EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

05.22.14

New Claims That Brendan Eich Got Abused and Pushed Out for Opposing DRM, Not for Opposing Gay Marriage Some Time in the Past

Posted in DRM, Free/Libre Software at 10:56 am by Dr. Roy Schestowitz

Brendan Eich
Photo by Darcy Padilla

Summary: A look at Brendan Eich’s musings from some months ago reveals hostility, as a matter of principle, towards DRM and some other items which suggest turf wars might be going on inside Mozilla

This sure is fascinating. Following the widely-chastised decision to embrace DRM it turns out that Eich was against the decision. We congratulated him for being a FOSS proponent who can end Mono dependence back when he was first appointed CEO and even before that. Remember that the patron of Firefox, Mozilla, was quick to embrace Ogg (we love Ogg), but later disappointed many of us by liaising with MPEG-LA (essentially stomping on the whole policy of supporting Ogg at the core). There certainly seems to be a turf war inside Mozilla. This is probably why Eich got ejected (through intense pressure on him).

With DRM and MPEG, Mozilla Firefox is no longer a FOSS browser. According to this one new blog post, DRM was why Brendan Eich had to go. “Eich stood firmly in the way of Mozilla incorporating DRM into Firefox,” says the source. Eich is a FOSS supporter, so this makes sense. Without him, Firefox can become FOSS only in the Chrome sense (FOSS with many blobs on top). Here is what Eich wrote in his site: “I continue to collaborate with others, including some in Hollywood, on watermarking, not DRM.”

He also said “DRM is about gaining leverage over “playback devices” and ultimately “users” in order to jack prices a bit” (source). To quote another take on it:

Eich stood firmly in the way of Mozilla incorporating DRM into Firefox. Now that he’s gone, and his technological authority with him, Mozilla immediately caved to Hollywood interests. It’s also interesting to note that the justification for Mozilla making this change is given as fear that users will abandon them. That demonstrates that the campaign to #uninstallfirefox was based on a sound principle, even if it was not quite as successful as I would have liked it to be.

Well, guess what, Mozilla? The treatment of Eich and promotion of DRM will do huge harm to Firefox and Mozilla. Many people disagreed with a position that Eich held outside his professional field half a decade ago, but those same people strongly disagree with the way some people in Mozilla treated Eich, not to mention the actions taken after his departure. Mozilla seems to be suffering an identity crisis of some kind.

With Moodlerooms, Blackboard is Almost Killing the Free Software Project (Moodle)

Posted in Free/Libre Software at 10:36 am by Dr. Roy Schestowitz

Summary: Blackboard seems to be ‘pulling a Microsoft’ on an essential FOSS project that makes Blackboard redundant

Moodle is a fantastic and comprehensive piece of free/libre software. I use it at work. I have it installed in my own Web site as well, having set up and configured Moodle for clients. It’s an impressive collection of software for which I produced some documentation, so seeing how Blackboard is trying to ruin it feels quite personal. First Blackboard was exploring patent litigation and now it uses “embrace, extend, and extinguish” (the Microsoft modus operandi).

According to this new post, there is threat to Moodle and Blackboard is involved. To quote: “When services are not conveying but users interact the GPL does not seem to come into play. While companies like Moodlerooms allege they donate a lot of funding to Moodle, we are unable to use the source code from this deriv because it is “Cloud” based and no copies are distributed.

“I was absolutely surprised when I saw that Moodlerooms did not have a GPL notice on their website. I was confused, shocked and dismayed when I realized they were not required to have one. Honestly, they use Moodle as a backend. They use both 1.9x (GPL v2) and 2.x (GPL v3). At least, according to their Joule documentation, this is how their service works.

“They take a 1.9x course and archive it. They then use 2.x to convert this to Common Cartridge format for importing to Learning Management Systems like Moodle and Blackboard – the company who bought them or whatever – Blackboard is proprietary. Moodlerooms code and Joule is closed source even though it uses open source.

“The interface of Moodlerooms is admittedly Moodle. The look and feel is exactly Moodle. The processes on the back are not seen, but seems like a simple backup, restore, export process.

“However, maybe I want to see the code. I cannot. This is a service.”

Remember that Moodlerooms is now controlled by the biggest enemy of Moodle which is linked to Microsoft. The author of the rant does not seem to note this (perhaps unaware).

Apple is Abandoning Steve Jobs’ Thermonuclear War on Linux/Android

Posted in Apple, GNU/Linux, Google, Patents, Samsung at 10:28 am by Dr. Roy Schestowitz

Summary: Apple is reportedly folding and moving away from the counterproductive war that Steve Jobs started before his death

There are indications in the media (both large and small outlets) that after vicious attacks against HTC Apple may end litigation against Samsung, quite similarly. As one person put it: “The long and drawn out battle between Samsung Electronics and Apple over the ownership of various intellectual properties may be coming to a close.”

Samsung and Apple have been in the courts for years (only lawyers won). Apple started it all because Apple is silly and it was headed by an arrogant man at the time. To quote HBR:

Look out across today’s ultra-competitive smartphone market and you’ll see something resembling the religious wars of the Middle Ages. This is no quaint summer-weekend reenactment. The weapons being brandished are devilishly constructed patents; the rules of engagement the arcane procedures of federal courts. And the havoc being wreaked — in higher prices, banned devices, and stifled innovation — is laying waste to the industry landscape.

The central battle pits Apple against everyone and everything involved with Android, Google’s open source operating system.

Android’s release, for Apple’s late founder and CEO Steve Jobs, was the ultimate heresy. “I will spend my last dying breath if I need to,” Jobs is quoted as saying in a series of jeremiads, “and I will spend every penny of Apple’s $40bn in the bank, to right this wrong. I’m going to destroy Android, because it’s a stolen product. I’m willing to go thermonuclear war on this.”

And so Apple has. Between 2006 and 2012, the company was involved, sometimes as plaintiff and sometimes as defendant, in nearly 150 patent lawsuits around the world over various features of its iPhone — including hardware, software, and product design.

Like the religious wars of old, a complex web of alliances, side agreements, and mutual defense pacts have conspired to draw the entire industry into open warfare. Sony is suing LG. Nokia is suing HTC. Motorola (owned by Google since 2011) is suing and being sued by everyone.

Based on this other new report, Apple is close to giving up, having failed to tax Android in any significant way. Reuters says the following:

Apple Inc and Google Inc’s Motorola Mobility unit have agreed to settle all patent litigation between them over smartphone technology, ending one of the highest profile lawsuits in technology.

In a joint statement on Friday, the companies said the settlement does not include a cross license to their respective patents.

“Apple and Google have also agreed to work together in some areas of patent reform,” the statement said.

Apple and companies that make phones using Google’s Android software have filed dozens of such lawsuits against each other around the world to protect their technology. Apple argued that Android phones that use Google software copy its iPhones.

It is starting to look like Apple is admitting defeat and abandoning Jobs’ aggressive legacy. It is worth noting that Apple has launched no new major cases since Jobs died. It is a good sign because it may mean that Apple as an aggressor in the courtroom might be a dead legacy.

05.21.14

Links 21/5/2014: New Qt, Bacon Leaves Canonical

Posted in News Roundup at 2:23 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Planet FLOSS India – 10th anniversary
  • Good Enough Is Good Enough
  • Do You REALLY Need That Non-Free Software?

    The standard comment trolls make to FLOSS is that non-Free software is better, somehow, because you pay for it up front. I’ve seen several instances of that being false in schools. Here’s an example of a big business rolling out non-Free software. It didn’t work for them and they are stopping the rollout part way through. You don’t always get what you pay for…

  • Security’s future belongs to open source

    The proof that open source, properly applied, is available. Studies, such as the one recently done by Coverity, have found that open-source programs have fewer errors per thousand lines of code than its proprietary brothers. And, it’s hard to ignore the Communications-Electronics Security Group (CESG), the group within the UK Government Communications Headquarters (GCHQ) that assesses operating systems and software for security issues, when they said that that while no end-user operating system is as secure as they’d like it to be, Ubuntu 12.04 is the most secure desktop.

    On the other hand, the mere existence of Microsoft’s monthly Patch Tuesday says everything most of us need to know about how “secure” proprietary software is. I also can’t help noticing how every time Microsoft releases a new version of Internet Explorer (IE), they always claim it’s the most secure ever. And, then, a new hole is found, and guess what, that same security hole is in every version of IE from IE 6 to IE 11. If IE really were being rewritten to make it secure why are the same holes showing up In Every Version??

  • HP Strengthens Commitment to Open Networking and the Open Cloud

    As a platinum member of both the Linux Foundation and the OpenStack Foundation, HP hasn’t exactly kept its interest in open source a secret. Recently, however, it upped its commitment to open source in two key areas. First, it added the OpenDaylight project — one it helped found — to its list of platinum memberships. Second, it launched the Helion portfolio and pledged to invest more than $1 billion in support of new open source cloud products and platforms.

    “Our views on open source are captured by our commitment to base HP’s cloud product and services strategy entirely upon the open source OpenStack framework,” Mark Pearson, chief technologist for HP Networking, told Linux.com. “We believe openness speeds up innovation.”

  • Events

  • Web Browsers

  • SaaS/Big Data

    • Looker Unveils New ‘Self-Service’ Big Data Analytics Platform
    • OpenStack launches new marketplace of vendors

      The OpenStack Juno Summit last week in Atlanta was a source of many new and exciting announcements, from both vendors and the OpenStack Foundation itself. One of the more interesting of such announcements was of a new OpenStack Marketplace. For those looking to explore their options in commercial offerings of OpenStack, from training to distributions to public clouds and more, the Marketplace is designed to help users better understand what resources are available.

    • New OpenStack Resources Flowed Out of the Atlanta Summit

      Last week was filled with soundbytes and announcements from OpenStack Summit in Atlanta, and there were also announcements of several new services and resources surrounding the OpenStack cloud platform. In case you missed some of the most important ones, here is what you need to know, whether you are considering an OpenStack deployment or already have one underway.

    • OpenStack Building Storyboard for the Software-Defined Economy
    • Ubuntu, Puppet, Grizzly Play Key Roles in OpenStack Deployments

      During an afternoon session at the OpenStack Juno Summit in Atlanta on May 14, members of the OpenStack User Committee publicly revealed the results of the latest OpenStack user survey. OpenStack is an open-source cloud platform originally started by NASA and Rackspace in 2010 that has since grown to include many of the leading names in the technology world, including IBM, HP, Dell, Cisco and AT&T. Since 2010, there have been nine major milestone releases of OpenStack, with the most recent being the Icehouse release that debuted on April 17. The new OpenStack user study includes responses from 506 OpenStack deployments around the world. The top country for deployments is the United States, followed by China. Across the 506 OpenStack clouds, organizations are in various stages of deployments, with 210 being in development/quality assurance, 218 in proof of concept and 209 in production deployment. One of the key findings of the user survey is that OpenStack users are running different OpenStack releases and don’t always update to the latest version, for various reasons. For the OpenStack clouds running in production, the survey found that the Ubuntu Linux operating system is the leading choice. In this eWEEK slide show, we take a look at some of the key findings from the OpenStack user survey.

    • KEMP Unveils Condor Cloud Application Delivery Framework
  • CMS

    • WordPress 3.9.1 now available in Fedora

      This update is a bugfix update of the previous major WordPress update 3.9 (codenamed “Smith”). WordPress 3.9.1 has been available for a few days in Fedora 20, and was recently just pushed to the Fedora 19 repos.

      The 3.9 WordPress update introduced a slew of new features and refinements, including a new theme browser, improved post editing, and updates to the image editing tools.

  • Public Services/Government

    • Local government software sharing and reuse site revamped

      Europe Commons, an online platform for the sharing, exchange and reuse of software solutions for Europe’s municipalities and other local government organisations was revamped earlier this month, during which it also received a new name – Civic Exchange. The platform collects and promotes applications and digital services that help improve public services in Europe. The platform’s consortium is doubling its efforts to find new solutions, announcing evidence-based case studies to showcase those with the most impact.

    • 3 ways government can unleash the power of feedback

      Open government is a critical dimension to democracy. It is also difficult. If it were easy, our work would be over. Yet, open government by its nature needs constant iteration. Open government, much like open source, is grounded in collaborative and participatory processes that ultimately shape how we experience our cities, states, and country. It requires several dimensions—from releasing information to creating structures and processes to empower people inside and out of government.

  • Openness/Sharing

  • Programming

  • Standards/Consortia

    • Direct from the White House: APIs are key to extending platforms

      To a technology director at the White House, the State of the Union is like the Superbowl. While the world is watching the President of the United States deliver an address to the nation, Leigh Heyman and his team are managing the media technology behind the scenes to create an enhanced and interactive experience for the viewers. How many of you watched the State of the Union on YouTube this year?

    • Finding OpenGL Driver Bottlenecks With OProfile + PTS

      A new initiative is underway by a Mesa developer to pair the OProfile system profiler with the Phoronix Test Suite for more easily finding OpenGL driver bottlenecks, etc.

Leftovers

  • Why Tech’s Best Minds Are Very Worried About the Internet of Things

    The 1,606 respondents said they saw many potential benefits to the Internet of Things. New voice- and gesture-based interfaces could make computers easier to use. Medical devices and health monitoring services could help prevent and treat diseases. Environmental sensors could detect pollution. Salesforce.com chief scientist JP Rangaswami said that improved logistics and planning systems could reduce waste.

  • iOS 7: users destroy iPhones after fake waterproof advert

    A spoof advert suggesting Apple’s new iOS 7 operating system made handsets waterproof appears to have fooled some users into destroying their iPhones.

  • First academy chain closes leaving the fates of six schools in the balance

    An academy chain in charge of running six state schools became the first in the country to fold today – forcing a sudden hunt for new sponsors to take them over.

  • Security

  • Defence/Police/Secrecy/Aggression

    • The Blair-Bush Letters

      If anybody is surprised that key letters between Tony Blair and George Bush on launching the invasion of Iraq have gone missing, they have not been paying attention. On both sides of the Atlantic, the Obama and Cameron regimes have consistently and continually covered up the crimes of their predecessors, from launch illegal wars of aggression to instituting programmes of torture and extraordinary rendition and murder.

  • Environment/Energy/Wildlife

    • How a Raccoon Became an Aardvark

      In July of 2008, Dylan Breves, then a seventeen-year-old student from New York City, made a mundane edit to a Wikipedia entry on the coati. The coati, a member of the raccoon family, is “also known as … a Brazilian aardvark,” Breves wrote. He did not cite a source for this nickname, and with good reason: he had invented it. He and his brother had spotted several coatis while on a trip to the Iguaçu Falls, in Brazil, where they had mistaken them for actual aardvarks.

  • PR/AstroTurf/Lobbying

    • Vote Green in England

      So who should those of us living in England vote for tomorrow? I intend to vote Green – it seems to me that in England that is the best way to give a positive expression to the discontent with mainstream parties. I particularly hope that those who have the opportunity to vote for Rupert Read in the East of England will do so. Their support for renationalizing the railways would be enough for me, but actually I find myself in agreement with the large majority of their platform. I reproduce here an article from the ever excellent Peter Tatchell.

    • Hungary and the End of Politics

      How Victor Orbán launched a constitutional coup and created a one-party state.

