EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

06.01.14

Links 1/6/2014: Two Linux Mint Releases, New NSA Leaks From Risen

Posted in News Roundup, Site News at 5:13 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Kano review – doing it for the kids

    The Kano computer system revolves around two core things: a Raspberry Pi and the Kano OS designed for it. More than just another Raspberry Pi kit, it proved itself with a successful Kickstarter, promising a system that would help get kids into real computing and allow them to start down a path of programming and coding.

  • Sphere 1.4 Is an Icon Pack for People Who Don’t Like Flat Operating Systems

    The Sphere icon pack is made by Achim Karsch and features over 24.000 icons for the operating system, covering pretty much all the known applications out there.

  • Australian Linux conference 2014 records big loss

    The Australian national Linux conference of 2014, held in Perth in January, looks set to make a loss of nearly $40,000, according to the president of Linux Australia, Joshua Hesketh.

  • Linux.conf.au $40,000 Budget Shortfall: A Lesson In The Importance Of Planning
  • Server

    • Linux Video of the Week: 40-Node Raspberry Pi Supercomputer

      Guill, a recent graduate of the masters in computer science and electrical engineering program at the University of Texas in Dallas, built the 40-node Raspberry Pi cluster for distributed software testing. In addition to a list of technical requirements, Guill wrote that he also wanted it to be “visually pleasing.”

    • 32-bit Enterprise Linux Still Matters

      I’ve done a lot of support of government servers and they run for about forever, as in until they serve no further use. Even retired, old servers are often repurposed and put back into service due to budget restrictions and/or long lead times to order new equipment under the required procedures for government procurement. In the United States this is especially true at the state level. When a server is repurposed it is usually reloaded with the current enterprise standard Linux distrubution release and applications, not legacy releases. That’s one common use case.

  • Kernel Space

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

    • GNOME Desktop/GTK

      • GNOME Foundation webpage design
      • First ideas for a better GNOME browser

        I have tried to describe a situation where Web browsing is more tightly integrated with the desktop. There is still a lot of work to do: detailed functionality needs to be refined, assumptions need to be verified, mockups and prototypes need to be created and evaluated…

        A browser is a very complex application to design, but luckily there is a lot of knowledge already available that should help us generate ideas and make informed decisions.

      • AppData progress and the email deluge

        I’ve deliberately not included GNOME in this sweep, as a lot of the core GNOME applications already have AppData and most of the gnomies already know what to do. I also didn’t include XFCE appications, as XFCE has agreed to adopt AppData on the mailing list and are in the process of doing this already. KDE is just working out how to merge the various files created by Matthias, and I’ve not heard anything from LXDE or MATE. So, I only looked at projects not affiliated with any particular desktop.

      • GNOME Shell 3.13.2 Brings Improvements for Airplane Mode

        This is the first update for GNOME Shell in the current 3.13.x development cycle, and its makers have made quite a few modifications to it.

        According to the changelog, the airplane mode menu is now insensitive in the lock screen, the struts are no longer extended to the screen edge, keynav has been fixed for alternatives in AltSwitcher, and the window menus have been implemented in the shell.

      • Tartan: Plugging Clang Into The GNOME Stack

        Tartan is a new research and development project by Collabora to yield a Clang analysis plug-in for GLib and GNOME.

        The Tartan plug-in loads GObject-Introspection meta-data for all encountered functions to better inform LLVM’s Clang and the plug-in also takes care of detecting common coding practices for GLib. Tartan is licensed under the GPLv3+ by Collabora.

      • GTK+ 3.13.2 Arrives with Interactive Debugging and Gestures Suppor

        This latest update for GTK arrives with a multitude of changes and new features, but this is understandable because this is a development release.

        According to the changelog, interactive debugging support has been implemented, gesture support has finally landed, the GTK+ widgets can now draw outside their allocation zone, by setting a clip with gtk_widget_set_clip(), GtkStack has added a few more transition types, and the GtkProgressBar is now narrower.

  • Distributions

    • Kali Linux 1.0.7 review

      The latest update to Kali Linux was released a few days ago. Kali Linux 1.0.7 review is a summary review of the main features of this latest upgrade to the security distribution from Offensive Security, a security and penetration training outfit based somewhere on this third rock from the Sun.

      The main feature introduced in Kali Linux 1.0.7 is the ability to transfer the system to a USB stick with encrypted persistence.

    • The five most popular end-user Linux distributions

      Sure, on the desktop, Windows still rules. According to Stat Counter’s’ April 2014 data, Windows has about a 90 percent market share. Out of an approximate base of 1.5 billion PCs, that’s about 1.36 billion Windows PCs. So, guess what’s the number two end-user operating system in the world?

    • Netbook, Desktop and X Editions of Simplicity Linux 14.7 Alpha 1 Now Available

      “Simplicity Linux 14.7 Alpha is now available for download in Netbook, Desktop and X Editions. It is based on Precise Puppy and uses the excellent LXPup by SFS to provide LXDE as a desktop environment for Netbook and Desktop Editions. As usual, Netbook is our cut down version which focuses on web based applications rather than locally installed applications,” said the developer in the official announcement.

    • Screenshots

    • PCLinuxOS/Mageia/Mandrake/Mandriva Family

      • June 2014 issue of The PCLinuxOS Magazine released

        The PCLinuxOS Magazine staff is pleased to announce the release of the June 2014 issue of the PCLinuxOS Magazine. The PCLinuxOS Magazine is a product of the PCLinuxOS community, published by volunteers from the community. The magazine is lead by Paul Arnote, Chief Editor, and Assistant Editor Meemaw. The PCLinuxOS Magazine is released under the Creative Commons Attribution-NonCommercial-Share-Alike 3.0 Unported license, and some rights are reserved.

    • Red Hat Family

    • Debian Family

      • Tails 1.1 Beta 1 Secure Distro Now Has Windows 8 Comouflage Mode

        Tails is a distribution based on Debian and Tor technologies that aims to keep its users as anonymous as possible. It gained a lot more visibility after Edward Snowden said that he used exactly this Linux distribution to hide his tracks. The developers are now implementing more changes and fixes that should ensure it becomes even more secure.

      • Siduction ‘Paintitblack’ LXQt Dev Release: Screenshots

        Earlier this month the Siduction team, which regularly updates snapshots based on Debian Unstable/Sid, released a development build showcasing the new LXQt desktop, the future of both the LXDE and the Razor-qt environments. Siduction have a bit of history here as they featured Razor-qt as a desktop early on and were probably the only distribution to ship a dedicated iso as part of their line-up throughout 2012 and 2013. Besides using KDE 4 for the main image Siduction have shown a great commitment to medium light and lower resource desktops.

      • Derivatives

        • Canonical/Ubuntu

          • First Look Unreal Tournament, Tangiers Trailer, and Ubuntu Surface
          • Is Cinnamon a worthy replacement for Ubuntu Unity?

            If there’s one area of Linux that gets more scrutiny than any other, it’s the desktop. From every corner, the haters and detractors abound. Nearly every publication that offers any focus on the Linux desktop at some point posts a piece about getting rid of the default Ubuntu desktop. Cinnamon is one of the primary replacement contenders.

          • Unity Control Center for Ubuntu 14.04 LTS Review

            Ubuntu developers are trying to shake some of its GNOME dependencies and they have been working towards this goal for quite some time. Ubuntu distributions have been using GNOME packages since the beginning, even before the adoption of Unity as the default desktop environment.

            Back when Ubuntu was still using GNOME 2.x to power its desktop, people were complaining about various problems, which in fact were not the fault of the Ubuntu developers. Some of the patches submitted by Ubuntu upstream, to the GNOME project were accepted either with delay or not at all. So, Canonical has decided to make Unity, a project it can control from one end to another.

          • Flavours and Variants

            • Deepin’s Functionality Is a Bit Too Shallow

              The Deepin desktop design is snazzy yet simple to use. It is one of the first Linux distros to take advantage of HTML 5 technology.

              Add its home-grown applications such as the Deepin Software Center, Deepin Music Player and Deepin Media Player, and you get an operating system that is tailored to the average user.

              The Deepin Linux development team is based in China. The distro so far is available only in English and traditional or simplified Chinese. It is a very young distro that debuted a few years ago and cycled through just one or two full releases per year as it crawled through its alpha and beta stages.

              Deepin 2014 Beta is the latest version, released earlier this month to replace a version released last fall. This current release, based on screen shots displayed on the website for the previous version, substitutes the more traditional bottom panel bar with a docking bar that resembles the Mac OS X look.

              Read more

            • Linux Mint 17 “Qiana” Is Now Available for Download

              The new Linux Mint 17 “Qiana” is based on Ubuntu 14.04 LTS and the first flavors released are Cinnamon and MATE, which is the norm for this kind of launches.

              It’s important to note right from the start that the ISOs for the two versions of Linux Mint 17 usually arrive before the official announcement, which is not too far off. Rest assured, these are the official images from the Linux Mint Team.

            • Download Linux Mint 17 final release ISO images
            • Linux Mint 17 Qiana release ISOs available for download

              The ISOs approved for Linux Mint 17 aka Qiana stable release are already uploaded and available for download. The release hasn’t been announced yet but here’s your chance to install and enjoy the latest version of the popular Ubuntu derivative! 32 and 64-bit versions of both the Cinnamon and MATE variants are available.

            • Linux Mint 17 “Qiana” Is Now Available
            • Linux Mint 17 “Qiana” Cinnamon Officially Released
            • Linux Mint 17 MATE & Cinnamon Versions Officially Out
  • Devices/Embedded

    • Synology DS414j review – the future of NAS?

      When you buy a Synology product, you know what you’re getting yourself in to. The company’s designs rarely change between generations, beyond a few small tweaks and improvements to the internals, and its Linux-based DiskStation Manager operating system only ever improves with time. Its pricing, however, can leave it out of the reach of the budget-conscious buyer, especially when more than two drive bays are required.

    • Why Cisco joined the Linaro Digital Home Group
    • Linaro forms digital media group

      The Linaro Digital Home Group, or LHG, follows other working groups from Linaro, a not-for-profit company owned by ARM and many of its top licensees. Linaro develops standardized open source Linux and Android toolchain software for ARM-based devices. Previous groups have included the Linaro Enterprise Group (LEG), the Linaro Networking Group (LNG), and most recently, the Security Working Group (SWG).

      As usual, the goal is provide standardized software and requirements for relevant upstream open source projects. In this case, Linaro defines digital home applications as media-centric devices including set-top boxes, televisions, media players, gaming, and home gateway devices. Home automation does not appear to be a central focus.

    • Phones

      • Ubuntu Phone OS vs. Mozilla Firefox OS

        Though it’s difficult to compare two operating systems that are targeted at different users, Mozilla’s Firefox OS still feels half-baked compared to what Ubuntu offers. While Canonical is focused on making a full-fledged mobile OS that goes head-to-head against Android and iOS, Firefox’s approach is towards making smartphones more affordable. Initial reviews of Firefox OS have been really underwhelming so it will take about a year for us to see both operating systems in the hands of its end users. Finally, it would be a great idea to wait till both operating systems get enough exposure and that would be somewhere around April 2015 where both Ubuntu and Firefox would have (hopefully) reached enough stability to be used on a broader scale.

      • Tizen Dev Conf 2014 open to student developers for free

        Good news for budding developers interested in mobile platforms and devices. The Tizen Developer Conference 2014 (hashtag #TDCSF14) due next week is offering free registration to student developers.

      • Pride and Prejudice: Smartphones

        Android/Linux smartphones are taking 80% of the market shipments while having an average selling price ~$70 less than those other operating systems, you know, on Blackberries and iPhones.

      • WebRTC voice and video now available on Firefox Nightly, but…

        WebRTC voice and video is now available on Firefox Nightly. That’s the latest news from the Mozilla Foundation and TokBox, the Web communications company that Mozilla Foundation is working with to bring us WebRTC voice and video in my favorite Web browser. To see how this actually works, I decided to download Firefox Nightly and install or run it on my systems.

      • Ballnux

        • Samsung’s original Galaxy Gear smartwatch drops Android for Tizen

          Samsung’s first generation of smartwatches is officially ditching Android. SamMobile reports that the original Galaxy Gear is being upgraded to Tizen, the operating system used on the newer Gear 2 and Gear 2 Neo (but not the Gear Fit, yet another model released this spring.) Samsung has made a point of differentiating its software from stock Android — its various Android smartphones are loaded with design tweaks — but in this case, the main difference will be in added features; we and other reviewers found that the Tizen interface looked and operated very much like the Android one.

        • Samsung Continues to Convert Mobile Players to Tizen

          Samsung continues to welcome new players into the Tizen family. Its June 2 dev conference may coincide with Tizen smartphone news.

Free Software/Open Source

Leftovers

  • Teenager Killed His Parents Because They Took His iPod Away

    A Virginia tenth grader says he attacked and killed his parents because they were acting too parental, “taking away [his] iPod and stuff.”

    Vincent Parker, a 16-year-old honor roll student, was arrested after he randomly attacked and killed his parents last December.

  • Brother and sister kill their Alzheimer’s-afflicted mother during an EXORCISM by beating her to ‘force out demons’
  • Everyone Agrees They Don’t Know Why Teenager Committed Suicide, So Helpful Coroner Shouts Video Games

    They say that the more things change, the more they stay the same. When it comes to adults attempting to explain away inexplicable tragedy by scapegoating the younger generation’s entertainment du jour, that certainly seems to be the case. For our generation, of course, that means video games. We’ve seen it over and over again, from journalists jumping to blame violent games before they have any facts to back it up, to television personalities pretending there’s a proven link when there isn’t, to grandstanding politicians proposing constitution-violating sin-taxes on games just because.

  • Science

    • New Video: Neil deGrasse Tyson Destroys Climate Deniers

      For 11 episodes now, the groundbreaking Fox and National Geographic Channel series Cosmos has been exploring the universe, outraging creationists, and giving science teachers across the nation something to show in class every Monday. In the process, the show has been drawing more than 3 million viewers every Sunday night, a respectable number for a science-focused show that is, after all, a major departure from what prime-time audiences are used to.

      Cosmos certainly hasn’t shied from controversy; it has taken on evolution and industry-funded science denial, and it has been devoting an increasing amount of attention to the subject of climate change. And apparently that was just the beginning. This coming Sunday, Cosmos will devote an entire episode to the topic.

  • Health/Nutrition

    • Why Are Food Prices so High? Because We’re Eating Oil

      Anyone who buys their own groceries (as opposed to having a full-time cook handle such mundane chores) knows that the cost of basic foods keeps rising, despite the official claims that inflation is essentially near-zero.

    • Diets Make You Fatter—The Three Little Words that Really Help You Lose Weight

      “British girls have become the fattest in Europe” was this week’s brutal headline.

    • Synthetic biology products found in “green” laundry detergent

      Consumer products containing ingredients made using an advanced form of engineering known as synthetic biology are beginning to show up more often on grocery and department store shelves.

      A liquid laundry detergent made by Ecover, a Belgian company that makes “green” household products including the Method line, contains an oil produced by algae whose genetic code was altered using synthetic biology. The algae’s DNA sequence was changed in a lab, according to Tom Domen, the company’s manager for long-term innovation.

  • Security

    • Anonymous hacktivists plan massive attack on Brazilian World Cup sponsors – report

      Amid mass demos and violence over extravagant World Cup spending showing little promise of return for an impoverished Brazil, Anonymous hackers plan a mass hack attack on the Cup’s sponsors, a source told Reuters.

      High inflation and low business investment have hampered the government’s recent attempts to boost the economy ahead of the tournament. All this is happening as some of the country’s most pressing social and other problems have been neglected, with rampant poverty and destitution rife in large parts of the capital.

      People are up in arms, staging protest events for a number of reasons, the latest of which are centered on skepticism that the lavish spending on the World Cup will benefit them in any substantial way. This Friday, several simultaneous events blocked Rio de Janeiro’s main roads, paralyzing traffic.

  • Defence/Police/Secrecy/Aggression

    • Don’t sanitize the reality of war

      The only winners in war are those who produce the guns, bullets, drones, IEDs, and all the other gadgets to maim and kill.

    • White House press secretary Jay Carney leaving

      Jay Carney is stepping down as White House press secretary, President Barack Obama announced on Friday.

    • 6 Of Jay Carney’s Most Epic Clashes With Reporters

      When Jay Carney steps down as White House press secretary later this year, he will leave behind a trail of memorable clashes with reporters. Here are a few of them:

    • How Many Terrorists Are There: Not As Many As You Might Think

      Terrorism is a deadly, ever-present menace from which Americans should spare no expense or effort in protecting themselves. Or so our rulers claim.

    • The University & the Security State: DHS Joins Pentagon and CIA on Campus

      Most countries have special-purpose institutions of higher education to train military officers. The United States has 18 such colleges and universities, including federally funded ones such as West Point, state-funded ones such as The Citadel, and private ones such as Norwich University. What distinguishes the United States from all but a few other countries is the presence of the Reserve Officers Training Corps (ROTC) at civilian colleges and universities.

      Created in 1916, ROTC is probably the most visible sign of U.S. military involvement on non-military colleges and universities, with its uniformed cadets and midshipmen and university credit for courses taught by military officers on “military science” and “leadership.” Army, Navy), or Air Force ROTC programs are present today on almost 500 campuses.

    • Obama accepts veterans affairs chief resignation with ‘regret’

      Obama said Sloan Gibson, deputy secretary of the VA, would take the helm on an acting basis while he looked “diligently” for a new permanent VA secretary. Gibson, an Army veteran and former banker, had joined the VA just three months ago after running the USO military service organization.

    • How Long Will Europe Pay Tribute to USA?

      France and the United States have exchanged statements on the Mistral ships contract with Moscow. Deputy Spokesperson Marie Harf has said the United States is concerned about the deal and it believes that the time is wrong for selling the amphibious assault ships to the Russian Federation. The statements were made after French President Hollande confirmed that the deal signed in 2011 is in force to be completed in October. The $1, 2 billion Vladivostok is to join the Russian Navy in 2014 with Sevastopol, the second ship of the class, to be delivered in 2015.

    • Fmr Bush Counter-Terror Czar: Bush, Cheney, Rumsfeld All Committed War Crimes

      According to the nation’s former top counterterrorism official, former President George W. Bush, his Vice President Dick Cheney, and their Defense Secretary Donald Rumsfeld had all committed war crimes during their tenure.

      Richard Clarke was Bush’s counterterrorism czar in 2001 and later became the president’s special advisor on cyberterror until he resigned in 2003 and became a vocal critic of the administration. In an interview with Democracy Now! this week, Clarke was asked by host Amy Goodman whether Bush, Cheney, and Rumsfeld could ever seriously face “war crimes” charges for the Iraq operation.

    • Exclusive: New document details America’s war machine — and secret mass of contractors in Afghanistan

      What is a huge army of private contractors secretly doing in Afghanistan? A leaked PowerPoint presentation explains

    • “Force Protection Alpha in Effect” –Coming To A Town Near You

      My arrest at Creech along with eight others on April 16 was a “return to the scene of the crime” (the Air Force’s crime, not mine) for me, as I was among the “Creech 14” in April 2009, the first nonviolent direct action against drones in the U.S. Creech was then one of only a few sites from which drones were controlled by the U.S. and by the United Kingdom, which has a wing of the Royal Air Force stationed there to fly their own drones. Since then the use of armed drones has been proliferating around the world and so has the number of drone operation bases in communities around the U.S. My work with Voices for Creative Nonviolence has brought me to the scenes of the crime in Afghanistan, the CIA headquarters at Langley, Virginia and at the gates of drone bases in New York, Iowa, Missouri and in England as well.

    • US Drones hitting Civilian Homes, Killing non-Combatants

      Domestic buildings have been hit by drone strikes more than any other type of target in the CIA’s 10-year campaign in the tribal regions of northern Pakistan, new research reveals.

    • New Data: American Drones Killed Hundreds of Pakistani Civilians
    • Civilian Casualty Rates in CIA vs. DOD Drone Programs: Apples and Oranges
    • What the Drones Strike: Targets Attacked by CIA Drones in Pakistan – Most are Houses

      The Bureau is publishing, for the first time, data showing the types of targets that have been reportedly attacked by CIA drones in Pakistan.

      The research is a joint project by the Bureau, Forensic Architecture, a research unit based at Goldsmiths University, London, and Situ Research in New York. The data feeds this interactive website mapping the strikes, the types of target attacked, and their relative scale.

    • If Bush Is a War Criminal, Then So Are Truman, LBJ, Nixon and Obama

      Finally, although President Obama ended the use of torture, he continued the drone attacks started under Bush. A Stanford Law School reports states that “there is significant evidence that U.S. drone strikes have injured and killed civilians.” Many say they violate international law, especially since civilians are killed in countries that haven’t declared war upon the U.S. As for the decisions of presidents before Obama, the use of the atomic bombs, massive bombing campaigns in Vietnam, and chemical weapons like Agent Orange can easily be viewed as war crimes. If President Bush is deemed a war criminal, then the decisions of presidents before and after Bush should be evaluated in the same manner.

    • Aussies dead in drone strikes — and Brandis does not care
    • US Will Still Use Drone Strikes: Barack Obama

      President Barack Obama said on Wednesday he will continue to “take direct action” by ordering drone strikes and capture operations against suspected terrorists “when necessary to protect ourselves.”

      In a speech outlining a foreign policy framework that stresses cooperation with allies, Obama said there still would be times when the U.S. must go it alone. He restated a policy he disclosed last May, however, that no drone strike should occur unless there is “a near certainty” that no civilians will be harmed.

    • A(nother) Procedural Roadblock for Drone Casualty Reporting Requirements

      By way of brief background for the unfamiliar, at the most basic level (but with varying degrees of specificity), each proposal would require the President to release a public report on the number of civilian and combatant casualties killed in U.S. drone strikes (for earlier discussions on the substance of the proposals, see e.g., here and here). Back in November, the House and Senate intelligence committees debated including a similar reporting requirement in the Intelligence Authorization Act for FY 2014. The SSCI-approved version of the bill included the provisions; whereas, HPSCI rejected a Schiff-sponsored amendment to include the reporting requirements in the House version. Ultimately, however, the proposal was never enacted.

    • US Global Hawk Drones Given Access To British Airspace
    • Despite promise, US govt moves to classify justification for drone killing of American
    • U.S. Seeks to Censor More of Memo That Approved Drone Strike on American
    • Feds Want to Censor More of the Drone Memo
    • US gov’t wants to withhold crucial information on Yemen drone strike
    • US appeals court rebuffs govt try for secrecy

      A New York federal appeals court has rejected the government’s request to reargue in secret its order that it reveal a classified memo describing legal justifications for using drones to kill U.S. citizens suspected of terrorism overseas.

    • Inside the Ring: Memo outlines Obama’s plan to use the military against citizens
    • Obama Unveils His “Don’t Do Stupid Sh*t” Doctrine At West Point
    • ‘Boss’ bumper sticker for a true Chicagoan
    • Is ‘Obama: Like a Boss’ bumper sticker completely wrong?
    • Obama Administration Desperate to Censor Assassination Memo

      After announcing it would comply with a federal court order, the Obama administration has decided that it wants to conceal more portions of a controversial memo authorizing the assassination of Americans overseas.

      Last week, officials with the U.S. Department of Justice said they would make public parts of the internal document written in July 2010 by then-federal lawyer David Barron that justified the use of drones or other means to kill U.S. citizens accused of terrorist involvement.

      The declaration came as the U.S. Senate was considering Barron’s confirmation as a judicial appointee to the First Circuit Court of Appeals—a move that helped convince at least one Democratic senator, Mark Udall of Colorado, to support the nomination.

    • Drone memo author should be in jail

      Conservatives say, and this is one of their more successful memes, that poor people are immoral. The proles have sex and kids out of wedlock and expect us (i.e., upstanding middle- and upper-class patriots) to pay for them. They steal Medicare and cheat on welfare. They don’t follow The Rules (rules written by, let’s just say, not them). Which makes them Bad.

    • Obama’s Vacuous West Point Foreign Policy Speech

      In his May 28 West Point speech on foreign policy President Obama took a swipe at “so-called realists.” But the acolytes of this particular school of thought will by and large be satisfied with his manifesto. The most scathing attacks on Obama’s foreign policy have come from neo-conservatives such as Robert Kagan. They are the ones who will pounce on the Mr. Obama’s latest address, and indeed have already done so.

      The West Point lecture was classic Obama: the president was calm and reasonable. And he took an in-between Goldilocks stance designed to differentiate him from the extremes. The latter he characterized simplistically to supplement the rhetorical force, if not the persuasiveness, of his case.

    • As Obama sets agenda at West Point, anti-drone protesters rally

      About two dozen anti-drone protesters greeted those entering the United States Military Academy Wednesday, piggybacking their message onto the fanfare of graduating cadets and a visit by President Barack Obama.

    • New data shows drones killed hundreds of Pakistani civilians

      Some light has been shed on how the drone program works; in October 2013, the Washington Post revealed how the NSA is also involved in the targeted killing program. And early in 2014, The Intercept published more details about how “controversial metadata analysis and cell-phone tracking technologies” used by the NSA for its surveillance programs are also used to identify drone targets.

    • The Blair-Bush notes

      It isn’t just John Major who is unhappy that transcripts and full notes of conversations between Tony Blair and George W Bush about the lead-up to the Iraq war will remain secret. The entire world needs details of conversations between Blair and Bush about the 2003 war, but instead the Chilcot inquiry will only get the gist of the talks. For a war which killed 655,000 Iraqis and over one million in total, and for a reason never proven, it cannot be just the former British prime minister who is troubled by the lack of information and transparency.

    • Liverpool journalist channels Iraq War anger into debut novel

      IT’S ABOUT as eye-catching a blurb as you could hope for on an Iraq war thriller – an endorsement from embattled Wikileaks founder Julian Assange himself.

    • Full-steam ahead for a whitewash of Tony Blair’s Iraq lies as Chilcot surrenders

      Chilcot has surrendered in a “bad, bad day for democracy and justice. The establishment of this country, and the security and intelligence services have won again. Truth has lost out.”

    • Welcome to the warped but wonderful world of ex-PM Tony Blair

      Many believe Blair should be put on trial for his role in taking us to what looks like an increasingly illegal war in Iraq. I would try him for allowing the country to be swamped with millions of new arrivals as, and this fact is absolutely vital to remember, it was not fair to anyone; not those who were already here, those who arrived or those who came along subsequently.

      Communities felt they lost their identities, schools were filled to the point that giant cabins were quickly rushed into playgrounds to fit in all the children, many of whom could speak no English, and resentment quickly grew.

    • Crediting Obama for Bringing Troops Home–Without Noting He Sent Them Abroad

      In reality, current US troop levels–about 32,000–are actually about what they were when Obama took office (Think Progress, 6/22/11). A graph that accompanied an NPR story (6/29/11) shows this pretty clearly.

      Late last year the New York Times offered similarly misleading spin (FAIR Blog, 11/25/13), reporting that Obama “has reduced the forces in Afghanistan from about 100,000 in 2010 to about 47,000 today.” That’s technically true, but ignores the fact that the troop levels had only gotten that high as a result of Obama’s policy of massive escalation.

    • Is Iran’s Missing General, Ali Reza Asgari, Living in the United States?

      He was said to be a key player in the Beirut embassy bombing in 1983 and in the founding of Hezbollah—until he disappeared in 2007. Now a new book claims he’s under CIA protection.

    • Benghazi ‘‍cover-up’ being ignored, reader contends

      Reader Peter Smith is none too happy with this newspaper.

      As he wrote to me: “I could see The Blade shirking and hiding initially from its duty of reporting to the citizenry about the tragedy when the news first broke, due to the lack of ‘factual evidence…’

      “But now the facts are out! I know it and you know it too … time to step up and report first-hand all the facts about this tragedy and all the ramifications coming out of it, including the cover-up.”

    • US sends assault ship with 1,000 Marines to Libyan coast
    • Op-Ed: Hifter again attacks Islamists as Libyan protesters show support
    • The man at the center of the chaos in Libya: Khalifa Haftar
    • Syrian rebels say they are already being trained by the CIA

      The issue of giving aid to the Syrian rebels has been widely debated with some concerned that weapons and training will end up in the hands of Islamists who have embedded themselves among the opposition.

    • Syrian rebels say they are being trained by the CIA
    • Guatemala: The coup that radicalised Che Guevara

      Sixty years ago, in June 1954, a CIA-orchestrated coup ousted the reformist Guatemalan government of Jacobo Arbenz Guzman. The coup installed a brutal right-wing regime and decades of bloody repression.

    • Obama’s ProtoWar Against Russia and China

      Russia and China are both under attack by a multi-pronged U.S.-led ‘proto-war’ which could erupt into ‘hot war’ or even nuclear war. ‘Protowar’ or ‘proto-warfare’ is the term I have coined to describe the use of multiple methods intended to weaken, destabilize, and in the limit-case destroy a targeted government without the need to engage in direct military warfare.

    • What Are Polish Death Squads Fighting For in Ukraine?

      On May 11 a plane arrived at Kiev’s airport in strict secrecy; it was met by the airport’s military personnel rather than the civilian staff. NATO military uniforms, 500 packages of amphetamines, and containers marked as poisonous substances were unloaded from the plane. By order of the Kiev directorate of the SBU, the fighters, the cargo and the containers of poison were not inspected and left the airport in cars with tinted windows. The cargo was accompanied by CIA agent Richard Michael. Aboard the plane were also fighters from the Right Sector and the Polish private military company ASBS (Analizy Systemowe Bartlomiej Sienkiewicz) Othago, created several years ago by Poland’s current Minister of the Interior, B. Sienkiewicz.

    • Premature US Victory-Dancing on Ukraine

      Washington’s role in the coup d’etat in Kiev on Feb. 22 has brought the U.S. a Pyrrhic victory…

    • Squat demolition called off after four nights of rioting in Barcelona

      City attempt to reach peaceful agreement over fate of squatters’ civic centre after fourth night of violent clashes in Catalan capital

    • Meet Directive 3025.18 Granting Obama Authority To Use Military Force Against Civilians

      While the “use of armed [unmanned aircraft systems] is not authorized,” The Washington Times uncovering of a 2010 Pentagon directive on military support to civilian authorities details what critics say is a troubling policy that envisions the Obama administration’s potential use of military force against Americans. As one defense official proclaimed, “this appears to be the latest step in the administration’s decision to use force within the United States against its citizens.” Meet Directive 3025.18 and all its “quelling civil disturbances” totalitarianism…

    • Sleeping toddler burned during SWAT raid
    • SWAT team throws concussion grenade into baby playpen during no-knock raid

      A SWAT crashed through a family’s door in the middle of the night and threw a concussion grenade into a baby’s playpen. A 19-month-old baby was horribly disfigured when it exploded in his face. [Graphic]

      Alecia Phonesavanh and her family were staying at a friend’s house after their home had been lost in a fire. The makeshift living arrangements left their 19-month-old baby boy sleeping in a playpen in a shared room. Things were going OK until the local government decided to send paramilitary home invaders to unleash indiscriminate violence upon the home and anyone inside.

  • Transparency Reporting

    • ‘The disgraced oligarch’: WikiLeaks cables reveal changing US views on Poroshenko

      The US was among the first states to congratulate Ukraine’s president-elect Petro Poroshenko. Yet real US opinions of the new president are more complicated, as revealed by WikiLeaks cables which refer to the billionaire as a “disgraced oligarch.”

      For years, the US was keeping an eye on the Ukrainian billionaire and former foreign minister. Between 2006 and 2011, Poroshenko’s name was a direct or indirect subject of hundreds of cables released by WikiLeaks.

      A simple search for ”Poroshenko” on WikiLeaks’ website gives at least 350 documents mentioning his name. But some of the descriptions provided by US diplomats are far from complimentary.

    • Thousands of journalists withhold a mistakenly released CIA agent name

      Last Saturday, the White House accidentally revealed the identity of the CIA’s most senior operative in Kabul by accidentally including his name on a list of officials participating in President Obama’s surprise visit to US troops in Afghanistan. Though it was disbursed to more than 6,000 journalists, all indications suggest that every outlet has complied with the government’s request to refrain from publishing the name.

  • Environment/Energy/Wildlife

    • Action Alert: Ann Coulter as CNN’s Climate Change Expert

      FAIR’s latest Action Alert (5/28/14) urges media activists to call out CNN for basing a climate change report around one guest: right-wing climate change denier Ann Coulter. If you write to CNN, please share a copy of your message in the comments below.

    • CNN’s Climate Expert: Ann Coulter?!
    • US Plans to Speed Poultry Slaughtering, Cut Inspections

      The U.S. government is in the final stages of weighing approval for an overhaul of regulations governing the country’s poultry industry that would see processing speeds increase substantially even while responsibility for oversight would be largely given over to plant employees.

    • The “Pugilistic” Way The Koch Brothers Handle The Media

      The author of Sons of Wichita, the new biography of the Koch brothers, never got the interviews he wanted with the archconservative billionaires. But he says the family nonetheless kept a close eye on his research, deploying the “very aggressive P.R. operation” they have used for years to silence media criticism.

    • ‘A Government Of Thugs’: How Canada Treats Environmental Journalists

      I attempted to enter Canada on a Tuesday, flying into the small airport at Fort McMurray, Alberta, waiting for my turn to pass through customs.

      “What brings you to Fort Mac?” a Canada Border Services Agency official asked. “I’m a journalist,” I said. “I’m here to see the tar sands.” He pointed me to border security. Another official, a tall, clean-shaven man, asked the same question. “I’m here to see the tar sands.” he frowned. “You mean oil sands. We don’t have tar here.”

  • Finance

    • Bilderberg 2014: In the Court of Good King Henry

      The bankers, intelligence chiefs and private military strategists are the dukes, energy and arms firms the barons.

    • Seven Finns participate in Bilderberg meeting

      The list of participants for the 62nd Bilderberg meeting that began in Copenhagen, Denmark, on Thursday includes seven Finns. The annual meeting is an exclusive forum for the political and financial elite of the world to engage in informal, off-the-record discussions on a variety of global issues.

    • ​Bilderberg actually talks nukes, euro nationalism and… Barack Obama – leak

      The officially released agenda of the prestigious Bilderberg club meeting is not true, claims RT show host Daniel Estulin, a longtime watcher of the ‘secret world govt’ group. He says he obtained the real agenda for this year’s gathering in Copenhagen.

    • Thomas Piketty accuses Financial Times of dishonest criticism

      Thomas Piketty has accused the Financial Times of ridiculous and dishonest criticism of his economics book on inequality, which has become a publishing sensation.

      The French economist, whose 577-page tome Capital in the Twenty-First Century has become an unlikely must-read for business leaders and politicians alike, said it was ridiculous to suggest that his central thesis on rising inequality was incorrect.

      The controversy blew up when the FT accused Piketty of errors in transcribing numbers, as well as cherry-picking data or not using original sources.

    • Threat of tenant evictions at highest level in more than 10 years

      Bedroom tax and housing list squeeze blamed for landlord repossession orders topping 47,000 in three months

    • Moyers: 10 Disgustingly Rich Companies That Will Do Anything To Avoid Paying Taxes

      This week, Bill speaks to Nobel prize-winning economist Joseph E. Stiglitz, who argues that we must reform the tax code and stop subsidizing tax dodgers. A recent report by Americans for Tax Fairness suggests that corporate taxes are near a 60-year low — and that’s partially because corporations have become adept at not paying their share.

      Here’s a list of 10 tax-dodging corporations excerpted from the Americans for Tax Fairness report.

    • Argentinian Central Bank is Afraid of Bitcoin

      Yet another of the world’s central banks has publicly “warned” citizens of Bitcoin. The Argentinian Central Bank has posted a statement about Bitcoin on their official website, warning of the lack of legal tender status, volatility, and Bitcoin’s use in fraudulent activities and money laundering.

    • Savage capitalism is back – and it will not tame itself

      Back in the 90s, I used to get into arguments with Russian friends about capitalism. This was a time when most young eastern European intellectuals were avidly embracing everything associated with that particular economic system, even as the proletarian masses of their countries remained deeply suspicious. Whenever I’d remark on some criminal excess of the oligarchs and crooked politicians who were privatising their countries into their own pockets, they would simply shrug.

    • Proof that Corporate Tax Cuts Have Done More Harm Than Good

      The percentage of taxes that corporations pay today are near the record lows of the United States’ total tax bill, even though these corporations are bringing in huge profits. Although this is happening, the unemployment rate still remains high. A study completed by the Center for Effective Government and National People’s Action shows the damage done by having corporations pay low taxes and the effect on state budgets. The study shows that a small increase in the amount of taxes large corporations pay will have positive effects such as restoring cuts in education and public services, and could possibly restore over three million jobs. As federal aid was declined to state budgets more and more, many states have cut back on taxes claiming that doing so would benefit their economy and create jobs. One example of this was a tax exemption on corporate profits passed directly to individual owners in the state of Kansas. This kept Kansas in a recession. Hard working employees were stuck with paying the taxes that corporations got out of paying. Corporations get out of paying taxes in loopholes such as offshore tax havens, the “executive pay loophole” that allows corporations to deduct performance bonuses from their tax receipts, and the “stock-based pay loophole” that allows companies to deduct billions from their tax bill. People can see that cutting the taxes of corporations is not helping the economy in any state. It is not helping form jobs, and Americans agree it needs to be stopped.

    • More Proof Corporate Tax Cuts Have Done More Harm Than Good

      The taxes paid by corporations today are near record lows as a percentage of the United States’ total tax bill, even as they are recording massive profits. Yet the unemployment rate is still high. However, if we turned back the clock on corporate tax rates and returned to Nixon-era levels and closed loopholes, millions of American jobs would be created, according to The Disappearing Corporate Tax Base, a new report released today.

    • Could 932,367 Secessionists Be Right About Dying America?
    • More disabled workers paid just pennies an hour

      A national charity whose executives earn six-figure salaries used a legal loophole to pay disabled workers as little as three and four cents an hour, according to documents obtained exclusively by NBC News.

      An NBC News investigation recently revealed that Goodwill Industries, which is among the non-profit groups permitted to pay disabled workers far less than minimum wage because of a federal law known as Section 14 (c), had paid workers as little as 22 cents an hour.

    • Digging up the Dirt on Canadian Mining in Latin America
  • Censorship

    • MPAA: The Last Bastion of Censorship in America

      The MPAA was formed initially in 1922 under the moniker Motion Picture Producers and Distributors of America. It was created in order to give films at the time a set of standards by which filmmakers would use as a list to make sure that movies wouldn’t depict excessive violence, sexuality or other practices deemed immoral. It was later changed to the Motion Picture Association of America and placed under the direction of Jack Valenti in the mid ‘60s.

    • In Cuba, technology may beat censorship
    • The New York Times and freedom of the press

      An extraordinary commentary published in the New York Times Book Review — posted online May 22, scheduled for print publication June 8 — asserts that the US government must be the final decision-maker on whether leaked information about government wrongdoing should be published by the press.

      This anti-democratic screed, worthy of any police state, is written by Michael Kinsley, a longtime fixture of the punditry establishment and the former co-host of CNN’s “Crossfire” program. His commentary takes the form of a review of Glenn Greenwald’s new book No Place to Hide on the Edward Snowden revelations about illegal mass surveillance by the National Security Agency.

      Kinsley ridicules Greenwald’s claim that blanket NSA surveillance of electronic communications is a threat to the democratic rights of the American people, and that Snowden was justified in exposing government criminality by leaking documents to Greenwald and other journalists for eventual publication in the Guardian (US) and the Washington Post.

    • Wikipedia founder: Google EU ruling ‘won’t work’
    • Google faces up to image problem in Europe
    • Germany Mulls Arbitration for Web ‘Right to Be Forgotten’

      The German government is considering setting up arbitration courts to weigh in on what information people can force Google Inc. (GOOG) and other search-engine providers to remove from results.

    • Twitter Has Quietly Learned To Censor And Ban Its Users When Governments Ask

      Twitter has a reputation as an open platform for expressing one’s opinions. It’s become a place for dissent and debate. It played a key role in the “Arab Spring” revolutions of the last couple of years.

      But last week, it agreed to censor a pro-Ukrainian Twitter feed in Russia. It also blocked a “blasphemous” account in Pakistan. It’s not the first time Twitter has censored politically sensitive accounts. Now, it seems, Twitter’s reputation as a platform for free speech is at risk.

    • Michael Bloomberg Compares Ivy League ‘Censorship’ to Soviet Russia in Harvard Speech
    • Michael Bloomberg Blasts Ivy League For Liberal ‘Censorship’
    • Cambodia’s Draft Law Turns Free Speech into Cybercrime

      Historically, Cambodia has been fairly lax in enacting legislation that stifles freedom of expression online—unlike its neighbors of Vietnam and Thailand— but with more Cambodian citizens gaining access to the Internet, the Cambodian People’s Party (CPP) has attempted to control dissenting views and “immoral actions” online through the drafting of a cybercrime law. A leaked copy of the legislation, which was initially drafted in 2012, revealed some serious threats to fundamental freedoms by making certain speech and other actions online punishable by fine and prison time.

    • “I Can Feel Total Censorship in the Air”: Internet Freedom Evaporates in Thailand
    • Google accepting censorship requests

      Google is accepting requests from Europeans who want to erase unflattering information from the results produced by the world’s dominant search engine.

      The demands can be submitted on a Web page Google opened late Thursday in response to a landmark ruling issued two weeks ago by Europe’s highest court.

    • Google accepting ‘right to be forgotten’ requests in Europe
  • Privacy

  • Civil Rights

  • Internet/Net Neutrality

  • Intellectual Monopolies

    • MakerBot Files For Patent On A Design Derived From Work By Its Community

      MakerBot is one of the key companies in the low-cost 3D printing market. It was founded in 2009 and based its first model on the completely open RepRap design. However, in 2012, MakerBot moved away from its open source roots, claiming that it needed to make this shift in order to build a long-term business:

      We are going to be as open as we possibly can while building a sustainable business. We are going to continue to respect licenses and continue to contribute to the open technology of 3D printing, some of which we initiated. We don’t want to abuse the goodwill and support of our community. We love what we do, we love sharing, and we love what our community creates.

    • Makerbot blatantly steals and patents a community design.

      In a stunning display of madness, makerbot industries files a patent application on a mechanism clearly derived from content created by their users. What’s almost worse is the article they wrote praising the invention, presumably while they were filing the paperwork.

    • Success Of Fringe Parties In European Parliament Raises New Obstacle To TAFTA/TTIP’s Progress

      As Techdirt has been charting, the TAFTA/TTIP negotiations have already encountered far more resistance than was expected when they began last year. This has mostly centered around the controversial corporate sovereignty provisions, but there are also more general concerns about things like deregulation — for example, through a new regulatory council. As well as pushback from expected quarters — civil organizations and NGOs (pdf) — even some European governments are expressing their doubts. And following last week’s elections for the European Parliament, a new obstacle to concluding the agreement has been added: an increased number of European politicians (MEPs) that are skeptical about pan-European projects in general, and TAFTA/TTIP.

    • Copyrights

      • Labels Decide Not To Appeal Spanish Court Ruling That Found P2P File Sharing Software Perfectly Legal

        In April, we wrote about an important court ruling in Spain that found that Pablo Soto’s P2P file sharing software, Blubster, was “perfectly legal”, because the software was “neutral” and a part of “free enterprise within the framework of a market economy.” In that post, we went through the entire history of earlier court rulings that had similarly suggested that file sharing software shouldn’t be blamed for how people used it, and the US’s aggressive pressure that forced Spain to pass multiple new copyright laws to try to reverse such rulings. All of that appeared to be for nothing, as the courts still recognized the silliness of blaming software for how people use it.

      • RESPECT Act Should Be HYPOCRISY Act After How Often Labels Screwed Over Artists

        Yesterday, the music labels, under the guise of RIAA spinoff SoundExchange, along with Congressional Reps. George Holding and John Conyers, announced some new legislation and a coordinated PR campaign for what they’re calling “Project72.” The official name of the bill is the “Respecting Senior Performers as Essential Cultural Treasures Act” or the RESPECT Act. There is so much hypocrisy and ridiculousness here that it’s difficult to know where to start. However, in short, the labels fought hard to keep the situation the way it is today, and a very large number of the musicians the RIAA rolled out in “support” of this new law — claiming they just want to get paid by music streaming services — are musicians who got totally screwed over by RIAA labels in the past. How about a little “respect”?

05.31.14

TrueCrypt Too Proprietary to be Secure and Corporate Media Should Stop Blaming Free/Open Source Software (FOSS)

Posted in Free/Libre Software, Security at 4:36 am by Dr. Roy Schestowitz

TrueCrypt was never worth trusting in the first place

Telecommunication

Summary: Analysis of the whole TrueCrypt fiasco and response to the blaming of FOSS (where the licences are clearly not FOSS)

PROPRIETARY software should be assumed insecure by design, as it often contains back doors and one simply cannot prove otherwise. Based on experience alone, a lot of proprietary software comes with back doors, sometimes accidentally but not always. A lot has been written about this before, both here and elsewhere, so we are not going to write so much on this subject. Instead we wish to focus on the news that TrueCrypt development is moving to Switzerland (the first article we found about this is [1] and there is also some analysis [2]). The PATRIOT Act comes to mind and also the experiences of secure mail services in the United States, including Edward Snowden’s E-mail provider. When Groklaw shut down, citing concerns over NSA spying, it recommended that people adopt Kolab, which is based in Switzerland. It should be emphasised that Switzerland harbours privacy not because of humanitarian interests but because of national interests. For domestic prosperity it facilitates international crime (tax evasion from all nations) and wishes to guard the criminals.

The problems with TrueCrypt are not new to us; I very much predicted what the news insinuates and I had received flack for saying so. TrueCrypt has been thoroughly and even successfully openwashed based on some odd kind of marketing angle; those close to the project know better how it works and if an audit which is not transparent is needed for TrueCrypt, then we should quickly realise that the build process and some components are wrapped in a riddle/mystery. The very core of the problem, including its build process, are very crucial. The announcement from TrueCrypt was as vague — not transparent — as the project itself.

Now it is widely known that TrueCrypt gave an illusion of privacy, which is in many ways worse than having no privacy at all because there is impact on users’ behaviour. We may never know how many people have gone to jail or were killed because of TrueCrypt’s false promise.

FOSS-hostile sites try to spin that as an issue with FOSS even though it’s not FOSS. One source states: “The abrupt announcement that the widely used, anonymously authored disk-encryption tool Truecrypt is insecure and will no longer be maintained shocked the crypto world–after all, this was the tool Edward Snowden himself lectured on at a Cryptoparty in Hawai’i.”

Snowden uses Debian GNU/Linux (Tails) and the main reporter he worked with, Glenn Greenwald, only recently dumped Microsoft Windows and moved to GNU/Linux.

There has been a lot more coverage about it [1, 2], including the usual scaremongering by Mr. Goodin, who wrote about it not once but twice, saying: “One of the official webpages for the widely used TrueCrypt encryption program says that development has abruptly ended and warns users of the decade-old tool that it isn’t safe to use.”

Goodin’s colleague wrote about it as well. They are really milking this cow and the best known CIA-linked news site asked: “Is this the end of popular encryption tool TrueCrypt?”

The plutocrats’ press, Forbes, called it “Open Source” (in the headline), so it can’t even get its basic facts right:

Over the past 24 hours the website for TrueCrypt (a very widely used encryption solution) was updated with a rather unusually styled message stating that TrueCrypt is “considered harmful” and should not be used. If you have not come across TrueCrypt and why it has become so popular see the below section ‘why do people use TrueCrypt’.

Better coverage came from the expected sources, not playing to the tune of FOSS smears (TrueCrypt is proprietary).

Knowing that Microsoft is an NSA partner, Gordon in our IRC channels felt baffled because TrueCrypt is “now recommending bitlocker for windows”, to which Ryan replied: “Proprietary encryption from Microsoft that was designed in partnership with the NSA…”

Microsoft is talking to British police about encryption. When I wrote about this nearly a decade ago Microsoft staff were using personal insults against me, only later (much later) to realise that I was right. Sean Michael Kerner calls TrueCrypt “Open-Source” (with a dash) when he writes: “The other challenge facing TrueCrypt is the simple fact that there are many other disk-encryption technologies now available. On Microsoft’s Windows operating system in particular, which was a key target platform for TrueCrypt, versions of Windows after Windows XP include support for Bitlocker, which performs a similar function. In addition, there are multiple file-encryption technologies available, including, FileVault for Mac, DiskCryptor for Windows and Luks for Linux.”

Proprietary operating systems are not compatible with encryption for the same reason that proprietary hypervisors are not. If the NSA can infiltrate the lower layer (e.g. VM host, OS, BIOS) through back doors, then the rest (what’s above) is almost automatically compromised. No sane developer would recommend anything that’s proprietary for security and privacy. Don’t forget Microsoft's COFEE and CIPAV. Microsoft is very much in bed with spooks and police. Microsoft is an informant without conciousness. Privacy in Windows is not a goal; the contrary is true. One Linux/BSD site thinks that TrueCrypt is now “dead” and there is the following statement about the software licence:

Based on the wording of its license, there was always a question mark surrounding the open source-ness of Truecrypt. But that’s not the topic of this brief article. What prompted me to write this is an article that appeared in the Washington Post suggesting that TrueCrypt may have seen its last days as an (“open source”) software project.

Just remember that TrueCrypt is not FOSS.

There is another project whose software licence was blamed for lack of participation and oversight. The OSI’s President blamed the licence. That project was OpenSSL, which is now scrambling to get some more money. The Economist makes FUD out of it while other sites take a more objective approach [4-15]. Remember this: if the project is not quite as open or free as it wants people to believe, then it might not be worth trusting. We never trusted TrueCrypt.

Related/contextual items from the news:

  1. TrueCrypt Not Dead, Forked and Relocated to Switzerland

    The development of TrueCrypt, an open source piece of software used for on-the-fly encryption, has been terminated and users have been advised not to use it because it is not secure enough. Now, it seems that another team of developers have forked the software and rebased it in Switzerland.

  2. Death (?) And Rebirth!
  3. TrueCrypt, An Open-Source Whole-Disk Encryption System, Leaves Users High And Dry
  4. Tough Love for the Encryption Software That Was Compromised by Heartbleed
  5. CII announces 2 full-time devs and a security audit for OpenSSL
  6. Heartbleed: Linux Foundation hires dynamic duo to fix OpenSSL
  7. Linux Foundation throws money at OpenSSL staffing post-Heartbleed
  8. The Linux Foundation’s Core Infrastructure Initiative Announces New Backers, First Projects to Receive Support and Advisory Board Members

    The Core Infrastructure Initiative (CII), a project hosted by The Linux Foundation that enables technology companies, industry stakeholders and esteemed developers to collaboratively identify and fund open source projects that are in need of assistance, today announced five new backers, the first projects to receive funding from the Initiative and the Advisory Board members who will help identify critical infrastructure projects most in need of support.

  9. The Linux Foundation Assigns Two Full-Time Developers to Work on OpenSSL
  10. LF Announces New Backers, Projects For Core Infrastructure
  11. Linux Foundation adds more Internet protocols to its protection list
  12. Everyone uses OpenSSL, but nobody’s willing to fix it — except the Linux Foundation
  13. Linux Foundation flings two full-time developers at OpenSSL

    The Linux Foundation’s new elite tech repair team has named its initial areas of focus as it works to find and seal holes in widely-used open source software.

    The Linux Foundation announced on Thursday that members of the “Core Infrastructure Initiative” (CII) will dedicate resources to working on the Network Time Protocol, OpenSSH, and OpenSSL to hunt down and fix flaws in the tech that helps tie the internet together.

    “All software development requires support and funding. Open source software is no exception and warrants a level of support on par with the dominant role it plays supporting today’s global information infrastructure,” said Jim Zemlin, the executive director of the Linux Foundation.

  14. Corporations put their cash where their open source security is

    OpenSSL and Open Crypto Audit Project are the first open source projects to receive funding from the Core Infrastructure Initiative.

  15. The Linux Foundation Draws Backers and Funds to Tackle Tech Problems

Manufacturing Propaganda in Microsoft-funded Circles to Belittle FOSS and Magnify Microsoft

Posted in Deception, GNU/Linux, Google, Microsoft at 3:44 am by Dr. Roy Schestowitz

Summary: Some timely examples of facts being abandoned and an alternative reality being introduced by Microsoft-funded firms and lobbyists

FOR nearly 8 years we have focused on tackling FUD and showing where the FUD came from. Public perceptions and truths (objective facts) are an abyss apart when massive PR agencies do what they’re paid to do, which is to screw with public perceptions and drive the population further away from the truth (for a profit).

In Microsoft’s parallel universe, only the desktop counts and GNU/Linux is still somewhat of an underdog with 1% market share. Microsoft relies on corruptible voices to spread such myths and it is improperly counting share in other areas, not just on desktops/laptops.

Charlie Demerjian, whom Microsoft tried to corrupt with some freebies (he declined), has published this long article titled “Microsoft is now irrelevant to computing, and they want you to know it” (highly recommended read).

To quote one portion: “With two major cave-ins in the past few weeks, Microsoft is screaming at the top of its lungs about how irrelevant it is. If you didn’t understand the fall of Microsoft from powerful monopolist to computing afterthought, let SemiAccurate explain it to you.

“For the past few decades, Microsoft has been a monopoly with one game plan, leverage what they have to exclude competition. If someone had a good idea, Microsoft would come out with a barely functional copy, give it away, and shut out the income stream of the innovator. Novell, Netscape, Pen, and countless others were crushed by this one dirty trick, and the hardware world bowed to Redmond’s whims.”

Here is more: “Competition was likewise non-existent, anyone that tried was shut out of new PCs, shut out of interoperability, had revenues devastated by free offerings from Microsoft, and many other similar monopoly games. Microsoft was the proverbial fat and lazy behemoth that was quite content to count their money and turn screws on customers whenever they needed more. If you doubt the seriousness of this stagnation, ask yourself what the last innovation Microsoft came up with was, not evolution but true innovation. I can’t think of any either.”

Here is the part about GNU/Linux: “Similarly with Linux, Microsoft just made sure that no OEM could bundle it with PCs, any that tried paid a high price. It was shut out. On the datacenter side however, Microsoft couldn’t force bundle Windows Server, customers put their own software on. For some strange reason, most large datacenters balk at paying $2000+ per two sockets for something that is vastly inferior to manage, slower, more resource hungry, and completely insecure versus the free alternative.

“Microsoft’s server market share went from 66%+ of sockets to less than 30% in five years, mostly due to datacenters and consolidation. Please don’t look for this to be reflected in the numbers from the big consulting houses, they are too afraid of revenue loss to count sockets. Instead they use the metrics that their customers want them to use, and only count sales of servers from certain vendors and sold OSes, a small fraction of the market. Microsoft didn’t just lose the server market, they were blown out of the water and have no way to recover. Other than internal services, Microsoft is just not relevant in the cloud. If you doubt this, go price a server instance from Rackspace, keep hardware constant and only vary the OS. Game over.”

Demerjian is alluding right there at the start to Gartner and IDC, two firms that create an illusion that Microsoft is relevant on servers (in top Web servers Microsoft is at around 9% and in HPC Microsoft is hardly even at 1%).

Then come mobile devices (smartphones, tablets, etc.) which basically count as computers quite comparable to laptops. Demerjian writes: “That said most people didn’t grasp how badly Microsoft had fallen, they were totally irrelevant and had no more monopoly to leverage. This played out with the Windows 8 launch, Microsoft was desperately trying to stay relevant in mobile by forcing the entire computing ecosystem to adopt their new mobile OS. In theory this would lead to software being leveraged across platforms, and between Office and Exchange, they could force people to use Microsoft mobile products.

“A funny thing happened though, an entire generation of users didn’t want to give up their beloved iPhones or Android devices for an inferior, slower, more expensive, app-free Microsoft device. Microsoft repeated their threat loudly, “Use our mobile OS or you won’t get Office or Exchange on your phone!” To their abject horror the response was almost universally, “OK, bye”.”

Microsoft is now attempting to fight Linux domination in mobile devices by taxing them. Mike Masnick becomes an accidental victim of spin and deception from Microsoft lobbyist Florian Müller, spreading another myth by naming only potential costs and making it look like patents add up to $120 on a phone. It’s a shame that Masnick fell for it. Everyone knows that many phones cost far less than $120 and the nature of this warped analysis seeks to ‘normalise’ patent extortion against the likes of Android/Linux. There is agenda there. Hopefully Masnick will recognise this error because other than that he has done great work exposing Microsoft trolls like Intellectual Ventures that still do evil every month (usually via proxies). Masnick has also covered the sham of a ‘reform’ against patent trolls, which did not happen because trolls like Intellectual Ventures lobbied Congress for years and are still doing everything to keep this broken system of endless scope in place.

In order to artificially make Android more expensive Microsoft has been passing patents to patent trolls such as MOSAID. This is how Microsoft ‘competes’. Microsoft wants taxes on phones to be seen as ‘normal’, or a status quo.

05.30.14

Microsoft-backed Mono is Still Trying to Spread to More Linux-Based Platforms

Posted in GNU/Linux, Microsoft, Mono at 11:51 am by Dr. Roy Schestowitz

API trap and dependency

Summary: Amid openwashing of .NET there are yet more attempts to make mobile Linux dependent on Microsoft’s APIs

The peripheral Microsoft Corporation (allies/staff at companies such as
Xamarin) continues to push Mono into all sorts of Linux-centric projects such as MeeGo (we covered this in prior years) and now its successor Tizen is at risk. “Kitsilano Software are bringing C# to Tizen, in the form of the MonoTizen project,” says this article. This is part of the openwashing of .NET and also the intrusion of patented/copyrighted Microsoft APIs, not to mention code (Mono is partly written by Microsoft, with Microsoft copyrights and Microsoft licences). Serdar Yegulalp continues to contribute to this issue (lots of .NET openwashing this month [1, 2, 3, 4, 5, 6]). Several expected sites aid a perception management campaign of Microsoft by painting .NET as “open”, including folks over at IDG, whose bias is now further revealed because the ‘former Computerworld editor” (top IDG site) calls FOSS vendors “losers”.

Watch this other Microsoft-friendly (.NET-boosting) site openwashing .NET from another angle:

JetBrains recently open sourced Nitra, a set of tooling for working with programming languages on the CLR.

The CLR is proprietary; hence, this Nitra thing is incompatible with the promise of FOSS. But that is the type of nonsense promotes by CodePlex and other Microsoft openwashing proxies. It is not about FOSS; rather, it is about looking kind of like FOSS, deceiving people and luring them into lock-in or spyware.

.NET APIs are a dangerous threat especially after the CAFC's decision in Oracle vs. Google.

One story that we have ignored in recent days (it’s not in daily links) is about Mono. There has been a lot of media coverage of Unity3D because of a new release (days ago). Almost nobody who reported on bother to say it was Mono-plagued. Some FOSS sites gave it positive coverage, making the risk more alluring.

Software Patents Are Still a Threat to Europe Due to ‘Unitary’ Patent

Posted in Patents at 11:31 am by Dr. Roy Schestowitz

Large corporations unite to occupy Europe

Unitary Patent
Picture from FFII

Summary: New report about the unitary patent and its progress in Europe which worries European software proponents because it can bring software patents (and patent trolls) to the whole of the EU

Glyn Moody has read a PDF-formatted document which circulated among the likes of the Foundation for a Free Information Infrastructure (whose Web site has been almost dead for several years, just like its vocal members’ sites). This document deals with the state of the Unitary Patent and it says that things are not looking good. “That’s particularly the case for software patents,” writes Moody, “where the US experiences shows us how much damage trolls can cause. The UPC will open up Europe for software patent trolling on a massive scale.”

It has been a while since we last wrote about software patents in Europe. It does not look like things are improving. Perhaps we will return to covering these issues soon (time permitting).

WhiteSource is a Trojan Horse

Posted in Free/Libre Software, FUD at 11:20 am by Dr. Roy Schestowitz

White horse

Summary: Behind the negative marketing of WhiteSource, which seeks to portray FOSS as a risk and WhiteSource as the solution

Last year we wrote about FUD from WhiteSource, which sounds like something 'open source' but is actually against it. An article by Microsoft proponent (for decades) Scott M. Fulton helps amplify the signal of WhiteSource, stating: “Software development teams continue to implement open source components as boilerplate, cut-and-paste code. Now, one repository service may have a way of estimating the costs.”

Like Black Duck‘s ‘software’, this effort continues to create fear and not too surprisingly some companies blacklist sites where FOSS code is available. A lot of new sites that target IT managers help spread the message from the likes of Black Duck. It’s all business.

You know who rips off stuff? Black Duck. Just ask Palamida. It’s not developers who rip off others. It’s the one hypocritical exploiter of the fear created by oneself. Black Duck is not alone in this meta ‘industry’; there are other such firms, led by ‘former’ Microsoft managers. Their business model is beneficial not only to themselves but also to Microsoft.

Some companies try to make money out of fear, specifically the phobia against FOSS. We need to learn to reject such companies. They are not trying to help. The more afraid people are of FOSS, the more money they make.

When NSA/PRISM/Microsoft Skype Turns Voice Conversations Into Text in Real Time

Posted in Microsoft at 11:05 am by Dr. Roy Schestowitz

Clapper must be unwittingly impressed

Microphone

Summary: Microsoft reveals that the NSA-friendly Skype is already capable of turning voice into text in real time, adding to existing concerns over Microsoft ‘reading’ people’s IM sessions in real time (and following links)

Thanks to some good reporting from Germany we already know that Microsoft is reading people’s text chats in Skype (almost certainly saving them all with no retention policy to limit this secret collection). Microsoft is now using Skype for bribes in Brazil, as we already noted the other day, but we should importantly remember that Microsoft is a PRISM company, the first one in fact (Microsoft is how PRISM started). Skype is a spying operation, so when Slashdot says Microsoft processes speech at its end we know there is no node-to-node communication. Microsoft intercepts the sound and processes it. Microsoft shows it has capability of saving as text people’s voice conversations as text as well (easier to process and later to search or assign triggers to).

Welcome to 2014. With strong NSA connections Microsoft sure became Stalin’s dream (Stallman’s phrase). Careful what you say.

Desperate Microsoft Too Busy Attacking the Competition (Primarily GNU/Linux), Not Creating Products

Posted in Microsoft at 10:53 am by Dr. Roy Schestowitz

The sinking ship tries to pull FOSS down with it

Rodrigues island

Summary: Some of the latest examples of Microsoft disruption (interfering with the competition) rather than Microsoft production

Earlier this week we showed how Microsoft (through CIS) was recruiting moles to help fight FOSS by confusion and infiltration. It is typical and very routine an exercise for Microsoft. Nokia is one recent example. Microsoft is actively recruiting moles who would come across to the public as pro-FOSS while also pro-Microsoft (while on Microsoft’s payroll), contributing — covertly — to a false perception that Microsoft is now accepted by FOSS and is a FOSS player. It is a bit like the strategy of undercover spies; it’s how the CIA infiltrates humanitarian groups (such as HRW) and pushes its agenda as pro-human rights, or commending the CIA (from supposedly humanitarian groups) for its aggressive action under the guise of “pro-rights” (women’s rights, democracy, freedom and so on).

Microsoft is not genuinely changing. It hardly changes anything at all. It is definitely not honest about changing its attitude towards FOSS. All it does is send AstroTurfers to critical sites like Techrights (as Microsoft did with horrible insults) while running attack ads against FOSS projects. All that Microsoft is trying to change (and barely succeeds at doing) is the public’s perception. Microsoft’s ads that seek to recruit moles state this explicitly. Under the supposed leadership of Satya N. Microsoft continues to extort FOSS using patents. Ballmer seems to be moving further away from Microsoft, but Gates who is the bigger bully (always has been) recrntly increased his role at Microsoft. Wired (Condé Nast) helps openwash Gates these days, but this is clearly part of the marketing charade. People like Mozilla’s CEO get pushed out with much help from Microsoft-linked press (never mind the bizarre nature of these tactics [1]), but a longtime criminal like Gates gets portrayed as a Saint. He buys media companies and pays many off, including a lot of blogs.

Speaking of marketing, watch Samsung‘s actions and this news about what Microsoft does to Android and Linux:

Microsoft sends astronauts to troll Samsung’s “Terminal Galaxy 5”

[•••]

With that said, Microsoft, you could’ve done better, though this is still a class above your ill-fated Scroogled campaign against Google.

Microsoft won’t get far with this strategy, but it sure can cause a lot of damage.

Related/contextual items from the news:

  1. Bill Maher rails against political correctness

    A few weeks ago, the CEO of Mozilla was forced to resign because it was revealed that in 2008, he supported Prop. 8, California’s ban on gay marriage. A bad law, yes, but 52% of Californians voted for it. Do they all have to resign? Obama was against gay marriage in 2008! Does he have to resign? Hillary came around just last year. Can she be President?

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

Further Recent Posts

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts