-source notebook for big data analytics visualization has renamed itself ZEPL and announced $4.1M in Series A funding.

          ZEPL, which swears a certain professional football organization had nothing to do with it ditching its former name (NFLabs), is one of numerous companies smelling blood in the water around Tableau, the $3.5 billion business intelligence and analytics software vendor that has stumbled financially in recent quarters and seen its stock price plummet accordingly. The pitch from ZEPL entering my email inbox read: “Is Open Source project eating Tableau’s lunch?”

        • OpenMake Software turns its ARA solution into open-source offering

          OpenMake Software wants to improve how developers use the Continuous Delivery pipeline with its recently open-sourced Application Release Automation (ARA) solution, Release Engineer, which is based on version 7.7 of the ARA solution and offered under the FreeBSD license.

        • Open source needs social freedoms for business to thrive

          When open source was first introduced in 1991 with Linux, it was considered a novelty in the industry, a new toy for developers to play with. Today, it’s a fundamental driver of technology innovation across all software companies, according to Dirk Hohndel, VP and chief open source officer at VMware Inc.

          “Open source is more than software development methodology; open source is how a group of people interact and how you create fantastic technology,” said Hohndel.

        • 6 organizational growing pains you can avoid

          Everything has a season, and as organizations age—communities, charities, companies, churches and more—they face similar diseases of time. These are emergent patterns of failure that arise not from mistakes but from the consequences of earlier success. In open source, we are seeing the same patterns emerge; this should not be a surprise.

          Some of them are unavoidable. Understanding them helps leaders reduce the risk that will arise and helps identify them when they do. This is by no means a comprehensive list, but we have encountered all of these modes of systemic failure, some of them often.

        • Maximizing the benefits of open source in IoT

          With the dawn of the Internet of Things, software is making its way into every product, into every industry. And along with software come developers, who bring their beliefs, attitudes, expertise, and habits along with them. One of those is open source technology — a staple in the software industry since the 1980s, but a new and often scary concept for many traditional industries, whose businesses are built on protecting their assets and intellectual property.

          In this article, we will illustrate how open source technologies permeate every part of the IoT development stack, and outline how open source can be used as a means of market control as well as a booster of innovation and a way to tap into the IoT developer talent pool. The data have been collected from 3,700 IoT developers in 150 countries across the globe, surveyed in Q4 2015 and shines a light on how big a deal open source really is in IoT, why developers love it, and how companies can create a successful commercial strategy around the use of open source by aligning themselves with the values of that core stakeholder group that are developers.

        • A tour of Google’s 2016 open source releases

          Open source software enables Google to build things quickly and efficiently without reinventing the wheel, allowing us to focus on solving new problems. We stand on the shoulders of giants, and we know it. This is why we support open source and make it easy for Googlers to release the projects they’re working on internally as open source.

          We’ve released more than 20-million lines of open source code to date, including projects such as Android, Angular, Chromium, Kubernetes, and TensorFlow. Our releases also include many projects you may not be familiar with, such as Cartographer, Omnitone, and Yeoman.

        • Why this CTO believes open source should be the new norm for all software companies

          Open source is personally very important to me, and my team has a long track record of contributing to open source projects, so it was a simple decision to open source our platform. Doing that encourages transparency and community engagement, which is key for any product that has security at its core. We had a vision to be a secure and completely transparent messaging app and we stuck to it.

        • Google’s Open Embedded Projector is a Cool Data Visualization Tool

          With 2016 closing out, there is no doubt that cloud computing and Big Data analytics would probably come to mind if you had to consider the hot technology categories of the year. However, there is an absolute renaissance going on right now in the field of artifical intelligence and the closely related field of machine learning. In fact, in its top 10 strategic technology trends for the year 2017, Gartner put AI and machine learning at the top of the list.

          Google is among several companies making big contributions in this space. It recently gathered some compelling AI and machine learning demonstrations and placed them in its Google AI Experiments showcase. Now, Google has announced that it is open sourcing its data visualization tool, Embedding Projector. The tool will aid machine learning practioners as they visualize data without having to install and run Google’s TensorFlow tool (also open source, which we covered here).

        • Nextcloud’s Promising Advances Continue

          The extremely popular ownCloud open source file-sharing and storage platform for building private clouds has been much in the news lately. CTO and founder of ownCloud Frank Karlitschek resigned from the company a few months ago. His open letter announcing the move pointed to possible friction created as ownCloud moved forward as a commercial entity as opposed to a solely community focused, open source project. Karlitschek had a plan, though. He came out with a fork of ownCloud called Nextcloud, and we’ve reported on strong signs that this cloud platform has a bright future. In recent months, the company has continued to advance Nextcloud.

          Now, if you’re running the Nextcloud platform, a convenient new addition is coming your way. The Nextcloud 9.0.54 and 10.0.1 releases come with a new updater. This new updater allows reliable upgrading to new Nextcloud versions via the web and in the upcoming 11 release even via the command line interface.

        • Don’t Let Your Project Suffer Because of Founder’s Mentality

          There’s a certain mentality that can creep up and slowly destroy open source project development. It’s dangerous in a way that nobody really notices it’s there or that it is destructive, except at the very last moments. It’s the founder’s mentality.

        • How Gratipay helps solve the ‘free rider’ problem
        • Rhizome is working on an open-source tool to help archive digital content

          “The stability of this kind of easy archiving for document storage, review and revision is a great possibility, but the workflow for journalists is very specific, so the grant will allow us to figure out how it could function.”

          Another feature of Webrecorder that journalists might find appealing, and one of the software’s core purposes, is to preserve material that might be deleted or become unavailable in time.

          However, the tool is currently operated under a Digital Millennium Copyright Act (DMCA) Takedown policy. This means any individual can ask for a record of their web presence or materials to be removed, so Rhizome will be working to “answer the more complicated questions and figure out policies” around privacy and copyright with the latest round of funding.

        • An ode to releasing software

          There is one particular moment in every Free and Open Source Software project: it’s the time when the software is about to get released. The software has been totally frozen of course, QA tests have been made, all the lights are green; the website still needs to be updated with the release notes, perhaps some new content and of course the stable builds have to be uploaded. The release time is always a special one.

          The very day of the release, there is some excitement and often a bit of stress. The release manager(s), as well as everyone working on the project’s infrastructure are busy making sure everything is ready when the upload of the stable version of the software, binaries and source, has been completed. In many cases, some attention is paid to the main project’s mirror servers so that the downloads are fluid and work (mostly) flawlessly as soon as the release has been pushed and published.

        • Events

          • Diversity Scholarship Series: My Time at CloudNativeCon 2016

            CloudNativeCon 2016 was a wonderful first conference for me and although the whirlwind of a conference is tiring, I left feeling motivated and inspired. The conference made me feel like I was a part of the community and technology I have been working with daily.

        • Web Browsers

        • SaaS/Back End

          • Spark and Hadoop Training Can Lead to Top Job Prospects

            In the tech job market race these days, hardly any trend is drawing more attention than Big Data. And, when talking Big Data, the subject of Hadoop inevitably comes up, but Spark is becoming an increasingly popular topic. IBM and other companies have made huge commitments to Spark, and workers who have both Hadoop and Spark skills are much in demand.With all this in mind, several providers are offering free Hadoop and Spark training.

        • Oracle/Java/LibreOffice

          • Michael Meeks: 2016-12-08 Thursday.

            Mail chew; really encouraged to see Kolab’s lovely integration with Collabora Online announced and available for purchase. Wonderful to have them getting involved with LibreOffice, doing testing, filing and triaging bugs up-stream and so on, not to mention the polished marketing.

          • LibreOffice Goes Online

            Well, Meeks and company have done it. What was at first a rather limited demonstration of LibreOffice running in a browser window is now available as a Docker image for everyone to try out. I haven’t yet, because I’m under the weather with yet another winter cold, but that shouldn’t delay you.

        • CMS

          • WordPress 4.7 Content Management System Provides New Design Options

            WordPress is among the most widely used open-source technologies in the world, powering more than 70 million websites. WordPress 4.7 was released Dec. 6, providing a new milestone update including new features for both users and developers. As is typically the case with new WordPress releases, there is also a new default theme in the 4.7 update. The 2017 theme provides users with a number of interesting attributes including the large feature image as well as the ability to have a video as part of the header image. The Theme Customizer feature enables users to more intuitively adjust various elements of a theme, to fit the needs of websites that use will upgrade to WordPress 4.7. In addition, the new custom CSS (Cascading Style Sheets) feature within a theme preview lets users quickly see how style changes will change the look of a site. As an open-source project, WordPress benefits from participation of independent contributors and for the 4.7 release there were 482 contributors. In this slideshow eWEEK takes a look at some of the highlights of the WordPress 4.7 release.

        • Education

          • Psychology Professor Releases Free, Open-Source, Preprint Software

            The Center for Open Science, directed by University of Virginia psychology professor Brian Nosek, has launched three new services to more quickly share research data as the center continues its mission to press for openness, integrity and reproducibility of scientific research.

            Typically, researchers send preprint manuscripts detailing their research findings to peer-reviewed academic journals, such as Nature and Science. The review process can take months or even years before publication – if the research is published at all.

            By contrast, “preprinting,” or sharing non-peer-reviewed research results online, enables crucial data to get out to the community the moment it is completed. That, said Nosek, is critical.

        • Pseudo-Open Source (Openwashing)

        • BSD

          • GCC 6.2/7.0 vs. LLVM Clang 3.9/4.0 SVN Compiler Performance

            Earlier this week I published some GCC 5.4 vs. GCC 6.2 vs. GCC 7.0 SVN development benchmarks with a Core i7 6800K Broadwell-E system. For those curious how the LLVM Clang compiler stack is comparing, here are some tests on the same system when running fresh benchmarks of LLVM Clang 3.9 as well as LLVM Clang 4.0 SVN.

            These tests were done with LLVM Clang 3.9 and 4.0 SVN added in to the GCC results from this Core i7 6800K system running Ubuntu 16.10 with the Linux 4.8 kernel. The CFLAGS/CXXFLAGS were maintained the same throughout all testing with the “-O3 -march=native” flags.

          • LLVM 3.9.1 Expected For Release Next Week

            While LLVM 4.0 isn’t coming until its planned release in Feburary, the LLVM 3.9.1 point release is expected this coming week.

            Tom Stellard of AMD released LLVM 3.9.1-rc3 on Friday and anticipates this being the last release candidate. This 3.9.1-rc3 build just has some ARM/AArch64 fixes compared to his earlier RC2 milestone.

        • FSF/FSFE/GNU/SFLC

          • GCC Patch To Support Google’s Fuchsia OS

            It’s been a while since last hearing anything of Google’s experimental Fuchsia OS but it looks like things are moving along as they are now looking to merge support for it into the GCC compiler.

        • Public Services/Government

          • Slovenia voting analysis tool shared as open source

            The President of the Parliament of Slovenia, Milan Brglez, last Monday unveiled Parlameter, a web-based software solution that displays in the National Assembly voting results and helps analyse them. The software, made available as open source, is developed by ‘Danes je nov dan’ (Today is a new day) an NGO focusing on eParticipation, openness and government oversight.

          • Bulgaria to make EUPL preferred open source licence

            Next week, the government of Bulgaria will make the European Union Public Licence (EUPL) the preferred licence to be used for governmental software development projects. An ordinance, to be adopted on Wednesday, will allow projects to use around ten popular free and open source software licence approved by the Open Source Initiative (OSI) – an open source advocacy organisation.

          • Bulgaria, France, UK, US support OGP free software policy

            The United States of America and three EU Member states – Bulgaria, France and the United Kingdom – have pledged support for the open source policy, making it an official part of the ‘Paris Declaration’, the outcome of the 4th Global Summit of the Open Government Partnership (OGP), taking place in Paris this week. The open source policy is also supported by the city of Austin (USA).

        • Licensing/Legal

          • Open Source Software A Core Competency For Effective Tech M&A

            Imagine your company just acquired its competitor for $100 million. Now imagine the company’s most important asset – its proprietary software – is subject to third-party license conditions that require the proprietary software to be distributed free of charge or in source code form. Or, imagine these license conditions are discovered late in the diligence process, and the cost to replace the offending third-party software will costs tens of thousands of dollars and take months to remediate. Both scenarios exemplify the acute, distinct and often overlooked risks inherent to the commercial use of open source software. An effective tech M&A attorney must appreciate these risks and be prepared to take the steps necessary to mitigate or eliminate them.

            Over the past decade, open source software has become a mainstay in the technology community. Since its beginnings, open source software has always been viewed as a way to save money and jumpstart development projects, but it is increasingly being looked to for its quality solutions and operational advantages. Today, only a fraction of technology companies do not use open source software in any way. For most of the rest, it is mission critical.

          • Facing down copyright claims, Doom roguelike fan game goes open-source (correction)
          • Doom-inspired roguelike goes open-source in a bid to outrun Zenimax lawyers

            Last week news broke that Zenimax is threatening legal action against the developer of DoomRL, a free Doom-inspired roguelike. Now, DoomRL’s creator is open-sourcing it in an attempt to put it beyond the reach of Zenimax’s legal team.

            Many devs will probably appreciate the symbolic resonance of this move, given that id Software open-sourced the original Doom code almost twenty years ago.

          • DoomRL creator makes free roguelike open-source to try and counter Zenimax legal threat
          • DoomRL Goes Open-Source in Face of Copyright Claims

            Earlier this week, ZeniMax Medi hit DoomRL, a popular roguelike version of the original first-person shooter, with a cease-and-desist order. This order instructed producer ChaosForge to remove the free downloadable game to prevent further legal action. Instead of taking it down, co-creator Kornel Kisielewicz turned the game open-source.

        • Openness/Sharing/Collaboration

        • Programming/Development

          • This Indian software company just partnered with the world’s biggest open source community

            In what can be called a major motivation for Indian tech firms, Amrut Software, an end-to-end Software, BPO services and solutions provider has become a GitHub distributor for India region.

            GitHub hosts world’s biggest open source community along with the most popular version control systems, configuration management and collaboration tools for software developers. It has some of the largest installations of repositories in the world.

          • Python 3.6 released with many new improvements and features

            Python,the high-level interpreted programming language is now one of the most preferred programming language by beginners and professional-level developers.So,here Python 3.6 is now available with many changes,improvements and of course the ease of Python was not left in the work list.

        Leftovers

        • Health/Nutrition

          • Els Torreele Named Executive Director Of Global MSF Access Campaign

            Veteran public health advocate Els Torreele of Belgium has been named the new executive director of the high-profile Médecins Sans Frontières (MSF, Doctors Without Borders) Access Campaign, based in Geneva.

          • Spain: Brexit Britain must pay for expats’ healthcare

            Britain will have to reach a deal to pay for the healthcare of its citizens in Spain once the country leaves the EU, Spain’s foreign minister has said.
            Speaking at a conference in Alicante, Jose Manuel Garcia-Margallo said Spain would try to reach a deal for the UK to pay for the healthcare of the estimated 800,000 Brits living in the country.

            “We must reach an agreement for residents to access health services in Spain, but covered by the United Kingdom” he told the conference held by accountancy firm PWC, according to Spanish news site Estrella Digital.

        • Security

        • Defence/Aggression

          • What if the terrorists won?

            Like 9/11 for New Yorkers, the Paris attacks of November 2015 have become that rare thing for city slickers — a topic of conversation in which everyone can participate. There are two million Parisians, each of whom has a story about the night suicide bombers and gunmen killed 130 people at cafés, restaurants, the Stade de France and the Bataclan music hall.

            Some offer a poignant mix of tumult and tragedy, like the one my high school friend tells of diving under a table at a café when a terrorist opened fire on drinkers with an assault rifle. (She performed CPR on a shooting victim who ended up dying from loss of blood). Others, like mine, are less riveting. After making sure my friends and family were safe, I got to work covering the story. The tales all have one thing in common: a moment in which the person recounting it is struck by the enormity of what occurred.

        • Transparency/Investigative Reporting

          • Julian Assange issues statement, destroys Sweden’s rape case

            In the statement Assange also complains at considerable length about what he says is the oppressive behaviour of the Swedish authorities towards him: reviving a rape investigation after it was closed down, issuing an arrest warrant against him without proper cause and in breach of due process, and insisting on his extradition from Britain to Sweden instead of questioning him in Britain, as he had repeatedly offered.

            In this part of the statement Assange says that the Swedish prosecutor’s decision to interview him in the Ecuadorian embassy in London – something which the Swedish prosecutor had previously consistently refused to do – was the result of a decision in March 2015 of the Swedish Supreme Court that she was in potential breach of her duties, and of the February 2016 decision of the Working Group on Arbitrary Detention of the UN Human Rights Council that he has been illegally denied his freedom as a result of her actions and of the actions of the British authorities.

            Assange’s statement is obviously partly intended to give his side of the story after years of legally enforced silence.

            As Assange rightly complains, numerous stories about him and about his case have appeared in the Western media, some undoubtedly leaked to the media by the Swedish authorities. These leaks and stories were clearly designed to ruin his reputation, and have in fact been very effective in doing so.

          • Anonymous Leaks to the WashPost About the CIA’s Russia Beliefs Are No Substitute for Evidence

            The Washington Post late Friday night published an explosive story that, in many ways, is classic American journalism of the worst sort: the key claims are based exclusively on the unverified assertions of anonymous officials, who in turn are disseminating their own claims about what the CIA purportedly believes, all based on evidence that remains completely secret.

            These unnamed sources told the Post that “the CIA has concluded in a secret assessment that Russia intervened in the 2016 election to help Donald Trump win the presidency, rather than just to undermine confidence in the U.S. electoral system.” The anonymous officials also claim that “intelligence agencies have identified individuals with connections to the Russian government who provided WikiLeaks with thousands of hacked emails” from both the DNC and John Podesta’s email account. Critically, none of the actual evidence for these claims is disclosed; indeed, the CIA’s “secret assessment” itself remains concealed.

        • Environment/Energy/Wildlife/Nature

          • In U.S., there are twice as many solar workers as coal miners

            SolarCity, the largest installer of residential solar systems in the U.S., nearly doubled its workforce last year, hiring 4,000 people to do everything from system design and site surveys to installation and engineering.

            The hiring spree at SolarCity isn’t slowing; it’s picking up speed as the company attempts to install twice as many rooftop solar systems than last year and readies its 1.2 million-square foot factory in New York, which is scheduled to reach full production in 2017.

          • Trump team’s demands fuel fear of Energy Department ‘witch hunt’

            Donald Trump’s transition team wants the Energy Department to provide the names of any employees who have worked on President Barack Obama’s climate initiatives — a request that has current and former staffers fearing an oncoming “witch hunt.”

            The president-elect’s team sought the information as part of a 74-point questionnaire that also asked for details about how DOE’s statistical arm, the Energy Information Administration, does the math on issues such as the cost-effectiveness of wind and solar power versus fossil fuels. POLITICO obtained the document Friday, after Trump’s advisers sent it to the department earlier in the week.

        • Finance

          • TPP, TTIP And CETA Are Disasters For The Public: Are There Better Ways To Do Trade Deals?

            As well as calling for truly independent and impartial judges, the Declaration also wants any dispute resolution mechanism to be available to small companies and even members of the public.

            The Namur Declaration is mostly of interest because it grew out of Magnette’s personal experience with CETA (article in French). The fact that a few dozen leading academics have lent their names to it adds weight, but is unlikely to bring about major changes to the way that trade negotiations are conducted. However, seismic political developments on both sides of the Atlantic are already doing that; let’s hope these provide an opportunity to debate and maybe even adopt some of the Declaration’s bold ideas.

          • Trump’s Labor Pick, Andrew Puzder, Is Critic of Minimum Wage Increases

            President-elect Donald J. Trump on Thursday chose Andrew F. Puzder, chief executive of the company that franchises the fast-food outlets Hardee’s and Carl’s Jr. and an outspoken critic of the worker protections enacted by the Obama administration, to be secretary of labor.

            “Andy Puzder has created and boosted the careers of thousands of Americans, and his extensive record fighting for workers makes him the ideal candidate to lead the Department of Labor,” Mr. Trump said in a statement.

            Mr. Puzder, 66, fits the profile of some of Mr. Trump’s other domestic cabinet appointments. He is a wealthy businessman and political donor and has a long record of promoting a conservative agenda that takes aim at President Obama’s legacy. And more than the other appointments, he resembles Mr. Trump in style.

          • Italy’s banking nightmare just came true

            The road back to health for Italian banks just became rockier. A lot rockier.

          • Why It’s Pointless For Trump To Renegotiate TPP, Even If He Wanted To, And Even If He Could

            Last month, we pointed out that that pretty much everyone agrees that TPP is dead… except that some still cling to the hope that Trump might be persuaded to carry out another swift U-turn and revivify the zombie deal. As Mike noted, Trump doesn’t seem to be against these kinds of mega-trade deals in principle, it’s just that he says the US generally concedes too much in them. That means he’d need some kind of high-profile win to make TPP 2.0 compatible with his earlier condemnation of TPP 1.0′s terms.

            The hope amongst true TPP believers seems to be that Trump could reopen the negotiations, talk tough, and strike a deal that is far more favorable to the US, which he could then ratify, holding it up as another Trump triumph. But in an article on the Cobram Courier site, the Australian ambassador to the US, Joe Hockey, says it would be “fanciful” to think the other TPP nations would happily reopen negotiations so that Trump could rewrite it in his favor.

        • AstroTurf/Lobbying/Politics

          • A ‘Political Horror Show’ of Recounts, 16 Years After Hanging Chads

            The recount of the presidential election ended on Wednesday night as abruptly as it had begun. By Thursday, workers were packing away canvas bags of ballots, board records and tables and chairs. A legal battle halted proceedings before all of Michigan’s votes were counted again, but not before a flood of perplexing peculiarities emerged.

            An effort to recount the votes here and in Pennsylvania and Wisconsin led by Jill Stein, the Green Party candidate, was never viewed as very likely to change Donald J. Trump’s election to the presidency, but it revealed something else in stark terms: 16 years after a different presidential recount in Florida dragged on for five agonizing weeks, bringing the nation close to a constitutional crisis, recounts remain a tangle of dueling lawyers, hyperpartisanship and claims of flawed technology.

            States still have vastly different systems for calling recounts and for carrying them out. Counting standards are inconsistent from state to state, and obscure provisions, like one in Michigan that deems some precincts not “recountable,” threaten to raise more public doubt about elections than confidence. Some of the most basic questions — is it better to count by hand, or with a machine? — have not been settled.

          • Green Party’s Jill Stein on Obstacles to Vote Recount: “This is Not What Democracy Looks Like”

            A Wisconsin judge is set to decide if a recount of the state’s presidential vote can proceed. We speak with Green Party presidential candidate Dr. Jill Stein, who has requested recounts in three states where Donald Trump narrowly beat Hillary Clinton: Wisconsin, Michigan and Pennsylvania. But Stein has faced obstacles in all three states. Today’s hearing in Wisconsin comes after two pro-Trump groups, the Great America PAC and the Stop Hillary PAC, filed a federal lawsuit seeking to stop the recount process. Meanwhile, in Michigan, a judge has already halted the recount. Another hearing will be held in Pennsylvania today to decide if a recount there can begin.

          • Redo Election For POTUS
          • Jill Stein: US election recount is vital to reform our broken voting system

            The election didn’t end on 8 November, it just morphed into a crisis whose resolution is not in sight. Hillary Clinton’s campaign was impacted by an October surprise delivered by a partisan FBI, but November was not short on surprises, and there may yet be one in December. A little more than a week ago, while people were wondering what it would take to get the Clinton campaign to pursue a recount, Jill Stein’s campaign amazed everyone by taking on the job. Exuberance for the idea immediately inspired small donors to contribute $6.5m in about 48 hours.

          • The Michigan Vote Recount Halt Isn’t Distracting Jill Stein From Her Main Post-Election Goal

            A Michigan judge ordered that the state start its vote recount on Dec. 5, but by Dec. 7, he had changed his tune and halted that very same recount. You might think this effectively knocks out Green Party candidate Jill Stein’s recount effort, but according to her team, the Michigan vote recount isn’t stopping Stein.

            U.S. District Judge Mark Goldsmith had originally ordered the ballot recount to start at noon on Dec. 5 so as to complete the recount by the Dec. 13 soft deadline before the Dec. 19 Electoral College vote. But the case came back to him when a Michigan Court of Appeals panel rejected the recount after determining that Stein was not considered an “aggrieved party” in the election. (Due to her fourth place finish in the state with around 1.1 percent of the votes, it wasn’t considered realistic that Stein could have actually won the election.) Goldsmith upheld this decision and lifted his previous order, citing the lack of evidence of “significant fraud or mistake” in his decision.

            Interestingly enough, Stein chose to spearhead vote recounts in battleground states rather than her opponent Hillary Clinton, who won the popular vote over President-elect Donald Trump. And for Clinton, whose campaign agreed to cooperate with Stein’s effort, not winning Michigan’s electoral votes in the recount effectively puts her out of the running to overturn Trump’s Electoral College victory. (She needed to win Michigan, Wisconsin, and Pennsylvania to put her vote count ahead of Trump’s.)

          • Constitutional Lawyer: It’s an “Outrage” That Judge Halted Michigan Presidential Election Recount

            On Wednesday, a federal judge ordered Michigan’s Board of Elections to stop the state’s electoral recount. U.S. District Judge Mark Goldsmith said he would abide by a court ruling that found that former Green Party presidential candidate Dr. Jill Stein could not seek a recount. Goldsmith concluded, “A recount as an audit of the election has never been endorsed by any court.” Stein has pledged to continue to push for a recount. Michigan is one of three battleground states where Stein had demanded a recount. The other two states are Wisconsin and Pennsylvania. President-elect Donald Trump narrowly defeated Democratic presidential contender Hillary Clinton in all three states. For more, we’re joined by John Bonifaz, attorney and political activist specializing in constitutional law and voting rights. He was one of a group of leading election lawyers and computer scientists calling for a recount in Wisconsin, Michigan and Pennsylvania.

          • Donald Trump and Hillary Clinton’s final campaign spending revealed

            Donald Trump’s campaign spent about $94m in its final push for the White House, according to new fundraising reports.

            The Republican continued his campaign-long trend of spending far less than Democratic rival Hillary Clinton. Her campaign spent almost $132m in its closing weeks, according to reports filed on Thursday with the Federal Election Commission. The latest reports cover 20 October to 28 November.

            Over the course of the primary and general elections the Trump campaign raised about $340m including $66m out of his own pocket. The Clinton campaign, which maintained a longer and more concerted fundraising focus, brought in about $581m.

          • Obama orders full review of Russian hacking during the 2016 election

            President Obama has ordered a full review of foreign-based digital attacks that U.S. intelligence agencies say were aimed at influencing this year’s presidential election, a top White House official said Friday.

            The disclosure came after President-elect Donald Trump again dismissed a blunt U.S. intelligence assessment that concluded senior Russian authorities had authorized the digital theft of emails from Democratic Party officials and Hillary Clinton’s campaign manager during the campaign.

          • Obama orders review of Russian election-related hacking

            President Barack Obama has ordered a full review into hacking aimed at influencing US elections going back to 2008, the White House said Friday.
            “The President has directed the Intelligence Community to conduct a full review of what happened during the 2016 election process. It is to capture lessons learned from that and to report to a range of stakeholders,” White House Homeland Security and Counterterrorism Adviser Lisa Monaco said at a Christian Science Monitor breakfast with reporters Friday. “This is consistent with the work that we did over the summer to engage Congress on the threats that we were seeing.”

            White House spokesman Eric Schultz added later that the review would encompass malicious cyber activity related to US elections going back to 2008.

          • Russia Hacked Republican Committee but Kept Data, U.S. Concludes

            American intelligence agencies have concluded with “high confidence” that Russia acted covertly in the latter stages of the presidential campaign to harm Hillary Clinton’s chances and promote Donald J. Trump, according to senior administration officials.

            They based that conclusion, in part, on another finding — which they say was also reached with high confidence — that the Russians hacked the Republican National Committee’s computer systems in addition to their attacks on Democratic organizations, but did not release whatever information they gleaned from the Republican networks.

            In the months before the election, it was largely documents from Democratic Party systems that were leaked to the public. Intelligence agencies have concluded that the Russians gave the Democrats’ documents to WikiLeaks.

            Republicans have a different explanation for why no documents from their networks were ever released. Over the past several months, officials from the Republican committee have consistently said that their networks were not compromised, asserting that only the accounts of individual Republicans were attacked. On Friday, a senior committee official said he had no comment.

          • A Clinton Fan Manufactured Fake News That MSNBC Personalities Spread to Discredit WikiLeaks Docs

            The phrase “Fake News” has exploded in usage since the election, but the term is similar to other malleable political labels such as “terrorism” and “hate speech”; because the phrase lacks any clear definition, it is essentially useless except as an instrument of propaganda and censorship. The most important fact to realize about this new term: those who most loudly denounce Fake News are typically those most aggressively disseminating it.

            One of the most egregious examples was the recent Washington Post article hyping a new anonymous group and its disgusting blacklist of supposedly pro-Russia news outlets – a shameful article mindlessly spread by countless journalists who love to decry Fake News, despite the Post article itself being centrally based on Fake News. (The Post this week finally added a lame editor’s note acknowledging these critiques; the Post editors absurdly claimed that they did not mean to “vouch for the validity” of the blacklist even though the article’s key claims were based on doing exactly that).

            Now we have an even more compelling example. Back in October, when WikiLeaks was releasing emails from the John Podesta archive, Clinton campaign officials and their media spokespeople adopted a strategy of outright lying to the public, claiming – with no basis whatsoever – that the emails were doctored or fabricated and thus should be ignored. That lie – and that is what it was: a claim made with knowledge of its falsity or reckless disregard for its truth – was most aggressively amplified by MSNBC personalities such as Joy Ann Reid and Malcolm Nance, The Atlantic’s David Frum, and Newsweek’s Kurt Eichenwald.

          • Rather Than Exposing Propaganda, WaPo Shows How It’s Done

            As the Hillary Clinton campaign slogged toward victory in the long primary campaign against Sen. Bernie Sanders, word came from WikiLeaks that it had scored a trove of hacked emails to and from the Democratic National Committee. Among other things, they proved that DNC chair Debbie Wasserman Schultz and Clinton campaign chair John Podesta, along with their organizations, had been working hand-in-glove to skew the primaries in Clinton’s favor.

            The day before the party’s convention opened in Philadelphia on July 24, Wasserman-Schultz had to resign her post or face a floor revolt. Sanders delegates were so angry at what they were learning from WikiLeaks about the sabotage of their candidate that hundreds walked out on the second day of the convention, tossing away their delegate credentials over the security fence and vowing never to support Clinton.

          • Washington Post Issues Correction To “Fake News” Story

            The Washington Post has been under fire for its publication of an article entitling “Russian propaganda effort helped spread ‘fake news’ during election, experts say.” The article by Craig Timberg relied on a controversial website called PropOrNot, which published what is little more than a black list of website that the authors deemed purveyors of fake news including some of the largest sites on the Internet like Drudge Report. However, the previously unknown group was itself criticized for listing “allies” that proved false. Yesterday, Hillary Clinton ramped up the call for action against “fake news” which she described as an epidemic. Now the Washington Post has published a rather cryptic correction to the fake news story. The controversy is the subject of my latest column in USA Today.

            The organization listed a variety of news sites as illegitimate. It included some of the most popular political sites from the left and right Truthout, Zero Hedge, Antiwar.com, and the Ron Paul Institute. It even includes one of the most read sites on the Internet, the Drudge Report. Notably, it also included WikiLeaks, which has been credited with exposing political corruption and unlawful surveillance programs.

          • Trump says U.S.-China relationship must improve

            President-elect Donald Trump said on Thursday the United States needed to improve its relationship with China, which he criticized for its economic policies and failure to rein in North Korea.

            “One of the most important relationships we must improve, and we have to improve, is our relationship with China,” Trump told a rally in Iowa. The United States and China are the world’s two biggest economies.

            “China is not a market economy,” he said. “They haven’t played by the rules, and I know it’s time that they’re going to start.”

          • Trump has declined many intelligence briefings offered to him according to Senate aide

            Intelligence community officials have confirmed that president-elect Donald Trump has declined many of the daily intelligence briefings that have been offered to him, a Senate aide confirmed to CBS News’ Margaret Brennan. The Washington Post first reported that Mr. Trump was turning away intelligence briefings in the weeks after the election.

            Two key Senate Democrats — Ben Cardin of Maryland and Dianne Feinstein of California — expressed dismay about this in an op-ed published Thursday by USA TODAY.

          • Russia Hacked Republican Committee but Kept Data, U.S. Concludes

            American intelligence agencies have concluded with “high confidence” that Russia acted covertly in the latter stages of the presidential campaign to harm Hillary Clinton’s chances and promote Donald J. Trump, according to senior administration officials.

            They based that conclusion, in part, on another finding — which they say was also reached with high confidence — that the Russians hacked the Republican National Committee’s computer systems in addition to their attacks on Democratic organizations, but did not release whatever information they gleaned from the Republican networks.

            In the months before the election, it was largely documents from Democratic Party systems that were leaked to the public. Intelligence agencies have concluded that the Russians gave the Democrats’ documents to WikiLeaks.

            Republicans have a different explanation for why no documents from their networks were ever released. Over the past several months, officials from the Republican committee have consistently said that their networks were not compromised, asserting that only the accounts of individual Republicans were attacked. On Friday, a senior committee official said he had no comment.

          • Attorney Calls For Florida Voters To Demand A Hand Recount Of All Ballots

            On December 11th, 2016, voters around the state will demand that their votes be counted and will respectfully request that the courts approve a full hand count of the paper ballots of the 2016 Florida Presidential Election.

          • Michigan owes Jill Stein a refund since recount stopped

            Green Party candidate Jill Stein is in line for a big check from the state of Michigan after the recount she requested was stopped by a federal judge and the state Board of Canvassers after only three days of counting ballots.

            Under state law, Stein had to pay $125 per precinct — or $973,250 — to count Michigan’s 7,786 in-person and absentee voting precincts. That check was delivered to state officials when she requested the recount last week.

            Now, with only a fraction of the recount completed, Michigan’s Secretary of State is prepared to refund a portion of that amount, said Fred Woodhams, spokesman for Secretary of State Ruth Johnson. Stein will have to pay for the precincts in Michigan that were counted, but she will not be charged for the precincts that couldn’t be counted because of problems with the ballot containers.

        • Censorship/Free Speech

          • Breitbart News pushes deeper into Europe

            A NOTABLE American commentator, Charles Krauthammer, once explained Rupert Murdoch’s success in founding Fox News, a cable channel, by pointing out that he had found a niche market—half the country. The same may be true of Breitbart News, a conservative website whose fortunes have risen with those of Donald Trump, and whose chairman, Stephen Bannon (pictured), is Mr Trump’s chief strategist.

            Milo Yiannopoulos, an editor at Breitbart, explained after Mr Trump’s victory that half of voters are “repulsed by the Lena Dunham, Black Lives Matter, third-wave feminist, communist, ‘kill-all-white-men’ politics of the progressive left.” Breitbart saw it coming a while ago, he added. The company’s expansion plans suggest it sees something coming in Europe, too. It already has a website in Britain and in January it will launch French and German sites.

          • Fake News About Fake News Leads To (Fake?) Defamation Threat

            So, it seems like “fake news” is all the rage these days. As we’ve discussed, the sudden focus on fake news is a silly distraction. It’s not likely to be changing many minds — and the talk about fake news seems mostly to be leading to calls for censorship. And a big part of the problem is that “fake news” is such a broad and vague label. It’s been applied to outright propaganda, to satire, to serious reporting, to serious reporting people don’t like… and to serious, but mistaken, reporting. The problem is that when you lump all those things together, things get pretty damn messy.

            Take, for example, this “fake news” story that got a lot of attention when it came out right around Thanksgiving: the Washington Post claimed that some “experts” had shown that Russian propagandists were behind the fake news explosion during the election. Which experts? The story doesn’t say. What evidence? The story doesn’t say. The article is focused on a brand new organization called “PropOrNot” that claimed to be run by experts, but won’t identify who’s involved, and the Washington Post didn’t seem to care. But still it made incredibly broad claims about “fake news” and Russian propaganda.

          • The Thin Line Between Political Censorship and Fighting Fake News in Iran

            The Iranian government is reportedly taking steps to expand regulations on large public news channels on the instant messenger Telegram. The move would apparently affect groups with more than 5,000 subscribers.

            It remains unclear, however, if state officials seek dramatic changes to controls on these online communities (ostensibly in the battle against “fake news”), or if the government merely plans to extend and continue existing Internet controls.

            As reported by Tasnim News, a hardline news agency affiliated with the Revolutionary Guards, Iranian ICT Minister Mahmoud Vaezi made the announcement at a press conference during the National Conference on Public Service. Vaezi cited the dangers “unofficial news channels” pose in Iran’s rural and less developed regions, where fake news and misinformation have gained sizeable audiences.

          • Tunisian-American Comic Pokes Fun at the Censorship of Corrupt State-Sponsored News During the Arab Spring

            In February 2011, Arab Spring protests spread from Tunisia and Egypt to Zitounia, a fictional island-nation in the Mediterranean. At least that’s the plot line for “Good Morning, Zitounia!” a new off-Broadway play from comic and activist Leila Ben-Abdallah.

            Ben-Abdallah takes the audience back to a time when protests raged and reporters maintained their propaganda directed by the corrupt government. Despite extreme restrictions, state-owned media did their best to cover the news; a phenomenon some American journalists seem to be emulating in an all-Trump era.

            “This show is for anyone who doesn’t want to read the news because it is too sad, or wants to learn more about the Middle East and North Africa, but is afraid it is too dense or boring,” Ben-Abdallah explained.

          • The Attack on “Fake News” Is An Outright Campaign for Censorship of the Truth

            The buzzword “fake news” has popped into the popular lexicon in recent weeks.

            We’ve been using that term for years, though, when referring to the mainstream media.

            While poll numbers show that about 9 out of 10 people don’t trust the information they get from the mainstream media, they likely still have no idea just how fake it all is.

            As someone who travels the world, I often walk by a television program and it’s called program for a reason, with the local media and can’t even believe what I am seeing or hearing.

          • Application of problematic CJEU ruling on copyright infringement by hyperlinks is getting out of hand

            That’s just unbelievable. I have read this sentence over and over again, and I don’t think I’ve ever seen anything like that in a U.S. ruling, let alone by higher courts. It happens in all jurisdictions that concepts get conflated or confused, but the words “conflation” and “confusion” are by far not strong enough to describe this.

            It’s highly illogical that unrelated factors such as a profit motive and knowledge of an infringement cold have any bearing on the term “communication to the public.” You either communicate (including that you make available) something to the public or you don’t, but that is unrelated to whether you do it for profit, for fun, or pro bono, just like it has nothing to do with whether you do it on a Tuesday or a Wednesday. Also, a “communication to the public” (including a “making available”) is a communication to the public regardless of whether it’s legal or illegal. That is a subsequent question then.

          • Information Warfare: Chinese Software Supports Subtle Censorship
          • Jihad crackdown slippery slope of censorship
          • Another View: Introducing censorship on social media can be a slippery slope
          • Slippery slope of censorship
        • Privacy/Surveillance

        • Civil Rights/Policing

          • Geert Wilders guilty of incitement

            Dutch far-right politician Geert Wilders was on Friday found guilty of incitement and encouraging discrimination, but was not given a penalty.

            A judge said that freedom of expression is fundamental to a democracy, but said there were limits to how far people could go.

            The case against Wilders dates back to 2014 when, during a rally of his Freedom Party (PVV), he asked supporters if they wanted more or fewer Moroccans in the Netherlands. The crowd responded by chanting “Fewer! Fewer! Fewer!”

            Wilders answered them by saying, “We’ll take care of that.”

            Prosecutors asked for a €5,000 fine to be the penalty for Wilders and argued that he deliberately tried to distinguish Dutch citizens of Moroccan origin from others, calling his comments “unnecessarily offensive.”

        • Intellectual Monopolies

          • In Search of Evidence: The IP Statistics For Decision Makers Conference (IPSDM) 2016

            The already existing problem of cross-licensing agreements and also the problem of “cluttering” of patent or trade mark registers, particularly in the information technology and life sciences industries.

          • Trademarks

            • Will Iceland’s EU trade mark end up on ice?

              As the Northern European weather turns to a cold chill, a trade mark dispute is just starting to heat up…

              Iceland is known for its chilly temperatures and occasional financial difficulties. It is also the name of a Nordic country.

              You might think that a supermarket which primarily sells frozen foods would not be readily confused with a country which is known (in no particular order) for Bjork, hot springs, Northern Lights* and the pirate party. But a recent war of words (the main word being “Iceland”) has erupted like a geyser and once again brought trade mark law to the mainstream media’s attention.

            • Indian Trade Marks Registry to widen its doors for recording “well known” marks

              The role of recordation of well-known marks varies across jurisdictions. Against that backdrop, the step about to be taken by the Trade Marks Registry in India in connection with recording well-known marks is especially noteworthy. Kat friend Ranjan Narula, of RNA Intellectual Property Attorneys, describes what can be expected to shortly take place.

          • Copyrights

            • It Begins: Congress Proposes First Stages Of Copyright Reform, And It’s Not Good

              The House Judiciary Committee has been “exploring” various copyright reform proposals for a few years now, asking for feedback, holding a “listening tour” and more. Through it all, it seemed pretty clear that the Judiciary Committee is (reasonably) fearful of getting SOPA’d again, and thus was trying to figure out some less controversial proposals it could push forward first to see how they worked. Two, in particular, have been brought up multiple times: moving the Copyright Office out of the Library of Congress… and creating a “small claims court” for copyright infringement. And it appears that’s what the Judiciary Committee is now moving forward on, even though both are pretty bad ideas.

            • Coming in 2017: Reforms to Copyright Law and the Copyright Office
            • CBS Sues Public Domain For Existing

              This is of course not the first time we’ve seen such an attempt to nibble (or chomp) away at the edges of the public domain. Other examples include the high-profile fight over Sherlock Holmes, and the recent loss over Wizard Of Oz promotional materials. But each is subtly different, and together they form a trifecta that snuffs out giant swathes of the public domain.

              In the case of Sherlock Holmes, we’ve got the rule that early works falling into the public domain can be freely used, but if you’re building on them or adapting them, you can’t incorporate character traits or story points from later works that are still under copyright. While this still raises a huge host of “perpetual copyright” concerns, at its core it seems… somewhat reasonable. The Wizard Of Oz situation is similar, stemming from the idea that just because some materials from the film have fallen into the public domain doesn’t mean everything else is fair game. But, it pushed the borders: the court didn’t simply say that building on the public domain material with other still-copyrighted material from the film becomes infringing, but that building on it with anything or changing it in any way makes it infringing.

        ]]> http://techrights.org/2016/12/10/asteroidos-in-headlines-again/feed/ 0 Links 3/12/2016: Mageia 5.1 Released, Mozilla Revenue at $421.3M http://techrights.org/2016/12/03/mageia-5-1-released/ http://techrights.org/2016/12/03/mageia-5-1-released/#comments Sat, 03 Dec 2016 16:14:12 +0000 http://techrights.org/?p=97186

        GNOME bluefish

        Contents

        GNU/Linux

        Free Software/Open Source

        • Google Rolls Out Continuous Fuzzing Service For Open Source Software

          Google has launched a new project for continuously testing open source software for security vulnerabilities.

          The company’s new OSS-Fuzz service is available in beta starting this week, but at least initially it will only be available for open source projects that have a very large user base or are critical to global IT infrastructure.

        • Web Browsers

          • Mozilla

            • Mozilla Reports 2015 Revenue of $421.3M

              For its fiscal 2015 year, Mozilla reported revenue of $421.3 million, up from $329.6 million that it reported Mozilla’s revenue’s have grown significantly over the last decade. The first year that Mozilla ever publicly disclosed its financial status was for its 2005 fiscal year, when the open-source organization generated $52.9 million in revenue.

            • Mozilla is doing well financially (2015)

              Mozilla announced a major change in November 2014 in regards to the company’s main revenue stream.

              The organization had a contract with Google in 2014 and before that had Google pay Mozilla money for being the default search engine in the Firefox web browser.

              This deal was Mozilla’s main source of revenue, about 329 million US Dollars in 2014. The change saw Mozilla broker deals with search providers instead for certain regions of the world.

        • Healthcare

          • Open source wearable Angel shuts down

            “Well, looks like the Angel Sensor folks have (finally) officially thrown in the towel,” he wrote. “Not really a surprise, as they had gone silent for nearly a year after delivering their crowdfunded product over two years late. They did release code for their open-source SDK, and there is a community of developers who have forked it on GitHub3 to continue development. Too bad they gave up, as the promise of a truly open source wearable with an array of useful sensors is lacking in the QS space.”

        • FSF/FSFE/GNU/SFLC

          • The Three Software Freedoms

            The government can help us by making software companies distribute the source code. They can say it’s “in the interest of national security”. And they can sort out the patent system (there are various problems with how the patent system handles software which are out of the scope of this article). So when you chat to your MP please mention this.

          • Leapfrog Honoring the GPL
          • A discussion on GPL compliance

            Among its many activities, the Software Freedom Conservancy (SFC) is one of the few organizations that does any work on enforcing the GPL when other compliance efforts have failed. A suggestion by SFC executive director Karen Sandler to have a Q&A session about compliance and enforcement at this year’s Kernel Summit led to a prolonged discussion, but not to such a session being added to the agenda. However, the co-located Linux Plumbers Conference set up a “birds of a feather” (BoF) session so that interested developers could hear more about the SFC’s efforts, get their questions answered, and provide feedback. Sandler and SFC director of strategic initiatives Brett Smith hosted the discussion, which was quite well-attended—roughly 70 people were there at a 6pm BoF on November 3.

          • Join us as a member to give back for the free software you use

            At the FSF, we run our own infrastructure using only free software, which makes us stand out from nearly every other nonprofit organization. Virtually all others rely on outside providers and use a significant amount of nonfree software. With your support, we set an example proving that a nonprofit can follow best practices while running only free software.

          • The Free Software Foundation is in need of members
        • Openness/Sharing/Collaboration

          • Open Hardware/Modding

            • HiFive1 Is an Open-Source, Arduino-Compatible RISC-V Dev Kit

              Bay Area startup SiFive has announced the Freedom Everywhere 310 (FE310) system-on-chip — the industry’s first commercially-available SoC based on the free, open-source RISC-V architecture, along with the corresponding low-cost, Arduino-compatible HiFive1 development kit.

            • Samsung Defection From ARM to RISC-V.

              It was always thought that, when ARM relinquished its independence, its customers would look around for other alternatives.

              The nice thing about RISC-V is that it’s independent, open source and royalty-free.

              And RISC-V is what Samsung is reported to be using for an IoT CPU in preference to ARM.

            • Neutralize ME firmware on SandyBridge and IvyBridge platforms

              First introduced in Intel’s 965 Express Chipset Family, the Intel Management Engine (ME) is a separate computing environment physically located in the (G)MCH chip (for Core 2 family CPUs which is separate from the northbridge), or PCH chip replacing ICH(for Core i3/i5/i7 which is integrated with northbridge).

        Leftovers

        • Science

          • Opinion: An Ethical Code for Conferences

            This fundamental form of scientific communication is threatened by modern recording technology and researchers who refuse to adhere to an age-old ethical code.

        • Health/Nutrition

          • Non-Corporate Entities Join Forces Against Adoption Of Plant Breeders’ Rights Regulations In Africa

            The United Nations Special Rapporteur on the Right to Food, civil society, and farmers’ representatives have raised serious concerns on the upcoming adoption of draft regulations of a protocol protecting breeders’ rights in Africa. Civil society groups and farmers’ representatives have been blocked from participating in the meeting expected to adopt the regulations, according to them. The Special Rapporteur is calling for a halt to the process, and for starting again with a more transparent, inclusive, and evidence-based process.

        • Security

          • Security updates for Friday
          • Understanding SELinux Roles

            I received a container bugzilla today for someone who was attempting to assign a container process to the object_r role. Hopefully this blog will help explain how roles work with SELinux.

            When we describe SELinux we often concentrate on Type Enforcement, which is the most important and most used feature of SELinux. This is what describe in the SELinux Coloring book as Dogs and Cats. We also describe MLS/MCS Separation in the coloring book.

          • The Internet Society is unhappy about security – pretty much all of it

            The Internet Society (ISOC) is the latest organisation saying, in essence, “security is rubbish – fix it”.

            Years of big data breaches are having their impact, it seems: in its report released last week, it quotes a 54-country, 24,000-respondent survey reporting a long-term end user trend to become more fearful in using the Internet (by Ipsos on behalf of the Centre for International Governance Innovation).

            Report author, economist and ISOC fellow Michael Kende, reckons companies aren’t doing enough to control breaches.

            “According to the Online Trust Alliance, 93 per cent of breaches are preventable” he said, but “steps to mitigate the cost of breaches that do occur are not taken – attackers cannot steal data that is not stored, and cannot use data that is encrypted.”

          • UK’s new Snoopers’ Charter just passed an encryption backdoor law by the backdoor

            Among the many unpleasant things in the Investigatory Powers Act that was officially signed into law this week, one that has not gained as much attention is the apparent ability for the UK government to undermine encryption and demand surveillance backdoors.

            As the bill was passing through Parliament, several organizations noted their alarm at section 217 which obliged ISPs, telcos and other communications providers to let the government know in advance of any new products and services being deployed and allow the government to demand “technical” changes to software and systems.

          • EU budget creates bug bounty programme to improve cybersecurity

            Today the European Parliament approved the EU Budget for 2017. The budget sets aside 1.9 million euros in order to improve the EU’s IT infrastructure by extending the free software audit programme (FOSSA) that MEPs Max Anderson and Julia Reda initiated two years ago, and by including a bug bounty approach in the programme that was proposed by MEP Marietje Schaake.

          • Qubes OS Begins Commercialization and Community Funding Efforts

            Since the initial launch of Qubes OS back in April 2010, work on Qubes has been funded in several different ways. Originally a pet project, it was first supported by Invisible Things Lab (ITL) out of the money we earned on various R&D and consulting contracts. Later, we decided that we should try to commercialize it. Our idea, back then, was to commercialize Windows AppVM support. Unlike the rest of Qubes OS, which is licensed under GPLv2, we thought we would offer Windows AppVM support under a proprietary license. Even though we made a lot of progress on both the business and technical sides of this endeavor, it ultimately failed.

            Luckily, we got a helping hand from the Open Technology Fund (OTF), which has supported the project for the past two years. While not a large sum of money in itself, it did help us a lot, especially with all the work necessary to improve Qubes’ user interface, documentation, and outreach to new communities. Indeed, the (estimated) Qubes user base has grown significantly over that period. Thank you, OTF!

          • Linux Security Basics: What System Administrators Need to Know

            Every new Linux system administrator needs to learn a few core concepts before delving into the operating system and its applications. This short guide gives a summary of some of the essential security measures that every root user must know. All advice given follows the best security practices that are mandated by the community and the industry.

          • BitUnmap: Attacking Android Ashmem

            The law of leaky abstractions states that “all non-trivial abstractions, to some degree, are leaky”. In this blog post we’ll explore the ashmem shared memory interface provided by Android and see how false assumptions about its internal operation can result in security vulnerabilities affecting core system code.

        • Defence/Aggression

          • Hackers destroy computers at Saudi aviation agency

            Hackers destroyed computers at six important Saudi organizations two weeks ago, marking a reappearance of the most damaging cyberweapon the world has ever seen.

            Last time, it was used to destroy 35,000 computers at the oil company Saudi Aramco. U.S. intelligence quietly blamed Iran for that attack.

            This time around, the cyberweapon has attacked at least one Saudi government agency, as well as organizations in the energy, manufacturing and transportation sectors, according to two researchers with direct knowledge of the investigations into the attack.

          • Teacher at Tower Hamlets school ‘condoned Charlie Hebdo terror attack in front of pupils’

            A teacher faces a classroom ban after he allegedly “condoned” the Charlie Hebdo terror attack in front of pupils at a Tower Hamlets school.

            Hamza Jalal Tariq, 28, effectively said during a lesson that the victims murdered by Islamist gunmen “should be killed for insulting the prophet”, a professional conduct panel ruled.

            The panel heard Tariq made the comment in response to a student just days after 12 people were murdered in the French satirical newspaper’s Paris office in January last year.

            Tariq was a teacher at Tower Hamlets PRU, which has four sites across the east London borough, since 2013, but resigned after the accusations surfaced.

          • Don’t Say I’m Violent, Or I’ll Kill You

            Yesterday, I wrote about the thwarted mass murder at Ohio State University. To the Best Vice-President We Never Had, Tim Kaine, it was “a senseless act of gun violence”. To those under attack, it was in fact an act of automobile violence and machete violence. And to the perpetrator, it was not “senseless” but made perfect sense.

          • Donald Trump and the Taiwanese President Just Had an Unprecedented Phone Call

            Donald Trump has spoken with the president of Taiwan, a self-governing island the U.S. broke diplomatic ties with in 1979.

            It is highly unusual, perhaps unprecedented, for a U.S. president or president-elect to speak directly with a Taiwanese leader. The U.S. cut formal diplomatic ties with Taiwan when it shifted diplomatic recognition of China to the communist government on the mainland, although Washington still has close unofficial ties with Taipei.

        • Environment/Energy/Wildlife/Nature

          • A Catastrophic Amount of Carbon Could Leak From the Soil By 2050

            The term “snowball effect” is an unfortunate way to describe climate change, but a new study is predicting just that.

            Climate scientists warn that by 2050, an astonishing 55 trillion kilograms of carbon could be released into the atmosphere from the soil. To put things in perspective, that’s the emissions equivalent of adding another United States to the planet. And, like a rapidly tumbling snowball, more emissions mean more warming, and more warming means… well, you get it.

            Of course, this nightmare scenario hinges on our inability to curb carbon emissions—a fate that’s become significantly more realistic with Donald Trump, a vocal climate change denier and coal aficionado, about to enter the White House. Our failure to meet the goals mandated by the Paris Agreement would result in “about 17 percent more than the projected emissions due to human-related activities during that period,” Tom Crowther, the study’s lead author and a researcher at the Netherlands Institute of Ecology, said in a statement.

          • Climate change will stir ‘unimaginable’ refugee crisis, says military

            Climate change is set to cause a refugee crisis of “unimaginable scale”, according to senior military figures, who warn that global warming is the greatest security threat of the 21st century and that mass migration will become the “new normal”.

            The generals said the impacts of climate change were already factors in the conflicts driving a current crisis of migration into Europe, having been linked to the Arab Spring, the war in Syria and the Boko Haram terrorist insurgency.

        • Finance

          • Corporate Welfare Will Bring Back Jobs vs. Jobs Will Never Come Back

            The story went on to say that Trump and Vice President–elect Mike Pence had promised Carrier they would be “friendlier to businesses by easing regulations and overhauling the corporate tax code.” Probably more to the point from Carrier’s point of view, Schwartz noted that the state of Indiana, where Pence is still governor, “also plans to give economic incentives to Carrier as part of the deal to stay.”

            So Trump’s job program involves cutting business taxes and regulations, plus a corporate-welfare package whose cost will presumably be declared after media attention wanders. This makes Trump “a different kind of Republican” how, exactly?

        • AstroTurf/Lobbying/Politics

          • Yer Fake News Garbage: Trevor Noah Knows Nothing About the Secret Service

            About 1:30 into the video above, Daily Show host Trevor Noah, as echoed by the Huffington Post, committed fake news.

            Well, to be fair, it was more like ignorance than fake, because Noah’s shock and accusations that Trump is going to charge the Secret Service $1.5 million in rent to help protect him at Trump Tower was only a couple of Googles away from being shown to be wrong.

            To begin, Noah appears somewhat surprised that a president-elect is protected, and that protection costs a lot of money. Noah seems somewhat offended that that protection will take place at Trump Tower.

            Surprise! Any president-elect has to live somewhere. It makes sense he’d stay living where he always does. There is no junior White House. Also, presidents do not give up their homes when they move into the White House. All have kept their own homes and the Secret Service has always protected them there. Reagan and Bush had their ranches, remember. Nothing new here.

          • I Don’t Like Trump or Racism
          • Why Are Media Outlets Still Citing Discredited ‘Fake News’ Blacklist?

            The Washington Post (11/24/16) last week published a front-page blockbuster that quickly went viral: Russia-promoted “fake news” had infiltrated the newsfeeds of 213 million Americans during the election, muddying the waters in a disinformation scheme to benefit Donald Trump. Craig Timberg’s story was based on a “report” from an anonymous group (or simply a person, it’s unclear) calling itself PropOrNot that blacklisted over 200 websites as agents or assets of the Russian state.

            The obvious implication was that an elaborate Russian psyop had fooled the public into voting for Trump based on a torrent of misleading and false information posing as news. Everyone from Bloomberg’s Sahil Kupar to CNN’s to Robert Reich to Anne Navarro to MSNBC’s Joy Ann Reid tweeted out the story in breathless tones. Center for American Progress and Clinton advocate Neera Tanden even did her best Ron Paul YouTube commenter impression, exclaiming, “Wake up people.”

            But the story didn’t stand up to the most basic scrutiny. Follow-up reporting cast major doubt on the Washington Post’s core claims and underlying logic, the two primary complaints being 1) the “research group” responsible for the meat of the story, PropOrNot, is an anonymous group of partisans (if more than one person is involved) who tweet like high schoolers, and 2) the list of supposed Russian media assets, because its criteria for Russian “fake news” encompasses “useful idiots,” includes entirely well-within-the-mainstream progressive and libertarian websites such as Truth-Out, Consortium News, TruthDig and Antiwar.com (several of whom are now considering lawsuits against PropOrNot for libel).

          • If We Care About the Constitution, Trump Has to Sell His Empire

            Donald Trump is about to become president and immediately begin violating the Constitution. The Constitution explicitly prohibits the president from taking payments and gifts from foreign governments. (Can we stop using the term “emolument“? No one has used it for a hundred years. We want to be clear on what the Constitution means.)

            Donald Trump is right now and will continue to be taking payments and gifts from foreign governments in the form of benefits to his properties, unless he dumps the stuff. This is about as clear a violation of the constitutional provision imaginable, so why on Earth do we have Andrew Ross Sorkin (New York Times, 11/28/16) approvingly accepting Donald Trump’s nonsense claim in his letter to Mr. Trump?

          • Hillary Clinton’s “Corrupt Establishment” Is Now Advising Donald Trump

            “The establishment,” Donald Trump famously said during his closing argument for the presidency, “has trillions of dollars at stake in this election.”

            He described “a global power structure that is responsible for the economic decisions that have robbed our working class, stripped our country of its wealth and put that money into the pockets of a handful of large corporations and political entities.”

            He asked the country to be “brave enough to vote out this corrupt establishment.”

            Now, less than four weeks after riding that line to victory, he formally invited the establishment into his administration.

            On Friday, Trump announced the creation of a “Strategic and Policy Forum” that will serve to advise him on domestic economic matters. The list of advisers is a who’s-who of corporate elites.

        • Censorship/Free Speech

          • Commission responds to Ombudsman investigation on EU Internet Forum

            In April 2016, the European Ombudsman launched an investigation into the European Commission’s failure to disclose information of the “EU Internet Forum”. The EU Internet Forum brings together US internet companies (Microsoft, Facebook, Twitter, Google), government officials, and law enforcement agencies to discuss how to reduce the accessibility of undefined “terrorist material” (as defined by 28 different national laws that are not even properly implemented in some countries) and badly defined “hate speech” online.

          • Perils of Censorship in the Digital Age

            The ripple effects of the Donald Trump election victory in America continue to wash over many different shorelines of public opinion, like so many mini-tsunamis hitting the Pacific rim over the last few last weeks. The seismic changes have indeed been global, and not least in Europe.

            First up, the Eurocrats have been getting in a bit of a flap about the future of NATO, as I recently wrote. In the past I have also written about the perceived “insider threat” – in other words, whistleblowers – that has been worrying governments and intelligence agencies across the Western world.

            Currently the Twittersphere is lighting up around the issue of “fake news“, with Western mainstream media (news purveyors of the utmost unsullied probity, naturally) blaming Trump’s unexpected victory variously on the US alt-media shock jocks, fake news trolls and bots, and sovereign-state media outlets such as the Russian RT and Sputnik.

            In the wake of US Democrat claims that Russia was interfering in the election process (not a practice that the USA has ever engaged in in any other country around the world whatsoever), we now have the US Green Party presidential candidate apparently spontaneously calling for recounts in three key swing-states in the USA.

          • Self-Censorship: Free Society vs. Fear Society

            In the summer of 2005, the Danish artist Kåre Bluitgen, when he met a journalist from the Ritzaus Bureau news agency, said he was unable to find anyone willing to illustrate his book on Mohammed, the prophet of Islam. Three illustrators he contacted, Bluitgen said, were too scared. A few months later, Bluitgen reported that he had found someone willing to illustrate his book, but only on the condition of anonymity.

            Like most Danish newspapers, Jyllands-Posten decided to publish an article about Bluitgen’s case. To test the state of freedom of expression, Flemming Rose, Jyllands-Posten’s cultural editor at the time, called twelve cartoonists, and offered them $160 each to draw a caricature of Mohammed. What then happened is a well-known, chilling story.

          • Three ways Facebook could reduce fake news without resorting to censorship

            The public gets a lot of its news and information from Facebook. Some of it is fake. That presents a problem for the site’s users, and for the company itself.

            Facebook cofounder and chairman Mark Zuckerberg said the company will find ways to address the problem, though he didn’t acknowledge its severity. And without apparent irony, he made this announcement in a Facebook post surrounded – at least for some viewers – by fake news items.

          • Cameroonian Government Calls Social Media A ‘New Form Of Terrorism’

            But it didn’t stop there. As the Global Voices post notes, when government officials finally admitted that there had been an accident, social media continued to challenge the government version, which tried to play down the number of dead, and to lay the blame on allegedly-defective Chinese-made carriages.

          • China is censoring people’s chats without them even knowing about it

            China’s WeChat originated as a WhatsApp clone, but later evolved into the single-most important tool for connecting people in China. Yet it’s never been clear exactly how China’s internet censors have attempted to control information that spreads in the app. That’s partly because you likely wouldn’t know if you got censored in the first place.

          • Lawyer sues 20-year-old student who gave a bad Yelp review, loses badly

            When 20-year-old Lan Cai was in a car crash this summer, it was a bad situation. Driving home at 1:30am from a waitressing shift, Cai was plowed into by a drunk driver and broke two bones in her lower back. Unsure about how to navigate her car insurance and prove damages, she reached out for legal help.

            The help she got, Cai said, was less than satisfactory. Lawyers from the Tuan A. Khuu law firm ignored her contacts, and at one point they came into her bedroom while Cai was sleeping in her underwear. “Seriously, it’s super unprofessional!” she wrote on Facebook. (The firm maintains it was invited in by Cai’s mother.) She also took to Yelp to warn others about her bad experience.

            The posts led to a threatening e-mail from Tuan Khuu attorney Keith Nguyen. “If you do not remove the post from Facebook and any other social media sites, my office will have no choice but to file suit,” he told her, according to a report in the Houston Press on the saga.

          • China’s WeChat is censoring group chats without users’ knowledge
          • WeChat censorship offers a blueprint for Facebook but here’s why it should not enter China
          • Study: Chinese App WeChat Censors Chinese Users More
          • China’s WeChat is censoring group chats without users’ knowledge
        • Privacy/Surveillance

        • Civil Rights/Policing

          • Trump national security pick once wrote Chelsea Manning should be tried for treason, executed if guilty

            KT McFarland, Donald Trump’s pick to be his deputy national security adviser, once wrote that former Army intelligence analyst Chelsea Manning should be tried for treason and executed if found guilty.

            Manning was convicted and sentenced to 35 years in prison for handing over a trove of classified documents to Wikileaks. McFarland, a national security analyst and host of an online Fox News show for years, made the comments in a weekly column on the Fox News’ website.

          • NYT Protects Its Pundit Who Dismissed Trans Rights as ‘Boutique Issue’

            If Boylan didn’t catch the name of the commentator she saw, it was not hard to find; if I put “boutique issues November 9 MSNBC” into Google, the first thing that comes up is a piece on Breitbart (11/9/16) approvingly recounting the conversation.

            It seems more likely that the omission of Bruni’s name—a familiar one, of course, to regular readers of the Times op-ed page—was a deliberate choice. Note that Maher got different treatment—which seems to suggest a different standard for commentators who work for HBO vs. those who write for the New York Times.

          • Twitter Only Tech Firm of Nine to Say No to Helping Build Muslim Registry

            Out of nine technology companies, from Facebook to Booz Allen Hamilton, only Twitter confirmed it would refuse to help the Trump administration build a “Muslim registry,” The Intercept reported on Friday.

            The outlet contacted—or attempted to contact—the companies over the course of two weeks, asking if they would contract out their services to help create the hypothetical database, which President-elect Donald Trump’s national security adviser Kris Kobach has said would track immigrants entering the U.S from Muslim nations.

          • ACLU Suggests Jury Instructions Might Be A Fix For ‘Missing’ Police Body Camera Recordings

            We’ve written plenty of posts about police body cameras — how useful they can be and how useless they often are. What should result in additional law enforcement accountability has been turned into a mostly-optional documentation system. The new tech and its accompanying guidelines have done very little to increase accountability.

            Body cameras are pretty much mainstream at this point, but when excessive force and/or misconduct are alleged, footage captured by police is often nonexistent. Officers disable recording equipment, delete footage, or simply claim the camera “malfunctioned.” Some repeatedly “forget” to activate their cameras ahead of controversial arrests and interactions.

            But what can be done about it? So far, law enforcement agencies have done little but promise to create more policies and guidelines — ones that can continue to be ignored by officers who’d rather not create a permanent record of their actions. There’s been some discipline, but what little of it there is hasn’t been very severe. And stories of repeated tampering with recording devices in some agencies suggests what is in place isn’t much of a deterrent.

          • FBI Gains New Hacking Powers While GOP Congress Sits on Sidelines

            The FBI is now allowed to hack into computers anywhere in the world using only a single warrant, according to a new rule that was quietly implemented on Thursday.

            Prior to the new policy taking effect, federal computer investigators could only hack into a computer within the same district where they obtained a warrant from a judge. “Rule 41,” as it is known, changes those procedures, allowing feds to search potentially any computer, regardless of where the warrant was issued.

            Devices that investigators believe are part of a botnet or that are masking their location would be vulnerable to the new single-warrant intrusions.

            Authorities say the change is necessary for them to effectively investigate cyber-crimes, particularly ones involving botnets–devices that leverage multiple computers to carry out an attack. A side-effect of the rule, however, could lead to the hacking of innocent individuals whose computers were infected by malware making them unknowingly a part the attack.

          • Jakarta protests: Muslims turn out in force against Christian governor Ahok

            A crowd of at least 200,000 Muslim protesters has descended on Jakarta to demand the Christian governor of the Indonesian capital be arrested for insulting Islam.

            There was heavy security at the rally on Friday with authorities wary of the kind of violence that marred a similar demonstration in November.

            People headed towards a huge park in downtown Jakarta to protest against Basuki Tjahaja Purnama, known by his nickname Ahok, who has become the target of widespread anger in the world’s most populous Muslim-majority country.

          • Saudi Woman Without Hijab Attacked: Execution Called For By Conservative Muslim Twitter Users

            A number of Saudi social media users reacted with anger when a woman posted Monday a picture showing her in Riyadh without the traditional body covering known as the abaya and headscarf known as the hijab.

            A 21-year-old student from the city of Dammam who called herself Sara Ahmed for fear that her real name could put her in danger shared the tweet of a woman named Malak Al Shehri photographed wearing a dark blue coat, bright multicolored skirt and boots. Next to the picture, she included screenshots of three tweets by accounts calling for justice and even violence against Shehri. All three tweets included an Arabic hashtag that translates to “We demand the imprisonment of the rebel Angel Al Shehri.” The name Malak translates to “Angel” in Arabic.

            “Kill her and throw her corpse to the dogs,” @ab_alshdadi wrote, while @ilQil tweeted “we want blood.” Many others insulted Shehri’s morals.

          • When a Saudi woman daring not to wear a hijab leads to calls for her beheading, maybe it’s time the UK paid attention

            Today it was reported that a Saudi women who posted a picture of herself on social media in public without wearing a hijab faced outrage on social media, including calls for her execution. One man memorably declared: “Kill her and throw her corpse to the dogs.”

            To the surprise of the some, Saudi Arabia – which has been bombing Yemen for 18 months, including one incident where the country’s fighters bombed a funeral, and which has arguably the worst record on women’s rights in the world – was recently re-elected to the Human Rights Council, the United Nations’ premier human rights body. There was, predictably, an outcry.

            Governing women’s clothing, whether on the beaches of Cannes or the streets of Riyadh, is a violation we should all stand against. And clearly people in the Islamic world believe this as ardently as atheists in the West. This year, men in Iran wore headscarves in solidarity with their wives who are forced cover their hair in public places. The campaign against the enforced hijab in Iran has seen women defying morality police in public and even shaving their hair. If men in Saudi Arabia campaigned in similar numbers and joined the fight, perhaps we’d see a change in the Middle East’s political landscape.

          • Jury deadlocked in trial of cop filmed killing fleeing suspect

            Defense attorneys for Michael Slager, a 35-year-old North Charleston officer, called for a mistrial in the murder case, while the judge has ordered the 12-member panel to continue deliberating. All the while, a single juror wrote a note to the presiding judge that he or she could not, “in good conscience, approve a guilty verdict.”

            “You have a duty to make every reasonable effort to reach a unanimous verdict,” Judge Clifton Newman told panelists, who began hearing the case a month ago. The jury began deliberating Wednesday.

            North Charleston police had officially defended Officer Slager until the footage surfaced. At the moment, the video doesn’t appear to be swaying all 12 jurors that the officer is guilty of murder or voluntary manslaughter.

        • Internet Policy/Net Neutrality

          • FCC doesn’t like AT&T, Verizon ‘zero rating’ their own video apps

            Specifically, the regulators said “zero rating” can hurt competition and consumers. In the letter obtained by the Associated Press, regulators make the case that other services could pay Verizon and AT&T to not eat into customers’ cell data. This could be bad for competing video services who aren’t in favor with the carriers, the FCC argues.

            AT&T launched DirecTV Now earlier this week. AT&T Mobility customers can stream video data over LTE without impacting their data allowance. Verizon offers something similar with its go90 service.

        • Intellectual Monopolies

          • Trademarks

            • Who Gets To Trademark Iceland?

              When you cover enough trademark disputes, you come to expect a fairly typical pattern to them. Entity X bullies entity Y over a vaguely similar use of a mark that often times is overly broad or generic, and then there is either a capitulation to the bullying, a settlement, or the rare instance of a trial that results in an actual ruling. The outcomes aren’t typically favorable for those of us that think trademark law has been pushed beyond its original intent, but the pattern persists.

              But every once in a while, you find a zebra amidst the thundering hooves of horses. Such is the case with a very strange dispute currently going on between Iceland Foods, a foodstuffs retailer, and Iceland, the island nation between Greenland and the rest of Europe. Due to the retailer’s aggressive protection of its trademark, which consists of a generic term preceeded by the name of a country, Iceland has petitioned to revoke the trademark Iceland Foods has on its name for all of Europe.

          • Copyrights

            • Court Overturns ‘Pirate’ Site Blockade Based on EU Ruling

              A site that was outlawed following mass court action against more than 150 domains has been cleared on appeal. Kisstube embeds movies, some of them infringing, hosted on other platforms such as YouTube. However, the Rome Court of Appeal found that according to an EU ruling, merely embedding pirated content is not illegal.

              Early November, police in Italy targeted more than 150 sites involved in the unauthorized streaming of movies and sports.

              The Special Units of the Guardia di Finanza obtained a mass injunction from a judge in Rome, heralding the largest ever blocking operation in the country.

            • The proposed new VAT rules on e-publications: do they have any implications for copyright and digital exhaustion?

              Yesterday – as part of its Digital Single Market Strategy – the EU Commission unveiled proposals for new tax rules with the objective of supporting e-commerce and online businesses in the EU.

              Among the measures proposed, there is one that may be of interest also from a copyright perspective.

        ]]>
        http://techrights.org/2016/12/03/mageia-5-1-released/feed/ 0
        Links 2/12/2016: Mint Betas, Chrome 55, KDevelop 5.0.3, PHP 7.1.0 http://techrights.org/2016/12/02/kdevelop-5-0-3/ http://techrights.org/2016/12/02/kdevelop-5-0-3/#comments Sat, 03 Dec 2016 02:55:06 +0000 http://techrights.org/?p=97160

        GNOME bluefish

        Contents

        GNU/Linux

        Free Software/Open Source

        Leftovers

        • Oracle kicks £1.1bn into European computer sciences and digital skills [Ed: Oracle cares not about education and research; look what it did to researchers who reverse-engineered stuff.]

          ORACLE IS PROVIDING $1.4bn (around £1.1bn) in direct, and what it calls ‘in-kind’ support for European computer sciences and skills.

          The cash is part of an $3.3bn kitty that applies worldwide and is designed to support digital literacy, something that we are often told is lacking.

        • Science

          • New standard helps optical trackers follow moving objects precisely

            Throwing a perfect strike in virtual bowling doesn’t require your gaming system to precisely track the position and orientation of your swinging arm. But if you’re operating a robotic forklift around a factory, manipulating a mechanical arm on an assembly line or guiding a remote-controlled laser scalpel inside a patient, the ability to pinpoint exactly where it is in three-dimensional (3-D) space is critical.

        • Security

          • Security Patches for Firefox and Tor Address Key Security Vulnerability
          • Mozilla Patches Zero-Day Flaw in Firefox

            Mozilla moves quickly to fix vulnerability that was being actively exploited in attacks against Tor Browser, which is based on Firefox.

            Late afternoon on November 30, Mozilla rushed out an emergency update for its open-source Firefox web browser, fixing a zero-day vulnerability that was being actively exploited by attackers. The vulnerability was used in attacks against the Tor web browser which is based on Firefox.

          • Thursday’s security advisories
          • ‘Fatal’ flaws found in medical implant software

            Security flaws found in 10 different types of medical implants could have “fatal” consequences, warn researchers.

            The flaws were found in the radio-based communications used to update implants, including pacemakers, and read data from them.

            By exploiting the flaws, the researchers were able to adjust settings and even switch off gadgets.

            The attacks were also able to steal confidential data about patients and their health history.

            A software patch has been created to help thwart any real-world attacks.

            The flaws were found by an international team of security researchers based at the University of Leuven in Belgium and the University of Birmingham.

          • Lenovo: If you value your server, block Microsoft’s November security update

            Lenovo server admins should disable Windows Update and apply a UEFI fix to avoid Microsoft’s November security patches freezing their systems.

            The world’s third-largest server-maker advised the step after revealing that 19 configurations of its x M5 and M6 rack, as well as its x6 systems are susceptible.

          • Symantec and VMware patches, Linux encryption bug: Security news IT leaders need to know
          • UK homes lose internet access after cyber-attack

            More than 100,000 people in the UK have had their internet access cut after a string of service providers were hit by what is believed to be a coordinated cyber-attack, taking the number affected in Europe up to about a million.

            TalkTalk, one of Britain’s biggest service providers, the Post Office and the Hull-based KCom were all affected by the malware known as the Mirai worm, which is spread via compromised computers.

            The Post Office said 100,000 customers had experienced problems since the attack began on Sunday and KCom put its figure at about 10,000 customers since Saturday. TalkTalk confirmed that it had also been affected but declined to give a precise number of customers involved.

          • New Mirai Worm Knocks 900K Germans Offline

            More than 900,000 customers of German ISP Deutsche Telekom (DT) were knocked offline this week after their Internet routers got infected by a new variant of a computer worm known as Mirai. The malware wriggled inside the routers via a newly discovered vulnerability in a feature that allows ISPs to remotely upgrade the firmware on the devices. But the new Mirai malware turns that feature off once it infests a device, complicating DT’s cleanup and restoration efforts.

        • Defence/Aggression

          • The New Red Scare

            “Welcome to the world of strategic analysis,” Ivan Selin used to tell his team during the Sixties, “where we program weapons that don’t work to meet threats that don’t exist.” Selin, who would spend the following decades as a powerful behind-the-scenes player in the Washington mandarinate, was then the director of the Strategic Forces Division in the Pentagon’s Office of Systems Analysis. “I was a twenty-eight-year-old wiseass when I started saying that,” he told me, reminiscing about those days. “I thought the issues we were dealing with were so serious, they could use a little levity.”

        • Environment/Energy/Wildlife/Nature

          • Signs Of A Creepy Government Conspiracy At Standing Rock

            That vague title leaves a lot open to interpretation. And if the internet has taught us anything, it’s that interpretation is not the average person’s strong suit … or even their medium suit, for that matter. “Clash” suggests an equal meeting of force, and that’s really not the case when one side has military hardware and the backing of a multi-billion-dollar corporation, and the other side … well … doesn’t. Reading that headline makes the story sound identical to every other protest of the last 20 years. But thanks to sites like Twitter, “water protectors” with drones can put video of how that “clash” really looked in front of thousands of eyes…

          • Indonesia: Human rights abuses on palm oil plantations

            The world’s most popular food and household companies are selling food, cosmetics and other everyday staples containing palm oil tainted by shocking human rights abuses in Indonesia, with children as young as eight working in hazardous conditions, said Amnesty International in a new report published today.

          • Indonesia’s Forest-Fire Problem Is Nowhere Close to Being Solved. Here’s Why

            Choking haze caused by Indonesia’s annual slash-and-burn forest fires affects millions of people. Wetter weather provided some relief in 2016, but tackling the fires properly will require monumental change

          • Climate change escalating so fast it is ‘beyond point of no return’

            Global warming is beyond the “point of no return”, according to the lead scientist behind a ground-breaking climate change study.

            The full impact of climate change has been underestimated because scientists haven’t taken into account a major source of carbon in the environment.

            Dr Thomas Crowther’s report has concluded that carbon emitted from soil was speeding up global warming.

            The findings, which say temperatures will increase by 1C by 2050, are already being adopted by the United Nations.

        • Finance

          • Panama Papers: Europol links 3,500 names to suspected criminals

            Almost 3,500 individuals and companies in the Panama Papers are probable matches for suspected criminals including terrorists, cybercriminals and cigarette smugglers, according to a document seen by the Guardian.

            The analysis, which was carried out by Europol, the EU’s law enforcement agency, sheds more light on the breadth of criminal behaviour facilitated by tax havens around the world.

            “The main point here is that we can link companies from the Panama Papers leaks not only with economic crimes, like money laundering or VAT carousels, but also with terrorism and Russian organised crime groups,” Simon Riondet, head of financial intelligence at Europol, told a committee of MEPs.

          • EU, RI look to negotiate CEPA points

            Indonesia will seek a win-win outcome for the Comprehensive Economic Partnership Agreement (CEPA) with the European Union, having exchanged views on a number of crucial sticking points ahead of the next round of negotiations in January.

            The EU and Indonesia began earnest talks on the free trade pact in September following the signing of scoping papers earlier in April.

            Issues discussed in the negotiations include market access for trade in goods and services, customs and trade facilitation, sustainable development and dispute settlement.

          • Meltdown at the European Parliament

            The carefully calibrated “grand coalition” of Europe’s dominant political parties, which EU leaders have relied on to sustain their agenda and to manage a series of crises since 2014, this week imploded amid the collapse of a power-sharing deal in the European Parliament and the start of a bruising fight over the Parliament presidency.

            The rupture cast a shadow of uncertainty over Brussels, raising the prospect of weeks of distraction and legislative paralysis, and leaving European Commission President Jean-Claude Juncker and European Council President Donald Tusk with little choice but to watch in dismay from the sidelines and brace for further turbulence.

          • Guggenheim Helsinki museum plans rejected by city councillors

            Venice and Bilbao will remain the only Guggenheim museums in Europe for the foreseeable future after Helsinki finally buried a controversial plan for a striking new shrine to modern and contemporary art on the city’s waterfront.

            After a stormy five-hour meeting lasting into the early hours of Thursday morning, city councillors voted by 53 to 32 to kill off the project, which had been fiercely contested in Finland since it was floated in 2011.

            Helsinki’s deputy mayor, Ritva Viljanen, who had supported the plans for a €150m (£126m) museum on a prime dockside site currently in use as a car park, said the project’s proponents would have to accept the decision.

            “Democracy has spoken, and in no uncertain manner; there can be no ifs or buts,” Viljanen told YLE, the state broadcaster. She said she was sorry feelings about the project had run so high, with some backers receiving threats of violence.

          • Revelations on tax avoidance of football stars: serious foul play against common good

            Today, the Spanish newspaper “El Confidencial” reports on leaked documents revealing tax avoidance practices by football stars like Cristiano Ronaldo. Although residing in Madrid, Ronaldo has been invoicing most of his advertising revenues through an Irish company. With this manoeuvre, he has benefitted from a significantly lower tax rate on his earnings. While Spain taxes at 43.5%, Ireland only charges 12.5%. MEP Sven Giegold, financial and economic policy spokesperson of the Greens/EFA group, comments on the so-called “football leaks”…

        • AstroTurf/Lobbying/Politics

          • Why the recount matters: Jill Stein

            There is nothing more important to our American way of life than our democracy. The lifeblood of this nation is the principle that each citizen’s vote is equal when it comes to choosing our president.

            But in the age of computerized voting machines and unprecedented corporate influence in our elections, our electoral system is under increasing threat. How can every citizen’s voice be heard if we do not know if every citizen’s vote is counted correctly?

            To help ensure it is, I have asked for a recount of the 2016 presidential election in Wisconsin, Michigan and Pennsylvania. Our goal is not to change the result of the election. It is to ensure the integrity and accuracy of the vote. All Americans, regardless of party, deserve to know that this and every election is fair and that the vote is verified.

          • New evidence finds anomalies in Wisconsin vote, but no conclusive evidence of fraud

            Did the outcome of voting for president in Wisconsin accurately reflect the intentions of the electors? Concerns have been raised about errors in vote counts produced using electronic technology — were machines hacked? — and a recount may occur.

            Some reports involving statistical analysis of the results has been discussed in the media recently. These analyses, though, rely on data at the county level. Technology, demographics and other important characteristics of the electorate vary within counties, making it difficult to resolve conclusively whether voting technology (did voters cast paper or electronic ballots?) affected the final tabulation of the vote for president.

          • Chris Sacca: ‘Silicon Valley must stand up to Trump or risk destroying tech, America and the planet’

            Leading US venture investor Chris Sacca is calling on Silicon Valley to stand up and defend the technology industry from President-elect Donald Trump, or risk an unpleasant future where technology no longer provides solutions, but instead hurts people and spies on them, as well as potentially destroying the planet.

            “The hypocrisy is really risking what America stands for. I think the tech sector has to acknowledge that we’re making this problem worse. We can’t just be open source and say use [software, products and services] for whatever you want,” Sacca, an early seed investor in Twitter, Uber, Instragram, Twilio and Kickstarter told the audience at the Slush 2016 tech conference in Helsinki, Finland.

          • Teen becomes seventh ‘faithless elector’ to protest Trump as president-elect

            A teenager from Washington state has become the seventh person to indicate that she will break ranks with party affiliation and become a “faithless elector” in an attempt to prevent Donald Trump being formally enshrined as president-elect when the electoral college meets on 19 December.

            Levi Guerra, 19, from Vancouver, Washington, is set to announce that she is joining the ranks of the so-called “Hamilton electors” at a press conference at the state capitol in Olympia on Wednesday.

            The renegade group believes it is the responsibility of the 538 electors who make up the electoral college to show moral courage in preventing demagogues and other threats to the nation from gaining the keys to the White House, as the founding fathers intended.

          • Trump lawyers file objection to delay Michigan recount

            President-elect Donald Trump’s lawyers have filed an objection to the recount in Michigan, delaying and potentially blocking a review that was slated to begin Friday.

            Michigan Secretary of State Ruth Johnson (R) said that the state’s Bureau of Elections received the objection from Trump representatives on Thursday, a day after Green Party nominee Jill Stein filed for a recount.

          • Trump Spokesmonster Scottie Nell Hughes: ‘There’s No Such Thing as Facts’

            We have officially entered the post-fact American era. Donald J. Trump presidential surrogate Scottie Nell Hughes, known for being one of the most wack in Trump’s pack, explicitly said on public radio’s “The Diane Rehm Show” yesterday that lying is official Trump strategy.

          • Dr. Jill Stein, Alleged Election Spoiler, Defends Her Recount Battle

            On the heels of the most contentious presidential election in recent history, comes an equally contentious recount effort. Dr. Jill Stein, the Green Party candidate who won only 1 percent of the popular vote, is now attracting far more media attention than her campaign ever did, after she launched a controversial effort to initiate recount proceedings in Wisconsin, Pennsylvania, and Michigan—three states where Donald Trump beat Hillary Clinton by roughly 1 percent.

          • Why a recount? Prof who sparked it explains

            How might a foreign government hack America’s voting machines?

            Here’s one possible scenario. First, the attackers would probe election offices well in advance in order to find ways to break into their computers. Closer to the election, when it was clear from polling data which states would have close electoral margins, the attackers might spread malware into voting machines in some of these states, rigging the machines to shift a few percent of the vote to favor their desired candidate.

            This malware would likely be designed to remain inactive during pre-election tests, do its dirty business during the election, then erase itself when the polls close. A skilled attacker’s work might leave no visible signs — though the country might be surprised when results in several close states were off from pre-election polls.

        • Censorship/Free Speech

        • Privacy/Surveillance

        • Civil Rights/Policing

          • Assange’s dilemma: ‘The UK & Sweden are vassals of the United States’

            The rule of law has gone into the heap of history, and Julian Assange is one of the victims of that. I do hope the UK will come to its senses and start obeying international law, former CIA officer Ray McGovern told RT.

            A UN panel rejected an appeal from the British government in the case of Julian Assange, who has been holed up in the Ecuadorian embassy in London for more than four years.

            The UN Working Group on Arbitrary Detention upheld its earlier ruling that the WikiLeaks founder is being arbitrarily detained.

          • U.S. veterans to form human shield at Dakota pipeline protest

            More than 2,000 U.S. military veterans plan to form a human shield to protect protesters of a pipeline project near a Native American reservation in North Dakota, organizers said, just ahead of a federal deadline for activists to leave the camp they have been occupying.

            It comes as North Dakota law enforcement backed away from a previous plan to cut off supplies to the camp – an idea quickly abandoned after an outcry and with law enforcement’s treatment of Dakota Access Pipeline protesters increasingly under the microscope.

          • Toronto university Muslim group accused of anti-Semitism

            Voices from Toronto’s Jewish community are accusing a group of Muslim and pro-Palestinian university students of scuttling a vote by their union to commemorate Holocaust Education Week.

            The controversy unfolded during Tuesday’s general meeting of the Ryerson Student Union (RSU), which was set to vote on a Jewish student group’s motion to hold Holocaust Education Week events.

            According to a member of Hillel Ryerson, students from the university’s Students for Justice in Palestine (SJP Ryerson) and the Muslim Students Association (RMSA) first called for an amendment to the motion to include all forms of genocide.

            But then they walked out, causing the meeting to lose quorum and the vote to die, Hillel Ryerson’s Aedan O’Connor says. “Instead of going through with trying to amend it, they … decided to walk out,” he said Wednesday.

          • Call 6 Investigates Rafael Sanchez denied press credential to Carrier event

            Call 6 Investigates Chief Investigator Rafael Sanchez was denied press credential access to the announcement event at the Carrier plant that will detail the deal the west-side Indianapolis plant made with President-elect Donald Trump and Vice President-elect Mike Pence to keep more than half of the jobs of the original 1,400 slated to be moved to Mexico.

        • Intellectual Monopolies

          • Popcorn, Football And Chocolate – US Idea To Prompt Discussions At WIPO TK Committee

            What do popcorn, chewing-gum, football, syringes, and chocolate have in common? According to a United States paper tabled at the World Intellectual Property Organization, they are all rooted in traditional knowledge. While most efforts are geared this week towards trying to find consensual language on a treaty protecting traditional knowledge, the US said a discussion on what is protectable and what is not would be instructive. Some other delegations resubmitted proposals introducing alternative means of protection than a binding instrument.

          • Copyrights

            • Canada’s music lobby admits WIPO Internet Treaty drafters were “just guessing”

              Michael Geist writes, “The global music industry has spent two decades lobbying for restrictive DMCA-style restrictions on digital locks. These so-called “anti-circumvention rules” have been actively opposed by many groups, but the copyright lobby claims that they are needed to comply with the World Intellectual Property Organization’s Internet treaties. Now the head of the RIAA in Canada admits that the treaty drafters were just guessing and that they guessed wrong.”

            • Spain Announces New Campaign to Fight Internet Piracy

              Spain’s Ministry of Education, Culture and Sport has announced a new initiative for tackling piracy, especially online. Minister Íñigo Méndez de Vigo said a special prosecutor’s office will be developed alongside enhanced technological and human resources. An educational campaign targeting children is also on the agenda.

        ]]>
        http://techrights.org/2016/12/02/kdevelop-5-0-3/feed/ 0
        Links 26/11/2016: VLC 360, Wine 1.9.23 http://techrights.org/2016/11/26/vlc-360-wine-1-9-23/ http://techrights.org/2016/11/26/vlc-360-wine-1-9-23/#comments Sat, 26 Nov 2016 19:58:02 +0000 http://techrights.org/?p=97029

        GNOME bluefish

        Contents

        GNU/Linux

        • Microsoft & Linux & Patents & Tweets [Ed: Microsoft Loves Linux Patent Tax]

          Fact-checking some tweets about Linux Foundation’s newest member and their harvesting of other members’ money.

          [...]

          The revenue Microsoft gains comes a range of targets than can be colloquially called “Linux” with varying qualification. That includes embedded Linux and things that use it such as Android and shared SMB filesystems as well as Linux as a server and things that use it. Again, identifying the ratio of income per usage is impossible for anyone outside Microsoft (and probably for most people inside).

          Certainly the range of patents Microsoft is known to be attempting to monetise includes a broad range of functions. The best list I have found appears to have been inadvertently published by the Chinese Ministry of Commerce in 2014. But licensing activity is certainly not limited to Android; Microsoft also targets ChromeOS, Linux servers, Linux in consumer devices (each of those is a sample; there are plenty of other press releases) and much of the Android licensing actually appears to related to xFAT filesystem interoperability as in the Tom Tom case.

        • Desktop

          • Meet Pinebook, A Low Cost Linux Laptop That Looks Like A MacBook

            PineBook is a budget laptop running an Allwinner quad-core 64-bit processor. The device comes in two screen sizes both of them having 2GB RAM and 16GB eMMC storage along various ports and connectivity options. PineBook supports a number of Linux distros and Android versions.

          • Meet the Pinebook, a $89 ARM Laptop That Runs Ubuntu

            The Pine64 Pinebook is an ARM laptop priced from $89. It can run Android, ChromiumOS and various flavours of Linux, including Ubuntu.

          • Light and Thin 64-bit ARM based Open Source Notebook
          • The 12 Most Ridiculous Windows Errors of All Time

            Computers and humans are so different. While computers are infinitely faster at processing information, they run into trouble if they try to stray from their course. These “fast idiots” contrast to people, who can’t think as fast as machines but can adapt much more easily.

            These relations have produced some hilarious situations where novice users failed to grasp the basics of using Windows. On the other side of this are error messages. When a computer runs into an unexpected scenario, it usually throws up a message box for the user to review.

        • Server

          • Japan plans 130-petaflops China-beating number-crunching supercomputer

            Like 498 out of the top 500 systems, Japan’s 27 supercomputers in the Top 500 list all run Linux, and it is highly likely the new system will do so as well. It is not yet known who will construct the system for the Japanese government—bidding for the project is open until December 8.

        • Kernel Space

          • Graphics Stack

            • RadeonSI’s Gallium3D Driver Performance Has Improved Massively In The Past Year

              As some more exciting benchmarks to carry out this US holiday week, here are benchmarks of all major Mesa releases from Mesa 11.0 from mid 2015 through the latest Mesa 13.1-dev code as of this week. Additionally, the latest AMDGPU-PRO numbers are provided too for easy comparison of how the open-source AMD GCN 3D driver performance has evolved over the past year. It’s a huge difference!

            • LLVM 4.0 Causes Slow Performance For RadeonSI?

              Several times in the past few weeks I’ve heard Phoronix readers claim the LLVM 4.0 SVN code causes “slow performance” or has rendering issues. Yet it’s gone on for weeks and I haven’t seen such myself, so I decided to run some definitive tests at least for the OpenGL games most relevant to our benchmarking here.

            • It Looks Like We’ll Still See A GUI Control Panel For AMD Linux

              Earlier this year I exclusively reported on the “Radeon Settings” GUI control panel may be open-sourced for AMD Linux users but since then I hadn’t heard anything publicly or privately about getting this graphics driver control panel on Linux for AMDGPU-PRO and the fully-open AMDGPU stack. But it looks like that it’s still being worked on internally at AMD.

            • Yet More AMDGPU DAL Patches This Week For Testing

              It had been a few weeks since last seeing any new enablement patches for AMD’s DAL display abstraction layer code, which is a big requirement for HDMI/DP audio, HDMI 2.0, potential FreeSync support, and also needed for next-generation GPUs. The lack of fresh DAL patches changed though this week when new patches were sent out and already another round of revising to this display code has now been mailed out for review.

        • Applications

        • Distributions

          • Reviews

            • An Everyday Linux User Review Of Q4OS 1.8

              Q4OS is fairly straight forward to get to grips with and it runs like a dream.

              When I tried it last year it was on a much older machine and really worked well. On this machine it performs magnificently.

              The Windows look and feel might not be to everybody’s taste especially the use of “My Documents” and “My Pictures” etc but you can easily rename them.

              The desktop environment is Trinity and it lacks certain features such as window snapping.

              I haven’t tried Q4OS out with my NAS drive or printer and other hardware yet but I did last time around and it had no issues so I suspect it will be the same this time. I will update you in the next blog post about this. I will also update you as to whether Steam works or not.

              As with last time around I can’t really fault Q4OS on anything. Well I suppoes there are a couple of things that could be improved such as dual booting and the network manager should be installed by default as the one that comes with Q4OS is a bit inconsistent.

              After just a couple of hours effort I had Q4OS installed with every application I need including PyCharm. I am now able to listen to music, watch films, surf the web, write software, edit documents, read and send mail, use DropBox, use Skype and play games.

              Q4OS also comes with WINE which is useful for running Windows software.

          • PCLinuxOS/Mageia/Mandriva Family

            • Mageia 5 Support Extension and General Update

              With the delays to Mageia 6 and the approaching initial end of life (EOL) for Mageia 5 (initially planned for early December), we felt that it would be good to give an update on where things were with both Mageia 5 and 6.

              Firstly, every release so far has been supported until 3 months after the next release, and Mageia 5 will be no different. Since Mageia 6 is being delayed, Mageia 5’s support is automatically extended in order to give users 3 months to upgrade before Mageia 5 stops receiving security updates.

          • OpenSUSE/SUSE

          • Red Hat Family

            • Finance

            • Fedora

              • Korora 25 Upgrades, Mageia 6 Delays, Gift Ideas

                The Korora project announced a bit of good news for user waiting for the latest release while Mageia users will have to continue to wait. opensource.com published a gift buying guide for Open Source fans and it looks like the netbook is back is back. Gary Newell reviewed Q4OS 1.8 and makeuseof.com today reminded us of why we use Linux.

              • Impatient for Korora 25?

                We are busy preparing Korora 25 ‘Gurgle’ for release but those who already have Korora 64 bit 24 or 23 installations don’t have to wait.

              • Running Fedora 25 Design Suite on ASUS X550ZE laptop
              • Summary report on FUDCon APAC, Phnom Penh

                This year FUDCon APAC happened in Phnom Penh, Cambodia for two days 5th and 6th of November. This FUDCon happened as part of bigger conference called as BarCamp, ASEAN 2016. This BarCamp happened at Norton university from 4th to 6th November.

                On the first day of this BarCamp/FUDCon when we reach to the venue, we found it to be very nice place, full of people like students, volunteers, banners of BarCamp everywhere. It was a five floor building and the inauguration talk happened at the top 5th floor where all the honourable guests including Brian Exelbierd, Fedora Community Action and Impact Coordinator talked about FOSS.

              • Upgraded to Fedora 25

                Generally I used to upgrade after the Alpha releases, but this time I decided to wait till the final release. Reason: just being lazy. The other point is of course the nightly cloud images, which I am using for a long time.

                Before I upgraded my laptop, the first step was to sync the gold release of Everything repo, and then the updates repo for x86_84. The Everything repo is around 55GB, and the updates was 14GB+ when I synced. After I managed to get the local mirror at home fully synced, I upgraded using dnf system-upgrade.

          • Debian Family

            • Starting the faster, more secure APT 1.4 series

              We just released the first beta of APT 1.4 to Debian unstable (beta here means that we don’t know any other big stuff to add to it, but are still open to further extensions). This is the release series that will be released with Debian stretch, Ubuntu zesty, and possibly Ubuntu zesty+1 (if the Debian freeze takes a very long time, even zesty+2 is possible). It should reach the master archive in a few hours, and your mirrors shortly after that.

            • Debian package build tools

              When I was first introduced to Debian packaging, people recommended I use pbuilder. Given how complex the toolchain is in the pbuilder case, I don’t understand why that is (was?) a common recommendation.

            • vmdebootstrap Sprint Report

              This is now a little overdue, but here it is. On the 10th and 11th of November, the second vmdebootstrap sprint took place. Lars Wirzenius (liw), Ana Custura (ana_c) and myself were present. liw focussed on the core of vmdebootstrap, where he sketched out what the future of vmdebootstrap may look like. He documented this in a mailing list post and also presented (video).

              Ana and myself worked on live-wrapper, which uses vmdebootstrap internally for the squashfs generation. I worked on improving logging, using a better method for getting paths within the image, enabling generation of Packages and Release files for the image archive and also made the images installable (live-wrapper 0.5 onwards will include an installer by default).

            • Quicker Debian installations using eatmydata

              Two years ago, I did some experiments with eatmydata and the Debian installation system, observing how using eatmydata could speed up the installation quite a bit. My testing measured speedup around 20-40 percent for Debian Edu, where we install around 1000 packages from within the installer. The eatmydata package provide a way to disable/delay file system flushing. This is a bit risky in the general case, as files that should be stored on disk will stay only in memory a bit longer than expected, causing problems if a machine crashes at an inconvenient time. But for an installation, if the machine crashes during installation the process is normally restarted, and avoiding disk operations as much as possible to speed up the process make perfect sense.

        • Devices/Embedded

        Free Software/Open Source

        • Deepstream: an Open-source Server for Building Realtime Apps

          Realtime apps are getting really popular, but they’re also hard to build. Wolfram Hempel introduces deepstream, an open-source server he co-founded to make data-sync, request-response and publish-subscribe a whole lot easier.

        • Open Source Email Marketing with phpList

          Email marketing has been exploding in popularity. You might have heard of the likes of MailChimp and Emma advertising the use of their services to send a whole bunch of messages for prospects and profit. The number of ways to promote goods online is forever growing, and research shows emails are still the most effective. I like to compare it with the “desktop is dead” myth; while mobile is on the rise, desktop is here to stay. I believe the same about email.

          Having said that, it’s no surprise that the number of services competing in the field have mushroomed in recent years, capitalising on demand from firms of all sizes to get access to that most personal of places, the email inbox.

          While big brand proprietary platforms and their sponsorship deals have been busy establishing themselves, an Open Source alternative has been minding its own business, making regular releases and accumulating a committed base of users since the year 2000. Enter phpList, the email marketing app you can run yourself without paying for messages, subscribers, or additional features.

        • 3 alternative reasons why you should test Nextcloud 11 Beta

          And many of the folks about to be put in power by President-elect Trump favor more spying, including on US citizens, expansion of the NSA, a crackdown on whistleblowers and more. Trump’s pick for CIA director calls for Snowden’s execution. For, what I can only guess must be giving proof of illegal government spying to dangerous terrorists like the Washington Post and the Guardian, who proceeded to win a Pulitzer prize by disclosing this information irresponsibly to the US public.

        • Mickey Mouse Open Source, Close Call at WordPress, and More…

          These days we’re seeing a lot of companies that aren’t officially in the software business releasing code developed in-house for internal use under open source licenses. You can now add Disney to that list, which includes Capital One, Walmart and others.

          This was pointed out on Wednesday by InfoWorld’s Paul Krill, who notes that in addition to Mickey Mouse, Pinocchio and Nemo, the company has given us advanced image projects such as OpenEXR, as well as DevOps tools for the Mac, such as Munki. More information on Disney’s open source projects can be found on its GitHub page.

        • Plans Unveiled for R3s Corda to Move to Open Source

          Head over to corda.net on November 30 for links to the codebase, simple sample applications and a tutorial to get started writing your own CorDapps.

        • SaaS/Back End

          • How to Get Certified for Top Open Source Platforms and Applications

            The cloud computing and Big Data scenes are absolutely flooded with talk of shortages in people with deployment and management expertise. There just are not enough skilled workers to go around. The OpenStack Foundation, the Cloud Native Computing Foundation and other organizations are now taking some important steps to address the situation.

            As 2017 approaches, here are some of the best ways to get certified for the open source cloud and Big Data tools that are makng a difference.

            As part of its efforts to grow the OpenStack talent pool and global community, the OpenStack Foundation has announced professional certification programs that are meant to provide a baseline assessment of knowledge and be accessible to OpenStack professionals around the world. Some of the first steps in advancing the program are taking place now, and Red Hat is also advancing OpenStack certification plans.

        • Pseudo-Open Source (Openwashing)

        • FSF/FSFE/GNU/SFLC

          • More Offloading Code Hits GCC Mainline For Both HSA & NVPTX

            For those following GCC’s offloading capabilities to devices like GPUs, more work continued being mainline this week. We are onto stage 3 development of GCC 7 but items that were still being reviewed at that time are still being allowed to land. It looks like in 2017 we may finally see more GCC support come to reality when it comes to AMD HSA support and OpenMP / OpenACC offloading to NVIDIA GPUs.

        • Openness/Sharing/Collaboration

          • Open Data

            • Dutch Drecht cities published first batch of open datasets

              The Drecht cities (Drechtsteden), a collaboration of six municipalities in the delta region of the Netherlands, have published a first batch of open datasets. The data has been made available on several public open government data platforms. It includes information on complaints, monumental trees, groundwater levels, monuments, playgrounds, dumpsters, and real estate values. More datasets will follow in the near future.

        Leftovers

        • Science

          • Sweden publishes report on ‘The Social Contract in Digital Times’

            Last month, the Swedish Digitalisation Commission (Digitaliseringskommissionen) published a theme report on ‘The Social Contract in Digital Times’. The report comprises a collection of articles contributed by a dozen authors working in academia, science and innovation.

            The report highlights social issues such as the meaning of equality for the individual.
            Welfare, healthcare and education, for example, can be provided in new, more personalised ways. What can and should be the State’s commitment in this setting, and what rights and obligations should the individual have?

          • Two new planets for neuroscientists

            Those that have been around the free and open source community will already know what planets are. They’re web pages that aggregate feeds from various sources – usually community members’ blogs. There are quite a few around and I follow a few myself – Planet Fedora, Planet GNOME, and Planet Mozilla, for example. They’re extremely useful to keep onesself up to date with the happenings in the communities.

            So, I’ve gone ahead and set up two new planet instances to aggregate information from a myriad of neuroscience sources. The first is Planet neuroscience. The feeds this one aggregates are all from peer reviewed journals. So, pure research on this one. It’s one long list of new publications.

        • Health/Nutrition

          • Tens of thousands of children at risk of starvation in Nigeria crisis

            More than 120,000 people, most of them children, are at risk of starving to death next year in areas of Nigeria affected by the Boko Haram insurgency, the United Nations is warning.

            Intense fighting in parts of Nigeria, Chad, Niger and Cameroon has left more than 2 million people displaced, farmers unable to harvest their crops and aid groups unable to reach isolated communities. One small state in Nigeria has more displaced people than the entire refugee influx that arrived in Europe last year.

        • Security

          • Friday’s security updates
          • Linux hardening: a 15-step checklist for a secure Linux server [Ed: paywall]

            Most people assume Linux is secure, and that’s a false assumption. Imagine your laptop is stolen without first being hardened. A thief would probably assume your username is “root” and your password is “toor” since that’s the default password on Kali and most people continue to use it. Do you? I hope not.

          • Homeland Security Issues ‘Strategic Principles’ For Securing The Internet Of Broken Things

            For much of the last year, we’ve noted how the rush to connect everything from toasters to refrigerators to the internet — without adequate (ok, any) security safeguards — has resulted in a security, privacy and public safety crisis. At first, the fact that everything from Barbies to tea kettles were now hackable was kind of funny. But in the wake of the realization that these hacked devices are contributing to massive new DDoS botnet attacks (on top of just leaking your data or exposing you to hacks) the conversation has quickly turned serious.

            Security researchers have been noting for a while that it’s only a matter of time before the internet-of-not-so-smart-things contributes to human fatalities, potentially on a significant scale if necessary infrastructure is attacked. As such, the Department of Homeland Security recently released what they called “strategic principles” for securing the Internet of Things; an apparent attempt to get the conversation started with industry on how best to avoid a dumb device cyber apocalypse.

        • Defence/Aggression

          • Analysis: Why Sweden is giving an award to the ‘White Helmets’?

            Sweden did not succeed in getting Bob Dylan to come to Stockholm to receive the Nobel Prize for Literature. Nevertheless as a consolation the “White Helmets” did arrive to get the Right Livelihood Award.

            This article examines a likely geopolitical rationale that the Swedish elites had for selecting that organization. Also, facts suggest a congruence between the stances of those elites on Syria and the declared political aims of the organization White Helmets. The reviewing of the institutions involved in the award-decision and process can also result relevant in pondering the reason for the event. Finally, to inquire into the role of Carl Bildt, as member of the board of directors in the institution ultimately deciding, is interesting against the backdrop of his opposition regarding the participation of Julian Assange and Edward Snowden in previous international events organized by the same institutions –all of them under the umbrella of the Swedish Foreign Office.

          • Obama administration expands elite military unit’s powers to hunt foreign fighters globally

            The Obama administration is giving the elite Joint Special Operations Command — the same organization that helped kill Osama bin Laden in a 2011 raid by Navy SEALs — expanded power to track, plan and potentially launch attacks on terrorist cells around the globe, a move driven by concerns of a dispersed terrorist threat as Islamic State militants are driven from strongholds in Iraq and Syria, U.S. officials said.

            The missions could occur well beyond the battlefields of places like Iraq, Syria and Libya where Joint Special Operations Command (JSOC) has carried out clandestine operations in the past. When finalized, it will elevate JSOC from being a highly-valued strike tool used by regional military commands to leading a new multiagency intelligence and action force. Known as the “Counter-External Operations Task Force,” the group will be designed to take JSOC’s targeting model — honed over the last 15 years of conflict — and export it globally to go after terrorist networks plotting attacks against the West.

          • How Donald Trump responded to Fidel Castro’s death

            Trump came under intense scrutiny in September following allegations that he knowingly violated the U.S. Cuban embargo in the 1990s, news that threatened to sour Cuban-Americans’ opinion of him.

            A Newsweek story said the now-president elect spent $68,000 to send business consultants to Cuba despite the embargo. Trump Hotels reimbursed Seven Arrows Investment & Development Corp. shortly after Trump launched his bid for the White House.

          • Fidel Castro dies at 90

            Cuban leader Fidel Castro has died at age 90, his brother Raul announced on state television in the early morning hours Saturday.

            Raul Castro made a brief TV statement around 12:30 a.m. Eastern.

            “It is with great pain I come to inform our country, friends of our America, and the world that today, Nov. 25, 2016 at 10:29 p.m., the commander in chief of the Cuban Revolution, Fidel Castro Ruz, died,” he said.

        • Transparency/Investigative Reporting

          • Setting the World to Rights

            Julian is very aware of the persistent rumours about his position or health. He is fine apart from a cold, and buoyed by recent events.

          • Readers choose Assange over Trump as Time’s Person of the Year

            Wikileaks founder Julian Assange has overtaken President-elect Donald Trump for the lead in the online poll that allowed Time magazine readers to choose who the next person of the year should be.

            As of 1:00 pm (eastern time) on Monday, Assange and Trump were deadlocked with 9 per cent of all the “yes” votes cast by participants, but Assange pulled ahead to 10 per cent shortly after noon, Time reported.

            Wikileaks made headlines regularly during 2016 presidential election by releasing information, including leaked internal Democratic National Committee correspondence and messages from the account of Hillary Clinton’s campaign manager John Podesta.

        • Environment/Energy/Wildlife/Nature

          • Arctic ice melt could trigger uncontrollable climate change at global level

            Arctic scientists have warned that the increasingly rapid melting of the ice cap risks triggering 19 “tipping points” in the region that could have catastrophic consequences around the globe.

            The Arctic Resilience Report found that the effects of Arctic warming could be felt as far away as the Indian Ocean, in a stark warning that changes in the region could cause uncontrollable climate change at a global level.

          • Despite tough talk, Indonesia’s government is struggling to stem deforestation

            TEGUH, chief of the village of Henda, in the Indonesian portion of Borneo, enters his office brimming with apologies for being late. The acrid scent of smoke wafts from his clothes. He explains that he was guiding police and firefighters to a fire just outside the village. A farmer had decided to clear his land by burning it. Henda sits amid Borneo’s vast peatlands; the fire had set the fertile soil smouldering for nearly 24 hours. It was a small fire, he says—perhaps a couple of hectares—but Mr Teguh still struggled to contain his exasperation, given the destruction wrought by fires set for land-clearance just a year ago.

            Last year, in the autumn for the most part, at least 2.6m hectares of Indonesia’s forests burned—an area the size of Sicily. The fires blanketed much of South-East Asia in a noxious haze and released a vast plume of greenhouse gases. Much of the island’s interior was reduced to sickly scrub; along its roads stand skeletal trees, reproachful witnesses to the ravages they endured. Indonesia’s forest fires alone emitted more greenhouse gases in just three weeks last year than Germany did over the whole year. The World Bank estimates that they cost Indonesia $16bn in losses to forestry, agriculture, tourism and other industries. The haze sickened hundreds of thousands across the region, and according to one study, hastened over 100,000 deaths.

          • Scientists Across the World Are Nervous About Trump, Survey Says

            With Donald Trump set to step into the Oval Office this January, we’ve reported before that scientists are concerned his policies could mean an attack on America’s scientific prowess and integrity.

            In fact, 72 percent of scientists surveyed in a recent worldwide poll said the results of the election would have a negative impact on research and science in the US. The survey was conducted by the Science Advisory Board, a panel of over 75,000 doctors, researchers, and scientific experts. It polled 3,289 scientists from every continent, except Antarctica. Of the American scientists, 85 percent said they voted for Democratic nominee Hillary Clinton, and about 10 percent said they voted for Trump.

          • Health Canada proposes ban on pesticide linked to bee deaths

            Canada’s health regulator is planning to ban a controversial neonicotinoid pesticide, which it says has contaminated waterways and killed important aquatic insects.

          • Feds move to ban common neonicotinoid insecticide, say use ‘not sustainable’

            The federal government is moving to phase out a common neonicotinoid insecticide after finding that it accumulates in waterways and harms aquatic insects.

            Health Canada has announced a 90-day public consultation period on imidacloprid, which is used on everything from cereals, grains, pulses and oilseeds to forestry woodlots and flea infestations on pets.

            Neonicotinoids as a class of pesticides have come under heavy scrutiny in recent years for their potential impact on bee populations.

        • Finance

          • TiSA-Leaks: Fundamental rights shall be levered out for free trade – also in the internet

            Today we publish new TiSA documents in cooperation with Greenpeace which have been kept secret until now. The „Trade in Services Agreement“ is a proposed trade treaty for services between 23 Parties, including the EU and the United States.

            The new leaks include the Annexes about Electronic Commerce and Telecommunications Services. Those will have a noticeable impact on net politics in the EU. They point to negative effects on data protection, net neutrality, freedom of speech and IT security.

            If the EU does not manage to defend its positions and grovels to the interests of industry lobbyists it will become unreliable and show that it prefers trade to fundamental rights.

        • AstroTurf/Lobbying/Politics

          • Wisconsin is preparing to recount election votes after receiving petition from Jill Stein

            True to her word, Green Party presidential candidate Jill Stein filed for an election recount in the state of Wisconsin this afternoon, just 90 minutes before the deadline to file, according to the Wisconsin Elections Commission. The move comes after Stein raised over $5 million through a fundraising effort to cover the cost of recounts in Wisconsin, Pennsylvania, and Michigan — three key battleground states that helped Donald Trump gain the 270 electoral college votes needed to win the election. Trump won Wisconsin by a margin of just over 25,000 votes.

          • Trump election: Wisconsin prepares for vote recount

            Officials in Wisconsin are preparing to conduct a full recount of the votes from the US election in the state, which was narrowly won by Donald Trump.

            A formal request for the recount was filed by the Green Party’s Jill Stein.

            Dr Stein, the Green Party’s candidate, has also pledged to file for recounts in Michigan and Pennsylvania.

            The result would need to be overturned in all three states to change the outcome of the election, something analysts say is highly unlikely.

            Dr Jill Stein reportedly wants to make sure computer hackers did not skew the poll in favour of Mr Trump.

          • Wisconsin to recount presidential votes

            Wisconsin will undertake a recount of its presidential election votes after two requests from third-party candidates.

            Green Party nominee Jill Stein filed her request just before the deadline Friday afternoon, the Wisconsin Elections Commission announced. Reform Party candidate Rocky De La Fuente also filed for a recount.

            “We are standing up for an election system that we can trust; for voting systems that respect and encourage our vote, and make it possible for all of us to exercise our constitutional right to vote,” Stein said in a statement.

        • Censorship/Free Speech

          • Now Reddit is ‘censoring the alt-right’ after founder got fed up of being called a PAEDO

            THE CHIEF executive of Reddit has admitted to anonymously editing posts that were critical of him – changing them to refer to president-elect Donald Trump instead.

            Steve Huffman, posting under his username Spez on the discussion forum, told users that he was sick of being constantly called a paedophile in their discussions on the site.

          • Internet, a Double-Edged Sword Stained With Fake News and Censorship [Ed: The problem isn’t “fake news” but people not knowing how to validate news based on reputation of sources]

            By AsiaToday reporter Kim Eun-young – The Internet has created a new landscape of social change as an outlet for open communication. However, it also threatens Millennials with false information and censorship.

            Both Google and Facebook announced on Nov. 15 that they will ban fake news sites from using their ad networks to prevent the spread of false information, AFP reported. The shift comes as they face a backlash over the role they played in the U.S. presidential election by allowing the spread of false information supporting a particular candidate that might have contributed to the outcome of the election.

          • China Uses US Concern Over Fake News To Push For More Control Of The Internet

            In the context of this sentence, “reward” and “punish” both sound like they have the same definition. Unless the government official is hinting that those spreading fake news stories more aligned with the government’s aims will be given… something for their assistance in pushing the party line.

            The United States has long been looked to as a free speech ideal, something other countries can strive for in their own governance. But countries opposed to those ideals are watching much more closely, looking for anything that belies the ideals the US government claims to hold dear. So, when President Obama suggests fake news is an actual threat to democracy, countries like China are going to use this to justify further control of citizens’ communications and stricter regulation of news sources — for the “good of the nation.”

          • Election Prompts More Aggressive Twitter Censorship

            And according to some conservatives whose accounts have been suspended, Twitter has looked the other way when it comes to those on the Left who have bullied conservatives. An example discovered by USA Today was a California college student, Ariana Rowlands, who said she received personal attacks and death threats after Tweeting about her pride in her Hispanic heritage and her support for Trump. She said she reported the posts, but Twitter did nothing about the abusive account holders.

          • Gambia: Ahead of polls, digital media skirt censorship

            While state media in Gambia is government controlled and the private media practices self-censorship, political opponents of the small West African country’s strongman President Yahya Jammeh are using digital media to bypass the hurdles they face in reaching audiences.

            Gambians are heading to presidential polls next week, on Dec. 1, and campaigns are already in motion, with the incumbent facing his former ally and a coalition of seven opposition parties.

          • Major Journalism Trade Unions Stand with Sputnik Against Censorship

            Sputnik News Agency and Radio Broadcaster has received the support of both the International Federation of Journalists (EFJ) and European Federation of Journalists (EFJ) following the passing of a controversial resolution by the European Parliament.

          • Nataliya Rostova: In Russia’s media, censorship is silent

            The idea of conducting a survey of Russian journalists came to me after seeing something similar in New York magazine, which earlier this year polled 113 people working in the US media on the problems and challenges they face. I thought it’d be interesting to compare the responses of journalists working on opposite sides of the Atlantic. On the one hand, you have the experience of a country where every schoolchild feels pride in the First Amendment, which forbids Congress to pass any legislation limiting freedom of speech and the press, and, on the other, experience from a country where censorship was officially banned only 26 years ago.

          • Will new censorship kill Chinese filmmaking?

            China’s new film censorship laws would, at first blush, be enough to make a director cry.

            Movies must not promote gambling, superstition, drug abuse, violence nor teach criminal methods. What’s more they should “serve the people and socialism”. The horror!

            So will this mean the end of great Chinese cinema and the drowning of dwindling audiences in sea of dull, paternalistic fare?

            Not necessarily.

          • Dodgy Age Verification And Censorship Are Not The Answer

            Open Rights Group has got to know a disastrous policy when it sees it. Back in 2010, during the last Digital Economy Bill, music companies demanded that people be cut off the Internet after “three strikes” if they were accused of file sharing.

            Even then, it was clear that this was a disproportionate response that wouldn’t bring any of the supposed benefits.

            “Three strikes” and disconnection was never put into action. It crashed and burned, and everyone does their best to forget it.

            Now, I am experiencing a strong sense of déja vu. The new incarnation of the Digital Economy Bill starts with a real concern, that children can access pornography online, and puts forward a ‘modest proposal”. This is a deserving group whose interests are indisputably important.

          • Brazilian Activists Outsmart Facebook’s Censorship of the Female Nipple

            Gradually this has been challenged in Brazil, with many feminist movements doing marches attended by many women who, in protest against hypersexualization and shaming of women’s bodies, bare their chests in public. This has been accompanied by increased frustration with Facebook and Instagram’s Community Standards, which allow specific non-sexual images of women’s nipples (they make exceptions for breast feeding and post-mastectomy photos), but not others. They also allow some images of graphic violence, such as photos of people who have been tortured. Hypersexualized images of female breasts are also considered appropriate (as long as the nipple is not clearly visible), while photos including women’s nipples ranging from indigenous ceremonies in Australia to campaigns against breast cancer are prohibited.

          • Facebook doesn’t need to ban fake news to fight it

            Mark Zuckerberg’s social media site doesn’t have to become a censor to help tackle false stories. It can do a lot by helping its own users with context

          • On Blacklists and Russia ‘Hacking’ American Democracy
          • MacWorld, PCWorld Kill Site Comments Because They ‘Value And Welcome Feedback’

            For a while now the trend du jour in online media is to not only block your readers from making news story comments, but to insult their intelligence by claiming this muzzling is driven by a deep-rooted love of community and conversation. NPR, for example, muted its entire readership because, it claimed, it “adored reader relationships.” Reuters and Recode, in contrast, prevented their own users from speaking on site thanks to a never-ending dedication to “conversation.” Motherboard similarly banned all on-site reader feedback because it greatly “values discussion.”

            There’s a number of reasons to ban comments, but few if any have anything to do with giving a damn about your community. Most websites, writers and editors simply don’t want to spend the time or money to moderate trolls or cultivate local community because it takes a little effort, and quality human discourse can’t be monetized on a pie chart. Instead, it’s easier and cheaper to simply outsource all public human interactivity to Facebook. In addition to being simpler, it avoids the added pitfalls of a public comment section where corrections to your story errors are posted a little too visibly.

          • Will Facebook’s China Censorship Tool Work?
          • Facebook ‘quietly developing censorship tool’ for China
          • Facebook is ready to censor posts in China — should users around the world be worried?
          • Court (Again) Tosses Lawsuit Seeking To Hold Twitter Accountable For ISIS Terrorism
          • The 5 Worst Places To Be An Internet User In Southeast Asia
          • Top 10 Countries With Highest Internet Censorship in 2016
          • ‘It’s like they were selling heroin to schoolkids’: censorship hits booksellers at Kuwait book fair
        • Privacy/Surveillance

          • Microsoft gives third-parties access to Windows 10 Telemetry data

            Microsoft struck a deal with security company FireEye recently according to a report on Australian news magazin Arn which gives FireEye access to all Windows 10 Telemetry data.

          • European Union wants to regulate cryptography?

            Regulating cryptography is of course a bad idea. It’s true that cryptography can be an obstacle for collecting digital evidence. Generally, that’s one of the aims of cryptographic methods: make it difficult to obtain plain-text data. It can be used for the good, as well as for the bad, as with many other tools or technologies. But it’s unclear if policy makers can achieve reasonable regulatory frameworks. And the stakes are high. Weakening cryptography would ultimately lead to far reaching negative impact on digital markets, society, trust, cybersecurity and privacy.
            Intentional weakening of cryptography and security solutions – whether by requiring weaker algorithms or key sizes, or introducing backdoors – in order to make life easier for local law enforcement agencies means that criminals and foreign powers will also benefit from those measures.
            Good cryptography is strong cryptography.

          • Edward Snowden’s extradition lawsuit is rejected by Norway’s Supreme Court

            Norway’s Supreme Court has rejected Edward Snowden’s attempt to win free passage to visit the country and receive an award for free speech.

            Mr Snowden, who currently resides in Russia, copied and leaked thousands of classified NSA documents in 2013, revealing the scale of US government surveillance after the 9/11 attacks.

            In April, the 33-year-old took Norway to court in an attempt secure free passage, through Oslo’s District Court, an appeals court and finally the country’s Supreme Court.

          • Edward Snowden loses Norway safe passage case

            Edward Snowden’s bid to guarantee that he would not be extradited to the US if he visited Norway has been rejected by the Norwegian supreme court.

            The former National Security Agency contractor filed the lawsuit in April, attempting to secure safe passage to Norway to pick up a free speech award.

            It had already been rejected by Oslo District court and an appeals court.

            Mr Snowden is a former NSA analyst who leaked secret US surveillance details three years ago.

            As a result, he is facing charges in the US which could put him in prison for up to 30 years.

          • Twitter Says Its API Can’t Be Used For Surveillance, But What Does It Think The FBI’s Going To Do With It?

            Dataminr, the company whose Twitter firehose access has become somewhat of cause celebre on both sides of the privacy fence, is back in the news. After being told it couldn’t sell this access to government agencies for surveillance purposes, Dataminr had to disconnect the CIA from its 500 million tweets-per-day faucet.

            Twitter was pretty specific about what this buffed-up API could and could not be used for. The CIA’s surveillance efforts were on the “Don’t” list. This rejection of the CIA’s access was linked to existing Twitter policies — policies often enforced inconsistently or belatedly. What the CIA had access to was public tweets from public accounts — something accessible to anyone on the web, albeit with a better front-end for managing the flow and an API roughly 100x more robust than those made available to the general public.

          • Here’s how to delete yourself from the internet – at the click of a button

            In our smartphone-obsessed digital age, we effectively live our entire lives online, which makes us increasingly vulnerable to unseen threats.

            Cyber crime, fraud and identity theft are exponentially growing concerns. Our personal lives, locations, and increasingly our passwords are made public online for anyone to find.

            If the highly invasive Investigatory Powers Bill (AKA the Snooper’s Charter) isn’t blocked, then every single digital move you make will be recorded for up to 12 months.

          • Germany planning to ‘massively’ limit privacy rights

            A draft law released by the German union for data protection (DVD) this week revealed that the interior ministry was proposing to drastically limit the powers of Germany’s data protection authorities, banning them from investigating suspected breaches of people’s medical and legal records.

            As well as expanding video surveillance with facial recognition software, the bill would limit the government’s own data protection commissioners to checking that the technical prerequisites are in place to ensure that doctors’ and lawyers’ files are secure, but it stops them from following up when citizens report concerns that their data has been leaked.

            The bill would also shut down citizens’ right to know what data is being collected about them – even by private firms, if releasing that information would “seriously endanger” a company’s “business purposes,” the SZ quoted the draft as saying. Thilo Weichert, former data protection commissioner for the state of Schleswig-Holstein and now DVD board member, condemned de Maiziere’s plans as a “massive” erosion of privacy in Germany.

          • Donald Trump’s national security chief ‘took money from Putin and Erdogan’, says former NSA employee

            A former NSA employee has accused Donald Trump’s selection for National Security Advisor of taking money from both Russia and Turkey and of breaching information security regulations.

            John Schindler said Michael Flynn, who Mr Trump has nominated for the senior post, had taken money from the governments of Vladimir Putin and Recep Erdogan. Mr Schindler claimed on Twitter that Mr Trump would be a “hypocrite” if he stood by his nomination of the former general given his promise to “drain the swamp” of Washington.

            “Flynn took money from Putin & Erdoğan AND he broke important INFOSEC laws+regs,” he said. “If Trump stands by him now, he is a monstrous hypocrite.”

        • Civil Rights/Policing

          • Bill Introduced To Push Back Approval Of DOJ’s Proposed Rule 41 Changes

            In addition, the DOJ wants permission to break into “compromised” computers and poke around inside them without the permission or knowledge of the owners of these computers. It also wants to treat anything that anonymizes internet users or hides their locations to be presumed acts of a guilty mind. The stripping of jurisdictional limits not only grants the FBI worldwide access for digital seizures and searches, but also encourages it to go venue shopping for judicial rubber stamps.

          • Jakarta’s violent identity crisis: behind the vilification of Chinese-Indonesians

            Before Jakarta, there was Batavia, the 17th-century capital city of the Dutch East Indies, built with the skill of just a few hundred ethnic Chinese artisans who had settled as traders along the shore.

            How little has changed.

            Many big projects in modern day Jakarta, a city of more than 10 million, have been built by developers from the minority group, the descendants of the original merchants and other Chinese who have arrived since.

            Chinese-Indonesians – estimated to make up 1% to 4% of the country’s 250 million people – have had an impact on Jakarta which is vastly disproportionate to their physical numbers. The economic success of the group’s small elite has led to repeated bouts of resentment, discrimination and even violent assaults.

          • Dozens injured, hundreds arrested in riot at Bulgaria refugee camp

            Around 1,500 migrants have rioted in Bulgaria’s largest refugee camp, triggering clashes that left two dozen police injured and prompted the arrest of hundreds of protesters, officials said.

            “Around 300 migrants, six of them considered a threat to national security, have been arrested,” Prime Minister Boyko Borissov told BNR public radio after visiting the camp in early hours of Friday.

            He added that 24 police officers and two migrants had been injured and that the situation had been brought under control.

          • Migrants Clash With Police in Bulgaria; 200 Detained

            Police detained 200 migrants after they clashed with police at a refugee camp in southern Bulgaria on Thursday, injuring several officers.

          • President Erdogan: I will open gates for migrants to enter Europe if EU blocks membership talks

            President Recep Tayyip Erdogan has warned Turkey could open its border for refugees to stream into Europe after EU MEPs voted for a temporary halt to membership talks.

            Speaking at a congress on womens’ justice in Istanbul, the president warned: “If you go any further, these border gates will be opened. Neither me nor my people will be affected by these dry threats. It wouldn’t matter if all of you approved the vote”.

            He said the EU had “wailed” for help controlling the flow of refugees and migrants in 2015 and the bloc worried what would happen if Turkey opened its borders. Mr Erdogan made specific reference to Turkey’s main border crossing with EU member Bulgaria.

          • North Dakota Pipeline camp prepares for winter with donations
          • Islamic banking is the another name of destruction of civilization through Economic Jihad.

            Islamic banking traces its roots to the 1920s, but did not start until the late 1970s, and owes much of its foundation to the Islamist doctrine of two people: Indian-born Abul Ala Maududi of the Jamaat-e-Islami and Hassan al-Banna of the Muslim Brotherhood in Egypt. While these two pillars of the Pan-Islamist movement propagated jihad and war against the West, they also recognised the role international financial institutions could play in carrying out their political objectives.

          • Hacker who helped expose Ohio rape case pleads guilty, faces more prison time than rapists

            Earlier this week, Deric Lostutter, 29, known online as “KYAnonymous,” pleaded guilty in federal court in Kentucky to one count of conspiracy and one count of making false statements to law enforcement agents for his hack of the Steubenville (Ohio) High School football fan website Roll Red Roll in December 2012.

            Lostutter has said he hacked into the site to expose information about the gang rape of an unconscious teenage girl from West Virginia by members of the football team. Two of those team members, Trent Mays and Malik Richmond, were eventually sentenced to serve time — two years and one year, respectively — in a juvenile detention center for rape and kidnap.

        • Intellectual Monopolies

          • Amended TRIPS Agreement Close To Ratification, Says WTO’s Azevêdo

            For Roberto Azevêdo, director general of the World Trade Organization, an amendment to the Trade-Related Aspects of Intellectual Property Rights (TRIPS) Agreement that affects access to pharmaceuticals for developing countries remains a priority of the WTO.

            It was witnessed this week by Benin, which signed up to an amendment to the agreement this week in Geneva, joining several other nations that have signed in 2016.

          • Copyrights

            • Court Freezes Megaupload’s MPAA and RIAA Lawsuits

              A federal court in Virginia has granted Megaupload’s request to place the cases filed by the music and movie companies on hold until April next year, while the criminal case remains pending. Meanwhile, Megaupload is working hard to ensure that critical evidence on decaying hard drives is preserved.

            • $1bn Getty Images Public Domain Photograph Dispute is Over

              Earlier this year, photographer Carol Highsmith received a $120 settlement demand from Getty Images after she used one of her own public domain images on her website. Highsmith responded with a $1bn lawsuit but after a few short months the case is all over, with neither side a clear winner.

        ]]>
        http://techrights.org/2016/11/26/vlc-360-wine-1-9-23/feed/ 0
        Links 25/11/2016: Pinebook, Games Sales http://techrights.org/2016/11/25/games-sales/ http://techrights.org/2016/11/25/games-sales/#comments Fri, 25 Nov 2016 15:14:30 +0000 http://techrights.org/?p=97016

        GNOME bluefish

        Contents

        GNU/Linux

        Free Software/Open Source

        • Groovy, an Open Source Success Story

          Apache Groovy is a multi-faceted general purpose programming language for the Java platform. While primarily an object-oriented language with many dynamic language features, it also supports functional programming, static type checking and static compilation. This article looks at some interesting aspects of Groovy’s history and some of the significant guiding principles which help keep it a vibrant open source project.

        • The Conventions of Contributing to Open Source

          We all love using open source, right? I have done my fair share of contributing to open source, mainly through small contributions here and there. I’ve tried to open source some libraries in the past, with varying levels of success and failure. I would say I am somewhere in the middle on the Contributor’s Spectrum. There are those that do much more and those that do much less.

        • How Open Sourcing Bootstrap Made It Huge

          Teaching and learning from each other and building awesome stuff as a result of open communication and collaboration lie at the heart of the open source philosophy. Bootstrap certainly stands out as one of the most successful instances of the open source approach, which has made it what it is today.

        • Love the Amazon Echo? Meet these 3 open source projects

          But where does open source fit into the picture? Is voice-controlled, connected future destined to be forever dominated by a few proprietary choices of custom-built hardware/software combinations that are essentially black boxes to their users? We hope not!

          In fact, there are a few open source tools for voice control out there already, and it wouldn’t surprise me if the field grows as the technology becomes more pervasive. Looking for a weekend project? Check out a few of these options.

        • FreeDOS 1.2 Release Candidate 2

          We started FreeDOS in 1994 to create a free and open source version of DOS that anyone could use. We’ve been slow to make new releases, but DOS isn’t exactly a moving target anymore. New versions of FreeDOS are mostly about updating the software and making FreeDOS more modern. We made our first Alpha release in 1994, and our first Beta in 1998. In 2006, we finally released FreeDOS 1.0, and updated to FreeDOS 1.1 in 2012. And all these years later, it’s exciting to see so many people using FreeDOS in 2016.

        • FreeDOS 1.2 RC2 Arrives, Still Evolving After 22 Years

          The second release candidate of FreeDOS 1.2 is now available, approximately one month after FreeDOS 1.2-RC1 and twenty-two years after the FreeDOS open-source project began.

        • 10 holiday gift ideas for open source enthusiasts

          It’s that time of year again! Our amazing community members shared some of their favorite open-source-related products and gifts with us, and we’ve pulled together some of the best for our annual holiday gift guide.

          Kick off the holiday shopping season by checking out these 10 great gifts for open source enthusiasts. While you’re at it, don’t forget to enter our Holiday Gift Guide Giveaway for a chance to win your very own LulzBot Mini 3D printer.

        • Oracle/Java/LibreOffice

          • LibreOffice contributor interview: Leif Lodahl

            Until September 1st I was working as project manager and business developer in the company Magenta. From September 1st I’m working as IT architect at City of Ballerup (Ballerup Municipality). My work for (and with) LibreOffice has, until recently, been both professional and in my spare time.

        • Pseudo-Open Source (Openwashing)

        • Openness/Sharing/Collaboration

        Leftovers

        • Huge fire hits Manchester’s Chinatown

          Fire has ripped through a building in Manchester’s Chinatown, yards from the quarter’s imperial arch.

          The huge blaze began at about 2.15am and threatened to cause disruption as shoppers head out to grab Black Friday deals.

          A fleet of fire engines sent to tackle the flames illuminated the decorative gateway at the peak of the blaze and blocked city centre roads.

        • Fire breaks out in Manchester Chinatown

          The blaze began at about 02:15 GMT at a building on Nicholas Street and lit up the Chinatown arch at its peak, Greater Manchester Fire and Rescue said.

        • Security

          • Hackers attack European Commission

            The European Commission was the victim of a “large scale” cyberattack Thursday, a spokesperson said.

            “The attack has so far been successfully stopped with no interruption of service, although connection speeds have been affected for a time. No data breach has occurred,” the spokesperson said.

          • 8 Books Security Pros Should Read

            Calling all infosec pros: What are the best books in your security library?

            On a second thought, let’s take a step back. A better question may be: Do you have a security library at all? If not, why?

            Security professionals have countless blogs, videos, and podcasts to stay updated on rapidly changing news and trends. Books, on the other hand, are valuable resources for diving into a specific area of security to build knowledge and broaden your expertise.

            Because the security industry is so complex, it’s impossible to cram everything there is to know in a single tome. Authors generally focus their works on single topics including cryptography, network security modeling, and security assessment.

            Consider one of the reads on this list of recommendations, Threat Modeling: Designing for Security. This book is based on the idea that while all security pros model threats, few have developed expertise in the area.

          • DoD Opens .Mil to Legal Hacking, Within Limits

            Security researchers are often reluctant to report programming flaws or security holes they’ve stumbled upon for fear that the vulnerable organization might instead decide to shoot the messenger and pursue hacking charges.

            But on Nov. 21, the DoD sought to clear up any ambiguity on that front for the military’s substantial online presence, creating both a centralized place to report cybersecurity flaws across the dot-mil space as well as a legal safe harbor (and the prospect of public recognition) for researchers who abide by a few ground rules.

          • Data breach law ‘will create corporate awareness’

            The introduction of a data breach law requiring disclosure of consumer data leaks is important because it will make big corporates aware they need to be transparent about their state of security, the head of a big cyber-security firm says.

            Guy Eilon, the country manager of Forcepoint, was commenting on the speech made by Dan Tehan, the minister assisting the prime minister on cyber security, on Wednesday.

          • US Navy breach: 130,000 soldiers at risk after HPE contractor hacked [iophk: "MS, possibly MS sharepoint?"]

            The Navy has acknowledged the breach and said it was made aware of the incident after being notified that a laptop belonging to an employee of Navy contractor Hewlett-Packard Enterprise (HPE) was compromised by hackers.

          • US Navy warns 134,000 sailors of data breach after HPE laptop is compromised

            Sailors whose details have been compromised are being notified by phone, letter, and e-mail, the Navy said. “For those affected by this incident, the Navy is working to provide further details on what happened, and is reviewing credit monitoring service options for affected sailors.”

          • Personal data for more than 130,000 sailors stolen, admits US Navy

            A spokesman for Hewlett Packard Enterprise Services, said: “This event has been reported to the Navy and because this is an ongoing investigation, HPE will not be commenting further out of respect for the privacy of our Navy personnel.”

          • Riseup’s Canary Has Died

            Popular provider of web tools for activists and anarchists and backbone of much infrastructure for internet freedom, Riseup.net has almost certainly been issued a gag order by the US government.

        • Defence/Aggression

          • Haifa fires: Tens of thousands of Israelis flee city

            Tens of thousands of Israelis have been fleeing wildfires in the northern city of Haifa, with the prime minister warning that any proof of arson would be treated as “terrorism”.

          • Israel fires: Tens of thousands flee as fires hit Haifa

            “Every fire that was the result of arson or incitement to arson is terror in every way and we’ll treat it as such,” he was quoted by Haaretz newspaper as saying.

            “Anyone who tries to burn parts of the state of Israel will be severely punished.”

            Police chief Roni Alsheich said that if fires had been started deliberately it was “safe to assume… it is politically-motivated”.

          • Haifa fire overcome but others rage elsewhere in Israel

            Israeli firefighters on Friday reined in a blaze that had spread across the country’s third-largest city of Haifa and forced tens of thousands of people to flee their homes, but continued to battle more than a dozen other fires around the country for the fourth day in a row.

            Some 60,000 have yet to return to their homes as police forces and firefighting units were still heavily deployed in the Haifa area for fear that the fire could be reignited due to the rare dry, windy weather.

            Though no serious injuries were caused, several dozen people were hospitalized for smoke inhalation. Hundreds of homes were damaged and in a rare move, Israel on Thursday called up military reservists to join overstretched police and firefighters and made use of an international fleet of firefighting aircraft sent by several countries.
            Firefighters work in Haifa, Israel, Thursday, Nov. 24, 2016. A raging wildfire ripped through parts of Israel’s third-largest city on Thursday, forcing tens …

          • One by One, ISIS Social Media Experts Are Killed as Result of F.B.I. Program

            In the summer of 2015, armed American drones over eastern Syria stalked Junaid Hussain, an influential hacker and recruiter for the Islamic State.

            For weeks, Mr. Hussain was careful to keep his young stepson by his side, and the drones held their fire. But late one night, Mr. Hussain left an internet cafe alone, and minutes later a Hellfire missile killed him as he walked between two buildings in Raqqa, Syria, the Islamic State’s de facto capital.

          • Arms Sales To Saudi Arabia: The Kingdom Hires A Powerful Former Lawmaker To Lobby Trump White House And Congress

            Saudi Arabia just added another heavyweight to its already formidable team of lobbyists: former California Rep. Howard “Buck” McKeon. The longtime GOP lawmaker isn’t any ordinary lobbyist. Between 2011 and 2015, he was the chair of the powerful House Armed Services Committee, which oversees the Department of Defense and its multibillion dollar foreign-military sales program to Saudi Arabia. According to data from the Center for Responsive politics, McKeon was among the top five recipients of defense contractor money in the U.S. House of Representatives.

          • UK rejects MPs’ calls to stop arms sales to Saudis

            The UK government has rejected calls by lawmakers to temporarily stop arms sales to Saudi Arabia over the Kingdom’s war crimes in Yemen.

            Britain has signed off £3.3 billion in arms sales to Saudi Arabia since March 26, 2015, when it launched a war in Yemen in order to undermine the Houthi Ansarullah movement and restore power to Saudi-backed former President Abd Rabbuh Mansur Hadi.

        • Transparency/Investigative Reporting

          • London Calling: When Sweden Finally Questioned Assange

            On Tuesday 15 Sweden undertook questioning of Assange, the session lasting until the late afternoon. With a new statement provided by Assange and Sweden developing their enquiries based on the information Julian has given, in full cooperation, it is unclear at this point if the Preliminary Investigation has concluded or whether further visits from Sweden are planned. Pressure should be applied to the Swedish prosecutors to act swiftly in either scenario. It should be remembered the the initial investigation of the allegation against Assange was closed by the Stockholm area prosecutor in just 5 days on the basis “that evidence did not disclose any offence”. It is imperative that Ny either makes a formal charge or closes the investigation without further delay.

          • WikiLeaks releases The Yemen Files.

            The Yemen Files are a collection of over 500 documents from the United States embassy in Sana’a, Yemen. Comprising of over 200 emails and 300 PDFs, the collection details official documents and correspondence pertaining to the Office for Military Cooperation (OMC) located at the US embassy. The collection spans the period from 2009 until just before the war in Yemen broke out in earnest during March 2015. This time covers both Hillary Clinton’s term as Secretary of State (2009-2013) and the first two years of Secretary John Kerry.

          • WikiLeaks Releases Documents Evidencing US Arming Yemeni Forces Ahead of War

            WikiLeaks released on Friday more than 500 documents from the United States embassy in Yemen, offering documentary evidence of Washington arming, training and funding of Yemeni forces ahead of the war.

        • Environment/Energy/Wildlife/Nature

          • Finland set to become first country to ban coal use for energy

            Finland could become the first country to ditch coal for good. As part of a new energy and climate strategy due to be announced tomorrow, the government is considering banning the burning of coal for energy by 2030.

            “Basically, coal would disappear from the Finnish market,” says Peter Lund, a researcher at Aalto University, and chair of the energy programme at the European Academies’ Science Advisory Council.

            The groundwork for the ban already seems to be in place. Coal use has been steadily declining in Finland since 2011, and the nation heavily invested in renewable energy in 2012, leading to a near doubling of wind power capacity the following year. It also poured a further €80 million into renewable power this past February.

          • Arctic ice melt could trigger uncontrollable climate change at global level

            Arctic scientists have warned that the increasingly rapid melting of the ice cap risks triggering 19 “tipping points” in the region that could have catastrophic consequences around the globe.

            The Arctic Resilience Report found that the effects of Arctic warming could be felt as far away as the Indian Ocean, in a stark warning that changes in the region could cause uncontrollable climate change at a global level.

            Temperatures in the Arctic are currently about 20C above what would be expected for the time of year, which scientists describe as “off the charts”. Sea ice is at the lowest extent ever recorded for the time of year.

            “The warning signals are getting louder,” said Marcus Carson of the Stockholm Environment Institute and one of the lead authors of the report. “[These developments] also make the potential for triggering [tipping points] and feedback loops much larger.”

        • Finance

          • Kela’s outgoing director general voices support for basic income

            Liisa Hyssälä, the director general at the Social Insurance Institution of Finland (Kela), has reiterated her concerns about the sustainability of the country’s social security system.

            “Our basic social security system is a patchwork and we cannot afford the constantly rising social security costs. Various benefits should be brought together into larger wholes both for the sake of customers and for the sake of sensible administration and the public economy,” she writes in a blog on Sosiaalivakuutus.fi.

          • 5 Things to Know about Billionaire Betsy DeVos, Trump Education Choice

            Billionaire Betsy DeVos, a major GOP funder and party activist from Michigan, has been tapped by Donald Trump to become the Secretary of the U.S. Department of Education next year.

            Many have decried the choice as a looming disaster for public schools in America, with NEA president Lily Eskelsen Garcia observing that DeVos’ “efforts over the years have done more to undermine public education than support students. She has lobbied for failed schemes, like vouchers–which take away funding and local control from our public schools–to fund private schools at taxpayers’ expense.”

            Randi Weingarten, the president of AFT, stated that “Betsy DeVos is everything Donald Trump said is wrong in America–an ultra-wealthy heiress who uses her money to game the system and push a special-interest agenda that is opposed by the majority of voters. Installing her in the Department of Education is the opposite of Trump’s promise to drain the swamp.”

        • AstroTurf/Lobbying/Politics

          • Emails: CIA Official Reviewed Parts of Times Reporter’s Book Before Publication

            New York Times reporter David Sanger worked extensively with former deputy CIA director Michael Morell during the reporting of his book Confront and Conceal: Obama’s Secret Wars and Surprising Use of American Power—even arranging to provide Morell with access to an entire unpublished chapter for his review—according to documents obtained by Gizmodo.

            The records, consisting of internal emails from the CIA press office, show that Sanger met with Morell on more than one occasion in 2012 to discuss his then-forthcoming book, promising to bring with him a full chapter for Morell to read in case “he has issues” with the reporting. The emails, which we received under the Freedom of Information Act, are redacted in a manner suggesting that Morell and Sanger discussed sensitive national security information, and show that on at least one occasion, a CIA public affairs officer sent Sanger an encrypted message via email.

            While the notion of a national security reporter meeting with a senior CIA official is obviously not unusual—such transactions are in the reporter’s job description, and Sanger’s book acknowledges that he withheld information at the request of government officials—the extent of Sanger’s collaboration with Morell and the fact that the men apparently discussed sensitive information is noteworthy in light of the Obama administration’s unprecedented campaign against government leakers.

          • How long before the white working class realizes Trump was just scamming them?

            While we’re still analyzing the election results and debating the importance of different factors to the final outcome, everyone agrees that white working class voters played a key part in Donald Trump’s victory, in some cases by switching their votes and in some cases by turning out when they had been nonvoters before.

          • Washington Republican proposes charging protestors with ‘economic terrorism’

            The proposed bill would make protesting a class C felony should it cause any sort of “economic disruption” or “jeopardize human life and property.” Such a proposal would mean violators could face five years in prison, a $10,000 fine or both.

            Any group who organizes a protest that is considered disruptive would also be charged with “economic terrorism.” The law would not apply to strikes or picketing.

            The bill is aimed at protests in the Pacific Northwest, often by environmental activists, that are aimed at shutting down commerce and transportation.

            Protesters in Olympia, Wash., recently camped out for more than a week on railway tracks to stop a shipment of sand used for fracking.

            The bill is also being proposed at a time when anti-Trump protests are taking place across the country, including in Washington. Protests in Seattle have been reported to be peaceful and nonviolent so far.

          • Australia ceases multimillion-dollar donations to controversial Clinton family charities

            AUSTRALIA has finally ceased pouring millions of dollars into accounts linked to Hillary Clinton’s charities.

            Which begs the question: Why were we donating to them in the first place?

            The federal government confirmed to news.com.au it has not renewed any of its partnerships with the scandal-plagued Clinton Foundation, effectively ending 10 years of taxpayer-funded contributions worth more than $88 million.

            The Clinton Foundation has a rocky past. It was described as “a slush fund”, is still at the centre of an FBI investigation and was revealed to have spent more than $50 million on travel.

            Despite that, the official website for the charity shows contributions from both AUSAID and the Commonwealth of Australia, each worth between $10 million and $25 million.

          • By the Numbers: The Recount Scenarios (It is a Long Shot)

            Green Party candidate Jill Stein (Disclosure: I voted for Stein) is calling for a recount in key states, and has raised some $3 million for that purpose. Her funding page estimates the total cost, including lawyers, will be $6-7 million.

          • Trump’s team of gazillionaires

            Donald Trump campaigned as a champion of the “forgotten man” and won the White House on the strength of his support among the white working class.

            So far, he’s stacking his administration with masters of the universe.

            Beyond Trump himself, who claims a net worth of more than $10 billion, the president-elect has tapped businesswoman Betsy DeVos, whose family is worth $5.1 billion, and is said to be considering oil mogul Harold Hamm ($15.3 billion), investor Wilbur Ross ($2.9 billion), private equity investor Mitt Romney ($250 million at last count), hedge fund magnate Steve Mnuchin (at least $46 million), and super-lawyer Rudy Giuliani (estimated to be worth tens of millions of dollars) to round out his administration. And Trump’s likely choice for deputy commerce secretary, Todd Ricketts, comes from the billionaire family that owns the Chicago Cubs.

            Even retired neurosurgeon Ben Carson, who’s up for the job of secretary of housing and urban development, has an estimated fortune of $26 million, while White House adviser Steve Bannon has likely earned millions off his stake in the show “Seinfeld” alone. Andrew Puzder, a possible labor secretary, is no slouch, either — he made more than $4.4 million in 2012 as CEO of the holding company that owns restaurant chains Hardee’s and Carl’s Jr.

          • Jill Stein raises over $4.5m to request US election recounts in battleground states

            Jill Stein, the Green party’s presidential candidate, is preparing to request recounts of the election result in several key battleground states.

            Stein launched an online fundraising page seeking donations toward a multimillion-dollar fund she said was needed to request reviews of the results in Michigan, Pennsylvania and Wisconsin.

            The drive has already raised more than $4.5m, which the campaign said would enable it to file for recounts in Wisconsin on Friday and Pennsylvania on Monday.
            Hillary Clinton urged to call for election vote recount in battleground states
            Read more

            The fundraising page said it expected to need around $6m-7m to challenge the results in all three states.

          • Jill Stein asks for another $2.5 million after reaching goal to fund election recounts in two states

            Jill Stein has now crowdfunded more than $4.5 million to cover the costs of election recounts in Wisconsin and Pennsylvania. The Green Party presidential candidate has since upped her requested total to $7 million, a figure that she says would also cover a recount in Michigan, a hotly contested battleground state where “statistical anomalies” in voting were identified.

          • Campaign: Stein raises millions for recount effort

            Green Party presidential nominee Jill Stein raised more than $4 million over two days to fund recount efforts in three states.

            Donations had nearly reached her campaign’s $4.5 million goal by late Thanksgiving evening, according to a fundraising page on her web site.

            “Congratulations on meeting the recount costs for Wisconsin. Raising money to pay for the first round so quickly is a miraculous feat and a tribute to the power of grassroots organizing,” her campaign said.

            “Now that we have nearly completed funding Wisconsin’s recount (which is due on Friday), we can begin to tackle the funding for Michigan’s recount (due Monday) and Pennsylvania’s recount (due Wednesday).”

            Stein said Wednesday that many Americans are wondering if the election results were reliable after a “divisive and painful” race and reported hacks into voter and party databases and individual email accounts.

            [...]

            The total cost of the effort in the three states could be as high as $7 million, her campaign said, including attorney fees and recount observers.

            A group of election lawyers and researchers are urging Hillary Clinton to ask for a recount in Wisconsin, Michigan and Pennsylvania, claiming that they found evidence that voting machines had been tampered with.

          • Jill Stein campaign to recount key states in US election reaches $2.5m target

            A campaign launched by the Green Party candidate Jill Stein to recount key states in the US election has reached its initial funding target of $2.5m (£2m) in just a matter of hours.

            The money will allow Ms Stein to review the results in Wisconsin, Michigan and Pennsylvania, where concerns have been raised about irregularities with electronic voting results.

            Each of the states voted narrowly in favour of Donald Trump (though the final Michigan count is still to be confirmed), and carry enough electoral college votes between them to change the result of the election if all were redeclared for Hillary Clinton.

          • Donald Trump’s Argentinian tower suddenly gets the green light to proceed

            Only three days after Argentina’s President Mauricio Macri called President-elect Donald Trump to congratulate him on his upset victory, it was announced that construction on a long held-up project for a Trump tower in Buenos Aires would proceed.

            As Quartz reported on Wednesday, Trump’s associates at YY Development Group in Buenos Aires told La Nacion, one of Argentina’s most influential conservative newspapers, that construction on the tower would be going ahead. La Nacion also reported that the initial call between Trump and Macri (who have been friends since the 1980s) was arranged due to efforts made by foreign minister Susanna Malcorra to get in touch with Trump’s son Eric through Felipe Yaryura, an Argentine businessman who is friends with Trump and was present to celebrate when he discovered that Trump had been elected. Eric Trump reportedly then put Malcorra in touch with Trump’s foreign affairs team.

            As Quartz also notes, Malcorra avoided answering a question posed by a reporter about whether she knew Yaryura and used him to get Macri in touch with Trump. Similarly, a spokeswoman from YY Development refused to comment to Quartz about any of these questions because “they have already had too much media exposure.”

        • Censorship/Free Speech

          • The CEO of Reddit confessed to modifying posts from Trump supporters after they wouldn’t stop sending him expletives

            Reddit CEO Steve Huffman has confessed to modifying the posts of some users on the most visible Donald Trump-supporting “subreddit” community after they repeatedly slung verbal abuse in his direction.

            The story begins earlier this week, when The New York Times published a report on Comet Ping Pong, a Washington DC pizza place that a false news item on social media had pegged as the center of a child-abuse ring run by Hillary Clinton and her campaign head John Podesta, despite a lack of any evidence.

            Following that report, Reddit took steps to shut down the “r/Pizzagate” subreddit community, which had the stated goal of proving the existence of a conspiracy centering on Comet Ping Pong. “We don’t want witchhunts on our site,” says the warning that replaced the Pizzagate page on Reddit.

          • Reddit CEO admits to editing user comments amid Pizzagate malarkey

            Steve Huffman, CEO of Reddit, today admitted to editing several comments that criticised him on the site.

            He made the admission on Reddit, where he posts under the username Spez.

            Huffman got a lot of flak from members of the The_Donald, a subreddit for supporters of President-elect Donald Trump, after Reddit banned the Pizzagate subreddit. Pizzagate was dedicated to a debunked conspiracy theory linking Hillary Clinton to a paedophile ring.

            In response, he edited comments reading “fuck Spez” to instead be directed at moderators of the The_Donald subreddit.

        • Privacy/Surveillance

          • Bill Binney: New UK spying law is going to kill people, ex-NSA technical director and whistleblower warns

            Britain’s new spying laws could kill people, the ex-technical director of the NSA has warned.

            Pursuing a strategy of allowing spies to look in on everything that everyone says “costs lives, and has cost lives in Britain because it inundates analysts with too much data”, Bill Binney has warned UK MPs who are scrutinising the Investigatory Powers Bill.

            The bill, also known as the Snoopers’ Charter, is set to be passed by parliament early this year and will bring with it huge and unprecedented spying powers for UK intelligence agencies and the government. But it has been criticised by privacy campaigners and technology companies who argue that it will put lives in danger.

            “It is 99 per cent useless,” Mr Binney said in a letter sent to MPs. “Who wants to know everyone who has ever looked at Google or the BBC? We have known for decades that that swamps analysts.”

          • Microsoft Shares Telemetry Data Collected from Windows 10 Users with 3rd-Party
          • Microsoft is reportedly sharing Windows 10 telemetry data with third-parties

            MICROSOFT HAS REPORTEDLY signed a deal with FireEye that will see it share telemetry data from Windows 10 with the third-party security outfit.

            So says Australian website ARN, which reports that Microsoft and FireEye’s partnership, which will see the security firm’s iSIGHT Intelligence tools baked into Windows Defender, will also see FireEye “gain access to telemetry from every device running Windows 10.”

            Microsoft uses telemetry data from Windows 10 to help identify security issues, to fix problems and to help improve the quality of its operating system, which sounds like a good thing. However, with the company previously admitting that it’s latest OS is harvesting more data than any version before it, Microsoft’s mega data-slurp also raised some privacy concerns.

          • The opportunity cost of mass surveillance is lost innovation and jobs

            Surveillance kills jobs and drives investment and innovation elsewhere. Lost among the common talking points of liberty, human rights, and Big Brother, there’s a much more economic effect when you force people to conform to a gray mass: you lose the radicals and the free thinkers, those who innovate and build the next generation of industries and jobs. Politicians care a lot more about that than about a theoretic concept of liberty.

            An opportunity cost is the cost you pay for not realizing the alternative you didn’t choose. When you choose a pizza, your opportunity cost is not having the hamburger. When you choose a bus ride because it’s cheaper, the opportunity cost is the time you’d save by taking a taxi. When you choose a cheap supplier of goods, your opportunity cost is low quality and more maintenance. And so on.

          • NSA Head Meets With Trump Team But Doesn’t Give Obama A Heads Up

            David Greene talks to Foreign Policy columnist James Bamford about the future of NSA Director Admiral Mike Rogers, whose tenure has been rocked by cyber-security breaches of classified material.

          • Lawmakers decry possible removal of NSA director, call for hearings

            Several key GOP members of Congress began to weigh in this weekend with strong disapproval over suggestions that Adm. Michael Rogers, the director of the National Security Agency and commander of U.S. Cyber Command, may be fired during the final weeks of the Obama administration.

        • Civil Rights/Policing

          • Dutch race hate row engulfs presenter Sylvana Simons

            The images of a black Dutch TV presenter’s face super-imposed on the hanged bodies of victims of a lynching are too nauseating to look at. And yet a video featuring the mocked-up pictures has been widely circulated online here.

            Sylvana Simons has for years been a familiar presence on Dutch TV and radio, and the attack on her has highlighted a debate bubbling inside the Netherlands far removed from its reputation as a liberal tolerant nation.

            A former presenter on talent show Dancing with the Stars, she recently joined the political party “Denk” (Think) and is running in the next election.

          • Bad Santa: German town sacks Father Christmas over alleged far-right support

            A town in Germany has sacked Santa Claus over alleged links to a far-Right movement.

            Peter Mück has dressed as Santa and distributed sweets to children at the annual Christmas market in the Bavarian town of Mühldorf for 30 years.

            But this year the Christmas market opened without him after the mayor of Mühldorf announced that he had been fired.

            Mr Mück was dismissed over comments he wrote on Facebook in support of a post by the far-Right “Identitarian Movement”, which campaigns against immigration and Islam, and has been accused of open racism.

          • Two Saudi Women Sentenced to 20 Lashes for Using ‘Obscene Words’ on WhatsApp

            One of the young women came to the Criminal Court in Jeddah and accused the other of using abusive expressions during their WhatsApp conversation. She then showed her phone at the Court’s request to prove her words.

            During the next session, the court confirmed that the woman had indeed sent obscene messages to the other, but the defendant said she was not the first to start the hassle and showed a message which she received from her counterpart two months ago.

          • #NoLove4USGov – An extradition too far

            Amber Rudd has signed Lauri Love’s extradition order despite huge public uproar, opposition both inside and outside her own party, inside and outside of government and a previous home secretary, now Prime Minister blocking an extradition with almost exactly the same conditions. Lauri is unlikely to meet justice in America, in his case the most likely outcome is jail without a trial.

            Naomi Colvin of Courage Foundation has previously said:

            “Judge Tempia’s ruling on Friday shows that the legal changes Theresa May introduced after she blocked Gary McKinnon’s extradition are not fit for purpose.”

            David A Elston Pirate Party Spokesperson said:

            “Clearly the US is not interested in justice and our own government is unwilling to stand up for our civil liberties.

            “Instead through extradition the USA is seeking to silence and lock up Love. Knowing this was blocked before, this clear failure of our government is a chosen path. The forum bar does not work as this is precisely the kind of scenario it was meant to prevent. More importantly they have failed Lauri and through the ruling on him, our civil liberties and our rights, our right to a fair trial has taken a heavy hit.

          • All residents in China’s restive Xinjiang region must hand in passports to police: media

            All residents in China’s restive region of Xinjiang must hand in their passports to local police stations for “examination and management”, the Global Times newspaper said on Thursday.

            “Anyone who needs the passport must apply to the police station,” an anonymous police officer in Aksu prefecture told the paper, adding that the policy had been implemented throughout Xinjiang.

        • Internet Policy/Net Neutrality

          • Forget Net Neutrality, Trump FCC Advisor Wants to Kill the FCC Itself

            Under President Donald Trump, the US government’s policy protecting net neutrality, the principle that all internet content should be equally accessible to consumers, is likely to be rolled back, according to tech policy experts.

            But that shift, as important as it would be, may be just the beginning of the changes in store for the Federal Communications Commission under Trump’s administration. In fact, the nation’s top communications regulator itself may look very different than it does today.

            Like, very different. As in, practically non-existent.

        • Intellectual Monopolies

          • Trademarks

            • Iceland (the country) is actually suing Iceland (the shop)

              The island nation of Iceland has said it is taking legal action against British frozen-food chain Iceland over the right to use their shared name.

              Iceland’s Ministry of Foreign Affairs said it has challenged Iceland Foods at the European Union Intellectual Property Office. It says it is acting because the retail chain “aggressively pursued” Icelandic companies using the word Iceland in their branding.

              Iceland Foods holds a Europe-wide trademark registration for the word “Iceland,” and the Nordic country’s government said it was “exceptionally broad and ambiguous in definition.”

          • Copyrights

        ]]>
        http://techrights.org/2016/11/25/games-sales/feed/ 0
        Links 21/11/2016: New Linux RC, Zorin OS 12 Receives a Lot of Press Coverage http://techrights.org/2016/11/21/zorin-os-12-coverage/ http://techrights.org/2016/11/21/zorin-os-12-coverage/#comments Mon, 21 Nov 2016 17:29:16 +0000 http://techrights.org/?p=96918

        GNOME bluefish

        Contents

        GNU/Linux

        Free Software/Open Source

        • In memoriam: Pieter Hintjens

          Former FFII President, erstwhile OFE collaborator, and personal friend, Pieter Hintjens, passed away last month at the age of 53. Pieter was a programmer, an influential thinker, and a prolific writer who inspired many. While we did not always agree, I always appreciated the intelligence and passion he brought to everything he did. He will be much missed.

        • Best open source management tools

          Open source software provides an attractive alternative to more costly commercial products, but can open source products deliver enterprise-grade results? To answer this question we tested four open source products: OpenNMS, Pandora FMS, NetXMS and Zabbix. All four products were surprisingly good. We liked Pandora FMS for its ease of installation and modern user interface. In general, we found configuration to be easier and more intuitive with Pandora than the other contenders. NetXMS came in a close second with a nice user interface, easy to configure rules and a solid user manual. Overall, we found all four products suitable for enterprise use, particularly in small-to-midsize environments

        • Pandora FMS wins open-source management shootout

          Doing more with less remains an ongoing challenge for IT execs. Making sure everything keeps humming along to meet service-level agreements can be challenging for resource-stretched IT departments. For all but the smallest shops, effective monitoring requires tools that provide a meta view of the entire infrastructure with drill-down capabilities.

        • 4 ways to open up your project’s infrastructure

          Open source isn’t just about opening up your code—it’s also about building a supporting infrastructure that invites people to contribute. In order to create a vibrant, growing, and exciting project, the community needs to be able to participate in the governance, the documentation, the code, and the actual structures that keep the project alive. If the overall “hive” is doing well, it attracts more individuals with diverse skills to the project.

        • Minoca, it’s ‘another’ lightweight OS for IoT

          New on the scene is recent times is Minoca OS, a general purpose open source operating system written specifically to conserve power, storage and memory.

        • Events/Outreachy

          • Speak at The Linux Foundation’s Invite-Only Open Source Leadership Summit

            The Linux Foundation Open Source Leadership Summit (formerly known as Collaboration Summit) is where the world’s thought leaders in open source software and collaborative development convene to share best practices and learn how to create and advance the open source infrastructure that runs our lives.

            The Linux Foundation is now seeking executives, business and technical leaders, open source program office leaders, and open source foundation and project leaders to share your knowledge, best practices and strategies with fellow leaders at OSLS, to be held Feb. 14-16, 2017, in Lake Tahoe, CA.

          • LLVM Developer Meeting 2016 Videos Posted

            The videos from the LLVM Developer Meeting 2016 conference that took place at the beginning of November are now online.

          • Outreachy Winter 2016 Projects/Participants Announced

            The accepted participants and their projects for the Outreachy Winter 2016 session were announced earlier this month for helping females and other under-represented groups engage in free software development.

        • SaaS/Back End

        • Pseudo-Open Source (Openwashing)

        • Funding

          • Early Stage Startup Heptio Aims to Make Kubernetes Friendly

            Two Former Google staffers the built the original Google Compute Engine and helped to create Kubernetes are launching their own company to fill a perceived gap in the container orchestration market.

            Heptio was officially announced on Nov. 17, as yet another company in the ever-growing landscape of vendors aiming to support the open-source Kubernetes container orchestration system. Heptio is noteworthy in that it was recently founded and led by the same two Google staffers, Craig McLuckie and Joe Beda, that originally created Kubernetes in the first place.

        • Standards/Consortia

          • GLobjects 1.0.0 Released For OpenGL Aide

            GLobjects 1.0.0 has been released as an open-source library designed to make OpenGL usage “modern, less cluttered, and less error-prone.”

            GLobjects 1.0 is derived from glbinding and OpenGL Mathematics and provides a object-oriented C++-based interface.

        Leftovers

        • Security

          • Linux versus Unix hot patching

            There has always been a debate about how close Linux can get to the real operating system (OS), the core proprietary Unix variants that for two decades defined the limits of non-mainframe scalability and reliability.

            But times are changing, and the new narrative may be when will Unix catch up to Linux on critical reliability, availability, and serviceability (RAS) features such as hot patching?

            Hot patching, the ability to apply updates to the OS kernel while it is running, is a long sought-after but elusive feature of a production OS.

            It is sought after because both developers and operations teams recognise that bringing down an OS instance that is doing critical high-volume work is at best disruptive and at worst a logistical nightmare. Its level of difficulty also makes it somewhat elusive.

            There have been several failed attempts and implementations that almost worked, but they were so fraught with exceptions that they were not really useful in production.

          • Can I interest you in talking about Security?
        • Defence/Aggression

          • US Implicated in Targeting Yemeni Civilians

            Since March 2015, Yemen has been ravaged by armed conflict between the incumbent administration headed by President Abdrahbuh Mansour and the religious-political Houthi insurgency, sometimes linked to terrorist organization Al-Qaeda. The US had prioritized its anti-terrorism efforts in the Middle East following the rise of Musab al-Zarqawi (the founder of ISIS). But, in becoming preoccupied with hunts for other high-profile terrorist targets, the US let the internal socio-political state of Yemen fall to the wayside. To make up for past neglect, the Obama administration began backing Yemen’s Mansour administration and implementing “strategic” bombings. Today, Yemen is neck deep in a war they did not ask for, facing an enemy that is not identifiable.

            On August 15, 2016, “Abs Hospital, located in the country’s Hajjah governorate and supported by the international medical charity, was hit at 3:45 p.m. local time.” According to a statement released by Doctors Without Borders (Médecins Sans Frontières [MSF]), nine individuals were killed on impact, including an MSF volunteer. Teresa Sancristóval, the MSF emergency program manager, claims that all military authorities were well informed regarding the GPS coordinates of the humanitarian hospital site, but failed to acknowledge it when planning the strike. There is still no information released on behalf of who was targeted by the strike.

          • 9/11, Permanent War, and the Transnational Capitalist Class

            Globalization of trade and central banking has empowered private corporations to positions of power and control never before seen in human history. Under advanced capitalism, the structural demands for a return on investment require an unending expansion of centralized capital in the hands of fewer and fewer people. The financial center of global capitalism is so highly concentrated that less than a few thousand people dominate and control some $100 trillion dollars of wealth.

          • Could David Petraeus, Rumored Candidate for Secretary of State, Get a Security Clearance?

            After months of criticizing Hillary Clinton for mishandling classified information while serving as secretary of state, Donald Trump is reportedly considering David Petraeus for the same job, even though the four-star general and former CIA director pled guilty to passing classified information to his former lover and biographer.

            The Guardian reported on Thursday that Petraeus is in the running for secretary of state in the Trump administration. The anonymously sourced report could not be confirmed, but Petraeus reportedly met with Trump just before the election, and has since been complimentary about the president elect.

            On German cable news, Petraeus called Trump a “dealmaker,” and said, “He’s right to criticize Washington over its partisanship and its inability to forge compromises.”

            Petraeus resigned as CIA director in 2012 after the FBI discovered he was having an affair with Paula Broadwell, his biographer. The resulting investigation revealed that he had given her highly classified information, and Justice Department prosecutors wanted to indict Petraeus on felony charges.

            According to his 2015 plea deal, Petraeus intentionally gave Broadwell access to eight “Black Books” filled with highly classified information, including “the identities of covert officers, war strategy, intelligence capabilities and mechanisms, diplomatic discussions,” and even Petraeus’s conversations with the president. He also admitted that he had misled the FBI during the investigation.

          • THE COMING WAR ON CHINA – A NEW PILGER FILM FOR TV AND CINEMA

            John Pilger’s new film – The Coming War on China – will be in UK cinemas from Monday 5 December 2016 and on ITV at 10.35pm on Tuesday 6 December.

          • British Navy fires warning shots at Spanish vessel off Gibraltar

            The British Navy on Sunday fired flares at a Spanish research vessel after it ignored requests to leave the waters at Gibraltar’s coast and attempts to contact the crew failed, the Guardian reports.

            The boat, operated by Spain’s state Oceanographic Institute, entered the British waters several times within 48 hours, but ignored requests to leave.

            “The Royal Navy challenges all unlawful maritime incursions into British Gibraltar territorial waters. We back this up by making formal diplomatic protests to the Spanish government,” a spokesperson for the ministry of defense told the Guardian.

            Fabian Picardo, Gibraltar’s chief minister, said he was “satisfied” with the tactical decisions taken, AFP reports. Gibraltar says similar “provocative” incidents with Spanish vessels take place in its territorial waters, but it is rare for the Navy to fire flares.

          • Former NSA Director Doesn’t Think Michael Flynn Is Up To The Job

            Former National Security Agency director and CIA director Michael Hayden expressed concern about President-elect Donald Trump’s pick for national security advisor, Michael Flynn, saying Flynn, the former director of the Defense Intelligence Agency, would be “stretched a bit” by his new role.

            “But by and large he’s been successful at the tactical operational level,” Hayden said during an appearance on ABC’s “This Week.” “This is a strategic global job. And so I think he’ll be stretched a bit by this.”

          • A New Documentary Explores the Devastating Effects of Drone Warfare on Victims and Whistleblowers

            On the night of February 21, 2010, a group of families driving a convoy of vehicles through the valleys of Uruzgan Province, Afghanistan came into the sights of a Predator drone crew operating out of Creech Air Force Base in Nevada.

            “That truck would make a beautiful target,” one of the operators says. The crew analyzes the convoy, debating whether children are present. “I really doubt that child call, man. I really fucking hate that shit.”

        • Environment/Energy/Wildlife/Nature

          • Exploring Tidal Marsh Resilience to Sea Level Rise

            The NOAA-sponsored National Estuarine Research Reserve System released a national assessment of tidal marsh resilience in the face of rising sea levels. This assessment establishes a national monitoring baseline for estuarine climate change impacts.

            Using data from the reserve’s system-wide monitoring program, the study was conducted at 16 sites in 13 coastal states. The results indicate that Pacific coast tidal marshes are more resistant to rising seas levels from climate change than marshes in the Atlantic. Of the areas evaluated, one marsh in Narragansett Bay, Rhode Island, and another in Massachusetts’ Waquoit Bay were found to be the most vulnerable.

          • How Important is the Ocean to U.S. Island Territories?

            A new report allows readers to better understand the importance of the ocean to the economies of two U.S. territories in the Caribbean. For people who manage, protect, and make use of the resources in these special places, more accurate economic data about ocean use are key to good decision making. And good decisions will help keep our ocean healthy and resilient—supporting livelihoods for future generations. Shown here: St. John, U.S. Virgin Islands.

          • San Francisco Bay And Outer Coast Sentinel Site Cooperative

            Rush Ranch, part of San Francisco Bay National Estuarine Research Reserve. The tidal marshes at Rush Ranch and nearby China Camp serve as research sites for scientists; classrooms for teachers, land managers and naturalists; and inspiring places for Bay Area residents to visit. Credit: Tom Muehleisen.

            The region is a major urban and economic center and a unique ecological treasure. It is home to over seven million people, and retains some of the largest and most important natural areas along the west coast, including three National Marine Sanctuaries (Greater Farallones, Cordell Bank, and Monterey Bay), the Point Reyes National Seashore, the San Francisco Bay National Estuarine Research Reserve, and the San Francisco Bay National Wildlife Refuge Complex. The estuary serves as a major hub of commerce and supports the most intact Mediterranean-climate wetlands in North America.

            The San Francisco Sentinel Site Cooperative Management Team is currently comprised of representatives from NOAA’s Office for Coastal Management (OCM), the San Francisco Bay Conservation and Development Commission (BCDC), the San Francisco Bay National Estuarine Research Reserve (NERR), NOAA’s Greater Farallones National Marine Sanctuary (GFNMS), and California Sea Grant. The management team guides the development of the Cooperative and assists with engaging partners and linking existing efforts related to our focus areas, and expanding collaborations in the region.

          • Why “Climate Change” Must Become a Promise to Decolonize

            Like the racist policing we witnessed at the Dakota Access pipeline (and have been witnessing throughout the nation), climate change was, as feminist philosopher Chris J. Cuomo reminds us, “manufactured in a crucible of inequality.” Specifically, it is “a product of the industrial and the fossil-fuel eras, historical forces powered by exploitation, colonialism and nearly limitless instrumental use of ‘nature.’”

          • What we choose to resist

            I was standing in a crowded room filled with plaid and free cider. The student-run events space of Oxford Hub buzzed with a collective though rather timid optimism. Standing on a table with a foaming beer in his hand was Achim Steiner, Director of the Oxford Martin School and former Executive Director of the United Nations Environment Programme. He was delivering the first of the celebratory speeches.

            “In terms of global cooperation, the Paris Agreement was perhaps the most vital moment of sanity,” said Steiner. “Paris alone will not save us, but imagine if it had not happened.”

            In his words, the Agreement has forged an opportunity to deal with two key climate issues: legacy and equity. It has created the space to begin tackling the challenges of per-capita and historical CO2 emissions, and disparities such as the impacts of climate change on small island states and developing regions.

            As Steiner continued with his speech, however, he didn’t mince his words. Every syllable carried weight. “I have heard it all before,” he said, when referring to resistance to climate action and energy transitions. “We can’t do it. We don’t have the grid. It will affect our bottom line. It’s not possible. But the shareholders…”

          • English village strives for carbon neutrality

            South of Manchester, Ashton Hayes is a collection of tweed cottages and pretty houses, nestled between green fields and trees. But for the past 10 years, this small village has been showing world leaders how to save the planet.

            “I switched things off, wore more jumpers, changed how I used electricity – for example, I never used it after that for heating water,” says local Kate Harrison, as a way of explaining how she managed to cut her energy consumption by a whopping 60 percent over a short period of time.

            “Eventually I replaced my boiler for a much more efficient one – and just threw myself into the project, really.”

          • ‘Unprecedented’: More than 100 million trees dead in California

            California’s lingering drought has pushed the number of dead trees across the state past 100 million, an ecological event experts are calling dangerous and unprecedented in underlining the heightened risk of wildfires fueled by bone-dry forests.

            In its latest aerial survey released Friday, the U.S. Forest Service said 62 million trees have died this year in California, bringing the six-year total to more than 102 million.

          • Fiji’s Prime Minister Pleads With Trump: ‘Save Us’ From Climate Change

            Fiji’s Prime Minister Frank Bainimarama has pleaded with Donald Trump and the American people to help save his slowly sinking nation. At this year’s global climate talks in Marrakech, he said that climate change was no hoax, and invited the President-elect to come visit Fiji and see the damage first hand.

            Mr. Bainimarama made his remarks on Friday, the last day of this year’s Conference of the Parties, a yearly meeting where UN signatories of the Paris Climate Agreement meet to discuss and plan its implementation.

            The spectre of a Trump administration and what that could mean for the climate agreement hung like a pall over the talks in Marrakech, and Mr. Bainimarama—slated to be president of next year’s meeting—addressed the worry directly on the closing day of the conference. His tiny island nation of Fiji is already under serious pressure from rising seas—a product of climate change.

        • Finance

          • German citizenship is ranked the most valuable in the world

            Not only do Germans have the most powerful passports in the world, they also have the highest quality of citizenship, according to a new report. The consultancy Henley & Partners’ first Quality of Nationality Index (QNI) ranks the value of 161 nations’ citizenship on a scale of 0 to 100%.

          • Sanders, Warren Not ‘Genuine Progressives’–Says Washington Post

            In standard theory, the people in the developing world buy their own stuff, with rich countries like the US providing the financing. It actually did work this way in the 1990s, up until the East Asian financial crisis in 1997. In that period, countries like Malaysia, Vietnam and Indonesia were growing very rapidly while running large trade deficits. This pattern of growth was ended by the terms of the bailout imposed on these countries by the US Treasury Department through the International Monetary Fund.

            The harsh terms of the bailout forced these and other developing countries to reverse the standard textbook path and start running large trade surpluses. This post-bailout period was associated with slower growth for these countries. In other words, the poor of the developing world suffered from the pattern of trade the Post advocates. If they had continued on the pre-bailout path, they would be much richer today. In fact, South Korea and Malaysia would be richer than the United States if they had maintained their pre-bailout growth rate over the last two decades. (This is the topic of the introduction to my new book, Rigged: How Globalization and the Rules of the Modern Economy Were Structured to Make the Rich Richer; it’s free.)

            It is also important to note that the Post is only bothered by forms of protection that might help working-class people. The United States prohibits foreign doctors from practicing in the United States unless they complete a US residency program. (The total number of slots is tightly restricted, with only a small fraction open to foreign-trained doctors.) This is a classic protectionist measure. No serious person can believe that the only way for a person to be a competent doctor is to complete a US residency program. It costs the United States around $100 billion a year ($700 per family) in higher medical expenses. Yet we never hear a word about this or other barriers that protect the most highly paid professionals from the same sort of international competition faced by steelworkers and textile workers.

          • TPP: A Post-Mortem

            The death of the Trans-Pacific Partnership that EFF called last week has since been confirmed by White House officials. This marks the end of a long-running campaign against the secretive agreement that EFF began back in 2012.

            Make no mistake; although the proximate cause of the TPP’s demise was the U.S. Presidential election result, the TPP faced long odds in Congress even if the election had gone the other way. This in turn was due to broad opposition to the agreement from many sectors of society across the political divide, including from members of the digital rights community. So as we survey the fallout from the TPP’s demise, EFF and its supporters are entitled to feel proud of the part we played.

          • NYC Lawmakers Push For Audits of Landlords Who Pocket $1.4 Billion Tax Break

            New York City’s biggest housing subsidy may finally get more scrutiny just as state lawmakers are about to consider a massive expansion of the controversial program.

            The $1.4 billion-a-year program, known as 421-a, is designed to wipe away most of the property taxes owed by real estate developers who agree in return to limit annual rent increases in new apartments they have constructed. For buildings in Manhattan as well as expensive neighborhoods in other boroughs, a certain percentage of units must also be set aside for low-income renters.

          • Federal Court Holds That the Government Can’t Lock Up Immigrants for Being Poor

            Cesar Matias, a gay man, fled to the United States from Honduras more than a decade ago to escape the persecution he suffered because of his sexuality. He worked as a hair stylist and in a clothing factory in Los Angeles and rented a small, one-bedroom apartment.

            In March 2012, immigration agents arrested him; locked him up in the city jail in Santa Ana, California; and put him in deportation proceedings. He applied for asylum, and an immigration judge found him eligible for release while his case was being decided. He then spent the next four years of his life in prison — not because of any crime, but because he couldn’t afford to pay the $3,000 bond set by the judge.

          • For the poor, Texas’ justice system is a maze with no exit

            Dee Arellano had just parked her car in downtown Houston when she was approached by a police officer on horseback. The officer cited her because her vehicle registration had lapsed, a common infraction.

          • A ‘trade war’ is already going on in cyberspace

            After the initial shock-and-awe reaction to the surprise Trump victory, the markets rejoiced last week… a lot.

            “The Dow closed at an all-time high on Thursday, while the S&P and the Nasdaq were flirting with their record highs entering Friday,” reported CNBC.

            Others were less thrilled with the election result. Some experts claimed Trump’s plans to raise tariffs on China, withdraw from NAFTA, and otherwise stop globalization in its tracks would surely set off a trade war and hurt the markets.

            I disagree.

            I think Trump can’t start a trade war because we are already in one. It’s been going on for years, right under our noses… and it’s happening in cyberspace.

          • Economist’s research reveals poverty should be measured by more than income

            Since social scientists and economists began measuring poverty, the definition has never strayed far from a discussion of income.

            New research from Georgia Tech economist Shatakshee Dhongde shows there are multiple components of poverty that more accurately describes a household’s economic condition. Dhongde looks at “deprivation” more than simply low income, and her work finds that almost 15 percent of Americans are deprived in multiple dimensions.

            “This study approaches poverty in a new way,” said Dhongde, who recently published “Multi-Dimensional Deprivation in the U.S.” in the journal Social Indicators Research.

        • AstroTurf/Lobbying/Politics

          • ‘None of the old rules apply’: Dave Eggers travels through post-election America

            It was different in 2008. Knowing that Michigan was securely in Obama’s column and Ohio was on the bubble, Rob and Jenny went to Toledo to knock on doors in trailer parks and housing projects. Foreclosure signs were common. When they introduced themselves as canvassers for Obama, the residents, all of them white, were welcoming and chatty. “The interactions were long,” Mickey said. “The people were worried and they wanted to talk.” Ohio’s 18 electoral votes went to Obama in 2008 and 2012.

            “This campaign wore a lot of people down,” Mickey said. “The state was bombarded by pro-Clinton ads, but she failed to offer any sustained and coherent economic message. She said, ‘I’m not crazy’ and ‘I’m not a sexist racist pig’, but for working class whites that’s not enough. I would say that of the people who slammed their doors on me, most of them didn’t vote for either candidate.”

          • Lashing Out at ‘Identity Politics,’ Pundits Blame Trump on Those Most Vulnerable to Trump

            Over the past two weeks, pundits from all ends of the spectrum have been scrambling to explain Clinton’s unexpected loss, with reasons spanning from the plausible to the highly dubious; WikiLeaks, Bernie Sanders, fake news, Jill Stein, Russia, bad algorithms and the FBI have all been accused of having sole or part responsibility. Lately, however, a new, entirely bogus culprit has emerged from center and center-left circles: “identity politics” and its close cousin, “political correctness.”

          • Those Damn Emails

            Clinton supporters were surprised the emails mattered at all, because they had been fed a regular and often fully-factually wrong diet by the majority of the media. There was some good reporting on what the emails meant, and how classification works, but it was almost all on right-of-center websites Clinton people did not read, and blithely dismissed as biased when the sites were brought to their attention. And yeah, sometimes things got a bit too partisan in tone, but the facts were also there.

          • Hamilton vs Trump

            “Apologize!” was President elect Donald Trump conclusion of two messages he wrote to the cast of Hamilton, one of the most successful Broadway musicals in recent times. He was thus responding to the incident in which actor Brandon Victor Dixon, that played Vice President Aaron Burr, addressed the audience of the show.

            At the end of last Friday’s performance, noting that Vice President-elect Mike Pence was in the audience, he used the opportunity to thank Mr. Pence for attending the show and told him, “We hope you will hear us out.”

            And then Dixon added, “We, sir, we are the diverse America who are alarmed and anxious that your new administration will not protect us, our planet, our children, our parents, or defend us and uphold our inalienable rights, sir. But we truly hope that this show has inspired you to uphold our American values and to work on behalf of all of us. All of us. Again, we truly thank you for seeing this show, this wonderful American story told by a diverse group of men and women of different colors, creeds and orientations.”

          • For Many Americans, A Day to Forget
          • A Victory for ‘White’ America

            My reaction four days out from the moral tragedy of Donald Trump’s election as President is this: we are two nations, not one nation. On Nov. 8, 2016, one nation, a very white, very gerrymandered nation, braced by feeble voter turnout, conquered the other.

            The conquest will continue for at least a generation since it includes control of the U.S. Supreme Court. Mid-term elections may bring minor relief (or possibly not because Senate Democrats have far more seats to defend than Republicans) but the conquering nation knows that the Supreme Court and other judges pipe the tune to which all must dance.

          • Trump Can’t Hear What the Cast of “Hamilton” Tried to Tell Him

            The message, written by the show’s creator, Lin-Manuel Miranda, with input from the cast and crew, certainly reached Trump Tower, less than a mile away from the Richard Rodgers Theater, since it inspired a fit from the man whose divisive campaign stirred the alarm and anxiety the cast described, Donald Trump.

            Despite the intensely civil tone of this act of dissent, Trump inaccurately claimed that Pence “was harassed” by the cast of the play, and then described their plea for tolerance as “very rude,” before demanding an apology.

          • We Cannot “Give Trump a Chance”

            In the ten days since the election, several thousand people have phoned and emailed my Seattle City Council office in their fury over my call to shut down Donald Trump’s agenda with massive peaceful protests on Inauguration Day.

            Many messages were from middle- and working-class people who had voted for Trump because they hated corporate Democrats and Hillary Clinton, and mistakenly believed that Trump was going to stand up for the ordinary Americans. Many were also racist and misogynist, saying things like, “You don’t belong here with the bull***t you spew from your c***su**er,” or “Drop dead and go back to turbanville.”

            Call after call, while having zero tolerance for bigotry and threats, my staff patiently explained to the more reasonable Trump supporters that we agree working people have been sold out by corporate politicians. That we completely oppose the bipartisan, big business policies of “free trade” deals like the TPP and NAFTA, corporate tax handouts, and the close ties of both parties to Wall Street. Callers were surprised to learn that while I fiercely oppose Trump, I did not back Hillary Clinton (I campaigned for Bernie Sanders, and later Jill Stein). Many were simply not reachable, as they spewed hate on all those protesting their president-elect. They will have to experience Donald Trump’s policies in office to see him for what he is: a con man and representative of the billionaire class who sold the lie that he will bring back the American Dream.

            My first grim thoughts as I saw some of the horrifying emails was that I will be far from the only person targeted after the dangerous rise of Donald Trump. Bigots are feeling emboldened. Already a surge in bullying and hate crimes has taken place, and the KKK felt confident to hold a rally in North Carolina to celebrate Trump’s victory.

          • Trump Assembling Team of ‘Swamp Creatures,’ Says Ellison

            Forget “draining the swamp,” President-elect Donald Trump is building a cabinet full of “more swamp creatures than ever before,” Rep. Keith Ellison (D-Minn.) told CBS’s “Face the Nation” on Sunday.

            Appearing on the morning show, the progressive lawmaker, who is running to chair the Democratic National Committee (DNC), said, “Donald Trump has already proven where he’s going with this thing,” based on the nominees thus far.

            “He has lobbyists and big-time investment bankers,” Ellison continued, pointing to the recent Politico article, “Why Wall Street is Suddenly in Love with Trump.”

            “He’s not doing what he’s said he’s gonna do for average working Americans,” he added.

          • Meet the Candidate For Attorney General Who’s Hunted Quail with Corporate Donors

            While Donald Trump was running for the White House, he bashed politicians who courted the billionaire Koch brothers as “puppets” and vowed to “drain the swamp” in Washington by squelching cozy relationships between lobbyists and elected officials.

            Take, for example, Kris Kobach, the Kansas secretary of state, who is reportedly on the short list to become Trump’s attorney general.

            Last month, Kobach was among a group of Republican secretaries of state who spent the weekend hunting pheasant and quail and shooting clay pigeons with corporate donors at a Kansas lodge, a getaway funded by industry groups.

            The attendees included Allen Richardson, a lobbyist for Koch Industries, who joked about keeping the guest list secret. “The Koch brothers out with the Republican secretaries of state — that’s a news story I don’t need,” he said, unaware that a ProPublica reporter was in attendance.

          • Switzerland not so neutral with Clinton Foundation donation

            An agency overseen by the Swiss foreign ministry made a hefty donation to the Clinton Foundation — at the same time the US and Switzerland were in the midst of a diplomatic struggle over tax evasion.

            The Swiss Agency for Development and Cooperation shelled out about $500,000 to the Clinton Foundation in 2011, money earmarked for a program that sought to lower mortality for mothers and infants in Liberia, the Schweiz am Sonntag newspaper discovered on Sunday, according to The Local.

            The payment was made when the US government was pressuring Swiss banks to hand over customer info, after allegations arose that Swiss banks were being used to help avoid US taxes.

          • The Dark Money Cabinet

            uring the Presidential primaries, Donald Trump mocked his Republican rivals as “puppets” for flocking to a secretive fund-raising session sponsored by Charles and David Koch, the billionaire co-owners of the energy conglomerate Koch Industries. Affronted, the Koch brothers, whose political spending has made their name a shorthand for special-interest clout, withheld their financial support from Trump. But on Tuesday night David Koch was reportedly among the revellers at Trump’s victory party in a Hilton Hotel in New York.

            Trump campaigned by attacking the big donors, corporate lobbyists, and political-action committees as “very corrupt.” In a tweet on October 18th, he promised, “I will Make Our Government Honest Again—believe me. But first I’m going to have to #DrainTheSwamp.” His DrainTheSwamp hashtag became a rallying cry for supporters intent on ridding Washington of corruption. But Ann Ravel, a Democratic member of the Federal Elections Commission who has championed reform of political money, says that “the alligators are multiplying.”

          • What Student Protests Tell Us About America Under Trump

            There is little doubt that Trumps’ campaign and subsequent election have brought trauma into public education at all levels.

            “The country has elected a man who threaded racist, xenophobic, and misogynistic messages and mockery of disabled people through his campaign,” writes Emily Bazelon for the New York Times.. “Donald J. Trump’s victory gives others license to do the same,”

            Bazelon, a Times staff writer and author of a highly regarded book on bullying explains that characteristics Trump targeted for insults and inflammatory rhetoric – being non-white, gay, or disabled – describe students who are most apt to be bullied and abused in schools. She cites numerous examples of harassment and racist displays in schools since the election.

            An article for Mother Jones reports, “Bullying in schools is out of control since the election,” and cites examples of racist incidents and actions in Michigan, Pennsylvania, and Oregon.

          • Who’s to Blame for President Trump?

            First, as Wikileaks has proven without a shadow of a doubt, it is clear that the DNC colluded with the Clinton campaign as well as with highly placed sources at CNN to fatally undermine and sabotage the progressive insurgency campaign of Vermont Senator Bernie Sanders.

          • Swedish company Tetrapak linked to Clinton Foundation Haiti Operations. More on Ericsson

            This article reports the link found between the Swedish company Tetrapak (also know as Tetra Pak) with the Clinton Foundation, as it is indicated in a document newly released by the US Department of State to the organization Judicial Watch, after a federal order (details down below). I am also reporting, based in document I found at the Freedom of Information Act, on the economic consequences for Haiti due to expanded credits given to the giant Swedish company Ericsson.

          • President-elect: I had to settle Trump University case ‘to focus on our country’

            President-elect Donald Trump sounded off on his $25m payout to students who accused him of fraud on Saturday, as he prepared for a meeting with former foe Mitt Romney, tipped as a possible nominee for secretary of state.

            On Friday the US president-elect settled class-action fraud lawsuits relating to his Trump University for $25m, avoiding the public embarrassment of having to testify in court, despite having previously vowed to fight the cases to the end.

            On Saturday he sought to explain in a tweet: “I settled the Trump University lawsuit for a small fraction of the potential award because as President I have to focus on our country.”

          • Ivanka isn’t the only reason these photos of Trump meeting Abe are problematic

            Trump also hasn’t done much to reassure the public about potential conflicts of interest: As many pointed out, his daughter Ivanka Trump and her husband Jared Kushner feature prominently in photos of the diplomatic meeting.

            Presidential family members often interact with foreign leaders at state dinners, but Ivanka is more than family—she represents Trump’s private business interests. While part of Trump’s transition team, she is one of three Trump kids slated to run his private business after Jan. 20. Her own business recently was forced to apologize for turning media appearances about her father’s presidency into a sales opportunity.

          • Lucy Kellaway to leave the Financial Times to become a teacher

            Lucy Kellaway, the columnist and associate editor of the Financial Times, is leaving the newspaper after 31 years.

            From next summer, she will begin a new career as a maths teacher in a “challenging” London secondary school. In so doing, she will be acting as a pioneer for the charity Now Teach, which she co-founded earlier this year.

            It was set up to encourage high-flying professionals in the business world to retrain as teachers and help to address the shortage of maths and science teachers.

            Kellaway said: “I’ve had one of the nicest jobs in journalism by writing a column for 22 years. I love it, but I don’t want to spend my entire life doing it.

            “I think teaching is hugely important and I’m in the luxurious position of being able to take on the task. My mother was a teacher. One of my daughters is a teacher. It’s in the family, and I’m very excited about making this move.”

            Kellaway’s columns, poking fun at modern corporate culture, have long been regarded as a jewel in the FT’s crown. Editor Lionel Barber describes her as “a unique voice for the business community.”

          • Extreme Center Goes After Anti-Trump Protesters

            After Donald Trump’s surprise victory last week, protests against his pending presidency—and against the racism, misogyny and xenophobia he embodies—popped up from New York City to Portland to Kansas City to Austin to Nashville. Thousands of protesters gathered under the banner of #NotMyPresident, expressly rejecting the Trump administration’s agenda of, among other things, forced deportations, Muslim bans and attacks on women’s reproductive rights.

            On cue, several center and center-left pundits jumped in to call into question and concern-troll this exercise of dissent and its sometimes “violent” excesses of property damage.

          • TV Pundits Eager to Make Trump the New ‘Normal’

            After wrongly predicting the election, political pundits are returning to TV talkshows to explain what will happen under a Trump presidency. But these predictions aren’t like TV anchors predicting the weather; these forecasts have a profound impact on the public reception to the Trump administration and the future course of US politics.

            The danger is that by normalizing Trump—a candidate distinguished by an embrace of political violence and open appeals to ethnic nationalism who boasted of getting away with sexual assaults—these commentators will make racist and sexist bullying an acceptable way to run for public office.

          • 2016 the year everyone got interested.

            Some people wondered why the “losing” side to Brexit or the US Elections complained, moaned and did not accept the result. This is quite simple when you boil it down to the fact both were only a binary choice question, this is clearly going to be divisive by nature!

          • Sanders Draws Massive Crowds as Progressives Prepare to Fight Trump

            The election of a right-wing, repressive government led by President-elect Donald Trump and a Republican-dominated Congress has the American left searching for ways to mount a resistance and regain ground in future elections.

            Many have found an answer in progressive figures such as Sen. Bernie Sanders (I-Vt.), it seems, as crowds of young people are once again gathering to hear the senator speak.

            The senator has spoken out multiple times in the days since Trump’s election, arguing that the Democratic party needs to make greater efforts to reach working-class people and overhaul its leadership; vowing that progressives will “not go silently into the night”; and promising to resist Trump’s repressive, right-wing policy plans.

            The Democratic Party, which spurned Sanders’ campaign during the primary, has elevated the senator to a leadership position within the party.

          • Resisting Despair: Speaking Truth in the Face of Trump

            The attacks keep coming. A few blocks from my apartment in Michigan, a white man threatened to light a Muslim woman on fire if she did not remove her hijab. In California, my friend comforted a mother whose high-school-age daughter and her friend got yelled at in the grocery store parking lot by a man screaming, “Get out of here, lesbian bitches, you know Trump is president and that isn’t going to be allowed anymore.” My heart sinks with each new report of anti-Muslim, anti-Black, anti-immigrant and anti-LGBTQ attacks involving direct references to Trump and his campaign slogans. As we countenance a president who has embraced a curator of white supremacist propaganda as his chief White House strategist, and who plans to enact xenophobic attacks on a mass scale, I see Truthout’s role as twofold. First, we must resist the normalization of state-sanctioned violence and white supremacy. We can do so by publishing investigative reports and analyses that center the words of people directly affected by this violence. Second, we must resist despair by reporting on concrete acts of mass resistance that can be joined and copied by others. As a commissioning editor, I will be seeking out these stories in the days and months to come.

        • Censorship/Free Speech

          • Acclaimed Brazilian film makes splash despite political battles and cries of censorship

            An internationally acclaimed Brazilian film received the equivalent of an X rating, perhaps because of a political stand taken by the cast. But despite the controversy and alleged censorship surrounding Kleber Mendonca Filho’s “Aquarius,” it has made a big splash at the box office in a large and growing market that usually has more conservative tastes.

          • Germany Wants To Hold Facebook Criminally Liable If It Doesn’t Find & Delete ‘Hate’ Speech

            We’ve been pointing out that in the rush to claim that Facebook is a media company that must take responsibility for the content that is posted and shared on the site, there’s really an implicit call for blocking content that is somehow deemed “bad.” People keep acting like Facebook, rather than its users, has the responsibility to edit what is on the site. That’s dangerous — and for yet another example of how, we’ve now got a German official saying that Facebook has to be classified as a media property and be held criminally liable if it doesn’t magically delete “hate speech.”

            This is really, really dangerous. Yes, we know that Germany has much stricter hate speech laws, but if you have to have them, at least hold the proper party responsible: those doing the speaking (and, yes, as we’ve pointed out repeatedly, hate speech laws are almost always abused by governments to silence and punish people they don’t like). Facebook, to some extent, has brought this on itself. In the past, it’s made promises, to Germany in particular about how it will help curb “hate speech” on the site. And, eventually, the government is going to get upset and say “you’re not doing enough.” Earlier this year, Facebook (along with Google, Microsoft, and Twitter) tried to appease European bureaucrats by signing an agreement to respond to complaints of hate speech within 24 hours. But now officials want more. Because once you give governments the power to censor speech, they’re always going to want more.

          • Mark Zuckerberg on Facebook’s fake news: We’re working on it

            Buzzfeed found that the most-shared Facebook stories have been bogus pro-Trump articles, some of them produced by a fake-news mill run by Macedonian teenagers. A man who makes $10,000 a month writing bogus news opened up to a Washington Post reporter about his conflicted feelings. Sen. Ben Sasse (R-Neb.) suggested the media take note of “paid rioting”—referring to the persistent, yet evidence-free idea that anti-Trump activists were bused-in, paid protesters.

          • Citizen Lab uncovers censorship across Chinese live-streaming apps

            The Citizen Lab, a research centre based at U of T’s Munk School of Global Affairs, has published a report following a year-long investigation into censorship practices concerning Chinese live-streaming applications Sina Show, YY, and, 9158.

            Citizen Lab’s research was done by reverse-engineering the applications in order to examine the scripts that facilitate censorship, such as keyword bans which were on the client-side and therefore completely accessible to researchers after the reverse-engineering process.

            The popularity of live-streaming using these applications has risen exponentially, with people using them to perform and share glimpses into their everyday lives.

          • NYT Advocates Internet Censorship

            The New York Times wants a system of censorship for the Internet to block what it calls “fake news,” but the Times ignores its own record of publishing “fake news,” reports Robert Parry.

          • A moment of truth amid the fake news for Mark Zuckerberg

            r

            Well, the election is over; now we’re knee-deep in postmortems. Every mainstream publication and every corner of the blogosphere is full of autopsies. Many of these investigations have an anguished “How could this have happened?” tone. American students in a university department adjacent to mine have decorated the trees outside with hundreds of distraught but determinedly forward-looking messages. “Love WILL Conquer!” says one. “Knowledge not Ignorance,” says another.

            I don’t propose to add to this genre. If you want an informed, dispassionate analysis of the campaign that has given Trump the keys to the kingdom, look no further than an essay by Professor Charlie Beckett of the LSE on that institution’s Polis blog. It’s worth reading in full, but for those who are pressed for time, the gist is: “Trump had the better politics. Tactically, strategically, personally, policy-wise. He won partly because the Democrats and Hillary Clinton got most of that wrong, but mainly because he did best what you are supposed to do in an election: convince people to vote for you. They (and he) knew what they were doing.”

          • According to Snopes, Fake News Is Not the Problem

            The day after the election, news began swirling around social media that New York Times columnist David Brooks had called for President-elect Donald Trump’s assassination. Snopes managing editor Brooke Binkowski had a feeling it was fake. Because, come on now, would a prominent columnist for a reputable news outlet really make that kind of comment?

            Snopes has made its business out of correcting the misunderstood satire, malicious falsehoods, and poorly informed gossip that echoes across the internet — and that business is booming. Traffic jumped 85 percent over the past year to 13.6 million unique visitors in October, according to comScore. The site supports itself through advertising, and in the last three years it has made enough money to quadruple the size of its staff.

            Sure enough, a bit of Snopes reporting revealed that Brooks had written a column saying Trump would likely resign or be impeached within a year. A news item published on The Rightists claimed Brooks had then said in an interview for KYRQ Radio New York that Trump should be killed. Snopes found The Rightists doesn’t even pretend to traffic in truth. In the site’s “about” section, it describes itself this way: “This is HYBRID site of news and satire. part [sic] of our stories already happens, part, not yet. NOT all of our stories are true!” What’s more, the story’s facts didn’t add up. For example, the site claimed Brooks had made the comments on a radio station — KYRQ — that didn’t exist.

          • What Peter Thiel’s Appointment Could Mean For Freedom Of Speech

            As Donald Trump commences his ghastly slouch toward Washington, a coterie of sycophants snatches at his coattails: Newt Gingrich, Rudy Giuliani, Chris Christie—we knew this particular trio would scurry after heightened relevance and authority. Unsurprisingly, all three have slavered their way to the president-elect’s transition team, and possibly into the Cabinet. Less expected, perhaps, was billionaire PayPal co-founder Peter Thiel’s recent appointment to the same advisory committee. And yet, an alliance between Trump and Thiel, however appalling, seems so fitting that hindsight renders it almost preordained.

            We can surmise that Thiel’s explicit relevance to the team resides in his connection to Silicon Valley. Fervently supportive of President Obama, the technology hub does not regard Trump with the same beam of approval; on the contrary, it’s deeply dismayed by his ascendance to the presidency. Apart from his evident love affair with Twitter, Trump oscillates in his position on technology’s consequence to modern life. He has also threatened to renegotiate international trade agreements beneficial to the tech industry. Apple, in particular, fears that it will be barred from overseas production (this might not be a bad thing, considering the working conditions of so many foreign factories).

            Theoretically, Thiel will forge a more congenial relationship between his Silicon Valley colleagues and the incoming executive administration. He has previously claimed that his outlier status as a Trump-supporting libertarian has not blighted his business relationships. That said, it’s difficult to conceive of Thiel as possessing much social capital or political influence amid such a staunchly liberal community. And, in any case, would Silicon Valley be cajoled into cooperation with Trump? That remains to be seen.

          • UK Piracy Blocklist Silently Expands With Hundreds of Domains

            UK Internet providers have added close to 500 URLs to the national pirate site blocklist. The expansion follows a request from copyright holders who frequently add new proxies for sites that have previously been barred. Despite this mass-update, the ongoing blocking whack-a-mole is far from over.

        • Privacy/Surveillance

          • The Secret Agenda of a Facebook Quiz

            Do you panic easily? Do you often feel blue? Do you have a sharp tongue? Do you get chores done right away? Do you believe in the importance of art?

            If ever you’ve answered questions like these on one of the free personality quizzes floating around Facebook, you’ll have learned what’s known as your Ocean score: How you rate according to the big five psychological traits of Openness, Conscientiousness, Extraversion, Agreeableness and Neuroticism. You may also be responsible the next time America is shocked by an election upset.

            For several years, a data firm eventually hired by the Trump campaign, Cambridge Analytica, has been using Facebook as a tool to build psychological profiles that represent some 230 million adult Americans. A spinoff of a British consulting company and sometime-defense contractor known for its counterterrorism “psy ops” work in Afghanistan, the firm does so by seeding the social network with personality quizzes. Respondents — by now hundreds of thousands of us, mostly female and mostly young but enough male and older for the firm to make inferences about others with similar behaviors and demographics — get a free look at their Ocean scores. Cambridge Analytica also gets a look at their scores and, thanks to Facebook, gains access to their profiles and real names.

            Cambridge Analytica worked on the “Leave” side of the Brexit campaign. In the United States it takes only Republicans as clients: Senator Ted Cruz in the primaries, Mr. Trump in the general election. Cambridge is reportedly backed by Robert Mercer, a hedge fund billionaire and a major Republican donor; a key board member is Stephen K. Bannon, the head of Breitbart News who became Mr. Trump’s campaign chairman and is set to be his chief strategist in the White House.

          • Obama declines comment on reports of possible removal of NSA chief

            U.S. President Barack Obama declined on Sunday to comment on media reports that senior defense and intelligence officials in his administration had requested the removal of National Security Agency chief Mike Rogers.

            Obama called Rogers a “terrific patriot” during a news conference at an Asia-Pacific Economic Cooperation summit in Lima, adding he did not generally comment on personnel matters.

          • Former GCHQ spy suspended because of work ‘incident’ found dead in bath

            A FORMER GCHQ spybase worker who had once been suspended because of an “incident” at work was found drowned in his bath – and the front door of his flat was unlocked, an inquest heard yesterday.

          • Theresa May’s Terrible Instincts

            Everything you do on the web is now stored for twelve months by the security services. They can hack into your laptop or phone to see what is on there without any conditions at all. Not only do they not need to convince a judge you are suspected of a crime, they do not need to even pretend to actually suspect you of anything at all. They can just decide to target you and go fishing. The UK has now zero right to online privacy and the most vicious security service powers of any democracy. Indeed when you combine powers with capability (and the security service are recruiting tens of thousands more staff to our stasi state) the UK is now the most authoritarian country in the world. The legislation. passed this week, was framed by Theresa May as Home Secretary and received no significant opposition from the UK’s complicit political class.

          • Self-censorship dangerous for journalism and democracy: Joseph [Ed: surveillance is made to induce exactly that]

            Veteran investigative journalist Josy Joseph today said self-censorship, which had become the norm across newsrooms, was dangerous for both journalism and democracy.

            “Once journalist gets a job, he has a bank loan and has to pay EMI. So his concern is to protect his salary. So, he starts self-censorship within himself,” he said.

            “Then when once he goes into newsroom, the editors bring in their vested interest. So there is large and very powerful self-censorship that rules newsroom and I think it is dangerous for both democracy and journalism,” said Joseph, whose book on corruption in India released recently.

            He was speaking during a discussion on “Investigative journalistic stories that never saw light of the day” at Tata Lit-fest here.

            Joseph’s book “A Feast of Vultures: The Hidden Business of Democracy in India” examines and documents the corruption within the Indian democracy.

          • Battle erupts as Trump considers NSA chief for top intelligence post
          • Intelligence battle erupts as Trump considers NSA chief for top intel post
        • Civil Rights/Policing

          • Congress Needs More Information Before the Government’s New Hacking Powers Kick in [Ed: Older but relevant]

            The federal government is set to get massively expanded hacking powers later this year. Thankfully, members of Congress are starting to ask questions.

            In a letter this week to U.S. Attorney General Loretta Lynch, 23 members of Congress—including Sens. Ron Wyden and Patrick Leahy and Rep. John Conyers—pressed for more information and said they “are concerned about the full scope of the new authority” under pending changes to federal investigation rules.

            The Department of Justice kickstarted this process by proposing changes to Rule 41 of the Federal Rules of Criminal Procedure, which governs how the government obtains search warrants from federal magistrate judges. Specifically, the changes to Rule 41 would let judges grant warrants allowing the government to remotely hack into and search computers and other devices when those devices are part of a “bot-net” or when the government isn’t sure where the devices are located.

          • President Obama Claims He Cannot Pardon Snowden; He’s Wrong

            There may be reasons why the President doesn’t wish to grant a pardon to Snowden, but his stated reasons are completely bogus.

          • Trump’s Picks For AG & CIA Happy To Undermine Civil Liberties, Increase Surveillance

            This is (unfortunately) not a huge surprise, but it appears that a Trump administration is going to be much worse for civil liberties and surveillance. Earlier today, Donald Trump named his choices to head the CIA — Rep. Mike Pompeo — and to be the next Attorney General — Senator Jeff Sessions — and both have terrible records on surveillance, civil liberties and whistleblowing. They also are problematic in other areas, but in the areas where we cover, it’s not looking good.

          • Chagossians Have No Right of Self-Determination

            The debate starts at 10.34 – if you put the cursor to the bottom of the picture a slider appears. It is excruciating to watch. In an unusually full House of Commons (not a high bar) there is indignation and real anger on all sides, with even Tories describing the decision to continue the eviction of the Chagos islanders as “dishonourable”.

            The government argues that the Chagossians are not “a people” distinct from the Mauritians, therefore they do not have a right of self-determination. This piece of sophistry is designed to answer the obvious question of why the Chagossians have less rights than the Falkland Islanders or Gibraltarians. The actual answer – that the Chagossians are not white – is not one the government wishes to give. It also begs the question, if the Chagossians are Mauritians, why are the islands not a part of Mauritius?

            The government produced a paper on prospective resettlement, imposing arbitrary conditions on where and how the Chagossians could live designed to make life as difficult as possible. Those conditions included that there could be no civilian use of the airstrip – which I am glad to see Alex Salmond challenged in the Commons. Chagossians could work at the US airbase, but only on condition their partners and children would not be permitted to be with them. Fishing – their traditional activity – will be banned by the UK government’s marine reserve.

          • Spinning Bannon as ‘Provocateur’ Who ‘Relishes Combativeness’

            There’s a difference between bad news and bad reporting. We’re seeing a lot of both these days, as each Trump Cabinet choice hurls us deeper into dystopia.

            For example: How do you describe a man who propagates white supremacy, misogyny and antisemitism? If you’re the New York Times, you call him a “provocateur.” If you’re the AP, you say his hire is evidence of Trump’s “brash, outsider instincts.”

            Stephen Bannon, the Trump campaign chief executive and recently named “Chief Strategist and Senior Counselor” for the Trump White House, has declared of Breitbart, the website he still heads, “We’re the platform for the alt-right”—that being, by Breitbart’s own description, a coalition of advocates of “scientific race differences” with those who “believe that some degree of separation between peoples is necessary for a culture to be preserved” and online traffickers in racist and antisemitic stereotypes and harassment, along with a significant admixture of pro-Hitler neo-Nazis.

          • CBS Evening News Provides Platform For White Nationalist To Spin, Without Pressing Him On Racist Views

            CBS News provided alt-right white nationalist Richard Spencer with a platform to normalize his racist political movement and praise President-elect Trump without pressing him on his racists comments and stances.

          • Kica Matos on Immigration, Sue Udry on Civil Liberties–Under Trump

            This week on CounterSpin: Donald Trump spent his entire campaign demonizing immigrants as dangerous, job-stealing criminals. While denouncing that, media sometimes dismissed it as mainly campaign rhetoric. Will they take the story seriously enough as a Trump administration tries to turn those ideas into policy? We’ll hear from Kica Matos, director of immigrant rights and racial justice at the Center for Community Change.

          • Jewish historians speak out on the election of Donald Trump

            As scholars of Jewish history, we are acutely attuned to the fragility of democracies and the consequences for minorities when democracies fail to live up to their highest principles. The United States has a fraught history with respect to Native Americans, African Americans and other ethnic and religious minorities. But this country was founded on ideals of liberty and justice and has made slow, often painful progress to achieve them by righting historic wrongs and creating equal rights and opportunities for all. No group has been more fortunate in benefiting from this progress than American Jews. Excluded by anti-Semitism from many professions and social organizations before the Second World War, Jews in the postwar period became part of the American majority, flourishing economically and politically and accepted socially. There are now virtually no corners of American life to which Jews cannot gain entry. But mindful of the long history of their oppression, Jews have often been at the forefront of the fight for the rights of others in this country.

            In the wake of Donald Trump’s electoral victory, it is time to re-evaluate where the country stands. The election campaign was marked by unprecedented expressions of racial, ethnic, gender-based, and religious hatred, some coming from the candidate and some from his supporters, against Muslims, Latinos, women, and others. In the days since the election, there have been numerous attacks on immigrant groups, some of which likely drew inspiration from the elevation of Mr. Trump to the presidency of the United States.

          • Career Racist Jeff Sessions Is Donald Trump’s Pick For Attorney General
          • Grassroots Digital Rights Alliance Expands Across U.S.

            Observers around the world are scrutinizing the President-elect’s transition team and prospects for digital rights under the incoming administration. Trump’s campaign statements offered few reasons to be optimistic about the next administration’s commitments, making the unrestrained domestic secret surveillance regime that President Trump will inherit an even greater threat not only to privacy, but also dissent, individual autonomy and freedom of conscience, and—ultimately—our democracy.

            At EFF, we have committed ourselves to redoubling our efforts to defend digital rights. We know, however, that it will take the concerted actions of our supporters to help our goals find their reflection in law, policy, technology, and culture.

            That’s why we launched the Electronic Frontier Alliance (EFA), a network of grassroots groups taking action in their local communities to promote digital rights.

          • Troubling Study Says Artificial Intelligence Can Predict Who Will Be Criminals Based on Facial Features

            The fields of artificial intelligence and machine learning are moving so quickly that any notion of ethics is lagging decades behind, or left to works of science fiction. This might explain a new study out of Shanghai Jiao Tong University, which says computers can tell whether you will be a criminal based on nothing more than your facial features.

            The bankrupt attempt to infer moral qualities from physiology was a popular pursuit for millennia, particularly among those who wanted to justify the supremacy of one racial group over another. But phrenology, which involved studying the cranium to determine someone’s character and intelligence, was debunked around the time of the Industrial Revolution, and few outside of the pseudo-scientific fringe would still claim that the shape of your mouth or size of your eyelids might predict whether you’ll become a rapist or thief.

            Not so in the modern age of Artificial Intelligence, apparently: In a paper titled “Automated Inference on Criminality using Face Images,” two Shanghai Jiao Tong University researchers say they fed “facial images of 1,856 real persons” into computers and found “some discriminating structural features for predicting criminality, such as lip curvature, eye inner corner distance, and the so-called nose-mouth angle.” They conclude that “all four classifiers perform consistently well and produce evidence for the validity of automated face-induced inference on criminality, despite the historical controversy surrounding the topic.”

          • Officer Put on Leave After Video Shows Him Punching Woman in Face During Eviction

            An officer with the Flagstaff police department in Arizona has been put on leave following the release of video footage taken by an eye witness that showed him punching a woman in the face during an arrest earlier this week.

          • Hey, Trump Told, ‘Get Your Daughter the F$%k Out of State Meetings!’

            U.S. News & World Report writes that “Ivanka Trump’s presence at the meeting was only made public when the Japanese government released photos, as the Trump team has continued to bar journalists from witnessing all but the most superficial aspects of the transition.”

            CBS News describes her presence, along with that of her husband, Jared Kushner, as “a reminder of potential conflicts of interest between Donald Trump’s businesses and the White House” as well as his adult children’s future roles in the White House.

            Ivanka and Kushner are on the Trump transition team’s executive committee.

            “Their involvement raises a host of ethical questions,” Emily Jane Fox writes at Vanity Fair, as “it appears to violate the 1967 nepotism law put in place after John Kennedy installed his kid brother Bobby as attorney general.” There’s also the fact that Ivanka, along with her two brothers, will reportedly run the real estate mogul’s business empire in a “blind trust.”

            “Which, as you hardly need to be sharp-eyed to point out, makes it a bit odd that she’s sitting in on presidential state business,” Marine Hyde writes at the Guardian.

            Hyde added, “Before you could say ‘conflict of interests’, America’s most dysfunctional family have already begun blurring the lines between politics and business”

          • Killing Dylann Roof Wouldn’t Help Racial Injustice

            The impact of race on criminal justice is one of the hottest topics of our time. Today’s police-shooting videos have not revealed something new, they have revealed, in a new way, a legacy of racial hatred and violence that is embedded in our nation’s DNA, and more and more Americans are waking up to that fact. So, if we are ready to address the impact of racism in the criminal justice system, what do the remedies look like?

            Let me tell you one thing that will not work—sentencing Dylann Roof to death. Jury selection for his federal death penalty case in the Charleston shooting last summer starts on Nov. 7.

          • Donald Trump’s Mass Deportations Would Cost Billions and Take Years to Process

            And while the president-elect’s comments, rhetoric, and choice of advisers, have fueled panic among immigrant communities across the country, many are quick to point out that he is only going to exacerbate a broken system that’s already been defined by rogue enforcement agencies and rampant abuse for years.

            “Obama built a horrible machine already,” said Danny Cendejas, an organizer with Detention Watch Network, a group that fights immigration detention and deportations nationwide. “Trump will just take it, and take it to a much more horrifying level.”

            In fact, what Trump is proposing is not very different from what has already been happening under the Obama administration, which has prioritized the deportation of undocumented immigrants with criminal convictions. But there simply aren’t two to three million of them. According to the Migration Policy Institute, the number of undocumented people with criminal records is closer to 820,000, and even then many of those people are not the “rapists” and “criminals” Trump would have us believe but are guilty instead of “status crimes,” like driving without a license in states that won’t allow undocumented people to get one, or entering the country illegally.

          • As Schools See Hate-Fueled Attacks Rise, Millions Demand Trump Speak Out

            And while Trump “spoke against bullying, intimidation, and hate crimes” during his “60 Minutes” interview on Sunday, his appointment of alt-right “hero” Stephen Bannon to chief strategist “sends the exact opposite message,” the letter charges.

            “The presidency is about many things,” it concludes. “Chiefly, it is about setting an example through your leadership. You have said that you will be the president for all Americans, Mr. Trump. We ask that you keep your promise by loudly, forcefully, unequivocally, and consistently denouncing these acts and the ideology that drives them. We ask you to use your position, your considerable platform, and even your tweets to send a clear message that hate has no place in our public discourse, in our public policy, or in our society.”

          • None of This Is Normal. All of It Is Un-American.

            Journalists who investigated Trump, his businesses, family and associates have been mailed anti-Semitic screeds or threatened with violence and even death. Women who have reported on Trump have been sent the vilest sexist epithets. Kshama Sawant, the socialist city council member from Seattle who recently urged protests at Trump’s inauguration in January has been targeted for email and phone attacks, some of which have suggested that she kill herself.

            Just about everyone I know has a story or two or three from the last week and a half. My friend Deana tells of a part-Asian co-worker swung at by a white male who mistook him as being from the Middle East, of a friend’s boyfriend who was told to “Go back to Africa” on his Facebook page, of another friend’s middle-school-aged daughter and other girls who were pushed around by boys in her class, some wearing Trump T-shirts and shouting hateful things about women.

          • Digital Security Tips for Protesters

            After the election, individuals took to the streets across the country to express their outrage and disappointment at the result of the U.S. presidential election. Many protesters may not be aware of the unfortunate fact that exercising their First Amendment rights may open themselves up to certain risks. Those engaging in peaceful protest may be subject to search or arrest, have their movements and associations mapped, or otherwise become targets of surveillance and repression. It is important that in a democracy citizens exercise their right to peaceably assemble, and demonstrators should be aware of a few precautions they can take to keep themselves and their data safe. Here we present 10 security tips for protesting in the digital age.

            [...]

            If you’re really concerned with the data stored on your device, don’t bring it at all and pick up a prepaid mobile phone. These lower-end devices can be purchased along with a SIM card at most large retail stores, and current federal regulation does not require you to show your ID (but your state may). Let your friends know your temporary number, and use this to coordinate activities. Remember that the location of mobile devices can be determined by the cell towers they connect to, so if you don’t want your identity known, turn off your prepaid device before going home or anywhere that might lead to your identity. Using GPS should be safe, since GPS is a receiver and does not transmit any information, but your device may store your coordinates. For this reason, we suggest you turn off location services. When you’re done with the phone, it can be safely recycled or discarded from a location that is not linked to you. Keep in mind that if you carry both your regular device and a prepaid one with you, the location of these devices can be correlated as a way to compromise your anonymity.

          • Clemency Applicants Urge Obama to Act Before Trump Presidency Crushes Hope

            When Brigitte Barren Williams realized Donald Trump had won the presidential election, “it felt like somebody let the air out of a balloon,” she said. Her brother, David Barren, is locked up at a federal prison in West Virginia, serving life plus 20 years on federal drug conspiracy charges. Now in his 50s, Barren has served almost 10 years of his sentence — the minimum portion required before he is eligible to seek a commutation under President Obama’s clemency initiative.

            Tens of thousands of people convicted of nonviolent federal drug crimes have sought mercy under the program, which was announced in April 2014. Obama ramped up his commutations in advance of the election, and Williams prayed with each clemency announcement that her brother’s name might be on the list. After the last round came out, on November 4, Williams was forced to hope that if Obama didn’t grant her brother clemency, perhaps his successor might.

            But the chances of that almost certainly dissolved on election night. Trump has called the clemency recipients “bad dudes,” warning one audience this summer that “they’re walking the streets. Sleep tight, folks.” After winning the White House on such fearmongering rhetoric — and promptly naming a white supremacist to his cabinet — Trump chose Alabama Sen. Jeff Sessions as his attorney general, an opponent of criminal justice reform and defender of mandatory minimums. There is little reason to believe President Trump will show mercy to people like Barren.

            Yet Williams remains steadfast in her belief that her brother will come home. “We are a family of very strong faith,” she said. Besides, her fight does not end with his freedom. There are too many others in his position. “We have to continue making sure people care.”

            Williams spoke over the phone from Washington, D.C., where she had traveled from Pittsburgh for a series of public events under the theme “Hope for the Holidays.” The advocacy group #cut50, which aims to slash the incarcerated population in half, had organized the series, where participants urged Obama to commute as many sentences as possible in the remaining weeks of his presidency.

          • Installing a Torture Fan at CIA

            President-elect Donald Trump’s selection of Kansas Congressman Mike Pompeo, an open aficionado of torture practices used in the “war on terror,” to be CIA director shows that Trump was serious when he said he would support “waterboarding and much worse.”

            Earlier, there had been a sliver of hope that that, while on the campaign trail, Trump was simply playing to the basest instincts of many Americans who have been brainwashed – by media, politicians, and the CIA itself – into believing that torture “works.” The hope was that the person whom Trump would appoint to head the agency would disabuse him regarding both the efficacy and the legality of torture.

          • Obama says he can’t pardon Snowden

            A campaign to pardon NSA leaker Edward Snowden, launched in combination with a fawning Oliver Stone film about him, hasn’t made any headway. The request spurred the entire membership of the House Select Committee on Intelligence, 13 Republicans and 9 Democrats, to send a letter to President Barack Obama urging against a pardon. “He is a criminal,” they stated flatly.

          • A country with perfect law enforcement based on perfect surveillance will stop dead in its tracks

            Britain passed the Snooper’s Charter, as expected. Legislators worldwide are making the crucial mistake of seeing privacy as an individual luxury, instead of as a collective necessity: a country that increases its surveillance reduces its pace of progression and competitiveness, and does so at its peril, even disregarding the human rights angle.

            The United Kingdom, on its third attempt, just passed the worst mass-surveillance legislation seen in a democracy – the so-called “Snooper’s Charter”. There is a belief that such intrusion is necessary for the development of society, and that privacy is an individual luxury. Nothing could be further from the truth: privacy is a collective necessity, for society does not develop without it.

          • Rail bosses wanted to spy on sex lives of people who opposed controversial route

            The information gathered would include details of their sex lives, mental health and political views.

            An extraordinary document was published by HS2 detailing how they would access and “process personal data” including details of individuals’ sexual orientation, trade union affiliation, criminal record as well as information about their physical and mental health.

            As part of the company’s Privacy Notice, HS2 said it could collect this information on a number of people, including staff and suppliers but also complainants and litigants, which would include those claiming compensation or objecting to the scheme.

          • Student jailed after blackmailing schoolgirl, 14, with ‘abuse’ video

            A student has been jailed for blackmailing a 14-year-old schoolgirl into handing over family jewellery after threatening to release a video of her being ‘abused’ on Facebook.

            The young victim claimed she was targeted for sexual exploitation by Mohammed Luqman, 18, over a period of months.

            The Birmingham college student allegedly recorded her being sexually abused and later threatened to release the videos on social media, unless she stole from her family for him.

          • Monkey incident sparks clashes in southern Libyan city of Sabha, 16 dead

            At least 16 people died and 50 were wounded in Libya in four days of clashes between rival factions in the southern city of Sabha, a health official said on Sunday.

            According to residents and local reports, the latest bout of violence erupted between two tribes after an incident in which a monkey that belonged to a shopkeeper from the Gaddadfa tribe attacked a group of schoolgirls who were passing by.

            The monkey pulled off one of the girls’ head scarf, leading men from the Awlad Suleiman tribe to retaliate by killing three people from the Gaddadfa tribe as well as the monkey, according to a resident who spoke to Reuters.

        • Intellectual Monopolies

          • Copyrights

            • Turning Promises Of Marrakesh Treaty For Visually Impaired Into Reality

              With the recent entry into force of the Marrakesh Treaty providing copyright exceptions for persons with visual impairments, a panel convened alongside last week’s World Intellectual Property Organization copyright committee meeting explored ways to transform the treaty’s promises into reality.

              The WIPO Standing Committee on Copyright and Related Rights (SCCR) met from 14-18 November. The 15 November side event was organised by the Accessible Books Consortium (ABC), which is hosted by WIPO.

            • [Old] EFF to Copyright Office: It’s Time for Real Reform of DMCA 1201

              Over 11,000 People Join EFF’s Call to Protect Security Research and Repair

              San Francisco – The Electronic Frontier Foundation (EFF) urged the U.S. Copyright Office today to protect the public’s right to research and repair everything from phones to refrigerators to tractors, to support the right of people with print disabilities to convert media into an accessible format, and to restore users’ rights to make fair and lawful uses of the software and media they buy.

              EFF’s comments are part of the Copyright Office’s ongoing study into whether the “anti-circumvention” provisions of Section 1201 of the Digital Millennium Copyright Act (DMCA) are working for the public. Section 1201 bans anyone from accessing a copyrighted work when a technology like digital rights management software (DRM) is in place to block access. The law is meant to stop illegal copying, but instead, companies use digital locks in all sorts of products to obstruct those who want to look inside for any reason—blocking competition, innovation, security research, and other legal activities. To vindicate these activities, the public must resort to a burdensome exemption process that allows the digital locks to be broken in certain cases. EFF and a host of other public interest organizations must repeatedly plead for temporary exemptions that expire every three years. Moreover, the law expects users to figure out for themselves how to circumvent digital locks to take advantage of exemptions: no one is allowed to give them the technology to do so.

        ]]>
        http://techrights.org/2016/11/21/zorin-os-12-coverage/feed/ 0
        Links 18/11/2016: Apache at 17 (Years), GNU Octave 4.2 http://techrights.org/2016/11/18/gnu-octave-4-2/ http://techrights.org/2016/11/18/gnu-octave-4-2/#comments Fri, 18 Nov 2016 11:26:33 +0000 http://techrights.org/?p=96844

        GNOME bluefish

        Contents

        GNU/Linux

        Free Software/Open Source

        • Jim Zemlin: Why Open Source is Professionalizing, and How to Stay Ahead

          If it is true that software is eating the world then it is also true that open source is eating software. The very fabric of our digital society increasingly runs on software built and supported collectively by hundreds of thousands of people around the globe. And not just traditional technology companies. As we move towards a world defined by digital experiences carmakers, retailers, banks, hospitals, movie studios and so many more are becoming involved in building and underwriting this work—in reality they are becoming software companies themselves.

        • How Open Source and InnerSource are changing the IT Landscape
        • The Tragedy of Open Source
        • Open Source and Trends shaping it
        • Managing the Opportunities and Challenges of Open Source Innovation
        • Open Source is all about Community
        • Open Source Development at the UK Government

          New code developed for the UK government is open by default. Coding in the open enables reuse and increases transparency, which results in better digital services, said Anna Shipman, technical architect at Government Digital Service (GDS). She spoke about open sourcing government at GOTO Berlin 2016.

          Our job is to change the way the government works, said Shipman. The UK government wants to provide digital services which are so good that people want to use them; services which are leading to better interaction between the government and citizen.

          Software development at the UK government used to be done with yearly big bang releases. Over the years this has changed with many teams doing several code updates every day.

        • ‘Podling’ Apache projects are spending longer in the incubator

          Stewards of the Apache Software Foundation are mildly concerned that many nascent projects are spending longer in the incubator, putting pressure on limited mentoring resources.

          In the 12 months up to November 2016, ASF oversaw 30 new “podling” incubator projects, of which four were retired and just seven graduated. Jim Jagielski, director and co-founder at ASF, said the graduation rate has fallen compared to previous years, causing him to ponder why so many projects were apparently stuck.

        • Apache: 17 years on in the open source community

          Apache is a public charity based in the US that facilitates the development of open source projects for the public good in a vendor neutral environment.

          This week the Apache Software Foundation (ASF) hosted ApacheCon in Seville, Spain to celebrate not only it’s 17 year old ‘birthday’ but to further instill this open source community’s core principles that have been with it since the beginning: the ‘Apache Way’.

        • AT&T’s Chris Rice Upskills on SDN & Open Source

          One key advantage SDN provides is the ability to directly program the network by rapidly adding on-demand applications on top of the SDN controller. Service providers are increasingly turning to open source software as a viable alternative to proprietary automation tools, but concerns such as cost, security, standards and whether the software is “carrier-grade” remain front of mind.

        • Transforming scientific research with OpenStack

          A cloud-based approach is often heralded as the natural way forward when it comes to improving agility. And whilst many traditional enterprises have turned to the technology, other types of organizations are seeing the benefits too.

        • Open Source vs Proprietary Cloud: Choose Wisely
        • Web Browsers

          • Mozilla

            • Firefox 51 To Enable WebGL 2 By Default, FLAC Audio, Skia Content Rendering On Linux
            • Introducing Firefox Focus – a free, fast and easy to use private browser for iOS
            • Privacy made simple with Firefox Focus

              Today we launched Firefox Focus, a brand new iOS browser that puts user privacy first. More than ever before, we believe that everyone on the Internet has a right to protect their privacy. By launching Firefox Focus, we are putting that belief into practice in a big way.

              How big? If you download Firefox Focus and start to browse, you will notice a prominent “Erase” button in the upper right-hand corner of the screen. If you tap that button, the Firefox Focus app erases all browsing information including cookies, website history or passwords. Of course, you can erase this on any other browser but we are making it simple here – just one tap away.

              Out of sight too often means out of mind. Burying the tools to clear browsing history and data behind clicks or taps means that fewer people will do it. By putting the “Erase” button front and center, we offer users a simple path to healthy online behaviors — protecting their online freedom and taking greater control of their personal data. To further enhance user privacy, Firefox Focus also by default blocks advertising, social and analytics tracking. So, on Firefox Focus, “private” browsing is actually automatic, and erasing your history is incredibly simple.

        • SaaS/Back End

          • AtScale Takes its BI Platform Beyond Hadoop

            As it began to develop, the Big Data trend–sorting and sifting large data sets with new tools in pursuit of surfacing meaningful angles on stored information–remained an enterprise-only story, but now businesses of all sizes are evaluating tools that can help them glean meaningful insights from the data they store. As we’ve noted, the open source Hadoop project has been one of the big drivers of this trend, and has given rise to commercial companies that offer custom Hadoop distributions, support, training and more.

        • Oracle/Java/LibreOffice

          • LibreOffice Conference 2016: First videos online

            Here at The Document Foundation we’ve been really busy since the LibreOffice Conference in September, running our Community Weeks and the Month of LibreOffice. But finally we’ve started putting videos online from presentations at the conference.

            Don’t miss this opening presentation, the State of the Project, and then scroll down for more talks and demos.

        • Funding

          • Kubernetes founders launch Heptio with $8.5M in funding to help bring containers to the enterprise

            For years, the public face of Kubernetes was one of the project’s founders: Google group product manager Craig McLuckie. He started the open-source container-management project together with Joe Beda, Brendan Burns and a few other engineers inside of Google, which has since brought it under the guidance of the newly formed Cloud Native Computing Foundation.

            Beda became an entrepreneur-in-residence at Accel Partners in late 2015, Burns left Google for Microsoft earlier this year and McLuckie quietly left Google to start a new venture a few weeks ago. McLuckie and Beda have now teamed up again to launch Heptio, a new pure-play Kubernetes company.

        • BSD

          • openbsd changes of note

            mcl2k2 pools and the em conversion. The details are in the commits, but the short story is that due to hardware limitations, a number of tradeoffs need to be made between performance and memory usage. The em chip can (mostly) only be programmed to write to 2k buffers. However, ethernet payloads are not nicely aligned. They’re two bytes off. Leading to a costly choice. Provide a 2k buffer, and then copy all the data after the fact, which is slow. Or allocate a larger than 2k buffer, and provide em with a pointer that’s 2 bytes offset. Previously, the next size up from 2k was 4k, which is quite wasteful. The new 2k2 buffer size still wastes a bit of memory, but much less.

        • FSF/FSFE/GNU/SFLC

        • Public Services/Government

          • Faster unified capabilities and open source code on DISA’s plate for 2017

            The Defense Information Systems Agency is trying to speed up the delivery of its voice, video and data services to Defense Department and military employees.

            DISA currently has its Unified Capabilities (UC) contract award date set for the fourth quarter of 2018, but the IT agency thinks it can push the award to the left and have it finished by the first quarter. The contract, called Defense Enterprise Office Solutions (DEOS), would integrate things like voice, video, email, content management and other communication devices into one seamless, unified client.

            However, DISA’s Enterprise-wide Services Division Chief Brian Hermann, thinks DISA can award and set up UC faster.

        • Openness/Sharing/Collaboration

          • 4 tips for DIY makers

            First, I take a picture of the postcard and upload it to Wikimedia Commons under a free license, usually Creative Commons Share-Alike 4.0 or CC BY-SA 4.0 International. These two licenses allow anyone to use the image of my artwork for both non-commercial and commercial purposes, modify and remix them. And uploading to Wikimedia Commons puts my artwork in a place where many people will see it.

        • Programming/Development

          • LLVM’s LLD Linker Looking At Enabling Multi-Threading By Default
          • You Are Not Paid to Write Code

            “Taco Bell Programming” is the idea that we can solve many of the problems we face as software engineers with clever reconfigurations of the same basic Unix tools. The name comes from the fact that every item on the menu at Taco Bell, a company which generates almost $2 billion in revenue annually, is simply a different configuration of roughly eight ingredients.

            Many people grumble or reject the notion of using proven tools or techniques. It’s boring. It requires investing time to learn at the expense of shipping code. It doesn’t do this one thing that we need it to do. It won’t work for us. For some reason—and I continue to be completely baffled by this—everyone sees their situation as a unique snowflake despite the fact that a million other people have probably done the same thing. It’s a weird form of tunnel vision, and I see it at every level in the organization. I catch myself doing it on occasion too. I think it’s just human nature.

          • Eclipse Che cloud IDE joins Docker revolution

            Eclipse Che 5.0 is making accommodations for Docker containers and Language Server Protocol across multiple IDEs. The newest version of the Eclipse Foundation’s cloud-based IDE and workspace server will be available by the end of the year.

            The update offers Docker Compose Workspaces, in which a workspace can run multiple developer machines with support for Docker Compose files and standard Dockerfiles. In the popular Docker software container platform, a Compose file is a Yet Another Markup Language (YAML) file defining services, networks, and volumes; a Docker file is a text document with commands to assemble an image. Che also has been certified for Docker Store, which features enterprise-ready containers. In addition, Docker is joining the Eclipse Foundation and will work directly with Che.

        Leftovers

        • Are Office Depot workers pushing unnecessary computer fixes?

          1116-ctm-officedepotinvestigation-jones-1181439-640×360.jpg
          KIRO-TV

          The retailer says it helps about 6,000 customers per week with its free PC health checks, and that it does not condone any of the alleged conduct we uncovered. But CBS affiliate KIRO-TV’s undercover cameras showed how employees used the service to sell customers expensive computer repairs that weren’t there, reports KIRO’s Jesse Jones.

          Office Depot’s technicians repeatedly told us our computers were infected.

          “It’s got malware symptoms in there,” one said.

          They said they could fix them — for a hefty fee.

          “It actually looks like it’s $180 right now,” the technician estimated.

          The only problem? All the PC’s were brand new and fresh out of the box. The computer security firm IOActive also gave them a clean bill of health.

          “We found no symptoms of malware on these computers when we operated them,” said Will Longman, IOActive VP of Information Technology and Security.

          We even purchased one of the new computers at Office Depot. But when we brought it to technicians at a different store, a technician said, “Malware symptoms were found in the machine.”

        • Science

          • Blast Off With the Amateur Rocketeers of the Mojave Desert

            An event called “Large, Dangerous Rocket Ships” doesn’t bring to mind a day of peace and quiet. If nothing else, a field packed with amateur rocketeers blasting things toward the heavens is raucous to say the least. But Sean Lemoine found it all very … zen. “It’s very serene out there, just watching the rockets,” he says.

            Large, Dangerous Rocket Ships is among the world’s biggest amateur rocketry events. Some 250 rocketeers from as away as the UK and Argentina gathered on a cracked lakebed in the Mojave Desert, where the Federal Aviation Administration cleared the airspace for miles around. That’s essential, because these folks launch rockets capable of reaching 17,000 feet and making Elon Musk smile.

        • Hardware

          • Hard Drive Stats for Q3 2016: Less is More

            In our last report for Q2 2016, we counted 68,813 spinning hard drives in operation. For Q3 2016 we have 67,642 drives, or 1,171 fewer hard drives. Stop, put down that Twitter account, Backblaze is not shrinking. In fact, we’re growing very nicely and are approaching 300 petabytes of data under our management. We have fewer drives because over the last quarter we swapped out more than 3,500 2 terabyte (TB) HGST and WDC hard drives for 2,400 8 TB Seagate drives. So we have fewer drives, but more data. Lots more data! We’ll get into the specifics a little later on, but first, let’s take a look at our Q3 2016 drive stats.

        • Security

          • Security updates for Thursday
          • Reproducible Builds: week 81 in Stretch cycle
          • Security-hardened Android, bounties for Tcl coders, and more open source news

            In a blog post yesterday, the Tor project announced a refresh of a prototype of a Tor-enabled Android phone aimed at reducing vulnerability to security and privacy issues. Combining several existing software packages together, the effort has created an installation tool for hardening your phone. While designed for a Nexus 6P reference device, the project hopes to expand to provide greater hardware choice.

          • Linux flaw exposed in a minute by pressing enter key

            Researchers have discovered a major vulnerability in the Cryptesetup utility that can impact many GNU/Linux systems, which is activated by pressing the enter key for about 70 seconds.

          • Chinese IoT Firm Siphoned Text Messages, Call Records

            A Chinese technology firm has been siphoning text messages and call records from cheap Android-based mobile smart phones and secretly sending the data to servers in China, researchers revealed this week. The revelations came the same day the White House and the U.S. Department of Homeland Security issued sweeping guidelines aimed at building security into Internet-connected devices, and just hours before a key congressional panel sought recommendations from industry in regulating basic security standards for so-called “Internet of Things” (IoT) devices.

          • Google security engineer slams antivirus software, cites better security methods

            Google senior security engineer Darren Bilby isn’t a fan of antivirus software, telling a conference in New Zealand that more time should be spent on more meaningful defenses such as whitelisting applications.

            Speaking at the Kiwicon hacking conference, Bilby said that antivirus apps are simply ineffective and the security world should concentrate its efforts on things that can make a difference.

            “Please no more magic,” Bilby told the conference, according to The Register. “We need to stop investing in those things we have shown do not work. Sure, you are going to have to spend some time on things like intrusion detection systems because that’s what the industry has decided is the plan, but allocate some time to working on things that actually genuinely help.”

            Antivirus software does some useful things, he said, “but in reality it is more like a canary in the coal mine. It is worse than that. It’s like we are standing around the dead canary saying, ‘Thank god it inhaled all the poisonous gas.’”

          • Dutch government wants to keep “zero days” available for exploitation

            The Dutch government is very clear about at least one thing: unknown software vulnerabilities, also known as “zero days”, may be left open by the government, in order to be exploited by secret services and the police.

            We all benefit from a secure and reliable digital infrastructure. It ensures the protection of sensitive personal data, security, company secrets and the national interest. It is essential for the protection of free communication and privacy. As a consequence, any vulnerability should be patched immediately. This is obviously only possible when unknown vulnerabilities are disclosed responsibly. Keeping a vulnerability under wraps is patently irresponsible: it may be found simultaneously by others who abuse it, for example to steal sensitive information or to attack other devices.

          • How To ‘PoisonTap’ A Locked Computer Using A $5 Raspberry Pi

            White hat hacker Samy Kamkar has come up with a way of to hijack Internet traffics from a password-protected computer.

            Serial white hat hacker Samy Kamkar has developed a new exploit for breaking into a locked computer and installing a persistent web-based backdoor on it for accessing the victim’s online accounts.

        • Defence/Aggression

          • David Petraeus in the running to be Trump’s secretary of state

            David Petraeus – the former US army general and CIA director who was prosecuted for mishandling classified information – has entered the race to become Donald Trump’s secretary of state, diplomatic sources said on Thursday.

            Petraeus resigned in November 2012 after the FBI discovered he had had an affair with his biographer, Paula Broadwell, and had shared classified information with her. He eventually pleaded guilty to a misdemeanor charge for mishandling the information. People who have seen him recently say he is anxious to return to public life and has privately refused to rule out serving in a Trump administration.

          • You say pro-NATO, I say pro-peace

            So the NATO Secretary General’s second justification of the organisation’s continued existence is not exactly what one would call compelling. But I suppose he had to try, when Juncker’s threatened folie de grandeur that is the EU army is even less inspiring.

            So, back to President-elect Donald Trump. What will he do, faced with this mess of competing western military/security interests and Euro-bureaucrat careerists? Perhaps his US isolationist position is not so mad, bad and dangerous to know as the wailings of the western liberal press would have us believe?

            American “exceptionalism” and NATO interventionism have not exactly benefited much of the world since the end of the Cold War. Perhaps the time has indeed come for an American Commander-in-Chief who can cut deals, cut through the sabre-rattling rhetoric and, even unintentionally, make a significant contribution to world peace.

            Stranger things have happened. After all, outgoing President Obama won the Nobel Prize for Peace a mere eight months after his inauguration….

        • Transparency/Investigative Reporting

          • Assange ends testimony to prosecutors

            WikiLeaks founder Julian Assange has “co-operated fully” with prosecutors questioning him over a Swedish rape allegation and hopes the case against him will now be dropped, his lawyer Jennifer Robinson says.

            But she told reporters outside Assange’s refuge at the Ecuadorian Embassy in London on Tuesday that even if Swedish authorities drop the case he will still have to stay inside the embassy while a US investigation into WikiLeaks’ release of secret US government documents continues.

            In the embassy where he’s been holed up since mid-2016, the 45-year-old Australian on Tuesday finished two days of giving testimony on an allegation he raped a woman in Stockholm in 2010.

          • Why the World Needs WikiLeaks

            My organization, WikiLeaks, took a lot of heat during the run-up to the recent presidential election. We have been accused of abetting the candidacy of Donald J. Trump by publishing cryptographically authenticated information about Hillary Clinton’s campaign and its influence over the Democratic National Committee, the implication being that a news organization should have withheld accurate, newsworthy information from the public.

            The Obama Justice Department continues to pursue its six-year criminal investigation of WikiLeaks, the largest known of its kind, into the publishing of classified documents and articles about the wars in Iraq and Afghanistan, Guantánamo Bay and Mrs. Clinton’s first year as secretary of state. According to the trial testimony of one F.B.I. agent, the investigation includes several of WikiLeaks founders, owners and managers. And last month our editor, Julian Assange, who has asylum at Ecuador’s London embassy, had his internet connection severed.

          • What Will Be the Costs of Whistleblowing in Trump’s America When They Were Already Extreme Under Obama?

            It was around four in the morning when I received the phone call. “I was raided by the FBI,” said a trembling voice on the other end. “I need help.”

            I was immediately alarmed. I was in the middle of production of a highly risky investigation into the U.S. drone war, and I had gained exclusive access to film with two whistleblowers who wanted to go on the record about their experiences in the drone program. The voice on the phone belonged to one of them, and my research would later become the documentary film “National Bird.”

            When I answered the phone, I was at a veterans’ convention near Denver and had just established contact with a third whistleblower.

          • How Will Trump Deal with FOIA?

            President-elect Donald Trump campaigned on the idea that the media is incompetent, biased, and vindictive. He was also the first candidate in modern US history to refuse to release his tax returns.

            Taken together, the inbound Trump administration doesn’t look like it’s going to be particularly forthcoming or transparent with reporters. But how will his administration deal with the Freedom of Information Act, one of the most powerful tools reporters, activists, and researchers have to gain insight into the inner workings of government?

        • Environment/Energy/Wildlife/Nature

          • Indonesian fires exposed 69 million to ‘killer haze’

            Wildfires in Indonesia and Borneo exposed 69 million people to unhealthy air pollution and are responsible for thousands of premature deaths, new research has shown.

            The study, published today in Scientific Reports, gives the most accurate picture yet of the impact on human health of the wildfires which ripped through forest and peatland in Equatorial Asia during the autumn of 2015.

            The study used detailed observations of the haze from Singapore and Indonesia. Analysing hourly air quality data from a model at a resolution of 10km – where all previous studies have looked at daily levels at a much lower resolution – the team was able to show that a quarter of the population of Malaysia, Singapore and Indonesia was exposed to unhealthy air quality conditions between September and October 2015.

          • Britain ratifies Paris climate agreement

            Britain said on Thursday it had ratified the Paris Agreement, the global deal to combat climate change.

            The Paris Agreement came into force on Nov. 4 when more than 55 countries representing more than 55 per cent of global greenhouse gas emissions ratified the deal.

            “The UK is ratifying the historic Paris Agreement so that we can help to accelerate global action on climate change and deliver on our commitments to create a safer, more prosperous future for us all,” Nick Hurd, Minister of State for Climate Change and Industry, said.

          • Largest bank in Norway pulls its assets in Dakota Access pipeline

            A press release from Greenpeace Thursday says the largest bank in Norway, DNB, sold its assets in the Dakota Access pipeline. They say this decision was the result of 120,000 signatures from Greenpeace Norway and others to DNB, urging the bank and other financial institutions to pull finances from the project.

        • Finance

          • EU set to ask Ukip group to repay almost £150,000 in ‘misspent funds’

            Ukip is likely to be asked to repay tens of thousands of euros by European parliament finance chiefs who have accused the party of misspending EU funds on party workers and Nigel Farage’s failed bid to win a seat in Westminster.

            The Alliance for Direct Democracy in Europe, a Ukip-dominated political vehicle, will be asked to repay €173,000 (£148,000) in misspent funds and denied a further €501,000 in EU grants for breaking European rules that ban spending EU money on national election campaigns and referendums.

          • We must rethink globalization, or Trumpism will prevail

            Let it be said at once: Trump’s victory is primarily due to the explosion in economic and geographic inequality in the United States over several decades and the inability of successive governments to deal with this.

            Both the Clinton and the Obama administrations frequently went along with the market liberalization launched under Reagan and both Bush presidencies. At times they even outdid them: the financial and commercial deregulation carried out under Clinton is an example. What sealed the deal, though, was the suspicion that the Democrats were too close to Wall Street – and the inability of the Democratic media elite to learn the lessons from the Sanders vote.

          • Angela Merkel suggests TTIP trade deal won’t be concluded under Barack Obama’s presidency

            Angela Merkel has said the TTIP trade deal will not be completed now Donald Trump has been elected president of the United States.

            Speaking at a joint press conference with US President Barack Obama, the German Chancellor said the United States represents an important trading partner for both Germany and the European Union.

            “I’ve always come out strongly in favour of concluding a trade agreement with the United States of America,” Ms Merkel said.

            She added: “We have made progress, quite a lot of progress, but they will not be concluded now.

            “But we will keep what we have achieved so far, and I’m absolutely certain one day we will come back to what we have achieved and build on it.”

          • Goodbye, American neoliberalism. A new era is here

            The neoliberal era in the United States ended with a neofascist bang. The political triumph of Donald Trump shattered the establishments in the Democratic and Republican parties – both wedded to the rule of Big Money and to the reign of meretricious politicians.

            The Bush and Clinton dynasties were destroyed by the media-saturated lure of the pseudo-populist billionaire with narcissist sensibilities and ugly, fascist proclivities. The monumental election of Trump was a desperate and xenophobic cry of human hearts for a way out from under the devastation of a disintegrating neoliberal order – a nostalgic return to an imaginary past of greatness.

            White working- and middle-class fellow citizens – out of anger and anguish – rejected the economic neglect of neoliberal policies and the self-righteous arrogance of elites. Yet these same citizens also supported a candidate who appeared to blame their social misery on minorities, and who alienated Mexican immigrants, Muslims, black people, Jews, gay people, women and China in the process.

            This lethal fusion of economic insecurity and cultural scapegoating brought neoliberalism to its knees. In short, the abysmal failure of the Democratic party to speak to the arrested mobility and escalating poverty of working people unleashed a hate-filled populism and protectionism that threaten to tear apart the fragile fiber of what is left of US democracy. And since the most explosive fault lines in present-day America are first and foremost racial, then gender, homophobic, ethnic and religious, we gird ourselves for a frightening future.

        • AstroTurf/Lobbying/Politics

          • Daily Report: The Increasingly Tectonic Force of Social Media

            Social media has been in the glare since the election for its perceived harmful qualities, such as the spreading of hate speech and the false information.

            But the effect of social media on world affairs is much larger than just misinformation and mean tweets, Farhad Manjoo writes. In his new State of the Art column, he argues that social media — now collectively used by billions of people worldwide through services like Facebook, Snapchat, Twitter, WeChat and Weibo — has grown to a point where it is increasingly influencing the course of global events.

          • Facebook fake-news writer: ‘I think Donald Trump is in the White House because of me’

            What do the Amish lobby, gay wedding vans and the ban of the national anthem have in common? For starters, they’re all make-believe — and invented by the same man.

            Paul Horner, the 38-year-old impresario of a Facebook fake-news empire, has made his living off viral news hoaxes for several years. He has twice convinced the Internet that he’s British graffiti artist Banksy; he also published the very viral, very fake news of a Yelp vs. “South Park” lawsuit last year.

            But in recent months, Horner has found the fake-news ecosystem growing more crowded, more political and vastly more influential: In March, Donald Trump’s son Eric and his then-campaign manager, Corey Lewandowski, even tweeted links to one of Horner’s faux-articles. His stories have also appeared as news on Google.

          • The fact fake news ‘outperformed’ real news on Facebook proves the problem is wildly out of control

            BuzzFeed is reporting that at the end of the US presidential election, the top malicious fake news stories actually outperformed the most popular legitimate news stories shared by media companies.

            According to data from a Facebook-monitoring tool, the top 20 fake news stories collectively got more engagements – shares, likes, comments – than the top 20 factually accurate news stories shared by mainstream news outlets.

          • [Older] Did Newsweek’s Kurt Eichenwald Use Threats and Bribery to Silence a Young Journalist?

            In retrospect, it sounds preposterous: A nationally recognized journalist publishes an article alleging a conspiracy between the Republican candidate for President of the United States and Russia, and, when his hyperbole is exposed in an email from a young journalist, allegedly attempts to intimidate and bribe that journalist in exchange for his silence. Nevertheless, sometimes truth is stranger than fiction.

          • Here’s Your 2016 Election Explained from 2013

            Here’s an excerpt from my book Ghosts of Tom Joad: A Story of the #99 Percent. I wrote the passage below in 2013. Nobody wanted to read it then, nobody thought it meant anything. Well, maybe it makes more sense now. And, yeah, I’m a little bitter about that.

            “Yep. Thirty years on the big bucket, pouring out two hundred tons of steel a day. Lookit my right arm—muscle’s twice as thick as on the left ’cause of that lever I pulled every day. I got that job right after Korea in fact. My old man sent me to see the foreman while I was still wearing my uniform.”

            “How’s it up there now? I heard the president say he’s creating more jobs, so I was considering moving up.”

            “Moving on isn’t a bad idea. I wished I had done it at your age. Hell, I wished I’d done it last month.”

            “So there’s work where you’re from?”

            “Same there as it was four years ago and four years before that. Every four years the president comes back into western Pennsylvania like a dog looking for a place to pee. He reminds us that his wife’s cousin is from some town near to ours, gets photographed at the diner if it’s still in business, and then makes those promises to us while winking at the big business donors who feed him bribes they call campaign contributions. I’m tempted to cut out the middleman and just write in ‘Goldman Sachs’ on my ballot next election.”

          • ‘Yesterday We Were Stunned, Today We Organize’ – CounterSpin special report on what comes next after Trump’s election

            So, much to come, but for this week, what now for electoral reform and congressional diversity, for the environment, for Muslim-Americans and others made vulnerable by the so-called War on Terror in its domestic and international fronts? We’ll hear from Rob Richie and Cynthia Terrell from FairVote, from author and professor Deepa Kumar, from Phyllis Bennis of the Institute for Policy Studies, and from Patty Lovera from Food and Water Watch. They’re all coming up, but first a brief look back at recent press

          • How Trump’s ‘Chief Strategist’ Provided a ‘Platform for the Alt-Right’

            Stephen Bannon, the Trump campaign chief executive and the announced “Chief Strategist and Senior Counselor to the President” in the Trump administration, has declared of Breitbart, the website he still heads, “We’re the platform for the alt-right.” What did he mean by that?

            Well, the alt-right, by Breitbart‘s own description, is a coalition of advocates of “scientific race differences”; people interested in “the preservation of their own tribe and its culture” who “believe that some degree of separation between peoples is necessary for a culture to be preserved”; online traffickers in racist and antisemitic stereotypes who “feel a mischievous urge to blaspheme”; and a significant fringe of hardcore, pro-Hitler neo-Nazis.

          • Neo-Liberalism Under Cover of Racism

            The first, and highly successful method is to convince people that it is not the massive appropriation of resources by the ultra-wealthy which causes their poverty, it is rather competition for the scraps with outsiders. This approach employs pandering to racism and xenophobia, and is characteristic of UKIP and Trump.

            The second approach employs the antithesis to the same end. It is to co-opt the forces marginalised by the first approach and rally them behind an “alternative” approach which is still neo-liberalism. This is identity politics which reached its apotheosis in the Clinton campaign. The Wikileaks releases of DNC and Podesta emails revealed the extreme cynicism of Clinton manipulation of ethnic group votes. Still more blatant was the promotion of the idea that Hillary being a corrupt neo-con warmonger was outweighed by the fact she was female. The notion that elevating extremely rich and privileged women already within the 1% to top positions, breaks a glass ceiling and benefits all women, is the precise feminist equivalent of trickledown theory.

            That the xenophobic strand rather than the identity politics strand won will, I predict, prove to have no impact on continued neo-liberal policies.

          • You Are Still Crying Wolf

            Trump made gains among blacks. He made gains among Latinos. He made gains among Asians. The only major racial group where he didn’t get a gain of greater than 5% was white people. I want to repeat that: the group where Trump’s message resonated least over what we would predict from a generic Republican was the white population.

            Nor was there some surge in white turnout. I don’t think we have official numbers yet, but by eyeballing what data we have it looks very much like whites turned out in equal or lesser numbers this year than in 2012, 2008, and so on.

          • Barack Obama on fake news: ‘We have problems’ if we can’t tell the difference

            “If we are not serious about facts and what’s true and what’s not, if we can’t discriminate between serious arguments and propaganda, then we have problems,” he said during a press conference in Germany.

            Since the surprise election of Donald Trump as president-elect, Facebook has battled accusations that it has failed to stem the flow of misinformation on its network and that its business model leads to users becoming divided into polarized political echo chambers.

            Obama said that we live in an age with “so much active misinformation” that is “packaged very well” and looks the same whether it’s on Facebook or on TV.

          • The Electoral College Was Created to Stop Demagogues Like Trump

            Trump promises to bring to the presidency precisely the ‘tumult and disorder’ that Hamilton warned against

            Since Nov. 9, Donald Trump has been described as our “President-elect.” But many would be shocked to learn that this term is actually legally meaningless. The Constitution sets out a specific hurdle for Trump to ascend to the presidency. And that will not happen until Dec. 19 when the members of the Electoral College meet in their respective states to vote for the President.

          • Senator Boxer Introduces Bill to Eliminate Electoral College
        • Censorship/Free Speech

          • From Hate Speech To Fake News: The Content Crisis Facing Mark Zuckerberg

            Mark Zuckerberg — one of the most insightful, adept leaders in the business world — has a problem. It’s a problem he has been slow to acknowledge, even though it’s become more apparent by the day.

            Several current and former Facebook employees tell NPR there is a lot of internal turmoil about how the platform does and doesn’t censor content that users find offensive. And outside Facebook, the public is regularly confounded by the company’s decisions — around controversial posts and around fake news.

            (Did Pope Francis really endorse Donald Trump? Does Hillary Clinton really have a body double?)

          • Facebook’s Problem Is More Complicated Than Fake News

            In the wake of Donald Trump’s unexpected victory, many questions have been raised about Facebook’s role in the promotion of inaccurate and highly partisan information during the presidential race and whether this fake news influenced the election’s outcome.

            A few have downplayed Facebook’s impact, including CEO Mark Zuckerberg, who said that it is “extremely unlikely” that fake news could have swayed the election. But questions about the social network’s political significance merit more than passing attention.

          • Six Monarchs, 140 Dissidents, One Rule: Keep Your Mouth Shut

            Bahraini human rights activist Zainab al-Khawaja, known to her 47, 900 Twitter followers as @angryarabiya, faced trial in a courtroom in Manama in October 2014. The charges related to an incident two years earlier when she had ripped up a photo of Bahrain’s King Hamad in an act of protest. If the judge was expecting contrition, he was in for a shock. Al-Khawaja proceeded to pull out another photo of the king, ripped it up, and placed it in front of a bemused judge, who promptly adjourned the hearing and stomped off.

          • Why Twitter’s Alt-Right Banning Campaign Will Become The Alt-Right’s Best Recruitment Tool

            If there are two points worth hammering home on matters of free speech, they are that defenders of free speech must be willing to defend speech they don’t like and that the solution to bad speech is more good speech. I would argue that Western democracy as a whole can be defined as a political version of the Socratic Method, by which the electorate engages in public debate, constantly questioning the other side, in order to produce the most optimal thoughts. For those that value this method of discourse, it’s instantly recognized that it only works if you have opposing views. To that end, it’s imperative that we not only allow, but feverishly welcome, different points of view.

            But this kind of thinking is currently under assault in America, and from both sides. The latest example of this is Twitter’s recent decision to carpet-ban an entire slew of accounts linked to the so-called “alt-right” movement.

          • Mark Zuckerberg Continues to Miss the Point on Facebook as a Media Entity

            Zuckerberg says he “cares deeply” about the company’s fake news problem

            As critics slam Facebook for the role they believe it—and in particular its penchant for fake news stories—played in the election of Donald Trump, CEO Mark Zuckerberg continues to resist any attempt to pin some of the blame on his company. But in doing so, he misses the point.

            Over the weekend, the Facebook co-founder took to the site to respond to some of those criticisms. He said he “cares deeply” about the fake news problem and wants to get it right. But he also said that he doesn’t believe fake news contributed to the election’s outcome.

          • Kim Jong Un Gets New Mean Nickname After Chinese Censors Block Fat Jokes
          • China censors search reuslts for Kim Jong Un’s ‘Fatty’ nickname
          • China clamps down on Kim Jong-un ‘fatty’ jokes
          • China Really Doesn’t Want Anyone to Call Kim Jong-Un a ‘Fatty’
        • Privacy/Surveillance

          • UK Joins Russia And China In Legalizing Bulk Surveillance

            The highly-intrusive Investigatory Powers Bill has been passed by the UK’s House of Lords, and will come into force within weeks.

            The move gives the British government the power to spy on its citizens to an extent that’s virtually unprecedented anywhere in the world – only Russia and China have comparable regimes.

            It legalizes activities that the GCHQ spy agency had been illegally carrying out for years, including the bulk collection of personal communications data. It also allows both the security services and the police the power to hack into and bug electronic devices from smartphones to baby monitors.

            Meanwhile, internet and phone providers will be required to record and store for a year their customers’ phone and web activity. This will include the websites they’ve visited and the communications software they’ve used, along with every mobile app and more.

          • Your mobile phone records and home address for sale

            Corrupt insiders at offshore call centres are offering the private details of Australian customers of Optus, Telstra and Vodafone for sale to anyone prepared to pay.

            A Fairfax Media investigation can reveal Mumbai-based security firm AI Solutions is asking between $350 and $1000 in exchange for the private information, but even more if the target is an Australian “VIP, politician, police, [or] celebrity”.

          • Chinese tourist town uses face recognition as an entry pass

            Who needs tickets when you have a face? From today, the ticketed tourist town of Wuzhen in China is using face-recognition technology to identify people staying in its hotels and to act as their entry pass through the gates of the attraction.

            The system, which is expected to process 5000 visitors a day, has been created by web giant Baidu – often referred to as the “Chinese Google”.

            Wuzhen is a historic town that has been turned into a tourist attraction with museums, tours and traditional crafts. When people check in to hotels in the tourist area, they will now have their pictures taken and uploaded to a central database. If they leave and re-enter the town, the face-recognition software will check that they are actually a guest of a hotel there before allowing them back in.

          • UN privacy chief: UK surveillance bill is ‘worse than scary’

            Joseph Cannataci, the UN’s special rapporteur on privacy, attacked the government’s draft Investigatory Powers Bill, saying he had never seen evidence that mass surveillance works. He also accused MPs of leading an “absolute offensive” and an “orchestrated” media campaign to distort the debate and take hold of new powers.

            The comments came during a live streamed keynote presentation at the Internet Governance Forum in Brazil, where leading experts from around the world have gathered to discuss the future of the internet and web policy.

            In a wide-ranging presentation and discussion panel Cannataci — who has previously said the UK’s digital surveillance is similar to George Orwell’s 1984 — discussed the state of surveillance and privacy around the world. Pausing to briefly talk about the Home Office’s new bill, but without going deeply into detail, Cannataci said: “The snoopers’ charter in the UK is just a bit worse than scary, isn’t it.”

          • Google Unleashes its Machine Learning Group [Ed: Human learning at Google (spying, dossiers, classification, surveillance etc.) as “Machine Learning” ‘group’]
          • Companies Keep Asking Us To Track You; We’d Rather You Be Protected From Tracking
          • James Clapper, who led America’s digital mass surveillance efforts, has resigned
          • Director of National Intelligence James Clapper Resigns
          • James Clapper, the US intelligence chief, resigns
          • James Clapper, of NSA-scandal fame, is stepping down
          • America’s Top Spy Talks Snowden Leaks and Our Ominous Future

            Public appearances don’t come easily to James Clapper, the United States director of national intelligence. America’s top spy is a 75-year-old self-described geezer who speaks in a low, guttural growl; his physical appearance—muscular and bald—recalls an aging biker who has reluctantly accepted life in a suit. Clapper especially hates appearing on Capitol Hill, where members of Congress wait to ambush him and play what he calls “stump the chump.” As he says, “I rank testimony—particularly in the open—right up there with root canals and folding fitted sheets.”

          • Lawmakers Want To Halt Changes That Would Allow Trump Wider Hacking Abilities

            A group of senators are making a last-ditch effort to delay proposed changes to a federal rule that would greatly expand the government current hacking powers.

            The Review the Rule Act would delay the proposed changes to Rule 41, officially known as the Federal Rule of Criminal Procedure 41, from going into effect until July 1, 2017. Earlier this year, the Supreme Court approved proposed changes to Rule 41, giving Congress until Dec. 1 to modify, reject, or postpone the changes established by the court before they become law.

            Broadly speaking, Rule 41 deals with circumstances in which the government is allowed to tap into citizen’s computers.

            The bipartisan group backing the bill includes Democratic Senators Chris Coons, Steve Daines, Ron Wyden, and Al Franken and Republican Senator Mike Lee, together with Representatives John Conyers Jr., and Ted Poe, a Democrat and Republican respectively.

          • Britain has passed the ‘most extreme surveillance law ever passed in a democracy’

            The new law, dubbed the “snoopers’ charter”, was introduced by then-home secretary Theresa May in 2012, and took two attempts to get passed into law following breakdowns in the previous coalition government.

            Four years and a general election later — May is now prime minister — the bill was finalized and passed on Wednesday by both parliamentary houses.

            But civil liberties groups have long criticized the bill, with some arguing that the law will let the UK government “document everything we do online”.

            It’s no wonder, because it basically does.

            The law will force internet providers to record every internet customer’s top-level web history in real-time for up to a year, which can be accessed by numerous government departments; force companies to decrypt data on demand — though the government has never been that clear on exactly how it forces foreign firms to do that that; and even disclose any new security features in products before they launch.

          • Oregon Sen. Ron Wyden threatens to filibuster if Trump goes after encryption

            Democratic Sen. Ron Wyden of Oregon, who was re-elected last week, told VICE News in an exclusive interview that he is willing to cross the aisle to work with President-elect Donald Trump, but that he is also poised for battle on civil liberties.

            Wyden is a member of the Senate Intelligence Committee and has gone up against the NSA and the CIA. He thinks national security will play a prominent role in the Trump administration. And even though his party is in the minority in Congress, he intends to hold Trump accountable should the president try to weaken protections surrounding encryption.

          • Privacy is the only working antidote against echo chambers

            Echo chambers are causing real harm to developing a coherent discourse in any subject, but those echo chambers all depend on identity. Replace the identity with privacy, and the echo chamber cannot function, instead allowing for a diverse range of unidentified opinions and viewpoints.

            The term “echo chamber” has gotten a revival lately, and especially after the recent US presidential election: the dangers of only speaking to, and hearing, likeminded people – being in an “echo chamber” where your own opinions are echoed back at you. Facebook is cited as one of the worst echo-chamber environments, and for good reason.

            Wall Street Journal’s “Blue Feed, Red Feed” demonstration really highlights how bad the phenomenon is: you only see news stories that reinforce your existing opinions. (If you haven’t seen the demo, it’s worth seeing.) Since Facebook is a for-profit company, it tries to keep us happy, and part of keeping us happy is confirming that we’re right about basically everything we believe.

          • Why the Investigatory Powers Act is a privacy disaster waiting to happen

            On Thursday, the Investigatory Powers Bill, colloquially known as the Snoopers’ Charter, completed its final stage and is set to become law. The legislative process began in March of this year, and has been rather overshadowed by the Brexit referendum and its shambolic aftermath. As a result, the UK government has had a comparatively easy ride over what are some of the most extreme surveillance powers in the world.

          • Snooper’s Charter is set to become law: how the Investigatory Powers Bill will affect you

            After more than 12 months of debate, jostling and a healthy dose of criticism, the United Kingdom’s new surveillance regime is set to become law.

            Both the House of Lords and House of Commons have now passed the Investigatory Powers Bill – the biggest overhaul of surveillance powers for more than a decade.

            Now the bill has been passed by both of these official bodies, it is almost law. Before it officially is adopted, however, it will need to receive Royal Assent, which is likely to be given before the end of 2016 (to match the government’s intentions and ahead of existing surveillance laws expiring).

          • Burner Phones and Email Encryption: Protecting Documentary Sources in a Surveillance State

            I bought a burner phone in cash and felt like a criminal. Earlier, as I was spreading the dollar bills on the counter, I asked myself, “Am I completely paranoid?” It was not the first time during the production of my drone warfare documentary, National Bird, that this thought crossed my mind, and it was certainly not the last.

            But I was not paranoid – and neither were the protagonists of my film, three whistleblowers who had worked in the U.S. drone program with top-secret clearances. Less than 24 hours prior to my phone purchase, one of them had had their home raided by the FBI and was now being investigated for espionage. I needed to contact my lawyer, an expert on First Amendment rights, and given the recent turn of events, using my own phone did not seem like a good idea.

            When I started my research for National Bird, I knew I was entering dangerous territory loaded with sensitive information. My goal for the film was to speak to the people directly impacted by the drone war, not to some pundits in suits in front of bookshelves. I wanted to gain access to the people on the inside who were fighting this high-tech war, and to the victims and survivors in the target countries. This was a risky project from the outset and it became necessary to work with lawyers to reduce the risks for everyone involved.

          • iPhone call history can be extracted from an iCloud account

            APPLE USERS are having their call records stored in the company’s iCloud servers in a way that can be extracted by third parties.

            Russian software house ElcomSoft has revealed that it has found a way to extract the data in near real time, for anyone targeting a phone with iOS 9 or above.

            The company has released an app called ElcomSoft Phone Breaker 6.20, capable of performing its nefarious mischief even on a locked, PIN-protected phone.

          • Apple logs iPhone, iMessage and FaceTime calls in iCloud

            Despite Apples’ apparent strong stance on security, its user’s iCloud Drives are frequently accessed by legal authorities.

            Even in the now famous case of the case of the San Bernardino shooter, Apple revealed it had already handed over access to the shooters iCloud. That data includes email logs and content, text messages, photos, documents, contacts, calendars, bookmarks and iOS device backups.

          • Apple Uploading Call Data, Including From Third-Party Call Apps, To Users’ iCloud Accounts

            Plain vanilla call records aren’t that difficult to obtain. They’ve long been considered third-party records and can be obtained without a warrant. The Intercept quotes a former FBI agent as saying this is a “boon” for law enforcement because the four-month retention period is longer than most service providers’.

            That doesn’t seem to be correct at all. The EFF’s Nate Cardozo points out that most service providers retain call logs for at least a year, with some retaining records for as long as a decade. Kim Zetter, who wrote the piece for The Intercept, believes it might be a misunderstanding. Providers may retain content (messages, etc.) for a shorter time frame than the four months of records Apple automatically uploads, but former agent Robert Osgood (quoted in The Intercept’s piece) clearly states he’s referring to call logs.

        • Civil Rights/Policing

          • Christians sentenced to 80 lashes by Sharia court for drinking communion wine

            Yaser Mosibzadeh, Saheb Fadayee and Mohammed Reza Omidi will be flogged in public after being arrested at a house church gathering in Rasht, Iran, earlier this year.

            The trio spent weeks in prison before finally being released on bail, but will now be subjected to the cruel and degrading punishment after being found guilty by Islamist judges.

            Security agents also raided the home of their pastor Yousef Nadarkhani and his wife Fatemeh Pasandideh and arrested them at the same time, but they were not detained.

          • Amnesty criticises Indonesia for blasphemy probe against Governor Ahok

            Amnesty International has asked Indonesia to drop the blasphemy probe against Jakarta’s Chinese Christian Governor Basuki “Ahok” Tjahaja Purnama.

            Ahok was in the limelight in the last few weeks after hardline Islamist organisations demanded his ouster and held a rally in capital Jakarta that turned violent.

          • Briton who reported rape in Dubai could face jail for extramarital sex

            A British woman who reported being raped by two men is “petrified” after being told she faces jail in Dubai for extramarital sex.

            The 25-year-old tourist claimed she was attacked by two men while on holiday in the United Arab Emirates and reported the incident to police.

            But officers then charged the professional from Cheshire with extramarital sex and, despite being bailed, she is not allowed to leave the country. Her passport has been confiscated and UK-based UAE legal experts Detained in Dubai said she could face a prison sentence if found guilty.

            The family of the woman, who cannot be named for legal reasons, have set up fundraising pages online to raise money to cover her legal costs. She is currently residing in a safe house.

            The woman’s father wrote online that his daughter had met the two men in her hotel who raped her. He claims the alleged attack was filmed. He added: “She is stranded, is not allowed to leave the country, and is alone scared, and in a dreadful situation, as you can imagine.”

          • Turnkey Tyranny: Jamming the Lock on the Way Out

            For six years—from 2006 to 2013—I worked inside the intelligence community to enforce laws and policies that protect privacy and civil liberties. My tenure spanned the administrations of George W. Bush and Barack Obama. The surveillance policies of both administrations enlarged the powers of the National Security Agency (NSA) and other intelligence agencies and put considerable strain on privacy.

            Edward Snowden’s disclosures of mass surveillance programs, beginning in 2013, led to a course correction in the late Obama years. Changes included a substantial transparency drive, limits on signals intelligence collection that apply to foreigners, and reforms to the Foreign Intelligence Surveillance Act (FISA) that include the end of bulk collection of metadata under that law. I have argued that the Snowden reforms forced the NSA to become “more transparent, more accountable, more protective of privacy—and more effective.”

            Still, we delude ourselves if we think they have made the NSA tyrant-proof. In Snowden’s first interview from Hong Kong, warned against “turnkey tyranny.” One day, he said, “a new leader will be elected” and “they’ll find the switch.” With Donald Trump’s election, it is important that this warning not be proved prophetic. While the United States has a robust system of intelligence oversight—the strongest in the world—it still largely depends on the good faith of Executive Branch officials.

          • Trump’s Torture Promise Hits A Deep Nerve For The People Who Worked To Ban It

            President-elect Donald Trump’s promise to bring back enhanced interrogation techniques — including waterboarding and “a hell of a lot worse than waterboarding” — is rattling the tight-knit community of government officials and activists who have worked for a decade to forbid it.

            “I cannot believe we are honestly having this convo,” one anti-torture advocate, who has helped shape interrogation policy during Obama’s tenure, wrote to BuzzFeed News in an email. “This is so fucking depressing.”

            Trump first promised back in February, months before he won the Republican nomination, that he would revive the use of Bush-era interrogation tactics — like waterboarding, sleep deprivation and rectal feeding — that have since been outlawed and labeled torture. After his win, Republican lawmakers are coming out of the woodwork and endorsing his plan. Sen. Tom Cotton said Wednesday night that he had faith in Mr. Trump to “make those tough calls” to bring back waterboarding.

            For this small community — made up of a smattering of human rights groups, activists and former national security officials — that rhetoric threatens to invalidate nearly a decade of anti-torture efforts and void the marginal, but significant, successes under the Obama administration. While Obama has been fiercely criticized for failing to prosecute Bush-era officials for the CIA’s now-defunct torture program and for aiding the CIA’s obfuscation on the issue, there has been slow, but significant effort to close off pathways for the US to torture in the future, including policies that have passed through Congress.

          • Chelsea Manning Formally Petitions Obama to Commute Her Sentence

            Last week, Chelsea Manning formally petitioned President Obama for clemency, asking him to reduce the remainder of her 35-year sentence to time served. According to the New York Times, Manning, who pleaded guilty in 2010, has been imprisoned for longer than any other whistleblower in American history.

            In a statement accompanying the petition, a copy of which was provided to Jezebel, Manning said she took “full and complete responsibility” for leaking the secret military and diplomatic documents. “I have never made any excuses for what I did. I pleaded guilty without the protection of a plea agreement because I believed the military justice system would understand my motivation for the disclosure and sentence me fairly. I was wrong.”

          • The United Kingdom is a Malign Entity that Must Be Broken – Indefensible Chagos Decision

            I have no doubt the majority of people in the UK would be horrified by the deportation of the Chagos Islanders. But the entire political and economic structure of the UK state is such that it is inevitably a satrap to United states Crimes, be it in Diego Garcia, Iraq, Afghanistan, Libya or elsewhere. The only remedy is for the United Kingdom and its worldwide imperial pretensions to be ended as a state. I express this view succinctly here:

          • UK Home Secretary Agrees To Turn Over Accused Hacker Lauri Love To US Government

            Accused hacker Lauri Love is headed to the United States to face prosecution, thanks to an order signed by UK Home Secretary Amber Rudd. The Home Office felt that — after “all things” were “considered” — the best place for an Asberger’s sufferer with suicidal tendencies is the US prison system, most likely segregated from the general population.

        • Intellectual Monopolies

          • Copyrights

            • Music torrent site What.cd has been shut down

              What.cd, an invite-only music torrent website first launched in 2007, has been shut down after a raid by French authorities. The private tracker offered free (and often illegal) access to a massive, deeply thorough collection of music and was popular among audiophiles for its strict rules around quality and file formats. The site was created after the shutdown of another well-known torrent website, Oink, which operated between 2004 and 2007. Though its primary focus was music sharing, What.cd also permitted torrents of computer software, ebooks, and other content.

            • World’s largest music torrent site goes dark, disputes report about server seizure

              It took nearly 10 years, but authorities have finally targeted and taken down What.cd, which had risen to become the Internet’s largest invite-only, music-trading torrent site.

              The news was confirmed by the tracker’s official Twitter account on Thursday via two posts: “We are not likely to return any time soon in our current form. All site and user data has been destroyed. So long, and thanks for all the fish.”

            • BREIN’s New Torrent Piracy Crackdown Results in First Settlement

              Last year, Dutch anti-piracy group BREIN announced a broad crackdown on torrent pirates, which resulted in the first settlement this week. The person in question paid 4,800 euros for sharing 12 TV-show episodes. According to BREIN, hundreds of thousands of pirates are now at risk of receiving similar treatment.

            • Mega Compromised by Hackers (Updated)

              Mega, the cloud storage site originally founded by Kim Dotcom, was compromised by hackers this week. Outsiders gained access to part of the site’s infrastructure and released some source code, claiming to have user details as well. Mega confirmed the hack of their seperate blog/help centre system but says that no user data was compromised

        ]]>
        http://techrights.org/2016/11/18/gnu-octave-4-2/feed/ 0
        Links 15/11/2016: “498 out of 500 of the Speediest Computers on the Planet Are Running Linux” http://techrights.org/2016/11/15/hpc-498-out-of-500/ http://techrights.org/2016/11/15/hpc-498-out-of-500/#comments Tue, 15 Nov 2016 22:43:27 +0000 http://techrights.org/?p=96801

        GNOME bluefish

        Contents

        GNU/Linux

        Free Software/Open Source

        • ARK Crew Releases Open Source Code on GitHub

          ARK Crew, developers of the new ARK cryptocurrency ecosystem, has announced the release of its open source code on GitHub. The source code launch was set to coincide with the platform’s first developer-focused bounty program, designed to encourage others to participate in the review and provide feedback on the project.

        • Editorial: What Does Open Source Mean to You?

          The same goes for the large amount of open source JavaScript projects available to us developers. Whether they are intended to help you build amazing apps, or as a learning resource to help you level up your skills, these are all projects, supported and maintained by the community. Thanks to the collaborative nature of open source, you’re free to download and modify any of them and, most importantly, to contribute any changes you make back to the project itself.

          I love open source and I’m thankful for it. It’s an integral part of working on the internet, but one which it is all to easy to overlook. That’s why I’m happy that we’re dedicating a whole week’s worth of articles to the subject. Talking of which, let’s look at what we have in store…

        • ‘World’s first Open Source SDN and NFV Orchestrator’ demonstrated at Operations Transformation Forum

          Huawei demonstrated the OPEN-O Sun, said to be the world’s first Open Source SDN and NFV Orchestrator, at the Operations Transformation Forum 2016 in Wuzhen, China.

          The forum brought together industry leaders from around the world to discuss the transformation of digital operations and share best practices. Helen Chen, leader of the OPEN-O Integration Project noted that the OPEN-O Orchestrator will soon be commercially available.

        • What to do about free riders in open organizations and communities: Addressing open source’s free rider problem

          For advice on addressing this problem, Jonathan suggests we look to ecosystem management, “an industry in itself, with its attendant experts, who write books and speak at conferences.” I recently read one of the seminal books in this area, Governing the Commons, by Nobel laureate Elinor Ostrom, and I’d like to offer some initial thoughts on how it might apply to open organizations and open source sustainability.

          [...]

          Free-riding in open source communities leads to overworked and underpaid individuals, and eventually to burnout. It’s bad for people, and it’s bad for projects. It’s a problem we need to address. Ostrom shows us how to tackle the problem with a methodical approach to institutional design and analysis. Open organizations that steward open source software projects have much to learn from her, while recognizing that we will need to adapt her recommendations to fit our situation.

        • Web Browsers

        • SaaS/Back End

          • What’s In Store for Cloud Computing, Apache CloudStack in 2017?
          • Apache jclouds 2.0, a Java Multi-Cloud Toolkit, Arrives

            Over the past several months, we’ve taken note of the many open source projects that the Apache Software Foundation has been elevating to Top-Level Status. The organization incubates more than 350 open source projects and initiatives, and has squarely turned its focus to data-centric and developer-focused tools in recent months. As Apache moves these projects to Top-Level Status, they gain valuable community support.

            Apache also incubates a number of interesting cloud-centric projects. Now, it has announced the availability of Apache jclouds v2.0, which is a Java multi-cloud toolkit.

        • Databases

        • Pseudo-Open Source (Openwashing)

        • FSF/FSFE/GNU/SFLC

          • GCC 7 Feature Development Ends

            GCC 7 feature development is officially over with the development phase entering stage three now where the focus is on bug-fixing.

            While GCC 7 feature development has ended, Red Hat’s Jakub Jelinek wrote in this latest GCC status report, “Patches posted early enough during Stage 1 and not yet fully reviewed may still get in early in Stage 3. Please make sure to ping them soon enough.”

        • Public Services/Government

          • Parliament: Navarre should move to use open source

            The Parliament of Navarre, one of Spain’s autonomous regions, wants the region to switch to free and open source software. A resolution urging the government to draft a migration plan was adopted by the Parliament on 27 October.

          • [Older] Uncle Sam launches open source trove of government code

            The United States government has made good on its policy of requiring agencies to release 20 per cent of their bespoke code as open source by making code.gov live, complete with lots of code.

          • Hungary aims to get rid of IT vendor lock-in

            Hungary’s central government wants to reduce its dependency on a handful of IT vendorsm. To begin with, a decision taken last week aims to reduce the use of a proprietary office productivity suite by 60 % in 2020. The government also wants to improve its procurement of IT solutions in order to to create business opportunities for small and medium-sized companies.

          • Russian Bill Makes Free Software a Public Priority

            The draft, approved by the Russian Federation’s Duma (lower chamber) in mid-October, requires the public sector to prioritise Free Software over proprietary alternatives, gives precedence to local IT businesses that offer Free Software for public tenders, and recognises the need to encourage collaboration with the global network of Free Software organisations and communities.

          • Russian Bill makes Free Software a Public Priority

            Legislators have drafted a bill that will boost Free Software on multiple levels within the Russian Federation’s public sector.

            The draft, approved by the Russian Federation’s Duma (lower chamber) in mid-October, requires the public sector to prioritise Free Software over proprietary alternatives, gives precedence to local IT businesses that offer Free Software for public tenders, and recognises the need to encourage collaboration with the global network of Free Software organisations and communities.

            The text enforces prioritising Free Software over proprietary alternatives by requiring public administrations to formally justify any purchase of proprietary software. The purchase will be considered unjustified if a Free Software solution exists that satisfies the list of technical specifications and standards. In addition, all IT purchase agreements in the public sphere must be registered in a dedicated registrar and detail the overall quantity and price of both purchased proprietary and Free Software.

        • Licensing/Legal

          • Open source licenses are shared resources

            One can easily see examples of software as a shared resource, whether shared by a few people or a few million people. Of course, these shared resources are not always as fully appreciated as they should be. They can pass underappreciated until drama such as a security vulnerability draws attention and illuminates the importance of what is being shared.

            But a license? A shared resource?

            Yes, open source licenses are shared resources. And, they, too, may be underappreciated until a vulnerability is exploited. Legal documents (contracts, licenses, whatever they may be called) are typically unique to each commercial enterprise. Certainly, there is some commonality. Lawyers adapt from what others have done. Patterns are followed. Text is reused.

          • Building Out an Open Source Project? Your License Matters

            It was only a few years ago when Red Hat CEO Jim Whitehurst made the prediction that open source software would soon become nearly pervasive in organizations of all sizes. That has essentially become true, and many businesses now use open source components without even knowing that they are doing so.

            As businesses adopt open source platforms such as OpenStack and Hadoop, they are complementing them with their own open source projects.For these reasons and other ones, it is more important than ever to know your way around the world of laws and licenses that pertain to open source software. Leaders of new projects need to know how to navigate the complex world of licensing and the law, as do IT administrators. Here is our newly updated ollection of resources to help you navigate the world of open source laws and licenses.

            We’ve rounded up some resources on open source, licenes and the law, as seen in this post, but the topic remains a moving target. Did you know that there is an official, free journal dedicated to open source law? It’s the International Free and Open Source Software Law Review, and it’s worth looking into.

        • Openness/Sharing/Collaboration

          • Boundless Launches GIS Products Based on Open-Source, Data-Rich Future

            In a proprietary, license-based model, users might need to pay more to scale up their operations. For some, the extra costs might mean going through a procurement cycle, which takes time and resources.

          • Free and open sewing patterns gain popularity

            About two months ago, I started rewriting the entire Makemypattern.com codebase. I am using this opportunity to implement some improvements and features that were difficult to implement in the existing backend. But my main reason is that I am going to make all of my code available as open source. And for that, I need to make it easy for others to extend and adapt the code.

            With a mission that is not merely about making patterns anymore, I also feel like a name change was needed. So when I finish my rewrite, I will relocate to Freesewing.org, which is free as in beer and free as in speech.

        • Programming/Development

        Leftovers

        • How Google changed itself for India in a ‘mission to connect the world’

          Alphabet Inc’s Google is ready to spend billions to get millions of Indians online– through a slew of India-specific products and initiatives – to stay relevant in the world’s fastest-growing internet economy.

          With 350-million internet users, India has already surpassed the US, and the number is expected to double by 2020. Around 15,000 new Indians log onto the internet every day, fitting perfectly in Google’s scheme of the “next billion internet users” gambit to acquire new customers.

          But this wasn’t the case three years ago, not until smartphones burgeoned and a large number of people started accessing the Net through their phones.

          All that makes India more important for Google, especially after China, which has the maximum number of internet users globally, closed its doors the American internet firm.

        • Science

          • The Distribution of Users’ Computer Skills: Worse Than You Think

            One of usability’s most hard-earned lessons is that you are not the user. This is why it’s a disaster to guess at the users’ needs. Since designers are so different from the majority of the target audience, it’s not just irrelevant what you like or what you think is easy to use — it’s often misleading to rely on such personal preferences.

            For sure, anybody who works on a design project will have a more accurate and detailed mental model of the user interface than an outsider. If you target a broad consumer audience, you will also have a higher IQ than your average user, higher literacy levels, and, most likely, you’ll be younger and experience less age-driven degradation of your abilities than many of your users.

        • Health/Nutrition

          • Flint mayor asks for state of emergency renewal over water crisis

            Mayor Karen Weaver has asked for a renewal of the state emergency it was declared nearly one year ago over Flint’s water crisis.

            A resolution is on the agenda for Flint City Council members to approve or deny the request at Monday evening’s meeting as the declaration is due to expire Nov. 14.

            “Mayor Karen W. Weaver has stated that it imperative that Flint’s state of emergency remain in place until the city of Flint’s drinking water is deemed safe to drink without a filter,” states the resolution.

          • Congress begins lame duck session, with Flint water crisis funding on the agenda

            Michigan’s senior U.S. Senator says there are some things that Congress has to address when it returns to work this week.

            Sen. Debbie Stabenow says her top priority during Congress’ lame duck session will be lining up federal money for Flint.

            “We have a promise that was made to me by the Speaker of the House and the Republican Majority Leader that before the end of this year we would pass the money that’s critical to fixing the pipes in Flint,” says Stabenow.

          • VW admits Audi automatic transmission software can change test behavior

            Last week, a German newspaper reported that Audi was hiding emissions-cheating software in its automatic transmissions. I don’t know why it took a whole week, but Volkswagen finally came around to admitting as much.

            “Adaptive shift programs can lead to incorrect and non-reproducible results” in emissions tests, Volkswagen told Reuters on Sunday. Software in the AL 551 automatic transmission may detect testing conditions and shift in a way that minimizes emissions, only to act “normally” out on the road. Much like Dieselgate’s defeat device, that leads to higher-than-imagined pollution, which could be in excess of legal limits.

            Audi’s AL 551 can be found in both gas and diesel vehicles, including the A6, A8 and Q5.

          • WTO ‘Paragraph 6’ System For Affordable Medicine: Time For Change?

            A range of practitioners and representatives in the manufacture of medicines, intergovernmental officials, academics and civil society representatives last week gave diverse views on the effectiveness of a waiver to international trade rules intended to ease shipments of affordable medicines to low-income countries.

            Alongside the first day of the 8-9 November World Trade Organization Council for Trade-Related Aspects of Intellectual Property Rights (TRIPS), the intergovernmental South Centre held a side event to discuss experiences in the implementation and the effective functioning of the system.

          • New MSF survey: Thousands of kids dying in northeast Nigeria

            Thousands of children have died of starvation and disease in Boko Haram-ravaged northeastern Nigeria, Doctors Without Borders said Tuesday quoting a new survey that is forcing Nigerian officials to stop denying the crisis.

            The Paris-based organization hopes that official recognition of the calamity in which “thousands are dying” will help bring urgent aid before older children also start dying, Natalie Roberts, emergency program manager for northeast Nigeria, told The Associated Press.

            A survey of two refugee camps in the northeastern city of Maiduguri shows a quarter of the expected population of under-5 children is missing, assumed dead, according to the organization. Under-5 mortality rates in the camps are more than double the threshold for declaring an emergency, Roberts said in a phone interview from Paris.

        • Security

          • Security advisories for Monday
          • How to Secure Your Ubuntu Network

            In 2016, keeping your Ubuntu network secure is more important than ever. Despite what some people might think, there’s much more to this than merely putting up a router to protect a network. You must also configure each of your PCs properly to ensure you’re operating within a secure Ubuntu network. This article will show you how.

          • Linux Foundation Back Reproducible Builds Effort for Secure Software

            Building software securely requires a verifiable method of reproduction and that is why the Linux Foundation’s Core Infrastructure Initiative is supporting the Reproducible Builds Project.

            In an effort to help open-source software developers build more secure software, the Linux Foundation is doubling down on its efforts to help the reproducible builds project. Among the most basic and often most difficult aspects of software development is making sure that the software end-users get is the same software that developers actually built.

          • Boy, 17, admits TalkTalk hacking offences

            A 17-year-old boy has admitted hacking offences linked to a data breach at the communications firm TalkTalk.

            Norwich Youth Court was told he had used hacking tool software to identify vulnerabilities on target websites.

          • Upgrade for KDE neon Security Issue

            Last month we moved the neon archive to a new server so packages got built on our existing server then uploaded to the new server. Checking the config it seemed I’d made the nasty error of leaving it open to the world rather than requiring an ssh gateway to access the apt repository, so anyone scanning around could have uploaded packages. There’s no reason to think that happened but the default in security is to be paranoid for any possibility.

          • Security B-Sides conferences attract growing information security crowd

            The Security B-Sides DC conference is part of the B-Sides movement, which was created to provide a community framework to build events for and by information security practitioners. Alex Norman, the co-director of Security B-Sides DC, tells us how he wants to expand information security beyond security professionals, and to involve a larger, more diverse community.

          • Major Linux security hole gapes open

            An old Linux security ‘feature’ script, which activates LUKS disk encryption, has been hiding a major security hole in plain sight.

          • A Linux Exploit That Uses 6502 Code

            With ubiquitous desktop computing now several decades old, anyone creating an operating system distribution now faces a backwards compatibility problem. Each upgrade brings its own set of new features, but it must maintain compatibility with the features of the previous versions or risk alienating users. If you are a critic of Microsoft products for their bloat, this is one of the factors behind that particular issue.

          • Cryptsetup Vulnerability Allows Easily Getting To A Root Shell

            CVE-2016-4484 was disclosed on Monday as a Cryptsetup issue that allows users to easily gain access to a root initramfs shell on affected systems in a little over one minute of simply hitting the keyboard’s enter key.

            This Cryptsetup vulnerability is widespread and easy to exploit, simply requiring a lot of invalid passwords before being dropped down a root shell. The data on the LUKS-encrypted volume is still protected, but you have root shell access. The CVE reads, “This vulnerability allows to obtain a root initramfs shell on affected systems. The vulnerability is very reliable because it doesn’t depend on specific systems or configurations. Attackers can copy, modify or destroy the hard disc as well as set up the network to exflitrate data. This vulnerability is specially serious in environments like libraries, ATMs, airport machines, labs, etc, where the whole boot process is protect (password in BIOS and GRUB) and we only have a keyboard or/and a mouse.”

          • CVE-2016-4484: Cryptsetup Initrd root Shell
          • Security updates for Tuesday
          • Super Mari-owned: Startling Nintendo-based vulnerability discovered in Ubuntu
        • Defence/Aggression

        • Transparency/Investigative Reporting

          • Assange Is Questioned in London Over Rape Accusation in Sweden

            Six years after the Swedish authorities opened an investigation into a rape accusation made against Julian Assange, the WikiLeaks founder, he was questioned about the matter on Monday.

            The questions were prepared by prosecutors in Sweden, where an arrest warrant for Mr. Assange was issued in 2010, but were posed by a prosecutor from Ecuador under an agreement the two countries made in August. Ecuador granted Mr. Assange political asylum in 2012, and the interview occurred at the Ecuadorean Embassy in London. Mr. Assange has lived in the embassy since June 2012 to avoid extradition to Sweden over the rape accusation.

        • Environment/Energy/Wildlife/Nature

          • Thanks to Donald Trump, China just won the global green technology sector

            There’s no denying who the king of technology in the 20th century was: America. But the 21st century poses new challenges that must be met by the rise of the green technology and green energy sectors across the globe. And whatever country is producing the best green tech solutions is in the pole position to spring to the top of the 21st century technological heap.

            America’s election of Donald Trump virtually guarantees that country will be China.

            To be fair, China was already ahead of the US on this front. It began investing big in green tech more than a decade ago, and it is now the world’s leading investor in green energy. Last year alone, China invested more than US$100 billion in green energy – that’s more than double what the US invested – and that number is expected to grow. Trump or no, there’s a good chance China would have won this race. But the US, the second-biggest global investor, was in a better position than any other single nation to challenge China on this front.

          • Floridians Wonder How President-Elect Trump Will Deal With Their Rising Seas

            Mar-a-Lago, President-elect Donald Trump’s signature piece of property in the South, is just 70-miles north of Miami in Palm Beach, a mostly upscale barrier island. But the residence and private club is likely to be affected by the rising tides and increasingly powerful hurricanes that now regularly batter the coast of Florida.

            Miami and nearby coastal towns in Florida are, and will be, impacted by changes in our climate—the sea levels in just the past decade rose at double the rate of the entire century before, according to the World Resource Institute. But in the end, Floridians chose noted climate change-skeptic Donald Trump as their future leader.

        • Finance

          • EU ministers to discuss plan to charge Britons to visit Europe after Brexit

            A European plan under which Britons will face a £10 charge to travel to the EU after Brexit is to be discussed by interior ministers this week.

            The plan for a European version of the US visa waiver programme has already won the backing of the British diplomat now in charge of European security.

            Sir Julian King, the European commissioner for the security union is to give evidence to peers on Tuesday. He has described the plan as “a valuable additional piece of the jigsaw” in the war against international terrorism.

          • Why India wiped out 86% of its cash overnight

            On 8 November, Prime Minister Narendra Modi gave only four hours’ notice that virtually all the cash in the world’s seventh-largest economy would be effectively worthless.

            The Indian government likes to use the technical term “demonetisation” to describe the move, which makes it sound rather dull. It isn’t. This is the economic equivalent of “shock and awe”.

            [...]

            These may be the largest denomination Indian notes but they are not high value by international standards – 1,000 rupees is only £12. But together the two notes represent 86% of the currency in circulation.

            Think of that, at a stroke 86% of the cash in India now cannot be used.

            What is more, India is overwhelmingly a cash economy, with 90% of all transactions taking place that way.

            And that is the target of Mr Modi’s dramatic move. Because so much business is done in cash, very few people pay tax on the money they earn.

          • Donald Trump victory wipes $1 trillion off value of global bond markets

            Donald Trump’s stunning victory in the US presidential election wiped more than $1 trillion (£800bn) off the value of global bond markets in two days.

            President-elect Trump has pledged to massively increase infrastructure spending, which has caused a big shift away from the safety of government debt and into the shares of companies who may cash in on any spending bonanza. The wider stock market has also risen on the back of investors’ predictions of increased growth.

            Turning on the government spending taps would push up inflation, meaning that the already meagre returns on US bonds would head into negative territory, adding more reasons to sell and move into riskier assets.

          • 7 WTF Ways Famous Companies Rip You Off Every Day

            There’s a righteous, almost smug satisfaction to buying something cheap. It feels like we’re sticking it to the big companies by denying them those extra ten cents per unit on a box of Kit Kats. However, no one loves a bargain more than the businesses themselves. That usually takes the form of tax evasion and poor wages, but sometimes they like to get … creative.

          • Baby dies after Indian hospital refuses to accept parents’ money because of country’s new cash note ban

            A baby died when a hospital in India refused to accept a deposit paid in banknotes which were withdrawn from circulation the day before.

            Police said they are investigating a doctor in a Mumbai suburb who allegedly turned away a couple with a premature baby because they did not have the correct currency.

            Kiran Sharma gave birth to a boy around one month early on 9 November and was rushed to Jeevan Jyot Hospital in Govandi to the east of the city, reported The New Indian Express.

        • AstroTurf/Lobbying/Politics

          • VP Elect Mike Pence Goes To Court To Keep His Emails Secret

            The circumstances are different, but the general principle is the same — and there’s a really important issue at stake when it comes to FOIA and public records issues. The background is fairly convoluted, but here’s a quick summary. After President Obama announced a plan to defer enforcement of certain immigration laws for certain individuals, a few states were upset about it, and Texas and Indiana (where Pence is governor) sued the President. Pence hired an outside law firm to handle the case, and a local lawyer thought this was a waste of taxpayer funds. The lawyer filed public records requests to get access to emails about the decision to hire the law firm and to find out the costs to taxpayers.

            Pence’s office released some emails, but they were apparently redacted in places — and in one case an email referred to an attached white paper that was not included. The lawyer who filed the request, William Groth, went to court to demand that the Pence administration reveal the full email with the attached white paper. The Pence administration has argued that it’s not subject to public records requests as “attorney-client” work material — but also that the courts are not allowed to question what the government chooses to release or redact under public records laws. A lower court agreed — following an Indiana Supreme Court ruling saying that the courts cannot “meddle” in public records decisions by the legislative or executive branch due to “separation of powers.” That’s a bizarre reading of the law that seems to actually turn the concept of separation of powers on its head, as it kind of destroys a key part of that separation: the checks and balances of the three branches of government.

          • Your Government Wants to Militarize Social Media to Influence Your Beliefs

            A global conference of senior military and intelligence officials taking place in London this week reveals how governments increasingly view social media as “a new front in warfare” and a tool for the Armed Forces.

            The overriding theme of the event is the need to exploit social media as a source of intelligence on civilian populations and enemies; as well as a propaganda medium to influence public opinion.

            A report from the American Civil Liberties Union (ACLU) last month revealed how a CIA-funded tool, Geofeedia, was already being used by police to conduct surveillance of Facebook, Twitter and Instagram to monitor activists and protesters.

            Although Facebook and Twitter both quickly revoked Geofeedia’s access to their social feeds, the conference proves that social media surveillance remains a rapidly growing industry with no regulatory oversight. And its biggest customers are our own governments.

          • Remember when they told us Hillary, not Bernie, would beat Trump?

            If the Democrats continue to front establishment candidates while the establishment’s cherished beliefs continue to crumble, they will continue to lose.

            American politics now: the anti-establishment, white-nationalism troll party and the pro-establishment party that thinks you’ll vote for them because you fear white supremacists more than you hate the trolls.

            American politics tomorrow, if we address ourselves to the work at hand: the terrified troll white-nationalist party versus the party of hope, change and rebuilding: “dismissing a major indicator of popularity like polling—a key tool of campaign journalism in virtually all other contexts—due to vague, handwaving claims of unvettedness comes across as far more a convenient talking point than an earnestly arrived-at conclusion.”

          • Interview: Green Party Presidential Candidate Jill Stein On Clinton’s Loss To Trump

            When the liberal class heard news media report Donald Trump won the Electoral College vote, numerous people experienced meltdowns that involved blaming anyone and everyone but Hillary Clinton’s presidential campaign. In particular, Green Party presidential candidate Jill Stein was one of the targets, even though the math did not point to Stein as a culprit for the outcome.

            MSNBC’s Rachel Maddow wailed, “If you vote for somebody who can’t win for president, it means that you don’t care who wins for president.” It not only displayed the prejudice many liberals have against allowing more choices and more voices in presidential elections, but it also exemplified a denial among liberal pundits. They reflexively lashed out at Stein or Bernie Sanders in order to ignore their failure to recognize how Trump had a strong chance all along to win because voters were fed up with the neoliberal economic policies of Democrats.

            For this week’s “Unauthorized Disclosure,” the show returns with an interview with Jill Stein. She highlights what her campaign managed to accomplish. She looks back on smears she faced, such as the idea that she was anti-vaccine and says she views it as a “sign of the media’s weakness and also their fear and our strength.” Then, she shares how she was never confident Clinton would win the election and addresses the denial among Democrats, who do not want to confront the reality of what happened. She also lists off a number of initiatives and efforts she plans to help support in the aftermath of the election.

          • Julian Assange, Whose Wikileaks Played a Pivotal Role in US Election, Faces Possible Criminal Trial

            I sit in the tiny conference room adjoined to Julian Assange’s tiny living space in Ecuador embassy. I always feel a bit restless and nervous waiting for him. I worry how he’s coping. I realize how difficult it must be, to be here for years every day looking at these same walls, not feeling the sunshine.

            Just then the cat pops in, making me feel more at ease. He has full reign. He is on the table sniffing the muffins and rubbing up against me purring and maybe a little disappointed that everything I’ve brought is vegan.

            Next, the big man walks in, wearing a Sea Shepherd tshirt and jeans, a bit disheveled. It’s early but he manages a smile. He’s got a long day ahead.

          • Julian Assange calls for leaks on Trump after claims Wikileaks attacked Hillary Clinton

            The online group was grilled by users of Reddit in a questions and answer session on the online debating forum.

            WikiLeaks became a focal point during the election campaign.

            It published thousands of internal Democrat National Council emails, and more recently thousands more from the hacked email account of the Hillary Clinton campaign manager John Podesta.

            Some Reddit users appeared suspicious Wikileaks had an agenda to get Donald Trump elected.

          • WikiLeaks informant Chelsea Manning asks Obama to cut her 35-year prison sentence to time served

            The Lawyer of Chelsea Manning, a former US soldier who is currently serving a prison sentence for disclosing secret diplomatic and military documents to WikiLeaks in 2010, has put forth a petition requesting President Barack Obama to grant clemency and reduce the rest of her 35-year sentence to the more than six years she has already served.

            Manning’s punishment is the longest period of incarceration awarded to any leaker in American history.

          • Anti-Semitic incidents stoke fear among Jews after Trump win

            A synagogue in Montana wants police protection after Nazi fliers were delivered nearby following Donald Trump’s election win. Anxiety is now growing among American Jews after Trump appointed an alleged anti-Semite as one of his closest advisors on Sunday as the number of hate incidents continues to rise across the US.

          • Did the WikiLeaks Email Dumps Cost Hillary the White House? [Ed: falsely blames it all on Russia, without evidence]
          • Pain Management

            The only thing that will save us from a populist racist oligarch demagogue is a populist anti-racist anti-neoliberal progressive with a mobilized movement behind them and serious contenders up and down the ticket.

          • Sanders backs Trump protests, questions Electoral College
          • Amid DNC Reckoning, Ellison Emerges as Progressive Antidote to Trump

            Amid the growing post-election call for a “reckoning” within the Democratic Party, Rep. Keith Ellison on Minnesota has swiftly emerged as the favored progressive choice to lead that transition.

            “Liberal lawmakers and advocacy groups have started plotting a major overhaul of the Democratic National Committee (DNC),” the Washington Post reported late Thursday, with the first step being a replacement for the embattled interim chair Donna Brazile.

            The progressive flank of the party has largely placed the blame for the stunning election loss on the DNC and its elitist leadership, which they say is out of touch with the Left’s grassroots base, which wants to see a renunciation of corporate influence.

          • Maine became the first state in the country Tuesday to pass ranked choice voting

            Amid a national vote that rocked the political world Tuesday, voters in Maine narrowly approved a measure that supporters say will be respectively disruptive to the state’s political status quo.

            With 98 percent of the vote reporting in the state, 52 percent of voters approved a ballot question making Maine the first state to implement ranked choice voting, a fundamental reform of how voters literally fill out their ballot.

            In a ranked choice vote system, rather than simply voting for one candidate, voters rank their candidates by preference—first, second, third, and so on.

          • Maine Passes Ranked-Choice Voting

            Maine residents have approved a ballot question that will allow voters to rank their choice of candidates.

            Under the election overhaul, ballots are counted at the state level in multiple rounds. Last-place candidates are eliminated until a candidate wins by a majority.

          • Stephen Bannon and Reince Priebus to lead Trump’s White House

            Donald Trump has named Reince Priebus as his White House chief of staff, rewarding a loyalist to his party and its long-serving chairman by making him his top aide in the Oval Office. But he also named Steve Bannon, the head of his campaign and of the far-right website Breitbart, as his “chief strategist and senior counselor”.

            The statement announcing Trump’s decision named Bannon first, despite the vague title of his role. It said he and Priebus would work as “equal partners”.

            “Steve and Reince are highly qualified leaders who worked well together on our campaign and led us to a historic victory,” Trump said. “Now I will have them both with me in the White House as we work to make America great again.”

          • Trump appoints Chief of Staff, chief strategist

            “I am thrilled to have my very successful team continue with me in leading our country,” Trump said in a statement.

          • Denying climate change is only part of it: 5 ways Donald Trump spells doom for the environment

            If the world’s governments don’t prevent the planet’s surface temperature from increasing more than 2°C, then life on Earth will become a difficult proposition for many humans, animals and plants. Glaciers will melt, sea levels will rise, crops will fail, water availability will decrease, and diseases will proliferate. Some areas will experience more wildfires and extreme heat; in others, more hurricanes and extreme storms. Coastal cities and possibly entire nations will be swallowed by the sea. There will be widespread social and economic instability, leading to regional conflicts.

          • Trump seeks top-secret security clearances for his kids

            President-elect Donald Trump is seeking top-secret security clearances for his adult children, CBS News reported Monday.

            CBS News said the real estate mogul has asked the White House if he can obtain such clearances for Ivanka, Eric and Donald Jr., as well as his son-in-law, Jared Kushner.

            But a transition team official told the presidential pool reporter Monday night that the president-elect did not request such a step and said the Trump children have not started filling out paperwork for such clearances.

          • I actually have something I would use the Department of Education to do. It would be to monitor our institutions of higher education for extreme political bias and deny federal funding if it exists.
          • Donald Trump ‘will consult Nigel Farage before Theresa May’ on UK policy proposals, says Aaron Banks

            Donald Trump will run policy proposals affecting the UK past Nigel Farage before consulting Theresa May, a Ukip donor has claimed.

            Mr Trump’s chief strategist Steve Bannon will “run ideas” past interim Ukip leader Mr Farage, prominent Ukip donor Aaron Banks told the Daily Telegraph.

            “There is no doubt about it that Steve Bannon will talk to Nigel Farage before any other British politician and run stuff by them,” Mr Banks said.

          • Playtime is over

            Well, I was optimistic. The tea party radicals have gone nuclear, but I wasn’t counting on a neo-Nazi running the White House, or on the Kremlin stepping in …

            Let me explain.

            A few years ago, wandering around the net, I stumbled on a page titled “Why Japan lost the Second World War”. (Sorry, I can’t find the URL.) It held two photographs. The first was a map of the Pacific Theater used by the Japanese General Staff. It extended from Sakhalin in the north to Australia in the south, from what we now call Bangladesh in the west, to Hawaii in the east. The second photograph was the map of the war in the White House. A Mercator projection showing the entire planet. And the juxtaposition explained in one striking visual exactly why the Japanese military adventure against the United States was doomed from the outset: they weren’t even aware of the true size of the battleground.

            I’d like you to imagine what it must have been like to be a Japanese staff officer. Because that’s where we’re standing today. We think we’re fighting local battles against Brexit or Trumpism. But in actuality, they’re local fronts in a global war. And we’re losing because we can barely understand how big the conflict is.

            (NB: By “we”, I mean folks who think that the Age of Enlightenment, the end of monarchism, and the evolution of Liberalism are good things. If you disagree with this, then kindly hold your breath until your head explodes. (And don’t bother commenting below: I’ll delete and ban you on sight.))

            The logjam created by the Beige Dictatorship was global, throughout the western democracies; and now it has broken. But it didn’t break by accident, and the consequences could be very bad indeed.

            What happened last week is not just about America. It was one move—a very significant one, bishop-takes-queen maybe—in a long-drawn-out geopolitical chess game. It’s being fought around the world: Brexit was one move, the election and massacres of Dutarte in the Philippines were another, the post-coup crackdown in Turkey is a third. The possible election of Marine Le Pen (a no-shit out-of-the-closet fascist) as President of France next year is more of this stuff. The eldritch knot of connections between Turkey and Saudi Arabia and Da’esh in the wreckage of Syria is icing on top. It’s happening all over and I no longer think this is a coincidence.

          • Looking for someone to blame? It’s not third parties

            As news of Hillary Clinton’s shocking loss sinks in, many Clinton supporters looking for someone to blame are pointing fingers at a familiar scapegoat: people who voted outside the two-party system.

            Pundits are already trying to blame Libertarian Gary Johnson and me, the Green party candidate, for Trump’s win. For example, MSNBC’s Rachel Maddow concocted a scenario in which by taking every Stein vote and half of Johnson’s votes, Clinton could have grabbed enough states from Trump to eke out an electoral college win, a story repeated by CNN. Unwilling to accept that Clinton didn’t motivate enough voters to win the presidency, and explore the reasons why, many pundits are instead looking to put responsibility for the loss onto others.

            First the facts: if every single Stein voter had voted for Clinton, Clinton still lost.

          • Why Are Liberals Blaming The Green Party For Trump?

            The Green Party’s showing in this year’s election was strong but not significant enough to reach the desired 5%. It was more like 1%. Still, the Stein Baraka ticket garnered more than 1.2 million votes nationwide. That’s a big bump from the last Green Party presidential ticket in 2012 which won less than half a million votes.

            Already some liberal pundits, shocked by the election of Donald Trump have begun blaming the Green Party for Clinton’s loss. The New York Times’ Paul Krugman tweeted on election night, “Jill Stein managed to play Ralph Nader. Without her Florida might have been saved.”

          • A road map Hillary Clinton did not follow to the White House

            We know this because Wikileaks founder Julian Assange came into possession of it along with tens of thousands of other emails to and from Clinton’s strategist Podesta, and spread them across the internet.

            Huma Abedin’s email revealed no high drama or internal backbiting, and so it did not grab headlines during the campaign. It simply noted that she had met with Smith, a San Francisco political consultant, and she attached a memo, titled thoughts.doc. Written by Smith, it maps out a strategy, though not one followed by Hillary Clinton.

            Smith and his firm, SCN Strategies, are among the most successful Democratic campaign firms in the state and country. In 2008, he ran Clinton’s 2008 winning primary campaigns in California and Texas. And in 2014, he was making a pitch for a position in Clinton’s 2016 campaign; he didn’t get it.

            “Today, you are a fully known quantity and a second-time candidate for President of the United States,” Smith wrote, setting forth how Clinton might announce her candidacy and frame her campaign. “As such you will be expected to have a clear and deep rationale for your candidacy from the first day of the campaign.”

          • Donna Brazile says CNN should have let her ‘defend myself’ following Wikileaks email

            Donna Brazile, the interim chair of the Democratic National Committee and former CNN contributor, went after her former employer at an event at a women’s college in Virginia Monday, blaming them for “ripping me a new one” instead of allowing her to defend herself after it appeared she tipped off Hillary Clinton’s campaign to town hall questions.

            Brazile, who had been a contributor and commentator at CNN for 14, resigned from the network earlier this year after WikiLeaks published hacked emails that showed Brazile tipping off Clinton’s campaign in advance to at least two questions the Democratic presidential nominee could be asked at upcoming town hall events.

            “CNN never gave me a question,” Brazile said at a talk held at Hollins University, according to The Roanoke Times. “I wish CNN had given me some other things, like the ability to defend myself rather than ripping me a new one.”

            Brazile did not deny the allegations that she had emailed two questions in advance, but she said she “never got on Clinton’s campaign airplane or prepped the candidate for any of the debates,” according to the Roanoke Times. When the network cut ties with Brazile permanently, it said the company was “completely uncomfortable” with the revelations and asserted that it had not provided questions to Brazile in advance.

          • Rep. Keith Ellison Enters Race for DNC Chair With Strong Support

            Rep. Keith Ellison formally announced his candidacy Monday to be the next chairman of the Democratic National Committee, a race that has taken on unusual importance as the party looks for someone to lead its efforts to rebuild after last week’s devastating loss to Donald Trump.

            Ellison, a progressive who backed Bernie Sanders over Hillary Clinton in the presidential primary, enters the potentially crowded race as the clear favorite thanks to early backing from a number of leading Democrats.

            “It is not enough for Democrats to ask for voters’ support every two years. We must be with them through every lost paycheck, every tuition hike, and every time they are the victim of a hate crime,” Ellison said in a statement announcing his bid. “When voters know what Democrats stand for, we can improve the lives of all Americans, no matter their race, religion or sexual orientation. To do that, we must begin the rebuilding process now.”

          • More than half of arrested anti-Trump protesters didn’t vote

            More than half of the anti-Trump protesters arrested in Portland didn’t vote, according to state election records.

            At least seventy demonstrators either didn’t turn in a ballot or weren’t registered to vote.

            KGW compiled a list of the 112 people arrested by the Portland Police Bureau during recent protests. Those names and ages, provided by police, were then compared to state voter logs by Multnomah County Elections officials.

            Records show 35 of the protesters arrested didn’t return a ballot for the November 8 election. Thirty-five of the demonstrators taken into custody weren’t registered to vote.

          • D.C. Area High School Students Walk Out Of Class To Protest Trump

            A day after hundreds of students staged a peaceful protest at Montgomery Blair High School in Silver Spring, another large protest is taking place in the District.

            Hundreds of students walked out of school at Woodrow Wilson Senior High School, in the Tenleytown neighborhood, Tuesday morning in protest of President Elect Donald Trump.

          • President Trump’s Cabinet Will Be Filled With Deplorables

            There are 67 days until Donald Trump’s inauguration, a fact that seems to have surprised the president-elect – who reportedly never thought he’d remain in the race past October 2015 – as much as anyone. According to the Wall Street Journal, not only was Trump “surprised by the scope” of the president’s duties when President Obama explained them to him in private last week, but his aides were unaware they would need to hire an entirely new White House staff.

          • The Election was Stolen – Here’s How…

            On Tuesday, we saw Crosscheck elect a Republican Senate and as President, Donald Trump. The electoral putsch was aided by nine other methods of attacking the right to vote of Black, Latino and Asian-American voters, methods detailed in my book and film, including “Caging,” “purging,” blocking legitimate registrations, and wrongly shunting millions to “provisional” ballots that will never be counted.

            Trump signaled the use of “Crosscheck” when he claimed the election is “rigged” because “people are voting many, many times.” His operative Kobach, who also advised Trump on building a wall on the southern border, devised a list of 7.2 million “potential” double voters—1.1 million of which were removed from the voter rolls by Tuesday. The list is loaded overwhelmingly with voters of color and the poor. Here’s a sample of the list

          • ‘Trump lookalike’ chef slams media coverage of beating

            TV chef Anders Vendel said in a Facebook post that he was beaten up by three men, two of whom bound his arms behind his back, while the third beat him in the face. He estimated that he was punched twenty times in the face, which took place at 4am in central Malmö on Saturday.

            The attack left him with a broken nose and extensive bruising around his right eye, mouth and jaw.

            In the Facebook post, which has since been deleted but has been widely cited by populist media including Russian state propaganda channel RT, Vendel had said the men thought he resembled the US President-elect. He also said they were Muslim.

            But in a comment to The Local on Monday, the chef said the way his case was being used abroad was “scary.”

            Headlines in RT, the Daily Mail and various other global media emphasised the attackers’ supposed religion. None of them had spoken to the chef.

            “I was angry, hurt and humiliated when I wrote what I was thinking at the time,” Vendel said.

          • Trump’s victory comes with a silver lining for the world’s progressives

            The election of Donald Trump symbolises the demise of a remarkable era. It was a time when we saw the curious spectacle of a superpower, the US, growing stronger because of – rather than despite – its burgeoning deficits. It was also remarkable because of the sudden influx of two billion workers – from China and Eastern Europe – into capitalism’s international supply chain. This combination gave global capitalism a historic boost, while at the same time suppressing Western labour’s share of income and prospects.

            Trump’s success comes as that dynamic fails. His presidency represents a defeat for liberal democrats everywhere, but it holds important lessons – as well as hope – for progressives.

            From the mid-1970s to 2008, the US economy had kept global capitalism in an unstable, though finely balanced, equilibrium. It sucked into its territory the net exports of economies such as those of Germany, Japan and later China, providing the world’s most efficient factories with the requisite demand. How was this growing trade deficit paid for? By the return of around 70 per cent of the profits made by foreign corporates to Wall Street, to be invested in America’s financial markets.

        • Censorship/Free Speech

        • Privacy/Surveillance

          • Spies Use Tinder, and It’s as Creepy as You’d Think

            On September 4, a group of young activists planned to attend a demonstration against Interim President Michel Temer in the city center of São Paulo. They never made it. Their group had been infiltrated by an Army Captain Willian Pina Botelho—via Tinder.

            Surveillance and infiltration are not new tactics, but the ACLU revelation last month that Twitter, Instagram, and Facebook had been sharing data with surveillance service Geofeedia reminds us that the internet is bringing it to whole new levels. The story of the “Tinder infiltrator” serves as a reminder for a generation of young activists who are organizing online: don’t stop organizing, but be vigilant.

          • Comey Can’t Say How Often Encryption Thwarts Investigations, But Probably A Lot

            FBI Director James Comey believes encryption is perhaps the biggest threat to public safety yet. So big, in fact, that he can only engage in hyperbole about it. There’s been very little done to quantify the problem, even by the agency that seems to fear it most.

            In 2015, Comey told senators that a “vast majority” of devices seized by US law enforcement “may no longer be accessible” due to encryption. Comey has a very strange definition of “vast majority,” as Marcy Wheeler points out.

          • US Secrecy Prevails In German Constitutional Court

            The German constitutional court has rebuffed a second complaint seeking to allow oversight bodies to see the US National Security Administration (NSA) selector list.

            The list was pushed by the NSA to its German sister organisation BND to crawl through data traffic intercepted at the DeCIX, an internet exchange point in Frankfurt and traffic-wise the largest peering platform worldwide.

          • 1ST LEAD Court: Germany does not have to hand over NSA list of spying targets By Friederike Heine, dpa

            The list of so-called “selectors” – telephone numbers, email and IP addresses – was handed to Germany‘s foreign intelligence agency BND by the National Security Agency (NSA) with the aim of spying on German and European targets.

          • The German government won’t have to disclose who it spied on with the NSA
          • German court’s ruling on mass spying is a victory for the BND and NSA
          • German court rejects opposition’s bid for disclosure of NSA spy targets
          • German Constitutional Court rules out access to NSA’s ‘selectors’ list
          • Court rejects case to reveal more on US spies in Germany
          • CIA, NSA ordered to reveal to judge whether they were involved in Occupy Philly surveillance

            A federal judge has ordered the CIA and the National Security Agency to disclose to him whether they were involved in spying on Occupy Philadelphia protesters during their monthlong demonstration at what is now Dilworth Park five years ago.

            Responding to a Freedom of Information Act lawsuit filed by a lawyer for the demonstrators, U.S. District Judge Berle M. Schiller gave the agencies until early next year to submit a list of any records detailing the agencies’ potential surveillance activities, along with a justification of why those documents should be withheld from public disclosure.

            Schiller said he would rely upon that list to determine whether to release such documents or whether he would need to examine such records in person before making his decision.

          • Federal Contractor Collected Pay From NSA, OPM for Hours He Didn’t Work: Prosecutors
          • Apps for Communicating and Organizing in the Age of Trump

            On January 20, Donald Trump will gain control over the most powerful surveillance system in history. Worried? Here are some steps you can take to protect yourself.

            The U.S. government has a long history of targeting activists. Agents spied on Martin Luther King Jr., bugging his hotel rooms in an attempt to find out personal information which could be used to discredit him. More recently, the FBI spied on Black Lives Matter activists.

            U.S. intelligence agencies have unprecedented power to gather information on millions of American citizens. This information includes our communications, banking info, and web browsing data. We know that the National Security Agency (NSA) collects data on who you talk to, when, and where you call from.

          • Donald Trump is about to control the most powerful surveillance machine in history

            The US intelligence agencies are among the most powerful forces to ever exist, capable of ingesting and retaining entire nations’ worth of data, or raining down missiles on targets thousands of miles away. As of January 20th, all that power will be directly answerable to Donald Trump.

            It’s still early, but a picture is starting to emerge of how the president-elect could use those powers — and it’s not a pretty sight. Since the September 11th attacks, the US government gives the president almost unlimited discretion in matters of national security, with few limitations or mechanisms for oversight. That includes NSA surveillance, as well as the expanding powers of the drone program. And from what Trump has said on the campaign trail, his targets for using those powers may cut against some of America’s most important civil rights.

          • Shazam Keeps Your Mac’s Microphone Always On, Even When You Turn It Off

            What’s that song? On your cellphone, the popular app Shazam is able to answer that question by listening for just a few seconds, as if it were magic. On Apple’s computers, Shazam never turns the microphone off, even if you tell it to.

            When a user of Shazam’s Mac app turns the app “OFF,” the app actually keeps the microphone on in the background. For the security researcher who discovered that the mic is always on, it’s a bug that users should know about. For Shazam, it’s just a feature that makes the app work better.

          • A 10-Digit Key Code to Your Private Life: Your Cellphone Number

            The next time someone asks you for your cellphone number, you may want to think twice about giving it.

            The cellphone number is more than just a bunch of digits. It is increasingly used as a link to private information maintained by all sorts of companies, including money lenders and social networks. It can be used to monitor and predict what you buy, look for online or even watch on television.

            It has become “kind of a key into the room of your life and information about you,” said Edward M. Stroz, a former high-tech crime agent for the F.B.I. who is co-president of Stroz Friedberg, a private investigator.

            Yet the cellphone number is not a legally regulated piece of information like a Social Security number, which companies are required to keep private. And we are told to hide and protect our Social Security numbers while most of us don’t hesitate when asked to write a cellphone number on a form or share it with someone we barely know.

        • Civil Rights/Policing

          • Saudi bans schools from marking non-Islamic holidays

            Saudi education ministry has warned international schools from marking non-Islamic occasions, such as Christmas and New Year, the media reported on Monday.

            The ban includes forbidding those schools from providing holidays on such occasions or changing the dates of exams to suit them, Xinhua news agency reported.

          • Spokesperson Maryam Namazie wins 2016 International Secularism (Laicite) Prize

            This is a time where “solidarity” is no longer an act of defending revolutionaries but fascists; where there is always support for Islamist projects like Sharia courts, the burqa, gender segregation, apostasy and blasphemy laws – whether de jure or de facto – but never for those who refuse to be silenced, erased and “disappeared”.

            It’s a time when “progressive” all too often means protecting regressive identity politics, which homogenises entire communities and societies, and deems theocrats as the sole legitimate arbiters and gatekeepers of “community” values.

            It’s a politics of betrayal – devoid of class struggle and political ideals – which sees any dissent through Islamist eyes and immediately labels it “Islamophobic” and blasphemous.

            We are called “aggressive apostates”, “fundamentalist secularists”, “native informants”, “inflammatory”. We are accused of violating the “safe spaces” of Islamists on universities and even “inciting hatred”.

          • Blasphemy: How Kano mob murdered my wife in my presence – Husband

            Pastor Mike Agbahime, husband of Bridget Agbahime who was killed by an irate mob in Kano for alleged blasphemy has finally spoken up on the events that lead to his wife’s death.

            Agbahime in an interview with The Punch blamed Kano Governor Umar Ganduje for paving the way for the release of the arrested suspects.

          • Mauritanian clerics urge for blogger’s death penalty to be applied

            Muslim clerics in Mauritania on Sunday urged the authorities to execute a blogger who was sentenced to death in 2014 for apostasy after writing a blog post on Islam and racial discrimination.

            Mohamed Ould Cheikh Ould Mkhaitir’s article touched a nerve in Mauritania, a West African country with deep social and racial divisions. He was tried for apostasy and received the death penalty despite having repented and saying his article was misunderstood.

            According to the U.S.-based Freedom Now rights group who provide Mkhaitir with legal counsel, the blog post appears to have been the first he published. Prior to his arrest he worked as an engineer for a mining company and was not an activist, Freedom Now said on its website.

          • Delta: Police Raid Baby Factory in Oshimili Council, Arrest Six Pregnant Wome

            Police have raided a baby factory and arrested at least six pregnant women who are allegedly planning to sell their newborn babies after delivery in Delta State.
            The police said the arrest was made in Okwe community, Oshimili South Local Government Area of the state in Nigeria’s South-South region.
            They revealed that a victim, Blessing Aondoseer, had reported that her husband allegedly connived with some people to take away her two weeks old baby.

          • Freedom House warns that internet privacy is eroding fast

            INDEPENDENT WATCHDOG Freedom House has issued its 2016 report along with a chilling warning that internet privacy is becoming something of an oxymoron.

            Freedom House is based in Washington and deals with how countries handle and provide the internet and technology to citizens. We imagine that it is currently hiring. The Freedom On The Net report said that freedom has declined for the sixth year in a row.

          • The Way to Stop Trump

            The stunning upset election of Donald Trump has left many Americans wondering what has become of their country, their party, their government, even their sense of the world. Purple prose has been unleashed on the problem; comparisons to fascism and totalitarianism abound. Commentators claim that Trump’s election reflects a racist, sexist, xenophobic America. But we should resist the temptation to draw broad-brush generalizations about American character from last Tuesday’s outcome. The result was far more equivocal than that; a majority of the voters rejected Trump, after all. There is no question that President Trump will be a disaster—if we let him. But the more important point is that—as the fate of American democracy in the years after 9/11 has taught us—we can and must stop him.

            The risks are almost certainly greater than those posed by any prior American president. Trump, who has no government experience, a notoriously unreliable temperament, and a record of demagoguery and lies, will come to office with Republican majorities in both houses of Congress, and, once he fills the late Antonin Scalia’s seat, on the Supreme Court as well. His shortlist of Cabinet appointees offers little hope that voices of moderation will be heard. Who, then, is going to stop him? Will he be able to put in place all the worst ideas he tossed out so cavalierly on the campaign trail? Building a wall; banning and deporting Muslims; ending Obamacare; reneging on climate change treaty responsibilities; expanding libel law; criminalizing abortion; jailing his political opponents; supporting aggressive stop-and-frisk policing; reviving mass surveillance and torture?

            Whether Trump will actually try to implement these promises, and more importantly, whether he will succeed if he does try, lies as much in our hands as in his. If Americans let him, Trump may well do all that he promised—and more. Imagine, for example, what a Trump administration might do if there is another serious terrorist attack on US soil. What little he has said about national security suggests that he will make us nostalgic for George W. Bush and Dick Cheney.

          • Chuck Schumer: The Worst Possible Democratic Leader at the Worst Possible Time

            When Barack Obama leaves the White House, New York Sen. Chuck Schumer will almost certainly be elected Senate minority leader — and therefore become the highest ranking Democratic official in America.

          • Prosecutor Shuts Down New Orleans Cop’s Attempt To Charge Arrestee With Hate Crime For Insulting Responding Officers

            The Louisiana legislature decided to help out its most underprivileged constituents — law enforcement officers — by making it a felony to “attack” them using nothing more than words.

            When New Orleans police officers arrived at the scene of a disturbance to arrest an intoxicated man for banging on a hotel’s windows and harassing the employees, the situation devolved into the totally expected.

          • Hate Crimes Are Up — But the Government Isn’t Keeping Good Track of Them

            In 2015, the authorities in California documented 837 hate-crime incidents, charting a surge in offenses motivated by religious intolerance toward Muslims and Jews, while crimes against Latinos grew by 35 percent.

            Last week, shortly after Donald J. Trump was elected the country’s next president, the Southern Poverty Law Center put up a form on its website encouraging people to share details about potential hate crimes. By the next day, they’d received about 250 reports – more than they’re used to seeing in six months.

            Then on Monday, the FBI released its latest national tabulation of hate crimes, data that showed an overall uptick of 6.8 percent from 2014 to 2015. The accounting, drawn from information passed on to the bureau by state and local law enforcement agencies, charted a 67-percent increase in anti-Muslim hate crimes.

          • Self-styled ‘Sharia patrol’ allegedly launch brutal attack on girl for ‘not wearing HIJAB’

            In the horrific footage from Vienna, Austria, the youngster is seen being violently attacked by a group of girls and a boy in what is believed to be a “Sharia patrol”.

            In this clip, she keeps her hands in her pocket and takes the savage beating, despite breaking her jaw in two places and blood dripping from her face.

            The group is reported to have said in the video: “She has pulled the headscarf down, demolish her!”

          • Lauri Love faces hacking trial in US after UK signs extradition order

            Love’s family plan to appeal against the decision. The 31-year-old—who has Asperger’s syndrome—faces up to 99 years in prison and fears for his own life, his lawyers have said.

            A home office spokesperson told Ars: “On Monday 14 November, the secretary of state, having carefully considered all relevant matters, signed an order for Lauri Love’s extradition to the United States. Mr Love has been charged with various computer hacking offences which included targeting US military and federal government agencies.”

            Rudd considered four so-called legal tests of the Extradition Act 2003: whether Love is at risk of the death penalty; whether specialty arrangements are in place; whether Love has previously been extradited from another country to the UK, thereby requiring consent from that country; and whether Love was previously transferred to the UK by the International Criminal Court.

            However, the home secretary concluded that none of these issues applied to Love.

          • Dilma Rousseff, Brazil’s ex-president, says successor Temer took bribes

            Brazil has been plunged into a fresh bout of political uncertainty after lawyers for former president Dilma Rousseff presented evidence suggesting her successor, Michel Temer, accepted bribes from a construction company.

            If accepted the documents filed with the supreme electoral court raise the possibility of the 2014 presidential election being declared invalid due to campaign funding violations, which could force Temer from office.

            The two politicians were running mates in 2014 but have since become bitter enemies. Rousseff, of the Workers party, was impeached and removed from the presidency in September on charges of window-dressing government accounts. She has levelled accusations of treachery at her replacement, Temer, of the centre-right Brazilian Democratic Movement party.

          • Hate crimes against Muslim Americans increased by 67 percent in 2015, says FBI

            Ibrahim Hooper, spokesman for the Council on American-Islamic Relations, said, ‘We saw a spike in anti-Muslim incidents nationwide beginning toward the end of 2015. That spike has continued until today and even accelerated after the election of President-elect Trump’

          • Jews Aren’t An SJW-Approved Minority
          • U.S. Muslims make up only one percent of the population, but file 40% of workplace discrimination complaints

            Even outside of fear of drawing an Islamist attack, avoiding conflict with Muslim employees affects both the company’s ‘inclusive’ image, and its liability to lawsuits by activist groups like the Council on American Islamic Relations (CAIR). When special interest activist groups put pressure on businesses to give into their demands businesses often (depending on the issue/s) concede rather than face bad publicity. Businesses placating to Muslim demands is one of the objectives of the Hamas-affiliated CAIR. Masquerading as a civil liberties organization for Muslims, CAIR, as mentioned in the video, pressures businesses into accommodating the most trivial of Muslim practices advocated for in sharia law.

        • Internet Policy/Net Neutrality

          • Decentralization – a deep cause of causes you care about deeply

            Decentralized and distributed networks are, quite simply, fundamental; everyone is affected in many ways by the degree of distribution — not least one’s personal agency, the development of our societal structures, and our impact on this planet’s living systems.

            As we instrument the planet, as we build out a pervasive computing environment, as increasingly little ‘undigital’ remains, ensuring the decentralized and distributed nature of that digital infrastructure is nothing short of mission critical. We must resist the easy short-term temptations of centralization to avoid its longer-term miseries.

        • Intellectual Monopolies

          • South Centre, FAO Sign Agreement Promoting Tech Transfer, Innovation

            The intergovernmental South Centre and the United Nations Food and Agriculture Organisation have signed a five-year agreement to help the global south fight malnutrition, reduce poverty, and address climate change consequences. The memorandum of understanding was signed on the margins of the recent climate change discussion held in Marrakesh.

          • Countries Asked To Revise IP Laws Preventing Implementation Of Farmers’ Rights [Ed: Treating people like farming slaves and perpetuating poverty by imposing ‘IP’, then calling them “pirates”.]

            Global Consultation on Farmers’ Rights took place in Bali, Indonesia from 27-30 September and was co-organised by the governments of Indonesia and Norway. The secretariat of the International Treaty on Plant Genetic Resources for Food and Agriculture (ITPGRFA) of the Food and Agriculture Organization of the United Nations (FAO) engaged in the preparatory process, according to the treaty’s website.

            The consultation was attended by 95 participants from 37 countries, from all the seven regions of the FAO, according to a source. Participants came from governments, academia, international organisations (such as the ITPGRFA, the International Union for the Protection of New Varieties of Plants [UPOV], and the UN Convention on Biological Diversity), non-governmental organisations (such as Oxfam, the Development Fund, and SEARICE), and farmers and farmers’ organisation (such as la Via Campesina), the source said.

          • Copyrights

            • Toto, I Don’t Think We’re In The Public Domain Anymore

              Long-time readers may remember our coverage of a slow-moving copyright case over public domain images from The Wizard of Oz and other movies. In brief: back in 2006, Warner Bros. sued vintage/nostalgia merchandise company AVELA, which had obtained restored images from old promotional posters for the films and was selling them for T-shirts and other products. Nobody disputed that these specific images were in the public domain, because the promo materials had not been registered for copyright even though the films were — but Warner claimed that the images nevertheless infringed on the copyright in the characters established by the film. The court originally sided with Warner in full, but on appeal found that the exact two-dimensional reproductions of the images on T-shirts and the like were not infringing, but instances where they were combined with text and other images or used to create three-dimensional models were, and awarded some pretty huge damages. To complicate matters, there’s also a trademark claim wrapped up in all this. There was another appeal, and now a court has upheld the ruling and the damages, giving movie studios another weapon in their war on the public domain (here’s a PDF of the full ruling).

              Now, there are a lot of layers here, and I’m going to focus on The Wizard Of Oz, since it provides the most interesting example. The 1900 book is in the public domain. The 1939 movie is still under copyright held by Warner. The associated 1939 promo materials were not registered (a requirement at the time) and are in the public domain. And many characters and other elements of the movie are also covered by trademark, also owned by Warner. Absolutely none of these facts are in dispute — but put them all together and you have a giant mess that illustrates the flimsiness of the idea/expression dichotomy, and how something can supposedly remain in the public domain while being gutted of all its usefulness to the public.

            • Donald Trump Parody Results in Clockwork Orange Copyright Suit

              A YouTube parody which hoped to provide a satirical take on Donald Trump’s presidential campaign has ended in a lawsuit. Hugh Atkin portrayed elements of Trump’s efforts in the style of and alongside images from A Clockwork Orange. Now the Australian is getting sued in the United States for copyright infringement.

            • U.S. Copyright Office Undecided About Future of DMCA Takedowns

              The U.S. Government’s Copyright Office has launched a new consultation seeking guidance on the future of the DMCA’s takedown process and safe harbor. Through a set of concrete questions, they hope to find a balance between the interests of copyright holders, Internet services and the public at large.

        ]]>
        http://techrights.org/2016/11/15/hpc-498-out-of-500/feed/ 0
        Links 11/11/2016: Mutter 3.22.2, Slackware Live Edition 1.1.4 http://techrights.org/2016/11/11/slackware-live-edition-2/ http://techrights.org/2016/11/11/slackware-live-edition-2/#comments Fri, 11 Nov 2016 13:39:24 +0000 http://techrights.org/?p=96696

        GNOME bluefish

        Contents

        GNU/Linux

        • From Windows to Linux: yes, that is still a thing

          A request from a bank to look at a switch from Windows to Linux has led to UK-based IT specialist Patrick Fitzgerald and his colleagues at British firm i-Layer developing a detailed method for an institution to make the transition.

          Fitzgerald, who gave a talk about it at SUSECon 2016, has been in the IT business for a long time. He and his colleagues only came up with the detailed plan when he had to tackle the task set for him by the Allied Irish Bank.

          “The bank has 900 branches and 7500 teller workstations,” Fitzgerald said. “After the move, just two people are needed to manage the lot.” He added that the smallest branch had just two users, one teller and ran on bandwidth of 128k.

          The bank initially called him in for advice and help when it experienced a shortage of trained staff.

        • A Loopy Non-Interview With Linux Advocate Marcel Gagné

          This week, Roblimo again takes a virtual trip up to the Great White North, that would be Canada for the benefit of the NSA and those of you taking notes at home, and has way too much fun hanging out with Linux advocate Marcel Gagné.

        • Server

          • ​When to use NGINX instead of Apache

            They’re both popular open-source web servers but, according to NGINX CEO Gus Robertson, they have different use cases. And Microsoft? Its web server has dropped below 10 percent of all active websites for the first time in 20 years.

          • Enabling the Digital Revolution: SDN and Beyond

            SDN can create far greater manageability by enabling network managers and developers to access network resources at a programmatic level, treating network resources in much the way they treat other computing resources such as central processing units (CPUs) and memory. It can enable networks to become easier to scale up or down, shorten setup time, increase security, and reduce costs. And SDN can take advantage of programmable network hardware, enabling managers to change the behavior of network devices through software upgrades instead of expensive hardware replacements.

          • Re-Imagining the Container Stack to Optimize Space and Speed
          • Keynote: Blurring the Lines: The Continuum Between Containers and VMs

            Graham Whaley, Sr. Software Engineer at Intel, says there is a continuum of features and benefits across the container/VM spectrum, and you should be able to choose which point on that continuum best suits you.

          • Docker and machine learning top the tech trends for ‘17

            With 2017 fast approaching, technology trends that will keep gathering steam in the new year range from augmented and virtual reality to machine intelligence, Docker, and microservices, according to technology consulting firm ThoughtWorks.

          • AWS Gives Customers On-Premises Linux Option

            Amazon Web Services recently expanded its menu of cloud services to give customers the option of using the Amazon Linux AMI on premises. Customers can use the Amazon Container Image on premises for the purpose of developing and testing workloads, AWS Chief Evangelist Jeff Barr explained. The AMI provides a stable, secure and high-performance environment for applications running on the Amazon Elastic Compute Cloud, he said. “It is built from the same source code and packages as the AMI and will give you a smooth path to container adoption.”

        • Kernel Space

          • Linux 4.8.7

            I’m announcing the release of the 4.8.7 kernel.

            All users of the 4.8 kernel series must upgrade.

            The updated 4.8.y git tree can be found at:
            git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.8.y
            and can be browsed at the normal kernel.org git web browser:

            http://git.kernel.org/?p=linux/kernel/git/stable/linux-st…

          • Linux 4.4.31
          • Linux Kernel 4.4.31 LTS Released with Multiple Updated Drivers, Various Fixes

            Immediately after informing the community about the release of Linux kernel 4.8.7, which is now the most advanced kernel you can get for a GNU/Linux distribution, Greg Kroah-Hartman announced the availability of Linux kernel 4.4.31 LTS.

          • Linux Kernel 4.8.7 Updates Intel and Radeon Drivers, Improves Wireless Support

            Today, November 10, 2016, Linux kernel maintainer Greg Kroah-Hartman announced the release of the seventh maintenance update to the Linux 4.8 kernel series, along with the Linux kernel 4.4.31 LTS long-term support version.

            Finally, the release cycle of Linux kernel 4.8 has settled in and it looks like more and more GNU/Linux distributions are adopting it, including the upcoming openSUSE Leap 42.2 and Fedora 25, due for release next week. Rolling release users of Solus, Arch Linux, and openSUSE Tumbleweed are already enjoying the latest Linux kernel 4.8 updates, and soon they’ll receive a new one, Linux kernel 4.8.7, which comes ten days after Linux kernel 4.8.6.

          • The Code To Intel’s New Linux Wireless Daemon Is Now Public

            During this year’s systemd conference there was talk of A New Wireless Daemon Is In Development To Potentially Replace wpa_supplicant. At that time the code wasn’t yet public to this new open-source WiFi daemon developed by Intel, but since then the code has now opened up.

          • Hyperledger’s Next Act: A Blockchain Bridge to China

            Immutable, shared ledgers of transactions and goods could come to serve as a reminder that everything we grow, build, buy and sell comes from the same tiny planet.

            But this future is far from guaranteed, and the various blockchain developer groups competing to bring it to life have so far struggled to involve talent from all over the world in this global vision.

            Blockchain consortium Hyperledger, for example, was initially founded with support from companies in almost exclusively Western nations. Yet, the consortium has grown this year to include more than 20 members headquartered in China and 10 from Japan and South Korea, with a spattering of members from other nations represented as well.

          • Graphics Stack

        • Applications

        • Desktop Environments/WMs

          • Many Xfce Package Updates Bring Stable GTK3 Support, Notifyd Gets Do-Not-Disturb

            While it’s likely a long time before Xfce 4.14 gets released with full GTK3 tool-kit integration, there are some new Xfce4 package updates available this week.

            Xfce4-settings 4.13 is out and is a development release for the 4.13 series. This initial release marks Xfce Settings being fully-ported to GTK+ 3.x. That’s the main change with this release is the port from GTK2 to GTK3 but some bugs do remain. There are some screenshots via this blog post.

          • K Desktop Environment/KDE SC/Qt

            • Krita 3.1: third beta released

              Here is the third Krita 3.1 beta! From the Krita 3.1 on, Krita will officially support OSX. All OSX users are urged to use this version instead of earlier “stable” versions for OSX.

            • Qt on the NVIDIA Jetson TX1 – Device Creation Style

              NVIDIA’s Jetson line of development platforms is not new to Qt; a while ago we already talked about how to utilize OpenGL and CUDA in Qt applications on the Jetson TK1. Since then, most of Qt’s focus has been on the bigger brothers, namely the automotive-oriented DRIVE CX and PX systems. However, this does not mean that the more affordable and publicly available Jetson TX1 devkits are left behind. In this post we are going to take a look how to get started with the latest Qt versions in a proper embedded device creation manner, using cross-compilation and remote deployment for both Qt itself and applications.

            • Cutelyst 1.0.0 with stable API/ABI is out!

              Cutelyst the Qt web framework just reached it’s first stable release, it’s been 3 years since the first commit and I can say it finally got to a shape where I think I’m able to keep it’s API/ABI stable. The idea is to have any break into a 2.0 release by the end of next year although I don’t expect many changes as the I’m quite happy with it’s current state.

            • Cutelyst 1.0 Qt Web Framework Released

              Announced today is Cutelyst 1.0 with it reaching a state where the API/ABI can be maintained until Cutelyst 2.0, which will likely come at the end of 2017. Read that announcement if you are interested in this framework and yet another interesting deployment around the Qt tool-kit.

            • Kwave is in kdereview
            • After 18 Years, KWave Sound Editor Is Working Its Way Into KDE Multimedia

              KWave is a graphical sound editor that’s been in development since 1998 and is finally working its way into KDE Multimedia for becoming a proper part of KDE.

              A Phoronix reader pointed out today that KWave is finally working to become formally part of KDE rather than a separate project. KWave is currently in the KDE review process to be a component of KDE Multimedia, as outlined last month via this KDE-core-devel message.

            • KDE Applications 16.08.3 Is the Last in the Series, 16.12 Lands December 15

              Today, November 10, 2016, the KDE Project announced the release and general availability of the third and last scheduled maintenance update of the KDE Applications 16.08 software suite for KDE Plasma 5 desktops.

              That’s right, we’re talking about KDE Applications 16.08.3, which lands almost a month after the previous update, namely KDE Applications 16.08.2, bringing the long-term support version of KDE Development Platform 4.14.26 along for the ride. KDE Applications 16.08.3 is here to address over 20 bugs reported by users since then.

          • GNOME Desktop/GTK

            • An Everyday Linux User Guide To The Nautilus File Manager

              Nautilus is a very popular file manager so if it isn’t installed for your particular distribution you should be able to find it in the graphical package manager.

              Nautilus is the default file manager within Ubuntu Linux.

            • Mutter 3.22.2
            • GNOME’s Mutter 3.22.2 Ships With Many Wayland Fixes

              Normally GNOME point releases aren’t too worth mentioning over here, but with this morning’s release of GNOME Mutter 3.22.2 it’s a bit of a different story.

              GNOME Mutter 3.22.2 is a worthwhile upgrade particularly if you are running on Wayland. Mutter 3.22.2 has several Wayland crash fixes (two separate bug reports_ plus has at least four bugs fixed around placement issues of windows/elements when running on Wayland. There is also a fix for popup grabs blocking the screen lock on Wayland. There is also a fix for two finger and edge scrolling under Wayland.

            • GNOME Shell and Mutter Get Wayland and Wi-Fi Improvements for GNOME 3.22.2

              As part of the soon-to-be-released second and last scheduled point release of the GNOME 3.22 desktop environment for GNU/Linux distributions, the GNOME Shell and Mutter components have received new versions earlier today, November 10, 2016.

              GNOME Shell 3.22.2 and Mutter 3.22.2 are now available for download, and it looks like they bring various improvements to make your GNOME 3.22 desktop experience better, especially of you’re using the next-generation Wayland display server.

              For example, the Mutter 3.22.2 window and composite manager release fixes various placement issues and several crashes on Wayland, and also repairs the functionality that allowed users to switch between edge and two-finger-scrolling on the Wayland session.

        • Distributions

          • Solus Project to No Longer Support openSUSE & Fedora Repos for Budgie 11 Desktop

            While many of us, Solus users, are preparing for the winter holidays, the team lead by renowned developer Ikey Doherty is currently working hard on bringing what might just be the biggest Budgie desktop release so far.

            We can all agree that the current Budgie desktop environment is pretty cool with its GNOME 2-like vibe, and you can even enjoy it on Ubuntu Budgie, Arch Linux, Debian GNU/Linux, SparkyLinux (Debian based), and Manjaro (Arch Linux based). You can also enjoy Budgie on RPM-based distros like openSUSE and Fedora, which currently lies on the Solus Project’s OBS (Open Build Service) repositories.

          • Reviews

            • elementary OS 0.4 Loki

              elementary OS is a Linux desktop distribution that’s based on Ubuntu. The project’s goal is crafting a “fast and open replacement for Windows and macOS”.

              The latest, stable edition, with a core that’s based on Ubuntu 16.04, is elementary OS 0.4, code-named Loki.

              This article provides a walk-through of the distribution’s most important features.

              The distribution’s login screen. By default, a guest account is enabled.

          • New Releases

          • OpenSUSE/SUSE

            • SUSE: A look inside the new SUSE Linux Enterprise 12 Service Pack 2

              While out in the streets of DC there was alternately depression and elation, gnashing of teeth and celebration, at SUSECon yesterday, SUSE announced SUSE Linux Enterprise (SLE) 12 Service Pack 2 designed to power physical, virtual and cloud-based mission-critical environments. The goal with this release is to help SLE users accelerate innovation, improve system reliability, meet ever more challenging security requirements and adapt to the accelerating pace of new technologies. SUSE expressed great pride in the fact that 2/3 of the Fortune Global 100 are currently using SLE.

            • Red Hat ‘spy’ makes appearance at SUSECon

              The attendees at SUSECon 2016, the annual conference of the Germany-based SUSE Linux being held in Washington DC this week, fall into the usual well-known categories: employee, media, analyst, speaker etc.

            • openSUSE Tumbleweed Users Get Latest Linux Kernel, Mesa, and KDE Plasma Updates

              Today, November 10, 2016, openSUSE Project’s Douglas DeMaio reports on the latest updates brought by a total of four snapshots for the openSUSE Tumbleweed rolling release Linux-based operating system.

            • OpenSUSE Tumbleweed Lands Mesa 13.0
            • openSUSE News: Mesa 13 Arrives in Tumbleweed with New Kernel

              This week has been a bit hectic with dramatic change affecting people around the world, but openSUSE Tumbleweed users who are use to change can find some clarity in the chaos with five snapshots that were released this week.

              These snapshots brought not only a new major version of Mesa but a new kernel and Plasma 5.8.3.

              The newest snapshot 20161108 updated yast2 to version 3.2.3 and added a patch to fix a crash from upstream for Wayland. Lightweight web browser epiphany, which updated to version 3.22.2 in the snapshot, added fixes for adblocker and improved the password form for autofill handling.

            • Highlights of YaST development sprint 27

              This week, during SUSECon 2016, SUSE announced an exciting upcoming new product. SUSE CASP – a Kubernetes based Container As a Service Platform.

              That has, of course, some implications for the installer, like the need of some products (like CASP) to specify a fixed configuration for some subsystems. For example, an established selection of packages. The user should not be allowed to change those fixed configurations during installation.

              We have implemented a possibility to mark some modules in the installation proposal as read-only. These read-only modules then cannot be started from the installer and therefore their configuration is kept at the default initial state.

            • openSUSE Leap Goes Gold, Fedora 25 Delayed a Week

              Today in Linux news openSUSE 42.2 Leap has gone Gold Master in time for next Wednesday’s release. On the other side of town Fedora 25 has been delayed a week, pushing its release to November 22, 2016. Sam Varghese and John Grogan reported on the latest from SUSECon 2016, with one covering a Red Hat spy in attendance. Eric Hameleers released his latest liveslak and ISOs. The Hectic Geek compared Ubuntu 16.10 flavors and Carla Schroder examined Ubuntu’s enterprise chops.

            • SUSE plans container as a service platform

              Germany-based SUSE Linux has announced a container as a service platform that it hopes to release as a public beta in April next year, before the first customer version comes out in July the same year.

              Three of the developers involved — Federica Teodori, project manager for container and orchestration, Andreas Jaeger, senior product manager, and Simona Arsene, product manager — spoke to iTWire about the technology on the sidelines of SUSECon 2016, the company’s annual conference that is being held in Washington DC this week.

              Jaeger said the idea was to have a software-defined infrastructure where containers handled the workloads. The advantage was that containers, which include an application and its dependencies, could be moved around and could run from more than one location.

            • SUSE Deal Includes Ceph Storage Project
            • SUSE Growing Linux Biz Revenue at 18 percent in 2016

              According to Brauckmann, the fastest-growing route to market for SUSE now is the public cloud.

          • Slackware Family

            • More Flash fixes in November
            • Q4 2016 fixes for Java 8 (openjdk)
            • LibreOffice 5.2.3 for Slackware-current

              I wanted the latest LibreOffice in the upcoming Slackware Live Edition 1.1.4 (PLASMA 5 variant) so I have built and uploaded a set of packages for LibreOffice 5.2.3. They are for Slackware-current only.

            • Slackware Live Edition 1.1.4 – based on slackware-current of 4 Nov 2016

              Today I conclude my packaging frenzy with a new release of ‘liveslak‘. Version 1.1.4 is ready with only some minor tweaks. Users of the “iso2usb.sh” script on non-Slackware distros should be happy that the script finds all the required programs now.
              I made a set of ISO images for several variants of the 64bit version of Slackware Live Edition based on liveslak 1.1.4 and using Slackware-current dated “Fri Nov 4 03:31:38 UTC 2016”. These ISO images have been uploaded and are available on the primary server ‘bear‘. You will find ISO images for a full Slackware, Plasma5 and MATE variants and the 700MB small XFCE variant.

          • Red Hat Family

          • Debian Family

            • Derivatives

              • Canonical/Ubuntu

                • Enterprise Linux Showdown: Ubuntu Linux

                  Canonical’s Ubuntu Linux is the newcomer in the enterprise Linux space. Its first release was in 2004; the other two enterprise Linux distributions in this series, SUSE and Red Hat, were born in 1992 and 1993. In its short life Ubuntu has generated considerable controversy, supporters, detractors, excitement, and given the Linux world a much-needed injection of energy.

                  One of the primary differentiators between Ubuntu, RHEL, and SUSE is Ubuntu unashamedly and boldly promotes their desktop version. RHEL and SUSE soft-pedal their desktop editions. Not Canonical. Desktop Ubuntu has been front and center from the beginning.

                • Flavours and Variants

                  • Ubuntu 16.10 Flavors Comparison: Ubuntu vs Ubuntu GNOME vs Kubuntu vs Xubuntu

                    As promised in my earlier Ubuntu 16.10 review, I have come up with an Ubuntu 16.10 flavors comparison as well, although, I was planning on coming up with this comparison much sooner (but hey, it’s here!)

                    Unlike in my Ubuntu 16.04 LTS flavors comparison which only included two main Ubuntu flavors (Ubuntu GNOME & Kubuntu), this time, I’ve also added Xubuntu 16.10 to the comparison because it was requested by a couple of my readers. The ISO disc image sizes are as follows: Ubuntu 16.10 (1.6 GB), Ubuntu GNOME 16.10 (1.5 GB), Kubuntu 16.10 (1.6 GB) & Xubuntu 16.10 (1.3 GB). And also, I only chose the 64-bit versions of the disc images for the flavors review as well.

                    And in this comparison, I’ll only be comparing the performance related data, the stability and hardware recognition of each flavor. I’ll skip new features and whatnot, because you can find information about those features elsewhere, quite easily.

        • Devices/Embedded

          • Phones

            • Android

              • Google responds in EU antitrust case: “Android hasn’t hurt competition” [Ed: This is Microsoft pulling EU strings]

                Google—as expected—has dismissed the European Commission’s charge that the ad giant abused Android’s dominance to block its competitors in the market.

                The company is accused of using Android’s position as the dominant smartphone operating system in Europe to force manufacturers to pre-install Google services while locking out competitors.

        Free Software/Open Source

        • GitLab, Consumer Driven Contracts, Helm and Kubernetes

          This article will focus on building a workflow driven by Continuous Integration and Continuous Delivery for deploying the services on Kubernetes.

          We’ll develop and deliver an Application with two different services that communicate with each other. One service is internal and the other will be accessible from the outside world via Traefik. We’ll want to develop, deploy and evolve each service independently of the rest.

        • Web Browsers

          • Mozilla

            • Announcing Rust 1.13

              The Rust team is happy to announce the latest version of Rust, 1.13.0. Rust is a systems programming language focused on safety, speed, and concurrency.

              As always, you can install Rust 1.13.0 from the appropriate page on our website, and check out the detailed release notes for 1.13.0 on GitHub. 1448 patches were landed in this release.

              It’s been a busy season in Rust. We enjoyed three Rust conferences, RustConf, RustFest, and Rust Belt Rust, in short succession. It was great to see so many Rustaceans in person, some for the first time! We’ve been thinking a lot about the future, developing a roadmap for 2017, and building the tools our users tell us they need.

            • Rust 1.13 Brings ? Operator, Better Performance

              Rust 1.13 is now available as the latest implementation of this popular and growing programming language.

        • SaaS/Back End

          • How OpenStack Uses Nodepool

            OpenStack is an open-source cloud platform at its core, but it’s also much more. In order to build OpenStack itself, the OpenStack Foundation has needed to build out all kinds of infrastructure management tooling, including an effort known as nodepool.

          • Survey Shows Spark Spreading Out, Heading to the Cloud

            New survey data from nearly 7,000 respondents in the Big Data space are in, conducted by The Taneja Group for Cloudera, which focuses on Hadoop/Spark-based data-centric tools. The new “Apache Spark Market Survey” shows that Spark is set to break from the Hadoop ecosystem and function more and more as an independent data processing tool. It may move from on-premises installations to the cloud in many instances.

        • Oracle/Java/LibreOffice

          • LibreOffice 5 – Free Office Suite Keeps Getting Better

            LibreOffice is the best office software available, or at least on Linux. LibreOffice is a powerful office suite that comes with a clean interface and feature-rich tools that seeks to make your productive and creative. LibreOffice includes several applications including Writer for word processing, Calc for spreadsheets, Impress for presentations, Draw for vector graphics and flowcharts, Base for databases, and Math for formula editing.

        • Pseudo-Open Source (Openwashing)

        • FSF/FSFE/GNU/SFLC

        • Programming/Development

          • What is hackathon culture?

            That’s the type of culture codeRIT and BrickHack are about. Race, gender, and how much you know about coding software doesn’t matter; what matters is that you want to learn, and you want to better yourself and the world.

        Leftovers

        • Microsoft lays out its hopes for a Trump presidency

          As America wraps its head around the result of Tuesday’s election, the tech world is taking stock of what’s about to happen to it, both in the short and long term. We’ve heard how Silicon Valley has reacted with disappointment and uncertainty over what President Donald Trump means for tech-related policy. Microsoft on the other hand has gone into a little more detail about the relationship it wants with the president-elect.

          In a blog post published the day after the election, Brad Smith, Microsoft’s president and chief legal officer, offered his congratulations to Trump while making it clear that there was a great deal of work ahead for both sides.

        • Health/Nutrition

          • WTO Members Discuss UN High-Level Report On Medicines Access That WHO Declined To Discuss

            The World Trade Organization intellectual property committee this week discussed the report of United Nations Secretary General’s High-Level Panel on access to medicines which offered recommendations regarding the use of intellectual property in international trade. Developing countries taking the floor accentuated the use of flexibilities under trade rules, and the World Health Organization gave an overview of how its activities follow the panel’s recommendations, and its future projects. Civil society meanwhile criticised the WHO’s decision to dismiss a request by some developing countries to include discussions on the UN report at the next Executive Board Meeting. WHO then used this WTO meeting to make a statement about the UN report.

          • American Women Are Preparing for a War on Reproductive Rights Under President Trump

            Benoit told The Intercept that more than two dozen women reached out to her for advice about the IUD, a small device inserted into the uterus that, depending on the type, works for three to 12 years. “I recommend the IUD right now especially because it’s long term, which with 20 million+ Americans potentially losing their health insurance and potentially right to an abortion, is important,” she said.

          • India Patent Office denies patent for prostate cancer drug sold under brand name Xtandi, generic name enzalutamide

            According to this story, the India Patent Office has denied a patent for the prostate cancer drug sold under the brand name Xtandi (generic name Enzalutamide). Opponents of the patent claimed it was a new form of a known substance, and not eligible in India under Section 3(d) of its patent act.

            According to the Times of India, the Astellas price for 112 pills (a 28 day supply) of Xtandi was 335,000 rupees, or about $5014.60 US Dollars. This is $179 per day or $44.77 per pill, much higher than the $26 per pill price Astellas sells the drug for in Japan.

            According to the World Bank, the 2015 per capita income in India was $1,590 per year, or $4.36 per day.

          • Six Candidates For WHO Director General Lay Out Their Views

            Funding, universal health, multisectoral work and access to medicines were among the issues addressed at the recent candidates’ forum of the World Health Organization in Geneva as part of the process to choose the next director general of the UN health agency. Candidates spoke on how to fund the organisation in its quest for universal health care and response to emergencies.

          • Two Generics Companies Apply For First WHO Prequalification Of Novel Antiretroviral

            Today, the Medicines Patent Pool announced that two generic drug companies applied for the World Health Organization prequalification of an innovative antiretroviral.

        • Security

          • The Future of IoT: Containers Aim to Solve Security Crisis

            Despite growing security threats, the Internet of Things hype shows no sign of abating. Feeling the FoMo, companies are busily rearranging their roadmaps for IoT. The transition to IoT runs even deeper and broader than the mobile revolution. Everything gets swallowed in the IoT maw, including smartphones, which are often our windows on the IoT world, and sometimes our hubs or sensor endpoints.

            New IoT focused processors and embedded boards continue to reshape the tech landscape. Since our Linux and Open Source Hardware for IoT story in September, we’ve seen Intel Atom E3900 “Apollo Lake” SoCs aimed at IoT gateways, as well as new Samsung Artik modules, including a Linux-driven, 64-bit Artik7 COM for gateways and an RTOS-ready, Cortex-M4 Artik0. ARM announced Cortex-M23 and Cortex-M33 cores for IoT endpoints featuring ARMv8-M and TrustZone security.

          • GCHQ encourages ISPs to rewrite their software to stop DDoS attacks

            The head of the GCHQ believes that if ISPs were to rewrite their software that they could potentially stop DDoS attacks from affecting their networks.

          • GCHQ thinks ISPs can solve DDoS by taking a good look at themselves

            THE BOSS OF UK SPOOK AGENCY GCHQ reckons that he has the solution to the global problem of distributed denial-of-service (DDoS) attacks that blight online services: a standard rewrite of the software and code on which ISPs run.

            Ian Levy, technical director of GCHQ’s National Cyber Security Centre, told The Sunday Telegraph that the organisation is already planning talks with ISPs like BT about this silver bullet, and he is hopeful that it won’t turn out to be silver-plated bullshit.

          • OpenSSL Security Advisory [10 Nov 2016]
        • Transparency/Investigative Reporting

          • Is Disclosure of Podesta’s Emails a Step Too Far? A Conversation With Naomi Klein

            There’s an amazing irony here in some sense because I’ve been defending the news value of the WikiLeaks archives over the past several months, not just the Podesta but also the DNC archive. And I’ve defended WikiLeaks in the past, long prior to the Snowden archive. There are a couple of really fascinating nuances that I think set the stage for the kinds of distinctions that you’re urging be drawn.

            When I first started defending WikiLeaks back in 2010, one of my primary arguments was that WikiLeaks, contrary to the way they were being depicted by the U.S. intelligence community and their friends, was not some reckless rogue agent running around sociopathically dumping information on the internet without concern about who might be endangered. And in fact, if you look at how the biggest WikiLeaks releases were handled early on — the Iraq and Afghanistan war logs, as well as the State Department cables — not only did they redact huge numbers of documents on the grounds that doing so was necessary to protect the welfare of innocent people, they actually requested that the State Department meet with them to help them figure out what kind of information should be withheld on the grounds that it could endanger innocent people.

            So they were very much an ardent and enthusiastic proponent of that model — that when you get tons of information that belongs in the public eye, you have the corresponding responsibility to protect not only people’s physical security but also their privacy. I used to defend them on that all the time.

            Somewhere along the way, WikiLeaks and Julian decided, and they’ve said this explicitly, that they changed their mind on that question — they no longer believe in redactions or withholding documents of any kind.

          • Reddit users take WikiLeaks to task over email dumps, Russia

            Among the highlights of the AMA, was WikiLeaks revealing it decides to publish information according to its “promise to sources for maximum impact.” WikiLeaks also denied colluding with Trump’s campaign and Russia, and defended the information it dumped and its timing.

          • We are the WikiLeaks staff. Despite our editor Julian Assange’s increasingly precarious situation WikiLeaks continues publishing
        • Environment/Energy/Wildlife/Nature

          • Marrakech climate talks: giving the fossil fuel lobby a seat at the table

            As the world gathers in Morocco for the historic first meeting under the Paris agreement – called “COP22” but now also “CMA1” – it does so with the unprecedented involvement of corporate interests who have fought climate action around the world, funded climate change denial and whose fundamental interest is in extracting and burning as much fossil fuel as possible.

            Earlier this year, desperate moves from countries representing the majority of the world’s population to examine how the UN might identify and minimise conflicts of interest were swept under the carpet by rich countries – especially the US, EU and Australia – who argued they wanted to be as “inclusive” as possible and that the concept of “conflict of interest” was too hard to define.

          • Myron Ebell: 5 Fast Facts You Need to Know

            Donald Trump is rumored to appoint Myron Ebell, a climate change denier, as head of the Environmental Protection Agency.

            Ebell serves as the director of the Center for Energy and Environment at the Competitive Enterprise Institute, and he’s currently heading President-Elect Trump’s Environmental Protection Agency transition process. Politico reports that Ebell himself will likely become the new head of the EPA. While nothing official has been announced by the Trump campaign, the appointment of Ebell would represent a dramatic shift in the United States’ environmental policies.

            Here’s what you need to know about Myron Ebell, the possible next head of the Environmental Protection Agency.

          • Team Trump is already filled with Washington insiders

            To shape his administration, President-elect Donald Trump is drawing squarely from the “swamp” he has pledged to drain.
            Trump’s transition team is staffed with long-time Washington experts and lobbyists from K Street, think tanks and political offices.

            It’s a far cry from Trump’s campaign, which ended only Tuesday night, and message that he would “drain the swamp” in Washington. He has advocated congressional term limits and proposed a “five-point plan for ethics reform” that included strengthening restrictions on lobbying, including five-year bans for members and staff of the executive branch and Congress from lobbying, and expanding the definition of lobbyist to prevent more revolving door activity.
            But he has so far fully embraced lobbyists within his transition, and all signs point to a heavy influence from longtime Washington Republican circles on his transition. And with Trump mostly skipping detailed policy proposals during his campaign, these they can have a powerful impact on his agenda.

          • Trump Picks Top Climate Skeptic to Lead EPA Transition

            Donald Trump has selected one of the best-known climate skeptics to lead his U.S. EPA transition team, according to two sources close to the campaign.

            Myron Ebell, director of the Center for Energy and Environment at the conservative Competitive Enterprise Institute, is spearheading Trump’s transition plans for EPA, the sources said.

            The Trump team has also lined up leaders for its Energy Department and Interior Department teams. Republican energy lobbyist Mike McKenna is heading the DOE team; former Interior Department solicitor David Bernhardt is leading the effort for that agency, according to sources close to the campaign.

          • Palm oil industry under fire as Indonesia’s haze drama continues

            In August, haze from Indonesian slash-and-burn agriculture enveloped Singapore and wafted into Malaysia and up to Thailand. It was not as bad as last year, however.

            The usual wave of complaints came from Singapore and the diplomatic spat started again.

            Indonesia’s Minister of Environment and Forestry, Dr Siti Nurbaya Bakar, asked that Singapore focus on its own role in addressing the issue instead of “making so many comments”. She said that Indonesia has stuck to its side of the bargain in trying to avoid the recurrence of forest fires and in strictly enforcing the law. She is right.

            Dr Siti has vowed to bring the culprits to justice – mostly palm oil plantation companies, some headquartered in Singapore.

          • What does a Trump presidency mean for climate change?

            Donald Trump, the 45th president of the United States, has called climate change a “Chinese hoax,” so it’s no wonder climate scientists are freaking out about what will happen to the environment in the years to come.

            Trump has already threatened to pull America out of the landmark Paris climate change accord, eliminate the Environmental Protection Agency, repeal environmental regulations, and cut climate funding. He proposed an incoherent energy plan aimed at reviving the coal industry. It’s difficult to know which of these promises Trump will follow through on, but climate scientists warn that his plan is a disaster that would create lasting harm to everything from global biodiversity to food availability.

          • Climate change may be escalating so fast it could be ‘game over’, scientists warn

            It is a vision of a future so apocalyptic that it is hard to even imagine.

            But, if leading scientists writing in one of the most respected academic journals are right, planet Earth could be on course for global warming of more than seven degrees Celsius within a lifetime.

            And that, according to one of the world’s most renowned climatologists, could be “game over” – particularly given the imminent presence of climate change denier Donald Trump in the White House.

        • Finance

          • Even Fans Admit Chances Of TPP Being Ratified By US Soon — Or Ever — Have Just Slumped

            In the wake of the unexpected win of Donald Trump, people in many fields are starting to re-examine their assumptions about what might happen in the next few years. One of the areas impacted by Trump’s success is trade in general, and trade deals in particular. For perhaps the first time, the 2016 election campaign put trade deals front and center. They may even have contributed to Hillary Clinton’s downfall, since many found her sudden conversion to the anti-TPP movement unconvincing, to say the least.

          • Judge rejects Trump bid to bar campaign statements from fraud trial

            A U.S. judge on Thursday tentatively rejected a bid by Donald Trump to keep a wide range of statements from the presidential campaign out of an upcoming fraud trial over his Trump University venture.

            The ruling came in advance of a pretrial hearing later on Thursday where lawyers for the president-elect will square off against students who claim they were they were lured by false promises to pay up to $35,000 to learn Trump’s real estate investing “secrets” from his “hand-picked” instructors.

            Trump owned 92 percent of Trump University and had control over all major decisions, the students’ court papers say. The president-elect denies the allegations and has argued that he relied on others to manage the business.

          • The Trans-Pacific Partnership is dead, Schumer tells labor leaders

            The Senate’s soon-to-be top Democrat told labor leaders Thursday that the Trans-Pacific Partnership, the trade deal at the center of President Obama’s “pivot” to strengthen ties with key Asian allies, will not be ratified by Congress.

            That remark from Sen. Charles E. Schumer (D-N.Y.), who is expected to be the incoming Senate minority leader, came as good news to the AFL-CIO Executive Council, which met Thursday in Washington. Schumer relayed statements that Republican congressional leaders had made to him, according to an aide who confirmed the remarks.

          • TiSA: Trade in Services Agreement is Bad News for Workers and Communities

            The report sets out how a TiSA agreement would concentrate more power in the hands of multinational corporations, put a stranglehold on vital government regulation, undo the limited progress which has been made on regulating banks and finance conglomerates, and lead to an “Uberisation” of millions of workers’ jobs.

            Sharan Burrow, ITUC General Secretary, said: “While trade deals like TTIP, TPP and CETA are making headlines, government negotiators working hand in glove with corporate lobbyists are hoping to smuggle TiSA through while attention is focused elsewhere. This must not be allowed to happen.

            From what is known about the secret TiSA deal, it would have a profound and negative impact on financial regulation, protections for workers and consumers alike, and across a whole raft of other areas. Governments have still not learned the lesson that putting corporate interests ahead of the living standards and lives of their own people is not only unjust, it is political stupidity.”

          • Theresa May faces Brexit resistance as MPs threaten to vote against Article 50

            Theresa May has been given a fresh indicator of the difficulties she could face if Parliament is given a vote on article 50, as MPs lined up threatening to vote against triggering Brexit .

            Ministers are challenging a High Court ruling that Parliament must be given a say before the formal two-year process can be started by the Government, but if it comes to a Commons vote a number of MPs have indicated they would oppose the measure unless there are major concessions.

            Liberal Democrat leader Tim Farron said his party would vote against Article 50 unless there was a guarantee that the final Brexit deal with the European Union is put to a fresh referendum.

            He insisted he respected the decision made by voters in favour of leaving the EU but said nobody should have a deal “imposed” upon them.

            Although the Lib Dems only have eight MPs they have more than 100 peers in the Lords, which could spell trouble for the Government if judges rule that a full act of Parliament is required before Article 50 can be triggered, as the legislation would have to clear both Houses.

          • Saudi Arabia owes billions to private firms after collapse in oil revenues

            Saudi Arabia has admiited that it owes billions of dollars to private firms and foreign workers after oil revenues collapsed, the kingdom’s new finance minister said.

            The arrears have left tens of thousands of foreign workers, chiefly in the construction sector, struggling for months while they await back pay.

            “I don’t recall the exact amount now but its billions of dollars,” Mohammed Aljadaan told reporters on Thursday.

          • Your money’s no good: rupee note cancellation plunges India into panic

            Queues of angry, panicked Indians wound around bank buildings in Mumbai, the financial capital, on Thursday morning, two days after the prime minister, Narendra Modi, announced that 500- and 1,000-rupee notes, worth around £6 and £12, would be taken out of circulation.

            In a televised announcement on Tuesday night, Modi had urged Indians not to rush to banks, as they would have until the end of 2016 to deposit cash in their accounts. But with the high-value notes withdrawn from Wednesday in an effort to combat corruption, black-market trade and tax evasion, many were left without cash for day-to-day expenses.

            Banks were closed on Wednesday, and reopened on Thursday morning with a cap on cash withdrawals. ATMs remained closed, so currency was only available from the banks. Newspapers around the country reported long queues at branches, as people scrambled to exchange their high-value banknotes for 100-rupee bills.

          • Trump tapped the viral anger over H-1B use

            President-elect Donald Trump realized early in his campaign that U.S. IT workers were angry over training foreign visa-holding replacements. He knew this anger was volcanic.

            Trump is the first major U.S. presidential candidate in this race — or any previous presidential race — to focus on the use of the H-1B visa to displace IT workers. He asked former Disney IT employees, upset over having to train foreign replacements, to speak at his rallies.

            “The fact is that Americans are losing their jobs to foreigners,” said Dena Moore, a former Disney IT worker at a Trump rally in Alabama in February. “I believe Mr. Trump is for Americans first.”

        • AstroTurf/Lobbying/Politics

          • Donald Trump could be impeached within weeks, claims legal professor

            Donald Trump could be impeached within weeks, according to at least one legal professor.

            There is a strong case for the beginning of legal proceedings that would stop Donald Trump from being president, says law professor Christopher Peterson.

            A paper from Professor Peterson says that there is ample evidence to charge the new President-elect with crimes that would see him potentially being removed from office.

            Professor Peterson’s analysis was written in September, before Mr Trump became president. But the argument makes it applies after the election, too.

          • Facebook’s failure: did fake news and polarized politics get Trump elected?

            It’s a great quote, but he never said it.

            It typifies the kind of fake news and misinformation that has plagued the 2016 election on an unprecedented scale. In the wake of the surprise election of Donald Trump as president of the United States, pressure is growing on Facebook to not only tackle the problem but also to find ways to encourage healthier discourse between people with different political views.

            Rather than connecting people – as Facebook’s euphoric mission statement claims – the bitter polarization of the social network over the last eighteen months suggests Facebook is actually doing more to divide the world.

          • Why Mark Zuckerberg Is Fortune’s Businessperson of the Year
          • President Trump: How America Got It So Wrong

            “Fuck yourself,” he says, thrusting a middle finger in my face. He then turns around and walks a boy of about five away from me down Fifth Avenue, a hand gently tousling his son’s hair.

            This was before Donald Trump’s historic victory. The message afterward no doubt would have been the same. There’s no way to overstate the horror of what just went down. Sure, we’ve had some unstable characters enter the White House. JFK had health problems that led him to take amphetamine shots during the Cuban Missile Crisis. Reagan’s attention span was so short, the CIA had to make mini-movies to brief him on foreign leaders. George W. Bush not only didn’t read the news, he wasn’t interested in it (“What’s in the newspapers worth worrying about?” he once asked, without irony).

            But all of these men were just fronts for one or the other half of the familiar alternating power structure, surrounded by predictable, relatively sober confederates who managed the day-to-day. Trump enters the White House as a lone wrecking ball of conspiratorial ideas, a one-man movement unto himself who owes almost nothing to traditional Republicans and can be expected to be anything but a figurehead. He takes office at a time when the chief executive is vastly more powerful than ever before, with nearly unlimited authority to investigate, surveil, torture and assassinate foreigners and even U.S. citizens – powers that didn’t seem to trouble people much when they were granted to Barack Obama.

          • Elections, the Internet, and the Power of Narrative

            Once again, the struggle over the Power of Narrative has been laid bare – just as it was in the 1530s and countless other times in history. Once again, a colluding establishment had decided to tell a unified story as The Truth, only to be shattered by new communications technology revealing the collusion and a set of alternative, unapproved talking points. This has happened before, and this will happen again, and it is the biggest power shift that can happen in society – far greater than an election.

            Elections are ultimately about violence. Since the Treaty of Westphalia in 1648, far predating modern democracy, states have taken upon themselves to enforce a certain set of rules on their population – with violence, if need be. The territorial governments under the Treaty of Westphalia – loosely what we call “countries” today – therefore have a monopoly on exercising lawful violence against bad people. This mechanism remains with modern voting, which therefore becomes an indirect way of wielding violence against those bad people.

          • How Data Failed Us in Calling an Election

            It was a rough night for number crunchers. And for the faith that people in every field — business, politics, sports and academia — have increasingly placed in the power of data.

            Donald J. Trump’s victory ran counter to almost every major forecast — undercutting the belief that analyzing reams of data can accurately predict events. Voters demonstrated how much predictive analytics, and election forecasting in particular, remains a young science: Some people may have been misled into thinking Hillary Clinton’s win was assured because some of the forecasts lacked context explaining potentially wide margins of error.

            “It’s the overselling of precision,” said Dr. Pradeep Mutalik, a research scientist at the Yale Center for Medical Informatics, who had calculated that some of the vote models could be off by 15 to 20 percent.

            Virtually all the major vote forecasters, including Nate Silver’s FiveThirtyEight site, The New York Times Upshot and the Princeton Election Consortium, put Mrs. Clinton’s chances of winning in the 70 to 99 percent range.

          • Polls etc.

            Two points which have come up at work and may be generally interesting as everyone picks through the wreckage. Research/marketing stuff, be warned. Also remember I was HIDEOUSLY WRONG about Trump not being like Brexit because I was a straw-clutching idiot. So pinch of salt but…

            1) The Polls. They fucked up, and so did the aggregators (in fact worse, as one of the individual polls (IBM/TPP) did rather well). 538, PEC, etc look like post-meteor dinosaurs. But obviously the individual polls are also in trouble if the business is going to come down to “poll all year and then at the end we see who’s turnout assumptions are best”.

            But the problem actually runs deeper than that – the trouble isn’t “shy Trump voters” which you can often detect using other indicators. It’s Trump voters who barely even get the chance to be shy, because years of declining response rates (down from 25% to 5% or so in the last 20 years) have created an entirely skewed survey-taking universe where the set of people who will take surveys at all is very different from the population. Estimating how many might be missing is pure guesswork: yes, an insurgent electorate is more right wing, but by 2 points? 5? 10? There’s no way of knowing. These people are dark matter. PS the exit polls ARE STILL POLLS this still applies.

          • Tech founders want California to secede

            Shervin Pishevar, an early Uber investor and cofounder of Hyperloop, posted a series of tweets Tuesday night announcing his plans to fund “a legitimate campaign for California to become its own nation.”

            And no, he’s not joking.

            “Yes it’s serious,” Pishevar told CNNMoney in an e-mail. “It’s the most patriotic thing I can do. The country is [at] a serious crossroads.”

            Within hours, several other tech founders offered their support for the plan.

            “I was literally just going to tweet this. I’m in and will partner with you on it,” Dave Morin, an investor and founder of private social networking tool Path, tweeted in response to Pishevar.

          • Donna Brazile: I’m sorry only that I got caught cheating with debate questions

            Donna Brazile, the interim chair of the Democratic National Committee, is not only refusing to apologize for giving debate questions to candidate Hillary Clinton. She’s also saying she would do it again if given the opportunity.

            “My conscience — as an activist, a strategist — is very clear,” she said in an interview with talk-radio host Joe Madison that aired on Monday.

            Brazile argued she was simply doing her job as a strategist to know what questions the debate moderators might pose: “You’re doggone right I’m gonna talk to everybody. Joe, I will never go out on TV or go on radio without the facts. I will ask. I will submit things. I will circulate things. And guess what? I also enjoy the exchange that I have with my colleagues.”

          • Everyone Is Sharing Michael Moore’s 5-Point ‘Morning After To-Do List’

            The morning after Donald Trump became the U.S. president-elect felt like something of a hangover for millions of Democrats. With a Republican Senate and House of Representatives to boot, to say nothing of Supreme Court vacancies, many liberals were understandably depressed.

            Maybe that’s why documentary filmmaker Michael Moore’s five-point plan has been shared over 100,000 times since it was posted on Facebook Wednesday morning. It offers a blueprint for how Democrats can get back up and fight for their causes.

          • It’s Still the Same United States

            In the aftermath of Donald Trump’s shocking victory, many liberals woke up Wednesday morning feeling like strangers in their own country, or perhaps, as if they were the familiar ones and it was the country itself that had become the stranger. I heard it in the voices of friends. I read it in texts from family. I found it in newspaper headlines from some of my favorite writers and in tweets and Facebook messages. What kind of a country do I live in? they asked. Something important has changed. This is not the nation I thought I knew.

          • Trump campaign staff redirects, then restores, mention of Muslim ban from website

            President-elect Donald Trump’s campaign staff temporarily redirected the webpage detailing his controversial proposal to temporarily ban Muslim immigration into the United States, one of the most divisive and controversial policy ideas of his campaign, but swiftly sought to restore it after reporter inquiries Thursday.

            The proposal is detailed on a page titled, “Donald J. Trump statement on Preventing Muslim Immigration.” Starting on Election Day, that page redirected to a new page where supporters could donate to the campaign. “Thank you America,” said the banner on the new page. “We showed America the silent majority is no longer silent.”

          • KKK announces North Carolina ‘victory’ parade

            While one report of Ku Klux Klan activity in North Carolina following Donald Trump’s election as president was debunked, the real KKK has announced a rally in the state.

            Trump, a Republican, was officially endorsed by the KKK during his campaign against Hillary Clinton, a Democrat. Trump won North Carolina on his way to winning the presidency, defeating Clinton here by nearly 5 percentage points.

            Details on the rally celebrating Trump’s victory are scarce. It’s being held by The Loyal White Knights of the Ku Klux Klan, which is based in Pelham – a small, unincorporated community about 45 minutes north of Burlington, near the Virginia border.

            The group was behind a rally in South Carolina last year protesting the removal of the Confederate flag from the state Capitol building.

          • Trump’s dystopia is coming – but it will destroy itself

            It means that the reactionary forces of the far-right are resurgent. Trump’s victory is the latest in a global trend which was previously manifest in Britain’s Brexit vote, which saw Britons vote to get out of the European Union. That itself follows a growing wave of popularity for right-wing extremists across Europe.

            It’s no surprise that among the first in Europe to congratulate Trump on taking the White House were far-right leaders like France’s Marine Le Pen and the Netherlands’ Geert Wilders.

            That is because, as I’ve documented elsewhere, Trump’s advisory team has close ties to Europe’s fascist political parties.

            His campaign rhetoric has meant that the forces he rode to victory are hardly a secret.

          • Theresa May still awaiting call from Donald Trump

            The UK’s hopes for a continuation of the much-vaunted special relationship with the US under Donald Trump have suffered an early setback after the new president-elect spoke to nine world leaders in the 24 hours after his election win, without Theresa May getting a call.

            Trump has thus far talked to the leaders of Ireland, Mexico, Israel, Egypt, Turkey, India, Japan, Australia and South Korea, according to various reports.

            A Downing Street spokesman said a phone call between May and Trump was “being arranged now”. He said: “They will speak at the earliest possible opportunity.” The spokesman added that May had sent the president-elect a letter.

          • DNC Staffer Screams At Donna Brazile For Helping Elect Donald Trump

            On Thursday, Democratic Party officials held their first staff meeting since Hillary Clinton’s stunning loss to Donald Trump in the presidential race. It didn’t go well.

            Donna Brazile, the interim leader of the Democratic National Committee, was giving what one attendee described as “a rip-roaring speech” to about 150 employees, about the need to have hope for wins going forward, when a staffer identified only as Zach stood up with a question.

            “Why should we trust you as chair to lead us through this?” he asked, according to two people in the room. “You backed a flawed candidate, and your friend [former DNC chair Debbie Wasserman Schultz] plotted through this to support your own gain and yourself.”

            Some DNC staffers started to boo and some told him to sit down. Brazile began to answer, but Zach had more to say.

            “You are part of the problem,” he continued, blaming Brazile for clearing the path for Trump’s victory by siding with Clinton early on. “You and your friends will die of old age and I’m going to die from climate change. You and your friends let this happen, which is going to cut 40 years off my life expectancy.”

          • This Photo Of Sad Obama Staffers Isn’t From Trump’s White House Visit

            The photo was taken by European Press Agency photographer Jim Lo Scalzo and shows White House staff listening as Obama spoke from the Rose Garden Wednesday.

          • Obama To Pardon Hillary To Save Her From Jail

            Obama’s last act as president will be saving Hillary from jail by granting her a pardon, despite spending the last months claiming she has done nothing wrong.

            Washington insiders claim an elaborate pardon is being drawn up to protect Hillary from prosecution and jail time.

            The White House is deflecting questions about President-elect Donald Trump’s intent to appoint a special prosecutor to review Clinton’s case, and steadfastly refusing to rule out a pardon.

        • Censorship/Free Speech

          • Users Around the World Reject Europe’s Upload Filtering Proposal

            Users around the world have been outraged by the European Commission’s proposal to require websites to enter into Shadow Regulation agreements with copyright holders concerning the automatic filtering of user-generated content. This proposal, which some are calling RoboCopyright and others Europe’s #CensorshipMachine, would require many Internet platforms to integrate content scanning software into their websites to alert copyright holders every time it detected their content being uploaded by a user, without any consideration of the context.

            People are right to be mad. This is going to result in the wrongful blocking of non-infringing content, such as the fair use dancing baby video. But that’s only the start of it. The European proposal may also require images and text—not just video—to be automatically blocked on copyright grounds. Because automated scanning technologies are unable to evaluate the applicability of copyright exceptions, such as fair use or quotation, this could mean no more image macros, and no more reposting of song lyrics or excerpts from news articles to social media.

          • In The Rush To Blame Facebook, Come The Calls To Suppress Ideas People Disagree With

            In fact, it’s likely to make things even worse. Remember the mostly made up “controversy” about Facebook suppressing conservative news? Remember the outrage it provoked (or have you already forgotten?). Just imagine what would happen if Facebook now decided that it was only going to let people share “true” news. Whoever gets to decide that kind of thing has tremendous power — and there will be immediately claims of bias and hiding “important” stories — even if they’re bullshit. It will lead many of the people who are already angry about things to argue that their views are being suppressed and hidden and that they are being “censored.” That’s not a good recipe. And it’s an especially terrible recipe if people really want to understand why so many people are so angry at the status quo.

            Telling them that the news needs to be censored to “protect” them isn’t going to magically turn Trump supporters into Hillary supporters. It will just convince them that they’re even more persecuted.

            Other than “censoring” certain content, the only other suggestion I seriously heard was someone suggesting that Facebook should force-feed its users opposing views. Like that’s actually going to change anyone’s mind, rather than get them pissed off again. And, once again, this seems like people failing to take responsibility for their own actions. If you don’t have any friends who supported Trump, don’t lump that on Facebook.

            There are legitimate questions about whether you can better inform a populace. But censorship and force-feeding information is general paternalistic nonsense that totally misunderstands the issue and misdiagnoses the problem. As Clay Shirky noted earlier this year, too many Hillary supporters thought that “bringing fact checkers to a culture war” would win out, when that’s never going to happen. Fighting Facebook’s algorithim is more of the same nonsense. It’s based in the faulty belief that those who voted for “the other” are simply too dumb to understand the truth, and if they just got more truth, they’d buy it. It’s not understanding why they voted the way they did. It’s looking for easy scapegoats.

            Facebook’s algorithm is an easy target, but it’s even less likely to solve a culture war than fact checkers.

          • Less Censorship Could Make Independent Film Productions Suffer

            China passed its first comprehensive law governing the film industry on Monday, a move that some said would simplify the process of approving and censoring films. Others, however, worried that it could put more pressure on filmmakers, particularly independent producers.

          • Number of imported films in China reaches record high

            Chinese moviegoers will be spoilt for choice this month, with over 50 films, some of which are highly anticipated, from home and abroad hitting the cinemas in the month.

            November will see the release of 12 foreign films, including Doctor Strange, Fantastic Beasts and Where to Find Them, Allied, Billy Lynn’s Long Halftime Walk, taking the number of imported films in the Chinese market to a record high of 39 this year. The number was 34 last year.

            Some domestic films are also highly anticipated, like I am not Madame Bovary, directed by Feng Xiaogang and starring Fan Bingbing, which has already won awards at Toronto International Film Festival and San Sebastian International Film Festival, and was nominated for many other awards.

            Even though most Chinese audiences are already used to overseas blockbusters flushing into the Chinese market in recent years, the cinematic booty of this month is still quite unprecedented.

          • New claims of Facebook censorship in Norway

            Just two months after Facebook found itself in the centre of an international controversy after censoring posts in Norway, the social media giant has banned another prominent Norwegian for posting a photo that included nudity.
            Artist, writer and Dagbladet columnist Kjetil Rolness was banned from Facebook for three days for having shared an article from online newspaper iTromsø.

            Author Tom Egeland, who was at the centre of the ‘Napalm Girl’ Facebook controversy back in August, was the one to bring the new case to light. He did so, naturally enough, on his Facebook page.

          • Polish minister accuses Facebook of censorship over right-wing symbol
          • Poland’s far-right groups protest Facebook
          • Far-right Polish groups protest Facebook profile blockages
          • Are Mark Cuban’s Reasons For Banning ESPN’s Mavericks Reporters Science Fiction?
          • Mark Cuban turns pro-censorship in latest NBA fit
        • Privacy/Surveillance

          • Should You Spy on Your Kids?

            In the middle of a long bicycle ride several weeks ago, I pulled over for a rest and took out my iPhone to send a text message to my wife. I had a feeling she might be watching me.

            “If you’re checking my location, I’m not dead,” I wrote to her. “I’m getting coffee on Mercer Island.”

            As it happens, she was not keeping tabs on where I was, but she could have — and has in the past — because I have allowed her to do so using the location-tracking capability in my phone. Whenever she’s curious, she can see me represented as an orange dot on a digital map on her phone. An unmoving dot could be a cyclist husband who got a flat tire, grabbed a beer with a friend or was hit by a car (hence the reassuring text).

            Now and again, I, too, check my wife’s location so I know when she leaves work and can time dinner with her arrival. She and I have both tracked the whereabouts of our 13-year-old daughter using her phone to reassure ourselves that she was on her way home from school or a trip to the store.

          • King County using customer grocery store data to target pet owners, send licensing notices

            A King County letter that ended up in the mailboxes of thousands of pet owners is raising concerns over privacy.

            The letter told pet owners to license their pets or face a $250 fine.

            “It feels weird to me, it feels like they’re kind of snooping around in a place where they shouldn’t be,” said dog owner Chris Lee.

            Turns out for the last four years, King County has been using data companies to target specific taxpayers, or in this case pet owners. That means every time customers swipe those rewards cards, they’re gathering data.

          • Government Needs Access To Big Data To Fight, Uh, Terrierism

            Scummy King County, Washington is using customer grocery store data to target pet owners and send them letters threatening them with a $250 fine if they don’t license their pets.

            Good reason to pay in cash, to avoid linking a “loyalty card” to the real you (Just call me “Mrs. Claus, 1010 North Pole Lane), and to vote out the assholes doing this.

          • The phone so secure even the head of the NSA uses it: Boeing’s secret ‘blackphone’ that can SELF DESTRUCT if tampered with begins testing (and no, you can’t buy one)

            Developed by Boeing and the Defense Information Systems Agency, the Boeing Black phone is designed for secure communication between governmental agencies and their contractors.

            The handset can even self destruct if it is tampered with, destroying all the data on it, and is so secure that Boeing will only sell it to ‘approved’ purchasers.

          • New IBM Platform Brings Watson to IoT

            IBM unveiled today an experimental platform that allows developers to embed Watson functions and cognitive technology into various devices. The platform, dubbed Project Intu, can be accessed through the Watson Developer Cloud, Intu Gateway, and GitHub.

        • Civil Rights/Policing

          • EU citizenship proposal could guarantee rights in Europe after Brexit

            The European parliament is to review a proposal for an associate EU citizenship open to nationals of a country that has left the union but who want to stay part of the European project and retain some of their EU rights.

            The plan, tabled by a liberal MEP from Luxembourg, could mean British citizens who opt for the new status would be able to continue to travel freely and live on the continent – rights that may no longer be automatic after Brexit.

            “It’s clear the UK is divided, and many people want to remain part of Europe,” said Charles Goerens, who proposed amendment 882 to a draft report by the parliament’s constitutional affairs committee on possible changes to “the current institutional set-up” of the European Union.

            “The idea is simply to guarantee those who want it some of the same rights they had as full EU citizens, including the right of residence in the EU, and to be able to vote in European elections and be represented by an MEP.”

          • Reports of racist graffiti, hate crimes in Trump’s America

            Fears of heightened bigotry and hate crimes have turned into reality for some Americans after Donald Trump’s presidential win.
            Racist, pro-Trump graffiti painted inside a high school. A hijab-wearing college student robbed by men talking about Trump and Muslims.
            While Trump has been accused of fostering xenophobia and Islamophobia, some of his supporters have used his words as justification to carry out hateful acts.
            Here’s what some Americans are dealing with across the country.

        • Internet Policy/Net Neutrality

          • Here’s How President Trump Could Destroy Net Neutrality

            Donald Trump’s presidential election victory could have dire consequences for US internet freedom and openness, according to several tech policy experts and public interest advocates surveyed by Motherboard on Wednesday.

            The Republican billionaire will likely seek to roll back hard-won consumer protections safeguarding net neutrality, the principle that all internet content should be equally accessible, as well as a host of other policies designed to protect consumers, ensure internet freedom, and promote broadband access, these experts and advocates said.

            “Everything we’ve accomplished over the last ten years is now in jeopardy,” said Malkia Cyril, co-founder and executive director of the Center for Media Justice, a nonprofit group that advocates for digital freedom and inclusion. “From net neutrality to broadband privacy to prison phone reform and the Lifeline expansion, that’s all at risk now.”

          • Trump’s FCC: Tom Wheeler to be replaced, set-top box reform could be dead

            Tom Wheeler’s time as chairman of the Federal Communications Commission is nearing an end now that Republican Donald Trump has won the presidency. You can expect Wheeler to step down from his chairmanship on or before January 20, when Trump is inaugurated.

            It’s customary for the chair to step down when the White House shifts to the opposing party. All five FCC commissioners are appointed by the president and confirmed by the US Senate, with the president’s party having a one-vote majority. (The president usually appoints minority party commissioners based on recommendations made by minority party lawmakers.)

            Trump can’t force Wheeler, a Democrat, to leave the commission entirely before his term expires, but the president can designate a new chairperson.

        • Intellectual Monopolies

          • Trademarks

            • CJEU rules against Rubik’s Cube shape trade mark

              In the judgment, published today, the five-judge panel said the General Court was wrong in its evaluation of functionality.

              Article 7(1)(e) of the (old) CTM Regulation provides that signs which consist exclusively of the shape of the goods themselves, a shape necessary to obtain a technical result or a shape which gives substantial value are not registrable.

            • CJEU upholds duty to reverse-engineer trade marks in Rubik’s cube decision, but what about the actual v abstract test?

              The role of the graphical representation included in trade mark applications is to let competitors and bodies in charge of the registration know the scope of the requested protection.

              In theory, owners’ exclusive rights are limited to the aesthetic appearance of the sign as represented in the application graphic representation. Thus – according to some – the chance to register a certain sign should be based on the self-contained, easily accessible, and intelligible images that appear in trade mark application.

          • Copyrights

            • Anti-Piracy Group FACT Expands Reach Beyond Hollywood

              The Federation Against Copyright Theft says that it will branch out into new areas of IP enforcement. For decades the anti-piracy group has relied on Hollywood for much of its business but with that work now being carried out by the MPA and others, FACT will offer services to companies outside the audio-visual sector.

            • CJEU says that EU law allows e-lending

              As reported by this blog, this reference arose in the context of proceedings brought by the association of Dutch public libraries which – contrary to the position of Dutch government – holds the view that libraries should be entitled to lend electronic books included in their collections according to the principle “one copy one user”.

              This envisages the possibility for a library user to download an electronic copy of a work included in the collection of a library with the result that – as long as that user “has” the book – it is not possible for other library users to download a copy. Upon expiry of the e-lending period, the electronic copy downloaded by the first user becomes unusable, so that the book in question can be e-borrowed by another user.

            • E-books can be lent by libraries just like normal books, rules EU’s top court

              Public libraries can lend out electronic books, the European Union’s highest court has ruled.

              The judgment confirms the opinion of Maciej Szpunar, advocate general to the the Court of Justice of the European Union (CJEU), who said back in June that lending out e-books should be permitted in the 28-member-state bloc provided authors are fairly compensated in the same way as for physical books.

        ]]>
        http://techrights.org/2016/11/11/slackware-live-edition-2/feed/ 1
        Links 7/11/2016: NES Classic Linux Computer http://techrights.org/2016/11/07/nes-classic-linux-computer/ http://techrights.org/2016/11/07/nes-classic-linux-computer/#comments Tue, 08 Nov 2016 00:18:44 +0000 http://techrights.org/?p=96639

        GNOME bluefish

        Contents

        GNU/Linux

        Free Software/Open Source

        • Stop searching for projects and start searching for bugs

          GitHub has a powerful search engine where you can customize your search in a variety of ways. The easiest way to search is by issue label.

          A lot of open source projects label their issues to conveniently track them, using labels like beginner, easy, starter, good first bug, low hanging fruit, bitesize, trivial, easy fix, and new contributor.

          You can further narrow down your search based on the programming language you’re comfortable with, by adding language: name to your search query. For example, here are all issues labeled as “beginner” in JavaScript.

        • ‘Open source’ is not ‘free software’

          In the open source universe, using terms such as FLOSS (Free/Libre and Open Source Software) is common and represents a casual conflation of the terms open source and free software, which are often used interchangeably. I would be remiss if I didn’t also admit that I have been guilty of same. I won’t be doing that anymore—or at least I’ll try not to—for a simple reason: Using the terms interchangeably is dangerous to the goals of free software and open media advocates (read “anti-DRM”). To continue this practice is to undermine beliefs that are fundamental to free software and associated movement.

        • RPG Open Source Horse Pulls IBM i Community Plow

          The RPG development community is shrinking. I don’t mean because old programmers are riding into the sunset. I’m talking about collaboration and its ability to guide development that benefits the community by addressing the challenges of next generation applications for IBM midrange shops. Not that a collaborative open source culture is thriving here. But it could and it should. There are efforts to get this under way. And that will figuratively shrink the community.

        • Events

        • Web Browsers

          • Chrome Crushing It In The Browser Wars While Edge Continues To Sputter

            Despite all the effort Microsoft is expending in getting Internet users to try out and stick with its Edge browser, Chrome continues to the popular choice. Even worse for Microsoft, Chrome’s popularity is growing—it now accounts for more than half of all desktop browser usage and has nearly double the market share of Edge and Internet Explorer combined.

            Market research firm Net Applications has Chrome sitting pretty with a 54.99 percent share of the desktop browser market, up from 31.12 percent at this moment a year ago, while Internet Explorer and Edge combine for 28.39 percent and Firefox stuck at around 11 percent. Even more interesting is that when Windows 10 launched to the public at the end of July 2015, Chrome had a 27.82 percent share of the market while Internet Explorer still dominated the landscape with a 54 percent share. Now the script has flipped.

          • Chrome

            • Google’s Chrome Hackers Are About to Upend Your Idea of Web Security

              In a show of hacker team spirit in August of last year, Parisa Tabriz ordered hoodies for the staff she leads at Google, a group devoted to the security of the company’s Chrome browser. The sweatshirts were emblazoned with the words “Department of Chromeland Security,” along with Chrome’s warning to users when they visit insecure websites that leave them open to surveillance or sabotage: a red padlock crossed out with an X.

            • Gopass, a Chrome extension for Pass

              Last week I treated myself to some hardware upgrades for my desktop, which will be my main workstation from now on. After installing Ubuntu Gnome, I was pleasantly surprised to find that most of my favorite applications from OSX have a Linux version.

              One application that does not have a native Linux client is 1Password, my (now ex-) password manager. Luckily, there’s Pass.

        • SaaS/Back End

        • Databases

          • Open-source database PostgreSQL powering GOV.UK portal

            The UK Government Digital Service (GDS) has been running PostgreSQL for one year now to power the GOV.UK portal. This open-source database system hosts the central content store underlying the portal, its Content Management System (CMS), and its internal publishing API.

        • Education

          • Hungary seeks nationwide, open source eLearning tool

            Municipalities in Hungary should be able to use modern, web based eLearning tools to train their staff. To make this possible, Hungary’s State Treasury is looking for a service provider to help them run the open source Moodle eLearning solution.

        • BSD

          • FreeBSD 11.0

            There were definitely some attractive features in FreeBSD 11.0. I especially enjoyed the changes to the system installer. The ability to set up UFS and ZFS through a series of guided steps was a welcome feature. I also really appreciate that the installer will allow us to enable certain security features like PID randomization and hiding the processes of other users. Linux distributions allow the administrator to set these options, but they often require digging through documentation and setting cryptic variables from the command line. FreeBSD makes enabling these features as straight forward as checking a box during the initial installation.

            I also like how pkg has progressed. I think it has become faster in the past year or two and handled dependencies better than it did when the new package manager was introduced. In addition, FreeBSD’s documentation is as good as ever, though I feel it has become more scattered. There were times I would find what I wanted in the Handbook, but other times I had to switch to the wiki or dig through a man page. The information is out there, but it can take some searching to find.

            Other aspects of running FreeBSD were more disappointing. For example, I had hoped to find boot environments working and accessible from the boot menu. However, progress seems to have reversed in this area as switching boot environments prevented the system from loading. There were some other issues, for example I was unable to login from the graphical login screen, but I could access the Lumina desktop by signing into my account from the command line and launching an X session.

            Hardware was a weak point in my experiment. FreeBSD did not work on my desktop machine at all in BIOS mode and failed to boot from installation media in UEFI mode. When running in a VirtualBox environment, the operating system did much better. FreeBSD was able to boot, play sound and run smoothly, but screen resolution was limited, even after VirtualBox modules had been installed and enabled.

            Perhaps my biggest concern though while using FreeBSD 11.0 was that I could not update the base operating system, meaning it would be difficult to keep the system patched against security updates. Even once I had manually created a /boot directory to fix the boot environment creation issue, freebsd-update and freebsd-version continued to fail to detect the running kernel. This leaves the system vulnerable and means our best chance for keeping up with security updates is to manually install them from source code, not an ideal situation.

            All in all, FreeBSD 11.0 does have some interesting new features, but it also has several bugs which make me want to hold off on using the operating system until a point release has been made available to fix the existing issues.

        • FSF/FSFE/GNU/SFLC

        • Public Services/Government

          • The People’s Code – Now on Code.gov

            Over the past few years, we’ve taken unprecedented action to help Americans engage with their Government in new and meaningful ways.

            Using Vote.gov, citizens can now quickly navigate their state’s voter registration process through an easy-to-use site. Veterans can go to Vets.gov to discover, apply for, track and manage their benefits in one, user-friendly place. And for the first time ever, citizens can send a note to President Obama simply by messaging the White House on Facebook.

            By harnessing 21st Century technology and innovation, we’re improving the Federal Government’s ability to provide better citizen-centered services and are making the Federal Government smarter, savvier, and more effective for the American people. At the same time, we’re building many of these new digital tools, such as We the People, the White House Facebook bot, and Data.gov, in the open so that as the Government uses technology to re-imagine and improve the way people interact with it, others can too.

          • People’s Code: The U.S. Government Delivers Numerous Open Source Projects

            When it comes to the U.S. government, most people’s eyes are trained on the Presidential race, and if yours are, you may have missed the substantial work promoting open source software that the government is doing. For example, The Office of Management and Budget recently mandated in a lengthy memo that under the final Federal Source Code policy, federal agencies will have to share internally developed code with each other and release at least 20 percent of their code to the public.

            Now, the government has launched an update of its website, Code.gov, aimed at housing key open source projects.

          • Code.gov is the US government’s open-source software hub
        • Openness/Sharing/Collaboration

          • Open Access/Content

            • Deep Dive: Open Access and Transforming the Future of Research

              EFF works to inform the world about breaking issues in the world of technology policy and civil liberties. And one of our best ways of communicating with our friends and members is through our nearly-weekly newsletter, EFFector. Last week, we sent out a very special EFFector: a deep dive, single-issue edition that got into the nitty-gritty of open access and research. To keep the conversation going, we are publishing it here on the Deeplinks blog as well.

        Leftovers

        • Health/Nutrition

          • East African Nations Agree Declaration Promoting Regional Pharma Sector Investment

            The three-day conference brings together key stakeholders from EAC Partner States including Ministries of Health, Finance and Industry, National Medicines Regulatory Agencies (NMRAs), National Procurement Agencies (NMPAs), AU-NEPAD Planning and Coordinating Agency, World Health Organization (WHO), United Nations Conference on Trade and Development (UNCTAD), United Nations Industrial Development Organization (UNIDO) and the private sector (local and international pharmaceutical manufacturers) as well as international development partners and investors among others.

          • Indian Generic Pharma Warns Against Government Caving To US Pressure On Data Exclusivity

            The Indian Drug Technical Advisory Board meeting on 7 November is expected to discuss a measure that could lead to opening the way to a 10-year data exclusivity period for originator pharmaceutical companies in India, according to the Indian Pharmaceutical Alliance. The alliance submitted a letter to the advisory board to warn against consequences on public health of data exclusivity if the Indian government “succumbs to” pressure by the United States.

            In a letter to the Indian Drug Technical Advisory Board dated 27 October, D G Shah, secretary general of the Indian Pharmaceutical Alliance (IPA), explained why data exclusivity, which extends market exclusivity, would delay access to cheaper versions of the medicines.

          • WHO Makes Headway In Hepatitis C Treatment Access Campaign

            A leading cause of liver cancer and cirrhosis, chronic infection by hepatitis C virus (HCV) affects more than 80 million people worldwide, 85% of whom live in low (13%) and middle (72%) income countries. Around 15% of Egypt’s population, for example, is infected – one of the world’s highest prevalence rate – while it is estimated that 12 million people in India have hepatitis C.

            Nearly 700 000 people are killed by hepatitis C yearly, where preventive vaccines are lacking.

            And this occurs at a time when at least 1.2 million people in Japan and three million Americans suffer from hepatitis C, while the infection is a major European public-health challenge (between 0.4% and 3.5% of the population in different EU Member States), as the most common single cause of liver transplantation.

        • Security

          • Free security is the only security that really works

            There are certain things people want and will pay for. There are things they want and won’t. If we look at security it’s pretty clear now that security is one of those things people want, but most won’t pay for. The insane success of Let’s Encrypt is where this thought came from. Certificates aren’t new, they used to even be really cheap (there were free providers, but there was a time cost of jumping through hoops). Let’s Encrypt make the time and actual cost basically zero, now it’s deployed all over. Depending who you ask, they’re one of the biggest CAs around now, and that took them a year? That’s crazy.

          • SQLi, XSS zero-days expose Belkin IoT devices, Android smartphones

            Research director Scott Tenaglia and lead research engineer Joe Tanen detailed the vulnerabilities during their ‘Breaking BHAD: Abusing Belkin Home Automation devices’ talk at the Black Hat Europe conference in London last Friday.

            The zero-day flaws specifically relate to Belkin’s smart home products and accompanying Android mobile application, which is used to wirelessly control the home automation devices.

            The first flaw, a SQL injection vulnerability, enables would-be hackers to inject malicious code into the paired Android WeMo smartphone app, and thus take root control of the connected home automation device.

        • Defence/Aggression

          • Evil Russian Propaganda from the Evil Russian Invaders

            The BBC World Service was founded by the Foreign and Commonwealth Office and funded by them directly for six decades, until a cosmetic change last year. Its specific purpose is to spread British values and the British view of the world abroad. It specifically, on its dozens of different national services, gives an opportunity to dissident voices who cannot get on their mainstream media. The Americans spend hundreds of millions annually on outfits like RFE/RL to do the same. Yet when the Russians do precisely the same thing on a much smaller scale, for example by enabling you to listen to me, this is portrayed as evil propaganda.

            Fortunately we have the Henry Jackson Society to defend you from it. The Henry Jackson Society, supported by Liam Fox, Jim Murphy and pretty well every other right wing enthusiast you can name, is of course a great believer in free markets. And its sense of the market has detected that its old product of a constant stream of Islamophobia is becoming dated, and currently buyers want Russophobia. Whatever your phobia, the Henry Jackson Society will have some to sell you, so here we have their new Manual of Russophobia.

          • Do Wars Make Us Safer? The People Aren’t Feeling It

            A new poll from an unlikely source suggests that the US public and the US media have very little in common when it comes to matters of war and peace.

            This poll was commissioned by that notorious left-wing hotbed of peaceniks, the Charles Koch Institute, along with the Center for the National Interest (previously the Nixon Center, and before that the humorously named Nixon Center for Peace and Freedom). The poll was conducted by Survey Sampling International.

          • Yemen: The man who lost 27 family members in an air strike

            The war in Yemen had been going on for just two months when Abdullah al-Ibbi sat down for a late-night meal with his two wives, their children and grandchildren. It was then, in an instant, that his world shattered.

            The air strike that hit Abdullah’s home killed 27 members of his family. He survived, but only learnt about their deaths six weeks later when he woke up in a hospital bed.

            “If I didn’t fear God, I would have committed suicide at that moment,” he recalls. “I would have jumped off a building… but God gave me patience.”

            The family had lived in the Houthi rebel stronghold of Saada, which has come under intense aerial bombardment by the Saudi-led coalition supporting the exiled President Abdrabbuh Mansour Hadi.

            The air strike hit their home at around midnight, says Abdullah. Rescuers with bulldozers worked until morning to retrieve the bodies buried under the rubble. Seventeen were children – the youngest, Abdullah’s granddaughter, Inas, was one month old.

            Three of his adult sons also made it out alive.

        • Environment/Energy/Wildlife/Nature

          • NOAA 2017 Tide Tables are Available

            NOAA 2017 tide tables are now available. NOAA tide tables have been in production for 150 years and are used by both commercial and recreational mariners for safe navigation. Printed tide tables provide users with tide and tidal current predictions in an easy-to-read format for particular locations. NOAA’s Center for Operational Oceanographic Products and Services produce these tide tables on an annual basis.

          • Rose Aguilar on Standing Rock Reporting, Michelle Chen on Samsung Labor and Environmental Abuses

            This week on CounterSpin: In their feature “What to Know About the Dakota Access Pipeline Protests,” Time magazine told readers that “environmental activists say” the pipeline would contribute to man-made climate change; “they insist that fossil fuels—including the vast reserves in the Bakken Shale—need to be kept in the ground to protect the world from the worst effects of climate change.”

          • Adidas is making a million pairs of its much-anticipated sneakers created from recycled ocean plastic

            For more than a year, Adidas has been teasing the release of a shoe made almost entirely from discarded plastic fished out of the oceans. It revealed its first prototype of the sustainable sneaker, created in collaboration with environmental organization Parley for the Oceans, in June 2015. Finally, in mid-November, the first mass-produced quantity—7,000 pairs, to be exact—will go on sale, and according to Adidas, that’s just the start.

            “We will make one million pairs of shoes using Parley Ocean Plastic in 2017—and our ultimate ambition is to eliminate virgin plastic from our supply chain,” Eric Liedtke, an Adidas executive board member responsible for global brands, said in a Nov. 4 statement.

          • Green Party Candidate In 33rd Senate Race Feels Real Issues Have Been Ignored By Major Parties

            Colin Bennett is no stranger to running as a Green Party candidate in the 33rd Senate District. He ran and lost in 2004, 2006, 2008 and 2014. The only race he missed in the past decade was in 2012, when he ran for Congress.

            Bennett believes that the issue of climate change is too important not to keep trying to find a way to awaken people to the dangers involved, and if that involves running for office, then so be it, he says.

            “Literally, I feel the world is on the precipice of disaster,” said Bennett. “I’m doing everything in my power to turn that around.”

            Bennett, 37, lives in Westbrook, runs a small used bookstore in Deep River called Bennett’s Books, and has other jobs to make ends meet. In the summer, Bennett works for Sail Connecticut Access, a nonprofit operation that gives people with special needs the opportunity to go sailing.

            The campaign across the 33rd Senate District, which stretches down the Connecticut River Valley from Portland to Old Saybrook, has been dominated by disputes between Republicans and Democrats over Donald Trump and Gov. Dannel P. Malloy.

          • French Greens pick MEP Jadot for 2017 presidential race

            French MEP Yannick Jadot will be the Green candidate for French president next year after winning a second-round party primary Monday.

            Jadot won 54 percent of the vote against Michèle Rivasi, who also sits in the Greens/European Free Alliance group in the European Parliament.

            Jadot, a 49-year-old former Greenpeace activist, won the most votes in the primary’s first round in late October with support of 36 percent. Around 13,000 party members and supporters cast their ballot either by mail or online (for French nationals abroad) last week in the second-round of voting.

        • Finance

          • NYT’s Kristof Blames Poverty on Too Many TVs, Not Too Little Money

            Times columnist Nicholas Kristof, who was awarded a Pulitzer Prize in 2006 for giving “voice to the voiceless” on international social justice issues, wrote an op-ed in yesterday’s Times (10/30/16) arguing for increased government action on poverty. His calls for heightened attention to economic deprivation, though, were buried in a larger message that was familiar to longtime Kristof-watchers: that the poor aren’t actually poor because they lack enough money, but because of their own moral failings.

          • CEO’s message a jolt to IT workers facing layoffs

            IT workers in the infrastructure team at Health Care Service Corporation (HCSC) were notified recently of their layoff. They expect to be training replacements from India-based contractor HCL. The layoff affects more than 500 IT workers, according to the insurance firm.

            This familiar IT story began a little differently. A few days before employees were notified in mid-October of their layoff, HCSC CEO Paula Steiner talked about future goals in an internal, company-wide video.

            Steiner’s comments weren’t IT-department-specific, but the takeaway quote by one IT employee was this: “As full-time retiring baby boomers move on to their next chapter, the makeup of our organization will consist more of young and non-traditional workers, such as part-time workers or contractors,” said Steiner in the video.

            What Steiner didn’t say in the employee broadcast is that some of the baby boomers moving “on to the next chapter” are being pushed out the door.

          • What is a blockchain, and why is it growing in popularity?

            Last year, Ripple Labs, creator of the virtual currency XRP, was fined $0.7 million (~£540,000) by the US Financial Crimes Enforcement Network for violating regulations concerning money laundering.

            Some observers cite this as the moment cryptocurrencies shaved off their startup hipster beards, put on a tie, and went mainstream. Being fined by a regulator means that you’re part of the financial services industry at last.

            Given that the first and most famous cryptocurrency, Bitcoin, was launched back in 2009, it has taken the wider industry a relatively long time to warm to it. But now suddenly everyone is talking about Bitcoin’s underlying blockchain technology as a disruptor of potentially massive proportions: Sweden is trialling a new land registry that uses a blockchain, dozens of startups spanning numerous sectors are poking around at possible uses, and importantly policy makers such as the European Parliament have voted in favour of a more hands-off approach towards blockchain tech regulation.

          • Dutch campaigners gather signatures to derail EU-Canada trade deal

            Activists in the Netherlands have gathered almost two-thirds of the signatures needed to lay the groundwork for a referendum on Europe’s free trade deal with Canada, which they say overly favours the interests of multinational companies.

            The Dutch have twice voted down European Union initiatives in referendums, scuppering a proposed EU constitution in 2005 and in April throwing into disarray plans for closer EU relations with Ukraine.

        • AstroTurf/Lobbying/Politics

          • The Art of Spin

            How Hillary Clinton backers deployed faux feminism and privilege politics to divert attention from her destructive policies.

          • Front-Page Election News: More Horserace, More Trump, More Presidency

            Most, but not all campaign stories featured these sorts of empty calories; some dealt with important questions of candidates’ leadership, demeanor and conflicts of interest. One piece (Washington Post, 8/30/16) highlighted Trump’s “us vs. them” strategy, often blaming US problems on minority groups. Another (New York Times, 9/3/16) detailed Clinton’s cozy relationship with and frequent courting of the ultrarich.

            Another 12 percent of front-page election stories were focused on voters. Over half of these stories featured straightforward polling reports, while the others were more detailed looks at voter mood and logic. The New York Times covered voters particularly well; giving voice to their doubts and hopes for the candidates (9/14/16, 9/9/16). The Washington Post (8/22/16) and USA Today (9/13/16) both published some illuminating voter pieces, but many merely regurgitated poll data.

          • Podesta Congratulated on Nevada Fraud

            Nevada was of course one of the most blatant examples of all of the Democratic National Committee rigging the election against Sanders. Firstly the caucuses featured casino owners bussing in coachloads of employees with firm instructions to vote for Hillary. Even with this, Hillary was struggling. Next the Democratic party machine announced to the media on 21 February that Hillary had won, despite it being by no means clear if that were true.

            Finally at the delegate conference, Hillary acolyte and DNC member Roberta Lange in the chair called the state for Clinton on the basis of the most dubious delegate vote imaginable – and denying any recount. What is more, the Clinton camp scored a double whammy by portraying, throughout the controlled corporate media, the precise scenes you see in this video as a violent riot by Sanders supporters. I do ask you to watch this video through and see what you think. It may just change your entire mind on what is really happening in US “democracy”.

          • Clintons Are Under Multiple FBI Investigations as Agents Are Stymied

            Current and former FBI officials have launched a media counter-offensive to engage head to head with the Clinton media machine and to throw off the shackles the Loretta Lynch Justice Department has used to stymie their multiple investigations into the Clinton pay-to-play network.

          • Franken: FBI’s Comey should face Senate hearings

            Sen. Al Franken called Sunday for the Senate Judiciary Committee to hold hearings on FBI Director James Comey’s handling of the investigation into Hillary Clinton’s private server. And the Minnesota senator said he thinks Hillary Clinton can rely on his state’s voters despite a last-minute visit from Donald Trump, though he said he’s always “nervous.”

            “I think that there should be hearings, and I’m certain there will be hearings in the Judiciary Committee on this matter,” the Franken told CNN’s Jake Tapper on “State of the Union.”

            His comments reflected the Democratic frustration with Comey telling lawmakers 11 days before the November 8 election that the FBI was reviewing new emails potentially connected to its investigation into whether Clinton mishandled classified information.

            [...]

            Franken also defended the Clinton Foundation as Tapper pressed him on whether it should be shuttered if Clinton wins the election.

          • Can The Oligarchy Still Steal The Presidential Election?

            At this point, I would think that the Oligarchy would prefer to steal the election for Trump, instead of from him, rather than allow insouciant Americans to destroy America’s reputation by choosing a person under felony investigations for president of the United States.

          • Not all Americans are Barking Nutters

            The journalists of course attempt to say that to vote for Stein is to let Trump in. Stein sticks strongly to the argument that the “Queen of Corruption” and “Warmonger” Clinton is not in fact a real choice from Trump. This is of course absolutely true, Clinton is a dangerous extremist – she just happens to support the extremism of the right wing establishment and its poodle media.

            I have been fascinated by the apoplexy generated in the pretend left by the notion that people ought not to vote for Clinton. The go-to argument is that not to vote for her is in itself an act of misogyny. I wonder if they will argue the same for Marine Le Pen. The second argument is that a corrupt warmonger is better than the racist bigot Trump. The interesting thing is, close examination reveals an almost 100% correlation between those apoplectic at any lack of support for Clinton, and those who supported Tony Blair. The idea that being an ultra-corrupt warmonger is not a big problem is obviously a fixed principle with these people.

          • Defying the Politics of Fear

            Our only chance to overthrow corporate power comes from those who will not surrender to it, who will hold fast to the causes of the oppressed no matter what the price, who are willing to be dismissed and reviled by a bankrupt liberal establishment, who have found within themselves the courage to say no, to refuse to cooperate. The most important issue in this election does not revolve around the personal traits of Hillary Clinton or Donald Trump. It revolves around the destructive dynamic of unfettered and unregulated global capitalism, the crimes of imperialism and the security and surveillance apparatus. These forces are where real power lies. Trump and Clinton will do nothing to restrict them.

            It is up to us to resist. We must refuse to be complicit, even in the act of voting, with the fossil fuel industry’s savaging of our ecosystem, endless wars, oppression of the poor, including the one in five children in this country who is hungry, the evisceration of constitutional rights and civil liberties, the cruel and inhumane system of mass incarceration and the state-sponsored execution of unarmed poor people of color in our marginal communities.

            [...]

            The rise of Donald Trump is the product of the disenchantment, despair and anger caused by neoliberalism and the collapse of institutions that once offered a counterweight to the powerful. Trump gives vent to the legitimate rage and betrayal of the white underclass and working poor. His right-wing populism, which will grow in virulence and sophistication under a Clinton presidency, mirrors the right-wing populism rippling across much of Europe including Poland, Hungary, France and Great Britain. If Clinton wins, Trump becomes the dress rehearsal for fascism.

          • US election poll tracker: Who is ahead – Clinton or Trump?

            Americans will vote on 8 November to choose their next president.

            The numbers have begun to tighten as we approach election day amid crises affecting both Democratic contender Hillary Clinton and her Republican rival Donald Trump.

            Use our tracker to follow the contest and scroll down to find some explanation on what the polls show.

          • WikiLeaks Show Washington Post Writer Asked DNC For Anti-Trump Research

            Washington Post columnist Dana Milbank appears to have asked the Democratic National Committee (DNC) to do the majority of the research for a negative column he wrote about Donald Trump in April 2016.

            Milbank’s column was titled, “The Ten Plagues of Trump,” and featured a list of “outrageous things” said by Trump. One of the “plagues” listed by Milbank, for example, was “Blood” and centered around a quote from Trump about Megyn Kelly: “You could see there was blood coming out of her eyes, blood coming out of her wherever.”

          • WikiLeaks: Chicago mayor used private domain to communicate with officials

            Chicago Mayor Rahm Emanuel used personal email accounts and a personal email domain to communicate with government officials and political figures, according to a published report based on hacked emails posted by WikiLeaks.

            Emanuel’s personal account information turned up among the thousands of emails from John Podesta, Democratic presidential candidate Hillary Clinton’s campaign chairman, the Chicago Tribune reported. Clinton has come under fire for her use of a private email server because doing so potentially jeopardized classified information.

            Emanuel registered his personal email domain, “rahmemail.com,” on May 16, 2011, the day he was sworn into office. The hacked emails also turned up evidence of Emanuel’s personal Gmail account.

          • Chelsea’s husband allegedly used foundation ties to boost hedge fund

            Chelsea Clinton’s husband used his connections to the Clinton family and their charitable foundation to raise money for his hedge fund, according to an allegation by a longtime Clinton aide made public Sunday in hacked documents released by WikiLeaks.

            Marc Mezvinsky extended invitations to a Clinton Foundation poker event to rich Clinton supporters he was courting as investors in his hedge fund, and he also relied on a billionaire foundation donor to raise money for the fund, according to the WikiLeaks documents. They also assert that he had his wife Chelsea Clinton make calls to set up meetings with potential investors who support her family’s political and charitable endeavors.

            The documents — a memo and an email — were written in late 2011 and early 2012, respectively, by ex-Clinton aide Doug Band. They were sent to family confidants including John Podesta, who is now serving as Hillary Clinton’s presidential campaign chairman, and Cheryl Mills, who was Clinton’s State Department chief of staff.

          • Why Historians Must Use Wikileaks To Write The History Of The 2016 Election

            Wikileaks is playing a prominent, if under reported, role, in the 2016 American presidential election. Few understand the importance of Wikileaks in the eventual writing of the history of presidential politics.

            The media write and talk about events as they happen, usually without historical background or context. A good historian writes with retrospection about past events that explain historical outcomes. U.S. Presidential elections leave behind a clutter of accounts of those who were (or claim to have been) eyewitnesses to history – campaign insiders, journalists, pundits, and hangers-on. The best insider accounts pierce some of the veil of campaign rhetoric, PR, talking points, and smoke and mirrors to explain what was really happening behind the scenes.

          • Viggo Mortensen will be voting for Jill Stein on Tuesday, says it’s not a protest vote

            Like most of Hollywood, Viggo Mortensen is solidly anti-Trump in this election, but he’s also no fan of Hillary Clinton.

            Instead the “Lord of the Rings” star — a Bernie Sanders supporter until he dropped out of the race — will be casting his vote for Jill Stein.

            “I don’t want to get to the end of my life and look back and go, ‘You know, I never voted my conscience,’ ” he said at a luncheon for his movie “Captain Fantastic” at the Explorer’s Club.

            “Not really, when it mattered. I don’t want to do that. And I don’t look at it as a protest vote. I’m not voting against something, I’m voting for something. I’m voting my conscience. It’s not a protest, it’s an affirmation.”

          • WikiLeaks: DNC and CNN colluded on questions for Trump, Cruz

            Newly released emails from WikiLeaks suggest that the Democratic National Committee colluded with CNN in devising questions in April to be asked of then-Republican primary candidate Donald Trump in an upcoming interview.

            In an email to DNC colleagues on April 25 with the headline “Trump Questions for CNN,” a DNC official with the email username DillonL@dnc.org asked for ideas for an interview to be conducted by CNN anchor Wolf Blitzer.

            “Wolf Blitzer is interviewing Trump on Tues ahead of his foreign policy address on Wed. … Please send me thoughts by 10:30 AM tomorrow.”

            The sender of the email would seem to be DNC Research Director Lauren Dillon, who was identified in previous reports of DNC emails released by WikiLeaks in July.

          • Chelsea Clinton ‘used Foundation resources to fund her 2010 wedding to Marc Mezvinsky’, according to new Wikileaks emails

            Hillary Clinton’s daughter Chelsea allegedly used resources from the Clinton Foundation for her wedding, a new dump of Wikileaks emails appear to reveal.

            In several emails, Doug Band, a former top aide to president Bill Clinton and a former Clinton Global Initiative board member, complains about Chelsea Clinton (writing ‘cvc’ for Chelsea Victoria Clinton).

            In one email, dated January 1, 2012, Band emails John Podesta, Chairman of the 2016 Hillary Clinton presidential campaign, and says Chelsea Clinton was conducting an internal investigation into CGI and the Clinton Foundation, which posed a conflict of interest.

            It is unclear why Chelsea Clinton was investigating her family’s foundation and its dealings with money.

          • DNC staffers prepared CNN anchors Wolf Blitzer and Jake Tapper for interviews with Trump, new batch of 8,000 WikiLeaks emails reveals

            The Democratic National Committee helped CNN anchors Wolf Blizter and Jake Tapper prepare for interviews with Donald Trump, the latest WikiLeaks email dump has revealed.

            Among the batch of 8,263 emails released on Sunday night, one shows that staff working for the network hosts asked DNC staffers what questions they should put to the Republican candidate.

            They also asked for advice when it came to an appearance from former candidate, Ted Cruz.

            An email dated April 28 entitled ‘Cruz on CNN’ reads ‘CNN is looking for questions. Please send some topical/interesting ones.’

          • Vote Your Conscience, Vote for WikiLeaks and Vote for Dr. Jill Stein

            With Hillary Clinton circumventing yet another FBI investigation, progressives have an alternative to establishment Democrats. If your conscience won’t allow you to side with a person who is advised by Henry Kissinger and neoconservatives like Robert Kagan, then you have a choice on November 8, 2016. You can vote for a future without a media beholden to John Podesta’s dinner parties. You can choose a future without Wolf Blitzer or Donna Brazile colluding with the DNC, and without a Democratic nominee accepting Foundation contributions from countries that fund ISIS. If you envision a world without wars for oil, fracking, the prison industrial complex, and severe breaches in campaign finance laws, then you certainly don’t have to pick Clinton or Donald Trump.

            You can vote for WikiLeaks.

            You can vote for WikiLeaks, and appease your conscience by championing Dr. Jill Stein and the Green Party.

            Every movement has a beginning, and although Jill Stein has been active in politics for years, this year marks a turning point in American history. Julian Assange and WikiLeaks have allowed voters to see the inner workings of the Clinton campaign; countering an American media serving essentially as Hillary Clinton’s public relations machine. Instead of a 2005 hot mic audio of Donald Trump (considered to be Pulitzer Prize winning journalism by the The Washington Post) Assange and WikiLeaks have published enough Podesta emails to highlight the long-term implications of a Clinton presidency.

          • Meme warfare: how the power of mass replication has poisoned the US election

            If you use Facebook, or Twitter, have a Wi-Fi connection, watch television or have been to an office Halloween party, you’ve probably encountered them: internet memes.

            These shareable, sometimes pithy and often puerile units of culture have emerged as the lingua franca of the 2016 election, and have given the American people an entirely new way of articulating their beliefs. Clinton’s top tweet is a meme. Trump’s taco bowl became one. Through memes, Ted Cruz was “unmasked” as the Zodiac killer. Jeb Bush’s limp plea for applause got him Vined into oblivion. Bernie Sanders shared a moment with a bird that blossomed into something out of Walt Disney’s long-lost Marxist phase.

            Memes can be fun, or they can be dumb – but as an emerging medium, they haven’t provoked a lot of debate or analysis. In fact, they seem to defy scrutiny.

            And slowly, before anyone can even take note, memes are ruining democracy.

          • WikiLeaks releases latest batch of emails from Clinton campaign chair

            WikiLeaks has published its 33rd tranche of emails from the hacked account of Hillary Clinton’s campaign chairman, John Podesta.
            Trends

            The whistleblowing organization has now published more than 55,600 emails in a series of daily online releases which it said were building towards the November 8 presidential election.

          • Democrats advised CNN on interview questions for Donald Trump, according to new WikiLeaks release

            The Democratic National Committee (DNC) apparently helped CNN anchors prepare for interviews with Donald Trump, according to the latest WikiLeaks email dump.

            Included in some 8,263 emails released by WikiLeaks is an exchange that shows DNC staff discussing how to advise CNN on what questions to ask Mr Trump in a scheduled interview ahead of his foreign policy address.

            However CNN defended the practice, saying it had sought the Republicans’ opinions about questions to ask Hillary Clinton in order to “ensure a tough and fair interview”.

            Although the interview with Mr Trump was ultimately cancelled, the emails showed numerous questions were submitted by the DNC.

          • Campaign collusion: Is CNBC’s John Harwood too close to the Clinton operation?

            The following question was asked on Sept. 21, 2015, via email, to the chairman of a major presidential campaign, John Podesta: “What should I ask Jeb?”

            At the time, Jeb Bush was still a leading candidate to challenge Hillary Clinton for the White House — and had more money behind him.

            The question didn’t come from a campaign surrogate or an opinion host — it came from the chief Washington correspondent at CNBC, John Harwood. And just to make sure he hit Bush where the Clinton campaign — which still viewed the former Florida governor as its most likely opponent for 2016 — wanted him to most, Harwood went to Clinton’s campaign chief to do all the thinking for him.

            It should be noted that the title “chief Washington correspondent” means Harwood is not an opinion host or a partisan pundit — he’s one who represents the network as objective and nonpartisan. It also means he cannot consult with opposition campaigns for advice — nor can he provide advice back to a campaign, which Harwood has on several occasions via recent WikiLeaks dumps.

          • Husband Of CNN Exec Tipped Clinton Campaign Off To Network’s Polls Prior To Release

            An email released by WikiLeaks on Sunday shows that the husband of CNN vice president and Washington bureau chief Virginia Moseley tipped the Clinton campaign off to a favorable poll just before its release last September.

            “Good CNN poll coming,” Thomas Nides, Moseley’s husband, wrote to Clinton campaign chairman John Podesta in a Sept. 20, 2015 email.

            Nides served as deputy secretary of state under Clinton and is currently vice president at Morgan Stanley. His name has been floated for a possible high-level spot in a Clinton White House.

          • A call to progressives: Help build and own the Green Party

            It hasn’t been an easy election year for progressives. Many were crushed when Bernie Sanders failed to pull off a historic upset of establishment pick Hillary Clinton, then outraged when leaked emails proved what they already knew — that the Democratic Party elite had conspired against Sanders’ political revolution the whole time.

            But with the racist, sexist billionaire buffoon Donald Trump leading the GOP, many progressives have resigned themselves to pulling the lever for Clinton in an attempt to keep Trumpismo at bay. But before you accept yet another election year of “lesser evilism,” allow yourself to consider investing your vote in the Green Party

            In a 2006 interview with the editorial board of the Jewish Press in Brooklyn, then-Senator Hillary Clinton shared her opinion on the recent election in Palestine: “I do not think we should have pushed for an election in the Palestinian territories. I think that was a big mistake,” said Sen. Clinton. “And if we were going to push for an election, then we should have made sure that we did something to determine who was going to win.”

          • Clinton aide says Foundation paid for Chelsea’s wedding, WikiLeaks emails show
          • Don’t Move To Canada If Your Candidate Loses, Read This

            Regardless of who wins this election, around half of the country is going to have to learn to live under the rule of someone they’ve vilified for the entire election cycle. (That’s two and a half years, but with a RealFeel of untold centuries trapped in the Phantom Zone.) In order to help people from both sides, we’ve put together a few tips in case the other side wins.

          • New WikiLeaks email suggests possible ‘collusion’ between CNBC, Clinton campaign

            CNBC host John Harwood in September 2015 asked Hillary Clinton’s campaign chairman, John Podesta, what he should ask then-Republican presidential candidate former Florida Gov. Jeb Bush in an upcoming interview, according to new emails published by WikiLeaks.

            Harwood, who faced harsh criticism for his performance as a debate moderator in the third Republican presidential primary debate in October 2015, sent Podesta an email on Sept. 21, 2015, with the subject line, “What should I ask Jeb…” The body of the email read, “…in Speakeasy interview tomorrow.”

          • Chris Hedges: The End of the Election Will Not Mean the End of Public Anger

            It’s impossible to tell you, because it really will depend on the mood, on the emotions of the voters on election day. That’s all these campaigns are about, because they both essentially are neo-liberal candidates who will do nothing to impede imperial expansion and corporate power. The whole campaign has descended to, you know, not surprisingly, to the level of a reality TV show, with presidential debates featuring women who have accused former President Bill Clinton of sexual assault being brought in by Donald Trump; videos – I’ll go back to the primaries – of the size of people’s genitals. I mean, it’s just appalling, but all of that is emblematic of a political system in deep decay and one that no longer revolves around fundamental issues. We know from the Wikileaks emails, the John Podesta emails that were leaked from Hillary Clinton, that there was a calculated effort on a part of a Clinton campaign to promote these fringe candidates – like Trump, and they particularly wanted Trump, because the difference between Hillary Clinton and a more mainstream Republican candidate, like Jeb Bush, is so marginal. So if you had to ask me, I don’t think Trump will win, but I don’t rule out the possibility that he will win – we have to look at the Brexit polls in Britain…

          • Jill Stein: ‘We Have Crossed the Rubicon in This Election’

            Jill Stein is already looking past tomorrow’s election.

            The Green Party candidate, who is has a polling average of about 2% heading into Election Day, chuckled at the prospect of an outright win Tuesday. She said she’s hoping for 5% in election returns, and beyond that, she’s planning to push for reforms in the presidential debate commission and to help pave the way for future third party candidates with a rank choice voting initiative.

            Stein spoke to TIME on the eve of the election about what she’s seem from voters this year, how women were talked about in the race and why she never takes vacations.

        • Censorship/Free Speech

          • Serbia’s censorship debate

            Is the Serbian government using underhanded censorship methods to control the media narrative or are critics too harsh?

          • FOSS Friendly IBM is Attempting to Destroy OpenLava

            Several years ago Platform Computing (now owned by IBM) released an open source version of LSF (Platform Load Sharing Facility) — their premier software product. LSF is a workload management platform and job scheduler for distributed HPC environments. In recent years that open source product has begun to flourish, and now IBM is using the DMCA in an attempt to erase all progress made on the project since it was first released. I guess if you can’t compete, you call your legal team…

          • Internet Pioneers Slam $750,000 Settlement for the ‘Man Who Invented Email’

            Two early internet pioneers are expressing sadness and disbelief at the fact that Shiva Ayyadurai, a self-described “world-renowned scientist, inventor, lecturer, philanthropist and entrepreneur” who says he invented “email: the electronic mail system as we know it today,” will receive a $750,000 settlement from Gawker Media, the bankrupt publisher that he sued for defamation earlier this year over a series of stories that, his lawsuit claims, “falsely trace the origin of email and call Dr. Ayyadurai a liar.”

            Computer programmer Ray Tomlinson is credited by many experts and historians with developing the technology that we understand today as email. Dave Crocker, who helped write several foundational standards documents about messaging over the internet, told Gizmodo that Ayyadurai’s settlement with Gawker Media represents a victory for a version of the history of email’s development that isn’t supported by evidence. “I grew up being taught that the truth is always a sufficient defense against claims of defamation,” Crocker said upon hearing about the settlement. “Given the extensive documentation about the history of email, I’m sorry to find that that the adage no longer holds true.”

            John Vittal, one of Crocker’s co-authors, seconded his frustration. Vittal is best known in the traditional history of email for being the first person to implement “reply” and “forward” functions. “What’s true is true, and you can’t hide from it, and shouldn’t be able to capitalize on thwarting it,” said Vittal. “To me, it’s a sad day.”

          • Clinton Campaign Also Not A Fan Of Free Speech: Sends Legal Threat Letters Over Trump Ads

            If there’s one thing that the two major Presidential candidates seem to agree on it’s that we have too much free speech and all you First Amendment whiners should quiet down. Just this morning, we wrote about Trump threatening a documentary filmmaker with a cease & desist letter (the latest in a fairly long list of defamation threat letters). And it appears that the Clinton campaign is also ramping up its similar legal threat letter business.

            Last week, it sent cease & desist letters to broadcasters in Florida who were airing Trump ads that used some footage of Michelle Obama back in the 2008 campaign taking something of a swipe at Clinton. And, just today, the campaign supposedly sent out cease & desist letters to broadcasters airing new Trump ads claiming that Clinton is “under investigation by the FBI.”

          • Facebook Blocks Profiles Of Far-Right Polish Groups, Sparks Protests

            Several far-right Polish groups have protested outside Facebook’s office in Warsaw after the social networking site temporarily blocked their profiles.

            About 120 people demonstrated in the Polish capital Saturday afternoon, denouncing what they said was “censorship.”

          • Poland’s far-right groups protest Facebook ‘censorship’ after social accounts removed
          • Far-right Polish groups protest Facebook profile blockages
        • Privacy/Surveillance

          • If The FBI Can’t Stop All These Leaks About An Investigation, Why Would it Be Able To Keep Encryption Backdoor Secret?

            In the last 10 days or so, James Comey sent two letters to Congress — the first one notifying Congress of some new information in an “unrelated” investigation that may pertain to Hillary Clinton’s emails. And then the one from yesterday admitting that there was nothing important in those emails. That was effectively all that Comey said officially. Yet, in between all of that a ton of information leaked from the FBI about the investigation. We learned what it pertained to (the Anthony Weiner investigation), heard estimates of the number of emails involved, heard that the FBI found them weeks ago but only told Comey right before he sent the letter, that the FBI didn’t have a warrant to read the emails — and then that it did, and that a whole bunch of people inside both the FBI and DOJ have opinions on both sides of this whole mess.

            Basically, the FBI (and the DOJ) were leaking information like it was the last chance they’d ever have to leak information and their lives depended on who could leak the most.

          • The USA threatens to unleash cyber warfare against Russia
          • A second Privacy Shield legal challenge increases threat to EU-US data flows

            The Privacy Shield transatlantic data transfer deal is now caught in a pincer action: A week after it emerged that Irish digital rights activists had filed suit to annul the deal come reports that a French campaign group has begun its own legal action.

            French civil liberties campaign group La Quadrature du Net filed suit against the European Commission, the European Union’s executive body, on Oct. 25.

            Although the Court of Justice of the EU has not yet published details of the complaint, Brussels-based news agency Euractiv reported Thursday that La Quadrature’s goal is to annul the Commission’s decision that Privacy Shield provides adequate protection under EU law when the personal information of EU citizens is transferred to the U.S. for processing.

          • China Adopts Cybersecurity Law Despite Foreign Opposition

            The Cyber Security Law was passed by the Standing Committee of the National People’s Congress, China’s top legislature, and will take effect in June, government officials said Monday. Among other things, it requires internet operators to cooperate with investigations involving crime and national security, and imposes mandatory testing and certification of computer equipment. Companies must also give government investigators full access to their data if wrong-doing is suspected.

            China’s grown increasingly aggressive about safeguarding its IT systems in the wake of Edward Snowden’s revelations about U.S. spying, and is intent on policing cyberspace as public discourse shifts to online forums such as Tencent Holdings Ltd.’s WeChat. The fear among foreign companies is that requirements to store data locally and employ only technology deemed “secure” means local firms gain yet another edge over foreign rivals from Microsoft Corp. to Cisco System Inc.

          • A Guy Put Amazon’s ‘Alexa’ In Big Mouth Billy Bass’ Body And People Are Rightly Horrified

            So Big Mouth Billy Bass — you know, that animatronic singing fish that was annoyingly popular at the end of the 1990s — was, frankly, already pretty creepy. But one little modification brought it to new, disturbing heights.

            Brian “Wizard of Terror” Kane posted this lil’ video to Facebook on Oct. 27, which features a Big Mouth Billy Bass configured so that the voice of Alexa — Amazon’s voice assistant similar to Apple’s Siri — emanates from the fish’s mouth.

            The video is simply captioned, “the future” ― and it’s a dystopian vision indeed.

          • How to talk with your loved ones in private

            A few days ago I ran a very biased and informal survey to get an idea about what options are being used to communicate with end to end encryption with friends and family. I explicitly asked people not to list options only used in a work setting. The background is the uneasy feeling I get when using Signal, a feeling shared by others as a blog post from Sander Venima about why he do not recommend Signal anymore (with feedback from the Signal author available from ycombinator). I wanted an overview of the options being used, and hope to include those options in a less biased survey later on. So far I have not taken the time to look into the individual proposed systems. They range from text sharing web pages, via file sharing and email to instant messaging, VOIP and video conferencing. For those considering which system to use, it is also useful to have a look at the EFF Secure messaging scorecard which is slightly out of date but still provide valuable information.

          • Researchers Matched Images on Tattoo Websites to a German Police Database

            For the last year, EFF has been battling to free records from the National Institute of Standards and Technology (NIST) regarding an ethically dubious research program to promote the development of automated tattoo recognition technology. The agency is months delinquent in providing a variety of information, most notably the list of 19 research entities who received a giant set of tattoo images obtained from prisoners in custody. This delay is particularly alarming as NIST is currently recruiting institutional participants for the next stage of its expanded research, scheduled to begin on Dec. 1.

            What we’ve discovered so far about NIST’s approach to tattoo identification raises major concerns for privacy, free speech, the freedom to associate, and the rights of research subjects. We’ve also learned that similar tattoo recognition experiments are being conducted in Germany, a country that is usually sensitive to personal privacy.

          • ‘Our Identity Is Often What’s Triggering Surveillance’

            The civil rights director of the Oregon state Department of Justice has filed a lawsuit against his employer. It seems the department got a new computer program that lets them search social media, and to test it out, they looked for hash tags related to Black Lives Matter and activism against police violence, turning up a tweet by Erious Johnson, which led his colleagues to start compiling a report on him without his knowledge. Johnson’s lawsuit claims racial discrimination and a hostile work environment for engaging in protected activity.

        • Civil Rights/Policing

          • 25 Years After Junk Science Conviction, Texas Finally Admits Sonia Cacy’s Innocence

            Twenty-five years after she was first accused of the arson-murder of her uncle, 68-year-old Sonia Cacy on November 2 was finally exonerated by Texas’ highest criminal court, a move that clears the way for her to seek compensation from the state for her decades-long ordeal.

            Cacy’s conviction for a crime that never happened is a prime example of the devastating consequences of allowing junk science into the courtroom, of the need for continuing education of forensic practitioners, and for the robust review of convictions that may have been tainted by outdated, or imagined, science.

            In fact, arguably, it was Cacy’s case that set in motion a series of events that would eventually culminate in a unique partnership between the Innocence Project of Texas and the Texas state fire marshal, designed to review old arson-related criminal cases in order to ferret out convictions based on unsupportable fire science. “Sonia’s case is a lesson to the entire criminal justice system of how important it is to keep bad science out of court,” said Gary Udashen, president of the IPTX and Cacy’s longtime attorney.

          • Officer fired over feces sandwich

            A San Antonio police officer has been fired after an internal investigation determined he tried to give a homeless man a sandwich with feces inside it.

          • Man shot and killed by off-duty officer after ‘road rage incident’ escalated

            A man was shot and killed by an off-duty Chicago police officer Saturday afternoon in the Mount Greenwood neighborhood. The man was riding as part of a funeral procession, his family says, when what officials are calling a “road rage incident” escalated and he was shot and killed.

            During a short press conference, Chicago Police Superintendent Eddie Johnson described the chaotic scene near 111th and Troy that led to the fatal shooting around 3 p.m. Saturday.

            Johnson said it began as a “road rage incident” between multiple people and a “fire department member.” Then, Johnson said, an off-duty police officer who was in a barbershop across the street saw the fight and headed over, “announcing his office” as he got involved. That’s when “the subject,” identified by his family as 25-year-old Joshua Beal, “displayed a weapon,” according to Johnson.

          • Nigeria frees Muslims accused of murder over blasphemy

            A court in northern Nigeria has freed five Muslim men accused of killing an elderly Christian woman for allegedly blaspheming the Prophet Mohammed.

            The court in the city of Kano discharged the five men on Thursday on the legal advise of the prosecution.

            “The legal advice presented to the court, dated June 24, states that there is no case to answer as the suspects are all innocent and orders the court to discharge all the suspects,” the judge said in his ruling.

          • Fresh attacks on Hindus in Bangladesh, houses torched

            In fresh attacks on Hindus in Bangladesh, unidentified miscreants set ablaze some of their houses and damaged two temples in central Brahmanbarhia district where several places of worship of the minority community were vandalised earlier this week, police said.

          • Luxembourg’s Asselborn: Turkey is using Nazi-era tactics

            Luxembourg’s Foreign Minister Jean Asselborn, in an interview with Deutschlandfunk Monday, compared the Turkish government’s dismissal of civil servants to methods used by the German Nazi regime, and recommended that the European Union impose economic sanctions.

            Since the failed July 15 coup that killed more than 240 people, Turkish President Recep Tayyip Erdoğan has detained, suspended or dismissed more than 110,000 public servants as part of a wider crackdown on his political opponents.

        • Internet Policy/Net Neutrality

          • Despite ESPN Whining, Nielsen Confirms Historic Subscriber Losses For Channel

            Last week, we noted how Disney and ESPN threw a bit of a hissy fit when Nielsen data indicated that ESPN had one of the biggest subscriber losses in company history last month. According to Nielsen’s data, ESPN lost 621,000 homes in a single month, as well as losing 607,000 ESPN2 households and 674,000 ESPNU homes. That’s of course on the heels of losing more than 7 million subscribers over the last three years or so, thanks largely due to the rise of cord cutting, cord trimming (scaling down your TV package) and the rise of some “skinny bundles” that exclude ESPN from the base channel lineup.

            ESPN demanded that Nielsen withdraw its numbers, insisting they represented a “dramatic, unexplainable variation” that didn’t match ESPN’s own numbers. Nielsen obliged, but after conducting an “extensive” review of the numbers found them to be “accurate as originally released.” Of course, this shouldn’t be a surprise; we’ve noted how everybody but ESPN appears to have seen the writing on the wall. But instead of adapting to the changing times, ESPN responded by denying that cord cutting was real, and suing companies like Verizon for trying to bring some flexibility to the traditional cable bundle.

        • Intellectual Monopolies

          • Clinton v. Trump on copyrights and patents: Reading the platform and the tea leaves

            The hot-button issues this election can be counted on one’s fingers—and for most voters, things like copyright and patent policy don’t make the list. Assigned to a wonkish zone far from the Sunday morning talk shows, intellectual property issues aren’t near the heart of our deeply polarized political discourse.

            Of the two major party candidates in 2016, only the Democratic candidate has a platform that even addresses copyright and patent policies. So today, let’s look at what we know about Hillary Clinton’s plan, and make some informed speculation about what could happen to these areas under a Donald Trump presidency.

            Given that the campaign is focused (as always) on a relatively small group of issues, tech policy watchers who spoke to Ars were surprised to see a presidential platform that mentions IP issues at all. Clinton’s briefing paper on technology and innovation addresses both copyright and patent issues directly, and that in itself is something of a surprise. Trump’s website has no such information, so the best clues to his approach lie in his public statements and the people he has surrounded himself with.

          • Copyrights

        ]]>
        http://techrights.org/2016/11/07/nes-classic-linux-computer/feed/ 0
        Links 2/11/2016: Fedora 25 Final Freeze, Minoca OS Under GPL http://techrights.org/2016/11/02/minoca-os-under-gpl/ http://techrights.org/2016/11/02/minoca-os-under-gpl/#comments Wed, 02 Nov 2016 15:02:49 +0000 http://techrights.org/?p=96535

        GNOME bluefish

        Contents

        GNU/Linux

        • What if Linux never existed?

          Linux has been around for a long time now, and many of us take it for granted as part of our everyday lives. But have you ever paused to consider what life would be like if Linux never existed? A writer at Network World recently explored this question based on some funny social media posts.

        • Linux Journal November 2016

          I like the idea of life hacking. I’m not sure it’s a term that you’ll find in the dictionary (although perhaps—dictionaries have some odd things in them now), but the idea of improving life by programmatically changing things is awesome. I think that might be why I’m such an open-source fan. When it’s possible to change the things you don’t like or improve on something just because you can, it makes computing far less mystical and far more enjoyable.

        • Desktop

          • Some Disappointed Apple Fans Are Moving To Ubuntu Linux

            At its October event, Apple tried hard to convince the users that its latest MacBook Pro is machine built for professional users. The company showed off the brand new Touch Bar that changed its appearance depending on the applications running on the screen. The new MacBooks are thinner and more powerful than ever. But, there’s something missing that’s driving away some diehard Apple fans.

            Firstly, Apple decided to ditch a large array of connectivity ports–HDMI ports, SD card slot, Thunderbolt 2 ports, and standard USB port. These ports have been replaced by 4 Thunderbolt 3/USB-C ports. So, the same power user segment that’s being aimed by Apple, is expressing lots of concerns.

            Apart from the disappeared ports, these MacBooks have maximum 16GB of RAM. On the contrary, minimum 32GB RAM is becoming a standard for power users. While Microsoft is presenting itself as the new innovative tech company, some Apple loyalists are turning to another alternative, i.e., Linux.

          • Elementary, My Dear Siri!

            I’m not one prone to knee-jerk reactions, but I’m also not one to sit about idly without considering alternatives. So the first thing I did after the Apple keynote was to download a copy of Elementary and burn it to an SD card.

            An hour or so later, after checking that my Chromebook would work OK with it1, I installed from the live image to the SSD and began the process of figuring out whether, three years after I first tried it, Elementary is finally good enough for me as a development environment.

            Like last time, this isn’t a review per se, but rather a smattering of my impressions while trying to assess whether it suits me.

            I’m being realistic here – I know it’s not macOS, I don’t expect it to be macOS, it will not be a magical replacement for macOS for most people who share my current disenchantment with Apple, but I am very familiar with Linux, and most definitely need to consider moving to it in the long term given the way Apple has been neglecting Mac hardware and software over the past few years.

            So given this week’s keynote completely ignored desktops and that I sorely need to upgrade my six-year-old Mac mini, this is as good a time as any to evaluate what’s out there.

        • Server

          • AWS releases Amazon Linux container image for use in on-premises data centers

            Amazon Web Services (AWS), a division of Amazon that offers cloud computing and storage services, today announced that it has released a container image of its Amazon Linux operating system — which has, until now, only been accessible on AWS virtual machine instances — that customers can now deploy on their own servers.

            Of course, other Linux distributions are available for use in companies’ on-premises data centers — CentOS, CoreOS, Red Hat Enterprise Linux, Canonical’s Ubuntu, and so on. Now companies that are used to Amazon Linux in the cloud can work with it on-premises, too. It’s available from AWS’ EC2 Container Registry. Amazon Linux is not currently available for instant deployment on other public clouds, whether Oracle’s, Google’s, Microsoft’s, or IBM’s.

        • Kernel Space

          • Fireside Chat: GKH Talks Licensing, Email, and Aging Maintainers

            No one aside from Linus Torvalds has more influence or name recognition in the Linux Kernel project than Greg Kroah-Hartman. More commonly known as GKH, the ex SUSE kernel developer and USB driver maintainer is now a Linux Foundation Fellow and the full-time maintainer of the -stable Linux branch and staging subsystem, among other roles. In a recent Fireside Chat with Kroah-Hartman at Embedded Linux Conference Europe, Tim Bird, Chair of the Architecture Group of the Linux Foundation’s CE Working Group, described him as the hardest working person he knows.

          • Linux 4.4.30

            I’m announcing the release of the 4.4.30 kernel. This fixes a bug in
            4.4.29 and older kernels by reverting two patches that should not have
            been applied.

            All users of the 4.4 kernel series must upgrade.

            The updated 4.4.y git tree can be found at:
            git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.4.y
            and can be browsed at the normal kernel.org git web browser:

            http://git.kernel.org/?p=linux/kernel/git/stable/linux-st…

          • Linux Kernel 4.4.30 LTS Fixes a Bug in 4.4.29 and Older Kernels, Update Now

            After informing the Linux community about the release and immediate availability of the Linux 4.8.6 kernel, renowned Linux kernel developer Greg Kroah-Hartman announced the Linux 4.4.29 LTS kernel.

            Linux kernel 4.4.29 LTS was a fairly normal maintenance update that brought changes to a total of 82 files, with 657 insertions and 358 deletions, according to the appended shortlog and the diff from Linux kernel 4.4.28 LTS announced a week ago. However, later that day Greg Kroah-Hartman bumped the version to 4.4.30, removing two patches that shouldn’t have been applied in the first place.

          • Hyperledger Eyes Mobile Blockchain Apps With ‘Iroha’ Project

            A blockchain project developed by several Japanese firms including by startup Soramitsu and IT giant Hitachi has been accepted into the Hyperledger blockchain initiative.

            Developed by Hyperledger member and blockchain startup Soramitsu, Iroha was first unveiled during a meeting of the project’s Technical Steering Committee last month. Iroha is being pitched as both a supplement to other Hyperledger-tied infrastructure projects like IBM’s Fabric (on which it is based) and Intel’s Sawtooth Lake.

          • It’s Bitcoin’s Birthday: Whitepaper Released 8 years Ago Today

            At the time, many people who first read the paper became interested in the background technology, and several wanted to see it in a working state.

            It seems very few knew that was going to happen.

            Once Bitcoin launched in 2009, the biggest success story in digital money was launched. Satoshi launched Bitcoin as open source software so anyone could use it, fork it and update it. At first, the early adopters were mainly from the cryptography community like Hal Finney, the recipient of the very first bitcoin transaction.

          • Web Pioneer Tries to Incubate a Second Digital Revolution

            Brian Behlendorf knows it’s a cliché for veteran technologists like himself to argue that society could be run much better if we just had the right software. He believes it anyway.

            “I’ve been as frustrated as anybody in technology about how broken the world seems,” he says. “Corruption or bureaucracy or inefficiency are in some ways technology problems. Couldn’t this just be fixed?” he asks.

            This summer Behlendorf made a bet that a technology has appeared that can solve some of those apparently human problems. Leaving a comfortable job as a venture capitalist working for early Facebook investor and billionaire Peter Thiel, he now leads the Hyperledger Project, a nonprofit in San Francisco created to support open-source development of blockchains, a type of database that underpins the digital currency Bitcoin by verifying and recording transactions.

          • ​New round of HPE software layoffs begins

            Linux Plumbers, the invite-only conference for core Linux developers, is usually a happy occasion, but not this time.

            Several top programmers came looking for work because they had just been laid off by Hewlett Packard Enterprise (HPE). And they weren’t the only ones. Last week, HPE laid off numerous OpenStack cloud developers.

          • Graphics Stack

        • Applications

        • Desktop Environments/WMs

          • K Desktop Environment/KDE SC/Qt

          • GNOME Desktop/GTK

            • Rust and Vala
            • Bézier curves, markers, and SVG’s concept of directionality

              In the first post in this series I introduced SVG markers, which let you put symbols along the nodes of a path. You can use them to draw arrows (arrowhead as an end marker on a line), points in a chart, and other visual effects.

              In that post and in the second one, I started porting some of the code in librsvg that renders SVG markers from C to Rust. So far I’ve focused on the code and how it looks in Rust vs. C, and on some initial refactorings to make it feel more Rusty. I have casually mentioned Bézier segments and their tangents, and you may have an idea that SVG paths are composed of Bézier curves and straight lines, but I haven’t explained what this code is really about. Why not simply walk over all the nodes in the path, and slap a marker at each one?

            • Rust and GObject

              From documentation Rust provides a low level and high level API to access common operations. Provides a set of assumptions to help its great features like automatic memory management, secure and concurrent data access. On high level side, Rust provides a rich set of common collection, iterators, tuples and others.

              For GObject interoperability, there is a project , and this too, I found to allow you to use GObject based libraries in Rust, while they depends on other project, or directly on GObject Introspection generated XML files to introspect these C libraries.

            • Meet Meow, a Purfect GNOME Menu Editor

              If you love using GNOME Shell but wish that it was easier to create and customise folders in the App View, here’s an app that might help.

            • GNOME Shell 3.23.1 Introduces Dual-GPU Integration, Mutter Adds Wayland Fixes

              We reported last week that the first milestone of the upcoming GNOME 3.24 desktop environment, due for release on March 22, 2017, arrived for early adopters, but the changes weren’t all that significant.

              A few days after the announcement for GNOME 3.23.1, the GNOME Shell 3.23.1 graphical interface and Mutter 3.23.1 window and composite manager made their appearance on the official FTP server, and looking at their changelogs, attached at the end of the article for reference, it appears there are plenty of new features to get excited for.

            • GNOME and Rust

              I’ve been keeping an eye on Rust for a while now, so when I read Alberto’s statement of support for more Rust use in GNOME, I couldn’t resist piling on…

              From the perspective of someone who’s quite used to C, it does indeed seem to tick all the boxes. High performance, suitability for low-level tasks and C ABI compatibility tend to be sticking points with new languages — and Rust kills it in those departments. Anyone who needs further convincing should read up on Raph Levien’s font renderer. The usual caveat about details vis-a-vis the Devil applies, but the general idea looks exactly right. Rust’s expressiveness and lack of baggage means it could even outperform C for non-trivial code, on top of all the other advantages.

        • Distributions

          • New Releases

            • IPFire 2.19 Linux Firewall Distribution Switches to Unbound as DNS Proxy

              On the first day of November 2016, Michael Tremer from the IPFire project, an open source, professional, secure and hardened Linux-based firewall distribution, proudly announced the release of IPFire 2.19 Core Update 106.

              IPFire 2.19 Core Update 106 is the latest stable release of the Linux firewall OS, and it looks like it implements a new DNS proxy, namely Unbound, which replaces the Dnsmasq DNS forwarder and DHCP server used in previous releases. The decision was made because of the recent DNSSEC implementation by default in the distribution, which proves to offer better DNSSEC reliability, enhanced features, such as import of static leases, and improved performance.

            • 4MLinux 20.0 GNU/Linux Distribution Hits Stable Channel, Adds New Boot Options

              Today, November 1, 2016, 4MLinux developer Zbigniew Konojacki informs us about the general availability of the final release of his independent 4MLinux 20.0 GNU/Linux operating system.

              4MLinux 20.0 has entered development at the beginning of September, when the Core edition was pushed to the Beta channels for early adopters, as well as for the 4MLinux developer to rebase all of his GNU/Linux distribution on the new system, which is now powered by the long-term supported Linux 4.4.27 kernel fully patched against the “Dirty COW” vulnerability.

          • Arch Family

            • Arch Linux 2016.11.01 Now Available for Download, Powered by Linux Kernel 4.8.6

              Today is the first day of November (still is in some countries), which means that a new ISO respin of the popular and lightweight Arch Linux operating system is now available for download.

              That’s right, Arch Linux 2016.11.01 is out, and it’s powered by the recently released Linux 4.8.6 kernel, which makes Arch Linux the first GNU/Linux distribution to offer a live and installable ISO image powered by the latest stable and most advanced Linux kernel version available, at least at the moment of writing this blog story.

            • Manjaro 16.10 “Fringilla” Released

              A new version of the Arch-based Manjaro Linux distribution is available and continues with its Xfce desktop choice while a KDE Plasma 5.8 version is also available.

          • Red Hat Family

            • Red Hat Extends IT Automation Reach

              Using a more declarative approach to IT automation that doesn’t require IT operations staff to learn how to program has the obvious benefit of being simpler for more IT organizations to embrace. Now Red Hat is extending the reach of that approach with the release today of an update to the agentless Ansible open source framework that reaches deeper into the realms of networking, containers and the cloud.

            • Finance

            • Fedora

              • Fedora 25 Linux Now in Final Freeze, Slated for Release on November 15, 2016

                ovember 1, 2016, was an important day on the release schedule of the forthcoming Fedora 25 Linux operating system, as it hit the Final Freeze development stage, leading to significant cut-offs.

                The Final Freeze stage is a very important step in the development process of any GNU/Linux distribution, which means that no new packages will be added to the operating system and its current state will be preserved until the final release, but not before it passes all tests for all supported hardware architectures. As usual, during the Final Freeze stage, only critical bug fixes are accepted, and new package versions will be pushed to the stable repos after the OS officially hits the streets.

              • Fedora 25′s Hybrid Graphics Improvements, To Support NVIDIA Wayland EGLStreams

                When Fedora 25 ships in (hopefully) two weeks it will contain much better support for hybrid graphics / Optimus systems thanks to improvements led by Red Hat.

              • Fedora 25 Is Vetting Their Switchable Graphics Support This Week

                For those with a NVIDIA Optimus laptop or other dual-GPU system, Fedora QA has organized a test day this week for testing the switchable graphics support for Fedora 25 that will be shipping later this month.

              • Hybrid Graphics and Fedora Workstation 25

                When we started the Fedora Workstation effort one thing we wanted to do was to drain the proverbial swamp of make sure that running Linux on a laptop is a first rate experience. As you see from my last blog entry we have been working on building a team dedicated to that task. There are many facets to this effort, but one that we kept getting asked about was sorting out hybrid graphics. So be aware that some of this has been covered in previous blog entries, but I want to be thorough here. So this blog will cover the big investments of time and effort we are putting into Wayland and X Windows, GNOME Shell and Nouveau (the open source driver for NVidia GPU hardware).

          • Debian Family

            • Debian developer completes 20 years with project

              The Debian GNU/Linux project is 23 years old and one of its developers has just completed two decades with the community Linux organisation.

              Steve McIntyre, who led the project in 2008 and 2009, joined Debian in 1996. He wrote that he had first installed Debian in late October that year, migrating over from his existing Slackware installation with the help of a friend. It took an entire weekend and he says he found it so painful that he thought of bailing out at many times.

            • Derivatives

        • Devices/Embedded

        Free Software/Open Source

        • Aporeto Announces Trireme, an Open-Source Security Project for Kubernetes and Docker
        • Trireme Open-Source Security Project Debuts for Kubernetes, Docker

          Network isolation isn’t the only way to secure application containers anymore, so Aporeto unveils a new security model for containers running in Docker or as part of Kubernetes cluster.
          Dimitri Stiliadis co-founded software-defined networking (SDN) vendor Nuage Networks in 2011 in a bid to help organizations improve agility and security via network isolation. In the container world, however, network isolation alone isn’t always enough to provide security, which is why Stiliadis founded Aporeto in August 2015. On Nov. 1, Aporeto announced its open-source Trireme project, providing a new security model for containers running in Docker or as part of a Kubernetes cluster.

        • Minoca OS: A new open source operating system

          Minoca OS is a general purpose operating system written completely from the ground up. It’s intended for devices looking to conserve power, memory, and storage. It aims to be lean, maintainable, modular, and compatible with existing software.

          In other words, it’s built for little devices that want a full-featured OS.

          On the app side, we’ve got a package manager (opkg), and a growing suite of packages like Python, Ruby, Git, Lua, and Node. Under the hood, Minoca contains a powerful driver model between device drivers and the kernel. The idea is that drivers can be written in a forward compatible manner, so kernel level components can be upgraded without requiring a recompilation of all device drivers.

        • Minoca Is A New GPLv3, General Purpose OS
        • ReactOS 0.4.3 Is Near With New Features, RC1 Released

          There are a lot of operating system updates to end out October and begin November… Even the “open-source Windows” ReactOS is out with a new test release.

        • OpenIndiana 2016.10 Released With MATE 1.14 Desktop, Drops Sun SSH

          The latest version of OpenIndiana, the Illumos-powered Solaris distribution letting OpenSolaris live on in community form, is now available.

        • OpenIndiana 2016.10 Unix OS Migrates to FreeBSD Loader, Adds MATE 1.14 Desktop

          OpenIndiana is a free and open-source Unix operating system, based on Illumos and derived from OpenSolaris. The latest version, 2016.10, was announced by Alexander Pyhalov on October 31, 2016.

          The OpenIndiana 2016.10 “Hipster” release comes with a large number of updated components, new features and under-the-hood improvements, but the most exciting ones are the migration to FreeBSD Loader, porting of Intel KMS (Kernel Mode Setting), implementation of Python 2.7 by default, removal of Sun SSH, and MATE 1.14 desktop, which is now integrated and installed by default.

        • Google “Eve” Kabylake System Gains Coreboot Support

          I haven’t seen Google announce any Intel Kabylake powered Chromebooks yet, but activity indicates that they may not be too far out with now having mainlined Coreboot support for a new device codenamed “Eve”.

        • 8 Open Source BPM Software Options

          Open source business process management (BPM) software appears to account for a large percentage of recent innovation in the broader BPM market.

          “Open source solutions are leading the evolution of the BPM technologies: from pure BPM solutions that automate processes, increase productivity and ensure regulatory compliance to business application platforms that include tools and capabilities to empower DevOps teams to effectively create and maintain business applications,” said Miguel Valdes Faura, CEO and founder of Bonitasoft, provider of an open source BPM platform.

          The trends in open source BPM software mirror the broader BPM market, said Phil Simpson, manager, BPM Product Marketing for Red Hat, mentioning a move away from on-premise deployments in favor of BPM-as-a-service, and adoption of more dynamic ad-hoc case management style flows in lieu of rigid process models.

        • Managing Production Systems with Kubernetes in Chinese Enterprises

          Kubernetes has rapidly evolved from running production workloads at Google to deployment in an increasing number of global enterprises. Interestingly, US and Chinese enterprises have different expectations when it comes to requirements, platforms, and tools. In his upcoming talk at KubeCon, Xin Zhang, CEO of Caicloud, will describe his company’s experiences using Kubernetes to manage production systems in large-scale Chinese enterprises.

        • Node.js Is Helping Developers Get the Most Out of JavaScript

          Node.js, the JavaScript runtime of choice for high-performance, low latency apps, continues to gain popularity among developers on the strength of JavaScript.

        • 10 tips for making your documentation crystal clear

          So you’ve some written excellent documentation. Now what? Now it’s time to go back and edit it. When you first sit down to write your documentation, you want to focus on what you’re trying to say instead of how you’re saying it, but once that first draft is done it’s time to go back and polish it up a little.

        • Apache Ignite Powers GridGain’s In-Memory Computing Platform

          Here at OStatic, we’ve often noted that whenever the Apache Software Foundation graduates an open source project to become a Top Level Project, it tends to bode well for the project. Just look at what’s happened with Apache Spark, for example.

          Last year, Apache, which is the steward for and incubates more than 350 Open Source projects, announced that Apache Ignite had become a top-level project. Ignite is an open source effort to build an in-memory data fabric that was driven by GridGain Systems. Now, GridGain Systems has announced that it is offering the Ignite-based GridGain Enterprise Edition in the Amazon Web Services (AWS) Marketplace.

        • Nitrous.io shuts down, open source self-hosted version promised

          Nitrous.io, a Singapore and San Francisco-based cloud integrated development environment (IDE) provider, has announced it is to shut down its development platform and cloud IDE on November 14, with customers given until that date before their data is deleted.

          The company has stopped new signups, and said that payments made after October 16 will be refunded in full, as well as promising that subscriptions to any Nitrous email list will expire at the end of this month.

        • SaaS/Back End

          • Forrester: OpenStack and AWS are Now Crowned Cloud Standards

            At the recent OpenStack Summit in Barcelona, nteroperability among OpenStack-powered clouds was trumpeted far and wide. And, in tandem with that, OpenStack proponents are also touting the fact that the open cloud computing platform has emerged as a de facto standard, alongside Amazon Web Services.

            Forrester Research’s latest report, “The State of Cloud Platform Standards, Q4 2016,” specifies that OpenStack and AWS are now the cloud standards. That’s quite something when you consider that OpenStack is only a few years old.

            There are, of course, numerous open cloud platforms out there. OpenNebula, Eucalyptus, and CloudStack are just a few of the choices. But Forrester Research reports that ”almost every public, private, and hosted private cloud provider has either already developed or is in the process of developing varying levels of support for the OpenStack APIs.”

        • Oracle/Java/LibreOffice

        • Pseudo-Open Source (Openwashing)

        • Funding

        • FSF/FSFE/GNU/SFLC

          • GIMP 2.9.6 Readying New Clipboard, GUI Improvements

            GIMP is taking another step towards the long overdue GIMP 2.10 image program update with a new milestone release being on the horizon.

            The GIMP 2.9.6 release has yet to happen but its NEWS entry was updated for the pending release.

            What users can look forward to in GIMP 2.9.6 is a new clipboard implementation to copy/paste layers and layer groups, color tags, the mouse pointer dialogs and colors applied to images are now color-managed, various GUI additions, improvements to some of the built-in tools, a native WebP loader/exporter, and around 60 bug fixes over the earlier GIMP 2.9 development release.

          • Update NEWS for the GIMP 2.9.6 release
        • Public Services/Government

          • Emilia-Romagna ends its use of OpenOffice

            For the second time this year, an Italian public administration is ending its use of open source office productivity software. A source in the IT department of the Emilia-Romagna region confirmed to the Open Source Observatory last week that the region will end its use of OpenOffice. The region will move to a cloud-based proprietary office solution, others say.

            The IT department did not respond to emails seeking comments sent last week and yesterday. This news item will be updated with more information as it becomes available.

            On 31 October, a press statement by the region’s councillor for the Digital Agenda, Raffaele Donini, mentions the use of unspecified cloud solutions, which should reduce the number of pages printed by the administration each year by some 5 million. The switch would save EUR 700,000 per year.

            Update: the region took its decision to switch to a cloud solution on 24 October.

        • Licensing/Legal

          • Wix gets caught “stealing” GPL code from WordPress

            Abrahami was alluding to the use in the WordPress text editor of code originally published as open source under the more permissive MIT public license, as Wix developer Tal Kol said explicitly in a followup post on Medium. Kol said that the code was developed in an attempt to collaborate with WordPress engineers—porting the Automattic, GPL-licensed editor to the React Native JavaScript platform for mobile apps. After a prototype was ready in June, Kol explained, he tweeted a link to the code to Automattic’s engineering team but didn’t get a response until October 28, when Mullenweg called Wix out for a GPL violation.

            The problem for Wix is that while it may very well have open-sourced the component it built using WordPress’ editor—which Kol says was in turn built using another editor licensed under the more permissive MIT open source license—the company then published the component as part of commercially licensed software. That action violates both the spirit and the letter of the GNU Public License, which requires anything built with GPL-licensed code to be distributed with the same GPL license. By adding the GPL-licensed editor module code to its own application, Wix essentially placed its whole mobile application under the scope of the GPL license.

        • Openness/Sharing/Collaboration

          • The Polls of the Future Are Reproducible and Open Source

            There’s a new poll aggregator in town. And it’s a monster, harnessing three of the most powerful ideas in science today: Bayesian inference, open-source software, and reproducible research.

          • Open Data

            • Open Source Data Sharing Software Takes Aim At Cancer

              Researchers collaborating in Pittsburgh have developed an open-source software resource that can better enable investigators studying cancer to process large amounts of genomic cancer data.

              The new resource, developed by researchers from the University of Pittsburgh and the Pittsburgh Supercomputing Center can assist investigators in sorting through genomic cancer data to determine better methods of cancer prevention, diagnosis and treatment.

              The open-source software, which processes data generated by The Cancer Genome Atlas (TCGA) project and is called TCGA Expedition, is described in an article in the journal PLOS ONE.

        • Programming/Development

          • Which ‘ancient’ programming language do you use the most?

            The definition of an “older” language is a little fuzzy. For many developers, the languages they are working with were created before they were born. For the purposes of this poll, we selected a few popular languages from Wikipedia’s History of programming languages article and selected the somewhat arbitrary cutoff of needing to have been created prior to 1980.

        Leftovers

        • Science

          • Paranoid Android: Erica May Be the Creepiest Robot Ever Built

            Professor Hiroshi Ishiguro is a weird dude. For the last couple of decades, he’s been on a quest to make the most lifelike android possible. His first creation was based on his daughter’s image and proved so frightening to his child that the machine had to be locked away in a crate. Later, Ishiguro–who dresses in all-black, like a Japanese Johnny Cash–made a machine that looks exactly like him. As you do.

        • Security

          • Security updates for Tuesday
          • Let’s Automate Let’s Encrypt

            HTTPS is a small island of security in this insecure world, and in this day and age, there is absolutely no reason not to have it on every Web site you host. Up until last year, there was just a single last excuse: purchasing certificates was kind of pricey. That probably was not a big deal for enterprises; however, if you routinely host a dozen Web sites, each with multiple subdomains, and have to pay for each certificate out of your own dear pocket—well, that quickly could become a burden.

            Now you have no more excuses. Enter Let’s Encrypt a free Certificate Authority that officially left Beta status in April 2016.

            Aside from being totally free, there is another special thing about Let’s Encrypt certificates: they don’t last long. Currently all certificates issued by Let’s Encrypt are valid for only 90 days, and you should expect that someday this term will become even shorter. Although this short lifespan definitely creates a much higher level of security, many people consider it as an inconvenience, and I’ve seen people going back from using Let’s Encrypt to buying certificates from commercial certificate authorities for this very reason.

          • Microsoft says Russia-linked hackers exploiting Windows flaw [Ed: So it says the back doors it gave the NSA are used by many others]

            Microsoft Corp (MSFT.O) said on Tuesday that a hacking group previously linked to the Russian government and U.S. political hacks was behind recent cyber attacks that exploited a newly discovered Windows security flaw.

            The software maker said in an advisory on its website there had been a small number of attacks using “spear phishing” emails from a hacking group known Strontium, which is more widely known as “Fancy Bear,” or APT 28. Microsoft did not identify any victims.

            Microsoft’s disclosure of the new attacks and the link to Russia came after Washington accused Moscow of launching an unprecedented hacking campaign aimed at disrupting and discrediting the upcoming U.S. election.

          • Lack of cybersecurity standards leaves election process vulnerable [Ed: Windows in voting machines is a real issue [1, 2]]

            Hackers continue to exploit vulnerabilities in the U.S. political technology, highlighting the need for cybersecurity standards and guidelines to help protect voter information.

          • Windows zero-day exploited by same group behind DNC hack

            On Oct. 31, Google’s Threat Analysis Group revealed a vulnerability in most versions of Windows that is actively being exploited by malware attacks.

            Today, Terry Myerson, executive vice president of Microsoft’s Windows and Devices group, acknowledged the exploit was being used actively by a sophisticated threat group—the same threat group involved in the hacks that led to the breach of data from the Democratic National Committee and the Clinton campaign. And while a patch is on the way for the vulnerability, he encouraged customers to upgrade to Windows 10 for protection from further advanced threats.

          • How DNS Works: A Primer

            DNS has been in the news a great deal as of late. First, there was the controversy over the United States government essentially handing over control of the Internet’s root domain naming system. Then DNS made headlines when cybercriminals performed three separate distributed denial of service (DDoS) attacks on a major DNS service provider by leveraging a botnet army of millions of compromised IoT devices. Yet with all the hoopla surrounding DNS, it surprises me how many IT pros don’t fully understand DNS and how it actually works.

            DNS stands for Domain Name System. Its purpose is to resolve and translate human-readable website names to IPv4 or IPv6 addresses. Technically speaking, it’s not a necessary part of the networking processes. Rather, DNS simply makes it easier for human beings to know and remember what server they are trying to reach. For example, it’s much easier to remember that if you want to perform an internet web search, you type in www.google.com as opposed to the IPv4 address of 216.58.217.4.

          • Security Blogger Identifies Next IoT Vulnerability, This Time on Linux OS [Ed: not Linux is the problem here but bad developers of devices]

            Recommendations for mitigation include turning off global telnet open services and not using known vulnerable usernames or passwords. If a device is infected (or you’re not sure if it is), this can be removed by rebooting the infected devices, the post said. Of course it will then have to be secured against the intrusion, or it will be re-infected.

          • Top GCHQ director calls security industry “witchcraft”

            The National Cyber Security Center’s technical director Ian Levy has slammed commonly-accepted cyber security advice, equating the security industry to “witchcraft” and accusing it of deliberately creating unnecessary fear around cyber threats.

            Speaking at Future Decoded 2016, Microsoft’s annual digital transformation conference, Levy argued that cyber security is not transparent and that the industry is “blaming the user for designing the system wrong”.

        • Defence/Aggression

          • Swiss police detain eight in a mosque raid

            Swiss police on Wednesday raided a mosque in the north of the country, detaining eight people, AP reported.

            Those in custody are suspected of calling for killing of Muslims refusing to attend prayers.

            Police searched the mosque in Winterthur, near Zürich, and the apartments of three people, according to a statement from the regional prosecutor’s office. Among those arrested was an Ethiopian imam who could have been behind the call for the killings.

        • Transparency/Investigative Reporting

          • WikiLeaks releases 26th batch of #PodestaEmails from Clinton campaign chair

            The latest release consists of over 1,100 emails. More than 43,000 emails have now been published by the whistleblowing site, which has pledged to make public a total of 50,000 in the run up to next week’s US presidential election.

            Tuesday’s email release divulged more details on the Clinton team’s reaction to her email server scandal and gave further insight into its relationship with the MSM.

          • The FBI Seems To Be Leaking Like A Sieve Concerning Details Of Clinton Email Investigation

            Okay, look, let’s face the fact that any time we write about anything having to do with either Hillary Clinton or Donald Trump, people in the comments go nuts accusing us of being “in the tank,” or “shills.” or even (really) “up the ass” of one candidate or the other (and, yes, this has happened with both of the major party candidates). I’m assuming it will happen again with this post, even though it’s not true. As should be abundantly clear, we’re not big fans of either choice (and don’t get us started on the third parties…). So when we talk about one, the other (or even both together), it’s not because we’re “biased” or trying to help or hurt one or the other. We’re just doing the same thing we always do, and which we never had a problem with before, which is reporting on policy related issues having to do with technology, free speech, the 4th amendment, law enforcement, etc. So, before you rush in to yell at us in the comments, please consider that maybe just because we’re not toeing the party line on your preferred candidate, maybe it’s not because we’re in the tank for the other one.

          • The Clinton-Obama Emails

            or everyone wondering why the Clinton email case never went to a grand jury, former U.S. Attorney General Michael Mukasey offers an explanation: After disclosure of emails between Hillary Clinton and Barack Obama , “the president said during an interview that he thought Mrs. Clinton should not be criminally charged because there was no evidence that she had intended to harm the nation’s security—a showing required under none of the relevant statutes.

        • Environment/Energy/Wildlife/Nature

          • Why Dakota Is the New Keystone

            The Native Americans who have spent the last months in peaceful protest against an oil pipeline along the banks of the Missouri are standing up for tribal rights. They’re also standing up for clean water, environmental justice and a working climate. And it’s time that everyone else joined in.

            The shocking images of the National Guard destroying tepees and sweat lodges and arresting elders this week remind us that the battle over the Dakota Access Pipeline is part of the longest-running drama in American history — the United States Army versus Native Americans. In the past, it’s almost always ended horribly, and nothing we can do now will erase a history of massacres, stolen land and broken treaties. But this time, it can end differently.

          • State of emergency declared for Alabama after Colonial pipeline incident

            Alabama Governor Robert Bentley on Tuesday declared a state of emergency for the state due to an explosion and fire involving Colonial Pipeline Co [COLPI.UL] in Shelby County on Monday.

            “The State of Emergency is effective November 1, 2016 through December 1, 2016 unless sooner terminated,” according to a statement from the governor’s office.

          • Dakota Access pipeline protesters crowdsource for $5,000, get $1 million

            The crowdsourcing goal was modest: $5,000, enough to help a few dozen people camping in North Dakota to protest the nearby construction of the four-state Dakota Access oil pipeline. The fund has since topped a staggering $1 million.

            The fund is among several cash streams that have provided at least $3 million to help with legal costs, food and other supplies to those opposing the nearly 1,200-mile pipeline. It may also give protesters the ability to prolong their months-long encampments that have attracted thousands of supporters, as the Standing Rock Sioux Tribe pursues the fight in court.

        • Finance

          • Liam Fox’s attempt to secure pre-Brexit deal with EU suffers setback

            Liam Fox’s hopes of securing a trade deal with the European Union before Brexit have been dealt a blow by a leading member of the European parliament, who insists no deal can be struck until the UK has left the bloc.

            Danuta Hübner, a former Polish government minister who became the country’s first European commissioner, said it would not be possible for the UK to conclude a trade deal while still an EU member.

            Now an MEP, she chairs the European parliament’s constitutional affairs committee, which will be responsible for vetting any post-Brexit free-trade agreement with the UK.

            In an interview with the Guardian, she stressed negotiations on Britain’s EU exit under article 50, due to begin next year, would be on a different track to talks on the future relationship.

            “Formally you cannot conclude or even negotiate the agreement that belongs to a third-country situation while you are still a member. Article 50 is only about withdrawal and only when you are out can [you] negotiate another agreement.”

          • European Taxi Unions Merge to Create United Front Against ‘Uber Lobby’

            In Spain, as in almost all other markets it has entered, Uber has faced pushback from authorities, protests by taxi drivers, and a rash of rival startups looking to get their own piece of the lucrative ride-hailing market. But the latest attempt to challenge the US company’s hegemony in the taxi app market is a different beast. Perhaps realizing the difficulties in relying on regulation to keep Uber out, taxi drivers in Spain announced this week plans to create their own app.

            This is not the first time taxi drivers have tried to beat Uber and its ilk at their own game. The last few years have seen a rash of rival apps brought out by taxi drivers, but this approach faces considerable challenges, not least winning over customers from big, established brands with multi-billion dollar budgets.

          • Wells Fargo blackballed employees who refused to commit fraud, forcing them out of the industry forever

            Earlier this month, Planet Money aired an interview with a Wells Fargo whistleblower who was fired for trying to alert the bank to the millions of criminal frauds being committed against its customers, and we learned that the whistleblower had been added to a confidential blacklist used by the finance industry, preventing her from ever getting work in the industry again.

            This week’s Planet Money (MP3) airs an interview with another Wells Fargo whistleblower who resigned when the bank made him recant his complaints to upper management, and then put pressure on him to engage in the same frauds as his colleagues. This whistleblower, too, was unable to get work at any other bank, and it wasn’t until a sympathetic hiring manager at a rival bank told him confidentially that he had been blacklisted that he found out why.

            The blacklist is called “U5,” and it’s maintained by the finance institutions as a way of alerting each other to fraudsters who are fired for breaking finance rules. The list was designed to protect banks from fraud, but it has no defenses against fraudulent banks.

        • AstroTurf/Lobbying/Politics

          • Dems should blame Hillary, not Comey, for the ‘October surprise’

            Before Democrats burn James Comey in effigy, they should think about how the FBI director came to have an outsized influence in the election in the first place.

            It’s not something Comey sought or welcomed. A law enforcement official who prizes his reputation, he didn’t relish becoming a hate figure for half the country or more. No, the only reason that Comey figures in the election at all is that Democrats knowingly nominated someone under FBI investigation.

            Once upon a time — namely any presidential election prior to this one — this enormous political and legal vulnerability would have disqualified a candidate. Not this year, and not in the case of Hillary Clinton.

          • WikiLeaks: Clinton Foundation Plagued by Corruption and Conflict

            On November 1, WikiLeaks released an email from Clinton campaign chair John Podesta that provided perspective into the corrupt inner conflicts of the controversial non-profit the Clinton Foundation.

            “I cannot stress enough that if this is not handled appropriately it will blow up,” wrote Tina Flournoy, Bill Clinton’s chief of staff, in an April 8 2015 email to Podesta. The subject of the email was “CHAI” referring to the Clinton Health Access Initiative.

            The day before, on April 7, Flournoy noted in an email to Podesta and other Clinton staff, “do you guys know where we are – as of today – on CHAI? That needs to be discussed – but he’s about to lose it if we don’t wrap the call.”

            A 2015 New York Times article explained the tensions between CHAI CEO Ira Magaziner, and the rest of the Clinton Foundation, based on a performance review of Magaziner and by CHAI’s board, an influential member of which is Chelsea Clinton. “Ira’s ‘paranoia’ was mentioned by several board members to encompass Ira’s general mistrust of the board and its intentions,” the performance review noted.

          • CNN Gets Caught in Cheating Scandal

            That’s not the way CNN and Brazile reacted when exposed by the WikiLeaks emails. In the first incriminating email, Brazile told the Clinton team, “From time to time I get the questions in advance” and shared a question on the death penalty that Clinton would be asked on CNN’s March 13 town hall.

          • Hillary Supporters Are Still Trying To Pretend Nothing’s Wrong, And It’s Hilarious

            If you want to have an easy condescending laugh at someone else’s expense (and who doesn’t?), type the words “non story” into the Twitter search bar and look how many Hillary Clinton supporters are using that phrase to try and spin away the FBI’s discovery of new evidence pertinent to the criminal investigation of their candidate. Use quotation marks. You can do it with Facebook’s search function too, just make sure you click “Latest” to get the last few days’ worth of spin.

          • Corruption is the cornerstone of the Clinton campaign

            Reopening Hillary Clinton’s FBI investigation isn’t a political ploy, nor is it an “October Surprise.” But it could be God’s early Christmas gift to America.

            Hillary Clinton’s top aide, Huma Abedin, says she doesn’t know how her emails showed up on husband Anthony Weiner’s computer. The FBI stumbled upon another treasure trove of Clinton-related emails while investigating Abedin’s now estranged husband, who is under investigation himself for allegedly exchanging lewd messages with a 15-year old girl.

            Additional emails released in August found that Abedin carelessly toted around classified government information in her car, once asking Clinton’s personal assistant to intercept “a bunch of burn stuff in the pocket of my front seat” she’d left unattended.

            If this wasn’t so incredibly dangerous it would be Saturday Night Live-worthy.

            Despite how we feel about WikiLeaks, Americans should be thanking the good Lord the belly of the beast that is Hillary Clinton has been exposed for what it is. Emails have revealed, as the old song goes, corruption so high, you can’t get over it, so wide, you can’t get around it, and so deep, you can’t get under it.

          • Debunking Trump’s “secret server”

            This is nonsense. The evidence available on the Internet is that Trump neither (directly) controls the domain “trump-email.com”, nor has access to the server. Instead, the domain was setup and controlled by Cendyn, a company that does marketing/promotions for hotels, including many of Trump’s hotels. Cendyn outsources the email portions of its campaigns to a company called Listrak, which actually owns/operates the physical server in a data center in Philidelphia.

            In other words, Trump’s response is (minus the political bits) likely true, supported by the evidence. It’s the conclusion I came to even before seeing the response.

            When you view this “secret” server in context, surrounded by the other email servers operated by Listrak on behalf of Cendyn, it becomes more obvious what’s going on. In the same Internet address range of Trump’s servers you see a bunch of similar servers, many named [client]-email.com. In other words, trump-email.com is not intended as a normal email server you and I are familiar with, but as a server used for marketing/promotional campaigns.

          • Clinton Loyalist Thought Super PAC Coordination With Campaign Was “Skirting if Not Violating Law”

            Neera Tanden, president of the liberal Center for American Progress and policy director for Hillary Clinton’s 2008 presidential campaign, is arguably Clinton’s most fervent supporter. In one of the hacked emails to and from Clinton campaign chairman John Podesta published by WikiLeaks, Tanden emphasized that “I would do whatever Hillary needs always.”

            But as a recently released email chain shows, even Tanden was concerned in May last year that plans of a pro-Clinton Super PAC to directly coordinate with the campaign were “shady” and “skirting if not violating [the] law.”

            That Super PAC’s coordination with the Clinton campaign has since become the subject of a complaint to the Federal Election Commission from the Campaign Legal Center, a Washington, D.C., watchdog organization.

          • Susan Sarandon Goes Full ‘Bernie Or Bust,’ Endorses Jill Stein

            Actress and activist Susan Sarandon is backing Green Party presidential candidate Jill Stein instead of Democratic nominee Hillary Clinton.

            In a letter published on Stein’s campaign website, Sarandon cites Clinton’s lack of support for a $15 minimum wage and her silence on the Dakota Access Pipeline as some of her reasons for not supporting the candidate.

            “Fear of Donald Trump is not enough for me to support Clinton, with her record of corruption,” Sarandon’s letter reads. “Now that Trump is self-destructing, I feel even those in swing states have the opportunity to vote their conscience.”

            Sarandon was a vocal champion of Sen. Bernie Sanders (I-Vt.) throughout the Democratic presidential primary, and was among his “Bernie or bust” supporters who said they likely wouldn’t back Clinton’s candidacy if the senator lost the primary.

          • Thankin’ Stein

            Green Party candidate Jill Stein has not endorsed Donald Trump, and she has expressed wariness of either Trump’s or Clinton’s winning the presidency.

          • WikiLeaks: ‘Kept Me Out of Jail’: Top DOJ Official Involved in Clinton Probe Represented Her Campaign Chairman

            The Justice Department official in charge of informing Congress about the newly reactivated Hillary Clinton email probe is a political appointee and former private-practice lawyer who kept Clinton Campaign Chairman John Podesta “out of jail,” lobbied for a tax cheat later pardoned by President Bill Clinton and led the effort to confirm Attorney General Loretta Lynch.

          • Clinton aide advised: ‘Dump all those emails’

            Hillary Clinton’s campaign chairman advised a longtime aide that they were “going to have to dump all those emails” on the day that a report revealed Clinton’s exclusive use of a private email server while secretary of State, according to stolen emails released Tuesday by WikiLeaks.

            “Not to sound like Lanny, but we are going to have to dump all those emails so better to do so sooner than later,” says the March 2015 message, labeled as from John Podesta to Cheryl Mills and apparently referencing longtime Clinton confidant Lanny Davis.

            “Think you just got your new nick name,” Mills replied.

            Clinton campaign officials have refused to confirm the authenticity of the emails, which are believed to have been stolen from Podesta’s personal account by Russian government hackers.

            Previously released emails have revealed some advisers were frustrated that Clinton hadn’t made information about the server public sooner.

            “Why didn’t they get this stuff out like 18 months ago? So crazy,” policy adviser Neera Tanden wrote to Podesta that same evening, March 2, 2015.

            “Unbelievable,” Podesta replied.

          • All The Dumb Sh!t Trump Has Done As Nominee In One

            Donald Trump has never met a person he didn’t want to publicly shame. Google the words “Donald Trump feuds” and you’ll get hundreds of articles detailing spats with random people like world-renowned architect Frank Gehry and comedian Jerry Seinfeld, who, in the fallout of his feud with Trump, said, “If God gave comedians the power to invent people, the first person we would invent is Donald Trump.”

          • Ajamu Baraka Makes His Case to the People of Baltimore

            The Real News profiles scholar, human rights activist and Green Party Vice Presidential Candidate Ajamu Baraka on a recent visit to Baltimore

          • CNN Debate Attendee Reacts to Her Question Being Leaked to Clinton Campaign

            On Tuesday’s Happening Now, Fox’s Jenna Lee spoke with the woman who asked the question that former CNN contributor Donna Brazile gave to Hillary Clinton‘s campaign before a CNN presidential debate.

            Lee-Anne Walters identified herself as the “woman with a rash” who wanted to ask Clinton about her plan to address the poison water crisis that continues to afflict Flint, Michigan. Hacked emails from WikiLeaks revealed that when Brazile was still with her old network, she somehow got hold of Walters’ question, and then sent campaign chairman John Podesta advanced notice of what was coming.

            When asked how she felt about the news, Walters said that Clinton “should be disqualified because she had had an advantage she shouldn’t have had.” Walters also said that she was “disgusted” by Clinton’s answer, describing it as a “cop-out” that would not adequately address the lead in the city’s water.

          • Make America Think Again: Why You Should Consider Jill Stein

            You just cannot make up the sort of things we have seen this wild, sordid election cycle. Is it any wonder that sixty percent of Americans think that we need another political party in the United States?

            A vote for Jill Stein would help build such a party. The Greens have been around since 1984 and have had some limited election successes. This year, they have managed to get an all time high number of states, 45, including the District of Columbia, that feature their candidate, Jill Stein, on the Presidential ballots. This came about during an all out effort by the Greens for ballot access across the country. Many Bernie Sanders supporters flocked to the Stein campaign after his withdrawal from the Democratic Presidential race.

          • They Don’t Care About Us

            The Podesta emails show that Democratic power brokers won’t reward labor’s unwavering loyalty or record contributions.

          • Presidential Candidates Dr. Jill Stein & Gov. Gary Johnson [Pt. 1]

            Dr. Jill Stein is a mother, physician and longtime teacher of internal medicine. Also the co-author of two major environmental reports — In Harm’s Way: Toxic Threats to Child Development and Environmental Threats to Healthy Aging — she has dedicated years of public service as an environmental-health advocate. She has testified before numerous legislative panels as well as local and state governmental bodies, playing a key role in the effort to get the Massachusetts fish advisories to better protect women and children from mercury contamination. Her first foray into politics was in 2002, when she ran for Governor of Massachusetts. Dr. Stein is again running to be the Green Party nominee for President in 2016.

          • Democratic megadonor bankrolls ‘Republicans for Clinton’ super PAC

            Most of the money behind an upstart “Republicans for Clinton” super PAC has come from billionaire Democratic megadonor Dustin Moskovitz, a co-founder of Facebook.

            According to a Center for Public Integrity review of new campaign finance filings, Moskovitz has contributed $250,000 to the R4C16 super PAC. That represents about 70 percent of the group’s income through Oct. 19.

            R4C16 nevertheless touts itself as “a grassroots movement” of “concerned Republicans who are committed to vote for Hillary Clinton for president to defeat Donald Trump.”

            During the final presidential debate last week in Nevada, the super PAC sponsored an anti-Trump mobile billboard with the message “DON’T GROPE. VOTE,” which traversed the Las Vegas strip for hours.

        • Censorship/Free Speech

          • 15 Temples Vandalised In Bangladesh Over Facebook Post

            An angry mob vandalised at least five Hindu temples and attacked property in Bangladesh after an alleged Facebook post mocking one of Islam’s holiest sites, police and residents said Monday.

            Scores of people attacked the places of worship late Sunday in the eastern town of Nasirnagar after a local Hindu fisherman allegedly posted an edited photo on social media of a Hindu deity inside the black cube-shaped Kaaba in Mecca, Saudi Arabia.

            District police chief Mizanur Rahman said two Islamist groups had been demonstrating to demand the arrest and execution of the fisherman when a group of between 100 and 150 men broke away and attacked the temples.

            A local Hindu community leader said at least 15 temples were vandalised and numerous Hindu idols were smashed during the hour-long rampage.

          • Turkey detains editor of secular opposition newspaper Cumhuriyet and bans media reporting on it

            Turkish courts have ordered a media blackout on reporting the detention of the editor-in-chief of secularist opposition newspaper Cumhuriyet.

            Murat Sabuncu was detained while authorities searched for executive board chairman Akin Atalay and writer Guray Oz, the official news agency Anadolu said.

            Police were searching the homes of Mr Atalay and Mr Oz, the agency added.

            CNN Turk said police have issued detention warrants for 13 of the paper’s journalists and executives.

          • Louis Smith banned for two months by British Gymnastics after ‘mocking Islam’ in leaked video

            Louis Smith has been given a two-month ban by British Gymnastics after he appeared to mock Islam in a video that emerged last month.

            The four-time Olympic medallist has already apologised after a video, filmed by Smith that included his friend and retired fellow gymnast Luke Carson, mimicked Islamic prayer practices.

            The incident happened a month after Smith competed at the Rio Olympic Games, where he won a silver medal in the men’s pommel horse.

            He issued a statement soon after the video was leaked to the media to say he was “deeply sorry” for his “thoughtless actions”. The 27-year-old also said that his heavy training regime during his gymnastic career has not allowed him to “behave like an idiot” when he was younger, but accepted that his actions were inappropriate nonetheless.

          • YouTube Signs Landmark Deal to End Music Video Blocking in Germany

            After years of legal battles, YouTube and German music rights group GEMA have reached a landmark licensing agreement. As a result, Germans now have access to tens of thousands of music videos that were previously “not available” in their country.

          • YouTube Censors Video on … Left-Wing Censorship

            What do you suppose happens on YouTube to a video that is a “discourse on the First Amendment and the tactics that progressives are using to limit speech and political engagement by conservatives”? Well, according to the Wall Street Journal, it falls victim to an algorithm with absolutely no sense of irony.

            A video titled “The Dark Art of Political Intimidation” was posted last week by WSJ columnist Kimberly Strassel as a PragerU lecture. “Within several hours of PragerU posting the video,” said a WSJ editorial, YouTube placed it in ‘restricted mode,’ making it inaccessible to schools, libraries and young Americans whose parents have enabled YouTube technology filters.”

          • YouTube Finally Buries The Hatchet With GEMA, Meaning People In Germany Can Watch Videos Again

            Almost four years after we noted that the fight between German collection society GEMA and YouTube had gone on way too long, it looks like it’s finally been settled. If you don’t know, way back when, GEMA, which is effectively a mandatory copyright royalty collector in Germany, demanded insane rates for any music streaming on YouTube. Apparently, it initially argued that a stream on YouTube was no different than a purchase on iTunes, and thus it should be paid the same rate. In 2009, it asked for 17 cents per video view (which was a decrease from the 37.5 cents per stream it had asked for earlier). 17 cents. Anyone who knows anything about how the internet works and how advertising works knows that’s insane. YouTube was paying out a decent chunk of its advertising revenue to other collection societies at a fraction of a penny per view, which is inline with the potential ad revenue.

          • Chinese Live-Streaming Apps Employing Censorship Against Rivals

            Chinese video services have long censored taboo topics to promote the government’s vision of a “harmonious society.” Now some popular providers are turning the same tools on each other, using blacklists to shut out rival platforms, according to a research group.

            Live-streaming video services in China have grown into a $2.5 billion industry by featuring everything from celebrities cooking lunch at home to women seductively eating bananas. But the competition for fickle viewers is such that several of the largest players have quietly scrubbed mentions of rivals along with political red-flags such as party leaders’ names, according to Citizen Lab at the University of Toronto.

          • Researchers reverse-engineer Chinese streaming services to learn how they’re censored

            As live streaming apps surge in popularity in China, the companies profiting from the craze are pulling out all the stops to censor millions of users and avoid the wrath of a government intent on maintaining a tight control over the flow of information.

            A new report from the University of Toronto’s Munk School of Global Affairs describes how China’s biggest live streaming apps work to shut down discussion on everything from sex and gambling to political gaffes and government corruption.

          • Civil rights groups take Facebook to task over content censorship
          • Rights groups ask Facebook to clarify policies on content removal
          • Facebook accused of censorship
        • Privacy/Surveillance

          • Clinton Emails Could Help ex-NSA Contractor Who Took Terabytes Home, Attorneys Say

            In the four years Hillary Clinton sent and received State Department correspondence using a private and insecure email system, Harold T. Martin III allegedly stockpiled classified information inside his Maryland home and an unlocked shed.

            Martin faces charges for alleged theft of government documents and mishandling classified information that carry up to 11 years in prison, and he’s been behind bars since his August arrest, with prosecutors saying they intend to file more serious Espionage Act charges, often used by the Obama administration to go after leakers and whistleblowers.

          • Ex-FBI Chief Reviews Security For Booz Allen After NSA Contractor Arrest

            Consultant firm Booz Allen Hamilton has engaged the services of former FBI director Robert Mueller for an external review of its security practice after one of its employees contracted with the National Security Agency (NSA) was arrested on charges of stealing classified information, reports Reuters. In three years this is the second Booz Allen staff with NSA to have been involved in a controversy, the first being Edward Snowden who leaked classified files in 2013.

            Prosecutors allege that Harold Thomas Martin had been downloading secret documents for over two decades and stolen at least 50 terabytes of classified information. The files seized from Martin’s home include “specific operational plans against a known enemy of the United States and its allies.”

          • ShadowBrokers Release More Alleged Equation Group Data

            Data purports to show configuration details of servers that NSA allegedly hacked and used to host exploits

            For the second time in the last three months, a group that calls itself ShadowBrokers has publicly released data allegedly purloined from the Equation Group, an outfit that many consider to be the cyber hacking arm of the National Security Agency (NSA).

            In August, ShadowBrokers rattled many in the security industry when they leaked details on highly classified hacking tools and exploits that they claimed the NSA had developed and used over the years for breaking into systems belonging to US adversaries.

          • ShadowBrokers dump Equation group hacked servers in publicity push
          • Shadow Brokers Dump List of Servers Hacked by the NSA’s Equation Group
          • ShadowBrokers Dumps Lists of Equation Group Hacked Servers
          • ShadowBrokers Data Dump Leaks Compromised Servers Used By NSA For Hacking Operations
          • Despite its Nefarious Reputation, New Report Finds Majority of Activity on the Dark Web is Totally Legal and Mundane

            Dark web data intelligence provider Terbium Labs has conducted the industry’s first data-driven, fact-based research report that looked to identify what’s really taking place on the far corners of the Internet. For most, the term dark web immediately conjures thoughts of illegal drug sales, pornography, weapons of mass destruction, fraud and other criminal acts. The reality however is that the bulk of activity appearing on the dark web is much like the content and commerce found on the clear web. In fact, research found that nearly 55% of dark web content is legal.

            “What we’ve found is that the dark web isn’t quite as dark as you may have thought,” said Emily Wilson, Director of Analysis at Terbium Labs. “The vast majority of dark web research to date has focused on illegal activity while overlooking the existence of legal content. We wanted to take a complete view of the dark web to determine its true nature and to offer readers of this report a holistic view of dark web activity — both good and bad.”

          • Researchers Claim AI Can Identify Gang Members on Twitter

            Social media feeds contain a wealth of personal information: daily gripes, tastes in music and movies, and plans for nights out. It’s no wonder that police are interested in mining that data for insights into where crime might spring up.

            But can these digital artifacts, taken together, say anything deeper about who you really are? A number of experts believe so: In the near future, algorithms trained on this sort of information may make important decisions about individuals.

            Here’s a recent example. Researchers from the Ohio Center of Excellence in Knowledge-enabled Computing (Kno.e.sis) at Wright State University, in a paper posted to the arXiv preprint server, say they’ve devised a deep learning AI algorithm that can identify street gang members based solely on their Twitter posts, and with 77 percent accuracy.

          • How Canada’s Anti-Cyberbullying Law Is Being Used to Spy on Journalists

            Patrick Lagacé, a columnist for Montreal’s La Presse newspaper, says that police told him he was a “tool” in an internal investigation when they tapped his iPhone’s GPS to track his whereabouts and obtained the identities of everyone who communicated with him on that phone.

            Lagacé alleges that this surveillance was designed to intimidate and discourage potential sources within the Montreal police department from approaching him with information for his story.

            Police obtained a warrant for this under the hugely controversial Bill C-13, which gave investigators new powers, privacy lawyer David Fraser noted in an interview. The bill was initially sold as combatting cyberbullying and the unwanted publication of intimate images online, also known as “revenge porn.”

            “These laws are presented with certain scenarios in mind, but these are laws of general application that can be used for any offence,” Fraser said. “We need to be very careful in parsing, and frankly, not believing, the objectives that politicians use [when selling the public on the need for these laws]. We need to cut through that and look at the substance of the law to see how they can be used, and more importantly, abused.”

        • Civil Rights/Policing

          • These Native American Dakota Access Pipeline protesters say they were held in kennels after being arrested

            After a day of clashes between police and demonstrators, at least 140 protesters were arrested near the Dakota Access Pipeline route last Thursday. Now some of the Native American activists arrested say they were kept in dog kennel-like enclosures and that police wrote identification numbers written on their arms.

            One protest coordinator who was arrested, Mekasi Camp-Horinek, told the Los Angeles Times police wrote a number on his arm and kept him and his mother in a mesh enclosure that appeared to be a dog kennel, which did not have any bedding or furniture.

          • Christian priest pelted with stones by children shouting ‘Allahu Akhbar’

            The Ethiopian vicar was visiting the town of Raunheim on the outskirts of Frankfurt when the pre-teens started throwing stones at him.

            Dressed in traditional priest’s gear and wearing a cross around his neck, the 47-year-old was walking to the Russian Orthodox chapel in Frankfurter Straße with a local priest, who wished to remain anonymous, when he was attacked.

            The three children, aged between 10 and 12-years-old, shouted “Allahu Akhbar” as they threw the stones, the other priest who was visiting from a nearby church said.

          • Dakota pipeline protesters say they were detained in dog kennels; 268 arrested in week of police crackdown

            Tens of thousands of people have checked in on Facebook at the Standing Rock Indian Reservation over the past few days. They are expressing solidarity with the protests against the Dakota Access pipeline in North Dakota, which have faced an increasingly brutal backlash from police.

            Native American activists on the ground recently told reporters they had been detained in dog kennels after being arrested at protests against the proposed pipeline. Other protesters have been pepper-sprayed by police and targeted with beanbag bullets as the militarized police crackdown has escalated.

            For months, indigenous groups at Standing Rock have led protests against the $3.8 billion pipeline, which will transfer oil nearly 1,200 miles, from North Dakota south to Illinois.

            Native Americans, who call themselves water protectors rather than protesters, warn that the pipeline will contaminate their lone source of drinking water and pollute their land. Thousands of environmental and social justice activists from around the country have joined their demonstrations in solidarity.

          • Armed migrants fight running battles in the French capital

            A MIGRANT turf war erupted into violence on the streets of one of Paris’ trendiest neighbourhoods early this morning as asylum seekers beat each other to a pulp with wooden clubs.

          • Canadian Police Use Cell Tower Dumps To Text 7,500 Possible Murder Witnesses

            The police are utilizing “dumps” from cell towers in the area to obtain these phone numbers. And that’s all they’ve obtained, apparently. Using the list of connected phones in the area at the time of the murder, the police are sending text messages asking recipients to fill out a website questionnaire to help police find the killer.

            As much as this might seem like an intrusion, it’s probably preferable to the alternative: sending out dozens of officers to question potentially thousands of witnesses. Obviously, it works out well for the police. But it also works out for citizens. Nothing obliges anyone to respond to the unsolicited texts and answering a few questions on a website is far less annoying than being questioned at home by officers peeking through open doors to see if they can spot anything resembling indicia of criminal activity. Why make the entire day a waste? Why not make a few ancillary arrests while investigating an unrelated crime?

            Unfortunately, it appears ignoring the message (or sending back “UNSUBSCRIBE”) isn’t going to keep the cops from using your phone for their communications.

          • DOJ Finally Releases Its Internal, Mostly-Vague CFAA Prosecution Guidelines

            I’d imagine the DOJ is more concerned about crafty cybercriminals beating them in the tech arms race than it is about legislators’ inability to reform the CFAA (something the DOJ routinely opposes). The “Intake and Charging Policy” memo [PDF] for the DOJ’s prosecution of cybercrimes lists a number of factors to be considered before pursuing federal charges.

            The first key is the sensitivity of the information or system accessed “without authorization,” followed by national security considerations and economic impact. Public safety is also a factor. The document points out that information obtained without authorization can be deployed to stalk and harass officials and lower level members of the general public.

            But the definition of “unauthorized access” isn’t explored adequately in the legal memo, leaving this to be answered on a case-by-bad case basis. The prosecutions of Aaron Swartz and Andrew “Weev” Auernheimer suggest the DOJ allows this definition to be set by the complainant rather than by policy. When MIT or AT&T complain, the government listens.

          • If You Want To Believe This Country Is Falling Apart, Just Ask Those Who Are Supposed To Be Keeping It Together

            Nothing sells like fear. And the Department of Public Safety is in need of some sales. There’s $800 million in border security dollars at stake. At least. The DPS would like $300 million more this year because it’s just damn unsafe to share a border with a foreign country.

        • Internet Policy/Net Neutrality

          • After North Carolina Law Bans Municipal Broadband, One ISP Gives Gigabit Connections Away

            Back in August, we noted how the FCC lost an incredibly important case regarding municipal broadband. In short, the FCC tried to dismantle state-level protectionist laws, written by incumbent ISPs, that hamstring towns and cities from building their own broadband networks or striking public/private partnerships for broadband — even in areas those same incumbent ISPs refused to upgrade. The FCC had tried to claim that its congressional mandate to ensure “even and timely” broadband deployment allowed it to strip away any part of these laws that hindered broadband expansion.

            But the courts argued that the FCC lacks this authority, forcing the agency to acknowledge it was giving up on this fight. But there are still countless municipal broadband providers in the 19 states that have passed these laws that can’t launch or expand existing service lest they run face-first into a law written by Comcast, AT&T, Verizon, or CenturyLink lawyers. And there are millions of customers that are incredibly frustrated by the lack of broadband market competition, resulting in the expensive, inconsistent broadband connections most of us “enjoy” today.

          • Canada To Debate Banning ‘Zero Rating’ This Week

            While the United States finally passed net neutrality rules this year, the FCC’s decision to not ban zero rating (exempting some content from usage caps) has proven to be highly problematic. ISPs like Comcast, AT&T and Verizon have all begun exempting their own content from usage caps, putting competing services like Netflix, Amazon and Hulu (or smaller startups) at a disadvantage. The loophole has also spawned new confusing options from Sprint that throttle games, music and video by default, unless a consumer is willing to pony up $20 or more extra to have those services actually work as intended.

            So yes, the United States passed net neutrality rules, but its unwillingness to tackle zero rating means that net neutrality is now being hamstrung anyway — now just with regulatory approval.

        • Intellectual Monopolies

          • Germany pours cold water on takeover bids as concern regarding China’s IP-driven M&A activity spreads

            A number of prospective Chinese takeovers of German high-tech businesses have been suspended by Berlin pending further investigation of their potential economic impact and national security implications. The German government’s intervention does not bode well for Chinese buyers, which have been pinning their hopes of procuring strategically valuable IP on Europe after missing out on US acquisitions due to similar concerns.

            Writing in Die Welt at the weekend prior to departing for Beijing to meet with counterparts, German vice chancellor and economy minister Sigmar Gabriel was markedly critical of China’s approach to acquiring foreign technology. While claiming that China protects its own businesses from foreign buyouts through the imposition of “discriminatory requirements”, Gabriel accused the country’s high-tech industries of “going on a shopping tour here with a long list of interesting companies” with the clear intention of gaining control of strategically important technologies. “Nobody can expect Europe to accept such foul play of trade partners,” he added.

          • Ottiglio Leaves IFPMA For Consultancy In Geneva [Ed: Mario Ottiglio to use connections acquired in public corridors in Europe to push private US Big Pharma interests]
          • WIPO Committee Debates SDGs, Review Of Development Agenda Recommendations

            The World Intellectual Property Organization Committee on Development and Intellectual Property (CDIP) is meeting this week with an agenda including the presentation of a first review on how well WIPO implemented its Development Agenda Recommendations from 2008 to 2015. Also on the agenda is a discussion on what United Nations Sustainable Development Goals can be applied to WIPO’s work, and what the role of WIPO is in technology transfer.

          • Proposal By WHO To Increase Country Contributions Receives Mixed Reactions

            As the head of the World Health Organization warned of funding shortfalls at this week’s financing dialogue, she also proposed to raise assessed country contributions by 10 percent to help mitigate the situation. However, countries had a different take on the suggestion, which is expected to be further considered in the discussions on the budget for 2018/2019, at the Executive Board meeting in January, and at the annual World Health Assembly next May.

          • SCA Hygiene Laches Oral Arguments: How Do we Interpret Congressional Silence?

            Sitting in the background is the Supreme Court’s parallel copyright decision in Petrella v. MGM (2014) holding that the doctrine of laches cannot bar a claim for legal damages brought within the three-year statutory limitations of copyright law. In its opinion, the Federal Circuit distinguished Petrella – finding that in this situation patents should be treated differently than copyrights.

            Martin Black (Dechert) argued for petitioner-patentee SCA Hygiene and suggested that Petrella paves the way: “There is nothing in the Patent Act which compels the creation of a unique patent law rule, and if the Court were to create an exception here, that would invite litigation in the lower courts over a wide range of Federal statutes.”

          • Trademarks

            • CJEU tackles meaning of “so” in trade mark case

              Does the word “so” have a laudatory function when used on its own? The CJEU has struggled to resolve that question in its latest EU trade mark ruling

            • Video Game Voice Actor Strike Devolves Into Petty Trademark Dispute

              For those who don’t follow the video game industry closely, you may not be aware that there is currently a worker’s strike by voiceover actors belonging to SAG-AFTRA against some of the larger game publishers out there. The union and ten or so publishers have been attempting to negotiate a new labor agreement for something like two years, with the sticking point being additional compensation based on game sales. While this concept may sound foreign to those of us that grew up with the gaming industry in its infancy, the explosion in the market and its evolution as an artform certainly warrants the same consideration talents get from other entertainment industries, such as television and film. After all, why shouldn’t game voiceover actors be just as frustrated with Hollywood-style accounting as their on-screen counterparts?

              And, yet, because this is a labor dispute, of course there had to be a petty wrong-turn along the way, which brings us to how SAG-AFTRA is now firing off demands that a PR firm hired by the game studios stop trying to influence the public because of a lame trademark claim. The key issue appears to be that this PR firm is using domain names and social media handles that include the SAG-AFTRA union name.

          • Copyrights

            • Copyright Office Fucks Over Thousands Of Sites With Plans To Remove Their DMCA Safe Harbors

              If you run any kind of website it’s super important that you file with the Copyright Office to officially register a DMCA agent. This is a key part of the DMCA. If you want to make use of the DMCA’s safe harbors — which create a clear safe harbor for websites to avoid liability of infringing material posted by users — then you have to first register with the Copyright Office. Larger corporate sites already know this, but many, many smaller sites do not. This is why for years we’ve posted messages reminding anyone who has a blog to just go and register with the Copyright Office to get basic DMCA protections (especially after a copyright troll went after some smaller blogs who had not done so).

              A few months back, we noted, with alarm, that the Copyright Office was considering a plan to revamp how it handled DMCA registrations, which had some good — mainly making the registration process cheaper — but a really horrific idea of requiring sites to re-register every three years or lose their safe harbor protections.

            • Star Athletica arguments: Will SCOTUS find a uniform test for useful articles?

              Supreme Court oral arguments in Star Athletica v Varsity Brands touched on copyright, cheerleader uniforms and camouflage, with observers uncertain the court will come up with an appropriate test for useful articles

              The Supreme Court heard arguments in Star Athletica v Varsity Brands on Monday in a copyright dispute over designs for cheerleading uniforms. The question presented was: “What is the appropriate test to determine when a feature of a useful article is protectable under section 101 of the Copyright Act?”

            • Reykjavik: Icelandic Pirates Triple Result, But Not Largest Party

              The Icelandic Pirate Party has made a record election. Early vote counts place Pirates at 14 percent, for nine ten seats of the 63-seat world’s oldest Parliament. As the victory party draws to a close and the results slowly finalize, it’s worth looking a little at what comes next.

              Pirate Parties keep succeeding, although on a political timescale. It started out a little carefully with getting elected to the European Parliament from Sweden, then to multiple state parliaments in Germany, city councils all over Europe, the Czech Senate, and the Icelandic Parliament, all in a decade’s insanely hard volunteer work.

        ]]>
        http://techrights.org/2016/11/02/minoca-os-under-gpl/feed/ 0
        Links 1/11/2016: Linux Hallowee, Debian Drops PowerPC http://techrights.org/2016/11/01/debian-drops-powerpc/ http://techrights.org/2016/11/01/debian-drops-powerpc/#comments Tue, 01 Nov 2016 16:51:56 +0000 http://techrights.org/?p=96530

        GNOME bluefish

        Contents

        GNU/Linux

        Free Software/Open Source

        • 6 ways to use open tools to better support Indian languages

          India is a large and a populated country that makes up a large base of Google consumers. So in recent years, Google’s widened support of world languages for its various products has been a blessing. It has specifically helped Indian people grow their use of and participation on the Internet.

          For one, Google Summer of Code helps students experiment with and build prototypes that enhance language-based software. Another way is through Google Translate, a web and app-based platform that provides machine translation from one language to another. It is predominantly maintained and serviced by volunteer contributions. Yet, there are more ways Google can support great inclusivity through the support of world languages; particularly people speaking South Asian-languages.

        • FreeDOS 1.2 RC1 Released
        • FreeDOS 1.2 RC1

          You may know that I am involved in many open source software projects. Aside from my usability work with GNOME, I am probably best known as the founder and project coordinator of the FreeDOS Project.

        • Minoca OS: A new open source operating system

          Today we’re thrilled to announce that Minoca OS has gone open source. We are releasing the entirety of the Minoca OS source code under the GNU GPLv3. We’re excited to build a community of users and developers around this new operating system, and we need help. You can check out the source at https://github.com/minoca/os. You can also check out our repository of third party source packages here. If you’re just looking to download the latest stable binaries of Minoca OS, head to the download page.

        • Minoca OS goes open source
        • What software documentation can learn from tabletop gaming

          That was it. Those were the (altered for the sake of this example) instructions. Three steps and one big shout that hey, don’t look now but you’re playing the game already, and you’re up and running.

          To be fair, there were a lot of nuances that those three steps did not in any way cover. Luckily, there were three more paragraphs that the author snuck in after the “You’re playing!” pronouncement, providing more details on the types of cards, what they mean, and so on.

          And there were lots of times during those first few games where we had to stop game play and scratch our heads, asking “Wait, we can’t play this card after that card can we? What happens now?” For an answer, we went back to the rules and looked in the little reference section on the back of the rule sheet, learning about the technicalities of the game as we went along.

          But you see, it tricked us; we didn’t feel like we were reading the instructions because we were actively playing the game. We weren’t reading instructions, as such; we were using the rules as reference. It was practically part of the game.

        • How Do We Encourage Technologists in the Public Interest?

          As I mentioned when the Recompiler interviewed me, my inspirations and role models in technology are technologists who serve the public interest. The person who introduced me to free and open source software, Seth Schoen, is a kind teacher and a rigorous thinker who deploys his software engineering expertise at the intersection of technology and activism. I was lucky enough to meet the right people early in my career so I see public interest technology as a desirable and viable career path AND something you can integrate into a career that doesn’t focus on nonprofit/government work — but not enough people know about it, and not enough institutions encourage it.

          How do we help encourage and employ more Seths, more Bruce Schneiers, more Eleanor Saittas, more Kelsey Gilmore-Innises? If you were to say “Sumana, that’s a pretty infosecurity-centric list there, what about people who are more about analytics to enable policy work, or the web developers at 18F, or –” then I would agree with you! This is a broad and deep field, and thus a broad and deep question.

        • Using Open Source to Roll Back Prices at Walmart

          What do you do when your e-commerce site adds at least a million new products every month, and sometimes more than a million in a single week? According to Jeremy King, who is senior vice president and CTO for Walmart Global eCommerce, one of the things you do is invest in open source, both as a user and as a developer. But how do you convince the suits in the front office to release code developed in house as open source?

          “The good part about WalmartLabs is that we sort of didn’t ask for permission,” he admitted last week before a crowd of over 2,000 at the All Things Open conference in Raleigh, North Carolina. He was being interviewed on stage by ATO’s master of ceremonies, community manager Jono Bacon, in a “fireside chat” during the opening day keynote sessions. “We sort of started off with that approach. As we got bigger, obviously you don’t open source a product that you’ve spent resources on for a couple of years without really talking to the enterprise, so it really was a baby step as you go in.”

        • LendingCalc.com’s PUFIN Open Source Blockchain Tech May Be Marketplace Lending Answer

          In the wake of recent company shakeups and growing pains in the marketplace lending industry, the need for better transparency and industry tools for all participants has become a critical concern. PUFIN, an online and open source project to create free and global loan identifiers using blockchain technology, aims to deliver order and uniformity in a secure environment to the marketplace.

          Recent entrants into the market are proposing systems that reserve the right to charge fees at any time. The idea of a free enticement that allows for charging fees later may be the basis for a slow or incomplete industry adoption of online loans.

          LendingCalc.com‘s Ben McMillan and Mike Mazier may have the open source answer: They have filed to patent a fee-free system to use blockchain technology to generate unique identifiers for loans in line with the US Treasury’s whitepaper “Opportunities and Challenges in Online Marketplace Lending.” The company is in the works to set up their system as an open source resource for the industry.

        • Web Browsers

          • Mozilla

            • 130 serious Firefox holes plugged this year

              Mozilla has shuttered more than 130 serious vulnerabilities reported by community hackers this year.

              The browser-backing outfit announced the statistics in a post covering its bug bounty program and broader information security efforts.

              More than 500 million users ran Firefox at the close of 2015. It’s since become the world’s second-most-used browser.

        • Oracle/Java/LibreOffice

          • Road to LibreOffice 5.3

            With the availability of the LibreOffice 5.3 Alpha, we have entered the road to LibreOffice 5.3, the next significant major release of the best free office suite ever developed. The software is in the early stage of the final development cycle, and as such should be installed only by expert community members skilled in quality assurance tasks, or involved in launch activities. Although in Alpha stage, LibreOffice 5.3 has an outstanding Coverity Scan score, as confirmed on October 20, with 0.01 defects per 1,000 lines of code (the image on the left is a screenshot of the Coverity Scan dashboard). LibreOffice 5.3 will be officially announced at the end of January 2017.

        • CMS

          • The Wix Mobile App, a WordPress Joint

            Anyone who knows me knows that I like to try new things — phones, gadgets, apps. Last week I downloaded the new Wix (closed, proprietary, non-open-sourced, non-GPL) mobile app. I’m always interested to see how others tackle the challenge of building and editing websites from a mobile device.

            I started playing around with the editor, and felt… déjà vu. It was familiar. Like I had used it before.

            Turns out I had. Because it’s WordPress.

          • WordPress and Wix Are Fighting About Open Source Software

            So WordPress and Wix are fighting one another – and I’m not talking about them competing for customers. Instead, the two website building heavyweights are having a brawl via the blogosphere.

          • Attackers use patched exploits to hit Joomla! sites
          • Joomla websites attacked en masse using recently patched exploits

            Attackers are aggressively attacking Joomla-based websites by exploiting two critical vulnerabilities patched last week.

            The flaws allow the creation of accounts with elevated privileges on websites built with the popular Joomla content management system, even if account registration is disabled. They were patched in Joomla 3.6.4, released Tuesday.

          • Georgia state government earns national recognition for web accessibility

            Georgia’s enterprise web platform runs on Drupal 7, which includes many accessibility features in its baseline code and structure. That makes it easier for any new site to build in accessibility from day one. This comes with the caveat that not all modules are accessible, and plenty can be coded and designed without accessibility in mind, meaning that just using Drupal does not make a site accessible to users with disabilities. That said, even in its original implementation with Drupal 7 in 2012, Georgia’s web publishing platform was built to meet federal accessibility standards (Section 508, for those of you interested in the details).

            From there, when the product team wanted to improve the platform’s underlying code to meet the more modern WCAG 2.0 AA accessibility guidelines, they were working from a flexible and scalable base.

        • Healthcare

          • How open source can change the face of healthcare

            The significant advances being made in technology over the past decade have introduced world changing solutions that are revolutionising how businesses operate.

            However, it is not only business which is reaping the benefits of technologies in the fields of cloud, big data, the IoT, artificial intelligence and others, areas such as

            healthcare are also being boosted.

            Numerous companies such as IBM, Google, Microsoft and more have all invested significantly in the area and have made great strides in placing their technologies in this field.

        • Pseudo-Open Source (Openwashing)

        • Funding

        • BSD

        • FSF/FSFE/GNU/SFLC

          • AMD’s HSAIL Front-End For GCC Might Finally Be Close For Merging

            There is finally an update on the proposed HSAIL front-end for GCC for supporting the BRIG binary form of the Heterogeneous System Architecture Intermediate Language.

            See that earlier article for more background information on the ongoing GCC HSA efforts that have been happening for a few years now. That HSAIL GCC front-end has been quiet since it was proposed back in May but now it looks like it may be close to going mainline.

        • Public Services/Government

          • France opens source code of three new simulators

            France is continuing to improve its fiscal transparency by opening the source code of three new algorithms, and has promoted use of this code through a hackaton called #CodeGouv.

            The three algorithms are used by the French administration to calculate:

            The cost of a car registration document which can change according to the geographical location or the type of vehicle;
            The legal bonus of an apprentice, which can vary according to the number of working hours;
            The penalty rate. The simulator assesses the interest the French administration should pay if payments are delayed.

            Read more

          • Slovakia: 40% ICT systems to use open source by 2020

            By 2020, 40% of public administration ICT systems in Slovakia should use open source software. The target for open source is part of the country’s ICT architecture, which was updated in September.

          • Nantes: ‘Surveys support switch to open source’

            When implementing free and open source desktop software, public administrations should gather feedback through user surveys, says Eric Ficheux, change management specialist at Nantes Métropole, France’s 6th largest city. “Good news comes only if you organise feedback”, he says, adding: “Survey data cannot be challenged by project opponents, and helps to defend against foul play.”

          • Ho Hum. Another City Switches To LibreOffice

            I knew that 15 years ago when OpenOffice.org came out with version 1.0. It’s still true today. Further, LibreOffice also works on GNU/Linux so another barrier to FLOSS (Free/Libre Open Source Software) has been broken.

        • Licensing/Legal

          • React’s license: necessary and open?

            React’s patent license (1) isn’t a bad idea, because the BSD license is not explicit about granting patent rights; and (2) probably meets the requirements of the Open Source Definition.

        • Openness/Sharing/Collaboration

          • What are the impacts of participatory budgeting in Europe?
          • Open Data

            • Slovakia to fully automate the publication of open data

              Slovakia will automate the publication of public sector information as open data as much as possible, and integrate this process in all government information processing systems. This is one of the main priorities in the National Concept of Public Information Services (Národná Koncepcia Informatizácie Verejnej Správy; NKIVS) that was adopted last month.

            • ODIC 2016: some case studies emerge in Open Contracting

              Start small, clearly demonstrate the impact, and adopt a standardised approach with civil society – these are among the lessons learnt arising from a session on Open Contracting, held as part of the Open Data International Conference (ODIC 2016). This event took place in Madrid at the beginning of October.

              Open Contracting is a way to make public procurement more transparent to citizens and a way to avoid corruption. But only 10% of countries are aligned on an Open Contracting basic standard, it was noted during the session. Data are published in open format. The Open Contracting Partnership has developed a data standard for Open Contracting, the goal of which is to “reflect the complete contracting cycle”, according to the website.

          • Open Hardware/Modding

            • Outdoor Gear Companies: It’s Time to Open-Source Your Technology

              Patagonia finally released the Yulex wetsuits this fall. Even more important, it also released the technology behind the rubber and the names of the factories that produced the suits. The company’s hope: to motivate other manufacturers to use fewer resource-intensive materials. “We knew from the beginning that we’re a very small player in the surf industry—there’s no way we’re going to disrupt that industry—but it was always our intention to invite other companies to use [the technology],” Hubbard says.

        • Programming/Development

          • Perl might be old school, but it continues to attract new users

            Earlier this year, ActiveState conducted a survey of users who had downloaded our distribution of Perl over the prior year and a half. We received 356 responses–99 commercial users and 257 individual users. I’ve been using Perl for a long time, and I expected that lengthy experience would be typical of the Perl community. Our survey results, however, tell a different story.

            Almost one-third of the respondents have three or fewer years of experience. Nearly half of all respondents reported using Perl for fewer than five years, a statistic that could be attributed to Perl’s outstanding, inclusive community. The powerful and pragmatic nature of Perl and its supportive community make it a great choice for a wide array of uses across a variety of industries.

            For a deeper dive, check out this video of my talk at YAPC North America this year.

        Leftovers

        • The Great “Cultural Appropriation” Pumpkin: Psst, Halloween Belongs To The Irish

          Yale lecturer Erika Christakis and her husband, professor Nicholas Christakis, were uglied out of the university after she dared to offend the crypussies that pass for college students these days by sending out the mildest call to let people express themselves as they wish on Halloween.

          The thing about all these tiny little authoritarian screechers on campus — they should spend more time going to class and learning the stuff of Western culture that promotes logical thought. Because they don’t bother to do the slightest bit of, “Hmm, where does this argument I’m supporting lead?”

        • How the White House will hand over social media accounts to Clinton or Trump

          The White House just published an overview explaining its plans for a “digital transition” between the departing Obama administration and the incoming 45th president of the United States. It details how each White House social media account (and position-specific handles like @POTUS, @FLOTUS, and @VP) will be transferred to the victor of November 8th’s presidential election. Since Obama is the first commander in chief to have a presence on most of these apps, there’s not much in the way of precedent for figuring out how it’s all supposed to work. So the White House developed some of its own.

          For the big ones, the switchover will happen on inauguration day: January 20th. That’s when either Hillary Clinton or Donald Trump will assume the @POTUS Twitter account, for instance. The White House says that the account’s followers (currently over 11 million) will carry over to the next Oval Office occupant, but tweets will be zeroed out so that the 45th president can start fresh. President Obama’s @POTUS tweet history will be moved over to a new account, @POTUS44. That page is already live, though it’s currently protected.

        • Science

          • Finland to allow voters to cast votes online in all general elections

            “The Government intends to carefully look into the possibility of introducing electronic voting in general elections. The matter is associated with both advantages and disadvantages. It is good to examine online voting as a means to promote democracy ahead of the one-hundredth anniversary of Finland,” says Jari Lindström (PS), the Minister of Justice and Employment.

            The task force is expected to conclude its preparatory work by the end of next year.

            General elections include the municipal, parliamentary and presidential elections, the elections to the European Parliament, and the planned provincial elections. Voters in indicative referendums will also be allowed to cast their votes online, according to the Ministry of Justice.

        • Hardware

          • Steve Jobs would probably be rather upset with what Apple has become today

            This past week, Apple spent 82 minutes unveiling a new app, a computer screen made by another company, and three laptops with the same name. They weren’t exactly the major overhauls that many were hoping for, and the event comes not too long after the company released a new iPhone that looked much like the last two it put out, and its other notable innovations of late have been making its products in different sizes and unleashing a sea of dongles on the world.

            In an old interview that’s making the rounds online today, former CEO Steve Jobs explained, in his mind why companies like Xerox, a company that once had one of the most innovative research labs in the world, failed. He compared the product cycles and the corporate structures of strong, stable consumer brands, such as PepsiCo, which John Sculley, the CEO that once replaced him at Apple, previously ran.

        • Health/Nutrition

          • Water, jobs, justice: an urgent demand to rebuild America’s water infrastructure

            During this year’s election, both major party candidates have discussed the need for massive infrastructure investments to upgrade everything from our highways and bridges to our airports. Unfortunately, there has been little conversation highlighting our nation’s urgent need to upgrade our aging drinking water and wastewater systems.

            While our interstate highway system officially turned 60 this year, some of the infrastructure delivering water to our communities is over a century old, and that includes the pipes—many made of lead. So it’s no surprise that there’s an urgent national health crisis unfolding before our eyes. Far beyond Flint, Mich., every week more information is revealed showing that millions of homes, schools, restaurants and small and large businesses in almost every state throughout the country are serviced by lead pipes or old crumbling water lines. According to a recent study by the Government Accountability Office, economically distressed cities with declining populations continue to have urgent water infrastructure needs: there are more Flints waiting in the wings if we don’t act.

          • America’s Legal Pot Economy Is Forced Underground

            Punctuated by sharp intakes of breath, Max Simon repeated himself softly, trying to mask a deep frustration. “We … are … a … media … company. We produce media.”

            Like many startup founders, the 34-year-old has a spiel right down to the enunciation and cadence. He gave his speech nine times, to nine different bankers. Eight rejected him. But it wasn’t venture capital he was seeking. It was a checking account.

            Simon is the founder of Green Flower Media LLC, a production company in Ojai, Calif., that sells educational videos about marijuana, with topics ranging from medicinal use to cannabis industry investing. He likens the platform to a cannabis-centric Lynda.com, the online-course company owned by LinkedIn. Shortly after Green Flower sold its first batch of videos, Simon received an e-mail from Chase Bank. The company’s corporate account was being shut down.

          • Flint, and Michigan, Brace for More Charges in Water Inquiry

            As Flint continues to suffer from a water crisis, one question percolates here in Michigan’s capital: Who will be charged next?

            So far, nine low-level or midlevel government officials have been criminally charged as part of the state investigation into the water’s contamination, which has been tied to lead poisoning in children and the deaths of 12 people from Legionnaires’ disease.

            In recent weeks, however, there have been growing indications that investigators are focusing on bigger targets, and they seem to be looking more intently at the state’s failure to respond to the Legionnaires’ cases.

            “Twelve people died,” said Bill Schuette, Michigan’s attorney general, who is leading the investigation. “That is certainly a high priority for us.”

          • Judge: Flint water allegations ‘shock the conscience’

            The State of Michigan can be sued over allegations that the contamination of Flint’s drinking water damaged the health of residents and hurt the value of their properties, a Michigan Court of Claims judge has ruled.

            Judge Mark Boonstra, in an opinion issued Wednesday, said that if proven true, allegations brought against Gov. Rick Snyder and other defendants by Melissa Mays and other Flint residents, “shock the conscience.”

            Boonstra dismissed two counts against the state, but said two other counts may proceed to trial.

            The lawsuit can proceed on allegations the state violated the due process clause of the state constitution by failing to protect Flint residents’ “bodily integrity,” Boonstra ruled. The suit can also proceed on allegations that state actions were a substantial cause of decline in Flint property values and the state “abused its powers” by “continuing to supply each water user with corrosive and contaminated water,” he said in a 50-page opinion released Thursday.

          • ‘Fix rooms’ plan for Glasgow drug addicts set for green light

            A controversial plan to set up so-called “fix rooms” to allow drug addicts to inject safely under supervision in Glasgow is likely to get the go-ahead.

            Members of the health board, the city council and police are expected to agree the idea in principle.

            The move aims to address the problems caused by an estimated 500 or so users who inject on Glasgow’s streets.

          • Doubts About the Promised Bounty of Genetically Modified Crops

            The controversy over genetically modified crops has long focused on largely unsubstantiated fears that they are unsafe to eat.

            But an extensive examination by The New York Times indicates that the debate has missed a more basic problem — genetic modification in the United States and Canada has not accelerated increases in crop yields or led to an overall reduction in the use of chemical pesticides.

            The promise of genetic modification was twofold: By making crops immune to the effects of weedkillers and inherently resistant to many pests, they would grow so robustly that they would become indispensable to feeding the world’s growing population, while also requiring fewer applications of sprayed pesticides.

            Twenty years ago, Europe largely rejected genetic modification at the same time the United States and Canada were embracing it. Comparing results on the two continents, using independent data as well as academic and industry research, shows how the technology has fallen short of the promise.

          • The Candy Hierarchy for 2016: Halloween’s best and worst treats

            The results of our survey are in. This year’s list of the most loved and hated Halloween treats has a surprise in store!

          • Chan Issues Clarion Call For Increased WHO Funding

            World Health Organization Director General Margaret Chan today warned of serious funding shortfalls for the current biennium endangering the implementation of certain programmes. Areas most in need of financing include non-communicable diseases (such as cancer, diabetes and cardiovascular diseases), food security, and antimicrobial resistance. The high-profile Health Emergencies Programme is also underfunded and Chan proposed to ask countries to raise their assessed contributions at the next World Health Assembly.

          • Brazil, China, India, South Africa Put UN High-Level Panel On Medicines Access On TRIPS Council Agenda

            For next week’s World Trade Organization intellectual property committee meeting, the major developing economies have submitted a request to discuss the recently released report of the United Nations Secretary General’s High-Level Panel on Access to Medicines, according to Knowledge Ecology International (KEI). A key element of the UN report was to make it harder for countries deter or discourage other countries from trying to use patent flexibilities built into the WTO Agreement on Trade-Related Aspects of Intellectual Property Rights (TRIPS) – something the major developing economies have been discouraged from doing in the past.

          • Michigan Mother: Hillary Clinton Receiving Advance Debate Question ‘Should Be an Automatic Disqualification’

            A Michigan mother is furious that now-DNC Chairwoman Donna Brazile sent Hillary Clinton advance notice of her question at a Democratic presidential debate in Flint, Michigan this March.

            According to the latest Wikileaks release of John Podesta’s emails, Brazile tipped off Clinton to an incoming question from an audience member at the debate hosted by CNN — where Brazile was then a paid contributor.

            “One of the questions directed to HRC tomorrow is from a woman with a rash,” Brazile wrote in the email’s subject line. “Her family has lead poison and she will ask what, if anything, will Hillary do as president to help the ppl of Flint.”

            LeeAnne Walters, the woman who asked that question, said on her Facebook page Monday that she found the revelation “appalling.”

        • Security

          • DDoS of SN Underway [Updated]

            Right, so there’s currently a DDoS of our site specifically happening. Part of me is mildly annoyed, part of me is proud that we’re worth DDoS-ing now. Since it’s only slowing us down a bit and not actually shutting us down, I’m half tempted to just let them run their botnet time out. I suppose we should tweak the firewall a bit though. Sigh, I hate working on weekends.

          • AtomBomb: The New Zero-Day Windows Exploit Microsoft Can’t Fix?

            There’s a new zero-day Microsoft Windows exploit in the wild by the name of AtomBomb, and Microsoft may not be able to fix it.

          • New code injection method affects all Windows versions [iophk: “watch the ‘news’ play this one down or ignore it; full product recall is needed at this point”]

            Researchers at cyber-security firm enSilo have discovered a method of code injection in all versions of Windows that cannot be eliminated as it is part of the operating system design.

            The design flaw allows for code injection and is dubbed AtomBomb as it makes use of the system’s atom tables.

            As Microsoft defines it, “An atom table is a system-defined table that stores strings and corresponding identifiers. An application places a string in an atom table and receives a 16-bit integer, called an atom, that can be used to access the string. A string that has been placed in an atom table is called an atom name.”

            In a blog post describing the method of attack, enSilo’s Tal Liberman wrote: “Our research team has uncovered a new way to leverage mechanisms of the underlying Windows operating system in order to inject malicious code. Threat actors can use this technique, which exists by design of the operating system, to bypass current security solutions that attempt to prevent infection.”

          • British parliament members urge Obama to halt hacking suspect’s US extradition

            This week, culture minister Matt Hancock and more than 100 fellow MPs (Members of Parliament) have signed a letter calling on president Barack Obama to block Lauri Love’s extradition to the US to face trial over the alleged hacking of the US missile defence agency, the FBI, and America’s central bank.

            Love—an Asperger’s syndrome sufferer from Stradishall, Suffolk—was told in September at a Westminster Magistrates’ Court hearing that he was fit to be extradited to the US to face trial in that country. The 31-year-old faces up to 99 years in prison in the US if convicted. According to his lawyers, Love has said he fears for his life.

          • Security advisories for Monday
          • Tug of war between SELinux and Chrome Sandbox, who’s right?

            Over the years, people have wanted to use SELinux to confine the web browser. The most common vulnerabilty for a desktop user is attacks caused by bugs in the browser. A user goes to a questionable web site, and the web site has code that triggers a bug in the browser that takes over your machine. Even if the browser has no blogs, you have to worry about helper plugins like flash-plugin, having vulnerabilities.

          • Trick or Treat! Google issues warning of critical Windows vulnerability in wild

            Recently, Google’s Threat Analysis Group discovered a set of zero-day vulnerabilities in Adobe Flash and the Microsoft Windows kernel that were already being actively used by malware attacks against the Chrome browser. Google alerted both Adobe and Microsoft of the discovery on October 21, and Adobe issued a critical fix to patch its vulnerability last Friday. But Microsoft has yet to patch a critical bug in the Windows kernel that allows these attacks to work—which prompted Google to publicly announce the vulnerabilities today.

            “After 7 days, per our published policy for actively exploited critical vulnerabilities, we are today disclosing the existence of a remaining critical vulnerability in Windows for which no advisory or fix has yet been released,” wrote Neel Mehta and Billy Leonard of Google’s Threat Analysis Group.”This vulnerability is particularly serious because we know it is being actively exploited.”

            The bug being exploited could allow an attacker to escape from Windows’ security sandbox. The sandbox, which normally allows only user-level applications to execute, lets programs execute without needing administrator access while isolating what it can access on the local system through a set of policies.

            But by using a specific type of call to a legacy support Windows system library generally used for the graphics subsystem—win32k.sys—malicious code can escalate its privileges and execute outside of the sandbox, allowing it to execute code with full access to the Windows environment. Win32k.sys has been a problem before: Microsoft issued a warning back in June about a similar privilege escalation problem that had not yet been exploited, and another arrived in August.

          • DDoS defenses emerging from Homeland Security

            Government, academic, and private-sector officials are collaborating on new ways to prevent and mitigate distributed denial-of-service (DDoS) attacks, based on research years in the making but kicked into high gear by the massive takedown this month of domain name system provider Dyn.

          • US DMCA rules updated to give security experts legal backing to research

            The US government has updated and published a new list of exemptions to the Digital Millennium Copyright Act, a move perhaps long-overdue which will protect cybersecurity professionals from prosecution when reverse-engineering products for research purposes.

            On October 28, the US Copyright Office and the Librarian of Congress published the updated rules on the federal register.

            The DMCA regulations now include exceptions relating to security research and vehicle repair relevant to today’s cybersecurity field. For the next two years, researchers can circumvent digital access controls, reverse engineer, access, copy, and manipulate digital content which is protected by copyright without fear of prosecution — within reason.

          • Stop being the monkey’s paw

            This story got me thinking about security, how we ask questions and how we answer questions. What if we think about this in the context of application security specifically for this example. If someone was to ask the security the question “does this code have a buffer overflow in it?” The person I asked for help is going to look for buffer overflows and they may or may not notice that it has a SQL injection problem. Or maybe it has an integer overflow or some other problem. The point is that’s not what they were looking for so we didn’t ask the right question. You can even bring this little farther and occasionally someone might ask the question “is my system secure” the answer is definitively no. You don’t even have to look at it to answer that question and so they don’t even know what to ask in reality. They are asking the monkey paw to bring them their money, it’s going to do it, but they’re not going to like the consequences.

          • Tyfone looks to open-source to solve IoT security issues

            It came as no surprise to Tyfone CEO Siva Narendra when tens of millions of Internet connected devices were able to bring down the Web during a coordinated distributed denial of service attack on Oct. 21.

            Narendra’s Portland-based company Tyfone has been working on digital security platforms to safeguard identity and transactions of people and things for years.

            Narendra says mobile devices in conjunction with the cloud have brought new levels of productivity to our lives. Internet of Things devices (the common name given to these connected items) are poised to bring even greater levels of productivity and cost-savings to businesses, and safety and convenience to our everyday lives.

          • Google just disclosed a major Windows bug — and Microsoft isn’t happy

            Today, Google’s Threat Analysis group disclosed a critical vulnerability in Windows in a public post on the company’s security blog. The bug itself is very specific — allowing attackers to escape from security sandboxes through a flaw in the win32k system — but it’s serious enough to be categorized as critical, and according to Google, it’s being actively exploited. As a result, Google went public just 10 days after reporting the bug to Microsoft, before a patch could be coded and deployed. The result is that, while Google has already deployed a fix to protect Chrome users, Windows itself is still vulnerable — and now, everybody knows it.

            Google’s disclosure provides only a general description of the bug, giving users enough information to recognize a possible attack without making it too easy for criminals to replicate. Exploiting the bug also depends on a separate exploit in Adobe Flash, for which the company has also released a patch. Still, simply knowing that the bug exists will likely spur a lot of criminals to look for viable ways to exploit it against computers that have yet to update Flash.

          • AtomBombing: A Code Injection that Bypasses Current Security Solutions

            Our research team has uncovered new way to leverage mechanisms of the underlying Windows operating system in order to inject malicious code. Threat actors can use this technique, which exists by design of the operating system, to bypass current security solutions that attempt to prevent infection. We named this technique AtomBombing based on the name of the underlying mechanism that this technique exploits.

            AtomBombing affects all Windows version. In particular, we tested this against Windows 10.

          • Disclosing vulnerabilities to protect users

            On Friday, October 21st, we reported 0-day vulnerabilities — previously publicly-unknown vulnerabilities — to Adobe and Microsoft. Adobe updated Flash on October 26th to address CVE-2016-7855; this update is available via Adobe’s updater and Chrome auto-update.

            After 7 days, per our published policy for actively exploited critical vulnerabilities, we are today disclosing the existence of a remaining critical vulnerability in Windows for which no advisory or fix has yet been released. This vulnerability is particularly serious because we know it is being actively exploited.

            The Windows vulnerability is a local privilege escalation in the Windows kernel that can be used as a security sandbox escape. It can be triggered via the win32k.sys system call

          • The next president will face a cybercrisis within 100 days, predicts report

            The next president will face a cybercrisis in the first 100 days of their presidency, research firm Forrester predicts in a new report.

            The crisis could come as a result of hostile actions from another country or internal conflict over privacy and security legislation, said Forrester analyst Amy DeMartine, lead author of the firm’s top cybersecurity risks for 2017 report, due to be made public Tuesday.

            History grades a president’s first 100 days as the mark of how their four-year term will unfold, so those early days are particularly precarious, said DeMartine. The new commander in chief will face pressure from foreign entities looking to embarrass them early on, just as U.S. government agencies jockey for position within the new administration, she said.

          • Hackforums Shutters Booter Service Bazaar

            Perhaps the most bustling marketplace on the Internet where people can compare and purchase so-called “booter” and “stresser” subscriptions — attack-for-hire services designed to knock Web sites offline — announced last week that it has permanently banned the sale and advertising of these services.

            On Friday, Oct. 28, Jesse LaBrocca — the administrator of the popular English-language hacking forum Hackforums[dot]net — said he was shutting down the “server stress testing” (SST) section of the forum. The move comes amid heightened public scrutiny of the SST industry, which has been linked to several unusually powerful recent attacks and is responsible for the vast majority of denial-of-service (DOS) attacks on the Internet today.

        • Defence/Aggression

          • WikiLeaks Reveals Team Hillary’s Libya Spin: It Would Be Syria Without Clinton’s War

            In the lead-up to Hillary Clinton’s marathon testimony before Congress on Benghazi in October 2015, her presidential campaign prepared to make some eye-popping claims—including that Libya would have turned into Syria without U.S. intervention.

            That’s according to an internal talking-point memo released in Tuesday’s dump of WikiLeaks emails. WikiLeaks says those emails were hacked from the inbox of Clinton campaign Chairman John Podesta. The Clinton campaign is not commenting on whether or not the emails are doctored, and blames the Russian government for the hack.

          • Media Roll Out Welcome Mat for ‘Humanitarian’ War in Syria

            As she marches toward the US presidency, Hillary Clinton has stepped up her promotion of the idea that a no-fly zone in Syria could “save lives” and “hasten the end of the conflict” that has devastated that country since 2011.

            It has now been revealed, of course, that Clinton hasn’t always expressed the same optimism about the no-fly zone in private. The Intercept (10/10/16) reported on Clinton’s recently leaked remarks in a closed-door speech to Goldman Sachs in 2013…

          • Shahid Buttar and Selling Empire, War and Capitalism with Peter and Mickey

            In the first half of the program, Shahid Buttar discusses the chapter he wrote for Censored 2017, “Ike’s Distopian Dream,” where he examines the many ways that President Eisenhower’s warning about the military-industrial complex has proven correct.For the second half of the program, Mickey and Peter survey some of the other chapters of Censored 2017, particularly Peter’s chapter, “Selling Empire, War and Capitalism,” a look at the advertising / public relations industry, and how its influence extends far beyond peddling consumer products.

          • Whistleblower exposes how NATO’s leading ally is arming and funding ISIS

            A former senior counter-terrorism official in Turkey has blown the whistle on President Recep Tayyip Erdogan’s deliberate sponsorship of the Islamic State (ISIS) as a geopolitical tool to expand Turkey’s regional influence and sideline his political opponents at home.

            Ahmet Sait Yayla was Chief of the Counter-Terrorism and Operations Division of Turkish National Police between 2010 and 2012, before becoming Chief of the Public Order and Crime Prevention Division until 2014. Previously, he had worked in the Counter-Terrorism and Operations Division as a mid-level manager for his entire 20-year police tenure, before becoming Chief of Police in Ankara and Sanliurfa.

            In interviews with INSURGE intelligence, Yayla exclusively revealed that he had personally witnessed evidence of high-level Turkish state sponsorship of ISIS during his police career, which eventually led him to resign. He decided to become a whistleblower after Erdogan’s authoritarian crackdown following the failed military coup in July. This is the first time that the former counter-terrorism chief has spoken on the record to reveal what he knows about Turkish government aid to Islamist terror groups.

          • Inside Palantir’s War With the U.S. Army

            Palantir is the Palo Alto, California, data analytics company co-founded and backed by billionaire Peter Thiel. It had won seed funding and praise from the Central Intelligence Agency a few years earlier and had become a darling among the Federal Bureau of Investigation and a few other government customers. Its employees were at the Pentagon to show off the company’s ability to compile disparate data streams and display the information graphically for non-technical consumers; Palantir hoped to win a big contract.

            But the conversation went poorly. The slacks and dress shirts with a few buttons undone that Palantir executives wore may have been a step up for sunny California where hoodies are the norm but were a sign of disrespect at the Pentagon, according to a person familiar with the meeting. Senior officials, including U.S. Assistant Secretary of the Army for Acquisition, Logistics and Technology Dean Popps, were not impressed, this person said.

            They told Palantir: “Don’t come to the E-ring without a tie unless your name is Gates or Buffet,” said the person, referring to the portion of the Pentagon occupied by senior officials. “They couldn’t get over the tie thing. They didn’t care about the technology.”

          • German Magazine Uses Daesh Propaganda Video to Show All is Well in Mosul

            In an almost four-minute video, political editor of Spiegel Online Christoph Sydow tried to defend the editorial policy of his magazine regarding the developments in Aleppo and Mosul. However, the shots demonstrated in his video turned out to be the propaganda materials of Daesh terrorists.

            The video was supposed to be a response to critical letters of Spiegel Online readers and their comments on social networks. Many of them accused the magazine of spreading propaganda and presenting the situation in the Middle East in a biased manner.

          • CIA Releases Controversial Bay of Pigs History

            The CIA today released the long-contested Volume V of its official history of the Bay of Pigs invasion, which it had successfully concealed until now by claiming that it was a “draft” and could be withheld from the public under the FOIA’s “deliberative process” privilege. The National Security Archive fought the agency for years in court to release the historically significant volume, only to have the U.S. Court of Appeals in 2014 uphold the CIA’s overly-broad interpretation of the “deliberative process” privilege. Special credit for today’s release goes to the champions of the 2016 FOIA amendments, which set a 25-year sunset for the exemption: Senators John Cornyn, Patrick Leahy, and Chuck Grassley, and Representatives Jason Chaffetz, Elijah Cummings, and Darrell Issa.

            Chief CIA Historian David Robarge states in the cover letter announcing the document’s release that the agency is “releasing this draft volume today because recent 2016 changes in the Freedom of Information Act (FOIA) requires us to release some drafts that are responsive to FOIA requests if they are more than 25 years old.” This improvement – codified by the FOIA Improvement Act of 2016 – came directly from the National Security Archive’s years of litigation.

          • Still fighting the last war: Syria and the Western peace movement

            The anti-war movement is struggling to find its place in a multipolar world in which stopping the war requires new thinking

            When I was five years old, a very small Vietnamese man came to my bedside to say goodnight. He was the Vietnamese ambassador, and he had a very kindly, wrinkled smile, and, as I later discovered, both he and his wife were veterans of the very long war in Vietnam against foreign occupiers. He himself had crawled under barbed wire fences to set explosives under French war planes during the early 1950s. His wife, also diminutive, had been the 16-year-old leader of an anti-aircraft unit that helped bring down enemy planes during the conflict, which back in 1973 was still ongoing.

          • Sweden declares WWII hero Raoul Wallenberg dead, 71 years after he disappeared in Hungary

            Sweden declares WWII hero Raoul Wallenberg dead, 71 years after he disappeared in Hungary.

        • Transparency/Investigative Reporting

        • Environment/Energy/Wildlife/Nature

          • Utilities In Florida Are Using A Fake Consumer Group To Hamstring Solar Competition

            Earlier this year, we noted how traditional utilities were playing extremely dirty in Florida to try and derail efforts to ramp up solar competition and adoption in the state most likely to benefit from it. After all, the vision of a future where competition is rampant, customers pay less money, and solar users actually get paid for driving power back to the grid gives most of these executives heartburn. As a result, utilities have gotten creative in the state, launching fake solar advocacy groups that actually function to pollute public discourse and derail any amendments intended to help solar grab a larger foothold in the state.

          • Fracking Linked to Cancer-Causing Chemicals, New YSPH Study Finds

            An expansive new analysis by Yale School of Public Health researchers confirms that numerous carcinogens involved in the controversial practice of hydraulic fracturing have the potential to contaminate air and water in nearby communities.

            Fracking is now common in the United States, currently occurring in 30 states, and with millions of people living within one mile of a fracking site. The study suggests that the presence of carcinogens involved in or released by hydraulic fracturing operations has the potential to increase the risk of childhood leukemia. The presence of chemicals alone does not confirm exposure or risk of exposure to carcinogens and future studies are needed to evaluate cancer risk.

          • Stein Campaign Condemns ‘Violent Repression of Peaceful Protests Against DAPL’

            The conflict surrounding the construction of the Dakota Access Pipeline escalated dramatically Thursday, October 27. Water protectors at Treaty Camp, a new frontline in the path of the pipeline along Highway 1806, were forced off the land in a dramatic and often violent manner by police. The large police action included armored, military vehicles, pepper spray, high-velocity bean bags and tear gas. Shortly after the disturbing confrontation Jill Stein, Green Party nominee for the Presidential Election, and running mate Ajamu Baraka released a statement condemning the actions being used in North Dakota:

            “The Stein/Baraka campaign is horrified and outraged at the militarized repression of water protectors at the Standing Rock reservation in North Dakota. Police and private security forces have engaged in violent actions against peaceful earth defenders who have come to protect the land and water from the construction of the Dakota Access Pipeline.

          • Two more Honduran land rights activists killed in ongoing violence
          • NASA Scientists Suggest We’ve Been Underestimating Sea Level Rise

            About 71 percent of the Earth is covered by water, so measuring sea level changes around the world is no small feat. Up until now, scientists believed they knew how much global sea level had risen during the 20th century. This number has hovered around 0.6 inches per decade since 1900, according to the National Oceanic and Atmospheric Administration, and has been partly driven by warming ocean temperatures.

            But a new study, published this month to Geophysical Research Letters, found evidence to suggest that historical sea level records have been off—way off in some areas—by an underestimation of 5 to 28 percent. Global sea level, the paper concluded, rose no less than 5.5 inches over the last century, and likely saw an increase of 6.7 inches.

            The reason for this discrepancy was uncovered by earth scientists at NASA’s Jet Propulsion Laboratory and the University of Hawai’i at Mānoa. By comparing newer climate models with older sea level measurements, the team discovered that readings from coastal tide gauges may not have been as indicative as we thought. These gauges, located at more than a dozen sites across the Northern Hemisphere, have been a primary data source for estimating sea level changes during the last several decades.

        • Finance

          • How the British Brexit Economy Works

            1) A containerful of shoddy training shoes are produced in China, shipped to UK, sorted by lowly paid British zero hours workers and put on shelves of High Street sports shop.
            2) While this is happening, sterling plunges 25%.
            3) Coachload of Chinese tourists visit sports shop attracted by collapsed pound sterling. They exclaim “Wow Western trainers! And so cheap”. They buy them to take back to China as gifts for family members they don’t like that much.
            4) Declare a Brexit sales boom!

          • Theresa May’s ‘just managing’ families set to be worse off

            Low-earning families that Theresa May has promised to help will be thousands of pounds a year worse off by 2020 because of rising inflation, lower wage growth and Tory social security cuts, according to new analysis of their post-Brexit economic prospects.

            Those who the prime minister describes as “just managing” – and who are her key priority, she says – are in line for substantial falls in real incomes unless the chancellor, Philip Hammond, steps in to help them in his autumn statement on 23 November.

            Pressure is growing on Hammond from senior Tories to reverse the decisions to slash benefits, which were announced last year by his predecessor George Osborne, in order to assist those who May said on entering Downing Street were “working around the clock” but still struggling to get by.

          • How Minnesota’s governor performed an economic miracle by raising tax on the rich and increasing minimum wage

            By every measure, Minnesota governor Mark Dayton’s five year run as governor has been a stellar success: while Tim Pawlenty, his tax-slashing, “fiscally-conservative” Republican predecessor presided over a $6.2B deficit and a 7% unemployment rate (the mere 6,200 jobs added under Pawlenty’s 7-year run barely registered), Dayton added 172,000 new jobs to the Minnesota economy, brought Minnesota down to the fifth-lowest unemployment rate in the country, and brought the average Minnesotan income up to $8,000 more than the median US worker, while posting a $1B budget surplus.

            How did Dayton do it? He raised the state income tax on individuals earning more than $150K, from 7.85% to 9.85%; he raised Minnesota’s minimum wage and guaranteed equal pay for women.

          • CETA Signed Off As Wallonia Folds Under Pressure

            Democracy and civil rights took a crushing blow today. Shortly after news surfaced that Wallonia folded under the pressure, the Comprehensive Economic and Trade Agreement (CETA) has been signed.

            One of the many secret trade deals floating around is known as CETA. While proponents say these trade agreements are simply about trade, the details suggest that such agreements are much more about pushing laws than actual trade.

            Last year, we dug into some of these details and found a number of provisions that adversely affects digital rights. This includes censorship through site blocking, account termination through a three strikes law, unlimited damages for copyright infringement, and provisions that allow border patrols to seize your cell phone at the border.

            Other concerns raised revolve around ISDS (Inter-State Dispute Settlement) that sets up an international tribunal for major multi-national corporations. The purpose is to allow corporations to sue governments if laws are passed that get in the way of profits and future potential profits. Examples raised in the past revolve around warning labels on cigarette packages, regulations on price for pharmaceuticals, and rulings against oil extraction and pipelines.

          • Swiss rail stations will sell bitcoins at ticket machines

            Switzerland is stepping up its bitcoin fascination in a big way. Railway operator SBB (with the help of SweePay) is launching a 2-year trial for a service that lets you exchange Swiss francs for bitcoin at any of the company’s ticket machines in the country. Scan a QR code with your phone and you can get between 20 to 500 francs ($20 to $505) of digital currency at any time. If you want to go shopping without using cards or physical cash, you can do it right after you leave the train station.

            There are some big catches involved. You need to have a Swiss phone number to get bitcoin, so you’re not completely anonymous… and of course, you’re out of luck if you’re not a resident. You also can’t buy tickets with bitcoin at the machines, so don’t think your bitcoin mining operation will pay for your next trip to Zurich.

          • No, CETA is NOT approved yet
          • Canada and E.U. Sign Trade Deal, Bucking Resistance to Globalization

            The European Union and Canada signed a far-reaching trade agreement on Sunday that commits them to opening their markets to greater competition, after overcoming a last-minute political obstacle that reflected the growing skepticism toward globalization in much of the developed world.

          • Icelandic women walk off the job 14% early to protest 14% pay-gap

            On October 25, thousands of Icelandic women went home at 2:38PM, after 86% of their work-days had passed, to protest the fact that they only earn 86% of their male counterparts’ wages.

            They turned out for a mass demonstration that echoed the 1975 protests over pay equity, which saw over 90% of the country’s women take to the street.

          • EU-Canada trade deal signed, but our fates (and ISDS) not yet sealed

            On Sunday, the president of the European Commission Jean-Claude Juncker, president of the European Council Donald Tusk, prime minister of Slovakia Robert Fico, and Canadian prime minister Justin Trudeau signed the Comprehensive Economic and Trade Agreement (CETA) between the EU and Canada. It followed more than a week of frenzied negotiations after Belgian regions refused to give permission to the central government of Belgium to proceed with the deal.

          • Don’t celebrate Justin Trudeau signing the Ceta deal with the EU – like TTIP, it is a ticking time bomb

            Don’t be fooled by the triumphant rhetoric emanating from Brussels today – the controversial EU-Canada trade deal known as CETA might have returned from the dead in time for Halloween, but it’s very much a zombie agreement. While CETA will now be approved by the European Council and head towards the Parliament, its future looks bleak.

            And it gets worse for Brussels. Because Belgium’s regional parliaments have, in the process of hobbling CETA, driven a stake into the heart of European trade policy. No wonder Financial Times columnist Wolfgang Munchau hailed the so-called ‘breakthrough’ as “a huge victory for Belgium’s Ceta opponents”.

            CETA (the Comprehensive Economic & Trade Agreement) is the sister deal of the better known TTIP trade deal between the US and EU. Just like its sibling, it is essentially not about reducing tariffs, but deregulation, liberalisation, and the handing of further powers over law-making to big business. Despite some fancy footwork by the EU to reform the hated “corporate court” system, which gives foreign investors their own special legal process to sue governments, that system is very much still in place in CETA.

        • AstroTurf/Lobbying/Politics

          • Podesta paid $7,000 a month by top donor

            Hillary Clinton’s campaign chairman, John Podesta, last year signed a $7,000-a-month contract with the foundation of a major Clinton donor who made a fortune selling a type of mortgage that some critics say contributed to the housing collapse, hacked emails show.

            In February of last year, as Podesta was working to lay the groundwork for Clinton’s soon-to-launch campaign for the Democratic presidential nomination, he signed the contract with the Sandler Foundation, which was started by Herb Sandler and his late wife Marion Sandler.

          • Trump Supporter Voted Twice in Iowa Because “Polls Are Rigged”

            Donald Trump has been warning supporters left and right about the potential devastating consequences of voter fraud. But the first arrest for voter fraud in this election season is actually a staunch Trump supporter. Terri Rote, 55, was arrested on first-degree l misconduct charges after she cast two ballots in the election. She was released on a $5,000 bond.

            So why did Rote, a registered Republican, decide to cast two ballots? She was apparently afraid that her first ballot would be counted as a vote for Hillary Clinton. “I wasn’t planning on doing it twice, it was spur of the moment,” Rote told Iowa Public Radio. “The polls are rigged.”

          • Donald Trump rolls out endorsements from people he pays

            At a campaign event in Miami on Tuesday that was more in keeping with the norms of politics in North Korea, Donald Trump brought reporters to one of his golf courses and invited 10 of his employees on stage to praise him.

            [...]

            Siegel also boasted about helping to secure Florida for George W. Bush in 2000, by pressing thousands of employees to vote for the Republican candidate. In an interview with the same publication, the developer explained that he gave employees not-so-subtle hints about what he wanted them to do by putting negative articles about Al Gore in envelopes along with their paychecks.

            As The Atlantic explained in 2012, after Siegel’s anti-Obama memo was leaked to Gawker, employers cannot explicitly pay workers to vote a certain way, but, in most states, they are permitted to make their preferences known before election day.

            Unlike Florida, California does have a law stating that “no employer shall coerce or influence or attempt to coerce or influence his employees through or by means of threat of discharge or loss of employment to adopt or follow or refrain from adopting or following any particular course or line of political action or political activity.”

          • Five takeaways from the latest WikiLeaks releases

            Government ethics watchdogs have long warned that the Clintons’ nonprofit would present serious conflict-of-interest concerns should the former secretary of State obtain the oval office.

            Republicans — led by Donald Trump — have accused the Clintons of using the foundation to peddle influence and line their own pockets.

            The details in Band’s memo gave new ammunition to critics who have pressed for the foundation to be shuttered.

            In it, Band describes how Bill Clinton’s personal wealth skyrocketed with the help of the same consultants raising money for the foundation, and the same donors who poured millions into the charity.

            “I think it’s going to be a continuing problem unless they close the thing down after she’s elected,” said Democratic strategist Brad Bannon.

            Those calls were echoed by the press.

            “Let me go to bottom line: There is no way under any circumstance the Clinton Foundation should be operating if she becomes president,” Chuck Todd, moderator of NBC’s “Meet the Press,” told WGN Radio in Chicago on Thursday. “I just don’t see how they can keep that going.”

          • Leaked Email Reveals Google Chairman Wanted To Be Clinton Campaign’s ‘Head Outside Advisor’

            WikiLeaks has continued to reveal Schmidt’s cozy relationship with the Clinton campaign.

          • WikiLeaks: Podesta Continued Ties to Russian Firm After He Said He Divested

            More hacked emails released Sunday by WikiLeaks appear to show Hillary Clinton campaign chairman John Podesta’s apparent continued connection to Joule Unlimited Technologies, despite his claims that he divested from the Kremlin-financed energy company, The Daily Caller reported.

            Podesta has said he transferred his 75,000 shares from Joule to a holding company named Leonidio Holdings. But included in the released emails is information that Podesta received a K1 income tax form indicating that he was a partner sharing income with Leonidio Holdings, while another form was made out to Podesta’s daughter Megan Rouse, who is a financial planner.

            A June 5, 2015 email from Rouse to John, Mae and Gabe Podesta shows the extent to which other family members were involved: “Mae and Gabe, Please see attached K1 for Leonidio. You can use this to complete your 2014 tax return. We will each report 1/3 share of what’s on the form. Mom and Pa, Please see attached K1 showing the distribution to Leonidio.”

          • Tax form Indicates Podesta Put Kremlin-Tainted Shares In Daughter’s Company

            Clinton campaign chairman John Podesta received a K1 income tax form indicating that he was a partner sharing income with Leonidio Holdings, according to emails released Sunday by WikiLeaks. Another form was made out to Podesta’s daughter, Megan Rouse, his partner in Leonidio Holdings.

            Podesta has always maintained that he transferred his 75,000 shares from Joule Unlimited Technologies, a Kremlin-financed energy company, to an “anonymous” holding company named Leonidio Holdings. Not only does Leonidio share an address with Podesta’s daughter, Rouse, but they share a tax return.

            The other beneficiaries are all in the family too.

          • Obama told us he’s honorable — but he’s just another liar

            Now we know Obama was lying. His own aides said so, in e-mails uncovered by WikiLeaks and made public this week.

          • WikiLeaks: Trump Rally Agitator and Clinton Campaign Manager Are ‘Close’

            Robert Creamer, the operative behind sending provocateurs to Donald Trump rallies, was close to Robby Mook, Hillary Clinton’s campaign manager, according to new emails released by WikiLeaks.

            Creamer, who allegedly spearheaded the dirty tricks for the Democrats, wasn’t just consulting for the Democratic National Committee, according to videos made by Project Veritas. He was sending people to provoke Trump at events.

          • Fmr U.S. Atty: Comey’s Hand Forced by FBI ‘Seething’ Anger at Botched Hillary Email Investigation

            In an exclusive interview with Breitbart News, the former U.S. Attorney for the District of Columbia Joseph DiGenova gave a stark assessment of what led to FBI Director James Comey’s recent decision to reopen the investigation into Hillary Clinton’s use of a private email server, after an investigation into Anthony Weiner’s sexting scandal led to the discovery of thousands of emails on the computer of Weiner’s estranged wife, top Hillary Clinton aide, Huma Abedin.

          • Boring or Annoying Things We Have to Know

            I have always glazed over at any mention of Hillary Clinton’s emails. The USA is not my country, and it seemed like a rather boring argument about classifications and document security. I also had a natural resistance to anything that appeared to promote the interests of Donald Trump. I now realise that is how a complicit media was deliberately presenting it, and my lack of interest was the desired effect. They are still presenting the issues in a manner which I hope I will be able to prove to you is entirely tendentious. So this weekend I request you to grit your teeth, set aside your disinterest and read through this article. Please.

            Those Hillary server emails are largely a separate thing to those which WikiLeaks has been releasing. What the WikiLeaks release of the Democratic National Committee and Hillary campaign chair Podesta emails has proved beyond any reasonable doubt, is the extent of Hillary’s corruption. Both in terms of the fixing of the primary election against Bernie Sanders by the people who were supposed to be organising it, and the vast sums of money the Clinton family were receiving personally through Clinton Foundation and consultancy activity linked to State Department access, decisions and activity.

            Before Clinton handed over her private email server to the FBI investigation into her handling of classified material, she scrubbed over 30,000 emails and had drives physically treated to ensure permanent destruction. It is obviously very likely that many of those emails referred to the kind of nefarious activity we are now seeing from the DNC and Podesta leaks.

            It is also of course a fact that those 30,000 emails all had recipients, as well as Hillary as a sender. We can be sure that a major effort will have been undertaken to make sure recipients deleted them too. But from time to time some are sure to turn up. That is what has just happened and prompted yesterday’s announcement of a renewed investigation. In the course of an unrelated investigation into alleged paedophile grooming, the FBI has come across some of Hillary’s deleted emails on the device of a close political aide.

          • The Podesta Emails Revelations: A Collection

            —In an email containing information from intelligence sources, Clinton detailed a strategy for defeating the Islamic State and noted Qatar and Saudi Arabia are funding ISIS operations. (Dan Wright, Shadowproof)

            —Hillary Clinton’s letter to mega-donor Haim Saban against the boycott, divestment, and sanctions (BDS) movement against Israel was leaked to press to attract pro-Israel donors. (Rania Khalek, Electronic Intifada)

            —During one of her paid speeches for Goldman Sachs, Clinton admitted a no fly zone in Syria would mean the United States and NATO would “kill a lot of Syrians.” (Zaid Jilani, The Intercept)

            —Representatives of Qatar wanted to meet for “five minutes” with Bill Clinton to present a $1 million check to him for his birthday (New York Times)

          • Sometimes You Need to Dig a Little to Unearth the Point of an NYT Story

            As it turns out, most other news outlets did not share the Times‘ sense of newsworthiness.

          • ‘Will Every Eligible Voter Be Able to Cast a Ballot?’

            It’s hard to pick the most ominous or disturbing thing Donald Trump has said, but his call for supporters to “go and watch” polling places in “certain areas” because “you know what I’m talking about” is up there. But Trump’s claim that the election is rigged—unless he wins, in which case it isn’t—didn’t spring full-blown from his head. Republicans have claimed voter fraud benefiting their opponents for a long time. And for a long time, corporate media have set those claims alongside concerns about voter suppression, of African-Americans and immigrants in particular, as though they were equally grounded, or just analogous partisan gripes.

          • FBI discovered Clinton-related emails weeks ago

            The FBI stumbled upon a trove of emails from one of Hillary Clinton’s top aides weeks ago, law enforcement officials told CNN Sunday.
            But FBI Director James Comey didn’t disclose the discovery until Friday, raising questions about why the information was kept under wraps and then released only days before the election.
            Meanwhile, the Justice Department has obtained a warrant that will allow it to begin searching the computer that is believed to contain thousands of newly found emails of top Clinton aide Huma Abedin, two law enforcement sources confirmed to CNN.

            The timeline behind the discovery of the emails came into greater clarity Sunday.
            Investigators took possession of multiple computers related to the inquiry of Anthony Weiner in early October, U.S. law enforcement officials said. Weiner is Abedin’s estranged husband and is being probed about alleged sexting with a purportedly underage girl.

          • Clinton emails: FBI chief may have broken law, says top Democrat

            The Democratic leader in the US Senate says the head of the FBI may have broken the law by revealing the bureau was investigating emails possibly linked to Hillary Clinton.

            Harry Reid accused FBI director James Comey of violating an act which bars officials from influencing an election.

            News of the FBI inquiry comes less than two weeks before the US election.

            The bureau has meanwhile obtained a warrant to search a cache of emails belonging to a top Clinton aide.

            Emails from Huma Abedin are believed to have been found on the laptop of her estranged husband, former congressman Anthony Weiner.

          • The FBI is sitting on ‘explosive’ information regarding Donald Trump and Russia, top Democrat asserts

            A top Democrat in Washington says the FBI has shone a spotlight on a new trove of emails potentially associated with Hillary Clinton’s use of a private email server while sitting on “explosive information” allegedly tying Donald Trump to the Russian government.

            Senator Harry Reid, the Democrat leader of the US Senate, accused the FBI of double standards in a letter sent late on Sunday to James Comey, the agency’s director, who jolted the presidential race on Friday by revealing the existence of a new cache of emails.

          • Facebook wants to be your guide on Election Day

            Now that the presidential debates are over, Facebook wants to help you prepare for the last political battleground: the voting booth.

            The social-media company unveiled a feature this week designed to help users create a voting plan, showing not just presidential candidates but also information on statewide elections. Should you want to dive down to the local level, you can give Facebook your address and the company will tell you what’s on the ballot in your neck of the woods.

          • Google’s Schmidt drew up draft plan for Clinton in 2014

            Eric Schmidt, the chairman of Google’s parent company Alphabet, submitted a detailed draft to a key Clinton aide on 15 April 2014, outlining his ideas for a possible run for the presidency and stressing that “key is the development of a single record for a voter that aggregates all that is known about them”.

            Though Schmidt did not mention it, this kind of information is the lifeblood of Google’s business.

            The ideas, in an email released by the whistleblower website WikiLeaks, were sent to Cheryl Mills, former deputy White House counsel to Bill Clinton. Mills forwarded it to Clinton campaign chairman John Podesta, campaign manager Robby Mook and Barack Obama’s 2012 campaign manager David Plouffe.

          • Schmidt sought top outside post in Clinton campaign

            Eric Schmidt, the chairman of Google’s parent company Alphabet, expressed a desire more than two years ago to be the “head outside adviser” to Hillary Clinton’s presidential campaign, according to an email released by WikiLeaks.

            The email, dating back to 2014, was part of a bigger trove released by the whistle-blower website, all of which were from the Gmail account of Clinton campaign chairman John Podesta.

            There have been unproven claims by the Democratic Party that the leaked material has been provided by Russian sources.

            In the email, sent to campaign manager Robby Mook, Podesta wrote that he had met Schmidt on 2 April 2014 and that he (Schmidt) was “ready to fund, advise recruit talent, etc”.

            Podesta apparently expected Schmidt to be a pushy sort, as he wrote, “He (Schmidt) was more deferential on structure than I expected. Wasn’t pushing to run through one of his existing firms. Clearly wants to be head outside advisor, but didn’t seem like he wanted to push others out. Clearly wants to get going.

            “He’s still in DC tomorrow and would like to meet with you if you are in DC in the afternoon. I think it’s worth doing. You around? If you are, and want to meet with him, maybe the four of us can get on the phone in the am.”

            Mook was in Australia at the time, but wrote back to Podesta that he would “to do a call w him before I get back or meet with him after the 23rd”.

          • Democrats should ask Clinton to step aside

            Has America become so numb by the decades of lies and cynicism oozing from Clinton Inc. that it could elect Hillary Clinton as president, even after Friday’s FBI announcement that it had reopened an investigation of her emails while secretary of state?

            We’ll find out soon enough.

            It’s obvious the American political system is breaking down. It’s been crumbling for some time now, and the establishment elite know it and they’re properly frightened. Donald Trump, the vulgarian at their gates, is a symptom, not a cause. Hillary Clinton and husband Bill are both cause and effect.

            FBI director James Comey’s announcement about the renewed Clinton email investigation is the bombshell in the presidential campaign. That he announced this so close to Election Day should tell every thinking person that what the FBI is looking at is extremely serious.

            This can’t be about pervert Anthony Weiner and his reported desire for a teenage girl. But it can be about the laptop of Weiner’s wife, Clinton aide Huma Abedin, and emails between her and Hillary. It comes after the FBI investigation in which Comey concluded Clinton had lied and been “reckless” with national secrets, but said he could not recommend prosecution.

          • Clinton Foundation: Only 10% and 6% towards charity grants in 2013-14

            The Clinton Foundation spent less than 6 percent of its budget on charitable grants in 2014 and less than 10% the year prior, according to documents the organization filed with the Internal Revenue Service (IRS).

          • U.S. Officials Doubt Donald Trump Has Direct Link to Russia

            For much of the summer, the F.B.I. pursued a widening investigation into a Russian role in the American presidential campaign. Agents scrutinized advisers close to Donald J. Trump, looked for financial connections with Russian financial figures, searched for those involved in hacking the computers of Democrats, and even chased a lead — which they ultimately came to doubt — about a possible secret channel of email communication from the Trump Organization to a Russian bank.

            Law enforcement officials say that none of the investigations so far have found any link between Mr. Trump and the Russian government. And even the hacking into Democratic emails, F.B.I. and intelligence officials now believe, was aimed at disrupting the presidential election rather than electing Mr. Trump.

            Hillary Clinton’s supporters, angry over what they regard as a lack of scrutiny of Mr. Trump by law enforcement officials, pushed for these investigations. In recent days they have also demanded that James B. Comey, the director of the F.B.I., discuss them publicly, as he did last week when he announced that a new batch of emails possibly connected to Mrs. Clinton had been discovered.

          • Don’t settle for the lesser of two evils in this election. Vote for the Green party

            Donald Trump’s self-inflicted wounds and propensity for public meltdowns had pushed the public-opinion needle toward Hillary Clinton, according to recent polls. That may have changed a little in the aftermath of the FBI’s renewing of its email probe last week. But even so, the fears of many voters that a Donald Trump presidency might become a reality have abated.

            Those fears are not unfounded. Trump’s failings as a candidate and a person are manifest, and he would be in a position to wreak considerable havoc if elected. That’s especially true at the agency level, with the judiciary and in other arenas where the president can wield executive power. The wildcard aspect of his personality poses risks that can’t be predicted, nor can anyone know the degree to which congress would be inclined to obstruct or approve his most damaging initiatives.

            What has been lost in the salacious and obsessive media coverage of the Republican nominee’s outrageous behavior, bigoted remarks and appeal to the worst instincts of the electorate, however, is a critical examination of what a Clinton administration will mean for the nation. The FBI probe, information on tangled interests within the Clinton Foundation, evidence of influence peddling and Wikileaks revelations detailing manipulation of media and the democratic process, signal a plutocratic style of governance that is all too familiar and increasingly dominant at the federal level.

            The content of what has been revealed in these leaks, as well as her lengthy track record in government and policy statements as a candidate yield an inescapable conclusion: Hillary Clinton represents the entrenched interests of the status quo. Her election will expand the excesses of global interventionism and corporate welfare that have characterized US policies for several decades – at tremendous, almost incalculable cost both domestically and internationally.

          • Jill Stein’s AMA (Ask Me Anything) On Reddit: All You Need To Know About The Green Party Candidate’s Q & A Session

            “We could for example cancel the obsolete F-35 fighter jet program, create a Wall Street transaction tax (where a 0.2% tax would produce over $350 billion per year), or canceling the planned trillion dollar investment in a new generation of nuclear weapons. Unlike weapons programs and tax cuts for the super rich, investing in higher education and freeing millions of Americans from debt will have tremendous benefits for the real economy.”

          • WIKILEAKS: Here’s How The Clinton’s Free Private Jet Scam Works

            Ira Magaziner, the CEO of the Clinton Health Access Initiative, asked former President Bill Clinton to thank Morocco’s King Mohammed VI for “offering his plane to the conference in Ethiopia.”

            “CHAI would like to request that President Clinton call Sheik Mohammed to thank him for offering his plane to the conference in Ethiopia,” Magaziner gushed in a November 22, 2011 email released by WikiLeaks.

            Clinton frequently has expected free, luxurious private jet travel during his post-presidential life. Clinton, his wife and daughter have artfully secured free air travel and luxurious accommodations since they left the White House. It’s an effective way to accept gifts of great value without declaring them for the Clinton Foundation.

          • Clinton Foundation memo reveals Bill and Hillary as partners in crime

            Last week, WikiLeaks dropped a 2011 memo by top Bill Clinton aide Doug Band that lays bare Team Clinton’s sordid financial dealings when Hillary Clinton was secretary of State.

            Band describes how the Clinton Foundation served as a conduit for what he called “Bill Clinton Inc.” — the former president’s for-profit arm. Other documents show State Department involvement.

            The result is an unsavory mix of charity work, profiteering, and pay-to-play politics that potentially reaches the highest levels of US foreign policy and screams for IRS and Department of Justice reviews.

            At center is Band and his consulting firm Teneo. Band served as gatekeeper to all things Bill Clinton. Those wanting a former president as golf partner ponied up. Requests for Foundation dough followed. Next came Clinton Inc. — the steady stream of speeches, books, and honorary titles that enriched Bill Clinton. Teneo managed it all.

            Huge corporations and others seeking Clinton’s orbit lined up. Teneo’s clients included major U.S. corporations Coca-Cola and Dow Chemical, which donated huge sums.

            Foreign firms like UBS donated and greased Clinton Inc.

            For-profit Laureate International Universities went further, buying Clinton “advice” and rights to his prestige for $3.5 million annually. In all, Band states Teneo’s management yielded the former president $50 million — including a $2 million upfront slice of Band’s firm — with another $66 million queued. Band also facilitated political activity including securing campaign donors and managing Clinton’s political schedule.

          • The Clinton Foundation: Hopelessly Corrupt Or Just A Lousy Charity?

            Public Corruption: As the unseemly ties between the Clinton Foundation and Hillary Clinton’s State Department become more glaring and disturbing, the rhetoric from the Democratic side is getting more desperate. Now Clinton hatchet man James Carville says critics of the foundation are going to hell.

          • Poll: Comey’s bombshell changes few votes

            The race for the White House is tight, but it has not been radically changed by the FBI director’s bombshell announcement last week.

            Hillary Clinton has a slim three-point lead over Donald Trump one week before Election Day, according to a new POLITICO/Morning Consult poll conducted entirely after FBI Director James Comey announced the discovery of new emails that might pertain to the former secretary of state’s private server.

            Clinton leads Trump 46 percent to 43 percent in a two-way race, and 42 percent to 39 percent in a four-way race, with Libertarian nominee Gary Johnson at 7 percent and the Green Party’s Jill Stein at 5 percent.

            The poll was conducted using an online panel of 1,772 likely voters on Saturday and Sunday, beginning one day after Comey’s announcement. The poll carries a margin or error of 2 percentage points.

          • National poll: Trump now leads Clinton by 1 point

            Republican presidential nominee Donald Trump has overtaken Democratic rival Hillary Clinton for the first time since May in a national tracking poll.

            Trump has a 1-point lead over the former secretary of State, 46 to 45 percent, in the ABC News/Washington Post poll released Tuesday morning.

          • Trump Leads Clinton by 1 Point in New Poll as Enthusiasm Declines

            While vote preferences have held essentially steady, she’s now a slim point behind Donald Trump — a first since May — in the latest ABC News/Washington Post tracking poll, produced for ABC by Langer Research Associates.

            Forty-six percent of likely voters support Trump in the latest results, with 45 percent for Clinton. Taking it to the decimal for illustrative purposes, a mere .7 of a percentage point divides them. Third-party candidate Gary Johnson has 3 percent, a new low; Jill Stein, 2 percent.

          • Report & Wikileaks Reveal How Facebook, Clinton Loyalists Control Your Newsfeed

            Censorship by Facebook has become a thorn in the side of nearly anyone with an opinion differing from the narrative touted by the corporate press — for instance, sentiments not praising Hillary Clinton — and now, through both a new report from Reuters and emails published by Wikileaks, we have insight into why certain posts are targeted.

          • John Podesta’s Best Friend At The DOJ Will Be In Charge Of The DOJ’s Probe Into Huma Abedin Emails

            Now that the FBI has obtained the needed warrant to start poring over the 650,000 or so emails uncovered in Anthony Weiner’s notebook, among which thousands of emails sent from Huma Abedin using Hillary Clinton’s personal server, moments ago the US Justice Department announced it is also joining the probe, and as AP reported moments ago, vowed to dedicate all needed resources to quickly review the over half a million emails in the Clinton case.

          • ‘Google has power to control elections, can shift millions of votes to Clinton’ – Robert Epstein

            People trust the “unbiased” internet search giant Google so much it can actually influence up to 10 million undecided voters to choose Hillary Clinton for president, prominent US psychologist and author Robert Epstein told RT following years of research.

            Despite being a supporter of the Democratic presidential nominee, Dr. Epstein believes Google’s unchecked algorithm of placing one candidate over the other in search results constitutes a “threat to democracy.”

        • Censorship/Free Speech

        • Privacy/Surveillance

          • Interrogated by Finnish police for alleged idendity crimes, fraud and attempts of fraud

            Putting the word out: I was interrogated by the Finnish police today for
            multiple alleged counts (15+) of identity crimes, fraud and attempts of
            fraud. The invitation letter to be interrogated was sent out on
            2016-10-21 and received by me on 2016-10-25. Today is 2016-10-31.

            The police suspects me because of an “IP-address assigned to my name”,
            which I can’t confirm or deny to have a relation to me. As a suspect, I
            was not told what this aclaimed IP-address was on a specific date to my
            knowledge. It is only speculation if these allegations wrongly against
            me have something to do with my relation with the Tor community or
            activism about digital rights online.

            Pending ongoing investigation, I am not allowed by law to share more
            specific details about to the investigation. I’d be glad to reveal more
            details about the case once the investigation is over and share/hear how
            I became a suspect, once I know about it. (Note that my story is at
            least slightly opinionated.)

            I had a witness with me and I feel like my rights were being violated
            during the interrogation. The officer (not to be named publicly in
            respect for privacy) didn’t want to allow me to write down their badge
            number by taking the badge away from me while trying to write down the
            numbers. The officer looked slightly anxious.

          • Google Glass can teach you Morse code in four hours without trying

            If all that is meaningless to you, don’t worry. Researchers at the Georgia Institute of Technology have found a way for humans to learn Morse code in four hours just by playing games.

            The subjects were given Google Glass headsets (ask your parents) and continued to play games while vibrations near the ear slowly embedded subconscious Morsey goodness into their brains, reported Phys.org.

          • South African Spy Company Used by Gadaffi Touts its NSA-Like Capabilities

            The South African company best known for selling Muammar Gaddafi’s regime spy equipment used to monitor millions of Libyans’ international phone calls is now claiming it can intercept communications on a scale that rivals a government spy agency, according to a company brochure obtained by The Intercept.

            In a 2016 pamphlet produced by VASTech SA Pty Ltd., the company outlines its current capabilities for governments, militaries, and law enforcement agencies around the world, claiming it can conduct “passive detection” of communications transmitted from satellites, fix-and-mobile phones, and fiber optic cable.

            The company is offering multiple tools to vacuum up communications from around the globe undetected, or what the company calls “communication intelligence extraction solutions” — a capability not unlike the U.S. National Security Agency’s PRISM program.

          • Who are the Shadow Brokers?
          • New Leak Leads To Another NSA Spying Scandal
          • Hackers say they’re revealing more from trove of NSA data
          • NSA-Hacking ‘Shadow Brokers’ Reveal Spy-Penetrated Networks
          • Shadow Brokers leak second batch of data allegedly from NSA-linked ‘Equation Group’ hacking unit
          • Shadow Brokers releases list of servers hacked by the NSA
          • Shadow Brokers post list of compromised IP addresses
          • New leak may show if you were hacked by the NSA
          • Hacking group says list features servers infiltrated by National Security Agency
          • The Shadow Brokers dump more intel from the NSA’s elite Equation Group
          • Shadow Brokers leak list of supposed NSA controlled computers in China, Russia
          • Shadow Brokers claim to leak NSA cyberespionage targets
          • ‘Shadow Brokers’ dumps list of NSA-hacked attack servers
          • Shadow Brokers Tell U.S. to Pay to Get Files Back
          • Second Shadow Brokers dump released
          • Shadow Brokers Give NSA Halloween Surprise With Leak Of Hacked Servers
          • Hackers expose apparent NSA cyber espionage operations
          • NSA has been hacking Sonatrach from 2010 to 2002
          • Shadow Brokers leak systems hacked by NSA – mostly mail and uni servers in India, China
          • New leak reveals over 100 web addresses compromised by the NSA
          • Shadowbrokers’ NSA dirty tricks spill points to compromised servers in China and Russia
          • Shadow Brokers leaks list of NSA targets and compromised servers
          • NSA Hackers The Shadow Brokers Dump More Files
          • Hacker group releases list of NSA-compromised servers
          • Past behaviour did not stop leaker from accessing sensitive NSA Data

            The US National Security Agency’s (NSA) latest alleged leaker apparently raised no red flags despite a history of abnormal behaviour. The New York Times reported on 29 October that Harold T. Martin III, who is accused of stealing 50 terabytes of data from the NSA, apparently dealt with divorces, unpaid taxes, legal charges and drinking problems and was still allowed access to top secret information.

            In a detention hearing on 28 October, Judge Richard D. Bennett noted that Martin had a history of drinking problems. In 2006, he faced a drunk driving charge. Martin is known to have been called up for unpaid taxes in 2000, which he did not pay off for over a decade. Martin’s other run ins with the law include a computer harassment charge and an incident where he pretended to be a police officer during a traffic dispute.

            Martin’s house would eventually be raided by the Federal Bureau of Investigation in August 2016. He was arrested when investigators found thousands of pages of classified material on several storage devices, apparently taken from a variety of jobs he held as an NSA contractor, most recently for Booz Allen. It is not clear whether Martin was merely hoarding this information, or intended to leak it. His lawyers have stated that “there is no evidence that he intended to betray his country”.

          • Rights Groups, Activists Ask President To Respond To Unanswered Encryption Petition

            A bunch of organizations concerned with privacy, free press, and human rights are gently reminding the outgoing president that he still hasn’t fully responded to a We the People petition about encryption.

          • Montreal police monitored iPhone of La Presse journalist Patrick Lagacé

            Montreal police strongly defended a highly controversial decision to spy on a La Presse columnist by tracking his cellphone calls and texts and monitoring his whereabouts as part of a necessary internal police investigation — while the journalist involved called what they did “indefensible.”

            “Lives were not at stake, this was not a question of national security,” La Presse columnist Patrick Lagacé said in an interview Monday. “The leaks made them look bad, that’s why they decided to go after me in the way they did.”

            Opposition politicians are also condemning Montreal police for spying on Lagacé, though Montreal Mayor Denis Coderre stood by police chief Philippe Pichet on Monday, noting that a mayor should not intervene in police operations, but did say he was troubled by the news.

            For several months this year, police were monitoring Lagacé’s iPhone to determine the identity of his sources, La Presse reported. This was confirmed to Lagacé last Thursday by Montreal police.

            At least 24 surveillance warrants were granted by courts in 2016, at the request of the Montreal police department’s special investigations section, which probes crime within the police force. The warrants allowed police to track the telephone numbers of incoming and outgoing calls on Lagacé’s phone, and to monitor the phone’s location, although Pichet denied at a hastily convened press conference Monday that the GPS on his phone was monitored.

            Lagacé said he is sure many judges around the world have been asked by police departments to grant similar warrants, but refused because it was too “vulgar” to spy on a reporter. “It was incredibly aggressive,” he said, questioning the judgment of the judge involved.

          • Lords examines Investigatory Powers Bill

            The Investigatory Powers Bill will have its third reading, a final chance to tidy up the bill and make changes, in the House of Lords on Monday 31 October.

          • Belgian Court Fines Microsoft For Failing To Comply With Its Impossible Order

            The court, failing to understand anything but its power to order people around, demanded Skype turn over communications. Skype turned over the only thing it could actually obtain, explaining that its architecture didn’t support the interception of calls. No dice. That only made the court angry.

            The court was no more happy to have pointed out to it that Microsoft didn’t actually fall under its jurisdiction. It maintains no data centers in Belgium, nor does it have anyone employed there. Microsoft suggested the court work with governments of countries where it actually maintains a presence and utilize their mutual assistance treaties.

          • Brandi Collins on Black Lives Surveillance

            Corporate journalists rely on the First Amendment, but it’s increasingly unclear if the First Amendment can rely on them. The relative lack of interest in the impact of spying on activists—a practice with a long and disturbing history given new power by technology—is the latest example.

          • As Expected, FCC Passes Modest Privacy Rules For Broadband Providers, ISPs Act Like World Has Ended

            Over the past week, we’ve been talking a lot about the need for more transparency and user control for privacy on the internet, so it’s only fitting that the FCC has officially adopted its new privacy rules for ISPs that will require broadband providers to be much more explicit concerning what information it collects and shares with others, and provide (mostly) clear “opt-in” requirements on some of that data collection. This isn’t a surprise. It was pretty clear that the FCC was going to approve these rules that it announced earlier this year. And, of course, the big broadband providers threw a giant hissy fit over these rules that just ask them to be more transparent and give users at least a little bit of control over what data is collected.

            Comcast has caused these proposals “irrational” and various think tankers paid for by the broadband providers tried to tell the world that poor people benefit from a lack of privacy. And magically new studies came out claiming that broadband providers are cuddly and lovable, rather than snarfing up everyone’s data.

            And, of course, the various broadband providers want to blame Google for the rules, because everyone wants to blame Google for everything. The issue here is that the broadband access providers have these rules, while online service providers, like Google and Facebook do not. There are, of course, a few responses to this. The first, is that the FCC doesn’t have authority over those sites, like it does have over the access providers under the Telecom Act. The second is that users are much more locked in to their broadband access provider, and there is much less competition. Switching is much more difficult. The third argument is, basically, that Google and Facebook don’t have nearly the same history as the broadband access providers of really nasty privacy violations. Hell, just as these new rules were coming, Verizon was being fined for stealth zombie cookies. Finally, the simple fact is that broadband access providers have the power to spy on a lot more internet activity than Google or Facebook. Yes, those other services are in more and more places, but it’s not difficult to block them. With your ISP everything goes through their pipes, and unless you carefully encrypt your traffic via a VPN, they get to see everything.

          • Why do we still accept that governments collect and snoop on our data?

            In recent weeks, the Hollywood film about Edward Snowden and the movement to pardon the NSA whistleblower have renewed worldwide attention on the scope and substance of government surveillance programs. In the United States, however, the debate has often been a narrow one, focused on the rights of Americans under domestic law but mostly blind to the privacy rights of millions of others affected by this surveillance.

        • Civil Rights/Policing

          • At DAPL, Confiscating Cameras as Evidence of Journalism

            While elite media wait for the resistance to the Dakota Access Pipeline to go away so they can return to presenting their own chin-stroking as what it means to take climate change seriously, independent media continue to fill the void with actual coverage.

            One place you can go to find reporting is The Intercept (10/25/16), where journalist Jihan Hafiz filed a video report from North Dakota, where the Standing Rock Sioux and their allies continue their stand against the sacred site–trampling, water supply–threatening project.

          • ‘Dumbfounded’: Documentarian facing 45 years for filming pipeline protest

            Schlosberg was arrested in Walhalla, North Dakota, on October 11 for filming activist Michael Foster — a member of the group known as Climate Direct Action — as he shut off a valve of a Canadian tar sands pipeline. In solidarity with protesters opposing the Dakota Access Pipeline in North Dakota, activists shut down similar valves in Washington, Montana, and Minnesota on the same day.

            However, authorities in North Dakota have charged the filmmaker with two Class A felonies and one Class C felony, including conspiracy to theft of property, conspiracy to theft of services, and conspiracy to tampering with or damaging a public service.

          • Descendants of Jewish refugees seek German citizenship after Brexit vote

            Descendants of the tens of thousands of German Jews who fled the Nazis and found refuge in Britain are making use of their legal right to become German citizens following the Brexit vote.

            German authorities have reported a twentyfold increase in the number of restored citizenship applications – a right reserved for anybody who was persecuted on political, racial or religious grounds during the Nazi dictatorship, as well as their descendants.

          • Inside Nigeria’s Baby Factories

            Baby factories in Nigeria are pumping out babies for sale on the illegal adoption market. Swedish journalist Therese Cristiansson infiltrated these baby-trafficking networks with a hidden camera.

          • Nigeria lost $9bn to Boko Haram attacks – Presidential panel

            The Presidential Committee on North-East Initiative has revealed that the nation lost about $9bn to the violent activities of the Boko Haram insurgents in Borno, Yobe and Adamawa states.

            According to the committee, a strategic framework would soon be set up by President Muhammadu Buhari in line with his determination to rebuild the North-East.

            The Vice-Chairman of the PCNI, Alhaji Tijani Tumsah, said this on Thursday in Abuja, while briefing newsmen on the outcome of its inaugural meeting.

            According to him, the focus of the meeting was to discuss the mandate given to the PCNI to fashion out a way that would be most direct, in terms of the delivery of that mandate, analyse the enormity of the task and fulfil the presidential mandate to give succour to the people of the North-East.

            Tumsah said, “We are not investigating anybody; there are people who are investigating such diversions. I’m glad you mentioned the Senate, the House of Representatives, police and the EFCC. Our mandate, going forward, is to provide a strategic framework for the implementation of all interventions going into the North-East in terms of humanitarian works, resettlement and eventual rebuilding of the North-East.

          • Iran: Writer Jailed For Writing Unpublished Story

            On Monday, Iranian intelligence authorities broke the apartment door of writer and human rights activist Golrokh Ebrahimi Iraee, raided her apartment and took her by force to serve a 6 year prison sentence for writing a story on stoning women in Islam, that was never published.

            Golrokh Ebrahimi Iraee 35 years old, is the wife of political prisoner Arash Sadeghi, 36 who is now serving a 19 year prison sentence in Iranian prisons. The family has suffered much mistreatment since the 2009 disputed presidential election in Iran and have been in and out of prison. They have also lost their mother who had a stroke the minute the authorities raided their home in 2009.

          • Iran: Writer facing imminent imprisonment for story about stoning

            Iranian authorities must immediately repeal the conviction and sentence of Golrokh Ebrahimi Iraee, a writer and human rights activist who is due to begin serving six years in prison on charges including “insulting Islamic sanctities” through the writing of an unpublished story about the horrific practice of stoning, Amnesty International said today.

            “The charges against Golrokh Ebrahimi Iraee are ludicrous. She is facing years behind bars simply for writing a story, and one which was not even published – she is effectively being punished for using her imagination,” said Philip Luther, Research and Advocacy Director for the Middle East and North Africa at Amnesty International.

          • Woman recalls moment she was strip-searched by police aged 12

            A woman has described being strip-searched by police when she was 12 years old.

            Georgia Wood, now 20, said the officers were “horrible and demeaning” and the incident had “really affected” her life, leaving her lacking confidence and suffering panic attacks.

            Ms Wood was taken into police custody in south Wales eight years ago with her mother, who was suspected of possessing drugs.

            No illegal substances were found on Ms Wood or her mother, Karen Archer, who wasn’t charged with an offence.

            According to figures acquired by the BBC from 13 police forces in England and Wales, more than 5,000 children aged 17 and under were strip-searched between 2013 and 2015.

          • Saudi Arabia is preparing to behead and crucify a 21-year-old activist

            A young Saudi Arabian Shi’a activist, who was sentenced to death last year, has lost his final appeal for justice and is due to be executed by beheading, followed by the mounting of his headless body onto a crucifix for public viewing.

            Human rights groups and Saudi critics are appalled by both the nature of the execution and the flimsy case against Ali Mohammed al-Nimr, though neither of these factors are unusual in today’s Saudi Arabia.

          • Muslim women complain about Sharia inquiries

            More than 100 Muslim women have complained about their treatment under two government probes into Sharia law.

            The inquiries – one ordered by Theresa May when she was home secretary, and another by the home affairs select committee – are ongoing.

            But some women have signed an open letter and said the aim is to ban Sharia councils, not reform them.

            The Muslim Women’s Network UK said the inquiries risk treating women like “political footballs”.

            The councils are tribunals often used to settle disputes within the Muslim community.

            The first evidence session on Sharia councils is due to be held by the home affairs committee on Tuesday.

          • Sharia Courts interfered to protect domestic abusers, MPs told

            Leading figures from the UK’s Sharia councils will give evidence in parliament tomorrow, in the wake of accusations that a leading Sharia court has been protecting domestic abusers from criminal proceedings.

            The Home Affairs Select Committee has published written evidence submitted to it that is heavily critical of the Muslim Arbitration Tribunal (Mat) in Nuneaton, Warwickshire, in advance of its session on Tuesday. The Mat states on its website that it urges the Crown Prosecution Service to “reconsider” criminal charges brought against Muslim men accused of domestic violence.

            The Southall Black Sisters, a group that helps vulnerable women, have told the committee that the strategy of asking the CPS to “reconsider” cases is an “attempt to sabotage criminal proceedings”.

          • UK.gov’s pricey Five Year Plan to see off cyber thugs still in place

            UK Chancellor Philip Hammond is due to reaffirm a pledge to spend £1.9bn up until the end of 2020 to bolster the UK’s cyber security strategy in a speech early this afternoon.

            The updated strategy – which doesn’t include any new spending pledges1 – is expected to include an increase in focus on investment in automated defences to combat malware and spam emails, establish a fund earmarked to recruit 50 specialists to work on cybercrime at the National Crime Agency, the creation of a Cyber Security Research Institute and an “innovation fund” for cyber security startups. All this investment is needed because of increased threats from nation state attackers, terrorists and organised crime gangs, the Chancellor is expected to say.

          • Legislators Demand Answers From DOJ On Expanded Hacking Powers It’s Seeking

            There’s only a couple of months left until the DOJ’s proposed Rule 41 changes become law. All Congress has to do is nothing. This is a level of effort Congress is mostly amenable to. If this becomes law, worldwide deployments of malware/spyware during investigations will be unable to be challenged in court. In addition, the DOJ wants to be part of the cyberwar. It’s seeking permission to remotely access zombie computers/devices used in cyberattacks to “clean” them.

          • There’s no way your Facebook “check-in” is confusing North Dakota cops

            On Monday, supporters of the Standing Rock Sioux Tribe’s protest against the Dakota Access Pipeline began a viral campaign enticing people to “check in” to the reservation on Facebook as a way to “overwhelm and confuse” local law enforcement.

            However, there is no evidence that this tactic is effective, particularly as the Morton County Sheriff’s Department expressly said on its own Facebook page that it “is not and does not follow Facebook check-ins for the protest camp or any location. This claim/rumor is absolutely false.”

            In recent months, activists have been protesting at the site on the border of North and South Dakota in an attempt to halt a planned oil pipeline that many believe would damage the local water supply and desecrate tribal lands.

            This Facebook plea is similar to calls in 2009, during the controversial presidential election in Iran, where supporters of the Green Movement urged people to change their Twitter location to Tehran. Similarly, there was no indication that this action mitigated local Iranian authorities’ ability to arrest protesters.

          • Turkey detains 13 journalists after mass firings of public servants

            Turkey has detained 13 journalists in an ongoing wave of government crackdowns following a coup attempt in July.
            Early Monday morning, Turkish police detained Murat Sabuncu, editor-in-chief of the newspaper Cumhuriyet, along with a dozen other reporters in a raid, according to official news agency Anadolu.

          • Branding Moderates as ‘Anti-Muslim’

            As if facing down violent Islamist fanatics isn’t enough, Muslim reformers now have to dodge attacks from the American left. Consider the Southern Poverty Law Center’s decision last week to brand two such reformers, Ayaan Hirsi Ali and Britain’s Maajid Nawaz, as “anti-Muslim extremists.”

          • Indonesian woman becomes latest person to be caned ‘for standing near boyfriend’

            A 20-year-old woman in Indonesia has been publicly caned for standing too close to her boyfriend, becoming the 14th person to be flogged this month in the same province.

            The unnamed woman was accused of breaking Islamic Sharia law, which strictly forbids unmarried couples to become intimate, and was flogged in front of a crowd in Banda Aceh province.

            She was escorted onto a stage outside a mosque wearing a headdress and was lashed with a cane.

            Incidents of the punishment have reportedly increased recently in Indonesia.

        • Internet Policy/Net Neutrality

          • AT&T’s Already Making Things Up To Get Its Massive New Merger Approved

            Over the years, we’ve noted how AT&T has a nasty habit of lying to sell the public, press and regulators on the company’s neverending attempts to grow larger. Whether it’s promising broadband expansions that never arrive, or using astroturf to try and argue anti-consumer mergers are good for toddlers, AT&T’s lobbyists, lawyers, and policy tendrils work tirelessly to argue that up is down, black is white, and any skepticism of its claims are unfounded hysteria. As we saw with the blocked T-Mobile merger, this sort of behavior doesn’t work quite as well as it used to.

            Enter AT&T’s latest $85 billion planned acquisition of Time Warner. Consumer advocates worry AT&T could use its size and leverage to make content more expensive, while the usage caps and zero rating give AT&T’s own upcoming streaming video service an unfair market advantage. Wall Street hasn’t exactly been bullish on the idea either, noting how AT&T’s $69 billion acquisition of DirecTV, followed by its $85 billion acquisition of Time Warner is not only a giant risk on the eve of the cord cutting revolution, but it saddles AT&T with an absolute mountain of debt that will potentially damage the company’s credit rating.

          • Most of Canada’s Biggest Telecoms Want to End Net Neutrality

            On Monday, Canada’s federal telecommunications regulator debates the principle of net neutrality—the idea that every online service should be equally accessible in terms of connection speed and data costs.

            It’s fitting that this hearing takes place on Halloween, because the idea that one of Canada’s telecoms could favour a certain music streaming service, for example, over another—by making Spotify free to use, while Apple Music eats away at your data plan, for example—is pretty spooky.

        • Intellectual Monopolies

          • Copyrights

            • Sega/Steam Took Down A Bunch Of Legitimate Steam Workshop Mods Over Copyright Concerns

              We’ve talked often about how common it is for legitimate customers to get caught up in attempts to thwart piracy and copyright infringement. From DRM keeping legit purchasers from using what they paid for to Fair Use uses of content getting taken down by automatic systems on sites like YouTube, it’s worth noting whenever this happens. After all, there is an expression in the legal system that goes something like: I’d rather set 100 guilty people free than imprison a single innocent. The stakes when it comes to copyright aren’t as high as jail time, typically, but it’s interesting how little this mantra penetrates with those who would enforce copyright via carpet-bomb rather than a scalpel.

              Take the recent incident with Sega’s Steam Workshop mod-space, for instance, where dozens and dozens of mods within the platform suddenly disappeared.

            • My Talk At Wikimedia: Copyright Impacts Everything

              Last week, I mentioned that I was giving a talk at the Wikimedia Foundation about copyright. It was a fun time, and the video from the talk is now online. Unfortunately, the audio and the video are… not entirely great. I’d complain about the terrible microphone, but that sounds like a certain presidential candidate. The video is okay, but the colors are off, so my presentation looks a little weird. Either way, you should still be able to get the basics. There’s an introduction from Jan Gerlach at the Wikimedia Foundation, talking about all the important policy work they do, then my talk that runs about half an hour, followed by a Q&A with the audience that runs another half hour or so. It was a fun time, with a really great group of folks, and the conversation continued on after the official session ended for quite a while.

            • Supreme Court Asks White House To Weigh In On Dancing Baby Fair Use Case

              The copyright case involving Stephanie Lenz and her dancing baby is one that may finally be nearing a conclusion after many, many years — but it’s not over yet. As you may recall, Lenz posted a very brief clip of her then toddler, dancing along to a few seconds of a barely audible Prince song. This was almost a decade ago.

            • Copyright and cheerleaders at the Supreme Court

              Star Athletica v Varsity Brands involves copyright protection for cheerleader uniforms. The question asked is: What is the appropriate test to determine when a feature of a useful article is protectable under Section 101 of the Copyright Act?

              “It is important because the court may well strike out on a new course or at least throw its determinative hat in the ring on how to approach useful articles more generally,” says Robert Brauneis of The George Washington University Law School, who will be presenting the session.

            • Copyright on a Useful Item

              Today the Supreme Court heard oral arguments in the pending copyright case of Star Athletica v. Varsity Brands. Although not a patent case, the issue involves the boundary line (if any) between patent and copyright and the “useful article” exception. Question Presented: What is the appropriate test to determine when a feature of a useful article is protectable under section 101 of the Copyright Act. The statutory test under Section 101 states that “the design of a useful article . . . shall be considered a pictorial, graphic, or sculptural work only if, and only to the extent that, such design incorporates pictorial, graphic, or sculptural features that can be identified separately from, and are capable of existing independently of, the utilitarian aspects of the article.”

            • Power Struggle In Russia As Internet Pirates Vie For Upper Hand

              The Russian intellectual property industry is on the verge of a new scandal. Following the recent arrest of Sergey Fedotov, head of the Russian Authors’ Society (RAS), Russia’s leading public association for the protection of intellectual property rights, on the charge of multi-million ruble thefts, the Russian police has announced the initiation of criminal proceedings against Maxim Ryabyko, head of the Russian Association for the Protection of Copyright on the Internet (RAPCI).

            • 86-Year Old Grandma Accused of Pirating a Zombie Game

              Since it’s become mandatory for ISPs to forward piracy notifications in Canada, hundreds of thousands of people have received letters over alleged copyright infringements. One of these accused pirates is an elderly woman, who’s threatened with $5,000 in potential damages for downloading a zombie game she’s never heard of.

            • ‘Shocked’ grandmother on hook for illegal mutant game download

              Post-nuclear war, mutant-killing video games are not Christine McMillan’s thing.

              But the 86-year-old from Ontario has been warned she could have to pay up to $5,000 for illegally downloading a game she’d never heard of.

              She is one of likely tens of thousands of Canadians who have received notices to pay up, whether they are guilty or not.

              “I found it quite shocking … I’m 86 years old, no one has access to my computer but me, why would I download a war game?” McMillan told Go Public.

              In May, she received two emails forwarded by her internet provider.

              They were from a private company called Canadian Intellectual Property Rights Enforcement (CANIPRE) claiming she had illegally downloaded Metro 2033, a first-person shooter game where nuclear war survivors have to kill mutants.​

            • Canada Copyright Troll Threatens Octogenarian Over Download Of A Zombie War Game

              Copyright trolling is somehow still a thing and it never seems to fail to provide ridiculous examples of miscarriages of justice. It has been long pointed out how rife with inaccuracy the process of threatening individuals with lawsuits and fines based on infringement as evidenced only by IP address is. Even courts have time and time again pointed out that an IP address is not sufficient to identify a person responsible for a given action. Yet the trolls still send out their threat letters, because bullying in this manner generally works.

              The latest example of this kind of trolling misfire comes from Canada, where 86-year-old Christine McMillan received a threat letter from CANIPRE over an alleged infringing download of Metro 2033, a game in which the player slaughters zombies in a post-nuclear world.

            • Pirate Party Books Election Victory in Iceland

              The Pirate Party in Iceland booked an important victory in the local parliamentary election today, scoring 14.5% of the total vote. While lower than most polls predicted, it marks the first time that a Pirate Party, anywhere in the world, has a serious shot at taking part in a government coalition.

            • Iceland’s Pirate Party Gains Ground in Election

              After near-constant exposure to the nausea-inducing dumpster fire that is the 2016 U.S. presidential race, it might be hard to grok that a movement of anti-establishment internet pirates has become one of the leading political parties of a small island nation.

              And yet that’s what’s happening in right now in Iceland, where the hacktivist-inspired Pirate Party achieved significant victories in the country’s parliamentary elections yesterday. Yesterday they won 14.5 percent of the popular vote, putting them in third place behind the center-right Independence Party and the Left-Green Movement, who won 29 percent and 15.9 percent of the vote respectively. (Earlier results showed them beating the Left-Green Movement for second place, but that changed as more votes were counted.)

              It wasn’t enough to seize majority control of the country as some polls for the extremely tight race were suggesting, but it was enough to win them 10 seats in the 63-seat parliament, up from the mere three they held after the 2013 elections. The formerly leading center-right Progressive Party, meanwhile, saw its seats drop by over half from 19 to eight, its dominance soundly trounced by the Pirates and the country’s smaller left-leaning parties: Left-Green, Bright Future, and Social Democrats. In the wake of the news, Icelandic prime minister and progressive Party member Sigurður Ingi Jóhannsson resigned Sunday.

            • EU Advocate General Declares That Hotels Don’t Need To Pay Copyright License To Have In-Room Television

              We’ve seen all manner of silly claims by copyright licensing groups as to what requires what kind of license in every kind of circumstance. These licensing groups have gone after children’s charities. A UK collection society had the strategy of calling up local businesses and demanding payments should they hear music playing in the background. The Author’s Guild once claimed that reading a book out loud constituted the need for a separate license, while ASCAP asserted with a straight face that the ring of a mobile phone was a public performance. This panoply of idiocy might be funny, except for the very real harm done through this kind of harassment.

              Even the good stories in this vein weigh heavily in that they are necessary at all. For instance, the advocate general for the EU’s Court of Justice recently wrote an opinion advising that hotels didn’t need a copyright license just to have televisions within guest rooms. It’s a good ruling, but conjures the frustrating question as to why it was needed in the first place. The answer, of course, is because a collection group was attempting to collect from hotels for just that reason.

        ]]>
        http://techrights.org/2016/11/01/debian-drops-powerpc/feed/ 0
        Links 30/10/2016: Lenovo Surrenders to Linux, Bodhi Linux 4.0.0 Released http://techrights.org/2016/10/30/lenovo-surrenders-to-linux/ http://techrights.org/2016/10/30/lenovo-surrenders-to-linux/#comments Sun, 30 Oct 2016 16:00:10 +0000 http://techrights.org/?p=96489

        GNOME bluefish

        Contents

        GNU/Linux

        Free Software/Open Source

        • What you can learn from GitHub’s top 10 open source projects

          Open source dominates big data. So much so, in fact, that Cloudera co-founder Mike Olson has declared, “No dominant platform-level software infrastructure has emerged in the last ten years in closed-source, proprietary form.” He’s right, as the vast majority of our best big data infrastructure (Apache Hadoop, Apache Spark, MongoDB, etc.) is open source.

        • Nine in ten companies use open source

          It’s not surprising that businesses are feeling jittery about cybersecurity, especially after last week’s news that a botnet had used Internet of Things devices to hack into platforms like Reddit, Twitter and Spotify. And this week, a new report from Rackspace, the managed cloud company, has revealed that while many companies are now using open source – a type of software that makes the original source code freely available – they still harbour security concerns.

          The report, which surveyed 300 large organisations in the UK, found that 90% of companies are using open source coding, despite 54% associating it with security threats. And while 25% of companies are fully using open source, of the companies that aren’t fully using it, 49% saw closed source technologies as more secure.

        • Why Professional Open Source Management is Critical for your Business

          In his Open Source Landscape keynote at LinuxCon Japan earlier this year, Jim Zemlin, Executive Director of the Linux Foundation said that the trend toward corporate-sponsored open source projects is one of the most important developments in the open source ecosystem. The jobs report released by the Linux Foundation earlier this year found that open source professionals are in high demand. The report was followed by the announcement that TODOGroup, a collaboration project for open source professionals who run corporate open source program offices, was joining the Linux Foundation. Open source is no longer exclusively a pursuit of the weekend hobbyist. Professional open source management is a growing field, and it’s critical to the success of your technology strategy.

        • Ignite UI Is Now Open Source!

          For a while now, Ignite UI has been the choice for large enterprises to create beautiful and powerful modern web UIs on top of their enterprise data. We (Infragistics) are now making this product available to everyone. We want to open up the most powerful and easy-to-use UI framework for Modern Web Applications to everyone. In order to do this, we’ve made the majority of the line of business Ignite UI controls and components open source, and available on GitHub to everyone to grab! The open source part of Ignite UI is licensed under Apache 2.0.

        • Increasing Diversity is not Just the Duty of the Marginalized

          Often women are presented with a “Prove it again” bias in the workplace, in which they must repeatedly demonstrate their competence just to be taken seriously. As a member of the OpenStack Technical Committee for the past four years, Anne Gentle has encountered her fair share of these biases. Gentle shared her experience on today’s episode of The New Stack Makers podcast, recorded at the OpenStack Summit in Barcelona this week.

        • Microservices Ecosystem Transit Map

          Microservices architecture has reached a tipping point where its broad adoption is now pretty much guaranteed. According to a survey by NGINX, nearly a third of companies have deployed microservices in production, and another third are either using microservices in development or considering them. Furthermore, there is fairly even distribution of microservices adoption across small (36%), medium (50%), and large companies (44%), indicating that the approach has merit regardless of how many developers you have in your organization.

        • Free Dev Tools for Running or Creating a Site

          Are you involved in DevOps and web development, or are you aiming to be? If so, you’re probably very aware of many of the tools from the open standards and open source arenas that can make your work easier. Still, these are always spreading out at a fast clip and there are some applications and tools that are rarely discussed. Here at OStatic, we try to regularly update our collections focused on them. In this post, you’ll find numerous free resources for web development that range from complete online courses available for free to unsung applications.

        • Collaboration yields open source technology for computational science

          The gap between the computational science and open source software communities just got smaller – thanks to an international collaboration among national laboratories, universities and industry.

          The Eclipse Science Working Group (SWG), a global community for individuals and organizations who collaborate on commercially-friendly open source software, recently released five projects aimed at expediting scientific breakthroughs by simplifying and streamlining computational science workflows.

        • Open source data sharing software takes aim at cancer
        • Open source oncology software from Pitt, UPMC to speed genomic data sharing

          TCGA Expedition, a new new tool developed by the University of Pittsburgh, UPMC and the Pittsburgh Supercomputing Center, can help cancer investigators wade through huge amounts of genomic data.

          The open-source technology, which manages data from The Cancer Genome Atlas project, continuously downloads, processes and manages TCGA data, allowing researchers to choose specific tools as they work toward better treatments.

          “Starting with TCGA, our goal is to make large data sets available to the average researcher who would not otherwise be able to access this information,” said Rebecca Jacobson, MD, professor of biomedical informatics and chief information officer at Pitt’s School of Medicine, in a statement.

        • Pittsburgh researchers team up to offer open-source genomic software

          Several Pittsburgh-based genetic research organizations have released to the public an open-source software tool that aims to make researchers’ work easier while handing massive amounts of genomic data across disparate data sources.

          The three participants in the software development project, called TCGA Expedition, are the University of Pittsburgh, the UPMC health system and the Pittsburgh Supercomputing Center. The 30-year-old center is a collaboration between Carnegie Mellon University and the University of Pittsburgh.

          The genetic database known as the Cancer Genome Atlas is, for now, the focus of the Pittsburgh developers’ attention. It is a joint project of the National Cancer Institute and the National Human Genome Research Institute at the National Institutes of Health.

        • Open source is all about pay it forward

          When a bunch of open source devotees get together, the results can be quite astounding. In eight short years, Cloudera has become number five on the Forbes Cloud 100 list. As for the “pay it forward” reference – see the comments at the end.

        • Mitchell Hashimoto Talks About His Superpower and Why You Should Find Yours

          As the co-founder of HashiCorp, Mitchell Hashimoto is credited with being the creator of Vagrant, Packer, Terraform, Consul, Vault and other DevOps tools. In addition, he’s an O’Reilly author and a top GitHub user, whether guaged by followers, activity or contributions. That’s quite a set of accomplishments for a young man who’s still on the younger side of 30.

        • Events

          • Winners of NZ Open Source Awards revealed

            The winners of the 2016 New Zealand Open Source Awards have been announced.

            Jason Ryan, chair of the judging panel said the winners constituted an impressive list of New Zealand’s Open Source community, and represented a cross-section of a thriving technical, social and creative sector.

            “The calibre of the nominations meant that there were strong contenders in every category. And while all of the finalists were worthy of recognition, the judges unanimously agreed that the winners in each category were those most deserving of recognition for their contributions”, Ryan said.

            The Awards aim to raise awareness of the free and open source advantage for New Zealand by “telling powerful success stories based on real achievements that are already making a difference for our country,” according to the award web site.

          • Winners of the 2016 New Zealand Open Source Awards Announced [Ed: same as below]
          • Winners of the 2016 New Zealand Open Source Awards Announced
          • Tizen DevLab Coming to Bangalore India – 4 November 2016
          • OpenStack Summit Barcelona Presentation

            Yesterday I conducted my talk at the OpenStack Summit in Barcelona. You can find the presentation here: “Vanilla or Distributions: How Do They Differentiate?” and the video from the session on the OpenStack Foundation youtube channel.

          • CppCon Special Report

            KDAB has long supported the C++ community, as C++ is the backbone of Qt and up-to-date knowledge of its changes keeps us on the leading edge in the Qt world.

            Later this year we shall be supporting Europe’s Meeting C++ in Berlin, but now that this year’s talks have been released we felt it was time for a Special Report on CppCon which ran from September 17th-23rd this autumn in Bellevue, WA.

            KDAB’s Kévin Ottens was on the program committee and reviewed the talks at this year’s show, while Giuseppe D’Angelo (Peppe) contributed a day’s training on Programming with Qt Widgets, and two Lightning Talks on Qt (see them here and here), as well as attending the rest of the event.

          • GStreamer Conference 2016: Holographic Telecommunication in the Age of Free Software
          • Sysdig Camp-Con-World-Fest-Summit
        • Web Browsers

          • Mozilla

            • A Quantum Leap for the Web

              Over the past year, our top priority for Firefox was the Electrolysis project to deliver a multi-process browsing experience to users. Running Firefox in multiple processes greatly improves security and performance. This is the largest change we’ve ever made to Firefox, and we’ll be rolling out the first stage of Electrolysis to 100% of Firefox desktop users over the next few months.

              But, that doesn’t mean we’re all out of ideas in terms of how to improve performance and security. In fact, Electrolysis has just set us up to do something we think will be really big.

            • Mozilla Quantum: New Browser Engine Based On Servo/Rust For Firefox

              Mozilla’s latest secret project to go public is Quantum, a new browser engine for Firefox. But before wondering what happened to Servo, don’t worry, Quantum makes use of Servo and Rust.

            • Porting a few C functions to Rust

              Last time I showed you my beginnings of porting parts of Librsvg to Rust. In this post I’ll do an annotated porting of a few functions.

              Disclaimers: I’m learning Rust as I go. I don’t know all the borrowing/lending rules; “Rust means never having to close a socket” is a very enlightening article, although it doesn’t tell the whole story. I don’t know Rust idioms that would make my code prettier. I am trying to refactor things to be prettier after a the initial pass of C-to-Rust. If you know an idiom that would be useful, please mail me!

        • SaaS/Back End

        • Oracle/Java/LibreOffice

          • Community Week: Design – get involved

            Earlier this week we talked to Heiko Tietze, LibreOffice’s user experience (UX) mentor, and then looked at some of the changes that the Design team has made in recent releases of the suite. You’ve seen that even the smallest updates to the interface can have a significant effect, and the Design team is always looking for new ideas and contributions. So read on to learn how you can get involved and make LibreOffice better for everyone.

        • CMS

          • Wix denies allegations it stole WordPress code, says it open sourced work

            A day after being on the receiving end of allegations that it not only stole code from WordPress, it also failed to contribute back to the open-source community, Wix has responded, saying that the claims against it are baseless and that its do-it-yourself website building platform has been operating in good faith.

            In an open letter to WordPress creator Matt Mullenweg, Wix chief executive and cofounder Avishai Abrahami answered every criticism leveled at his company. He admitted that Wix did use WordPress’ open source library for “a minor part of the application,” but claimed that every modification or improvement the team made was submitted back as open source. Mullenweg had said previously that Wix’s mobile app editor, which was released this month, was built using “stolen code.”

          • Wix Delivers Weak Response To Stolen WordPress Code Claims

            Recently, Automattic CEO Matt Mullenweg’s accused Wix of stealing source code from WordPress and using it in the company’s mobile app “without attribution, credit, or following the license”. Wix, deciding it was best not to let Mullenweg’s stipulations go unchallenged, has fired back with a double-barrelled, if wishy-washy, reply.

            Matt Mullenweg’s letter garnered not one, but two responses from Wix: the first from CEO Avishai Abrahami and the second via the company’s lead engineer Tal Kol.

          • WordPress Creator Matt Mullenweg Blasts Wix, Avishai Abrahami Responds

            Matt Mullenweg, the creator of WordPress, is not happy with the editor used in the Wix mobile app, saying the web building service copied his platform. Wix.com’s CEO Avishai Abrahami responds to Mullenweg’s accusations.

            Mullenweg said in his blog that Wix’s mobile app seems familiar to him, it’s like he had used it before. He said he has because it’s WordPress.

            “If I were being honest, I’d say that Wix copied WordPress without attribution, credit, or following the license,” he said. “Wix has always borrowed liberally from WordPress – including their company name, which used to be Wixpress Ltd. – but this blatant rip-off and code theft is beyond anything I’ve seen before from a competitor.”

          • Nasdaq Taps Open Source Tech for IR

            Nasdaq Corporate Solutions, a business line of Nasdaq, Inc., is banking on the collective input from users of Drupal open-source web content management technology to empower its platform for IR websites.

          • Moodle Installation Made Easy

            Moodle is a very popular course-management system, equivalent to Blackboard, but entirely free and open source. This short YouTube video by Moodle expert Nellie Deutsch explains how you can install Moodle in your cPanel with Softaculous in under 2 minutes.

        • Pseudo-Open Source (Openwashing)

        • Public Services/Government

          • Poland to start a central source code repository

            Poland is to create a central source code repository, aiming to facilitate sharing and reuse of ICT solutions. The repository is part of an overhaul of the country’s eGovernment strategy, which was adopted last month.

          • Boston city Web site goes open source

            Boston has loaded the source code for boston.gov on github, which means code writers can now rummage around and submit improvements to make the site work better.

            City Hall says this makes Boston the first “major” US city to turn its Web site into an open-source project. Officials emphasize the code – based on open-source Drupal software – contains no sensitive data.

          • EXCLUSIVE – Creating an open source driven culture of innovation in the Malaysian government

            Senior ICT executives from Malaysian government agencies got together at an OpenGov Breakfast Dialogue to discuss the process of transforming government with flexibility and transparency, how to do more with less in an era of increasing budgetary constraints and the key role that could be played by Open Source.

        • Openness/Sharing/Collaboration

          • 3D-printed violins, a new tool from NASA, and more open source news
          • Open source healthcare and the empowered patient

            Conventional ‘top down’ health care is characterised by the system not really catering for the patient’s needs and often restricting the way patient data – especially for chronic conditions like diabetes and heart disease – can be shared and utilised, says patient advocate, Tim Omer. But there is an alternative, bottom up, approach he tells Ian Scales. A range of “community projects are very interesting because we’re freeing the (patient) data. We’re not necessarily saying we know how to use it, [but] we make it available and other community projects take that data and then do interesting things with it,” he says.

          • Open Hardware/Modding

            • An Open Source 96 MSPS Logic Analyzer For $22

              If you are in the market for an inexpensive USB logic analyser you have a several choices, but few of them deliver much in the way of performance. There are kits from China for a few dollars using microcontrollers at their heart, but they fail to deliver significant sample rates. If you require more, you will have to pay for it.

              [...]

              This project has the promise to add a very useful piece of test equipment to the armoury of the engineer on a budget, and to aid the cost-conscious reader he’s provided extensive documentation and installation instructions, as well as the code for the FPGA. Thanks to one of the more awesome hacks of 2015, there is an entirely open toolchain for this Lattice part, and our own [Al Williams] has written up a multi-part getting-started guide if you want to get your feet wet. You probably want one of these anyway, and now it’s a logic analyzer to boot.

            • Global CNC Metal Cutting Machine Tools Market Growth Value, Demand and Analysis 2016
            • Massive Open Source CNC Machine Created Offering 8 x 4ft Cutting Area (video)

              If you are looking for a large format CNC machine you might be interested in a new open source system which has been created by Bar Smith in the form of the Maslow CNC which provides a cutting surface 8 x 4ft in size.

        Leftovers

        • Hardware

          • The New Macbook Pro Has a Touchscreen Keyboard, Whether You Like It or Not

            The MacBook introduced in early 2015 already set the stage for this, but the MBP no longer has the USB ports you’re used to. Nope, the now has four Thunderbolt ports, Intel’s proprietary port that also supports the new, smaller, and reversible USB-C standard. What does that mean for you? Basically, if you want to continue to use your current USB devices, like mice, you’ll need an adapter.

        • Health/Nutrition

          • Don’t Be Fooled By Profiteers Option

            It is critical, if we are to solve the ongoing healthcare crisis in the US, that we are not fooled by what is actually the Profiteer’s Option that will be another gift to the insurance industry. We must unite instead and fight, just as we fight to stop pipelines and the Trans-Pacific Partnership, for the solution, national improved Medicare for All, a single payer system that nearly two-thirds of people in the US support.

          • More Hepatitis C Patients Being Treated In Developing Countries; Price Still An Issue

            In May 2016, the World Health Assembly adopted a viral hepatitis strategy with the goal of eliminating hepatitis B and C as public health threats by 2030.

            The report found that increasing generic competition is beginning to have an impact on the prices of hepatitis medicines, which are becoming more affordable in low- and most lower-middle-income countries. High prices in high income and middle-income countries have led to rationing of treatment, including in the European Union and Switzerland.

            Measures that have been used to increase affordability and improve access to hepatitis medicines include optimised procurement, voluntary licenses, local production, and patent oppositions, said the report.

            Countries that are not able to procure from generic sources have to engage in price negotiations unless they use flexibilities contained in the World Trade Organization Agreement on Trade-Related Aspects of Intellectual Property Rights, the report said. The report provides pricing information to help buyer countries to better assess the market prices and fix goals in price negotiations.

          • Protecting Online Access To Safe And Affordable Medication

            High drug prices are a global public health crisis. This is mostly the case among lower income countries but also for citizens and residents in the US, where tens of millions are not filling prescriptions due to cost. The international online marketplace is a much-needed lifeline for consumers who cannot afford prescription medication where they live. People deserve the widest possible access to safe and affordable medication, including online access, and the Internet community can help.

          • Obamacare: The Biggest Insurance Scam in History

            The Affordable Care Act (ACA), also called “Obamacare,” may be the biggest insurance scam in history. The industries that profit from our current health care system wrote the legislation, heavily influenced the regulations and have received waivers exempting them from provisions in the law. This has all been done to protect and enhance their profits.

            In the meantime, the health care crisis continues. Fewer people, even those with health insurance, can afford the health care they need because of out-of-pocket costs. The ACA continues that trend by pushing skimpy health plans with low coverage and restricted networks.

        • Security

          • Friday’s security advisories
          • Here’s How to Protect Linux Servers & Android Phones from Dirty COW Vulnerability
          • The Inevitability of Being Hacked

            The last attempted hack came 5 minutes ago, using the username root and the password root.

          • New Windows code injection method could let malware bypass detection

            Security researchers have discovered a new way that allows malware to inject malicious code into other processes without being detected by antivirus programs and other endpoint security systems.

            The new method was devised by researchers from security firm Ensilo who dubbed it AtomBombing because it relies on the Windows atom tables mechanism. These special tables are provided by the operating system and can be used to share data between applications.

            “What we found is that a threat actor can write malicious code into an atom table and force a legitimate program to retrieve the malicious code from the table,” Ensilo researcher Tal Liberman said in a blog post. “We also found that the legitimate program, now containing the malicious code, can be manipulated to execute that code.”

            This new code-injection technique is not currently detected by antivirus and endpoint security programs because it is based on legitimate functionality, according to Liberman. Also, the atom tables mechanism is present in all Windows versions and it’s not something that can be patched because it’s not a vulnerability.

          • Of course smart homes are targets for hackers

            The Wirecutter, an in-depth comparative review site for various electrical and electronic devices, just published an opinion piece on whether users should be worried about security issues in IoT devices. The summary: avoid devices that don’t require passwords (or don’t force you to change a default and devices that want you to disable security, follow general network security best practices but otherwise don’t worry – criminals aren’t likely to target you.

          • OpenStack Security Project Aims to Protect the Open-Source Cloud

            The OpenStack Security project adds new tools and processes to help secure OpenStack technologies. The project technical leader offers insight on the program.
            Security is such a critical element of the open-source OpenStack cloud platform that there is an entire project—the OpenStack Security project—dedicated to the task of helping protect OpenStack technologies.

            In a well-attended session at the OpenStack Summit in Barcelona, Spain, on Oct. 27, Rob Clark, the project technical leader of the OpenStack Security project, detailed the group’s most recent efforts.

          • Bug Bounty Hunter Launches Accidental DDoS Attack on 911 Systems via iOS Bug

            The Maricopa County Sheriff’s Office Cyber Crimes Unit arrested Meetkumar Hiteshbhai Desai, an 18-year-old teenager from the Phoenix area, for flooding the 911 emergency system with hang-up calls.

            According to a press release from the Maricopa County Sheriff’s Office, Desai created a JavaScript exploit, which he shared on Twitter and other websites with his friends.

            People accessing Desai’s link from their iPhones saw their phone automatically dial and redial 911.

          • Dyn DDoS attack exposes soft underbelly of the cloud

            It’s apparently possible that a DDoS attack can be big enough to break the internet — or, as shown in the attack against ISP Dyn, at least break large parts of it.

            The DDoS attack against Dyn that began Friday went far past taking down Dyn’s servers. Beyond the big-name outages, organizations could not access important corporate applications or perform critical business operations.

          • [Older] ​The Dyn report: What we know so far about the world’s biggest DDoS attack

            First, there was nothing — nothing — surprising about this attack. As Paul Mockapetris, creator of the Domain Name System (DNS), said, “The successful DDoS attack on DYN is merely a new twist on age-old warfare. … Classic warfare can be anticipated and defended against. But warfare on the internet, just like in history, has changed. So let’s take a look at the asymmetrical battle in terms of the good guys (DYN) and the bad guys (Mirai botnets), and realize and plan for more of these sorts of attacks.”

          • Incident Report: Inadvertent Private Repository Disclosure

            On Thursday, October 20th, a bug in GitHub’s system exposed a small amount of user data via Git pulls and clones. In total, 156 private repositories of GitHub.com users were affected (including one of GitHub’s). We have notified everyone affected by this private repository disclosure, so if you have not heard from us, your repositories were not impacted and there is no ongoing risk to your information.

            This was not an attack, and no one was able to retrieve vulnerable data intentionally. There was no outsider involved in exposing this data; this was a programming error that resulted in a small number of Git requests retrieving data from the wrong repositories.

            Regardless of whether or not this incident impacted you specifically, we want to sincerely apologize. It’s our responsibility not only to keep your information safe but also to protect the trust you have placed in us. GitHub would not exist without your trust, and we are deeply sorry that this incident occurred.

          • How Bad Is Dirty COW?
          • Unpatched Linux exploit grants instant full access to other users
          • Dirty COW was Livepatched in Ubuntu within Hours of Publication

            If you haven’t heard about last week’s Dirty COW vulnerability, I hope all of your Linux systems are automatically patching themselves…

            Why? Because every single Linux-based phone, router, modem, tablet, desktop, PC, server, virtual machine, and absolutely everything in between — including all versions of Ubuntu since 2007 — was vulnerable to this face-palming critical security vulnerability.

            Any non-root local user of a vulnerable system can easily exploit the vulnerability and become the root user in a matter of a few seconds. Watch…

          • Canonical Livepatch Service Automatically Updates Ubuntu 16.04 LTS (and later) with the Latest Kernel without Rebooting
          • Dirty COW and clean commit messages
          • Linux kernel CVE-2016-5195 “Dirty COW” mitigated by Sandstorm
          • Flexera Software Acquires Software Composition Analysis Provider, Palamida

            Flexera Software, the leading provider of next-generation software licensing, compliance, security and installation solutions for application producers and enterprises, today announced that it has acquired Palamida, provider of Software Composition Analysis solutions. The financial terms of the acquisition have not been disclosed.

          • Flexera Software Acquires Open Source Application Security Provider, Palamida
          • Vulnerability Spotlight: LibTIFF Issues Lead To Code Execution
          • Short DNS Record TTL And Centralization Are Serious Risks For The Internet
          • Distrusting New WoSign and StartCom Certificates
        • Defence/Aggression

          • Leaked Memo: Is Soros Planning ‘Series of Color Revolutions’ in Southeast Asia?

            Wikileaks’ Podesta Files shed light on US billionaire George Soros’ deep concerns about the lack of “freedom” and “constitutional democracy” in Malaysia under Najib Razak. Soros’ concerns may serve as a prelude for a series of “color revolutions” in Southeast Asia, Mathew Maavak of Universiti Teknologi Malaysia assumed in an interview with Sputnik.

            The latest set of documents released by Wikileaks indicates that George Soros and his Open Society Foundation are very concerned about the situation in Malaysia, one of the US’ longstanding allies in Southeast Asia.

            A memo, sent by Michael Vachon, US billionaire George Soros’ “right hand,” on March 6, 2016, to Chairman of Clinton’s presidential campaign John Podesta shed light on the Malaysian “corruption crisis” and blamed the country’s Prime Minister Najib Razak for “damaging the US’ credibility in the region.”

          • General is most senior Army officer to kill self

            The Army acknowledged Friday that Maj. Gen. John Rossi committed suicide on July 31, making him the highest-ranking soldier ever to have taken his own life.

            Rossi, who was 55, was just two days from pinning on his third star and taking command of Army Space and Missile Command when he killed himself at his home at Redstone Arsenal in Alabama. ‘

            Investigators could find no event, infidelity, misconduct or drug or alcohol abuse, that triggered Rossi’s suicide, said a U.S. government official with direct knowledge of the investigation. It appears that Rossi was overwhelmed by his responsibilities, said the official who was not authorized to speak publicly about the investigation.

            Rossi himself talked in March about suicide at a conference on preventing troops from killing themselves.

          • Gothenburg ‘one of Europe’s most segregated cities’

            One in ten school students in Gothenburg’s north-eastern suburbs sympathize with religious extremist organizations, according to a survey carried out by Swedish non-profit organization Varken Hora eller Kuvad.

            “I was completely shocked when I saw the result. I perhaps would have guessed one percent. I’m speechless,” Guluzar Tarhan Selvi, acting project manager at Varken Hora eller Kuvad told Swedish newspaper Göteborgs-Posten (GP).

            The Swedish government’s national coordinator against violent extremism said she was not hugely surprised by the number however.

            “The study was carried out in some of the areas where we know there are people who have travelled to join Isis in Syria,” Hillevi Engström said.

            And the MP insisted it is good that more facts about support for extremist organizations are coming to light.

            “You have to put forward all the facts and after that start prevention work early, and speak about everyone’s equal value and human rights in school. It’s also to do with alienation. Many people have a feeling that they don’t belong to society,” she added.

          • Turkey parliament to consider death penalty for coup plotters: Erdogan

            Turkish President Recep Tayyip Erdogan on Saturday said his government would ask parliament to consider reintroducing the death penalty as a punishment for the plotters behind the July coup bid.

            “Our government will take this (proposal on capital punishment) to parliament. I am convinced that parliament will approve it, and when it comes back to me, I will ratify it,” Erdogan said at an inauguration ceremony in Ankara.

            “Soon, soon, don’t worry. It’s happening soon, God willing,” he said, as crowds chanted: “We want the death penalty!”

        • Transparency/Investigative Reporting

          • ‘Israel is depressing’: Clinton adviser vents frustration in latest Podesta emails

            WikiLeaks has dumped another batch of emails from the account of Hillary Clinton’s campaign chair, John Podesta. This is the 21st batch of communications to be released by the whistleblowing site.

          • WikiLeaks Releases 22nd Batch of Clinton Campaign Chair Podesta’s Leaked Emails

            Following the latest release, the total number of leaked emails reached over 35,600.

            WikiLeaks published the first batch of emails on October 8.

          • Despite Administration’s Promises, Most Government Transparency Still The Work Of Whistleblowers And Leakers

            The self-proclaimed “most transparent administration” isn’t even more transparent than the last administration — one run by a hawkish member of a politically-powerful family and given a blank check to increase government power by a terrorist attack on American soil.

            Less transparent, perhaps, than any other previous administration, including those run by the truly corrupt (Nixon) or those engaged in actual wars against actual entities (rather than against loosely-defined concepts like “drugs” or “terrorism”).

            These previous administrations managed to be at least as transparent as the current one, even without the “disadvantages” of being presided over by a lawyer specializing in the Constitution and pushed towards openness by multiple leakers exposing multiple secret surveillance programs.

        • Environment/Energy/Wildlife/Nature

          • Climate change rate to turn southern Spain to desert by 2100, report warns

            Southern Spain will be reduced to desert by the end of the century if the current rate of greenhouse gas emissions continue unchecked, researchers have warned.

            Anything less than extremely ambitious and politically unlikely carbon emissions cuts will see ecosystems in the Mediterranean change to a state unprecedented in the past 10 millennia, they said.

            The study, published in the journal Science, modelled what would happen to vegetation in the Mediterranean basin under four different paths of future carbon emissions, from a business-as-usual scenario at the worst end to keeping temperature rises below the Paris climate deal target of 1.5C at the other.

          • Pope’s message on climate change trumped by party affiliations in US

            Over time, a funny thing happened to the perception of climate science in some countries: it became just another badge in the culture wars. Public opinion on what this field of science says is now primarily a reflection of which team you’re on politically. While anyone trying to reach across teams to communicate about climate change is likely to be discounted as a result, voices from within a group can get a fairer hearing.

          • Corporate Bias in Investor-State Dispute Settlement Threatens Environmental Protection

            We now know one of the three tribunalists who will decide TransCanada’s $15 billion claim against the U.S. for rejecting the dangerous Keystone XL tar sands pipeline that would carry oil from Alberta to Texas: David R. Haigh, Q.C.,a lawyer with a long history of representing the oil and gas industry whose previous clients include Alberta-based oil and gas producers, an Alberta-based oilfield materials supplier, and an Alberta-based oil and gas pipeline company. Mr Haigh works as a senior partner in a law firm working on Canadian tar sands.

            The case, which TransCanada is bringing under the North American Free Trade Agreement (NAFTA), is just one of a growing number of suits in which multinational corporations and other investors use sweeping rights in trade deals to challenge environmental protections in private tribunals.

            This raises a critical question about such tribunals, known as investor-state dispute settlement (ISDS) tribunals: are they biased in favor of corporations and other investors?

            The answer is yes, according to a growing body of independent empirical research.

            So why does bias plague ISDS tribunals? How does this affect environmental protection, and where does this leave deals like the Trans-Pacific Partnership (TPP) with ISDS at their heart?

          • Amy Goodman on Why the North Dakota Pipeline Standoff Is Only Getting Worse

            If it’s possible in this oversaturated age for a mass-protest movement to fly under the radar, the battle over the building of the $3.8 billion Dakota Access pipeline certainly qualifies. Just this past weekend in Morton County, North Dakota, 127 people were arrested during protests over renewed construction, which follows what protesters believed was relief from the federal government, in the form of a multi-agency letter to the pipeline builders, Energy Transfer Partners, asking them to halt building for tribal consultation and the preparation of environmental-impact statements. The construction has continued apace.

            And yet the clash hasn’t quite risen to the level of front-page news. That’s despite the efforts of investigative journalist Amy Goodman, the host of the Democracy Now! independent news broadcast, who had an arrest warrant issued for her in September after her coverage of the situation. (A judge dismissed the charges.) “Not enough people realize what’s going on out there,” says Goodman. “It’s a bigger story than the amount of attention its received.”

          • Standing Rock Sioux Tribal Chair: DOJ Must Investigate Use of Force Against #DAPL Resistance

            “I knew North Dakota state was planning something,” says Standing Rock Sioux Tribal Chair Dave Archambault II of the raid on a resistance camp Thursday by militarized police. “They set up a pre-hospital tent near the camp. … That was sending me signals this was going to get out of hand.” Archambault says he asked the Department of Justice to step in and ask the state not to proceed with the raid, and now calls on the Justice Department to launch an investigation into the use of force against those resisting the Dakota Access pipeline.

        • Finance

          • Zombie protesters call for CETA to stay dead in the ground

            This morning in London, protesters dressed as zombies posed outside the European Commission office in London with a banner saying “Stop CETA rising from the dead – Toxic trade deals belong in the grave.”

            The controversial trade deal between Canada and the EU was due to be signed on Thursday, but was postponed following opposition from one of the regional Belgian parliaments. An agreement was later reached to appease the Wallonian parliament, but the deal has still yet to be signed.

          • Legal Statement on Investment Protection in TTIP and CETA

            Investment protection and investor-state dispute settlement (ISDS) mechanisms are perhaps the most contentious aspects of TTIP and CETA. These mechanisms provide foreign investors with the right to sue the EU or its Member States in private tribunals over potential losses in profit due to current or new public welfare regulations.

            To address this, we, the Stop TTIP European Initiative, are presenting this legal statement signed by 101 professors of law from 24 European countries.

            The goal of this statement is to convey to European decision-makers that a significant part of the legal community finds the investor protection mechanisms within the free trade deals TTIP and CETA to be highly problematic and not compatible with the rule of law. The statement outlines the fundamental legal issues within these mechanisms and explains how they pose grave threats to public interest, democratic principles and state budgets.

          • Vietnam’s reluctance to ratify the TPP is bad news for Washington

            Vietnam’s decision to hold off ratifying the Trans-Pacific Partnership is a further blow to the beleaguered trade pact and a setback for American economic ambitions in Asia.

            The 12-nation TPP is aimed at liberalizing trade and investment in the Asia-Pacific region, and Vietnam has been hoping that its participation in the deal will lead to an increase in exports. But even in the U.S., which led negotiations for the pact, approval of the TPP is nowhere in sight. This apparently convinced Vietnam to proceed slowly as well.

            An official in the secretariat of the Vietnamese parliament told reporters on Oct. 18 that approval of the TPP is not on the agenda for the current legislative session, which runs through late November, making it certain that the country will not ratify the pact this year.

            Nguyen Thi Kim Ngan, chairwoman of the parliament, said in September that Vietnam’s ratification would depend on factors such as moves by other negotiating members of the TPP and the outcome of the Nov. 8 presidential election in the U.S.

            At the same time, the Philippines, which was considering joining the TPP after Vietnam, has apparently changed its stance in recent weeks, moving away from Washington and closer to Beijing.

          • The EU Made Simple. How the Commission dictates law.

            This article will focus on the power of the EU Commission by looking at how its members are appointed, their security of employment and how they are motivated during and after their employment. The second part will focus on Commission powers including its absolute right to veto all ‘legislative initiatives’ from whatever source, including the Council of Ministers and the EU Parliament. The power is, in effect, a veto on all EU Law, amendments and repeals, without exception.

            Edit. 27 Oct 2016. Some quite strong objections on Twitter have been made by pro EU people about the suggestion that the EU Parliament cannot amend proposed EU legislation.

          • Canadians Launch Constitutional Challenge Against CETA

            Wallonia is not alone. Not only has the region been joined by several other Belgian regional parliaments in opposition to CETA (the Canada-EU Comprehensive and Economic Trade Agreement), but now a Canadian constitutional challenge against CETA has been launched in the Federal Court of Canada.

            On Oct. 21, renowned constitutional lawyer Rocco Galati filed the statement of claim against CETA on behalf of the Hon. Paul Hellyer (former Minister of National Defence) and two co-plaintiffs, Ann Emmett and George Cromwell (members of the Committee on Monetary and Economic Reform). At the Oct. 25 press conference, Galati referred to the corporate sector as “the new royalty,” and he stated, “What this treaty does is literally revert us back to the divine right of kings, but they are multinational corporations now.”

          • EU, Canada to sign trade accord Sunday

            The European Union and Canada will sign the CETA trade agreement Sunday, after a weeks-long deadlock.

            European Council President Donald Tusk announced in a tweet Friday evening that a summit has been scheduled for noon on Sunday.

          • EU and Canada to sign trade pact after Belgians strike key deal

            Canada and the European Union will sign a landmark free trade deal on Sunday after a series of key votes in Belgian regional assemblies on Friday ended opposition that had threatened to destroy the entire agreement.

            Soon after the final Belgian vote, European Council president Donald Tusk called Canadian Prime Minister Justin Trudeau and invited him to Brussels for the signing ceremony, which is scheduled for noon local time (1000 GMT).

          • EU-Canada Trade Deal Dodges Belgian Veto For Now, But Faces Multiple Legal Challenges

            First, Germany’s constitutional court imposed some quite stringent constraints on the German government. The most important of these is that the official signing of CETA will not cause the entire text to be applied provisionally, as the European Commission had originally hoped. Instead, some parts must wait until all 28 member states ratify the deal through votes in their national parliaments. That’s going to take quite a while — perhaps years — and there’s no guarantee that every country will ultimately ratify CETA. The corporate sovereignty provisions are one of the elements that will not come into force until after full ratification, something also agreed with Magnette. This means it’s quite likely that the CJEU will hand down its verdict on the legality or otherwise of ICS before that, possibly killing it forever.

            The other important point about the German constitutional court’s decision is that it only rejected a request for a preliminary injunction, which it deemed unnecessary. The German court’s full consideration of whether CETA is constitutional or not continues. The European Commission may have postponed the Wallonian problem but there are plenty of others on both sides of the Atlantic that could still stop CETA, and definitively.

          • Apple’s Cook: ‘We’re going to kill cash’

            “We’re going to kill cash,” he said. “Nobody likes to carry around cash.”

          • Lost thumb drives bedevil U.S. banking agency

            A U.S. banking regulator says an employee downloaded a large amount of data from its computer system a week before he retired and is now unable to locate the thumb drives he stored it on.

            The Office of the Comptroller of the Currency, which is a part of the Department of the Treasury, said the loss represented “a major information security incident” as it reported the case to Congress on Friday.

            The data was taken in November 2015, but its loss was only discovered in September this year as the agency reviewed downloads to removable media devices in the last two years.

            The employee in question used two thumb drives to store the information, both of which he is unable to locate, the agency said.

            It didn’t say what information was downloaded but said it involved “controlled unclassified information, including privacy information” and numbered at least 10,000 records.

          • Uber to fight decision that it must pay drivers the national living wage

            GIG ECONOMY SUPERSTAR Uber has been dealt a blow by a London employment tribunal which has ruled that its drivers be paid the national living wage.

            In July, two drivers took the cab firm to court arguing that their terms of employment meant that they were effectively full-time employees rather than self-employed. This would make them entitled to the national minimum wage of £7.20 per hour, rather than the £5.00 they typically earned.

            Uber argued that its drivers are self-employed and were ineligible for this level of pay, as well as from other benefits such as holiday pay.

          • Airbnb faces worldwide opposition. It plans a movement to rise up in its defence

            In the back room of a pub in Kentish Town, a group of middle-class Londoners are perched on velvet-covered stools, eating hummus and talking about property. On the wall, above a pile of empty beer kegs, a slide presentation is in progress. A video of Airbnb’s recent advert shows smiling hosts opening their front doors and declaring their support for Sadiq Khan’s post-Brexit “London is open” campaign.

            The audience of Airbnb hosts are there after receiving individual invitations from the company to a “home sharers” meet-up – a concept largely unfamiliar to the slightly bemused crowd. Jonathan, an enthusiastic Californian Airbnb employee, who was recently seconded to London to set up the clubs, is happy to explain: “Homesharing clubs are simply a way of organising this into something … that has a unified voice … then actually takes actions as a collective,” he says, in a less than clear answer.

          • Reader Alert: EU-Canada Trade Agreement (CETA) To Be Signed Tomorrow In Brussels

            With a delay of mere days, CETA, the Comprehensive Economic and Trade Agreement between the European Union and Canada, will be signed Sunday in Brussels by Canadian Prime Minister Justin Trudeau, European Council President Donald Tusk and European Commission President Jean Claude Juncker. This follows two weeks of uncertainty over the deal that includes not only tariff reduction, but also an attempt to harmonise regulation and set up a reformed investor-state dispute settlement (ISDS) mechanism.

        • AstroTurf/Lobbying/Politics

          • 2006 Audio Emerges of Hillary Clinton Proposing Rigging Palestine Election

            “I do not think we should have pushed for an election in the Palestinian territories. I think that was a big mistake,” said Sen. Clinton. “And if we were going to push for an election, then we should have made sure that we did something to determine who was going to win.”

          • Clinton Adviser Neera Tanden’s Greatest Hits

            In truth, Tanden’s leaked email conversations read almost like discarded lines from a sitcom screenplay, and her candid criticisms of Clinton and colleagues — not to mention her predilection for foul language — have become something of an internet sensation among those keeping close tabs on WikiLeaks releases.

            So, to save our readers from the effort and tedium of spending hours sifting through John Podesta’s leaked emails, here are some of Tanden’s most spectacular statements.

            Tanden on “The Letter” (presumably the letter from Clinton’s doctor touting her health): “Is great. F*** these a**holes.”

            Tanden on Clinton’s use of a private email server: “Do we actually know who told Hillary she could use a private email? And has that person been drawn and quartered? Like whole thing is f***ing insane.”

          • Inside The Invisible Government: John Pilger On War, Propaganda, Clinton And Trump

            The American journalist, Edward Bernays, is often described as the man who invented modern propaganda.
            The nephew of Sigmund Freud, the pioneer of psycho-analysis, it was Bernays who coined the term “public relations” as a euphemism for spin and its deceptions.
            In 1929, he persuaded feminists to promote cigarettes for women by smoking in the New York Easter Parade – behaviour then considered outlandish. One feminist, Ruth Booth, declared, “Women! Light another torch of freedom! Fight another sex taboo!”
            Bernays’ influence extended far beyond advertising. His greatest success was his role in convincing the American public to join the slaughter of the First World War. The secret, he said, was “engineering the consent” of people in order to “control and regiment [them]according to our will without their knowing about it”.
            He described this as “the true ruling power in our society” and called it an “invisible government”.
            Today, the invisible government has never been more powerful and less understood. In my career as a journalist and film-maker, I have never known propaganda to insinuate our lives as it does now, and to go unchallenged.

          • Choices Other than Clinton or Trump

            And there are more choices. In Connecticut there are at least 20 or so other presidential candidates you can vote for. Secretary of the State Denise Merrill will explain.

          • The Green Party’s Radical Common Sense

            Germany and other European countries have a thriving multiparty political culture. The U.S. used to have one too. In 1916, five parties were seated in Congress.

            In his Washington Post article “In Europe, the Green Party is a force. In the U.S., it’s irrelevant. Here’s why,” Per Urlaub, associate professor of German studies at the University of Texas, contends that “the American electoral system is heavily weighted against small political parties.”

            He’s right. Alternative parties must wrestle with ballot-access laws, enacted since 1916 by Democratic and Republican legislators in many states, that privilege major-party candidates and hinder others. In some states, alternative parties are effectively banned from participation.

            When alternative parties do get on the ballot, their candidates often face the “spoiler” accusation. The supposed spoiler effect can be eliminated by replacing the prevailing “first past the post” system with “ranked choice,” which allows people to rank their preferences.

            Reforms like ranked choice voting (RCV) and proportional representation—which gave Germany and other European countries their multiparty legislatures—are considered radical here, even though they grant voters greater power and more options.

          • Unheard Third Debate with Margaret Flowers

            During a TRNN Facebook live event, Green Party Candidate Margaret Flowers – who was not invited to the Maryland Senate debate despite being on the ballot – responds to questions posed to Democratic Representative Chris Van Hollen and Republican State Delegate Kathy Szeliga, as well as questions from viewers.

          • Clinton Email Scandal: Kim Dotcom Says Deleted Mails Can Be Recovered

            Democratic presidential nominee Hillary Clinton’s email controversy may be far from over, if internet entrepreneur Kim Dotcom is to be believed. The man wanted by the U.S. on copyright infringement and money laundering charges said on Twitter Thursday that all of Clinton’s “permanently deleted” emails can, in fact, be accessed. Legally.

          • Megaupload’s Kim Dotcom: NSA Could Recover Hillary’s Emails
          • Clinton’s emails could be recovered by NSA, says Kim Dotcom

            An internet entrepreneur notorious for his illegal file-sharing website Megaupload says Hillary Clinton’s 33,000 deleted emails could be recovered by the US National Security Agency.

            “I know where Hillary Clintons [sic] deleted emails are and how to get them legally,” wrote Kim Dotcom on Twitter Wednesday (27 October).

            Dotcom is fighting extradition to the United States on copyright infringement charges, among others, for hosting unlicensed content like films, music, and software on his defunct file-sharing site.

            Attached to the tweet — which was copied to Donald Trump’s Twitter account — is a screenshot with a five-step plan on how to get the emails. Step two suggests contacting Michael Rogers, Director of the National Security Agency (NSA). The third step is to have Rogers use the XKeyscore surveillance program, revealed by Edward Snowden, to recover the emails.

          • How Facebook’s Racial Segmentation Is Helping Trump Campaign Try To Suppress African American Voting

            Earlier this week, Bloomberg had a fairly revealing article about the internal digital efforts of the Donald Trump campaign, in which Bloomberg reporters embedded for a few days. The whole article is quite interesting, but one of the most stunning parts, frankly, was the Trump campaign staffers directly admitting how they are actively trying to suppress voting by African Americans. It’s no secret that a variety of new voter ID laws are designed to suppress voting — especially among minorities. When North Carolina’s voter ID law was struck down by the court, the judge pointed out how the legislators that had backed it had explicitly targeted rules that would suppress votes among African Americans. They had requested “racial data” concerning voter ID and then specifically targeted the types of ID more commonly used by African Americans.

          • Can Iceland’s Pirate Party Win the Election?

            Iceland Pirate Party Candidate Smari McCarthy discusses how the party would govern should it win the country’s upcoming election. He speaks on “Bloomberg Markets.”

          • Iceland elections: The Pirate Party’s march to power

            Snowdens of the world rejoice, the Pirate Party is coming.

            This Saturday Iceland holds its parliamentary elections and is likely to become the first nation to vote Pirates into government.

          • AI system that correctly predicted last 3 US elections says Donald Trump will win

            The New York businessman with a penchant for celebrity television may suddenly find himself in love with artificial intelligence developed in India.

            The polls and simulations that involve the skills and insight of human beings suggest Donald Trump could be heading for something of a pasting. But an artificial intelligence (AI) system developed in Mumbai, and which correctly predicted the last three US presidential elections, puts the Republican nominee ahead of his rival Hillary Clinton in the battle to secure the keys to the White House.

            MogIA was developed by Sanjiv Rai, the founder of Indian start-up Genic.ai. It has taken 20 million data points from public platforms such as Google, Facebook and Twitter and analysed the information to create predictions, CNBC reported.

          • Rig The Election … With Math!

            Welcome to The Riddler. Every week, I offer up a problem related to the things we hold dear around here: math, logic and probability. These problems, puzzles and riddles come from many top-notch puzzle folks around the world — including you!

            Recently, we started something new: Riddler Express problems. These are bite-size puzzles that don’t take as much fancy math or computational power to solve. For those of you in the slow-puzzle movement, worry not — we still feature our classic, more challenging Riddler.

          • Clinton Aide’s For-Profit Firm Illegally Raised $150 Million for Clinton Charity

            Douglas Band, one of former President Bill Clinton’s closest advisors, boasted to outside auditors that his for-profit corporation had a “historical role in carrying the majority of the fundraising burden” for the nonprofit Clinton Foundation.

            A Nov. 16, 2011 memo Band authored, which WikiLeaks made public Wednesday, raises disturbing questions about charitable law violations due to mixing for-profit activities with the nonprofit foundation.

          • #PodestaEmails22: WikiLeaks release another 600 mails from Clinton chair

            WikiLeaks has released the 22nd batch of emails from the account of Hillary Clinton’s campaign chair, John Podesta.

            To date, the whistleblowing site has released 36,190 emails, with around another 14,000 expected before Americans go to the polls on the November 8.

            It was revealed in mails released on Friday that Podesta had been warned in March 2016 to change his email password “immediately” as someone had illegitimately attempted to gain access to his account.

          • What the WikiLeak Revelations Reveal About Donna Brazile and the DNC

            Donna Brazile, interim chair of the Democratic National Committee, faces new scrutiny as evidence points to abuses of power.

            Brazile’s alliance with the Hillary Clinton team looks to have started in 2008. In February of that year, while Clinton was running for president against Barack Obama, CNN political commentator and consultant Paul Begala wrote an email to the Clinton team saying that it should “court” Brazile. At that time, during the primaries, Brazile refused to publicly endorse a candidate but worked closely with the Democratic National Committee (DNC). Until recently, she also worked for CNN and ABC News. Her close relationship with the Clinton camp has deepened over the years.

          • If President Hillary Is Inevitable, Why Are Her Media Goons Still Attacking Jill Stein?

            This phrase has become very useful in our current political environment. It’s a line from one of those Shakespeare plays where everyone dies in the end, and its use has become a way of pointing out when someone’s frantic resistance to something reveals a lot more about their true agendas than they intended to let on. When you know that your government is lying to you and the media is helping them, such things can often be a useful way of figuring out exactly what’s going on.

            Take for example the way corporate media, proven by WikiLeaks to be pervasively controlled by the Clintons and their allies far more than we ever knew, has continued to run smear pieces on Green Party presidential candidate Jill Stein, even while they assure everyone that Hillary has an insurmountable lead over Donald Trump.

          • Clinton Aide Boasted About How He Helped Foundation Prosper

            Doug Band, a longtime aide to former President Bill Clinton, said in a 2011 document released by WikiLeaks that the high-powered consulting firm he co-founded helped raise money for the Clinton Foundation when its own efforts were flagging.

            The memo was written around the time Chelsea Clinton was questioning whether Band’s role as an adviser to her father and the family foundation presented conflicts of interest as he courted clients for Teneo Holdings LLC. In the memo, Band argued just the opposite: that he was a volunteer who sought to “leverage my activities, including my partner role at Teneo, to support and raise funds for the Foundation.”

          • Podesta emails finally reveal smoking gun

            The “Podesta emails” being released daily by Wikileaks have produced their first bona fide “smoking gun” — a long email by Clinton Foundation associate Doug Band detailing the manner in which Bill Clinton was using the foundation’s connections as a way to build up personal clients for speech giving and consultancy.

          • Hillary Clinton Tops 2015-16 Islamist Money List

            The Middle East Forum’s “Islamist Money in Politics” (IMIP) project has revealed the top ten recipients of 2015-16 campaign contributions from individuals who subscribe to the same Islamic supremacism as Khomeini, Bin Laden, and ISIS.

            Hillary Clinton tops the list, raking in $41,165 from prominent Islamists. This includes $19,249 from senior officials of the Council on American-Islamic Relations (CAIR), declared a terrorist organization by the United Arab Emirates on November 15, 2014.

            For example, Mrs. Clinton has accepted $3,900 from former CAIR vice-chairman Ahmad Al-Akhras, who has defended numerous Islamists in Ohio indicted – and later convicted – on terrorism charges.

          • FBI Investigating New Information Regarding Hillary Clinton… Because Of The Anthony Weiner Sexting Investigation

            Hillary Clinton’s use of a private email server (at times kept in her own basement…) has obviously been a big story during this campaign — and for a variety of obvious, yet stupid, reasons, the discussion has become ridiculously partisan. What people should be able to admit on all sides of the debate is that Clinton’s use of a private email server was incredibly stupid and, at the very least, calls into serious question the judgment of whoever told her this was okay. It also, almost certainly, put serious information at risk of being exposed through hacks. But, earlier this year, the FBI came out and said that it didn’t actually break the law. There was a bit of the old “high court, low court” to this whole setup, because you could see how someone with much less fame or status would be nailed to the wall by the DOJ if they wanted to put that person away.

            Either way, the surprise of today is the new announcement by James Comey that the FBI is investigating some new emails that were apparently discovered in an “unrelated case” on “a device.” There were a couple of hours of speculation on this, with gradual denials — not the Wikileaks investigation, not the Clinton Foundation investigation — until it was revealed that it was from the investigation into Anthony Weiner’s sexting. Law enforcement seized devices belonging to both Weiner and his then wife (they’ve since filed for divorce), Huma Abedin, who is a close Clinton aide (and who also had an email account on the private Clinton server). Other reports have noted that the emails aren’t ones that were withheld from the original investigation, so it’s not an issue of withholding info, but could potentially reveal issues about the motivations and setup of the private server.

            In political circles this is raising eyebrows, coming just 11 days before the election, in a campaign where Clinton’s opponent, Donald Trump, has repeatedly pointed to her use of an email server as a reason that she should be in jail, and even promising to appoint a special prosecutor to go after her for this (which, uh, actually isn’t how the President is supposed to use that power, but…). Comey’s letter doesn’t go into much detail, though reporters have been getting more and more details. The letter was sent to a variety of people in Congress, on key committees, including the heads of the Intelligence, Judiciary, Oversight and Homeland Security committees.

          • Clinton the Victim, FBI-Email Edition

            Her first role was as “woman,” hoping to sweep up roughly 50% of the electorate in a single empowering noun. As with Obama, she hoped to mobilize a huge swath of voters who wanted to participate in electing the first Black female president. Didn’t go mainstream. Grandmother, same. Competent life-long government person, hmmm, cut both ways, many people wanted a change. Third Obama Term, meh, took some steam out of Bernie’s campaign but not much more. Killer of bin Laden, sorta worked in one debate, dragged on into an SNL skit cliche through the others.

            When the first news of the emails came out in March 2015. Hillary didn’t really have a persona for that, mumbling about no classified, then about not wanting multiple devices, prevaricating here, avoiding there. She tried blaming Colin Powell, then the State Department’s creaky IT infrastructure.

            Until she nailed it: She was the victim of a conspiracy.

          • Only 2 points separate Clinton, Trump in latest tracking poll

            Hillary Clinton and Donald Trump are separated by only two percentage points in a new Washington Post-ABC News tracking poll, ending a week in which the race has tightened as core Republican groups have returned to Trump’s fold.

            Likely voters split 47 percent for Clinton and 45 percent for Trump, according to the survey conducted Monday through Thursday. That’s little changed from a 48-44 split in the previous day’s tracking results, which covered Sunday through Wednesday, but it is a substantial tightening since last weekend when Clinton led by a wide margin.

          • #PodestaEmails23: WikiLeaks releases new mails from Clinton chair

            More than 36,000 emails from Podesta’s account have been released by the whistleblowing site, which has vowed to publish a total of 50,000 emails before the US presidential election on November 8.

        • Censorship/Free Speech

          • Twitter Sued By Shareholders Over Poor Performance Following Censorship Spree

            Twitter took on the narrative of “listen and believe”. They appointed people like Anita Sarkeesian’s Feminist Frequency to their Trust and Safety Council and had people like Randi Lee Harper and the Crash Override Network crew in their ear. They censored people like Milo Yiannopoulos, a Conservative provocateur at the behest of comedian Leslie Jones, and have amply ignored a lot of other cases of sexual and aggressive harassment that didn’t fit in line with their Social Justice “progressivism”.

          • Why Wikipedia Is Worried About Global ‘Right To Be Forgotten’ Delistings

            As Techdirt reported last year, the problematic “right to be forgotten” — strictly speaking, a right to be delisted from search results — took a really dangerous turn when the French data protection regulator told Google that its orders to delist results should apply globally, not just in France, a view it confirmed twice. The latest development in this saga is the submission of a petition to the French Supreme Court against the global reach of delisting, made by the Wikimedia Foundation, the organization behind Wikipedia

          • Wikimedia Foundation files petition against decision to extend the ‘right to be forgotten’ globally

            Although the [French data protection authority] CNIL’s case is directed towards Google, the gradual disappearance of Wikimedia pages from Google search results around the world ultimately impacts the public’s ability to find the invaluable knowledge contained within the Wikimedia projects. Search engines have played an important role in the quest for knowledge — roughly half of Wikipedia visits originate from search engines.

            The CNIL’s most recent order, if upheld, threatens the capacity to write and share important information about history, public figures, and more. It undermines the public’s ability to find relevant and neutral information on the internet, and would make it exceedingly difficult for projects like Wikimedia’s to provide information that is important for society.

          • Danish Mohammed cartoons editor clashes with paper

            The Danish ex-editor who commissioned the Mohammed cartoons that triggered deadly protests a decade ago on Friday accused the Jyllands-Posten newspaper of trying to silence him, saying it had let “the jihadists” win.

          • Angela Merkel: internet search engines are ‘distorting perception’

            Angela Merkel has called on major internet platforms to divulge the secrets of their algorithms, arguing that their lack of transparency endangers debating culture.

            The German chancellor said internet users had a right to know how and on what basis the information they received via search engines was channelled to them.

            Speaking to a media conference in Munich, Merkel said: “I’m of the opinion that algorithms must be made more transparent, so that one can inform oneself as an interested citizen about questions like ‘what influences my behaviour on the internet and that of others?’.

          • Ex-professor attacked for Halloween email: ‘Certain ideas are too dangerous to be heard at Yale’

            Erika Christakis set off a furor a year ago by publicly questioning whether Yale students should try to stop their peers from wearing allegedly offensive Halloween costumes.

            Student activists tried to get her and her husband Nicholas, both professors, removed as the masters of the Silliman residential college, and Erika canceled her spring classes because the campus climate was not “conducive to civil dialogue.” She never came back.

          • My Halloween email led to a campus firestorm — and a troubling lesson about self-censorship

            The right to speak freely may be enshrined in some of our nation’s great universities, but the culture of listening needs repair. That is the lesson I learned a year ago, when I sent an email urging Yale University students to think critically about an official set of guidelines on costumes to avoid at Halloween.

            I had hoped to generate a reflective conversation among students: What happens when one person’s offense is another person’s pride? Should a costume-wearer’s intent or context matter? Can we always tell the difference between a mocking costume and one that satirizes ignorance? In what circumstances should we allow — or punish — youthful transgression?

          • Citizen Journalists Claim Facebook Censorship After Page Was ‘Unpublished’ by ‘Mistake’

            “It’s a sickening feeling to know you’re being censored not for any horrible thing you’ve done, but for trying to tell the truth to millions of people. Are we living in America? Seriously, our First Amendment rights have been slowly eroding away bit by bit.”

            Leisa Audette and Patty McMurray started the Facebook page when they became “frustrated by so-called journalists” and were inspired by Andrew Breitbart. The citizen journalists say they were both stay-at-home moms with three girls. They met at a fundraiser at Patty’s house.

            Leisa said, “We were blessed to meet and hear Andrew Breitbart speak at a small, private event in Michigan just one week before he died. Inspired by his work and his passion to save America, we started a Facebook page to honor his legacy.”

          • Facebook executives feel the heat of content controversies
          • Is Facebook feeling the heat of content controversies?
          • Facebook continues to face heat over its censorship practices
          • Oscar-nominated filmmaker attacks Kremlin censorship
          • Moscow theatre director sparks row with claims of state censorship

            A culture war between Russia’s artistic community, the Kremlin and a patriotic biker gang has broken out, after the leading star and director of a Moscow theatre accused the state of heading towards Stalin-era censorship.

            “I see how people are itching to change things and send us back to the past. And not just to the time of stagnation, but further back – to Stalin’s times,” said Konstantin Raikin, during an emotional speech to a gathering of theatrical professionals earlier this week.

            “Stop pretending that the authorities are the only bearers of morality. That’s not true,” he said.

            Raikin is the director of Moscow’s Satirikon theatre as well as its star actor, featuring in a number of leading roles including King Lear. He said the state was using informal influence to block stagings or plays it thought were inappropriate, or went against loosely defined traditional values.

          • ‘Leviathan’ Director Says Russian Censorship Is “Rampant”

            Andrey Zvyagintsev, the Golden Globe-winning and Oscar-nominated Russian director of Leviathan, has written an op-ed in Russian daily Kommersant, in which he expressed concerns about state censorship in the world of arts and culture.

          • Oscar-nominated filmmaker attacks Kremlin censorship

            Oscar-nominated director Andrei Zvyagintsev on Thursday launched a furious attack on the Kremlin over government censorship that he said is strangling the arts.

            “It’s completely obvious that censorship has fully entered into the cultural life of the country,” Zyagintsev wrote on the website of the Kommersant daily.

            Zvyagintsev, whose biting social drama “Leviathan” was nominated for an Oscar last year, argued that the state effectively censors the arts by limiting funding for only projects it approves.

            The director said he was responding to comments by President Vladimir Putin’s spokesman Dmitry Peskov that while censorship is unacceptable, the commissioning of arts projects made with state funds does not fall under this category.

            “We say it’s censorship, they say it’s a state commission,” he wrote, saying that cinema and other arts are dependent on state funding to survive.

            Zvyagintsev has become one of Russia’s best known directors abroad since he won the Golden Lion at the Venice film festival with his debut film “The Return” in 2003.

          • Dad pens sarcastic response to son’s ‘Fahrenheit 451′ permission slip

            Some Twitter users suggested the permission slip may have indeed been a part of the lesson, but Radosh expressed doubt.

          • YouTube Just Censored A Video Criticizing Censorship
          • YouTube Versus Conservative Speech
          • Joe Hildebrand says the Left finds film censorship is a bitter pill
          • Cassie Jaye’s Red Pill too truthful for feminists to tolerate
          • Sex, politics and censorship
          • Protest prison censorship of the Bay View: Use this sample letter
          • Appeals Court Says Plaintiff In Anti-SLAPP Lawsuit Can’t Lower Fee Award Just By Voluntarily Dismissing Lawsuit
          • Australian Teen With Wacky Mullet Sues The Media For Making A Meme Out Of His Haircut
          • The UK government’s war on porn will expose children to more and worse

            Ars first raised the prospect of the UK government bringing in age verification for porn sites a year ago and confirmed that it would be happening in February.

            In its written evidence to the House of Commons Public Bill Committee on the Digital Economy Bill, the Open Rights Group put together a good summary of the problems with the approach. These include the privacy risks of creating insecure databases of the UK’s porn habits, and the fact that age verification will be easy to circumvent.

            As a more recent blog post by the Open Rights Group notes, MPs have finally woken up to the fact that age verification won’t in fact stop children from accessing pornographic sites, and have come up with Plan B, which is even worse than Plan A: “in order to make age verification technologies ‘work,’ some MPs want to block completely legal content from access by every UK citizen. It would have a massive impact on the free expression of adults across the UK. The impact for sexual minorities would be particularly severe.”

        • Privacy/Surveillance

          • Google intensifies tracking: check your private settings

            Google made a significant change to the company’s privacy policy recently which changes in a significant way how the company is tracking users on the Internet.

            Previously, the company kept its DoubleClick advertising engine apart from its core user services such as Gmail, Search or YouTube. While users could give Google consent to use the information for advertising, it required users to become active and opt-in for that.

            Those who did give Google consent, did not have their “personal” information and activity used for advertising purposes and tracking.

          • Navy veteran in NSA data breach ‘stole numerous names of American spies abroad and sensitive operational details’
          • How did one contractor steal 50TB of NSA data? Easily, say former spies
          • DOJ: Much of seized 50TB from ex-NSA contractor is “highly classified”
          • Powers to Investigate

            The Communication Data Bill was draft legislation introduced first in May 2012. It sought to compel ISPs to store details of communications usage so that it can later be used for law enforcement purposes. In 2013 the passage of this bill into law had been blocked and the bill was dead.

            In 2014 we saw the Data Retention and Investigatory Powers Act 2014 appear. This seemed to be in response to the Data Retention Directive being successfully challenged at the European Court of Justice by Digital Rights Ireland on human rights grounds, with a judgment given in 2014. It essentially reimplemented the Data Retention Directive along with a whole load of other nasty things.

            The Data Retention and Investigatory Powers Act contained a sunset clause with a date set for 2016. This brings us to the Investigatory Powers Bill which it looks will be passing into law shortly.

            Among a range of nasty powers, this legislation will be able to force ISPs to record metadata about every website you visit, every connection you make to a server on the Internet. This is sub-optimal for the privacy minded, with my primary concern being that this is a treasure trove of data and it’s going to be abused by someone. It’s going to be too much for someone to resist.

          • N.S.A. Appears to Have Missed ‘Big Red Flags’ in Suspect’s Behavior

            Year after year, both in his messy personal life and his brazen theft of classified documents from the National Security Agency, Harold T. Martin III put to the test the government’s costly system for protecting secrets.

            And year after year, the system failed.

            Mr. Martin got and kept a top-secret security clearance despite a record that included drinking problems, a drunken-driving arrest, two divorces, unpaid tax bills, a charge of computer harassment and a bizarre episode in which he posed as a police officer in a traffic dispute. Under clearance rules, such events should have triggered closer scrutiny by the security agencies where he worked as a contractor.

          • Facebook Lets Advertisers Exclude Users by Race

            Imagine if, during the Jim Crow era, a newspaper offered advertisers the option of placing ads only in copies that went to white readers.

            That’s basically what Facebook is doing nowadays.

            The ubiquitous social network not only allows advertisers to target users by their interests or background, it also gives advertisers the ability to exclude specific groups it calls “Ethnic Affinities.” Ads that exclude people based on race, gender and other sensitive factors are prohibited by federal law in housing and employment.

          • Google AI invents its own cryptographic algorithm; no one knows how it works

            Google Brain has created two artificial intelligences that evolved their own cryptographic algorithm to protect their messages from a third AI, which was trying to evolve its own method to crack the AI-generated crypto. The study was a success: the first two AIs learnt how to communicate securely from scratch.

          • WhatsApp-Facebook privacy U-turn now being probed by EU data watchdog

            A seismic shift in privacy policy by messaging app WhatsApp this summer, when it said it would begin sharing user data with parent company Facebook including for ad targeting, has now attracted the attention of European’s data protection watchdog group, the Article 29 Working Party.

            The WP29 group wrote to WhatsApp founder Jan Koum yesterday, setting out its concerns about the privacy policy U-turn — including how the shift was communicated to users.

            “The Article 29 Working Party (WP29) has serious concerns regarding the manner in which the information relating to the updated Terms of Service and Privacy Policy was provided to users and consequently about the validity of the users’ consent,” it writes.

            “WP29 also questions the effectiveness of control mechanisms offered to users to exercise their rights and the effects that the data sharing will have on people that are not a user of any other service within the Facebook family of companies.”

            It adds that its various members, so basically all the national DPAs of EU Member States, will “act in a coordinated way” to target any problems they identify, with a dedicated working group for enforcement actions set to address the WhatsApp issue specifically.

          • President Obama ridiculed on Snapchat by daughter Sasha

            President Barack Obama has disclosed that his younger daughter recently mocked him on Snapchat.

            The US leader said Sasha had recorded him discussing the social network at a family dinner and then quietly posted a reaction to her friends.

            It is not the first time the president has discussed his 15-year-old’s online activities.

            In July, he said she also tweets, leading several media outlets to try to identify her account.

            It remains secret.

            Likewise a copy of the described Snapchat post has not been made public. Messages posted to the app are designed to disappear after being viewed or within a short period of time, but there are ways to circumvent the restrictions.

          • Killer sought via text message broadcast

            Ontario police have used the mass-messaging technique, known as a tower dump, before now, but its use was challenged in Canadian courts after one local force applied to use it to contact more than 100,000 people.

          • Standards Symposium Highlights Security, Privacy On Eve Of World Telecom Standardization Assembly

            Besides privacy-enhancing technologies, privacy by design and the “leveraging of international frameworks that contain basic principles of security, privacy and trust,” the conclusions also “stressed” security goals, including “sharing of information between public and private sectors on threats to the ICT infrastructure,” and a joint effort “to develop national capabilities to protect from cyber-attacks.” ITU experiences 1 million attacks every day, according to Reinhard Scholl, deputy director of ITU-T, of which he called 10,000 serious.

          • Would You Be Tempted By This ‘Grand Bargain’ On Privacy?

            Digital privacy and the control of personal data have emerged as two of the main online battlegrounds in recent years, as the flood of Techdirt posts on the subject attests. One of the central questions is how we can use global online services like Facebook and Google without surrendering control of the information we provide them. The US and the EU take contrasting approaches here, both of which have attracted plenty of supporters and detractors.

            But what about alternatives: might there be another way to tackle this crucial subject that is effective and reasonably fair to all? Jack M. Balkin and Jonathan Zittrain, respectively professors at the law schools of Yale and Harvard, believe there is. Together, they’ve written an article that appears in The Atlantic, entitled “A Grand Bargain to Make Tech Companies Trustworthy,”

          • Booz Allen Hamilton hires former FBI director to review its security measures
          • Booz Allen Hamilton hires former FBI director to investigate high-profile thefts
          • Booz Allen hires former FBI director Mueller to review personnel processes
          • Booz Allen reviewing security after arrest of NSA contractor

            Booz Allen Hamilton said on Thursday it had hired a former FBI chief to conduct an external review of its security practices, after the consulting firm learned for the second time in three years that an employee working under contract with the National Security Agency had been charged with stealing classified information.

            Booz Allen, which earns billions of dollars a year contracting with U.S. intelligence agencies, has come under renewed scrutiny in recent weeks after authorities took Harold Thomas Martin into custody.

        • Civil Rights/Policing

          • In Leaked Recording, Austin Police Chief Tears Into Commanders For Fatal Shootings, Use Of Excessive Force

            If police culture is truly going to change, it needs to start at the bottom. Years of DOJ investigations and consent agreements have done almost nothing to root out the deep-seated problems found in many law enforcement agencies. The change has to come from within each department — a much longer, slower process that requires those leading the reforms to put their careers on the line. They will be opposed by many of their fellow officers and villainized by police unions for any attempts to bring more accountability to policework.

            There are probably more law enforcement officials out there with the same mindset as Austin (TX) police chief Art Acevedo. Unfortunately, very little of what they’ve done or said makes its way into the public eye without being strained through several filters. Acevedo’s private comments to Austin PD commanders, however, arrive in the form of a leaked recording.

            Acevedo was addressing the criticism he took for firing Geoffrey Freeman after the officer shot and killed a naked, unarmed, mentally-ill 19-year-old as he ran down a residential street. Acevedo addressed many issues during this talk and made it clear the APD isn’t going to keep heading down the same limited-accountability road and end up just another law enforcement agency more known for its misdeeds than its law enforcement efforts.

          • Berkeley protesters form human chain to stop white students from getting to class

            Students at the University of California, Berkeley held a day of protest on Friday to demand the creation of additional “safe spaces” for transgender and nonwhite students, during which a human chain was formed on a main campus artery to prevent white students from getting to class.

            The demonstrators were caught on video blocking Berkeley’s Sather Gate, holding large banners advocating the creation of physical spaces segregated by race and gender identity, including one that read “Fight 4 Spaces of Color.”

            Protesters can be heard shouting “Go around!” to white students who attempt to go through the blockade, while students of color are greeted with calls of “Let him through!”

          • Liberals’ blind faith: The silence on the misogyny in the Muslim world is deafening

            In a new 90-second video ad, a Muslim-focused political action committee rightly slams Donald Trump for his sinister proposal to ban Muslims from entering the United States.

            While Trump is wrong-minded as he pounds the drumbeat of “us vs. them” with the Islamic world, I also hope liberals can move beyond blind defense of the Muslim religion and assess it with greater nuance. I say this as someone who has endured considerable alienation by challenging the premises of Mormonism, my childhood faith (even after facing discrimination growing up because of my religion). While initially painful, thinking about Mormonism objectively has broadened my worldview and allowed me greater ability to analyze any institution, religious or otherwise.

            I wish many Muslims and liberals would be so objective when looking at the brutally misogynistic behavior associated with some Muslims’ interpretations of sharia and reject the knee-jerk reaction that paints anyone who questions the modern Muslim world as Islamophobic. The refusal to do so is chilling those of us who unequivocally believe in women’s rights, who believe in freedom of expression, who believe in rationality and critical thinking. Last week in a #SalonTalks interview, author Amani Al-Khatahtbeh, who is otherwise incredibly talented and articulate, essentially said that the horrible French move to ban the “burkini” is essentially on par with an anti-woman acid attack; this is as false equivalency.

          • ‘I Live in a Lie’: Saudi Women Speak Up

            Saudi Arabia is an incredibly private, patriarchal society. While I was making the film, many women were afraid to share their stories for fear of backlash from the male relatives who oversee all aspects of their lives as so-called guardians. We wanted to hear more about their fears, their frustrations, their ambitions.

            Saudi Arabia has one of the world’s highest rates of Twitter use, and our posts rocketed around. We were overwhelmed by the outpouring.

            Most of the responses focused on frustration over guardianship rules that force women to get permission from a male relative — a husband, father, brother or even son — to do things like attend college, travel abroad, marry the partner of their choice or seek medical attention. Some women talked about the pride they had in their culture and expressed great distrust of outsiders. But many of them shared a deep desire for change and echoed Juju19’s hopelessness.

          • When CIA and NSA Workers Blow the Whistle, Congress Plays Deaf

            Do the committees that oversee the vast U.S. spying apparatus take intelligence community whistleblowers seriously? Do they earnestly investigate reports of waste, fraud, abuse, professional negligence, or crimes against the Constitution reported by employees or contractors working for agencies like the CIA or NSA? For the last 20 years, the answer has been a resounding “no.”

            My own experience in 1995-96 is illustrative. Over a two-year period working with my wife, Robin (who was a CIA detailee to a Senate committee at the time), we discovered that, contrary to the public statements by then-Chairman of the Joint Chiefs Colin Powell and other senior George H. W. Bush administration officials (including CIA Director John Deutch), American troops had in fact been exposed to chemical agents during and after the 1991 war with Saddam Hussein. While the Senate Banking Committee under then-Chairman Don Riegle, D-Mich., was trying to uncover the truth of this, officials at the Pentagon and CIA were working to bury it.

          • Youth prisons don’t reform, they damage: Column

            On any given day, more than 50,000 young offenders are locked away from their families in juvenile detention facilities.

            We expect these kids, most of whom have few positive relationships with adults or meaningful connections to education or jobs, to emerge equipped for success.

            Instead, recidivism rates (which vary from state to state) range from nearly 50% to 75% within three years of release for juvenile offenders in many areas of the country. Across America, we need a watershed shift in youth justice that protects public safety and is more informed by what works.

          • A Language to Unite Humankind

            According to Esther Schor, in her new book, “Bridge of Words: Esperanto and the Dream of a Universal Language” (Metropolitan), this famous story, of the Tower of Babel, represents a sort of second original sin. “If mortality is what it is like to live after Eden, misunderstanding,” she writes, “is what it is like to live after Babel.” This is not just a psychological misfortune but, more pressingly, a political one. Because we don’t speak the same language as our neighbors, we can’t see their point of view, and therefore we are more likely to rob them and kill them.

            For thousands of years, people have taken this matter quite seriously. Ambitious organizations such as the Roman Empire and the Roman Catholic Church made sure that their members, whatever their mother tongue, learned a second, common language. More recently, various thinkers have considered constructing universal languages from scratch. Schor gives a colorful summary. In the seventeenth century, Francis Bacon proposed that our written language switch to something like Chinese ideograms, bypassing words altogether, and John Wilkins, the first secretary of the Royal Society, proposed a new language with two thousand and thirty characters. Gottfried Wilhelm Leibniz said that we should use a pictographic system, a little like Egyptian hieroglyphs. In the eighteenth and nineteenth centuries came the rise of nationalism and, with it, linguistic nationalism, which held that the particularity of language was in fact an advantage, not a problem. Johann Gottfried Herder claimed that a people’s language contained its spiritual essence. Wilhelm von Humboldt believed that language, mediating between the mind and the world, actually created a people’s identity.

          • Seoul considers messaging ban

            The city legislature of Seoul, South Korea, is considering implementing a law that would ban after work messaging to employees, in an effort to reduce work-related stress among employees.

            Members of the Seoul Metropolitan Council proposed a revision to a public ordinance that would ban after-work messaging to employees of the city’s government. The new rule is an attempt to guarantee employees the right to rest and states that employee privacy must not be subject to employer contact outside of work hours. If passed, it would ban managers from contacting public sector employees after work hours through phone calls, text messaging, or social networking.

          • Heart doctor ‘beat teenage daughter for staying at male friend’s house after Halloween party’

            A top heart doctor who worked at the UN gave his teenage daughter a beating and labelled her a “prostitute” after she disobeyed his orders and went to a Halloween party, a medical tribunal heard on Thursday.

            Dr Gohar Rahman, 57, grabbed the youngster by the hair, caned her on the bottom with his walking stick and then rained down punches on her head after he accused her of “bringing shame” on his family.

            Police were called in after the daughter sent out a SOS message on social media using a Nintendo DS.

            The daughter, then 17, had earlier gone to the party after falsely telling her father she would be home from a friend’s house by 9.30pm.

          • Young Scholar, Now Lawyer, Says Clarence Thomas Groped Her in 1999

            The anticipation of meeting a U.S. Supreme Court justice for the first time turned to shock and distress for a young Truman Foundation scholar in 1999 when, she says, Justice Clarence Thomas grabbed and squeezed her on the buttocks several times at a dinner party.

          • James Comey Broke with Loretta Lynch and Justice Department Tradition

            On Friday, James Comey, the director of the Federal Bureau of Investigation, acting independently of Attorney General Loretta Lynch, sent a letter to Congress saying that the F.B.I. had discovered e-mails that were potentially relevant to the investigation of Hillary Clinton’s private server. Coming less than two weeks before the Presidential election, Comey’s decision to make public new evidence that may raise additional legal questions about Clinton was contrary to the views of the Attorney General, according to a well-informed Administration official. Lynch expressed her preference that Comey follow the department’s longstanding practice of not commenting on ongoing investigations, and not taking any action that could influence the outcome of an election, but he said that he felt compelled to do otherwise.

        • Internet Policy/Net Neutrality

          • Comcast Joins AT&T, Files Lawsuit Against Nashville To Slow Google Fiber

            We’ve been noting for the last year how the latest front in the quest to bring competition to the broadband market is the boring old utility pole. Under the current model, a company like Google Fiber needs to request an ISP move its own gear before Google Fiber can attach its fiber lines. Given that ISPs often own the poles, and have little incentive to speed a competitor to market, this can often take six months or longer — worse if gear from multiple incumbent ISPs needs moving. Google Fiber notes this has quite intentionally slowed its arrival in cities like Nashville.

            As such, Google Fiber has been pushing cities to pass new “one touch make ready” utility pole attachment reform rules, which let a single licensed and insured technician move any ISP’s gear (often a matter of inches), reducing pole attachment from a 9 month process, to one that takes as little as a month. Needless to say, ISPs like AT&T feel threatened by anything that could speed up competition in these stagnant markets, so it has been suing cities like Louisville and Nashville for trying to do so.

          • What’s really at stake if AT&T buys Time Warner

            After all the shouting this election season, perhaps it’s no wonder AT&T CEO Randall Stephenson is proposing a tone-deaf $85.4 billion megamerger with Time Warner. On paper, the deal may have seemed like a shoo-in — after all, the Department of Justice approved a similar merger between Comcast and NBC Universal in 2011. But a lot has changed in the meantime.

            Riding the current wave of populism, politicians from both sides of the aisle have expressed skepticism — even outright hostility — to the proposed merger. Hillary Clinton last year vowed to prevent further market concentration by beefing up the antitrust enforcement arms of the DOJ and FTC. And in a fact sheet on competition policy put out earlier this month, she promised a return to stricter antitrust enforcement, “in contrast to the highly permissive approach of the Reagan era.”

          • The Senate Summoned The Wrong Time Warner To Talk About AT&T Merger

            The big news earlier this week, of course, was AT&T’s announced plans to purchase Time Warner. As we, and plenty of others, were careful to point out, Time Warner is a different and totally separate company from Time Warner Cable (which Comcast famously tried to takeover not that long ago). Yes, at one time they were the same company, but that was a long, long time ago. They’ve been separate since 2009. And yet, lots of people still get them confused. In fact, soon after the announcement of the deal, AT&T had to do a special filing with the SEC to clarify which Time Warner it was buying. Really.

        • Intellectual Monopolies

          • Your Brexit briefing

            There is no need for IP owners and advisers to panic following the UK vote to leave the EU. But now is a good time to consider how rights could be affected in the medium term

          • Trademarks

            • Catching up with TTAB cases

              The Trademark Trial and Appeal Board has seen a slew of unusual cases this year, according to John Welch, an attorney with Wolf Greenfield

            • Arsenal, The UK Football Club, Sues Arsenal Cider House, The Pittsburgh Bar, Because Of Course It Would

              Exactly how far can overly protective trademark owners go before the wider public wakes up to what a shitstorm trademark has become? It’s a question I find myself asking often, given the type of stories we cover around here. It seems any progress made on that front is slow, however, and the ridiculous stories keep on rolling in. You may recall that the Premier League, the UK’s famous soccer/football/whatever league, has already proven itself incapable of making any kind of sense while enforcing its intellectual property rights. Well, perhaps taking its cue from its parent league, the also-famous Arsenal soccer club is reaching across the pond to try to block a trademark application for a small bar in the suburbs of Pittsburgh.

            • Huge Casino Threatens Small Blues Club For Using The Word ‘Live’ In Its Name

              When I drop dead of a massive heart attack, it will be because some huge company has bullied some small company over a ridiculous trademark that never should have been granted in the first place. The examples for this sort of thing are legion around Techdirt, but it still gets me every single time. The Trademark Office has done such a poor job of turning even the barest of critical eyes towards trademark applications that all sorts of short and common words have been granted trademarks all over the place, including in industries where it was plainly insane to grant them at all.

              The latest of these concerns a small family-owned supper club in Maryland and the threat letter it received from an enormous casino company over the trademark it had somehow received on the word “live.”

          • Copyrights

            • Swedish Court: News Site Embedding A YouTube Video Guilty Of Copyright Infringement

              Nearly a decade ago, just as YouTube was really getting popular, we questioned whether or not it would be considered infringement to merely embed a YouTube video if the content in that video were unauthorized. As we noted at the time, it seemed like a crazy idea that this should be considered infringing, given that embedding is just sticking a simple line of code on a website. No content ever actually is hosted or lives on that website. You’re just telling a browser to go find content from the original YouTube source. For the most part, US courts have agreed that embedding is not infringing. And we’d thought that the EU had come to the same conclusion — however that ruling was a bit vague, in that it focused on the embedding of authorized content, not unauthorized content.

              Last month, however, there was the troubling EU Court of Justice ruling that found that mere links could be deemed direct infringement, especially if they were posted on a for-profit site. The ruling, somewhat dangerously, argued that any for-profit site that posted links should have the burden of checking to make sure the content they link to is not infringing, and it’s fine to assume that they had the requisite knowledge when they link (this is, of course, crazy). And now we’re seeing the reverberations of such a silly ruling.

            • Time Warner Cable Threatens Pirates With Account Termination

              Time Warner Cable has added an interesting clarification to its copyright infringement notifications. In addition to warning pirates of the standard “mitigation measures” that are part of the Copyright Alert System, the ISP now adds that persistent pirates also risk losing their Internet connection, and more.

            • Reykjavik: Icelandic Pirates Triple Result, But Not Largest Party

              The Icelandic Pirate Party has made a record election. Early vote counts place Pirates at 14 percent, for nine seats of the 63-seat world’s oldest Parliament. As the victory party draws to a close and the results slowly finalize, it’s worth looking a little at what comes next.

              Pirate Parties keep succeeding, although on a political timescale. It started out a little carefully with getting elected to the European Parliament from Sweden, then to multiple state parliaments in Germany, city councils all over Europe, the Czech Senate, and the Icelandic Parliament, all in a decade’s insanely hard volunteer work.

              Today, as the victory party draws long into the night and as the Election Saturday becomes Celebration Sunday (and quite probably Interview-and-Media Sunday for a lot of people), it’s clear that the Pirate Party of Iceland has broken all previous election records, clocking in at 14% with about one-third of the votes counted at 01:00 on election night.

            • How Hacker and ‘Pirate’ Birgitta Jónsdóttir Revolutionized Iceland’s Politics

              Birgitta Jónsdóttir likes to describe herself as a “poetician”—part poet, part politician. But that moniker doesn’t touch on what she’s best known for: founding Iceland’s radical Pirate Party, the collection of anarchists, libertarians, and techies that could gain control of the Nordic island’s parliament in an election Saturday.

              The Pirates are expected to gain as many as 20 seats in the weekend vote, which would give them a leading position to form a government. If that happens, the group’s extraordinary rise to power will have taken just a heartbeat in politics—less than four years.

            • Why Icelandic Elections Are More Important Than American

              On Saturday, in the shade of the American presidential elections that dominates the daily global news, some more important elections are going to be held. They will take place in the land of ice and snow, the most northern country of Europe, Iceland.

              This election is important because in Iceland we don’t have the usual “pretenders” to the power, but a pair that symbolizes the fight between the old world that is dying and the new one that is rising. The old is a traditional right-wing, conservative party which gives all power to the politicians. They stand against the radical, which believes in power of the base of the society, the grass root movements, the collective intelligence.

            • Pirate party prepares for first major win in Iceland elections

              This weekend, the political landscape in Iceland could be transformed. Polls show a real possibility that the Pirate Party – best known for its anti-establishment views and activism over copyright law and transparency – could come into power.

              In opinion polls conducted in October, the Pirate Party is tied for first place with the Independence Party (currently in government) and the Left-Green Movement. The pirates and the greens have agreed to form a coalition, and if after Saturday’s election they have a majority – perhaps with the help of some other parties – they will become the government of Iceland.

              “We don’t know what will happen on election night,” says Björn Leví, a Pirate Party candidate hoping to be elected on Saturday. “It will be very exciting, and it looks like it will be amazing for the Pirate Party.”

              Advertisement

              Iceland’s Pirate Party is led by Birgitta Jónsdóttir. The first Pirate Party was established in Sweden in 2006 with the main intention of reforming copyright law. Political parties acting under the Pirate Party banner now have a presence in many countries.

              “In Iceland we’ve expanded the Pirate Platform,” says Leví. “We’re not just about copyright and privacy, we’re about transparency and direct democracy as well.”

            • MPAA: EFF Just Jealous It Doesn’t Control Copyright Office Like Hollywood Does

              Earlier this week we wrote about the revelation, via a FOIA request by the EFF, that the Copyright Office consulted heavily with Hollywood (the MPAA directly, and a variety of movie studios) before weighing in on the FCC’s set top box competition proposal. As we noted, the Copyright Office’s discussion on the issue involved completely misrepresenting copyright law to pretend that an agreement between to industries (content studios & TV companies) could contractually wipe out fair use for end users. That’s… just wrong. The FCC’s proposal had absolutely nothing to do with copyright. It was just about letting authorized (paying) customers access content that was already authorized through other devices. What the FOIA request revealed was that the Copyright Office not only had many, many, many meetings with Hollywood, but that it actually prioritized those meetings over ones with the FCC — and lied to the FCC to say that key Copyright Office personnel were not available the very same week they were meeting with the MPAA, in order to push back the meeting with the FCC.

              It was a pretty big deal, given the Copyright Office’s reputation for acting as a taxpayer-funded lobbying arm for Hollywood. Of course, the MPAA is now mocking the EFF over this story, with a blog post by Neil Fried, one of the top lobbyist’s for the MPAA, and someone who features prominently in the conversations with the Copyright Office revealed by the FOIA request. The crux of Fried’s post is that there’s no news in the revelations, and that the Copyright Office met with the MPAA because the MPAA asked to meet with it.

            • Hollywood Accounting Back In Court: How Has Spinal Tap Only Earned $81 In Merchandise Sales For Its Creators?

              We’ve discussed the amazing bullshit known as Hollywood Accounting many times here on Techdirt. This is the trick whereby big Hollywood studios basically get out of paying anyone royalties by claiming movies (including big, mega-famous ones) are not profitable. The most simple version of this trick is that the big studio sets up an independent corporation to represent “the film.” It then “sells” services to that corporation, which it owns, at exorbitant prices. So, for example, it will charge a “marketing and distribution fee,” which may actually be many multiples of the film’s actual budget. No cash changes hands here. It’s just a paper transaction, but because of those “fees” any money made from the film remains with the big Hollywood studio, and is not passed on to anyone who has “participation” in the net profits from the film.

              Things can get more complex than that, but that’s a basic version of the scam. This has come out a lot in the past few years, thanks to a series of lawsuits. It’s how we know that a Harry Potter film that brought in basically a billion dollars in revenue still declared a $167 million “loss”. It’s why one of the highest grossing films ever, Return of the Jedi, still claims to be in the red, when it comes to paying out residuals. That’s a film that’s made $33 billion (with a b). Not profitable, under Hollywood accounting. Another film whose books were opened up in a lawsuit was Goodfellas, where Warner Bros. was not only accused of charging $40 million in interest on the $30 million cost of production, but also of hiding over $100 million in revenue.

              In another bizarre case from a few years ago, two subsidiaries of Vivendi went after each other over Hollywood accounting — with StudioCanal suing Universal for pulling such an accounting trick on a bunch of famous movies. Universal hit back by claiming it actually overpaid StudioCanal.

        ]]>
        http://techrights.org/2016/10/30/lenovo-surrenders-to-linux/feed/ 0
        Links 28/10/2016: NetBSD 7.0.2, Linux Mint 18.1 Will be “Serena” http://techrights.org/2016/10/28/linux-mint-18-1-will-be-serena/ http://techrights.org/2016/10/28/linux-mint-18-1-will-be-serena/#comments Fri, 28 Oct 2016 23:41:40 +0000 http://techrights.org/?p=96471

        GNOME bluefish

        Contents

        GNU/Linux

        • Linux Voice / Linux Magazine Merge

          Issue 32 is the last issue of Linux Voice as a stand-alone magazine as we have joined Linux Magazine. This newly merged magazine will bring the best bits of Linux Voice and Linux Magazine together into a single volume. All four of us Linux Voice founders will still be here contributing to the newly merged magazine – you’ll find us in the aptly named Linux Voice section. We’ll continue to write about the things that excite us in the world of open source software and we’ll continue making our popular podcast.

        • Desktop

        • Server

          • Managing OpenStack with Open Source Tools

            Day 2 operations are still dominated by manual and custom individual scripts devised by system administrators. Automation is needed by enterprises. Based on the above analysis, Ansible is a leading open source project with a high number contributions and a diverse community of contributions. Thus Ansible is a well supported and popular open source tool to orchestrate and manage OpenStack.

          • Databricks Weaves Deep Learning into Cloud-Based Spark Platform

            Databricks, a company founded by the creators of the popular open-source Big Data processing engine Apache Spark, is a firm that we’ve been paying close attention to here at OStatic. We’re fans of the company’s online courses on Spark, and we recently caught up with Kavitha Mariappan, who is Vice President of Marketing at the company, for a guest post on open source tools and data science.

            Now, Databricks has announced the addition of deep learning support to its cloud-based Apache Spark platform. The company says this enhancement adds GPU support and integrates popular deep learning libraries to the Databricks’ big data platform, extending its capabilities to enable the rapid development of deep learning models. “Data scientists looking to combine deep learning with big data — whether it’s recognizing handwriting, translating speech between languages, or distinguishing between malignant and benign tumors — can now utilize Databricks for every stage of their workflow, from data wrangling to model tuning,” the company reports, adding “Databricks is the first to integrate these diverse workloads in a fast, secure, and easy-to-use Apache Spark platform in the cloud.”

          • OpenStack Building the Cloud for the Next 50 Years (and Beyond)

            Two OpenStack Foundation executives talk about what has gone wrong, what has gone right and what’s next for the open-source cloud.
            BARCELONA, Spain—When OpenStack got started in 2010, it was a relatively small effort with only two companies involved. Over the last six years, that situation has changed dramatically with OpenStack now powering telecom, retail and scientific cloud computing platforms for some of the largest organizations in the world.

          • The Myth of the Root Cause: How Complex Web Systems Fail

            Complex systems are intrinsically hazardous systems. While most web systems fortunately don’t put our lives at risk, failures can have serious consequences. Thus, we put countermeasures in place — backup systems, monitoring, DDoS protection, playbooks, GameDay exercises, etc. These measures are intended to provide a series of overlapping protections. Most failure trajectories are successfully blocked by these defenses, or by the system operators themselves.

          • How to assess the benefits of SDN in your network

            Software-defined networking has matured from a science experiment into deployable, enterprise-ready technology in the last several years, with vendors from Big Switch Networks and Pica8 to Hewlett Packard Enterprise and VMware offering services for different use cases. Still, Nemertes Research’s 2016 Cloud and Data Center Benchmark survey found a little more than 9% of organizations now deploying SDN in production.

        • Kernel Space

          • Applying the Linus Torvalds “Good Taste” Coding Requirement

            In a recent interview with Linus Torvalds, the creator of Linux, at approximately 14:20 in the interview, he made a quick point about coding with “good taste”. Good taste? The interviewer prodded him for details and Linus came prepared with illustrations.

            He presented a code snippet. But this wasn’t “good taste” code. This snippet was an example of poor taste in order to provide some initial contrast.

          • DTrace for Linux 2016

            With the final major capability for BPF tracing (timed sampling) merging in Linux 4.9-rc1, the Linux kernel now has raw capabilities similar to those provided by DTrace, the advanced tracer from Solaris. As a long time DTrace user and expert, this is an exciting milestone! On Linux, you can now analyze the performance of applications and the kernel using production-safe low-overhead custom tracing, with latency histograms, frequency counts, and more.

          • The initial bus1 patch posting
          • Linux 4.8.5

            I’m announcing the release of the 4.8.5 kernel.

            All users of the 4.8 kernel series must upgrade.

            The updated 4.8.y git tree can be found at:
            git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.8.y
            and can be browsed at the normal kernel.org git web browser:

            http://git.kernel.org/?p=linux/kernel/git/stable/linux-st…

          • Linux 4.4.28
          • BFQ I/O Scheduler Patches Revised, Aiming To Be Extra Scheduler In The Kernel

            FQ developers had hoped to replace CFQ in the mainline Linux kernel with Budget Fair Queueing for a variety of reasons but it hadn’t ended up making it mainline. Now the developers are hoping to introduce BFQ back to mainline as an extra available scheduler.

            Paolo Valente on Wednesday published the latest patches dubbed “BFQ-v0″ for adding it as an extra scheduler. He began by saying, “this new patch series turns back to the initial approach, i.e., it adds BFQ as an extra scheduler, instead of replacing CFQ with BFQ. This patch series also contains all the improvements and bug fixes recommended by Tejun, plus new features of BFQ-v8r5…On average CPUs, the current version of BFQ can handle devices performing at most ~30K IOPS; at most ~50 KIOPS on faster CPUs. These are about the same limits as CFQ. There may be room for noticeable improvements regarding these limits, but, given the overall limitations of blk itself, I thought it was not the case to further delay this new submission.”

          • Graphics Stack

          • Benchmarks

            • Power Consumption & Efficiency Of The Linux Kernel For The Last Three Years

              Earlier this week I published Linux 3.9 through Linux 4.9 kernel benchmarks looking at the raw performance of various subsystems when testing each of the major kernel releases as far back as this Core i7 Haswell system was supported. From that same system, today is a look at testing the kernels going back to Linux 3.11 when Haswell graphics support was first in good shape for this Core i7 4790K box while looking at the raw power consumption and performance-per-Watt for these 19 major kernel releases.

            • The Idle Power Use Of The Past 19 Linux Kernel Releases

              This morning I published the Power Consumption and Efficiency Of The Linux Kernel For The Last Three Years article containing power consumption data for an Intel Haswell system going back to the Linux 3.11 kernel through Linux 4.9 Git. Those were some interesting power consumption numbers under load while here are the idle numbers.

              The idle tests were still running this morning so I opted to post them later since they’re interested in their own right. The same i7-4790K system was used for benchmarking all of these kernels from Linux 3.11 to Linux 4.9 (25 October Git). No other changes were made during the testing process. Each kernel was freshly booted to the Unity desktop and then launched the idle power consumption test for a period of three minutes while monitoring the AC power draw as reported by the WattsUp Power meter. Automating this with the Phoronix Test Suite: MONITOR=sys.power phoronix-test-suite benchmark idle.

            • Phoronix Test Suite 6.8 Milestone 1 Released
        • Applications

        • Desktop Environments/WMs

          • 6 Best Linux Desktop Environments [Part - 2]

            Linux has been developing at a good pace through this last years and with development comes better support for different hardware regarding support for proprietary drivers for video cards, better file systems, more choices in what operating system to use and one of the things that has it importance is distros graphical environment.

          • More Details On Enlightenment’s Ecore_Drm2 Atomic Modesetting

            Back in September the Enlightenment project’s EFL library added atomic mode-setting and nuclear page-flipping support to provide a “perfect rendering” and a “buttery smooth” experience. Earlier this month was then an update on the Ecore_Drm2 state while coming out this week is a Samsung OSG blog post explaining more about the atomic mode-setting details.

          • Ecore_Drm2: How to Use Atomic Modesetting

            In a previous article, I briefly discussed how the Ecore_Drm2 library came into being. This article will expand on that article and provide a brief introduction to the Atomic Modesetting and Nuclear Pageflip features inside the new Ecore_Drm2 library.

          • Papirus Icon Theme Scores Big October Update
          • K Desktop Environment/KDE SC/Qt

            • Qt Creator 4.2 Beta released

              Qt SCXML is a new module in Qt that allows you to create state machines from State Chart XML and embed them into Qt C++ and Qt Quick applications (Overview). It was released as Technical Preview in Qt 5.7 and will be released fully supported with Qt 5.8.

              Qt Creator 4.2 now supplements the module by offering a graphical editor for SCXML (experimental). It features editing states and sub-states, transitions, events, and all kinds of properties. The editor is experimental and the plugin is not loaded by default. Turn it on in Help > About Plugins (Qt Creator > About Plugins on macOS) to try it.

            • Qt Creator 4.2 Beta Released
          • GNOME Desktop/GTK

            • GObject and SVG

              GSVG is a project to provide a GObject API, using Vala. It has almost all, with some complementary, interfaces from W3C SVG 1.1 specification.

              GSVG is LGPL library. It will use GXml as XML engine. SVG 1.1 DOM interfaces relays on W3C DOM, then using GXml is a natural choice.

              SVG is XML and its DOM interfaces, requires to use Object’s properties and be able to add child DOM Elements; then, we need a new set of classes.

        • Distributions

          • Reviews

            • Chapeau Is Exactly What the Linux Desktop Needs

              That is where Chapeau comes in. Chapeau is a cutting-edge Linux distribution, built from Fedora Workstation, using the GNOME desktop environment, and intended to be an incredibly intuitive and easy to use, out-of-the box experience.

              Trust me when I say Chapeau is exactly that.

              Part of the Chapeau marketing states that it is “Fedora without the work.” I could not have said it better. With Chapeau, you get a desktop distribution in which everything works—in every way—out of the box.

          • New Releases

            • Maui 2 “Blue Tang” released

              The Maui team is happy to announce the release of Maui 2 – 64bit version.

              This is our second version of Maui which comes with plenty new features and fixes based on Plasma 5.8.2, KF 5.27 and Qt 5.7.0.
              We also provide the latest LTS Linux Kernel 4.4 together with an updated Ubuntu 16.04 LTS base system.
              Firefox was updated to version 49 and Thunderbird to version 45.

          • PCLinuxOS/Mageia/Mandriva Family

            • New KNOPPIX Release, LibreOffice 5.1.6, Rosa Down

              In Linux news today KNOPPIX 7.7.1 was released to the public based on Debian with GNOME 3.22, KDE 5.7.2, and “Everything 3D.” The Rosa project is experiencing network issues and folks may experience problems trying to connect to their services the next few days. LibreOffice 5.1.6 was announced today by The Document Foundation, the sixth update to the Still branch for stable users, and a new vulnerability was disclosed in GNU Tar.

            • Network shutdown

              From our part we will try our best to make the migrating process as smooth and seamless as possible for our partners.
              Note that the most possible period for unavailability of our resources is this weekend, but there is some probability it may also occur on Friday 10/28/16.
              In the first place, this process is aimed to improve the quality of our services, so please be patient and cooperative.

          • OpenSUSE/SUSE

            • openSUSE Tumbleweed – Review of the Week 2016/43

              The magic number this week is 6: that’s how many snapshots have been published since the last weekly review (1020, 1022, 1023, 1024, 1025 and 1026). Some of them were a bit larger than average (1026 – a big rebuild due to bash 4.4).

            • Identify constraint problems

              Until now it was not possible to easily identify if the constraints are the reaseon for your job to hang in state scheduled and not switching to building. That caused a lot of confusion for it was not clear what the problem is and if the state would change.

          • Red Hat Family

            • ESDS Teams Up With Red Hat On Managed Cloud Hosting Services

              ESDS Software Solution has announced that it has joined hands with Red Hat to bring together the benefits of cloud solutions to legacy applications and enterprise databases. Customers can now avail managed data and cloud hosting services on ESDS eNlight Cloud platform that allows vertical auto scaling of virtual machines. ESDS can now offer needed agility to enterprises that may not otherwise reap the benefits of cloud, given the architecture of their systems.

              eNlight Cloud is a state-of-the-art cloud hosting solution with a built-in ability to automatically scale CPU and RAM on-the fly. Customers can now access the benefits of automatic load sensing and scaling, pay-per-consumption metered billing, root access to enterprise databases and managed OS, database and network services by using Red Hat Enterprise Linux on patented eNlight Cloud. This solution is targeted at customers across several verticals including aviation, banking, manufacturing, oil & gas, shipping and telecommunications.

            • Swisscom, UKCloud Adopt Red Hat OpenStack Platform

              Red Hat announced today that both Swisscom and UKCloud will be leveraging its OpenStack platform as the companies transition toward cloud computing. Swisscom will use the platform to develop its own cloud platform, and UKCloud will provide its customers with the ability to deliver digital services directly to UK citizens.

            • Red Hat named as visionary in Gartner’s 2016 Magic Quadrant

              Red Hat, Inc., the world’s leading provider of open source solutions, on Thursday announced that Gartner, Inc. has positioned Red Hat in the “Visionaries” quadrant of Gartner’s October 2016 Magic Quadrant for Distributed File Systems and Object Storage for Red Hat Ceph Storage and Red Hat Gluster Storage.

            • CentOS 6 Linux Servers Receive Important Kernel Security Patch, Update Now

              We reported a couple of days ago that Johnny Hughes from the CentOS Linux team published an important kernel security advisory for users of the CentOS 7 operating system.

            • Finance

            • Fedora

              • Bodhi 2.3.0 released

                Bodhi 2.3.0 is a feature and bug fix release.

              • Fedora at Ohio Linuxfest 2016

                We arrived at the our hotel around 1PM on Friday. After checking in we headed over to find the new site in the Hyatt Regency Hotel. The first things we noticed was the Columbus Convention Center is doing a major renovation and one of those renovations was they removed the escalators from the food court to the second floor. At first we thought this may be a issue to move the event stuff in but there was an elevator close by. Also no signage for OLF in the Food Court area. After getting off the elevator on the second floor there was a sign pointing around the corner to the Ohio Linuxfest registration table. This year Ohio Linuxfest charged $10 for general attendees (free to students with student ID). We checked in and out our badges (yes insert favorite Blazing Saddles joke here). We walked down to the Vendor Expo hall which this year had a grand total of 28 exhibitors (see website for vendor lists). While the Expo was setup ready for Vendors to move in but the Vendor Expo was not open to the public on Friday.

              • The Bugs So Far Potentially Blocking The Fedora 25 Release

                Adam Williamson of the Fedora QA team has sent out a list of the bugs currently outstanding that could block the Fedora 25 release from happening on its current schedule should they not be fixed in time.

              • Updated Fedora 24 ISO Respins Now Available with Dirty COW-Patched Linux Kernel

                It looks like a new set of updated Live ISO images for the Fedora 24 GNU/Linux operating system were published by Ben Williams, founder of the Fedora Unity Project and a Fedora Ambassador.

                Dubbed F24-20161023, the updated Live ISOs a few days ago and include up-to-date components from the official Fedora 24 Linux software repositories, with which was fully syncronized as of October 23, 2016. Of course, this means that they also include the latest Linux kernel update fully patched against the “Dirty COW” bug.

              • PHP version 5.6.28RC1 and 7.0.13RC1
              • Flock Stories 2016, Episode 1: Redon Skikuli

                Flock Stories by Chris WardIf you were wondering where Flock 2018 might be, today’s guest Redon Skikuli might just have your answer! Redon is not just a Fedora community contributor, he’s a Fedora community creator. I ask Redon what he’s up to these days and why he thinks we should also consider joining future Flocks.

          • Debian Family

        • Devices/Embedded

          • Security-minded µQseven COM taps Allwinner A64

            Theobroma’s µQseven form factor “A64-µQ7”COM runs Linux 4.x on a quad-core -A53 Allwinner A64, and adds a security module.

            Austria-based Theobroma has released its second Allwinner-based computer-on-module using the half-size, 70 x 40mm µQseven form-factor. The A64-µQ7 follows the A31 µQ7, based on the quad-core, Cortex-A7 Allwinner A31. This time around the company has opted for the 64-bit, quad-core Cortex-A53 Allwinner A64.

          • Latest 96Boards SBC ships with GbE/PCIe add-on

            Fujitsu’s 96Boards CE compatible “F-Cue” SBC runs Linux on a quad-core Cortex-A15/A7 Socionext MB86S71 SoC, and offers a PCIe/GbE expansion board.

            The Fujitsu Electronics F-Cue is the latest Linux-driven 96Boards CE form factor SBC, following others like the uCRobotics Bubblegum-96 and Qualcomm DragonBoard 410c. The open-spec board uses the same 85 x 54mm CE spec, featuring standard 40- and 60-pin mezzanine expansion connectors. The board is pricier than most 96Boards entries, selling for $286, plus another for $48 an optional PCIe/GbE expansion board.

          • Rugged Qseven module runs Linux on Apollo Lake

            Seco unveiled a “Q7-B03” Qseven COM with Intel’s new Atom E3900 “Apollo Lake” SoC and optional onboard SATA flash and -40 to 85°C support.

          • 96Boards SBC adds “Giga” expansion and optional GbE card
          • Rugged Bay Trail boardset offers dual GbE and dual mini-PCIe

            The device supports Linux, Windows, Windows Embedded, and VxWorks, and offers five-year availability.

          • Tiny, open spec SBC offers wireless and 8GB eMMC

            FriendlyElec’s $45, 75 x 40mm “NanoPi S2” SBC runs Debian or Android on a quad-core A9 SoC, and offers RPi expansion, WiFi, Bluetooth, and 8GB eMMC.

          • Phones

            • Tizen

              • Video: Introducing Samsung ARTIK Cloud with Samsung Gear S2

                Samsung Electronics have previously announced SAMSUNG ARTIK Cloud™, which is an open data exchange platform designed to connect devices and applications. One of the goals of the SAMSUNG ARTIK Cloud is to provide developers the tools they need to securely connect to Internet of Things (IoT) devices, collect data and react to it accordingly.

                Companies can benefit from using open APIs and tools in order to accelerate their “time to market” and ultimately start monetizing their Investment. SAMSUNG ARTIK Cloud has a tiered pricing model, but the great thing is that you can actually start using it for FREE.

              • Game: Group Play Drag Racing in Tizen Store for Samsung Z1, Z2 and Z3

                Remember the World Cricket Championship 2 game? The most rated cricket game in the Tizen Store by Nextwave Multimedia Pvt. Ltd. Today they have added a new game named “Group Play Drag Racing“. It’s a Racing game against 6 racers, and you have to use your gears to the best of your ability in order to be fast fast fast !

            • Android

              • NVIDIA rolling out Shield Android TV upgrade 3.3 with improved audio, updated Vulkan API, and more
              • Software Upgrade 3.3 Available For NVIDIA SHIELD Android TV
              • PlayStation Vue launches on Android TV
              • Google Assistant channel launches on IFTTT
              • Google Allo Update 2.0 Brings Android 7.0 Nougat Features To The Table: Split-Screen, Quick Reply Support
              • Android 7.0 Nougat OTA download for OnePlus 3, OnePlus 2, OnePlus X happening this December
              • In Tech News: Apple iPhone Quarterly Results Signal Yet Another Year of 15% Flat Market Share

                If you look at the above picture, you really need to come to grips, that there is not, and will never be, a global take-over of the smartphone space by Apple’s iPhone. It has a VERY steady slice of the market. A healthy, profitable and loyal slice, but it is not growing nor is it shrinking. Apple finds one in seven smartphone owners eager to own their devices, and six in seven smartphone buyers will not buy an iPhone, either they don’t want it, or can’t afford it. Deal with this reality. 15%. That is not the world

              • How I Use Android: EvolveSMS and Talon developer Luke Klinker

                Luke Klinker knows his way around app development.

                Klinker started building his Android app empire when he was a student at the University of Iowa. He embraced Google’s Material Design standard and worked with his brother to create clean and intuitive apps that were packed with features and yet easy to use.

              • LG V20 Review: For spec-hungry Android enthusiasts, it’s the best Android phablet you can buy [Video]

                2016 has been a tough year for the Android market. In previous years we couldn’t count on one hand the number of awesome devices, but this year there have only been a few to choose from. The Galaxy S7, specifically the Edge has stood out as a clear winner, despite the praise given to competing devices like the HTC 10. On the other hand, no one really cared about LG this year. The G5 was a flop by every definition.

                Now in late 2016, there still isn’t much to pick from. The Galaxy Note 7 was close to perfection, and then it literally exploded in Samsung’s face. Google’s Pixel aims to fill the void, and redefine what an Android smartphone can and should be. However, if you’re not looking to get a Pixel, the LG V20 is 100% what you should be looking at, especially if you’re aiming for a big phone. Let’s take a closer look.

              • Android 7.0 Nougat: 15 hidden tips and tricks

                WE’VE RAIDED THE release notes in pieces past, but this time around (and with Google’s Pixel XL in tow) we’re running through some of the more useful additions to have found their way into the latest Android build.

                And for those of you who’ve skipped to the end, cats and hamburgers both have their uses…

              • Why Apple-to-Android upgrade comparisons are utterly meaningless

                Android upgrades are a contentious topic. Bring ‘em up in any way, and you’re bound to see some riled up people.

                I should know: I’ve observed and analyzed Android upgrades for years now — all the way back to the now-ancient-seeming Android 2.2 Froyo era, when widespread rollouts for the platform were still an untested concept. And in all of that time, one thing has stayed pretty much the same: By and large, Android manufacturers suck at delivering timely and reliable OS updates.

                But hang on: Not everything about the Android upgrade situation has remained constant over these past several years. In fact, one very significant area has evolved considerably — and it’s an area that’s almost always overlooked as part of the Android upgrade discussion, particularly when iOS comparisons come into the picture.

                As we think about Google’s new Pixel phone and its unique position as the sole current handset guaranteed to get quick and regular Android updates, it’s important to step back and put the situation in perspective — because there really is much more to it than what we see on the surface. And while iPhone-to-Android upgrade comparisons are an inevitable side effect of the discussion (and one I’ve already heard brought up plenty in the context of the Pixel, especially when it comes to its short-seeming two-year window for support), the truth is that upgrades on iOS and Android are drastically different beasts.

              • BlackBerry reveals its LAST ever Android smartphone

                Marking BlackBerry’s third foray into Android devices, the DTEK60 has been designed to take on the likes of Samsung and HTC with a polished look and powerful hardware.

                The device features a 5.5-inch QuadHD display with a resolution of 2,560×1,440-pixels and a pixel density of 538ppi, which BlackBerry says can display up to 16 million colours.

                Inside, there’s a speedy quad-core Snapdragon 820 processor from Qualcomm, backed up by 4GB of RAM and 32GB of storage, which can be boosted up to 2TB via a microSD card.

              • Latest Strategy Analytics data shows Chinese Android manufacturers eating at Apple’s marketshare

                Apple just reported its latest earnings yesterday evening, and now Strategy Analytics is out with its latest report concerning the smartphone industry. The latest data shows the entire smartphone industry saw shipments rise 6 percent year over year to hit 375 million worldwide during Q3 2016.

                Shipment rose from 345.2 million units in Q3 2015 to 375.4 million in Q3 2016, which is the industry’s fastest growth rate for a year. Strategy Analytics attributes much of this growth to new product launches from Apple.

                Individually for Apple, though, the numbers weren’t as bright. The company saw its shipments fall from 48 million to 45.5 million, just as it reported during its earnings call. This fall pushed Apple’s marketshare from 13.6 percent to 12.1 percent, though Apple is holding strong to its #2 spot.

              • Android, Samsung Improve in Third Quarter

                Consumer Intelligence Research Partners (CIRP) released analysis of the results of its research on mobile phone operating systems and brands for the calendar quarter that ended September 30, 2016. This analysis features findings about market share trends in mobile phone operating systems and brands in the US from July-September 2016.

                CIRP research shows that the two major mobile operating systems, Google Android and Apple iOS, controlled about 97% of US customer mobile phone activations in the third quarter (Chart 1). In the September 2016 quarter, Android accounted for 71% of US activations, the same share as the year-ago September 2015 quarter, and up from 63% in the June 2016 quarter. iOS accounted for 26% of activations, about the same as its 27% share in the year-ago September 2015 quarter, but down from its 32% share in the June 2016 quarter.

              • This Android keyboard trick fixes bad autocorrect suggestions
              • 11 things Android phone makers should copy from the Pixe
              • Review: 7 PDF editing tools for iOS and Android
              • Qualcomm acquires NXP Semiconductors for $47 billion
              • Moto M with metal body and Snapdragon 625 leaks

        Free Software/Open Source

        • Pitt, partners create open source software for cancer genome data

          Researchers at the University of Pittsburgh, UPMC and the Pittsburgh Supercomputing Center have created software to help investigators more easily navigate genomic cancer data.

          The free, open-source software, profiled Thursday in the journal PLOS ONE, processes data generated by The Cancer Genome Atlas project. Funding for the new software was provided by the Institute of Precision Medicine and the University of Pittsburgh Cancer Institute.

        • Starting a Career as an Open Source Developer

          “Disney, John Deere and Walmart. Any idea what these three companies have in common?”

          The question was asked on Wednesday by Brandon Keepers, GitHub’s head of open source. He was about three minutes into a session he was conducting called “Contributing to Your Career” at the All Things Open conference.

          “All three of these companies are actually software companies,” he answered after taking a moment to tease the audience. “They do other things. They build tractors, protect trademarks and build amusement parks, and sell groceraies and things that you need everyday. But they’ve also become software companies and they’ve become really active in open source — and they’re not alone.”

        • A look at how retail giant Walmart is becoming open source first

          It’s rare that we speak to large, global enterprises that are redesigning their technology stack and culture around an open source first policy. More often than not companies stick to their legacy vendors of choice, or they shift to ‘reliable’ cloud/digital vendors where similar buying rules apply.

          However, that’s exactly what Walmart is doing. Since acquiring performance lifecycle management start-up OneOps four years ago, in order to implement a DevOps approach to its e-commerce environment, the retailer is also prioritising open source over everything else – with it having made a big investment in OpenStack for its infrastructure.

        • Open source no longer scares the enterprise

          Open source breaks the rules on corporate procurement, but developers never play by the rules and now open source has sneaked in through the back door

          A study by Vanson Bourne for Rackspace reports that businesses are making big savings by using open source.

          In the survey of 300 organisations, three out of five respondents cited cost savings as the top benefit, reducing average cost per project by £30,146.

        • Defining MANO: Open Source vs. Standards

          As service providers are working to deploy NFV-based services, they are finding that management and orchestration (MANO) is a pain point. One of the big questions about MANO is how we go from a high-level architecture diagram to interoperable implementations. Do we take the traditional telco path and work through standards bodies? Or do we take a cloud-centric path and focus on open source development projects?

        • Eclipse Kapua IoT Project Gets Code from Eurotech and Red Hat

          The nascent Eclipse Kapua project got a big boost this week from its chief sponsors, open source solutions provider Red Hat and M2M/IoT platform provider Eurotech. The two companies announced their first official code contributions to the recently approved project, through which they are developing a modular, cloud-based platform for managing IoT gateways and smart edge devices. Red Hat and Eurotech collaborated to propose the project last June.

        • APIStrat Boston to highlight link between APIs and open source projects

          This year’s API Strategy and Practice (known as APIStrat)—to be held in Boston on November 2-4—has a strong open source component running throughout the event, and with little wonder. Successful API strategies more often than not either contribute new open source projects, or draw on the rich source of tools already built by the open source community.

          The API mindset has always lent itself to an open source ethos. APIs are all about opening up internal assets, data, and systems in order to connect and collaborate with a wider ecosystem of partners and end users. Amongst leadership businesses that have a strong API strategy, seeing so many contribute and use open source projects is not surprising, and this is reflected throughout this year’s APIStrat program. After all, two of the key specifications formats that are used across the industry to describe APIs—the Open API Initiative and RAML—are both open source projects. Projects like Mashape’s Kong and Tyk’s API Gateway are both open source and gaining greater recognition and uptake.

        • Phil Shapiro: Open Source and Social Justice Advocate

          If you visit the public library in Tacoma Park, Maryland, you might run into Phil Shapiro, who is in charge of their computer lab. Or if you visit Foss Force (you’ve heard of that website, right?) you’ll see his byline here, here, here, and many other places.

          According to my thesaurus, “Phil Shapiro” is a synonym for “prolific.” And then there’s Twitter, where Phil holds forth on many topics, often many times daily.

          For a change, this video is a story that’s not by Phil, but about Phil. How did he get into Linux? How well is Linux accepted by library patrons? How do the Open Source and Social Justice movements complement each other, and how they they work together better? All good questions for Phil, so they’re questions we asked him. And his answers are enlightening — but also light-hearted, because Phil is a light-hearted guy.

        • Events

        • Web Browsers

          • Mozilla

            • Our Role in Protecting the Internet — With Your Help

              Protecting the security of the Internet requires everyone. We talked about this theme in a recent post, and in this post we’ll expand on the role Mozilla plays, and how our work supports and relies on the work of the other participants in the Web.

            • Mozilla Hosts Seventh Annual MozFest in London this weekend

              Now in its seventh year, MozFest is the world’s go-to event for the free and open Internet movement. Part meeting place for like-minded individuals keen to share ideas; part playground for Web enthusiasts, hobbyist netizens and seasoned open source technonauts alike, part hack-a-thon; part living breathing creative brainstorm; part speaker-series; MozFest is a buzzy hive of activity. It attracts thousands of visitors each year (1,800 in 2015) from as many as 50 countries around the world, making it the biggest unconference of its kind.

        • Oracle/Java/LibreOffice

          • LibreOffice 5.1.6 Office Suite Released for Enterprise Deployments with 68 Fixes

            Today, October 27, 2016, we’ve been informed by The Document Foundation about the general availability of the sixth maintenance update to the LibreOffice 5.1 open-source and cross-platform office suite.

            You’re reading that right, LibreOffice 5.1 got a new update not the current stable LibreOffice 5.2 branch, as The Document Foundation is known to maintain at least to versions of its popular office suite, one that is very well tested and can be used for enterprise deployments and another one that offers the latest technologies.

          • LibreOffice 5.1.6 available for download

            The Document Foundation (TDF) announces LibreOffice 5.1.6, the sixth minor release of the LibreOffice 5.1 family launched in January 2016, targeted at individual users and enterprise deployments. Users of previous LibreOffice releases should start planning the update to the new version.

        • BSD

        • FSF/FSFE/GNU/SFLC

          • FSF announces change in general counsel

            On Thursday, October 27, 2016, Eben Moglen stepped down as general counsel to the Free Software Foundation (FSF). Moglen, who in addition to being a professor of law and legal history at Columbia University, is the founder, president, and executive director of the Software Freedom Law Center (SFLC), and a former FSF board member, has generously served as the FSF’s pro bono general counsel for the last 23 years.

          • Licensing resource series: How to choose a license for your own work

            We provide plenty of resources when it comes to picking a license. From our list of licenses to essays on copyleft, if you are looking to figure out what license is right for you there is plenty of information to rely upon. But this month’s resource helps to pull that information together in one place to make selecting a license simple.

            Our guide, “How to choose a license for your work” is one stop browsing for answering many of the questions you may have when it comes to finding the right license. It provides recommendations based on the state of the work, but also based on the type of work that it is. While the Affero GNU General Public License version 3 works great for server software, documentation would probably be better served with a license directed at such, like the GNU Free Documentation License version 1.3. Smaller works can often get away without a strong copyleft, but still need to address patents, and so Apache License version 2.0 might be appropriate. The guide explains the reasoning behind the different recommendation for these and more. It also links to all those other resources mentioned above in case you need to dive in deeper when picking out a license.

          • Friday ‘Frankenstein’ Directory IRC meetup: October 28th starting at 1pm EDT/17:00 UTC
          • Free Software Directory meeting recap for October 21st, 2016
        • Public Services/Government

        • Licensing/Legal

          • Conservancy’s First GPL Enforcement Feedback Session

            As I mentioned in an earlier blog post, I had the privilege of attending Embedded Linux Conference Europe (ELC EU) and the OpenWrt Summit in Berlin, Germany earlier this month. I gave a talk (for which the video is available below) at the OpenWrt Summit. I also had the opportunity to host the first of many conference sessions seeking feedback and input from the Linux developer community about Conservancy’s GPL Compliance Project for Linux Developers.

            ELC EU has no “BoF Board” where you can post informal sessions. So, we scheduled the session by word of mouth over a lunch hour. We nevertheless got an good turnout (given that our session’s main competition was eating food :) of about 15 people.

            Most notably and excitingly, Harald Welte, well-known Netfilter developer and leader of gpl-violations.org, was able to attend. Harald talked about his work with gpl-violations.org enforcing his own copyrights in Linux, and explained why this was important work for users of the violating devices. He also pointed out that some of the companies that were sued during his most active period of gpl-violations.org are now regular upstream contributors.

        • Openness/Sharing/Collaboration

          • Open Chemistry project raises up the next generation of researchers

            In 2007 I took part in Google Summer of Code (GSoC) developing the Avogadro application. As we were developing Avogadro, we founded The Open Chemistry project as an umbrella project to develop related tools for chemistry and materials science. Our goal is to bring high quality open source tools to research communities working in these areas, and to develop other tools to complement the Avogadro molecular editor.

            This year we were very pleased to be selected as a mentoring organization for GSoC; a few of our mentors are Geoff Hutchison, Adam Tenderholt, David Koes, and Karol Langner, who are all long-time contributors in related projects. And, we were lucky to get three slots for student projects. To get started, we lined up a number of mentors from related communities, and developed an ideas page.

        • Programming/Development

          • Getting Groovy with data

            Groovy is an almost perfect complement to Java, providing a compact, highly expressive and compatible scripting environment for my use. Of course, Groovy isn’t totally perfect; as with any programming language, its design is based on a series of trade-offs that need to be understood in order to produce quality results. But for me, Groovy’s advantages far outweigh its disadvantages, making it an indispensable part of my data analysis toolkit. In a series of articles, I’ll explain how and why.

        Leftovers

        • Spreadsheets have ruled Earth for too long. Business must embrace the cloud [iophk: “the pie chart has already done untold damage, how much more when coupled with clown computing?”]

          The one certainty in business software and services is that there will always be more acronyms. At the moment, though, there’s more to the sector than just another jargon explosion: we’re moving towards a new way of looking at IT, one that applies best-practice business processes to any company—however small it may be, and however fast it may grow.

          This sounds good, but wading through websites full of perky lists of generic benefits can leave many IT managers still wondering exactly what they’re being sold.

        • Finland ranks in top 3 travel destinations for 2017

          In its annual ranking, independent-travel publisher Lonely Planet names Canada, Colombia and Finland as prime destinations for 2017.

        • 13 IT leaders confess their scary stories and deep, dark fears

          Today’s IT leaders are facing a world of unknowns and underlying fears on a daily basis – from the ransomware that could take down their organizations, to the emergence of new digital disruptors that could render their business obsolete, to the absence of quality IT talent they need to stay ahead of these and other threats. Although scary, it is comforting to know that you are not alone.

          We asked 13 IT leaders to share their stories of unexpected or frightening events in their career, or the threats on the horizon making them nervous for the future of IT. Read on for their tales from the IT crypt.

        • Science

          • Google’s neural networks invent their own encryption

            Computers are keeping secrets. A team from Google Brain, Google’s deep learning project, has shown that machines can learn how to protect their messages from prying eyes.

            Researchers Martín Abadi and David Andersen demonstrate that neural networks, or “neural nets” – computing systems that are loosely based on artificial neurons – can work out how to use a simple encryption technique.

            In their experiment, computers were able to make their own form of encryption using machine learning, without being taught specific cryptographic algorithms. The encryption was very basic, especially compared to our current human-designed systems. Even so, it is still an interesting step for neural nets, which the authors state “are generally not meant to be great at cryptography”.

        • Hardware

          • 2001: An Apple Odyssey

            A lot about Apple has changed since 2001, but one thing that hasn’t are the haters.

            Exactly 15 years ago this week, Apple released the iPod, a device that was met with a famously harsh one-line review from Slashdot founder Rob Malda: “No wireless. Less space than a nomad. Lame.”

            If you’re an Apple fan, you know that quote inside and out, because it was a great example of the haters being wrong and a nice quote to pull out of your hat.

          • The question about ‘grand strategy’ that made Tim Cook unhappy on Apple’s earning call was based on a Harvard professor’s theory that makes uncomfortable reading for Apple

            Last night, Apple CEO Tim Cook gave a terse, unhappy answer to this question from UBS analyst Steven Milunovich: “Does Apple today have a grand strategy for what you want to do?”

            Milunovich asked the question two different ways, and Cook gave only non-answers, one of which was “as usual, we’re not going to talk about what’s ahead.”

            There is a reason Milunovich asked that question. It’s not merely about Cook’s tradition of not giving clues about what Apple will do next. Rather, Milunovich’s question was based on a theory by Harvard Business School Professor Clayton Christensen. The theory makes uncomfortable reading for observers of Apple, and perhaps for insiders too.

        • Security

          • Thursday’s security updates
          • Mirai will be dwarfed by future Android botnet DDoS attacks, Lookout warns

            THE MIRAI BOTNET will seem like nothing compared to the havoc that is caused when hackers turn their attention to hijacking Android smartphones, Lookout’s security research chief has warned.

            Speaking to the INQUIRER, Mike Murray said it would be easy for cyber crooks to take over millions of smartphones, noting how often the Android requires patching.

          • Deal Seeks to Limit Open-Source Bugs

            Seeking to spot potential security vulnerabilities in systems that increasingly rely on open source software, software license optimization vendor Flexera Software has acquired a specialist in identifying potentially vulnerable software components.

            Flexera, Itasca, Ill., said Thursday (Oct. 27) it is acquiring San Francisco-based Palamida Inc. Terms of the transaction were not disclosed.

          • Senator Wants to Classify Insecure Internet of Things Devices As ‘Harmful’

            A massive attack carried out with a zombie army of hacked internet-connected devices caused intermittent outages on Friday, preventing tens of thousands of people from accessing popular sites such as Twitter, Reddit, and Netflix.

            For many security experts, an attack like that one, which leveraged thousands of easy-to-hack Internet of Things such as DVRs and surveillance cameras—weaponized thanks to a mediocre but effective malware known as Mirai—is just a sign of things to come.

            That’s why Sen. Mark Warner (D-Va.) wants the US government to do something about it.

          • Senator Prods Federal Agencies on IoT Mess

            The co-founder of the newly launched Senate Cybersecurity Caucus is pushing federal agencies for possible solutions and responses to the security threat from insecure “Internet of Things” (IoT) devices, such as the network of hacked security cameras and digital video recorders that were reportedly used to help bring about last Friday’s major Internet outages.

            In letters to the Federal Communications Commission (FCC), the Federal Trade Commission (FTC) and the Department of Homeland Security (DHS), Virginia Senator Mark Warner (D) called the proliferation of insecure IoT devices a threat to resiliency of the Internet.

          • European Parliament increases budget for EU-Fossa

            On Wednesday, the European Parliament agreed to a follow-up to the European Commission’s ‘EU Free and Open Source Software Auditing’ project (EU-Fossa). The plan for the next phase is included in the EU 2017 budget that was agreed upon by the European Parliament.

          • European Parliament votes to extend Free Software security audits

            Remember how I raised €1 million to demonstrate security and freedom aren’t opposites? Well here’s what happened next and how we are going to move forward with this.

            In 2014, two major security vulnerabilities, Heartbleed and Shellshock, were discovered. Both concerned Free Software projects that are widely used throughout the Internet, on computers, tablets, and smartphones alike. My colleague Max Andersson from the Swedish Greens and I proposed a so-called “pilot project”, the Free and Open Source Software Audit (FOSSA).

          • Princeton Upskills U on Open Source Security

            During Wednesday’s Upskill U course, lecturer Gary Sockrider, principal security technologist for Arbor Networks , explained the history of DDoS attacks, case studies of recent attacks, and the business impact of these security threats. DDoS attacks not only raise operational expenses, but can also negatively affect an organization’s brand, and result in loss of revenue and customers. (Listen to Security: Tackling DDoS.)

            “Having visibility is key, you can’t stop something you can’t see. Having good visibility across your own network is vital in finding and stopping these attacks,” said Sockrider. “You can leverage common tools and technology that are already available on the network equipment you own today such as flow technologies, looking at SIP logs … Obviously you’ll want to get to some specific intelligent DDoS mitigation in the end.”

          • GNU Tar “Pointy Feather” Vulnerability Disclosed (CVE-2016-6321)

            Last week was the disclosure of the Linux kernel’s Dirty COW vulnerability while the latest high-profile open-source project going public with a new security CVE is GNU’s Tar. Tar CVE-2016-6321 is also called POINTYFEATHER according to the security researchers.

            The GNU Pointy Feather vulnerability comes down to a pathname bypass on the Tar extraction process. Regardless of the path-name(s) specified on the command-line, the attack allows for file and directory overwrite attacks using specially crafted tar archives.

          • Let’s Encrypt and The Ford Foundation Aim To Create a More Inclusive Web

            Let’s Encrypt was awarded a grant from The Ford Foundation as part of its efforts to financially support its growing operations. This is the first grant that has been awarded to the young nonprofit, a Linux Foundation project which provides free, automated and open SSL certificates to more than 13 million fully-qualified domain names (FQDNs).

            The grant will help Let’s Encrypt make several improvements, including increased capacity to issue and manage certificates. It also covers costs of work recently done to add support for Internationalized Domain Name certificates.

            “The people and organizations that Ford Foundation serves often find themselves on the short end of the stick when fighting for change using systems we take for granted, like the Internet,” Michael Brennan, Internet Freedom Program Officer at Ford Foundation, said. “Initiatives like Let’s Encrypt help ensure that all people have the opportunity to leverage the Internet as a force for change.”

          • How security flaws work: SQL injection

            Thirty-one-year-old Laurie Love is currently staring down the possibility of 99 years in prison. After being extradited to the US recently, he stands accused of attacking systems belonging to the US government. The attack was allegedly part of the #OpLastResort hack in 2013, which targeted the US Army, the US Federal Reserve, the FBI, NASA, and the Missile Defense Agency in retaliation over the tragic suicide of Aaron Swartz as the hacktivist infamously awaited trial.

          • How To Build A Strong Security Awareness Program

            At the Security Awareness Summit this August in San Francisco, a video clip was shown that highlights the need to develop holistic security awareness. The segment showed an employee being interviewed as a subject matter expert in his office cubicle. Unfortunately, all his usernames and passwords were on sticky notes behind him, facing the camera and audience for all to see.

            I bring this story up not to pick on this poor chap but to highlight the fact that security awareness is about human behavior, first and foremost. Understand that point and you are well on your way to building a more secure culture and organization.

            My work as director of the Security Awareness Training program at the SANS Institute affords me a view across hundreds of organizations and hundreds of thousands of employees trying to build a more secure workforce and society. As we near the end of this year’s National Cyber Security Awareness Month, here are two tips to incorporate robust security awareness training into your organization and daily work.

        • Defence/Aggression

          • Britain, U.S. sending planes, troops to deter Russia in the east

            Britain said on Wednesday it will send fighter jets to Romania next year and the United States promised troops, tanks and artillery to Poland in NATO’s biggest military build-up on Russia’s borders since the Cold War.

            Germany, Canada and other NATO allies also pledged forces at a defense ministers meeting in Brussels on the same day two Russian warships armed with cruise missiles entered the Baltic Sea between Sweden and Denmark, underscoring East-West tensions.

            In Madrid, the foreign ministry said Russia had withdrawn a request to refuel three warships in Spain’s North African enclave of Ceuta after NATO allies said they could be used to target civilians in Syria.

            The ships were part of an eight-ship carrier battle group – including Russia’s sole aircraft carrier Admiral Kuznetsov – that is expected to join around 10 other Russian vessels already off the Syrian coast, diplomats said.

          • Yazidi women who escaped from Isis win EU human rights prize

            Two Yazidi women who survived sexual enslavement by Islamic State before escaping and becoming “inspirational” advocates for their community in Iraq have won the EU’s prestigious Sakharov human rights prize.

            Nadia Murad and Lamiya Aji Bashar were abducted with other Yazidi women in August 2014 when their home village of Kocho in Sinjar, northern Iraq, was attacked by Isis jihadis. It was one of the darkest episodes Iraq has suffered at the hands of the terrorist group.

            The annual Sakharov prize for freedom of thought, established in 1988, is named after the Soviet physicist and outspoken dissident Andrei Sakharov and is awarded to “individuals who have made an exceptional contribution to the fight for human rights across the globe”. It has previously been awarded to the likes of Aung San Suu Kyi and Nelson Mandela.

            The EU described Murad and Aji Bashar as “public advocates for the Yazidi community in Iraq, a religious minority that has been the subject of a genocidal campaign by IS militants”.

          • Assyrian Woman: ISIS Murdered My Son Because He Refused to Convert

            An Assyrian Christian woman has shared how members of the Islamic State terrorist group brutally murdered her son because he refused to deny his faith in Jesus Christ.

            During an interview with the Southern California-based human rights group Roads of Success, Syrian mother Alice Assaf recalled how ISIS overtook her hometown, the Damascus suburb of Adra al-Ummaliya, in 2014, and immediately began killing Christians.

            “Members of 200 different families were killed right before our eyes,” Assaf said, according to an English translation provided by Roads of Success in a YouTube video. “They shot them. We witnessed the shooting of so many. So I told my children [and thought] it was better for us to die in our own home so that our other family members would know our fate. When we got home, one person said to me, … ‘ISIS is killing Christians.’”

            Assaf shared how militants killed indiscriminately, massacring at least six men and about 250 children – all under four years old – at a nearby bakery.

          • ‘The day I killed my rapist’

            A young Tunisian woman was photographed naked by a friend of her father’s. He then used the images to silence her – until one day she snapped and took a bloody revenge.

        • Transparency/Investigative Reporting

          • The strange tale of a dating site’s attacks on WikiLeaks founder Assange

            For an online dating site, toddandclare.com seems really good at cloak-and-dagger stuff. Disconnected phones. Mystery websites. Actions that ricochet around the globe.

            But the attention grabber is the Houston-based company’s target: Julian Assange, the founder of WikiLeaks, whose steady dumps of leaked emails from Hillary Clinton’s presidential campaign have given supporters of Donald Trump the only cheering news of the last few weeks.

            In some ways, toddandclare.com’s campaign against Assange is as revelatory as the leaked emails themselves, illustrating the powerful, sometimes unseen, forces that oppose WikiLeaks.

            Whoever is behind the dating site has marshaled significant resources to target Assange, enough to gain entry into a United Nations body, operate in countries in Europe, North America and the Caribbean, conduct surveillance on Assange’s lawyer in London, obtain the fax number of Canada’s prime minister and seek to prod a police inquiry in the Bahamas.

            And they’ve done it at a time when WikiLeaks has become a routine target of Democratic politicians who portray Assange as a stooge of Russian President Vladimir Putin and his reported efforts to disrupt the U.S. election.

            One part of toddandclare’s two-pronged campaign put a megaphone to unproven charges that Assange made contact with a young Canadian girl in the Bahamas through the internet with the intention of molesting her. The second part sought to entangle him in a plan to receive $1 million from the Russian government.

          • Hillary, Wikileaks, Russia – theater of absurd goes viral

            Can people STOP referring to Wikileaks as a news organization. They are a foreign agent, supported by Russia, publishing stolen data,” tweeted Michael McFall, who is considered among the most controversial former US ambassador in Russia. During his tenure in Moscow, McFall was surrounded by controversies and continues to air bombastic tweets.

            On the other hand, Wikileaks, which was launched 10 years ago, has turned out to be a unique phenomenon. It is redefining modern media by attempting to expose even media outlets, tabloids, and successful channels alongside their big bosses. The website has been publishing leaked documents to bring truth out in the open.

            The sad state of affairs of our times is that truth has to find its way to the public through questionable ways and instruments. In case of Wikileaks, most of their documents are accessed either via hacking or are supplied by whistleblowers.

            All these years Wikileaks has been revealing a lot of classified information on numerous subjects related to foreign and domestic policies of countries. Wikileaks publisher and journalists have won many awards. In 2015, it was nominated for the UN Mandela Prize and was nominated for six years in a row, from 2010 to 2015, for the Nobel Peace Prize.

          • Aide Said He Was Running ‘Bill Clinton Inc.’ in New WikiLeaks Dump

            A 12-page memo written by a former aide to President Bill Clinton illustrates how he and other advisers raised millions of dollars for the Clinton Foundation and the Clintons after they left the White House, according to a new batch of emails released by WikiLeaks.

            The purported memo from Doug Band details how he and his team locked in lucrative speaking deals for Bill Clinton and how Band leveraged his work at his global consulting firm, Teneo Strategies, to persuade clients to contribute to the Clinton Foundation. Band described his work as running “Bill Clinton Inc.”

            “We also have solicited and obtained, as appropriate, in-kind services for the president and his family – for personal travel, hospitality, vacation and the like,” Band allegedly said in the document.

          • The strange tale of a dating site’s attacks on WikiLeaks founder Assange

            For an online dating site, toddandclare.com seems really good at cloak-and-dagger stuff. Disconnected phones. Mystery websites. Actions that ricochet around the globe.

            But the attention grabber is the Houston-based company’s target: Julian Assange, the founder of WikiLeaks, whose steady dumps of leaked emails from Hillary Clinton’s presidential campaign have given supporters of Donald Trump the only cheering news of the last few weeks.

            In some ways, toddandclare.com’s campaign against Assange is as revelatory as the leaked emails themselves, illustrating the powerful, sometimes unseen, forces that oppose WikiLeaks.

        • Environment/Energy/Wildlife/Nature

          • World wildlife ‘falls by 58% in 40 years’

            The Living Planet assessment, by the Zoological Society of London (ZSL) and WWF, suggests that if the trend continues that decline could reach two-thirds among vertebrates by 2020.

            The figures suggest that animals living in lakes, rivers and wetlands are suffering the biggest losses.

            Human activity, including habitat loss, wildlife trade, pollution and climate change contributed to the declines.

            Dr Mike Barrett. head of science and policy at WWF, said: “It’s pretty clear under ‘business as usual’ we will see continued declines in these wildlife populations. But I think now we’ve reached a point where there isn’t really any excuse to let this carry on.

          • World facing biggest mass extinction since dinosaurs – with two thirds of animals wiped out in 50 years

            The world is facing the biggest extinction since the dinosaurs, with seven in 10 mammals, birds, fish, amphibians and reptiles wiped out in just 50 years, a new report warns.

            The latest Living Planet report by the World Wildlife Fund (WWF) and the Zoological Society of London (ZSL) estimates that by 2020 populations of vertebrates will have fallen by 67 per cent since 1970.

            Extinction rates are now running at 100 times their natural level because of deforestation, hunting, pollution, overfishing and climate change.

          • World on track to lose two-thirds of wild animals by 2020, major report warns

            The number of wild animals living on Earth is set to fall by two-thirds by 2020, according to a new report, part of a mass extinction that is destroying the natural world upon which humanity depends.

            The analysis, the most comprehensive to date, indicates that animal populations plummeted by 58% between 1970 and 2012, with losses on track to reach 67% by 2020. Researchers from WWF and the Zoological Society of London compiled the report from scientific data and found that the destruction of wild habitats, hunting and pollution were to blame.

            The creatures being lost range from mountains to forests to rivers and the seas and include well-known endangered species such as elephants and gorillas and lesser known creatures such as vultures and salamanders.

          • Hectare by hectare, an indigenous man reforested a jungle in Indonesia’s burned-out heartland

            The road from this inland provincial capital in southern Borneo to the delta city of Banjarmasin is littered with degraded forests and peat swamps, hallmarks of a region at the epicenter of last year’s nationwide fire and haze crisis.

            Amid this arid landscape, however, lies an oasis: the peat forest of Jumpun Pambelom, whose name means “life source” in the local Dayak Ngaju language.

            The jungle here is largely the work of a Ngaju man named Januminro. Since 1998, when Indonesia experienced one of the worst episodes of uncontrolled burning in recorded history, the 54-year-old has bought up and reforested degraded land in the area — a hectare here, a few there.

            Today Jumpun Pambelom spans 18 hectares (44 acres) and bustles with with plant and animal life, from rare ulin trees (Eusideroxylon) and towering ramins (Gonystylus) to endangered Bornean orangutans (Pongo pygmaeus) and sun bears (Helarctos malayanus), not to mention plenty of swamp fish and game.

          • Two-Thirds of Wild Animal Populations Could Be in Decline by 2020

            Around the world, more than two-thirds of wildlife populations could be in decline by the year 2020 because of human activity on the planet, says a new report from the World Wildlife Fund (WWF) and the Zoological Society of London, a conservation charity.

            The Living Planet Report, which the WWF puts out every two years, says that populations of vertebrates (including mammals, birds, fish, amphibians and reptiles) dropped by 58 percent between 1970 and 2012. Of course, quantifying biodiversity loss around the planet is no easy task, and there are long-raging debates about how much species loss spells disaster. The picture will get even worse if we don’t take steps now, the WWF says.

            “Within one generation, we’ve seen drastic declines in global wildlife populations,” James Snider, vice-president of science, research and innovation at WWF-Canada, told me. “One of the more troubling facts is that it seems, based on reporting [every two years], that the decline is worsening.” The 2014 report showed a 52 percent decline over the same period, he noted. “Based on that, we expect that by 2020, If no significant action is taken, it could be as much as two-thirds of populations that have declined since the 1970s.”

          • What the elk is that? Animal in SC for 1st time in centuries

            A wild elk has been spotted roaming the woodlands of South Carolina for the first time in more than 200 years.

            News outlets report that wildlife biologists are warning Upstate residents and tourists to stay away from a young bull elk that was seen in several places in Pickens County over the weekend.

            In response to social media posts showing people feeding the animal, North Carolina Wildlife Resources Commission biologist Justin McVey warned the public that the animal can cause serious injuries.

          • Carbon Dioxide in the Atmosphere Has Passed a Worrying Threshold

            The World Meteorological Organization’s greenhouse-gas bulletin shows that 2015 was the first year in which levels of carbon dioxide reached 400 parts per million on average across the globe. Part of what pushed the planet over this threshold was El Niño, which, according to the WMO, “reduced the capacity of ‘sinks’ like forests, vegetation and the oceans to absorb CO2.”

            But even when those sinks regain their ability to absorb carbon dioxide, warns the WMO secretary-general, Petteri Taalas, emissions will still need to be cut. “The El Niño event has disappeared. Climate change has not,” he explained. “Without tackling CO2 emissions, we cannot tackle climate change and keep temperature increases to below 2 °C above the preindustrial era.”

          • Officials say no drinking water impacted by Sunoco pipeline rupture

            The state Department of Environmental Protection and the EPA continue to sample water downstream from a gasoline pipeline break in Lycoming County, and say so far no levels of petroleum have been detected that would risk public health. Terry Maenza, a spokesman for American Water, which serves about 12,000 customers in the area near the accident says their sampling has also found no traces of the contaminant. American Water had shut down its intake valves and asked customers to conserve water on Friday after an estimated 55,000 gallons of gasoline spilled into a tributary of the Loyalsock Creek. The Loyalsock runs into the Susquehanna River. Officials speculate that the flood waters that likely caused the pipeline rupture were so heavy, that the leaked fuel was quickly diluted as it flowed downstream.

            “Everything is back to normal,” said Maenza. He says the company lifted it’s conservation request and resumed operations on Sunday.

            The flood waters have receded and Sunoco has removed the broken section of pipe, which was about 10 feet downstream from a bridge washed out by heavy rains. Sunoco officials say the bridge washed into the exposed pipe, which had been buried 5 feet below the creek.

            “Given the position of the pipe and the location of the bridge before and after the event, it’s clear that the bridge was responsible for the damage to the pipe,” said David R. Chalson, Sunoco Logistics senior vice-president for operations.

          • Clinton campaign declines to support Dakota pipeline protesters

            Hillary Clinton’s silence on the Dakota Access Pipeline has not gone unnoticed.

            On Thursday morning, young water protectors from Oceti Sakowin, the Seven Council Fires, and the Standing Rock Sioux Nation traveled to the Democratic presidential nominee’s campaign headquarters in Brooklyn, New York, demanding that she speak out against the Dakota Access Pipeline (DAPL).

            The Hillary Clinton campaign has thus far remained silent about the 1,172-mile pipeline, which would cross both the Missouri River and the Ogallala Aquifer, threatening sacred indigenous land and water supplies. The group also called for solidarity actions at Clinton campaign offices across the country.

        • Finance

          • Twitter Failing? 5 Signs The Company Is In Trouble

            Twitter Inc. announced its quarterly results Thursday, which showed the company’s growth has slowed for the second consecutive quarter. The social network company has struggled to maintain a positive outlook as it faces competition from apps such as Instagram and Snapchat.

          • Twitter slashes jobs, Vine as it seeks profits

            Twitter appeased Wall Street by restructuring to chart a course to profitability and by showing early signs its business is perking up.

            User growth and revenue climbed more than analysts expected as the struggling social media company announced 350 job cuts, or about 9% of its workforce. It also said it would shutter mobile video app Vine.

            “The current quarter results were ahead of expectations and user figures provided some promising elements as well,” said Pivotal Research Group analyst Brian Wieser, who is maintaining his price target of $26 and a buy recommendation on the stock.

            The effort to right the company comes as potential buyers such as Google, Salesforce and Walt Disney declined to pursue an acquisition. The lack of interest has cranked up pressure on Twitter’s embattled management.

            Jack Dorsey, the Twitter chief executive who returned to the helm last year to reinvigorate growth, declined to comment on the takeover discussions, saying only that Twitter’s board is committed to “maximizing long-term shareholder value.”

          • Twitter to Cut 9% of Workforce as Q3 Earnings Top Expectations

            Twitter will lay off 9% of its employees as the company struggles to achieve profitability, while the social-media company’s third-quarter 2016 revenue and earnings exceeded Wall Street expectations.

            Twitter said the job cuts will focus primarily on reorganizing its sales, partnerships and marketing operations. The company had 3,910 employees as of the end of September, meaning Twitter is pink-slipping about 350 staffers.

            The layoffs come as Twitter showed some slight improvement in financial performance for Q3. The company posted quarterly revenue of $616 million, up 8% year-over-year, and adjusted net income of $92 million, or 13 cents per share. Wall Street expected Twitter to post revenue of $606 million and adjusted EPS of 9 cents. Factoring in stock-based compensation and other items, Twitter’s net loss in the quarter was $103 million, an improvement from a net loss of $132 million in the year-earlier period.

          • [Old] CETA: The Canadian TTIP nobody noticed until it was (almost) too late

            Since Ars wrote about the Transatlantic Trade and Investment Partnership (TTIP) last year, it has gradually moved up the UK’s political agenda, culminating in the recent pledge by Jeremy Corbyn to scrap it if he is elected as prime minister before it is completed, and to fight it if he is not. But while many people are increasingly worried about what might happen with TTIP, there’s another trade agreement, one which has already been signed, which is about to bring in many of the same controversial measures almost unnoticed.

          • Here’s Why Amazon Stock Just Collapsed

            Shares fell over 6% in after-market trading Thursday

            Amazon.com Inc reported a lower-than-expected quarterly profit on Thursday as expenses rose and the company provided a disappointing fourth-quarter revenue forecast.

            Amazon, whose shares were down 6.8 percent in after-hours trading, said its net income rose to $252 million, or 52 cents per share, from $79 million, or 17 cents per share, a year earlier. It was company’s sixth straight profitable quarter.

          • ‘We’re Not Helping Our Kids by Keeping the Deficit Down’ – CounterSpin interview with Dean Baker on the debt boogeyman

            The announcement that one agenda item for the final presidential debate would be “debt and entitlements” was not surprising. “Debt and entitlements,” linked together that way, are always on corporate media’s agenda, but though the terms are tossed around a lot, they’re rarely unpacked or explained. In place of facts, we get fear. The Chicago Tribune said if they could inject one debate question, it would be: “Secretary Clinton, Mr. Trump, you have children. Why aren’t you scared?”

            Well, Americans face many serious challenges. Are runaway national “debt and entitlements” one of them? We’re joined now by Dean Baker, co-director of the Center for Economic and Policy Research, where you’ll find his blog, Beat the Press, and he’s the author of, most recently, Rigged: How Globalization and the Rules of the Modern Economy Were Structured to Make the Rich Richer. Welcome back to CounterSpin, Dean Baker.

          • UN rights expert urges States not to sign the ‘flawed’ CETA treaty and put it to referendum

            The trade deal set to be signed by the European Union and Canada is a corporate-driven, fundamentally flawed treaty which should not be signed or ratified without a referendum in each country concerned, a United Nations human rights expert says.

            Alfred de Zayas, the UN Independent Expert on the promotion of a democratic and equitable international order, deplored the pressures brought on the Belgian regional parliament of Wallonia, which initially said it would not approve the treaty but later said its concerns had been met. “A culture of bullying and intimidation becomes apparent when it comes to trade agreements that currently get priority over human rights,” the expert said.

        • AstroTurf/Lobbying/Politics

          • Jill Stein: The Best Way to Boost the Economy Is by Saving the Planet

            I believe the U.S. economy needs a Green New Deal: an ambitious yet secure economic and environmental program that will revive the economy, turn the tide on climate change, and make wars for oil obsolete—allowing us to cut our bloated, dangerous military budget in half. Building on the concept of Franklin D. Roosevelt’s New Deal, the Green New Deal calls on communities, government, and ordinary people on the scale of World War II to transition our energy system and economy to 100% clean, renewable energy by 2030.

            The author of the best-known series of studies on transitioning to 100% clean energy, Stanford University professor Mark Jacobson, asserts that it is technologically and economically feasible. Bill Nye and others note that we have the technology to make this transition possible—and the science shows that we must. The only missing ingredient is political will.

          • Be A Realist – Vote Jill Stein

            It cracks me up whenever I see pawns of the Democratic Party like Robert Reich try to argue that supporting Hillary Clinton is the “realistic and practical” way to forward the progressive agenda. It always makes me wonder what reality they’re referring to when they call such creative fabrications “realistic.” Does Mr. Reich hail from Narnia, perhaps? Some magical gumdrop fantasy land where everyone walks backward and M. Night Shyamalan’s movies keep getting better and better?

          • ‘Ethical deficit’: New concerns over foundation

            Hillary Clinton’s top aides worried about foreign donations to the Clinton Foundation ahead of 2016, according to a NYT report based on a new Wikileaks release.

          • Memo shows Bill Clinton’s wealth was tied to Clinton Foundation

            In a 2011 memo, an aide to Bill Clinton laid out the messy relationship between the Clinton Foundation and the former president’s personal interests, detailing how some foundation donors also paid Clinton to speak and provide consulting services.

            The memo was released on Wednesday as part of a Wikileaks dump of Hillary Clinton’s campaign chairman John Podesta’s hacked emails.

            Doug Band, a long-time aide to Bill Clinton, wrote the 2011 memo as part of an internal audit at the Clinton Foundation. In trying to explain his role in the Foundation, Band also brought up a series of instances he and his consulting company, Teneo Holdings, helped Bill Clinton secure for-profit contracts.

            The memo, which was being circulated to some in Clinton’s inner circle including Podesta, reinforces Republican criticisms of the blurred lines between the foundation and professional interests of the Clintons and their associates.

            “Independent of our fundraising and decision-making activities on behalf of the Foundation, we have dedicated ourselves to helping the President secure and engage in for-profit activities — including speeches, books, and advisory service engagements,” Band wrote. “In that context, we have in effect served as agents, lawyers, managers and implementers to secure speaking, business and advisory service deals. In support of the President’s for-profit activity, we also have solicited and obtained, as appropriate, in-kind services for the President and his family — for personal travel, hospitality, vacation and the like.”

            At one point, Band even referred to the former president’s money-making enterprises as “Bill Clinton, Inc.”

            Band said and Justin Cooper, another long-time aide, weren’t separately compensated for helping Bill Clinton profit.

          • Wikileaks: Damaging analysis of Sanders’s single payer plan was likely a coordinated Clinton hit

            A search through Wikileaks’s database reveals that a week before a damaging, highly critical analysis of Bernie Sanders’s single payer healthcare plan was released by healthcare expert Kenneth Thorpe, with no disclosure of any affiliation with any campaign, the Clinton campaign was floating Thorpe’s name out as a vehicle to attack the Senator’s Medicare-for-all plan.

            Thorpe’s analysis was reported by Vox on January 28th, in an article titled “Study: Bernie Sanders’s single-payer plan is almost twice as expensive as he says.” A flurry of articles and editorials touting the study followed — for example, Paul Krugman’s January 28th editorial “Single Payer Trouble,” or the New York Time’s report “Left-Leaning Economists Question Cost of Bernie Sanders’s Plans.” These articles all fed the notion that Sanders was a pie-in-the-sky, puppies and rainbow dreamer, with no real grasp on reality.

            Others, however, such as single payer advocates David Himmelstein and Steffie Woolhandler, (“On Kenneth Thorpe’s Analysis of Senator Sanders’s Single-Payer Reform Plan”), claimed convincingly that Thorpe’s analysis rested on highly questionable, or flatly incorrect, assumptions and that it also contradicted previous studies that Thorpe himself had done. Sanders’s campaign, meanwhile, called the analysis “a total hatchet job.”

            As it turns out, a week before Thorpe’s analysis was released, in a January 19th thread discussing the merits of attacking Sanders on healthcare, Jake Sullivan, a top Clinton advisor, floated the idea of using Thorpe to attack Sanders on healthcare…

          • Eric Garner’s Daughter Slams Clinton Campaign Over Emails Confusing Police Brutality And Gun Violence

            Erica Garner, the daughter of Eric Garner, a black man who was killed by a NYPD officer in 2014, is slamming Hillary Clinton’s campaign over leaked emails from the server of John Podesta, the campaign’s chairman.

            “I know we have Erica Garner issues but we don’t want to mention Eric at all? I can see her coming after us for leaving him out of the piece,” wrote Nick Merrill, a spokesman for the campaign, in the email leaked from Podesta’s private server and posted on WikiLeaks.

            The email correspondence was a discussion about whether the death of Garner’s father should be used in a Clinton opinion piece for New York Daily News on gun violence.

            “It was obvious that the two white men that were on the email chain didn’t even know that my dad wasn’t shot,” Garner told The Huffington Post via Twitter direct message. “It was clear that he was just a dead body for them to manipulate for their use. White liberals have been trying to cram racism into the box of gun violence for a while now.”

          • Erica Garner Slams Clinton Campaign, Staffers for ‘Exploiting’ Father’s Death in Wikileaks Emails
          • Why would you want to “use” my dad?’: Eric Garner’s daughter slams Clinton campaign over WikiLeaks emails

            Erica Garner, whose father died in a chokehold by a New York City police officer in 2014, scolded the Clinton campaign in a series of tweets Thursday over hacked internal emails published by WikiLeaks that mentioned her and her father.

            The emails, exchanged between several Clinton staffers, had discussed a draft of a Clinton op-ed on gun violence that was eventually published in the New York Daily News in late March.

          • Neo-McCarthyism masks the US’s real problems

            AMID a tense stand-off in the Middle East between Russia and the United States, it is not surprising that tensions are rising by the day. Rhetoric coming out of the White House and the Kremlin is increasingly antagonistic, which has had damaging implications for the battle between Hillary Clinton and Donald Trump.

            This election can be characterised by the blatant red scare tactics by Clinton and the Democrats, largely aimed at insinuating that Trump, WikiLeaks, and even Green Party presidential candidate Jill Stein are de-facto Kremlin agents.

            It feels like we are in the 1960 election rather than 2016.

            The neo-McCarthyism adopted by the Clinton campaign to deflect any reasonable criticisms one may have of her flawed candidacy is unnecessary and paranoid.

            Not only this, but it draws attention away from the real issues and problems that the US faces as a nation — many of which Clinton and fellow centrists have been the root cause of.

          • Hacker-founded Pirate Party could win Iceland election

            Iceland’s radical Pirate Party, run by a former WikiLeaks worker who wants to be a political “Robin Hood,” could lead the Nordic nation’s next government after Saturday’s election.

            The Pirate Party, started four years ago, is part of a wave of populist groups gaining ground in Europe, from Austria to Italy, amid discontent with political scandals and a stalled economic recovery. Iceland’s economy collapsed after the 2008 financial crisis, and in April the prime minister resigned after being named in the Panama Papers scandal.

            “We stand for enacting changes that have to do with reforming the systems, rather than changing minor things that might easily be changed back,” said Birgitta Jónsdóttir, 49, the party’s leader and self-described “poetician.” “We do not define ourselves as left or right but rather as a party that focuses on the systems. In other words, we consider ourselves hackers.”

            Formed in 2012 to lobby for Internet copyright reform, the Pirate Party has broadened its platform to include advocating for direct democracy, total government transparency, decriminalizing drugs and even offering asylum to National Security Agency leaker Edward Snowden.

          • Iceland’s ‘Pirate’ Jonsdottir: an accidental politician

            The public face of the Icelandic Pirate Party, Birgitta Jonsdottir is a hacker, cyberspace anarchist, poet — and a rather reluctant politician.

            However, she could find herself strutting the corridors of power if the Pirate Party emerges as expected as the strongest group in Saturday’s election in the North Atlantic island nation.

          • The Truth About Donald Trump’s Hair
          • The Greens are a movement party

            The Greens have elected hundreds of people to office at the local level, and Greens win about 34 percent of the time that we run in local elections. So please do not allow Pacifica to repeat a myth that the corporate media creates.

          • National Geographic Rebrands, Drops ‘Channel’ From Its Name

            NatGeo is finally dropping “Channel” from its name. A year after bringing all the other National Geographic entities — the magazine, the National Geographic Society — under the 20th Century Fox corporate umbrella, National Geographic Partners is going to start acting like one big adventurous family, and it’s giving itself a new tagline to boot: “Further.”

            “[‘Channel’] suggests this linear television destinations and increasingly that’s not the way people are consuming us,” explained National Geographic Global Networks CEO Courtney Monroe. “We are one, and we are working more closely together.” Monroe put forth the upcoming NatGeo series “Mars”, premiering Nov. 14, as an example: Yes, it’s a big event series, a hybrid of documentary-style interviews interwoven with a fictional narrative about the mission to colonize the Red Planet. But, she pointed out, it’s also the cover story of the November issue of the National Geographic magazine, as well as the topic of two books — one for kids, and one for adults.

          • WikiLeaks drops another tranche of #PodestaEmails from Clinton campaign chair

            There will be a total of 50,000 emails released in the lead up to November 8, according to WikiLeaks. So far, 35,594 have been published.

          • WikiLeaks Releases 21st Batch of Clinton Campaign Chair Podesta’s Emails

            WikiLeaks uploaded on Friday the 21st batch of emails of the US Democratic Party presidential nominee Hillary Clinton’s campaign chairman, John Podesta.

          • Clinton’s camp feared Joe Biden run, worked hard to kill it

            Biden would have sailed away from Trump much earlier and faster than Hillary Clinton did. But beyond the easy victory she’s likely to win anyway all told, he doesn’t have much to recommend him over her, and lacks many of her — yes, I know! — her scruples.

          • Why 5% for the Green Party is a win for America

            In 1854, a few thousand people gathered in Jackson, Michigan to launch an independent challenge to a national political system dominated by two parties. “Of strange, discordant, and even hostile elements,” a party leader later recalled, “we gathered from the four winds…[with] every external circumstance against us.” This challenge was fueled by the radical abolitionist movement that united white workers and formerly enslaved Africans against the criminal institution of slavery, as a response to the political crisis caused by the Kansas-Nebraska Act.

            In just two years, this insurgent third party — created by movement activists — had gained ground across the Northern states, challenging the Whig Party. In short order this insurgent “third party” had become a major opposition party. By 1858 they had won an influential foothold in Congress, and by 1860, that party leader — Abraham Lincoln — was elected President of the United States.

            It’s painfully obvious that the Republican Party has strayed dramatically from its early radical roots in abolitionism, equality, and peace. But it’s also quite fitting that, in 2016, as that party is declining into dangerous reactionary know-nothingism, the opening for a new party rooted in radical equality, environmental justice, and peace to rise up is bigger than ever. Amid the raging flames of austerity, endless war, impending climate change, and the most polarized election in modern memory, a record 57 percent of Americans are yearning for another choice, and for an independent political party that will truly represent their interests, according to a recent Gallup poll.

            [...]

            Our grassroots, people-powered campaign has achieved incredible gains in this election cycle, despite having had a fraction of the media coverage and an even smaller fraction of the vast resources of the two major parties. With the material benefits that come with 5 percent of the popular vote, we will have unprecedented resources to continue building this movement for progressive change, shoring up power from below, and paving the way for a new, sorely needed politics of integrity and transformation.

          • The Best Ballot Plan Now? ‘Strategic’ Voting for the Stein-Baraka Green Party Ticket

            Donald Trump is campaigning to win 40 percent of the vote for president—and he’s close, with recent polls showing him in the high 30s. But his final performance will not help.

            Trump is focusing on topics that will prevent him from broadening his base, such as the women he accuses of lying about his alleged sexual assaults, and what he calls the rigged election. He is fighting with other Republicans, like Paul Ryan, and with Republican state leaders, most notably in Ohio. His refusal to say he will accept the outcome of the election is creating more conflict with Republicans and raising doubts with voters.

            Outlets predicting the results of the election say Clinton will be the next president, with astoundingly lopsided odds. The Huffington Post gives Trump only a 3.1 percent chance of winning and puts Clinton’s likelihood at 96.8 percent. The New York Times gives Clinton a 93 percent chance.

          • Podesta relative earned six-figure fees lobbying Clinton’s State Dept. during his tenure there
          • Eric Garner’s daughter blasts Clinton campaign after WikiLeaks emails

            The daughter of a New York City man who died after he was put in a police chokehold blasted Hillary Clinton’s campaign Thursday when WikiLeaks revealed email conversations about using her father’s death to protest gun violence.

            “I’m troubled by the revelation that you and this campaign actually discussed ‘using’ Eric Garner … Why would you want to ‘use’ my dad,” tweeted Erica Garner, who endorsed Vermont Sen. Bernie Sanders in the Democratic primary.

          • Goodlatte Statement on the FBI’s Decision to Reopen the Clinton Investigation
          • WikiLeaks Dumps Mean Hillary’s Presidency Would Be Tainted from Day One
          • How Neera Tanden Works

            Emails released by WikiLeaks reveal the maneuverings of a liberal think-tank president and member of Hillary Clinton’s inner circle.

          • Hillary headache: Even Chelsea ripped ‘hustling’ at lucrative family foundation

            Did the Clinton Foundation, for all its good works, serve as a giant slush fund?

            That question has surged to the forefront of the campaign in the wake of another Wikileaks dump, and one of the biggest accusers turns out to be Chelsea Clinton.

            The Chelsea criticism is a bombshell, one that exploded with enough force that it propelled the lead story in both the New York Times and Wall Street Journal and an above-the-fold piece in the Washington Post.

          • State Dept Told ‘Friendly’ AP Reporters About Missing Hillary Emails Before Congress

            Department of State officials told Hillary Clinton campaign staffers they would leak a story about missing Benghazi investigation emails to a “friendly” Associated Press reporter before Congress “has a chance to realize what they have.”

            “Just spoke to State a little more about this,” Clinton’s travelling press secretary Nick Merrill wrote to campaign staffers on June 24, 2015, regarding emails sent between the former secretary of state and her longtime confidant Sidney Blumenthal.

            The Department of State told Merrill they would be tipping off AP reporters that at least 15 emails between Clinton and Blumenthal were missing from 55,000 pages of emails handed over to a House committee investigating the Sept. 11, 2012 attack on a U.S. diplomatic compound in Benghazi, Libya.

          • If Clinton Campaign Believes WikiLeaks Emails Are Forged, Why Don’t They Prove It?

            Top Democrats have repeatedly waved off substantial questions arising from their hacked emails by falsely implying that some of them are forgeries created by Russian hackers.

            The problem with that is that no one has found a single case of anything forged among the information released from hacks of either Clinton campaign or Democratic Party officials.

            The strategy dates all the way back to a conference call with Democratic lawmakers in August. Politico reported that a number of Democratic strategists suggested that Russian hackers — who have been blamed by U.S. intelligence agencies for supplying the emails to Wikileaks and other web sites — could sprinkle false data among the real information.

            Since then, despite the complete lack of evidence to support such a claim, it’s become a common dodge among leading Democrats and the Clinton campaign when asked questions about the substance of the emails.

          • WikiLeaks shows Clinton hid email scandal from her own staff

            Hillary Clinton’s closest aides hid the private email scandal from her campaign team in the months before the official launch of her presidential campaign, emails made public by WikiLeaks show.

            Robby Mook, Clinton’s campaign manager, John Podesta, Clinton’s campaign chair, and Neera Tanden, co-chair of Clinton’s transition team, each expressed shock at the revelations about her private server as they emerged in early March 2015.

            Although Clinton’s team had performed research on her in 2014 as staff prepared for her campaign, Clinton’s inner circle apparently steered Mook and others away from the issue until it was too late.

            When Podesta asked Mook if he had “any idea of the depth of this story,” Mook answered simply, “Nope.”

          • Is there a deeper network behind the ‘Catholic Spring’?

            Washington D.C., Oct 27, 2016 / 12:02 pm (CNA/EWTN News).- A reputed “Catholic Spring” is in the news after hacked emails from John Podesta, now Hillary Clinton’s campaign manager, indicated plans for an effort to sow revolution within the Church.

            But grants to the think tank Podesta founded also suggest links to other efforts targeting religion. The Center for American Progress appears to be part of an influence network that advocates restrictions on religious freedom while promoting dissent within Christianity on sexual morality, especially LGBT issues.

            Podesta co-founded the Center for American Progress in 2003 after serving as White House Chief of Staff in President Bill Clinton’s final term. He served as the center’s CEO until 2011. He became a special adviser to President Barack Obama in 2013, and joined the Hillary Clinton campaign in early 2015.

          • Propaganda Alert! Misleading Article About Jill Stein in the Daily Beast

            A particularly misleading article, titled “Jill Stein’s Ideology Says One Thing — Her Investment Portfolio Says Another,” is being peddled by the Daily Beast, which accuses the Green Party’s presidential candidate, Jill Stein, of being a hypocrite for investing in certain mutual funds which hold assets with energy, tobacco, & pharmaceutical companies. The accusation is, like much of what the Clinton-controlled Daily Beast spews from it’s slimy propaganda-machines, a poorly-constructed pile of journalistic garbage.

            I shall provide a link to the article at the bottom of this page but I’d like to discourage my readers from clicking it because I hate the thought that these jerks will get any amount of ad-money from web-traffic out of my site. I’d also like to note that the Daily Beast is owned by IAC, a media corporation whose board of directors includes — [drumroll, please…] Chealsea Clinton! So — please click sparingly!

          • New Emails in Clinton Case Came From Anthony Weiner’s Electronic Devices

            Federal law enforcement officials said Friday that the new emails uncovered in the closed investigation into Hillary Clinton’s use of a private email server were discovered after the F.B.I. seized electronic devices belonging to Huma Abedin, a top aide to Mrs. Clinton, and her husband, Anthony D. Weiner.

            The F.B.I. is investigating illicit text messages that Mr. Weiner sent to a 15-year-old girl in North Carolina. The bureau told Congress on Friday that it had uncovered new emails related to the Clinton case — one federal official said they numbered in the thousands — potentially reigniting an issue that has weighed on the presidential campaign and offering a lifeline to Donald J. Trump less than two weeks before the election.

            In a letter to Congress, the F.B.I. director, James B. Comey, said that emails had surfaced in an unrelated case, and that they “appear to be pertinent to the investigation.”

            Mr. Comey said the F.B.I. was taking steps to “determine whether they contain classified information, as well as to assess their importance to our investigation.” He said he did not know how long it would take to review the emails, or whether the new information was significant.

          • October surprise: FBI reviewing new emails in Clinton server case

            The FBI on Friday said it is assessing new emails “pertinent” to the investigation into Hillary Clinton’s use of a private email server, a stunning and unexpected move that comes more than a week before the presidential election.

            In a letter sent to lawmakers on Friday, FBI Director James Comey said the bureau has learned of the existence of more emails “that appear to be pertinent to the investigation.” The messages were found “in connection with an unrelated case,” Comey wrote without further explanation.

            Law enforcement officials told The New York Times that the emails were uncovered after the FBI seized devices belonging to longtime Clinton aide Huma Abedin and her husband, Anthony Weiner, who is under investigation for allegedly sending sexually explicit messages to an underage girl.

            After being briefed by his team, Comey “agreed that the FBI should take appropriate investigative steps” to determine whether the emails “contain classified information, as well as to asses their importance to our investigation.”

            Comey said he could not predict how long it would take the bureau to assess whether the new emails are “significant,” meaning the investigation could hang over Clinton’s head through the election.

          • Advocating a ‘Split Ticket,’ WaPo Columnist Parts Ways With Reality

            I’m glad, truly I am, that Samuelson (7/9/97) is no longer writing in regards to climate change, “It’s politically incorrect to question whether this is a serious problem that serious people ought to take seriously.” But if he’s not in denial about climate change, he’s in denial about denialism: Ryan says “I don’t know” whether humans are warming the Earth’s climate, “and I don’t think science does either.” He does know whether the federal government can do anything about climate change, though: “I would argue the federal government, with all its tax and regulatory schemes, can’t.”

            As for McConnell, he says that “for everybody who thinks [the planet is] warming, I can find somebody who thinks it isn’t.” His own position? “I’m not a scientist, I am interested in protecting Kentucky’s economy, I’m interested in having low-cost electricity.”

            These are the people that Samuelson suggests will do something about the climate catastrophe if you make sure they don’t lose control of Congress.

            Finally, a historical note: Setting up his argument, Samuelson notes, “At its peak in 1972, ticket splitters represented 30 percent of voters.” Hmm—why do you suppose that 1972 was the peak of ticket-splitting? While the parties on the presidential level had definitively switched sides on civil rights by 1972, with Democrat George McGovern an ardent advocate and Republican Richard Nixon pursuing his “Southern strategy,” congressional representatives throughout the South were still overwhelmingly Democratic—mostly the same people who had been fighting civil rights for years.

          • Why It All Matters for Hillary

            The arguments of “everybody does it” and “well, it wasn’t illegal” in regards to the email server, the Clinton Foundation, pay-for-play, donor access, dirty tricks against Sanders, the many well-timed coincidences of Trump revelations, and more, are strawman logic.

            Leaving aside the idea that people usually say “everybody does it” and “well, it wasn’t illegal” only when their own candidate gets caught doing something, what was done matters.

          • Anthony Weiner Investigation Leads FBI Back To Clinton Email Server Case

            Newly discovered emails being examined by the FBI in relation to Hillary Clinton’s email server came to light in the course of an unrelated criminal investigation of Anthony Weiner, a source familiar with the matter tells NPR’s Carrie Johnson.

            Weiner is the estranged husband of close Clinton aide Huma Abedin; he has been under scrutiny for sending illicit text messages to an underage girl.

            Earlier Friday FBI Director James Comey notified members of Congress that the FBI had reopened its investigation into the handling of classified information in connection with the Democratic presidential candidate’s use of a private email server while secretary of state.

            In a letter to the leaders of congressional oversight committees, Comey wrote: “In connection with an unrelated case, the FBI has learned of the existence of emails that appear to be pertinent to the investigation. I am writing to inform you that the investigative team briefed me on this yesterday, and I agreed that the FBI should take appropriate investigative steps designed to allow investigators to review these emails to determine whether they contain classified information, as well as to assess their importance to our investigation.”

          • Clinton Campaign Worried About Bill Cosby Clinton Foundation Ties

            Hillary Clinton’s campaign worried that she would face scrutiny over the thousands of dollars the Clinton Foundation accepted from accused rapist Bill Cosby, a newly leaked memo reveals.

            The memo, dated July 16, 2015, also reveals that Hillary was instructed to give a non-answer if pressed over whether the foundation would return Cosby’s donations.

          • Limbaugh: FBI wants focus off WikiLeaks

            Rush Limbaugh says the FBI is starting a new review of Hillary Clinton’s emails to distract voters from WikiLeaks’s revelations about her.

            “[FBI Director James] Comey is just doing this to take everybody’s attention off of the WikiLeaks email dump,” Limbaugh said on his radio broadcast Friday.

            “The cynical view is that Comey is still carrying water for Clinton and is trying to get everybody to stop paying attention on the WikiLeaks dump because it’s starting to have an impact,” he continued.

            “So you announce you’re opening the inquiry, get everybody all hot and bothered and focused on it, and after three or four or five days, you announce it’s a false alarm, nothing to see her, investigation now officially over, and meanwhile, in that five day period, everybody’s forgotten about WikiLeaks.”

            Limbaugh said WikiLeaks emails are exposing the Democratic presidential nominee’s secrets and damaging her White House bid.

          • ‘Bill Clinton, Inc.’ Memo Reveals Tangled Business, Charitable Ties

            A 2011 memo made public Wednesday by Wikileaks revealed new details of how former President Bill Clinton made tens of millions of dollars for himself and his wife, then Secretary of State Hillary Clinton, through an opaque, ethically messy amalgam of philanthropic, business and personal activities.

            The memo was written by Bill Clinton’s longtime aide, Doug Band, and is among tens of thousands of emails apparently stolen from Hillary Clinton’s campaign chief, John Podesta, in what U.S. officials believe is part of a massive Russian-backed attempt to disrupt the U.S. election.

            The Band memo came in response to an investigation undertaken by a law firm, Simpson Thatcher, into the activities of the Clinton Foundation at the behest of its board. The board was concerned that some of the activities undertaken by Band and others on behalf of the President could threaten the Foundation’s IRS status as a charity, according to Band’s memo. Chelsea Clinton had also reported concerns to Podesta and other Clinton advisors that Band and his recently-launched consulting firm, Teneo, were using her father’s name without his knowledge to contact British lawmakers for clients, including Dow Chemical.

        • Censorship/Free Speech

          • Comedy writer has exactly the right response to his kid’s Fahrenheit 451 permission slip

            Daily Show writer Daniel Radosh’s son came home from school with a permission slip that he’d have to sign before the kid could read Ray Bradbury’s novel Fahrenheit 451, which is widely believed to be an anti-censorship book (Bradbury himself insisted that this was wrong, and that the book was actually about the evils of television).

            Fahrenheit 451 has been the frequent subject of parental challenges on the flimsiest of grounds, as when fundamentalist Christian Alton Verne, of Conroe, Texas, demanded to have the book removed from the curriculum because the characters occasionally blaspheme and say “damn” (“If they can’t find a book that uses clean words, they shouldn’t have a book at all”).

            Radosh responded to the permission slip — which mentioned these parental challenges — with a wry note congratulating the teacher for using permission slips to convey the awfulness of heavy-handed attempts to control peoples’ access to information.

          • Copyright conundrum: Tweeting this may cost you

            Be careful if you tweet this story: It might cost you.

            The European Commission created a legal minefield for billions of internet users with a well-intentioned but poorly worded proposed law to help struggling publishers guard against digital attrition by Google and other news aggregators.

            As people read the fine print in plans released last month to strengthen publishers’ rights over their articles, they discovered the Commission may have accidentally exposed tweeters, facebookers and even LinkedIn users to the whims of the world’s most powerful media organizations.

            Under the Commission’s proposal, copyright lawyers could chase down citizens for sharing sentences or snippets of articles on social media.

            “Users would be breaking the law if they use snippets of articles whether it is enforced or not,” said Julia Reda, a Member of the European Parliament. The law is intended to help traditional publishers survive the digital age but, she said, “it applies to everyone, and if we pass this legislation, it will be in the hands of the publishers to decide whether they want to enforce it.”

          • Clinton Campaign Scrambled To Kill NYT Report She Flipped On Gay Marriage, WikiLeaks Shows

            Members of Hillary Clinton’s presidential campaign sought to discredit reports over her shifting stance on same sex marriage, the latest batch of WikiLeaks emails show.

            On April 15, 2015, press secretary Nick Merrill started an email chain with policy spokesman Jesse Lehrich over a New York Times article written by Alan Rappeport titled, “Shifting Position, Clinton Says Gay Marriage Should Be A Constitutional Right.”

          • Milo speech at U-Md. canceled because security fee was too high; supporters call it censorship

            A scheduled speech by conservative writer Milo Yiannopoulos at the University of Maryland was canceled because a student group was unable to raise enough money to cover fees the university required shortly before the event, including more than $2,000 for security.

            The costs led to complaints from students and others that the university was silencing a potentially contentious speech rather than encouraging free and open debate. But a spokeswoman for the school countered that the security fee included the speaker’s request to have officers present, and that university officials had worked to help the students.

          • Colleges Cancel Milo Yiannopoulos Appearances
          • Breitbart editor Milo Yiannopoulos’ U. of Md. appearance canceled due to security costs
        • Privacy/Surveillance

          • Privacy Shield legal spat puts EU-US data flows at risk again

            Europe’s Privacy Shield faces a legal challenge from an Irish civil liberties group.

            Digital Rights Ireland (DRI) has brought a complaint against the Safe Harbour successor that governs the transfer of personal data between the European Union and the US.

          • AT&T is (allegedly) making millions of dollars selling your data to cops
          • Big data grab: Now they want your car’s telemetry

            This isn’t simply a market for one Uber to dominate, suggests McKinsey in its new report, “Monetizing Car Data.” As the report authors conclude, the opportunity to monetize car data could be worth $450 billion to $750 billion within the next 13 years.

          • We’re seeing yet another election cycle where privacy is of no concern to candidates

            Yet another election campaign is passing without privacy and other fundamental rights being discussed. While candidates certainly have different stances, judging on public discourse, they’re not what makes or breaks the election. The conclusion remains that in absence of political importance, technical measures are necessary to maintain privacy at the individual level.

            When I founded the Swedish Pirate Party in 2006, which would go on to win seats in the European Parliament, it was on a key insight: nothing political happens unless it’s positive for a politician’s career. This can either take the form of looking good in media, when they take a rare initiative of their own, or of not being fired, when their job is under threat from challengers.

          • Search Risk – How Google Almost Killed ProtonMail

            In the past two months, many of you have reached out to us to ask about the mysterious tweets we sent to Google in August. At ProtonMail, transparency is a core value, and we try to be as transparent with our community as possible. As many people have continued to point out to us, we need to be more transparent here to avoid continued confusion and speculation. Thus, we are telling the full story today to clarify what happened.

          • Why did ProtonMail vanish from Google search results for months?

            If you’re the maker of a popular, zero access encrypted webmail product and suddenly discover your product is no longer featuring in Google search results for queries such as “secure email” and “encrypted email,” what do you conclude?

            That something is amiss, for sure.

            But the rather more pertinent question is whether your product’s disappearance is accidental or intentional — given that Google also offers a popular webmail product, Gmail, albeit one that does not offer zero access because users “pay” the company with their personal data, which feeds into Alphabet’s user profiling and ad targeting engines.

            So, in other words, Google is not an entirely disinterested bystander when it comes to a rival email product’s success.

          • Encryption no bar to giving govt data, Apple told Democrats

            A senior Apple official reassured the chairman of the Clinton presidential campaign that the tech giant would co-operate with the US government when it came to handing over “meta-data or any of a number of other very useful categories of data”, as “strong encryption does not eliminate Apple’s ability to give law enforcement” such data.

            Lisa Jackson, Apple’s vice-president for environment, policy and social initiatives, sent an email to John Podesta on 20 December 2015, thanking him for “the principled and nuanced stance the Secretary took last night on encryption and the tech sector. Leadership at Apple certainly noticed and I am sure that is true throughout the Valley”.

            Her comments about handing over data to the government are in marked contrast to the strong pro-customer statement on encryption made by Apple chief executive Tim Cook earlier this year when the FBI demanded that Apple hand over data on an Apple iPhone 5C belonging to one of the two people who participated in a terrorist attack in San Bernardino, California.

          • AT&T actually sells leads to DEA and local law enforcement using Project Hemisphere

            AT&T has been running a for-profit mass surveillance program, called Project Hemisphere, since 2007. Everybody already knows about AT&T cooperation with NSA mass surveillance metadata database… This is a separate program that allows law enforcement to access all of AT&T’s data at will, even though the information is never handled by law enforcement, which apparently makes it legal. The Project Hemisphere mass surveillance program was created by AT&T and specifically marketed to law enforcement as an easy-to-use system

            If you’re wondering what information that AT&T could possibly have on you if you’ve never been an AT&T customer, AT&T has compiled all the relevant phone metadata that passed through their hardware that they possibly could since the 1980s. AT&T has a metadata record of everything from Skype calls to text messages to phone calls on LTE, not just the ones that were made to or from AT&T networks; either, but all of them that ever touched an AT&T owned switch. If you’re wondering what percentage of American switches are owned by AT&T, the answer is over 75%.

          • AT&T reportedly spies on its customers for government cash

            AT&T controls a big chunk of America’s cellular infrastructure, and it turns out that it’s been using that power for super-creepy purposes. The Daily Beast is reporting that the telco has essentially turned itself into a spy-for-hire in the pay of the government. According to the piece, the company’s Project Hemisphere is providing warrantless surveillance, thanks to some legal gray areas, that score it millions of dollars from taxpayers.

            The existence of Project Hemisphere has been known since the New York Times reported on it way back in 2013. Back then, it was presented as a minor tool that was only employed in a handful of states for specialized anti-drug operations. If these new revelations are accurate, then Hemisphere’s being used for a wide variety of crimes all across the country ranging from murder all the way through to Medicaid fraud. AT&T’s information is good enough that it can tell investigators where someone was when they made a call, who they were speaking to and, as we know from the EFF, it’s easy to divine intention just from those two pieces of information.

          • Beijing threatens legal action over webcam claims

            The Chinese Ministry of Justice has threatened legal action against “organisations and individuals” making “false claims” about the security of Chinese-made devices.

            It follows a product recall from the Chinese electronics firm Hangzhou after its web cameras were used in a massive web attack last week.

            The attack knocked out sites such as Reddit, Twitter, Paypal and Spotify.

            The Chinese government blamed customers for not changing their passwords.

            Its legal warning was added to an online statement from the company Xiongmai, in which the firm said that it would recall products, mainly webcams, following the attack but denied that its devices made up the majority of the botnet used to launch it.

            The firm later told Reuters that the recall would effect “less than 10,000″ devices.

            It also noted that users not changing their default passwords were contributing to weak security.

            This was reiterated by the Ministry of Justice which said Xiongmai’s products “cannot be manipulated by criminals”, again blaming users who “do not change the initial password”.

          • AI-powered body scanners could soon be inspecting you in public places

            A startup bankrolled by Bill Gates is about to conduct the first public trials of high-speed body scanners powered by artificial intelligence (AI), the Guardian can reveal.

            According to documents filed with the US Federal Communications Commission (FCC), Boston-based Evolv Technology is planning to test its system at Union Station in Washington DC, in Los Angeles’s Union Station metro and at Denver international airport.

            Evolv uses the same millimetre-wave radio frequencies as the controversial, and painfully slow, body scanners now found at many airport security checkpoints. However, the new device can complete its scan in a fraction of second, using computer vision and machine learning to spot guns and bombs.

        • Civil Rights/Policing

          • Fury over Bosnian town built by Middle East investors which has Arabic as its ‘official’ language – and locals can only enter if they work as servants

            Angry locals are protesting about a Bosnian town built by Middle Eastern investors which has Arabic as its ‘official’ language – and where locals can only enter if they work as servants.

            The 160 homes have been constructed in a luxury enclave near Tarcin, five miles west of the Bosnian capital Sarajevo.

            But furious locals say that their only way of accessing the area is through being hired as servants or cleaners – and claim most of the homes contain the wives of wealthy businessmen.

          • Sex Before Marriage: Indonesia Proposed Islamic Law Would Put Sexually Active People In Prison

            Anyone engaging in sex outside of marriage in the world’s third-largest democracy could soon face up to five years in prison. Indonesia’s highest court is deliberating whether to broaden existing law to make all casual sex illegal in the latest bid by conservative Islamists in the country to revise a relatively secular legal code.

            A decision by the Constitutional Court is expected in December or early next year, with indications that the court is leaning toward enacting the tougher legislation. While adultery is currently punishable by up to nine months in prison, if the new law goes through it would make gay sexual relations illegal in Indonesia for the first time. It has already received backlash from human rights organizations.

          • Jaipur: After losing bet, man forces ex-wife to sleep with friend

            A 42-year-old mother-of-two from Jaipur filed a rape complaint after her former husband tricked her into sleeping with his friend. She claimed that her ex-husband drugged her and took her to his friend’s house after losing a bet.

            The man, however, claims it was all for Nikah Halala, a Sharia law that requires the divorced woman to marry and consummate with another man before she can remarry her former husband.

            A Hindustan Times report says he has a fake nikahnama with the stamp of the Jaipur city qazi, which states his ex-wife and the friend were married.

          • The Mayor of London’s “My Side”

            Sadiq Khan, the Mayor of London, addressed the Chicago Council on Global Affairs (CCGA) on September 15. Although his topic was “The Breakdown of Social Integration – The Challenge of Our Age,” some crucial components of that challenge were notably absent from his presentation.

            Even though Mayor Khan said he believes that, “London is the powerhouse” for his country and is “proud that London was the only region in England to vote to remain in the European Union” (some boroughs voted 80% “Remain”), when it came to the United Kingdom as a whole, he said that “my side” lost the referendum.

            That strikes one as an odd way for the mayor of any city to talk. Isn’t he the Mayor of all of London? Aren’t the Londoners who voted for Brexit included on his “side”?

          • Email To Podesta: Germany Imported Its Own Immigrant Crime Wave

            Nobody tells it like it is like they do when they don’t know the world will be tweeting their emails. Here’s a Wikileaked February 2016 email to Hillary Clinton presidential campaign chairman John Podesta.

          • 36-year-old Pennsylvania man gets 18 months for phishing nude celebrity pics

            A 36-year-old Ryan Collins from Pennsylvania was sentenced to 18 months in prison after pleading guilty to hacking the Apple and Google accounts of more than 100 celebrities, including Jennifer Lawrence, Aubrey Plaza, Rihanna, and Avril Lavigne. Collins stole personal information, including nude photos, from the celebrities.

            The photos were famously posted on 4Chan and Reddit in 2014. Collins pleaded guilty to hacking the celebrities’ accounts in May, but he did not plead guilty to posting the images on the Internet. “Investigators have not uncovered any evidence linking Collins to the actual leaks or that Collins shared or uploaded the information he obtained,” the Department of Justice (DOJ) noted.

            According to The Guardian, Collins ran a phishing scheme from November 2012 to September 2014, sending celebrities e-mails that appeared to be from Apple and Google, requesting their user names and passwords.

          • Dakota Access Pipeline protesters arrested and pepper sprayed

            Authorities began arresting people at a Dakota Access Pipeline protest site in Morton County, North Dakota today, according to the Associated Press and the Guardian. Protesters report being pepper sprayed by authorities on a live stream hosted by Cempoalli Twenny on his Facebook page. There have also been reports that authorities are using beanbag guns. Protesters could be heard calling for a medic in the live stream.

        • Internet Policy/Net Neutrality

          • The City That Was Saved by the Internet

            The “Chattanooga Choo Choo” sign over the old terminal station is purely decorative, a throwback. Since the Southern Railroad left town in the early 1970s, the southeastern Tennessee city has been looking for an identity that has nothing to do with a bygone big band song or an abandoned train. It’s finally found one in another huge infrastructure project: The Gig.

            The first thing you see at the Chattanooga airport is a giant sign that says “Welcome to Gig City.” There are advertisements and flyers and billboards for the Gig in the city’s public parks. The city’s largest building is dedicated to the Gig. Years before Google Fiber, Chattanooga was the first city in the United States to have a citywide gigabit-per-second fiber internet network. And the city’s government built it itself.

            At a time when small cities, towns, and rural areas are seeing an exodus of young people to large cities and a precipitous decline in solidly middle class jobs, the Gig has helped Chattanooga thrive and create a new identity for itself.

          • This Guy Has the Fastest Home Internet in the United States

            For reference, the Federal Communications Commission officially classifies “broadband” as 25 Mbps. His connection is 400 times faster than that.

        • DRM

          • Apple’s new MacBook Pro kills off most of the ports you probably need

            Apple just introduced a shiny, super thin new MacBook Pro. But for what was birthed, a lot of widely-held standards had to die.

            Today, Apple removed the MagSafe 2 charging port type, they stripped away the HDMI port, they ripped out the SD card slot, they shuttered the Thunderbolt 2 ports (which you probably used like three times) and they most notably killed the standard USB port. All these ports, which power data transfer and charging for most everything you likely use, have been replaced by four Thunderbolt 3/USB-C ports. Surprisingly the folks at Apple saw it fit to give the headphone jack a stay of execution on the new model.

        • Intellectual Monopolies

          • Copyrights

            • “MPAA and RIAA’s Anti-Piracy Plans Harm The Internet”

              The Internet Infrastructure Coalition is urging the U.S. Government not to blindly follow the RIAA and MPAA’s input regarding online piracy threats. The group, which represents tech firms including Google, Amazon and Verisign, warns that the future of the Internet is at stake.

            • Repeat Infringers Can Be Mere Downloaders, Court Rules

              A 10-year-old copyright case has prompted an interesting opinion from a US appeals court. In determining the nature of a “repeat infringer” (which service providers must terminate to retain safe harbor), the court found these could be people who simply download infringing content for personal use.

            • When the FCC asked about unlocking set-top boxes, the Copyright Office ran to the MPAA

              It’s been more than 20 years since Congress told the FCC that it should do something about the cable and satellite companies’ monopolies over set-top boxes (American households spend more than $200/year to rent these cheap, power-hungry, insecure, badly designed, trailing edge, feature-starved boxes), but it wasn’t until this year that the FCC announced its Unlock the Box order and asked for comments.

              The US Copyright Office is a branch of the US government, and its job is to help regulate the entertainment industry. That industry is one of the principle advocates for keeping the set-top box dumpster fire burning without any changes, because the lack of competition lets them call the shots with the cable/satellite companies (some entertainment companies are also major satellite/cable companies — Comcast/Universal, Time-Warner Cable, etc).

              But newly released internal documents from the Copyright Office reveal that literally the first thing it did when it learned that the FCC was seeking comments on unlocking set-top boxes was to call on the MPAA and its member companies — and shortly thereafter, it released a highly controversial comment stating that movie companies should have the right to dictate the features of these devices and exercise a veto over the them.

        ]]>
        http://techrights.org/2016/10/28/linux-mint-18-1-will-be-serena/feed/ 0
        Links 27/10/2016: Major Changes in Unity 8, Nextcloud Targets Phones http://techrights.org/2016/10/27/nextcloud-targets-phones/ http://techrights.org/2016/10/27/nextcloud-targets-phones/#comments Thu, 27 Oct 2016 18:06:09 +0000 http://techrights.org/?p=96444

        GNOME bluefish

        Contents

        GNU/Linux

        • Desktop

          • Linux and the Imaginary New User

            Linux has always had a reputation for being difficult to use. Consequently, when developers began improving users interfaces, they concentrated on what they imagined that new users needed. They rarely had the actual opportunity to observe new users, but the new user they imagined became a standard figure among developers, often surviving to this day.

            Yet after observing this habit for over a decade, I wonder more than ever if the imaginary new user still exists, or ever existed at all. I suspect, too, that the emphasis on this figure has been a detriment to other types of users.

          • Awwh, This Linux Wallpaper Is Adorable

            I pimped some Fedora community wallpapers yesterday, there was that (rather gorgeous) Ubuntu Timeline wallpaper a few weeks back, and the steam from hype-train that brought the “new” Ubuntu default wallpaper still lingers in the air a bit.

            So — honestly — I wanted so bad not to write about yet another wallpaper.

        • Server

          • The Point Of Docker Is More Than Containers

            Spending time with Docker during Cloud Field Day about a month ago opened my eyes to the larger ecosystem that Docker is building, and that others are building around it. There is so much more to Docker than just the idea of immutable containers.

            For a start, Docker made using containers easy. That’s no small feat for a tricky piece of technical infrastructure. Making it easy, and specifically easy for developers, to use removed a lot of friction that was no small contributor to the pain of other, earlier methods. It gave developers are really simple way to create a fully functional development environment, isolated from all other dependencies, with which to work.

          • What are the Top NFV Risks for Carriers?

            What are the risks of network functions virtualization (NFV)? As with any emerging technology, moving fast or picking the wrong components can do more harm than good. Let’s spend some time breaking down the NFV risks in building a virtual network.

            I have spent the few months gathering feedback from various service providers to get their view on whether NFV and its cousin software-defined networking (SDN) are ready for prime time. Even though many service providers expressed optimism that NFV technology is moving toward maturity, there are definitely cautionary tales on what to look out for.

            This article serves as an introduction to the challenges of NFV component selection – later articles will refer in more detail to the challenges in selecting NFV hardware and software components such as OpenStack and Open vSwitch.

          • “DevOps is a management problem”

            Improving your own organization’s performance – from where they are now to performance levels equal to the industry leaders – seems like a very long and difficult road. What is missing in most organizations? We talked to Damon Edwards, co-founder and managing partner of DTO Solutions and DevOpsCon speaker, about the challenges that accompany DevOps and how a repeatable system that empowers teams to find and fix their own problems looks like.

          • Manage disk image files wisely in the face of DevOps sprawl

            A disk image is simply a file, but that seemingly innocuous file contains a complete structure that represents applications, storage volumes and even entire disk drives.

          • TNS Guide to Serverless Technologies: The Best Frameworks, Platforms and Tools

            Even if you don’t need the servers themselves, serverless technologies could still require plenty of supporting software. Frameworks are needed to codify best practices, so that everyone is not out to reinvent the wheel, especially when it comes to interfacing with various languages such as Go, JavaScript and Python. And platforms are needed to help people avoid spending too much time on configuring the underlying infrastructure, perhaps by handing the work off to a service provider.

            Just in time for the Serverless conference in London, this post highlights some of the most widely used frameworks and platforms, as well as other supporting tools, that make successful serverless-based workloads happen.

        • Kernel Space

          • BUS1 Kernel Message Bus Posted For Review

            David Herrmann has posted the initial patches for review of the BUS1 kernel message bus, the successor to KDBUS as an in-kernel IPC mechanism.

            Herrmann announced, “This proposal introduces bus1.ko, a kernel messaging bus. This is not a request for inclusion, yet. It is rather an initial draft and a Request For Comments. While bus1 emerged out of the kdbus project, bus1 was started from scratch and the concepts have little in common. In a nutshell, bus1 provides a capability-based IPC system, similar in nature to Android Binder, Cap’n Proto, and seL4. The module is completely generic and does neither require nor mandate a user-space counter-part.”

          • Linux 4.9 Is Going To Be The “Biggest Ever” Linux Release

            The next Linux kernel release, i.e., Linux 4.9, could be the biggest ever Linux release in terms of the commits. Linus Torvalds shared this news in the release announcement of Linux 4.9-rc2. He also hinted at the possibility of turning 4.9 into an LTS release. The final build of the kernel is expected to arrive in December.

          • Why Is The Penguin Tux Official Mascot of Linux? Because Torvalds Had Penguinitis!

            The official mascot of the Linux kernel developed by Linus Torvalds is a penguin named Tux. You might have thought about the probable reasons why a penguin has been used as the face of the Linux kernel. Some people believe that Torvalds was bitten by a penguin that’s why he chose one to represent his kernel.

          • Graphics Stack

        • Applications

        • Desktop Environments/WMs

          • GNOME Desktop/GTK

            • Dual-GPU integration in GNOME

              Thanks to the work of Hans de Goede and many others, dual-GPU (aka NVidia Optimus or AMD Hybrid Graphics) support works better than ever in Fedora 25.

              On my side, I picked up some work I originally did for Fedora 24, but ended up being blocked by hardware support. This brings better integration into GNOME.

            • ‘GNOME To Do’ App Picks Up New Features

              GNOME To Do is one of those apps you’ve probably heard of, but do not use. And with a bunch of rivals task managers and to-do list apps available on Linux — from Simplenote to Remember the Milk — and online, the little app that might has its work cutout.

        • Distributions

          • Benefits Of Using Lightweight Linux Distributions

            There are quite a few lightweight linux distributions around but why should you care especially when most of our PCs that are on the market boast some very fast multi-core processors, large volumes of RAM and very fast Solid State Drives. Sure they can bring new life to old machines but there are many other reasons why they could be awesome for you.Let me give you a few reasons you would so much benefit from going with a Lightweight Linux distribution.

          • New Releases

            • TheSSS 20.0 Server-Oriented Linux Distro Ships with Linux Kernel 4.4.17, PHP 5.6

              4MLinux developer Zbigniew Konojacki informs Softpedia today, October 26, 2016, about the release and immediate availability of version 20.0 of his server-oriented TheSSS (The Smallest Server Suite) GNU/Linux distribution.

            • Quirky 8.1 Linux Is Built with Ubuntu 16.04 Binary DEBs, Supports Raspberry Pi 3

              Puppy Linux developer Barry Kauler was happy to announce the general availability of his Quirky 8.1 “Xerus” GNU/Linux distribution built with binary DEB packages from the Ubuntu 16.04 LTS (Xenial Xerus) operating system.

              Quirky 8.1 “Xerus” is here to replace the old “April” series, and while it is indeed built using the binary DEBs of Ubuntu 16.04 LTS, it stays true to being a distro from the Puppy Linux family and not an Ubuntu clone. However, it lets users install packages from the official Ubuntu 16.04 LTS (Xenial Xerus) software repositories, a feature that was not available in the Quirky “April” releases.

            • Alpine Linux 3.4.5 released

              The Alpine Linux project is pleased to announce the immediate availability of version 3.4.5 of its Alpine Linux operating system.

              This is a bugfix release of the v3.4 musl based branch, based on linux-4.4.27 kernels and it contains important security fixes for the kernel and for musl libc.

            • Alpine Linux 3.4.5 Released with Linux Kernel 4.4.27 LTS, Latest Security Fixes

              A new maintenance update of the server-oriented Alpine Linux 3.4 operating system has been released, bringing a new Linux kernel version from the long-term supported 4.4 series and the latest security patches.

              According to the release notes, Alpine Linux 3.4.5 is now available as the most up-to-date version of the GNU/Linux distribution based on musl libc and BusyBox, it’s powered by the Linux 4.4.27 LTS kernel, which was fully patched against the “Dirty COW” vulnerability, and includes numerous updated components and applications.

          • Screenshots/Screencasts

          • Gentoo Family

            • Gentoo Miniconf 2016

              As I noted when I resurrected the blog, part of the reason why I managed to come back to “active duty” within Gentoo Linux is because Robin and Amy helped me set up my laptop and my staging servers for singing commits with GnuPG remotely.

              And that happened because this year I finally managed to go to the Gentoo MiniConf hosted as part of LinuxDays in Prague, Czech Republic.

          • Arch Family

            • ArchBang – Best Arch based distro for old or low-end hardware with high performance and low resource utilization

              Arch Linux is very unique, compare with other Linux distributions because it doesn’t comes with live ISO & Desktop Environment. Arch gives you the full freedom to customize the installation as you wish, When you boot up, you’ll be end up with a terminal and most of the people panic here because they don’t want to build from scratch.

              There are many, Actively developed Arch derived Linux distributions are available with pre-installed Desktop environment. I would advise you to go with any one distribution as you wish.

          • OpenSUSE/SUSE

          • Red Hat Family

          • Debian Family

            • Why does software development take so long?
            • Debian’s New Look, Red Hat Giveaways, Ubuntu Advantage

              The newest eye candy to grace the default desktops of Debian 9 users is very tasteful and beautiful. The color palate is easy on the eyes while providing warmth and a professional aura. This year’s winner is a remarkably wonderful job by returning designer Juliette Belin, who just happened to have designed last version’s theme. 3,479 folks voted and Laura Arjona explained the vote gathering and counting methodology. I started getting a headache trying to understand that, so suffice to say the prettiest won. The other submissions are being combined into one package for easy installation.

            • Derivatives

              • DebEX Distro Now Lets You Create an Installable Debian 9 Live DVD with Refracta

                After informing us of the release of Exton|OS Light Build 161021, today, October 26, 2016, GNU/Linux developer Arne Exton sent an email to announce the availability of DebEX Barebone Build 161025.

                The latest version of the DebEX Barebone GNU/Linux distribution, build 161025, is here, based on the soon-to-be-released Debian GNU/Linux 9 “Stretch” (Debian Testing) operating system and kernel 4.8.0-21-exton, a specially crafted Linux kernel package based on the latest stable Linux 4.8 kernel.

              • KNOPPIX 7.7.1 Public Release
              • Canonical/Ubuntu

                • Ubuntu 17.04 Daily Builds Are Now Available to Download

                  Ubuntu 17.04 Daily Builds Are Now Available to Download http://www.omgubuntu.co.uk/2016/10/ubuntu-17-04-daily-iso

                • Ubuntu 17.04 (Zesty Zapus) Daily Build ISO Images Are Now Available for Download

                  Now that the upcoming Ubuntu 17.04 (Zesty Zapus) operating system is officially open for development, the first daily build ISO images have published in the usual places for early adopters and public testers.

                • Infographic: Ubuntu Advantage explained

                  Ubuntu Advantage is the commercial support package from Canonical. It includes Landscape, the Ubuntu systems management tool, and the Canonical Livepatch Service, which enables you to apply kernel fixes without restarting your Ubuntu 16.04 LTS systems.

                  Ubuntu Advantage gives the world’s largest enterprises the assurance they need to run mission-critical workloads such as enterprise databases, virtual/cloud hosts or infrastructural services on Ubuntu.

                  The infographic below gives an overview of Ubuntu Advantage, it explains the business benefits, why Ubuntu is #1 in the cloud for many organisations and includes a selection of Ubuntu Advantage customers.

                • New Video Shows Changes Headed to Unity 8

                  A new YouTube video claims to show an ‘quick overview of what’s to come to Unity 8’ in a future update.

                  Uploaded by Kugi Javacookies (not sure if that’s his real name), the clip is described as offering a “quick overview of what’s to come soon to Unity 8. Since the silo has now been signed-off by QA, so it will probably land really soon.”

                  Kugi adds that he finds it “awesome to actually follow projects even up to the small details. Codes in launchpad, actual projects in bileto and queued silos for QA testing in Trello. Really cool! :D”.

                • Flavours and Variants

        • Devices/Embedded

          • New Cortex-M chips add ARMv8 and TrustZone

            ARM launched its first Cortex-M MCUs with ARMv8-M and TrustZone security: the tiny, low-power Cortex-M23 and faster Cortex-M33.

            At the ARM TechCon show in Santa Clara, ARM unveiled two new Cortex-M microprocessors that will likely emerge as major Internet of Things workhorses over the coming decade, supplanting most existing Cortex-M designs. The Cortex-M23 and Cortex-M33 are also the first Cortex-M processors with ARMv8-M technology, enabling ARM TrustZone security, among other benefits. The TrustZone support is enabled via a new IoT-oriented CoreLink SIE-200 network-on-chip, which adds IP blocks on top of the AMBA 5 AHB5 interface. ARM also announced a TrustZone CryptoCell-312 technology for creating secure SoCs based on ARMv8-M.

          • Open Source Operating Systems for IoT

            Over the past decade, the majority of new open source OS projects have shifted from the mobile market to the Internet of Things. In this fifth article in our IoT series, we look at the many new open source operating systems that target IoT. Our previous posts have examined open source IoT frameworks, as well as Linux- and open source development hardware for IoT and consumer smart home devices. But it all starts with the OS.

            In addition to exploring new IoT-focused embedded Linux-based distributions, I’ve included a few older lightweight distributions like OpenWrt that have seen renewed uptake in the segment. While the Linux distros are aimed primarily at gateways and hubs, there has been equivalent growth in non-Linux, open source OSes for IoT that can run on microcontroller units (MCUs), and are typically aimed at IoT edge devices.

          • Congatec’s first Apollo Lake COMs include SMARC 2.0 model

            Congatec announced three Linux-friendly COMs based on Intel’s new Atom E3900 SoC: a Qseven, a COM Express Compact, and one of the first SMARC 2.0 modules.

            Congatec is one of the first vendors to announce a major product lineup based on Intel’s newly announced, 14nm-fabricated Atom E3900 “Apollo Lake” SoCs. In addition to the Qseven form-factor Conga-QA5 and the COM Express Compact Type 6 CongaTCA5 modules, the company unveiled the Conga-SA5, which is billed as Congatec’s first SMARC 2.0 module. In fact, the Conga-SA5 appears to be the company’s first SMARC COM ever, and one of the first SMARC 2.0 models to be fully announced. (See more on SMARC 2.0 below.)

          • Intel launches 14nm Atom E3900 and spins an automotive version

            The Linux-ready Atom E3900 series, which was formally announced at the IoT Solutions World Congress in Barcelona on the same day as the start of ARM TechCon in Silicon Valley, has already started rolling out to some 30 OEM customers, some of which have already announced products (see below). The first Apollo Lake based products will ship 2Q 2017, says Intel.

          • Phones

        Free Software/Open Source

        • Chain Releases Open Source Blockchain Solution for Banks

          Chain, a San Francisco-based Blockchain startup, launched the Chain Core Developer Edition, which is a distributed ledger infrastructure built for banks and financial institutions to utilize the Blockchain technology in mainstream finance.

          Similar to most cryptocurrency networks like Bitcoin, developers and users are allowed to run their applications and platforms on the Chain Core testnet, a test network sustained and supported by leading institutions including Microsoft and the Initiative for Cryptocurrency and Contracts (IC3), which is operated by Cornell University, UC Berkeley and University of Illinois.

        • Netflix Upgrades its Powerful “Chaos Monkey” Open Cloud Utility

          Few organizations have the cloud expertise that Netflix has, and it may come as a surprise to some people to learn that Netflix regularly open sources key, tested and hardened cloud tools that it has used for years. We’ve reported on Netflix open sourcing a series of interesting “Monkey” cloud tools as part of its “simian army,” which it has deployed as a series satellite utilities orbiting its central cloud platform.

          Netflix previously released Chaos Monkey, a utility that improves the resiliency of Software as a Service by randomly choosing to turn off servers and containers at optimized tims. Now, Netflix has announced the upgrade of Chaos Monkey, and it’s worth checking in on this tool.

        • Coreboot Lands More RISC-V / lowRISC Code

          As some early post-Coreboot 4.5 changes are some work to benefit fans of the RISC-V ISA.

        • Nextcloud Advances with Mobile Moves

          The extremely popular ownCloud open source file-sharing and storage platform for building private clouds has been much in the news lately. CTO and founder of ownCloud Frank Karlitschek resigned from the company a few months ago. His open letter announcing the move pointed to possible friction created as ownCloud moved forward as a commercial entity as opposed to a solely community focused, open source project.

          Karlitschek had a plan, though. He is now out with a fork of ownCloud called Nextcloud, and we’ve reported on strong signs that this cloud platform has a bright future. In recent months, the company has continued to advance Nextcloud. Along with Canonical and Western Digital, the partners have launched an Ubuntu Core Linux-based cloud storage and Internet of Things device called Nextcloud Box, which we covered here. Now, Nextcloud has moved forward with some updates to its mobile strategy. Here are details.

        • Enterprise Open Source Programs Flourish — In Tech and Elsewhere

          If you cycled the clock back about 15 years and surveyed the prevailing beliefs about open source technology at the time, you would find nowhere near the volume of welcome for it that we see today. As a classic example, The Register reported all the way back in 2001 that former CEO of Microsoft Steve Ballmer made the following famous statement in a Chicago Sun-Times interview: “Linux is a cancer that attaches itself in an intellectual property sense to everything it touches.”

        • 5 More Reasons to Love Kubernetes

          In part one of this series, I covered my top five reasons to love Kubernetes, the open source container orchestration platform created by Google. Kubernetes was donated to the Cloud Native Computing Foundation in July of 2015, where it is now under development by dozens of companies including Canonical, CoreOS, Red Hat, and more.

          My first five reasons were primarily about the project’s heritage, ease of use, and ramp-up. The next five get more technical. As I mentioned in part one, choosing a distributed system to perform tasks in a datacenter is much more complex than looking at a spreadsheet of features or performance. And, you should make your decision based on your own needs and team dynamics. However, this top 10 list will give you my perspective, as someone who has been using, testing, and developing systems for a while now.

        • Bankers plan to give Corda blockchain code to Hyperledger project
        • Are European Banks Falling Behind in Blockchain Development?
        • Hyperledger adds 10 new members to support open source distributed ledger framework

          The Linux Foundation’s Hyperledger project has announced that 10 new members have joined the project in order to help create an open standard for distributed ledgers for a new generation of transactional applications.

        • The Blockchain Created By Ethereum’s Fork is Forking Now

          A blockchain that was born out of the rejection of a contentious technical change is on the cusp of making a decision some argue contradicts its core values.

          That’s the situation the developers behind ethereum classic face ahead of a hard fork expected to be enacted on its blockchain on 25th October (should network participants approve the upgrade). Originally formed in reaction to a decision by the ethereum community to edit its “immutable” ledger, the fork caused an ideological schism among its enthusiasts.

          Alarmed by the action (or seeing a chance to profit by continuing the original network), miners and speculators began running its blockchain, which developers named “ethereum classic”. Other investors then bought into the vision, and today, there are currently 85m classic ethers (ETC) worth $87m.

        • Events

          • Science Hack Day India 2016

            Few months back Praveen called to tell me about the new event he is organizing along with FOSSASIA, Science Hack Day, India. I never even registered for the event as Praveen told me that he just added mine + Anwesha’s name there. Sadly as Py was sick for the last few weeks, Anwesha could not join us in the event. On 20th Hong Phuc came down to Pune, in the evening we had the PyLadies meetup in the Red Hat office.

          • Science Hack Day, Belgaum

            It started quite early with Kushal telling me that Praveen Patil was organizing a Science Hack Day with Hong Phuc’s help and that it might be an interesting place to come to. He mentioned that there were many interesting people coming in and that Nisha and I would have a good time. I wasn’t very keen though because of my usual reluctance to get out and meet people. This was especially an issue for me with Cauldron and Connect happening back to back in September, draining most of my ‘extrovert energy’. So we were definitely not going.

          • FOSDEM 2017 Real-Time Communications Call for Participation

            FOSDEM is one of the world’s premier meetings of free software developers, with over five thousand people attending each year. FOSDEM 2017 takes place 4-5 February 2017 in Brussels, Belgium.

        • SaaS/Back End

          • From OpenStack Summit, Red Hat Reports That the Deployment Era is Here

            As noted here yesterday, OpenStack is here to stay in enterprises. A new study by 451 Research analysts shows that about 72 percent of OpenStack-based clouds are between 1,000 and 10,000 cores and three fourths choose OpenStack to increase operational efficiency and app deployment speed.

            Meanwhile, in conjunction with OpenStack Summit in Barcelona, Red Hat is out with very notable results from its polling of its OpenStack user base. Its study found that production deployments increased hugely in the last year, according to a survey of 150 information technology decision makers and professionals carried out by Red Hat.

          • You can run the same programs on 16 different OpenStack clouds

            Cloud companies like to talk about about how you can avoid vendor lock-in. And OpenStack just showed how to make it happen.

            Sixteen different vendors did a live demo at OpenStack Summit showing that you could run the same software stack on 16 separate OpenStack platforms.

          • ​Where OpenStack cloud is today and where it’s going tomorrow

            The future looks bright for OpenStack — according to 451 Research, OpenStack is growing rapidly to become a $5-billion-a-year cloud business. But obstacles still remain.

          • ​Mirantis OpenStack: The good news and the bad news

            Mirantis recently signed a major deal with NTT, but the company is also laying off some of its employees.

          • The World Runs on OpenStack

            The OpenStack Summit keynotes got underway the morning of October 25, with Mark Collier, Chief Operating Officer of the OpenStack Foundation, declaring that the world runs on OpenStack.

          • Study: OpenStack is Marching Forward in Enterprises

            How fast is the OpenStack global cloud services market growing? Research and Markets analysts came out with a new report recently that forecasts the global OpenStack cloud market to grow at a CAGR of 30.49% during the period 2016-2020. Many enterprises now have large scale OpenStack deployments, and in conjunction with this week’s OpenStack Summit in Barcelona, new study results are shedding light on exactly how entrenched this open cloud platform is in enteprises.

            The bottom line is: OpenStack is here to stay in enterprises.

            OpenStack deployments are getting bigger. Users are diversifying across industries. Enterprises report using the open source cloud software to support workloads that are critical to their businesses. These are among the findings in a recent study by 451 Research regarding OpenStack adoption among enterprise private cloud users. About 72 percent of OpenStack-based clouds are between 1,000 and 10,000 cores and three fourths choose OpenStack to increase operational efficiency and app deployment speed. The study was commissioned by the OpenStack Foundation.

            Here are some of the companies discussing their OpenStack deployments in Barcelona: Banco Santander, BBVA, CERN, China Mobile, Comcast, Constant Contact, Crowdstar, Deutsche Telekom, Folksam, Sky UK, Snapdeal, Swisscom, Telefonica, Verizon, Volkswagen, and Walmart. You can find some of the specific deployment stories from the companies at the OpenStack User Stories page.

          • OpenStack Adoption and Revenues on the Rise

            One thing you can count on at the semiannual OpenStack Summits are new studies and reports about OpenStack. And that’s the case at the OpenStack Summit going on in Barcelona, Spain, now through Oct. 28. A number of studies are being discussed at the event, including the October 2016 OpenStack User Survey and new analysis on the state of OpenStack from analyst firm 451 Group. According to the 451 Group, the OpenStack software market will generate $1.8 billion in revenue in 2016 and grow to $5.7 billion by 2020. The firm is forecasting that the five-year compound annual growth rate for OpenStack from 2015 through 2020 will be 35 percent. The semiannual OpenStack User Survey is also a topic of discussion at the OpenStack Summit, providing insight into the state of OpenStack deployment. Among the high-level findings is that 71 percent of OpenStack clouds are now in production and fully operational, up from 59 percent in 2015. Also of note is how well-regarded the Kubernetes orchestration system has become, outpacing CloudFoundry in terms of user interest. In this slide show, eWEEK takes a look at some of the highlights of the latest OpenStack research studies.

          • ​HPE backs off from OpenStack development

            HPE still supports OpenStack in its Helion cloud program, but it’s cutting way back on how much it’s spending on helping create OpenStack.

          • Is OpenStack Cloud Interoperability a Myth?

            Boris Renski, co-founder of Mirantis, argues that interoperability doesn’t start at the infrastructure layer. It starts with applications, he said.
            BARCELONA—A keynote highlight on Oct. 26 at the OpenStack Summit here was a live, onstage demonstration with 16 OpenStack vendors, all showing a degree of interoperability. The demonstration was part of an interoperability challenge, though, according to Boris Renski, co-founder of Mirantis and member of the OpenStack board of directors, the infrastructure layer is not necessarily the right place to emphasize interoperability.

          • Communications Leaders Choose Red Hat OpenStack Platform for Powering Cloud Deployments to Deliver New Services
          • Red Hat: OpenStack moving beyond the proof-of-concept phase

            Red Hat’s annual poll found that 43 percent of respondents have deployed the cloud platform in production, compared to just 16 percent one year ago. The company reckons the increase reflects efforts by the community to address complexity and deployment issues that were previously known to have been a major roadblock to adoption.

            The study also noted that the steep learning curve for deploying OpenStack is being addressed as a growing number of engineers become certified to operate the platform. In addition, Red Hat cited cloud native application development as another driving force in enterprise adoption of OpenStack.

          • OpenStack Summit Emphasizes Security, Interoperability

            From security to interoperabilty to use cases and everything in-between, this week’s OpenStack Summit from Oct. 25 to 28 in Barcelona, is set to illuminate the cloud. This year’s event, which brings together vendors, operators and developers of the open-source cloud platform, will offer more sessions than ever before on securing OpenStack clouds.

            The Barcelona Summit follows the release of the OpenStack Newton milestone, which debuted on Oct. 6. While discussions about the most recent release are always part of every OpenStack Summit, so too are case-studies from operators of OpenStack clouds.

        • Pseudo-Open Source (Openwashing)

        • FSF/FSFE/GNU/SFLC

          • FSF Blogs: Who in the world is changing it through free software? Nominate them today!

            Nominations for the 19th annual Free Software Awards opened at LibrePlanet 2016, right after the most recent Free Software Awards were presented — and we need you to nominate more projects by November 6th, 2016 at 23:59 UTC. For details see instructions below.

            If you know a free software contributor or project that deserves celebration, don’t hesitate to nominate them! This is your opportunity to publicly recognize people and projects that have inspired you. Your nominations will be reviewed by our awards committee and the winners will be announced at LibrePlanet 2017.

          • denemo @ Savannah: Version 2.0.14 is imminent, please test
          • Development of a New MetaHTML

            MetaHTML is being ported to modern GNU/Linux systems by a small team of eager contributors. We are happy to announce the new developments in the world of GNU MetaHTML.

          • guile-curl v0.4 released

            I am pleased to announce an small update of guile-curl, which is a library for fetching files by URL from the internet in the GNU Guile dialect of the Scheme programming language. It supports many protocols, such as https, ftp, tftp, and, most importantly, gopher.

        • Public Services/Government

          • While Other Cities Go Linux, Toronto Bets Big on Microsoft Software [Ed: Toronto joins the Dark Forces]

            The partnership between Microsoft and the city of Toronto certainly comes at the right time, as other authorities across the world already announced decisions to give up on Windows and Office and replace them with open-source alternatives.

            Munich is the city that started the entire trend, but it wasn’t at all a smooth transition. Some of the local officials proposed a return to Microsoft software, claiming that training and assistance actually impacted productivity and explaining that in the end it all pays off to use Microsoft software because of the familiarity that users experience, which translates to a substantial productivity boost.

            And yet, the transition off Microsoft products is happening and more authorities are willing to do it, not necessarily because of the costs, but also due to security concerns, as is the case of Russia.

        • Openness/Sharing/Collaboration

          • Open Data

            • Using Open Source for Data

              Bryan Liles, from DigitalOcean, explains about many useful open source big data tools in this eight minute video. I learned about Apache Mesos, Apache Presto, Google Kubernetes and more.

          • Open Hardware/Modding

            • Open-Source Toolkit Lets Communities Build Their Own Street Furniture

              Despite the vast amount of customization options technology has allotted us, it can still be difficult to create projects that are community-centric. For example, though 3D printing can help us personalize our own jewelry, it has limited use for outfitting parks with trash cans or equipping bus stops with comfortable seating. Still, hyper-customizable tech has taught us the convenience of managing our own products, eliminating the bureaucratic complications of mass produced, production-line assembly.

              Leveraging this ideology to better the community, the Better Block Foundation, a nonprofit dedicated to building local communities, has developed an open-source toolkit for creating a variety of fixtures for communities. The platform, called Wikiblock, allows designs ranging from benches to beer garden fences to be downloaded and taken to a maker space where a computer-aided machine can print the design from plywood. Similar to Ikea’s simplistic, DIY approach, the printed wood can be assembled by hand, without glue or nails.

            • How to make a lighted, porch bag for Halloween

              While I typically go all out for Halloween decorations every year, I’ll admit I’m feeling tired this year. I still wanted to delight the neighborhood kids with simple details, so I decided to make lighted bags for my front porch railing this year.

              If you are someone who has a paper cutting machine like the Silhouette, this project will likely be a lot easier. Simply import the SVG file, resize for whatever size box you want, cut out, and assemble. However, for those of you who don’t have one, I’ve included instructions on how to make this project without any machine at all.

              The box was created with the help of artists who share their art at OpenClipArt. I also used Inkscape to create the SVG file. If you don’t like bats, you could modify the SVG file to include other types of clipart in the center of the bag.

        Leftovers

        • Science

        • Hardware

        • Health/Nutrition

          • Antimicrobial Resistance Should Not Overshadow Broader Issue Of Access To Medicines, Some Say

            While the issue of antimicrobial resistance has arrived in high-level discussions, and there is a consensus that the problem must be tackled one way or another to avoid slipping back into a pre-antibiotic era, some voices are highlighting the need to remember that other health issues remain unmet, and access to medicines is still an acute problem.

            On 25 October, the World Health Organization, World Intellectual Property Organization and the World Trade Organization organised a joint technical symposium on antimicrobial resistance. The symposium sought to achieve a better understanding of the global challenge of antibiotic resistance and examine possible ways forward.

            Most speakers invited to the event presented possible solutions to boost research and development for new antibiotics and the need to restrict the use of existing antibiotics to prevent the building up of microbe resistance. However, some speakers insisted on the fact that antimicrobial resistance (AMR) is only a part of the issue of access to medicines.

          • Between Quick Wins And Long Roads Ahead On Antimicrobial Resistance

            Raising awareness, creating effective stewardship, national action plans on antimicrobial resistance, building trust and getting onto the agenda of the G20 are critical to fostering access and appropriate use of antibiotics, according to speakers at yesterday’s joint technical symposium on antimicrobial resistance (AMR).

            The annual trilateral cooperation event between the World Health Organization, World Intellectual Property Organization and World Trade Organization was held on 25 October. The first panel of the symposium discussed the balance between fostering access to antibiotics whilst ensuring their appropriate use.

        • Security

        • Defence/Aggression

          • Why Clinton’s plans for no-fly zones in Syria could provoke US-Russia conflict

            The former strategists spoke to the Guardian as Clinton’s Republican rival Donald Trump warned that Clinton’s proposal to establish “safe zones” to protect beleaguered Syrian civilians would “lead to world war three”.

            The proposal of no-fly zones has been fiercely debated in Washington for the past five years, but has never attracted significant enthusiasm from the military because of the risk to pilots from Syrian air defenses and the presence of Russian warplanes.

            Many in US national security circles consider the risk of an aerial confrontation with the Russians to be severe.

            “I wouldn’t put it past them to shoot down an American aircraft,” said James Clapper, the US director of national intelligence, on Tuesday in response to a question from the Guardian at the Council on Foreign Relations.

          • Why Is the Foreign Policy Establishment Spoiling for More War? Look at Their Donors.
          • UK deploys hundreds of troops and aircraft to eastern Europe

            The UK is deploying hundreds of troops, as well as aircraft and armour to eastern Europe as part of the biggest build-up of Nato forces in the region since the cold war. The deployment is taking place during growing tensions over a series of high-profile Russian military manoeuvres.

            RAF Typhoon aircraft from RAF Coningsby will be sent to Romania for up to four months, while 800 personnel will be sent with armoured support to Estonia, 150 more than previously planned, the Ministry of Defence (MoD) has said. France and Denmark will also commit more troops, the British government said.

          • Looking Ahead: Clinton’s Plans for Syria

            Hillary Clinton has a plan for defeating Islamic State in Syria. Donald Trump has one, too. With the conflict in Syria spreading beyond its borders, it’s essential to understand the new president’s strategies – and how they may need to be adjusted over the next four years.

        • Transparency/Investigative Reporting

          • WikiLeaks ‘sowing the seeds of its own destruction’ says former NSA chief [Ed: repeats the “Russia” smear]

            A former deputy director of the US National Security Agency (NSA), John C Inglis, believes that WikiLeaks – the whistleblowing platform led by Julian Assange – has become “internally confused” in recent years and that “natural forces” may soon wipe it out.

            “WikiLeaks might be in fact be sowing the seeds of its own destruction,” Inglis told IBTimes UK in an exclusive interview on 25 October, indicating the organisation has overstepped a boundary by leaking material which has the potential to influence the upcoming US presidential election.

          • Former NSA deputy director opens up about Snowden, Trump and mass surveillance

            To the former deputy head, Snowden is not a whistleblower and may indeed be an unwitting pawn of the Kremlin. Sitting calmly in the British Museum, London, Inglis exclusively told IBTimes UK how the agency was “stunned” by the leak now commonly known as the ‘NSA files’.

          • Roundtable: Former Deputy Director of NSA Talks Insider Threats
        • Environment/Energy/Wildlife/Nature

          • ‘Reads like you’re punting’: Why Clinton chopped a Keystone XL reference from her book

            A reference to the Keystone XL pipeline was chopped from Hillary Clinton’s memoir due to political considerations, according to the latest batch of stolen emails posted Thursday on Wikileaks.

            While writing the book Hard Choices, Clinton initially included a reference to the pipeline at the urging of her daughter, Chelsea, according to a 2014 email purportedly sent to her current campaign chair John Podesta.

            “She decided to write about Keystone because her daughter suggested that it would be a glaring omission and look like an even worse dodge if she left it out,” said the note from Clinton speechwriter Dan Schwerin.

            The note said the passage was crafted with some help from Podesta, then edited by Bill and Hillary Clinton. The ill-fated phrases referred to Keystone XL as a tough choice amid the transition to a clean-energy economy. They concluded with Clinton refraining to take sides, out of respect for her successor John Kerry, who led the project review as Secretary of State.

            Her book editor apparently wanted the section dropped — because it read like a political dodge.

        • Finance

        • AstroTurf/Lobbying/Politics

          • Worldwide Solidarity with a Green Party POTUS

            ES, “that Sea Shepard Captain, Paul Watson.” YES, “that Woodstock.” Sea Shepard Captain Paul Watson cast his vote the other day, and shared his experience about his experience as an early voter.

          • The Radical, Grassroots-Led Pirate Party Just Might Win Iceland’s Elections

            Though she’s grown out the blue-dyed coiffure, Birgitta Jónsdóttir still brightens up the anodyne halls of the Althing, Iceland’s parliament in Reykjavík, the country’s capital. In stockinged feet, a white-cotton hippie skirt, and a dark-blue embroidered waistcoat, the 49-year-old Jónsdóttir refuses to fit the classic mold of politician, even though she’s occupied a parliamentary seat for seven years, since 2012 as the front person of the Pirate Party. Jónsdóttir, the former WikiLeaks spokesperson and a published lyricist, calls herself a “poetician,” since verse is her true calling, she says, not the daily grind of politics. Yet if Iceland’s national elections were held today and not on October 29, the Pirates could head up a new government on this rugged island of 330,000 souls—possibly with Jónsdóttir as prime minister.

            Iceland’s political status quo—a Nordic-style parliamentary democracy, dominated for decades by pro-NATO conservatives—was shattered when the country went bust in the 2008 financial crisis, pitching Iceland into its deepest crisis since full independence and the republic were declared in 1944. This year, Iceland was rocked again when the Panama Papers leak exposed corruption among top politicos, including the prime minister, who resigned under fire. “People here are angry and frustrated,” says Karl Blöndal, deputy editor of the center-right Morgunbladid. “In the minds of many voters, the Pirates are the only untainted party, and with them Birgitta carries authority. She’s been the face of the opposition since the crash.”

            Although the Pirates began surging in polls more than a year ago, peaking at 43 percent in April, Jónsdóttir has been coy about whether she’d take the country’s highest post if elections go in the party’s favor and supporters insist on her as prime minister. (Iceland’s Pirates have slipped considerably in surveys since early this year; currently, they’re neck and neck with the ruling Independence Party.) The object of her desire, she says, is the Althing’s presidency, an office from which she could reinvest power in the legislature—one means of bringing politics nearer to the people, a cause close to Pirate hearts.

          • The Pentagon’s ‘Terminator Conundrum’: Robots That Could Kill on Their Own

            No humans were remotely piloting the drone, which was nothing more than a machine that could be bought on Amazon. But armed with advanced artificial intelligence software, it had been transformed into a robot that could find and identify the half-dozen men carrying replicas of AK-47s around the village and pretending to be insurgents.

            As the drone descended slightly, a purple rectangle flickered on a video feed that was being relayed to engineers monitoring the test. The drone had locked onto a man obscured in the shadows, a display of hunting prowess that offered an eerie preview of how the Pentagon plans to transform warfare.

            Almost unnoticed outside defense circles, the Pentagon has put artificial intelligence at the center of its strategy to maintain the United States’ position as the world’s dominant military power. It is spending billions of dollars to develop what it calls autonomous and semiautonomous weapons and to build an arsenal stocked with the kind of weaponry that until now has existed only in Hollywood movies and science fiction, raising alarm among scientists and activists concerned by the implications of a robot arms race.

          • The Clinton Campaign Should Stop Denying That The Wikileaks Emails Are Valid; They Are And They’re Real

            Being interviewed by Megyn Kelly, here’s how Brazile tries to claim that the emails are not real, but basically comes out with a word salad of nothing, rather than simply admitting that the email is legit.

          • Jill Stein: The Best Way to Boost the Economy Is by Saving the Planet

            Our nation—and our world—face a perfect storm of economic and environmental crises that threaten not only the global economy, but life on Earth as we know it. The dire, existential threats of climate change, wars for oil, and a stagnating, crisis-ridden economic system require bold and visionary solutions. In this election, we are deciding not just what kind of a world we want, but whether we will have a world at all.

            There is a growing concern in advanced economies that governments are running out of options to stabilize a precarious and volatile global economic system. Since the onset of the Great Recession in 2008, the Fed’s large-scale bond purchases, called quantitative easing, have helped push interest rates close to 0% and have done more to serve Wall Streets’ interests by way of propping up the stock market than by boosting the overall economy for average Americans.

            These have proven to be temporary fixes, providing a semblance of “recovery” without addressing the underlying problems in the real economy: stagnating demand, lack of productive investment, staggering inequality and concentration of wealth—not to mention the climbing cost of climate-related disasters, like floods and wildfires, which have cost $26.9 billion dollars in 2016 alone. As recent warning signs in the U.S. market have shown, we are hardly out of the woods when it comes to preventing another big crash. Keeping interest rates super low has only produced the illusion of a healthy economy. Without sound fiscal policies targeted to help ordinary Americans, economic growth will stagnate.

          • Chris Hedges vs. Eddie Glaude: Should Progressives Vote for Hillary Clinton or Jill Stein?

            Pulitzer Prize-winning journalist Chris Hedges and Eddie Glaude, chair of the Department of African American Studies at Princeton University, debate the issue of strategic voting and the role of third-party candidates.

          • WikiLeaks memo exposes ‘Bill Clinton Inc.’

            He dubbed those for-profit pursuits “Bill Clinton, Inc.” The resulting deals often involved a mix of foundation donations, paid speeches and consulting contracts for Bill Clinton, lumping charitable and personal financial work together in ways that may have crossed ethical boundaries.

            Bill and Hillary Clinton have both defended the work of the Clinton Foundation as completely independent of their family’s finances or political ambitions. Critics have frequently accused the Clintons of using their foundation to enrich themselves and grow their political clout in anticipation of Hillary Clinton’s presidential bid.

            However, the Band memo makes clear the inextricable ties between Bill Clinton’s personal profits and his eponymous charity. What’s more, it reveals the fact that Teneo’s operation, at least in the early months of its existence, was heavily dependent on the Clinton name and foundation to build relationships with its clients.

            One example found in the memo involves GEMS Education, a for-profit education corporation that has been linked to the teaching of Sharia Law. The group paid Bill Clinton nearly $6.2 million between 2011-15, when the former president ended his contract with the firm ahead of Hillary Clinton’s campaign launch.

          • WikiLeaks: Clinton Team Leaked Creepshot of Bernie Sanders in His Swimming Suit

            The Clinton campaign buzzed over a picture of Bernie Sanders in his swimming suit, at the same time they were pushing stories about the Vermont Senator attending a fundraiser for Democrats with wealthy supporters.

            Bill Clinton’s chief of staff, Tina Flournoy, emailed the attached photo of Sanders relaxing by the pool at the DSCC retreat to Brian Fallon, Clinton’s national press secretary.

          • Memo reveals interplay between Clinton Foundation, personal business

            An internal memo released Wednesday by WikiLeaks reveals new details about the interplay between the Clinton Foundation and the Clinton family’s personal business interests.

            The 12-page document is penned by Doug Band, a longtime Clinton confidant who had been the Clinton Foundation’s primary fundraiser for a decade.

            Band wrote the memo as a principal for Teneo, a private consulting firm that raised tens of millions of dollars for the Clinton Foundation while also acting as a personal in-house agency for Bill Clinton.

            In the memo, Band describes his “unorthodox” role in raising money for the nonprofit foundation while simultaneously securing for-profit opportunities for the former president.

            The document argues that Band’s dual lines of work were “independent” of one another. The memo came after criticism from Chelsea Clinton — revealed in a separate email published by WikiLeaks — over Band’s role within the family’s network of interests.

            The memo states that as of November 2011, Teneo had raised tens of millions for the foundation and produced between $30 million and $66 million in revenue for Bill Clinton through various “business arrangements,” including paid speeches.

          • Aide: He arranged for $50M in payments for Bill Clinton

            A close aide to Bill Clinton said he arranged for $50 million in payments for the former president, part of a complicated mingling of lucrative business deals and charity work of the Clinton Foundation mapped out in a memo released by WikiLeaks on Wednesday.

            The report was written by Doug Band, who has transitioned from his job as a Clinton aide to a partner in Teneo Consulting, a company whose client roster now includes some of the biggest companies in the world. Along the way, Band wrote, he also pushed his clients and contacts to donate millions of dollars to the Clinton Foundation, and to help win business deals for Bill Clinton.

          • WikiLeaks does good work. It’s not Assange who’s gone off the deep end, it’s us

            What, the world’s most ardent defenders of freedom want to know, has happened to Julian Assange? Just a few years ago, he was such an earnest fellow, who spoke all truth to power. Well-known liberals gave him airtime, centrist trade organisations gave him membership and middle-brow humourists gave him plaudits and harbour. Now, all that the honourable can offer him is their disgust. He’s a Russian collaborator, a spiteful traitor, a pussy-grabbing narcissist whose leaks on Clinton place him in precisely the same deplorable basket that emits the stink of Trump.

          • Hacked memo offers an angry glimpse inside ‘Bill Clinton Inc.’

            As a longtime Bill Clinton adviser came under fire several years ago for alleged conflicts of interest involving a private consulting firm and the Clinton Foundation, he mounted an audacious defense: Bill Clinton’s doing it, too.

            The unusual and brash rejoinder from veteran Clinton aide and Teneo Consulting co-founder Doug Band is scattered across the thousands of hacked emails published by WikiLeaks, but a memo released Wednesday provides the most detailed look to date at the intertwined worlds of nonprofit, for-profit, official and political activities involving Clinton and many of his top aides.

          • The Green Party in the U.S. is a “Movement Party”
          • ‘There’s no good answer’: Podesta leaks show Clinton campaign stumped by email server debacle

            With the whistleblowing site promising the release of around 50,000 emails from Podesta, Wednesday’s dump brings to 33,042, the number of messages published by WikiLeaks so far.

          • WIKILEAKS: Clinton Camp Asked For Money From Donor With Russian Oil Ties

            Democratic presidential nominee Hillary Clinton’s campaign pitched a small group of wealthy liberals worried about global warming to become “climate policy donors,” according to a leaked email chain.

            One of those donors, however, has taken money from a Bermuda-based law firm with extensive ties to Russia. The email chain was one of thousands published online by WikiLeaks from Clinton campaign chair John Podesta’s hacked Gmail account.

          • Clinton campaign chair John Podesta gave his email login info to hackers after clicking on phishing link

            How did alleged hackers get access to the email account of John Podesta, the chair of the Hillary Clinton campaign? Apparently he just gave them his password.

            This is according to a leading cybersecurity firm, which says Podesta fell for a simple phishing scam frequently used in spam mail.

            A researcher at the company SecureWorks told Motherboard that Podesta was sent an email on March 19 that appeared to have come from Google. In the email was a link using Bitly, a URL shortening service. Podesta clicked on this link, which took him to a fake Google page, where he then typed in his login information.

            According to the cybersecurity firm, this is how the email account of former secretary of state Colin Powell was also hacked.

            The alleged hackers appear to later have sent Podesta’s emails to the whistleblowing journalism organization WikiLeaks, which has published them this month in installments. WikiLeaks says it has 50,000 messages to and from Podesta, and has published roughly 2,000 per day.

          • WikiLeaks: Clinton’s Campaign Chairman Lost His Cell Phone Getting Out Of Cab, Leaked Podesta Email Shows

            John Podesta lost his cell phone getting out of a cab, the latest dump of WikiLeaks‘ “The Podesta Emails” indicates. Podesta, the chairman for Hillary Clinton’s campaign, appears to have sent an email to Eryn Sepp on July 19, 2015, in which he asks for help finding his lost phone.

            “[I] lost my phone this am. It must have fallen off my belt getting in or out of the cab. I used Diamond and had a 4:45 pick up at Brandywine. Can you call Diamond Cab and see if the cab driver found it. They should be able to figure it out given the pickup. The receipt says #Diamond 444 C502,” Podesta appears to have written, according to the allegedly leaked email in WikiLeaks’ Podesta files.

            Readers have speculated that this incident might have been the way whoever delivered the Podesta files to WikiLeaks was able to access Podesta’s emails.

          • ‘Take the Money!!’ and other highlights from the Podesta email leak

            Throughout the Democratic primary, Hillary Clinton’s campaign presented her as a crusading reformer who would take on powerful corporate interests and curb the role of big money in American politics.

            But the recent WikiLeaks dump of campaign chairman John Podesta’s emails offers revealing snapshots that tell a somewhat different story. Top aides plot to “scare our people into giving bigger sums.” They debate whether to take cash from registered foreign agents: “Take the money!!” one senior campaign official advises. A top corporate lobbyist, pressed to “hit up” his clients for Clinton campaign coffers, asks for high-level help to advance one of those client’s interests. And there are new details about the overseas cash that rolled into the Clinton Foundation — including a $12 million commitment from the king of Morocco that Hillary Clinton personally helped facilitate.

            The emails also disclose just how nervous top Clinton advisers were that Vice President Joe Biden might get into the race (Podesta himself was convinced he was getting in.) And they fretted about their own candidate’s limitations. “Almost no one knows better [than] me that her instincts can be terrible,” wrote one longtime Clinton aide.

          • Why Bernie Was Right

            Wikileaks’ latest document dump vindicates Bernie Sanders’ critique of Hillary Clinton and the Washington establishment.

          • The FBI’s Clinton Probe Gets Curiouser

            Hillary Clinton may win the election in two weeks, but the manner of her victory will bedevil her in the White House. Specifically, evidence keeps turning up suggesting that the FBI probe into her emails was influenced by political favoritism and double standards.

          • Pirates Could Rule Iceland After Upcoming Legislative Elections

            The Pirate Party promises to clean up corruption, grant asylum to Edward Snowden and accept the bitcoin virtual currency.

            Riding a wave of anger over perceived corruption among Iceland’s political elite, the Pirate Party is doing well in the polls ahead of Saturday’s general election.

          • WikiLeaks shows Clinton hid email scandal from her own staff

            Hillary Clinton’s closest aides hid the private email scandal from her campaign team in the months before the official launch of her presidential campaign, emails made public by WikiLeaks show.

            Robby Mook, Clinton’s campaign manager, John Podesta, Clinton’s campaign chair, and Neera Tanden, co-chair of Clinton’s transition team, each expressed shock at the revelations about her private server as they emerged in early March 2015.

            Although Clinton’s team had performed research on her in 2014 as staff prepared for her campaign, Clinton’s inner circle apparently steered Mook and others away from the issue until it was too late.

            When Podesta asked Mook if he had “any idea of the depth of this story,” Mook answered simply, “Nope.”

          • 2016 The Choice: Washington Post reporter on a WikiLeaks hacked memo and ‘Bill Clinton Inc.’

            On Thursday, Oct. 27, 2016, Yahoo Global News Anchor Katie Couric speaks with Washington Post political investigations reporter Rosalind Helderman about her article detailing a hacked memo released by WikiLeaks that appears to implicate former President Bill Clinton in a pay to play scenario.

            Yahoo News Now Special Edition: “2016 The Choice” — Every weekday until the election, we’ll be coming to you live from the Yahoo Studios in New York City, bringing the latest information and analysis of the day’s most compelling storylines in the race for the White House.

          • Erica Garner blasts Clinton campaign over discussions staffers had about her father’s death in WikiLeaks emails

            Erica Garner, the daughter of police chokehold victim Eric Garner, ripped the Hillary Clinton campaign in a series of tweets Thursday after new campaign emails released by WikiLeaks showed how the Democratic nominee’s staffers discussed the death of her father.

            “I’m troubled by the revelation that you and this campaign actually discussed ‘using’ Eric Garner … Why would you want to ‘use my dad?” Garner tweeted along with a link to emails released by WikiLeaks. “These people will co opt anything to push their agenda. Police violence is not the same as gun violence.

          • WikiLeaks: Team Hillary Feared Clinton-Cosby Comparisons

            Political operative Ron Klain in January sent an “urgent” email to Hillary Clinton’s campaign staff warning of possible questions she might face, including how her husband’s sexual indiscretions might compare to disgraced comedian Bill Cosby.

            Klain’s insights became public Thursday thanks to the latest dump by WikiLeaks of campaign Chairman John Podesta’s hacked emails.

            Klain, who served as chief of staff to Vice Presidents Al Gore and Joe Biden, wrote that the campaign needed to set aside time to discuss the political questions, which now seem to be really owning the coverage.”

            Klain had several under the heading “WJC Issues.”

            One was particularly harsh: “How is what Bill Clinton did different from what Bill Cosby did?”

          • Wikileaks Reveals How Bill Clinton Profited From the Clinton Foundation

            A new cache of hacked e-mails, released Wednesday by WikiLeaks, is shedding new light on how Bill Clinton made millions of dollars while Hillary Clinton served as secretary of state, and raising questions about whether there may have been conflicts of interest between foreign donations to the Clinton Foundation and the former president’s personal business.

            In one 2011 memo written by Doug Band, a longtime aide to Bill Clinton, Band explains how he worked for years to raise $46 million for the Foundation through the Clinton Global Initiative, while also leveraging his relationships with corporate sponsors to secure lucrative speaking arrangements and consulting gigs for the former president. Band, who wrote the 12-page memo in response to an internal audit being conducted by lawyers for the Clinton Foundation, described the money-making endeavor as “Bill Clinton, Inc.”

            Those for-profit activities largely involved “speeches, books, and advisory service engagements” in which Band and his private consulting firm, Teneo, acted as “agents, lawyers, managers, and implementers.” Teneo also negotiated “in-kind services for the President and his family—for personal travel, hospitality, vacation, and the like.” By 2011, Bill Clinton had secured over $50 million in compensation and received an additional $66 million in future contracts, according to the memo. Among the deals were a number of paid speeches to corporations including banks like UBS and Barclays, and an $18 million arrangement to serve as “honorary chancellor” for Laureate International Universities, a for-profit college. Some foundation donors were also clients of Teneo, although there is no evidence of any quid pro quo.

          • WikiLeaks-released memo outlines Bill Clinton’s lucrative speeches

            In the memo, Band details how he set up for-profit deals for the former president, both involving money and “as appropriate, in-kind services for the President and his family — for personal travel, hospitality, vacation and the like.”

            Band’s memo covers 2001 to 2011, during which time “President Clinton’s business arrangements have yielded more than $30 million for him personally with $66 million to be paid out over the next nine years, should he choose to continue with the current engagements.”

        • Censorship/Free Speech

          • Musical Space: Censorship

            As you can imagine, the Nazis and the Soviet Union clamped down hard on music. Not only were many pieces permanently taken from society, but their composers as well. Modern Russia has also done its share; witness the imprisonment of the feminist Russian protest-punk band Pussy Riot in 2012.

          • Internet Celebrity ‘Bardock Obama’ Talks Censorship, ‘Dragon Ball Super’ In Interview [Exclusive]

            Censorship isn’t fun. Sure, some things need to be censored, but the politically correct world that we live in now has caused many people to fear expressing their opinions, even if it’s something harmless or backed by facts. You have a political view? Well, maybe you should hold it back because others may disagree. You don’t like a certain athlete’s protest of the national anthem? Delete that Instagram post because you’re going to get death threats. Fear has consumed us like a fire in a time of needing to please everyone, and it’s causing both panic and frustration among social media users.

          • With Interest In Profile Defenders’ Questionable Lawsuits Rising, The Lawsuits Start Falling

            Earlier this year, we were among the first to write about the highly questionable practice of “reputation management” companies filing clearly bogus lawsuits against unknown defendants, only to magically have those “defendants” show up a day or two later with an agreement that they had posted defamatory content. The goal of these lawsuits was obvious: get a court order. That’s because many platform websites, including Google, won’t take down or delink content based on a claim of defamation, but will do so if there’s a court order. Of course, filing a real lawsuit has all sorts of problems, including money and actually needing to have a real case. These reputation management lawsuits got around all of that by basically faking defendants, having them “agree” to a settlement admitting to defamation, and getting a court order saying that the content is defamatory. Neat and clean. And total abuse of legal process.

            Last month, Public Citizen’s Paul Levy (who has helped defend Techdirt against some legal bullies) picked up on this thread and found evidence of more bogus lawsuits. A few weeks ago, he and famed law professor Eugene Volokh teamed up to reveal more details on a series of such lawsuits, which all seemed to be connected back to a guy named Richart Ruddie and an operation that goes by a bunch of names, but mainly Profile Defenders. It appears that Ruddie/Profile Defenders is not the only one filing these kinds of lawsuits, but he’s been prolific. So far, Ruddie’s only response is a bizarre press release touting his “anti-cyberbullying skills.”

          • Pissed Consumer Sues Reputation Management Firms Over Their Bogus Lawsuit/Fake Defendant/Takedown Scams

            In the last few weeks, we’ve written a few posts about Richart Ruddie’s company, Profile Defenders, which appears to be “improving reputations” online by filing bogus defamation lawsuits, finding a bogus made-up “defendant” to “admit” to posting defamatory information, reaching a “settlement” and getting a court order. The whole scheme is about getting that court order, which is then sent on to Google and others (mainly Google). The whole point: if Google sees a court order saying that some content is defamatory, it will de-index that page. That the whole process to get that court order is a total sham is basically ignored. That may be changing. We were just noting that some of Profile Defenders’ cases are in trouble, and at least one has had the court order vacated.

          • Facebook’s Arbitrary Offensiveness Police Take Down Informational Video About Breast Cancer Screening

            Stories of Facebook’s attempt at puritanical patrols of its site are legion at this point. The site has demonstrated it cannot filter out parody, artwork, simple speech in the form of outrage, iconic historical photos, or sculpture from its prude-patrol censorship. As a private company, Facebook is of course allowed to follow its own whim when it comes to what is allowed on its site, but as an important tool in this era for communication and speech, the company is also a legitimate target for derision when it FUBARs this as badly as it does so often.

            So queue up the face-palming once more, as Facebook has decided to remove a video posted by a Swedish cancer charity informing women how to check for breast cancer, because the video included animated breasts, and breasts are icky icky.

          • Amazon slammed for censoring female erotica writer Anais Nin

            THERE’S a new book out by 20th century erotica pioneer Anais Nin — but you won’t find it if you search on Amazon.

            The world’s largest bookseller has black-listed erotica collection Auletris, the latest posthumous Nin work, after its publisher refused to edit the text to remove its more salacious details.

            But Nin’s literary cult following has slammed the retailer for “hypocrisy”, arguing that its censorship policy is haphazard and nonsensical.

            Long before the 50 Shades of Grey phenomenon brought erotic fiction to the mainstream, French bohemian Anais Nin penned the writings that would see her hailed by critics as among the best authors of female erotica.

            Delta of Venus and Little Birds, erotica collections published in the late 1970s after Nin’s death,can both be searched and bought on Amazon.

          • Putting a muzzle on the right to disagree
          • Read This Dad’s Perfect Response To An Ironic School Permission Slip
          • This Kid Needed A Permission Slip To Read ‘Fahrenheit 451′, & Dad’s Response Was Perfect
          • Daily Show Writer’s Reaction Letter On Censorship Goes Viral
          • 8th Grader Has to Have a Permission Slip Signed to Read ‘Fahrenheit 451,’ Dad Responds Epically
        • Privacy/Surveillance

          • Alibaba’s Boss Says Chinese Government Should Use Big Data Techniques On Its ‘Citizen Scores’ Surveillance Store

            He gave a concrete example of how big data techniques could be used in this context (original in Chinese). He said that there was nothing suspicious about somebody buying a pressure cooker or a clock, nor anything suspicious about someone buying ball bearings. But if somebody buys all of them together, you have a suspicious pattern. His suggestion that data mining techniques applied to everyday purchases might help the authorities to spot these patterns and to stop criminals before they act — a familiar enough idea — indicates that he is thinking of China’s plans to track every transaction from every shop as part of its “citizen scores” project.

            Once that data is gathered, it would indeed be possible to start applying big data techniques as a matter of course in order to spot correlations — something already being used on Internet data by the NSA and GCHQ. But Ma’s suggestion is to go even further, and to analyze every digital breadcrumb people drop for possible significance when combined with more data points, whether their own or of others.

          • Google’s Quiet, Confusing Privacy Policy Change Is Why We Need More Transparency & Control

            Last week, I wrote about how privacy is about tradeoffs, and despite what some people claim, there’s no such thing as “absolute privacy,” nor would you actually want something approximating what people think they mean by it. The real issue is the tradeoff. People are quite willing to trade certain information in exchange for value. But, the trade has to be clear and worth it. That’s where the real problems come in. When we don’t know what’s happening with our data, or it’s used in a sneaky way, that’s when people feel abused. Give people a clear understanding of what they’re giving and what they’re getting and you eliminate most of the problem. Then give end users greater control over all of this and you eliminate even more of the problem.

            This was our thinking in designing a Privacy Bill of Rights for companies to abide by in designing their services (along with EFF and Namecheap).

            It appears that Google would fail to meet the standards of that bill of rights. Last week, ProPublica wrote about how Google quietly changed the privacy policy related to how it connects DoubleClick advertising to other data that it has about you, allowing the company to actually link your name and other identifying information to you as you surf around the web. And, on top of that, it apparently includes tying what you type in Gmail to the ads you might see.

          • Pardoning Edward Snowden

            New attention is being paid to American exile Edward Snowden these days with the release of a movie by filmmaker and screenwriter Oliver Stone. Titled “Snowden,” it looks into what drove the National Security Agency (NSA) contract worker to take top secret documents from his workplace.

            More attention to Snowden is also being generated with the calls by Amnesty International, Human Rights Watch and the American Civil Liberties Union for President Barack Obama to pardon him.

          • Former NSA contractor again asks to be released from jail after alleged document theft

            A former National Security Agency contractor charged with stealing government property and taking classified information appealed to be released from prison in a motion Tuesday as he awaits trial.

            Harold T. Martin III, 51, of Glen Burnie, was charged in August with stealing 50 terabytes of information over two decades. Martin’s lawyers have not denied the theft but have characterized him as a hoarder who started taking documents home to help him get better at his job.

            On Friday, Martin’s lawyers tried to convince a judge to release him, but Magistrate Judge A. David Copperthite ruled he was a flight risk and had to remain in jail.

          • “He’s not Edward Snowden,” lawyers for accused NSA contractor tell judge

            Defense attorneys representing Harold Martin, the former National Security Agency contractor accused of stealing a vast quantity of classified materials, have asked a more senior judge to review the decision that kept their client in federal custody.

            On Tuesday, Martin’s federal public defenders filed a “motion to review detention order,” asking US District Judge Richard D. Bennett to overrule his more junior colleague’s decision last Friday to keep Martin behind bars.

            In August, when Martin was arrested, investigators seized 50 terabytes’ worth of data and many other printed and classified documents from Martin’s home in suburban Maryland. If all of this data was indeed classified, it would be the largest such heist from the NSA, far larger than what former contractor Edward Snowden took.

            During last week’s hearing, James Wyda, one of Martin’s lawyers, told US Magistrate Judge A. David Copperthite that his client “is not Edward Snowden. He’s not someone who, due to political ideas or philosophical ideas or moral principles, thinks he knows better than everybody else.”

          • Yahoo Asks James Clapper To Please Let It Talk About The Email Scanning It Did For The Government

            “Does not exist” is not nearly the same thing as “did not exist.” This means Yahoo is no longer scanning emails in this fashion, not that it never performed this scanning.

            The letter does make a good point about transparency. Currently, Yahoo is unable to defend itself against any allegations because it is likely under a gag order. Yahoo would like Clapper’s office to share in the public pain, especially since it had a problem sharing in the communications gathered on its behalf by the email provider.

            Public embarrassment or not, Clapper’s office is probably not rushing through a declassification review of this Section 702 FISA order. It could still be months or years before the government produces this document and/or allows Yahoo to speak openly about its email scanning program.

            Perhaps recognizing that a displeased letter to the ODNI doesn’t create much leverage, the company appears to be making this a global issue, rather than simply a domestic one. Marcy Wheeler points out that the letter mentions Yahoo’s global reach and users several times and namechecks the EU’s Privacy Shield agreement. This may be the key that loosens the Intelligence Community’s Glomarred lips.

          • ACLU Sues Government Over Unreleased FISA Court Opinions

            The US government is still holding onto its opacity ideals while publicly touting transparency directives. The FISA court — which presides over the NSA’s surveillance programs — has normally been completely shrouded in darkness. Things changed in 2013 after Ed Snowden began leaking documents.

            Forced into a conversation about domestic surveillance, the administration responded with more transparency promises and the signing of the USA Freedom Act into law. The new law curtailed the collection of domestic business records (phone metadata and other third-party records) and required the court to make its opinions public following declassification reviews.

            All well and good, but the government has apparently decided the new law only requires transparency going forward. FISA opinions dating back to 2001 still remain locked up, despite transparency promises and reform efforts.

          • Kuwait Backtracks On Mandatory DNA Database Of All Citizens And Visitors

            A few weeks ago, we reported on a move by some public-spirited lawyers in Kuwait to challenge an extraordinary new law that would require everyone in the country — citizens and visitors like — to provide their DNA for a huge new database. It seemed like a quixotic move, since the Kuwaiti authorities were unlikely to be intimidated by a bunch of lawyers.

          • Cyber after Snowden

            The damage, scar tissue, and cleanup process in a post-Snowden world

        • Internet Policy/Net Neutrality

          • Netflix CEO Wary That AT&T’s Latest Merger Could Hurt Streaming Competitors

            Streaming video competitors are justifiably nervous about AT&T’s $85 billion acquisition of Time Warner. Consumer advocates have been raising alarm bells since the deal was announced, warning that AT&T could make it more difficult than ever for streaming providers to gain access to the content they’ll need to compete with AT&T’s upcoming DirecTV Now streaming service. They’re also concerned that AT&T will continue to use zero rating to give its own content a distinct advantage, while penalizing streaming competitors like Netflix and Amazon.

          • Google Fiber Announces Layoffs & Deployment Pause, Will Likely Pivot To Wireless

            Back in August a report emerged claiming that Google Fiber executives were having some second thoughts about this whole “building a nationwide fiber network from the ground up” thing. More specifically, the report suggested that some executives were disappointed with the slow pace of digging fiber trenches, and were becoming bullish on the idea of using next-gen wireless to supplement fiber after acquiring fixed wireless provider Webpass. As such, the report said the company was pondering some staff reductions, some executive changes, and a bit of a pivot.

            Fast forward to this week when Access CEO Craig Barrett posted a cheery but ambiguous blog post not only formally announcing most of these changes, but his own resignation as CEO. According to Barrett, Google will continue to serve and expand Google Fiber’s existing markets (Austin, Atlanta, Charlotte, Kansas City, Nashville, Provo, Salt Lake City, and The Triangle in North Carolina), and will also build out previously-announced but not yet started efforts in Huntsville, Alabama; San Antonio, Texas; Louisville, Kentucky; and Irvine, California.

          • Alphabet Cutting Jobs in Google Fiber Retrenchment

            Google in the past two years put in place plans to expand its Fiber fast internet service to more than 20 cities. Inside the company, executives harbored bigger ambitions: to deliver service nationwide and upend the traditional broadband industry.

            Google parent Alphabet Inc. reset the project on a more humble footing on Tuesday. Craig Barratt, head of the Access unit that includes Google Fiber, is leaving, and about 9 percent of staff is being let go, according to a person familiar with the situation. The business has about 1,500 employees, meaning there will be more than 130 job losses.

        • Intellectual Monopolies

          • Trademarks

            • As The Cubs Head To The World Series, The Team Is Also Raging Against Single-Word Trademarks

              On the bright side, I suppose, if the plan by the Cubs was to undertake an overly aggressive stance on trademark protection every round of the playoffs, there’s only one round left, so this should be it. We had just been discussing that as the team entered the League Series to attempt to make the World Series, it had filed a lawsuit against the many street vendors that line the path to Wrigley Field for selling counterfeit merchandise. This suit, while perfectly within the rights of the team, bucked a decades-long trend of allowing those sales. It was part of the tradition of going to a game, walking by these vendors and seeing their kooky designs. Another tradition for the team is raising a blue “W” flag whenever they win. That “W” was part of trademark opposition by the Cubs and MLB when a business unrelated to the professional sports market dared to use the single letter in a logo for its financial services product.

              And now it seems that, on the eve of the World Series, the Cubs are going after more than one kind of W still, as well as the letter C.

            • Car-Freshener Wields Little Trees Trademark To Bankrupt Non Profit That Helped Ex-Cons And Recovering Addicts

              Back in August, Mike wrote about a trademark case between Car-Freshner Corp., the company that makes those ubiquitous tree-shaped air-fresheners, and Sun Cedar, a tiny non-profit that made real-wood fresheners while employing at-risk folk in the form of the homeless, ex-cons and recovering addicts. It was a strange case for any number of reasons, including the dissimilar appearance between the product of the two companies, the wide delta of size of the two companies, and the very nature of the work Sun Cedar was attempting to do as a social good. Sadly but unsurprisingly, Car-Freshner trotted out the excuse that it had to sue this small non-profit or risk losing its trademarks.

              And now it seems like, rather than working out some other kind of arrangement that would have allowed Sun Cedar’s good work to continue, the trademark dispute has resulted in the end of the non-profit entirely, at least in its current iteration. Even with an attorney agreeing to represent the non-profit for free, the costs of taking on the suit in far-off NYC simply killed the whole operation.

            • Trademark Suit Dashes Hopes Of Lawrence Company That Hired The Homeless

              The company that filed the suit, Car-Freshner Corp. of Watertown, New York, is known for its aggressive defense of its trademark. It once sued a greeting card company for using a scratch-and-sniff air freshener shaped like a tree.

              Mediation efforts between Sun Cedar and Car-Freshner were unsuccessful and last month Sun Cedar filed for Chapter 7 bankruptcy. Its shop, a converted garage, now sits idle. The equipment Adams purchased will be sold to pay off Sun Cedar’s debts.

          • Copyrights

            • The Reason The Copyright Office Misrepresented Copyright Law To The FCC: Hollywood Told It To

              There was some oddity over the summer, when the Copyright Office flat out misrepresented copyright law to Congress and the FCC with regard to the impact on copyright of the FCC’s (now dead) proposal to create competition among set top box providers. As we’ve explained over and over again, there were no copyright implications with the FCC’s proposal. All it said was that if an authorized user wanted to access authorized content via a third party device, that authorized user should be able to do so. And yet, the Copyright Office, incorrectly, seemed to make up an entirely new exclusivity in copyright law (one that would outlaw DVRs) that basically said not only could a content provider license content to a cable TV provider, but it could also limit the devices on which end users could view that content.

              Simply put: that’s wrong. That’s not how copyright law works, and we’ve known that since the Supreme Court’s ruling in the Betamax case decades ago.

              But why would the Copyright Office so misrepresent copyright law? That was the perplexing part. Even with a bunch of copyright professors explaining how wrong the Copyright Office was, the Office still went ahead with its letter. Of course, as with so many policy issues, it really seemed like the Copyright Office was just acting like a lobbying arm of Hollywood.

            • Linking to unlicensed content: Swedish court applies GS Media

              In 2012 the claimant (Rebecka Jonsson) filmed a bungee jumping session gone wrong in Africa.

              Someone (not Ms Jonsson) uploaded the video on YouTube. On 9 January 2012 the YouTube video was embedded on the L’Avenir website run by the defendant, in the context of an article describing the incident.

              The claimant had neither authorised the publication of the video on YouTube, nor its embedding in the L’Avenir article.

              In her action before the Attunda District Court, Ms Jonsson claimed that L’Avenir had infringed copyright in her video by both embedding it on its website and publishing a frozen still of the video. She sought damages for EUR 1931 against the defendant, as well as award of litigation costs.

              The Swedish court stated at the outset that the video is protected by Swedish copyright law, and noted how the circumstance for which the claimant’s video was (and still is) available on YouTube does not mean that no copyright infringement has occurred. This is because the claimant had not authorised the publication of the video on YouTube, nor – apparently – anywhere else on the internet.

            • Shameful: Perfectly Reasonable Academic Book On Gene Kelly Killed By Bogus Copyright Claims

              Remember when a copyright maximalist think tank guy insisted that copyright would never, ever be used for censorship? Well, about that…

              Earlier this year, we wrote about a crazy lawsuit filed by Gene Kelly’s widow, after finding out that a college professor named Kelli Marshall was working on a book collecting interviews with Gene Kelly. Marshall and her publisher reached out to a number of people associated with those interviews to clear any legitimate copyright claims (interview collection books are pretty common, and the copyright issue rarely gets in the way). Kelly’s widow, Patricia Ward Kelly, claimed that she held the copyright on all of Gene Kelly’s interviews, and sued Marshall for infringement. This was crazy for a variety of reasons, starting with the fact that the person being interviewed very rarely holds a copyright in the words they said (and Kelly’s widow made a mad dash to the copyright office to try to register these interviews right before suing). There’s also the whole fair use thing.

        ]]>
        http://techrights.org/2016/10/27/nextcloud-targets-phones/feed/ 0
        Links 23/10/2016: Alcatel’s New Android Smartphones, Another Honorary Doctorate for Stallman http://techrights.org/2016/10/23/another-honorary-doctorate-for-stallman/ http://techrights.org/2016/10/23/another-honorary-doctorate-for-stallman/#comments Sun, 23 Oct 2016 16:12:58 +0000 http://techrights.org/?p=96331

        GNOME bluefish

        Contents

        GNU/Linux

        Free Software/Open Source

        • The basics of open source quality assurance

          Open source depends on a sustainable community to develop code rapidly, debug code effectively, and build out new features. Because community involvement is voluntary, people’s skills, levels of involvement, and time commitments can vary. Given the variable nature of these factors, along with the fact that open source often relies on a philosophy of “release early, release often,” quality assurance can be become challenging.

        • An Open Source, Self-Hosted Heroku

          Running our own Heroku… It shouldn’t be that hard, right?

          We have a small set of servers we use to run our internal applications. Nothing too complex, just monitoring, our ELK stack, Jenkins, and a few internal services.

          Given our rather modest requirements it may seem obvious that our first attempt at deployment automation, Chef, was a bit overkill for our needs. Not only that, we also wanted our engineers to be able to easily deploy applications to our servers without having to set up a Chef recipe — like the role Heroku plays in many of our client projects. We could have decided to run our internal applications on Heroku as well, but their pricing model wasn’t compatible with our relatively small-scale requirements.

        • The role of Free Software in a world that doesn’t care

          The Free Software movement is about personal and social liberties. Giving the owner and user of a computer control over it. But most people don’t see the problem with a small number of multinational mega-corporations having control over everyone’s computers. They think: “Apple and Microsoft know what they’re doing, and they do a good job, so why would I need Free Software?”

          Accepting that most people reject the Free Software message, what can the Free Software movement contribute to the world?

        • 5 Best Open Source Mobile Test Automation Tools

          There is a wide range of devices and platforms one needs to account for when developing a mobile app. An automation app for Mobile Testing can save development and testing time. Here are 5 top open source automated mobile testing frameworks to use, including the likes of Appium, Robotium, and Selendroid.

        • Could open-source coding ‘save the world’?

          Open Source Day is one of the most popular events at the Grace Hopper Celebration of Women in Computing. This year, a day-long open-source hackathon was devoted to participants developing open-source projects for humanitarian causes.

          Neetu Jain, product manager at SoftLayer, an IBM Company, and Daniela Dorneanu, solution developer and product trainer at Appway, joined Rebecca Knight (@knightrm), co-host of theCUBE, from the SiliconANGLE Media team, during the Grace Hopper event to discuss the mission of Open Source Day and the goal of the hackathon for humanity.

        • Yahoo open sources NSFW neural network porn detector

          Embattled former darling of the search wars Yahoo has open sourced its neural network porn detector software.

          The firm has explained that it is in fact tremendously difficult to automatically identifying that an image is not suitable/safe for work (NSFW).

        • Events

          • An introduction to color spaces

            The Kernel Recipes conference is, unsurprisingly, focused on kernel-related topics, but one of the potentially most useful talks given there was only marginally about the kernel. Applications that deal with the acquisition or display of video data must be aware of color spaces, but few developers really understand what color spaces are or how they work. Media subsystem maintainer Hans Verkuil sought to improve this situation with an overview of the color-space abstraction.

          • A tale of two conferences

            The “small” criterion can be a bit of a problem since it, naturally, limits the number of people who can participate in this kind of event. The Linux Plumbers Conference (now just a few weeks away) is always trying to find the right balance between size and quality of the event, and there, too, tickets tend to sell out quickly. The nice thing about an event like Kernel Recipes, though, is that it ought to be reproducible in other parts of the world. We have a ready supply of good speakers and interesting things to talk about in our community, and it doesn’t take that many speakers to make an event like this work.

            In the end, it was a privilege to be able to attend both events. Your editor’s only regret was being unable to stay in Berlin for the Embedded Linux Conference Europe the following week. Conferences are an opportunity to get a sense for what is happening in our community and to renew one’s enthusiasm and energy; both LinuxCon and Kernel Recipes succeeded on all of those fronts. A diverse community needs a diverse range of events; happily, that is just what was in store in Europe during these weeks.

          • All Things Open Next Week – MCing, Talks, and More

            I was really impressed with All Things Open last year and have subsequently become friends with the principle organizer, Todd Lewis. I loved how the team put together a show with the right balance of community and corporation, great content, exhibition and more.

        • Web Browsers

        • Oracle/Java/LibreOffice

          • Seafile and Collabora make LibreOffice Online available for Seafile Pro

            Collabora Productivity, the driving force behind putting LibreOffice in the Cloud, and Seafile, a leading open source file sharing vendor, announce the availability of Collabora Online in the newly released Seafile pro edition 6.0.

          • Office Binary Document RC4 CryptoAPI Encryption

            In LibreOffice we’ve long supported Microsoft Office’s “Office Binary Document RC4 Encryption” for decrypting xls, doc and ppt. But somewhere along the line the Microsoft Office encryption scheme was replaced by a new one, “Office Binary Document RC4 CryptoAPI Encryption”, which we didn’t support. This is what the error dialog of…

        • CMS

          • Open Source CMS Pros and Cons – a Developer’s Perspective

            The phrase “Open Source CMS” lingers in the minds and hearts of many developers. CMSes are today’s talk of the Internet, and you won’t miss the discussion in local schools and private offices either. I don’t remember for how long I have used Open Source Content Management Systems (CMS) to manage local and international websites. However, I have implemented CMS-based solutions long enough, and I can tell you from experience these tools did become the big digital craze for many professional reasons.

        • Pseudo-Open Source (Openwashing)

        • BSD

        • FSF/FSFE/GNU/SFLC

        • Openness/Sharing/Collaboration

        • Programming/Development

          • Eclipse Foundation Collaboration Yields Open Source Technology for Computational Science

            The gap between the computational science and open source software communities just got smaller – thanks to a collaboration among national laboratories, universities and industry.

          • PyCon India 2016

            “This is awesome!”, this was my first reaction when I boarded my first flight to Delhi. I was having trouble in finding a proper accommodation Kushal, Sayan and Chandan helped me a lot in that part, I finally got honour of bunking with Sayan , Subho and Rtnpro which I will never forget. So, I landed and directly went to JNU convention center. I met the whole Red Hat intern gang . It was fun to meet them all. I had proposed Pagure for Dev Sprint and I pulled in Vivek to do the same.

            The dev sprint started and there was no sign of Vivek or Saptak, Saptak is FOSSASIA contributor and Vivek contributes to Pagure with me. Finally it was my turn to talk about Pagure on stage , it was beautiful the experience and the energy. We got a lot of young and new contributors and we tried to guide them and make them send at least one PR. One of them was lucky enough to actually make a PR and it got readily merged.

          • Hack This: An Overdue Python Primer

            In writing the most recent Hack This (“Scrape the Web with Beautiful Soup”) I again found myself trapped between the competing causes of blog-brevity and making sure everything is totally clear for non-programmers. It’s a tough spot! Recapping every little Python (the default language of Hack This) concept is tiring for everyone, but what’s the point in the first place if no one can follow what’s going on?

            This post is then intended then as a sort of in-between edition of Hack This, covering a handful of Python features that are going to recur in pretty much every programming tutorial that we do under the Hack This name. A nice thing about Python is that it makes many things much clearer than is possible in almost any other language.

          • Why I won’t be attending Systems We Love

            Here’s one way to put it: to me, Bryan Cantrill is the opposite of another person I admire in operating systems (whom I will leave unnamed). This person makes me feel excited and welcome and safe to talk about and explore operating systems. I’ve never seen them shame or insult or put down anyone. They enthusiastically and openly talk about learning new systems concepts, even when other people think they should already know them. By doing this, they show others that it’s safe to admit that they don’t know something, which is the first step to learning new things. They are helping create the kind of culture I want in systems programming – the kind of culture promoted by Papers We Love, which Bryan cites as the inspiration for Systems We Love.

            By contrast, when I’m talking to Bryan I feel afraid, cautious, and fearful. Over the years I worked with Bryan, I watched him shame and insult hundreds of people, in public and in private, over email and in person, in papers and talks. Bryan is no Linus Torvalds – Bryan’s insults are usually subtle, insinuating, and beautifully phrased, whereas Linus’ insults tend towards the crude and direct. Even as you are blushing in shame from what Bryan just said about you, you are also admiring his vocabulary, cadence, and command of classical allusion. When I talked to Bryan about any topic, I felt like I was engaging in combat with a much stronger foe who only wanted to win, not help me learn. I always had the nagging fear that I probably wouldn’t even know how cleverly he had insulted me until hours later. I’m sure other people had more positive experiences with Bryan, but my experience matches that of many others. In summary, Bryan is supporting the status quo of the existing culture of systems programming, which is a culture of combat, humiliation, and domination.

            [...]

            He gaily recounts the time he gave a highly critical keynote speech at USENIX, bashfully links to a video praising him at a Papers We Love event, elegantly puts down most of the existing operating systems research community, and does it all while using the words “ancillary,” “verve,” and “quadrennial.” Once you know the underlying structure – a layer cake of vituperation and braggadocio, frosted with eloquence – you can see the same pattern in most of his writing and talks.

        Leftovers

        • Hardware

          • Macs are 3 times cheaper to own than Windows PCs, says IBM’s IT guy

            Fletcher Previn could be one of the funniest IBM vice presidents the company employs.

            Before achieving what he jokes as his “true life-long ambition of middle management at IBM” he worked as an intern on the “Late Show with David Letterman” and did a stint for Conan O’Brian, too, he told attendees at the Jamf tech conference.

          • You guys, I got my Ono-Sendai working again!

            I’ve had this terminal sitting under my desk gathering dust for… close to two decades, I think. This is an Ann Arbor Ambassador 60, manufactured in 1982 or 1983. It is a terminal. You probably think that word means “a GUI window that runs a command line shell in it”. You think this thing must be a computer because it looks like what computers used to look like. But it is not a computer, it is a peripheral. This object consists of a keyboard, a serial port, and a CRT screen, and that’s about it. A screen, I must emphasize, that is capable of displaying only text, and that text can be in any two colors you like, as long as those colors are green and black.

            Look at the sustain on that phosphor. Just look at it! The video is a little long, but it’s moody.

            You plug the serial port on the back into the serial port of your mainframe, or into a modem, and boom, Thus We Go Forth Into Cyberspace.

        • Health/Nutrition

          • Your groceries may be cheaper, but farmers and supermarkets feel the pain

            If you’re just a little irked that gasoline prices have edged up recently, maybe this will cheer you up: Groceries are a bargain.

            Average supermarket prices fell 2.2% in September from a year ago, the most since late 2009, and they’ve been down on an annual basis for 10 straight months, the longest such streak since 1959-60, Labor Department figures this week showed.

            But while that breakfast of eggs, toast and bacon may not be putting as big of a dent in your wallet, falling prices at the checkout are spreading hardship across the nation’s farm belt and hammering the earnings of grocery chains.

          • ‘If I could afford to leave, I would.’ In Flint, a water crisis with no end in sight.

            Even now, the people of Flint, Mich., cannot trust what flows from their taps.

            More than one year after government officials finally acknowledged that an entire city’s water system was contaminated by lead, many residents still rely on bottled water for drinking, cooking and bathing.

            Parents still worry about their kids. Promised aid has yet to arrive. In ways large and small, the crisis continues to shape daily life.

          • EPA Bows to Industry in Delay of Glyphosate Cancer Review

            However, the EPA Scientific Advisory Panel (SAP) meetings were “postponed,” just four days before they were suppose to meet, after intense lobbying by the agrichemical industry, including Monsanto. The industry first fought to keep the meetings from being held at all, and argued that if they were held, several leading international experts should be excluded from participating, including “any person who has publicly expressed an opinion regarding the carcinogenicity of glyphosate.”

            As the meetings drew near, CropLife America, which represents the interests of Monsanto and other agribusinesses, specifically took issue with at least two scientists chosen for the panel, alleging the experts might be unfavorably biased against industry interests. On Oct. 12, the group sent a letter to the EPA calling for Dr. Kenneth Portier of the American Cancer Society to be more deeply scrutinized for any “pre-formed conclusions” about glyphosate. More notably, CropLife called for leading epidemiologist Dr. Peter Infante to be completely disqualified from panel participation.

            “EPA should replace Dr. Infante with an epidemiologist without such patent bias,” CropLife told the EPA. The chemical industry group said Infante was unlikely to give industry-sponsored research studies the credibility the industry believes they deserve. CropLife said Infante has testified in the past for plaintiffs in chemical exposure cases against Monsanto.

          • ‘Drug Dependence Hasn’t Been Stopped by 45 Years of the War on Drugs’

            Janine Jackson: “Police Arrest More People for Marijuana Use than for All Violent Crimes Combined” is the headline in the Washington Post. In the New York Times, it’s “Marijuana Arrests Outnumber Those for Violent Crimes, Study Finds.”

        • Security

          • Friday’s security updates
          • World’s first hack-proof Wi-Fi router with open source firmware is here

            Turris Omnia WiFi Router, the world’s first hack-proof router with open source firmware launched yesterday at the CES Unveiled Show in Prague, Czech Republic.

          • Open-source hack-proof router aims to close cyber security gap

            Routers are the gateway of every home internet network. Yet, while many computers run antivirus software, little has been done thus far to protect routers against cyber threats. A new device, described as the world’s first hack-proof router, was launched on Thursday at the CES Unveiled Show in Prague.

            The main strength of the Turris Omnia router, a spin-out of a cyber security research project by Czech Republic’s domain administrator NIC.cz, is the fact that it automatically updates and patches vulnerabilities as they become known.

          • Adding a phone number to your Google account can make it LESS secure.

            Recently, account takeovers, email hacking, and targeted phishing attacks have been all over the news. Hacks of various politicians, allegedly carried out by Russian hackers, have yielded troves of data. Despite the supposed involvement of state-sponsored agents, some hacks were not reliant on complex zero-day attacks, but involved social engineering unsuspecting victims. These kinds of attacks are increasingly likely to be used against regular people. This recently happened to a friend of mine:

            Two weeks ago, an ex-colleague (actually, my officemate at Google way back in 2002) — let’s call him Bob — had his Google account compromised while on vacation in Hawaii. With his primary email account compromised, the attacker could have:

          • “Dirty COW”, the most dangerous Linux Bug for the last 9 years

            Red Hat, the leading open source software developer firm, has revealed that Linux Kernel has been infected with a serious bug for the past 9 years. The bug has been dubbed as Dirty Cow. It is deemed dangerous because through this bug, an attacker can get write access to read-only memory.

          • Serious Dirty COW bug leaves millions of Linux users vulnerable to attack
          • Cyber attack: hackers ‘weaponised’ everyday devices with malware to mount assault

            The huge attack on global internet access, which blocked some of the world’s most popular websites, is believed to have been unleashed by hackers using common devices like webcams and digital recorders.

            Among the sites targeted on Friday were Twitter, Paypal and Spotify. All were customers of Dyn, an infrastructure company in New Hampshire in the US that acts as a switchboard for internet traffic.

            Outages were intermittent and varied by geography, but reportedly began in the eastern US before spreading to other parts of the country and Europe.

            Users complained they could not reach dozens of internet destinations, including Mashable, CNN, the New York Times, the Wall Street Journal, Yelp and some businesses hosted by Amazon.

          • Homeland Security Is ‘Investigating All Potential Causes’ of Internet Disruptions

            Cyber attacks targeting a little known internet infrastructure company, Dyn, disrupted access to dozens of websites on Friday, preventing some users from accessing PayPal, Twitter and Spotify.

            It was not immediately clear who was responsible for the outages that began in the Eastern United States, and then spread to other parts of the country and Western Europe.

            The outages were intermittent, making it difficult to identify all the victims. But technology news site Gizmodo named some five dozen sites that were affected by the attack. They included CNN, HBO Now, Mashable, the New York Times, People.com, the Wall Street Journal and Yelp.

          • Blame the Internet of Things for Destroying the Internet Today

            A massive botnet of hacked Internet of Things devices has been implicated in the cyberattack that caused a significant internet outage on Friday.

            The botnet, which is powered by the malware known as Mirai, is in part responsible for the attack that intermittently knocked some popular websites offline, according to Level 3 Communications, one of the world’s largest internet backbone providers, and security firm Flashpoint.

            “We are seeing attacks coming from a number of different locations. We’re seeing attacks coming from an Internet of Things botnet that we identified called Mirai, also involved in this attack,” Dale Drew, chief security officer at Level 3 Communications, said on a livestream on Friday afternoon.

          • How to Understand Today’s Internet Outage in 4 Words

            A massive DDoS attack against a major DNS service likely using a botnet of IoT devices resulted in Internet issues across the eastern United States Friday, making it hard for many users to access their favorite sites.

            Phew. That’s a lot of acronyms.

          • IoT Can Never Be Fixed

            This title is a bit click baity, but it’s true, not for the reason you think. Keep reading to see why.

            If you’ve ever been involved in keeping a software product updated, I mean from the development side of things, you know it’s not a simple task. It’s nearly impossible really. The biggest problem is that even after you’ve tested it to death and gone out of your way to ensure the update is as small as possible, things break. Something always breaks.

            If you’re using a typical computer, when something breaks, you sit down in front of it, type away on the keyboard, and you fix the problem. More often than not you just roll back the update and things go back to the way they used to be.

          • Hacked Cameras, DVRs Powered Today’s Massive Internet Outage

            A massive and sustained Internet attack that has caused outages and network congestion today for a large number of Web sites was launched with the help of hacked “Internet of Things” (IoT) devices, such as CCTV video cameras and digital video recorders, new data suggests.

            Earlier today cyber criminals began training their attack cannons on Dyn, an Internet infrastructure company that provides critical technology services to some of the Internet’s top destinations. The attack began creating problems for Internet users reaching an array of sites, including Twitter, Amazon, Tumblr, Reddit, Spotify and Netflix.

          • How an army of vulnerable gadgets took down the web today

            At some point this morning, one of the US’s critical internet infrastructure players was hit with a staggering distributed denial of service (DDoS) attack that has taken out huge swaths of the web. Sites like Twitter, Netflix, Spotify, Reddit, and many others — all clients of a domain registration service provider called Dyn — have suffered crippling interruptions and, in some cases, blanket outages.

            Details are now emerging about the nature of the attack. It appears the cause is what’s known as a Mirai-based IoT botnet, according to security journalist Brian Krebs, who cited cyber-threat intelligence firm Flashpoint. Dyn’s chief strategy officer Kyle Owen, who spoke with reporters this afternoon, later confirmed Flashpoint’s claim, revealing that traffic to its servers was clogged with malicious requests from tens of millions of IP addresses in what the company is calling a “very sophisticated and complex attack.”

          • Fixing the IoT isn’t going to be easy

            A large part of the internet became inaccessible today after a botnet made up of IP cameras and digital video recorders was used to DoS a major DNS provider. This highlighted a bunch of things including how maybe having all your DNS handled by a single provider is not the best of plans, but in the long run there’s no real amount of diversification that can fix this – malicious actors have control of a sufficiently large number of hosts that they could easily take out multiple providers simultaneously.

            To fix this properly we need to get rid of the compromised systems. The question is how. Many of these devices are sold by resellers who have no resources to handle any kind of recall. The manufacturer may not have any kind of legal presence in many of the countries where their products are sold. There’s no way anybody can compel a recall, and even if they could it probably wouldn’t help. If I’ve paid a contractor to install a security camera in my office, and if I get a notification that my camera is being used to take down Twitter, what do I do? Pay someone to come and take the camera down again, wait for a fixed one and pay to get that put up? That’s probably not going to happen. As long as the device carries on working, many users are going to ignore any voluntary request.

          • Indiscreet Logs: Persistent Diffie-Hellman Backdoors in TLS

            Software implementations of discrete logarithm based cryptosystems over finite fields typically make the assumption that any domain parameters they are presented with are trustworthy, i.e., the parameters implement cyclic groups where the discrete logarithm problem is assumed to be hard. An informal and widespread justification for this seemingly exists that says validating parameters at run time is too computationally expensive relative to the perceived risk of a server sabotaging the privacy of its own connection. In this paper we explore this trust assumption and examine situations where it may not always be justified.

            We conducted an investigation of discrete logarithm domain parameters in use across the Internet and discovered evidence of a multitude of potentially backdoored moduli of unknown order in TLS and STARTTLS spanning numerous countries, organizations, and protocols. Although our disclosures resulted in a number of organizations taking down suspicious parameters, we argue the potential for TLS backdoors is systematic and will persist until either until better parameter hygiene is taken up by the community, or finite field based cryptography is eliminated altogether.

          • Rigging the Election [Ed: too much Microsoft [1, 2]]

            When Dorothy discovers fraud in the land of Oz, she is told by the Wizard, “Don’t look behind the curtain.” But she does. In America, we demand truth and accountability in so many aspects of our daily lives, and yet somehow there’s little public outcry for transparency within voting, the sacred cornerstone of our democracy. For the most part, we sleep soundly under the blanket of assurances from government officials. FBI Director James Comey even attempted a spin of irony recently, noting that our “clunky” voting process actually makes wholesale rigging more difficult. However, Comey misses the bigger picture.

            [...]

            Hardly anyone uses the same computer from 12 years ago, yet large sections of the country currently vote on aging electronic systems which utilize proprietary software that cannot be publicly examined. Unverifiable technology remains deployed in 29 states – including Pennsylvania, Ohio, Florida – and other key battleground states, which may determine our next president. Races in these areas are not evidence based, and consequently, we cannot be certain ballots reflect voter intent. Bereft of such knowledge, how can we put faith in the legitimacy of our government?

          • How to Hack a Presidential Election
          • ‘Nice Internet You’ve Got There… You Wouldn’t Want Something To Happen To It…’

            Last month, we wrote about Bruce Schneier’s warning that certain unknown parties were carefully testing ways to take down the internet. They were doing carefully configured DDoS attacks, testing core internet infrastructure, focusing on key DNS servers. And, of course, we’ve also been talking about the rise of truly massive DDoS attacks, thanks to poorly secured Internet of Things (IoT) devices, and ancient, unpatched bugs.

          • Update Ubuntu 16.04 LTS Linux Kernel Without Rebooting With The Canonical Livepatch Service
          • Livepatch – Apply Critical Security Patches to Ubuntu Linux Kernel Without Rebooting
          • GitLab reinstates list of servers that have malware

            Willem de Groot published a list of web stores that contain malware. He first hosted this list on GitHub but it was deleted. Then he hosted it on GitLab where it was also deleted. The reason we gave him for the deletion was “GitLab views the exposure of the vulnerable systems as egregious and will not abide it.”. Willem wrote about his experience in a blog post.

          • Dirty COW — Critical Linux Kernel Flaw Being Exploited in the Wild
          • CVE-2016-5195 Found in Every Linux Version (for the Last 9 Years)
          • Explaining Dirty COW local root exploit – CVE-2016-5195
          • CVE Request: OpenSSH: Memory exhaustion issue found in OpenSSH
          • OpenSSL after Heartbleed

            Rich Salz and Tim Hudson started off their LinuxCon Europe 2016 talk by stating that April 3, 2014 shall forever be known as the “re-key the Internet date.” That, of course, was the day that the Heartbleed vulnerability in the OpenSSL library was disclosed. A lot has happened with OpenSSL since that day, to the point that, Salz said, this should be the last talk he gives that ever mentions that particular vulnerability. In the last two years, the project has recovered from Heartbleed and is now more vital than ever before.

        • Defence/Aggression

          • Philippines not really severing ties with US, Duterte says

            Philippines President Rodrigo Duterte has clarified his comments that seemed to call for a split from the United States, saying he was advocating a “separation of foreign policy” rather than “a severance of ties.”
            Addressing a press conference in Davao City after his return from a state visit to China, Duterte said:

            “It is not severance of ties. You say severance of ties, you cut the diplomatic relations. I cannot do that.
            “Why? It is in the best interest of my country that we maintain that relationship. Why? Because there are many Filipinos in the United States. Well, Americans of Filipino ancestry.
            “Why? Because the people of my country [are] not ready to accept. I said separation — what I was really saying was separation of a foreign policy.”

          • Jilted Muslim man killed a Dalit Hindu girl by acid attack in Nadia, West Bengal.

            It’s a tragic death of 17 year old Hindu schoolgirl, Mou Rajak on Tuesday in NRS Hospital in Kolkata after her eight day’s long struggle for life since she was admitted here for a critical care being a victim of acid attack. Her lungs were almost damaged as the acid thrown by a Muslim man Imran entered into lung through trachea.

          • Asia Bibi appeal adjourned — her death row ordeal drags on

            Release International urges Pakistan to take a stand against intimidation and release Asia Bibi, following the Supreme Court appeal setback. Release calls for courage to confront intolerance and repeal the blasphemy law. Pakistan’s Supreme Court has adjourned Asia Bibi’s appeal against her death sentence, following the decision of a leading judge to withdraw from the trial.

            Justice Muhammad Iqbal Hameed Ur Rehman stepped back from the case on the grounds that he had been a judge in the case of the Punjab governor Salmaan Taseer who was murdered for taking a stand against the blasphemy laws.

            “It seems strange to pull out on the day of the appeal,” says Paul Robinson, Chief Executive of Release International. “Surely any potential conflict would have been known in advance? What is clear is that it will take immense courage to withstand intimidation and release Asia Bibi — a fact underlined by the presence of so many riot police at the court.”

          • French police chief orders investigation after officers hold Paris protest

            The head of France’s national police force on Tuesday ordered an internal investigation after hundreds of police officers held an unauthorized protest in central Paris overnight.

            Angry police officers marched on the iconic Champs Elysées boulevard in the French capital after dark on Monday, complaining that they are understaffed and ill-equipped.

            The rebel police officers, who held the demonstration without permission or backing of their labour unions, accused Prime Minister Manuel Valls and Interior Minister Bernard Cazeneuve of grandstanding while failing to provide the resources they need to do their jobs.

          • Investigators find no evidence Muslim child was attacked on school bus

            The Wake County school system and the Cary Police Department say they haven’t found evidence that a 7-year-old Muslim student was assaulted by classmates on a school bus last week.

            Zeeshan-ul-hassan Usmani says his son Abdul Aziz was bullied and beaten by classmates at Weatherstone Elementary School in Cary while riding home on the bus last Friday because the first-grade student is Muslim.

            Usmani’s Facebook post, with the words “Welcome to the United States of America of Donald Trump” and a picture of Abdul Aziz’s left arm in a sling, has sparked worldwide social media and news media attention about Islamophobia.

            School and law enforcement officials say they’ve taken the allegations seriously and don’t tolerate bullying. But they say their investigations don’t confirm an assault even occurred.

          • Revealed: The UK is training Saudi pilots amid accusations of war crimes in Yemen

            The Saudi Air Force is being trained by the British Government amid accusations that it is carrying out atrocities in neighbouring Yemen, it has emerged.

            The Liberal Democrats – who uncovered the instruction being given, in both Saudi Arabia and the UK itself – described the revelation as “shameful”.

            Tom Brake, the party’s foreign affairs spokesman, called on the Ministry of Defence (MoD) to end the training immediately and for much stricter controls on arms exports to the oil-rich kingdom.

          • Thousands of California soldiers forced to repay enlistment bonuses a decade after going to war

            Short of troops to fight in Iraq and Afghanistan a decade ago, the California National Guard enticed thousands of soldiers with bonuses of $15,000 or more to reenlist and go to war.

            Now the Pentagon is demanding the money back.

            Nearly 10,000 soldiers, many of whom served multiple combat tours, have been ordered to repay large enlistment bonuses — and slapped with interest charges, wage garnishments and tax liens if they refuse — after audits revealed widespread overpayments by the California Guard at the height of the wars last decade.

            Investigations have determined that lack of oversight allowed for widespread fraud and mismanagement by California Guard officials under pressure to meet enlistment targets.

          • Hillary Clinton’s Strategic Ambition In A Nutshell. “Regime Change” in Russia… Putin is an Obstacle

            It has become crystal clear.

            For the record, here it is.

            She has big ambitions, which she does not spell out for fear of frightening part of the electorate, but which are perfectly understood by her closest aides and biggest donors.

            She wants to achieve regime change in Russia.

            She enjoys the support of most of the State Department and much of the Pentagon, and Congress is ready to go.

            The method: a repeat of the 1979 Brezinski ploy, which consisted of luring Moscow into Afghanistan, in order to get the Russians bogged down in their “Vietnam”. As the Russians are a much more peace-loving people, largely because of what they suffered in two World Wars, the Russian involvement in Afghanistan was very unpopular and can be seen as a cause of the collapse of the Soviet Union.

            This led to the temporary reign of the drunken Boris Yeltsin who – as recounted in Strobe Talbott’s memoirs – was putty in the hands of Bill Clinton. Hillary would like to renew that sort of relationship. Putin is an obstacle.

          • Hillary’s War Crime

            Muammar Gaddafi was the most progressive political leader in the world. Gaddafi used Libya’s oil wealth for the benefit of the Libyan people. He lived in a tent, a nice tent, but not in a palace, and he did not have collections of European exotic cars or any of the other paraphernalia associated with the ruling families in Saudi Arabia and the oil emirates that are Washington’s Middle Eastern allies.

            In Libya, education, medical treatment, and electricity were free. Gasoline was practically free, selling for 14 US cents per litre. Women who gave birth were supported with cash grants and couples received cash grants upon marriage. Libya’s state bank provided loans without interest and provided free startup capital to farmers.

            [...]

            Washington organized mercenaries, termed them “rebels” as in Syria, and sicced them on Libya. When it became clear that Gaddafi’s forces would prevail, Washington tricked naive and gullible Russian and Chinese governments and secured a UN no-fly zone over Libya to be enforced by NATO. The express purpose of the no-fly zone was to prevent Gaddafi from attacking civilian targets, which he was not doing. The real reason was to prevent a sovereign state from using its own air space so that the Libyan Air Force could not support the troops on the ground. Once the gullible Russians and Chinese failed to veto the Security Council’s action, the US and NATO themselves violated the resolution by using Western air power to attack Gaddafi’s forces, thus throwing the conflict to the CIA-organized mercenaries. Gaddafi was captured and brutally murdered. Ever since, Libya, formerly a prosperous and successful society, has been in chaos, which is where the Obama regime wanted it.

        • Transparency/Investigative Reporting

          • WikiLeaks urges supporters to ‘stop taking down the US internet’

            The site WikiLeaks asked its “supporters” on Friday to stop taking down the internet in the U.S. following a massive distributed denial of service (DDoS) attack that disrupted a number of major sites.

            “Mr. Assange is still alive and WikiLeaks is still publishing,” the site tweeted. “We ask supporters to stop taking down the US internet. You proved your point.”

          • Why Did WikiLeaks Tweet a Picture of Gavin MacFadyen?

            MacFadyen has a long history as a journalist who’s friendly to WikiLeaks. He was the director of the Centre for Investigative Journalism in London, an adviser to The Whistler, and focused much of his work on discussing and protecting whistleblowing activities. He even created the Julian Assange Defence Committee to raise funds to help pay for Assange’s legal expenses.

            WikiLeaks had been releasing a series of emails from Hillary Clinton’s campaign manager, John Podesta. Just this past week, Julian Assange’s Internet connection was cut, leading to speculation as to whether Assange is even still at the embassy. These rumors and conspiracy theories, combined with other rumors about WikiLeaks’ Twitter account itself, led to a lot of questioning about why WikiLeaks tweeted MacFadyen’s photo without an explanation.

          • George W. Bush’s White House ‘lost’ 22 million emails

            For 18 months, Republican strategists, political pundits, reporters and Americans who follow them have been pursuing Hillary Clinton’s personal email habits, and no evidence of a crime has been found. But now they at least have the skills and interest to focus on a much larger and deeper email conspiracy, one involving war, lies, a private server run by the Republican Party and contempt of Congress citations—all of it still unsolved and unpunished.

          • FOI Coalition assesses state of FOI in the first 100 days of Duterte administration

            Prof. Solomon Lumba of the UP College of Law, who is working with the Philippine Center for Investigative Journalism in conducting research on FOI, reported a brief analysis on the issue of exceptions. According to Atty. Lumba, one way to simplify the plethora of exceptions included in the initial exception inventories from the Department of Justice and the Office of the Solicitor General is to group them into conceptual categories, as was done in jurisdictions such as the US and Australia.

            Lastly, Atty. Eirene Jhone E. Aguila, co-convenor of R2KRN, delivered the Coalition’s Statement on the state of FOI in President Duterte’s first 100 days in office. The Coalition acknowledges the issuance of EO No. 2 as significant step towards guaranteeing the people’s right to know, but stresses the huge amount of work left to be done, particularly: completing the People’s FOI Manuals and implementing details of EO No. 2 for each agency, clarifying the issue of exceptions, and passing a long sought-for Freedom of Information law by the Congress.

        • Environment/Energy/Wildlife/Nature

          • Remember When We Thought Climate Change Would Matter This Election?

            This was supposed to be the election where climate change really mattered. Only, anyone watching the presidential debates wouldn’t have a clue that 1) 2016 has been history’s hottest year on record, and 2) our future leaders give any sort of crap about it.

            Climate change was mostly ignored during the last three debates, mentioned only in passing, and never discussed directly or at length. In fact, I’m fairly sure that Americans know more about Donald Trump’s sexual proclivities than his environmental policies (hint, hint: he doesn’t have any).

            But should we really feign surprise? Surely even the most hopeful of us didn’t expect global warming to compete with jobs, the border, or national security on the campaign trail. After all, this has been an election based on political identity, and when Americans can’t even agree on whether climate change is real, what’s incentivizing our candidates to fight for it?

            Just one question, posed during a town-hall by Ken Bone, a coal industry worker, shed any sort of light on the climate agendas of our two vastly different candidates. (And even then, Bone was criticized for not asking anything of real substance, as if energy policy, which lies at the heart of our climate change catastrophe, matters less than whether a candidate is a fan or not of science.)

          • 6 Sinking Cities to Visit Before It’s Too Late

            With the growing threats due to climate change – rising sea levels, devastating storms and tidal flooding – it’s no mystery why some of the world’s most iconic cities and natural wonders are at risk. And while there’s no clear-cut answer on the rate at which many cherished places the world over will be underwater, with the impending long-term effects of climate change – including the melting polar ice cap – we have a very narrow window before there will be dramatic repercussions, says Costas Christ, Chairman of the National Geographic World Legacy Awards and sustainable travel expert. “We have a window of 10 or 20 years at most before we set in motion the temperatures that we can’t turn back,” he says.

            Happily, the outlook isn’t all bleak. Our travel choices and actions make a difference, Christ says. “What can we do as travelers? We can choose those companies that are practicing and embracing sustainability,” he explains. By rewarding companies that are substituting plastics, generating less waste, offsetting their carbon footprint, using renewable energy and supporting national parks and fragile ecosystems, among other sustainable practices, we can advance conservation efforts, travel responsibly and have a positive long-term impact. With that in mind, here are six cities starting to submerge, and expert-endorsed tips for limiting your carbon footprint and aiding conservation efforts on your next trip.

        • Finance

          • Shop steward: Yle lay-offs “just the start”

            The Finnish Broadcasting Company (Yle) announced on Thursday that it plans to cut more than a third of current staff in its production unit. That will free up resources to spend more on outside acquisitions, which is a key goal of a parliamentary report published earlier this year. Employee representatives say that these lay-offs are only the beginning of an extended period of change for the company.

          • Ceta talks: EU hopes to unblock Canada trade deal

            The European Parliament president says he is optimistic that a free-trade deal between the EU and Canada can be signed soon despite last-minute obstacles.

            Objections by a Belgian region, which opposes the deal, “are for us Europeans to solve”, Martin Schulz said.

            He was speaking after meetings in Brussels with Canadian Trade Minister Chrystia Freeland and the head of Belgium’s Wallonia region.

            Ms Freeland said: “It’s time for Europe to finish doing its job.”

            After seven years of negotiations on the Comprehensive Economic and Trade Agreement (Ceta), talks broke down on Friday.

          • Left Alliance pushes to criminalize underpayment of wages

            The Left Alliance political party has proposed that employers found guilty of paying a wage below the lowest acceptable level agreed upon in Finland’s collective wage agreements should be subject to criminal charges.

          • Ari Berman on Rigging Elections, Dean Baker on the Debt Bogeyman

            Also on the show: Explosive entitlement spending! Runaway national debt! These are familiar bogeymen for elite media, but how much there is there? Dean Baker will join us to unpack the oft-heard media phrase “debt and entitlements,” and explain what it really means to call for cutting them. He’s co-director of the Center for Economic and Policy Research and writes the blog Beat the Press.

          • CETA: A way out of European self-dwarfism

            Anti-CETA campaigns and mass protests have put the EU-Canada deal under constant pressure. Daniel Caspary MEP asks: What are we going to do if the European Union buries its common trade policy?

            Daniel Caspary is a German MEP and is the EPP group’s coordinator on the Committee on International Trade (INTA) in the European Parliament and Parliamentary Secretary (Chief-Whip) of the German CDU/CSU Delegation.

        • AstroTurf/Lobbying/Politics

          • WikiLeaks: Clinton-Kaine Even Lied About Timing of Veep Pick

            A conversation between Clinton campaign chairman John Podesta and political consultant Erick Mullen leaked by WikiLeaks suggests that Tim Kaine — and Hillary Clinton — lied to the American people about the Virginia senator’s selection as Clinton’s running mate.

            In the email, Mullen complains to Podesta that attorney Bob Glennon “won’t stop assuring Sens Brown and Heitkamp (at dinner now) that HRC has personally told Tim Kaine he’s the veep.” The email was sent on July 15, 2015 — over one full year before the campaign’s official announcement.

            Clinton announced Kaine’s selection on July 22, 2016. The Clinton campaign behaved as if it were still sifting through possible VP picks until practically that very day. “Just got off the phone with Hillary. I’m honored to be her running mate. Can’t wait to hit the trail tomorrow in Miami!” Kaine tweeted.

          • No comment: Clinton has ‘nothing to say’ about Wikileaks email revealing $12M quid-pro-quo with Morocco’s king that an aide said was a ‘mess’ of her own making

            A stone-faced Hillary Clinton refused to comment tonight on an email a top aide sent calling a Clinton Foundation quid pro qou a ‘mess’ of the former secretary of state’s own making.

            ‘I have nothing to say about Wikileaks, other than I think we should all be concerned about what the Russians are trying to do to our election and using Wikileaks very blatantly to try to influence the outcome of the election,’ Clinton said.

            The Democratic nominee was responding to a question posed by DailyMail.com during a question and answer session with reporters riding on her campaign plane.

          • Megyn Kelly hits Donna Brazile on feeding Clinton debate question

            Interim Democratic National Committee chair Donna Brazile accused Megyn Kelly of “persecution” Wednesday evening when the Fox News anchor asked Brazile about an email, published by WikiLeaks, that indicated Brazile provided Hillary Clinton’s campaign with a question in advance of a CNN town hall.

            “As a Christian woman, I understand persecution, but I will not sit here and be persecuted because your information is totally false,” Brazile said during an interview conducted shortly after the third presidential debate.

            “Since I play straight up and I’ll play straight up with you, I did not receive any questions from CNN,” she said. “First of all, what information are you providing to me that will allow me to see what you’re talking about?”

            Kelly cited an email made public by WikiLeaks last week that indicated Brazile had informed high-level Clinton campaign aides that she sometimes received “questions in advance” before relaying a question about the death penalty that closely matched a question later asked during the CNN town hall. Roland Martin, a TV One host who partnered with CNN for the event, sent CNN a question containing the same language the day after Brazile sent it to the Clinton campaign.

          • Blanket Corporate Media Corruption

            It is disconcerting to be praised by a website whose next article warns of a “plague of sodomites”. Sometimes truth-telling is a difficult act because truth is a simple matter of fact; who might seek to exploit that truth is a different question. I almost certainly have little in common with the anti-gay people who chose to commend me.

            It is however incumbent on those who know truth to reveal it to the best of their ability, particularly if it contradicts an untruth being put about widely. The lie that WikiLeaks is acting as an agent of the Russian state is one that needs to be countered. Wikileaks is much more important than a mere state propaganda organisation, and needs to be protected.

            Political lying is a sad fact of modern life, but some lies are more dangerous than others. Hillary Clinton’s lies that the Podesta and Democratic National Congress email leaks are hacks by the Russian state, should be countered because they are untrue, and because their intention is to distract attention from her own corrupt abuse of power and money. But even more so because they recklessly feed in to a Russophobia which is starting to exceed Cold War levels in terms of open public abuse.

            Clinton has made no secret of her view that Obama has not been forceful enough in his dealings in Syria, and within her immediate circle she has frequently referred to the Cuban missile crisis as the precedent for how she believes Russia must be faced down. It is her intention to restore US international prestige by such a confrontation with Putin in Syria early in her Presidency, and perhaps more to the point to restore the prestige of the office of POTUS and thus enhance her chances of getting her way with a probable Republican controlled senate and congress.

            [...]

            It is worth noting that Hillary’s claim that 17 US Intelligence Agencies agree that Russia was the source of the leaks is plainly untrue. All they have said is that the leaks “are consistent with the methods and motivations of Russian-directed attacks.” Under extreme White House pressure to state that the Russians did it, that extremely weak statement was the only thing that the US Intelligence chiefs could cobble together. It is very plainly an admission there is no evidence that Russia did it, but the appalling corporate media have reported it as though it “proves” Hillary’s accusation of Russia is true.

            Bill Binney is like myself a former recipient of the Sam Adams Award – the World’s foremost whistleblowing award. Bill was the senior NSA Director who actually oversaw the design of their current mass surveillance software, and Bill has been telling anybody who will listen exactly what I have been telling – that this material was not hacked from Russia. Bill believes – and nobody has better contacts or understanding of capability than Bill – that the material was leaked from within the US intelligence services.

          • Media’s Debate Agenda: Push Russia, ISIS, Taxes; Downplay Climate, Poverty, Campaign Finance

            Russia, ISIS and taxes overwhelmed all other topics during the four presidential and vice-presidential debates, totaling 429 mentions from both candidates and questioners.

            Russia (and Putin) alone came up in the four debates 178 times, more than national debt/entitlements, Social Security, the Supreme Court, race/racism, education, abortion, drugs, poverty, LGBTQ people, climate change, campaign finance/Citizens United and the environment combined, with the latter topics totaling 164 mentions.

            Clinton’s emails were mentioned less than half as often as Trump’s tax returns (30 vs. 80 mentions), but still more than topics such as Social Security, the Supreme Court and education.

            Domestic issues that were mentioned somewhat frequently were immigration, police brutality/race, and Obamacare. Immigration is obviously a hot button issue given Trump’s calls to forcefully cleanse 11 million largely Latino immigrants from the United States.

          • Most Americans want Hillary indicted for email scandal – poll

            Over half of American voters surveyed in a recent poll disagree with the FBI’s decision not to prosecute Hillary Clinton over her emails scandal.

            A survey of 1,000 likely voters was conducted on October 18 and 19 by the polling company Rasmussen Reports. Voters were asked whether they agreed with the FBI’s decision not to file criminal charges against Hillary Clinton, despite acknowledging that she had been reckless and potentially exposed classified information to hostile countries. The results were released on Friday.

          • Rigged Elections Are An American Tradition

            It is an obvious fact that the oligarchic One Percent have anointed Hillary, despite her myriad problems to be President of the US. There are reports that her staff are already moving into their White House offices. This much confidence before the vote does suggest that the skids have been greased.

            The current cause celebre against Trump is his conditional statement that he might not accept the election results if they appear to have been rigged. The presstitutes immediately jumped on him for “discrediting American democracy” and for “breaking American tradition of accepting the people’s will.”

            What nonsense! Stolen elections are the American tradition. Elections are stolen at every level—state, local, and federal. Chicago Mayor Richard J. Daley’s theft of the Chicago and, thereby, Illinois vote for John F. Kennedy is legendary. The Republican US Supreme Court’s theft of the 2000 presidential election from Al Gore by preventing the Florida vote recount is another legendary example. The discrepancies between exit polls and the vote count of the secretly programmed electronic voting machines that have no paper trails are also legendary.

            So what’s the big deal about Trump’s suspicion of election rigging?

          • October 2016: The Month Political Journalism Died

            On Wednesday evening during the final presidential debate of the campaign, Hell did not freeze over. Moderator Chris Wallace of Fox News, where climate denial plays nothing but home games, passed on the final opportunity to ask Donald Trump and Hillary Clinton about climate change.

            This presidential campaign has been a catastrophe for American democracy and for American political journalism.

            Amid the relentlessly tawdry campaign news, most Americans haven’t even noticed the absence of virtually any high-level campaign discussion of environmental issues, let alone what many have called the biggest challenge of the 21st century.

            For now.

            But I invite you to think ahead to that “oh crap” moment that awaits us all, five, ten or 25 years from now, when America looks back to reckon with our self-imposed climate silence in the debates.

            Journalism—and the memes of our day—have failed us.

            I don’t mean to condemn all journalists, or even all political journalists. This campaign has seen Pulitzer-worthy investigative work, notably by old-media giants like the New York Times and Washington Post, on both major party candidates and their respective problems with veracity and transparency. But the horse-race coverage, driven by Twitter, bluster and clickbait, has predictably left important issues in the lurch.

          • Get Ready to Ignore Donald Trump Starting on November 9, or He’ll Never Go Away

            Donald Trump’s true gift is his uncanny ability to capture the attention of the news media.

            His declaration during Wednesday night’s third and final presidential debate that he may not accept defeat in three weeks captured global headlines, once again making him the lead story in the world, even as his chances of winning are essentially vanishing.

            But this is nothing new. There are countless other examples of successful attention-getting in Trump’s past, including his crusade against the Central Park Five in 2005, and the six weeks in 2011 where he monopolized TV news with his quest to find Barack Obama’s birth certificate.

            In fact, one way to look at Trump’s run for the presidency is as an attention-getting, brand-building exercise from start to finish. And in that context, this latest twist makes even more sense: It turns his otherwise sputtering campaign into a sort of dystopian season of “The Apprentice” where viewers watch for the cliffhanger: Will Trump bow out gracefully, or will he rally his supporters to declare his loss the result of a grand conspiracy?

            Not coincidentally, a half hour before the start of Wednesday’s debate, his campaign launched #TrumpTV, a livestream on his Facebook featuring Trump surrogates — leading to speculation that this served as a sort of a beta test for a rumored Trump-helmed television network. With that network, Trump could seek to monetize a panicked support base.

            On November 9, when Trump likely loses the presidential election in a big way, the news media will face a moment of truth: Will they continue to obsessively cover him and his post-election antics? Or will they ignore him?

            They should ignore him.

        • Censorship/Free Speech

        • Privacy/Surveillance

          • NLG and ACLU Submit FOIA and Open Records Requests to Investigate Unconstitutional Surveillance of Water Protectors at Standing Rock

            Today, the National Lawyers Guild (NLG), in conjunction with the ACLU of North Dakota, sent Freedom of Information Act (FOIA) and North Dakota Open Records Act requests to multiple state and federal agencies in response to the surveillance and arrests of the Native-led Water Protectors attempting to stop construction of the Dakota Access Pipeline (DAPL). In an affront to First Amendment rights, Water Protectors and allies have been continuously surveilled by low-flying planes, helicopters, and drones, and have had local cell phone communications jammed and possibly recorded. Dozens of local and out-of-state law enforcement have been called in, maintaining a heavily militarized presence at the site in an effort to intimidate activists and chill dissent.

          • How Could NSA Contractor Harold Martin Have Been Taking Home Classified Info For 20 Years Without NSA Noticing?

            A few weeks back, we wrote about the arrest of Harold Martin, an NSA contractor working at Booz Allen, for apparently taking “highly classified information” from the NSA and storing it electronically and physically in his home. There were a lot of questions about whether or not Martin was connected to the Shadow Brokers release of NSA hacking tools, though as more info comes out, it sounds like perhaps Martin was just found because of an investigation into Shadow Brokers, but not because he was connected to them. Soon after the arrest was made public (after being kept sealed for a little over a month), reports came out suggesting that Martin was basically a digital hoarder, but not a leaker (or a whistleblower).

          • Geofeedia, In Damage Control Mode, Issues Bogus DMCA Over Brochure Posted By Reporter

            And it’s time for yet another story of copyright being used for out and out censorship. Remember Geofeedia? That’s the creepy company that was selling its services to law enforcement agencies and school districts promising to spy on social media feeds to let law enforcement/schools know when people are planning bad stuff. After a big ACLU investigative report, basically all the major social media companies cut ties with Geofeedia, claiming that it was violating their terms of service. I’d imagine that the various law enforcement agencies and school districts who paid tens of thousands of dollars for this data may be asking for their money back.

            So what does Geofeedia do? Well, for starters, it abuses the DMCA to try to take down information. The Daily Dot’s Dell Cameron had actually written about how the Denver police spent $30k on Geofeedia back in September, a few weeks before the ACLU report dropped (nice scoop and great timing). Cameron then followed up with a detailed story following the ACLU report as well, noting that there were still plenty of other Geofeedia competitors on the market. At the end of that post, Cameron included a brochure that Geofeedia had apparently sent to a police department last year. But you can’t see it now, because (yup) Geofeedia issued a DMCA takedown to Scribd, the company that was hosting it.

          • Victory for the Exegetes Amateurs! French Surveillance Censured by Constitutional Council

            The French Constitutional Council has censored this morning the article of the 2015 French Surveillance Law on radio wave surveillance. Following a Priority Preliminary ruling on the issue of constitutionality (QPC) tabled by the Exegetes Amateurs (FDN Federation, FDN and La Quadrature du Net and the Igwan.net NGO), this is a clear victory for advocates of privacy against disproportionate surveillance promoted by Manuel Valls’ government. La Quadrature du Net is glad with this decision which effects are to be applied immediately (although regretting the extended time given to the legislator to conform to this decision in the long term) and calls on all citizens concerned with civil rights to support the tireless judicial and technical work accomplished with our friends of FDN and the FDN Federation.

          • Google’s Allo Sends The Wrong Message About Encryption

            When Google announced its new Allo messaging app, we were initially pleased to see the company responding to long-standing consumer demand for user-friendly, secure messaging. Unfortunately, it now seems that Google’s response may cause more harm than good. While Allo does expose more users to end-to-end encrypted messaging, this potential benefit is outweighed by the cost of Allo’s mixed signals about what secure messaging is and how it works. This has significance for secure messaging app developers and users beyond Google or Allo: if we want to protect all users, we must make encryption our automatic, straightforward, easy-to-use status quo.

            The new messaging app from Google offers two modes: a default mode, and an end-to-end encrypted “incognito” mode. The default mode features two new enhancements: Google Assistant, an AI virtual assistant that responds to queries and searches (like “What restaurants are nearby?”), and Smart Reply, which analyzes how a user texts and generates likely responses to the messages they receive. The machine learning that drives these features resides on Google’s servers and needs access to chat content to “learn” over time and personalize services. So, while this less secure mode is encrypted in transit, it is not encrypted end-to-end, giving Google access to the content of messages as they pass unencrypted through Google servers.

            Allo’s separate “incognito” mode provides end-to-end encryption, using a darker background to distinguish it from the default mode. Messages sent in this mode are not readable on Google’s servers, and can be set to auto-delete from your phone after a certain period of time. The Assistant and Smart Reply features, which depend on Google having access to message content, don’t work in “incognito” mode.

          • Half of All American Adults Have Pictures in Police Facial Recognition Systems

            If you’re already worried about the growth of the surveillance state, a new study may give you pause. Researchers from Georgetown Law’s Center on Privacy and Technology have found that half of Americans have photos in facial recognition networks used by law enforcement around the country—and many are likely unaware of it. The resulting report notes that the study is “the most comprehensive survey to date of law enforcement face recognition and the risks that it poses to privacy, civil liberties, and civil rights.”

            Study authors Alvaro Bedoya, Jonathan Frankle and Clare Garvie queried more than 100 police departments across the nation over the course of a year to come to their conclusions. They found that more than 117 million adults—overwhelmingly law-abiding citizens of these United States—have pictures in these systems. Amassing such a large number of photos of American adults is a result of interagency collaboration. In addition to mugshot photos taken following arrests, “26 states (and potentially as many as 30) allow law enforcement to run or request searches against their databases of driver’s license and ID photos.” They also write that big-city police departments—Chicago, Dallas and Los Angeles among them—are looking into real-time recognition on live street surveillance cameras, which allow “police [to] continuously scan the faces of pedestrians walking by a street surveillance camera.”

          • Using search warrants to get into fingerprint-locked phones

            A peculiar legal workaround might give federal authorities the right to access an individual’s phone data.

            Investigators in Lancaster, Calif., were granted a search warrant last May with a scope that allowed them to force anyone inside the premises at the time of search to open up their phones via fingerprint recognition, Forbes reported Sunday.

            The government argued that this did not violate the citizens’ Fifth Amendment protection against self incrimination because no actual passcode was handed over to authorities. Forbes was able to confirm with the residents of the building that the warrant was served, but the residents did not give any more details about whether their phones were successfully accessed by the investigators.

            “I was frankly a bit shocked,” said Andrew Crocker, a staff attorney at the Electronic Frontier Foundation (EFF), when he learned about the scope of search warrant. “As far as I know, this warrant application was unprecedented.”

          • Virtual lineup: Your face is already on file

            If local police showed up at your door requesting fingerprints and DNA samples, would you passively and unquestioningly comply? Or would you ask what crime you’re suspected of committing and demand probable cause for making the request or proof of a search warrant?

            The fact is, there’s a 50 percent chance your photo is already part of a biometric database. And law enforcement agencies across the country are using facial recognition software to regularly search this “virtual lineup” with little to no regulation or limits, according to an eye-opening 150-page report, “The Perpetual Line-Up: Unregulated Police Face Recognition in America,” published this week by the Georgetown Center on Privacy & Technology.

          • Supreme Court rules that IP address allocation is personal data, but to what use?

            The European Supreme Court rules that the subscriber identity behind an IP address is personal data, making such data protected by privacy laws. However, the court rules in a very narrow context of a web site operator, and says that the protection of personal data takes second place to a so-called “legitimate objective”. This may be an important verdict for future case law, but right now, it looks rather narrow.

            The European Court of Justice, the highest court in the EU, has ruled that the information about who was allocated a certain IP address at a certain time is personal data. This is a very important key word in European legislation, which means the data’s availability and use is protected by a mountain and a half of regulations and laws.

            The case was brought to the European Court of Justice by Patrick Breyer, a Pirate Party MP in the German State Parliament of Schleswig-Holstein, who is also a lawyer. Mr. Breyer was suing the Federal Government of Germany to prevent them from storing and recording his every visit to federal authorities’ websites.

          • Google is now tracking your private, personally identifiable information from all sources possible (ie; Gmail, Chrome, DoubleClick) by default

            Since this summer, new users are now being tracked to Google’s fullest potential unless they opt-out. Google has bought many tech companies over the last few decades. One such purpose, in 2007, of DoubleClick, prompted many concerns. Google, which had the promising slogan “Do no evil,” back then, promised that they would not combine Google’s already monolithic stack of user internet browsing history data with new acquisitions such as DoubleClick. DoubleClick is an extensive ad network that is used on half of the Internet’s top 1 million most popular sites. Now, Now that DoubleClick’s data is available to Google, Google can easily build a complete profile of you, the customer. This profile could include name, search history, and keywords used in email, all of which will expressly be used to target you for advertising or handed over to the government at the drop of a rubber stamp.

          • Google Has Quietly Dropped Ban on Personally Identifiable Web Tracking

            After we published this story, Google reached out to say that it doesn’t currently use Gmail keywords to target web ads. We’ve updated the story to reflect that.

            When Google bought the advertising network DoubleClick in 2007, Google founder Sergey Brin said that privacy would be the company’s “number one priority when we contemplate new kinds of advertising products.”

            And, for nearly a decade, Google did in fact keep DoubleClick’s massive database of web-browsing records separate by default from the names and other personally identifiable information Google has collected from Gmail and its other login accounts.

            But this summer, Google quietly erased that last privacy line in the sand – literally crossing out the lines in its privacy policy that promised to keep the two pots of data separate by default. In its place, Google substituted new language that says browsing habits “may be” combined with what the company learns from the use Gmail and other tools.

          • Argentine Soccer Club Wanted to Implant Microchips in Fans, Until They Revolted

            How do you solve a problem like blood-thirsty football hooligans? According to one Buenos Aires-based football club, just stick microchips in spectators’ arms and scan the bad apples away.

            Back in April, first division club CA Tigre proposed surgically implanting microchips—or “passion tickets,” as they called them—into fans’ bodies to expedite their access to the stadium and curb violence during games. The initiative was rejected after a brief trial period, CA Tigre informed Motherboard, and though the club wouldn’t say why, we expect public outrage had something to do with it.

            “Passion ticket allows fans to enter the stadium without anything else, just their passion for their team, and allows the club to maintain a trustworthy level of control over fans,” CA Tigre tweeted at the time to explain the initiative.

          • Internet Privacy: “You’re Only Anonymous On The Internet Because Nobody’s Tried Very Hard To Figure Out Who You Are”
        • Civil Rights/Policing

          • Imprisoned Saudi blogger faces more lashes: supporters

            Imprisoned Saudi blogger Raif Badawi, whose public flogging in the kingdom last year generated a global outcry, now risks a new round of lashes, a co-founder of a Canadian foundation advocating his release said on Tuesday.

            Evelyne Abitbol, who founded the Raif Badawi Foundation with Badawi’s wife, said a “reliable source” in Saudi Arabia claims he faces a new flogging after being sentenced to 10 years imprisonment and 1,000 lashes in 2014 for breaking the kingdom’s technology laws and insulting Islam.

            Saudi embassy officials in Ottawa and Saudi government officials in Riyadh were not immediately available for comment.

          • Raif Badawi: Atheist Saudi blogger faces further round of lashes, supporters say

            Saudi blogger Raif Badawi is facing a new round of lashes, according to his supporters.

            A Canadian foundation campaigning for his release said a “reliable source” in Saudi Arabia told them he faces a renewed threat of flogging.

            The 32-year-old was handed 1,000 lashes and a ten-year jail term in 2014 for insulting Islam online.

          • ‘He didn’t know the boy didn’t want to be raped’ court throws out migrant child sex charge

            When the youngster went to the showers, Amir A. allegedly followed him, pushed him into a toilet cubicle, and violently sexually assaulted him.

            Following the attack, the accused rapist returned to the pool and was practising on the diving board when police arrived, after the 10-year-old raised the alarm with the lifeguard.

            The child suffered severe anal injuries which had to be treated at a local children’s hospital, and is still plagued by serious post-traumatic stress disorder.

            In a police interview, Amir A. confessed to the crime; telling officers the incident had been “a sexual emergency”, as his wife had remained in Iraq and he “had not had sex in four months”.

          • Intelligence and Security Committee of Parliament

            I have just finished giving evidence to the Intelligence and Security Committee of Parliament on torture and extraordinary rendition. I am dashing off now and will give a fuller account later of what I said only. But I will just say that I was very happily surprised by how genuine the committee were, by the acuity of their questioning and by what was revealed of the general trend of their thinking. I perceived no hostility at all. I rather hope, and believe I have grounds to hope, that their eventual report will contain more of both truth and wisdom than is generally expected.

          • Homeland Security Must Stop Using Private Prisons for Immigration Detention. Here’s How to Do It.

            ACLU policy paper explains why detaining fewer immigrants must be part of the plan to stop using private prisons.

            This August, the Justice Department made history when it announced that the Bureau of Prisons would curtail — and eventually end — its use of private prisons. As the Justice Department noted, this change was made possible by criminal justice reforms that reduced its prison population. Now the ACLU is releasing a policy paper that calls on the Department of Homeland Security to follow suit by reducing its detention population and then ending its own use of private prisons.

            The paper, “Shutting Down the Profiteers: Why and How the Department of Homeland Security Should Stop Using Private Prisons,” provides a concrete plan for how ICE can and should phase out its reliance on private prisons. The number of immigrants in detention has skyrocketed in the past two decades, and without these unnecessary detentions, there would be no need for private prison beds. The paper describes the human toll of over-detention and privatization and lays out ICE’s dangerously close relationship with the private prison industry.

          • Police Want to 3D Print a Dead Man’s Fingers to Unlock His Phone

            I’ll unpack the Constitutional issues in a bit, but first, the technology. Michigan State University professor who holds six U.S. patents for fingerprint recognition technology was asked by police to help catch a murderer. The cops scans of the victim’s fingerprints and thought that unlocking his phone might provide clues as to who killed him.

          • Police arrest more people for marijuana use than for all violent crimes — combined

            On any given day in the United States, at least 137,000 people sit behind bars on simple drug-possession charges, according to a report released Wednesday by the American Civil Liberties Union and Human Rights Watch.

            Nearly two-thirds of them are in local jails. The report says that most of these jailed inmates have not been convicted of any crime: They’re sitting in a cell, awaiting a day in court, an appearance that may be months or even years off, because they can’t afford to post bail.

            “It’s been 45 years since the war on drugs was declared, and it hasn’t been a success,” lead author Tess Borden of Human Rights Watch said in an interview. “Rates of drug use are not down. Drug dependency has not stopped. Every 25 seconds, we’re arresting someone for drug use.”

        • Intellectual Monopolies

          • Harris Faulkner Suit Against Hasbro Over A Toy Hamster Ends In Settlement, Hasbro To Discontinue The Toy

            While we cover a lot of silly intellectual property disputes here, none has the potential to upend our society into a circus of hilarious litigious stupidity as much as publicity rights do. This barely-arrived form of intellectual property has been the star of all kinds of legal insanity, with one needing only to note its use by such upstanding denizens of our reality as Lindsay Lohan and the brother of Pablo Escobar. But I have to admit I had reserved a special place in my humor-heart for Harris Faulkner, the Fox News anchor that sued toy-maker Hasbro for making a a hamster figurine that shared her name. Because the sharing of a name isn’t sufficient to arise to a publicity rights violation, the IRL-non-hamster-Faulkner had to claim that the ficticious-hamster-Faulkner also borrowed from her physical likeness, an argument which her legal team actually made. As a reminder, here are images of both.

          • Trademarks

            • No One Owns Invisible Disabilities

              The purpose of registered trademarks is to protect people. When you buy a bottle of Club-Mate, the trademark affords you some certainty that what you’re buying is the product you already know and love and not that of a sneaky impostor. But when the U.S. Patent and Trademark Office (USPTO) issues overly broad or generic trademarks, those trademarks do just the opposite: they can expose us to the risk of legal bullying. One recent round of bullying over a trademark on “invisible disabilities” has shown how a bad trademark can even be used to threaten people’s right to assemble and express themselves online.

              It started in late 2015 when a group called Invisible Disability Project (IDP) applied for a trademark on its name. A lawyer representing the Invisible Disabilities Association (IDA) sent IDP a letter threatening to sue it over the use of the term “invisible disability.” (IDA had received a trademark on the term in 2013). In July 2016, IDA used Facebook’s trademark report form to have IDP’s Facebook page—the main place where IDP’s members and supporters congregate—taken down. IDA even registered the domain names invisibledisabilityproject.com and .net and directed visitors to those sites to its own website.

          • Copyrights

            • Anti-Piracy Outfits Agree to Strengthen International Cooperation

              Government officials and representatives from anti-piracy outfits from the United States, Europe and Russia met up in Brussels this week. The roundtable, “Combating Internet Piracy: International Practice”, focused on the need for international cooperation and the strengthening of copyright legislation.

              With the Internet and therefore online piracy having developed into a truly global phenomenon, anti-piracy groups everywhere are expanding their reach.

              What was once a semi-isolated affair has become a multi-agency, cross-continent operation, with governments and rights holders alike striving to share information and pool resources.

            • The Bernie Sanders of Iceland is a Pirate, a poet and possibly the country’s next leader

              Birgitta Jónsdóttir is a poet, a Web developer and a former WikiLeaks activist. She’s also founder and leader of Iceland’s Pirate Party, which has been at or near the top of polls ahead of national elections Oct. 29.

              Washington Post London Bureau Chief Griff Witte sat down with Jónsdóttir for an interview at her office in Reykjavik on Oct. 19. The following are excerpts from their conversation.

            • Cisco Develops System To Automatically Cut-Off Pirate Video Streams

              Cisco says it has developed a system to disable live pirate streams . The network equipment company says its Streaming Piracy Prevention platform utilizes third-party forensic watermarking to shut down pirate streams in real-time, without any need to send takedown notices to hosts or receive cooperation from third parties.

            • Team Prenda Loses Big Again: Told To Pay Over $650k For Bogus Defamation Lawsuit

              Welp, it looks like another bad day for Team Prenda. The law firm that went around uploading its own porn films and then shaking down people on the internet has had a bad few years in terms of courts blasting them for abusing the court system and ordering them to pay up for all sorts of awful things. Every few weeks it seems like we read about another loss for John Steele and Paul Hansmeier (the third “partner” in this mess, Paul Duffy, passed away). The latest is not only a pretty big hit, it’s also a complete “own goal” by Team Prenda. This one wasn’t in one of their crappy shakedown lawsuits where a defendant hit back. No, this was in the case where Prenda tried to sue all of its critics for defamation in both Illinois and Florida. The Florida case, filed by John Steele, was quickly dismissed once Steele realized it broke all kinds of rules. But the Illinois cases moved forward. There was some bouncing around between state and federal court, before the case was dismissed and some sanctions were added.

            • Prenda lawyers’ careers are up in smoke, but sanctions keep coming

              After a few years suing Internet users over piracy claims, the lawyers behind the Prenda law copyright-trolling operation had made millions. But beginning in 2013, they were hit with repeated sanctions from federal judges. Now, their careers are in shambles—Paul Hansmeier had his law license suspended, John Steele is facing a bar complaint, and both may be facing an FBI investigation. (A third lawyer who was involved, Paul Duffy, passed away last year.)

              Even as their scheme collapses, they continue to be hit with sanctions. This week, Hansmeier and Steele got hit with a big one. US District Judge John Darrah oversaw litigation related to one of Prenda’s most audacious moves—their defamation lawsuit against their critics. They sued Steele’s former housekeeper, Alan Cooper, and his lawyer, Paul Godfread, for accusing Steele of identity theft. For good measure, they also sued anonymous blog commenters who called Prenda attorneys “brain-dead” and “assclowns.”

        ]]>
        http://techrights.org/2016/10/23/another-honorary-doctorate-for-stallman/feed/ 0
        Links 21/10/2016: MPV 0.21, Mad Max for GNU/Linux http://techrights.org/2016/10/21/mad-max-for-gnu-linux/ http://techrights.org/2016/10/21/mad-max-for-gnu-linux/#comments Fri, 21 Oct 2016 15:53:28 +0000 http://techrights.org/?p=96285

        GNOME bluefish

        Contents

        GNU/Linux

        • Desktop

          • Top 8 Linux Distributions Of 2016

            There are quite a number of linux distribution out there and new ones are being added as the days go by. This means picking a distro amongst the lot becomes quite a difficulty. Luckily for you, I have hand-picked the best linux distributions in 2016 for you. These are the top distributions targeting very different uses and users and I bet at least one is going to appeal to you. So let’s get started.

          • Patten: How to exorcise Windows from your old computer

            You may have heard of Linux (also known as GNU/Linux), but only as something that hackers use. It has a reputation for being unwieldy and hard. That reputation is deserved … sometimes.

            But anyone can learn it. And if it’s good enough for Barbie, it should be good enough for you.

            The best part: It’s free, free, free.

            Linux is actually a kind of operating system, just as a mammal is a kind of animal. Linux systems are all similar or identical at the core (also known as the kernel). But they come in a lot of varieties, or distros. (Fun fact: Much of the Android operating system is based on Linux.)

            The hard part about Linux isn’t learning. It’s choosing.

        • Server

          • Docker: Making the Internet Programmable

            Docker, and containers in general, are hot technologies that have been getting quite a bit of attention over the past few years. Even Solomon Hykes, Founder, CTO, and Chief Product Officer at Docker started his keynote with the assumption that people attending LinuxCon Europe know that Docker does containers, so instead of focusing on what Docker does, Hykes used his time to talk about Docker’s purpose saying, “It really boils down to one small sentence. We’re trying to make the Internet programmable.”

            Hykes described this idea of making the Internet programmable with three key points. First, they are focused on building “tools of mass innovation” designed to allow people to create and innovate on a very large scale. Second, applications and cloud services are allowing the idea of the Internet as a programmable platform to be realized, and they want to make this accessible to more people. Third, they are accomplishing all of this by building the Docker stack with open standards, open infrastructure, and a development platform with commercial products on top of the stack.

        • Kernel Space

          • Linux 4.8.3

            I’m announcing the release of the 4.8.3 kernel.

            All users of the 4.8 kernel series must upgrade.

            The updated 4.8.y git tree can be found at:
            git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-4.8.y
            and can be browsed at the normal kernel.org git web browser:

            http://git.kernel.org/?p=linux/kernel/git/stable/linux-st…

          • Linux 4.7.9
          • Linux 4.4.26
          • Intel Turbo Boost Max 3.0 Patches Updated For Linux 4.9

            Intel has updated its currently out-of-tree Turbo Boost Max Technology 3.0 patches for compatibility against the Linux 4.9-rc1 kernel plus made other improvements to the code.

            These patches have been worked on the past few months after Intel PR initially claimed no TBM 3.0 Linux support. The patches have gone through several public revisions but sadly didn’t make it for integration into the mainline Linux 4.9 kernel.

          • Linux 4.9 Is Showing A Performance Boost On More Systems

            Earlier this week I posted some benchmarks of a Core i7 6800K Broadwell-E system seeing performance boosts under Linux 4.9 and it turns out it’s looking more widespread than just affecting a niche system or two. When testing a more traditional Intel Haswell desktop, Linux 4.9 Git is seeing more wins over Linux 4.8 and 4.7 kernels.

            Following that earlier 4.9 Git benchmarking I set out to do a fairly large Linux kernel comparison on a Haswell system to go back three or so years worth of kernel releases. That big kernel comparison will be finished up and posted in the days ahead, but already from this Core i7 4790K Devil’s Canyon system I am seeing some performance improvements with 4.9 Git to share over 4.7.0 and 4.8.0 stock kernels…

          • Linux Foundation Welcomes JavaScript Community

            Kris Borchers, executive director of the foundation, announced the news, saying that the JavaScript Foundation aims “to support a vast array of technologies that complement projects throughout the entire JavaScript ecosystem.”

            This includes both client and server side application libraries, mobile application testing frameworks, and JavaScript engines.

            All jQuery Foundation projects will also be united within the JS Foundation including jQuery, Lodash, ESLint, Esprima, Grunt, RequireJS, jQuery UI, Globalize, Sizzle, Jed, and Dojo.

          • Kernel 4.4.25 Has Been Released
          • Graphics Stack

          • Benchmarks

            • How to benchmark your Linux system

              The Software Center list will also include individual tests. These can be fine to use, but they can be tedious to open and configure manually. Keep your eye out for an entry called Phoronix Test Suite, or PTS for short. The Phoronix Test Suite is a powerful program that can run a single test, or an entire battery. PTS offers some built-in suites (collection of tests), or you can design your own suite. When tests are completed, you can choose to upload the test results to openbenchmarking.org, where other users can see your results and even run the exact same tests on their PC.

        • Applications

        • Desktop Environments/WMs

          • K Desktop Environment/KDE SC/Qt

            • Leslie Zhai Talks 20 Years of KDE in China

              In 2002, as a computer science major university student, I went to a Legal Authoried software store in Wuhan, Guangputun, and bought Redhat7 including four install CDs, three src.rpm CDs and a very exquisite user manual for only RMB 50, because other software for Windows 98 was too expensive to a univerty student! It was my first time to use KDE 3. Yes I chose KDE as my default desktop enviroment, but I tried GNOME of course. Wink Then I tried to migrate my university’s course assignment developed in Turbo C to compile with GCC. I used Konsole and VIM to edit my source code, I tried Emacs but I did not know how to make coffee with it, so I switched to VIM Wink and my teachers switched to use Redhat8 instead of Windows 98 when teaching operating system courses.

            • Choose Your Own Experience in Plasma 5.8 and beyond

              One of the key points of Plasma is while giving a simple default desktop experience, not limiting the user to that single, pre-packed one size fits all UI.

            • KDevelop 5.0.2 released for Windows and Linux

              Four weeks after the release of KDevelop 5.0.1, we are happy to announce the availability of KDevelop 5.0.2, a second stabilization release in the 5.0 series. We highly recommend to update to version 5.0.2 if you are currently using version 5.0.1 or 5.0.0.

            • Wayland improvements since Plasma 5.8 release

              Two weeks have passed since the Plasma 5.8 release and our Wayland efforts have seen quite some improvements. Some changes went into Plasma 5.8 as bug fixes, some changes are only available in master for the next release. With this blog post I want to highlight what we have improved since Plasma 5.8.

            • Wayland For KDE Plasma 5.9 Should Shape Up Quite Nicely

              Plasma 5.8 was only released at the beginning of October but already there has been a number of Wayland improvements queuing up for the next milestone, Plasma 5.9.

              KWin maintainer Martin Gräßlin wrote a blog post yesterday about some of the early Wayland changes coming for Plasma 5.9. Some of this early work for the next KDE Plasma 5 release includes resize-only borders, global shortcut handling, support for keyboard LEDs via libinput, relative pointer support, the color scheme syncing to the window decoration, window icon improvements, multi-screen improvements, panel imporvements, and more.

            • Autumn Sale in the Krita Shop
          • GNOME Desktop/GTK

            • GNOME at Linux Install Fest

              It’s an event organized in order to help first year students install a Linux distro on their laptops (here at our uni, we work almost entirely on Linux, so we need to help those that have never used it and set up their distros🙂 ).

        • Distributions

          • New Releases

          • OpenSUSE/SUSE

            • Highlights of YaST development sprint 26

              One of the main reasons to adopt Scrum was to ensure we make a good use of our development resources (i.e. developers’ time and brains) focusing on things that bring more value to our users. In the past we had the feeling that many important things were always postponed because the developers were flooded by other not so important stuff. Now that feeling is gone (to a great extent) and we have a more clear and shared view of the direction of our development efforts.

          • Red Hat Family

          • Debian Family

            • Derivatives

              • Debian-Based Parsix GNU/Linux 8.15 “Nev” Gets First Test Build, Ships GNOME 3.22

                Today, October 21, 2016, the developers of the Debian-based Parsix GNU/Linux operating system proudly announced the availability for download of the first test build of the upcoming Parsix GNU/Linux 8.15 “Nev” release.

              • Canonical/Ubuntu

                • Ubuntu Turns 12, Happy Birthday!

                  Today, October 20, 2016, is Ubuntu’s birthday! Its 12th anniversary since the release of the first Ubuntu version, namely Ubuntu 4.10 (Warty Warthog), which was originally announced by Canonical and Ubuntu founder Mark Shuttleworth on the 20th of October 2004.

                • Celebrating 12 years of Ubuntu

                  Founder Mark Shuttleworth announced the first public release of Ubuntu – version 4.10, or “Warty Warthog” – on Oct. 20, 2004. The idea behind what would become the most recognizable and widely used Linux distributions ever was simple – create a Linux operating system that anybody could use. Here’s a look back at Ubuntu’s history.

                • Happy 12th Birthday, Ubuntu!

                  Yup, it’s twelve years to the day since Mark Shuttleworth sat down to tap out the first Ubuntu release announcement and herald in an era of “Linux for human beings”.

                • A Slice of Ubuntu

                  The de facto standard for Raspberry Pi operating systems is Raspbian–a Debian based distribution specifically for the diminutive computer. Of course, you have multiple choices and there might not be one best choice for every situation. It did catch our eye, however, that the RaspEX project released a workable Ubunutu 16.10 release for the Raspberry Pi 2 and 3.

                  RaspEX is a full Linux Desktop system with LXDE (a lightweight desktop environment) and many other useful programs. Firefox, Samba, and VNC4Server are present. You can use the Ubuntu repositories to install anything else you want. The system uses kernel 4.4.21. You can see a review of a much older version of RaspEX in the video below.

                • Download Ubuntu Yakkety Yak 16.10 wallpaper

                  The Yakkety Yak 16.10 is released and now you can download the new wallpaper by clicking here. It’s the latest part of the set for the Ubuntu 2016 releases following Xenial Xerus. You can read about our wallpaper visual design process here.

                • Live kernel patching from Canonical now available for Ubuntu 16.04 LTS

                  We are delighted to announce the availability of a new service for Ubuntu which any user can enable on their current installations – the Canonical Livepatch Service.

                  This new live kernel patching service can be used on any Ubuntu 16.04 LTS system (using the generic Linux 4.4 kernel) to minimise unplanned downtime and maintain the highest levels of security.

                • How to enable free ‘Canonical Livepatch Service’ for Linux kernel live-patching on Ubuntu

                  Linux 4.0 introduced a wonderful feature for those that need insane up-time — the ability to patch the kernel without rebooting the machine. While this is vital for servers, it can be beneficial to workstation users too. Believe it or not, some home users covet long up-time simply for fun — bragging rights, and such.

                  If you are an Ubuntu 16.04 LTS user (with generic Linux kernel 4.4) and you want to take advantage of this exciting feature, I have good news — it is now conveniently available for free! Unfortunately, this all-new Canonical Livepatch Service does have a catch — it is limited to three machines per user. Of course, home users can register as many email addresses as they want, so it is easy to get more if needed. Businesses can pay for additional machines through Ubuntu Advantage. Want to give it a go? Read on.

                  “Since the release of the Linux 4.0 kernel about 18 months ago, users have been able to patch and update their kernel packages without rebooting. However, until now, no other Linux distribution has offered this feature for free to their users. That changes today with the release of the Canonical Livepatch Service”, says Tom Callway, Director of Cloud Marketing, Canonical.

                • KernelCare Is Another Alternative To Canonical’s Ubuntu Live Kernel Patching

                  Earlier this week Canonical announced their Kernel Livepatching Service for Ubuntu 16.04 LTS users. Canonical’s service is free for under three systems while another alternative for Ubuntu Linux users interested in a commercial service is CloudLinux’s KernelCare.

                  The folks from CloudLinux wrote in to remind us of their kernel patching solution, which they’ve been offering since 2014 and believe is a superior solution to Canonical’s service. KernelCare isn’t limited to just Ubuntu 16.04 but also works with Ubuntu 14.04 and other distributions such as CentOS/RHEL, Debian, and other enterprise Linux distributions.

        • Devices/Embedded

        Free Software/Open Source

        • Exclusive: Blockchain platform developed by banks to be open-source

          A blockchain platform developed by a group that includes more than 70 of the world’s biggest financial institutions is making its code publicly available, in what could become the industry standard for the nascent technology.

          The Corda platform has been developed by a consortium brought together by New-York-based financial technology company R3. It represents the biggest shared effort among banks, insurers, fund managers and other players to work on using blockchain technology in the financial markets.

        • European banks risk lagging Wall Street in blockchain race
        • Report: R3′s Banking Blockchain Software is Going Open Source
        • Major Banks Take First Steps Towards Creating Industry Standards For Blockchain Technology
        • ‘Disputive’ blockchain technology set to be co-opted by banks
        • Google’s Open Source Report Card Highlights Game-Changing Contributions

          Ask people about Google’s relationship to open source, and many of them will point to Android and Chrome OS — both very successful operating systems and both based on Linux. Android, in particular, remains one of the biggest home runs in open source history. But, as Josh Simmons from Google’s Open Source Programs Office will tell you, Google also contributes a slew of useful open source tools and programs to the community each year. Now, Google has issued its very first “Open Source Report Card,” as announced by Simmons on the Google Open Source Blog.

          “We’re sharing our first Open Source Report Card, highlighting our most popular projects, sharing a few statistics and detailing some of the projects we’ve released in 2016. We’ve open sourced over 20 million lines of code to date and you can find a listing of some of our best known project releases on our website,” said Simmons.

        • Events

          • LatinoWare

            Yesterday, Wednesday 19 oct, was the first day of LatinoWare thirteen edition hosted in the city of Foz do Iguaçu in Parana state with presence of 5155 participants and temperature of 36ºC. Currently this is the biggest event of free software in Brazil.

          • Attending a FUDcon LATAM 2016

            From my experience I will share my days at FUDcon 2016 held on Puno last week. There were 3 core days, and 2 more days to visit around.

          • FOSDEM Desktops DevRoom 2016 all for Participation

            FOSDEM is one of the largest (5,000+ hackers!) gatherings of Free Software contributors in the world and happens each February in Brussels (Belgium, Europe).

            Once again, one of the tracks will be the Desktops DevRoom (formerly known as “CrossDesktop DevRoom”), which will host Desktop-related talks.

            We are now inviting proposals for talks about Free/Libre/Open-source Software on the topics of Desktop development, Desktop applications and interoperability amongst Desktop Environments. This is a unique opportunity to show novel ideas and developments to a wide technical audience.

        • Web Browsers

          • Mozilla

            • Nino Vranešič: Open Source Advocate and Mozilla Rep in Slovenia

              “My name is Nino Vranešič and I am connecting IT and Society,” is what Nino says about himself on LinkedIn. The video is a little hard to understand in places due to language differences and (we think) a slow or low-bandwidth connection between the U.S.-based Zoom servers and Eastern Europe, a problem that crops up now and then in video conversation and VOIP phone calls with people in that part of the world, no matter what service you choose. But Vranešič is worth a little extra effort to hear, because it’s great to learn that open source is being used in lots of government agencies, not only in Slovenia but all over Europe. And aside from this, Vranešič himself is a tres cool dude who is an ardent open source volunteer (“Mozilla Rep” is an unpaid volunteer position), and I hope I have a chance to meet him F2F next time he comes to a conference in Florida — and maybe you’ll have a chance to meet him if he comes to a conference near you.

        • SaaS/Back End

          • Mirantis and NTT Com Double Down on OpenStack

            Mirantis continues to drive forward with new partnerships focused on the OpenStack cloud computing platform. The company and NTT Communications Corporation (NTT Com) have announced that they will partner to offer fully managed Private OpenStack as a service in NTT Com Enterprise Cloud and its data center services across the globe. NTT Com, in becoming Mirantis’ first data center services partner, says it will offer Mirantis Managed OpenStack on NTT Com Enterprise Cloud’s Metal-as-a-Service.

          • Using metrics effectively in OpenStack development

            At the OpenStack summit taking place this month in Barcelona, Ildikó Váncsa will be speaking on metrics in her talk Metrics: Friends or Enemies? She will discuss OpenStack metrics and how they can be used in software development processes, both for the individual developer and manager.

            I caught up with Ildikó before her talk to learn more about how metrics in OpenStack help guide developers and companies, and how they also drive evolution of the OpenStack community itself.

        • Databases

          • MySQL and database programming for beginners

            Dave Stokes has been using MySQL for more than 15 years and has served as its community manager since 2010. At All Things Open this year, he’ll give a talk about database programming for newbies with MySQL.

            In this interview, he previews his talk and shares a few helpful resources, required skills, and common problems MySQL beginners run into.

        • Pseudo-Open Source (Openwashing)

          • Nadella’s trust talk is just so much hot air

            Microsoft chief executive Satya Nadella appears to have an incredibly short memory. Else he would be the last person who talks about trust being the most pressing issue in tech in our times.

            Over the last year, we have been treated to a variety of cheap tricks by Microsoft, attempting to hoodwink Windows users left, right and centre in order to get them to upgrade to Windows 10. After that, talking about trust sounds odd. Very odd.

            Microsoft does not have the best reputation among tech companies. It is known for predatory practices, for being convicted as a monopolist, and in recent times has been trying to cultivate a softer image as a company that is not as rapacious as it once was.

            That has, in large measure, come about as its influence and rank in the world of computing have both slipped, with other companies like Apple, Facebook and Google coming to dominate.

        • BSD

        • Public Services/Government

          • Open source where possible in Polish Gdańsk

            The city of Gdańsk, Poland’s sixth largest city, is using open source software applications where possible. Open source is called an ‘important element’ in the Operational Programmes, made public in August. This document describes the tasks and activities set out by the city to achieve the goals it defined in the Gdańsk 2030 Plus Development Strategy.

        • Openness/Sharing/Collaboration

          • Ranking the Web With Radical Transparency

            Ranking every URL on the web in a transparent and reproducible way is a core concept of the Common Search project, says Sylvain Zimmer, who will be speaking at the upcoming Apache: Big Data Europe conference in Seville, Spain.

            The web has become a critical resource for humanity, and search engines are its arbiters, Zimmer says. However, the only search engines currently available are for-profit entities, so the Common Search project is creating a nonprofit engine that is open, transparent, and independent.

            We spoke with Zimmer, who founded Jamendo, dotConferences, and Common Search, to learn more about why nonprofit search engines are important, why Apache Spark is such a great match for the job, and some of the challenges the project faces.

          • Open Hardware/Modding

        • Programming/Development

        Leftovers

        • What You Should Know About Ken Bone

          Photoshops, memes, witty comments, retweets, offhanded references … and now, for some reason, his sexual fetishes are making national news.

        • Come On Elon! Tesla Stupidly Bans Owners From Using Self-Driving Teslas For Uber

          We’ve talked a lot about the end of ownership society, in which companies are increasingly using copyright and other laws to effectively end ownership — where they put in place restrictions on the things you thought you bought. This is bad for a whole variety of reasons, and now it’s especially disappointing to see that Tesla appears to be jumping on the bandwagon as well. The company is releasing its latest, much more high powered, version of autonomous self-driving car technology — but has put in place a clause that bars Tesla owners from using the self-driving car for any competing car hailing service, like Uber or Lyft. This is not for safety/liability reasons, but because Tesla is also trying to build an Uber competitor.

          We wrote about this a few months ago, and actually think it’s a pretty cool idea. Part of the point is that it effectively will make Tesla ownership cheaper for those who want it, because they can lease it out for use at times when they’re not using it. So your car can make money for you while you work or sleep or whatever. That’s a cool idea.

        • Science

          • Artificial intelligence could be the greatest disaster in human history

            Stephen Hawking has warned artificial intelligence could be the greatest disaster in human history if it is not properly managed.

            The world famous physicist said AI could bring about serious peril in the creation of powerful autonomous weapons and novel ways for those in power to oppress and control the masses.

            Hawking suggested AI could be the last event in the history of our civilisation if humanity did not learn to cope with the risks it posed.

        • Health/Nutrition

          • UNICEF Tender Allows Gavi To Supply Vaccines For Millions Of Children

            Gavi, the vaccine alliance, announced yesterday that a UNICEF pentavalent vaccine tender will secure sufficient supplies for the next three years to protect millions of children in Gavi-supported and transitioning countries.

            According to a Gavi press release, pentavalent vaccine will be accessible from a broad base of manufacturers at less than US$1: half this year’s average price.

            Pentavalent vaccine protects against five major infections in one shot: diphtheria, tetanus, pertussis, hepatitis B and Haemophilus influenzae type b (Hib), according to Gavi.

          • Flint Water Panel Calls for New Emergency Management Rules

            Michigan should consider abandoning its one-person emergency management structure and instead install a team of three experts when deficit-ridden municipalities and school districts fall under state control, according to a report released Wednesday by a legislative committee that investigated Flint’s lead-tainted water crisis.

            Nine current or former government workers have been criminally charged since doctors detected elevated levels of lead in some children due to the discolored and smelly water supply in the impoverished city of nearly 100,000.

        • Security

          • Security advisories for Thursday
          • More information about Dirty COW (aka CVE-2016-5195)

            The security hole fixed in the stable kernels released today has been dubbed Dirty COW (CVE-2016-5195) by a site devoted to the kernel privilege escalation vulnerability. There is some indication that it is being exploited in the wild. Ars Technica has some additional information. The Red Hat bugzilla entry and advisory are worth looking at as well.

          • New Debian Linux Kernel Update Addresses “Dirty COW” Bug, Three Security Issues
          • CVE-2016-5195

            My prior post showed my research from earlier in the year at the 2016 Linux Security Summit on kernel security flaw lifetimes. Now that CVE-2016-5195 is public, here are updated graphs and statistics. Due to their rarity, the Critical bug average has now jumped from 3.3 years to 5.2 years. There aren’t many, but, as I mentioned, they still exist, whether you know about them or not. CVE-2016-5195 was sitting on everyone’s machine when I gave my LSS talk, and there are still other flaws on all our Linux machines right now. (And, I should note, this problem is not unique to Linux.) Dealing with knowing that there are always going to be bugs present requires proactive kernel self-protection (to minimize the effects of possible flaws) and vendors dedicated to updating their devices regularly and quickly (to keep the exposure window minimized once a flaw is widely known).

          • “Most serious” Linux privilege-escalation bug ever is under active exploit (updated)

            While CVE-2016-5195, as the bug is cataloged, amounts to a mere privilege-escalation vulnerability rather than a more serious code-execution vulnerability, there are several reasons many researchers are taking it extremely seriously. For one thing, it’s not hard to develop exploits that work reliably. For another, the flaw is located in a section of the Linux kernel that’s a part of virtually every distribution of the open-source OS released for almost a decade. What’s more, researchers have discovered attack code that indicates the vulnerability is being actively and maliciously exploited in the wild.

          • Linux Kernels 4.8.3, 4.7.9 & 4.4.26 LTS Out to Patch “Dirty COW” Security Flaw

            Today, October 20, 2016, Linux kernel maintainer Greg Kroah-Hartman announced three new maintenance updates for the Linux 4.8, 4.7, and 4.4 LTS kernel series, patching a major security vulnerability.

            Known as “Dirty COW,” the Linux kernel vulnerability documented at CVE-2016-5195 is, in fact, a nasty bug that could have allowed local users to write to any file they can read. The worst part is that the security flaw was present in various Linux kernel builds since at least the Linux 2.6.x series, which reached end of life in February this year.

          • Canonical Patches Ancient “Dirty COW” Kernel Bug in All Supported Ubuntu OSes

            As reported earlier, three new Linux kernel maintenance releases arrived for various Linux-based operating systems, patching a critical and ancient bug popularly known as “Dirty COW.”

            We already told you that the kernel vulnerability could be used by a local attacker to run programs as an administrator, and it looks like it also affects all supported Ubuntu releases, including Ubuntu 16.10 (Yakkety Yak), Ubuntu 16.04 LTS (Xenial Xerus), Ubuntu 14.04 LTS (Trusty Tahr), and Ubuntu 12.04 LTS (Precise Pangolin), as well as all of their official or unofficial derivatives running the same kernel builds.

          • Linux users urged to protect against ‘Dirty COW’ security flaw

            Organisations and individuals have been urged to patch Linux servers immediately or risk falling victim to exploits for a Linux kernel security flaw dubbed ‘Dirty COW’.

            This follows a warning from open source software vendor Red Hat that the flaw is being exploited in the wild.

            Phil Oester, the Linux security researcher who uncovered the flaw, explained to V3 that the exploit is easy to execute and will almost certainly become more widely used.

            “The exploit in the wild is trivial to execute, never fails and has probably been around for years – the version I obtained was compiled with gcc 4.8,” he said.

          • Dirty Cow, Ubuntu @ 12, Save a Penguin

            Dirty Cow is a local privilege vulnerability that can allow one to gain root access. Specifically, “race condition was found in the way the Linux kernel’s memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.” Linus signed off and pushed the patch to git a few days ago and distributions are currently updating their products. This is considered a critical bug and users are encouraged to update as soon as possible because researchers have found code in the wild to exploit it. Worse still, the exploit leaves little or no trace of being compromised. So, keep an eye on your update applets or security advisories over the next few days. Since this bug has been in existence for so long, Kees Cook had to revise his critical bug lifetime average from 3.3 to 5.2 years, while the overall average for all bugs increased only slightly.

          • Hackers Hit U.S. Senate GOP Committee

            The national news media has been consumed of late with reports of Russian hackers breaking into networks of the Democratic National Committee. Lest the Republicans feel left out of all the excitement, a report this past week out of The Netherlands suggests Russian hackers have for the past six months been siphoning credit card data from visitors to the Web storefront of the National Republican Senatorial Committee (NRSC).

            [...]

            Dataflow markets itself as an “offshore” hosting provider with presences in Belize and The Seychelles. Dataflow has long been advertised on Russian-language cybercrime forums as an offshore haven that offers so-called “bulletproof hosting,” a phrase used to describe hosting firms that court all manner of sites that most legitimate hosting firms shun, including those that knowingly host spam and phishing sites as well as malicious software.

            De Groot published a list of the sites currently present at Dataflow. The list speaks for itself as a collection of badness, including quite a number of Russian-language sites selling synthetic drugs and stolen credit card data.

            According to De Groot, other sites that were retrofitted with the malware included e-commerce sites for the shoe maker Converse as well as the automaker Audi, although he says those sites and the NRSC’s have been scrubbed of the malicious software since his report was published.

            But De Groot said the hackers behind this scheme are continuing to find new sites to compromise.

            “Last Monday my scans found about 5,900 hacked sites,” he said. “When I did another scan two days later, I found about 340 of those had been fixed, but that another 170 were newly compromised.”

          • Thoughts on the BTB Paper

            The Branch Target Buffer (BTB) whitepaper presents some interesting information. It details potential side-channel attacks by utilizing timing attacks against the branch prediction hardware present in Intel Haswell processors. The article does not mention Intel processors later than Haswell, such as Broadwell or Skylake.

            Side-channel attacks are always interesting and fun. Indeed, the authors have stumbled into areas that need more research. Their research can be applicable in certain circumstances.

            As a side-note, KASLR in general is rather weak and can be considered a waste of time[1]. The discussion why is outside the scope of this article.

          • Donald Trump running insecure email servers

            In addition, Beaumont said he’d found that emails from the Trump Organization failed to support two-factor authentication. That’s particularly bad because the Trump Organization’s web-based email access page relies on an outdated March 2015 build of Microsoft Exchange 2007, he says. “Windows Server 2003, IIS 6 and Exchange 2003 went end of life years ago. There are no security fixes. They don’t have basics down,” the UK based researcher concludes.

          • Video: Endgame, Live from Grace Hopper 2016 [Ed: covers voting security]

            Andrea Limbago is interviewed by the CUBE at the Grace Hoper Celebration 2016 conference. She covers a number of interesting topics and I thought it was worth sharing. Enjoy!

          • Stable Linux Kernel Updates Roll Out To Address “Dirty COW” CVE
          • Dirty COW explained: Get a moooo-ve on and patch Linux root hole [Ed: If there was no branding, logo and Web site would it be news?]
          • Dirty COW: Linux kernel security flaw bypasses antivirus software
          • Warnings over Dirty Cow Linux bug [Ed: BBC found something negative to say about Linux so even a local privilege-escalation bug is “news”]
          • ‘Dirty Cow’ Linux vulnerability found after nine years [Ed: Wow, finally. The Guardian covers “Linux”… Couldn’t get the BBC and The Gurdian to cover Linux even when this kernel turned 25, but some old bug is major news? Shame. Both publications are Bill Gates-funded.]
          • “Dirty COW” Is The Most Dangerous Linux Privilege-escalation Bug Ever, Experts Say
          • Attackers exploit ancient ‘Dirty COW’ kernel flaw [Ed: My assessment: A CVE hyped up as “Dirty COW” is a lot more hype and fear-mongering than it ought to be. Pure marketing almost…]
          • Dirty COW Linux vulnerability – what you need to know
          • A serious Linux privilege-escalation bug has been in the wild for nine years
          • Linux Kernel Zero-Day CVE-2016-5195 Patched After Being Deployed in Live Attacks
          • ‘Dirty COW’ Linux kernel security vulnerability being exploited in the wild, warns Red Hat
          • The NyaDrop Trojan for Linux-running IoT Devices
          • Flaw resides in BTB helps bypass ASLR
          • Thoughts on the BTB Paper

            Though the attack might have some merits with regards to KASLR, the attack on ASLR is completely debunked. The authors of the paper didn’t release any supporting code or steps for independent analysis and verification. The results, therefore, cannot be trusted until the authors fully open source their work and the work is validated by trusted and independent third parties.

          • Spreading the DDoS Disease and Selling the Cure

            Earlier this month a hacker released the source code for Mirai, a malware strain that was used to launch a historically large 620 Gbps denial-of-service attack against this site in September. That attack came in apparent retribution for a story here which directly preceded the arrest of two Israeli men for allegedly running an online attack for hire service called vDOS. Turns out, the site where the Mirai source code was leaked had some very interesting things in common with the place vDOS called home.

        • Defence/Aggression

          • Channel 4 News defends Facebook live stream of battle for Mosul

            Channel 4 News has defended its decision to live stream a conflict for the first time amid concerns over the dangers of watching the battle for Mosul on a Facebook live feed.

            The publicly owned broadcaster joined other TV stations including Al-Jazeera and Rudaw, the Kurdish news agency that provided the content, to live stream the advance of Iraqi troops and Kurdish fighters into Mosul, Islamic State’s last major stronghold in Iraq.

            Watched more than 500,000 times by lunchtime on Tuesday, the Channel 4 News feed prompted a mixed response with several users questioning the appropriateness of “liking” and pasting emojis on scenes of potential devastation.

          • US marines to establish Norway ‘base’ by January

            The US Marine Corps is to establish a new base in northern Norway as early as January, as Nato forces work to improve their ability respond rapidly to potential Russian aggression
            Maj. Gen. Niel E. Nelson, commander of US Marine Forces in Europe and Africa, told US broadcaster CNN that the new marine base was under discussion with the Norwegian government.

            “We enjoy a very close relationship with the Norwegian Armed Forces and a limited rotational presence in Norway would certainly enhance this relationship and our ability to operate together,” he said in a statement

          • Let’s Rethink What ‘Leadership’ Means in Foreign Policy

            As a retired lieutenant colonel for the U.S. Army, I want to be positive. Even when I’ve identified major conceptual and practical failures in the conduct of American foreign and military policy, I’ve suggested alternatives that could improve the situation. But when looking at the state of our foreign policy in this moment, and given how entrenched the foreign-policy elite in Washington has become, a rational optimism is getting more and more difficult to find.

            In practice, the current administration tries to keep a lid on problems by applying limited military power—at least regarding troop levels—over large sections of the globe. These military operations are tactical in nature, designed to achieve small-scale results, without the consideration of how or even whether they support some larger strategic objective.

          • Agencies Found to Be Ignoring IGs to the Tune of $87 Billion

            Federal agencies are wasting $87 billion by failing to implement more than 15,000 inspector general recommendations, according to a new report released by Republican senators.

            Many of the proposals have been floated for more than 10 years, wrote Sens. Ron Johnson, R-Wis., who chairs the Homeland Security and Governmental Affairs Committee, and Chuck Grassley, R-Iowa, in their findings. The lawmakers and their staffs compiled the data over the last year from 72 different inspectors general at federal agencies governmentwide, and issued the final document without Democratic input.

          • Washington’s foreign policy elite breaks with Obama over Syrian bloodshed

            There is one corner of Washington where Donald Trump’s scorched-earth presidential campaign is treated as a mere distraction and where bipartisanship reigns. In the rarefied world of the Washington foreign policy establishment, President Obama’s departure from the White House — and the possible return of a more conventional and hawkish Hillary Clinton — is being met with quiet relief.

            The Republicans and Democrats who make up the foreign policy elite are laying the groundwork for a more assertive American foreign policy, via a flurry of reports shaped by officials who are likely to play senior roles in a potential Clinton White House.

          • Clinton’s “Incredibly Dangerous” Nuclear Brinkmanship

            Rowley, a former FBI special agent and division counsel whose May 2002 memo to the FBI Director exposed some of the FBI’s pre-9/11 failures was named one of TIME magazine’s “Persons of the Year” in 2002. She said today: “Clinton is engaging in incredibly dangerous brinkmanship with a nuclear superpower but at the same time, trying to lull the public into complacency about the danger she intends to place them in. Last night, she again pledged she would, after being elected, institute a ‘no-fly zone’ and ‘safe zones’ over Syria but she evaded answering the debate moderator’s direct question as to whether she would give the order to shoot down Russian aircraft over Syria. Her evasive response was directly at odds with the recent assessment of General Dunford, Chairman of the Joint Chiefs of Staff in testimony to Congress (as well as earlier assessments from former Chief Martin Dempsey and other top generals) that establishing a ‘no-fly zone’ would almost certainly mean war with Syria (and Russia).

            “In addition, Clinton mischaracterized what the intelligence agencies are saying about the emails to/from her campaign chief of staff, John Podesta, that are being put out by WikiLeaks. She claimed they have come from ‘the highest levels of the Russian government, clearly, from Putin himself, in an effort, as 17 of our intelligence agencies have confirmed, to influence our election.’

            “In fact, a carefully crafted statement from the Office of the Director of National Intelligence (James Clapper) was far less definitive, stating: ‘The recent disclosures … are consistent with the methods and motivations of Russian-directed efforts.’ It’s also worth noting that this was not the conclusion of a National Intelligence Estimate, merely a statement from the ODNI and Department of Homeland Security.” [Note: Because of an editing error by IPA staff, this news release originally quoted the line from the ODNI statement: “However, we are not now in a position to attribute this activity to the Russian Government.” But that sentence was referring to “scanning and probing of … election-related systems” — not to the recent WikiLeaks disclosures. IPA regrets the error.]

            ELIZABETH MURRAY, emurray404[at]aol.com, @elizabethmurra
            Murray served as deputy national intelligence officer for the Near East in the National Intelligence Council before retiring after a 27-year career in the U.S. government, where she specialized in Middle Eastern political and media analysis. See her page at Consortium News, including “How U.S. Propaganda Fuels New Cold War” and “Seeking a Debate on ‘Regime Change’ Wars.”

          • ‘Time to say goodbye to US,’ Philippines’ Duterte proclaims on historic China visit

            It’s “time to say goodbye” to the United States, said Philippines President Rodrigo Duterte on a visit to China, where he and President Xi Jinping are turning the recently-frosty tide with bilateral agreements, while Washington now gets the cold shoulder.

            Duterte spoke to the press in Beijing on Wednesday, on the eve of talks with Xi. There was scant information about what was to come on Thursday, but Duterte’s conference coincided with talk of unprecedented agreements being written up – particularly the granting to the Philippines the use of Scarborough Shoal territories – a disputed resource-rich area in the South China Sea.

          • ‘The Promise:’ The Armenian Genocide Epic Kirk Kerkorian Spent a Fortune to Make

            “The Promise,” a sweeping historical romance starring Oscar Isaac and Christian Bale, is the kind of movie epic they just don’t make anymore. It’s a throwback to David Lean’s “Doctor Zhivago” and Warren Beatty’s “Reds,” movies that transposed big, emotional stories against a sprawling canvas, and tugged at the heartstrings while dealing with thorny political periods.

          • Finland: Russian propaganda questioning our validity risks destabilising country

            Finnish government communications chief Markku Mantila said his officials had observed a barrage of state-sponsored media attacks ahead of the country’s celebrations marking 100 years of independence from Russia

          • Pakistan bans Bollywood and Indian television as Kashmir dispute spills over into entertainment industry

            Pakistan is banning Bollywood films and all Indian programmes and music across the country’s television and radio networks amid heightened tensions with its neighbour in the disputed Kashmir region.

            The two countries have exchanged cross-border fire in recent weeks, after India blamed Pakistani forces for raid on one of its army bases that left 18 soldiers dead last month and responded with “surgical strikes”.

            Narendra Modi, the Indian Prime Minister, vowed that the attack would “not go unpunished”, while his Pakistani counterpart Nawaz Sharif denied his country’s forces were involved and condemned “the unprovoked and naked aggression of Indian forces”.

            The escalation has provoked international alarm, spilling over into the world of entertainment and celebrity in both countries.

        • Transparency/Investigative Reporting

          • 4chan, Anonymous working to get Julian Assange working internet

            It’s been a rough week for WikiLeaks leader Julian Assange, who’s cooped up in the Ecuadorian embassy in London with no internet and, possibly, poisonous vegan meals trying to kill him.

            But members of 4chan and Anonymous are rallying together to get Assange the Wi-Fi he needs so that a good samaritan can stop reading him everything off of the internet.

            The plan, per a report by The Next Web, is called “Operation Hot Pockets” and involves members of the notorious internet gathering around the embassy, in shifts, to create wireless hotspots so Assange can, once again, access the internet to leak emails, update his Friendster account, and do whatever else he needs to do (Instacart?).

          • WikiLeaks claims sham U.S. firm is trying to smear Assange

            The anti-secrecy group WikiLeaks is claiming that an elaborate and somewhat wacky smear campaign has targeted the group’s founder, Julian Assange, to paint him as a pedophile and Russian client.

            WikiLeaks said the smear efforts, which it’s outlined in tweets and a series of documents over the past two days, include a sham offer from the Russian government to pay Assange $1 million to promote a women’s dating site and a separate scheme to link Assange to a criminal case in the Bahamas.

            The assertions are the latest twist in events that have kept Assange and WikiLeaks at center stage of the presidential campaign. The smears come as WikiLeaks releases tens thousands of emails hacked from the Democratic National Committee and from the personal email account of campaign chairman John Podesta.

          • ‘We wouldn’t not publish Trump documents or suppress them, but we can only work with what we’ve got’

            Last Sunday, Sarah Harrison stayed up to watch the second US presidential election debate between Democratic Party nominee Hillary Clinton and Republican rival Donald Trump. The organisation she works for, WikiLeaks, got a special mention at the showdown.

            “Our intelligence community just came out and said, in the last few days, that the Kremlin… are directing attacks, are hacking American accounts to influence the election,” Clinton said. “WikiLeaks is part of that, as are other sites.”

            It’s an accusation that rankles a little bit with Harrison.

            “This sort of attack keeps coming against us,” she says. “She [Hillary Clinton] is basically saying that the US intelligence community has confirmed this. But in their statements they have used vague language like ‘it’s the sort of thing we’ve come to expect from the Russians’. There’s no proof it comes from the Russians. We operate on the basis of source anonymity. We don’t comment on sourcing.”

          • Former CIA Employee Sues Agency Over Its Refusal To Provide Documents In Electronic Form

            The CIA is still causing problems for Jeffrey Scudder. Scudder used to work for the CIA. He was forced out of the agency after making a FOIA request for “historical documents of long-dormant conflicts and operations” while still employed there. Perhaps the agency thought only citizens outside of the agency should be making FOIA requests. Or maybe it thought Scudder was engaged in a particularly labyrinthine plot to exfiltrate declassified documents out of the agency. Whatever its thought process, it resulted in an FBI raid of Scudder’s house, the seizure of his electronics, and the end of his career.

            Unfortunately for the CIA, this has given Scudder more time to file FOIA requests and sue the agency when it responds in increasingly ridiculous ways. Scudder has already tangled with the CIA over its refusal to join the 20th century (never mind the current one) when turning over responsive documents. His last major request to the agency asked for “softcopy” — i.e., not paper — copies of 419 articles from the CIA’s “Studies in Intelligence.”

            The CIA told him it had no way of providing him documents in the format he asked for. Instead, it claimed it only had one way to comply with the request: the stupidest, most circuitous way.

          • The Wikileaks Story Is Even More Dramatic Thanks to This Composer’s Auto-Tuned Opera

            In early 2010, a US Army intelligence analyst stationed in Iraq sent three quarters of a million military and diplomatic documents to WikiLeaks, a non-profit founded by Julian Assange dedicated to sharing official documents “alleging government and corporate misconduct,” according to their website. Private Bradley Manning, the analyst behind the biggest intelligence leak in US history, then confessed to his deed in an online chat with a known hacker named Adrian Lamo. In May of 2010, Lamo reported the confession to US Army counterintelligence, the chat logs were published by Wired.com, and by July of 2013, Private Manning had been charged by the US government with 22 offenses, including “aiding the enemy.” After pleading guilty to 10 of the charges and the trial finished on August 21st in 2013, Manning was sentenced to 35 years in prison.

          • This Is Huge: New Project Releases All Current (Non-Confidential) Congressional Research Service Reports

            Going back nearly a decade, we’ve been talking about the ridiculousness of Congress refusing to publicly release reports from the Congressional Research Service (CRS). As we’ve discussed many times, CRS is an in-house think tank for Congress that is both famously non-partisan and actually really good at what they do. CRS reports tend to be really useful and highly credible (which is part of the reason why Congress isn’t a fan of letting them out into the public). Of course, as works of the federal government, CRS reports are in the public domain, but the way it’s always worked is that the reports are released only to members of Congress. These include both general reports on topics that are released to every member of Congress, or specific research tasked by a member for the CRS to investigate and create a new report. The members who receive the reports are able to release them to the public, and some do, but the vast majority of CRS work remains hidden from public view. For the most part, both CRS and Congress have resisted any attempt to change this. Going back decades, they’ve put together a mostly ridiculous list of reasons opposing plans to more widely distribute CRS reports.

            Some members of Congress keep introducing bills to make these public domain CRS reports actually available to the public. We’ve written about such attempts in 2011, 2012, 2015 and earlier this year. And each time they get shot down, often for completely ridiculous reasons, including the belief that making these reports public will somehow hurt CRS’s ability to continue to do good, non-partisan research.

            At times, different organizations and groups have taken up the cause themselves. Back in 2009, Wikileaks hit the jackpot and released nearly 7,000 such CRS reports. Steve Aftergood at the Federation of American Scientists has been posting CRS reports to a public archive for quite some time. There’s also Antoine McGrath’s CRSReports.com and some other sites that all create archives of CRS reports that they’ve been able to collect from various sources.

          • Agents of influence: How reporters have been “weaponized” by leaks

            Since June, some entity has been releasing e-mails and electronic documents obtained via network intrusions and credential thefts of politicians and political party employees. Some of the releases have appeared on sites believed to be associated with Russian intelligence operations; others have appeared on Wikileaks. On occasion, the leaker has also engaged journalists directly, trying to have them publish information drawn from these documents—sometimes successfully, other times not.

            The US government has pinned at least some of the blame for these leaks on Russia. This has led some observers to argue that WikiLeaks and Russian intelligence agencies are “weaponizing” the media. This is what national security circles refer to as an “influence operation,” using reporters as tools to give credibility and cover to a narrative driven by another nation-state. The argument is that by willingly accepting leaked data, journalists have (wittingly or not) aided the leaker’s cause. As such, they have become an “agent of influence.”

          • Agent of Influence 2.0

            An agent of influence is a particular type of agent used by an agency to deliver information (or a narrative) they hope will sway public opinion. There are three types of agent of influence:

            Controlled Agent — an agent under the direct control of an agency

            Trusted Contact — someone who is aware that they are being fed data by an agency; who is also looking to advance the same/similar agenda, but is not directly under the control of the agency

            Unwitting Agent — sometimes called a “useful idiot,” these agents are not aware of their role as conduits of data for an agency

            The primary role for an agent of influence is to add credibility to the narrative / data that the agency is attempting to get out and help influence the public.

        • Environment/Energy/Wildlife/Nature

          • World’s mammals being eaten into extinction, report warns

            Hundreds of mammal species – from chimpanzees to hippos to bats – are being eaten into extinction by people, according to the first global assessment of the impact of human hunting.

            Bushmeat has long been a traditional source of food for many rural people, but as roads have been driven into remote areas, large-scale commercial hunting is leaving forests and other habitats devoid of wildlife.

            The scientists behind the new analysis warned that, without action, the wiping out of these species could lead to the collapse of the food security of hundreds of millions of people reliant on bushmeat for survival.

            The work comes against the backdrop of the natural world undergoing the greatest mass extinction since a giant meteorite strike wiped out the dinosaurs 65m years ago, with species vanishing far more rapidly than the long term rate, driven by the destruction and invasion of wild areas by humans and their livestock and hunting.

          • Norway nature group calls for limits to tourist hikers

            Norway’s leading hiking group has called for limits to the huge number of tourists hiking to Pulpit’s Rock and other attractions.
            Lasse Heimdal, leader of Friluftsliv, an umbrella organisation for those engaged hiking and other outdoor pursuits, said there was a risk that the huge spike in tourists seen in recent years would damage the most popular sites.

            He argued that was “urgent that we now take measures to ensure that outdoor life is safeguarded”.

            “If the large loads might damage nature, the authorities are obliged to impose countermeasures,” he told NRK. “Limiting access can be one of the measures.”

          • Greenland is Melting

            Not long ago, I attended a memorial service on top of the Greenland ice sheet for a man I did not know. The service was an intimate affair, with only four people present. I worried that I might be regarded as an interloper and thought about stepping away. But I was clipped onto a rope, and, in any case, I wanted to be there.

            The service was for a NASA scientist named Alberto Behar. Behar, who worked at the Jet Propulsion Laboratory, in Pasadena, might be described as a twenty-first-century explorer. He didn’t go to uncharted places; he sent probes to them. Some of the machines he built went all the way to Mars; they are orbiting the planet today or trundling across its surface on the Curiosity rover. Other Behar designs were deployed on Earth, at the poles. In Antarctica, Behar devised a special video camera to capture the first images ever taken inside an ice stream. In Greenland, he once sent a flock of rubber ducks hurtling down a mile-long ice shaft known as a moulin. Each duck bore a label, offering, in Greenlandic, English, and Danish, a reward for its return. At least two made it through.

            When Behar died, in January, 2015—he crashed his single-engine plane onto the streets of Los Angeles—he was at work on another probe. This one, dubbed a drifter, looked like a toolbox wearing a life preserver. It was intended to measure the flow of meltwater streams. These so-called supraglacial rivers are difficult to approach, since their banks are made of ice. They are often lined with cracks, and usually they end by plunging down an ice shaft. The drifter would float along, like a duck, collecting and transmitting data, so that, by the time it reached a moulin and was sucked in, it would have served its purpose.

        • Finance

          • Saudi Arabia’s $17.5 Billion Bond Sale Draws Investors

            Banks and investors flocked to buy Saudi Arabia’s first global bonds, a milestone in the giant oil producer’s efforts to diversify its economy and embrace global financial markets.

          • Iain Macwhirter: Panic! We’re led by a Dad’s Army of Brexiter buffoons

            The vote to leave the EU has been widely interpreted as a cry of anguish, predominantly from the dispossessed in non-metropolitan England: white working class people, typically in the north, who feel they have been left behind by globalisation, rising inequality, casualisation and low pay.

            It is a cruel irony, therefore, that it is these people, the ones at the bottom of the social heap, who stand to be worst hit by the emerging post-Brexit economy. There have been howls of anguish from financiers in the City of London, who are demanding a special deal in the EU, and, since money talks, they’ll probably get one. But the first casualties, as The Herald reported yesterday, will be low-income families caught in the vice of rising living costs and benefit cuts who stand to lose £360 a year. As we know, most of the working-age benefit claimants are actually in work and their income had already been squeezed by 10 per cent since the 2008 crash.

          • CETA – new documents and declarations (as of 19 October)

            Several documents have been transmitted to the Walloon parliament, including these.

            Again, nothing clear about the legal weight of these documents. Interesting to see how many of them are unilateral declarations of the Commission or of the Council or even of one member state, which means they did not convince Canada to make those joint statements, which makes them even weaker than the joint interpretative declaration that has already wiedly been criticised. Indeed, even a joint interpretative declaration cannot solve the concerns that have been expressed.

          • Citizens’ Summit Contra CETA: It’s Not Only Wallonia

            With the vote on the European Union-Canada trade agreement (CETA) on the agenda once more at the upcoming EU Council meeting tomorrow the representatives of European and Canadian cities and regions gathered at Brussels today for a “CETA Citizens’ Summit.” Gerardo Pisarello, vice mayor of the city of Barcelona, said that cities like his see CETA as a barrier to their plans to remunicipalize water and energy services and the attempts “to open up public procurement to small companies and cooperatives.”

          • Power company drags Guatemala back to ICSID

            The case is the second ICSID claim to be filed against Colombia. The first, by mining company Glencore International, was filed earlier this year. Freshfields Bruckhaus Deringer is acting for the claimants in the two cases and also defended Guatemala in its dispute with TECO, though so far the state has not instructed counsel for the resubmitted claim.

            Last week, another ICSID tribunal issued a decision on rectification in a dispute between Philip Morris and Uruguay, making only minor corrections to an award issued earlier this year, which had held the state’s tobacco control regulations were not in breach of an investment treaty.

          • TTIP: the impact on the Greek democracy, economy and society

            The Transatlantic Trade and Investment Partnership (TTIP), belongs to the “new generation”of trade agreements. Together with Comprehensive Economic and Trade Agreement (CETA), the Trade in Services Agreement (TiSA) and the Trans-Pacific Partnership (TPP) is one of the most important forthcoming steps for the wide-ranging transformation of the bourgeois society and capitalism.

        • AstroTurf/Lobbying/Politics

          • WikiLeaks poisons Hillary’s relationship with left

            Donald Trump is pointing to a stream of hacked emails as proof that Hillary Clinton would be a compromised president, but a surprising number of progressives are drawing similar conclusions — albeit for a totally different reasons.

            Some of the left’s most influential voices and groups are taking offense at the way they and their causes were discussed behind their backs by Clinton and some of her closest advisers in the emails, which swipe liberal heroes and causes as “puritanical,” “pompous”, “naive”, “radical” and “dumb,” calling some “freaks,” who need to “get a life.”

          • Jill Stein op-ed: Break the blackout on political competition in America

            A voter revolt is brewing in America. People are fed up, and they should be. The super rich are destroying our economy, sending our jobs overseas and making our planet uninhabitable. But instead of offering real solutions, the two-party system has produced the two most disliked and distrusted candidates in history.

            In a Fox News poll from Sept. 30, 57 percent of voters said their choice in the presidential election is motivated primarily not by enthusiasm, but by fear of the other candidate. Democrats and Republicans have lost ground to independents, now the largest voting block. Meanwhile, an incredible 57 percent of Americans polled recently by Gallup say the Democratic and Republican parties have failed and we need a new major party. In short, the American people are ready for real competition to the two-party system.

            As I travel the country, I hear disgust with both parties, especially among young people. They see a political establishment that is unwilling or unable to tackle the dead-end economy, crushing student debt, endless expanding wars, growing climate crisis and injustice in our legal and immigration systems. They see Donald Trump as an ignorant, bigoted predator and Hillary Clinton as an untrustworthy insider with a troubling record. The Green Party’s message makes sense to many because Greens have the freedom, as the only national party that doesn’t take corporate money, to speak out for fair, common-sense solutions that establishment politicians won’t touch.

          • Op Ed: Investigative Journalism is Not Dead

            Okay, so, I wasn’t going to submit these here because I’ve really had quite enough of politics for the year but it seems the mainstream media are having an absolute blackout on anything critical of Hillary, to the point of CNN has both coincidentally lost a sitting congressman’s satellite feed immediately after mentioning wikileaks and tried to tell their viewers that even reading the wikileaks emails is illegal.

            These two videos by Project Veritas Action, apparently with more to come, are the result of a year or so of actual investigative journalism and deserve coverage somewhere though. I don’t personally care at all if you like Hillary or not but it’s always better to know the truth than to stick your head in the sand, so here they are.

          • If You’re Ever Dissed in a Hacked Email, Try to Respond Like Larry Lessig

            Lawrence Lessig is a professor at Harvard Law School, a leading advocate for campaign finance reform, and short-lived presidential candidate.

            He was also, in the view of the Clinton campaign, circa August 2015, a “smug,” “pompous,” loathsome guy whom a reasonable person might wish “to kick the shit out of on Twitter.”

          • Jill Stein offers third party perspective on final debate

            The final debate of the 2016 Presidential Election was a terse one, with more jabs than a UFC event. While the debate only featured the two mainstream candidates, Jill Stein used Facebook Live to communicate the Green Party’s goals for the country and politics.

            While the mainstream debates mostly focused on which candidate is more corrupt politically and morally, Jill Stein’s Facebook Live event drew 12,500 viewers who were excited to hear of an alternative to the two-party system. Leaving Donald Trump and Hillary Clinton to mudsling and name-call, Stein wanted to focus on the need for a three-party system and offering alternatives to the corporate-backed political system.

          • Green Party V.P. candidate makes visit to Muskegon, hopes for support

            Green Party vice-presidential candidate Ajamu Baraka visited Muskegon, and his stop was not at a college campus or a coffee shop but the Michigan Department of Corrections campus.

            Baraka visited Wednesday, Oct. 19, with prison inmate Rev. Edward Pinkney, who is serving time at the prison for a conviction on an election law forgery charge.

            “For him to be given a 30-month sentence allegedly for changing some signatures on a voter card that is outrageous,” Baraka said.

            Baraka has a message to voters looking for a home this election cycle: “We say you only have one choice and that is to support the Green Party. Don’t let fear undermine your commitment to principal.”

          • Green Party Candidate Jill Stein Rips John Oliver’s ‘Deceptive Attack’

            “Coming from someone who made a stunt of buying and canceling medical debt on his show, and who claims to want alternatives to the failed two-party system, this disingenuous attack on the idea of canceling student debt is both puzzling and hypocritical,” Stein’s campaign said in a statement. “It was beyond disappointing to see that our responses were completely ignored. The same tired, misleading attack lines were trotted out, and Oliver chose to misrepresent our campaign on the lone substantive issue that he addressed: our plan to cancel student debt.”

            In Sunday’s episode, Oliver said Stein’s plan to eliminate student debt relies on an economic method called quantitative easing, which is essentially the printing of new money. The problem, Oliver said, is that the Federal Reserve doesn’t have the jurisdiction of the president. “It’s basically akin to saying, ‘I’ll make us energy independent by ordering the Post Office to invade Canada,’” Oliver said. “No, Jill. That’s impractical, it’s a terrible idea, and you don’t seem to understand anything about it.”

          • Jill Stein Pitches a Green Foreign Policy

            On The Gist, Green Party candidate Jill Stein lays out her foreign policy. She debates Mike Pesca about Hillary Clinton, Yemen, and America’s use of force. Stein believes the United States is closer to nuclear war than ever, including the Cold War. She explains how de-escalating nuclear tensions with Russia should take priority, and how neither of the major party candidates is up to the job. This year marks Stein’s second run for the presidency.

          • Why These Americans Refuse to Vote

            In Nevada, residents are afforded a luxury not enjoyed by any other Americans: When they trudge to the polls next month, they’ll have the chance to check a box that reads, “None of These Candidates.” Nevada voters are statutorily entitled to signal their discontent with the entire array of presidential contenders before them by saying “screw it” and selecting that particular option. And it’s not a joke—this ultimate “F you!” has actually won various Nevada state primary elections in the past.

            One can only guess what percentage of voters would choose “none” were the option available nationwide, but there are some clues it’d find sizable traction: Donald Trump and Hillary Clinton are the two most despised major party nominees in modern electoral history. But outside Nevada, there’s no way to formally register your across-the-board disillusionment with the political system that produced them: You’ve got to pick Hillary Clinton, Donald Trump, or one of the third-party also-rans. (Or you could write somebody in, such as Fred Flintstone or LeBron James.)

          • Green Party’s Jill Stein on “Donald Trump’s Psychosis and Hillary Clinton’s Distortions”

            After Wednesday’s debate, Democracy Now! spoke to Dr. Jill Stein, the Green Party’s presidential nominee. She and Libertarian nominee Gary Johnson were excluded from the debate under stringent rules set by the Commission on Presidential Debates, which is controlled by the Democratic and Republican parties.

          • A Tale of Three Foundations
          • Donald Trump Just Lost, But So Did American Democracy

            Trump called Clinton a liar, a “nasty woman” and someone who should have “never been allowed to run” because she is a crook.

          • Presidential Conflicts of Interest, and More from CRS

            “Does federal law require the President to relinquish control of his or her business interests?” That question is considered in a new analysis from the Congressional Research Service.

            The short answer appears to be No. “There is no current legal requirement that would compel the President to relinquish financial interests because of a conflict of interest.”

            There are, however, certain legal disclosure requirements that apply to candidates for the Presidency. It is those requirements that are “the principal method of regulation of potential conflicts of interests for elected officials such as the President.”

          • Natasha Stoynoff’s account of Trump sexual assault now backed by 6 witnesses

            Former People magazine contributor Natasha Stoynoff recently went public with her claim that she was sexually assaulted by the GOP Presidential Nominee, Donald Trump.

            Trump and his paid toadies on the campaign trail mocked Stoynoff, and questioned her motives. There were no witnesses, Trump said, adding, “She lies! Look at her, I don’t think so.”

            A totally normal thing for an innocent man to say when accused of sexual assault.

            “We walked into that room alone, and Trump shut the door behind us. I turned around, and within seconds he was pushing me against the wall and forcing his tongue down my throat,” she wrote.

            Six people have now come forward to corroborate Stoynoff’s account.

            She wasn’t lying, they say. It happened. And it happened just like she said it happened.

          • Revealed: 6 People Who Corroborate Natasha Stoynoff’s Story of Being Attacked by Donald Trump

            Six colleagues and close friends who corroborate former PEOPLE writer Natasha Stoynoff’s account of being attacked by Donald Trump in 2005 are now coming forward. Among them is a friend who was with Stoynoff when she ran into Melania Trump later in N.Y.C.

            The wife of the Republican nominee denies meeting Stoynoff after the attack, but Stoynoff’s friend Liza Herz remembers being there during the chance meeting.

            “They chatted in a friendly way,” Herz, who met Stoynoff in college, says. “And what struck me most was that Melania was carrying a child and wearing heels.”

            Stoynoff’s story, which made national news when it broke last week and is reprinted in this week’s issue of PEOPLE, describes a run-in with Trump when she was covering him and pregnant wife Melania on assignment for PEOPLE in December 2005.

          • Michael Moore quietly made a Donald Trump movie. “TrumpLand” opens this week.

            Filmmaker Michael Moore has an “October surprise” for America: A stealthily and quickly made movie about the presidential campaign of GOP nominee and accused serial sexual predator Donald Trump.

          • What Michael Moore Understands About Hillary Clinton

            “Michael Moore in TrumpLand” isn’t quite the film that I expected it to be, and that’s all to the good. Moore is, of course, a genius of political satire, deploying his persona—as a populist socialist skeptic with a superb sense of humor and a chess player’s skill at media positioning—to deeply humane ends that are mainly detached from practicality, policy, and practical politics. The very idea of the new film—a recording of Moore’s one-man show from the stage of a theatre in a small, predominantly Republican town in Ohio—runs the risk of self-parody, being a feature-length lampooning of Trump, laid out with meticulously researched facts set forth with the sublime derision of which Moore is a master. It would have been a highly saleable version of preaching to the converted.

          • Final Debate Review: One President vs One Petulant Child

            So the last Trump vs Hillary debate is done. It will be remembered as the debate where Trump put himself and his personal acceptance ahead of the opinion of 200 million voters. I think this will damage him more than any other third debate ever, and will bring on a wave of condemnation by Republicans and more un-endorsements. I think he will walk that statement back, soon, and may be forced to Apple-igize or non-apologize for it.

          • Clinton Campaign Makes Wildly Inconsistent Claims About Emails Published By WikiLeaks

            Hillary Clinton’s presidential campaign contends the publication of emails from the campaign are part of a Russian plot. It believes raising the issue of Russia’s alleged involvement is enough to avoid discussion of the contents of emails. However, the campaign has been inconsistent in appearances on cable news networks.

            Multiple individuals explicitly insist there are doctored or forged emails to dodge questions. Some of these people had their email exchanges published by WikiLeaks. Yet no member of the Clinton campaign can name a single example of a forgery.

            Representatives of the Clinton campaign back away from talking points and answer questions about the emails if they can make a point that may be useful to the campaign about Donald Trump or Clinton’s progressive credentials. But when hosts of news programs ask questions they do not want to answer, they repeat a set of talking points; in particular, how Republican Senator Marco Rubio said this shows the Russians are trying to rig the election and people should stop talking about the emails.

        • Censorship/Free Speech

        • Privacy/Surveillance

          • Police mass face recognition in the US will net innocent people

            Live in the US? There’s a 50:50 chance that you’re in a police face recognition database, according to a report from the Center on Privacy & Technology at Georgetown Law in Washington DC. The findings suggest that about a quarter of all police departments in the US have access to face recognition technology.

            That police are using face recognition technology is not a problem in itself. In a world with a camera in every pocket, they would be daft not to. But face recognition can be used far more broadly than fingerprint recognition, which means it carries a higher risk of tagging innocent people.

            Fingerprints are difficult to work with. Prints from known criminals can only be gathered in controlled environments at police stations, and dusting for prints is so time consuming that it is only done at relevant crime scenes. This narrows down the number of people in the sights of any one investigation.

            It’s much easier to build huge databases of identified photographs. The majority of the 117 million faces in the police datasets come from state driving licenses and ID cards. And when trying to solve a crime, gathering faces is as easy as pointing a camera at the street. People attending protests, visiting their church, or just walking by can all have their faces “dusted” without ever knowing it.

          • UK first to bring surveillance under rule of law, says former GCHQ director [Ed: So the spies broke the law for many years and our government will pardon them and legalise the crime]

            Former GCHQ head David Omand says the UK will be the first country in Europe to legislate to regulate digital intelligence and put it under judicial supervision with judicial review

          • NSA Can Access More Phone Data Than Ever

            One of the reforms designed to rein in the surveillance authorities of the National Security Agency has perhaps inadvertently solved a technical problem for the spy outfit and granted it potential access to much more data than before, a former top official told ABC News.

            Before the signing of the USA Freedom Act in June 2015, one of the NSA’s most controversial programs was the mass collection of telephonic metadata from millions of Americans — the information about calls, including the telephone numbers involved, the time and the duration but not the calls’ content — under a broad interpretation of the Patriot Act’s Section 215. From this large “haystack,” as officials have called it, NSA analysts could get approval to run queries on specific numbers purportedly linked to international terrorism investigations.

          • NSA, GCHQ and even Donald Trump are all after your data

            As production and usage of data keeps growing globally, it’s worth remembering that the US government wants access to your information and will use warrants, decryption or hacking to get to it.

            That’s not news and the US government has many tools in its box. Many had already heard of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (aka the Patriot Act) as the means by which the FBI would get access to data. Then the Foreign Intelligence Surveillance Act took centre stage (although the original version of this actually predated the Patriot Act by a couple of decades) following the Snowden revelations that the NSA had access to data on a massive scale.

            If Donald Trump gets elected as president, he might introduce more snooping powers. As part of his election campaign, he has already issued some tough statements which seem likely to rebalance powers in favour of the US government and away from the tech industry.

          • Local Superior Court Judge Says DEA’s Wiretap Warrant Factory Perfectly Legal

            Over the past several years, the DEA has run hundreds of wiretap warrants through a single county judge’s court after getting them approved by whoever happened to be in the local district attorney’s office when agents need one signed. The latter part of this process runs contrary to statutes enacted specifically to prevent abuse of wiretap warrants by the federal agencies.

            The approval process, which had been streamlined to eliminate any possible roadblocks to the DEA’s deployment of wiretaps all over the country, was considered by the DOJ to be far enough outside legal boundaries as to make the warrants questionable, if not legally “toxic.”

            The district attorney who was supposed to personally approve these wiretap warrants never did. Former Riverside County district attorney Paul Zellerbach delegated this task to anyone but himself. Because of this, some of the warrants have been challenged in court, leading to the DOJ stepping in to salvage wiretaps its lawyers had previously instructed DEA agents to keep out of federal courts.

          • New Research Blames Insiders, Not North Korea, for Sony Hack

            Growing evidence suggests it was not North Korea.

            A leading cyber security firm says it has evidence that contradicts the government’s allegation that North Korea was behind the debilitating cyber attacks against Sony Pictures.

            Researchers from the firm Norse told Security Ledger, an independent security news website, that they believe that a group of six individuals orchestrated the hack, including at least one former employee who was laid off in company-wide restructuring in May.

          • “I’ve seen pretty much all your tech secrets”

            Government prosecutors intend to file charges under the Espionage Act against a former NSA contractor who was arrested in August and charged with stealing a massive trove of top-secret intelligence documents.

            In court papers filed Thursday [you can read them below], the government said Navy veteran Harold T. Martin III stole 50,000 gigabytes of data over the course of two decades, which far exceeds the number of documents Edward Snowden took from the NSA and leaked to journalists. (One gigabyte can store about 10,000 pages.)

            Prosecutors say Martin, who had been a contractor with Booz Allen Hamilton — the same company that employed Snowden at the time of his leak — is a national security threat and a flight risk, and must remain behind bars until a trial in his case begins next year. Earlier this week, Martin’s attorneys requested a court hearing to determine if he could be released pending trial; the hearing is scheduled to take place Friday afternoon in U.S. District Court in Maryland.

            In the court papers, the government for the first time characterized the documents that Martin allegedly stole, which prosecutors said lay bare a “course of felonious conduct that is breathtaking in its longevity and scale.” According to the government, in addition to numerous digital media devices the FBI seized from Martin, there were also “hard-copy documents that were seized from various locations during the search that comprise six full bankers’ boxes worth of documents.”

          • Trove of Stolen Data Is Said to Include Top-Secret U.S. Hacking Tools

            Investigators pursuing what they believe to be the largest case of mishandling classified documents in United States history have found that the huge trove of stolen documents in the possession of a National Security Agency contractor included top-secret N.S.A. hacking tools that two months ago were offered for sale on the internet.

            They have been hunting for electronic clues that could link those cybertools — computer code posted online for auction by an anonymous group calling itself the Shadow Brokers — to the home computers of the contractor, Harold T. Martin III, who was arrested in late August on charges of theft of government property and mishandling of classified information.

            But so far, the investigators have been frustrated in their attempt to prove that Mr. Martin deliberately leaked or sold the hacking tools to the Shadow Brokers or, alternatively, that someone hacked into his computer or otherwise took them without his knowledge. While they have found some forensic clues that he might be the source, the evidence is not conclusive, according to a dozen officials who have been involved in or have been briefed on the investigation.

          • Feds seized 50TB of data from NSA contractor suspected of theft

            In a new Thursday court filing, federal prosecutors expanded their accusations against a former National Security Agency contractor. Federal investigators seized at least 50 terabytes of data from Harold Thomas Martin III, at least some of which was “national defense information.” If all of this data was indeed classified, it would be the largest such heist from the NSA, far larger than what former contractor Edward Snowden took.

            Prosecutors also said that Martin should remain locked up and noted that he will soon be charged with violations of the Espionage Act. That law, which dates back nearly a century, is the same law that was used to charge Chelsea Manning and Snowden, among others. If convicted, violators can face the death penalty.

            United States Attorney Rod Rosenstein and two other prosecutors laid out new details in the case against Martin, whose arrest only became public earlier this month. Martin had been a contractor with Booz Allen Hamilton and possessed a top-secret clearance.

            The new filing states that Martin also took “six full bankers’ boxes” worth of paper documents, many which were marked “Secret” or “Top Secret.” The documents date from between 1996 through 2016.

          • Cops Monitoring Social Media Is Much More Than Just Collecting Tweets

            It’s not just your friends following you on Facebook or Twitter. The cops are, too.

            Law enforcement agencies around the world have used social media monitoring software to keep tabs on populations en masse, sweeping up their posts and tweets, giving police a bird’s-eye view of what, say, Twitter users are broadcasting in a specific area, or about a particular topic. Tweeting from an Olympic stadium? Sharing a post with a hashtag supporting Black Lives Matter? Police may be watching that, in real time.

            On the face of it, you might not have a problem with cops reading public social media posts or tweets: individuals presumably took the decision to put the information out there themselves. But law enforcement’s monitoring of social media is not that simple.

            “Social media monitoring is so much more than it first appears. Programs to monitor social media are rarely about manual review of public information,” Amie Stepanovich, US policy manager at activist group Access Now, told Motherboard in a Twitter message.

          • DNA testing for jobs may be on its way, warns Gartner

            It is illegal today to use DNA testing for employment, but as science advances its understanding of genes that correlate to certain desirable traits — such as leadership and intelligence — business may want this information.

            People seeking leadership roles in business, or even those in search of funding for a start-up, may volunteer their DNA test results to demonstrate that they have the right aptitude, leadership capabilities and intelligence for the job.

            This may sound farfetched, but it’s possible based on the direction of the science, according to Gartner analysts David Furlonger and Stephen Smith, who presented their research at the firm’s Symposium IT/xpo here. This research is called “maverick” in Gartner parlance, meaning it has a somewhat low probability and is still years out, but its potential is nonetheless worrisome to the authors.

          • How to endorse a political candidate on Facebook and lose friends forever
          • How to find out what Facebook knows about you

            Close to the top of this page you’ll see a section called “Interests” with a whole lot of tiles. Each tile represents an interest, and Facebook organizes your interests under a variety of categories including sports, news, entertainments, people, and technology.

            All you have to do is go through this list. If you see something that shouldn’t belong—or you’d rather not have belong—just click the “X” that appears in the upper-right corner of the tile when you hover over it with your mouse. This should remove or at least reduce any ads you see related to that content.

            Perhaps the most interesting section for most of us right now is the “Lifestyle and culture” section, which houses political interests. For me, personally, this area was way off. It said I had liked pages related to political parties I don’t support.

            My best guess as to how this happened is that in the last few weeks I’ve liked a bunch of articles criticizing the other side. Do that enough times and one particular candidate’s name comes up more than the other’s, and (perhaps) an association is made between you and the side you disagree with.

          • Email/Web footer – For the NSA….

            I responded to a spam message from my credit union, asking to be removed from their mailing list for things not directly related to my current account status using my standard Live.com email which has for at least 10 years now contained a footer labeled for the NSA which contains dozens of keywords sure to get you scanned. Well it finally worked… 2 days later the Yuma PD responded to my door and questioned me regarding the text of the footer which was reported to them by my credit union as a terrorist bomb threat. 2 Yuma PD marked cars and an unmarked vehicle containing a ‘detective’ arrived, rang the door bell and asked to speak to me, they wanted in the house badly but I chose to speak to them on the front porch. They had a copy of the email and were as they termed it just following up on a complaint lodged by the AEA credit union. The detective asked some rather pointed questions and tried real hard to get me to admit that the footer was really a threat but seemed rather embarrassed at his presence and went away after apparently I turned out to have valid ID and wasn’t brown. The patrol officers openly laughed with me at the over reaction and accepted a bottle of water on their way out. I am debating wearing a turban to the credit union to close my account out and demanding cash in lieu of a cashiers check, but given the state I am in and the gun carry laws that might be too much. I’ll report back if I don’t end up in Gitmo.

        • Civil Rights/Policing

          • Denmark: Muslims stage organised attack against teenagers for being “American”

            The below story also shows how little security Danes (and American tourists) have, now because the police is overwhelmed by Muslim crime and terror.

          • Segregated Housing For Black Students At Cal State LA

            Welcome to the indoctrination station.

            Martin Luther King, please report to the front desk. You’re being brought to trial on charges of microaggressions for this “content of their character” microaggression.

          • Uh, America’s Take On The Salem Witch Trials Is Really Weird

            Imagine someone accusing you of a crime so ridiculous that the crime itself isn’t a real thing, like “French-kissing a pink elephant while enjoying free healthcare and a living wage.” And before you can even figure out how to mount a reasonable defense, you and a dozen other people in your community are dead, swinging from a hanging tree while the rest of the town pats themselves on the back for sending the pink-elephant-kissers back to Hell where they belong.

            Now imagine that a few hundred years have passed, and instead of mourning the terrible crime committed against you, everyone in town dresses up as a cartoon version of you and encourages tourists to buy trinkets that minimize and celebrate your death.

            Got all of that? Cool, you’ve basically pictured what’s happened in Salem, Massachusetts. This town is famous for witches and witch trials, which is another way of saying “mob hysteria which resulted in the murder of over 20 people.” Instead of solemnly remembering their dark past with humility, Salem has gone a different route — specifically, the route populated with merchandise and Ferris wheels.

          • Imprisoned Saudi blogger Raif Badawi faces more lashes: supporters

            Imprisoned Saudi blogger Raif Badawi, whose public flogging in the kingdom in 2015 generated global outcry, now risks a new round of lashes, a co-founder of a Canadian foundation advocating for his release said on Tuesday.

            Evelyne Abitbol, who founded the Raif Badawi Foundation with Badawi’s wife, said a “reliable source” in Saudi Arabia claims he faces a new flogging after being sentenced to 10 years imprisonment and 1000 lashes in 2014 for breaking the kingdom’s technology laws and insulting Islam.

          • Outrage over actor Rahama Sadau’s hug highlights Nigeria’s divisions

            She is a hugely popular actor. He is a hugely popular rapper. But when Rahama Sadau and ClassiQ briefly touched in a music video released this month in northern Nigeria, their fleeting embrace set off a storm of controversy that has revealed the deep divides in the country.

            Sadau, 22, found herself lambasted by conservative commentators and banned from working in the predominantly Muslim north of Nigeria.

            “Rahama has been banned for life from acting … This is as a result of her recent immoral appearance in a certain video song where she appeared … hugging and cuddling,” said Salisu Mohammed, the head of the Motion Picture Practitioner’s Association of Nigeria, based in Kano state.

            The actor apologised for any offence she might have caused but called for a “more forgiving and tolerant” attitude.

            The northern Hausa-language film industry is only one part of the vast Nigerian movie business. Dubbed “Nollywood”, but divided along linguistic and cultural lines, it claims to be the second largest in the world, producing 2,000 films a year. Only Bollywood, the Indian film industry, which has been a huge influence on its Nigerian counterpart, produces more.

          • Muslim leader jailed for life after hiring hitman to kill mosque rival

            A Muslim leader has been jailed for life after hiring a hitman to execute his rival in cold blood following a bitter dispute over control of a controversial mosque.

            Khalid Rashad, 63, a Muslim convert, is the brother of Liz Mitchell, the lead singer in the 1970s band Boney M, famous for disco hits such as Rivers of Babylon, Rasputin and Daddy Cool.

            She appeared as a character witness in his trial, held in January this year, explaining how they had grown up in a large Christian family in Jamaica.

            The case can finally be reported at the end of a second trial in which Rashad was convicted of possessing military-grade plastic explosives and rounds of ammunition at his home, yards from Wembley stadium.

            In the first case, Abdul Hadi Arwani, 48, was found slumped in the driver’s seat of his VW Passat in a street in Wembley, north London, with the engine still running and bullet wounds in his chest in April last year.

            There was speculation that the preacher could have been murdered by a Syrian hitman when it emerged that he had been a vocal opponent of the regime of Bashar al-Assad.

          • Journalist Charged in North Dakota with Rioting; Case is Dismissed

            Amy Goodman, host of the New York City-based leftist news programme Democracy Now! was charged with criminal trespass by the North Dakota state’s attorney (prosecutor). The charge was changed to riot, then was dismissed due to lack of evidence when Goodman appeared in court on Monday. The charges stemmed from her presence at a protest in September against construction of the Dakota Access (Bakken) oil pipeline, after the protest was reported on her show.

          • Christian refugees persecuted by Muslim asylum seekers in German shelters – survey

            Christian asylum seekers as well as members of other religious minority groups living in refugee shelters across Germany face systematic persecution from both Muslim refugees and Muslim staff, a recently published survey shows.

            As many as 743 Christian refugees and 10 Yazidis living in refugee centers in various German states have reported religiously motivated attacks between February and September 2016, a survey conducted by several charitable NGOs says, stressing that collected data should be “considered … as the tip of the iceberg,” as “there are a high number of unreported cases.”

            Fifty-six percent of the affected refugees said that they were subjected to violent assaults and were beaten up while 42 percent of them said that they or their family members received death threats both from fellow refugees and Muslim staff, including volunteers and security personnel working at the centers.

          • Teat Scares Airlines: TSA Still Humiliates Nursing Mothers

            The Transportation Security Administration (TSA) still can’t identify an obvious breast pump used by women who are breastfeeding. According Hawaiian media, a mom was asked to prove her breast pump was real at the Lihue Airport.

            Agents told her she couldn’t take the pump on the plane because the bottles inside were empty. Interestingly, the same thing happened to Kossack Jesselyn Radack 8 years ago for the opposite reason: the bottles were full.

            This is not just a one-off. This is what occurs with measures intended to make people feel secure while doing nothing to actually improve security.

            Radack was on the No-Fly List, so maybe that’s why her breasts are more suspicious. But what the Hawaiian woman experienced is eerily similar and degrading as what Radack went through.

          • Arrested Backpage Execs Ask Kamala Harris To Drop Bogus Case She Herself Has Admitted She Has No Authority To Bring

            A few weeks ago, we wrote about the absolutely ridiculous and unconstitutional charges brought by California Attorney General Kamala Harris and Texas Attorney General Ken Paxton against the online classified site Backpage.com. We focused on the fact that Section 230 clearly protects Backpage from such a lawsuit, and went into detail on the ridiculousness of Harris’ “investigator” using the fact that Backpage itself actually worked with him to track down, remove, and block ads for prostitution as some sort of evidence of wrongdoing.

            The execs are now hitting back — as they should. They’ve asked the court to dump the case with a detailed and thorough filing. It highlights that the charges violate the First Amendment, Section 230 of the CDA and, at an even more basic level, the complaint doesn’t even satisfy the requirements for “pimping,” which is what they’re charged with.

          • By stealing from innocents, Chicago PD amassed tens of millions in a secret black budget for surveillance gear

            Since 2009, the Chicago Police Department has seized $72M worth of property from people who were not convicted of any crime, through the discredited civil forfeiture process, keeping $48M worth of the gains (the rest went to the Cook County prosecutor’s office and the Illinois State Police) in an off-the-books, unreported slush fund that it used to buy secret surveillance gear.

            Civil forfeiture is widely considered to be an invitation to abuse and exploitation, and Chicago’s system is especially pernicious, as the police get to keep the proceeds from seizure, and do not have to disclose or account for the money.

            The full scope of the program was revealed in late September by the Chicago Reader, who worked with Muckrock and the Lucy Parsons Lab to file public records requests that yielded more than 1,000 pages’ worth of CPD documents.

          • URGENT CALL: ask your MP to sign letter to Obama

            One week ago Lauri Love’s case was raised at Prime Minister’s Questions by David Burrowes MP. Lauri’s case, and the inadequacy of Theresa May’s forum bar, is now firmly on the Parliamentary agenda.

            David Burrowes is one of a cross-party group of MPs who are now campaigning for Lauri in Parliament. Along with Labour’s Barry Sheerman and Lib Dem Home Affairs spokesman Alistair Carmichael, he has written a letter to President Obama, asking for the extradition warrant to be withdrawn.

          • Iran arrests Baquer Namazi, father of imprisoned American businessman

            Six weeks after freeing U.S. citizens in a prisoner swap with the United States, Iran appears to have arrested yet another man whom Washington may take an interest in seeing freed.

            Baquer Namazi, 80, is the father of American businessman Siamak Namazi, who was detained in October and was not part of last month’s exchange. Before his father’s arrest, he was the last confirmed U.S. prisoner still being held in Iran.

            Baquer Namazi, a former UNICEF official, was arrested on Monday, his wife Effie Namazi said on Facebook. He is an Iranian-American.

            “I must share the shocking and sad news that Baquer was arrested in Tehran late evening of 22 February 2016 and as far as I have been told by those who took him taken to Evin prison,” she wrote. “Now both my innocent son Siamak and my Baquer are in prison for no reason. This is a nightmare I can’t describe.”

          • Muslims call for Norway minister to resign after pork post

            Norwegian Muslims have called on the country’s integration minister to step down after she said that immigrants should adapt to a culture of pork, alcohol and no face-veils.

            Sylvi Listhaug, a minister appointed by the anti-immigrant Progress Party, caused outrage on Monday when she made an incendiary post on the eve of an national integration conference.

            “I think those who come to Norway need to adapt to our society. Here we eat pork, drink alcohol and show our face. You must abide by the values, laws and regulations that are in Norway when you come here,” she wrote in a post that was ‘liked’ by 20,000 people.

          • Supporters of jailed Saudi blogger Raif Badawi fear flogging set to resume

            Supporters of jailed Saudi blogger Raif Badawi are sounding the alarm that his flogging could soon resume.

            The Montreal-based foundation that bears Badawi’s name said this week it has it on good authority his punishment will begin again.

            The information comes from a “private source” who is the same person who informed Badawi’s family in Canada about the first series of lashes in January 2015.

            Evelyne Abitbol, the foundation’s executive director, conceded Tuesday it isn’t known for sure if or when the lashes will resume. Nonetheless, the organization found the information credible enough to convey it publicly.

            “We believe this information is right because it came from the same source,” Abitbol said. “We thought: If we don’t do anything and he is flogged, we would not be happy about not alerting the international community.”

        • Internet Policy/Net Neutrality

          • How the Web Became Unreadable

            It’s been getting harder for me to read things on my phone and my laptop. I’ve caught myself squinting and holding the screen closer to my face. I’ve worried that my eyesight is starting to go.

            These hurdles have made me grumpier over time, but what pushed me over the edge was when Google’s App Engine console — a page that, as a developer, I use daily — changed its text from legible to illegible. Text that was once crisp and dark was suddenly lightened to a pallid gray. Though age has indeed taken its toll on my eyesight, it turns out that I was suffering from a design trend.

            There’s a widespread movement in design circles to reduce the contrast between text and background, making type harder to read. Apple is guilty. Google is, too. So is Twitter.

            Typography may not seem like a crucial design element, but it is. One of the reasons the web has become the default way that we access information is that it makes that information broadly available to everyone. “The power of the Web is in its universality,” wrote Tim Berners-Lee, director of the World Wide Web consortium. “Access by everyone regardless of disability is an essential aspect.”

          • Time’s Running Out for the FCC on Set-Top Reform, Privacy and Zero-Rating

            Dozens of leading public interest groups on Monday urged the Federal Communications Commission to swiftly approve new consumer protection policies aimed at promoting competition in the video marketplace, increasing online privacy, and ensuring internet openness.

            In a letter to FCC Chairman Tom Wheeler and his colleagues, the groups asked the agency to take action on two of the most important issues facing US telecom regulators: Rules that would save consumers billions of dollars annually by breaking the cable industry’s stranglehold on the video “set-top box” market, and tough new policies designed to protect consumers from broadband industry privacy abuses.

            The public interest coalition is also urging the FCC to crack down on the controversial practice of “zero-rating,” in which internet providers exempt certain online services from monthly data caps. Open internet groups say such schemes violate net neutrality, the principle that all content on the internet should be equally accessible, because they favor certain services by giving consumers an economic incentive to use them over rival offerings.

          • Oversight Transition Isn’t Giving Away the Internet, But Won’t Fix ICANN’s Problems

            At midnight last Saturday morning, Washington DC time, oversight over the performance of ICANN’s IANA functions—notably its maintenance of the root zone database of the Internet’s domain name system (DNS)—passed from the National Telecommunications and Information Administration (NTIA) to ICANN’s global multi-stakeholder community.

            Despite several weeks of heated discussion within the United States, we haven’t commented much on this transition. That’s because there has not been much to say: the talking points over ICANN have been mostly a product of American party politics (and the election season) rather than a debate on a substantive technical or policy issue. The outcome was unlikely to affect Internet users much one way or the other. Now that the transfer of oversight has gone through, life will go on pretty much as it did before, with the exception that a broader group of people will have the formal responsibility of ensuring that the DNS root zone is being administered according to community-developed policies. New accountability measures have been put in place by ICANN as a condition of the transition, which will give this community some extra teeth to make sure that it stays on the straight and narrow.

          • Vox Seems Kind Of Upset That We’re Building Gigabit Networks With Bandwidth To Spare

            If you want to see why broadband in the United States still stinks, your first stop should be to examine the state level protectionist laws used to stifle competition across countless markets. But despite the lobbyist stranglehold over state legislatures, we’re still seeing some impressive progress when it comes to the deployment of gigabit fiber networks. Google Fiber continues to slowly but surely expand its footprint, and we’re seeing the rise of numerous other piecemeal gigabit solutions, whether coming from the likes of Tucows or municipal broadband deployments in cities like Chattanooga, Tennessee.

            To be clear, the “gigabit revolution” is certainly a bit overhyped. The vast majority still can’t get this caliber of service, and the obsession with the mighty gigabit does tend to obscure a potentially more important conversation about broadband prices and the often glaring lack of real competitive options. But by and large most people can agree that gigabit fiber builds are a good thing in an era when most users can still only obtain DSL at circa 2002 speeds and prices, and two-thirds of homes lack access to speeds greater than 25 Mbps from more than one provider (aka a broken monopoly).

          • FCC Fines T-Mobile For Abusing The Definition Of ‘Unlimited’ Data

            For the better part of the last decade, wireless carriers have had an often vicious, adversarial relationship with the dictionary. More specifically, they’ve struggled repeatedly with the definition of the word “unlimited,” often pitching data services that proclaim to be unlimited, only to saddle users with onerous, often confusing restrictions. For the last decade, regulators have tried to cure them of this behavior, from Verizon paying $1 million to New York’s Attorney General in 2007, to the FCC fining AT&T $100 million last year.

        • Intellectual Monopolies

          • China’s Manufacturers Now Producing Copies Before Original Products Are Even Launched

            Techdirt has written a number of articles tracking how China is moving beyond its traditional counterfeit imitation culture to one of collaborative innovation, as exemplified by “gongkai”. An article on the Quartz site provides a useful update on this world, concentrating on developments in Shenzhen, generally regarded as China’s hardware equivalent of Silicon Valley.

          • Comments Received On South African IP Framework; Action Seen In Early 2017

            The invitation by the South African Department of Trade and Industry (DTI) to intellectual property stakeholders to comment on its recently released IP Consultative Framework has reignited calls for the department to come clean on the status of the national draft IP policy.

          • US, India Trade Ministers Agree List Of IP Enforcement Actions For India

            United States Trade Representative Michael Froman and Indian Minister of Commerce and Industry Nirmala Sitharaman met in Delhi today and discussed various bilateral issues including intellectual property rights. Based on the release from the meeting, it appears much of the IP focus was on tasks for India to do to better protect IP rights.

          • Copyrights

            • Skittles Photographer Actually Sues Trump Campaign Over Infringement

              A few weeks ago, we wrote about how David Kittos was threatening the Trump campaign with a copyright infringement lawsuit after Donald Trump Jr. tweeted out a really dumb image involving a bowl of Skittles and a ridiculous statement about refugees.

            • Megaupload User Fears Complete Data Loss, Asks Court For Help

              Millions of users lost access to their personal files when Megaupload was raided, and after nearly half a decade they are still stashed away in a Virginia warehouse. Former Megaupload user Kyle Goodwin has been trying to get his files back for years. This week he urged the court to take action, fearing that his data may soon be lost forever.

            • Our new brochure is finally here!

              After countless hours of work our new brochure “Ancillary Copyright for press publishers – Background and key issues” has arrived! It is easy to read and answers all relevant questions regarding an Ancillary Copyright for press publishers (AC). You can download it here for free.

              Much has happened in the past years. The first part of the paper reconstructs the development from the first discussions in Germany back in 2009 over the implementation in Germany and Spain with its consequences to Günther Oettinger’s current plans to introduce an AC at European level.

        ]]>
        http://techrights.org/2016/10/21/mad-max-for-gnu-linux/feed/ 0
        Links 19/10/2016: Canonical Livepatch Service, Plasma Plans http://techrights.org/2016/10/19/canonical-livepatch-service/ http://techrights.org/2016/10/19/canonical-livepatch-service/#comments Wed, 19 Oct 2016 12:55:43 +0000 http://techrights.org/?p=96208

        GNOME bluefish

        Contents

        GNU/Linux

        • Linux-Based Photographic Workflow on Android with Termux

          The title is a bit of a mouthful, but the basic idea is pretty simple; Instead of schlepping around a Linux machine, you can transform an Android device into a lightweight Linux-based platform for organizing, processing, and backing up photos and RAW files when you are on the move. The key ingredient of this solution is the Termux, a small open source app that combines a terminal emulator and a lightweight Linux environment. The app comes with its own software repository that has all the tools you need to set up a simplified photographic workflow. The Linux Photography book explains exactly how to can go about it, but here are a few pointers to get started.

        • Server

          • Demand compels container management vendor Rancher to create partner program
          • Rancher Labs Expands Container-Management Reach With New Partner Program
          • Rancher Labs Introduces Global Partner Network
          • Rancher Labs Launches Partner Program Around Open Source Container Management
          • WTF is a container?

            You can’t go to a developer conference today and not hear about software containers: Docker, Kubernetes, Mesos and a bunch of other names with a nautical ring to them. Microsoft, Google, Amazon and everybody else seems to have jumped on this bandwagon in the last year or so, but why is everybody so excited about this stuff?

            To understand why containers are such a big deal, let’s think about physical containers for a moment. The modern shipping industry only works as well as it does because we have standardized on a small set of shipping container sizes. Before the advent of this standard, shipping anything in bulk was a complicated, laborious process. Imagine what a hassle it would be to move some open pallet with smartphones off a ship and onto a truck, for example. Instead of ships that specialize in bringing smartphones from Asia, we can just put them all into containers and know that those will fit on every container ship.

          • Solving Enterprise Monitoring Issues with Prometheus

            Chicago-based ShuttleCloud helps developers import user contacts and email data into their applications through standard API requests. As the venture-backed startup began to acquire more customers, they needed a way to scale system monitoring to meet the terms of their service-level agreements (SLAs). They turned to Prometheus, the open source systems monitoring and alerting toolkit originally built at SoundCloud, which is now a project at the Cloud-Native Computing Foundation.

            In advance of Prometheus Day, to be held Nov. 8-9 in Seattle, we talked to Ignacio Carretero, a ShuttleCloud software engineer, about why they chose Prometheus as their monitoring tool and what advice they would give to other small businesses seeking a similar solution.

          • VMware Embraces Kubernetes in Container Push

            VMware is the latest IT vendor to support Kubernetes, the open-source container management system that Google developed.
            VMware announced on Oct. 18 at its VMworld 2016 Europe event that it is now supporting the Kubernetes container management system on the VMware Photon platform.

            Kubernetes is an open-source project that was developed by Google and today benefits from the contributions of a diverse community, including Red Hat and CoreOS. The Kubernetes project became part of the Linux Foundation’s Cloud Native Computing Foundation (CNCF) in July 2015. The Kubernetes 1.4 release debuted on Sept. 26 with added security features.

            “We have now built a Kubernetes-as-a-service capability into Photon Platform,” Jared Rosoff, chief technologist for cloud native apps at VMware, told eWEEK.

          • CoreOS Expands Kubernetes Control With Redspread Acquisition

            The purchase of container management vendor Redspread is the container startup’s second acquisition.
            CoreOS on Oct. 17 announced the acquisition of privately held container management vendor Redspread. Financial terms of the deal are not being publicly disclosed.

            Redspread got its start in the Y Combinator cyber accelerator for technology startups and was officially launched in March. Coincidentally, CoreOS was also originally part of Y Combinator, graduating in 2013. To date, CoreOS has raised $48 million in funding to help fuel its container efforts. The acquisition of Redspread is the second acquisition by CoreOS and comes more than two years after CoreOS’ acquisition of quay.io in 2014.

        • Kernel Space

        • Applications

        • Desktop Environments/WMs

          • K Desktop Environment/KDE SC/Qt

            • KDE Plasma 5.9 Desktop Launches January 31, 2017, Next LTS Arrives August 2018

              After announcing earlier today, October 18, 2016, the release of the second maintenance update to the KDE Plasma 5.8 LTS desktop environment, KDE published the release schedule for the upcoming major versions of the project.

            • KDevelop 5.0.2 Open-Source IDE Adds Many UI Improvements, 32-bit Windows Build

              The open-source, cross-platform and free integrated development environment (IDE) software KDevelop has been updated the other day, October 17, 2016, to version 5.0.2.

            • Plasma’s road ahead

              On Monday, KDE’s Plasma team held its traditional kickoff meeting for the new development cycle. We took this opportunity to also look and plan ahead a bit further into the future. In what areas are we lacking, where do we want or need to improve? Where do we want to take Plasma in the next two years?

              Our general direction points towards professional use-cases. We want Plasma to be a solid tool, a reliable work-horse that gets out of the way, allowing to get the job done quickly and elegantly. We want it to be faster and of better quality than the competition.

            • Global Menu Support Is Coming Back to KDE Plasma 5
            • KDE Plasma Looking At Global Menu, Wayland & Mobile For 2017

              KDE Plasma developers talked this week about their plans for the new development cycle and what they want the desktop to look like moving into 2017 and further ahead into 2018.

            • KDE Plasma 5 Desktop to Become a Solid and Reliable Workhorse That Stands Out

              On October 18, 2016, long time KDE software developer Sebastian Kügler published an in-depth story about what’s coming to the KDE Plasma 5 desktop environment in the next couple of years.

              It appears that KDE’s Plasma team had their traditional kickoff meeting on Monday, October 17, to discuss the upcoming features of the next KDE Plasma 5 release, which will be versioned 5.9 and whose release schedule has been already published, as reported earlier right here on this space.

              However, the Plasma team also discussed new ways to improve the quality of the popular desktop environment, as well as make it faster, more stable and reliable than existing versions. Their aim is to bring KDE Plasma to an unprecedented level of quality that will blow the competition away.

              “Our general direction points towards professional use-cases. We want Plasma to be a solid tool, a reliable work-horse that gets out of the way, allowing to get the job done quickly and elegantly. We want it to be faster and of better quality than the competition,” said Sebastian Kügler in the blog announcement.

            • Twenty and counting: KDE marks another milestone

              Twenty years ago, a German software developer named Matthias Ettrich kicked off a project to provide Linux users with all the desktop functionality that Windows users had at the time.

              The detailed email inviting participation was sent by Ettrich on 14 October 1996. He outlined his ideas and goals and attracted plenty of interest. The K Desktop Environment project was on its way.

          • GNOME Desktop/GTK

            • GStreamer Conference 2016 Videos, Vulkan Support Was Among The Talks

              The annual GStreamer Conference took place last week in Berlin alongside the Linux Foundation’s Embedded Linux Conference Europe. The videos from this multimedia open-source conference are now available.

              The folks from Ubicast have once again done a nice job recording all of the presentations from this GStreamer event. Conference talks ranged from the “stage of the union” to the state of VA-API with GStreamer, GStreamer Video Editing, dynamic pipelines, Vulkan, and more.

              When it comes to Vulkan support in GStreamer, there is work underway on vulkansink and vulkanupload elements, basic Vulkan support modeled on GStreamer’s libgstgl API, and more, but much more work is needed before it will be at the level of OpenGL support.

        • Distributions

          • Solus Enables OpenGL 4.5 for Intel Broadwell, MATE Edition Coming Along Nicely

            It’s been a great week for users of the unique and independent Solus operating system, and while you’re waiting impatiently for the Solus 1.2.1 release, we’d like to tell you a little bit about what landed in Solus during the past week.

          • Solus 1.2.1 Officially Released, First MATE Edition Now Available for Download

            Today, October 19, 2016, Softpedia was informed by the Solus Project about the official release and general availability of the long-anticipated Solus 1.2.1 release, along with the first Solus MATE Edition.

          • Solus 1.2.1 Released With Budgie Desktop Updates, Ships RADV Driver

            Version 1.2.1 of the promising Solus Linux distribution is now available and also premieres a MATE edition ISO to complement its original Budgie desktop.

          • Reviews

            • Meet Maui 1, the Slick New Hawaiian Netrunner

              Maui, the Netrunner Kubuntu replacement, is an inviting alternative. It is both new and already accomplished. The developers took a Kubuntu distro that was well-oiled but at the end of its development line to the next level.

              That should make adopting the Maui Linux distro a less risky option. Most other Linux distros are moving in the new direction of Wayland, Systemd and such. Maui’s developers are already there.

              Maui 1 is very stable and easy to use. It is a well-stocked distribution with an established library of KDE software.

          • New Releases

          • Arch Family

            • 5 Best Arch Linux Based Linux Distributions

              Arch Linux is a very popular name amongst Linux enthusiasts. It is very popular because it allows the user to tailor-make their linux distro to their taste. Arch Linux provides a solid base for you to work with, while still allowing for expansion and complete customization. ​

          • OpenSUSE/SUSE

            • openSUSE Leap 42.2 Approaching with RC, Meet Maui 1

              The openSUSE project today announced the release of Leap 42.2 Release Candidate 1 with less than one month remaining before final. On the other side of town, Dustin Kirkland announced Ubuntu kernel hotfixes and the Hectic Geek reviewed recently released 16.10. Jack Germain said Maui 1 “is stable and easy to use” and Sebastian Kügler blogged on “Plasma’s road ahead.”

          • Red Hat Family

            • Senior Gains Web Development Experience at Red Hat Internship

              High Point University senior Ryan Long got a taste of his dream career during a web development and design internship at Red Hat in Raleigh.

              Long, an interactive media and game design major and computer science minor from Fort Mill, South Carolina, gained valuable experience with the IT marketing team. He worked with the company’s website, fixing broken links, inserting translations and doing quality assurance. He also provided graphic design assistance and collaborated with the video team for projects that would be incorporated into the website.

            • Video: RHS 2016 – Container Security

              Dan Walsh (of SELinux fame) gave a talk on container security at the recent Red Hat Summit 2016.

            • CLIMB Project Selects Red Hat Ceph Storage to Achieve Their Storage Needs to Support Medical Breakthroughs
            • Red Hat eye from the Ubuntu guy: Fedora – how you doin’?

              Comment Red Hat is the biggest – and one of the oldest – companies in the Linux world, but despite the difficulty of accurately measuring Linux usage figures, Ubuntu and its relatives seem to be the most popular Linux distributions. Red Hat isn’t sitting idle, though. Despite its focus on enterprise software, including virtualisation, storage and Java tools, it’s still aggressively developing its family of distros: RHEL, CentOS and Fedora.

              Fedora is the freebie community-supported version, with a short six-month release cycle, but it’s still important. Although RHEL is the flagship, it’s built from components developed and tested in Fedora. According to Fedora Project Lead Matthew Miller told this year’s Flock to Fedora conference this summer its future looks bright.

            • Finance

            • Fedora

              • Raspberry Pi (2 and 3) support in Fedora 25 Beta!

                So support for the Raspberry Pi in Fedora has been a long time coming and yes, it’s FINALLY here with support landing just in time for Beta!

                The most asked question I’ve had for a number of years is around support of the Raspberry Pi. It’s also something I’ve been working towards for a very long time on my own time. The eagle-eye watchers would have noticed we almost got there with Fedora 24, but I got pipped at the post because I felt it wasn’t quite good enough yet. There were too many minor issues around ease of use.

              • Raspberry Pi Finally Well Supported By Fedora With 25 Beta

                While Fedora has always supported ARM/AArch64 hardware well, they’ve missed out on the whole Raspberry Pi craze even as the ARMv7 hardware has been shipping for a while and there are plenty of Pi-focused Linux distributions out there. With Fedora 25, there’s finally going to be good support for the Raspberry Pi 2 and 3 devices.

              • Fedora 25 Linux OS to Officially Offer Support for Raspberry Pi 2 and 3 Devices

                Just a few moments ago, Fedora Project proudly announced that support for Raspberry Pi 2 and Raspberry Pi 3 single-board computers is finally coming to the Fedora Linux operating system.

                As you might know, the Beta of the upcoming Fedora 25 operating system has been released, and it brought numerous new GNU/Linux technologies and Open Source software projects, including but not limited to Linux kernel 4.8, GNOME 3.22 desktop environment, KDE Plasma 5.8 LTS, and LibreOffice 5.2.2. One thing was missing, though, and that’s support for ARM devices like the popular Raspberry Pi.

          • Debian Family

            • Derivatives

              • Refracta 8.0 – Devuan on a stick

                There are probably some people living in the world today who still haven’t heard of systemd, though I doubt that any of them read DistroWatch. More digital ink has been spilled debating the topic of init systems than any other in techie history. There is probably nothing I can say about systemd that hasn’t already been said, and no argument either for or against it that hasn’t been repeated ad nauseum. So I won’t waste this review seeking converts for The Cause™. I don’t expect the issue to be finally settled until the Sun swells up to become a red giant and evaporates the Earth.

                Geeks determined to resist the systemd juggernaut have several options. For me, the most interesting project is Devuan, a fork of Debian. I will say by way of disclosure that I have downloaded Devuan, installed it, used it for months, and like it. However, it does have a few flaws – the installer in particular needs some more work. The first beta forces you to do a network install that – depending on your Internet connection speed – can take an hour or more. This has defeated curious newbies who decide to give up long before the first boot-up prompt appeared.

                It was my search for a quick and easy way to get Devuan up and running that led me to Refracta, a unique distro that fills a niche that has long been neglected. Refracta’s existence predates the systemd wars – it was originally based on Debian 5.0, otherwise known as “Lenny.” But when Debian 8.0 “Jessie” went full systemd, Refracta moved to the Devuan camp.

                Refracta’s chief selling point is this: it’s a live image that can be quickly installed, customized, and re-installed back to live media again. So basically you can roll your own live CD, configured for your hardware and tweaked to suit your personal tastes. It is currently my favorite distro, and I’d recommend it to any Linux geek who has had a little bit of experience. A total Linux newbie might feel more comfortable with a distro that mimics Windows’ point-and-click friendliness, but once you’ve got the basics down, Refracta is easy to get used to.

                It’s also worth mentioning that even without being installed, a Refracta live CD or USB stick makes an excellent diagnostic and rescue tool. It contains quite a few command line utilities that aren’t in a default Devuan or Debian installation, including gddrescue, testdisk, smartmontools, hdparm, lm-sensors, iftop, and iptraf. I have personally used testdisk to recover data from a crashed hard drive.

              • Canonical/Ubuntu

                • Ubuntu 16.10 Review: Not Bad, But if You’re Happy with 16.04 LTS, Stick with it!

                  After the previous 16.04 Long Term Release, Ubuntu has rolled out its latest ‘short term’ (my own naming convention for the non-LTS releases) version 16.10. Mainly, the ‘short term’ releases are only supported for 9 months and usually include software applications with their recent updates.

                  When you release a new version of your operating system within every 6 months, usually there isn’t a lot of room for adding major changes. And that is the case with many GNU/Linux distributions these days, and Ubuntu 16.10 release is no exception. Since Unity is based on the user application set provided by GNOME desktop environment, according to the release notes, the underlying GNOME user applications have been upgraded to the version 3.20 at least (which is the case with the file manager — ‘files’, for instance) and some others have been upgraded to the version 3.22 which is the latest release of GNOME currently.

                • Canonical Now Offering Live Kernel Patching Services, Free for Up to Three PCs

                  Today, October 18, 2016, Canonical informs us, through Dustin Kirkland, about a new interesting feature for Ubuntu Linux, which users can enable on their current installations.

                • Canonical Rolls Out Its Own Kernel Livepatching Service For Ubuntu
                • Canonical enterprise kernel livepatch service, free to Ubuntu community!
                • Hotfix Your Ubuntu Kernels with the Canonical Livepatch Service!

                  Ubuntu 16.04 LTS’s 4.4 Linux kernel includes an important new security capability in Ubuntu — the ability to modify the running Linux kernel code, without rebooting, through a mechanism called kernel livepatch.

                • Ubuntu 16.10: Yakkety Yak… Unity 8′s not wack

                  Canonical’s Ubuntu 16.10, codenamed “Yakkety Yak”, is nowhere near as chunky an update as 16.04 LTS was earlier this year. But that doesn’t mean there’s nothing new. In fact, the firm’s second release of the year has quite a few fresh features to hold users over until the bright and shiny future of Unity 8 and Mir arrive some time next year.

                  Nevertheless, it’s very odd to have what feels like a smaller update arrive with Ubuntu’s October release, which typically is the more experimental release with tons of new features being tested. This time around that’s not really the case. In what’s become a familiar refrain for Ubuntu, most of the work is happening with the still-not-quite-there Unity 8.

                  Ubuntu 16.10 marks the seventh time Unity 8 has not been ready for prime time. While Unity 8 appears to be progressing – judging by developer updates and playing with pre-release versions – it is, at this point, in danger of joining Duke Nukem Forever on the great vaporware list in the sky. Still, take heart Ubuntu fans, just as Duke Nukem Forever did eventually see the light of day, it seems very likely that Unity 8 and Mir will in fact be released eventually. Perhaps even as early as 17.04. Also, I have a bridge for sale, if anyone is interested.

                • LinuxAndUbuntu Review Of Unity 8 Preview In Ubuntu 16.10

                  Ubuntu 16.10 Yakkety Yak has just been released with quite a few number of new stuff and a first preview of Unity 8 desktop environment. Unity could be installed in Ubuntu 16.04 but it comes with 16.10 pre-installed. Unity 8 has been in development since 2013 and anyone who has seen or used Ubuntu phone will quickly notice the similarities and some major differences.

                • Ubuntu 16.10 targets hybrid cloud deployments, supports Unity 8 development

                  Canonical, developer of Ubuntu, a distribution of Linux, released a new version of its software that targets hybrid cloud deployments. Ubuntu is often mentioned as one of the top 3 distributions of Linux when shipments are considered, depending upon which research firm one cites.

                • Ubuntu 16.10 Now Offers More than 500 Snaps, Including VLC 3.0.0 and Krita 3.0.1

                  With the release of the Ubuntu 16.10 (Yakkety Yak) operating system, Canonical also had the pleasure of informing the community about the latest status of their Snaps universal binary packages.

                • Canonical Brings Its Ubuntu OpenStack and Ceph Offerings to 64-bit ARM Servers

                  Canonical informs Softpedia about their latest collaboration with ARM, the industry’s leading supplier of microprocessor technology, to bring the company’s OpenStack and Ceph offerings to 64-bit ARM-based servers.

                • ARM, Canonical deliver Ubuntu OpenStack, Ceph to 64-bit ARMv8-A platforms
                • Canonical and ARM collaborate on OpenStack
        • Devices/Embedded

        Free Software/Open Source

        Leftovers

        • NFL Teams Enjoy Giving NFL’s Social Media Policy A Giant, Hilarious Middle Finger, Using Toys

          You’ll recall that we recently commented on the NFL’s new dumb social media policy for its member teams, which outlines how much video content a team can push out as kickoff approaches (less than before), what type of video content from games teams can produce and distribute on their own (basically none), and the size of the fines if teams violate this policy (huuuuuge). The NFL has insisted elsewhere that this one-size-fits-all marketing approach has zilch to do with its precipitous ratings decline, although few believe it on this point. And, even as news of the policy has been released, the NFL itself has been inclined to push out as much of this very same content itself, centralizing its social media media control.

          So, if you’re an NFL team that doesn’t like the new policy and wants to make its fans aware of how silly it is in the most hilarious way possible, what do you do? Well, if you’re the Cleveland Browns and the Philadelphia Eagles, you push out Twitter updates to your followers that depict game highlights using plastic figurines. Here is how the Browns alerted their fans that their team had scored a touchdown.

        • Bill Belichick rants against NFL tablets: ‘I’m done’

          After the image of the New England Patriots coach slamming a Microsoft Surface tablet on the sideline in a Week 4 game against the Buffalo Bills went viral, Belichick explained Tuesday why he is fed up with the product.

        • Science

          • What is deep learning, and why should you care about it?

            Whether it’s Google’s headline-grabbing DeepMind AlphaGo victory, or Apple’s weaving of “using deep neural network technology” into iOS 10, deep learning and artificial intelligence are all the rage these days, promising to take applications to new heights in how they interact with us mere mortals.

        • Health/Nutrition

          • WHO Pandemic Influenza Advisory Group Meeting In Secret This Week

            The World Health Organization pandemic influenza framework advisory group is meeting this week, behind closed doors. A consultation is expected to take place on 20 October with stakeholders, and an information session has been organised on 21 October on the work of the advisory group, but no press is allowed in either meeting nor able to obtain any information about any aspect of the week’s events.

          • How Pharmaceutical Companies Are Keeping Americans From Doing Something The Government Says They Can Do

            The EFF’s series on “shadow regulation” continues, this time exploring how American pharmaceutical companies are keeping affordable medication out of the hands of Americans. The examination goes beyond what’s already common knowledge: that patents and regulatory capture have created a skewed marketplace that ensures healthy profit margins, rather than healthy Americans.

            But what’s not generally known is that the pharmaceutical companies have “partnered” with internet intermediaries to lock Americans out of purchasing options specifically approved by the FDA. To hear big pharmaceutical companies tell it, purchasing drugs from other countries (where the price is generally lower) is extremely dangerous, if not completely illegal. But that’s simply not true.

          • Eli Lilly Commits To Healthcare For 30 Million People In Middle-Income Countries And US By 2030 [Ed: Publicity stunt by company that got a bad name in those countries]

            Pharmaceutical manufacturer Eli Lilly today announced a stepped-up commitment to provide improved access to quality healthcare for 30 million people in resource-limited settings by 2030.

            The initiative, called Lilly 30×30, is based on a five-year, US$90 million investment in the Lilly Global Health Partnership, and aims at improving access to treatments for diabetes, cancer, and tuberculosis.

        • Security

        • Defence/Aggression

          • Mumbai: Two Muslim men arrested in RTI activist Bhupendra Vira murder case.

            Two Muslim men arrested in the Hindu RTI activist Bhupendra Vira murder case were remanded in police custody till October 24 by a magistrate in Mumbai today.

            The Mumbai police had arrested former Mumbai corporator Razzak Khan (78) and his son Amjad Khan (53) for their alleged involvement in the murder of the RTI activist. A 61-year-old Right to Information activist was killed in Mumbai on Saturday evening by a man who barged into his home, held a gun to his head and fired.

            Demanding their police custody, public prosecutor Ashok Medhe told the court, “The complainant (Vira’s son-in-law) in this case has alleged that they were getting repeated threats from the family of the accused. They also have a property dispute. In the past, family members of the accused had attacked Vira’s son. Police custody is required for a detailed investigation.”

        • Transparency/Investigative Reporting

          • Background and Documents on Attempts to Frame Assange as a Pedophile and Russias spy

            Earlier today the website DailyKos reported on a smear campaign plot to falsely accuse Julian Assange of pedophilia.

            Here is the description of the plot from Mr Assange’s legal team, the investigative report into the front company and associated correspondence. An unknown entity posing as an internet dating agency prepared an elaborate plot to falsely claim that Julian Assange received US$1M from the Russian government and a second plot to frame him sexually molesting an eight year old girl.

            The second plot includes the filing of a fabricated criminal complaint in the Bahamas, a court complaint in the UK and laundering part of the attack through the United Nations. The plot happened durring WikiLeaks’ Hillary Clinton related publications, but the plot may have its first genesis in Mr. Assange’s 16 months litigation against the UK in the UN system, which concluded February 5 (Assange won. UK and Sweden lost & US State Dept tried to pressure the WGAD according to its former Chair, Prof. Mads Andenas).

          • Ecuador curbs Assange’s internet to halt US election ‘interference’

            Ecuador has acknowledged it partly restricted internet access for WikiLeaks founder Julian Assange, who is taking refuge at its London embassy.

            It said Mr Assange had in recent weeks released material that could have an impact on the US presidential election.

            Ecuador also said its move was not the result of pressure from Washington.

            The US denied WikiLeaks accusations that it had asked Ecuador to stop the site publishing documents about presidential candidate Hillary Clinton.

          • WikiLeaks accuses Kerry of getting Assange off net

            WikiLeaks has said US Secretary of State John Kerry asked Ecuador to cut its leader Julian Assange’s Internet connectivity after the organisation had released the content of paid speeches that Democrat presidential candidate Hillary Clinton had given to Goldman Sachs.

            The US State Department has denied that Kerry was involved.

            The whistleblower organisation had accused Ecuador of cutting Assange’s Internet access a day earlier, saying “We can confirm Ecuador cut off Assange’s internet access Saturday, 5pm GMT, shortly after publication of Clinton’s Goldman Sachs speechs.”

            On Tuesday, it released another lot of emails from the Clinton campaign chairman John Podesta. None of the material released has contained any sensational disclosures.

          • Ecuador says it cut off Assange’s Internet over Clinton data dumps

            Ecuador, the nation that has granted political asylum to WikiLeaks founder Julian Assange at the country’s London embassy, said late Tuesday it had cut off his Internet access. Ecuador says it did this because of WikiLeaks’ recent dumps of hacked e-mails surrounding Democratic presidential candidate Hillary Clinton.

            “The Government of Ecuador respects the principle of non-intervention in the internal affairs of other states. It does not interfere in external electoral processes, nor does it favor any particular candidate,” the government said in a statement. “Accordingly, Ecuador has exercised its sovereign right to temporarily restrict access to some of its private communications network within its Embassy in the United Kingdom. This temporary restriction does not prevent the WikiLeaks organization from carrying out its journalistic activities.”

          • Ecuador says it disconnected Julian Assange’s internet because of Clinton email leaks

            The government of Ecuador disconnected the internet access of WikiLeaks founder Julian Assange at its Embassy in London because of his site’s publishing of documents that could affect the US presidential election, the government said in a statement today.

            WikiLeaks announced early on Monday that Assange’s internet link had been severed, saying that it had “activated the appropriate contingency plans.”

            In that statement, shared by Politico reporter Eric Geller, the Ecuadorian government says it “respects the principle of non-intervention in the internal affairs of other states” and that it “exercised its sovereign right to temporarily restrict access to some of its private communications network within its Embassy in the United Kingdom.”

          • Ecuador cut off Assange’s internet at U.S. request, WikiLeaks says

            Wikileaks said Tuesday that Secretary of State John Kerry asked Ecuador to stop WikiLeaks founder, Julian Assange, from publishing leaked emails that could disrupt peace negotiations with a guerrilla group in Colombia.

            [WikiLeaks emails show influence of Univision chairman in Clinton campaign // Internet cutoff is just the latest trouble for WikiLeaks’ Assange]

            Assange, who has been in refuge in Ecuador’s embassy in London for more than four years, saw his access to the internet cut over the weekend.

        • Finance

          • Tobacco Carve-Out From ISDS Starts To Spread: Another Nail In The Coffin Of Corporate Sovereignty

            One of the last pieces of horse-trading that went on in order to conclude the TPP deal involved corporate sovereignty, aka investor-state dispute settlement (ISDS), and tobacco. As we reported a year ago, a “carve-out” for tobacco was agreed, which was designed to assuage fears that tobacco companies would use TPP’s ISDS mechanism to challenge health measures like plain packs — something that Philip Morris attempted against both Australia and Uruguay.

          • EU to push through Canadian trade deal despite Belgium split

            The free trade pact between the European Union and Canada is likely to be sealed next week despite opposition from the Belgian region of Wallonia, according to European Trade Commissioner Cecilia Malmstrom as quoted by AFP.

          • CETA Still Not At Finish Line As Belgian State Halts Process

            CETA, the Canada-Europe trade agreement, is still not at the finish line yet. The European Commission has all but one member state on board for the signature of the Comprehensive Economy and Trade Agreement (CETA), Slovak Economy Minister Peter Ziga said today after a meeting of the trade ministers of the EU member states.

          • Rethinking investment treaties to advance human rights

            There are over 3,000 international investment treaties worldwide, with more under negotiation. The number of investor-state arbitrations based on these treaties continues to grow. Human rights issues have emerged in several arbitrations, for example in disputes that affected water access, public health, land rights, the environment and actions favouring disadvantaged groups. Yet few investment treaties contain meaningful references to human rights, and some arbitral tribunals have proved reluctant to consider human rights arguments made by states and non-governmental organisations (NGOs). Investment treaty policy needs reconfiguring in the light of human rights obligations. The UK has long been a key player in the development of the international investment regime. As the country gears up for international trade and investment negotiations in the aftermath of the ‘Brexit’ vote, there is an opportunity to show leadership by ensuring that investment policy supports human rights.

          • Surprise: Now Even Australia’s Biggest Business Organization Says It Has Doubts About TPP

            When a country’s top business association offers criticism in more or less the same terms as anti-TPP activists, maybe it’s time to think twice about ratifying a deal that still lacks any credible justification.

        • AstroTurf/Lobbying/Politics

          • Green Party VP Nominee Ajama Baraka: We Must Disrupt Our Relationship to Democratic Party

            When Green Party presidential nominee Jill Stein tapped Ajamu Baraka to be her running mate back in August, there were a flurry of news stories. Most tried to paint him as the anti-Obama—too radical, too intense, too left to occupy the space just a heartbeat away from the Oval Office.

            All of these characterizations of Baraka amounted to attempting to insult him with compliments.

            Long a voice for oppressed people around the globe, Baraka’s presence on the Green ticket is both self-aware and forward-moving; Southern organizer, human rights activist, veteran and socialist, Baraka is strategically positioned to prove that the core of what centrist Democrats would like you to believe about the Green Party is a lie.

          • Ken Loach: BBC news manipulative and deeply political

            Director Ken Loach has taken aim at the BBC, describing its news coverage as “manipulative and deeply political” and saying it is a “rotten place for a director”.

            Prominent leftwinger Loach, who is promoting his Palme d’Or-winning film about a man’s struggle with the UK benefits system, I, Daniel Blake, said there was a need to “democratise” the corporation.

            “Diversify it so that different regions can make their own dramas. And its notion of news has got to be challenged,” he told the Radio Times.

            “The BBC is very aware of its role in shaping people’s consciousness; this is the story you should hear about, these are the people worth listening to. It’s manipulative and deeply political.”

            In response to the comments, a BBC spokeswoman said: “BBC News is independent and adheres to clear published editorial guidelines including on impartiality. The BBC is consistently rated the most trusted and accurate news provider by the majority of people in the UK.”

          • Hacked Emails Prove Coordination Between Clinton Campaign and Super PACs

            The fact that political candidates are closely coordinating with friendly Super PACs — making a mockery of a central tenet of the Supreme Court’s 2010 Citizens United decision — is one of the biggest open secrets in Washington.

            Super PACs are only allowed to accept unlimited contributions on the condition that the money is spent independently of specific campaigns. The Federal Election Commission hasn’t reacted for a variety of reasons, including a lack of hard evidence, vague rules, and a partisan divide among the commissioners so bitter they can’t even agree to investigate obvious crimes.

            But newly disclosed hacked campaign documents published by WikiLeaks and a hacker who calls himself Guccifer 2.0 reveal in stark terms how Hillary Clinton’s staffers made Super PACs an integral part of her presidential campaign.

          • Donald Trump Is Running Some Really Insecure Email Servers

            In what might be one of the more delicious cases of irony to ever grace a presidential election, a researcher has found that a number of email servers linked to Donald Trump’s hotel and others businesses are running horribly out of date software which receive no security patches, and are lacking other precautions for keeping hackers out.

            The findings come at a time when cybersecurity is a crucial topic in the presidential election, with hackers dumping documents from Hillary Clinton’s campaign online, and Trump and his supporters continuing to criticise Clinton’s use of a private email server.

          • Clinton campaign considered Bill Gates, Tim Cook for VP

            An email from Hillary Clinton’s campaign chair John Podesta released in the recent WikiLeaks dump reveals a group of potential running mates considered by Clinton’s campaign. Clinton’s vice presidential candidates, while not altogether surprising, include some vaguely interesting choices like Bill and Melinda Gates, Apple CEO Tim Cook, and General Motors CEO Mary Barra.

          • Obama: Trump should ‘stop whining’ about rigged election

            President Obama on Tuesday offered a blunt rebuke to Donald Trump’s claim the presidential election will be rigged against him: Stop whining.

            “I’d invite Mr. Trump to stop whining and go try to make his case to get votes,” Obama said during a Rose Garden press conference with Italian Prime Minister Matteo Renzi.

            Trump has riled his supporters in recent days by ramping up his effort to undermine the November elections as “rigged” by the political establishment and mainstream media.

          • Donald Trump support during presidential debate was inflated by bots, professor says

            Many of the Twitter users supporting Donald Trump after the presidential debates were bots, according to a new analysis.

            More than four times as many tweets came from automated accounts that supported Mr Trump than they did backing Hillary Clinton, according to Philip Howard from the University of Oxford.

            The robot tweets helped give the appearance that Mr Trump had more support than he did, according to Professor Howard. That apparent surge in support was referenced repeatedly by Mr Trump, who claimed that despite what the official polling showed he had actually won both of the debates.

          • GOP senators avoid Trump questions on rigged election

            Republican senators don’t want to talk about Donald Trump’s allegations of a rigged election.

            The Hill contacted the offices of all 54 Republican senators and asked them if they think the election is rigged. Thirty-four of the senators’ offices did not respond, while another three declined to comment.

            Those that did respond offered little support for the GOP nominee’s claim.

            Fifteen senators said they do not think the election is being or will be rigged.

            One, Sen. John Cornyn (R-Texas), wants to “wait and see.”

          • Why Did Vote-Rigging Robert Creamer Visit The White House Over 200 Times During The Obama Admin

            Earlier today we wrote about a new Project Veritas undercover video that uncovered several democratic operatives openly discussing, in explicit detail, how to commit massive voter fraud. One of the operatives was a person by the name of Robert Creamer who is a co-founder of a democratic consulting firm called Democracy Partners. Within the video, an undercover journalist details a plan to register Hispanic voters illegally by having them work as contractors, to which Creamer can be heard offering support saying that “there are a couple of organizations that that’s their big trick” (see: “Rigging Elections For 50 Years” – Massive Voter Fraud Exposed By Project Veritas Part 2″).

            Unfortunately, the embarrassing video caused Creamer to subsequently resign from consulting the Hillary campaign as he issued a statement saying that he was “stepping back from my responsibilities working the [Hillary] campaign” over fears that his continued assistance would be a distraction for the campaign.

        • Censorship/Free Speech

        • Privacy/Surveillance

          • GCHQ reacts in the best way to Oliver Stone’s description of it as “barbaric” and “ruthless” [Ed: The mouthpiece of GCHQ speaks]

            GCHQ has refused to be drawn into a war of words with Oscar-winning director Oliver Stone, who described the agency as “barbaric”.

            Speaking at the Cheltenham Literature Festival on Sunday, Stone – the director of JFK, Platoon, Wall Street and Snowden said: “GCHQ is one of the most barbaric agencies around, very cold, very smart.

            “And likely to arrest anybody at any time, on any thing on any cause. So hello!”

          • The Shadow Brokers is now crowdfunding release of NSA hacking tools
          • Hackers selling NSA hacking tools for 10000 bitcoins
          • Stolen NSA Cyberweapons Auctioned: Shadow Brokers Wants $6.3 million To Publish Hacking Tools’ Password
          • Shadow Brokers Cancel Auction of Supposed NSA Hacking Tools
          • No one wants to buy NSA’s hacking tools
          • Shadow Brokers cancel auction of alleged stolen NSA cyberweapons after no one bid anything
          • Shadow Brokers Scraps Auction, Opts for 10000 BTC Crowdfund to Release NSA Files
          • NSA hackers abandon auction, seek $6M in crowd funding
          • Granted Warrant Allowed Feds To Force Everyone At Searched Residence To Unlock Devices With Their Fingerprints
          • MI6, MI5 and GCHQ ‘unlawfully collected private data for 10 years’
          • FBI Lifts Gag Order On NSL Issued To Google… Which Doesn’t Have Much To Say About It

            In other news, Google saw an increase in FISA-ordered requests for user info, bumping it up by about 5,000 total accounts as compared to the previous reporting period.

            Hopefully, Google’s ungagged-but-still-secret NSL won’t stay secret for much longer. It would be troubling if this were to become Google’s standard policy — the announcement of gag order removals but with no further details forthcoming. Not much “transparency” in the Transparency Report, unfortunately… not if that’s how it’s going to be handled.

            True, much of the opacity is still the government’s fault: the not-at-all-useful “banding” that makes NSL numbers impossible to parse (1-499 could mean one NSL… or almost 500 in one reporting period), the gag orders that remain in place forever, etc. But private companies shouldn’t take their cues from naturally-secretive government agencies. They’re pretty much all we have to provide us with an outside, somewhat unrestricted measure of the government’s surveillance efforts.

          • Government Seeks Do-Over On Win For Microsoft And Its Overseas Data

            The DOJ wants the Second Circuit Court of Appeals to revisit the decision it handed down in July — the one that’s preventing it from forcing Microsoft to hand over data stored on its servers in Ireland. The DOJ hoped the court would read the Stored Communications Act as applying to the location of the company served with the data request, rather than the actual location of the data. The Appeals Court disagreed with the lower court’s finding — one that dragged in the Patriot Act for some reason — pointing out that the purpose of the SCA was to protect the privacy of communications, not to facilitate the government in obtaining them.

          • Security agencies collected data unlawfully, UK court rules

            British spy agencies collected data illegally for more than a decade, a court has ruled.

            The Investigatory Powers Tribunal, which investigates complaints against intelligence services, ruled on Monday that the agencies’ secretive collection and use of bulk communications data (BCD) failed to comply with human rights laws until 2015.

            The ruling is the result of a case brought by privacy campaigners Privacy International that challenged the collection and use of bulk data by security agencies GCHQ, MI5 and MI6.

          • Police should rein in facial recognition programs, says new report

            A coalition that includes the ACLU, EFF, and 50 other organizations has asked the Department of Justice to investigate how the FBI and police are using large-scale facial recognition databases in criminal investigations. The letter comes alongside a new report that claims around half of American adults are effectively part of these databases.

            The report, released by the Georgetown Law Center on Privacy and Technology, draws on both existing data and material obtained through public records requests. It notes that at least 26 states — which have been previously identified — let law enforcement scan photos from the Department of Motor Vehicles as part of investigations. Based on the number of drivers who have received licenses in each state, the study’s authors calculate that this covers 117 million adults — or 48 percent of the total adult population. The licenses aren’t part of one central index, but several databases across states.

          • The perpetual lineup: Half of US adults in a face-recognition database

            Half of American adults are in a face-recognition database, according to a Georgetown University study released Tuesday. That means there’s about 117 million adults in a law enforcement facial-recognition database, the study by Georgetown’s Center on Privacy & Technology says.

            “We are not aware of any agency that requires warrants for searches or limits them to serious crimes,” the study says.

            The report (PDF), titled “The Perpetual Line-up: Unregulated Police Face Recognition in America,” shows that one-fourth of the nation’s law enforcement agencies have access to face-recognition databases, and their use by those agencies is virtually unregulated.

          • Before Nixon: When JFK tapped the phone of a New York Times reporter

            President Kennedy’s order to the CIA to begin collecting intelligence on American reporters—shattering its own charter—was formalized as Project Mockingbird. In the spring of 1963, this resulted in the wiretapping of two columnists, Robert S. Allen and Paul Scott, after they allegedly revealed classified secrets. Other reporters were also monitored in this program until its end in 1965.

          • A database of the UK’s porn habits. What could possibly go wrong?

            To this end the Digital Economy Bill creates a regulator that will seek to ensure that adult content websites will verify the age of users, or face monetary penalties, or in the case of overseas sites, ask payment providers such as VISA to refuse to process UK payments for non-compliant providers.

            There are obvious problems with this, which we detail elsewhere.

            However, the worst risks are worth going into in some detail, not least from the perspective of the Bill Committee who want the Age Verification system to succeed.

          • NBC Happily Parrots The CIA’s Case For Escalating Cyber War With Russia

            As we’ve been noting there have been growing calls for the Obama Administration to publicly scold Russia for hacking the DNC, and to dole out some kind of righteous punishment for this unseemly behavior. Calls on this front have ranged from launching larger cyber offensives or even a brick and mortar military response. We’ve noted repetaedly how this is stupid for a multitude of reasons, since hacking “proof” is (if the hacker’s any good) impossible to come by, with false-flag operations consistently common.

            So while there are some very obvious problems with escalation here, the U.S. press seems pretty intent on helping the intelligence community justify doing exactly that. Enter countless outlets breathlessly passing along the idea that we simply must “retaliate” for Russia’s behavior, willfully ignoring that the United States wrote the book on nation state hacking and lacks the moral high ground. As Snowden and other whistleblowers should have made abundantly clear by now, we’ve been hacking allies, fiddling in Democratic elections, creating indiscriminately dangerous malware and worse for decades.

            Led by our bad example, we’ve cultivated a global environment in which nation state operators hack one another every second of every day to keep pace with the United States. As such, the idea that the United States is an innocent daisy that needs to “retaliate” is absurdly, indisputably false, yet this concept sits at 90% of the reporting on this subject. Case in point: eager to get the escalation ball rolling, the CIA last week used NBC to make the case for a renewed cyber-warfare campaign against Russia in the coming months…

          • StartPage decides to ditch Yahoo after data breach

            Europe-based StartPage, a search engine that focuses on user privacy has canceled its partnership with Yahoo. In an announcement made on Monday, StartPage said it will be dropping Yahoo’s aggregate search results from its metasearch platform Ixquick.eu by the end of the month.

          • Top U.S. security official returns to AU to talk cyberspace [Ed: Michael S. Rogers in latest NSA charm offensive]
          • Director of the National Security Agency and Commander of US Cyber Command to Speak at Columbus State University
          • Adm. Rogers: US ‘Working Our Way Through’ NSA-Cyber Command Split
          • Feds need clarity on cyber structures
          • Rogers: ‘We’re working our way through’ process to split NSA-CYBERCOM roles
          • Cybersecurity chief supports splitting role with NSA, but in the right way
          • Official: you can still trust the NSA [Ed: FCW with its puff pieces now...]

            t might not be as momentous as knocking down the Berlin Wall, but tearing down the barriers between Signals Intelligence and Information Assurance inside the National Security Agency is revolutionary, an NSA official in the thick of those efforts contends.

            The NSA is six weeks into “NSA21,” which the agency calls the most substantial organizational reform in its 60-year history. Announced earlier this year, NSA21′s primary change is flattening the organization and moving it from a mission-based construct to a functional model.

        • Civil Rights/Policing

          • 4-star general snagged for lying in Stuxnet leak probe

            The Obama administration’s anti-leak drive has netted its most serious conviction of a high-ranking government official: a guilty plea by a former vice chairman of the Joint Chiefs of Staff to a felony charge of lying to investigators probing leaks about top secret U.S. efforts to disrupt Iran’s nuclear program.

            Retired Marine Gen. James Cartwright appeared in federal court in Washington on Monday afternoon, speaking in a low voice as U.S. District Court Judge Richard Leon accepted the former four-star general’s admission that he lied to FBI agents about his contacts with New York Times reporter David Sanger and former Newsweek reporter Daniel Klaidman.

          • Judge Rejects ‘Rioting’ Charge Against Journalist For Reporting On Protestors, But Prosecutor Still Looking For New Charges

            Last week it was announced that journalist Amy Goodman would go to North Dakota to face charges over her coverage of North Dakota oil pipeline protests that went viral. The idea that Goodman was charged with doing journalism was really ridiculous. The original charges focused on “trespassing” but once the local state’s attorney, Ladd Erickson, realized that those clearly would not stick, he changed them to rioting. When asked to defend the arrest warrant and charges by a local newspaper, Erickson displayed a complete lack of understanding of the First Amendment in saying that because Goodman’s coverage was sympathetic to the protesters, it was fine to consider her a protester too.

            Thankfully, a judge disagreed and rejected the rioting charge.

          • Judge Rejects Riot Charge Against Amy Goodman of ‘Democracy Now’ Over Pipeline Protest

            The radio journalist Amy Goodman spent the weekend with the threat of a riot charge hanging over her, arising from protests over a planned oil pipeline in North Dakota. But on Monday a judge rejected the case for lack of evidence.

            Ms. Goodman, the host and executive producer of the syndicated radio, television and web show “Democracy Now!” on Pacifica Radio, had planned to enter a not guilty plea on Monday, but District Judge John Grinsteiner declined to sign the charging document, bringing the case to a stop — at least for now.

            She and her lawyers declared victory on Monday, but Ladd Erickson, a state prosecutor who is assisting the Morton County state’s attorney’s office in the case, said other charges were possible.

          • Stepdad Goes To Police With Stepdaughter’s Sexts, Asks Them To Intervene, Is Prosecuted For Child Porn

            Sexting continues to be a thing. And, as we have covered various stories revolving around people sending pictures of their naughty bits to one another, much of the consternation in the public tends to be around children partaking in sexting. And I can see their point. While I tend to laugh at prudishness in general, it would probably be best for all involved if underage youngsters weren’t texting each other provocative pictures of themselves with reckless abandon.

            So what is a parent to do if their children are found to be doing just that? One might think that going to both the child’s school and authorities to ask for help in stopping this behavior would be in order, right? Well, for one parent in Australia, doing just that landed him a conviction for child pornography and sex offender registration, even as essentially the entire legal system acknowledged that he was just trying to be a good father.

          • Dad Asks Cops to Intervene in Daughter’s Sexting. They Arrest Him for Child Porn.

            A man who found out that his 15-year-old stepdaughter was sexting her boyfriend proceeded to download the evidence to bring it to the school and the police to ask them to intervene.

            Oh dear, readers. You know where this is heading. Intervene they did. Now the dad has been convicted on child pornography charges and placed on the sex offender registry. This, despite the judge understanding exactly why the man, Ashan Ortell, 57, held onto the images.

            “There is no suggestion of any exploitation of them by anybody,” ruled Judge Jane Patrick, over in Australia, which is becoming as daffy as the United States. “You made no attempt to conceal the images. In fact, you were so concerned that you contacted the authorities about the images.”

          • Child bride in Turkey dies after giving birth

            A child bride in Turkey has died of a brain hemorrhage after giving birth at the age of 15, local media have reported.

            The bleed thought to have killed her is believed to have been associated with going into labour at such a young age.

            Known only as Derya B, the girl was married in a religious ceremony at the age of 14.

          • Turkish child marriage film shines light on hidden abuses

            Child brides in Turkey are often raped, beaten and forced to undergo virginity tests, according to the director of a new documentary which aims to break the silence on the taboo issue.

            “Growing Up Married”, which will premiere in London on Oct. 30, examines the impact of child marriage on four women who were wed as teenagers in western Turkey.

            “When hearing some of their stories I thought to myself ‘how are you still alive?’,” filmmaker Eylem Atakav said in an interview with the Thomson Reuters Foundation.

            Globally, one third of girls in developing countries, excluding China, are married before the age of 18 and one in nine before the age of 15, according to U.N. data.

          • Vintage Photos of Bold and Modern Iranian Ladies Before the Islamic Law Took Over!

            The Islamic Republic however didn’t incline towards the Sharia Law until the late 70’s. The Iranian Revolution that took place in the year 1978 witnessed massive changes in the otherwise modern country.

            Right from their eating habits to their attire, to literature and art & culture, Iran witnessed a sudden shift in their functioning. Overtaking the Pahlavi dynasty changed the fate of the innocent Iranians forever under the rule of Grand Ayatollah Ruhollah Khomeini.

          • Two-thirds of child refugees screened by officials found to be adults, Home Office figures show

            Nearly two-thirds of “child” refugees who officials questioned about their real age were found to be adults, Home Office documents show.

            Figures show that in the year to September 2015, 65 per cent of the child refugees who had their age disputed were found to be over 18.

            It comes after Conservative MPs raised questions about the ages of 14 refugees who were brought to the UK this week from the “Jungle” migrant camp in Calais.

            The Home Office has no way of independently verifying the age of child refugees being brought to the UK.

            Home Office documents show that if a refugee does not have a birth certificate, a Home Office screening officer can certify them as a child based on their “physical appearance” or “demeanour”.

          • Stripped, stomped and sprayed: Former police officer Yvonne Berry breaks silence on Ballarat arrest ordeal

            A woman who was captured on CCTV being stripped, stomped on and kicked in the Ballarat police cells has spoken out for the first time.

          • Finally Free: ‘Guantánamo Diary’ Author Released After 14 Years Without Charge

            After unlawfully imprisoning our client Mohamedou Ould Slahi at Guantánamo for 14 years without charge or trial, the U.S. government has finally released him. He is now home in his native Mauritania.

            We are overjoyed for Mohamedou and his loving family, who have been anxiously awaiting his return for so many years. His release brings the U.S. one man closer to ending the travesty that is Guantánamo.

          • FBI Facial Recognition Expert Helps Denver PD Arrest Wrong Man Twice For The Same Crime

            Never let it be said law enforcement won’t get their man. Even if it’s the wrong man. And even if they do it twice.

            This was Denver native Steven Talley’s first experience with the local PD.

          • ‘Fear, censorship and retaliation’: United Nations rapporteur slams Australia’s human rights record

            Australia lacks adequate protections for human rights defenders and has created “an atmosphere of fear, censorship and retaliation” among activists, according to a United Nations special rapporteur.

            Michel Forst, who released an end-of-mission statement on Tuesday after a fortnight in Australia, said he was “astonished” by numerous measures heaping “enormous pressure” on public servants, whistleblowers and ordinary citizens.

          • UN warns of ‘fear, censorship and retaliation’ in Australia

            Strict secrecy laws and harassment by government officials are creating an “atmosphere of fear” in Australia, a UN investigator warns.
            In a damning report Tuesday, United Nations special rapporteur Michel Forst said several human rights defenders had refused to meet him because of the fear of persecution.

          • Australian secrecy laws must be reviewed, says UN investigator
          • UN Calls on Australia to Re-examine Secrecy Laws
          • Australia should urgently improve whistleblower protection, UN expert says
          • UN investigator urges review of Australian secrecy laws
          • UN warns of ‘fear, censorship and retaliation’ in Australia
          • Chilling effect on rights defenders: UN
          • Chilling effect on rights defenders: UN
        • Internet Policy/Net Neutrality

          • Software-Defined Networking Puts Network Managers in the Driver’s Seat

            SDNs can help organizations keep up with evolving network demands in an app-centric IT environment and give network managers much more flexibility.

          • The Open-Source Group Trying To “De-Google” The Internet

            How can we surf the web without using Google, Amazon or Facebook? French group Framasoft, which promotes the use of open-source software, offers a way.

            Under the “De-google-ify internet” initiative, the group uses decentralized software solutions to design tools that allow consumers to retake control of their data.

            Members of Framasoft are strong advocates for the digital privacy of consumers. They consider it their mission to educate people about internet freedom.

        • DRM

          • MacBook Pro to ditch traditional USB ports in favour of USB-C

            TRADITIONAL USB ports could be about to go the way of the 3.5mm headphone jack after the news that Apple’s new MacBook Pro will come with USB-C and Thunderbolt 3 only.

            A report from Macotakara claimed that Apple’s upcoming MacBook Pro models will ditch traditional USB ports, Thunderbolt 2 and the company’s MagSafe charging connector.

            Instead, according to a “reliable Chinese supplier”, the 13in and 15in laptops will have USB Type-C and Thunderbolt 3 ports, so buyers will be forced to cough up £65 to hook up standard USB devices.

          • Report: Apple will introduce new Macs at October 27th event [Updated

            The most interesting new information is about the MacBook Air. The 13-inch model is said to get USB Type-C and Thunderbolt 3, and those ports will replace all of the ports on the current Air—USB Type-A, Thunderbolt 2, and Magsafe 2. We don’t know how many of these ports the Air will get, but if the design stays more or less the same, it should at least get more than the one-ported MacBook. The 11-inch Air, which currently serves as Apple’s entry-level laptop, would be removed from the lineup.

        • Intellectual Monopolies

        ]]>
        http://techrights.org/2016/10/19/canonical-livepatch-service/feed/ 0