  • Censorship

    • Facebook Shuts Down Account Of Woman Who Posted Same-Sex Kiss Photo

      A woman in Italy is accusing Facebook of closing her account with less than 24 hours notice after she refused to remove a photo of two women kissing. Carlotta Trevisan says Facebook deemed that the image, which she described as “chaste” and “pure,” “violated the community’s standards on nudity and pornography.”

  • Privacy

  • Civil Rights

  • Internet/Net Neutrality

    • Why the UK needs to start caring about net neutrality

      LAST THURSDAY the US Federal Communications Commission (FCC) voted by a three to two margin to move forward with chairman Tom Wheeler’s proposals to gut net neutrality rules in the USA. But what exactly does that mean? And why should we, on a small island 3,000 miles away, care anyway?

      It all started in January when US internet service provider (ISP) Verizon successfully appealed against FCC Open Internet Order 2010, arguing that because internet service had been classified as an “information service” rather than a “telecommunications service”, the FCC had no right to enforce net neutrality rules under the common carrier regulations that had been the backbone of the 2010 rules, and a cornerstone of the Obama administration.

    • FCC chairman clarifies position with House Subcommittee
  • Intellectual Monopolies

    • TTIP Update XXVI

      This is probably the most action-packed update so far – a reflection of the fact that we are now deep in the TAFTA/TTIP negotiations, which have been running for nearly a year. Of course, information about what exactly is happening behind the closed doors is still thin on the ground. To its credit, the European Commission has recently published its negotiating positions in five areas: chemicals, cosmetics, pharmaceutical products, motor vehicles, textiles and clothing. Significantly, though, it did not publish its proposals for energy. That’s because they are far more contentious than for those other sectors.

    • Copyrights

      • Election Week, Swedish And Czech Pirate Parties Liftoff In Polls

        Last Friday, Swedish Public Radio opened with the headline “Swedish Pirate Party Heading For Re-Election To European Parliament” as a fresh poll was published. This was followed by similar news from the Czech Republic. As election week opens, more is up in the air than ever – but things are looking overall positive for the movement.

      • Student Wins Pirate Bay Domain To Protest Website Blockades

        A student has been awarded a valuable Pirate Bay-related domain after successfully complaining to Denmark’s domain name dispute body. ThePirateBay.dk will now be taken away from its current owner and transformed into a special site to protest the ISP blockade of The Pirate Bay in Denmark.

      • The Biggest Filer of Copyright Lawsuits? This Erotica Web Site

        In 2006, Colette Pelissier was selling houses in Southern California, and her boyfriend, Brigham Field, was working as a photographer of nude models. Colette wanted to leave the real-estate business, so she convinced her boyfriend to start making adult films. “I had this idea, when the real-estate market was cooling—you know, maybe we could make beautiful erotic movies,” she said.

      • Pirate Bay Backs Pirate Party With EU Election Banners

        The Pirate Bay has just launched a banner campaign to support the various Pirate parties participating in the European Parliament elections this week. The notorious torrent site is running localized ads, encouraging its millions of visitors to vote Pirate.

      • The Pirate Bay Running Promos For European Pirate Parties In Election Week

05.19.14

Links 19/5/2014: Ubuntu in HPC, New Linux Foundation Members

Posted in News Roundup at 3:17 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Web Browsers

    • Mozilla

      • AdBlock Plus: A Memory Guzzler?

        If you ask users of the Firefox browser why they use it, a lot of them will say that they have favorite extensions that work with it. And, among those popular extensions, AdBlock Plus is among the most popular of all. However, a post from Mozilla’s Nicholas Nethercote claims that the almost 19 million users of AdBlock Plus don’t realize that bugs and some design aspects of the extension can cause it to guzzle memory, potentially slowing computers down.

  • SaaS/Big Data

  • Oracle/Java/LibreOffice

  • BSD

    • Preview of GhostBSD 4.0

      GhostBSD is a desktop distribution that’s based on FreeBSD. The core developers are from Canada, so I think it ok to call it a Canadian distribution. The only article I’ve written about this distribution was a review of GhostBSD 2.5 back in February 2012 (see GhostBSD 2.5 review). I wasn’t impressed.

      But that was then, this is now. The third alpha of what will become GhostBSD 4.0 was released a few days ago. To see how far the distribution has come since the 2.5 edition, I downloaded and installed it from a DVD image in a virtual environment. I’m still not terribly impressed, though I realize the this is only a third alpha release. The following screenshots were taken from that test installation.

      This is what the boot menu looks like. This needs to change. Even PC-BSD, another FreeBSD-based distribution, has abandoned this bland boot menu.

  • FSF/FSFE/GNU/SFLC

    • 50 key MIT-related innovations

      23. The free software movement (1983)

      Early AI Lab programmer Richard Stallman was a major pioneer in hacker culture and started the freesoftware movement by launching the GNU operating system, a compatible replacement for the (nonfree) Unix OS. The last gap in GNU was filled by the kernel Linux, yielding the widely used GNU/Linux system.

    • Terry Hancock on Free Software and Free Culture [Interview]

      Advocates of Free Software aren’t made in a single night. When it comes to computers, software, and digital art, inspiration and motivation are of utmost importance. Terry Hancock, part owner of Anansi Spaceworks and Free Software Magazine columnist, was surrounded by all three growing up.

  • Public Services/Government

    • Open source code helps governments share information with citizens

      Before open data, there was FOIA. Beginning in 1967, the federal Freedom of Information Act (FOIA) empowered the public to request access to government documents. Unfortunately, some branches of government quickly began to push back, and within the decade the infamous phrase “can neither confirm nor deny” had been devised to avoid releasing information.

      This came to exemplify the adversarial relationship between the public and government. Yet public records requests (also known as FOIL, Right-to-Know, public information or open records requests, depending on where you are) remain a fundamental way in which the public is able to obtain information from government agencies under FOIA-like laws in all fifty states.

  • Licensing

  • Openness/Sharing

    • Hackerlands: the rural version of urban hackerspaces

      They open up areas struck by digital exclusion. They develop autonomous Internet networks in mountainous areas, install organic solar panels, and let local Internet radio emerge. They can even transform abandoned water troughs into eco-jacuzzis. “Hackerspaces,” user-friendly spaces where technological tools are crafted, are spreading throughout the rural environment.

    • Open Data

      • Exploring the legal issues around open data and open hardware

        Drafting and using open licenses for data and hardware presents both familiar old challenges (like license proliferation) and new challenges (like less developed legal frameworks and different production models). About thirty people working in these areas recently gathered (under the umbrella of the FSF-E’s “European Legal Network”) to discuss the latest work in these areas under the Chatham House Rules. This article will summarize what the group learned, and, I hope, stimulate discussion to improve the state of licensing in those areas.

    • Open Hardware

  • Programming

    • effects analysis in guile

      OK kids, so I had a bit of time recently. I’ve been hacking on Guile’s new CPS-based compiler, which should appear in a stable release in a few months. I have a few things to write about, but today’s article is on effects analysis.

Leftovers

  • What the heck is Fog Computing?

    While many are still trying to figure out Cloud Computing, here comes a rival concept – Fog Computing. It’s computing that takes place at the edge of the network, closer to home. That is, computing that takes place on the devices that are nearest to you – your smartphone and other connected devices that are around you. The so-called Internet of Things (IoT), or Internet of Everything (IoE).

    Fog Computing is not a new concept. Like Cloud Computing, it’s just a marketing buzzword for something that’s already taking place.

  • Health/Nutrition

    • Exposures by VA whistleblowers shake agency, reveal serious patient issues

      That’s one of the messages from a Senate hearing Thursday into a VA health-care system under fire on multiple fronts — from repeated complaints about long waits for service to unnecessary deaths.

      Yet even the American Legion, which has called for VA Secretary Eric K. Shinseki’s resignation, finds “veterans are extremely satisfied with their health-care team and medical providers,” according to the Legion’s national commander, Daniel M. Dellinger.

    • I Went to the Nutritionists’ Annual Confab. It Was Catered by McDonald’s.

      One recent Friday afternoon, in a Mariott Hotel ballroom in Pomona, California, I watched two women skeptically evaluate their McDonald’s lunches. One peered into a plastic bowl containing a salad of lettuce, bacon, chicken, cheese, and ranch dressing. The other arranged two chocolate chip cookies and a yogurt parfait on a napkin. “Eww,” she said, gingerly stirring the layers of yogurt and pink strawberry goop. The woman with the salad nodded in agreement, poking at a wan chicken strip with her plastic fork.

  • Finance

  • Censorship

  • Privacy

  • Civil Rights

    • Honest US Senator Wanted

      Looking for an honest US Senator my be a long shot, but we need one now to take forward the foiling of the British government’s attempts to block publication of the Senate report into torture and extraordinary rendition. Now we have got this into the mainstream media, it may have more traction. I am delighted that the Belhadj legal team have formally adopted the information that the UK is seeking to block release of key information in this report. Given that the Crown’s defence in the Belhadj case rests entirely on the argument that the USA does not want the facts revealed, that the Crown is then lobbying the USA to hide the same facts ought to be too much even for the most abject establishment lickspittle of a judge to stomach.

    • European day of action: Citizens call on MEPs to protect digital rights

      Today, a coalition of 36 civil rights organisations invites European citizens to take part in a day of action to make sure that the next European Parliament defends digital civil and human rights. Through WePromise.eu, people can pledge to vote for candidates who have signed up to protect digital rights.

  • Internet/Net Neutrality

    • Why the U.K. might kill the EU’s net neutrality law

      While the debate over net neutrality continues to rage in the United States, the British government is planning to block European Union legislation on the matter.

      It’s a surprising turn of events. Just last month, the European Parliament voted to place the principles of net neutrality into law. However, before it becomes law throughout Europe, each member country must also pass the legislation. On Thursday, the British government indicated it may veto it instead.

      At issue is a new provision that critics argue would restrict the British government’s “ability to block illegal material.” The amendment made it so that only a court order would allow for the banning of content, and not a legislative provision, as originally proposed, according to RT.

    • NY Times And Washington Post Describe Yesterday’s Net Neutrality Vote In Diametrically Opposite Ways

      As we noted, yesterday’s FCC vote concerning the NPRM on “open internet” rules was really just the start of the process. A lot of people seem confused by this — and part of the problem is really the FCC. Tom Wheeler keeps insisting that the rules are designed to protect net neutrality and the open internet, but as lots of people keep pointing out, the rulemaking he’s proposing would likely do the opposite. Because of that, you get a ton of confusion, perhaps best shown by a simple comparison, put together by Drew Oden on Twitter of the summary from both the NY Times and the Washington Post about what happened:

    • Hollywood Is Still On The Wrong Side Of Net Neutrality

      But, tragically, the powers that be among the legacy entertainment industry still seem to view net neutrality as a problem, not an important part of their future. It appears this is a combination of a few factors, led by their continued and irrational fear of “piracy.” Because of this, they seem to think that any sort of “open” internet is a problem. In fact, back in 2007, the MPAA specifically argued that net neutrality would harm its anti-piracy efforts. Similarly, both the RIAA and MPAA have lobbied strongly in the past for special loopholes and exceptions to any net neutrality rules that would allow ISPs to block content the legacy guys don’t like. In fact, one of the most famous net neutrality violations involved Comcast throttling BitTorrent connections. The Songwriters Guild of America once claimed that net neutrality would mean an end to songwriting.

    • Who’s against Net neutrality? Follow the money

      The cable industry has not been shy about handing out campaign donations to Congress. So guess who’s sending letters to the FCC arguing against Net neutrality?

  • Intellectual Monopolies

    • Copyrights

      • MPAA Urges Lawmakers to Protect Young Pirates From Cyber Threats

        The MPAA is urging lawmakers to protect young Americans from the “numerous hazards on pirate sites.” The movie industry group believes that young people may not be aware of the risks they face when visiting these sites and hopes that Senators will be able to address this cyber threat appropriately.

      • The Connection Between The Copyright Industry And The NSA

        There is a direct connection between copyright monopoly enforcement and mass surveillance, and between mass surveillance and lack of free speech. If you want to keep free speech, the copyright monopoly must be reduced sharply.

05.18.14

Links 18/5/2014: GNU/Linux on the Rise, Privacy in the News

Posted in News Roundup at 4:23 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • David Lowe: I thought, ‘The Sun Has Got His Hat On’. Now that’s a nice, safe choice

    ‘The BBC is fundamentally flawed. The system is fractured’: David Lowe at home in Torquay

  • Graphics pros left hanging as Adobe Creative Cloud outage nears 24 hours

    Adobe is struggling to correct a global outage that has already locked customers out of its Creative Cloud online services for nearly 24 hours.

  • Cloud-computing Has A Silver Lining For FLOSS

    While we potential users may argue the pros and cons of “Cloud Computing”, those who provide cloud-computing solutions are having to work hard for a living. That’s a pleasant change to having to pay the asking price to a monopolist, eh? I like that aspect of it. It’s also very efficient in that experts who should know how to run the service will fuss over it instead of the users or their randomly-hired staff. It is an ancient truth in the history of mankind that specialization is a good thing, all things being equal.

  • Cloud computing, or ‘The future is trying to KILL YOU’
  • Cloud computing is FAIL and here’s why

    Something for the Weekend, Sir? Adobe’s spectacular FAIL over the last 48 hours confirmed, rather than revealed, cloud computing to be so unreliable as to be positively dangerous. Cloud computing is shite. It takes over everything you’ve got, then farts in your face and runs away giggling.

  • Rackspace entertains possible takeover suitors

    At OpenStack Summit in Atlanta, GA, one of the topics of bar conversation was why Rackspace, one of OpenStack’s founding companies was keeping such a low profile at the show. Now we know it was probably because the company had been approached by companies looking for strategic partnerships or acquisitions.

  • Health/Nutrition

    • New Obamacare Loophole Shows Failure of For-Profit Health System: Critics

      The Obama administration earlier this month quietly handed the insurance industry another loophole in the Affordable Care Act—infuriating advocates for universal coverage who say this shows that an insurance-driven health system is doomed to fail.

      Announced on May 2, the provision opens the door to “reference pricing,” which allows insurance companies to set a price for medical procedures. If a patient receives a treatment that costs more, he/she will simply have to pay out of pocket. The measure is slated to apply to a majority of work-based health insurance plans and exchanges under the Affordable Care Act (also known as “Obamacare”), according to the Associated Press.

      Many worry that reference pricing will force patients to bear the burden of a costly and difficult-to-navigate medical system.

  • Security

  • Defence/Police/Secrecy/Aggression

    • East Ukraine Votes For Independence As Reports Claim 400 Blackwater Troops In Country
    • Is the West DIRECTLY Responsible for the Massacres In Ukraine?
    • Sen. Paul Says He’ll Filibuster Obama Judicial Nominee Over Drone Issue

      Bowling Green Republican Rand Paul says he wants to block the President’s nomination of David Barron for the First Circuit U.S. Court of Appeals because of Barron’s legal memos related to drones. During his time as a U.S. Justice Department lawyer, Barron reportedly authored at least two classified opinions giving the go-ahead to use drones to kill the U.S.-born extremist Anwar al-Awlaki in 2011 in Yemen.

    • Muslims Call Out Obama’s Hypocrisy With Twitter Campaign Attacking Civilian Drone Deaths
    • Drone opponents criticise US first lady’s support for Nigerian girls
    • ‘My husband kills kids with drones’: Michelle Obama’s viral pic fuels anti-drone campaign

      When US First Lady Michelle Obama appeared in a picture supporting the 276 schoolgirls kidnapped in Nigeria, she was praised for taking a stand against Boko Haram. But others quickly subverted her message and turned it into an anti-drone campaign.

    • Michelle’s Sign and the Imperatives of Empire

      But most Americans do not know why Iranians have excellent reason not to trust our word, nor why Africans remember us quite differently than Americans suppose.

    • US Terrorism from the Skies: The Truth Behind Drone Strikes as the President’s Personal Choice of Warfare

      Imagine attending your son or daughter’s or brother or sister’s wedding, a family member’s funeral, or just relaxing with friends at a local restaurant. While you may be busily living the most exciting high point of your life to the lowest grieving the loss of a family loved one, to just attending an everyday social gathering, all of a sudden your world is abruptly shattered never to be the same. Out of the blue from out of nowhere, a bomb hits and you are either dead, or barely alive suffering from life threatening injuries, or traumatized for life, forever changed for the worse. You will never enjoy another wedding, attend another funeral, or experience another emotional high or joy without sudden flashback memories of that fateful day flooding your consciousness and invading your world. Intrusive fear and panic rule your daily life where your sense of normalcy and homeostasis is forever knocked out of whack. Destroying lives is what US predator drones do every day of the week, year in and year out for more than a dozen years to thousands of innocent people in the Middle East, Central Asia and Africa and no doubt other hidden places we do not even know.

    • Does the Obama Administration Care About Innocents Killed by Drones?

      How many innocent people will the Obama administration kill before it comes clean on who these people are and why they were taken from their families, their friends and their communities? Despite President Obama’s repeated promises of more transparency, he had James Clapper, Director of National Intelligence, sent a letter to the heads of the Select Committee on Intelligence seeking the removal of a provision from the proposed Intelligence Authorization Act for Fiscal Year 2014 that would have modestly required President Obama to report the number of innocent people killed in drone strikes from only the previous year. Not surprisingly, this request was granted.

    • Kill a 16 Year-Old, Get a Promotion

      If you think that as a United States citizen you’re entitled to a trial by jury before the government can decide to kill you–– you’re wrong. During his stint as a lawyer at the Department of Justice, David Barron was able to manipulate constitutional law so as to legally justify killing American citizens with drone strikes. If you’re wondering what the justification for that is, that’s just too bad – the legal memos are classified. Sounds a little suspicious, doesn’t it? What’s even more suspicious is that now the Obama Administration wants to appoint the lawyer who wrote that legal memos to become a high-ranking judge for life.

    • US Cluster Bombs Keep Killing Civilians in Yemen

      When you’re a member of a club that includes Saudi Arabia, Iran, Zimbabwe, Pakistan, Russia, China, Equatorial Guinea, and Turkmenistan, you may very well be doing something you shouldn’t be doing. And that is the motley crew the United States finds itself alongside in refusing to sign the Convention on Cluster Munitions, an international treaty prohibiting the use, transfer, and stockpiling of cluster bombs.

    • Deadly U.S. Drone War Creating Problems for Yemen’s President

      After a brief respite, U.S. drones are buzzing above Yemen once again, reportedly killing six al-Qaeda “militants” on May 12.

      Hellfire missiles launched from the U.S.-piloted unmanned aircraft destroyed a car driving through the Marib province, according to a statement made by unnamed local officials. The identities of the dead were not readily available, however.

      Including strikes conducted early this year, the drone war in Yemen has resulted in the death of at least 12 suspected al-Qaeda operatives.

    • Do We Need Asimov’s Laws?

      As robots become ever more present in daily life, the question of how to control their behaviour naturally arises. Does Asimov have the answer?

    • The ultra-lethal drones of the future

      In 13 short years, killer drones have gone from being exotic military technology featured primarily in the pages of specialized aviation magazines to a phenomenon of popular culture, splashed across daily newspapers and fictionalized in film and television, including the new season of “24.”

      What has not changed all that much — at least superficially — is the basic aircraft that most people associate with drone warfare: the armed Predator.

    • Should robots kill without human supervision?
    • “The Stuff I Saw Really Began to Disturb Me”: How the U.S. Drone War Pushed Snowden to Leak NSA Docs

      In his new book, “No Place to Hide,” journalist Glenn Greenwald provides new details on Edward Snowden’s personal story and his motivation to expose the U.S. surveillance state. “The stuff I saw really began to disturb me. I could watch drones in real time as they surveilled the people they might kill,” Snowden told Greenwald about his time as a National Security Agency contractor. “You could watch entire villages and see what everyone was doing. I watched NSA tracking people’s Internet activities as they typed. I became aware of just how invasive U.S. surveillance capabilities had become. I realized the true breadth of this system. And almost nobody knew it was happening.”

    • RAW DATA: Kiwi killed in drone strike — Patrick Gower interviews Jeremy Scahill
    • NZ ‘aware’ of US drone attacks – journalist
    • Journalist: NZ spies aware of drone strikes
    • Gvt’s role in US drone attacks ‘pretty scandalous’
    • MH370: Ask Boeing and CIA, don’t blame MAS, says Dr Mahathir

      Former Prime Minister Tun Dr Mahathir Mohamad on Sunday suggested that Boeing and the Central Intelligence Agency should be questioned over the missing Flight MH370.

      “Someone is hiding something. It is not fair that Malaysian Airlines (MAS) and Malaysia should take the blame,” he said in his blog Chedet.cc.

      In his 11-paragraph long post, Mahathir expressed his viewpoints and theories on the situation and stressed that something was out of place and that the media would not post anything about Boeing or CIA.

      “They can land safely or they may crash, but airplanes do not just disappear. Certainly not these days with all the powerful communication systems which operate almost indefinitely and possess huge storage capacities,” Mahathir said.

      Stating that he believes the tracking system on the plane was intentionally disabled, Mahathir questioned on where was the data of the plane, which was supposed to have been recorded by the satellite.

      “MH370 is a Boeing 777 aircraft. It was built and equipped by Boeing, hence all the communications and GPS equipment must have been installed by Boeing.

    • Dr Mahathir adds CIA to list of suspects
    • The Excluded Cubans: Used by the CIA Unwanted by the USA

      The arrest of four infiltrated anti-Castro militants from Miami, sent to attack military units, highlights the situation of some 20 Cuban-Americans, who upon leaving prison in Cuba are considered unwelcome by Washington.

  • Environment/Energy/Wildlife

    • Tony Abbott’s budget emergency: what are the facts?
    • Murdoch-owned media hypes lone metereologist’s climate junk science

      This morning I, like any of you, was disappointed to see that the frontpage of The Times carried a story by the paper’s environment editor, Ben Webster, which read, ‘Scientists in cover-up of “damaging” climate view.’

      Variations of the story had been plastered everywhere, spearheaded by Murdoch-owned outlets, repeated uncritically by others.

      The Daily Mail, much loved for its objective reporting on climate change (and other stuff), declared: ‘Climate change scientist claims he has been forced from new job in “McCarthy”-style witch-hunt by academics across the world.’

      These stories were quoted approvingly by the Wall Street Journal’s James Taranto as “the latest reason to distrust the authority of ‘consensus’ climate scientists.”

  • Finance

    • Swiss consider world’s highest minimum wage

      Voters expected to say “no” to union-initiated referendum that would raise basic income to more than $4,000 a month.

    • Better than Redistributing Income

      Widening gaps between rich and poor, the top 1% and the rest, are heating up debates, struggles and recriminations over redistributing income. Should governments’ taxing, spending, and regulatory powers redistribute income from the wealthy to others, and if so, how exactly? As opinions and feelings polarize, political conflicts sharpen.

  • PR/AstroTurf/Lobbying

    • Lessig’s Anti-SuperPAC SuperPAC Raises First $1 Million In Just 12 Days

      We’re a little late on this (past few days have been quite busy…) but Larry Lessig’s SuperPAC to end all SuperPACs has hit its first target way early. As you hopefully remember, the goal was to reach $1 million in 30 days, which would then be matched by an (as yet) unknown donor, followed by a second campaign to raise $5 million in June — again matched by a donor. The plan then would be to use the $12 million to work on a few specific Congressional races to prove that it can have an impact, and then kick off in 2015 with a much bigger campaign to have an even larger impact.

  • Censorship

  • Privacy

    • Enigmail, and Not Signing by Default
    • Everyone should know just how much the government lied to defend the NSA

      A web of deception has finally been untangled: the Justice Department got the US supreme court to dismiss a case that could have curtailed the NSA’s dragnet. Why?

    • Glenn Greenwald on Hong Kong’s key role in Snowden’s NSA document leak
    • The official US position on the NSA is still unlimited eavesdropping power

      Modern American privacy law begins with Charles Katz, an accused gambler, making a call from a Los Angeles phone booth. In a now-famous opinion, Justice John Marshall Harlan concluded that the US Constitution protected Katz’s “expectation of privacy” in his call. American phone booths are now a thing of the past, of course, and Americans’ expectations of privacy seem to be fast disappearing, too.

      In two significant but almost-completely overlooked legal briefs filed last week, the US government defended the constitutionality of the Fisa Amendments Act, the controversial 2008 law that codified the Bush administration’s warrantless-wiretapping program. That law permits the government to monitor Americans’ international communications without first obtaining individualized court orders or establishing any suspicion of wrongdoing.

    • Crypto-guru slams ‘NSA-proof’ tech, says today’s crypto is strong enough

      History is filled with companies shamed by their shoddy cryptography implementations – even though the underlying maths is bang on.

      In a presentation titled “Crypto Won’t Save You” at the AusCERT conference on Australia’s Gold Coast, respected cryptographer Peter Gutmann of the University of Auckland took security bods through a decade of breaches featuring a laundry list of the world’s biggest brands.

    • Photos reveal NSA tampered with Cisco router prior to export

      For years, the US government has accused Chinese companies of placing surveillance equipment inside routers being exported to America, but this week evidence suggests the exact opposite may be happening.

      New photos implicate the US National Security Agency (NSA) in planting “beacons” into servers, routers and other network gear prior to being exported worldwide.

      The Guardian originally published details May 12 of how the covert operation works, part of bombshell allegations from the new book “No Place to Hide” by Glenn Greenwald, who claims the US is doing exactly what it’s accused Chinese telecommunications manufacturers of in the past.

    • Sprint Only Carrier to (Briefly) Question NSA Data Collection

      According to the Washington Post, Sprint was the only telecom carrier to ask the government for their legal rationale to justify the NSA’s ever-expanding warrantless wiretapping operations back in 2010, before much of it was revealed by Edward Snowden. While Sprint was different from their fellow carriers in that they at least asked the government for justification (as opposed to saying “how high”?) Sprint’s questions didn’t last long.

    • Sprint was the only telco to stand up to the NSA

      Newly declassified documents show the dilemma faced by telecommunications companies when the U.S. National Security Agency (NSA) came calling.

      According to a story this week in the Washington Post, Sprint asked the NSA for legal justification when it received requests for phone metadata in 2009. Reportedly, it was the only telco to require a legal rationale. The documents related to previous occasions for which the secret Foreign Intelligence Surveillance Court, or FISA, had issued orders.

    • NSA row sparks rush for encrypted email

      One new email service promising “end-to-end” encryption launched on Friday, and others are being developed while major services such as Google Gmail and Yahoo Mail have stepped up security measures.

    • Many more NSA revelations to come, Glenn Greenwald tells Al Jazeera; Snowden ‘very happy’

      Journalist Glenn Greenwald, at the centre of controversy since breaking the story about the existence of the National Security Agency (NSA) surveillance programme, has told Al Jazeera that there are “many more stories to go” based on the top secret documents taken by former NSA contractor Edward Snowden.

      Greenwald also told Al Jazeera interviewer John Seigenthaler that despite accusations to the contrary — the Obama administration has repeatedly said that the leaks hurt U.S national security — “nobody has been injured or in any way harmed as a result of our reporting.”

    • ‘New NSA document highlights Israeli espionage in US’

      The document, among those unleashed by former NSA contractor Edward Snowden and revealed by journalist Glenn Greenwald in his new memoir, carries the assessment that Israel is a good partner to the US for joint electronic spying programs against foreign agents but practices problematic operations.

    • NSA Is Recording the Voices of U.S. Telephone Calls
    • NSA Spying Has a Disproportionate Effect on Immigrants

      The consequences of eliminating Fourth Amendment protections for all international communication with foreigners

    • Advocates fear NSA bill is being gutted

      Privacy advocates are worried that a bill intended to reform the surveillance activities of the National Security Agency (NSA) is being watered down before it heads to the House floor.

      “Last stage negotiations” between members of the House and the Obama administration could significantly weaken provisions in the NSA bill, people familiar with the discussions say.

      “Behind the scenes, there’s some nervousness,” one House aide said.

    • NSA documents show Microsoft’s Prism cooperation
    • Microsoft openly offered cloud data to support NSA PRISM programme
    • Encrypted or not, Skype communications prove “vital” to NSA surveillance

      Last year, Ars documented how Skype encryption posed little challenge to Microsoft abuse filters that scanned instant messages for potentially abusive Web links. Within hours of newly created, never-before-visited URLs being transmitted over the service, the scanners were able to pluck them out of a cryptographically protected stream and test if they were malicious. Now comes word that the National Security Agency is also able to work around Skype crypto—so much so that analysts have deemed the Microsoft-owned service “vital” to a key surveillance regimen known as PRISM.

    • Former NSA Official Thinks A Blog Containing Nothing But His Own Tweets Is ‘Defamatory’

      All the PhDs in the world aren’t going to save you from having your own direct quotes turned against you. If anything, it only confirms what Schindler’s critics believe: that he’s pompous, arrogant and unwilling to actually engage in a debate. Instead, he prefers to belittle anyone who doesn’t hold a precious PhD in history, using his doctorate to paper over any flaws in arguments.

      I can’t imagine it’s much fun to see your Twitter feed boiled down to little more than shouts of “stupid!” and continuous pointing to a framed piece of paper, but whether Schindler likes it or not, those are his words and those are his go-to rhetorical devices. For someone who frequently uses the hashtag #caring to show his contempt for the ire he provokes, he certainly can’t seem to take having his own abuse heaped on his Carebear-surrounded head.z

    • Microsoft MVP Says NSA Can Monitor Secure Tor Browsing
    • Microsoft expert: Tor security compromised by NSA

      Speaking at Microsoft’s TechEd North America event earlier this week, the founder of the Cyber Crime Security Forum said that hackers and government agencies can now compromise the security of the TOR network.

      First set up in September 2002, TOR was originally conceived as means for Internet users from those countries with oppressive regimes to side step any state monitoring and similar controls on the web.

    • The NYT and the NSA: Abramson and Baquet have different journalistic values

      Lots of folks have sent along links to the New York Times’s new executive editor Dean Baquet’s backstory, spiking an important revelation about national surveillance when he was editor of the LA Times. At Huffington Post, David Bromwich, author of a new book about the political imagination, offers his own deep analysis of the abrupt change in command at the Times in the context of coverage of the national security state.

    • Cisco’s NSA problem is going to whack all of US tech’s growth plans

      Cisco’s emerging markets business—the engine for the networking giant’s future growth—continues to take a hit and that situation isn’t likely to change now that it’s common knowledge that the NSA has been intercepting routers—and other IT gear—in the supply chain so it can install call-home beacons.

    • The FBI, the NSA, and the Daunting Task of True Reform

      Last summer, after the in-FBI-custody shooting of Ibragim Todashev, a friend of the elder Boston bomber, the Bureau told the same story they have been telling since 1993 – this was justified. Furthermore, documents acquired by The New York Times last June showed that there were more than 150 FBI shootings by agents in the last 20 years – almost half fatal – and every single one was ruled justified after internal investigations.

    • bEncrypted Web Traffic More Than Doubles After NSA Revelations

      Google search guru Matt Cutts says we should encrypt the entire internet. And he’s not alone. In the wake of Edward Snowden’s revelations of widespread internet eavesdropping by the NSA, the human rights organization Access is also campaigning for all websites to encrypt their connections to internet users, a pretty good way of thwarting interlopers.

    • More People Are Encrypting Their Web Traffic In The Wake Of NSA Spying Revelations

      People have started taking Edward Snowden’s advice on using Web encryption to shield their movements online, according to a new study. After the former U.S. National Security Agency contractor leaked documents on the government’s surveillance programs, encrypted web traffic has more than doubled worldwide.

      In March, Snowden told a room full of tech industry workers at the SXSW Interactive conference that the only way people can protect themselves from government surveillance was to use Web encryption. He said that the United States didn’t even know all the documents he had because “encryption works.” And it looks like people worldwide are heeding that advice.

    • Sony Pictures buys film rights to Greenwald’s book on Snowden, NSA

      “Zero Dark Thirty” maker nabs rights to Glenn Greenwald’s look at working with Edward Snowden to reveal reach of NSA.

    • Germany Will Ban Tech Companies That Play Ball With NSA

      No German federal contracts will go to companies that turn over data to the NSA and other spy agencies in the U.S., and elsewhere. There may, however, be one crucial exemption.

    • Biggest NSA leaks are yet to come, Glenn Greenwald says in interview

      Journalist Glenn Greenwald, who has been at the center of controversy ever since breaking the story about the existence of the expansive National Security Agency (NSA) surveillance program, told Al Jazeera’s John Seigenthaler on Wednesday that there were “many more stories to go” based on the top secret documents taken by former NSA contractor Edward Snowden.

    • Did the NSA help kill UWB?

      Revisionist history is looking back at past events in light of more recent information. What really happened? And no recent source of information has been more important when it comes to revising the history of digital communications than former National Security Agency (NSA) contractor Edward Snowden. Today I’m really curious about the impact of the NSA on the troubled history of Ultra Wide Band (UWB) communication.

    • Harvard & MIT Students Have Created an Email So Secure Even the NSA Can’t Crack It
    • Startup pitches snoop-proof (even NSA-proof) email
    • How the NSA & FBI made Facebook the perfect mass surveillance tool

      The National Security Agency and the FBI teamed up in October 2010 to develop techniques for turning Facebook into a surveillance tool.

      Documents released alongside security journalist Glenn Greenwald’s new book, “No Place To Hide,” reveal the NSA and FBI partnership, in which the two agencies developed techniques for exploiting Facebook chats, capturing private photos, collecting IP addresses, and gathering private profile data.

    • Quoted: on Chinese routers as competition for NSA spying
    • Can We Stop America’s Surveillance State?

      Purloined formerly top-secret NSA documents are now there for the downloading, even as the calls for truth and privacy buttressed by irrefutable information, has run up against the institutional armor of the surveillance state that has little respect for public opinion or calls for “reform.”

    • Arlington: The Birthplace of NSA Surveillance

      Today’s National Security Agency is housed in a sprawling complex in Fort Meade, Md., but, according to a recent lecturer at Arlington Public Library, domestic surveillance by the NSA was perhaps born in Arlington.

      David Robarge, the CIA’s Chief Historian, told a standing-room only crowd last week about the history of espionage in Arlington, which started at Arlington Hall during World War II.

    • Tech groups dissatisfied with NSA reform bill
    • Microsoft, NSA and FBI reveal secret 3-way romance

      Would you like to listen to Gweek podcasts live, as they are being recorded? Get a job at the FBI and plug into Skype, which Microsoft has handed over to US spy agencies as a kind of lovers’ gift, and you can hear Dean and me chatting away!

    • Mass surveillance: the Dutch state of denial

      As in many countries, the Snowden revelations were front page news in the Netherlands. The PowerPoint slides showing the intensity of (inter)national surveillance received considerable attention in the political arena. Special debates were scheduled, and dozens of questions were asked by members of parliament. What made things special in the Netherlands was the fact that the revelations coincided with a review of the Dutch Intelligence and Security Act (WiV, Wet op de inlichtingen en veiligheidsdiensten), a process that was then already underway.

      The review committee delivered its report in early December 2013. In the meantime, the newspaper NRC reported on Dutch Snowden revelations. The documents given by ‘intermediary’ Greenwald to the NRC revealed that the Netherlands had been an NSA target between 1946 and 1968. The information that the Dutch counterpart of the NSA, the AIVD, was hacking into websites added to the impact. A third ‘Snowden’ issue was the stats showing that the NSA had access to 1.8 million telecommunications metadata. This chart had already been published some time ago but had escaped attention.

    • GOOGLE HAS MOST OF MY EMAIL BECAUSE IT HAS ALL OF YOURS

      For almost 15 years, I have run my own email server which I use for all of my non-work correspondence. I do so to keep autonomy, control, and privacy over my email and so that no big company has copies of all of my personal email.

      A few years ago, I was surprised to find out that my friend Peter Eckersley — a very privacy conscious person who is Technology Projects Director at the EFF — used Gmail. I asked him why he would willingly give Google copies of all his email. Peter pointed out that if all of your friends use Gmail, Google has your email anyway. Any time I email somebody who uses Gmail — and anytime they email me — Google has that email.

    • Whistleblowers Beware: Apps Like Whisper and Secret Will Rat You Out

      Startups like Secret and Whisper have defined a buzzy new category of social media, attracting millions of users and tens of millions of dollars in venture capital investments with the promise of allowing anyone to communicate with anonymity. But when it comes to actually revealing corporate and government secrets–a “whistleblowing” function that the two services either implicitly or explicitly condone–users should read the fine print.

    • DOJ Says Americans Have No 4th Amendment Protections At All When They Communicate With Foreigners

      We’ve already questioned if it’s really true that the 4th Amendment doesn’t apply to foreigners (the Amendment refers to “people” not “citizens”). But in some new filings by the DOJ, the US government appears to take its “no 4th Amendment protections for foreigners” to absurd new levels. It says, quite clearly, that because foreigners have no 4th Amendment protections it means that any Americans lose their 4th Amendment protections when communicating with foreigners. They’re using a very twisted understanding of the (already troubling) third party doctrine to do this. As you may recall, after lying to the Supreme Court, the Justice Department said that it would start informing defendants if warrantless collection of information under Section 702 of the FISA Amendments Act (FAA) was used in the investigation against them.

    • Snowden: The NSA planted backdoors in Cisco products
    • Charity makes legal bid against GCHQ over malware infections
    • Web round up – Microsoft, Google and phones!

      Whatsapp has been removed from its Windows Phone Store….bad news for all 4 Windows Phone users

    • The problem with LinkedIn

      If you’re looking for an online service that has a habit of incorporating lots of the problems inherent in the approach to modern day technology, then pull yourself up a seat, help yourself to the coffee, and perhaps nab a biscuit from the jar. Because I want to talk about LinkedIn.

  • Civil Rights

  • Internet/Net Neutrality

  • DRM

    • Open Letter to European Commission about DRM in HTML5

      Dear Commissioner Malmstroem,

      we are writing to you on the occasion of the international Day Against Digital Restrictions Management, which today is being celebrated around the world. We are very concerned about the security of European citizens, and we ask you to take action to protect them.

      The Free Software Foundation Europe (FSFE) is an independent charitable non-profit dedicated to promoting Free Software and freedom in the information society. Today we would like to direct your attention to a very specific threat to the freedom and security of computer users everywhere.

  • Intellectual Monopolies

    • Latest Trade Agreements Are Re-defining Cultural Choices As ‘Non-Tariff Barriers’ That Need To Be Eliminated

      It’s something of a misnomer to call TPP, TTIP and TISA trade agreements: they go far beyond traditional discussions about things like tariff removal, and are encroaching on domains that are as much cultural as economic. That is, many of things that the US dubs “trade barriers” are in fact long-standing expressions of national priorities, preferences and beliefs. That’s evident in an interesting post from Public Citizen’s Eyes on Trade blog, which explores the 2014 National Trade Estimate Report on Foreign Trade Barriers (pdf).

    • Trademarks

    • Copyrights

      • Piracy ‘Whistleblower’ to Remain Anonymous, Court Rules

        A person who claimed that the operators of Grooveshark were engaged in systematic copyright infringement will keep his anonymity, a court has ruled. The allegations, which were made in the comments section of an online news article, prompted Grooveshark’s parent company to unmask their author. They have now failed in that mission.

      • How Sweden Gained Access to a Canada-Hosted Torrent Site

        This week it was revealed that following a request from a Swedish anti-piracy group, police action was taken against a torrent site hosted on Canadian soil. The general understanding is that torrent sites are currently legal in Canada, so how does a situation like this come to pass?

      • This Is How The UK Piracy Warnings Will Work

        Last week news broke that UK ISPs are teaming up with copyright holders to notify Internet subscribers caught sharing pirated material. The plan has been widely covered in the media, but unfortunately fact and fiction are often intertwined. So how scary are these piracy warnings really? Let’s find out.

      • Updated: Canadian Police Raid BitTorrent Tracker, Confiscate Server

        In somewhat of a surprise move, Canadian police have raided a local torrent site and confiscated its server. With around 10,000 members, Spavar.org was a relatively small site. However, any police action against a Canada-based site is likely to cause wider concern since the country is home to countless torrent sites, from the very small to the very large.

      • Publisher Targets University Researchers for “Pirating” Their Own Articles

        The American Society of Civil Engineers is cracking down on researchers who post their own articles on their personal websites. The publisher, which owns dozens of highly cited journals, claims that the authors commit copyright infringement by sharing their work in public.

05.17.14

Linux Flaw is Not a Back Door, Unlike Many Microsoft Flaws

Posted in GNU/Linux, Microsoft, Security at 11:51 am by Dr. Roy Schestowitz

Selective reporting to breed bias against the lesser issues

3-D text

Summary: New elements of FUD against GNU/Linux, ignoring much bigger issues that barely get covered at all

Since Microsoft is in bed with the NSA, many Microsoft flaws (with new ones added almost every month) are remotely exploitable and Microsoft does not even tell us about them all. It’s like a perpetual back door with the occasional change of keys.

Recently, a flaw that mostly affects shared GNU/Linux hosting was hyped up in Microsoft-connected sites by old FUD 'friends' who habitually do this. This was followed by some other coverage elsewhere, neglecting to say that the flaw is already widely patched. It was not even so severe. This was accompanied by a couple more FOSS-hostile articles in the British press, including one from a Microsoft propaganda site
citing, as usual, talking points from friends of Microsoft. There is a lot of FOSS-hostile propaganda these days, including this piece from InformationWeek that gets it wrong on many levels. This one example is a very crappy article framing it as a “religious” battle between “open source” and “commercial” as though these are opposites. Even Linux proponents like Susan Linton amplify these distracting reports, ignoring the elephant in the room, notably Microsoft. That’s where monstrous holes reside and prosper. Reporters should be pressured to investigate the real threats.

As many OEMs have found out (Sony being one of the latest), selling computers with back doors preinstalled is not a good business model [1, 2, 3]. It turns out that Microsoft not only gives a back door to the NSA but also the FBI (domestic), based on new leaks. To quote one report: “Microsoft worked to provide the FBI with court-ordered user data after the company began using encryption for customers who used Outlook, according to newly-released documents first leaked by Edward Snowden.

Here is more, which shows that not only Skype is affected. To quote: “Last July, Glenn Greenwald published a set of claims regarding a number of Microsoft services that were, especially at the time, unsettling: That Microsoft had helped the NSA “circumvent its encryption” relating to web chat on Outlook.com, that it had worked with the FBI to bring OneDrive (then called SkyDrive) into better fit with PRISM, and that government data collection from Skype had…”

It goes deeper than this, proving that people should wipe and freshly install operating systems they can trust on devices. Maybe the press focus on the elephant in this room. One site says “[s]oftware giant Microsoft has been left with questions to answer over its approach to the US National Security Agency’s (NSA) global internet surveillance programme after a new document was released implying that the NSA routinely collected data from the Microsoft cloud.” Microsoft facilitated this. It’s not an accident. But that’s not even the the bad part; it’s just the tip of the iceberg. The real problem is worse because Windows itself contains back doors and new ones are routinely added. It is not just about the so-called ‘cloud’.

Copyrights and Not Just Patents Become a Threat to Free Software, Making Mono More Urgent to Avoid

Posted in Mono, Oracle, Patents at 6:24 am by Dr. Roy Schestowitz

Summary: Now that a relatively high court in the US views APIs as a recognised monopoly we face new risks and Mono is on very shaky ground

The other day when we wrote about patents as an issue with huge implications to FOSS we took note of Microsoft- and Oracle-backed tools such as CPTN (Novell’s patents), which OIN is quite pointless against. OIN is wrongly assuming a particular strategy of patent litigation will develop, even though companies like In Microsoft and Nokia dodge to proxies like MOSAID. Here is a new piece about OIN which focuses on hardware:

The next big intellectual property battle has been forming over hardwired and programmable chips made for mobile devices that leverage Linux code. However, the Open Invention Network has strategically deployed forces to keep Linux-powered smartphones, tablets and other computer technologies out of harm’s way. Its goal is to create a patent litigation no-fly zone around embedded Linux.

OIN does not appear too have done much — if anything at all — to stop litigation of this kind. To make matters worse, look what members like Oracle have been doing, leveraging copyright to attack other OIN members.

Here is Glyn Moody’s new take on this matter. He writes:

Last week, that “idea/expression dichotomy” was dealt a serious blow by a US court. Significantly, it is the same court – the Court of Appeals for the Federal Circuit (CAFC) – that is largely responsible for the software patent mess in the US.

Indeed, CAFC has been quite notorious for this. It is worse than even SCOTUS. Well, citing this older article, Mike Masnick explains that we should all be “recognizing that APIs shouldn’t be covered by copyright…as it makes people programming on your platform more valuable since they have more options and more flexibility. The big companies who don’t like this are being short-sighted. They’re trying to lock in developers, by forcing them to only develop for their platform, but in doing so, are inherently making their own platform less valuable.”

Now we are stuck in a mess of copyrights APIs, Jose warned us about such stuff years ago, in relation to Mono. Whatever Dalvik means to Java (Oracle) Mono may mean to .NET (Microsoft). We will revisit and expand on this another day.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

Further Recent Posts

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts