EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.01.16

Links 1/10/2016: Linux 4.7.6 and 4.4.23, Blender 2.78

Posted in News Roundup at 3:21 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • Linux Unable To Boot Lenovo Yoga 900 & 900; Is Microsoft At Fault?

      The popular device developer Lenovo has verified the claims that Lenovo Yoga 900 and 900s unable to boot Linux OS but only Microsoft Windows 10. The new Lenovo convertible laptop, Lenovo Yoga 900 and 900s, would reject and decline any attempt to install Linux operating system, making users turn their heads to Microsoft as the suspect for this issue.

      [...]

      This issue about the OS started when an identity of BaronHK posted on Reddit about installing Linux on the latest Lenovo Yoga book in which BaronHK encountered being blocked by a locked solid state drive (SSD) which Linux cannot define itself, and come up to link the issue to Microsoft.

  • Server

    • Why Good Linux Sysadmins Use Markdown

      The Markdown markup language is perfect for writing system administrator documentation: it is lightweight, versatile, and easy to learn, so you spend your time writing instead of fighting with formatting.

      The life of a Linux system administrator is complex and varied, and you know that documenting your work is a big time-saver. A documentation web server shared by you and your colleagues is a wonderful productivity tool. Most of us know simple HTML, and can whack up a web page as easily as writing plain text. But using Markdown is better.

    • How to Effectively and Efficiently Edit Configuration Files in Linux

      Every Linux administrator has to eventually (and manually) edit a configuration file. Whether you are setting up a web server, configuring a service to connect to a database, tweaking a bash script, or troubleshooting a network connection, you cannot avoid a dive deep into the heart of one or more configuration files. To some, the prospect of manually editing configuration files is akin to a nightmare. Wading through what seems like countless lines of options and comments can put you on the fast track for hair and sanity loss.

      Which, of course, isn’t true. In fact, most Linux administrators enjoy a good debugging or configuration challenge. Sifting through the minutiae of how a server or software functions is a great way to pass time. But this process doesn’t have to be an exercise in ineffective inefficiency. In fact, tools are available to you that go a very long way to make the editing of config files much, much easier. I’m going to introduce you to a few such tools, to ease some of the burden of your Linux admin duties. I’ll first discuss the command-line tools that are invaluable to the task of making configuration more efficient.

  • Kernel Space

    • Linux 4.7.6

      I’m announcing the release of the 4.7.6 kernel.

      All users of the 4.7 kernel series must upgrade.

    • Linux 4.4.23
    • Linux Kernel 4.7.6 Is Out with MIPS and OCFS2 Improvements, Updated Drivers

      Today, September 30, 2016, renowned Linux kernel developer Greg Kroah-Hartman announced the release of the sixth maintenance update to the latest stable Linux 4.7 kernel series.

      Linux kernel 4.7.6 comes only five days after the release of the previous maintenance version, Linux kernel 4.7.5, and, according to the appended shortlog and the diff from the last update, it changes a total of 76 files, with 539 insertions and 455 deletions. In summary, it updates multiple drivers, adds improvements to various filesystems and hardware architectures, and improves the networking stack.

    • Linux Kernel 4.4.23 LTS Has ARM and MIPS Improvements, Updated Filesystems, More

      Immediately after announcing the release of Linux kernel 4.7.6, Greg Kroah-Hartman proudly informed the community about the general availability of the Linux 4.4.23 LTS kernel.

      The Linux 4.4 kernel is a long-term supported branch, the latest and most advanced one, used in many stable and reliable GNU/Linux operating systems, including Ubuntu 16.04 LTS (Xenial Xerus) and Alpine Linux 3.4. Therefore, it is imperative for it to receive regular updates that bring fixes to the most important issues, as well as other general improvements.

    • From NFS to LizardFS

      If you’ve been following me for a while, you’ll know that we started our data servers out using NFS on ext4 mirrored over DRBD, hit some load problems, switched to btrfs, hit load problems again, tried a hacky workaround, ran into problems, dropped DRBD for glusterfs, had a major disaster, switched back to NFS on ext4 mirrored over DRBD, hit more load problems, and finally dropped DRBD for ZFS.

    • IBM’s Ginni Rometty Tells Bankers Not To Rest On Their Digital Laurels
    • BUS1, The Successor To KDBUS, Formally Unveiled — Aiming For Mainline Linux Kernel

      BUS1 has been in development as an in-kernel IPC mechanism building off the failed KDBUS project. An “RFC” will soon be sent out to Linux kernel developers about BUS1 and the subject will be discussed at next month’s Kernel Summit.

      David Herrmann, one of the BUS1 developers, presented at this week’s systemd.conf conference about the new capability-based IPC for Linux. He talked about how BUS1 is superior to KDBUS, how BUS1 is similar to Android’s Binder, Chrome’s Mojo, Solaris’ Doors, and other common IPC implementations.

    • A New Wireless Daemon Is In Development To Potentially Replace wpa_supplicant

      In addition to the BUS1 presentation, also exciting from the systemd.conf 2016 conference is a thorough walkthrough of a new wireless daemon for Linux being developed by Intel’s Open-Source Technology Center.

      Intel has been developing a new wireless daemon for Linux to potentially replace wpa_supplicant. This new daemon isn’t yet public but the code repositories for it will be opened up in the next few weeks. This new daemon has improvements around persistency, WiFi management, reduced abstractions for different operating systems and legacy interfaces, and changes to operation. This daemon is designed to be very lightweight and work well for embedded Linux use-cases especially, including IoT applications.

    • Graphics Stack

      • Libinput X.Org Driver Updated For X.Org Server 1.19

        Peter Hutterer has announced the release of a new version of xf86-input-libinput, the X.Org DDX driver that makes use of libinput for input handling on the X.Org Server.

      • xf86-input-libinput 0.20.0

        Most important fix is the use of input_lock() instead of the old SIGIO stuff to handle the input thread in server 1.19.

      • Mesa 13.0 Planning For Release At End Of October, Might Include RADV Vulkan

        Following the mailing list talk over the past two days about doing the next Mesa release, plans are being discussed for releasing at the end of October and it might have just got a whole lot more exciting.

        Emil Velikov, Collabora developer and Mesa release manager for the past several release series, has commented on that previously discussed mailing list thread. He mentioned he was secretly waiting in hopes of seeing the RADV Radeon Vulkan driver merged for this next release! He said he’d even be willing to see it merged even if it’s “not perfect/feature complete.”

    • Benchmarks

      • FreeBSD 11.0 Comes Up Short In Ubuntu 16.04 vs. macOS Sierra Benchmarks

        Yesterday I published some macOS 10.2 vs. Ubuntu 16.04 LTS benchmarks from a Mac Mini and MacBook Air systems. For those curious if BSDs can outperform macOS Sierra on Apple hardware, I tested the MacBook Air with FreeBSD 11.0 compared to the Linux and macOS results on that Core i5 system. Here are those results.

      • Early Benchmarks Of The Linux 4.9 DRM-Next Radeon/AMDGPU Drivers

        While Linux 4.9 will not officially open for development until next week, the DRM-Next code is ready to roll with all major feature work having been committed by the different open-source Direct Rendering Manager drivers. In this article is some preliminary testing of this DRM-Next code as of 29 September when testing various AMD GPUs with the Radeon and AMDGPU DRM drivers.

        Linux 4.9 does bring compile-time-offered experimental support for the AMD Southern Islands GCN 1.0 hardware on AMDGPU, but that isn’t the focus of this article. A follow-up comparison is being done with GCN 1.0/1.1 experimental support enabled to see the Radeon vs. AMDGPU performance difference on that hardware. For today’s testing was a Radeon R7 370 to look at the Radeon DRM performance and for AMDGPU testing was the Radeon R9 285, R9 Fury, and RX 480. Benchmarks were done from the Linux 4.8 Git and Linux DRM-Next kernels as of 29 September.

      • How Ubuntu 16.10 Beta 2 Performance Compares To Some Other Linux Distros

        The final Ubuntu 16.10 Beta for “Yakkety Yak” was released this week and we found its performance doesn’t differ much from Ubuntu 16.04 LTS (with the exception of the newer graphics stack) while here are some results comparing it to other modern Linux distributions.

        Tested for this quick, one-page-article comparison were Ubuntu 16.04.1 LTS, Ubuntu 16.10 Beta 2, Clear Linux 10660, Fedora 24, openSUSE Tumbleweed 20160927, and the Arch-based Antergos 16.9-Rolling release.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • Qt 3D WIP branches
      • New Qt 3D Functionality Is Being Worked On

        Sean Harmer of KDAB is organizing work around some upcoming “major Qt 3D features” for the open-source toolkit.

        It’s not known if the next round of Qt 3D features will be ready for the Qt 5.9 tool-kit release, but KDAB is looking to have these new branches for feature work with continuous integration coverage.

    • GNOME Desktop/GTK

      • GNOME Calendar App to Feature a New Sidebar, Week View & Attendees in GNOME 3.24

        GNOME developer Georges Stavracas wrote an in-depth blog post the other day to inform the GNOME, Linux, and Open Source communities about the upcoming improvements and new features coming to the GNOME Calendar apps.

        Now that some of us are already enjoying the recently released GNOME 3.22 desktop environment, the GNOME developers are hard at work to improve the GNOME apps and core components by either adding new exciting features and technologies or improving existing ones.

      • Cinnamon 3.2 in Linux Mint 18.1 Supports Vertical Panels, Better Accelerometers

        After informing the community a few days ago about the Mintbox Mini Pro PC and the upcoming improvements and new features shipping with the XApps software projects in Linux Mint 18.1, Clement Lefebvre just published the monthly Linux Mint newsletter.

      • Cross-compiling WebKit2GTK+ for ARM

        Of course, I know for a fact that many people use local recipes to cross-compile WebKit2GTK+ for ARM (or simply build in the target machine, which usually takes a looong time), but those are usually ad-hoc things and hard to reproduce environments locally (or at least hard for me) and, even worse, often bound to downstream projects, so I thought it would be nice to try to have something tested with upstream WebKit2GTK+ and publish it on trac.webkit.org,

      • Should we drop Vala?

        Is it Vala development a waste of time? Is Vala suitable for long term support libraries?

  • Distributions

    • LXLE: A Linux distro to give new life to old hardware

      I’ll bet that somewhere, perhaps at home and most likely at work, you’ve got some old hardware lying around. What to do with it? It still works but what’s it running? Windows XP? Vista? Windows 7 Starter or Home Basic?

      Yep, you’re stuck on some old version of Windows but moving that machine up to a newer version of Windows could be tricky ‘cause one or more of those old graphics cards and printer drivers have probably have fallen out of the update cycle.

      Even if those subsystems are still available, you’ll still have a problem as the newer OSs’ are pretty much guaranteed to suck the life out of old processors with the result that performance and therefore usability will be marginal at best.

      So, what to do? Before you start looking for a deal on a new machine and an e-waste disposal site, consider moving to Linux and, most specifically, consider migrating to LXLE, the LXDE eXtra Luxury Edition (though some people also claim it stands for Lubuntu Extra Life Extension).

    • OpenSUSE/SUSE

    • Red Hat Family

      • Red Hat, Logicalis in digital transformation partnership in Latin America

        PromonLogicalis, a provider of information technology and communication solutions and services in Latin America, and Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, announced a collaboration that aim to help organizations navigate the digital transformation of their infrastructures to pave the way for cloud and the software-defined technologies, and to advance open source technology awareness in the region.

        Open source is delivering significant advancements in many areas of technology through community-powered innovation, including cloud computing, mobile, big data, and more. And, as companies embrace modern technology as a competitive advantage via digital transformation efforts, many are turning to open source because of the flexibility and agility it can enable.

      • Finance

      • Fedora

        • PHP version 5.6.27RC1 and 7.0.12RC1
        • An Easy Way To Try Intel & RADV Vulkan Drivers On Fedora 24

          Fedora 25 should have good support for the open-source Vulkan Linux drivers (particularly if it lands the next Mesa release) while Fedora 24 users can now more easily play with the latest Mesa Git RADV and Intel ANV Vulkan drivers via a new repository.

          A Phoronix reader has setup a Fedora Copr repository that is building Intel’s Vulkan driver from Mesa Git plus the RADV Radeon Vulkan driver re-based from its source (David Airlie’s semi-interesting GitHub branch). Fedora COPR, for the uninformed, is the distribution’s equivalent to Ubuntu PPA repositories.

        • Meeting users, lots of users

          Every year, I introduce Fedora to new students at Brno Technical University. There are approx. 500 of them and a sizable amount of them then installs Fedora. We also organize a sort of installfest one week after the presentation where anyone who has had any difficulties with Fedora can come and ask for help. It’s a great opportunity to observe what things new users struggle with the most. Especially when you have such a high number of new users. What are my observations this year?

    • Debian Family

  • Devices/Embedded

Free Software/Open Source

  • 10 reasons why CIOs should consider open source software

    A recent survey shows 78 percent of companies run part or all of their operations on open source software. Indeed, open source continues to gain market traction as more companies adopt open technology to speed innovation, disrupt industries and improve overall productivity.

    Those who remain hesitant about adopting open source are in danger of being left behind. Because open source architecture lends itself to more frequent updates, and because of the openness, open source provides the freedom to innovate and mature in the way that enterprises need.

  • Kubernetes Arrives in New Flavors

    Kubernetes has taken center stage in recent days, and, as we’ve been noting in recent posts, the open source container cluster manager is heading in new directions. Google has just announced the release of Kubernetes 1.4, which makes the tool much easier to install.

    Meanwhile, Canonical has now launched its own distribution of Kubernetes, with enterprise support, across a range of public clouds and private infrastructure. It’s Kubernetes at the core, but features a number of extra bells and whistles.

  • 2016 Women in Open Source Award Winners

    We hope you enjoy and are inspired by this short video celebrating Preeti Murthy and Jessica McKellar, the winners of this year’s Red Hat Women in Open Source Awards.

  • Tech, talent and tools: The secret to monetizing open-source

    “In California during the gold rush, you didn’t make money digging for gold; you made money selling shovels,” said Mehta. A fitting metaphor for the idea that investing in talent and tools, especially tools, is how to turn a profit. The actual data, databases, algorithms and so on would be open source. Money would come from the tools to use that technology to benefit specific areas, such as automation of healthcare.

    And healthcare is a good place to start. “Big Data is all about making life cheaper, better. … If we forget about how to solve problems for humans, we’ve lost. We want to be known for enriching life,” said Mehta.

  • Changing the way we design for the web

    On the one hand, open source should mean lower cost of entry for people from poorer communities (like me, growing up). But on the other, I feel it is hard to contribute when under- or unemployed. I had a grant to work on the Web Animations API documentation, but I can’t do as much as I’d like with other animation features (motion paths, advanced timing functions) because I need to spend a lot of time working on my own business, getting paid.

    Essentially this leads to an awkward model where the only contributors are employed programmers—and when it comes to open source animation or design APIs, platforms, etc, this lack of user input really starts to show. Or, the only products with thriving open source development teams are those that have financially lucrative futures, turning the open source software (OSS) model into a capitalist one.

  • Asterisk 14 Improves Open-Source VoIP

    Digium, the lead commercial sponsor behind the Asterisk open source PBX project announced the release Asterisk 14 this week, continuing to evolve the decade old effort, making it easier to use and deploy.

  • Yahoo open-sources a deep learning model for classifying pornographic images

    Yahoo today announced its latest open-source release: a model that can figure out if images are specifically pornographic in nature.

    The system uses a type of artificial intelligence called deep learning, which involves training artificial neural networks on lots of data (like dirty images) and getting them to make inferences about new data. The model that’s now available on GitHub under a BSD 2-Clause license comes pre-trained, so users only have to fine-tune it if they so choose. The model works with the widely used Caffe open source deep learning framework. The team trained the model using its now open source CaffeOnSpark system.

    The new model could be interesting to look at for developers maintaining applications like Instagram and Pinterest that are keen to minimize smut. Search engine operators like Google and Microsoft might also want to check out what’s under the hood here.

    “To the best of our knowledge, there is no open source model or algorithm for identifying NSFW images,” Yahoo research engineer Jay Mahadeokar and senior director of product management Gerry Pesavento wrote in a blog post.

  • Events

  • Web Browsers

    • Chrome

      • CloudReady by neverware

        I thought I would put together a quick “installation” review of a product called CloudReady by neverware. What is CloudReady? CloudReady is basically a project to bring Chromium OS to those who would like to convert traditional laptops into Chromebook-like devices. I stumbled on them several months ago and finally decided to see how hard it was to install Chromium OS and how functional it actually was as a Chromebook-like device. I have a few low end (netbook-like) devices and I have been trying to figure out how I could make them functional for my boys, I thought this might be the solution.

    • Mozilla

      • Mozilla tells Firefox OS devs to fork off if they want to chase open web apps vision

        The Mozilla Foundation’s Firefox development team has decided enough is enough and will stop supporting Windows XP and Vista in March 2017 and also bin Firefox OS.

        The OS first. In this post Mozillans Ari Jaaksi and David Bryant, respectively the head of connected devices and veep for platform engineering, write that “By the end of 2015 Mozilla leadership had come to the conclusion that our then Firefox OS initiative of shipping phones with commercial partners would not bring Mozilla the returns we sought.”

        That decision means that “as of the end of July 2016 have stopped all commercial development on Firefox OS.”

  • SaaS/Back End

    • Cloudera Delivers Release Built on Apache Spark 2.0, and Advances Kudu

      Cloudera, focused on Apache Hadoop and other open source technologies,has announced its release built on the Apache Spark 2.0 (Beta), with enhancements to the API experience, performance improvements, and enhanced machine learning capabilities.

      The company is also working with the community to continue developing Apache Kudu 1.0, recently released by the Apache Software Foundation, which we covered here. Kudu is an open source columnar storage engine built for the Apache Hadoop ecosystem designed to enable flexible, high-performance analytic pipelines. Taken together, Cloudera’s new tools are giving it more diverse kinds of presence on the Big Data scene.

      Cloudera claims it was the first Hadoop big data analytics vendor to deliver a commercially supported version of Spark, and has participated actively in the open source community to enhance Spark for the enterprise through its One Platform Initiative. “With Spark 2.0, organizations are better able to take advantage of streaming data, develop richer machine learning models, and deploy them in real time, enabling more workloads to go into production,” the company reports.

    • Cloudera Delivers Enterprise-Grade Real-Time Streaming and Machine Learning with Apache Spark 2.0 and Drives Community Innovation with Apache Kudu 1.0
    • Vendors Pile on Big Data News at Strata

      Cloudera, Pentaho and Alation are among vendors making Big Data announcements at this week’s Strata event.

      Vendors big and small are making news at this week’s Strata + Hadoop event as they try to expand their portion of the Big Data market.

      Cloudera highlighted a trio of Apache Software Foundation (ASF) projects to which it contributes. Among them is Spark 2.0, which benefits from a new Dataset API that offers the promise of better usability and performance as well as new machine learning libraries.

    • New alliances focus on open-source, data science empowerment

      How can data science make a true market impact? Partnerships, particularly amongst open source communities. As IBM solidifies its enterprise strategies around data demands, two new partnerships emerge: one with Continuum Analytics, Inc., advancing open-source analytics for the enterprise; and another with Galvanize, initiating a Data Science for Executives program.

      Continuum Analytics, the creator and driving force behind Anaconda — a leading open data science platform powered by Python — has allied with IBM to advance open-source analytics for the enterprise. Data scientists and data engineers in open-source communities can now embrace Python and R to develop analytic and machine learning models in the Spark environment through its integration with IBM’s DataWorks Project.

      The new agreement between IBM and Galvanize, which provides a dynamic learning community for technology, will offer an assessment, analysis and training element for Galvanize’s Data Science for Executives program. This program empowers corporations to better understand, use and maximize the value of their data. The program will support IBM’s DataFirst Method, a methodology that IBM says provides the strategy, expertise and game plan to help ensure enterprise customers’ succeed on their journey to become a data-driven business.

    • Apache Spot: open source big data analytics for cyber
  • Oracle/Java/LibreOffice

    • TDF Releases Fresh Update to LibreOffice 5.2

      The Document Foundation today announced the availability of LibreOffice 5.2.2, the second update to the “fresh” 5.2 family. “LibreOffice 5.2.2, targeted at technology enthusiasts, early adopters and power users, provides a number of fixes over the major release announced in August.” These fixes include the usual number of import/export/filter fixes as well as a lot of interface adjustments and a few crashes.

      One of the more interesting import bugs fixed had first been reported 4 1/2 years ago. In version 3.5.0 when importing RTF files with several tables the formatting isn’t retained in all cases. The original reporter said this included column widths and placement. Comments updated the report throughout several versions on various systems. The bug sat for another year before being bumped and eight months later a patch was committed. After further input and more adjustments, Miklos Vajna committed patches for several versions including today’s 5.2.2.

  • Pseudo-Open Source (Openwashing)

  • BSD

    • OpenBSD 6.0 Limited Edition CD set (signed by developers)

      Five OpenBSD 6.0 CD-ROM copies were signed by 40 developers during the g2k16 Hackathon in Cambridge, UK.

      Those copies are being auctioned sequentially on ebay.

      All proceeds will be donated to the OpenBSD Foundation to support and further the development of free software based on the OpenBSD operating system.

  • FSF/FSFE/GNU/SFLC

    • Licensing resource series: Free GNU/Linux distributions & GNU Bucks

      When Richard Stallman set out to create the GNU Project, the goal was to create a fully free operating system. Over 33 years later, it is now possible for users to have a computer that runs only free software. But even if all the software is available, putting it all together yourself, or finding a distribution that comes with only free software, would be quite the task. That is why we provide a list of Free GNU/Linux distributions.

      Each distro on the list is commited to only distributing free software. With many to choose from, you can find a distro that meets your needs while respecting your freedom.

      But with so much software making up an entire operating system, how is it possible to make sure that nothing nasty sneaks into the distro? That’s where you, and GNU Bucks come in.

    • Friday Working together for Free Software Directory IRC meetup: September 30th
    • August and September 2016: photos from Pittsburgh and Fresno
    • Libre Learn Lab: a summit on freely licensed resources for education

      Libre Learn Lab is a two-day summit for people who create, use and implement freely licensed resources for K-12 education, bringing together educators, policy experts, software developers, hardware hackers, and activists to share best practices and address the challenges of widespread adoption of these resources in education. The 2nd biennial conference is Saturday, October 8th, and Sunday, October 9th, at the MIT Tang Center.

      The keynote addresses will be delivered by the FSF’s own Richard M. Stallman, former Chief Open Education Advisor Andrew Marcinek and founder of HacKIDemia Stefania Druga. At the event, there will be a special tribute to Dr. Seymour Papert (the father of educational computing) by Dr. Cynthia Solomon.

  • Programming/Development

    • Machine Learning with Python

      I first heard the term “machine learning” a few years ago, and to be honest, I basically ignored it that time. I knew that it was a powerful technique, and I knew that it was in vogue, but I didn’t know what it really was— what problems it was designed to solve, how it solved them and how it related to the other sorts of issues I was working on in my professional (consulting) life and in my graduate-school research.

      But in the past few years, machine learning has become a topic that most will avoid at their professional peril. Despite the scary-sounding name, the ideas behind machine learning aren’t that difficult to understand. Moreover, a great deal of open-source software makes it possible for anyone to use machine learning in their own work or research. I don’t think it’s an overstatement to say that machine learning already is having a huge impact on the computer industry and on our day-to-day lives.

Leftovers

  • Salesforce tries to block Microsoft’s LinkedIn acquisition

    Microsoft made a splash earlier this year when it announced the largest acquisition in its history, signing an agreement to buy LinkedIn for $26.2 billion. But now, Salesforce is trying to convince the European Union to block the deal.

    Salesforce Chief Legal Officer Burke Norton will argue to the EU’s competition authority that Microsoft’s control of LinkedIn’s dataset following an acquisition would be anticompetitive. EU competition chief Margarethe Vestager said in January that her agency would be looking directly at whether a company’s use of data is bad for competition, and these complaints seem aimed squarely at those comments.

    “Microsoft’s proposed acquisition of LinkedIn threatens the future of innovation and competition,” Norton said in a statement on Thursday. “By gaining ownership of LinkedIn’s unique dataset of over 450 million professionals in more than 200 countries, Microsoft will be able to deny competitors access to that data, and in doing so obtain an unfair competitive advantage.”

  • The Rise of the Helpful Operational Bots: ChatOps

    While some of the concepts surrounding ChatOps has been around for a long time, it is fair to say that the idea only really began to get traction within technical communities when Jesse Newland gave a talk on ChatOps at Github during PuppetConf 2012. Since 2012 we have seen a growth in interest in the new use of bots within operations.

  • Facebook Video Metrics Crossed The Line From Merely Dubious To Just Plain Wrong

    What happened here is actually pretty subtle, so bear with me. Facebook distinguishes “plays” from “views” — with the former being every single play of the video, including those auto-plays that you scroll straight past and never even look at, and the latter being only people who actually watched the video for three seconds or longer. Of course, there are still a million ways in which this metric is itself broken (I’ve certainly let plenty of videos play for more than three seconds or even all the way through while reading a post above or below them) but the distinction is a good one. All of the more detailed stats are based on either plays or views (mostly views) and are clearly labeled, but the one metric at issue was the “Average Duration of Video Viewed.” This metric could be fairly calculated as either the total amount of time from all plays divided by the total number of plays, or the same thing based only on time and number of views — but instead, it was erroneously being calculated as total play time divided by total number of views. In other words, all the second-or-two autoplays from idle newsfeed scrollers were being totalled up, and that time was being distributed among the smaller number of people who stayed on the video for more than three seconds as part of their average duration, leading to across-the-board inflation of that figure.

  • Journalist Tom Henderson on Cloud Vendor Lock-In

    This video is not technically about free or open source software, but it’s 100 percent about the danger of falling victim to proprietary vendors and their habit of making it hard to leave their sweet embrace once they get their paws on you. The Network World column by Tom Henderson that generated this interview is titled, The Many Dimensions of Cloud Value, and is subtitled, “Put your snorkels on: The marketing for cloud services is getting deep.” So is the marketing for many other proprietary something-as-a-something offerings ranging from operating systems to (obviously) cloud platforms.

  • Science

    • Why Deep Learning Is Suddenly Changing Your Life

      Over the past four years, readers have doubtlessly noticed quantum leaps in the quality of a wide range of everyday technologies.

      Most obviously, the speech-recognition functions on our smartphones work much better than they used to. When we use a voice command to call our spouses, we reach them now. We aren’t connected to Amtrak or an angry ex.

  • Health/Nutrition

    • Bayer Makes Deal With GMO Giant Monsanto

      That preemption bill was similar to other anti-local democracy measures peddled by the American Legislative Exchange Council (ALEC).

      From fracking bans to minimum wage and GMO labeling, ALEC and its politicians have successfully driven preemption efforts with its “model” legislation throughout different parts of the country at the behest of giant corporations.

      An Oregonian who leads a group with ties to Monsanto claimed he authored the bill, but as Lisa Arkin of the Pesticide Action Network North America noted both the Oregon bill and the ALEC bill share the same name and have the same core operative language and effect: “A local government may not enact or enforce a . . . measure, including but not limited to an ordinance, regulation, control area, or quarantine, to inhibit or prevent the production or use of agricultural seed, flower seed . . . or vegetable seed or products of agricultural seed, flower seed . . . or vegetable seed.”

      After the Oregon bill was introduced in 2013, it was taken to ALEC’s 40th anniversary meeting in Chicago, as the “Preemption of Local Agricultural Laws Act,” which is known as the “Monsanto Protection Act,” by its foes.

    • More Than 9 in 10 People Breathe Bad Air, W.H.O. Study Says

      The World Health Organization said Tuesday that 92 percent of people breathe what it classifies as unhealthy air, in another sign that atmospheric pollution is a significant threat to global public health.

      A new report, the W.H.O.’s most comprehensive analysis so far of outdoor air quality worldwide, also said about three million deaths a year — mostly from cardiovascular, pulmonary and other noncommunicable diseases — were linked to outdoor air pollution. Nearly two-thirds of those deaths are in Southeast Asia and the Western Pacific region, compared with 333,000 in Europe and the Americas, the report said.

      “When you look out through the windows in your house or apartment, you don’t see the tiny little particles that are suspended in the air, so the usual perception is that the air is clean,” Rajasekhar Balasubramanian, an air quality expert at the National University of Singapore who was not involved in the study, said in a telephone interview on Tuesday.

      “But the W.H.O. report is a clear indication that even in the absence of air pollution episodes, the concentrations of particles suspended in the air do exceed what’s considered to be acceptable from a health viewpoint,” he said.

      In previous studies, the W.H.O. estimated that more than eight in 10 people in urban areas that monitored air pollution were breathing unhealthy air and that about seven million deaths a year were linked to indoor and outdoor pollution.

  • Security

    • Linaro organisation, with ARM, aims for end-end open source IoT code

      With the objective of producing reference software for more secure connected products, ranging from sensors and connected controllers to smart devices and gateways, for the industrial and consumer markets, Linaro has announced LITE: Collaborative Software Engineering for the Internet of Things (IoT).

      Linaro and the LITE members will work to reduce fragmentation in operating systems, middleware and cloud connectivity solutions, and will deliver open source device reference platforms to enable faster time to market, improved security and lower maintenance costs for connected products. Industry interoperability of diverse, connected and secure IoT devices is a critical need to deliver on the promise of the IoT market, the organisation says. “Today, product vendors are faced with a proliferation of choices for IoT device operating systems, security infrastructure, identification, communication, device management and cloud interfaces.”

    • An open source approach to securing The Internet of Things
    • Addressing the IoT Security Problem

      Last week’s DDOS takedown of security guru Brian Krebs’ website made history on several levels. For one, it was the largest such reported attack ever, with unwanted traffic to the site hitting levels of 620 Gbps, more than double the previous record set back in 2013, and signalling that the terabyte threshold will certainly be crossed soon. It also relied primarily on compromised Internet of Things devices.

    • Linaro beams LITE at Internet of Things devices

      Linaro launched a “Linaro IoT and Embedded” (LITE) group, to develop end-to-end open source reference software for IoT devices and applications.

      Linaro, which is owned by ARM and major ARM licensees, and which develops open source software for ARM devices, launched a Linaro IoT and Embedded (LITE) Segment Group at this week’s Linaro Connect event in Las Vegas. The objective of the LITE initiative is to produce “end to end open source reference software for more secure connected products, ranging from sensors and connected controllers to smart devices and gateways, for the industrial and consumer markets,” says Linaro.

    • Don’t Trust Consumer Routers

      Another example of why you shouldn’t trust consumer routers. d-link

      It isn’t just this specific d-link router. We’ve seen the same issues over and over and over with pretty much every non-enterprise vendor.

      Plus we don’t want our devices used by crackers to DDoS Brian Krebs anymore, right?

      We are Linux people. We CAN do this ourselves.

    • D-Link DWR-932 router is chock-full of security holes

      Security researcher Pierre Kim has unearthed a bucketload of vulnerabilities affecting the LTE router/portable wireless hotspot D-Link DWR-932. Among these are backdoor accounts, weak default PINs, and hardcoded passwords.

    • The Cost of Cyberattacks Is Less than You Might Think

      What’s being left out of these costs are the externalities. Yes, the costs to a company of a cyberattack are low to them, but there are often substantial additional costs borne by other people. The way to look at this is not to conclude that cybersecurity isn’t really a problem, but instead that there is a significant market failure that governments need to address.

    • NHS trusts are still using unsupported Windows XP PCs

      AT LEAST 42 National Health Service (NHS) trusts in the UK still run Microsoft’s now-defunct Windows XP operating system.

      Motherboard filed Freedom of Information requests with more than 70 NHS hospital trusts asking how many Windows XP machines they use. 48 replied within the allotted time, and a whopping 42 of them admitted that they still use the operating system that reached end-of-life status in April 2014.

      Some of the culprits include East Sussex Healthcare, which has 413 Windows XP machines, Sheffield’s Children’s hospital with 1,290, and Guy’s and St Thomas’ NHS Trust in London with an insane 10,800 Windows XP-powered PCs.

      23 replied to Motherboard’s quizzing about whether they have an extended support agreement in place and, unsurprisingly, the majority said that they do not.

    • Friday’s security advisories
    • ICANN grinds forward on crucial DNS root zone signing key update

      The Internet Corporation for Assigned Names and Numbers is moving — carefully — to upgrade the DNS root zone key by which all domains can be authenticated under the DNS Security Extensions protocol.

      ICANN is the organization responsible for managing the Domain Name System, and DNS Security Extensions (DNSSEC) authenticates DNS responses, preventing man-in-the-middle attacks in which the attacker hijacks legitimate domain resolution requests and replaces them with fraudulent domain addresses.

      DNSSEC still relies on the original DNS root zone key generated in 2010. That 1024-bit RSA key is scheduled to be replaced with a 2048-bit RSA key next October. Although experts are split over the effectiveness of DNSSEC, the update of the current root zone key signing key (KSK) is long overdue.

    • Cybersecurity isn’t an IT problem, it’s a business problem

      The emergence of the CISO is a relatively recent phenomenon at many companies. Their success often relies upon educating the business from the ground up. In the process, companies become a lot better about how to handle security and certainly learn how not to handle it.

      As a CIO, knowing the pulse of security is critical. I oversee a monthly technology steering committee that all the executives attend. The CISO reports during this meeting on the state of the security program. He also does an excellent job of putting risk metrics out there, color coded by red, yellow, and green. This kind of color grading allows us to focus attention on where we are and what we’re doing about it.

  • Defence/Aggression

    • Congress May Rewrite Saudi 9/11 Law After Veto Override

      The two top Republicans in Congress said they’re prepared to rewrite legislation allowing victims of the Sept. 11 attacks to sue Saudi Arabia — less than 24 hours after Congress took the extraordinary step of overriding President Barack Obama’s veto of the measure to make it law.

      Both House Speaker Paul Ryan and Senate Majority Leader Mitch McConnell said that the measure could have unintended consequences — including the fact that it could leave U.S. soldiers open to retaliation by foreign governments.

      “I would like to think there’s a way we can fix so that our service members do not have legal problems overseas while still protecting the rights of the 9/11 victims,” Ryan told reporters Thursday, one day after his chamber voted 348-77 to override the veto.

      McConnell also said he was worried about unintended consequences of the measure, saying changes to the law might be needed.

      “It’s worth further discussing,” he told reporters Thursday. “It was certainly not something that was going to be fixed this week.”

    • Arab responses to 9/11 bill point to US interventions abroad

      Others support the bill, but point out that the U.S. is meanwhile backing a Saudi-led intervention in Yemen that has led to the deaths of thousands of civilians there.

      Two Arabic hashtags were trending on Twitter when the bill was passed, one referring directly to the Justice Against Sponsors of Terrorism Act, or JASTA, and the other simply titled: #TheAmericanTerrorism.

      Some Arabic Twitter users shared a photo montage that depicted U.S. military actions in Japan and Vietnam, as well as naked Iraqi prisoners in Abu Ghraib prison being humiliated by smiling U.S. troops. It read: “Japan, Vietnam, Iraq, Afghanistan can’t wait for JASTA to be implemented so they can, in turn, prosecute the U.S.”

      Another shared a 2005 Pittsburgh Post-Gazette editorial cartoon of a young boy on his father’s lap watching an image of the Hiroshima mushroom cloud and asking: “Which terrorist group did that?”

      One post shared more than 750 times included a clip with Arabic subtitles of stand-up American comedian Eddie Griffin talking about U.S. interventions in Iraq and Afghanistan, saying these wars are about “money, money, money.”

      The criticism, of course, is nothing new, says Eurasia Group’s Director for the Middle East and North Africa Ayham Kamel.

      “The Middle East, as a region where the U.S. has been dominant, has always been critical of U.S. policy,” he said.

    • Pakistan threatens to DESTROY India with nuclear bomb as atomic enemies edge to the brink of war

      PAKISTAN’S Defence Minister has threatened to “destroy” India – after India said on Thursday it had carried out “surgical strikes” on suspected militants preparing to infiltrate from Pakistan-ruled Kashmir.

      The strikes, which were a response to shots fired across the de facto border through the disputed Himalayan territory, could lead to a military escalation between the two nuclear-armed neighbours – risking a ceasefire agreed in 2003.

  • Transparency/Investigative Reporting

    • ‘We Believe in What We’re Doing’

      WikiLeaks is now 10 years old. SPIEGEL met with founder Julian Assange, 45, to discuss the whistleblower platform’s achievements and whether recent criticism leveled at the site is justified.

      SPIEGEL: Mr. Assange, 10 years after the founding of WikiLeaks, the whistleblower platform is again being criticized. WikiLeaks is said to have put millions of Turkish voters in danger. What is your response?

      Assange: A few days after the publication of internal emails from the Democratic National Committee, an entirely false story was put out that we had published the names, addresses and phone numbers of all female voters in Turkey. It is completely false. And it was and is simple to check. Power factions fight back with lies. That’s not surprising.

      SPIEGEL: Quite a few German journalists have long sympathized with WikiLeaks and also with Edward Snowden. But they aren’t impressed with the publishing of the DNC emails. Are you campaigning on behalf of Donald Trump?

      Assange: Our publication of the DNC leaks has showed that the Democratic National Committee had effectively rigged the primaries in the United States on behalf of Hillary Clinton against Bernie Sanders. That led to the resignation of leading members of the DNC, including its president Debbie Wasserman Schultz.

      SPIEGEL: People within the Clinton campaign have suggested that the DNC emails were given to you by the Russian secret service.

      Assange: There have been many attempts to distract from the power of our publications. Hillary Clinton is the favorite to win. As always, most media aligns with the presumptive winner even though their claimed societal virtue is to investigate those in power.

      SPIEGEL: The fact is, WikiLeaks is damaging Clinton and bolstering Trump.

      Assange: We’re not going to start censoring our publications because there is a US election. Our role is to publish. Clinton has been in government so we have much more to publish on Clinton. There is a lot of naivety. The US presidency will continue to represent the major power groups of the United States — big business and the military — regardless of who the talking head is.

      SPIEGEL: If someone submitted internal documents from the Trump campaign or the Republican Party, you would publish that as well?

      Assange: Yes, of course. That’s what we do.

    • CIA Took Three Years To Reject FOIA Request For Criteria For Rejecting FOIA Requests

      Curious about what criteria the CIA have for determining if they “can neither confirm nor deny” something? So did Jason Smathers, who back in 2010 filed one of MuckRock’s earliest requests for exactly that. Six years later, he still doesn’t know.

      Smathers first filed in October 2010 – to the agency’s credit, they only took a mere two months to get back to him.

    • Government Agencies Apparently Not Interested In Following Congressional Directives On Overclassification

      I’m not sure what this says about government transparency. Maybe it doesn’t say anything useful. Maybe it’s just the mixed signals we can expect from agencies only willing to make the most minimal transparency efforts. Or maybe it says something about the momentum of even slowly-moving large objects. A bureaucracy has a large turning radius and asking it to suddenly change its ways means you have to lower your expectations as to how “suddenly” should be defined. Whatever it says, it’s nothing good.

      Overclassification is a government-wide problem. Legislation has been passed to fix it. While the government expects the private sector to get right on it when laws are passed, it obviously cuts itself a lot more slack when faced with internal legislative redirection.

  • Environment/Energy/Wildlife/Nature

    • Climate justice meets racism: Standing Rock was decades in the making

      Attack dogs and waves of arrests by police in riot gear could look like isolated incidents of overreaction to the activism stemming from the Standing Rock reservation. But for the Lakota Sioux who live in these marginalized hillsides, the escalated militarization behind their battle against the Dakota Access pipeline is a situation decades in the making.

      North Dakota is not the whitest state in America, but it’s arguably the most segregated. More than 60 percent of its largest minority population, Native Americans, lives on or near reservations. Native men are incarcerated or unemployed at some of the highest rates in the country. Poverty levels for families of the Standing Rock tribe are five times that of residents living in the capital city, Bismarck. In Cannon Ball, the heart of the tribal community, there are rows of weathered government homes, but no grocery store. Tucked behind a lonely highway, this is where mostly white farmers and ranchers shuttle to and from homesteads once belonging to the Sioux.

    • Most people alive today set to witness dangerous global warming in their lifetime, scientists warn

      The world could hit two degrees Celsius of warming – the point at which many scientists believe climate change will become dangerous – as early as 2050, a group of leading experts has warned.

      In a report called The Truth About Climate Change, they said many people seemed to think of global warming as “abstract, distant and even controversial”.

      But the planet is now heating up “much faster” than anticipated, said Professor Sir Robert Watson, a former chair of the Intergovernmental Panel on Climate Change and one of the authors of the report.

      If their analysis is correct, it means the majority of people alive today will experience what it is like to live on a dangerously overheated planet.

    • 9 wonders of the world set to vanish forever: How many have you ticked off?

      This month, we learned that Spain was facing the prospect of becoming the first European Union member state to have a natural World Heritage Site make Unesco’s “danger list”. The Doñana coastal wetlands in Andalucía – home to the endangered Iberian lynx – is said to be under threat from a mining and dredging plan, as well as 1,000 illegal wells in the area.

      But it’s just one among a number of incredible sites the world over that, according to Unesco, could be lost forever. Here are just a few World Heritage Sites in Unesco’s danger zone that you might need to scrub off the bucket list.

    • To Reduce Haze and Save Indonesia’s Forests, Address the Root Cause of Fires

      Over the past few months we have seen heated debates over the problem of Indonesian forest fires and the associated haze in neighboring countries like Singapore. A new law in Singapore permits the prosecution of companies deemed to be responsible for causing such fires, and speculation about how the El Nino phenomenon might lead to particularly intense fires in the next month have drawn global attention to the issue.

      Three years ago, President Susilo Bambang Yudhoyono made a pledge to dedicate the remainder of his term in office to protect Indonesia’s environment and forests. Over the last three years he has done just that — with the historic moratorium on new logging concessions implemented in 2011, which has since been extended to May 2015. This policy has helped to protect more than 63 million hectares of primary forest and peat land, equivalent to an area larger than the landmass of Malaysia and the Philippines combined, and helped to lower Indonesia’s deforestation rate from 1.2 million hectares per year between 2003 and 2006, to between 450 and 600 thousand hectares per year since 2011. We also see the private sectors in the region stepping up their zero-deforestation commitments, including from the pulp and paper and palm oil industries.

    • Fires driving deforestation in Indonesia’s Leuser Ecosystem

      Indonesia’s Leuser Ecosystem lost 4,097 hectares of forest cover in the first six months of 2016, according to Forest, Nature and Environment of Aceh (HAkA), an NGO. At the same time, 187 fire hotspots were recorded in the nationally protected area during the period.

      “The hotspots overlay the forest cover loss in Aceh,” HAkA’s Agung Dwinurcahya said at a press conference in Jakarta. “For example, the high number of hotspots in Aceh Timur is the main contributor to deforestation in Aceh Timur.”

      Leuser, home to one of the Southeast Asian country’s last great swaths of intact rainforest, lies in Indonesia’s westernmost Aceh and North Sumatra provinces. It’s the only place in the world where orangutans, rhinos, elephants and tigers coexist in the wild.

    • Seven Popular Foods That Might Disappear Because of Climate Change

      Throughout history, different types of food have surged and dropped in popularity, and some foods that existed at one point just aren’t around anymore. But we’re not talking about foods that aren’t popular, quite the opposite in fact. Some of our favorite foods and drinks could be considered “endangered” because the places where they are grown are being severely impacted by climate change. If this isn’t proof that we need to do something about climate change, I don’t know what is. To start off, here are a few foods that are part of our everyday lives that might not be around for long.

  • Finance

    • In Wells Fargo Case, News Really Did Happen To An Editor

      Several years after I returned to New York from Oregon, I made a strange discovery. Bank accounts I was certain I had closed were inexplicably racking up service charges. It seemed bizarre, particularly because I had gone in person to a newly opened local branch of my West Coast bank to make sure the accounts were shut down.

      The failure to pay these charges (bills were sent to my old address and never caught up with me) resulted in penalties and a report to a credit agency. After an increasingly frustrating series of exchanges at the local branch, the bank agreed to wipe out the charges but said I would have to deal with the credit agencies on my own.

      It seemed outrageous, and as the editor in chief of an investigative news operation, I thought about asking Paul Kiel, ProPublica’s crack reporter on bank shenanigans, to take a look.

      But then I stopped myself.

      There’s an old saying in the journalism business for this sort of thinking: News is what happens to an editor.

      As with so many newsroom aphorisms, it’s meant to be proclaimed with an eye roll and a tone of deep sarcasm. Reporters view editor-generated stories as the bane of their existence, and not without reason. Random events and pet peeves are not often a great starting point for serious stories.

    • People born in the 1980s are HALF as wealthy in their thirties as people a decade older

      People born in early Eighties were around half as wealthy at age 30 as their counterparts who were born in the Seventies, analysis shows.

      The children of the “Baby Boomer” generation, currently in their early 30s, have an average net household wealth of £27,000 each a report by the Institute for Fiscal Studies, a think tank showed.

      By comparison the median wealth of those born in the 1970s had £53,000 on average by the same age. The figure takes into account housing, financial and private pension wealth.

    • Wealth of people in their 30s has ‘halved in a decade’

      People in their early 30s are half as wealthy as those now in their 40s were at the same age, a report finds.

      Today’s 30-something generation has missed out on house price increases and better pensions, according to research by the Institute for Fiscal Studies.

      Those born in the early 1980s have an average wealth of £27,000 each, against the £53,000 those born in the 1970s had by the same age, said the IFS.

      They will also find it harder to amass wealth in the future, it added.

      The think tank found that people born in the early 1980s were the first post-war group not to have higher incomes in early adulthood than those born in the preceding decade.

    • Children of Thatcher era have half the wealth of the previous generation

      The children of the Thatcher era have reached adulthood with half as much wealth as the previous generation, finds a major study published today.

      The report from the Institute of Fiscal Studies concludes people born in the early 1980s are the first post-war generation to suffer smaller incomes in early adulthood than those born 10 years before.

      A toxic mix of low interest rates and the calamitous crash of 2008 mean it is much harder to accumulate wealth, leaving them with meagre pensions and a lower rate of home ownership.

    • Basic Income — A concrete and financed proposal for Sweden

      I have now translated my proposal for basic income for Sweden, which I presented in Swedish some time ago.

      Although the proposal as such is strictly about Sweden and Swedish conditions, I am hoping that the reasoning and design principles I have applied may be of interest to basic income activists in other Nordic and European countries as well. In many ways, the welfare systems we have today are basically quite similar, and many of the problems we face are the same as well.

    • Portugal threatened with first treaty claim

      A Mexican company has threatened to bring a €42 million investment treaty claim against Portugal over a cancelled deal to privatise part of Lisbon’s public transport system.

      Grupo Autobuses de Oriente (ADO) announced last week that it had served a notice of dispute to the Portuguese government under the Mexico-Portugal bilateral investment treaty after negotiations proved “fruitless”.

      If the dispute reaches arbitration, it would be the first known investment treaty case that Portugal has faced – as well as a rare example of a Latin American multinational invoking a BIT to protect investments in a European state.

      The dispute relates to two “sub-concession agreements” that ADO, through its Spanish subsidiary Avanza, signed with Portugal’s then centre-right government under Prime Minister Pedro Passos Coelho in June 2015.

  • AstroTurf/Lobbying/Politics

    • Gary Johnson Is Not the Third-Party Candidate You’re Looking For

      With Hillary Clinton failing to provide a genuine voice for the 99% against Donald Trump’s bigoted fake-populism, a left-wing third-party candidate like Jill Stein can act as an important pole of attraction for a section of workers and youth sick and tired of the status quo. But Stein isn’t the only third-party challenger to Trump and Clinton. Gary Johnson, the former Republican governor of New Mexico, is running for president under the Libertarian Party. Johnson has been consistently outpolling Stein, and some polls even show Johnson beating Stein among former Bernie Sanders supporters.

      Given his polling results, Johnson may appear to be the best bet for building a viable challenge to the two-party system. And Johnson has a number of progressive positions on certain isolated issues, such as support for the legalization of marijuana and opposition to government surveillance. But, as socialists, we have to be clear that Gary Johnson, and libertarian politics in general, are a dead end for anyone trying to build a voice for the 99%.

    • Hacked Audio Reveals Hillary Clinton Sees Herself Occupying “Center-Left to Center-Right”

      In the hacked recording of a private conversation with campaign donors in February, Hillary Clinton distanced herself from progressive goals like “free college, free healthcare” and described her place on the political spectrum as spanning from the center-left to the center-right.

      Clinton has been inconsistent in the past about espousing political labels. She has at times touted herself as stalwart liberal. For instance, she said last July: “I take a backseat to no one when you look at my record in standing up and fighting for progressive values.” But a few months later, she told a group in Ohio: “You know, I get accused of being kind of moderate and center. I plead guilty.”

      The newly disclosed comments came in audio, apparently from hacked emails, that was revealed this week by the Washington Free Beacon, a conservative blog run by a Republican communications strategist. Clinton was speaking at a Virginia fundraiser hosted by Beatrice Welters, the former U.S. ambassador to Trinidad and Tobago, and her husband Anthony Welters, the executive chairman of an investment consulting firm founded by former Clinton aid Cheryl Mills.

      Clinton’s opponent at the time, Sen. Bernie Sanders, was pointing to successful programs in Norway and Sweden, which provide universal daycare, family leave, and government sponsored healthcare and college education, as policies that he would seek to adopt.

  • Censorship/Free Speech

    • Palestinians boycott Facebook over ‘censorship’

      Palestinian activists have recently launched a campaign to boycott Facebook after the popular social-media platform blocked several Palestinian accounts and deleted numerous posts – at Israel’s request – for alleged “incitement”.

      Earlier this week, campaigners – using the hashtag #FBCensorsPalestine – called on supporters to refrain from posting on Facebook between 8 p.m. and 10 p.m. (Jerusalem time) on Sept. 25.

      Hussam al-Zayegh, the campaign’s Gaza-based spokesman, told Anadolu Agency that the initiative had been launched in response to what he described as Facebook’s “pro-Israel bias”.

      According to al-Zayegh, the world’s most popular social-networking site is actively working to undermine Palestinian activists and journalists who rely on Facebook to help spread their message.

    • Palestinian Activists Are Angry About Alleged Facebook Censorship

      Palestinian activists are running an online campaign to hold Facebook accountable after the social media giant deleted a number of pro-Palestine posts and suspended several Palestinian journalists’ accounts.

      Quds News Network and other publications launched the hashtag #FBCensorsPalestine on Friday, when news emerged that seven Palestinian journalists associated with popular outlets in Israeli-occupied Palestinian territories had their accounts shut down for “violating community guidelines.”

      According to the seven journalists, four of whom work for Shehab News Agency and three of whom work for Quds, Facebook provided no further explanation of what standards were violated.

    • Donald Trump and the Return of Seditious Libel

      In 1733, New York printer John Peter Zenger began publishing the eighth newspaper in the American colonies, and the first willing to venture criticism of the government. The New-York Weekly Journal was the second paper in a city of 10,000 or so people, 1700 of them slaves.

      As we are reminded in Richard Kluger’s comprehensive new book, “Indelible Ink,” the first full-length account of Zenger’s travails, by 1735, Zenger (and the likely editor of his paper, James Alexander) had so offended Britain’s royal governor of New York and New Jersey, William Cosby, that Cosby brought suit against Zenger for seditious libel—the crime of criticizing the government. Under the law then in effect in Britain and its colonies, truth was not a defense to this charge. The leading legal treatise of the day explained that “since the greater appearance there is of truth in any malicious invective, so much the more provoking it is.” And: “The malicious prosecution of even truth itself cannot… be suffered to interrupt the tranquility of a well-ordered society.” This was deemed especially the case with true attacks on those in power, as they would have “a direct tendency to breed in the people a dislike of their governors and incline them to faction and sedition.”

    • Thoughtless and dangerous EU approach to free speech online

      There is a lot of ambiguity when it comes to the EU cooperation with Facebook, Twitter, Youtube/Google and Microsoft to censor the Internet – the Joint Referral Platform.

      On the one hand, it has been marketed as a tool to stop »radicalization« that could lead young people to religiously motivated violence, e.g. terrorism or joining the Islamic State in the Middle East.

      On the other hand, in documents and speeches the EU is totally focused on this project to stem »illegal online hate speech«, e.g. when it comes to racism and Islamophobia.

      On that account, what is deemed to be »illegal« adds to the confusion. Incitement to violence is clearly and reasonably within this definition. But when it comes to the broader definition of hate speech, laws vary between EU member states.

    • Chinese Communism’s Anniversary Shines Light On Censorship — In America

      Due to SAPPRFT restrictions, all American movie scripts are vulnerable to “requested” changes or self-censorship based on the Communist Party’s wishes.

    • Popular YouTuber Experiments With WebTorrent to Beat Censorship

      A popular YouTuber is experimenting with torrent-based technology in order to take control of his content and avoid third-party censorship. Bluedrake says that the potential for freedom when using WebTorrent “blows his mind” and has already carried out tests to get the project underway.

    • Banned Book Week brings awareness to censorship, individual choices

      Banned Books Week is from Sept. 25 to Oct. 1.

      This year will be the 34th anniversary of Banned Books week. The last week of September) will be when words will attempt to overthrow unnecessary censorship.

      After all, in the words of Laurie Anderson “censorship is the child of fear and the father of ignorance.”

      The heat-wave surrounding censorship of books sent the media in a frenzy in the 1980s, urging society to fight against authority, ensuring that there would be a change in social behavior and moral values.

    • Orwell 2016: Censorship in the age of social media

      If George Orwell is watching from above, he must be impressed. In his novel 1984, what was meant as a cautionary tale against government control and intellectual obscurantism, seems to have come to pass without our full knowledge.

      Where have our media taken us?

      To be brutally honest, I would say down the yellow brick road and around the tree a few times over already. As our world has become more and more dependent on media, we have opened ourselves up to the bite of censorship, control and the ever-evolving deity which is ‘social trend’.

      In other words, our need to be “connected” has pretty much left us dependent on information technology.

    • Singapore court sends teen blogger back to jail for criticising religion
    • Singapore rebel teen jailed for anti-religion posts
    • Singapore Teen Gets 6 Weeks in Jail for ‘Intending to Wound’ God’s Feelings
    • Teen blogger jailed in Singapore for insulting Muslims, Christians
  • Privacy/Surveillance

    • The “Pardon Snowden” Case Just Got Stronger

      Yesterday, the Department of Justice Inspector General (DoJ IG) issued a long overdue Congressionally-mandated report on FBI compliance with the PATRIOT Act’s Section 215 “business records” provision between 2012 and 2014. It is the first such report issued that covers the initial period of Edward Snowden’s revelations about widespread domestic mass surveillance by the federal government. Since his indictment for leaking the information to the press, Snowden’s lawyers have argued that he should not be prosecuted under the WW I-era Espionage Act because his revelations served the public interest.

    • Intel Community To Institute Actual Whistleblower Award For ‘Speaking Truth To Power’

      The Intelligence Community is looking to reward whistleblowers for “speaking truth to power.” No, seriously. Steven Aftergood of Secrecy News has posted a recent Intel Community announcement [PDF] that looks to fold a whistleblower honor into the community’s existing awards program.

      This is part of the intel community’s cautious foray into the harsh sunlight of transparency — itself a response to a presidential directive that our nation’s spies head outside for a bit and expose themselves a bit.

      The award may as well be called the “Snowden.” But the wording makes it explicit Snowden himself will never be eligible to receive the honorific fruits of his whistleblowing.

    • How Bulk Interception Works

      Mobile digital devices are ever more ubiquitous, generating new forms of data in quantities that continue to grow exponentially. Moreover, the costs of storing data have decreased drastically, and continue to do so every year. Most importantly, the technical means of combining datasets and analyzing this vast trove of data have advanced so rapidly that what were previously considered meaningless or incoherent types and amounts of data can now produce incredibly revelatory analyses. Metadata is structured in such a way that computers can search through it for patterns faster and more effectively and learn more about us than similar searches through the actual content of our communications.

    • The secret smartphone war over the struggle for control of the user

      There’s a war going on behind closed doors for control of your smartphone. It’s between the phone makers and the operators, but it’s not over privacy or data or cost – it’s over you.

      The battles are raging over who owns the consumer and your phone: is it the buyer or the manufacturer? And is the smartphone a device you purchase, or a service you pay for monthly?

      The boom years for the industry, when a smartphone was a user’s first, are long gone in developed nations with most smartphones now sold to people who already have one. In the US and UK market penetration has hit roughly 85%. This means the growth a phone maker needs each year can only come at the expense of a competitor. And that has changed how the manufacturers see the market.

      Marina Koytcheva, director of forecasting at CCS Insight says: “After years of analysts and commentators talking about mobile phone market peaking within the visible horizon, it has now reached that point.”

      The research firm expects total mobile phone sales to decline by 1.3% this year over last, with smartphones accounting for almost three-quarters of the market and up only 4.1% globally.

  • Civil Rights/Policing

    • Cops Dodge 4th Amendment By Phoning In ‘Anonymous’ Tips; Watch Their Drug Bust Vanish After They’re Exposed

      The two horses called in tips twice, resulting in searches of two residences. Despite costing them a nice drug bust and successful prosecution, both the DA (Shane Scanlon) and the Chief of Police (Carl Graziano) are defending not only the faux tipsters’ actions, but their work as law enforcement officers as well.

    • NYPD sent undercover officers to Black Lives Matter protest, records reveal

      Legal papers filed by the New York police department reveal that the department sent its own undercover officers to protests led by Black Lives Matter after the death of Eric Garner. The NYPD documents also show that it collected multimedia records about the protests.

      The NYPD disclosed its undercover operations in response to a group of New York attorneys requesting records under the state freedom of information law. The department has thus far declined to provide the records requested. But its descriptions in August court filings of the records it is refusing to release provide new details about its monitoring of protests at Grand Central Station:

      The first set contains “multimedia records” relating to the petitioners’ request for “pictures, videos, audio recordings, data, and metadata” collected or received by the NYPD at the Grand Central Station protests, which Black Lives Matter groups are still leading, according to the NYPD response.

      The second “consists entirely of communications between and among NYPD undercover officers and their handlers”, pertaining to the protests. According to a 22 August NYPD Memorandum of Law, these undercover communications “consist primarily of immediate impressions concerning ongoing events”.

    • FBI, DOJ And Their Forensic Scientists State They’ll Continue Using Discredited Junk Science To Put People Behind Bars

      For dozens of years, criminal prosecutions have relied on junk science. Forensic science, properly applied, can actually provide matches that identify suspects. But it’s not properly applied. In the hands of the DOJ, forensic evidence examination is a closed loop. Outside scientists have been granted access to the DOJ’s DNA work, but everything else — from fingerprints to hair samples — has been locked away in the government’s database.

      Still, the DOJ insists its science is solid, something it bases on confirmation bias. The matches determined in its forensic labs are “scientifically certain” because the DOJ’s expert witnesses have said so in court. Not only are outside scientists locked out of examining evidence and forensic processes, but defense lawyers are as well.

      The DOJ has finally decided to dial back its “scientific certainty” a bit by issuing guidance instructing its experts to not make this claim in court. This follows years of bogus matches being presented as sure things by forensic experts in court, leading to an unknown number of false convictions. This step back is a step forward for an agency that is mostly unwilling to admit to any mistakes or wrongdoing.

    • Video released shows officers shooting 6-year-old

      A Louisiana judge released body cam video Wednesday showing officers firing multiple rounds into a car, unknowingly striking and killing a 6-year-old boy.
      The incident, which happened in September 2015, resulted in the indictments of two marshals on second degree murder and second degree attempted murder charges.

      The marshals began pursuing the car after they witnessed an argument between a man and his girlfriend in front of a local bar, a source told CNN. Officers moved to detain the man, identified as Christopher Few, who took off in his car.
      The pursuit ended in gunfire on a dead-end street in Marksville, Louisiana.

    • Massachusetts Detective who Threatened to Murder Teens and Plant Drugs Won’t Be Fired or Charged

      A Springfield, Massachusetts narcotics detective has been placed on leave for 60 days, but not fired, after videos surfaced showing him threatening to murder two teenagers and plant drugs on them — videos which have cast doubt on the detective’s numerous drug cases.

      Detective Gregg A. Bigda was caught on video on February 26 at the Palmer Police Department, where he interrogated two teenagers, who along with a third teen were suspected of stealing an undercover police car outside a pizza shop, when he made the threats, according to a report on MassLive.com.

    • New Jersey Woman Forced into Mental Facility for Video Recording Courthouse

      It was a beautiful day in Freehold, New Jersey, so Jen Coombs decided to do First Amendment audits at the Monmouth County jail and courthouse to see how well officials there would respect her right to record in public.

      The New Jersey woman who runs a Facebook page called Time to Stand – New Jersey ended up forced into a mental facility against her will for four days. Not that it kept her from doing another First Amendment audit on the same courthouse upon her release.

      It all started on September 15, 2016 when Coombs made her way around the public areas of the facility and was approached within minutes by two jail employees who seemed determined to snatch the camera out of her hand before even asking her what she was doing.

      It wasn’t just her camera they were after. Coombs was immediately placed in handcuffs and her car keys were taken. Police then used her keys to find her parked car.

      Officials did not stop at just running her tags to get her information though. They used the keys to open her car and rummage around inside in an apparent search for something, anything, to charge her with.

    • Christian boy, 16, facing DEATH PENALTY for offending Muslims in Facebook post

      The boy has been arrested and charged with blasphemy after a photo of the Kaaba in Mecca, one of the holiest sites in Islam, appeared on his profile.

      A Muslim man told police the image, which was part of an alleged derogatory post against Islam on the boy’s profile, was insulting and sacrilegious.

      The black cube-shape is built around an ancient stone at the centre of Islam’s most sacred mosque Al-Masjid al-Haram in Mecca, Saudi Arabia.

      Locals reportedly claimed the image showed the Kaaba with a pig’s head on top.

    • Is It Still An Anonymous Tip If It’s Me?

      In Lackawanna County, Pennsylvania, two police officers found a way to get around one of those annoying loopholes that prevent them from locking up people who are guilty, guilty, GUILTY!!! The loophole is known to the rest of us as “The Fourth Amendment,” which states (among other things) “that no warrant shall issue except upon probable cause.”

      Detective Harold Zech and Lawrence Spathelf didn’t have probable cause to search the homes of Albert McCullough and Dakeem Booker, so they made their own. They phoned in “anonymous” tips to McCullough’s and Booker’s parole officers, who searched their and found some heroin.

    • New Guantánamo intelligence upends old ‘worst of the worst’ assumptions

      The “Dirty 30” probably weren’t all Osama bin Laden bodyguards after all. The “Karachi 6” weren’t a cell of bombers plotting attacks in Pakistan for al-Qaida. An Afghan man captured 14 years ago as a suspected chemical weapons maker was confused for somebody else.

      An ongoing review shows the U.S. intelligence community has been debunking long-held myths about some of the “worst of the worst” at Guantánamo, some of them still held today. The retreat emerges in a series of unclassified prisoner profiles released by the Pentagon in recent years, snapshots of much larger dossiers the public cannot see, prepared for the Periodic Review Board examining the Pentagon’s “forever prisoner” population.

    • DEA’s Army of 18,000 Informants Pocketed $237 Million Over Five Years

      It’s no secret that the Drug Enforcement Administration relies heavily on an army of confidential sources — men and women compelled, coerced, or enticed to share information with law enforcement, sometimes to alleviate their own legal troubles, sometimes for cash.

      Precisely how those relationships play out, however, is often shrouded in secrecy.

      A recently published audit by the Department of Justice has now offered a startling glimpse behind the scenes of those operations, revealing a world in which hundreds of millions of dollars have been doled out to thousands of informants over the last five years. Those informants include package delivery personnel, bus company employees, and Transportation Security Administration agents moonlighting as drug war spies — all operating with abysmal oversight and scant evidence of return on investment.

    • Military-Style Raid Ends Native Prayer Against Dakota Pipeline

      Up to 21 people were arrested during a peaceful prayer service.

      North Dakota police with military-style equipment surrounded Native Americans gathered in prayer against the construction of the Dakota Access pipeline on Wednesday, disrupting their plan to cross sacred and treaty-protected land in protest of a project they fear will destroy their livelihood.

    • U.S. Court Of Appeals Upholds Ruling That New Hampshire’s Silly Ballot Selfie Ban Violated The First Amendment

      You may recall that roughly a year ago, a federal judge struck down a New Hampshire law that made “ballot selfies” illegal. The state had essentially updated its laws revolving around limiting the ability to sell votes or influence the public through depicting who a person voted for to include criminalizing anyone that took a picture of their completed ballot and shared it on social media. The state had said that allowing that sort of thing encouraged voter corruption, with the idea that ballot selfies would be used as a form of proof that a bought vote had been completed, or might otherwise be used to influence other members of the public as to how to vote. It was a strange theory, given how unlikely it would be for a corrupted voter to post evidence of his or her corruption on Facebook, not to mention that stating that a person essentially couldn’t engage in a form of political speech via a picture was flatly unconstitutional. The federal judge agreed.

    • Border Patrol Agent Caught Watching Porn On The Job Blames The Internet Filter For Not Stopping Him

      We talk about porn filters occasionally here at Techdirt. Usually those discussions revolve around how useless and easily circumvented those filters are, even as the more clueless in government insist that we need more of this non-filtering filtering. This is not one of those stories. Instead, it is the story of one of the most tone-deaf individuals with a penchant for excuse-making I’ve ever come across.

      We start with Gizmodo, a website that used to be owned by Gawker Media until a rich guy decided to show America exactly what a rich guy with a lot of money could do and had Gawker shut down, presumably then diving into a pile of gold coins and rubbing hundred dollar bills on his nipples. Gizmodo recently filed an FOIA request to get at documents involving the misuse of computer equipment with the Department of Homeland Security. The site was hoping to see if there were any cases of overreach and abuse of technology by the department. Instead, it uncovered four cases of people watching porn, including one really special case involving a border patrol agent that simply would not stop looking at porn while on the job.

  • Internet Policy/Net Neutrality

    • Ridiculously Stupid: 4 State Attorneys General File Totally Bogus Lawsuit Against Internet Transition

      Okay, this is really dumb. What is it about state attorneys general making totally bullshit claims? It seems to happen with fairly consistent frequency. The latest is that four state AGs (from Arizona, Texas, Oklahoma and Nevada) have filed a lawsuit to stop the IANA transition. If you don’t recall, we’ve written about this a bunch. A bunch of people are up in arms over something they don’t seem to understand. The IANA transition is a good thing. It’s not the US government handing over the internet to Russia and China as you may have heard. It’s the Commerce Department severing an almost entirely symbolic link between it and a very specific internet governance capability concerning top level domains. And it’s important to complete the transition because other countries (including Russia and China) keep pointing to this symbolic link as a reason for why they should have more say in internet governance. Getting rid of the link keeps the internet functioning as it has for decades — and takes away a weapon from Russia and China. More importantly, going back on the transition now actually gives even more ammo to Russia and China, allowing them to point to unilateral actions by the US gov’t to block a process that everyone had agreed upon earlier.

      Anyway, to the actual lawsuit. It’s dumb. It’s really dumb. If you live in Arizona, Texas, Oklahoma or Nevada, you should be embarrassed for your Attorneys General. Elect better ones next time, please. First of all, they have no standing whatsoever to file this lawsuit. The IANA/top level domain system is not those states. They have no claim here other than “HEY LOOK! POLITICAL FOOTBALL THAT WE CAN GRANDSTAND OVER!” That does not give them standing. The best they can come up with for claiming standing is… uh… “hey, we have some websites.” No, really.

    • Judge Says No Way To Attorneys General Looking To Block IANA Transition

      Well, this isn’t much of a surprise, but following the ridiculous last minute attempt to block the IANA transition by four state attorneys general (who have absolutely no standing or argument), a judge has flatly denied their request for an injunction meaning that the transition is a go for midnight tonight, barring any really last minute unforeseen methods to block it (or a desperate leapfrog to an appeals court).

      Having spent part of the morning responding to clueless conspiracy theorists on my earlier post, I’m sure you’re going to hear the standard ridiculous lizard people warnings about how this is enabling “the UN” or “leftists” and “globalists” to “takeover” the internet and how it will allow China to build the “Great Firewall” into the core functioning of the internet. None of that is even remotely true. What happens tonight at midnight is… nothing, basically. ICANN, which has managed the IANA function through its multistakeholder process for almost two decades… will continue to do so. Nothing changes. The only “change” is that the US Commerce Dept. no longer has to issue a contract to ICANN for the IANA functions. And that’s it.

    • Net Neutrality: BEREC on the Right Path, Let’s Keep the Pressure on

      Net Neutrality is one of central challenge in the application of fundamental rights in the digital space. Too often it has been only considered as a technical or commercial issue, but it has serious impact on the real exercise of right to freedom of speech, right to information and on how the society build and think of itself; but also has important impacts on industrial and commercial issues. La Quadrature du Net has followed this issue since its start in the European debate circa 2009 by trying to defend a definition and wording in EU law of a strict Net Neutrality, protecting users and guaranteeing opportunities of development in a sane digital environment. As the BEREC guidelines for the Telecom Regulation adopted in October 2015 have been published, it is time to come back on the few years of campaign and to present the next fights and challenges for fundamental rights.

      La Quadrature du Net has defended, since 2009 and the first announces of EU works on Net Neutrality, an approach based on the defence of fundamental rights: to secure Net Neutrality, it is to defend the access of all to the Internet network, it is to allow to receive and send information with the same condition for all, it is to guarantee technical condition to a free and fair exercise of freedom of speech and information.

      It was not self-evident: as soon as the subject was within the speeches of Telecom operators and big digital companies, everything was made to consider Net Neutrality only from the perspective of financing Internet traffic and not as a major issue for the balance of the network that determines the quality of access and circulation of the information and services for the users as a whole.

    • A Massive Cable Industry Disinformation Effort Just Crushed The FCC’s Plan For Cable Box Competition

      Back in February the FCC proposed a new plan to bring competition to the cable box. Under the plan, cable providers would need to provide their programming to third party hardware vendors without the need for a CableCARD. The goal? Bring some competition to bear on a stagnant, captive market, resulting in cheaper, more open, and higher quality cable boxes. But because the plan would demolish $21 billion in rental fees while eroding sector control, the cable industry launched one of the most unprecedented lobbying and disinformation efforts I’ve ever seen in 16 years of covering the sector.

      Politicians loyal to the cable industry wrote letters lambasting the FCC for “jeopardizing the incredible evolution of video distribution services,” falsely comparing the idea to Popcorn Time. A flood of editorials magically began appearing in newspapers country wide claiming the FCC’s plan would boost piracy, hurt consumer privacy, and even “steal the future.” The cable sector even trotted out Jesse Jackson, who claimed in a horribly misleading op-ed that increased cable box competition was akin to the “snarling dogs, water hoses and church bombings” of America’s racist history. Seriously.

  • DRM

    • Racing Game Developers Sacrifice Playability On The Altar Of Anti-Piracy, Deliver Laggy Mess To Paying Customers

      So much for the advantages of PC gaming. Build a rig to your specifications and company reps tell you to use bog-standard settings to keep from being tripped up by anti-piracy and anti-hacking asset checks. If gamers wanted a one-size-fits-all gaming experience, they’d have settled for the console version. And there’s no guarantee that will work. The problem has been linked to on-the-fly decryption of game assets, which isn’t going to be solved in all cases by using default video settings.

      There’s a fix on the way but it’s tough to see how the developers are going to get around built-in asset checks that run through Windows EFS. There’s no easy “switch” to turn that off. While I understand developers are concerned about software piracy and cheaters/hackers ruining the online experience of honest players, there’s simply nothing to be gained by irritating those who’ve spent perfectly functional money on deliberately-broken software.

  • Intellectual Monopolies

    • Time To Talk Digital Issues At WTO With Focus On Developing Countries, Forum Hears

      Now is the time for those who want to bring new voices to the digital trade and general trade debate involving the World Trade Organization, says an adviser to a leading security think tank in Switzerland.

      “If the objective is for trade policy to effectively bring in non-traditional voices this is a perfect time for that to take place,” Nick Ashton-Hart, a consultant and associate fellow for the Geneva Centre for Security Policy said at the WTO’s 27-29 September Public Forum yesterday.

    • Uber hires former Google licensing executive in what could be a familiar pre-IPO play

      In a major move in the licensing community, former Google patent executive Kurt Brasch has moved to Uber as senior manager, patents. He joins an IP team led by fellow former Google employee Michael Meehan who jumped ship in February of this year.

      Brasch left Google earlier in the summer as the search giant let go of most of the legacy licensing team that it had picked up through its 2012 acquisition of Motorola Mobility.

      At Google he played a role in the Patent Purchase Promotion and its recent industry-wide successor IP3; helped launch the Patent Starter Program designed to encourage start-ups to join the License on Transfer Network; and led the team behind the 2014 cross licence with Cisco. That series of successes last year led this blog to name him as one of the IP personalities of 2015.

    • Gurry Speaks On Allegations For First Time As WIPO Members Discuss Actions

      Heading into next week’s annual UN World Intellectual Property Organization General Assemblies, WIPO member states are considering a report from the United Nations investigations office regarding allegations of wrongdoing made involving WIPO Director General Francis Gurry. And for first time since the allegations arose, Gurry has offered his defence. Spoiler alert: he neither confirmed nor denied it but raised questions about the legality of sharing the report with member states.

    • Trademarks

      • Supremes to rule on feds’ trademark censorship

        The U.S. Supreme Court has agreed to review the case alleging improper government censorship of a trademark for a band named The Slants, a precedent that also likely will impact significantly the current fight over the Washington NFL team’s name, the Redskins.

        According to the Rutherford Institute, which filed a friend-of-the-court brief in support of the band’s name, the censorship “openly discriminates against speech on the basis of content and viewpoint, violating the most fundamental constitutional guarantees to freedom of expression under the First Amendment.”

        The Asian-American dance rock band sued after the federal government, through its U.S. Patent and Trademark Office, censored them.

      • Can you trademark an offensive name or not? US Supreme Court to decide

        The Supreme Court on Thursday said it would decide, once and for all, whether federal intellectual property regulators can refuse to issue trademarks with disparaging or inappropriate names.

        At the center of the issue is a section of trademark law that actually forbids the US Patent and Trademark Office (USPTO) from approving a trademark if it “consists of or comprises immoral, deceptive, or scandalous matter; or matter which may disparage or falsely suggest a connection with persons, living or dead, institutions, beliefs, or national symbols, or bring them into contempt, or disrepute.”

09.29.16

Links 29/9/2016: Russia Moving to FOSS, New Nmap and PostgreSQL Releases

Posted in News Roundup at 8:53 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Microsoft is no longer Russia’s first choice of technology provider

    Moscow plans to open the replacement cycle by swapping Exchange and Outlook for email systems developed by New Cloud Technologies and distributed by by state-run carrier Rostelecom PJSC, Bloomberg reports. The software will be eventually deployed to as many as 600,000 computers.

    The city is also considering dropping Windows and Office, but state officials are still looking into alternatives, says Moscow’s head of information technology Artem Yermolaev.

    Putin has been pushing for technological independence after American corporations were forced to sever ties with major Russian institutions following the annexation of Crimea back in 2014.

    To actively encourage the adoption of local solutions, Putin’s internet czar German Klimenko has plans to raise taxes on Western tech companies operating within Russia.

  • Moscow Drops Microsoft on Putin’s Call for Self-Sufficiency

    Moscow city will replace Microsoft Corp. programs with domestic software on thousands of computers in answer to President Vladimir Putin’s call for Russia’s authorities to reduce dependence on foreign technology amid tensions with the U.S. and Europe.

    The city will initially replace Microsoft’s Exchange Server and Outlook on 6,000 computers with an e-mail system installed by state-run carrier Rostelecom PJSC, Artem Yermolaev, head of information technology for Moscow, told reporters Tuesday. Moscow may expand deployment of the new software, developed by Russia’s New Cloud Technologies, to as many as 600,000 computers and servers, and may also consider replacing Windows and Office, Yermolaev said.

  • Why Microsoft is getting the cold shoulder from Moscow

    Since the German city of Munich decided to ditch Microsoft Windows and Office, a growing number of European agencies have followed suit – from France’s national police force to the Italian military.

    The latest authority to turn its back on Microsoft is reportedly Moscow City Hall, which is transferring employee email from Microsoft Exchange Server and Outlook to the Russian-built MyOffice Mail.

    About 6,000 Moscow state employees will be switched over, including teachers, doctors and civil servants. If the move is a success, the city will consider shifting 600,000 PCs and servers away from Microsoft, and may also replace Windows and Office, according to Bloomberg.

  • Moscow will replace Microsoft’s products with local offerings

    Microsoft might lose a whole city of customers in Russia. According to Bloomberg, Moscow will begin replacing Redmond’s products with homegrown software as a result of Vladimir Putin’s urging to stop depending on foreign tech. Artem Yermolaev, the city’s head of information technology, told reporters that Moscow will begin by dropping Microsoft’s Exchange Service and by replacing Outlook on 6,000 computers with state-run carrier Rostelecom PJSC’s email system. Authorities are looking to deploy the email software to as many as 600,000 computers in the future. They might even replace Windows and the Office suite entirely, though there seems to be no solid plan for that at the moment.

  • Desktop

    • Alphabet’s Plans to Create Android PCs Should Make Microsoft a Little Nervous

      Four years after Microsoft (MSFT) first tried to give the world unified PC/mobile operating systems via the dual fiascoes known as Windows 8 and Windows RT, Alphabet’s (GOOGL) Google appears set to take its own stab at the concept. And there are reasons to think the company will see a measure of success.

      Citing “two independent and reliable sources,” Android Police reports Google plans to launch a notebook in the third quarter of 2017 that will likely be the first new device to showcase Andromeda, a version of Android that will integrate many features associated with Google’s Chrome OS PC operating system.

      The notebook will reportedly be called the Pixel 3, and carry a $788 price. Its feature set reportedly include a 12.3-inch display, an Intel (INTC) processor, a glass trackpad, a tablet mode and stylus support.

    • 4 of the Best Linux Distros for Windows Users

      For the past year Microsoft has offered free upgrades to their latest operating system, Windows 10. This was mainly due to the fact that Windows 8 and 8.1 were poorly received, especially when compared to Windows 7. Unfortunately the free upgrade period has passed, so if you want to give Windows 10 a try, you’ll have to dig into your wallet to do it. If your faith in the tech giant has waned over the years, you’re not alone. The latest versions of Windows have all been heavily criticized, proving that they have been a far cry from the world dominance of Windows XP.

      If you’re one of the many people turned off by the latest iterations of Windows, the jump to Linux might look very appealing. Unfortunately, a new OS often comes with a steep learning curve. Windows, with the exception of the fumble that was 8, has more or less looked and behaved the same for years. Having to re-learn everything can be a daunting task, one that could pressure you into staying with Windows forever.

      However, you do have options. There are many different distributions of Linux out there, with some aiming to replicate the look and feel of Windows. The goal of this is to make transitioning relatively painless. With Linux boasting improved hardware support, long term stability and a wider range of software applications, there is no better time to try it out!

    • Microsoft Applications and Services chief Qi Lu leaves the company [Ed: Microsoft exodus)

      Lu has been heading up the Applications and Services Group — the unit that has encompassed the Office applications team and the Bing search team.

      In an email to employees on September 29, CEO Satya Nadella announced Lu was leaving so as to recover from “health conditions caused by a prior injury.” (A couple of other reports, including the Wall Street Journal’s, say Lu’s injury was related to a biking accident.)

      Lu will continue to act as a “personal advisor” to Nadella and Microsoft Founder Bill Gates after his recovery, but he won’t be returning in his former role, Nadella said in his mail.

  • Server

    • Linux servers deliver greater performance and efficiency ‘than available on any x86-based server’
    • What are configuration management tools?

      For most people, computers don’t stay the same. Software is added, removed, and updated. Configurations are changed. Think about the changes you’ve made to your computer since the first time you booted it up. Now imagine making those changes to 10, 100, or 1,000 more computers. Configuration management tools are what make implemententing and enforcing these changes possible.

    • 5 new OpenStack tutorials and guides
    • Ericsson: The Journey to a DevOps Future in SDN

      There are big transformations going on in the world today that are driving rapid changes to the business of networks, said Santiago Rodriguez, VP of Engineering and head of the product development unit SDN & Policy Control at Ericsson, in his keynote Tuesday at OpenDaylight Summit.

      “Society is transforming, the way we do business is transforming, and accordingly the way we build our networks is transforming,” Rodriguez said.

      The three pillars of this network transformation include: 5G, virtualization and open source.

    • OpenDaylight sets product quality label, metrics for SDN solutions

      Initial OpenDaylight-based products expected to receive the “Powered by OpenDaylight” mark are offerings from Brocade, Ericsson, HPE, Inocybe and Serro.

    • Telstra Sees Quadrupled Data Capacity by 2020

      The latter service led Telstra to re-think its fiber deployment strategy, choosing to use pre-provisioned fiber connections to data centers in advance of customer demand, because the company knew that demand was coming, Blackall said. The strategy worked well with Telstra’s acquisition of Pacnet, which had already deployed SDN capabilities to connect its 27 points of presence around Asia.

    • The Tiny Internet Project, Part I

      As LJ readers well know, Linux drives many of the technologies we use every day, from smart TVs to Web servers. Linux is everywhere—except most homes and classrooms.

      That’s a problem if we want to help breed the next generation of engineers and computer scientists. In fact, if teenagers (or any other group of curious individuals) want to learn about Linux, they often must rely on a geeky friend or parent willing to show them the way.

      This three-part series seeks to change that by offering a way for anyone to learn about Linux by building what is essentially a tiny, self-contained Internet. Using old equipment and free software, you’ll build a private network (with your own domain name), build Web sites, set up an e-mail server, install and use a database, and set up a Linux distro mirror.

      Read more

  • Kernel Space

    • Graphics Stack

    • Benchmarks

      • Ubuntu 16.10 Doesn’t Change Much With Performance, Clear Linux Still Leads In Most Tests

        Given yesterday’s Ubuntu 16.10 final beta release ahead of the official “Yakkety Yak” debut in two weeks, I decided to run some benchmarks of Ubuntu 16.10 compared to Ubuntu 16.04.1 LTS on the same system plus also throwing in the Intel Clear Linux distribution given it tends to be one of the most performant.

        For those that haven’t yet tried out Ubuntu 16.10 nor followed its development, GCC 6.2 is now the default compiler in place of GCC 5.4 from Ubuntu 16.04 LTS. Mesa 12.0.3 provides the stock graphics drivers and Linux 4.8 is the stock kernel.

      • DDR4 Memory Speed Tests With The Core i7 6800K On Ubuntu Linux

        A few days ago I posted my first Core i7 6800K benchmarks under Ubuntu Linux compared to various other CPUs. Out of requests from some premium members, here are some straight-forward memory clocking tests of the i7-6800K on Ubuntu 16.04 LTS with the Linux 4.8 kernel. Tests were done from dual-channel DDR4 up through quad-channel DDR4 at DDR4-3000MHz.

  • Applications

  • Desktop Environments/WMs

    • GNOME Desktop/GTK

      • GNOME Calendar Pencils In Great New Features

        GNOME Calendar is one of the few decent desktop calendaring apps available on Linux — and it’s going to get better.

      • The future of GNOME Calendar

        Today, the Calendar Team had the first meeting in history. Isaque, Lapo, Renata, Vamsi and I attended it, and the meeting was extremely productive! In fact, we were able to sketch out the general direction that GNOME Calendar will head towards.

  • Distributions

    • Endless OS 3: Linux for the Net Less

      In the West, we take the Internet for granted. Oh, we may grumble about a slow connection, but that’s a first-world problem. For many, however, the Internet is a “maybe” thing. For those users, Endless’s Endless OS 3, may be just what they need.

    • New Releases

      • Qubes OS 3.2 has been released!

        I’m happy to announce that today we’re releasing Qubes OS 3.2!

        This is an incremental improvement over the 3.1 version that we released earlier this year. A lot of work went into making this release more polished, more stable and easier to use than our previous releases.

        One major feature that we’ve improved upon in this release is our integrated management infrastructure, which was introduced in Qubes 3.1. Whereas before it was only possible to manage whole VMs, it is now possible to manage the insides of VMs as well.

      • Security-Oriented Qubes OS 3.2 Improves the Integrated Management Infrastructure

        Today, September 29, 2016, Joanna Rutkowska announced the general availability of the second point release of the Qubes OS 3 stable series of the security-oriented and open-source Linux-based computer operating system.

        Qubes OS 3.2 is a maintenance release, which means that it mostly adds general fixes and improvements to various of the distribution’s core components and functionalities, including the integrated management infrastructure that was introduced as part of the previous update, Qubes 3.1, allowing users to also manage the “insides” of a virtual machine.

      • Alpine Linux 3.4.4 Is Out, Ships with Linux Kernel 4.4.22 LTS, OpenSSL Patches

        Today, September 28, 2016, Alpine Linux creator and lead developer Natanael Cop has the pleasure of announcing the release of the fourth maintenance update to the latest stable Alpine Linux 3.4 server-oriented operating system series.

        Alpine Linux 3.4.4 is out as the most advanced version, powered by the recently released, long-term supported Linux 4.4.22 kernel and bringing up-to-date components to make your Alpine Linux-based server(s) more stable and reliable than ever. Most of the core components have been updated, but the most important one is OpenSSL 1.0.2j, which received the latest security fixes, just like in the rest of the GNU/Linux distros.

    • Red Hat Family

      • Software Company Red Hat banks on India to hit $ 5 billion turnover in 5 years

        Red Hat, the open-source software company, said its India business was growing at more than double the rate of the overall company and would be an important contributor to its target of reaching $5 billion in the next five years.

        Red Hat has over $2 billion in annual revenue currently and grew over 21% in constant currency last year. Open-source software is freely available, so Red Hat’s business model depends on customers paying for the support and service it offers and not on license fees, making the company’s offerings typically cheaper than proprietary software. “India is one of our fastest growing markets. Red Hat does really when there is net new infrastructure to be set up. And the rapid pace of development that India is seeing sets really well with our offerings,” James Whitehurst, CEO of Red Hat, told ET.

      • Red Hat claims headway in Asia, bets big on container and hybrid cloud

        While the smallest in terms of revenue contribution, Asia is Red Hat’s fastest growing region and is likely to continue its upwards trajectory as emerging markets roll out new infrastructure.

        Developing nations in the region were embarking on many net new infrastructure projects, rather than replacement for existing technology, and open source would be involved in a large share of such projects. The decisions on which technology to deploy would rarely be between proprietary or open source, but rather on which open source vendor to go with or to do so internally, said Red Hat President and CEO Jim Whitehurst.

      • Finance

      • Fedora

        • Node.js 6.x LTS coming to EPEL 7

          Node.js® is a JavaScript runtime built on Chrome’s V8 JavaScript engine. It uses an event-driven, non-blocking I/O model that makes it lightweight and efficient. Its package ecosystem, npm, is the largest ecosystem of open source libraries in the world. You can read more about Node.js at the project website.

        • Switched to HTTPS

          Perhaps you already noticed it, I have switched all the sites for a secured browsing using HTTPS.

          So, new addresses are:

          https://blog.remirepo.net/ for this Blog (with an automatic and permanent redirection)
          https://forum.remirepo.net/ for the Forum (with an automatic and permanent redirection)
          https://rpms.remirepo.net/ for the Repository, but classical address stay available.

        • Fedora Hubs: Getting started

          Fedora Hubs provides a consistent contributor experience across all Fedora teams and will serve as an “intranet” page for the Fedora Project. There are many different projects in Fedora with different processes and workflows. Hubs will serve as a single place for contributors to learn about and contribute to them in a standardized format. Hubs will also be a social network for Fedora contributors. It is designed as one place to go to keep up with everything and everybody across the project in ways that aren’t currently possible.

    • Debian Family

      • Derivatives

        • Canonical/Ubuntu

          • Ubuntu’s Shuttleworth Explains Why Not All Containers are the Same

            Mark Shuttleworth, the founder of Ubuntu Linux, was an early backer of OpenStack as well as containers. This week, Shuttleworth’s company Canonical announced new commercial support for Kubernetes, which is a widely deployed container orchestration and management engine.

            In an interview with Datamation Shuttleworth emphasized that it’s important to understand the different use cases for containers and what the different types of container systems are all about.

          • Ubuntu Linux 16.10 ‘Yakkety Yak’ Beta 2 open source OS now available for download
          • Canonical Jumps On The Container Management Bandwagon With A Commercial Kubernetes Offering
          • ​Ubuntu’s new take on Kubernetes
          • When two tribes go to war: Docker Swarm on the left, easier-to-install Kubernetes on the right
          • Canonical Launches Commercial Support for Kubernetes
          • Canonical Releases Snapcraft 2.18 Tool for Creating Snaps in Ubuntu 16.04 LTS

            Canonical, through Sergio Schvezov, announced the release of yet another maintenance update to the Snapcraft open-source utility that helps application developers package their apps as Snaps.

          • Ubuntu Budgie Remix 16.10 Beta 2 Officially Released with Budgie Desktop 10.2.7

            Softpedia was informed today, September 29, 2016, by David Mohammed from the budgie-remix project about the availability of the second and last Beta release of the upcoming Ubuntu Budgie Remix 16.10 operating system.

            Coming hot on the heels of yesterday’s Ubuntu 16.10 (Yakkety Yak) Final Beta release, Ubuntu Budgie Remix 16.10 Beta 2 is based on most of the GNU/Linux and Open Source technologies used in Ubuntu 16.10, such as systemd 231 and Linux kernel 4.8, but it’s built around the latest version of the beautiful Budgie desktop environment created by the Solus Project.

          • Budgie-Remix Makes Progress With Ubuntu 16.10 Base, Beta 2 Released

            Budgie-Remix, the unofficial Ubuntu spin making use of the Budgie Desktop, has released its 16.10 Beta 2 milestone following this week’s Yakkety Yak Beta 2 release.

            Budgie-Remix is re-based to the latest Ubuntu 16.10 Yakkety package changes. In addition, a number of the Budgie-0Remix packages have been working their way into Debian proper and thus are available to Ubuntu 16.10 users via the official channels. Now available this way is the budgie-desktop package, Moka icon theme, Faba icon theme, and the Arc theme. The Ubuntu repository has also pulled in the Budgie artwork and wallpaper packages too.

          • Yakkety Yak Final Beta Released
          • Canonical Launches Commercial Support for Kubernetes

            Canonical, the lead commercial vendor behind the open-source Ubuntu Linux operating system, is getting into the Kubernetes market. Canonical now offers a freely available implementation of Kubernetes as well as commercial-support options.

            “I have no doubt that Kubernetes will be one of the major container co-ordination systems,” Mark Shuttleworth, founder of Ubuntu, told ServerWatch.

          • [How To] Build an Ubuntu Controlled Sous-Vide Cooker

            I’ll be honest with you from the off: I had zero idea what sous-vide cooking was before I started writing this post. Wikipedia dutifully informs me that’s Sous-Vide is a style of cooking that involves a vacuum, bags, and steam.

          • Flavours and Variants

            • Ubuntu Studio 16.10 to Offer an Up-to-Date Multimedia Oriented Linux Distro

              We reported earlier today, September 28, 2016, on the availability of the Final Beta (Beta 2) development milestone of the upcoming Ubuntu 16.10 (Yakkety Yak) operating system and its official derivatives.

              We’ve already talked here about what’s new in the Beta 2 of Ubuntu MATE 16.10, Lubuntu 16.10, and Kubuntu 16.10, and now we would like to tell you a little bit about Ubuntu Studio 16.10, which promises to offer users an up-to-date multimedia oriented Linux-based operating system.

              That’s right, it looks like today’s Ubuntu Studio 16.10 (Yakkety Yak) Beta 2 snapshot comes with all the latest software releases and a bunch of new apps that you might need for audio, video, or graphics processing jobs. But first, we need to tell you that Ubuntu Studio 16.10 is powered by a low-latency Linux 4.8 kernel.

            • Ubuntu GNOME 16.10 Beta 2 Released with Many Apps from the GNOME 3.22 Stack

              As part of yesterday’s Ubuntu 16.10 (Yakkety Yak) Final Beta launch, some of the opt-in flavors received their Beta 2 release, including Ubuntu GNOME 16.10, about which we would like to tell you all about in this article.

            • Linux Mint’s XApps to Get Screen Blanking, Sublime-like Search Bar Lands for Xed

              We already know that work on Linux Mint 18.1, the next major release of the popular Ubuntu-based operating system loved by many users, already begun, and Clement Lefebvre shares with us today some of the improvements coming to XApps.

            • Mintbox Mini Pro

              MintBox Mini Pro

              The new model is called “Mintbox Mini Pro”, it’s just as small as the original Mintbox Mini but with much better specifications.

            • Mintbox Mini Pro Linux Mini PC Launches For $395

              This week a new version of the popular Mintbox Mini Linux PC has been launched for $395 in the form of the Mintbox Mini Pro which is now equipped with 120 GB of SSD mSATA together with 64-bit AMD A10-Micro6700T system-on-a-chip with Radeon R6 graphics and features 8GB of DDR3L.

              The latest Mintbox Mini Pro is shipped preloaded with the awesome Linux Mint 18 operating system and includes a microSD card slot a serial port, and a micro SIM card reader.
              The new Mintbox Mini Pro is the same size as the original and measures 4.3 x 3.3 x 0.9 inches in size and weighs in at around 255g. The Linux mini PC incorporates a fanless design and features an all-metal case made of aluminium and zinc.

  • Devices/Embedded

    • Expandable, outdoor IoT gateway runs Android on i.MX6

      VIA’s “Artigo A830” IoT gateway runs Android on an i.MX6 DualLite SoC and offers HDMI, GbE, microSD, numerous serial and USB ports, plus -20 to 60° operation.

      As the name suggests, the VIA Technologies Artigo A830 Streetwise IoT Platform is designed for outdoor Internet of Things gateway applications. These are said to include smart lockers, vending machines, information kiosks, and signage devices that run “intensive multimedia shopping, entertainment, and navigation applications.” The outdoors focus is supported with an extended -20 to 60°C operating range, as well as surge and ESD protection for surviving challenges such as a nearby lightning strike.

    • Raspberry Pi Announces PIXEL Desktop Environment

      Today the Raspberry Pi Foundation formally announced the Raspberry Pi PIXEL, their own desktop that will be used in future Raspbian spins.

      PIXEL is short for Pi Improved Xwindows Environment, Lightweight desktop. PIXEL is derived from the LXDE desktop environment but with both appearance and fundamental changes, including some new applications.

    • Raspberry Pi Foundation Unveils New LXDE-Based Desktop for Raspbian Called PIXEL

      Today, September 28, 2016, Raspberry Pi Foundation’s Simon Long proudly unveiled a new desktop environment for the Debian-based Raspbian GNU/Linux operating system for Raspberry Pi devices.

      Until today, Raspbian shiped with the well-known and lightweight LXDE desktop environment, which looks pretty much the same as on any other Linux-based distribution out there that is built around LXDE (Lightweight X11 Desktop Environment). But Simon Long, a UX engineer working for Raspberry Pi Foundation was hired to make it better, transform it into something that’s more appealing to users.

    • MintBox Mini updated with faster AMD SoC and 8GB RAM

      CompuLab’s Linux Mint flavored MintBox Mini Pro mini-PC updates the Mini with an AMD A10 Micro-6700T, plus BT 4.0, mini-PCIe, and twice the RAM and storage.

      The CompuLab built, $395 MintBox Mini Pro, which ships with the Linux Mint 18 Cinnamon distribution, updates the $295 MintBox Mini with a lot more performance and features in the same compact 108 x 83 x 24mm footprint. That’s considerably smaller than earlier collaborations between CompuLab and the Linux Mint project, such as the circa-2013 MintBox 2.

    • Phones

      • Android

        • ​Google beats back Oracle again in Java Android case

          To recap, Oracle claimed the 37 Java application programming interface (API) packages Google used to develop Android are covered by copyright. Of course, that’s not really the issue. True, the the US Federal Circuit Court of Appeals foolishly ruled that APIs could be copyrighted. But the US District Court for the Northern District of California ruled in May 2016 that Google’s use of the Java APIs were not subject to copyright licensing fees. Instead, Android’s use of the APIs was covered by “fair use.”

        • Google’s Open Source Fuchsia OS: The Mystery Linux Distro

          Few things are more tantalizing than a good mystery, and Google is making waves for an open source-centric mystery that may end up having profound implications. It all started in August when an extensive and unusual code repository for a new operating system called Fuchsia was discovered online, and now the growing source code set is on GitHub.

          Thus far, Google officials have been mostly mum on the aim of this operating system, although they have made a few things clear in chat forums. Two developers listed on Fuchsia’s GitHub page — Christopher Anderson and Brian Swetland — are known for their work with embedded systems. The Verge, among other sites, has made a few logical deductions about the possible embedded systems focus for Fuchsia: “Looking into Fuchsia’s code points gives us a few clues. For example, the OS is built on Magenta, a “medium-sized microkernel” that is itself based on a project called LittleKernel, which is designed to be used in embedded systems,” the site reports.

          The GitHub postings that confirm that Fuchsia is based on Magenta are particularly notable because Magenta has had applications in the embedded systems space. Here are some direct quotes: “Magenta is a new kernel that powers the Fuchsia OS. Magenta is composed of a microkernel as well as a small set of userspace services, drivers, and libraries necessary for the system to boot, talk to hardware, load userspace processes and run them, etc. Fuchsia builds a much larger OS on top of this foundation.”

        • As Blackberry pulls out of handset business it has some big patent strategy calls to make
        • Luna Launcher turns your Android phone into a kid-friendly device

          On the fence about whether your child is old enough for their own smartphone? A new app called Luna Launcher can help you warm to the idea, by offering a simple way to limit access to select apps and actions, including who they can call or text – a list you can restrict to family members, for example. Of course, because of the way it needs to interact with your phone’s operating system in order to restrict access, Luna Launcher is only available on Android.

        • Google delays launch of Android Wear 2.0 to next year

          Google’s next-generation smartwatch platform, Android Wear 2.0, will not be seeing the light of day this year. The company announced today that it is delaying the launch of the update, which was originally scheduled for this fall, to sometime in early 2017.

          Instead of launching the final version this fall, Google is extending the developer preview program for Android Wear 2.0, and today it’s releasing the third preview of the platform for developers. The company says that it is using the extra time to fine tune the software via feedback from developers, and it will have another preview build released before the end of the year. Today’s version adds a number of new features, most notable of which is the Play Store for smartwatches.

        • Moto Z series and G4 Plus getting Android 7.0 Nougat update in Q4
        • Android Wear watches aren’t connecting to the iPhone 7
        • Many Android Wear watches aren’t working with the iPhone 7
        • Google Maps gains new voice commands on Android
        • OnePlus 3 Android 7.0 Nougat update is in the works
        • Huawei will introduce its next flagship on November 3
        • This is Google Cloud and G Suite
        • Exchange email down for Android and iOS users

          Microsoft Exchange mobile users on Android and iOS users have been unable to access emails on their phones due to a planned shift away from its Exchange Active Sync (EAS) protocol.

          The issue first appeared yesterday and is still affecting users.

          One customer got in touch to say: “Exchange Mobile device access seems to be up the Swanny for iOS and Android users.” They quipped: “Fortunately neither of the Windows Mobile users are affected.”

        • Latest Fitbit Blaze firmware update finally makes the tracker worth buying

          The Fitbit Blaze is a deceptive little fitness tracker. It may look like a smartwatch on the surface, but dive a little deeper and you’ll find it’s actually missing most of the smartwatch-y features we’ve come to expect from fitness tracker/smartwatch hybrids. When we reviewed the Blaze a few months ago, the lack of third-party notification support and poor selection of watch faces were some of our biggest gripes with this tracker. Thankfully Fitbit has finally heard our cries and released a new update that fixes these issues.

        • Android Wear watches aren’t connecting to the iPhone 7

          One of Android Wear’s biggest strengths is it that the platform is designed to be cross compatible with Android and iOS. However, a number of consumers are reporting that they can’t connected a range of Android Wear smartwatches up to the new iPhone 7 or iPhone 7 Plus.

        • Multiple Android Wear smartwatches are not pairing with the iPhone 7
        • Google Allo rockets past 5 million downloads
        • BlackBerry to stop developing its own hardware, will rely on manufacturing partners instead
        • How to copy music to your Android phone
        • Spaces v1.7 adds capability to save posted images [APK Download]
        • Firefox Aurora arrives on the Play Store in “unreleased” state
        • Mercedes and Kia add new Android Auto models

          Buying a new car comes with myriad of considerations. Is it fuel efficient? Is it safe? Will it play nicely with my phone? People sometimes neglect the last one, but you’re going to be carrying the phone literally every time you get in the car, so why not make sure? Mercedes and Kia seem to get that. They’ve added support for Android Auto to a ton of new cars today.

        • Sony Xperia X Compact review: Small Android is still good, but not much better

          Sony’s Xperia X Compact is basically the newest version of the Z5 Compact that hit the US earlier this year. But just because it’s a newer version of the (comparatively) tiny handset doesn’t mean it’s an upgrade in every way. Sony is pushing the camera sensors in the X Compact and the flagship-level XZ, as well as new features like five-axis image stabilization and HDR photo mode. Sony knows cameras, so we know the shooter in the X Compact will at least be competent. However, it has to be good enough to encourage photography buffs to shell out $499 for this unlocked handset while delivering solid performance across the board as well.

        • How I Use Android: Android Central Editor Emeritus Phil Nickinson

          In the meantime, I was able to convince Phil to step out of his metaphorical kitchen for a few minutes to chat about how he uses Android in his day-to-day life. This is a man who has seen and used practically every Android device over the past several years, after all — and a fair number of apps and customization tools, to boot.

          So what devices does someone with so much knowledge carry around in his own trousers, and how does he make the most of what they have to offer?

          Enough with the suspense already. In his own words, this is how Phil Nickinson uses Android.

        • Best Android Phones Under 5.7 Inches

          There’s no question that Samsung hit a home run with its Galaxy S7 line. We already think the smaller GS7 is the best phone under 5.2 inches, and the larger, curved-screen Galaxy S7 edge is our pick for the best phone under 5.7 inches. Why? It takes everything we love about the smaller phone and makes it bigger — but not too much.

Free Software/Open Source

  • But is it safe? Uncork a bottle of vintage open-source FUD

    Most of the open source questioners come from larger organisations. Banks very rarely pop up here, and governments have long been hip to using open source. Both have ancient, proprietary systems in place here and there that are finally crumbling to dust and need replacing fast. Their concerns are more oft around risk management and picking the right projects.

    It’s usually organisations whose business is dealing with actual three dimensional objects that ask about open source. Manufacturing, industrials, oil and gas, mining, and others who have typically looked at IT as, at best, a helper for their business rather than a core product enabler.

    These industries are witnessing the lighting fast injection of software into their products – that whole “Internet of Things” jag we keep hearing about. Companies here are being forced to look at both using open source in their products and shipping open source as part of their business.

    The technical and pricing requirements for IoT scale software is a perfect fit for open source, especially that pricing bit. On the other end – peddling open source themselves – companies that are looking to build and sell software-driven “platforms” are finding that partners and developers are not so keen to join closed source ecosystems.

    These two pulls create some weird clunking in the heads of management at these companies who aren’t used to working with a sandles and rainbow frame of mind. They have a scepticism born of their inexperience with open source. Let’s address some of their trepidation.

  • Real business innovation begins with open practices

    To business leaders, “open source” often sounds too altruistic—and altruism is in short supply on the average balance sheet. But using and contributing to open source makes hard-nosed business sense, particularly as a way of increasing innovation.

    Today’s firms all face increased competition and dynamic markets. Yesterday’s big bang can easily become today’s cautionary tale. Strategically, the only viable response to this disruption is constantly striving to serve customers better through sustained and continuous innovation. But delivering innovation is hard; the key is to embrace open and collaborative innovation across organizational walls—open innovation.

    Open source communities’ values and practices generate open innovation, and working in open source is a practical, pragmatic way of delivering innovation. To avoid the all-too-real risk of buzzword bingo we can consider two definitions of “innovation”:

    creating value (that serves customer needs) to sell for a profit; or
    reducing what a firm pays for services.

  • Minijail: Running Untrusted Programs Safely by Jorge Lucangeli Obes, Google
  • Minijail: Google’s Tool To Safely Run Untrusted Programs

    Google’s Minijail sandboxing tool could be used by developers and sysadmins to run untrusted programs safely for debugging and security checks, according to Google Software Engineer Jorge Lucangeli Obes, who spoke last month at the Linux Security Summit. Obes is the platform security lead for Brillo, Google’s Android-based operating system for Internet-connected devices.

    Minijail was designed for sandboxing on Chrome OS and Android, to handle “anything that the Linux kernels grew.” Obes shared that Google teams use it on the server side, for build farms, for fuzzing, and pretty much everywhere.

    Since “essentially one bug separates you and any random attacker,” Google wanted to create a reliable means to swiftly identify problems with privileges and exploits in app development and easily enable developers to “do the right thing.”

    The tool is designed to assist admins who struggle with deciding what permissions their software actually needs, and developers who are vexed with trying to second guess which environment the software is going to run in. In both cases, sandboxing and privilege dropping tends to be a hit or miss affair.

    Even when developers use the privilege dropping mechanisms provided by the Linux kernel, sometimes things go awry due to numerous pitfalls along that path. One common example Obes cited was trying to ride a switch user function that will drop-root and then forgetting to check the result of the situation relief, or setuid function, afterwards.

  • Intel and Cloudera Give Apache an Open Source Data/Security Tool

    For the past year, we’ve taken note of the many Big Data projects that the Apache Software Foundation has been elevating to Top-Level Status. The organization incubates more than 350 open source projects and initiatives, and has squarely turned its focus to Big Data and developer-focused tools in recent months. As Apache moves Big Data projects to Top-Level Status, they gain valuable community support.

    Recently, the foundation announced that Apache Kudu has graduated from the Apache Incubator to become a Top-Level Project (TLP). Kudu is an open source columnar storage engine built for the Apache Hadoop ecosystem designed to enable flexible, high-performance analytic pipelines. And, Apache Twill has graduated as well. Twill is an abstraction over Apache Hadoop YARN that reduces the complexity of developing distributed Hadoop applications, allowing developers to focus more on their application logic. In another Apache-related Big Data move, Cloudera and Intel have announced that they’ve contributed a new open-source project to the Apache Software Foundation targeted at using Big Data analytics and machine learning for cybersecurity.

  • Twitter Open Sources Stream Processing Engine Heron

    Twitter announced the open sourcing of Heron, a stream-processing engine that is a successor to Apache Storm. Heron is backwards compatible with Apache Storm, which eases its adoption amongst developers. Heron has replaced Apache Storm as the stream data processing engine inside Twitter due to its scalability, debug-ability, ability to work in a shared cluster infrastructure and better performance. A comprehensive list of features is listed in the documentation.

  • Events

    • PyCon 2016

      I come from a place where everyone worships competitive coding and thus cpp, so the experience of attending my first pycon was much awaited for me.

      This year’s PyCon India happened in Delhi and i along with a couple of my friends reached on 23rd September, the first day. We were a bit late but it was all right because, we didn’t miss anything.

    • What do you have to say? Share it at LibrePlanet 2017
    • LibrePlanet returns March 25-26, 2017, call for proposals for annual free software conference now open

      LibrePlanet is an annual conference for free software enthusiasts. The conference brings together software developers, policy experts, activists and computer users to learn skills, share accomplishments and face challenges to software freedom. Newcomers are always welcome, and LibrePlanet 2017 will feature programming for all ages and experience levels.

      This year, the theme of LibrePlanet is “The Roots of Freedom.” This encompasses the historical “roots” of the free software movement — the Four Freedoms, the GNU General Public License and copyleft, and a focus on strong security and privacy protections — and the concept of roots as a strong foundation from which the movement grows.

      “LibrePlanet is an impactful, exciting free software conference. Attendance has grown each year, yet the community-minded atmosphere has grown even stronger,” said John Sullivan, executive director of the FSF.

    • The Linux Foundation Announces Session Lineup for MesosCon Asia

      The Linux Foundation, the nonprofit organization enabling mass innovation through open source, today announced the schedule for MesosCon Asia, taking place November 18-19 in Hangzhou, China.

    • Tencent: Transforming Networks with SDN

      “SDN can really transform the way we do networks,” said Tom Bie, VP of Technology & Operation of Data Center, Networking and Server, Tencent, during his Wednesday keynote address at the Open Daylight Summit. The China telecom giant should know about the issues of massive scale networks: they have more than 200 million users for QQ instant messaging, 300 million users of their payment service, and more than 800 million users of their VChat service. Bie noted that Tencent also operates one of the largest gaming networks in the world, along with video services, audio services, online literature services, news portals, and a range other digital content services.

    • The Second Wave of Platforms, an Interview with Cloud Foundry’s Sam Ramji

      In today’s world of platforms, services are increasingly connected. In the past, PaaS offerings were pretty much isolated. It’s that new connected infrastructure that is driving the growth of Cloud Foundry, the open source, service-oriented platform technology.

      Sam Ramji is CEO of Cloud Foundry, which is holding its European event in Frankfurt this week. At the conference, we spoke with Ramji to discuss, among other topics:

  • Web Browsers

    • Mozilla

      • This Week In Servo 79

        In the last week, we landed 96 PRs in the Servo organization’s repositories.

        Promise support has arrived in Servo, thanks to hard work by jdm, dati91, and mmatyas! This does not fully implement microtasks, but unblocks the uses of Promises in many places (e.g., the WebBluetooth test suite).

        Emilio rewrote the bindings generation code for rust-bindgen, dramatically improving the flow of the code and output generated when producing Rust bindings for C and C++ code.

        The TPAC WebBluetooth standards meeting talked a bit about the great progress by the team at the University of Szeged in the context of Servo.

      • Servo Web Engine Now Supports Promises, Continues Churning Along

        It’s been nearly two months since last writing about Mozilla’s Servo web layout engine (in early August, back when WebRender2 landed) but development has kept up and they continue enabling more features for this next-generation alternative to Gecko.

        The latest is that Servo now supports JavaScript promises. If you are unfamiliar with the promise support, see this guide.

        The latest Servo code has improvements around its Rust binding generator for C and C++ code plus other changes.

      • Announcing Rust 1.12

        The Rust team is happy to announce the latest version of Rust, 1.12. Rust is a systems programming language with the slogan “fast, reliable, productive: pick three.”

        As always, you can install Rust 1.12 from the appropriate page on our website, and check out the detailed release notes for 1.12 on GitHub. 1361 patches were landed in this release.

      • Rust 1.12 Programming Language Released

        Rust 1.12 has been released as the newest version of this popular programming language with a focus on “fast, reliable, productive: pick three.”

  • SaaS/Back End

  • Databases

    • Riak TS for time series analysis at scale

      Until recently, doing time series analysis at scale was expensive and almost exclusively the domain of large enterprises. What made time series a hard and expensive problem to tackle? Until the advent of the NoSQL database, scaling up to meet increasing velocity and volumes of data generally meant scaling hardware vertically by adding CPUs, memory, or additional hard drives. When combined with database licensing models that charged per processor core, the cost of scaling was simply out of reach for most.

      Fortunately, the open source community is democratising large scale data analysis rapidly, and I am lucky enough to work at a company making contributions in this space. In my talk at All Things Open this year, I’ll introduce Riak TS, a key-value database optimized to store and retrieve time series data for massive data sets, and demonstrate how to use it in conjunction with three other open source tools—Python, Pandas, and Jupyter—to build a completely open source time series analysis platform. And it doesn’t take all that long.

    • PostgreSQL 9.6 released

      PostgreSQL 9.6, the latest version of the world’s leading open source database, was released today by the PostgreSQL Global Development Group. This release will allow users to both scale up and scale out high performance database workloads. New features include parallel query, synchronous replication improvements, phrase search, and improvements to performance and usability, as well as many more features.

    • PostgreSQL 9.6 Officially Released With Parallel Query Support
  • Oracle/Java/LibreOffice

    • LibreOffice Office Suite Celebrates 6 Years of Activity with LibreOffice 5.2.2

      Today, September 29, 2016, Italo Vignoli from The Document Foundation informs Softpedia via an email announcement about the general availability of the first point release of the LibreOffice 5.2 open-source and cross-platform office suite.

      On September 28, the LibreOffice project celebrated its 6th anniversary, and what better way to celebrate than to push a new update of the popular open source and cross-platform office suite used by millions of computer users worldwide. Therefore, we would like to inform our readers about the general availability of LibreOffice 5.2.2, which comes just three weeks after the release of LibreOffice 5.2.1.

      “Just one day after the project 6th anniversary, The Document Foundation (TDF) announces the availability of LibreOffice 5.2.2, the second minor release of the LibreOffice 5.2 family,” says Italo Vignoli. “LibreOffice 5.2.2, targeted at technology enthusiasts, early adopters and power users, provides a number of fixes over the major release announced in August.”

    • LibreOffice at 6, New Souped up Mint Mini

      September 28 was the official birthday for LibreOffice and Italo Vignoli looked back at some of the milestones for the project. Elsewhere, the Ubuntu family got new betas and Clement Lefebvre announced a new Mintbox Mini. Jack M. Germain reviewed Panther OS and Ryan Lynch recommended four distributions for Windows users.

      Happy Birthday LibreOffice! It was officially six years ago September 28 that The Document Foundation and LibreOffice were announced. The project consisted of former OpenOffice.org developers and volunteered who feared the worst after its sale to Oracle. Since that time, LibreOffice has grown and matured into an award winning Open Source office suite. Group photos taken at the LibreOffice conference at Brno were also shared including one of the attendees who were there on day one, as Bjoern Michaelsen explained. Although they were the seed, the project has grown to hundreds of contributors from all over the world. Italio Vignoli said the project attracted new developers every month for 72 straight months. He also said tomorrow begins the LibreOffice 5.3 developmental cycle, which is planned for release in January 2017.

    • Merging Communities
    • Happy 6th Birthday, LibreOffice
    • LibreOffice 5.2.2 Now Available to Download
  • Pseudo-Open Source (Openwashing)

  • BSD

    • FreeBSD 11.0-RELEASE Needs To Be Respun Due To Security Issues

      The delayed FreeBSD 11.0 release just suffered another last-minute set-back. While “FreeBSD 11.0-RELEASE images” were distributed to FTP mirrors and the official announcement expected today, these images need to be re-spun to contain some security fixes and thus pushing back the official release.

      Glen Barber noted today on the mailing list, “Although the FreeBSD 11.0-RELEASE has not yet been officially announced, many have found images on the Project FTP mirrors. However, please be aware the final 11.0-RELEASE will be rebuilt and republished on the Project mirrors as a result of a few last-minute security fixes we feel are imperative to include in the final release.”

    • FreeBSD 11.0 Operating System Lands October 5 Due to Last-Minute Security Issues

      A few minutes ago, Glen Barber informed the FreeBSD community that they should not hurry and install the ISO images of the FreeBSD 11.0 operating system made available a few days ago on the official FTP mirrors.

      These images aren’t safe to use and contain various security vulnerabilities that need to be fixed before the FreeBSD Project will officially unveil the final release of the FreeBSD 11.0 operating system in the coming days. According to the release schedule, FreeBSD 11.0 should hit the streets later today, September 29, 2016.

      However, until then the FreeBSD development team is hard at work patching those nasty security issues and rebuilding the final ISO images, which will be made available on the respective FTP mirrors later today as FreeBSD 11.0-RELEASE-p1. If you’re already running FreeBSD 11.0-RELEASE, you will soon be provided with instructions to safely update your system

    • OpenBSD Founder Calling For LLVM To Face A Cataclysm Over Its Re-Licensing

      For over one year there’s been talk of LLVM pursuing a mass relicensing from its University of Illinois/NCSA Open Source License, which is similar to the three-clause BSD license, to the Apache 2.0 license with explicit mention of GPLv2 compatibility. As mentioned in that aforelinked article, this re-licensing is moving ahead.

  • FSF/FSFE/GNU/SFLC

    • Free Software Directory meeting recap for September 23rd, 2016
    • Don’t be a stranger to GIMP, be GIMP…

      I can try and do more coding, more code reviewing, revive designing discussions… that’s cool, yet never enough. GIMP needs more people, developers, designers, community people, writers for the website or the documentation, tutorial makers… everyone is welcome in my grand scheme!

      Many of my actions lately have been towards gathering more people, so when I heard about the GNOME newcomers initiative during GUADEC, I thought that could be a good fit. Thus a few days ago, I had GIMP added in the list of newcomer-friendly GNOME projects, with me as the newcomers mentor. I’ll catch this occasion to remind you all the ways you can contribute to GIMP, and not necessarily as a developer.

  • Public Services/Government

    • EC approves Slovenia courts data exchange solution

      First CEF AS4-compliant b2b solution developed as open source by a public administration

      The European Commission has tested and approved Laurentius, an eDelivery court documents and case exchange solution compliant with the AS4 profile of the OASIS ebMS standard. In September, Laurentius passed all tests by the EC’s Connecting Europe Facility (CEF) for its so-called “e-SENS AS4 conformant solutions”.

  • Programming/Development

    • SDL 2.0.5 Is Readying For Release: Relative Mouse Mode For Wayland/Mir, Audio Capture

      SDL 2.0 point releases have ranged from being a few months apart to as much as two years apart. Fortunately, SDL 2.0.5 is now being put together for release just nine months after SDL 2.0.4.

      With the Mercurial repository, Sam Lantinga bumped the version in preparation for the SDL 2.0.5 release. The SDL 2.0.5 release hasn’t officially happened yet, but it should be here soon.

  • Standards/Consortia

    • Open standards default at Slovenia supreme court

      The use of open ICT standards is an IT requirement at Slovenia’s Supreme Court, responsible for the IT support of the entire court system in the country. The Supreme Court’s IT department has a strong preference for the development of modular, reusable software solutions. This strategy provides agility and flexibility, says Bojan Muršec, director of IT.

      The focus on open standards frees up the IT department to concentrate on the business, Muršec says. The IT department takes the modular approach serious: the first reusable module ever developed by the court – a court documents dispatch and delivery system – is re-used by all IT systems across the courts. “Making everything reusable prevents creation of silos in the organisation”, the IT director says.

      A positive side effect of the IT strategy is that the court uses mostly open source software solutions. This in turn helps to keep IT costs down, says the IT director, who estimates that the court saves EUR 400 to 500 thousand per year on licence fees: “The cost of proprietary licences always goes up.”

    • Why there is no CSS4 – explaining CSS Levels

      We had CSS1, and CSS2. We even had CSS2.1 and we then moved onto CSS3 – or did we? This post is a quick explanation of how CSS is versioned today.

      CSS versions 1 and 2 were monolithic specifications. All of CSS was included in one massive document. Selectors, positioning, colour – it was all in there.

      The problem with monolithic specifications is that in order to finish the spec, every component part also has to be finished. As CSS has grown in complexity, and new features are added, it doesn’t make sense to draw a line at which all work is stopped on all parts of CSS in order to declare that CSS version finished. Therefore, after CSS2.1 all the things that had been part of the 2.1 specification were broken down into modules. As the new CSS modules included all that had gone before plus any new features, they all came into being at Level 3. Hence CSS3, and people like me who understood CSS as a single specification referred to the group of Level 3 modules as “CSS3”.

Leftovers

  • Science

    • 6 Ways Driverless Cars Are Going To Kill Lots Of People

      You’ve probably read a few articles about driverless cars over the past couple of years. The technology is coming along quickly, with fleets of test cars already on the roads in some states. It seems like soon we’ll achieve the American dream of stuffing our faces and texting all we want while still managing to avoid public transportation.

      But the reality is quite different. We’re diving into this technology a little too quickly and ignoring all the warning signs about how we are going to screw up on the way to Driverless Car Utopia.

  • Health/Nutrition

    • Reporter who quit on air to fight for cannabis legalization could face prison

      Charlo Greene did not plan to curse on live television, but on 22 September 2014, the words came pouring out.

      Then a reporter for KTVA, a station in Alaska, Greene ended her segment on marijuana by revealing that she was a proponent of legalization – and was the owner of the Alaska Cannabis Club, the subject of her news report.

      “Fuck it, I quit,” she said, before abruptly walking off camera. The 26-year-old’s stunt shocked her colleagues and made her a viral sensation overnight.

    • Marijuana Arrests Are At a 20-Year Low

      Marijuana-related arrests are the lowest they’ve been in 20 years, but someone’s still getting busted for weed a little more than once every minute.

      According to new statistics released by the FBI on Monday, there were 574,641 arrests in 2015 for marijuana possession, which is the lowest it’s been since 1996. Between 2011 and 2014, possession arrests hovered above 600,000. And since possession arrests peaked at 800,000 in 2007, that’s a 25 percent decrease.

      As pot gets increasingly normalized, with 10 states considering medical or adult use marijuana legalization in this year’s election, law enforcement may be less likely to see it as a threat. The divide between federal and state laws is also becoming an increasingly absurd policy to enforce. Even Hillary Clinton mentioned in Monday’s debate that the prevalent prison sentences for nonviolent crimes, like marijuana possession, are unnecessary.

      The drop in weed possession arrests likely results from from adult use policies in places like Colorado, where all marijuana-related arrests have plummeted in recent years, Paul Armentano, deputy director of the National Organization for the Reform of Marijuana Laws, told Motherboard. “The recent decline in arrests in New York City, as well as in other major metropolitan areas that have imposed decriminalization ordinances in recent years, is also likely playing a role in this nationwide decline.”

    • House passes waterways bill with Flint aid

      The House easily passed a major waterways bill on Wednesday that included a bipartisan compromise to address the drinking-water crisis in Flint, Mich.

      A late-night deal on Flint aid helped resolve Democratic opposition to a stop-gap spending bill that lacked emergency funding for the city, paving the way for Senate passage of a continuing resolution earlier in the day and ending the threat of a government shutdown.

      In a 399-25 vote, House lawmakers approved the Water Resources and Development Act (WRDA), which authorizes dozens of water-related infrastructure projects around the country.

      Lawmakers adopted numerous amendments during floor debate, including one from Reps. Dan Kildee (D-Mich.) and John Moolenaar (R-Mich.) that would authorize up to $170 million for Flint.

      “We decided we don’t want to create brinksmanship. That doesn’t do anybody any good,” House Speaker Paul Ryan (R-Wis.) said Wednesday at the Economic Club of Washington, D.C.

    • Farming mega-mergers threaten food security, say campaigners

      When an Indian farmer plants his cotton crop, there’s at least a 75% chance the seeds have been been bought from a company owned by Monsanto. If a Latin American farmer sprays insecticide on her genetically engineered soya beans, the chemical is more than likely to have been provided by German chemical and drugs company Bayer or by US firm Dupont.

      And when African farmers add chemicals to their maize fields or plant it’s odds-on that they have come from Swiss company Syngenta.

      Until recently, six or seven global agri-food businesses competed with each other for a share of the world market for seeds and chemicals. But if EU and US regulators allow a series of mega-mergers to take place, within months just three companies will be left in control of nearly 60% of the world’s seeds, nearly 70% of the chemicals and pesticides needed to grow food and nearly all of the world’s GM crop genetic traits.

    • Should Kratom Be Banned? Here’s What the Experts Say

      While lots of people reading this are patiently waiting for marijuana legalization to finally reach their state — most likely passing the time by smoking marijuana — lots of others are about to see Prohibition show up at their door for the first time. They are the “kratom” users. That’s a plant-based painkiller which some people describe as “herbal heroin.” It was, up until now, completely legal. I first used it back in 2009 — not because I was in pain, but because I wanted to get high without failing a drug test (like many painkillers, you can also take it for fun). Then, a couple of years ago, I introduced kratom to someone who does live with chronic pain — Cracked contributor Marina Reimann.

  • Security

    • security things in Linux v4.5
    • Time to Kill Security Questions—or Answer Them With Lies

      The notion of using robust, random passwords has become all but mainstream—by now anyone with an inkling of security sense knows that “password1” and “1234567” aren’t doing them any favors. But even as password security improves, there’s something even more problematic that underlies them: security questions.

      Last week Yahoo revealed that it had been massively hacked, with at least 500 million of its users’ data compromised by state sponsored intruders. And included in the company’s list of breached data weren’t just the usual hashed passwords and email addresses, but the security questions and answers that victims had chosen as a backup means of resetting their passwords—supposedly secret information like your favorite place to vacation or the street you grew up on. Yahoo’s data debacle highlights how those innocuous-seeming questions remain a weak link in our online authentication systems. Ask the security community about security questions, and they’ll tell you that they should be abolished—and that until they are, you should never answer them honestly.

      From their dangerous guessability to the difficulty of changing them after a major breach like Yahoo’s, security questions have proven to be deeply inadequate as contingency mechanisms for passwords. They’re meant to be a reliable last-ditch recovery feature: Even if you forget a complicated password, the thinking goes, you won’t forget your mother’s maiden name or the city you were born in. But by relying on factual data that was never meant to be kept secret in the first place—web and social media searches can often reveal where someone grew up or what the make of their first car was—the approach puts accounts at risk. And since your first pet’s name never changes, your answers to security questions can be instantly compromised across many digital services if they are revealed through digital snooping or a data breach.

    • LibreSSL and the latest OpenSSL security advisory

      Just a quick note that LibreSSL is not impacted by either of the issues mentioned in the latest OpenSSL security advisory – both of the issues exist in code that was added to OpenSSL in the last release, which is not present in LibreSSL.

    • Record-breaking DDoS reportedly delivered by >145k hacked cameras

      Last week, security news site KrebsOnSecurity went dark for more than 24 hours following what was believed to be a record 620 gigabit-per-second denial of service attack brought on by an ensemble of routers, security cameras, or other so-called Internet of Things devices. Now, there’s word of a similar attack on a French Web host that peaked at a staggering 1.1 terabits per second, more than 60 percent bigger.

      The attacks were first reported on September 19 by Octave Klaba, the founder and CTO of OVH. The first one reached 1.1 Tbps while a follow-on was 901 Gbps. Then, last Friday, he reported more attacks that were in the same almost incomprehensible range. He said the distributed denial-of-service (DDoS) attacks were delivered through a collection of hacked Internet-connected cameras and digital video recorders. With each one having the ability to bombard targets with 1 Mbps to 30 Mbps, he estimated the botnet had a capacity of 1.5 Tbps.

      On Monday, Klaba reported that more than 6,800 new cameras had joined the botnet and said further that over the previous 48 hours the hosting service was subjected to dozens of attacks, some ranging from 100 Gbps to 800 Gbps. On Wednesday, he said more than 15,000 new devices had participated in attacks over the past 48 hours.

    • Security updates for Thursday
    • How 1.5 Million Connected Cameras Were Hijacked to Make an Unprecedented Botnet

      Last week, hackers forced a well-known security journalist to take down his site after hitting him for more than two days with an unprecedented flood of traffic.

      That cyberattack was powered by something the internet had never seen before: an army made of more than one million hacked Internet of Things devices.

      The hackers, whose identity is still unknown at this point, used not one, but two networks—commonly referred to as “botnets” in hacking lingo—made of around 980,000 and 500,000 hacked devices, mostly internet-connected cameras, according to Level 3 Communications, one of the world’s largest internet backbone providers. The attackers used all those cameras and other unsecured online devices to connect to the journalists’ website, pummeling the site with requests in an attempt to make it collapse.

    • NHS Hospitals Are Running Thousands of Computers on Unsupported Windows XP

      Hospitals across England are running thousands of out-of-date Windows XP machines, potentially putting patient data and other sensitive information at risk.

      Motherboard has found that at least 42 National Health Service (NHS) trusts in England are still using the Windows XP operating system, with many of them confirming that they no longer receive security updates for the software. Legal experts say that the NHS hospitals may be in breach of data protection regulations.

      “If hospitals are knowingly using insecure XP machines and devices to hold and otherwise process patient data they may well be in serious contravention of their obligations,” Jon Baines, Chair of the National Association of Data Protection and Freedom of Information Officers (NADPO), wrote in an email.

      In April 2014, Microsoft officially ended support for Windows XP, meaning that the company would no longer release security patches for the aging operating system. Any vulnerabilities discovered after that date would therefore be left for hackers to exploit. Governments and businesses could pay Microsoft for a custom extended support deal; the Crown Commercial Service, which is sponsored by the Cabinet Office, spent £5.5 million ($9 million) to continue receiving updates for the public sector, including for the NHS. That agreement ended in April 2015 and was not renewed.

    • Linux.Mirai Trojan causing mayhem with DDoS attacks

      A Trojan named Linux.Mirai has been found to be carrying out DDoS attacks.

      The malicious program first appeared in May 2016, detected by Doctor Web after being added to its virus database under the name Linux.DDoS.87. The Trojan can work with with the SPARC, ARM, MIPS, SH-4, M68K architectures and Intel x86 computers.

  • Defence/Aggression

    • Does Free College Threaten Our All-Volunteer Military?

      Does free college threaten our all-volunteer military? That is what writer Benjamin Luxenberg, on military blog War on the Rocks says. But the real question goes deeper than Luxenberg’s practical query, striking deep into who we are as a nation.

      Unlike nearly every other developed country, which offer free or low cost higher education (Korea’s flagship Seoul National University runs about $12,000 a year, around the same as Oxford), in America you need money to go to college. You need the bucks for tuition and books, and for most students, you need the bucks to not work full-time for a couple of years. Typical of America’s top end schools, Harvard charges $63,000 for tuition, room, board and fees. That’s more than a quarter of a million dollars for a degree. Even a state school wants $40,000 a year.

    • White House Is Profoundly Wrong About the Most Embarrassing Thing Senate Has Done

      The White House reacted harshly to the Senate’s overwhelming vote on Wednesday to override President Obama’s veto of a bill that would enable the family members of 9/11 victims to sue the Kingdom of Saudi Arabia in U.S. Courts.

      Press Secretary Josh Earnest called it “the single most embarrassing thing the United States Senate has done possibly since 1983.”

      As it happens, the White House’s principled opposition to the bill was based on its worry that it would open the door to lawsuits from foreigners accusing the U.S. government of crimes, possibly including the killing of hundreds of thousands of people in Iraq and Afghanistan, torture, deaths of innocent people with drones, and global mass surveillance.

      That makes Earnest’s comment the single most hyperbolic thing he’s said since — well — ever.

    • ‘Peace With Justice Is Still a Long Way Away’ – CounterSpin interview with Mario Murillo on Colombian accords

      The peace deal signed between the government of Colombian President Juan Manuel Santos and the FARC, the largest and oldest insurgency in Latin America, is historic. More than 50 years of fighting have killed more than 220,000 Colombians, overwhelmingly poor civilians. These years have seen executions, disappearances, detentions, torture. The violence has forced some 7 million people from their homes, the largest number of internally displaced people in the world.

    • Forget Blairite Propaganda. Sierra Leone was not Blair’s “Good War”.

      This was my speech to the World Beyond War conference at American University, Washington DC on 24 September.

    • Is Your Nation The Exceptional One?

      Nations such as this just don’t have what it takes to be Exceptional. They may have a few nice traditions that mark them out from other nations, and may even be very nice people. But Exceptional? Get out of here!

    • Can Russia Learn From Brazil’s Fate?

      Everyone should read Engdahl’s article. He reports that part of the attack on Rousseff stemmed from Brazil’s economic problems deliberately created by US credit rating agencies as part of Washington’s attack to down grade Brazilian debt, which set off an attack on the Brazilian currency, the cruziero.

      Brazil’s financial openness made Brazil an easy target to attack. One might hope that Vladimir Putin would take note of the cost of “economic openness.” Putin is a careful and thoughtful leader of Russia, but he is not an economist. He has confidence in neoliberal Elvira Nabiulina, Washington’s choice to head the Russian central bank. Nabiulina is unfamiliar with Modern Monetary Theory, and her commitment to “economic openness” leaves the Russian economy as exposed as Brazil’s to Washington destabilization. Nabiuina believes that the assault on the ruble is due to impersonal “global market forces,” not to Washington’s financial clout.

    • British Parliament Confirms Libya War Was Based On Lies … Turned Nation Into a “Shit Show” … Spread Terrorism

      The UK Parliament just confirmed what the alternative media has been saying for years.

      Specifically, a new report from the bipartisan House of Commons Foreign Affairs Committee – based on interviews with all of the key British decision-makers, review of documents, and on-the-ground investigations in Africa – found that the Libyan war was based on lies, that it destroyed the country, and that it spread terrorism far and wide.

    • Trump Promises No First Nuclear Strike, Sort of; New Bill Would Make it Illegal

      Donald Trump tried to ease fears about his finger being on the nuclear button during Monday night’s presidential debate, declaring that “I would certainly not do first strike.” He added: “Once the nuclear alternative happens, it’s over.”

      But moments later, the Republican presidential nominee seemed to backpedal, claiming that he “can’t take anything off the table.”

      Two members of Congress don’t want Trump to have the option.

      Responding to the majority of Americans who say they would not trust Trump with the nuclear arsenal, Sen. Edward Markey, D-Mass, and Rep. Ted Lieu, D-Calif., introduced legislation Tuesday that would bar the president from conducting a nuclear strike unless Congress had issued a formal declaration of war.

    • Clinton’s Faulty New Scheme to ‘Fight’ ISIS

      Even as Hillary Clinton pushes a new scheme for defeating ISIS, the reality is that contradictory U.S. policies in the Mideast that she helped formulate are fueling the growth of jihadi extremism, writes Daniel Lazare.

    • Congress overrides Obama’s veto of 9/11 bill

      Families of those killed in the terror attacks on 9/11 are now legally allowed to sue Saudi Arabia, after Congress voted Wednesday to override President Barack Obama’s veto of the legislation, the first override of his presidency.

      The votes by the House and Senate were overwhelming. Members of both parties broke into applause on the House floor after the vote.

      The Senate approved the override on a 97-1 vote, with Senate Minority Leader Harry Reid the lone Senator voting to sustain the president’s veto. Hours later, the vote in the House was 348-77, with one Democratic member voting “present.”

      White House spokesman Josh Earnest said aboard Air Force One before the House had voted that the Senate’s override is the “single most embarrassing thing the Senate has done since 1983,” referring to the last time the Senate overrode a veto by such a large margin.

    • Barack Obama brands Congress decision on Saudi 9/11 lawsuits bill ‘a mistake’

      Barack Obama says Congress is making a “mistake” and setting “a dangerous precedent” by passing a bill that would allow families of 9/11 victims to sue the Saudi government for damages.

      Both the Senate and the House of Representatives voted by an overwhelming majority to override the President’s veto of the Justice Against Sponsors of Terrorism Act (JASTA).

      The votes on Wednesday afternoon were the first time in the whole of Mr Obama’s presidency that he has been overruled by Congress.

      And speaking on CNN in the wake of the decision, Mr Obama warned that it left the US exposed to lawsuits from people around the world who have been affected by American foreign policy.

    • 9/11 bill veto override angers Saudi Arabia, Gulf nations: We “will stand by Saudi Arabia in every way possible”

      Saudi Arabia’s lobbying and warnings to Congress were not enough to blunt the passing of legislation allowing families of Sept. 11 victims to sue the kingdom for the attacks.

      The oil-rich country, which has a long but often troubled relationship with Washington, maintains an arsenal of diplomatic and commercial tools it could respond with.

      They include curtailing official contacts, pulling billions of dollars from the U.S. economy, and persuading its close allies in the six-member Gulf Cooperation Council it dominates to scale back counterterrorism cooperation, investments and U.S. access to important regional air bases.

    • Sudanese government ‘killing hundreds of civilians with chemical weapons attacks’ in Darfur – Amnesty

      The Sudanese government has been accused of launching chemical weapon attacks on its own civilians, killing hundreds of people including scores of children, in what would be a dramatic escalation of the Darfur conflict.

      Amnesty International says it has compiled the first credible body of evidence to suggest the forces of President Omar al-Bashir bombed swathes of the crisis-hit Jebel Marra region with chemical agents.

      The charity has released before-and-after satellite images, photographs of horrific burn wounds on children and evidence from more than 200 interviews, and called for a United Nations investigation.

      Chemical weapons attacks on the African continent in the post-war era have been extremely rare, and even the accusation that it has carried them out could represent a major setback for Sudan’s improving relations with the international community.

      But it also serves to highlight the ongoing armed conflict in Darfur that, since the peak of the violence and international attention in 2003, has continued to rage more or less unnoticed.

  • Environment/Energy/Wildlife/Nature

    • Palm oil company with links to Tory donors accused of failing to prevent ‘thousands of acres’ of rainforest being destroyed

      A palm oil company with links to Tory party donors and friends of David Cameron has been accused of failing to prevent massive fires devastating the rainforest.

      The firm, called Astra Agro Lestari, is a subsidiary of multi-billion dollar conglomerate Jardine Matheson, which owns major retail outlets, a string of luxury hotels and construction firms – as well as selling second-hand cars – mostly in Asia.

      Jardines is largely controlled by the well-connected Keswick family, descendants of its founders as an opium trader in 19th century China.

      David Cameron’s father Ian was a friend of the Keswicks and worked as a stockbroker to the family. In the 1980s, the future Prime Minister briefly worked at the company’s office in Hong Kong.

    • Trump’s Campaign Is Trying to Cover Up His Lies About Climate Change

      In a delicious turn of events at this week’s presidential debate, Donald Trump received his comeuppance over a four-year-old tweet in which he denounced climate change.

      On stage, his opponent, Hillary Clinton, referenced the tweet from 2012, and remarked that “Donald Trump thinks that climate change is a hoax perpetrated by the Chinese.” His reply? An easily fact-checked lie. “I did not. I do not say that,” he scrambled to say, like a child who’s been caught with his hand in the cookie jar.

    • Finnish firm creates roofing with integrated solar cells

      A Finnish sheet metal manufacturer has teamed up with MiaSolé, an American company that manufactures thin-film photovoltaic products. The film is integrated into the roofing material at Virte’s Turku factory.

      CEO Jaakko Virtanen is excited about integrated solar electricity systems.

      “I’ve dreamed of building materials that would themselves generate electricity, from roofs, windows and wall. Now that’s becoming a reality,” he tells Yle.

    • Earth is locked into 5 degrees Celsius of global warming? Not so fast.

      On Tuesday, a new climate study sent media outlets into a frenzy. News articles declared that Earth was “locked into” 5 Celsius degrees of warming – an exceptionally dire forecast, since most climate scientists warn that a boost of just 2 degrees C. would be catastrophic.

      But fortunately for coral reefs and coastal communities, scientists now say that prediction was wrong.

      It was Gavin Schmidt, director of NASA’s Goddard Institute for Space Studies, who led the charge. Dr. Schmidt was perhaps the most vocal of a group of prominent dissenters, all of whom insist that the actual committed warming estimate hovers around 0.5-1 degrees C. That number, while still significant in terms of global effects, is a far cry from the initial findings. So what caused the discrepancy: bad science or bad science journalism?

  • Finance

    • Passengers in Uber’s self-driving cars waived right to sue for injury or death

      Anyone requesting an Uber ride in a 12-sq mile area in the center of Pittsburgh might now be randomly allocated a self-driving Ford Fusion rather than a human-operated vehicle.

      But passengers riding in Uber’s computer-controlled cars today might be surprised at just how experimental the technology is. According to documents obtained by the Guardian under public records laws, until as recently as June anyone not employed by Uber riding in one of its autonomous vehicles (AVs) had to sign a legal document waiving the company of any liability for their injury or death.

      One senior Pittsburgh police officer signed a waiver on 23 June: “I acknowledge that some or all of the AVs in which I ride are in a development phase, are experimental in nature, and that riding in an AV may involve the potential for death, serious injury, and/or property loss.”

      The document was required by Uber’s Advanced Technologies Center (ATC), a research hub that in early 2015 hired dozens of robotics experts from nearby Carnegie Mellon University. Since then the ATC has been working furiously to catch up with the likes of Google and Tesla in self-driving technology – a task Uber CEO Travis Kalanick has described as “basically existential for us”.

    • The Questions That Should Be Being Asked About Trump’s Tax Returns

      A lot has been said about Trump’s refusal to make his tax returns public. But despite the volume of commentary, it’s not clear the right questions even are being asked.

      Trump claims he can’t release his returns because he’s under audit. At some level, that’s a legitimate concern. It would hardly be fair if thousands of tax professionals who oppose Trump politically helped the IRS by publishing their own analyses of the returns. Ultimately, however, it’s a phony excuse.

      But rather than challenge the logic behind Trump’s refusal to release returns, a series of questions should be asked:

      First, what tax years are under audit? Does it go back beyond 2012? If not, can the 2011 return be released? After all, the statute of limitations on the audit of that year has passed, so there’s no exposure to Trump by releasing that return. If not 2011, how about 2010?

      Second, why haven’t the audit notices been released? An audit notice is a short, generic letter from the IRS stating that a taxpayer’s return has been selected for examination. There’s nothing so sensitive in such a generic notice that it could not be made public. At this point, Trump has not even offered up this most basic evidence that he is really even under audit. Why hasn’t proof been demanded?

    • Brexit – who has the power to change UK law?

      Another way of seeing the inconsistency of the Government argument is this. If the Crown has the power to leave the EU without Act of Parliament, then it has always had it. The Referendum Act contains no provision that alters the constitutional position – it provided for a referendum on EU membership, defining the question to be asked, but without specifying what was to be done with the result. For that reason it is often referred to as “advisory”. Therefore, if the Government has the power to take the UK out of the EU today, then it equally had the power one year ago. But I do not think anyone would have seriously argued before the Referendum that the Government could take the UK out of the EU under prerogative power without any Parliamentary approval.

    • Britain’s backdoor to EU influence

      The U.K. has launched a behind-the-scenes diplomatic effort to influence EU affairs during the Brexit process by offering to lend officials to two small countries that will hold the bloc’s presidency next year.

      Britain gave up its six-month slot in the rotating presidency calendar, which had been scheduled for the second half of 2017, after other countries felt it would be inappropriate to have the U.K. setting the political agenda for a union it had voted to leave. But soon after the June referendum, London began hedging its bets by trying to position officials in Malta and Estonia, which will take their turns in the presidency next year.

  • AstroTurf/Lobbying/Politics

    • Donald Trump’s Roger Rabbit Moment

      As usual, what may have been most important is what went unsaid. The phrase “income inequality” came up only once, and that was from moderator Lester Holt. There was little mention of education or health care; some talk of energy policy but almost nothing on global warming other than Clinton’s reference to Trump claim that climate change is a hoax perpetrated by the Chinese (last night he denied ever saying it, but he has).

      And absolutely no mention of the ruinous influence of money in politics, which in retrospect made it a bit jarring that when Bill and Chelsea Clinton entered the debate auditorium they sat next to Vernon Jordan, a close family friend and adviser, certainly, but also senior counsel at Akin Gump, the biggest and most profitable lobbyist in Washington, prime peddlers of influence and privilege on Capitol Hill.

    • NYT Makes Bill Clinton’s Sex Life the Lead Story–Without Mentioning Trump’s

      Now we know how candidates can get a piece of information featured in the lead story of the New York Times: They just need to declare that they aren’t going to talk about it during a national debate.

      Thus Donald Trump’s cryptic last-minute debate comment—”I was going to say something…extremely rough to Hillary, to her family, and I said to myself, ‘I can’t do it. I just can’t do it. It’s inappropriate. It’s not nice’”—was unfolded into a piece in the top right corner of the Times‘ front-page (9/27/16), arguably the most valuable journalistic real estate in the United States, about Bill Clinton’s extramarital affairs.

    • Lester Holt Asks Zero Questions About Poverty, Abortion, Climate Change

      Presidential debates do as much to illustrate corporate media priorities as they do to showcase the candidates. They provide a snapshot into what the media, in this case represented by NBC’s Lester Holt, prioritizes as issues worthy of discussion.

      A week before the debate, Comcast-owned NBC announced the topics, and one could already tell we weren’t going to be in for a substantive evening: “Achieving prosperity,” “America’s direction” and “securing America.” This generic approach lead to a generic debate that focused mostly on horserace disputes and vague, open-ended questions about taxes and jobs.

      Holt didn’t ask any questions about the following topics: poverty, abortion, climate change, immigration, healthcare, student debt, privacy, LGBTQ rights or drug policy. (NBC reported before the debate that abortion and immigration were two of the policy issues that voters were most interested in, as indicated by Google searches, along with the economy and police shootings.)

      What was discussed: jobs, Trump’s tax returns, who did or didn’t support the Iraq War, raising taxes on the rich, race (framed mostly in a way that pandered to Trump’s theme of a country in disarray), Russian cyberattacks, ISIS, Obama’s birth certificate, Clinton’s physical appearance and whether the candidates would accept the election results.

    • Blow-by-Blow Analysis of the Decisive Moment of the Debate – through the eyes of a former debate coach

      I wasn’t planning to do a second blog about ‘the debate’ but two days after it, as we start to await the first polling to show its impact, I feel the need to write one more blog. I do believe this debate decided the election. I think many will come back to look at that Monday night as the time when Trump folded, and some will also see the brilliance of how Hillary skewered Trump and trapped him to make that debate far worse for Trump than it might have been. So, with the very rare opportunity for me to write a debate review on this blog, why not do something more serious about the blow-by-blow. How did it go? Lets get into the weeds. How did Hillary demolish Trump. I am using the full recording of the debate via Real Clear Politics which had the ABC network feed.

      Trump needed to remain Presidential throughout the first debate, he’d then get something near a tie. Hillary had to clearly win the debate, a tie was not good enough, she was expected to be the superior debater and had to now deliver.

    • Stein trolls Johnson on world leaders gaffe, also fails to name world leaders

      May, Stédile, and Corbyn, however, aren’t technically world leaders, as none holds a top position in their country’s government. May is a member of the Canadian House of Commons. Stédile is an economist and member of Brazil’s Landless Rural Workers Movement, which he helped found. Corbyn is the leader of the Labour Party in Britain.

      Johnson, sitting with Libertarian vice presidential nominee Bill Weld, was asked by MSNBC’s Chris Matthews to “name one foreign leader that you respect and look up to.” Johnson couldn’t name any.

    • Sunday Paper Q&A: Jill Stein

      You may not realize it, but there are actually two women running for president this year. In addition to Hillary Clinton, the first female major-party candidate, voters also have the choice to elect Jill Stein, who represents the Green Party.

      Stein is a practicing physician and an environmental health advocate. While her low polling numbers prevented her from participating in the first debate, Stein remains committed to her campaign. She exclusively sat down with us for this week’s Sunday Paper Q&A to explain why she’s motivated to stay in the race.

    • Endorsement: Libertarian Gary Johnson for president

      Today this newspaper does something it has never done in its 143-year history: endorse someone other than the Republican candidate in a presidential contest.

      Since its founding in 1873, The Detroit News has backed a Republican every time it has made a presidential endorsement (three times we have sat on the sidelines — twice during the Franklin Roosevelt elections and in the 2004 Bush/Kerry contest).

      We abandon that long and estimable tradition this year for one reason: Donald J. Trump.

      The 2016 nominee offered by the Republican Party rubs hard against the editorial board’s values as conservatives and Americans. Donald Trump is unprincipled, unstable and quite possibly dangerous. He can not be president.

    • Gary Johnson tries to get past ‘brain freeze’ with Detroit newspaper’s endorsement

      But Johnson’s self-described “Aleppo moment” on Wednesday night’s MSNBC town hall proved irresistible for critics and rivals. Jill Stein, the Green Party candidate who has fallen even further back in polls than Johnson, took the opportunity on Thursday to name the foreign leaders she admired — if anyone was curious. (No one she mentioned is currently serving as the head of government in any country.)

    • Politico Tries to Play Gotcha with Jill Stein’s Comments on Gary Johnson’s ‘World Leader’ Gotcha

      Last night on MSNBC, Chris Matthews asked Gary Johnson to name three foreign leaders that he admired. Rather than rejecting the question for its implicitly pro-government bias and as a silly thing to ask someone running for president, Johnson tried to answer by listing former Mexican president Vicente Fox and blanked on the name, saying it was another “Aleppo moment.” (Maybe soon they’ll be calling them Gary Johnson moments)

      Within minutes, social media was ablaze with users who probably couldn’t name a world leader (except maybe for Justin Trudeau, who’s become something of a favorite of social media progressives) claiming that Johnson couldn’t name a foreign leader at all, when the question was about leaders you respected.

      [...]

      Responding to my comment based on Twitter, Stein suggested that Politico was “just trying to play gotcha to distract from their favored candidate’s awful foreign policy record.” It’s hard to disagree with that assessment.

  • Censorship/Free Speech

    • Singapore jails teen blogger Amos Yee for anti-religion posts
    • Amos Yee gets 6 weeks’ jail for wounding religious feeling
    • Amos Yee gets 6 weeks’ jail for wounding religious feelings
    • Amos Yee pleads guilty to 3 charges
    • Jordan Imposes Media Blackout on Christian Writer’s Assassination as Protests Erupt

      Jordanian authorities imposed a blackout on the country’s press and social media Monday, preventing any coverage of the murder of the Christian writer shot dead outside an Amman court as protesters called for the government’s resignation.

      The censorship order by the Jordanian judiciary came after the murder of Nahed Hatter as he arrived at the city’s Palace of Justice on Sunday, accused of sharing a satirical cartoon on Facebook and of breaching the country’s blasphemy laws.

    • Montreal Muslim school president was ‘devastated’ by feminist’s criticisms, slander trial hears

      Quebec’s long-running debate over secularism and the place of religious minorities moved into the courtroom Monday as a slander trial opened against an outspoken critic of Islamic fundamentalism.

      A crowd of supporters, including two who arrived from France, filled the room to hear the case against Djemila Benhabib, who is being sued by a private Muslim school after she likened its teaching to the instruction received in terrorist training camps in Pakistan and Afghanistan.

      Benhabib, who was born in Ukraine but spent much of her childhood in Algeria, was invited on to a Montreal radio show in 2012 after writing a blog post about the Muslim School of Montreal.

      Benhabib told 98.5 FM host Benoît Dutrizac that she was shocked by what she found on the school’s website.

      Koranic verses being taught to children were “extremely violent” and “misogynistic,” she told Dutrizac in a recording played in the court. She said the school offers students “an indoctrination worthy of a military camp in Afghanistan or Pakistan.” The school, she said, “is creating fundamentalist activists who in a few years will be demanding accommodations and all sorts of bizarre things … We are an extremely long way from citizenship, from the values that belong to our society.”

    • Migrants Are Racist to Blonde Women, Swedish Ethics Professor Says

      Professor of Ethics Ann Heberlein has argued that blonde people in Sweden are subjected to racist abuse and violence from “people with a non-European appearance”.

      Ms. Heberlein, who appears regularly on Swedish Radio’s “Thoughts for the Day” and “Philosophical Room”, says blonde and Swedish victims of this racism choose to stay silent because “anti-racist” left wingers say that as a “privileged” group, ethnic Swedes have no right to complain.

      The professor at Lund University describes the racist abuse hurled at white women in Sweden, with phrases like “Svenne (meaning ethnic Swede) whore” and “bloody racist whore” shouted at them by people with migrant backgrounds.

    • Singapore jails teenager for hurting God’s feelings

      Amos Yee, a 17-year-old blogger in Singapore, is to spend six weeks in jail for “wounding religious feelings.” It is his second such jail term: he spent a month in jail last year for criticizing Christianity.

    • Donald Trump Happily Repeating Lie About Google Autocomplete Suppressing Negative Hillary News

      While politics isn’t generally a topic we dive into around here, technology policy and issues certainly are. And, since presidential election cycles infect every conceivable topic like a wine stain spreading across your favorite couch, we’ve talked about the two mainstream candidates quite a bit recently. And I get the complaints from all sides against both candidates, but it’s become somewhat breathtaking to watch Donald Trump build a campaign in large part on nonsensical and easily debunked conspiracy theories, such as how the planned internet governance transition will cede control of the web to China and Russia, or that our current sitting President might be a secret communist Muslim clay-person, but maybe not.

      And, of course, there is the constant claim of victim-hood at the hands of that damned liberal establishment, which now apparently includes Google. Some background for you is in order. Over the summer, a really dumb video went viral after claiming to show that Google was manipulating autocomplete searches to keep any bad press out of the results for searches about Hillary Clinton. Compared with Bing, for instance, Google’s autocomplete failed to finish off a search for “Hillary Clinton cr” with “Hillary Clinton crimes”, instead completing as “Hillary Clinton Crimea.” While your drunk uncle lost his goddamned mind over a conspiracy surely proven, Google chimed in to note that it specifically designed its autocomplete feature to keep disparaging results from anyone’s name, not just Hill-Dog’s. This was easily shown by putting in “Donald Trump cr”, which likewise autocompleted as “Donald Trump Crimea.”

      And that really should have been the end of that. But, because Donald Trump’s campaign isn’t one to pass on a good chem-trails story, its candidate tried to deflect a general panning of his debate performance by repeating this already disproved accusation.

    • Censorship is Killing the Spirit of Social Media

      Take Twitter, for example. The online social networking service is often criticized for not protecting its users and allowing pretty much anything on its platform. Because it does allow anything on its platform and that’s part of why people love it so much.

      Twitter is also kind of like a filing cabinet that records and preserves our digital history for us. You can go to Twitter, search a hashtag and find photos, articles and all the opinions you could ever want to hear on a particular moment from (recent) history. That’s pretty cool, when you think about it. But what’s not cool is finding tweets that you never saw, tweets that seemingly disappeared even though the 140-characters were typed.

      Twitter has been caught removing tweets, hiding tweets and deleting trending hashtags. Such accusations have opened the doors to how such a prominent platform—which sources the news for over half the population-gets away with censorship before our very eyes.

      It was just a few months ago that Twitter was accused of censoring tweets under ‘#DNCLeak’ during the WikiLeaks e-mail debacle. In this particular scenario, conservative Twitter users accused the platform of removing the hashtag from the trending bar, despite it displaying an estimated 250,000 tweets about the leaked employee e-mails from the Democratic National Committee.

      On the other side of the political spectrum, of course, is the whole Milo Yiannopoulos situation, which involves permanent censorship in the form of banning. Another accusation comes from Trump supporters, which say the social platform concealed his tweets asking for campaign donations.

      But is this censorship? Or is it just the work of a flawed algorithm?

    • HRC concerned about censorship of publications

      The Human Rights Commission(HRC) has released a statement regarding Freedom of Expression in relation to Cayman’s Prohibited Publications Order.

      The statement has been released during World Banned Books Week which is held each year, the last week in September and is recognised by the American Libraries Association. During the week, attention is focused on freedom of expression in relation to reading and the issue of censorship. In the Cayman Islands censorship of reading materials is found in the Prohibited Publications Order (under the Penal Code) which first came into effect in the Cayman Islands in 1977.

    • Censorship: Facebook Deleted 100,000 ‘Hate Posts, Insults’ in Just One Month

      Facebook revealed that within the last month it deleted 100,000 posts by German users for containing “hate”, but Justice Minister Heiko Maas has blasted the figure as too low.

      At a conference in Berlin, Maas said that to be accountable, social networks must publish the number of posts contested by users. The Justice Minister’s remarks implied that complainants on social media are valid judges of what constitutes criminal speech, something usually only determined by a court.

    • BANNED TOGETHER: A CENSORSHIP CABARET Set for Banned Books Week in NYC
    • Wallace students read banned books aloud to draw attention to censorship
    • Distributed Censorship or Extortion? The IoT vs Brian Krebs
  • Privacy/Surveillance

    • UK Government Says Smart Meters Can Definitely Be Trusted Because GCHQ Designed Their Security

      The idea behind smart meters — that detailed information about how you consume electricity will allow you to use power more efficiently and thus cut your bills and your home’s carbon emissions — is a good one in theory. And yet smart meters are still not used very widely, even in countries like the UK, where the government has a strategy to install millions of them by 2020. Actually, the likely savings by users are small, but smart meters also promise to allow the electricity industry to lower salary costs by carrying out meter readings remotely, which is one reason why it is so keen on the idea. Another is because smart meters make it is easy to cut off someone’s supply if they don’t pay their bills.

      The slow uptake of smart meters seems in part to be due to public concerns about security. People are worried that their smart meter will spy on them, sending back information to electricity companies that might be intercepted and used for targeted burglary when they are away. Similarly, there are fears that if the smart meter control system were compromised, domestic electricity supplies might be at risk on a large scale.

      One of UK Parliament’s most important committees, the one monitoring science and technology, has just published a report into the UK smart meter roll-out, offering recommendations for ways to speed it up.

      [...]

      has reported, one of the worst features of the UK’s Investigatory Powers Bill that is currently wending it way through Parliament is that it creates a legal framework to allow GCHQ and the other intelligence agencies to hack into any kind of equipment in order to carry out surveillance. Of course, that’s really rather easy when you were the one who designed its security systems.

    • FBI’s Controversial Surveillance Program Declined After Snowden

      The FBI’s use of a controversial program that collected Americans’ phone records decreased significantly after Edward Snowden exposed it to the world in 2013, a new report has found.

      The program allows the FBI to get access to phone records—but not the content of phone calls—with permission from the Foreign Intelligence Surveillance Court. Between 2012 and 2014, that court approved 561 so-called “business records orders,” but that number dropped from a nine-year high of 212 in 2012 to 170 in 2014, a nearly 20 percent decrease, according to a review by the Justice Department’s inspector general.

      The number fell again in 2015 to 142 orders. Snowden’s revelations helped fuel a change in U.S. law that ended the government’s practice of collecting and storing the phone records. Now, the government must request the information from phone companies.

    • Canadian Bank Prohibits Giving Passwords to Police

      While waiting for ten minutes on “hold” to make an appointment with my local branch of Scotiabank, I had time read through the new “Digital Services Agreement. Most of the eighteen pages were unremarkable, but a couple of things stood out.

      When you click “Accept”, you are agreeing to not give your password to police if they ask!

    • WhatsApp refuses to delete user data in India after court ruling

      Changes to WhatsApp’s data sharing rules are causing more controversy this week. The company refuses to comply with a court order from India’s Delhi High Court, which requested that the company delete any and all data collected by users who opted out of the company’s new privacy policy before September 25th.

      Since WhatsApp announced that it would be sharing some user data, including phone numbers, with Facebook, the app has come in for some serious critisism for undermining consumer privacy in India. These changes were made under the guise of cutting down on spam and improving services, but a good portion of users remain unconvinced.

    • EU clamps down on sale of surveillance tech to despotic regimes

      The European Commission has set out new measures to stop European companies exporting surveillance gear to despotic regimes. The proposal would also partially relax the rules on exporting cryptography tools.

      The proposal to overhaul the EU’s export controls on dual-use products—powerful technologies such as crypto software or rocket engines that can be used for good or evil—was presented on Wednesday (PDF) and includes a new human rights dimension.

      “It’s not a revolution. It’s an evolution of our current structure,” a commission source told Ars. “The foundation that is already there, is fairly solid, but this new proposal is more efficient, and will reduce the cost of the control, both for authorities at national level and also for the industries that have to apply for licenses.”

      “This new human security dimension comes from a conviction that our export controls should also enable us to prevent the misuse of items that are used to violate human rights. The types of technologies we are talking about, surveillance, etc., do not fit clearly within the current military regulation,” the source continued.

    • Apple Logs Your iMessage Contacts — and May Share Them With Police

      Apple promises that your iMessage conversations are safe and out of reach from anyone other than you and your friends. But according to a document obtained by The Intercept, your blue-bubbled texts do leave behind a log of which phone numbers you are poised to contact and shares this (and other potentially sensitive metadata) with law enforcement when compelled by court order.

      Every time you type a number into your iPhone for a text conversation, the Messages app contacts Apple servers to determine whether to route a given message over the ubiquitous SMS system, represented in the app by those déclassé green text bubbles, or over Apple’s proprietary and more secure messaging network, represented by pleasant blue bubbles, according to the document. Apple records each query in which your phone calls home to see who’s in the iMessage system and who’s not.

      This log also includes the date and time when you entered a number, along with your IP address — which could, contrary to a 2013 Apple claim that “we do not store data related to customers’ location,” identify a customer’s location. Apple is compelled to turn over such information via court orders for systems known as “pen registers” or “trap and trace devices,” orders that are not particularly onerous to obtain, requiring only that government lawyers represent they are “likely” to obtain information whose “use is relevant to an ongoing criminal investigation.” Apple confirmed to The Intercept that it only retains these logs for a period of 30 days, though court orders of this kind can typically be extended in additional 30-day periods, meaning a series of monthlong log snapshots from Apple could be strung together by police to create a longer list of whose numbers someone has been entering.

      The Intercept received the document about Apple’s Messages logs as part of a larger cache originating from within the Florida Department of Law Enforcement’s Electronic Surveillance Support Team, a state police agency that facilitates police data collection using controversial tools like the Stingray, along with conventional techniques like pen registers. The document, titled “iMessage FAQ for Law Enforcement,” is designated for “Law Enforcement Sources” and “For Official Use Only,” though it’s unclear who wrote it or for what specific audience — metadata embedded in the PDF cites an author only named “mrrodriguez.” (The term “iMessages” refers to an old name for the Messages app still commonly used to refer to it.)

    • Terrorism Directive: European Parliament to Cowardly Surrender to Outrageous Security Call

      For a few months, the European Parliament has been discussing a directive aimed at updating the European legislation on combating terrorism. After a vote in the LIBE Committee, MEPs agreed to send the text directly to a trialogue discussion; this reduces opportunities for a democratic debate on an issue that bears strong consequences for fundamental rights.
      Today, Wednesday 28 September, the third trialogue between the European Parliament, the European Commission and the Council of the European Union is to take place. Faced with the deadlock organised by European institutions, La Quadrature du Net emphasises the dangers of this text.

    • Allo: Snowden Says New Google App Could Become Tool For Police Surveillance

      Google recently released a new messaging application called Allo that it calls “revolutionary,” but whistleblower Edward Snowden warns that the app could be used for government surveillance.

      Radio Sputnik’s Loud & Clear spoke with Professor Bryan Ford, leader of the Decentralized/Distributed Systems lab at the Swiss Federal Institute of Technology in Lausanne, about the app and its potential impact on personal privacy.

    • Why Edward Snowden (NSA Whistleblower) Just Warned People Not to Use Google’s New Chatting App

      According to Edward Snowden, if you want to avoid giving law enforcement the green light to check out all your communications, don’t use it.

      “What is #Allo? A Google app that records every message you ever send and makes it available to police upon request,” the whistleblower tweeted.

      Tech giant Google has been working hard to infiltrate the virtual chatting world, launching Spaces, Duo, and most recently, Allo, all in the past couple of months.

      On its site, Allo is described as “a smart messaging app that helps you say more and do more. Express yourself better with stickers, doodles, and HUGE emojis & text. Allo also brings you the Google Assistant, preview edition.”

  • Civil Rights/Policing

    • For Latinos, the Problem Isn’t Trump—It’s Trumpismo

      Anyone watching this year’s elections knows that Latinos are going to play a critical role. The Age of LatinX is upon us. Without a doubt, LatinXs will play a determinate role in these important elections. As the presidential candidate for the Green Party, I take seriously the urgently critical role of the Latino vote in the 2016 elections. That’s why our campaign continues the work of raising LatinX and other issues.

      In an election where some are depressed because they see no path other than one that winds between two obsolete but deadly choices, this is a race to the bottom between the “lesser evil” and the “greater evil,” Hillary Clinton and Donald Trump. Such a choice starkly reflects the problems Latinos and we all face, ones that reach far and beyond Donald Trump. Trump’s candidacy is a virulent symptom of a far more sinister problem infecting our entire political system, something every community, including Latinos, experiences in very particular ways, regardless of their political affiliation.

      Growing numbers of Latinos are among the millions who helped push the question—“How do I vote for Jill Stein?”—as a top Google search term for our campaign after Monday’s debate. LatinXs have heard our message and are acting on their desire for change. I am confident and see every day on the campaign trail that even more are preparing to join us in this election. Our presidential platform is packed with the policies and positions—student debt forgiveness, free college education, fair trade, not free trade, labor rights, racial justice and police reform, a Green New Deal, and others—that we all know are necessary, and that Latinos especially have good reason to be concerned with.

    • The Military Logic of Punishing Chelsea Manning’s Suicide Attempt

      Last week, imprisoned whistle-blower Chelsea Manning was sentenced to 14 days in solitary confinement as punishment for her suicide attempt in early July at the prison barracks at Fort Leavenworth. The Fort Leavenworth disciplinary panel could not explicitly punish Manning for attempted suicide. Completed suicide is not a disciplinary violation and, to be guilty of attempting a crime, it’s necessary for the act which is attempted to be one. They disciplined her instead under a charge known as “conduct which threatens,” stating that Manning’s attempt to die interfered with “orderly running, safety, good order and discipline, or security” of the facility. (She is also being disciplined for possessing an unauthorized book). The whistle-blower stated that she was driven to suicide over the prison’s then-failure to appropriately treat her gender dysphoria. Why Manning injuring herself is deemed a threat to the facility’s functioning says much about the nature of that place’s function, says much about the true function of prisons.

      Before 1823 in England, according to early common law, if a person committed suicide, they would be posthumously punished. The body would be buried at the crossroads of a highway, impaled by a stake, often with a stone laid over the face (to prevent resurrection as a ghost or vampire). The deceased’s property would be forfeited to the king. Suicide was criminal because sovereignty over life and death did not then reside with the individual but with God, and with his chosen earthly emissary, the king. And since suicide was deemed an ungodly, criminal act, so too was an attempt—at times punishable by hanging. There’s no contradiction here: To execute a person who has herself tried to die is still punishment, not wish fulfillment. It’s the punishment of removing every last shred individual sovereignty; it’s the state’s reminder of where sovereignty really resides. Current state punishment of attempted suicide, in its rare cases like Manning’s, serves the same purpose.

    • Does The FTC Get To Ignore Section 230 Of The CDA?

      The case involves weight loss products, including colon cleanses, vended by LeanSpa. To generate more sales, LeanSpa hired LeadClick to act as an affiliate marketing manager. LeadClick coordinated promotion of LeanSpa’s products with LeadClick’s network of affiliates. Some affiliates promoted the products using fake news sites, with articles styled to look like legitimate news articles and consumer comments/testimonials that were fake. Apparently, all of this added up to big business. LeanSpa paid LeadClick $35-$45 each time a consumer signed up for LeanSpa’s “free” trial (which was a negative billing option). LeadClick shared 80-90% of these sign-up fees with affiliates and kept the remainder for itself. In total, LeadClick billed LeanSpa $22M, of which LeanSpa paid only $12M. Still, LeanSpa turned into LeadClick’s top customer, constituting 85% of its eAdvertising division’s sales.

    • An Ongoing Lack Of Technical Prowess Is Resulting In Bad Laws, Bad Prosecutions, And Bad Judicial Decisions

      Everyone in government is talking cyber-this and cyber-that, even though a majority of those talking don’t have the technical background to back up their assertions. This leads to dangerous lawmaking. The CFAA, easily one of the most abused computer-related laws, came into being thanks to some skittish legislators who’d seen one too many 80′s hacker films. (“WarGames,” to be specific.)

      Faulty analogies have led to other erroneous legislative conclusions — like the comparison of email to snail mail — which has led to the government treating any unopened email as “abandoned” and accessible without a warrant.

      But the problem goes further than the legislative branch. The executive branch hasn’t been much better in its grasp of technical issues, and the current slate of presidential candidates guarantees this won’t change for at least another four years.

      The judicial branch has its own issues. On both sides of the bench, there’s very little technical knowledge. As more and more prosecutions become reliant on secretive, little-understood technical tools like cell tower spoofers, government-deployed malware, and electronic device searches, unaddressed problems will only multiply as tech deployment ramps up and infusions of fresh blood into the judicial system fail to keep pace.

    • Court Dumps Cops’ Complaint They Were Unfairly Treated After Shooting Two Unarmed Suspects 47 Times

      In 2012, Cleveland police officers engaged in perhaps the most one-sided “shootout” ever with two suspects at the tail end of an (unauthorized) police chase. By the time it was over, officers had fired 139 bullets into a vehicle they had trapped in a school parking lot. Twenty-three of those hit the driver. Twenty-four hit the passenger. Both vehicle occupants were killed.

      One officer — Michael Brelo — apparently thought he was starring in his own action film. He unloaded 49 rounds in just over 20 seconds while standing on the hood of the stopped vehicle. All told, more than 75 Cleveland PD vehicles joined the chase/shooting. At the end of a yearlong investigation, 63 officers were suspended for their participation. Six officers were charged.

      The genesis of the horrific debacle was nothing more than a car backfiring. One cop mistook this for a gunshot and all hell broke loose. No weapons were recovered from the vehicle.

      One of the stranger offshoots of the infamous shootings was a lawsuit filed by several Cleveland police officers who took part in the chase. In their view, they were punished more harshly than African American officers who also participated in the unauthorized pursuit.

    • Help Me Choose a Nominee for the Hugh Hefner First Amendment Award

      The Hugh M. Hefner First Amendment Awards were established in 1979 to honor individuals who have made significant contributions to protect the First Amendment rights of Americans. They are looking for nominees for this year’s awards, and I’d like to send them a name.

    • Agent who interrogated Abu Zubaydah: ‘Where we went wrong as a nation’

      “His case represents the A to Z of where we went wrong as a nation,” said former FBI agent Ali Soufan, who interrogated some of the most prized captives of the war on terror, and considered Abu Zubaydah “a high-ranking terrorist” at his capture. “In a way, it was the original sin that led to the institutionalization of the so-called Enhanced Interrogation Techniques.”

    • Police Brutality Is a Campaign Issue, So Departments Ignore It on Social Media

      There’s zero doubt that police forces across the nation are caught between the crosshairs of politics and systemic racism; their losses and crimes either championed or hurriedly swept beneath the rug on the campaign trail.

      Both Hillary Clinton and Donald Trump addressed race relations in the United States as a symptom of a larger criminal justice problem. Trump went as far as to call America’s legacy of police brutality a matter of “law and order,” mirroring the strategic oversimplification of racism that has contributed to the killings of 285 black and Hispanic people by police officers in 2016 alone.

      But despite desperate efforts by citizens to document the unlawful abuse of minorities by officers, police departments still wield considerable control over their images and public messages. Thanks to social media sites like Facebook and Twitter, police are attempting to humanize themselves online, whether or not they’re physically repairing their relationships with America’s communities.

    • Russian journalist arrested for ‘illegal’ voting after exposing fraud in Duma elections

      An award-winning journalist who exposed voting fraud during Russia’s parliamentary elections has himself been arrested for alleged fraud.

      Denis Korotkov, a correspondent for the independent news website Fontanka, was scheduled to appear in court in St Petersburg on Wednesday on charges of “illegally obtaining a ballot”.

      But campaigners say Mr Korotkov was working undercover to expose vote rigging in the Duma elections, which have provoked international concern, and is now being harassed for his work.

      Mr Korotkov documented how he posed as a voter on 18 September and was given a sticker by polling station officials, who then arranged for him to be transported around St Petersburg with others to cast multiple ballots for specified candidates.

    • Denmark reverses course on refugee ‘child brides’

      Specifically, the agency concluded that the separate living quarters would violate the UN’s Convention on the Rights of the Child and Article 8 of the European Convention on Human Rights, which guarantees the right to one’s “private and family life”.

      Josephine Fock, an MP for The Alternative who raised the issue with DIS, cheered the reversal.

      “It is completely outrageous. We are talking about people who have fled to Denmark who are being split from each other. Some of them have children together and investigating individual [asylum] cases takes an unbelievably long time,” Fock told Metroxpress.

      In January, the Integration Ministry obtained an overview of the Danish asylum system that revealed that there are currently 27 minors who have spouses or partners. According to an earlier report in Metroxpress, there are two married 14-year-old girls at Danish asylum centres. One is married to a 28-year-old man, while the other is pregnant and has a 24-year-old husband.

    • [Older] Woman who mocked burka goes into hiding after online trolls offer bounty for her murder

      In a controversial article, Lejla Colak said forcing women to wear the Islamic headscarf was like forcing them to strap a sex toy to their heads.

      Twisted online trolls have launched a sick hate campaign against the Bosnian reporter, offering a cash prize if anyone kills or rapes her.

      One social media user, reportedly a member of the Bosnian army, wrote: “Are there any volunteers to rape lovely Lejla? I will personally pay for it.”

    • When ‘Yelling Commands’ Is the Wrong Police Response

      The story out of El Cajon, Calif., a San Diego suburb, had an eerie familiarity: The police respond to a person exhibiting some kind of disturbing behavior, but the subject — perhaps lost in his own, altered world — does not comply with the usual commands, does not heed the standard warnings, acts in a way that seems to invite danger, and ends up dead.

      An officer in El Cajon fatally shot a man identified as Alfred Olango on Tuesday, after Mr. Olango’s sister called 911 for help because he was acting erratically. The police released a still frame from a bystander’s video showing Mr. Olango, 30, mirroring the shooting stance of the officer facing him — feet apart, hands clasped and pointed at the officer. But one man had a gun and the other, it turned out, did not.

      “I called for help; I didn’t call you guys to kill him,” the sister wailed on a Facebook video recorded by a bystander.

      Far too little is known about what happened in El Cajon to judge the officer’s conduct, law enforcement experts and advocates for mentally ill people say. But the police use of force — sometimes lethal — against those with diminished mental capacity is distressingly common. The experts and advocates say that while training and practices have improved in the last generation, officers in many agencies still receive little or no education in how to recognize and deal with people who may not behave rationally.

      Like other police uses of force, confrontations involving people with diminished mental capacity have increasingly been caught on video and turned into national news. In July, officers in Sacramento shot and killed a man who was walking and running in the street, gesticulating wildly, and who refused to obey orders to drop the knife he was holding or to lie down.

    • Stand in solidarity with imprisoned writers in Saudi Arabia

      English PEN is continuing to hold monthly vigils in support of imprisoned writers Raif Badawi, Waleed Abulkhair and Ashraf Fayadh. Please join us to show them they have not been forgotten.

      English PEN has been holding regular vigils outside the Saudi Embassy in London in support of imprisoned blogger Raif Badawi and his lawyer Waleed Abulkhair since January 2015 when Badawi was first flogged for his peaceful activism. While Badawi has not been flogged since, he is continuing to serve a ten-year prison sentence, while Abulkhair is serving 15 years in prison for his human rights activism.

      PEN is also continuing to call for the immediate release of Palestinian poet and artist Ashraf Fayadh. Originally sentenced to death, Fayadh is now serving 8 years in prison and, like Badawi, continues to have the threat of hundreds of lashes looming over him.

      Please join us on Friday 30 September from 9 – 10am for a peaceful vigil at the Saudi Arabian Embassy in London. Activists are asked to meet at the Curzon Street entrance to the Embassy. (note: the postal address of the Embassy is 30-32 Charles Street, Mayfair, London).

    • Teen boy in Saudi Arabia arrested for “unethical behaviour” after flirty chat with YouTube teen girl star

      Abu Sin (his name means “toothless”) and Christina Crockett jokingly declared their love for one another in a silly YouNow stream that has since been uploaded to YouTube. They struggled through language barriers and acted like goofy young people.

      Evidently, being a cute kid is a crime in Saudi Arabia, where the 19 year old internet goofball lives.

      A Saudi attorney told Okaz newspaper the videos violate the country’s interpretation of Sharia law and internet regulations. Abu Sin could face up to three years in prison.

    • Man hit by tram after mass brawl breaks out between migrants in Vienna

      At least 20 people were involved in the fight, believed to have been between a group of Chechen and Turkish migrants, in the Austrian capital of Vienna on Tuesday evening.

      Austrian media reported that the trouble started when a Chechen man approached a group of 15 Turkish men socialising in an internet cafe and told them to be quiet.

      A brawl ensued, spilling out of the cafe and into the streets of the city’s Favoriten district.

      There was reports that one man was armed with a knife.

      Vienna is also home to a large population of Chechen migrants.

    • Interview: John Kiriakou On Supporting Jeffrey Sterling So He Doesn’t Die In Prison

      Former CIA officer John Kiriakou, who served a prison sentence at a federal prison in Loretto, Pennsylvania, joined Shadowproof managing editor Kevin Gosztola to talk about the case of former CIA officer Jeffrey Sterling, which they have both followed closely.

      Kiriakou’s reporting describes how officials at the Englewood federal prison, where Sterling is confined, failed to give him proper medical treatment for heart attack symptoms. Gosztola recently exchanged letters with Sterling and published a report on how the Bureau of Prisons is failing him.

      During the interview, Kiriakou shares his experiences with prison medical care and how all too often those who need care are denied proper treatment. He talks about how the Bureau of Prisons thinks prisoners like Sterling are malingering, which means they are lying about and faking serious health problems. He also describes why it is so important for a person in this situation to have outside support.

      Sterling has demanded the prison give him access to an outside doctor so that he can have his severe heart problems addressed.

    • Inside the Chicago Police Department’s secret budget

      When the clerk called Willie Mae Swansey’s case in a crowded courtroom last February, the 72-year-old approached the judge slowly, supporting herself with a four-pronged cane. It had been a busy afternoon in the Daley Center’s civil forfeiture courtroom, with more than a dozen quick hearings and a pair of trials preceding her own. The crush of defense lawyers and hopeful claimants had thinned by the time Swansey stepped up to the bench. She steadied herself beside a prosecutor and stood with a stately straightening of her back.

      Swansey was here to reclaim her car. The Chicago Police Department had seized the 2001 Chrysler PT Cruiser two years prior, arresting the driver, Swansey’s son, and charging him with manufacturing or delivering 15 to 100 grams of heroin. The car had been impounded ever since. Swansey herself was never charged with a crime, and it was her name, not her son’s, on the title. All the same, the Cook County state’s attorney’s office had agreed with CPD that the vehicle, which the office valued at $1,400, was worth keeping for good.

      [...]

      “I’m a poor black woman,” Swansey says. “I don’t have no money for an attorney.” Instead, she continued to represent herself.

      At her next appearance in May, she informed the court that her son’s criminal case was over. He had pleaded guilty, and having been under house arrest for 745 days, he was credited with time served and put on probation, according to county records.

      So on June 30, Swansey’s trial date finally arrived, two years and four months after CPD took her car. She had brought her son with her to court to testify that he had taken her keys without her knowledge. But the judge she saw that day, Paul Karkula, didn’t want to hear from him, she says.

      Instead, Swansey recalls, “The judge said, ‘I can’t give you back your car, because it would be right back on the road with drugs.’ ” (Karkula declined to comment for this story.)

      The decision struck Swansey as racist and deeply unfair. Swansey says she watched as four other cases that day were called and resolved, including one involving a wheelchair-bound white woman with a case very similar to hers. This woman got her car back, Swansey says. She did not.

    • How I Taught A Jury About Trolls, Memes And 4Chan — And Helped Get A Troll Out Of Jail

      A few weeks ago, CNN had a story on how a jury failed to convict Peter Wexler, an unemployed IT worker, who had been arrested and spent nearly a year in jail (without bail) for writing some mean stuff on his blog. He was literally arrested for five blog posts (which came with 20 criminal charges, as they had multiple charges on each post) and was facing up to 15 years in jail for those posts. Ken “Popehat” White blogged briefly about it, noting that it was a huge First Amendment win in a case where the defense team included one of his partners, Caleb Mason (along with lawyer Marri Derby, who was appointed by the court to represent Wexler through the Criminal Justice Act). It’s also a case that involved… me. I was an expert witness in the case, brought in to explain to the jury the nature of internet discourse, including how trolls quite frequently say outrageous things to get attention, and how it’s (for better or worse) not that uncommon to see people post angry rants on the internet, or to talk about how certain people should die, or to photoshop famous people into weird scenarios.

      I’ve avoided writing about the case up until now, mostly because of my involvement. And since Wexler was found not guilty on some charges, while the other charges resulted in a hung jury (the jury foreperson said that they voted 8 to 4 to acquit on those other charges), there’s a chance there may be a second trial. So recognize that it’s a case that I may still have future involvement in — and where I’m choosing my words carefully (the prosecutors in the case tried to take some of my posts on Techdirt out of context to attack my credibility, and it’s possible that could happen again — though I will admit to some confusion over being asked, twice, on the stand if I consider myself “an advocate for internet freedom,” as if that were a bad thing).

  • Internet Policy/Net Neutrality

    • FCC Postpones Vote on Set-Top Box Reform in a Blow to Chairman Wheeler

      The Federal Communications Commission on Thursday postponed a vote on its highly-anticipated proposal to increase competition in the video “set-top box” market after the chairman of the agency failed to secure the necessary votes to approve the plan.

      The delay amounts to a humbling setback for FCC Chairman Tom Wheeler, who had made reforming the $20 billion set-top box market a centerpiece of his pro-consumer agenda. With 40 days to go before a presidential election that will determine the makeup of the FCC going forward, the fate of the reform measure is now in doubt.

      As recently as Thursday morning, the vote was still scheduled, but Wheeler was ultimately unable to come to an agreement with his fellow Democratic commissioner Jessica Rosenworcel, who had previously raised concerns about his plan, and who represents the key swing vote at the five-member agency.

      “Commissioner Rosenworcel came to Chairman Wheeler’s office with a bunch of edits on the order, and those edits were unacceptable to his office,” according to a person familiar with the matter. “And that led to an impasse. As of 8 a.m. this morning the vote was on, and then by 9 a.m. the vote was pulled.”

    • FTC won’t give up fight against AT&T unlimited data throttling
    • The FCC Wants To Know Why Journalists Had To Pay $200 For WiFi At Presidential Debate
  • DRM/Broadcast

    • Don’t Hide DRM in a Security Update

      Over 10,000 of you have joined EFF in calling on HP to make amends for its self-destructing printers in the past few days. Looks like we got the company’s attention: today, HP posted a response on its blog. Apparently recognizing that its customers are more likely to see an update that limits interoperability as a bug than as a feature, HP says that it will issue an optional firmware update rolling back the changes that it had made. We’re very glad to see HP making this step.

      But a number of questions remain.

      First, we’d like to know what HP’s plans are for informing users about the optional firmware update. Right now, the vast majority of people who use the affected printers likely do not know why their printers lost functionality, nor do they know that it’s possible to restore it. All of those customers should be able to use their printers free of artificial restrictions, not just the relatively few who have been closely following this story.

    • 46 California Cities Join Rush To Impose ‘Netflix Tax’

      Last year, Chicago proudly declared that the city would be expanding its 9% amusement tax (traditionally covering book stores, music stores, ball games and other brick and mortar entertainment) to online streaming services and cloud computing. While Chicago was hungrily pursuing the $12 million in additional revenue the expanded tax would provide, it ultimately faced a lawsuit questioning the legality of Chicago’s move. The ongoing lawsuit by the Liberty Justice Center claims Chicago violated city rules by not holding a full vote on the changes, and is violating the Internet Freedom Tax Act.

      Legal or not, Chicago’s push to impose a Netflix tax has opened the floodgates.

    • What Cord Cutting? Cable Sector Hiked TV Prices 40% In Last Five Years

      We’ve noted time and time again that the cable and broadcast industry could compete with cord cutting by lowering prices, it just chooses not to. Even with last quarter seeing the biggest quarterly defection by paying subscribers ever recorded, time and time again you’ll see sector sycophants proclaim that cord cutting either doesn’t exist, or has been violently over-hyped and isn’t worth taking seriously. In fact, most sector executives still believe that the shift away from traditional cable will magically end once Millennials start procreating (protip: it won’t).

      As such, they’ve continued to raise cable TV rates at an absurd rate in the belief that they can keep milking the legacy cable TV cash cow in perpetuity. And while broadcasters certainly take the lion’s share of the blame for raising the cost of programming, you’d be hard pressed to find a cable TV provider that isn’t making things worse by also saddling consumers with misleading fees for nothing and soaring cable box, modem, and other hardware rental costs.

      The end result is users paying 40% more for cable TV than they did just five years ago. In fact the average cable bill is now $103.10 per month, an increase of 4% in the past year. And while the cable sector is quick to proclaim that this just reflects the “increased value” of cable TV, the reality is that most cable ops are trimming back overall channels to try and offset the bloated, soaring cost of sports programming.

  • Intellectual Monopolies

    • UN Panel Report On Access To Medicines Seen As Holding Potential For Change

      Speakers at a side event to the United Nations General Assembly last week commended a new report on access to medicines prepared by a high-level panel hand-chosen by the UN secretary general as containing fresh ideas and the potential to bring change to a longstanding problem.

      The breakfast dialogue, entitled, The Role of Health Technology: Innovation & Access in the 2030 Agenda for Sustainable Development, was organised on 23 September by the UN Secretary General’s High-Level Panel on Access to Medicines, whose report was released last week (IPW, United Nations, 14 September 2016).

    • WIPO staff council legal rep demands immediate removal of Gurry after distribution of misconduct report [Ed: about time?]

      The legal counsel to the World Intellectual Property Organisation’s Staff Council has called for the immediate removal of Francis Gurry as the UN agency’s director general and the lifting of his diplomatic immunity so that he might face possible criminal investigation or civil proceedings over the findings of a report into alleged misconduct that was delivered to the Chair of the WIPO General Assemblies in February.

      The demand is contained in a letter sent to “All Ambassadors and Permanent Representatives to the United Nations and other International Organizations in Geneva” yesterday. IAM has obtained a copy of the letter and has verified that it is authentic.

      The letter was sent following the distribution earlier this week of a heavily redacted version of the findings of an investigation, carried out by the UN’s Office of Internal Oversight Services (OIOS), into a series of allegations originally levelled at Gurry by the former deputy director general of the organisation James Pooley back in April 2014. Although the OIOS submitted its findings in February it is only now that WIPO member states have been able to see a copy of the report – albeit one in which large chunks have been blacked out.

    • Signs Of Changing Trends In FTAs’ IP Chapters, Speakers Say At WTO

      On intellectual property, the EU has published factsheets and position papers on what they would like to see in the agreement, she said. One of the focuses of those documents is raising awareness on the benefits of IP, and “we regret that the focus is not also on the human right to access information,” she said.

    • Trademarks

      • Lee v. Tam: Supreme Court Takes on the Slants

        In the case, Simon Tam is seeking to register a mark on his band name “The Slants.” The USPTO refused after finding that the mark is disparaging toward individuals of Asian ancestry.

      • US Supreme Court to hear Slants case

        The US Supreme Court has granted cert in Lee v Tam, the case involving Asian-American band The Slants and the issue of offensive trade marks.

        The issue presented is: “Whether the disparagement provision of the Lanham Act, 15 USC 1052(a), which provides that no trademark shall be refused registration on account of its nature unless, inter alia, it ‘[c]onsists of . . . matter which may disparage . . . persons, living or dead, institutions, beliefs, or national symbols, or bring them into contempt, or disrepute’ is facially invalid under the Free Speech Clause of the First Amendment.”

    • Copyrights

      • YouTube Hires Music Executive as a Liaison to the Industry

        For the last year, the music industry has been waging a bitter war against YouTube, accusing the popular video site of paying too little in royalties. The conflict has often seemed tribal, with record companies and stars on one side, and Silicon Valley on the other.

        Now, YouTube has brought over a major player from the music side.

        Lyor Cohen, who got his start in the early days of hip-hop and went on to top executive positions at Def Jam and the Warner Music Group — earning a reputation as the most tenacious force in any deal — has joined YouTube as the service’s global head of music, YouTube announced on Wednesday.

        It is the latest effort by a tech company to fortify itself by hiring a music insider. Two years ago, Apple bought Beats, which was founded by Dr. Dre and the producer Jimmy Iovine; in June, Spotify hired Troy Carter, the former manager of Lady Gaga.

        In a statement, Robert Kyncl, YouTube’s chief business officer, suggested that Mr. Cohen’s role was, to some degree, to be a bridge to the music world.

      • Kim Dotcom’s Extradition Appeal Concludes, Will He Get a “Fair Go”?

        After more than four weeks the extradition appeal hearings of Kim Dotcom and his former Megaupload colleagues have concluded. In his closing arguments, Dotcom’s lawyer urged the court to carefully weigh the facts and give his client a “fair go,” which he says the District Court failed to do. However, even if the High Court sides with the defense, the case is still far from over.

      • Dotcom Petitions Appeals Court For Rehearing Over Seized Millions

        Last month, the 4th Circuit Court of Appeals rejected efforts by Kim Dotcom to regain control over millions of dollars in assets seized by the US Government. Yesterday, Dotcom’s legal team petitioned the Court for a rehearing and rehearing en banc on the issues of forfeiture of assets and fugitive disentitlement.

09.28.16

Links 28/9/2016: Alpine Linux 3.4.4, Endless OS 3.0

Posted in News Roundup at 7:47 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Open source is not to blame for a lack of industry standards

    Carol Wilson wrings her hands over the “boring” nature of open source standardization, declaring that “Open source processes can take the fun out of everything, particularly technology wars.” Putting aside for a minute the irony of expecting standards to ever be anything more than mind-numbingly dull, Wilson’s larger argument misses the point.

    The problem with open source standards aren’t that they’re boring; it’s that they’re largely the same as the proprietary standards that preceded them. In practice, this presents no problem at all.

  • Down the rabbit hole, part 2: To ensure security and privacy, open source is required

    If my goal is to secure all of my computing devices, I need access to the source code in order to do a complete and effective security appraisal of the software I am running.

    It really is that simple. The need for open source software, in this case, has nothing to do with any ethical implications of software freedom—nor do the benefits of open source to software developers enter into this discussion. But having access to the source code is an undeniable benefit in ensuring the security of a piece of software.

  • Linaro organisation, with ARM, aims for end-end open source IoT code
  • Linaro start open-source development for IoT on ARM Cortex-M
  • ARM open source group address IoT software confusion

    Linaro has worked with ARM, Canonical, Huawei, NXP, RDA, Red Hat, Spreadtrum, STMicroelectronics, Texas Instruments and ZTE on the new IoT software, as part of what it calls the Linaro IoT and Embedded (LITE) Segment Group.

    Group says it wants to address the design problems created by the proliferation of choices for IoT device operating systems, security infrastructure, identification, communication, device management and cloud interfaces.

    It hopes to be able to reduce fragmentation in operating systems, middleware and cloud connectivity software, through the creation of open source device reference platforms.

    Initial technical work will be focused on delivering an end to end, cross­vendor solution for secure IoT devices using the ARM Cortex-­M architecture.

  • Open Source Community Continues Fight Against Cybercrime with Apache Spot (incubating)
  • Apache Spot Aims to Fetch Open Network Insights

    The project formerly known as Open Network Insights moves to the Apache Software Foundation and gets a new name—Apache Spot. It now includes support for DNS and Proxy in addition to Netflow.

    The Open Network Insight (ONI) project, backed by Cloudera, Intel and others and focused on helping organizations use big data for security insights, became generally available earlier this year. The ONI project is now being donated to the Apache Software Foundation (ASF)—home to Hadoop and many big data efforts—and is now getting a new life as the Apache Spot project.

  • Meet Apache Spot, a new open source project for cybersecurity

    Hard on the heels of the discovery of the largest known data breach in history, Cloudera and Intel on Wednesday announced that they’ve donated a new open source project to the Apache Software Foundation with a focus on using big data analytics and machine learning for cybersecurity.

    Originally created by Intel and launched as the Open Network Insight (ONI) project in February, the effort is now called Apache Spot and has been accepted into the ASF Incubator.

    “The idea is, let’s create a common data model that any application developer can take advantage of to bring new analytic capabilities to bear on cybersecurity problems,” Mike Olson, Cloudera co-founder and chief strategy officer, told an audience at the Strata+Hadoop World show in New York. “This is a big deal, and could have a huge impact around the world.”

  • Meet Apache Spot, a new open-source project for cybersecurity
  • Strata + Hadoop World: Apache Spot looks to tackle cybersecurity
  • Cloudera Approves First Grant Applications for Precision Medicine Initiative
  • Cloudera Broadens its Collaboration with Thorn to Include Software and Services to Fight Child Sexual Exploitation
  • Open source storage hits the mainstream

    Open source storage has gained mainstream acceptance in high performance computing, analytics, object storage, cloud (OpenStack) and NAS use, but can it crack the enterprise?

  • Rogue Wave Improves Support for Open Source Software with IBM
  • Rogue Wave Software to improve open-source software support with IBM

    Rogue Wave Software announces it is working with IBM to help make open source software (OSS) support more available. This will help provide comprehensive, enterprise-grade technical support for OSS packages.

  • Vendors and Customers Gettin’ Open Sourcey With It

    Basically, “open source enablement” seems to be about teaching customers how to embrace open source principles, both in terms of internal processes as well as external communities and ecosystems. As I’ve worked with many engineering and product teams over the years, I’ve seen many open source initiatives fail to reach their potential because of ingrained cultural obstacles that usually manifest in the form of corporate inertia that blocks forward progress.

  • Digium Announces Asterisk 14 Open Source Communications Software

    Digium®, Inc., the Asterisk® Company, today at its annual AstriCon users and developers conference, announced Asterisk 14, the next major release of the world’s most popular open source communications platform. Asterisk 14 continues the track of previous major releases, such as Asterisk 12 and Asterisk 13, by offering developer- and administrator-focused features and capabilities to simplify the scaling and deployment of Asterisk within large, service-based ecosystems.

  • Announcing the open source release of MORI, from Chalkbeat

    In 2014, Chalkbeat developed and started using a WordPress plugin for tracking impact. We called it MORI — Measures of Our Reporting’s Influence. As we wrote then, MORI grew out of one of our key beliefs: Journalists can make a difference, but the ability to measure the difference we make can multiply our impact over time. If we can document how, why, when, and where we made a difference, we are more likely to repeat our success.

    The quantitative data we track in MORI lets us see the big picture of how our work affects the world, beyond raw readership analytics; the qualitative narrative we record helps us tell the story. Our editorial teams can put important impacts in the hands of our fundraising team and others to turn around and share with the broader education community.

  • ODL: Open Source Hastens Software Usability

    Open Daylight Summit — Open source is connecting users and developers more intimately, and that’s a good thing, OpenDaylight Executive Director Neela Jacques said here today.

    In kicking off the OpenDaylight Summit, Jacques said the ability of users and developers to work side-by-side is evolving, and helping drive the faster pace at which open source can bring solutions to the industry.

    “Users can sit next to the developers of the code they use, and the interaction doesn’t go one way,” he said. “The real difference is the way users interact with developers. This is why we are able to get production-grade solutions so much faster than you ever would in proprietary world.”

  • Web Browsers

    • Mozilla

      • Mozilla has “stopped all commercial development of Firefox OS”

        Remember when Mozilla said it was ceasing development of Firefox OS for smartphones, but that it wasn’t giving up on the browser-based operating system altogether? Yeah, now the organization has pretty much thrown in the towel.

        After shifting the focus from phones to smart TVs and other Internet of Things products for a while, Mozilla senior engineering program manager Julie McCracken says development of the operating system was “gradually wound down” and that as of the end of July Mozilla has “stopped all commercial development of Firefox OS.

      • Firefox’s Test Pilot Program Launches Three New Experimental Features

        Earlier this year we launched our first set of experiments for Test Pilot, a program designed to give you access to experimental Firefox features that are in the early stages of development. We’ve been delighted to see so many of you participating in the experiments and providing feedback, which ultimately, will help us determine which features end up in Firefox for all to enjoy.

        Since our launch, we’ve been hard at work on new innovations, and today we’re excited to announce the release of three new Test Pilot experiments. These features will help you share and manage screenshots; keep streaming video front and center; and protect your online privacy.

  • Pseudo-Open Source (Openwashing)

  • FSF/FSFE/GNU/SFLC

    • GNU Tools Cauldron 2016, ARMv8 multi-arch edition

      That is what my England trip for the GNU Tools Cauldron was, but that only seemed to add to the pleasure of meeting friends again. I flewin to Heathrow and started on an almost long train journey to Halifax,with two train changes from Reading. I forgot my phone on the trainbut the friendly station manager at Halifax helped track it down andgot it back to me. That was the first of the many times I forgotstuff in a variety of places during this trip. Like I discovered thatI forgot to carry a jacket or an umbrella. Or shorts. Or full lengthpants for that matter. Like I purchased an umbrella from Sainsbury’s but forgot to carry it out. I guess you got the drift of it.

  • Standards/Consortia

    • FAQ: What’s so special about 802.11ad Wi-Fi?

      Here are the broad strokes about 802.11ad, the wireless technology that’s just starting to hit the market.

    • 2.5 and 5 Gigabit Ethernet Now Official Standards

      In 2014, multiple groups started efforts to create new mid-tier Ethernet speeds with the NBASE-T Alliance starting in October 2014 and MGBASE-T Alliance getting started a few months later in December 2014. While those groups started out on different paths, the final 802.3bz standard represents a unified protocol that is interoperable across multiple vendors.

      The promise of 2.5 and 5 Gbps Ethernet is that they can work over existing Cat5 cabling, which to date has only been able to support 1 Gbps. Now with the 802.3bz standard, organizations do not need to rip and replace cabling to get Ethernet that is up to five times faster.

      “Now, the 1000BASE-T uplink from the wireless to wired network is no longer sufficient, and users are searching for ways to tap into higher data rates without having to overhaul the 70 billion meters of Cat5e / Cat6 wiring already sold,” David Chalupsky, board of directors of the Ethernet Alliance and Intel principal engineer, said in a statement. “IEEE 802.3bz is an elegant solution that not only addresses the demand for faster access to rapidly rising data volumes, but also capitalizes on previous infrastructure investments, thereby extending their life and maximizing value.”

Leftovers

  • Yahoo Mail is down for some across the UK and Europe

    POOR OLD Yahoo can’t catch a break after users reported that its webmail service appears to be down.

    Some here at the INQUIRER are unable to access Yahoo Mail, while others have flocked to Twitter to moan that it’s not currently accessible.

  • Science

    • Never forget a face? You might be a super recogniser

      Your recognition skills are supported by a complex network of brain regions that rapidly develop during infancy and childhood, finally peaking at the age of 30.

    • Google swallows 11,000 novels to improve AI’s conversation

      When the writer Rebecca Forster first heard how Google was using her work, it felt like she was trapped in a science fiction novel.

      “Is this any different than someone using one of my books to start a fire? I have no idea,” she says. “I have no idea what their objective is. Certainly it is not to bring me readers.”

      After a 25-year writing career, during which she has published 29 novels ranging from contemporary romance to police procedurals, the first instalment of her Josie Bates series, Hostile Witness, has found a new reader: Google’s artificial intelligence.

      “My imagination just didn’t go as far as it being used for something like this,” Forster says. “Perhaps that’s my failure.”

    • The Power Paradox: The Surprising Science of How We Gain and Lose Influence

      What causes us to mishandle the power paradox, Keltner argues, is our culture’s traditional understanding of power — a sort of time-capsule that no longer serves us. Predicated on force, ruthlessness, and strategic coercion, it was shaped by Niccolò Machiavelli’s sixteenth-century book The Prince — but it is as antiquated today as the geocentric model of the universe that dominated Machiavelli’s day. What governs the modern world, Keltner demonstrates through two decades of revelatory studies, is a different kind of power — softer, more relational, predicated on reputation rather than force, measured by one’s ability to affect the lives of others positively and shift the course of the world, however slightly, toward the common good.

    • How a Pythagoras Cup works

      His YouTube channel is packed with similarly excellent videos wherein lab assistant Neil is persuaded to execute unnerving experiments. (previously.)

  • Health/Nutrition

    • CDC whistleblower claims agency has been using wrong Zika test

      In the midst of the fight to control Zika, the top public health agency in the United States has been engaged in an intense internal debate about the best way to test whether someone has been infected with the mosquito-borne virus.

      At the center of the debate at the Centers for Disease Control and Prevention is one of the leading experts on Zika virus. Robert Lanciotti is chief of the CDC lab responsible for developing tests to diagnose viral diseases such as Zika that are transmitted by mosquitoes, ticks and fleas.

  • Security

    • Security advisories for Wednesday
    • Facebook, Uber, Slack, and Pandora Pros Praise Free Security Tools

      Proponents of open source software argue that by letting passionate developers get involved and tweak underlying code, the tools they create are stronger and more reliable. Plus, for companies looking to bolster their digital defenses, the software has the added benefit of being free.

    • LibreSSL 2.5
    • LibreSSL 2.5 Released With New Features, iOS Support

      LibreSSL 2.5.0 is available today as the newest version of this growing fork of OpenSSL led by the OpenBSD project.

      LibreSSL 2.5′s libtls implementation now supports ALPN and SNI while handling four cipher suite groups, there is tightened error handling in some areas, support for OCSP intermediate certificates, initial support for Apple’s iOS platform, and a variety of other fixes and functionality improvements.

    • A quick fix for stupid password reset questions

      It didn’t take 500 million hacked Yahoo accounts to make me hate, hate, hate password reset questions (otherwise known as knowledge-based authentication or KBA). It didn’t help when I heard that password reset questions and answers — which are often identical, required, and reused on other websites — were compromised in that massive hack, too.

      Is there any security person or respected security guidance that likes them? They are so last century. What is your mother’s maiden name? What is your favorite color? What was your first pet’s name?

    • French hosting provider hit by DDoS close to 1TBps

      A hosting provider in France has been hit by a distributed denial of service attack that went close to one terabyte per second.

      Concurrent attacks against OVH clocked in at 990GBps.

      The attack vector is said to be the same Internet-of-Things botnet of 152,464 devices that brought down the website of security expert Brian Krebs.

      OVH chief technology officer Octave Klaba tweeted that the network was capable of attacks up to 1.5TBps.

    • Latest IoT DDoS Attack Dwarfs Krebs Takedown At Nearly 1Tbps Driven By 150K Devices

      If you thought that the massive DDoS attack earlier this month on Brian Krebs’ security blog was record-breaking, take a look at what just happened to France-based hosting provider OVH. OVH was the victim of a wide-scale DDoS attack that was carried via network of over 152,000 IoT devices.

      According to OVH founder and CTO Octave Klaba, the DDoS attack reached nearly 1 Tbps at its peak. Of those IoT devices participating in the DDoS attack, they were primarily comprised of CCTV cameras and DVRs. Many of these types devices’ network settings are improperly configured, which leaves them ripe for the picking for hackers that would love to use them to carry our destructive attacks.

  • Defence/Aggression

    • Senate Votes to Override Obama Veto on 9/11 Victims Bill

      A sweeping bipartisan majority in the Senate on Wednesday rejected President Obama’s veto of legislation that would allow families of those killed in the Sept. 11, 2001, terrorist attacks to sue Saudi Arabia for any role in the plot, all but assuring that Mr. Obama would suffer the first override vote of his presidency.

      The vote was 97 to 1, with only Senator Harry Reid, Democrat of Nevada, siding with the president.

      With the House nearly certain to follow the Senate later on Wednesday, the 9/11 bill will become law in a remarkable yet complicated bipartisan rebuke. Still, the measure itself remains contentious, and even some of those who cast a vote against Mr. Obama conceded that they did not fully support it.

      Mr. Obama’s greatest allies on Capitol Hill, who have labored for nearly eight years to stop most bills he opposes from even crossing his desk, turned against him, joining Republicans in the remonstrance.

    • Orlando Terror Attack ‘Triggered’ by Pentagon Drone Strike

      The domestic terrorist behind the Orlando nightclub massacre was motivated by a Pentagon drone strike in Iraq a month before the shooting, according to police transcripts made public last week.

      Conversations between Omar Mateen and an Orlando police negotiator on June 12 were kept secret by FBI and local police until Friday. The secrecy contributed to misleading media accounts of the terrorist’s motives in the days after the killings.

      The transcripts were released by Orlando police Friday after a Florida court hearing held in response to a lawsuit filed by several news organizations.

      Mateen killed 49 people during the attack on the Pulse, a gay nightclub, and wounded 53 others. Police eventually stormed the club and killed Mateen in a shootout after talks aimed at convincing him to surrender failed.

    • Senate overwhelmingly votes to override Obama veto on 9/11 bill

      The Senate voted overwhelmingly on Wednesday to override President Obama’s veto of legislation allowing lawsuits against foreign sponsors of terrorism, setting up an almost certain and historic defeat for the White House on the bill.

      The House is expected to follow suit within hours, making it the first veto of Obama’s presidency that has been overturned by Congress.

      Obama vetoed the legislation Friday because he said the bill — known as the Justice Against Sponsors of Terrorism Act, or JASTA — would infringe on the president’s ability to conduct foreign policy. It was the 12th veto of his presidency.

    • After 9/11 Bill, Could Saudi Arabia Really Sell All Its U.S. Assets?

      It’s easier to make a $750 billion threat than carry it out.

      The Senate on Tuesday unanimously passed a bill that would allow families of 9/11 victims to sue Saudi Arabia for its alleged connection to the attacks, pushing the kingdom one step closer to having to follow through on its pledge to sell hundreds of billions of dollars of United States assets that could be frozen by the courts. Carrying out that divestment pledge will be a long, difficult, complicated and likely costly process.

      “The idea that they could just flip a switch and sell them all, it just doesn’t compute,” George Pearkes of Bespoke Investment Group, an independent research firm, told HuffPost. “It’s just too much. No one’s going to be able to take that risk off your book,” Pearkes said, using the industry term for a portfolio.

      “You’re going to lose money doing it because everyone knows you’re going to do it, and … it immediately has an impact on your currency and balance of payments,” he added, noting that the Saudi currency is pegged to the U.S. dollar and the kingdom continually receives dollars for its oil exports.

    • US Senate Overrides Obama’s Veto – Chaos Imminent

      The Saudis have promised to pull their assets out of USA, hundreds of $billions in treasury bills and many other investments. 2016 could undo the tidy recovery USA has made in Obama’s term. Even a gradual withdrawal could lower the value of the dollar, raise interest rates, ding the stock-market, possibly trigger a nuclear arms race in the region and raise the price of gold.

    • Armed Forces personnel suspected of IS ties comprise just 1pct of militants detected

      Armed Forces personnel suspected to be involved with Islamic State (IS) make up just one per cent of militants detected by authorities so far.

      Defence Minister Datuk Seri Hishammuddin Hussein said despite the low number, the Ministry takes the matter seriously and has ordered that comprehensive action be taken to curtail the terrorist group’s ideology from spreading to security personnel.

      He said the Armed Forces Religious Corps and Royal Intelligence Corps have been tasked to detect soldiers who show interest in extremist groups, and warn members of the security forces against terrorism.

      The initiative includes educating soldiers on the true meaning of Islam and jihad.

      Hishammuddin, who spoke to reporters after launching the 40th Pacific Armies Management Seminar at a hotel here earlier today, however, did not reveal the exact number of soldiers who have been detected to be influenced by IS.

  • Transparency/Investigative Reporting

    • Journalists must fork over $200 for Wi-Fi at presidential debate

      News organizations attending Monday evening’s presidential debate must pay $200 for a “Secure Wireless Internet Connection” at Hofstra University in New York state. The debate is set to begin at 9pm Eastern.

      While profiteering during a high-profile occasion such as this is not unheard of—$15 for a patch cable?—what’s worse is that event staff at Hofstra University are reportedly using a $2,000 device to actively scan for hotspots and other ad-hoc Wi-Fi networks.

    • FCC official: “Something’s not right” with Wi-Fi at Monday’s debate

      One of the members of the Federal Communications Commission, Jessica Rosenworcel, has asked the agency to investigate the Monday evening ban on journalists’ Wi-Fi personal hotspots at the presidential debate held at Hofstra University.

      As Ars reported on Monday evening, the host venue demanded that journalists pay $200 to access the event’s Wi-Fi and were told to shut down their own hotspots or leave the debate. At least one photo, taken by Kenneth Vogel of Politico, showed a handheld device that was being used to scan for and locate “rogue” Wi-Fi networks.

  • Environment/Energy/Wildlife/Nature

    • The world passes 400ppm carbon dioxide threshold. Permanently

      Because carbon pollution has been increasing since the start of the industrial revolution and has shown no signs of abating, it was more a question of “when” rather than “if” we would cross this threshold. The inevitability doesn’t make it any less significant, though.

      September is usually the month when carbon dioxide is at its lowest after a summer of plants growing and sucking it up in the northern hemisphere. As fall wears on, those plants lose their leaves, which in turn decompose, releasing the stored carbon dioxide back into the atmosphere. At Mauna Loa Observatory, the world’s marquee site for monitoring carbon dioxide, there are signs that the process has begun but levels have remained above 400 ppm.

      Since the industrial revolution, humans have been altering this process by adding more carbon dioxide to the atmosphere than plants can take up. That’s driven carbon dioxide levels higher and with it, global temperatures, along with a host of other climate change impacts.

  • Finance

    • BEANO: Brexit Existing As Name Only

      This speech follows the recent statement of the Chancellor of the Exchequer that EU funding will be guaranteed until 2020.

      Could it be that the United Kingdom is not heading for a Hard Brexit or a Soft Brexit, but a Brexit existing as a name only?

      Could there be a BEANO Brexit?

    • Greece asks for suspension of TTIP negotiations

      Temporary suspension of negotiations on the Transatlantic Partnership Trade and Investment (TTIP) asked the Minister of Economy, Development and Tourism, George Stathakis, the Council of Foreign Affairs Ministers for Trade, held today in Bratislava.

      The Minister stressed that in the negotiations on the TTIP «has not seen any progress in sensitive European issues” regarding reciprocity in the liberalization of public procurement, the shipping issues, farm products with a geographical indication, the protection of consumers against genetically modified products, and complex environmental protection issues.

      It acknowledged that the TTIP is a major political issue for the European Union and that this time there are a number of important issues pending. Closed the placement of saying “need a new framework for negotiations, a new start on a new basis and at the appropriate time.”

    • Saudi Arabia’s monarch cuts ministers’ pay by 20%

      Saudi Arabia cancelled bonus payments for state employees and cut ministers’ salaries by 20 per cent, steps that further spread the burden of shoring up public finances to a population accustomed to years of government largesse.

      The government also decided to suspend wage increases for the lunar year starting next month and curbed allowances for public-sector employees, according to royal decrees and a cabinet statement published by state media.

      The salaries of members of a legislative body that advises the monarchy were cut by 15 per cent.

  • AstroTurf/Lobbying/Politics

    • Clinton campaign in ‘panic mode’ over Florida black voters

      To kill Donald Trump’s chances of capturing the White House, Hillary Clinton needs to win Florida. And to do that, she needs a big minority turnout.

      But Democrats are beginning to worry that too many African-American voters are uninspired by Clinton’s candidacy, leading her campaign to hit the panic button this week and launch an all-out blitz to juice-up voter enthusiasm.

      Bill Clinton, once nicknamed the “first black president,” embarks on a North Florida bus tour Friday in an attempt to draw African-American crowds. At the same time, Clinton herself will host events in Broward and St. Lucie counties, which have black populations higher than the statewide average.

    • 5 Conspiracy Theories That PROVE This Election Is The Worst

      The 2016 presidential election is well on its way to cementing its place in history’s annals of crazy. But do you know who finds it even crazier? Crazy people! Conspiracy nutjobs and other tinfoil hat cases follow political news too, and just as is the case with everyone else, there are candidates they do and don’t like. As such, the dark, sticky underbelly of the internet is inundated with madcap election theories that are somehow even more far-fetched than the accusations the actual candidates have been throwing around.

    • Michael Moore to Clinton supporters: Trump ‘won’

      Documentary filmmaker Michael Moore is telling Democratic presidential nominee Hillary Clinton’s supporters to treat the first presidential debate of 2016 as a Donald Trump victory and to not get complacent.

      Moore took to Twitter Tuesday, arguing that Clinton had “too much preparation, too much class,” and he wished she had gone “full throttle” on Trump, the Republican presidential nominee.

    • FBI silent on pending Clinton perjury probe

      FBI Director James Comey on Wednesday refused to provide the House Judiciary Committee with any clue about whether the bureau will comply with a request to investigate Hillary Clinton for perjury.

      “You cannot tell us whether you are indeed investigating?” Chairman Bob Goodlatte (R-Va.) asked during a hearing on FBI oversight.

      Comey said he would not comment on a pending referral.

      “When do you expect you will be able to tell us?” Goodlatte asked.

      “I don’t know,” Comey said.

      Goodlatte, along with Oversight Committee Chairman Jason Chaffetz (R-Utah), in July issued a criminal referral to U.S. District Attorney Channing Phillips, asking him to investigate whether Clinton lied to Congress during her marathon 11-hour testimony before the Select Committee on Benghazi.

    • I sold Trump $100,000 worth of pianos. Then he stiffed me.

      At Monday night’s debate, Donald Trump was called out for stiffing the people who work for him. Trump has been accused of failing to pay hundreds of contractors. And so far, he hasn’t seemed very sorry. When asked about failing to pay someone by Hillary Clinton this week, Trump replied, “Maybe he didn’t do a good job and I was unsatisfied with his work.”

      I take that attack personally. I’m one of the many small business owners who’ve been used by Trump, exploited and forced to suffer a loss because of his corporation’s shady practices.

      My relationship with Trump began in 1989, when he asked me to supply several grand and upright pianos to his then-new Taj Mahal casino in Atlantic City. I’d been running a music store for more than 30 years at that point, selling instruments to local schools and residents. My business was very much a family affair (my grandsons still run the store). And I had a great relationship with my customers — no one had ever failed to pay.

    • Jill Stein EXCLUSIVE: The debate through the Green Party lens

      Despite the efforts to silence the competition for the two establishment parties by excluding us from the televised presidential debates, we were able to reach millions of voters with our message using the open Internet and a cutting edge social media campaign.

      The debates sponsored by the Commission on Presidential Debates (CPD), a front group created by the Democratic and Republican parties to fool the American public, are anti-democratic. The two parties should not have the power to decide that their opponents cannot debate. That is not what democracy looks like.

      When the CPD was founded by former chairs of the Democratic and Republican National Committees, both made it clear their goal was to keep challengers out of the debate. Republican Frank Fahrenkopf, who remains a co-chair, indicated at the news conference that the CPD was “not likely to look with favor on including third-party candidates in the debates.”

      The NY Times quoted Democrat Paul Kirk, who was more blunt: “As a party chairman, it’s my responsibility to strengthen the two-party system.” Kirk’s successor as co-chair is Michael McCurry, former press secretary for Bill Clinton. The arbitrary criteria set by the secretive CPD are not designed to exclude “non-viable candidates”, but rather to prevent any candidate outside the Democratic-Republican duopoly from becoming viable in the eyes of the public.

    • Bernie Sanders’s brother to fight David Cameron’s seat for Green party

      Larry Sanders, the older brother of Democrat politician Bernie Sanders, is hoping to emulate his sibling’s success by standing for the Green party in David Cameron’s Oxfordshire seat.

      Bernie Sanders gave Hillary Clinton an unexpectedly tough fight in the Democratic presidential primaries, riding a wave of idealism among a predominantly young voter base.

      Now his brother Larry, 82, a retired social worker and former Green party councillor, plans to attempt a similar feat for the Greens in the byelection for the rock-solid Conservative constituency of Witney.

      It will be a tall order. “It hasn’t always been the richest turf for the Green party,” a party spokesman said. To become MP for Witney, he would have to overturn Cameron’s 22,700-vote majority in a seat where the last Green candidate won just 5.1% of the vote.

    • The Great Debate That Never Was

      If the Green Party’s Jill Stein had been allowed in this week’s presidential debate, it would have transformed the discussion and altered the race. That’s why Democrats and Republicans kept it a duopoly-only affair. “The only circumstances in which either Trump or Clinton can muster a minimally compelling argument, is against each other.” Thanks to Democracy Now!, we got a glimpse at what a real debate might be like. Clinton and Trump would lose.

  • Censorship/Free Speech

  • Privacy/Surveillance

  • Civil Rights/Policing

    • AP: Across US, police officers abuse confidential databases

      No single agency tracks how often the abuse happens nationwide, and record-keeping inconsistencies make it impossible to know how many violations occur.

      But the AP, through records requests to state agencies and big-city police departments, found law enforcement officers and employees who misused databases were fired, suspended or resigned more than 325 times between 2013 and 2015. They received reprimands, counseling or lesser discipline in more than 250 instances, the review found.

      Unspecified discipline was imposed in more than 90 instances reviewed by AP. In many other cases, it wasn’t clear from the records if punishment was given at all. The number of violations was surely far higher since records provided were spotty at best, and many cases go unnoticed.

    • Justice Department Is Fighting Fired FBI Agent’s Use of Whistleblower Defense

      John Parkinson, an Iraq War veteran who led a special operations unit in FBI’s Sacramento field office, first filed whistleblower complaints almost a decade ago when he became concerned with his coworkers’ behavior. He identified a colleague as having “a career-long pattern of soliciting prostitutes,” who used an FBI’s surveillance plane to travel to Reno to pay for sex. He alleged another colleague had a porn habit, even viewing explicit material at work. At one point, Parkinson removed furniture from an FBI office to keep it from getting soiled by the colleague, according to court documents.

      After filing his complaint, Parkinson found himself the subject of what he says was a retaliatory investigation, and was eventually fired. He has been fighting that decision for the past four years through a Kafkaesque maze of courts and internal appeals.

      On Monday, his attorneys filed a brief to the U.S. Federal Circuit Court of Appeals arguing for his right to raise a whistleblower retaliation defense.

    • Letter From CIA Whistleblower Jeffrey Sterling Details Federal Prison’s Scandalous Treatment

      Dear Jeffrey,

      I have followed your case closely, and I have also read recent updates from John Kiriakou, whose case I also covered extensively. I published his prison letters from FCI Loretto. Thank you for taking the time to answer some questions I have about your current struggle to obtain proper medical treatment for your heart condition.

      As of September 26, what is your current condition? What symptoms do you continue to endure? How critical do you believe it is that FCI Englewood take your symptoms seriously and grant you access to proper medical treatment? In other words, what do you need FCI Englewood to do for you now?

      How has your condition changed over the past months, and how responsive are officers within FCI Loretto to your insistence or requests for medical treatment? When you complain about pain, how long does it take until you finally see a doctor or medical professional?

      I understand you are expected to exhaust the administrative process before going outside this system to force the prison to give you proper medical treatment. What do you think of this process?

      I also recognize you, and your wife, Holly, have attempted other actions to convince the prison to take care of your urgent medical needs. What have you tried and what effect do you believe these actions have had?

      John Kiriakou reported on August 28 that Warden Deborah Denham had reversed her decision and would put a request into the “Bureau of Prisons Regional Office in Denver” that you “be taken to an outside cardiologist for testing.” Did you get to see a cardiologist? Is that how you found out you had high levels of Troponin?

    • The Proper Channels For Whistleblowing Still Mostly A Good Way For Messengers To Get Shot

      Whistleblower protections offered by the federal government are great in theory. In practice, they’re a mess. This administration has prosecuted more whistleblowers than all previous administrations combined. The proper channels for reporting concerns are designed to deter complaints. Those that do use the proper channels are frequently exposed by those handling the complaints, leading to retaliatory actions that built-in protections don’t offer an adequate remedy for.

      Perhaps the ultimate insult is that the proper channels lead directly to two committees that have — for the most part — staunchly defended agencies like the NSA against criticism and any legislative attempts to scale back domestic surveillance programs. The House and Senate Intelligence Committees are the “proper channels,” whose offered protections can only be seen as the hollowest of promises, especially after the House Intelligence Committee’s lie-packed response to calls for Snowden’s pardon.

      What the federal government offers to whistleblowers is a damned if you do/don’t proposition. Bypass the proper channels and brace yourself for prosecution. Stay within the defined lanes and expect nothing to change — except maybe your security clearance, pay grade, or chances of advancement within the government.

  • Internet Policy/Net Neutrality

    • ISP Feebly Tries To Defend Usage Caps By Comparing Them To…Oreos

      Earlier this month, we noted how Netflix had complained to the FCC about broadband usage caps, quite-correctly noting they’re little more than price hikes on uncompetitive markets. Netflix also was quick to highlight how caps can be used anti-competitively against streaming video providers, something the FCC opened the door to when it decided to turn a blind eye to the practice of zero rating (or exempting your own or a paid partners’ content from counting against the cap). As such, Netflix urged the FCC to finally crack down on usage caps using its authority under Section 706 of the Telecom Act.

    • AT&T Sues Nashville To Keep Google Fiber At Bay

      We’ve been talking about how the latest front in the battle for better broadband competition is the boring old utility pole. As Susan Crawford highlighted last month, getting permission from an ISP that owns a city’s utility poles can be a slow, bureaucratic nightmare, since the incumbent ISP has every incentive to stall would-be competitors. As such, Google has been pushing for “one touch make ready” proposals that use an insured, third-party contractor agreed to by all ISPs to move any ISP’s gear during fiber installs (often a matter of inches).

      But again, because this would speed up Google Fiber’s time to market, incumbent ISPs like Comcast, AT&T, Frontier and Time Warner Cable have all been fighting these reform efforts. Excuses provided by the ISPs range from claims that such reform violates their Constitutional rights, to unsubstantiated claims that such a policy would result in massive new internet service outages. AT&T has taken things one step further, and has been suing cities like Louisville for passing such reform laws.

  • Intellectual Monopolies

    • 10 highlights from the MARQUES Annual Conference in Villaitana

      Indigenous rights, EU trade mark reforms, geographical indications, design rights and much more were discussed at the recent MARQUES Annual Conference.

    • Trademarks

    • Copyrights

      • BBC iPlayer: New TV licence rules come into force

        All viewers who use the iPlayer to watch any BBC programmes must now be covered by a TV licence after new rules came into force on Thursday.

        Previously, iPlayer users only needed a licence if they were using the service to watch live broadcasts.

        That meant it was legal to watch programmes after broadcast on catch-up without paying the annual £145.50 fee.

        But the TV licence requirements have now been extended to include catch-up, online premieres and online-only shows.

      • Cloudflare: We Can’t Shut Down Pirate Sites

        As one of the leading CDN and DDoS protection services, Cloudflare is used by millions of websites across the globe.

        This includes thousands of “pirate” sites, including The Pirate Bay, who rely on the U.S. based company to keep server loads down.

        Copyright holders are generally not happy that Cloudflare is doing business with these sites. While most stop at complaining, adult entertainment outfit ALS Scan took the matter to court.

Links 28/9/2016: New Red Hat Offices, Fedora 25 ‘Frozen’

Posted in News Roundup at 6:11 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Linux Users v Windows Users, Debian Mourns Another

    The Debian project today shared the news of the passing of a long time contributor on September 17. In other news, the Linux Journal offered a free digital copy of their September 2016 magazine. Bruce Byfield compared Linux users to Windows users and My Linux Rig spoke to elementary OS founder Daniel Foré about his “Linux Setup.”

  • Asian Penguins turn failed program into a Linux success

    The Community School of Excellence (CSE) Asian Penguins are the world’s first and only Linux user group based in a Hmong charter school. A failed Windows laptop program at the school was turned by the Asian Penguins into a Linux success.

    Stu Keroff is the technology coordinator at the Community School of Excellence, a middle school located in St. Paul, Minnesota. He is a licensed elementary education and middle school social studies teacher, and a long-time Linux enthusiast. Stu founded and advises the Asian Penguins.

  • Free Today: September Issue of Linux Journal (Retail value: $5.99)
  • Desktop

    • 7 Ways Linux Users Differ from Windows Users

      To casual users, one person at a keyboard looks much the same as any other. Watch for a while, however, and the differences start to emerge — and whether they are using Linux or Windows is the least of them.

      The fact is, Linux users are different from Windows users in attitude as much as their choice of operating system. Originating as a Unix-type operating system and in opposition to Windows, Linux has developed an expectation and a philosophy in direct opposition to those promoted by Windows. Although many new Linux users have come directly from Windows, average Linux users simply do not react in the same way as Windows users.

    • Microsoft paid me $650 to scrub Windows 10 from my grandpa’s PC, says man

      Microsoft has paid the relative of an Alzheimer’s patient for having to scrub his PC clean of Windows 10.

      Jesse Worley said he’d received a cheque for $650 from Microsoft – seen by The Register – which he told us he’d received after threatening the giant with court action over an unwanted Windows 10 upgrade.

      Tech consultant Worley sought payment from the vendor for the 10 hours it took to rebuild his grandfather’s custom-build PC, re-installing Windows 7 to resemble Windows XP, in order to banish Windows 10.

      However, Worley – inspired by the case of a Californian woman over the unauthorised upgrade of her PC to Windows 10 – told The Reg he wasn’t interested in the money.

      He’d wanted to Microsoft to acknowledge it had slipped up with its notorious Get Windows 10 (GWX) nagware notifications, which he branded “deliberately misleading”.

      “Had Microsoft not gone out of their way to be deceptive, my grandfather pretty clearly wouldn’t have been updated to Windows 10,” he said.

    • Why kid hackers should have a Linux computer

      Kids these days are quite amazing in how fast they learn how to use computers. And what better system for a young hacker than a Linux computer? A writer at Medium recently shared the story of how his young nephew got his very own Linux computer.

  • Server

    • ​Kubernetes 1.4: One DevOps tool to rule all the containers
    • Kubernetes 1.4 promises to make container orchestration easier, more powerful
    • Canonical Releases ‘Core’ Kubernetes Container Distribution
    • Canonical launches Kubernetes public beta distribution
    • Canonical steps up enterprise courtship with Kubernetes bundle
    • Kubernetes 1.4 makes container orchestration bigger — and simpler
    • Canonical Expands Enterprise Container Portfolio with Commercially Supported Distribution of Kubernetes
    • Strategies for Running Stateful Applications in Kubernetes: Volumes

      Mesosphere DC/OS emphasizes running transactional workloads alongside cloud-native applications. Robin Systems, one of the container management companies, is aiming to containerize Oracle and other enterprise databases. The Kubernetes container orchestration engine is gearing up to run stateful workloads through a new concept called Pet Sets, which is a pod of stateful containers. Pet Sets was introduced as an alpha feature in Kubernetes 1.3, released in July.

      Kubernetes abstracts the underlying infrastructure building blocks into compute, storage and networking. When developers and operations teams get started with Kubernetes, they typically get exposed to objects such as pods, labels, services, deployments and replica sets, which provide a mechanism to deal with compute and networking. When it comes to persistence in Kubernetes, users should get familiar with the concepts of volumes, persistent volumes, persistent volume claims (PVC) and the upcoming Pet Sets.

      This article will be a first in a series that discusses the strategies and use cases for each of the storage choices available in Kubernetes. In this chapter, we will take a closer look at volumes, that provide the easiest migration path to Kubernetes.

    • Docker Doubles Down on Microsoft Windows Server [Ed: recall “DockerCon 2015 Infiltrated by Microsoft”]

      Docker for Windows debuts alongside a new commercial support relationship with Microsoft.
      For the most part, the Docker container phenomenon has been about Linux, with the majority of all deployments on Linux servers. But that could soon be changing as Docker Inc. today is announcing the general availability of Docker Engine on Windows Server 2016, alongside a new commercial support and distribution agreement with Microsoft.

      Docker containers rely on the host operating system for certain isolation and process elements in order to run. On Linux, those elements have always been present as part of the operating system, but the same was not true for Windows, which has required several years of joint engineering effort between Docker Inc. and Microsoft.

    • Hadoop Sandboxes and Trials Spread Out

      We all know that there is a skills gap when it comes to Hadoop in the Big Data market. In fact, Gartner Inc.’s 2015 Hadoop Adoption Study, involving 284 Gartner Research Circle members, found that only 125 respondents who completed the whole survey had already invested in Hadoop or had plans to do so within the next two years. The study found that there are difficulties in implementing Hadoop, including hardship in finding skilled Hadoop professionals.

    • Use models to measure cloud performance

      When I was young, I made three plastic models. One was of a car—a ’57 Chevy. Another was of a plane—a Spitfire. And a third was of the Darth Vader TIE Fighter. I was so proud of them. Each one was just like the real thing. The wheels turned on the car, and the plane’s propeller moved when you blew on it. And of course, the TIE Fighter had Darth Vader inside.

      When I went to work on the internet, I had to measure things. As I discussed in my last post, Measure cloud performance like a customer, when you measure on the internet you need to measure in ways that are representative of your customers’ experiences. This affects how you measure in two ways. The first is the perspective you take when measuring, which I talked about last time. The second way is the techniques you use to perform those measurements. And those techniques are, in effect, how you make a model of what you want to know. Those childhood plastic models turn out to offer some solid guidance after all.

    • ODPi Adds Apache Hive to Runtime Specification 2.0

      Today, ODPi announced that the ODPi Runtime Specification 2.0 will add Apache Hive and Hadoop Compatible File System support (HCFS). These components join YARN, MapReduce and HDFS from ODPi Runtime Specification 1.0

      With the addition of Apache Hive to the Runtime specification, I thought it would be a good time to share why we added Apache Hive and how we are strategically expanding the Runtime specification.

    • Ubuntu’s OpenStack on IBM’s Big Iron

      If I were Red Hat I would be looking over my shoulder right now; it appears that Ubuntu might be gaining. In just a few years the Linux distribution has gone from being non-existent in the enterprise to being a powerhouse. This is especially true in the cloud, where it’s a dominant force on both sides of the aisle. Not only is it the most deployed operating system on public clouds, its version of OpenStack accounts for over half of OpenStack cloud deployments, used by the likes of Deutsche Telekom, Bloomberg and Time Warner Cable.

  • Kernel Space

  • Applications

    • Linux and Open Source Hardware for IoT

      Most of the new 21 open source software projects for IoT that we examined last week listed Linux hacker boards as their prime development platforms. This week, we’ll look at open source and developer-friendly Linux hardware for building Internet of Things devices, from simple microcontroller-based technology to Linux-based boards.

      In recent years, it’s become hard to find an embedded board that isn’t marketing with the IoT label. Yet, the overused term is best suited for boards with low prices, small footprints, low power consumption, and support for wireless communications and industrial interfaces. Camera support is useful for some IoT applications, but high-end multimedia is usually counterproductive to attributes like low cost and power consumption.

    • nginx

      Case in point: I’ve been using the Apache HTTP server for many years now. Indeed, you could say that I’ve been using Apache since before it was even called “Apache”—what started as the original NCSA HTTP server, and then the patched server that some enterprising open-source developers distributed, and finally the Apache Foundation-backed open-source colossus that everyone recognizes, and even relies on, today—doing much more than just producing HTTP servers.

      Apache’s genius was its modularity. You could, with minimal effort, configure Apache to use a custom configuration of modules. If you wanted to have a full-featured server with tons of debugging and diagnostics, you could do that. If you wanted to have high-level languages, such as Perl and Tcl, embedded inside your server for high-speed Web applications, you could do that. If you needed the ability to match, analyze and rewrite every part of an HTTP transaction, you could do that, with mod_rewrite. And of course, there were third-party modules as well.

    • Etcher Image Writer Is Now Better Than Ever

      Back in may we spotlighted Etcher, a stylish open-source USB image writer app for Windows, macOS and Linux.

      In the months since our feature the app has released a over 10 small beta updates, with Etcher 1.5 Beta being the most recent release at the time of writing.

    • Audacious 3.8 released

      Audacious 3.8 was released on September 21, 2016.

    • New Version of Audacious Music Player Released

      A new version of Audacious, a popular lightweight audio player, is now available for download.

      Audacious 3.8 introduces a small set of features, including the ability to run more than one instance of the app at the same time. Quite why… no idea.

      New audtool commands have been added, including stream recording toggles, and cue sheet support is said to be “more seamless”.

    • Rambox Puts All Your Favorite Messaging Services In One App

      Rambox is a free, open-source messaging and email app that groups all your favourite web apps into one easy-to-manage window.

      Sound familiar?

      We’ve highlighted apps like Rambox before, with Franz and the Gmail-specific Wmail being but two.

    • Stylish Markdown Editor ‘Typora’ Is Now Available for Ubuntu

      In the market for a desktop markdown editor for Linux? You may have helped but notice that you’re rather spoilt for choice. From Abricotine and Scratch to Simplenote, Springseed and Remarkable. Even Gedit can render markdown with the right plugin! With so much choice it can be difficult to know which app to pick.

    • YoutPlayer Floats Your Fave YouTube Videos on The Desktop [Ed: just an Electron app]

      Looking for a neat-o way to play YouTube playlists on your desktop, outside your browser? Take a looksie at Yout, an Electron app that lets you add and watch YouTube playlists on your desktop, floating window stylee. Yout is not the most user-friendly of apps.

    • Instructionals/Technical

    • Games

      • Avoid the pile-up in ‘Clustertruck’, a first-person platformer with day-1 Linux support, it’s great

        We have been steadily getting more 3D “beat the timer” games where you’re up against others times, which is great because they really can be fun. I do love getting competitive in certain games, especially with some of my Steam friends and friends in the wider community. Games like this recently have been something I’ve been repeatedly going back to for a break from life.

        Clustertruck is not only about beating the times of other people, but it’s also a “the floor is lava” game, so if you touch the floor you have to start again. The really funny thing is that the safe pads are moving trucks you have to keep up with. You can at least grab onto the back of a truck if you just about touch it, so it’s not always instant death.

      • Fusion 3, the next generation game engine and editor from Clickteam will support Linux

        The difference between their tools and others, is the event system. Instead of needing to program every single line, you can stack up events and link them together to create a game. It works quite well and I’m pretty excited to give Fusion 3 a go on Linux myself to see what random games I can create for fun.

      • SteamOS 2.93 Brewmaster Beta Adds New Security Fixes from Debian GNU/Linux 8.6

        Valve’s SteamOS 2 gaming operating system is still getting goodies, and it looks like a new Beta update has been pushed on September 26, 2016, to the brewmaster_beta channel for public beta testers.

        That’s right, SteamOS 2.93 Brewmaster Beta is here to replace the previous build announced earlier this month, SteamOS 2.91 Brewmaster Beta, and add the latest security fixes and updates from upstream. This means that SteamOS is now officially based on the recently released Debian GNU/Linux 8.6 “Jessie” operating system.

        “SteamOS brewmaster update 2.93 pushed to brewmaster_beta. Corrects a build issue where the last kernel updates were not actually included. Also updates from the Debian 8.6 release[www.debian.org] and the usual security fixes,” says John Vert, Valve engineer, in the release announcement.

      • There Are Around 2,000 Steam Linux Games Available
      • Steam now has above 2,500 Linux & SteamOS games available

        I’ve seen some posts on reddit and across the wider net about Steam hitting around 2,000 games for Linux. The truth is the number is actually quite a lot higher.

        People seem to be using SteamDB numbers which aren’t up to date. The problem here is that SteamDB is unofficial and a manual process for people to let them know a game works. So you need to own the game and manually tell them, which makes their numbers rather different to the reality.
        Note: SteamDB do truly excellent work, this isn’t a bash attempt, but to let people know how they work and how their list is different.

        The other problem is that the Steam Search when filtering only for Games and only for Linux is still incorrect. It actually lists games that are due soon, or due this month and haven’t released yet. It also still lists games that haven’t updated their release date that were supposed to release before today, but didn’t actually release yet.

      • ‘Farabel’, a turn based strategy game is officially coming to Linux after a days work

        The developers of Farabel [Official Site, Steam, itch] sent word that their game is now officially coming to Linux. They asked for testers and in a single day got the game working properly on Linux and it’s now official.

      • RADV Vulkan Driver Can Now Correctly Render Talos Principle
      • The Talos Principle now renders correctly in ‘radv’, the open source AMD Vulkan driver

        Good news for Vulkan and AMD GPU fans, as David Airlie has put up a new blog post letting us know that The Talos Principle now renders correctly in this new open source AMD Vulkan driver.

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

    • GNOME Desktop/GTK

      • GNOME 3.22 Supports Flatpak Cross-Linux Distribution Framework

        GNOME 3.22, the second major update this year to the GNOME desktop environment, debuted Sept. 21—and since then, has made its way into the repositories of Linux distributions, including Fedora and openSUSE. Much as was the case with the GNOME 3.20 update earlier this year, many of the changes in the latest iteration of the popular open-source desktop environment are incremental. Among the most significant capabilities in GNOME 3.22 is support for the Flatpak framework, which is designed to allow an application to be installed on various Linux distributions. The GNOME Builder integrated development environment (IDE) can now also be used by developers to build Flatpak-compatible applications. Flatpak is an alternative approach to Snappy, which provides similar capabilities and was originally developed by Ubuntu. The GNOME Files application continues to evolve and, in this release, adds new capabilities that enable users to open compressed files automatically. Files also enables users to compress files easily in common compression formats. Additionally, Files gained the ability to batch rename files and folders on a user’s system. Here’s a look at the key features of the GNOME 3.20 desktop update.

      • [GNOME Maps:] Planning a trip
  • Distributions

    • The Linux Setup – Daniel Foré, elementary OS

      Daniel is the founder of elementary OS, the distribution that’s famous for its own look. Daniel came to Linux through a love of customizing Windows XP, so it’s no surprise he also came to appreciate the flexibility of Linux. Interestingly, especially given the strong visual aesthetic of elementary, Daniel’s favorite app is the Scratch text editor!

    • New Releases

      • Solus Gets MATE 1.16 Desktop Environment and Linux Kernel 4.7.5, Up-to-Date Apps

        Joshua Strobl from the Solus Project published a new installation of the distribution’s weekly newsletter, This Week in Solus 36, to inform Solus users about the latest software updates and other important changes in the Linux OS.

      • Proxmox VE 4.3 released

        Proxmox Server Solutions GmbH today announced the general availability of Proxmox Virtual Environment 4.3. The hyper-converged open source server virtualization solution enables users to create and manage LXC containers and KVM virtual machines on the same host, and makes it easy to set up highly available clusters as well as to manage network and storage via an integrated web-based management interface.

        The new version of Proxmox VE 4.3 comes with a completely new comprehensive reference documentation. The new docu framework allows a global as well as contextual help function. Proxmox users can access and download the technical documentation via the central help-button (available in various formats like html, pdf and epub). A main asset of the new documentation is that it is always version specific to the current user’s software version. Opposed to the global help, the contextual help-button shows the user the documentation part he currently needs.

      • Proxmox VE 4.3 Officially Released with New Reference Documentation, Updated GUI

        Today, September 27, 2016, Proxmox Server Solutions GmbH proudly announced the immediate availability of the Proxmox VE (Virtual Environment) 4.3 open source, Linux-based hyper-converged server virtualization solution.

        The biggest new feature of the Proxmox VE 4.3 release appears to be a new reference documentation that users can download in various formats, including as EPUB, PDF or HTML, helping newcomers get started with Proxmox much faster. However, it looks like it is based on the Debian GNU/Linux 8.6 “Jessie” and Ubuntu 16.04 LTS (Xenial Xerus) operating systems, running LXC 2.0 and Linux kernel 4.4 LTS.

    • OpenSUSE/SUSE

    • Red Hat Family

      • How Red Hat is making money on the public cloud with a hybrid approach

        Red Hat hasn’t traditionally played much of a part in public clouds, a fact its CEO Jim Whitehurst underscored in Red Hat’s recent earnings call. Though the company is now dabbling in a true elastic/consumption-based delivery and pricing model via OpenShift, Red Hat remains a primarily on-premises business that only feints toward a true cloud model in terms of service delivery.

        Ironically, the hybrid cloud may be the trend that gets Red Hat fully planted in the public cloud.

      • Red Hat Software Adding Fort Point Offices

        The new location will include an immersive briefing center for visiting executives, the first East Coast location for the company’s innovation labs and a new engineering lab, which will augment Red Hat’s 175,000-square-foot engineering and product headquarters in Westford. The engineering lab will provide collaborative space to take advantage of Boston’s tech ecosystem, Raleigh, North Carolina-based Red Hat said in a statement.

      • Finance

      • Fedora

        • Fedora Join meetings to begin this week

          We’ve had the Fedora Join SIG around for a bit now, but we haven’t been very active. Recently we’ve seen an increase in community members willing to participate in the SIG, and in combination with the work that CommOps is doing to improve the “joining experience” for newbies, we thought that it’s a good time to gain some traction.

        • Fedora 25 Alpha and processing.

          Is simple to use. You can used with java also with python and android mode.
          Come with many examples and tutorials.
          Today I tested with Fedora 25 alpha.

        • Fedora 24 — The Best Distro for DevOps?

          If you have been to any DevOps-focused conferences — whether it’s OpenStack Summit or DockerCon — you will see a sea of MacBooks. Thanks to its UNIX base, availability of Terminal app and Homebrew, Apple hardware is extremely popular among DevOps professionals.

          What about Linux? Can it be used as a platform by developers, operations, and DevOps pros? Absolutely, says Major Hayden, Principal Architect at Rackspace, who used to be a Mac OS user and has switched to Fedora. Hayden used Mac OS for everything: software development and operations. Mac OS has all the bells and whistles that you need on a consumer operating system; it also allows software professionals to get the job done. But developers are not the target audience of Mac OS. They have to make compromises. “It seemed like I had to have one app that would do one little thing and this other app would do another little thing,” said Hayden.

        • Fedora 25 Goes Into Beta Freeze Today, New Features Need To Be Completed

          Today is a big day along the Fedora 25 schedule and stepping towards its official debut in November.

          The Fedora 25 Beta freeze is today ahead of the planned beta release on 11 October. Also very important is today’s the 100% code complete deadline for Fedora 25 changes.

        • Fedora 25 Beta Freeze
        • Fedora 25 Linux Beta Might Land on October 11, 2016, Beta Freeze Now in Effect

          Fedora Project’s Mohan Boddu announced on September 26, 2016, that the upcoming Fedora 25 Beta milestone, which is scheduled for release next month on the 11th, is now officially in freeze stage.

          Fedora 25 is the next major release of the Red Hat-sponsored computer operating system for power users and anyone else who wants a well-designed Linux-based OS. It has been in development since July 2016, and the Alpha snapshot has hit the streets on August 30, after being delayed by a week due to some nasty regressions and bugs that have been patched quickly.

          The next stop in the Fedora 25 Linux development cycle is the Beta, which, according to the official release schedule, is now in freeze state. The Beta Freeze stage means that developers won’t be allowed to add any other features to the upcoming Beta release, but only to fix blockers and other annoyances that might not offer users a quality product.

    • Debian Family

      • Debian Project mourns the loss of Kristoffer H. Rose

        Kristoffer was a Debian contributor from the very early days of the project, and the upstream author of several packages that are still in the Debian archive nowadays, such as the LaTeX package Xy-pic and FlexML. On his return to the project after several years’ absence, many of us had the pleasure of meeting Kristoffer during DebConf15 in Heidelberg.

      • Derivatives

        • Parsix GNU/Linux 8.5 “Atticus” to Reach End of Life on September 30, 2016

          The Parsix GNU/Linux developers announced that the end-of-life status is approaching fast for the Parsix GNU/Linux 8.5 “Atticus” operating system, urging users to upgrade to the latest release immediately.

          Dubbed Atticus and based on the Debian GNU/Linux 8.5 “Jessie” operating system, Parsix GNU/Linux 8.5 was unveiled seven months ago, on February 14, 2016. Running the long-term supported Linux 4.1.17 kernel injected with TuxOnIce 3.3 and BFS patches, it was built around the GNOME 3.18 desktop environment with the GNOME Shell 3.18.3 user interface.

          The end of life (EOL) will be officially reached on September 30, 2016, which means that users of the Parsix GNU/Linux 8.5 “Atticus” operating system will no longer receive security and software updates. Therefore, they are urged today to upgrade to the latest, most recent version of the Debian-based distribution, Parsix GNU/Linux 8.10 “Erik.”

        • Canonical/Ubuntu

          • Ubuntu 16.10 Final Beta Officially Released with Linux Kernel 4.8, Download Now

            Delayed six days, the Final Beta release of the upcoming Ubuntu 16.10 (Yakkety Yak) operating system launched today, September 28, 2016, as the final development snapshot in the series.

            Today’s Final Beta is in fact the first Beta pre-release version of Ubuntu 16.10, and the only development milestone that you’ll be able to test if you want to see what’s coming to the next major release of Ubuntu Linux. However, we can tell you that it is powered by Linux kernel 4.8, contains up-to-date applications, and still uses the Unity 7 UI.

            “The Ubuntu team is pleased to announce the final beta release of Ubuntu 16.10 Desktop, Server, and Cloud products. Codenamed “Yakkety Yak”, 16.10 continues Ubuntu’s proud tradition of integrating the latest and greatest open source technologies into a high-quality, easy-to-use Linux distribution. The team has been hard at work through this cycle, introducing new features and fixing bugs,” reads the announcement.

  • Devices/Embedded

Free Software/Open Source

  • GitHub open-sources internal load-balancing software

    GitHub will release as open source the GitHub Load Balancer (GLB), its internally developed load balancer.

    GLB was originally built to accommodate GitHub’s need to serve billions of HTTP, Git, and SSH connections daily. Now the company will release components of GLB via open source, and it will share design details.

  • GE, Bosch and open source could bring more IoT tools

    Partnerships that could shape the internet of things for years are being forged just as enterprises fit IoT into their long-term plans.

    A majority of organizations have included IoT as part of their strategic plans for the next two to three years, IDC said last week. No one vendor can meet the diverse IoT needs of all those users, so they’re joining forces and also trying to foster broader ecosystems. General Electric and Germany’s Bosch did both on Monday.

    The two companies, both big players in industrial IoT, said they will establish a core IoT software stack based on open-source software. They plan to integrate parts of GE’s Predix operating system with the Bosch IoT Suite in ways that will make complementary software services from each available on the other.

  • Industrial IoT leaders work towards interoperability and open source collaboration
  • GE and Bosch Sign Agreement for Interoperability and Open Source Collaboration
  • Free PPMP from Bosch makes Industry 4.0 open for all
  • Open source tools can help small businesses cut costs and save time

    Imagine if there was a global community of tech experts who were independently building and improving digital tools that you could use for free. Tools that could help you provide a service for, and communicate with, your customers.

    Well, there is. The open source community is made up of amateur and professional computer coders who work on publicly available computer code. Businesses can then take these lines of code from websites such as Github, to use in their software, products and services.

    Open source projects are helping small businesses all over the world to save time and money.

  • OPNFV Colorado platform bolsters open source NFV efforts

    The Linux Foundation’s Open Platform for NFV project claims its third platform release targets accelerating development of NFV apps and services

    The telecom market’s continued move towards integrating network functions virtualization received a boost as the Linux Foundation’s Open Platform for NFV project released its latest Colorado platform release, the third from the open source-based organization.

  • Open-source NFV Project delivers third platform release

    The OPNFV Project, an open source project that facilitates the development and evolution of Network Functions Virtualization (NFV) components across various open source ecosystems through integration, deployment, and testing today announced the availability of OPNFV Colorado, the project’s third platform release.

  • Inocybe Technologies Launches Community Version of their Open Networking Platform
  • Open Source Getting on My Nerves

    Open source people are generally not dirt dishers, however. Take Phil Robb of OpenDaylight , where he is senior technical director. Robb was on that MANO panel in Denver, and he spoke to me shortly afterward in an interview on ODL’s new Boron software release. I specifically asked him about the “messy MANO situation” right now.

    His response was frustratingly calm. “I would equate the MANO space with where the controller space was three years ago,” he says. “One of the great things about open source is that real code is going to be up, going to be used, stuff will work or it will fall over. But we’ll fail fast and move on.” (See Carriers Driving ODL’s Boron Release.)

    So having multiple versions in process isn’t a bad thing, Robb says, because it might be that one approach works better for a set of use cases than another. What the industry will come around to “sooner rather than later” is that one approach likely addresses the broadest set of use cases and will be more widely adopted, while others address niches and either are used alongside the major approach or incorporated into it.

  • GENIVI Alliance launches new open source vehicle simulator project
  • Choosing the right metrics for your project

    Last month we discussed setting goals for your community metrics program. These goals serve as a constant reminder of what you want to achieve in the program and should be used as metrics themselves when deciding exactly what you are going to measure.

    This month we’ll document a basic strategy for deciding what to measure, and give examples of specific community metrics we’ve used in practice. Using our knowledge of our community and the goals we previously came up with, we’ll make sure the metrics we choose are relevant.

  • An Open Source Shopping Cart Can Boost Your Online Commerce Efforts
  • Open Source Projects Must Work Together to Survive

    Open source software is in danger of being beaten at its own game by upstart services that are tightly integrated, less complex, and easier to use. That message was at the heart of the cautionary tale told by Stephen O’Grady in his keynote at this year’s ApacheCon North America in May.

    O’Grady, Principal Analyst & Cofounder of RedMonk, recalled his years as a systems integrator, pointing out that open source software took a big bite out of the enterprise software market when it became more accessible and easier to use.

  • Contributing to an Open Source Project

    If you’re interested gaining some tips and insights into how to contribute to open source, this video of a presentation given on September 19 at the JavaOne conference in San Francisco by Gunnar Wagenknecht, a software engineer at Salesforce, and Wayne Beaton, director at the Eclipse Foundation, might be useful to you.

  • Facebook Debuts Open Source Detection Tool for Windows

    Facebook debuted the open source tool in 2014 as cross-platform, but for the last two years it was only supported on Ubuntu, CentOS, and Mac OS X operating systems. Facebook isn’t the biggest Windows shop, but the company confirmed in March that because so many users were asking for it, it was building a version of the tool for Windows 10.

  • Events

    • Report for Software Freedom Day 2016 – China Academy Science

      This year I am asked to present SFD in China Academy Science by the company, so unlucky I am not proper to deliver a Fedora talk then. I bring some DVDs and stickers there, as well as a roll up poster. However there are people asking questions about Fedora so finally I still do some Q&A after the event.

      SFD in China Academy Science this year is hold in Huairou Campus, suburbs of Beijing. So with another Red Hatter, Shiyang, we took train there. Their campus is not easy to find and by the time we arrived at the event it’s 10 minutes before the start of the event.

      Talks started on 2:00 PM. After the hostess introduced the event, Shiyang is the first to talk. He introduces the basic usage of Git and Github. During the Q&A part of his talk, I found that in fact most students not paying much attention to distributions already. They are just users of Linux.

    • OpenDaylight Symposium 2016
    • Keynote: Join or Die! – Stephen O’Grady, Principal Analyst & Cofounder, RedMonk
  • Web Browsers

    • Mozilla

      • B2G OS and Gecko Annoucement from Ari Jaaksi & David Bryant

        In the spring and summer of 2016 the Connected Devices team dug deeper into opportunities for Firefox OS. They concluded that Firefox OS TV was a project to be run by our commercial partner and not a project to be led by Mozilla. Further, Firefox OS was determined to not be sufficiently useful for ongoing Connected Devices work to justify the effort to maintain it. This meant that development of the Firefox OS stack was no longer a part of Connected Devices, or Mozilla at all. Firefox OS 2.6 would be the last release from Mozilla. Today we are announcing the next phase in that evolution. While work at Mozilla on Firefox OS has ceased, we very much need to continue to evolve the underlying code that comprises Gecko, our web platform engine, as part of the ongoing development of Firefox. In order to evolve quickly and enable substantial new architectural changes in Gecko, Mozilla’s Platform Engineering organization needs to remove all B2G-related code from mozilla-central. This certainly has consequences for B2G OS. For the community to continue working on B2G OS they will have to maintain a code base that includes a full version of Gecko, so will need to fork Gecko and proceed with development on their own, separate branch.

      • Firefox 53 Will Drop Support for Windows XP and Windows Vista

        Software companies are one by one giving up on Windows XP support for their products, and now it appears that it’s Mozilla’s turn to switch the focus to newer versions of Windows.

        Firefox 53 will be the first version of the browser which will no longer support Windows XP and Windows Vista, so users who haven’t yet upgraded to Windows 7 or newer will have to either stick with Firefox 52 or move to a different browser.

      • Boot 2 Gecko Being Stripped From Mozilla’s Codebase

        At the end of 2015 Mozilla effectively put an end to Firefox OS / Boot 2 Gecko by concluding things weren’t working out for Mozilla Corp and their commercial partners to ship Firefox OS smartphones. All commercial development around it has since stopped and they are now preparing to strip B2G from the mozilla-central code-base.

        The news to report on now is that Ari Jaaksi and David Bryant have announced, “Today we are announcing the next phase in that evolution. While work at Mozilla on Firefox OS has ceased, we very much need to continue to evolve the underlying code that comprises Gecko, our web platform engine, as part of the ongoing development of Firefox. In order to evolve quickly and enable substantial new architectural changes in Gecko, Mozilla’s Platform Engineering organization needs to remove all B2G-related code from mozilla-central. This certainly has consequences for B2G OS. For the community to continue working on B2G OS they will have to maintain a code base that includes a full version of Gecko, so will need to fork Gecko and proceed with development on their own, separate branch.”

  • SaaS/Back End

  • CMS

    • Open source application portal adds new ITS applications for download

      The Open Source Application Development Portal (OSADP) web-based portal provides access to and supports the collaboration, development, and use of open-source ITS-related applications. The OSADP has added a number of new ITS-related applications that are available free to the public, including:

  • Public Services/Government

    • Wyoming’s open source enterprise code library a secret no more

      Wyoming’s 250-person Enterprise Technology Services (ETS) group knew it had a good thing in its Enterprise Extensible Code Library, but it chose to keep things under wraps outside of the state until last week when members of that team attended an annual confab for state government CIOs.

      It was at the National Association of State Chief Information Officers (NASCIO) convention in Orlando that the ETS code library project was honored with a Recognition Award for Enterprise IT Management Initiatives, and the inquiries from other states and organizations started streaming in.

  • Openness/Sharing/Collaboration

    • Inside the Drone Journalism Lab’s open source operations manual

      Across the world, journalists are increasingly using drone technology to augment their reporting at a fairly inexpensive price.

      In order to help journalists become more adept drone users, the University of Nebraska-Lincoln’s Drone Journalism Lab recently released a free operations manual online.

      The manual, produced by Matt Waite, founder of the Drone Journalism Lab, is open source and Creative Commons licensed.

    • Open Source Malaria’s First Paper

      Open Source Malaria (OSM) publishes its first paper today. The project was a real thrill, because of the contributors. I’d like to thank them.

      Skepticism about open source research is often based on assumptions: that people will be too busy or insufficiently motivated to participate, or that there will be a cacophony of garbage contributions if a project is open to anyone. I’m not sure where such assumptions come from – perhaps people look first for ways that things might fail. We can draw upon many experiences of the open source software movement that would suggest such assumptions are poor. We can draw on successful examples of open collaboration in other areas of science, such as the Human Genome Project and the projects it has spawned, as well as examples in mathematics and astrophysics. This OSM paper addresses open source as applied to drug discovery, i.e. experimental, wet lab science in an area where we normally expect to need secrecy, for patents. It is based on the experience of 4-5 years of work and describes the first series examined by OSM.

    • Open Access/Content

Leftovers

  • Video claiming drilling into iPhone 7 will reveal hidden headphone port goes viral

    A video claiming that users can add a headphone socket to the iPhone 7, which only has a Lightning port, by drilling into the bottom of their phone has been watched almost 10m times.

    The prank video shows a man drilling a 3.5mm hole into the bottom left edge of the iPhone 7 held in a vice. It points to the row of small holes on the left side that replaced the headphone socket present on the iPhone 6S and claims that drilling into the second hole on the left reveals a hidden socket.

    Once the hole has been drilled the video shows an iPhone 7 playing music, although the sound comes out of the speakers, not the white headphones now inserted in the DIY hole.

  • Tempers flare in Venice as angry protesters block cruise ships

    Hundreds of demonstrators have taken to the water in Venice to protest against visiting cruise ships, as relations between tourists and locals reach a new nadir.

    Flare-waving protestors used gondolas and small boats to prevent cruise ships, including a vessel belonging to Thomson, from passing through the lagoon on Sunday.

    During peak season some 30,000 cruise ship passengers disembark in Venice every day, which locals claim is ruining their city, both environmentally and culturally.

  • Disney Is Working With an Adviser on Potential Twitter Bid

    Walt Disney Co. is working with a financial adviser to evaluate a possible bid for Twitter Inc., according to people familiar with the matter.

    After receiving interest in discussing a deal, Twitter has started a process to evaluate a potential sale. Salesforce.com Inc. is also considering a bid and is working with Bank of America on the process, according to other people, who asked not to be named because the matter is private.

    Representatives for Twitter and Disney didn’t respond to requests for comment.

    Speculation that Twitter will be sold has been gathering steam in recent months, including last week’s news of Salesforce’s interest, given the social-media company’s slumping stock and difficulties in attracting new users and advertising revenue. Disney, the owner of ABC and ESPN, could obtain a new online outlet for entertainment, sports and news. Jack Dorsey, chief executive officer of Twitter, is on the board of Disney.

  • Science

    • Archaelogists discover 200-year-old underground pub in Manchester

      Archaelogists have discovered a 200-year-old underground pub during building work on a office building in central Manchester.

      Excavators discovered untouched bottles full of of brandy and crockery branded with the 18th-century landlord of the Astley Arms.

      Archaelogists were brought to the site of a future 13-storey skyscraper as part the planning process and found the remains of houses as well as the pub.

  • Security

    • Tuesday’s security updates
    • New Open Source Linux Ransomware Divides Infosec Community

      Following our investigation into this matter, and seeing the vitriol-filled reaction from some people in the infosec community, Zaitsev has told Softpedia that he decided to remove the project from GitHub, shortly after this article’s publication. The original, unedited article is below.

    • Fax machines’ custom Linux allows dial-up hack

      Party like it’s 1999, phreakers: a bug in Epson multifunction printer firmware creates a vector to networks that don’t have their own Internet connection.

      The exploit requirements are that an attacker can trick the victim into installing malicious firmware, and that the victim is using the device’s fax line.

      The firmware is custom Linux, giving the printers a familiar networking environment for bad actors looking to exploit the fax line as an attack vector. Once they’re in that ancient environment, it’s possible to then move onto the network to which the the printer’s connected.

      Yves-Noel Weweler, Ralf Spenneberg and Hendrik Schwartke of Open Source Training in Germany discovered the bug, which occurs because Epson WorkForce multifunction printers don’t demand signed firmware images.

    • Google just saved the journalist who was hit by a ‘record’ cyberattack

      Google just stepped in with its massive server infrastructure to run interference for journalist Brian Krebs.

      Last week, Krebs’ site, Krebs On Security, was hit by a massive distributed denial-of-service (DDoS) attack that took it offline, the likes of which was a “record” that was nearly double the traffic his host Akamai had previously seen in cyberattacks.

      Now just days later, Krebs is back online behind the protection of Google, which offers a little-known program called Project Shield to help protect independent journalists and activists’ websites from censorship. And in the case of Krebs, the DDoS attack was certainly that: The attempt to take his site down was in response to his recent reporting on a website called vDOS, a service allegedly created by two Israeli men that would carry out cyberattacks on behalf of paying customers.

    • Krebs DDoS aftermath: industry in shock at size, depth and complexity of attack

      “This attack didn’t stop, it came in wave after wave, hundreds of millions of packets per second,” says Josh Shaul, Akamai’s vice president of product management, when Techworld spoke to him.

      “This was different from anything we’ve ever seen before in our history of DDoS attacks. They hit our systems pretty hard.”

      Clearly still a bit stunned, Shaul describes the Krebs DDoS as unprecedented. Unlike previous large DDoS attacks such as the infamous one carried out on cyber-campaign group Spamhaus in 2013, this one did not use fancy amplification or reflection to muster its traffic. It was straight packet assault from the old school.

    • iOS 10 makes it easier to crack iPhone back-ups, says security firm

      INSECURITY FIRM Elcomsoft has measured the security of iOS 10 and found that the software is easier to hack than ever before.

      Elcomsoft is not doing Apple any favours here. The fruity firm has just launched the iPhone 7, which has as many problems as it has good things. Of course, there are no circumstances when vulnerable software is a good thing, but when you have just launched that version of the software, it is really bad timing.

      Don’t hate the player, though, as this is what Elcomsoft, and what Apple, are supposed to be doing right.

      “We discovered a major security flaw in the iOS 10 back-up protection mechanism. This security flaw allowed us to develop a new attack that is able to bypass certain security checks when enumerating passwords protecting local (iTunes) back-ups made by iOS 10 devices,” said Elcomsoft’s Oleg Afonin in a blog post.

    • After Tesla: why cybersecurity is central to the car industry’s future

      The news that a Tesla car was hacked from 12 miles away tells us that the explosive growth in automotive connectivity may be rapidly outpacing automotive security.

      This story is illustrative of two persistent problems afflicting many connected industries: the continuing proliferation of vulnerabilities in new software, and the misguided view that cybersecurity is separate from concept, design, engineering and production.

      This leads to a ‘fire brigade approach’ to cybersecurity where security is not baked in at the design stage for either hardware or software but added in after vulnerabilities are discovered by cybersecurity specialists once the product is already on the market.

    • Sloppy programming leads to OpenSSL woes
    • OpenSSL Fixes Critical Bug Introduced by Latest Update

      OpenSSL today released an emergency security update after a patch in its most recent update issued last week introduced a critical vulnerability in the cryptographic library.

    • The Internet Of Poorly Secured Things Is Fueling Unprecedented, Massive New DDoS Attacks

      Last week, an absolutely mammoth distributed denial of service (DDoS) attack brought down the website of security researcher Brian Krebs. His website, hosted by Akamai pro bono, was pulled offline after it was inundated with 620Gbps of malicious traffic, nearly double the size of the biggest attack Akamai (which tracks such things via their quarterly state of the internet report) has ever recorded. Krebs was ultimately able to get his website back online after Google stepped in to provide DDoS mitigation through its Project Shield service.

    • Trump Offers More Insight On His Cybersecurity Plans: 10-Year-Old Relatives Vs. 400-lb Bedroom Dwellers

      Look, anyone who refers to cybersecurity or cyberwarfare as “the cyber” is probably better off not discussing this. But Donald Trump, in last night’s debate, felt compelled to further prove why he’s in no position to be offering guidance on technological issues. And anyone who feels compelled to portray hackers as 400-lb bedroom dwellers probably shouldn’t be opening their mouth in public at all.

      With this mindset, discussions about what “the Google” and “the Facebook” are doing about trimming back ISIS’s social media presence can’t be far behind. Trump did note that ISIS is “beating us at our game” when it comes to utilizing social media. Fair enough.

    • New, stronger crypto standard lacks backward compatibility

      The Internet Engineering Task Force is on the verge of approving a new standard for encrypted internet traffic that will make the web a safer place to shop, bank and browse — but it could also break a lot of stuff for people who don’t update their browsers. Transport Layer Security, or TLS, is an encryption protocol that works with web browsers. It’s the math, and the shared standards, that underlie the green padlock users see — the symbol which gives users the confidence that they are connected to the right site and is private enough to share personal or financial data. TLS supersedes SSL, or Secure Sockets Layer — a protocol dating back to 1995 that has proven to be thoroughly broken. But the latest TLS version was finalized in 2008 and in recent years has been the subject of many high profile attacks and newly discovered bugs.

  • Defence/Aggression

    • Duterte ‘about to cross the Rubicon’ with US, wants alliances with Russia & China

      Philippines President Rodrigo Duterte has reiterated his intention to distance his country from the US, its former colonial master, saying he is about to pass “the point of no return” with the US.

      “I am about to cross the Rubicon between me and the US,” the controversial Pacific leader told reporters, without elaborating.

      Duterte reiterated that the Philippines would seek closer ties with Russia and China, the two nations that challenged American ambition for global leadership. But, he added, the ties with the US would not be broken completely, only driven to a point that would allow Manila to have an independent policy.

    • Carter: Afghanistan War Supplemental Request Coming in November

      Defense Secretary Ash Carter plans to present Congress with a request for a supplemental spending measure to fund US troops in Afghanistan come November, he said Monday.

      However, Carter would not give a sense of how large the monetary request may be, saying only that there is a “range” that the department’s budgetary experts are considering.

    • Jordanian writer on trial for ‘anti-Islam’ cartoon shot dead outside court

      A gunman on Sunday killed prominent Jordanian writer Nahed Hattar outside a court where he was facing charges for sharing a cartoon deemed offensive to Islam, state news agency Petra reported.

      Hattar was struck by three bullets before the assailant was arrested, said Petra. Witnesses told AFP that a man had opened fire in front of the court in Amman’s Abdali district.

      The 56-year-old Christian was arrested on August 13 after posting a cartoon mocking jihadists on his Facebook account.

      He was charged with inciting sectarian strife and insulting Islam before being released on bail in early September.

    • Writer Charged With Insulting Islam Is Killed as Extremism Boils Over in Jordan

      Some of the most extreme elements in Jordan made clear in recent weeks that Nahed Hattar should pay for a provocative cartoon he posted online depicting a bearded man in bed with two women ordering God to bring him cashews and wine.

      So when Mr. Hattar, 56, a prominent writer from a Christian family, showed up at a court on Sunday to face criminal charges of insulting Islam, at least one man with a gun decided a trial was not enough. As three bullets ripped through the writer in front of the courthouse, Jordan’s simmering tensions boiled over.

    • France: What Is Hidden Behind the “Burkini Ban”

      In Sisco, Corsica, on August 13, a group of Muslim men arrived on a beach in the company of women wearing “burkinis” (full-body bathing costumes). The Muslim men firmly asked the tourists on the beach to leave and posted signs saying “No Entry”. When a few teenagers resisted, the Muslim men responded with a harpoon and baseball bats. The police intervened — but it was just the beginning.

      In the following days, on beaches all over France, Muslim men showed up, accompanied by women in burkinis, and asking beachgoers to leave. Tourists packed up and fled. Several mayors of seaside resorts decided to ban the bathing costume, and the “burkini ban” scandal was born.

      Some politicians said that banning the burkini “stigmatized” Muslims and infringed on their “human rights” to wear whatever they liked. Other politicians, including Prime Minister Manuel Valls and former President Nicolas Sarkozy, called the burkini a “provocation”, and asked for a law to ban it. The Council of State, the highest legal institution, eventually declared that banning the burkini was against the law; the ban was lifted.

      What is important to explain is what lies behind the “burkini ban.”

      Thirty years ago, France was a country where Islam was present but where Islamic demands were virtually absent and Islamic veils were rare.

      Then, in September, 1989, in a northern suburb of Paris, three female students decided to attend high school with their heads covered by a scarf. When the dean refused, the parents, with the support of newly created Muslim associations, filed a complaint. The parents won.

    • One dead and three injured in Malmo shooting as bomb found outside primary school

      Witnesses reported hearing 20 gunshots fired in bursts of three during a football derby at around 7pm local time between Malmö FF and Helsingborgs IF on Sunday.

      One eyewitness claimed the shots were fired by people in an Audi which drove off at high speed.

      Police found shell casings at the scene in Censorgatan and say the suspects may have escaped by moped – four people were injured, including one who was shot in the head.

    • Liberals’ MP hit by hate messages
    • India Says Pakistan Believes Terror Will Bring Territory

      Pakistan continues to believe terrorist attacks will allow it to obtain territory it covets in Jammu and Kashmir, India’s foreign minister said Monday.

      In her speech before the U.N. General Assembly, Sushma Swaraj also rejected accusations made by Pakistan’s prime minister from the same podium last week that India violates human rights, calling them “baseless.”

      She said India has a man in custody “whose confession is a living proof of Pakistan’s complicity in cross-border terror. But when confronted with such evidence, Pakistan remains in denial.”

      “It persists in the belief that such attacks will enable it to obtain the territory it covets,” Swaraj said. “My firm advice to Pakistan is: abandon this dream. Let me state unequivocally that Jammu and Kashmir is an integral part of India and will always remain so.”

    • Pakistani journalist suing US for killing his son, brother in drone attack

      A Pakistani journalist has sued the United States government in Pakistani courts alleging that the Central Intelligence Agency (CIA) had killed his brother and a son in a drone strike in the tribal region of the country in 2009.

      According to Karim Khan, his brother and the son were innocent and had no terror links at all. His brother Asif Iqbal had Masters degree in Modern Languages and was a teacher at a local school. The 16-year-old son, Zahinullah, was a student of grade 10.

      In an interview with Al Jazeera, Khan vowed to pursue the case against the CIA and the US government. “We would show their tyrannous face to the whole world…that’s all. They cannot bring back my brother or my son…but I will fight against them as far as I can,” he said.

      Since 2004, the Central Intelligence Agency has conducted over 400 drone attacks in Pakistan, killing about 3,000 people. The London-based Bureau of Investigative Journalism claims that at least 966 civilians, including 207 children were also among those killed by the drones.

  • Environment/Energy/Wildlife/Nature

    • Evolution of global temperature over the past two million years

      Reconstructions of Earth’s past climate strongly influence our understanding of the dynamics and sensitivity of the climate system. Yet global temperature has been reconstructed for only a few isolated windows of time, and continuous reconstructions across glacial cycles remain elusive. Here I present a spatially weighted proxy reconstruction of global temperature over the past 2 million years estimated from a multi-proxy database of over 20,000 sea surface temperature point reconstructions. Global temperature gradually cooled until roughly 1.2 million years ago and cooling then stalled until the present. The cooling trend probably stalled before the beginning of the mid-Pleistocene transition3, and pre-dated the increase in the maximum size of ice sheets around 0.9 million years ago. Thus, global cooling may have been a pre-condition for, but probably is not the sole causal mechanism of, the shift to quasi-100,000-year glacial cycles at the mid-Pleistocene transition. Over the past 800,000 years, polar amplification (the amplification of temperature change at the poles relative to global temperature change) has been stable over time, and global temperature and atmospheric greenhouse gas concentrations have been closely coupled across glacial cycles. A comparison of the new temperature reconstruction with radiative forcing from greenhouse gases estimates an Earth system sensitivity of 9 degrees Celsius (range 7 to 13 degrees Celsius, 95 per cent credible interval) change in global average surface temperature per doubling of atmospheric carbon dioxide over millennium timescales. This result suggests that stabilization at today’s greenhouse gas levels may already commit Earth to an eventual total warming of 5 degrees Celsius (range 3 to 7 degrees Celsius, 95 per cent credible interval) over the next few millennia as ice sheets, vegetation and atmospheric dust continue to respond to global warming.

    • Singaporeans are choking on smoke floating over from Indonesia – here’s why this is happening

      Every year, forest fires from Indonesia choke a swathe of Southeast Asia with a smoky haze for weeks. This phenomenon harms the planet and angers neighbors. It is also a health hazard.

      So what is fueling this? The world’s desire for palm oil.

      The edible oil is used in cookies, noodles and other packaged foods as well as soaps, shampoos, lipsticks and many other consumer goods.

      Farmers in Indonesia, the world’s biggest supplier of the commodity, often illegally burn the world’s oldest rainforest or use fire to clear old oil palms on existing plantations, and the smoke from the flames drifts across Singapore and Malaysia.

  • Finance

    • Dingell seeks transparency in trade deal negotiations

      Automakers such as Ford Motor Co. and Fiat Chrysler oppose the deal, in part because it doesn’t go far enough in addressing currency manipulation by other nations. Michigan lawmakers have suggested the state has lost tens of thousands of jobs in part because of currency manipulation by China, Japan and other countries.

      The office of U.S. Trade Representative Michael Froman declined to comment on Dingell’s bill.

      Froman’s office has highlighted its transparency efforts regarding TPP, including the publication of detailed summaries of U.S. objectives in negotiating the agreement; the solicitation of public input on negotiating priorities; and the holding of public hearings to gather input on the negotiations.

    • TTIP: Negotiations ‘in the void’

      Negotiations on the Transatlantic Trade and Investment Partnership (TTIP) are forging ahead, despite opposition from a number of countries. And the American elections are almost certain to compromise the deal. EurActiv France reports.

      Despite attempts by citizens and several governments to derail TTIP, EU member states have confirmed their aim of finalising the free trade deal with Canada (CETA) and pushing ahead with talks with the United States, despite the approaching elections.

    • Ministers aim to wrap up services trade deal in early December

      Countries negotiating an international agreement on trade in services plan to meet in early December to try to finalize the deal, U.S. Ambassador to the World Trade Organization Michael Punke told reporters on Monday.

      The Trade in Services Agreement (TiSA), which would provide stronger international rules for sectors such as communications and banking, is being negotiated among 23 WTO members, including the 28-country European Union, that account for 70 percent of global services trade.

      “The TiSA ambassadors met today and agreed to a ministers’ meeting on Dec. 5 and 6 in Geneva to conclude TiSA,” Punke said, adding: “Establishing 21st century trade rules for services, for 70 percent of the globe’s services economy, is a big deal.”

  • AstroTurf/Lobbying/Politics

    • Asymmetry between the major parties fries the circuits of the mainstream press

      On the eve of the first debate between Donald Trump and Hillary Clinton, I thought I would write down some of the precepts and maxims I have used to understand press behavior during this long and startling campaign season. If I have done this right, you should be able to test the usefulness of my list in the final six weeks of the U.S. election. (And during coverage of the debates!)

      A word on how I came up with this list. I’ve been a close reader and critic of campaign coverage American-style since 1988. That’s eight “cycles,” as people in the industry say. After I started PressThink in 2003, I could write about the gatekeepers without their permission — hurray for blogging! — and so my pace increased during the 2004, 2008, and 2012 elections. This year I have done a little less at my blog (eight pieces since May 2015, plus one for the Washington Post) and put more into the real time conversation on Twitter, which includes most of the people doing campaign coverage, as well as the heaviest users of it.

    • Fact Check: Has Trump declared bankruptcy four or six times?

      Trump’s companies have filed for Chapter 11 bankruptcy protection, which means a company can remain in business while wiping away many of its debts. The bankruptcy court ultimately approves a corporate budget and a plan to repay remaining debts; often shareholders lose much of their equity.

      Trump’s Taj Mahal opened in April 1990 in Atlantic City, but six months later, “defaulted on interest payments to bondholders as his finances went into a tailspin,” The Washington Post’s Robert O’Harrow found. In July 1991, Trump’s Taj Mahal filed for bankruptcy. He could not keep up with debts on two other Atlantic City casinos, and those two properties declared bankruptcy in 1992. A fourth property, the Plaza Hotel in New York, declared bankruptcy in 1992 after amassing debt.

      PolitiFact uncovered two more bankruptcies filed after 1992, totaling six. Trump Hotels and Casinos Resorts filed for bankruptcy again in 2004, after accruing about $1.8 billion in debt. Trump Entertainment Resorts also declared bankruptcy in 2009, after being hit hard during the 2008 recession.

    • 24 Arrested Outside Hofstra University While Demanding An Open Presidential Debate

      Hundreds protested the exclusion of alternative ideas and candidates from the first presidential debate

    • Colin Kaepernick: ‘Embarrassing’ that Donald Trump, Hillary Clinton are candidates

      Colin Kaepernick watched “a little bit” of Monday’s presidential debate, and he didn’t come away impressed with either candidate.

      [...]

      “It was embarrassing to watch that these are our two candidates,” Kaepernick told reporters Tuesday. “Both are proven liars and it almost seems like they’re trying to debate who’s less racist.

      “And at this point … you have to pick the lesser of two evils. But in the end, it’s still evil.”

  • Censorship/Free Speech

  • Privacy/Surveillance

    • When cyber gets physical: why we need the NSA [Ed: This shallow article (must enable JS) conflates cyberdefence with mass surveillance (which is what NSA does)]
    • Kuwait lawyers fight world’s first mandatory DNA sampling law

      Lawyers in Kuwait have issued a legal challenge to the only law in the world forcing citizens and visitors to give samples of their DNA to the government.

      The Kuwait government has said that the law is needed to combat terrorism. DNA testing is reportedly due to begin within weeks.

      When the law was passed in July last year, Adel AbdulHadi of the Kuwaiti law firm Adel AbdulHadi & Partners and his colleagues began researching and drafting their challenge to it. Their principal argument is that the law violates privacy and human rights provisions in the country’s own constitution, as well as those enshrined in international treaties to which Kuwait is a signatory.

    • Local Lawyers Challenge New Kuwaiti Law Creating Mandatory DNA Database Of All Citizens And Visitors
    • Snowden movie ‘preposterous’, says former NSA deputy director

      The former deputy director of the National Security Agency has taken issue with Oliver Stone’s biopic of one-time NSA employee Edward Snowden.

      Speaking to National Public Radio, Chris Inglis, who retired in 2014 after 28 years at the agency, said the film’s narrative “was a gross mischaracterisation of what NSA’s purposes are. And a gross exaggeration of Edward Snowden’s own particular role in that. To the point where you could come away from looking at that movie, saying, ‘Why are 50,000 people at the NSA dead wrong? And one is absolutely correct?’”

      An NSA deputy director does feature in the film, played by Patrick Joseph Byrnes, and commissions Snowden to lead an important project in Hawaii.

    • Military pressing for broader surveillance mandate

      New legislation is being prepared at the Ministry of Defense for inclusion in a broader package of laws aimed at upgrading surveillance by security officials that would include the possibility of monitoring data carried by cables crossing the country.

      At present, Finland does not have a law providing the military with a mandate to carry out these kinds of intelligence operations. The new legislation in the works will include this, and spell out oversight of intelligence gathering and the division of duties among various officials and agencies.

      The Finnish military has a signals intelligence unit known as the Finnish Intelligence Research Establishment which organizationally falls under the Air Force.

      The head of Finnish military intelligence services, Major General Harri Ohra-aho told Yle that operations are not only concerned with information gathering about the military picture in the region, but also with assessing social developments.

      “We don’t count tanks, rather create a broad analysis of the situation in our vicinity. Technological advances are changing the security environment,” said Ohra-aho.

    • Swiss endorse new surveillance powers

      Swiss voters have given a strong approval to a law on new surveillance powers for the intelligence agencies.

      The new law would allow the authorities to tap phones, snoop on email and deploy hidden cameras and bugs.

      It would help Switzerland catch up with other countries, supporters say.

      Opponents have feared it could erode civil liberties and put Swiss neutrality at risk by requiring closer co-operation with foreign intelligence agencies.

      Some 65.5% of voters agreed to accept the proposal. It will allow the Federal Intelligence Service and other agencies to put suspects under electronic surveillance if authorised by a court, the defence ministry and the cabinet.

    • Microsoft goes AI crazy: Now Office 365 can track what you really get up to in meetings

      At its annual Ignite conference this week in Atlanta, GA, Microsoft is showing off new AI features across its core products for the enterprise. According to CEO Satya Nadella, this AI-everywhere strategy amounts to Microsoft “democratizing AI” for everyone to solve the world’s most pressing challenges.

      “To do this, we’re infusing intelligence into everything we deliver, from the agent to applications, services and infrastructure,” said Nadella.

  • Civil Rights/Policing

    • A New Intelligence Award for “Reporting Wrongdoing” [Ed: this is a trap]

      Professional integrity may be welcome everywhere, but “speaking truth to power” is rarely welcomed by “power.” Often it is not even acknowledged as “truth.” (Apparently, the IC envisions itself here as the domain of truth, and not of power. Or will those who challenge the IC leadership itself be eligible for the new award?) Meanwhile, “reporting wrongdoing” often seems to end badly for the reporter, as the frequency of whistleblower reprisal claims indicates.

    • House Intelligence Panel Gets Dozens of Whistleblower Complaints Every Year

      Critics of leakers have often argued that whistleblowers have legitimate channels through which they can report their grievances, but in the murky world of intelligence, it’s hard to know how many complaints are filed, and what, if anything, happens as a result. Now, the House Permanent Select Committee on Intelligence says it sees “dozens” of such complaints every year.

      The committee will not disclose details on individual cases, however.

      “We receive whistleblower-type complaints both through the [Intelligence Community inspector general] — which includes complaints filed through the Intelligence Community Whistleblower Protection Act — and via individuals who approach the committee directly,” said Jack Langer, communications director for Committee Chair Rep. Devin Nunes, R-Calif. Those complaints number in the “dozens” each year, he added.

      The legal process for whistleblowing has been at the center of renewed debate following public disclosures made by Edward Snowden in 2013. Snowden, who worked as an NSA contractor, insists he tried to raise complaints internally, but eventually gave up on the system, for fear of reprisal or dismissal.

    • Torture and False Testimony Leaves Mexico on a Journey to Nowhere

      For many in Mexico, the disappearance of 43 young students from the Ayotzinapa teaching college two years ago remains a painful emblem of a profound national failure—the failure of the state to protect its own people. Among other things, the case highlighted collusion among drug gangs, local politicians, and police, the failure of federal authorities to carry out a credible investigation, and—glaringly—the degree to which torture remains part of the standard operating procedure of criminal investigation.

      Take the case of Patricio Reyes Landa, an alleged member of the Guerrero Unidos criminal gang. Two years ago, Mexico’s attorney general called a press conference and showed a video in which Reyes Landa and three other suspects demonstrated how they supposedly threw the students’ ashes in a river, after incinerating their bodies at a garbage dump. Now, Reyes Landa and some 90 other suspects detained during the investigation say they were tortured into making false confessions about what they did or saw.

  • Internet Policy/Net Neutrality

    • Verizon Claims Nobody Wants Unlimited Data, Wouldn’t Be Profitable Anyway

      Back in 2011, Verizon and AT&T eliminated unlimited wireless data plans, instead pushing users toward share data allotments and overage fees as high as $15 per gigabyte. And while the companies did “grandfather” many of these unlimited users at the time, both companies have made at art form out of harassing or otherwise annoying these customers until they convert to costlier shared plans. And despite the fact that such overage-fee-based plans confuse the living hell out of most customers (who have no idea what a gigabyte is), both companies continue to insist that customers don’t actually want unlimited data.

  • DRM

    • EFF calls on HP to disable printer ink self-destruct sequence

      HP Inc. should apologize to customers and restore the ability of printers to use third-party ink cartridges, the Electronic Frontier Foundation (EFF) said in a letter to the company’s CEO yesterday.

      HP has been sabotaging OfficeJet printers with firmware that prevents use of non-HP ink cartridges and even HP cartridges that have been refilled, forcing customers to buy more expensive ink directly from HP. The self-destruct mechanism informs customers that their ink cartridges are “damaged” and must be replaced.

    • Demand that HP make amends for its self-destructing printers [SIGN AND SHARE!]

      I’ve written an open letter to HP CEO Dion Weisler on behalf of the Electronic Frontier Foundation, asking him to make amends for his company’s bizarre decision to hide a self-destruct sequence in a printer update that went off earlier this month, breaking them so that they would no longer use third-party ink cartridges.

      The letter points out that this is bad business — and it’s also bad for security. HP printers have previously been shown to be vulnerable to malware that spreads through sneaky codes in documents you print, that can steal your private data, raid your network, and become part of website-killing botnets.

      HP hid its self-destruct sequence in a software update, making future updates — like those that patch this kind of defect — suspect, and decreasing the likelihood that HP’s customers will install them.

      Worse still: HP can use Section 1201 of the DMCA to threaten security researchers who reveal similar defects, and to attack competitors who restore full functionality to your printer.

    • Capcom Releases DRM For Street Fighter 5, Promptly Rolls It Back When It Screws Legitimate Customers

      It should be quite clear by now that DRM is a fantastic way for video game makers to keep people from playing their games. Not pirates, though. No, those folks can play games with DRM just fine, because DRM doesn’t actually keep piracy from being a thing. No, I’m talking about legitimate buyers of games, who in example after example after example suddenly find that the games they bought are unplayable thanks to DRM tools that work about as well as the American political system. And yet DRM still exists for some reason, as game makers look for some kind of holy grail piece of software that will turn every past pirate into a future dollar sign.

      This search for the perfect DRM continues, as we have just the latest story of DRM gone wrong. This story of the Street Fighter V DRM, though, is a special kind of stupid because it was put in place via a software update release, meaning that a game that worked perfectly one day was bricked the next.

  • Intellectual Monopolies

    • Copyrights

      • Copyright Theft Is Grounds For Deportation, Board Says
      • Immigration Board Says You Can Be Deported For Copyright Infringement

        While we still wait to see if Kim Dotcom can be taken against his will from another country into the US for “copyright infringement” claims, apparently the DOJ has also decided that it can work the other way. The Justice Department’s Board of Immigration Appeals has said that people can be deported for copyright infringement. Apparently the law (the Immigration and Nationality Act) says that non-citizens can be deported if they commit crimes “involving moral turpitude” but had never weighed in on whether or not copyright infringement counted.

        [...]

        To be fair, this was a case of criminal copyright infringement, and not civil copyright infringement — and the board noted that because criminal copyright infringement requires the showing of “willfulness,” it suffices for the “moral turpitude” question. The person in question, Raul Zaragoza-Vaquero, had been arrested for selling 800 copied CDs to an RIAA investigator. He received 33 months in prison and had to pay $36,000… and was then told he had to leave the country.

      • EFF White Paper Hopes To Educate Cops On The Difference Between An IP Address And A Person

        Judges have pointed out to copyright trolls on multiple occasions that an IP address is not a person. Trolls still labor under this convenient misconception because they have little else in the way of “proof” of someone’s alleged infringement.

        Unfortunately, law enforcement agencies also seem to feel an IP address is a person — or at least a good indicator of where this person might be found. This assumption leads to blunders like ICE raiding a Tor exit node because it thought an IP address was some sort of unique identifier. After having IP addresses explained to it by the EFF, ICE returned the seized hard drives and promised to make the same mistake in the future.

        In another case, the Seattle PD raided a Tor exit node in search of a person downloading child porn. It didn’t find the target it was looking for, but went ahead and demanded passwords so it could search files and logs at the unfortunate citizen’s home before realizing it had the wrong person.

        The EFF is kind of sick of having to explain the difference between an IP address and a person to government entities. It has put together a white paper [PDF] that should be required reading anywhere government employees feel compelled to act on “evidence” as useless as IP addresses.

      • The EU’s Proposed Copyright Directive Is Likely To Be A Wonderful Gift — For US Internet Giants

        Even if the Copyright Directive manages to pass through the EU legislative system without any changes — which seems unlikely — Google would be in a strong position, because it already has the content ID technology in place that will allow it to comply. Although McNamee suggests that as a result Google would be “uniquely placed to license such software to European internet providers,” it’s more likely that it would keep it for its own exclusive use. However, the US company Audible Magic would doubtless be more than happy to license its widely-used content identification system as an alternative. And irrespective of whether it’s based on technology from Google or from Audible Magic, it’s hard to see how this outcome helps the European tech industry.

09.27.16

Links 27/9/2016: Lenovo Layoffs, OPNFV Third Software Release

Posted in News Roundup at 6:56 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • My Experiences Converting Users To GNU/Linux

      My wife, TLW, runs GNU/Linux with few problems. She uses a tablet, an Odroid-C2 ARMed thick client, and a big notebook all running Debian GNU/Linux or Ubuntu and her Android/Linux smartphone and her scanner and printer all deal with Beast, my GNU/Linux server. I have her file-system plugged in via NFS so she can do IT in bed, in front of the TV, on TV, or in her office and all her thousands of pictures, documents, scans etc. are all in the same place.

      She doesn’t even have much problem using Ubuntu or XFCE4 on Debian because she mostly uses the same applications all day long. It just works for her and memories of That Other Operating System are fading. She was locked to a single thick client with limited capabilities in those Dark Days. She had repeated crashes and malware. Today, her issues with IT are things like changing the name of a file on the FTP server or how to scan a light image or…, real problems, not problems M$ causes billions of people every day.

    • Shame on Microsoft for Leaving Surface Pro Customers in the Dark

      When Microsoft came out with its first batch of Surface tablets a few years ago, the company took a bath on them. It didn’t help that they were conceived around the unpopular Windows 8 and the now-defunct Windows RT and that the prospects for the OS were in question. After Microsoft wrote off $900 million on its money-losing Surface business, the deathwatch was on. But the Intel-based Surface Pro and Surface Pro 2 showed a glimmer of hope, and Microsoft finally delivered a solid hit with the Surface Pro 3. After that water­shed release, the Surface division is now an important business that brings in more than $1 billion revenue per quarter. Yet Microsoft isn’t showing much appreciation toward the customers who helped put its Surface business on solid footing.

  • Server

    • DevOps: All Development, No Database

      Since the last time I touched working code in a production environment, it’s no exaggeration to say that no part of the development process remains untouched. Over the last decade plus, effectively every aspect of the application development process has been scrutinized, rethought and in many cases reinvented. From version control to build systems to configuration and deployment to monitoring, modern development’s toolchain is multi-part and sophisticated.

      As it must be. Processes that work for code released in cycles measured in months cannot be expected to handle workflows measured in days or minutes.

      For all that the process of developing software has evolved, however, the database remains curiously overlooked. Consider the example of Cloud Native. Describing a modern, typically legacy-free approach to building applications appropriate for cloud environments, the term Cloud Native has gone from informal descriptor to accepted industry shorthand in short order – to the extent that it has its own technical foundation.

      If we look at the membership of that foundation, the CNCF, it would appear that the roster includes no database vendors at the Platinum or Gold membership levels, at least if you assume Google’s involvement is around Kubernetes and not tools such as BigQuery. Of the 41 silver members, meanwhile, two can be considered database vendors: Crunchy and Treasure Data.

  • Lenovo

    • Microsoft, Lenovo Accused Of Blocking Linux On Signature Edition PCs

      Laptops today are increasingly powerful. Right now, if you get a new laptop, the probability is that it comes with the new Windows 10 operating system but there are some people that prefer to have a choice when it comes to OS selection. While some people are fine with Windows 10, there are those who might want to have a dual OS system running. A few people who bought Lenovo laptops like the Yoga 900, 910S, and 710S, found that Lenovo was blocking Linux.

    • What you missed in tech last week: HP’s ink ban, Lenovo vs Linux, Yahoo mega-hack

      LAST WEEK was a controversial one in the world of technology, and HP, Lenovo, Microsoft and Yahoo all faced a backlash from pissed off customers.

    • Motorola, Lenovo lay off over a thousand more people
    • New Lenovo layoffs at Moto, company has now lost over 95% of employees in four years

      Speaking to Droid-life, both sources inside the company and Motorola itself confirmed today that Lenovo has conducted a brutal round of layoffs at Moto. According to DL, over 50% of Motorola’s existing US staff have lost their jobs. A 20-year veteran of the company allegedly posted on Facebook that he had been laid off, so it looks like Lenovo is cutting deep at the device-maker.

      One source told them that over 700 employees would be asked to leave of the over 1200 Motorola currently employs. No doubt Lenovo hopes to cut costs by integrating much of Motorola’s software and hardware development into its own smartphone unit. Sensible or not, it’s still rather sad to watch the once-proud brand slowly be swallowed by The Great Lenovo Monster. The lack of critical or consumer hype around the company’s new Moto Z line hasn’t helped matters, and while the refreshed Moto G franchise was generally well-received, it’s the expensive phones that make the money, and I have a hard time believing the Z series is a runaway sales success.

    • Lenovo Courts Devs WIth Moto Z Source Code Release

      Lenovo, which owns Motorola, last week released the kernel source code for the Moto Z Droid smartphone on Github. The move follows the company’s posting of the Moto Z Droid Moto Mods Development Kit and Moto Mods on Github this summer. This is the first kernel source code made available for the Moto Z family of devices. Releasing the kernel source code seems to be another step in Lenovo’s attempt to get devs to build an iPhone-like ecosystem around the Moto Z family. The Z family is modular.

  • Kernel Space

    • The Linux Foundation Partners with Girls in Tech to Increase Diversity in Open Source

      One of the great strengths of open source is that it provides opportunities for everyone. Regardless of background, age, gender, race, ethnicity, nationality, sexual orientation or religion, everyone can benefit from and contribute to some of the most important technologies ever developed.

      Yet we know that many groups remain underrepresented in the open source community, which is why The Linux Foundation engages in efforts such as providing diversity scholarships for our training and events and sponsoring organizations such as Women Who Code, Code.org, Blacks in Technology, All Star Code and more.

    • Linux Foundation Certified System Administrator: Muneeb Kalathil

      I started using Linux when I was in school. But at that point, I was limited to Installation and running a few commands. I really started learning and growing my interest in Linux while I was working on my degree in Computer Applications. My first distribution was Red Hat CentOS. I spent many hours learning Linux and enjoyed it.

    • Reiser4 Implements Mirror & Failover Support

      Edward Shishkin, one of the last remaining Reiser4 developers and the one who has been leading this out-of-tree file-system the past few years, has implemented logical volumes support with support for mirrors (in effect, RAID 0) and failover support at the file-system level.

      Shishkin quietly announced on Sunday, “Reiser4 will support logical (compound) volumes. For now we have implemented the simplest ones – mirrors. As a supplement to existing checksums it will provide a failover – an important feature, which will reduce number of cases when your volume needs to be repaired by fsck.”

    • security things in Linux v4.3

      When I gave my State of the Kernel Self-Protection Project presentation at the 2016 Linux Security Summit, I included some slides covering some quick bullet points on things I found of interest in recent Linux kernel releases. Since there wasn’t a lot of time to talk about them all, I figured I’d make some short blog posts here about the stuff I was paying attention to, along with links to more information. This certainly isn’t everything security-related or generally of interest, but they’re the things I thought needed to be pointed out. If there’s something security-related you think I should cover from v4.3, please mention it in the comments. I’m sure I haven’t caught everything. :)

      A note on timing and context: the momentum for starting the Kernel Self Protection Project got rolling well before it was officially announced on November 5th last year. To that end, I included stuff from v4.3 (which was developed in the months leading up to November) under the umbrella of the project, since the goals of KSPP aren’t unique to the project nor must the goals be met by people that are explicitly participating in it. Additionally, not everything I think worth mentioning here technically falls under the “kernel self-protection” ideal anyway — some things are just really interesting userspace-facing features.

    • Open Source NFV releases third platform, offers additional testing capabilities

      The OPNFV Project, an open source project set on driving the evolution of network functions virtualization (NFV) components, has made its OPNFV Colorado release available.

      As the third platform release, OPNFV Colorado includes feature enhancements across security, IPv6, Service Function Chaining (SFC), testing, VPN capabilities, and support for multiple hardware architectures.

      Specifically, OPNFV Colorado address three main areas: core feature upgrades, enhanced testing capabilities, and infrastructure and testing environment advancements.

    • Serro CEO to Participate on Prominent Keynote Industry Panel at the Linux Foundation’s Upcoming OpenDaylight Summit in Seattle
    • The Linux Foundation and edX Roll Out a Free OpenStack Cours

      The market for OpenStack training continues to surge, and training is now offered by vendors such as Mirantis and independent organizations such as The Linux Foundation. Overall training for OpenStack surged last year. According to the OpenStack Foundation, since the launch of the OpenStack marketplace in September 2013, training offerings grew from 17 unique courses in eight cities to 119 courses in 99 cities.

    • Linux Kernel 4.4.22 LTS Brings ARM and EXT4 Improvements, Updated Drivers

      Immediately after announcing the release of Linux kernel 4.7.5, renowned kernel developer and maintainer Greg Kroah-Hartman informed the community about the availability of Linux kernel 4.4.22 LTS

    • ONOS Hummingbird SDN release touts core control function improvements

      ON.Lab’s ONOS Project noted its eighth SDN platform release expands southbound and northbound protocol, legacy device support

      The telecommunications market’s choice of software-defined networking platforms continues to blossom, with the Open Networking Laboratory’s Open Network Operating System Project releasing its latest SDN platform variant under the “Hummingbird” tag.

    • The Linux State Of AMD’s Zen x86 Memory Encryption

      With AMD’s forthcoming Zen processors is support for some new memory encryption technologies that are of particular benefit for virtualized environments.

      I wrote about Linux patches for AMD memory encryption earlier this year while since then more information has come to light. At last month’s Linux Security Summit, David Kaplan presented on these technologies coming with Zen; only today I had come across the slide deck for this presentation.

      The technologies come down to Secure Memory Encryption (SME) and Secure Encrypted Virtualization (SEV). SME provides memory encryption on a per-page-table basis using AMD’s ARM-based security co-processor. AMD SME + SEV are designed against both user-access attacks and physical access attacks with a particular focus on VM / hypervisor security.

    • Improving Fuzzing Tools for More Efficient Kernel Testing

      Fuzz testing (or fuzzing) is a software testing technique that involves passing invalid or random data to a program and observing the results, such as crashes or other failures. Bamvor Jian Zhang of Huawei, who will be speaking at LinuxCon Europe, realized that existing fuzz testing tools — such as trinity — can generate random or boundary values for syscall parameters and inject them into the kernel, but they don’t validate whether the results of those syscalls are correct.

    • OPNFV Heads Down Colorado Trail

      OPNFV today issued its third software release, ending the agonizing six-month period in which folks had to pronounce and spell Brahmaputra. (See OPNFV Issues Third Software Release.)

      This latest release continues the river theme but is sensibly named Colorado: It has other advantages as well, namely support for key features such as security, IPv6, service function chaining (SFC) testing, virtual private networks and more.

      In addition, Colorado is laying some key groundwork for what lies ahead as the industry comes to terms with the MANO (management and network orchestration) dilemma, says Heather Kirksey, Open Platform for NFV Project Inc. ‘s executive director.

    • OPNFV’s Third Release Includes Security Enhancements
    • ONOS, OPNFV Introduce Latest Open SDN, NFV Releases
    • OPNFV Issues Third Software Release
    • Graphics Stack

      • X.Org’s GLAMOR 2D Performance Continues To Be Tuned

        While GLAMOR has already been around for a number of years as a means of providing generic X11 2D acceleration over OpenGL for the X.Org Server, it’s a seemingly never-ending process to optimize its code-paths for best performance. More improvements are en route for making GLAMOR 2D faster, which should especially be helpful for Raspberry Pi users making use of the VC4 driver stack on this very slow-speed hardware.

        Benefits to the GLAMOR code in the X.Org Server obviously have the potential to benefit all users of this acceleration mechanism for code going into the xorg-server code-base as opposed to an individual GL driver, but for Raspberry Pi users in particular there is some efforts ongoing by Broadcom’s Eric Anholt as well as Keith Packard’s never-ending tinkering with the X Server code. GLAMOR continues to be used by default for all AMD GCN GPUs, Nouveau for the latest generations of GPU too, VC4 2D is only supported with GLAMOR, and optionally by other DDX drivers too.

    • Benchmarks

      • Intel Core i7 6800K Benchmarks On Ubuntu + Linux 4.8

        While the Core i7 6800K has been available for a few months now, there hadn’t been any review on it since Intel hadn’t sent out any Broadwell-E samples for Linux testing this time around. However, I did end up finally buying a Core i7 6800K now that the Turbo Boost Max 3.0 support is finally coming together (at first, Intel PR said it wouldn’t even be supported on Linux) so that I can run some benchmarks there plus some other interesting items on the horizon for benchmarking. Here are some benchmarks of the i7-6800K from Ubuntu 16.04 LTS with the Linux 4.8 kernel.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • Announcing the KDE Advisory Board

        With KDE having grown from a hobby project by a few volunteers 20 years ago to the large and central Free Software community it is now, our interactions with other organizations have become increasingly important for us. KDE software is available on several platforms, is shipped by numerous distributions large and small, and KDE has become the go-to Free Software community when it comes to Qt. In addition to those who cooperate with KDE on a technical level, organizations which fight for the same vision as ours are our natural allies as well.

        To put these alliances on a more formal level, the KDE e.V. hereby introduces the KDE e.V. Advisory Board as a means to offer a space for communication between organizations which are allied with KDE, from both the corporate and the non-profit worlds.

        One of the core goals of the Advisory Board is to provide KDE with insights into the needs of the various organizations that surround us. We are very aware that we need the ability to combine our efforts for greater impact and the only way we can do that is by adopting a more diverse view from outside of our organization on topics that are relevant to us. This will allow all of us to benefit from one another’s experience.

      • KDE Introduces An Advisory Board
    • GNOME Desktop/GTK

      • Behind the GNOME 3.22 Release Video

        This is less than usual. The time saving mostly stems from spending less time recording for the release video. At first thought you might think recording would be a breeze but it can be one of the most frustrating aspects of making the videos. Each cycle the GNOME community lands improvement a wide set of GNOME’s applications. So before each release I have to find some way to run a dozen of applications from master.

      • ContractPatch, Step 2: Understanding the power balance

        At the point you are presented with a job offer, your prospective employer really wants to hire you. Chances are, they’ve screened and interviewed a number of candidates and put a lot of work into the process. Your manager has thought deeply about who they want in the position and has probably imagined how it will all work out with you in the role. Both you and the hiring decision-maker(s) are probably very optimistic about what you’ll accomplish in the role and how well you’ll get along working together. At this point, no one wants to go back to the drawing board and start the process over again. You will be excited to start the new job but it’s worth taking a step back to appreciate the unusual position you are in with your new employer.

      • Epiphany Icon Refresh
  • Distributions

    • Reviews

      • Uruk GNU/Linux 1.0

        Uruk GNU/Linux appears to be a fairly young project with some lofty goals, but some rough edges and unusual characteristics. I applaud the developers’ attempts to provide a pure free software distribution, particularly their use of Gnash to provide a pretty good stand-in for Adobe’s Flash player. Gnash is not perfect, but it should work well enough for most people.

        On the other hand, Uruk does not appear to offer much above and beyond what Trisquel provides. Uruk uses Trisquel’s repositories and maintains the same free software only stance, but does not appear to provide a lot that Trisquel on its own does not already offer. Uruk does feature some add-ons from Linux Mint, like the update manager. However, this tends to work against the distribution as the update manager hides most security updates by default while Mint usually shows all updates, minus just the ones known to cause problems with stability.

        As I mentioned above, the package compatibility tools talked about on the Uruk website do not really deliver and are hampered by the missing alien package in the default installation. The build-from-source u-src tool may be handy in some limited cases, but it only works in very simple scenarios with specific archive types and build processes. Hopefully these package compatibility tools will be expanded for future releases.

        Right now I’m not sure Uruk provides much above what Trisquel 7.0 provided two years ago. The project is still young and may grow in time. This is a 1.0 release and I would hold off trying the distribution until it has time to build toward its goals.

    • New Releases

      • Black Lab Linux 8 Beta 3 Released

        The development team is pleased to announce the new Beta release of Black Lab Linux 8 – our latest OS offering to bring the best Linux desktop distribution currently on the market. This release moves the kernel and application set away from the prior LTS 14.04 base to the new 16.04 LTS base. Black Lab Linux 8 will showcase 3 desktop environments : MATE, LXDE and GNOME 3. Other improvements include:

        Full EFI support
        Kernel 4.4.0-38
        LibreOffice 5.2
        GNOME Video
        Rhythmbox
        Firefox 49
        Thunderbird
        GIMP
        Full multimedia codec support

      • Black Lab Linux 8 Beta 3 Is Out with Full EFI Support, Based on Ubuntu 16.04 LTS

        Softpedia was informed today, September 26, 2016, by Black Lab Software’s CEO Robert J. Dohnert about the availability of the third Beta development snapshot of the upcoming Black Lab Linux 8 GNU/Linux operating system.

        Black Lab Linux 8 “Onyx” Beta 3 is here approximately three weeks after the second Beta pre-release and it comes with a major change. It is no longer based on Ubuntu 14.04 LTS (Trusty Tahr), as the development team decided to switch base and move to the next Ubuntu LTS version, namely Ubuntu 16.04 LTS (Xenial Xerus).

    • OpenSUSE/SUSE

      • OpenSUSE Leap 42.2 Beta2

        Leap 42.2 Beta2 is looking pretty good, except for the problems with Plasma 5 and the nouveau driver. That’s really an upstream issue (a “kde.org” issue). I hope that is fixed in time for the final release. Otherwise, I may have to give up on KDE for that box.

    • Red Hat Family

      • Exactly What Is OpenStack? Red Hat’s Rich Bowen Explains

        You’ve probably heard of OpenStack. It’s in the tech news a lot, and it’s an important open source project. But what exactly is it, and what is it for? Rich Bowen of Red Hat provided a high-level view of OpenStack as a software project, an open source foundation, and a community of organizations in his talk at LinuxCon North America.

        OpenStack is a software stack that went from small to industry darling at warp speed. It has three major components: The compute service runs the virtual machines (VMs), and it has a networking service and a storage service, plus a dashboard to run everything. OpenStack is only six years old, and was born as a solution devised by Rackspace and NASA to solve a specific problem.

      • Red Hat’s Results Underscore its Growing Focus on OpenStack

        Late last week, Red Hat reported earnings per share of 55 cents on revenue of $600 million, beating estimates of 54 cents and $590 million, respectively. One thing that went unsaid across much of the coverage is that the company is in the midst of a major shift in its strategy toward OpenStack-based cloud computing, and it looks like service revenues and positive momentum from that effort are starting to arrive.

        “Our growth was driven in part by expanding our footprint with customers as we closed a record number of deals over $1 million, up approximately 60 percent year-over-year,” Red Hat CEO Jim Whitehurst said during his company’s earnings call. Seven of the top 30 deals had OpenStack in there, nine had RHEV,” Whitehurst said. “We had three OpenStack deals alone that were over $1 million. So I think we’re seeing really, really, really good traction there.”

      • Red Hat targets $5-b revenue in five years

        Open-source technology firm Red Hat Inc, which hit the $2-billion revenue milestone two quarters ago, is looking to achieve $2.4 billion in FY 2017 and $5 billion in the next five years.

        The company is betting on India, its second largest operation outside the US, as one of the key growth engines to help achieve its aspirational revenue goal of $5 billion by 2021.

        “India is a bright spot for Red Hat for three reasons,” Rajesh Rege, Managing Director, Red Hat India, told BusinessLine.

      • Red Hat Announces Ansible Tower App for Splunk, Enabling Intelligence and Automation Enhancements
      • Finance

      • Fedora

        • Fedora 26 Linux OS to Ship with OpenSSL 1.1.0 by Default for Better Security

          Fedora Program Manager Jan Kurik informs the Fedora Linux community about a new system-wide change for the upcoming Fedora 26 operating system, namely the addition of the OpenSSL 1.1.0 libraries by default.

          It appears that current Fedora Linux releases ship with OpenSSL 1.0.2h, which has been patched with the latest security fixes, but the team decided it was time to upgrade the OpenSSL libraries (libssl and libcrypto) to a newer, more advanced branch. Therefore, Fedora 26 Linux will ship with OpenSSL 1.1.0 by default, which will have a massive impact on the overall stability and security of the OS.

          “Update the OpenSSL library to the 1.1.0 branch in Fedora to bring multiple big improvements, new cryptographic algorithms, and new API that allows for keeping ABI stability in future upgrades. We will also add compat openssl102 package so the applications and other dependencies which are not ported yet to the new API continue to work,” reads the proposal.

        • GLPI version 9.1

          GLPI (Free IT and asset management software) version 9.1 is available. RPM are available in remi repository for Fedora ≥ 22 and Enterprise Linux ≥ 5

    • Debian Family

      • Derivatives

        • Parsix GNU/Linux 8.15 “Nev” Is in the Works, to Ship with the GNOME 3.22 Desktop

          We told you the other day that the Parsix GNU/Linux development team informed the community that new security updates are available for the current stable Parsix GNU/Linux 8.10 “Erik” and Parsix GNU/Linux 8.5 “Atticus” releases.

        • Canonical/Ubuntu

          • Unimpressed with Ubuntu 16.10? Yakkety Yak… don’t talk back

            Before I dive into what’s new in Ubuntu 16.10, called Yakkety Yak, let’s just get this sentence out of the way: Ubuntu 16.10 will not feature Unity 8 or the new Mir display server.

            I believe that’s the seventh time I’ve written that since Unity 8 was announced and here we are on the second beta for 16.10.

            Maybe that’s why they named it Unity 8. Whatever the case, Unity 8 is available for testing if you’d like to try it. So far I haven’t managed to get it working on any of the hardware I use, which goes a long way to explaining why it’s not part of Ubuntu proper yet.

          • Unimpressive Yakkety Yak, Plasma 5 Issues in Leap

            Today was a rough day in Linux distro news, Scott Gilbertson reviewed the Beta of upcoming Ubuntu 16.10 saying there’s not a whole lot to recommend in this update. Neil Rickert test drove openSUSE’s latest beta and had issues with his NVIDIA. Jesse Smith couldn’t tell what was added to Uruk over base Trisquel and Gary Newell didn’t see much point to portable Porteus since most stuff didn’t work.

          • Indicator Sound Switcher Makes Switching Audio Devices on Ubuntu a Snap
  • Devices/Embedded

    • SODIMM-style i.MX7 COM features dual GbE, WiFi/BT, eMMC

      Variscite’s Linux-driven “VAR-SOM-MX7” COM is shipping with an i.MX7 Dual SoC, WiFi and BLE, dual GbE, and optional eMMC and extended temp. support.

      Variscite’s VAR-SOM-MX7 follows many other Linux-ready computer-on-modules based on NXP’s i.MX7 SoC, which combines one or two power-stingy, 1GHz Cortex-A7 cores with a 200MHz Cortex-M4 MCU for real-time processing. While most of these offer a choice of a Solo or Dual model, and the NXP/Element14 WaRP7 offers only the Solo, the SODIMM-style VAR-SOM-MX7 taps the dual-core Dual. Unlike most of these modules, but like the WaRP7 and the CompuLab CL-SOM-iMX7, Variscite’s entry offers onboard WiFi and Bluetooth, in this case Bluetooth 4.1 with BLE.

    • BeagleBone Black Wireless SBC taps Octavo SiP, has open design

      BeagleBoard.org’s “BeagleBone Black Wireless” SBC uses Octavo’s OSD335x SiP module and replaces the standard BeagleBone Black’s Ethernet with 2.4GHz WiFi and BT 4.1 BLE.

      BeagleBone Black Wireless is the first SBC to incorporate the Octavo Systems OSD335x SiP (system-in-package) module, “which integrates BeagleBone functionality into one easy-to-use BGA package,” according to BeagleBoard.org. Announced on Sep. 26, the OSD3358 SiP integrates a TI Sitara AM3358 SoC along with a TI TPS65217C PMIC, TI TL5209 LDO (low-drop-out) regulator, up to 1GB of DDR3 RAM, and over 140 passives devices including resistors, capacitors, and inductors, within a single BGA package. The Linux-driven hacker SBC also adds TI WiLink 8 WL1835MOD wireless module with 2.2 MIMO.

    • NAS-targeted Skylake Mini-ITX loads up on SATA, GbE, PCIe
    • Epiq Solutions’ Sidekiq M.2

      Following on its resounding success with its Sidekiq MiniPCIe card, wireless communications systems specialist Epiq Solutions recently added the Sidekiq M.2 state-of-the-art, small form-factor, software-defined radio (SDR) card. Epiq Solutions explains that the Sidekiq product line provides a breakthrough small form-factor SDR transceiver solution ready for integration into systems that support either MiniPCIe or now the M.2 card form factors.

    • Phones

      • Tizen

        • Samsung in talks with Russian government to distribute the Z3 to students

          Samsung had recently made another announcement in Russia by partnering with Gazprom to distribute its Tizen handsets to the company’s employees. The South korean technology giant are now looking at a new way to increase the Tizen adoption rate in Russia. The target market for the new plan is school students. Samsung are in talks with multiple government agencies to supply the Tizen Z3 smartphone to school students and this was hinted during the Internet of Things forum hosted by Moscow Tizen Association in Russia on the 22nd of September.

        • My Money Transfer App Enters BETA for Z1 and Z3
      • Android

        • 6 open source fitness apps for Android

          A key part of developing a good fitness routine is creating a solid workout plan and tracking your progress. Mobile apps can help by providing readily accessible programs specifically designed to support the user’s fitness goals. In a world of fitness wearable devices like FitBit, there are plenty of proprietary apps designed to work with those specific devices. These apps certainly provide a lot of detailed tracking information, but they are not open source, and as such, do not necessarily respect the user’s privacy and freedom to use their own data as they wish. The alternative is to use open source fitness apps.

          Below, I take a look at six open source fitness apps for Android. Most of them do not provide super detailed collection of health data, but they do provide a focused user experience, giving the user the tools to support their workouts or develop a plan and track their progress. All these apps are available from the F-Droid repository and are all licensed under the GPLv3, providing an experience that respects the user’s freedom.

        • Roku Express, Roku Premiere, and Roku Ultra announced, starting at $29.99

          Roku Inc, maker of the popular Roku line of home media players, has just refreshed their entire product lineup at once. The existing lineup of flagship Roku boxes (but not the Roku Streaming Stick) has been replaced by three new products (with upgraded models for each); the Roku Express, the Roku Premiere, and the Roku Ultra.

        • This is what the Chromecast Ultra will look like

          Google is ramping up for their major October 4th event. In addition to seeing the Pixel and the Pixel XL formally unveiled, we’re also expecting a new Chromebook and the Chromecast Ultra. Until today, we had no idea what to really expect from the new Chromecast device in terms of design, but now we’re finally getting a sneak peek.

        • Android + Chrome = Andromeda; merged OS reportedly coming to the Pixel 3

          It has been almost a year since The Wall Street Journal dropped a bomb of a scoop on the Android community, saying Chrome OS would be “folded into” Android. The resulting product would reportedly bring Android to laptops and desktops. According to the paper, the internal effort to merge these two OSes had been underway for “roughly two years” (now three years) with a release planned for 2017 and an “early version” to show things off in 2016. It seems like we’re still on that schedule, and now Android Police claims to have details on the new operating system—and its first launch device—coming Q3 2017.

        • 8 great Android features that iOS needs to steal

          Not that long ago, I used to feel sorry for Android users and their clunky, sluggish devices—the thought of giving up my iPhone never crossed my mind. Recently, though, I’ve been the one green-eyed with envy, as snazzy new Android features make my once-precious iOS handset feel old and tired by comparison.

          Below I’ve highlighted eight of the most notable Android features that iOS needs to steal (there are plenty more, mind you), from automatic power-saving mode and installing apps from the web to smarter keypad shortcuts and the ability to clear storage-hogging app caches with a single tap.

        • Google said to debut Android/Chrome OS hybrid on tablet, convertible notebook

          Google is planning hybrid devices that run both Android and Chrome OS, including one convertible laptop, and one Huawei Nexus-branded tablet, according to a new report from 9to5Google. The report backs up another from Android Police today that says a convertible notebook is on the way.

          The Andromeda project bakes Chrome OS features into Android, giving you the best of both worlds in one place, according to early reports. This would make a lot of sense for a thin, convertible laptop device like the so-called “Pixel 3” that Android Police reported this morning, which is set to be launched in Q3 2017, and which will potentially boast a 12.3-inch touchscreen display.

        • Google Andromeda hybrid Android/Chrome OS tested on Nexus 9
        • Google reportedly working on a laptop and tablet running an Android-Chrome OS hybrid

          Google is reportedly working on a new Pixel laptop that will run on the long-gestating new operating system that merges Android and Chrome OS. According to Android Police and 9to5Google, the device is known internally by the codename “Bison” or Pixel 3, and will run on what’s currently being called “Andromeda” when it sees release in Q3 2017. In addition, 9to5Google also reports that Huawei is working on a new Nexus tablet that will also run the new OS.

        • Xiaomi Mi Box Android TV appears in the wild with a $69 price tag

          A savvy buyer spotted the forthcoming Xiaomi Mi Android TV box for sale at a Wal-Mart recently, even though the company still lists the set-top box as “coming soon” on the promo page.

          Not only did this quick-thinking individual grab some pictures of the merchandise, he also uploaded an unboxing video to YouTube. Nicely done.

        • Sony Xperia Devices To Get Android 7.0 Nougat In October
        • Sony’s leaked Android Nougat update plans reveal no love for Xperia Z3
        • ColorTV launches its content recommendations on Apple TV, Android TV and more
        • Best Android Phones 5.7 inches And Over
        • Xiny Android trojan evolves to root phones and infect system processes
        • Declutter your phone for a cleaner, faster Android experience
        • Android Nougat Update Coming Soon To Motorola, Samsung & Sony: List Of Devices Include Galaxy S7, Moto Z , Xperia XZ

Free Software/Open Source

  • Adopt a pump.io server

    As most of you know, E14N is no longer my main job, and I’ve been putting my personal time, energy, and money into keeping the pump network up and running. I haven’t always done a good job, and some of the nodes have just fallen off the network. I’d like to ask people in the community to start taking over the maintenance and upkeep of these servers.

  • Prodromou: Adopt a pump.io server

    There are currently around 25 servers in the federated network initially started by Prodromou, which does not count other pump.io instances. He notes that one important exception is the identi.ca site, which is significantly larger than the rest, and which he would like to find a trusted non-profit organization to maintain.

  • What does it mean to change company culture?

    Tools are specific concrete things that a culture has decided is a way to improve a process. Buckminster Fuller has a great quote about tools and thinking: “If you want to teach people a new way of thinking, don’t bother trying to teach them. Instead, give them a tool, the use of which will lead to new ways of thinking.” In particular, DevOps tools can provide folks new ways to look at things—like delivering code into a production environment, for example. But there’s lots of examples where a new tool doesn’t influence the thinking of the people who use it, so things don’t change.

  • Why Open Beats Closed
  • Google Improves Image Recognition; Releases Project as Open Source Software

    Google says its algorithm can correctly caption a photograph with nearly 94 percent accuracy.

    The company says the improvements come in the third version of its system named Inception, with the score coming from a standardized auto-caption test named ImageNet. It reports the first version scored 89.6 percent, the second 91.8 percent and the new one 93.9 percent.

  • Contributing to Open Source Projects Not Just For the Experts

    XDA has long been a proponent of open source development, and we’ve seen it flourish over the years. In fact, it’s one of the main reasons our community has grown as fast as it has over these past 13 years, with Android’s core being the driving force. Many people desire to be part of open source and contribute but often don’t know how they can, whether because they think they lack the skills or they just don’t have the time.

  • Web Browsers

    • Mozilla

      • Firefox Reader Mode is Finally Getting a Keyboard Shortcut

        Among the changes which arrived in the September release of Firefox 49 were an enhanced set of Reader Mode features, including spoken narration and line-width spacing options. All very welcome. But the improvements aren’t stopping there. Firefox 50, which is due next month, will add another sorely needed feature: a keyboard shortcut for Reader Mode. Y

  • SaaS/Back End

    • Introduction to OpenStack by Rich Bowen

      In this talk, Rich, the OpenStack Community Liaison at Red Hat, will walk you through what OpenStack is, as a project, as a Foundation, and as a community of organizations.

  • Pseudo-Open Source (Openwashing)

  • Licensing/Legal

    • Public licenses and data: So what to do instead?

      Why you still need a (permissive) license

      Norms aren’t enough if the underlying legal system might allow an early contributor to later wield the law as a threat. That’s why the best practice in the data space is to use something like the Creative Commons public domain grant (CC-Zero) to set a clear, reliable, permissive baseline, and then use norms to add flexible requirements on top of that. This uses law to provide reliability and predictability, and then uses norms to address concerns about fairness, free-riding, and effectiveness. CC-Zero still isn’t perfect; most notably it has to try to be both a grant and a license to deal with different international rules around grants.

  • Programming/Development

    • Pairing LLVM JIT With PostgreSQL Can Speed Up Database Performance

      Using the LLVM JIT with PostgreSQL can vastly speed up the query execution performance and shows off much potential but it hasn’t been mainlined yet.

      Dmitry Melnik presented at this month’s LLVM Cauldron over speeding up the query execution performance of PostgreSQL by using LLVM. Particularly with complex queries, the CPU becomes the bottleneck for PostgreSQL rather than the disk. LLVM JIT is used for just-in-time compilation of queries.

    • LLVM Cauldron 2016 Videos, Slides Published

      The inaugural LLVM Cauldron conference happened earlier this month ahead of the GNU Tools Cauldron in Hebden Bridge, UK. All of the slides and videos from this latest LLVM conference are now available.

  • Standards/Consortia

Leftovers

  • iPhone 7 Owners Destroy Phones After DRILLING Their Own Headphone Jack

    Just one problem. It is a joke. Yet iPhone 7 owners, or those desperate for their beloved headphone jack, have been attempting to drill their own. And it isn’t ending well for any of them.

  • Traffic Is Fake, Audience Numbers Are Garbage, And Nobody Knows How Many People See Anything

    How many living, breathing human beings really read Techdirt? The truth — the most basic, rarely-spoken truth — is that we have no earthly idea. With very few exceptions, no media property big or small, new or old, online or off, can truly tell you how big its audience is. They may have never thought about it that way — after all, we all get as close as we can to what we think is a reasonably accurate estimation, though we have no way of confirming that — but all these numbers are actually good for (maybe) is relative comparisons. What does it really mean when someone says “a million people” saw something? Or ten or a hundred million? I don’t know, and neither do you. (Netflix might, but we’ll get to that later.)

    Where should we start? How about this: internet traffic is half-fake and everyone’s known it for years, but there’s no incentive to actually acknowledge it. The situation is technically improving: 2015 was hailed (quietly, among people who aren’t in charge of selling advertising) as a banner year because humans took back the majority with a stunning 51.5% share of online traffic, so hurray for that I guess. All the analytics suites, the ad networks and the tracking pixels can try as they might to filter the rest out, and there’s plenty of advice on the endless Sisyphean task of helping them do so, but considering at least half of all that bot traffic comes from bots that fall into the “malicious” or at least “unauthorized” category, and thus have every incentive to subvert the mostly-voluntary systems that are our first line of defence against bots… Well, good luck. We already know that Alexa rankings are garbage, but what does this say about even the internal numbers that sites use to sell ad space? Could they even be off by a factor of 10? I don’t know, and neither do you. Hell, we don’t even know how accurate the 51.5% figure is — it could be way off… in either direction.

  • Alton Towers fined £5 MILLION for Smiler crash which left 16 maimed and injured

    The accident on the £18million white-knuckle ride in June last year at Alton Towers, the UK’s biggest theme park, left 16 people injured.

    At Stafford Crown Court, Judge Michael Chambers QC said thousands of young people were exposed to harm on the ride.

    He said: “Many thousands of people who went on the ride since it opened in May 2013 have been exposed to harm.”

  • Alton Towers operator Merlin fined £5m over Smiler crash

    Alton Towers operator Merlin has been fined £5m for the crash on the Smiler rollercoaster.

    Sixteen people were injured in the June 2015 crash, including two teenage girls who needed leg amputations.

    In April, Merlin Attractions Operations Ltd admitted breaching the Health and Safety Act.

  • Science

    • Why data is the new coal

      Deep learning needs to become more efficient if it is going to move from using data to categorise images of cats to diagnosing rare illnesses

  • Health/Nutrition

    • VCAT rejects tobacco giant’s push to access schoolchildren smoking data

      A judge has crushed moves by a tobacco giant to access the confidential survey results of Australian schoolchildren, including information revealing their attitudes to cigarettes and alcohol.

      British American Tobacco used freedom-of-information laws to seek access to six Cancer Council Victoria files, arguing it was in the public interest to expose to scrutiny the raw material used to underpin its plain packaging position.

  • Security

    • Security advisories for Monday
    • Who left all this fire everywhere?

      If you’re paying attention, you saw the news about Yahoo’s breach. Five hundred million accounts. That’s a whole lot of data if you think about it. But here’s the thing. If you’re a security person, are you surprised by this? If you are, you’ve not been paying attention.

    • IPFire 2.19 Linux Firewall OS Patched Against the Latest OpenSSL Vulnerabilities

      Only three days after announcing the release of IPFire 2.19 Core Update 104, Michael Tremer informs the community about the availability of a new update, Core Update 105, which brings important OpenSSL patches.

    • OpenSSL security advisory for September 26

      This OpenSSL security advisory is notable in that it’s the second one in four days; sites that updated after the first one may need to do so again.

    • Canonical Patches OpenSSL Regression in Ubuntu 16.04 LTS, 14.04 LTS & 12.04 LTS

      After announcing a few days ago that a new, important OpenSSL update is available for all supported Ubuntu Linux operating systems, Canonical’s Marc Deslauriers now informs the community about another patch to address a regression.

      The new security advisory (USN-3087-2) talks about a regression that was accidentally introduced along with the previous OpenSSL update (as detailed on USN-3087-1), which addressed no less than eleven (11) security vulnerabilities discovered upstream by the OpenSSL team.

    • Patch AGAIN: OpenSSL security fixes now need their own security fixes
    • Bangladesh Bank exposed to hackers by cheap switches, no firewall: Police
    • This is the Israeli company that can hack any iPhone and Android smartphone

      If Cellebrite sounds familiar, that’s because the name of this Israeli company came up during Apple’s standoff with the FBI over breaking iPhone encryption. The agency managed to crack the San Bernardino iPhone with the help of an undisclosed company. Many people believe it was Cellebrite that came to the rescue. Meanwhile, the company revealed that it could hack just about any modern smartphone, but refused to say whether its expertise is used by the police forces of repressive regimes.

    • Reproducible Builds: week 74 in Stretch cycle
    • East-West Encryption: The Next Security Frontier?

      Microsegmentation, a method to create secure, virtual connections in software-defined data centers (SDDCs), has already emerged as one of the primary reasons to embrace network virtualization (NV). But some vendors believe that East-West encryption of traffic inside the data center could be the next stop in data-center security.

      For example, VMware says it is looking at encrypting East-West traffic inside the data center, adding another layer of security to the SDDC. Why is that important? Today, most firewalls operate on the perimeter of the data center – either guarding or encrypting data leaving the data center for the WAN. And some security products may encrypt data at rest inside the data center. But encrypting the traffic in motion between servers inside the data center – known in the business as the East-West traffic – is not something that’s typically done.

    • DHS Offers Its Unsolicited ‘Help’ In Securing The Internet Of Things [Ed: In the UK, GCHQ meddles in the Surveillance of Things in the name of 'security' while at the same time, with Tories' consent, cracking PCs]

      It’s generally agreed that the state of security for the Internet of Things runs from “abysmal” to “compromised during unboxing.” The government — despite no one asking it to — is offering to help out… somehow. DHS Assistant Secretary for Cyber Policy Robert Silvers spoke at the Internet of Things forum, offering up a pile of words that indicates Silvers is pretty cool with the “cyber” part of his title… but not all that strong on the “policy” part.

  • Defence/Aggression

    • Duterte ‘admitted complicity’ in Davao killings – WikiLeaks

      President Rodrigo Duterte dared Senator Leila de Lima on Tuesday, September 20, to prove that he was behind extrajudicial killings in Davao City when he was the mayor there.

      A confidential cable dated May 8, 2009, which was published by WikiLeaks, said that Duterte once “admitted complicity” in vigilante killings in Davao City.

      The cable, written by then-US ambassador to the Philippines Kristie Kenney, quoted statements from then Commission on Human Rights (CHR) regional director Alberto Sipaco Jr.

      Kenney wrote: “Commission on Human Rights regional director Alberto Sipaco (strictly protect) at a private meeting affirmed that Mayor Duterte knows about the killings and permits them. Recounting a conversation he once had with Duterte, who is his close friend and former fraternity brother, Sipaco said he pleaded with the Mayor to stop vigilante killings and support other methods to reduce crime, like rehabilitation programs for offenders.”

      “According to Sipaco, the Mayor responded, ‘I’m not done yet,’” Kenney said.

  • Finance

    • IBM, China UnionPay complete block chain pilot project on bank loyalty points

      IBM completed a pilot project with Chinese credit card company China UnionPay that will facilitate the sharing of loyalty bonus points among banks using block chain technology.

      Bonus points earned through purchases on bank cards have long been an effective tool to attract and encourage customers to use specific cards. But since bonus points cannot be freely exchanged among different banks, offering various rewards, many go unused.

      IBM’s collaboration with China UnionPay will enable consumers worldwide to exchange bonus points from their various banks in less than a minute to select rewards they want.

      Block chain, the underlying technology in digital currencies such as bitcoin, has become one of the hottest innovations in the financial services world. Technology companies and banks have been exploring the use of block chain in all facets of both the financial and non-financial industries.

  • AstroTurf/Lobbying/Politics

    • Why no third parties tonight? Because two parties control the process

      Tonight’s debates will take place without Green Party candidate Jill Stein and Libertarian candidate Gary Johnson. Neither met a threshold of hitting 15 percent in national polls and thus were not invited to participate.

      That threshold was set by the group that puts on the debates, the Commission on Presidential Debates (CPD). Since its inception, the CPD has been staffed by elites from the two major parties. They pick the moderators, choose the format, and set the terms for participation.

    • Vote Now: Who Won the First Clinton-Trump Debate?

      Donald Trump and Hillary Clinton met for their first presidential debate Monday, and we want to know who you think won.

      Take a moment to click the link below next to the candidate who you thought did the best at the debate at Hofstra University in New York.

    • Barroso had deeper ties to Goldman Sachs

      Jose Manuel Barroso had closer contact with Goldman Sachs during his tenure as European Commission chief than he has previously admitted, according to Portuguese media.

      Correspondence obtained by Portuguese daily Publico under a freedom of information request suggests that Barroso, who took a job with the US bank earlier this year, held unregistered meetings with Goldman’s top people.

      In one email dated 30 September 2013, Goldman boss Lloyd Blankfein thanked Barroso for their “productive discussions” and said the bank’s senior partners were delighted about their “extremely fruitful meetings”.

      Publico reported that Goldman executives were happy to suggest “on a confidential basis” changes to EU policies, which Barroso’s cabinet read “with great interest”.

    • Fear, Anxiety, and Depression in the Age of Trump

      Carol Wachs, a psychologist in private practice in Manhattan, recently started seeing an old patient again. The client had first sought treatment for anxiety following the terrorist attacks on Sept. 11. Now she was worried about a new menace: Donald Trump and his zealous supporters. The patient, Wachs says, comes from a family of Holocaust survivors, and “it feels to her like all the stories she heard from her grandparents about how things feel normal and then all of the sudden, oh my God, here we are.”

    • No Trident, no private energy companies, and a universal basic income: Momentum activists mock up manifesto for Labour

      Momentum activists have created a mock general election manifesto with suggestions that all energy companies should be nationalised, the Trident nuclear deterrent be scrapped and a universal basic income to become policy.

      The grassroots organisation established shortly after Jeremy Corbyn’s election as leader in 2015, held the session at its World Transformed festival – an event running alongside Labour’s annual conference in Liverpool.

    • What Is Jill Stein Doing During the Presidential Debate?

      Jill Stein may not be in the first presidential debate, but she’s not going to be quiet during the debates either — and neither are her supporters. They’re planning a civil disobedience rally at the debates, which they’ve warned may result in some arrests. They are also planning a live stream of their protests, along with a live stream of Jill Stein’s answering all the debate questions as they are asked, in real time.

      Here’s what you need to know.

      Stein and Ajamu Baraka are hosting a Hofstra Debate Protest and Civil Disobedience event today, starting at 2:30 p.m. and lasting through the presidential debate. You can learn more about it on the Facebook page here. Buses will leave New York City at 2:30 p.m. Eastern, one from Bryant Park in Manhattan and two from Brooklyn near Barclay’s Center. You should RSVP to make sure there’s a seat for you on the bus.

    • Jill Stein pushes to be included in debate
    • At the last presidential debate at Hofstra University, Jill Stein got handcuffed to a chair for 8 hours

      On Monday evening, former Secretary of State Hillary Clinton and real estate mogul Donald Trump will gather onstage at Hofstra University in Hempstead, New York, for the first presidential debate of the 2016 election.

      Notably absent from the debate stage will be Green Party candidate Dr. Jill Stein and Libertarian candidate former Gov. Gary Johnson—neither of whom were able to meet the 15 percent polling threshold set by Commission on Presidential Debates (CPD). Johnson will be spending the debate tweeting from Twitter’s corporate office in Manhattan. Stein will be livestreaming from a protest outside the debate venue.

      Both Stein and Johnson have lobbied hard to be included in the debates. However, the commission, which is a nonprofit organization created and controlled by the Democratic and Republican parties, have consistently rebuffed their efforts.

      For Stein, at least, this lobbying is nothing new. When she ran as the Green Party nominee four years ago, Stein staged a similar protest when President Barack Obama squared off against former Massachusetts Gov. Mitt Romney on the very same stage at Hofstra University. Stein’s goal was to make a point about how the two major parties use their institutional advantages to shut out other voices.

    • 3rd-Party Candidate Jill Stein Escorted From Hofstra by Police Before Presidential Debate

      Stein’s campaign said she will not “risk arrest” this time, because there is an outstanding warrant for her arrest over her involvement in a recent protest against a controversial pipeline project in North Dakota. Still, her campaign spokeswoman Meleiza Figueroa said they will attempt to get the “spirited demonstration … as close to the gates as possible.”

      In 2012, Stein and her running mate were arrested outside Hofstra University when they tried entering the premises during a presidential debate between President Obama and then-Republican nominee Mitt Romney.

    • Debate Commission Enforces Exclusion By Having Jill Stein Escorted Off Hofstra

      Green Party presidential candidate Jill Stein was escorted off Hofstra University’s campus just hours before the first presidential debate of the general election. The escort was part of the Commission on Presidential Debates’ exclusion of her campaign from the debate.

      At a demonstration and press conference outside the university after she was removed, Stein returned and declared, “We have a right to know who we can vote for,” and condemned the debate that will air as a “spectacle” and a “disgrace.” She claimed it would “increase the appetite for the American voter for a true politics of integrity.”

      An “Occupy The Debates” march and action including supporters took off shortly after.

      Earlier in the afternoon, according to the Stein campaign, the presidential candidate was on her way to do an interview for MSNBC. Hofstra security and Nassau County police stopped her. Two police SUVs arrived. Officers asked MSNBC for their credentials, and in fact, the campaign said the network had credentials for Stein.

      Stein did an impromptu press conference as the situation unfolded. The police then escorted her off campus, and she was instructed “not to do any more press.”

      The presidential candidate was loaded into a van. It was stopped twice before the van made it off the university campus. At one point, the Nassau deputy police chief suggested Stein was “not public enemy number one.”

    • Clinton vs. Trump: Thousands of Police, Protesters Descend on Hofstra for Highly Anticipated Presidential Debate

      Thousands of police and protesters are descending on a Long Island college Monday for the first debate in what has been a raucous presidential race. A Super Bowl-sized audience will be watching at home.

      More than 100 million people may watch the 9 p.m. debate at Hofstra University, organizers say. If so, it’d be the largest debate viewership since the Ronald Reagan and Jimmy Carter debate drew 80 million viewers back in 1980.

    • Walt Whitman on Donald Trump, How Literature Bolsters Democracy, and Why a Robust Society Is a Feminist Society

      In 1855, Walt Whitman (May 31, 1819–March 26, 1892) made his debut as a poet and self-published Leaves of Grass. Amid the disheartening initial reception of pervasive indifference pierced by a few shrieks of criticism, the young poet received an extraordinary letter of praise and encouragement from his idol — Ralph Waldo Emerson, the era’s most powerful literary tastemaker. This gesture of tremendous generosity was a creative life-straw for the dispirited artist, who soon became one of the nation’s most celebrated writers and went on to be remembered as America’s greatest poet.

      [...]

      The role of government and those in power, he argues, is not to rule by authority alone — the mark of dictatorship rather than democracy — but “to train communities … beginning with individuals and ending there again, to rule themselves.” Above all, the task of democratic leadership is to bind “all nations, all men, of however various and distant lands, into a brotherhood, a family.” Many decades before women won the right to vote and long before Nikola Tesla’s feminist vision for humanity, Whitman argues that a robust democracy is one in which women are fully empowered and included in that “brotherhood” on equal terms…

  • Censorship/Free Speech

  • Privacy/Surveillance

    • Snowden shows the human side of Edward Snowden

      The film also explores how Snowden’s personal life is affected by the secrecy of his job, which strained the relationship with his girlfriend Lindsay. He is portrayed as torn between his personal life and the passion he has for his work. Like everyone else, Snowden had his own life outside of his work — a fact that tends to be overlooked.

    • Former NSA Deputy Director pans Snowden film

      Former NSA Deputy Director Chris Inglis called Oliver Stone’s film Snowden “a hard thing to watch.”

    • Reevaluate strategies of digital surveillance

      Mass surveillance programs collecting the metadata of millions of Americans are ineffective counterterrorism measures. They are ineffective not only because of their inability to prevent the atrocities we have seen in the last three years; but also because of their exorbitant cost. The cost of these programs is not purely calculated in dollar signs. There are the diplomatic costs, as countries learn more about U.S. surveillance of their citizens. There are the social costs, as American citizens remain largely in the dark about what the government does with their personal information, without sufficient oversight from Congress or an accessible forum to challenge this intrusion. And, finally, there are the costs to our technical systems, which have become increasingly vulnerable to abuse from other states.

    • Whistleblower story a winner

      Former National Security Agency contractor Edward Snowden blew the cover off the US government’s electronic surveillance programs.

      The former CIA and NSA employee leaked thousands of highly classified documents to the press and in doing so divided a nation. Did the hacker put America at risk by revealing top secrets or did citizens have the right to know how closely they were being monitored?

    • How ‘Snowden’ the movie could help win a pardon for Snowden the man

      The days leading up to September 16 release of director Oliver Stone’s “Snowden” looked like one long movie trailer.

      The American Civil Liberties Union and other human-right groups on Wednesday announced a campaign to win a presidential pardon for Edward Snowden, the former National Security Agency contract employee who leaked hundreds of thousands of its highly classified documents to journalists. The next day, the House Intelligence Committee released a bipartisan letter to the president that advised him against any pardon and claimed Snowden “caused tremendous damage to national security.”

      The week before, Stone had invited me to a private screening of his movie in Washington. I once worked in an NSA facility, and I’ve written about the agency for decades, so I was surprised and pleased by how successful Stone was in creating an accurate picture of life in the NSA.

    • In solidarity with Snowden: Hong Kong refugees call for pardon of NSA whistleblower
    • Hong Kong refugees protest to call for Snowden pardon
    • ‘Pardon Snowden!’ Hong Kong refugees march on US consulate (PHOTOS)
    • Hong Kong refugees march to US embassy, demand pardon for Edward Snowden
    • Edward Snowden to talk via video chat at Ohio Wesleyan

      Snowden is living in asylum in Russia, seeking to be pardoned for his actions, and still unwilling to remain silent. He is the focus of a new movie, “Snowden,” directed by Oliver Stone, and he will speak via video conference at Ohio Wesleyan University.

    • Whether or not the US pardons Edward Snowden, he shouldn’t return

      Recent weeks have seen a resurgence of an ongoing controversial discussion over whether President Obama should pardon Edward Snowden before leaving office. Russia granted Snowden asylum in 2013, after he publicly revealed that the National Security Agency (NSA) had been surveilling the American population’s communications and Internet usage without their knowledge in the name of “homeland security.”

      Even the FBI director, James Comey, has advised everyone to “take responsibility for their own safety and security” and cover their webcam up with tape. Snowden still resides in Russia, and many believe that he should now be allowed to return home.

      The new feature film, Snowden, has reignited interest in this case, and the film is looking to gain further public support for a pardon. Meanwhile, Snowden himself has asked to come home to America, in hopes for a fair trial; however, the only solace promised to him was that he wouldn’t be tortured.

      Snowden may deserve a pardon, but whether he receives one or not, he’ll never realistically be able to return to America without putting himself at serious risk. After revealing what the government is capable of — from watching citizens through their personal webcams to eavesdropping through cell phones — I doubt Snowden would feel safe in his home country anyways.

    • Edward Snowden is hero, not traitor

      To some, he is a treasonous criminal who should be brought to justice, a real Benedict Arnold. To others, he is a national hero. To me, he is a model of what it means to be a true patriot.

      For those who don’t know, Snowden worked for the National Security Agency and leaked a massive amount of confidential documents in 2013, detailing extensive government surveillance programs.

      These leaked documents were handed directly to three journalists who worked for The Guardian and The Washington Post. These publications, as well as a few others, published a multitude of articles exposing the leaked files. They revealed a comprehensive surveillance program run by the United States government.

    • ‘Snowden’ makes a statement

      “Snowden” is able to convey some extremely strong messages about trust and corruption, and it is definitely easy to see why Snowden acted the way he did. Some call him a patriot and some call him a traitor, but it’s clear to see he did what he thought was right. And after watching this film, it’s difficult to disagree.

    • Snowden awarded by Germans for ‘courage and conscience’

      The German city of Kassel has awarded American whistle-blower Edward Snowden for the “courage and conscience” that he showed in spilling US secrets.

    • NSA Zero Day Tools Likely Left Behind By Careless Operative

      Three years of unpatched holes, one of them a zero day that affects a great deal of Cisco’s networking equipment. Not only was TAO’s operation security compromised, but so were any number of affected products offered by US tech companies.

      However, investigators are still looking into the possibility that the tools were left behind deliberately by a disgruntled TAO operative. This theory looks far better on the NSA than another theory also being examined: that multiple operatives screwed up in small ways, compounding each other’s mistakes and (eventually) leading to a publich showing of valuable surveillance tools.

      As for the official, on-the-record comment… no comment. The FBI and Director of National Intelligence declined to provide Reuters with a statement.

      The NSA has long refused to acknowledge the inherent dangers of hoarding exploits and deploying them with little to no oversight. It’s unclear whether this incident will change this behavior or make it a more-forthcoming partner in the Liability Equities Process. What is has proven is that the NSA makes mistakes like any other agency — whether the tools left behind accidentally or deliberately. It’s just that when the NSA screws up, it exposes its willingness to harm American tech companies to further its own intelligence needs.

  • Civil Rights/Policing

  • Internet Policy/Net Neutrality

    • Slovakia to increase broadband coverage

      The government of Slovakia aims to increase broadband network access in the county. Together with network operators, it is mapping which parts of the country do not yet have broadband access.

      According to announcements by Informatizacia – an eGovernment and ICT advisory organisation, part of the Ministry for Investment and Computerisation, a survey is being organised involving the country’s Internet service providers, to determine which parts of the country have network speeds of less than 30Mbps. The survey will be launched in the first week of October. Four to five weeks later, the final list of Slovakia’s network white spots will be made public.

    • Web animation using CSS and JavaScript

      Animation on the web started in 1987 with the invention of the animated GIF, or Graphic Interface Format. GIFs were used mostly for advertisements on websites, but had some problems with the pixelation. Then, in the 1990s Adobe introduced Flash, a tool for animating with audio. This created a revolution and was the best way to do animation on websites for a very long time. But Flash has some issues.

      Closed source: Users must purchase Flash from Adobe and cannot make modifications to the software.

      Security: Flash allows writing and running complex scripts on websites and scripts can be written that directly access the memory of a computer.

      Performance: Flash websites can take a long time to load.

      Resource hog: Flash uses a high amount of computing resources and can actually hang or crash your system if multiple applications or flash sites are opened at the same time.

      Plugin dependency: You need to have flash plugin installed in your browser. And every month or more, you need to update it.

  • Intellectual Monopolies

    • Trademarks

      • Chicago Cubs: With Success Comes Trademark Lawsuit Against Street Vendors

        As a lifelong Cubs fan with a resume that includes going to my first game at Wrigley when I was four months old and living in Wrigleyville for several years, I can at the very least claim some expertise on the culture around the team and the stadium. For those that have not been lucky enough to visit baseball’s Mecca, the walk about up to the park consists of bar-laden streets on either Addison or Clark, with the sidewalks spilling over with fans, bar-patrons, and street vendors. Those street vendors offer innumerable wares, including t-shirts, memorabillia, and food. It’s part of the experience.

        An experience suddenly under fire by the team and Major League Baseball, which have jointly filed a federal lawsuit against some forty street vendors for trademark and counterfeit violations.

    • Copyrights

      • Help Fix Copyright: Send a Rebellious Selfie to European Parliament (Really!)

        Earlier this month, the EU Commission released their proposal for a reformed copyright framework. In response, we are asking everyone reading this post to take a rebellious selfie and send that doctored snapshot to EU Parliament. Seem ridiculous? So is an outdated law that bans taking and sharing selfies in front of the Eiffel Tower at night in Paris, or in front of the Little Mermaid in Copenhagen.

        Of course, no one is actually going to jail for subversive selfies. But the technical illegality of such a basic online act underscores the grave shortcomings in the EU’s latest proposal on copyright reform. As Mozilla’s Denelle Dixon-Thayer noted in her last post on the proposed reform, it “thoroughly misses the goal to deliver a modern reform that would unlock creativity and innovation.” It doesn’t, for instance, include needed exceptions for panorama, parody, or remixing, nor does it include a clause that would allow noncommercial transformations of works (like remixes, or mashups) or a flexible user clause like an open norm, or fair dealing.

      • The Weird Psychology Of People Fighting Those Who Resell Their Products

        Every so often, we hear a story about actions taken by someone who is just so upset about someone else doing something that it seems to border on obsessive. For example, when we hear about copyright holders who spend all their time sending DMCA takedowns — while whining about how they’re unable to produce new content and aren’t making any money from sending all those takedowns. The obvious response is: maybe stop sending all those takedowns and focus on something that’s actually productive, like creating new works and building a fan base willing to support you.

      • Toronto woman accuses theatre security guard of assault in anti-piracy take down

        When Jean Telfer went to a preview screening of a new movie Wednesday night, she didn’t expect that she’d come out with an injured shoulder and a bump on her head.

        Telfer and her friend Elaine Wong were at a Cineplex theatre at Yonge and Eglinton in Toronto for Sony Pictures Entertainment’s film The Magnificent 7. Sony had rented the theatre for the screening and hired a private security company.

        Halfway through the film, Telfer decided to leave because she found the movie to be too violent.

      • Movie Theater Security Guards Assault Women, Claim They Were Pirating Movie

        It’s well-known that the big studios and the MPAA like to indoctrinate movie theater employees into believing that there’s a horrible menace of people trying to pirate movies in the theaters, and that in some cases, they even hand out money to employees who “catch” pirates in the act. In general, all this really does is make it less enjoyable to go to the movies — and sometimes leads to elderly patrons being ejected from theaters because some kid is totally sure she’s pirating the film she’s watching.

        And the latest example is even more extreme, where private security forces apparently decided to assault a couple of Toronto women they falsely accused of pirating a showing of The Magnificent 7. One of the women, Jean Telfer, says she actually decided to leave the film early because she found it too violent. Apparently the idea that a pirate probably wouldn’t be leaving in the middle of a film didn’t occur to the geniuses Sony Pictures had specifically hired to “guard” the showing. So they tackled Telfer. Really.

      • To photocopy or not: Delhi High Courts grants universities carte blanche to photocopy for educational use

        The recent judgment of the Delhi High Court dismissing the lawsuit filed by publishers like Oxford University Press, Cambridge University Press and Francis Taylor has been received with much joy and applause from virtually all quarters of Indian academia and students. In a 94 page judgment, delivered more than 600 days after it was first reserved, the Delhi High Court has held that Section 52(1)(i) of the Copyright Act, 1957 allows for students and teachers to photocopy books and other educational material without any limit.

        The target of the lawsuit was a particular form of photocopying wherein the faculty at the Delhi School of Economics (DSE) would prescribe a reading list, usually comprising chapters from different books and a photocopying shop contracted by the university would then compile course-packs consisting of these various chapters and sell them to students, for profit. The publishers were seeking to monetise this practice by charging either the university or photocopy shop, a royalty of 50 paise per copyrighted page that was copied – a fair bargain, given the photocopier too was getting 50 paise per page. This is a business model followed in most western universities because it is unreasonable to expect students to buy an entire book for a single chapter.

        The High Court obviously disagreed with the publishers and there appears to be nobody in Indian academia who disagrees with this decision. Rather we’ve been told that the decision restores a “balance” to copyright jurisprudence and that it will facilitate access to knowledge. Unfortunately nobody explains the economics of this balancing act.

09.26.16

Links 26/9/2016: Linux 4.8 RC8, SuperTux 0.5

Posted in News Roundup at 6:24 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop

    • Letter to the Federal Trade Commission regarding Lenovo blocking Linux and other operating system installations on Yoga PCs.

      Lenovo just updated the BIOS for the Yoga 710, another system that doesn’t allow Linux installs. Wanna know what they changed? Update to TPM (secret encryption module used for Digital Restrictions Management) and an update to the Intel Management Engine, which is essentially a backdoor rootkit built into all recent Intel processors (but AMD has their version too, so what do you do?). No Linux support. Priorities…

    • Microsoft told to compensate customers for Windows 10 breaking computers

      Microsoft has been urged to pay compensation to customers that have suffered computer malfunctions when upgrading to its new software Windows 10.

      Since the company released the software last year it has been plagued by complaints, with customers claiming their computers upgraded without their permission and, in some cases, completely stopped working.

      Which?, the consumer watchdog, has told Microsoft to “honour consumers’ rights” and compensate those who have suffered from problems, including lost files, email accounts no longer syncing and failed WiFi connection.

      It said Microsoft customers had also complained that their webcams suddenly stopped working, as did speakers and printers in the wake of the upgrade.

    • Veteran Windows journo slams Microsoft over Surface Pro issues

      Microsoft’s tardiness and lack of communication in relation to battery issues affecting its Surface Pro PC/tablet hybrid has been slammed by well-known journalist Ed Bott who has been writing about the company for 25 years.

      In a column titled “Shame on Microsoft for leaving Surface Pro customers in the dark”, Bott wrote that Microsoft had not shown any appreciation of the users who had helped put its Surface business on a solid footing.

      He wrote that after the Surface Pro 3 had been in the market for more than a year, users began noticing a steady drop in battery capacity.

      In March 2016, the company’s support lines began fielding calls about the issue, with complaints that batteries that should have held a charge for five or more hours were going dead in 20 or 30 minutes and refusing to charge fully.

  • Server

    • IBM Preaches Cognitive, Cloud, And IT Consumption

      They say it’s not just about the technology. It’s really about the business. But that brings to mind an old adage from the car industry: You sell the sizzle not the steak. Right now the sizzle is cognitive computing. It has edged out big data and analytics in the one-upsmanship match of IT leadership and the next big thing. At the Edge conference last week, when IBM executives talked strategy and road maps, cognitive computing was on the tip of tongues.

      Cognitive is a differentiator, an upper hand for IBM. Big Blue has not let the world forget about Watson, its game show champion that’s evolved into a must-have business advantage in the making. Watson’s augmented intelligence, a term IBM prefers over artificial intelligence, has been applied to healthcare, finance, commerce, education, and security. According to IBM, it has thousands of scientists and engineers working on cognitive projects, which also extend to clients, academics, and external experts.

  • Kernel Space

    • Linux Kernel 4.8 Lands October 2 as Linus Torvalds Outs Last Release Candidate

      It’s still Sunday in U.S. so Linus Torvalds has just published his weekly announcement to inform us all about the availability of the eighth and last RC (Release Candidate) development snapshot of the upcoming Linux 4.8 kernel.

    • Linux 4.8-rc8 Released: Linux 4.8 Next Weekend
    • Linux 4.8 gets rc8

      Chill, penguin-fanciers: Linux lord Linus Torvalds is sitting on the egg that is Linux 4.8 for another week.

      As Torvalds indicated last week, this version of the kernel still needs work and therefore earned itself an eighth release candidate.

    • Linux Kernel 4.7.5 Released with Numerous ARM and Networking Improvements

      The fifth maintenance update to the Linux 4.7 kernel series, which is currently the most advanced, secure and stable kernel branch you can get for your GNU/Linux operating system, has been announced by Greg Kroah-Hartman.

      Linux kernel 4.7.5 is here only ten days after the release of the previous maintenance version, namely Linux kernel 4.7.4, and it’s a big update that changes a total of 213 files, with 1774 insertions and 971 deletions, which tells us that the kernel developers and hackers had a pretty busy week patching all sorts of bugs and security issues, as well as to add various, much-needed improvements.

    • Blockchain Summit Day Two: End-Of-Conference Highlights From Shanghai

      Financial services firms and startups looking to be the bridge to blockchain ledgers continued to dominate presentations on the second and final day of the Blockchain Summit, ending International Blockchain Week in Shanghai that also saw Devcon2 and a startup demo competition.

    • Graphics Stack

      • The RADV Radeon Vulkan Linux Driver Continues Picking Up Features
      • OpenChrome Maintainer Making Some Progress On VIA DRM Driver

        Independent developer Kevin Brace took over maintaining the OpenChrome DDX driver earlier this year to improve the open-source VIA Linux graphics support while over the summer he’s slowly been getting up to speed on development of the OpenChrome DRM driver.

        The OpenChrome DRM driver was making progress while James Simmons was developing it a few years back, but since he left the project, it’s been left to bit rot. It will take a lot of work even to get this previously “good” code back to working on the latest Linux 4.x mainline kernels given how DRM core interfaces have evolved in recent times.

      • My talk about Mainline Explicit Fencing at XDC 2016!

        Last week I was at XDC in Helsinki where I presented about the Explicit Fencing work we’ve been doing on the Mainline Linux Kernel in the lastest few months. There was a livestream of all presentations during the conference and recorded sections are available. You can check the video of my presentation. Check out the slides too.

    • Benchmarks

      • Testing Various HDDs & SSDs On Ubuntu With The Linux 4.8 Kernel

        Here are some fresh benchmarks of various solid-state drives (SATA 3.0 SSDs plus two NVMe M.2 SSDs) as well as two HDDs for getting a fresh look at how they are performing using the Linux 4.8 Git kernel.

        After publishing Friday’s Intel 600P Series NVME SSD tests of this lower-cost NVM Express storage line-up, I continued testing a few other SSDs and HDDs. These additional reference points are available for your viewing pleasure today. The additional data is also going to be used for reference in a Linux 4.8-based BCache SSD+HDD comparison being published next week. Stay tuned for those fresh BCache numbers.

  • Applications

  • Desktop Environments/WMs

    • LXQt 0.11.0 Desktop Environment Arrives After Almost One Year of Development

      After being in development for the past eleven months, the next major release of the lightweight, Qt-based LXQt desktop environment has been officially released and it’s available for download.

    • K Desktop Environment/KDE SC/Qt

    • GNOME Desktop/GTK

      • Great first year at LAS GNOME!

        This was the first year of the Libre Application Summit, hosted by GNOME (aka “LAS GNOME”). Congratulations to the LAS GNOME team for a successful launch of this new conference! I hope to see more of them.

        In case you missed LAS GNOME, the conference was in Portland, Oregon. I thoroughly enjoyed this very walkable city. Portland is a great place for a conference venue. When I booked my hotel, I found lots of hotel options within easy walking distance to the LAS GNOME location. I walked every day, but you could also take any of the many light rail or bus or trolley options running throughout the city.

  • Distributions

  • Devices/Embedded

    • Ghost Minitaur Robot Opens Doors & Climbs Fences & Stairs!

      Give this little droid a compatible brain, like a Raspberry Pi 3, which can display images via a built-in HDMI port and runs Linux at 1.2 Gigahertz, and is more akin to an actual computer than a microcontroller, and let programming of a robotic brain function shatter the ceiling on possibilities.

    • Phones

      • Android

        • Google could be about to reveal its Android and Chrome OS merger

          If you’ve been following Google for a while you’ll know that speculation around the company merging Android and Chrome OS into one single whole isn’t anything new, but the rumours have gained fresh impetus over the weekend.

          Sources speaking to the usually reliable Android Police say Google is preparing to combine the two OSes into something codenamed Andromeda inside the company – that’s also the name of the nearest galaxy to the Milky Way or the daughter of Cepheus and Cassiopeia in Greek mythology, depending on which meaning you want to take.

        • Google’s Oct. 4th Event May Reveal Merged Android/Chrome OS
        • Oct 4th rumors: Google to show off merged Android/Chrome OS preview, $69 Chromecast Ultra and $129 Google Home

          Google is holding an event on October 4th, where the company is expected to officially launches its new Pixel and Pixel XL smartphones. But that’s not all we’re expecting to see on October 4th.

          According to several reports from Android Police, we could also see the launch of Google Home, a Chromecast Ultra, and a new wireless router called Google WiFi.

          Google may also show off a preview of an operating system that merges Chrome OS and Android, although it’s unlikely to be available to the public before 2017.

        • Android Users Replace Phones Faster Than iPhone Fans

          Every time a new Apple iPhone gets released, it seems like everyone who has chosen iOS over Alphabet ‘s Android immediately orders one.

          In reality, however, not every consumer trades in his or her phone just because a new model comes out. They may want to, but leasing cycles, payment plans and other factors influence whether people swap out their iPhone or Android phone after a new model is released.

          On the Apple side, consumers are actually holding onto their phones slightly longer, while with Android, the replacement cycle has been steady for the past three years, according to data from Consumer Intelligence Research Partners (CIRP).

        • Sony Xperia X Performance users can register for Android 7.0 Nougat beta program (but not everywhere)
        • Leaked Presentation Slide Reveals Sony’s Android 7.0 Roadmap

          If you own an Android device that isn’t a Nexus, chances are you’re probably wondering when your phone will be updated to the latest version of Android, Android 7.0 Nougat. OEMs don’t usually reveal their update plans so early on, but the good news for Sony users is that we now have an idea of when the update will be released.

          This is thanks to an alleged leaked presentation slide as reported by Mojandroid.sk (via Xperia Blog) from Sony Slovakia. As you can see in the photo above, it shows the company’s plans for the Android 7.0 Nougat update. Assuming the timing is applicable for all markets they operate in, the Xperia X Performance and Xperia XZ should get their update in October.

        • Umi Plus International Giveaway [3 Phones]

Free Software/Open Source

  • How to throw a tarball over the wall

    It costs a lot of money to open source a mature piece of commercial software, even if all you are doing is “throwing a tarball over the wall.” That’s why companies abandoning software they no longer care about so rarely make it open source, and those abandoning open source projects rarely move them to new homes that benefit others.

    If all you have thought about is the eventual outcome, you may be surprised how expensive it is to get there.

    Read more

  • Desktop virtualisation kit-calculator goes open source

    The tool has gone through a number of iterations over the years, extending its capabilities to assess the infrastructure requirements of ever-more virtual desktops along the way while also keeping up with changes to VMware’s Horizon and Citrix’s XenDesktop.

    But Leibovici says he’s now sufficiently busy that “Unfortunately I find myself without time to maintain the VDI calculator, therefore I decided that the best outcome would be to open-source the app and let the community drive maintenance and innovation.”

    Hence its publication under an Apache 2.0 licence here on GitHub.

  • Attributes of Effective Project Managers

    Volunteers often work for both philanthropic and selfish reasons. For example, contributing to FreeBSD and having your code approved can translate to a career-building resume bullet (nearly ⅓ of the world’s internet traffic runs on FreeBSD). While not every contribution translates into a resume bullet, volunteers generally contribute more of their talents when their contributions are recognized. Martin takes great pride in publicly sharing information about how he gives back to his volunteers in the form of reasonably-sized monetary gifts. He remarked to me how one gift bought a programmer a new chair. While it may not seem like much, the contribution made a significant difference to that person’s sense of value to the project. Martin noticed that since the chair arrived the change requests for Ubuntu MATE that come from that programmer with the happy hind quarters seem to become his highest priority and Martin generally gets the changes in short order.

  • Show And Tell: Google Open Sources Its Image Captioning AI In TensorFlow

    Google has open sourced its Show and Tell system which will now be available in TensorFlow machine learning library. The Show and Tell system can analyze an image and provide a relevant caption describing the situation of the image. The code of the system is available on GitHub.

  • Web Browsers

  • SaaS/Back End

  • Databases

    • PostgreSQL 9.6 Preparing To Release Next Week With Its Parallel Queries Support

      PostgreSQL 9.6 is being prepared for release on 29 September as the database system’s latest major update.

      Arguably the biggest feature of the upcoming PostgreSQL 9.6 release is the parallel query support for scans, joins, and aggregates that should speed up the performance of SELECTs by a lot. There are also other improvements like synchronous replication on multiple standby servers, full-text search for phrases, and more.

  • FSF/FSFE/GNU/SFLC

    • Developing a GIMP Deblur Plugin

      The original assignment was to implement Cho’s algorithm for deblurring [Cho et al 2013] as a GIMP plugin. The previous bachelor thesis had found this algorithm as the best deblurring algorithm for recovering text. However, time marches on. During the literature review phase, the team came across some advances in deblurring. Moreover, the algorithm’s description in the paper was incomplete, and patented. (Interestingly enough, the patent did not clarify the incompleteness.) There was a new algorithm by Pan et al [Pan et al 2014] that was simpler, faster, and: open source. However, the original was coded in Matlab, which is (1) proprietary, (2) not freely available, and (3) not in much use by people who want to edit pictures.

      So, the team investigated both algorithms in great (and hairy) detail, and implemented Pan et al’s algo as an open source GIMP plugin. This required a working understanding of the maths involved (which is not explicitly taught in the Bachelor programme). Moreover, the end result is a sleek piece of work, showcasing the team’s CS creds as well.

      Below, a tiny bit about how blurring works, and how to deblur. I’ll skip most of the maths, promised.

  • Public Services/Government

    • North American Cities Slow to Adopt Open Source Software

      Most politicians who are setting the IT budgets do not have a clue what IT is doing. They demand more and more from them as technology changes. But unlike a crumbling road or rusting bridge that can be seen by all, they really do not see or understand what is happening in the IT department. As long as they can get access to their applications and data, everything is fine. This lack of knowledge leads to a lack of political willpower to make change happen or to even recognize that change is needed and that money can be saved by doing things differently.

Leftovers

  • Health/Nutrition

  • Security

    • Microsoft ends Tuesday patches

      Yesterday was a big day for Patch Tuesday. It was the last traditional Windows Patch Tuesday as Microsoft is moving to a new patching release model. In the future, patches will be bundled together and users will no longer be able to pick and choose which updates to install. Furthermore, these new ‘monthly update packs’ will be combined, so for instance, the November update will include all the patches from October as well.

    • The best way to develop software with effective security

      Regardless of the level at which you’re doing your programming, security is going to get in the way. No amount of application abstraction or modern development process seems capable of shielding developers from the barriers raised by security. It’s pretty hard not to hate security when it doesn’t seem to add any intrinsic value, and often gets in the way of providing a delightful user experience. To top it off products can get hacked anyway, in spite of any and all work you do to make your products secure.

  • Defence/Aggression

    • WPost Wants a Bigger War in Syria

      The neocon Washington Post wants an even bigger U.S. military intervention in Syria, ignoring the tenets of international law and assuming that more bombing will somehow make things better, observes ex-CIA analyst Paul R. Pillar.

    • Obama Promises to Shield Saudis on 9/11

      Back in 2008, when people said Barack Obama was “the one,” I didn’t realize they meant that he would be “the one” person standing, blocking the path to justice for the 9/11 victims’ families. Mr. Obama, please get out of our way and let us have some justice and peace 15 years after the brutal murder of our 3,000 loved ones.

      JASTA (Justice Against Sponsors of Terrorism Act, S.2040) is a well-thought out, powerful piece of anti-terrorism legislation. It does exactly what it says — it brings all those who fund terrorism to justice.

    • Obama Vetoes 9/11-Saudi Legislation Setting Up Potential Override

      As expected, President Barack Obama has vetoed legislation that would allow families of 9/11 victims to sue nations, including Saudi Arabia, for any role their government may have played in the terrorist attacks.

  • Environment/Energy/Wildlife/Nature

    • Dangerous Denial of Global Warming

      President Obama calls it “terrifying” and the greatest long-term threat facing the world. Three hundred seventy-five of the world’s top experts just warned of “severe and long-lasting consequences” for the planet if America’s next president drops the ball. Yet only 19 percent of registered voters say it’s a top issue; Hillary Clinton increasingly ducks the topic, and Donald Trump characteristically dismisses it all as a “hoax.”

      The issue, of course, is global warming. While reporters offer endless stories about Clinton’s emails and fainting spells, and Trump makes up new lies faster than fact-checkers can swat them down, few people in politics or the media are talking about the accelerating effects of climate change.

    • Fifty elephants killed each day for last decade, study says amid key talks on ivory trade

      The number of elephants across Africa has dropped by 111,000 in just 10 years to only 415,000 today, according to a study published on Sunday as global experts met in Johannesburg to discuss whether to lift the ban on the ivory trade.

      The Pan-African survey, by the International Union for Conservation of Nature, found that 50 elephants were killed each day since 2006 and laid the blame squarely on poachers seeking their precious tusks for sale mainly to Asian markets.

  • Finance

    • Calling the SEC

      Chris DiIorio suspected major broker-dealer Knight Capital of tanking penny stocks on purpose and racking up massive, unsustainable balance-sheet liabilities based on all the stocks it “sold” that it never really had.

      It had taken him five years to reach these conclusions — five years of digging through reams of financial data in search of answers to how and why his particular penny stock investment was so brutally crushed. Knight never answered DiIorio’s questions, nor, during the reporting of this story, any of The Intercept’s.

    • Monarch Airlines denies rumours it is going bust amid passenger fears

      The UK budget airline Monarch has denied rumours it is going bust, amid growing concerns among passengers that their bookings may be at risk.

      Speculation began to circulate on Sunday afternoon that the airline, a 48-year-old British aviation icon, was set to close.

      The airline continued to advertise holiday deals and take bookings for flights late into Sunday evening.

    • The many hurdles of Brexit – a short summary post

      This is a short summary blogpost of what appear to be the main issues which need to be addressed for a Brexit to take place. I set out below the issues as questions, though they could just as easily be framed as statements.

      I call each of these a “hurdle” – because it is possible that each one of these can be negotiated and jumped over; but it is also possible that each one can be an obstruction.

      [...]

      Hurdle One: Which domestic legal form? Act of Parliament or exercise of the Royal Prerogative (or something else?)

      Hurdle Two: What if the Scottish government is resolute in its opposition to Brexit?

      Hurdle Three: What if the Northern Ireland government is resolute in its opposition to Brexit?

      Hurdle Four: How is the border with the Republic of Ireland dealt with? What impact will there be (if any) on the Good Friday Agreement?

      Hurdle Five: What if Gibraltar is resolute in its opposition to Brexit?

      Hurdle Six: What if the government is defeated in the House of Commons on Brexit?

      Hurdle Seven: What if the government is defeated in the House of Lords on Brexit?

      Hurdle Eight: How is any Brexit to be reconciled with the 2015 Conservative manifesto pledge that the UK’s position in the Single Market will be “safeguarded”? How will that pledge affect the passage of Brexit legislation under the Salisbury Convention (that only legislation which fulfill manifesto pledges will not be subject to Lords’ delay)?

    • TTIP on its deathbed, but CETA moves forward despite growing concerns

      At a key meeting in Bratislava last Friday, EU ministers effectively put the controversial Transatlantic Trade and Investment Partnership (TTIP) negotiations on hold, perhaps forever. Even the perennially upbeat EU commissioner responsible for trade, Cecilia Malmström, admitted: “All ministers expressed their doubts about being able to conclude this before the end of the Obama presidency, and indeed, it looks increasingly unlikely.” Since both candidates for the US presidency have said they are dissatisfied with current trade negotiations, that makes TTIP’s long-term fate extremely uncertain.

      According to a report in Politico.eu, Austria’s economy minister made the suggestion to “relaunch [the TTIP negotiations] after the U.S. elections, with a new name, better transparency and also clearer goals.” However, another, unnamed minister said: “I don’t think there will be less demonstrations if we call it ‘John’.”

  • AstroTurf/Lobbying/Politics

    • Who is Gennifer Flowers? 10 facts about Bill Clinton’s former mistress and Donald Trump’s new friend
    • In Election, Russians Rallied Around Putin

      What is most important here is the fallacious link between low turnout and higher returns for United Russia. On the contrary, I believe low turnout as a general phenomenon, not linked to some openly declared boycott, makes it doubly difficult to get results in the ballot box that reflect the public opinion polls taken before the election.

      A well-documented example of this was the September 2013 mayoral election in Moscow when the turnout was surprisingly low, at 32 percent and the heavy favorite, Acting Mayor Sergey Sobyanin from United Russia, polled just 51 percent of the vote (46 percent according to the Opposition) and the fiercely anti-Kremlin candidate Alexei Navalny received 27 percent (35 percent according to his partisans). If anti-Kremlin voters in Moscow and St. Petersburg stayed home or at their dachas this past Sunday, you have to look deeper into their motivation.

    • Jeremy Corbyn Easily Re-Elected Labour Party Leader

      Jeremy Corbyn scored a “monumental victory” on Saturday, easily being reelected leader of Britain’s Labour Party.

      Corbyn got 61.8 percent of the vote to opponent Owen Smith’s 38.2. The Guardian reports that the 67-year-old “won a majority over Smith in every category—members, registered supporters, and trades union affiliates. He won the support of 59 percent of voting members, 70 percent of registered supporters, and 60 percent of affiliated supporters.”

      Cory Doctorow writes at BoingBoing that his reelection came despite sabotage from his own party and the UK press’s efforts to “to sideline, belittle and dismiss him.” As such, Doctorow argues, “it is nothing short of a miracle that Corbyn has won the leadership race, and that, moreover, he has increased his lead, beyond last year’s landslide, with a higher voter turnout than ever.”

      In fact the Bristol Post writes, it was “one of the most one-sided contests in the history of the party.”

    • Top Clinton aide Cheryl Mills granted partial immunity in email investigation

      Top Hillary Clinton aide Cheryl Mills received an immunity deal from the Justice Department in the FBI’s investigation into the former secretary of state’s private email server, records shown to Congress revealed Friday, re-injecting the email controversy into the presidential campaign just days before her first debate with Donald Trump.

      In addition to Mills, Clinton’s former chief of staff at State, grants of partial immunity were also extended to former Clinton aide Heather Samuelson, who worked as State’s White House liaison and later as a private attorney for Clinton and to John Bentel, who was director of the the Information Resources Management section in the secretary of state’s office, lawmakers said.

    • Former NSA analyst: FBI may reopen investigation if Clinton loses

      The FBI could reopen its investigation into Hillary Clinton’s mishandling of classified information if she fails to win the November election, according to a former National Security Agency analyst, especially in light of revelations made public in a Friday document dump by the agency.

      “The FBI completely ignored the appearance of highly classified signals intelligence in Hillary’s email, including information lifted verbatim from above-Top Secret NSA reports back in 2011,” John Schindler, a security expert and former analyst for the agency, wrote in a Sunday column for the Observer, noting the agency revealed on Friday that it never questioned Clinton about the issue.

    • Fresh Proof The FBI’s Hillary Email Probe Was A Joke

      Yet another surprise revelation suggests strongly that the FBI’s probe of Hillary Clinton’s e-mail mess was anything but a by-the-book investigation.

      House Oversight Committee Chairman Jason Chaffetz (R-Utah) said he learned only Friday that the Justice Department gave immunity deals to Clinton’s former chief of staff, Cheryl Mills, and two other aides. That brings to five the number of Clintonistas who got a pass in exchange for testimony and/or information.

      But what makes it especially significant in Mills’ case is that she was allowed to sit in on Clinton’s FBI interview, asserting attorney-client privilege on Hillary’s behalf. This, even though Mills was herself a witness, even a potential subject of, the investigation.

    • Obama Reportedly Used Pseudonym in Emails With Clinton, FBI Notes Reveal

      One of the more fascinating revelations from the additional FBI notes released about the Hillary Clinton email investigation is the revelation of a potential pseudonym used by President Obama in emails with Clinton.

      The relevant passage of the FBI interview notes how Huma Abedin said when Clinton changed her primary email address, “they had to notify the White House so that Clinton’s emails would not be rejected by the server.”

  • Censorship/Free Speech

  • Privacy/Surveillance

    • Privacy Commissioner warns of ‘hidden risks’ of the IoT

      The Australian Privacy Commissioner has warned that Australian businesses assessed as part of a global sweep of Internet of Things products and services generally lack clear information for customers about how their personal information is being managed.

      And, more than half of Aussie businesses have failed to adequately explain how personal information was collected, used and disclosed, according to the Privacy Commissioner.

      The sweep of IoT devices, just released by the Australian Privacy Commissioner, and fellow international regulators, through the Global Privacy Enforcement Network (GPEN), reveals that 71% of the IoT devices and services, and how information is managed, were not adequately explained by Australian businesses.

    • A Week In, the Pardon Snowden Debate Keeps Heating Up

      Since then, people worldwide have turned their attention back to the most famous whistleblower of our generation. Dozens of news and opinion pieces have considered his role in exposing the contours of U.S. mass surveillance, and moviegoers have watched Joseph Gordon-Levitt portray him in an Oliver Stone-directed filmbased on his life.

      The ACLU, Amnesty International, and Human Rights Watch launched the Pardon Snowden campaign with a press conference last Wednesday, with Ed himself appearing via live video. “Never in my wildest dreams would I have imagined, three years ago, such an outpouring of solidarity,” he said in profuse thanks to his supporters.

    • Gary Johnson: I would pardon Edward Snowden
    • Gary Johnson: I would pardon Snowden
    • Gary Johnson Supports Pardoning Edward Snowden
    • Edward Snowden should come home
    • Hong Kong campaigners, asylum seekers to demand US presidential pardon for Edward Snowden
    • Hongkongers Take to Streets in Support of U.S. Whistleblower Snowden
    • Rally for US whistleblower Edward Snowden brings Hong Kong’s refugees to the fore
    • Hong Kong refugees protest to call for Snowden pardon

      Activists and refugees staged a protest in Hong Kong on Sunday calling on Washington to pardon fugitive whistleblower Edward Snowden, with protesters describing refugees in the city as “heroes” for helping him evade authorities in 2013.

    • Snowden Receives German Citizen’s Award ‘Glass of Reason’

      Former US National Security Agency (NSA) contractor Edward Snowden received the Glass of Reason, award of the citizens of the German city of Kassel worth 10,000 euro ($11,230).

    • NSA whistleblower Edward Snowden gets German award for ‘courage and conscience’ after spilling US secrets

      Edward Snowden has received an award from a German city for the ‘courage and conscience’ he showed in spilling US secrets.

      He received the Glass of Reason, award from the citizens of the German city of Kassel worth 10,000 euros (£7,000).

      The award’s organizers reportedly said that they made this choice because the whistleblower “with courage, competence and reason has taken a conscience decision and put his past life and safety at stake for a bigger thing.”

    • ChIPs Global Summit Report 4: Facebook, Apple and the DoJ discuss the tension between privacy and security

      1. The privacy v security fallacy. National security and personal privacy are not at odds with each other. It is a false choice – it is really security v security. As Noreen highlighted 17.5 million people were victims of direct hacks which violated their personal privacy, but importantly they were also victims of crime. Privacy is a security issue and security is a privacy issue. People who put products into the marketplace want to stop crime at the onset and law enforcement want to stop it once it happens. The argument is that that you cannot undermine encryption to protect customer’s security and privacy in the interests of law enforcement because in doing so you will inevitably create back doors which allow “the bad guys” in resulting in crime (and, therefore, threats to security).

      2. Security and privacy have taken center stage. The FBI’s order against Apple was ex parte. There was no opportunity for Apple to be heard. The manner in which the FBI obtained the order (after months of working whit Apple and not under seal, so that it was public) therefore generated controversy and ignited fights between various factions on the public stage. Noreen explained that Apple was and had been cooperating with law enforcement for months until the February ex parte order. The FBI’s order asked Apple to write a new operating system so that they could gain access to the iPhone 5c at issue which was running on iOS 9 (reportedly known internally at Apple as GovtOS). If Apple complied with the order they would risk the security of other Apple customers. The panel recommended this TIME article interview with Tim Cook to the audience for background reading. The panel appreciated FBI Director Comey’s efforts to keep the issue in the forefront of public discussion, but some panellists stated that his comment that an “adult conversation” was needed in the wake of the controversy was probably an unfortunate choice of words as the insinuation was that if you did not agree with the FBI, you were not an adult. Now that the “fervor” has died down, many panellists felt it was time to reignite the conversation.

  • Civil Rights/Policing

    • Jordanian Writer Shot Dead In Front Of Court Before Trial Over Cartoon

      A gunman on Sunday killed prominent Jordanian writer Nahed Hattar outside a court where he was facing charges for sharing a cartoon deemed offensive to Islam, state news agency Petra reported.

      Hattar was struck by three bullets before the assailant was arrested, said Petra. Witnesses told AFP that a man had opened fire in front of the court in Amman’s Abdali district.

      The 56-year-old Christian was arrested on August 13 after posting a cartoon mocking jihadists on his Facebook account.

    • Nahed Hattar shot dead: Prominent Jordanian writer charged with offensive Facebook post killed

      A Jordanian writer who was arrested for posting a cartoon deemed offensive to Islam has been shot dead.

      Nahed Hattar was assassinated in front the Supreme Court in Amman with local media reporting he was shot three times in the head.

      The shooter has reportedly been arrested by security forces.

    • Palace to look into WikiLeaks report saying Duterte permitted Davao killings

      Malacañang on Sunday said it will look into “leaked information” that President Rodrigo R. Duterte knew and permitted vigilante killings in Davao during his term as mayor of the city.

      “We will look into [it] first,” Communications Secretary Martin M. Andanar said in a text message.

      “Commission on Human Rights Regional Director Alberto Sipaco (strictly protect) at a private meeting affirmed that Mayor Duterte knows about the killings and permits them,” read cable 09MANILA1002_a, one of the diplomatic cables released on the internet by self-described “multi-national media organization and associated library” WikiLeaks.

      “Recounting a conversation he once had with Duterte, who is his close friend and former fraternity brother, Sipaco said he pleaded with the Mayor to stop vigilante killings and support other methods to reduce crime, like rehabilitation programs for offenders,” it added.

    • A Digital Rumor Should Never Lead to a Police Raid

      If police raided a home based only on an anonymous phone call claiming residents broke the law, it would be clearly unconstitutional.

      Yet EFF has found that police and courts are regularly conducting and approving raids based on the similar type of unreliable digital evidence: Internet Protocol (IP) address information.

      In a whitepaper released today, EFF challenges law enforcement and courts’ reliance on IP addresses, without more, to identify the location of crimes and the individuals responsible. While IP addresses can be a useful piece of an investigation, authorities need to properly evaluate the information, and more importantly, corroborate it, before IP address information can be used to support police raids, arrests, and other dangerous police operations.

      IP address information was designed to route traffic on the Internet, not serve as an identifier for other purposes. As the paper explains, IP addresses information isn’t the same as physical addresses or license plates that can pinpoint an exact location or identify a particular person. Put simply: there is no uniform way to systematically map physical locations based on IP addresses or create a phone book to lookup users of particular IP addresses.

    • Far-Right Runs With ‘Outside Agitator’ Lie Spread by CNN

      This case offers a perfect example of why uncritically allowing police union officials to make unsourced assertions on national TV, and then repeating them as facts, is not a good idea.

      First, it’s important to note that Burnett even muffs her sourcing; by citing a “Charlotte police sergeant,” she ignores the fact that he’s a union representative, and that union representatives are not operating in their capacity as police officers or spokespeople for the department. By conflating the two, she treated what was effectively advocacy on behalf of an individual officer as an official statement by a police department; while police departments are of course capable of being deceptive themselves, they are at least in theory accountable to a city council and mayor.

    • Charlotte Police Video of Keith Scott’s Killing Released

      The same clip then shows another officer, in a red shirt, approach Scott just after the shooting and there is the sound of something skittering across the pavement as he crouches down by the dying man’s right side. There has been some speculation that the officer could have been sliding a gun away from Scott’s hand towards the curb behind him.

      Putney said that more footage was recorded on other police cameras, and all of the material would likely be released later, after the completion of an independent inquiry into the fatal shooting now being carried out by North Carolina’s State Bureau of Investigation. “The footage itself,” he added, “will not create in anyone’s mind absolutely certainty as to what this case represents and what the outcome should be.”

      The partial release of video failed to satisfy protesters, who rallied in Charlotte on Saturday night, chanting “Release the whole video!” according to DaShawn Brown of WSOC-TV.

    • Police Arrest 32 Child Traffickers, Uncover 6 Baby Factories

      Delta State Police Commissioner, Mr. Zanna Ibrahim yesterday said thirty-two child traffickers were arrested in the last two months, adding that six baby factories were uncovered in Asaba and its environs.

      Emphasizing his determination to synergize with the State Ministry of Women Affairs to fight against crime and other social vices in the state, the police boss said: “We have reduced drastically child trafficking in the state, and baby factories uncovered by men and officers of the police force, we will ensure efforts are put together to bring to book those in their hideouts”, pointing out that the suspects arrested currently being detained would be charged to court on completion of investigation.

      Mr. Zanna Ibrahim who spoke to journalists on efforts made so far since he assumed office in Asaba, said he was ready to collaborate and co-operative with Women Affairs department in the state, especially when the crime involves children and women who are target of traffickers.

    • VIDEO: Charlotte Police Killed Keith Lamont Scott In Under 10 Seconds, Withheld Audio Recordings Too

      Charlotte police finally respected the will of Keith Lamont Scott’s family and released two official videos of his last moments in a police killing that touched off peaceful protests, deployment of riot police and eventually violent protests and looting.

      But audio is redacted.

      Dash cam video reveals that Keith Lamont Scott only lived ten seconds after exiting his car.

      There’s definitely not an immediate threat by Scott to the four police officers with arms drawn, even slightly noticeable in the dash cam video.

      No gun is visible at any time.

      Part of the Charlotte police’s initial unproven claim to justify the shooting of Scott – for which no probable cause has yet been given – is that they gave “clear warning” audio in the body camera video below, nor in the dash camera video which illustrates what commands or verbalizing happened by the three officers on the scene, one of whom is clearly uniformed as seen in the dash camera video.

  • Internet Policy/Net Neutrality

    • ISP explains data caps to FCC: Using the Internet is like eating Oreos

      If you were worried that the debate over Internet data caps would get bogged down in technical mumbo-jumbo, fear no more—it’s actually much simpler than you think.

      Mediacom, a US cable company with a little over 1.1 million Internet subscribers in 22 states, has put the matter to rest by explaining to the Federal Communications Commission that its customers shouldn’t get unlimited data because using the Internet is just like eating Oreos.

      “You have to pay extra for double-stuffed,” Mediacom Senior VP and General Counsel Joseph Young wrote in a filing with the FCC last week.

    • Vint Cerf’s dream do-over: 2 ways he’d make the internet different

      Vint Cerf is considered a father of the internet, but that doesn’t mean there aren’t things he would do differently if given a fresh chance to create it all over again.

      “If I could have justified it, putting in a 128-bit address space would have been nice so we wouldn’t have to go through this painful, 20-year process of going from IPv4 to IPv6,” Cerf told an audience of journalists Thursday during a press conference at the Heidelberg Laureate Forum in Germany.

      IPv4, the first publicly used version of the Internet Protocol, included an addressing system that used 32-bit numerical identifiers. It soon became apparent that it would lead to an exhaustion of addresses, however, spurring the creation of IPv6 as a replacement. Roughly a year ago, North America officially ran out of new addresses based on IPv4.

      For security, public key cryptography is another thing Cerf would like to have added, had it been feasible.

  • DRM

    • HTML standardization group calls on W3C to protect security researchers from DRM

      The World Wide Web Consortium has embarked upon an ill-advised project to standardize Digital Rights Management (DRM) for video at the behest of companies like Netflix; in so doing, they are, for the first time, making a standard whose implementations will be covered under anti-circumvention laws like Section 1201 of the DMCA, which makes it a potential felony to reveal defects in products without the manufacturer’s permission.

      This is especially worrisome because the W3C’s aspiration for the new version of HTML is that it will replace apps as the user-interface for the Internet of Things, making all sorts of potentially compromising (and even lethal) bugs difficult to report without serious legal liability.

      The EFF has proposed that W3C members should be required to promise not to use the DMCA and laws like it this way; this has had support from other multistakeholder groups, like the Open Source Initiative, which has said that the W3C work will not qualify as an “open standard” if it doesn’t do something to prevent DMCA abuse.

  • Intellectual Monopolies

    • Trademarks

      • A song of Ice and Ice

        Iceland, a country famous for the northern lights, skyr yoghurt, and their recent performance in the Euros, has made headlines this week for threatening the trade mark rights of a major UK supermarket. The cause of this ire is unclear, as some sources report that Icelandic tourist board, ‘Promote Iceland’ was faced with opposition proceedings when they attempted to register an EU trade mark ‘Inspired by Iceland’. Other reports state that Icelandic companies are being prevented from trading under their country name due to Iceland Foods’ earlier right.

      • Eye ‘should’ve’ done that! – Specsavers nears approval to trade mark single word “should’ve” & “shouldve”

        Despite the legal and commercial concerns, Specsavers’s decision to register single words SHOULD’VE and SHOULDVE should be recognised as intelligent business strategy, considering the proliferation and potential of social media. The use of hashtags has become a significant vehicle of marketing for businesses. Hashtags have the power not only to categorise content but also to form trends and thus generate interest. Therefore, registering a specific word will be integral for Specsavers in expanding their marketing activities and driving future campaigns. For example, the hashtag ‘#should’ve recently accompanied the full Specsavers catchphrase. It is thus apparent that registration will help Specsavers to control use in the full spectrum of social media.

    • Copyrights

      • Man Likely to Sacrifice Himself Testing Streaming Piracy Limits

        A man is preparing a legal battle to find out where the boundaries lie when it comes to offering “fully loaded” Kodi TV devices in the UK. Brian Thompson, who is being taken to court by his local council, says he expects to lose the case. And barring a miracle that’s exactly what’s going to happen.

      • Copyright Loophole Could Undermine Important Consumer Protection Bill

        The Consumer Review Fairness Act Is a Noble Bill but Could Leave the Door Open for Copyright Abuse

        There’s a bill making its way through Congress that would protect consumers’ freedom of speech by limiting unfair form contracts. The Consumer Review Fairness Act (H.R. 5111), introduced by Leonard Lance (R-NJ) and cosponsored by several representatives, would address two shameful practices: contracts that bar customers from sharing negative reviews of products and services online, and contracts that attempt to assign the copyright in customers’ reviews to the businesses themselves (who then file copyright takedown notices to have negative reviews removed). The CRFA is an important bill, and it addresses a major problem, but it contains one loophole that could undermine its ability to protect people who write online reviews.

        An earlier version of the bill was introduced in both houses of Congress last year under the name Consumer Review Freedom Act (S. 2044, H.R. 2110). EFF applauded the bill when it was introduced. As we argued then, when a customer has no reasonable opportunity to negotiate a contract and its terms are overwhelmingly stacked against the customer, the contract shouldn’t be enforceable. We noted that these contracts usually fail in court, but that that hasn’t stopped businesses from using them. We also pointed out a few problems with the CRFA. Most of them have been addressed in the new bill, but the most disconcerting one remains.

        If a company claims that a review is not “otherwise lawful” (for example, because it allegedly defames the company), then the law may permit the company to claim that it owns the copyright in the review and have it removed as copyright infringement, thus creating a shortcut for having speech removed. We don’t think this is what Congress intended, and we hope it’s not too late to remove the two offending words.

        Imagine that I’m a vendor offering you a contract for a service. My contract includes a clause saying that you assign me the copyright in any review you write of my service. Under the CRFA, that clause would be invalid and my including it in the contract would be against the law. But if my contract says you assign me the copyright in any unlawful review you write, I could argue that that contract is valid under the CRFA.

09.25.16

Links 25/9/2016: Linux 4.7.5, 4.4.22; LXQt 0.11

Posted in News Roundup at 8:27 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • 10 Top Open Source Artificial Intelligence Tools for Linux

    In this post, we shall cover a few of the top, open-source artificial intelligence (AI) tools for the Linux ecosystem. Currently, AI is one of the ever advancing fields in science and technology, with a major focus geared towards building software and hardware to solve every day life challenges in areas such as health care, education, security, manufacturing, banking and so much more.

  • Events

  • Web Browsers

    • Mozilla

      • This Week In Servo 78

        Our overall roadmap is available online and now includes the initial Q3 plans. From now on, we plan to include the quarterly plan with a high-level breakdown in the roadmap page.

      • Firefox 49 Release: Find out what is new

        Firefox 49.0 is the next major stable release of the web browser. Firefox 48.0.2 and earlier versions of Firefox can be updated to the new release.

  • Oracle/Java/LibreOffice

  • BSD

  • FSF/FSFE/GNU/SFLC

    • A short critique of Stallmanism

      I like Stallman and tend to agree with him often: regarding software, or other politics. This article tries to constructively criticize some parts of the free software movement’s ideology, which I collectively refer to as “Stallmanism” (only as pun). It is not an attempt at a personal attack on Stallman, and by reading further you will probably see my politics are very far from that: I coined the term Stallmanism simply because he is at the center of the movement and himself a primary source of the ideas I am critiquing.

    • Libreboot Drama Continues, GNU Might Keep The Project

      It’s been one week since the Libreboot downstream of Coreboot announced it would leave the GNU and denounced the FSF over supposedly a transgendered individual having been fired by the this free software group. Both Richard Stallman and the FSF denounced these claims made by Libreboot maintainer Leah Rowe. Since then, no actual proof has been presented to back up these claims by the Libreboot maintainer but the drama around it has seemingly continued.

      Waking up this morning, I received an email as part of a long email chain from Leah Rowe about how the “GNU project refuses to let go of libreboot” and she wrote, “GNU project has told me that they will not allow libreboot to leave GNU. This is quite possibly the biggest insult imaginable, considering what has happened.”

    • Libreboot lead developer masks FSF Employee’s disendorsement as “typofix”

      ELI5: Leah Rowe made this commit to the Libreboot website earlier today with the comment “typofix”. In fact, it was more than a typo-fix as it shows that the FSF employee either no longer or never did give permission for the opposition against the FSF.

    • Richard Stallman and GNU refused to let libreboot go, despite stating its intention to leave

      Leah Rowe is still libreboot’s maintainer, and the GNU project has zero right to keep libreboot under its umbrella. If the maintainer of a GNU project steps down without intending for that project to leave GNU, then fine. But if a maintainer stays on as that projects maintainer while stating the projects intention to leave GNU, then GNU should honour that request.

    • GDB Continues Improving, libstdc++ Is Doing Well On C++17 & More

      At the GNU Tools Cauldron earlier this month in the UK there was a presentation on forthcoming improvements to the GNU Tools, presented by Nick Clifton as part of the Red Hat Tools Team.

  • Project Releases

  • Public Services/Government

    • Can Justin Trudeau Fix Canada’s Broken Government IT System?

      During a March hearing before the House of Commons Government Operations Committee, there was a telling exchange between an official of Shared Services Canada (SSC)–the department that manages the Canadian federal government’s IT–and rookie MP David Graham. Graham wanted to know what percentage of SSC’s data centres and servers ran on Linux or other similar source software. Patrice Rondeau, the SSC official, replied that “approximately 15 percent are running Linux.”

  • Openness/Sharing/Collaboration

  • Programming/Development

    • Oracle tries playing nice with Java EE rebels

      With Oracle now trying to get back on track with advancing enterprise Java, the company is seeking rapprochement with factions that had sought to advance the platform on their own. The two groups involved are mostly amenable to patching up the relationship.

      Oracle’s Anil Gaur, group vice president of engineering, said this week he had already been in touch with some of the concerned parties. The two factions include Java EE Guardians, led by former Oracle Java EE evangelist Reza Rahman, and Microprofile.io, which has included participation from Red Hat and IBM.

Leftovers

  • Facebook reveals new measurement tools and ad options for retailers

    With Facebook growing its advertising revenue 63 percent in the second quarter, the social giant is always looking for new ways to tailor ads to retailers and new measurement partners. Two announcements Tuesday and Wednesday are about expanding return on investment, while also making it easier for advertisers to measure that return.

    On Wednesday, Facebook announced five new measurement products with as many different partners. These are designed to allow marketers to work with the independent third parties they’re already familiar with, while Facebook addresses concerns that it has been a “walled garden” when it comes to data.

  • People Aren’t Watching Facebook Videos as Much as Facebook Said

    Over the past year, both media companies and advertisers have invested an enormous amount of money, labor, and time in Facebook’s video products.

    You can see evidence throughout the industry. It’s not just the auto-playing Donald Trump campaign ads that clog your News Feed (or, at least, which clog mine). In August, BuzzFeed restructured its organization so that video oversees most non-news divisions. In April, Mashable laid off about 24 writers and editors so it could make a “strategic shift” to video. Media analysts (including myself) began comparing where audiences spend their time to where advertisers spent their dollars. We suggested that soon mobile video could erode the entire television ad market.

    As of this morning, mobile still reigns. American consumers spend about 25 percent of their time on mobile phones (and a huge amount of that time on Facebook), but advertisers only spend about 12 percent of their budgets there.

  • Facebook Overestimated Key Video Metric for Two Years

    Big ad buyers and marketers are upset with Facebook Inc. after learning the tech giant vastly overestimated average viewing time for video ads on its platform for two years, according to people familiar with the situation.

    Several weeks ago, Facebook disclosed in a post on its “Advertiser Help Center” that its metric for the average time users spent watching videos was artificially inflated because it was only factoring in video views of more than three seconds. The company said it was introducing a new metric to fix the problem.

    Some ad agency executives who were also informed by Facebook about the change started digging deeper, prompting Facebook to give them a more detailed account, one of the people familiar with the situation said.

    Ad buying agency Publicis Media was told by Facebook that the earlier counting method likely overestimated average time spent watching videos by between 60% and 80%, according to a late August letter Publicis Media sent to clients that was reviewed by The Wall Street Journal.

  • Journalists Blaming Facebook For Decline Is Just As Tiresome As When They Blamed Craigslist & Google

    A few notes on some of the above links. The “study” that is cited in some of the first batch about how Craigslist is “killing” newspapers was from the Pew Research Center — the very same research shop that Greenslade points to in the link up at the top of this article blaming Facebook. Second, that first article in the second list, about Bob Woodward blaming Google… is also by Greenslade. Yet, in that case, Greenslade mocks Woodward for blaming Google (and very kindly provides a link to me mocking Woodward’s silly claims.

    So let’s get a few things out of the way here: Newspapers are struggling. They absolutely are. But it’s not “because” of Facebook (or Craigslist or Google). Newspapers were going to struggle with the rise of the internet no matter what, because it laid bare the basic coincidence that made newspapers profitable despite themselves. For many, many years, we’ve been pointing out that the true business of newspapers was a community business, rather than a news business. It’s just that in the pre-internet days, newspapers had a bit of a monopoly on being able to build communities — often local communities — around the news. But they had very little competition in that business, other than maybe a few other local newspapers (though consolidation took care of that in most markets). The business, then, of newspapers was taking the attention they received from that community, and selling it to advertisers.

    The internet structurally changed all of this, by creating all sorts of other areas where people could congregate and build communities. That’s kind of what the internet is good at. And suddenly there’s a ton of competition in the community space. But newspapers, incorrectly thinking they were in the “news” business, often made decisions that actively harmed the community aspect. They put up paywalls. They took away the ability to comment. They made it harder for local communities of interest to form.

    So what happened? The communities and their (valuable) attention went elsewhere. And, these days, much of that “elsewhere” when it comes to communities is Facebook.

    And, just like Google before it, Facebook has actually created a pretty valuable channel for sending people to your news website. Many publishers haven’t figured this out yet — or how to harness it. Hell, just a month or so ago, I was talking about how we here at Techdirt haven’t figured this out at all (we get depressingly little traffic from Facebook compared to many of our peers). But you won’t see us blaming Facebook for this. It’s on us. Have our ad rates dropped off a cliff? Yes. Is that Facebook’s fault? Hell no. Even if all the advertising money that used to go to newspapers and news sites magically shifted to Facebook (which it hasn’t), then it would be because of a failure on the part of those news companies to offer a better overall product for advertisers.

    It’s time for publications to stop blaming every new technology site that comes along, and to focus on actually adapting, changing and finding new business models that work. It may not be easy. And many will crash and burn completely. But that’s not the “fault” of these new companies at all.

  • Facebook launches first nationwide voter registration drive

    Facebook wants you to get out to vote.

    On Friday, Facebook users in the U.S. who are 18 and up will receive a reminder to register to vote at the top of their News Feed.

    The voter registration drive, Facebook’s first to roll out nationwide, is tapping the power of social media to influence millions of people and their friends, especially young people who are less likely to turn out. The reminder will be sent out over the next four days, Facebook said.

    Clicking on the “Register Now” button sends voters to the federal government’s vote.USA.gov which guides them through the registration process in their state. After registering to vote, users can share their status, a subtle form of social pressure for friends to perform their civic duty, too.

  • Microsoftter? Twoogle? Tech firms reportedly line-up to buy social network

    BAKE-OFF FORUM Twitter is being eyed up by a number of potential buyers, according to reports, including Google, Microsoft, Salesforce and Verizon.

    CNBC has the scoop, having heard from sources close to the social network that Twitter is in discussions with several tech giants as it attempts to secure the best deal for investors.

    A sale would not be a huge surprise as Twitter has been in the doldrums for some time and has struggled to monetise the platform in the same way as Facebook. User growth has slowed, which has made advertisers less keen on the platform as its reach is far below that of others.

  • Microsoft shuts down Skype office in London as it develops yet another client

    Microsoft is closing the London office that was home to part of its Skype development, causing the loss of 220 jobs. A further 300 people are losing their jobs in Redmond as Microsoft makes cuts that were previously announced in July.

  • Science

    • Panel On The Right To Scientific Progress And Freedom For Scientific Research

      Scientists, national and United Nations representatives, academia and civil society this week explored and elaborated on the right to enjoy scientific progress and the freedom which is indispensable for scientific research. The right was placed in the context of today’s global challenges and scientists presented the latest examples of their research, in which human rights related to freedom of scientific research could be applied. The panel set out promote systematic dialogue to foster an understanding of the right and of what is being advanced.

      The World Congress for Freedom of Scientific Research, a forum to foster dialogue between scientists and politicians, and the Associazione Luca Coscioni held the panel, chaired by the association’s representative Marco Cappato at the United Nations in Geneva.

      [...]

      He said “pharmaceutical companies which have so much cash asset can also support, not only in terms of taking money from the patient for drugs, but also to give something back to the whole society by spending money to make sure that hospital personnel is paid in the right way and that they are not suffering depression,” for example.

      “We need to have a paradigm change,” he said, “so the pharma industry, clearly has to be seen, not as a cost factor, they have to come into the game also as somebody which delivers something to society.”

    • Cut-throat academia leads to ‘natural selection of bad science’, claims study

      Getting stuff right is normally regarded as science’s central aim. But a new analysis has raised the existential spectre that universities, laboratory chiefs and academic journals are contributing to the “natural selection of bad science”.

      To thrive in the cut-throat world of academia, scientists are incentivised to publish surprising findings frequently, the study suggests – despite the risk that such findings are “most likely to be wrong”.

      Paul Smaldino, a cognitive scientist who led the work at the University of California, Merced, said: “As long as the incentives are in place that reward publishing novel, surprising results, often and in high-visibility journals above other, more nuanced aspects of science, shoddy practices that maximise one’s ability to do so will run rampant.”

  • Health/Nutrition

    • Europe Dominates List Of Candidates For Next WHO Director

      The World Health Organization today released the list of candidates to be the next director general of the UN health agency in Geneva. Of the six candidates, four are from the European region.

    • State’s cowardly act: Changing the rules for Flint

      Punitive. Self-serving. Cowardly.

      There’s no other way to describe the latest revelation about the State of Michigan’s unprecedented and irresponsible actions concerning the City of Flint: that this spring — at the direction of Gov. Rick Snyder, and with the support of GOP legislators — the state barred the city from suing it, without approval by a state-appointed board.

      In practice, that means the city can’t sue the state. And that means the City of Flint, on behalf of its citizen-taxpayer residents, can’t seek redress of its grievances against the State of Michigan through the courts — a protection conferred by the U.S. Constitution.

    • After court threat, state of Michigan removed Flint’s power to sue

      Days after Flint Mayor Karen Weaver served notice that her city might file a lawsuit against the State of Michigan over the Flint drinking water crisis, the state removed Flint’s ability to sue.

      Though Flint has not been under a state-appointed emergency manager since April 2015, the state still exerts partial control over the city through a five-member Receivership Transition Advisory Board, whose members are appointed by Gov. Rick Snyder.

      The board moved quickly to change the rules under which Flint is governed so that the city cannot file a lawsuit without first getting approval from that state-appointed board.

      In other words, Flint cannot sue the state without getting the state to sign off on it first.

    • State yanked Flint ability to sue after water lawsuit threat, report says

      A state-appointed board removed the city’s ability to sue following the threat of a lawsuit, the Detroit Free Press reported.

      After Mayor Karen Weaver sent notice that the city could file a lawsuit in connection to the Flint water crisis, the Reciever Transition Advisory Board changed governance rules and forced city officials to first get RTAB approval before entering litigation, the Free Press reported.

      Weaver filed a notice of intent to sue the state in March, the Free Press reported, and at the time Flint officials said they didn’t plan to sue the state, but needed to take action to reserve the city’s rights.

      Gov. Rick Snyder and House Speaker Kevin Cotter, R-Mt. Pleasant, asked Flint to withdraw the notice, according to the report, but Flint did not.

      Eight state employees have been charged with crimes in connection to the drinking water crisis here.

    • Doctor Confesses: I Lied to Protect Colleague in Malpractice Suit

      Almost two decades ago Dr. Lars Aanning sat on the witness stand in a medical malpractice trial and faced a dilemma.

      The South Dakota surgeon had been called to vouch for the expertise of one of his partners whose patient had suffered a stroke and permanent disability after an operation. The problem was Aanning had, in his own mind, questioned his colleague’s skill. His partner’s patients had suffered injuries related to his procedures. But Aanning understood why his partner’s attorney had called him as a witness: Doctors don’t squeal on doctors.

      The attorney asked the key question: Did Aanning know of any time his partner’s work had been substandard?

      “No, never,” Aanning said.

      Now, Aanning, in a stunning admission for a medical professional, has a blunter answer: “I lied.”

      While it’s impossible to know to what extent Aanning’s testimony influenced the outcome, the jury sided in favor of his colleague — and, ever since, Aanning said, he has felt haunted by his decision. Now, 77 and retired, he decided to write about his choice and why he made it in a recent column for his local newspaper, The Yankton County Observer. He also posted the article in the ProPublica Patient Safety Facebook group. Aanning, who is a member, called it, “A Surgeon’s Belated Confession.”

  • Security

    • Friday’s security updates
    • Impending cumulative updates unnerve Windows patch experts

      Microsoft’s decision to force Windows 10′s patch and maintenance model on customers running the older-but-more-popular Windows 7 has patch experts nervous.

      “Bottom line, everyone is holding their breath, hoping for the best, expecting the worst,” said Susan Bradley in an email. Bradley is well known in Windows circles for her expertise on Microsoft’s patching processes: She writes on the topic for the Windows Secrets newsletter and moderates the PatchMangement.org mailing list, where business IT administrators discuss update tradecraft.

    • Yahoo is sued for gross negligence over huge hacking

      Yahoo Inc (YHOO.O) was sued on Friday by a user who accused it of gross negligence over a massive 2014 hacking in which information was stolen from at least 500 million accounts.

      The lawsuit was filed in the federal court in San Jose, California, one day after Yahoo disclosed the hacking, unprecedented in size, by what it believed was a “state-sponsored actor.”

      Ronald Schwartz, a New York resident, sued on behalf of all Yahoo users in the United States whose personal information was compromised. The lawsuit seeks class-action status and unspecified damages.

      A Yahoo spokeswoman said the Sunnyvale, California-based company does not discuss pending litigation.

    • Yahoo faces questions after hack of half a billion accounts

      Yahoo’s admission that the personal data of half a billion users has been stolen by “state-sponsored” hackers leaves pressing questions unanswered, according to security researchers.

      Details, including names, email addresses, phone numbers and security questions were taken from the company’s network in late 2014. Passwords were also taken, but in a “hashed” form, which prevents them from being immediately re-used, and the company believes that financial information held with it remains safe.

    • Krebs Goes Down, Opera Gets a VPN & More…

      Krebs on Security in record DDOS attack: Everybody’s go-to site for news and views of security issues, has been temporarily knocked offline in a DDOS attack for the record books. We first heard about the attack on Thursday morning after Brian Krebs reported that his site was being hit by as much as 620 Gbs, more than double the previous record which was considered to be a mind-blower back in 2013 when the anti-spam site Spamhaus was brought to its knees.

      Security sites such as Krebs’ that perform investigative research into security issues are often targets of the bad guys. In this latest case, Ars Technica reported the attack came after Krebs published the identity of people connected with vDOS, Israeli black hats who launched DDOS attacks for pay and took in $600,000 in two years doing so. Akamai had been donating DDoS mitigation services to Krebs, but by 4 p.m. on the day the attack began they withdrew the service, motivated by the high cost of defending against such a massive attack. At this point, Krebs decided to shut down his site.

    • Upgrade your SSH keys!

      When generating the keypair, you’re asked for a passphrase to encrypt the private key with. If you will ever lose your private key it should protect others from impersonating you because it will be encrypted with the passphrase. To actually prevent this, one should make sure to prevent easy brute-forcing of the passphrase.

      OpenSSH key generator offers two options to resistance to brute-force password cracking: using the new OpenSSH key format and increasing the amount of key derivation function rounds. It slows down the process of unlocking the key, but this is what prevents efficient brute-forcing by a malicious user too. I’d say experiment with the amount of rounds on your system. Start at about 100 rounds. On my system it takes about one second to decrypt and load the key once per day using an agent. Very much acceptable, imo.

    • Irssi 0.8.20 Released
    • What It Costs to Run Let’s Encrypt

      Today we’d like to explain what it costs to run Let’s Encrypt. We’re doing this because we strive to be a transparent organization, we want people to have some context for their contributions to the project, and because it’s interesting.

      Let’s Encrypt will require about $2.9M USD to operate in 2017. We believe this is an incredible value for a secure and reliable service that is capable of issuing certificates globally, to every server on the Web free of charge.

      We’re currently working to raise the money we need to operate through the next year. Please consider donating or becoming a sponsor if you’re able to do so! In the event that we end up being able to raise more money than we need to just keep Let’s Encrypt running we can look into adding other services to improve access to a more secure and privacy-respecting Web.

    • North Korean DNS Leak reveals North Korean websites

      One of North Korea’s top level DNS servers was mis-configured today (20th September 2016) accidentally allowing global DNS zone transfers. This allowed anyone who makes a zone transfer request (AXFR) to retrieve a copy of the nation’s top level DNS data.

      [...]

      This data showed there are 28 domains configured inside North Korea, here is the list:

      airkoryo.com.kp
      cooks.org.kp
      friend.com.kp
      gnu.rep.kp
      kass.org.kp
      kcna.kp
      kiyctc.com.kp
      knic.com.kp
      koredufund.org.kp
      korelcfund.org.kp
      korfilm.com.kp
      ma.gov.kp
      masikryong.com.kp
      naenara.com.kp
      nta.gov.kp
      portal.net.kp
      rcc.net.kp
      rep.kp
      rodong.rep.kp
      ryongnamsan.edu.kp
      sdprk.org.kp
      silibank.net.kp
      star-co.net.kp
      star-di.net.kp
      star.co.kp
      star.edu.kp
      star.net.kp
      vok.rep.kp

    • Yahoo’s Three Hacks

      As a number of outlets have reported, Yahoo has announced that 500 million of its users’ accounts got hacked in 2014 by a suspected state actor.

      But that massive hack is actually one of three interesting hacks of Yahoo in recent years.

  • Defence/Aggression

    • 40 Years Ago, This Chilean Exile Warned Us About the Shock Doctrine. Then He Was Assassinated.

      In August 1976, The Nation published an essay that rocked the US political establishment, both for what it said and for who was saying it. “The ‘Chicago Boys’ in Chile: Economic ‘Freedom’s’ Awful Toll” was written by Orlando Letelier, the former right-hand man of Chilean President Salvador Allende. Earlier in the decade, Allende had appointed Letelier to a series of top-level positions in his democratically elected socialist government: ambassador to the United States (where he negotiated the terms of nationalization for several US-owned firms operating in Chile), minister of foreign affairs, and, finally, minister of defense.

      [...]

      After a powerful international campaign lobbied for Letelier’s release, the junta finally allowed him to go into exile. The 44-year-old former ambassador moved to Washington, DC; in 1976, when his Nation essay appeared, he was working at the Institute for Policy Studies (IPS), a left-wing think tank. Haunted by thoughts of his colleagues and friends still behind bars, many facing gruesome torture, Letelier used his newly recovered freedom to expose Pinochet’s crimes and to defend 
Allende’s record against the CIA propaganda machine.

    • Mario Murillo on Colombian Accord, Kevin Miller on Gender Wage Gap

      This week on CounterSpin: After more than a half century of bloody conflict that saw more than 200,000 mostly poor civilians killed, Colombia has a chance at a peace accord between the government and the FARC, the region’s oldest insurgent movement. You aren’t hearing too much about it in the press; we’ll get more from Mario Murillo, author of Colombia and the United States: War, Unrest and Destabilization.

    • Communal tension in Coimbatore after young Hindu Munnani leader hacked to death.

      A 36-year-old Hindu Munnani functionary was hacked to death by a four-member gang here, leading to tension in the district and neighboring Tirupur with the outfit calling for a bandh on Friday.

      C Sasikumar, district spokesperson of the organization, was returning home in Subramaniampalayam, in the outskirts, on a two-wheeler when the suspected Jihadi assailants chased him on motorcycles and attacked him with sickles late last night.

    • Saudi skeptics gain strength in Congress

      Lawmakers in both parties are growing more skeptical of the U.S. alliance with Saudi Arabia.

      This week, 27 senators — three Republicans and 24 Democrats — voted against a $1.15 billion arms sale to the country. That wasn’t enough to block it, but it was more votes against the deal than observers expected.

      “You are seeing more willingness to challenge the nature of the relationship, and I think that’s positive,” said Sen. Chris Murphy (D-Conn.), one of the leaders of the effort to block the arms sale. “Alliances go both ways. If you’re partner is doing things that aren’t in your interest, then you need to reserve the ability to start questioning your participation in that alliance.”

      Before now, President Obama had been seen as taking a lonely stance as the Saudi skeptic-in-chief.

      Obama angered Saudi Arabia earlier this year in an interview with The Atlantic when he referred to the country as “free riders” and suggested it is too focused on its rivalry with Iran at the expense of broader regional stability.

      Lawmakers repeatedly slammed Obama for turning his back on Saudi Arabia as he pursued the nuclear deal with Iran, the country’s traditional foe.

      But the roles have now reversed. Obama on Friday vetoed a bill that would allow families of the 9/11 victims to sue the Saudi government in court. Obama argued the bill undermine sovereign immunity and open up U.S. diplomats and military service members to legal action overseas.

    • LAVROV MAKES HISTORY: ‘Ceasefires’ were bogus, nixes future ‘unilateral measures’ [VIDEO]

      Russian Foreign Minister, Sergei Lavrov made history today at the UN’s meeting of the Security Council, declaring that future unilateral pauses couched as ‘ceasefire agreements’ are off the table. He has skillfully referred to the mounting factual evidence of the US’s continued flagrant violations on any number of points of agreement over the course of this conflict.

    • How US Propaganda Plays in Syrian War

      Manipulation of public perception has risen to a new level with the emergence of powerful social media. Multibillion-dollar corporate giants, such as Facebook, Twitter and Google, influence public perceptions, often via payments for “boosting” Facebook posts, paid promotion of Tweets, and biased results from search engines.

      Marketing and advertising companies use social media to promote their clients, but so do U.S. foreign policy managers who hire or enlist these companies to influence public perceptions to support U.S. foreign policy goals.

    • Another Kerry Rush to Judgment on Syria

      Secretary of State John Kerry has engaged in another rush to judgment blaming the Russians for an attack on a United Nations relief convoy in Syria before any thorough investigation could be conducted and thus prejudicing whatever might follow, as he did with the Syrian sarin case in 2013 and the shoot-down of Malaysia Airlines Flight 17 in 2014.

      Eager to go on the propaganda offensive – especially after a U.S. military airstrike last Saturday killed scores of Syrian soldiers who were battling the Islamic State in eastern Syria – Kerry pounced on an initial report that the attack on the convoy on Monday was an airstrike and then insisted that the Russians must have been responsible because one of their jets was supposedly in the area.

    • Turkey and the Kurdish Quandary

      Turkey’s President Recep Tayyip Erdogan has claimed that military operations against the Kurdistan Workers’ Party (PKK) will continue until “the very last rebel is killed.” What is puzzling about this statement is that after more than 30 years of violence that has claimed the lives of over 40,000 Turks and Kurds, Erdogan still believes he can solve the conflict through brutal force.

      But he is fundamentally mistaken, as the Kurds’ long historical struggle is embedded in their psyche and provides the momentum for their quest for semi-autonomy that will endure until a mutually accepted solution is found through peaceful negotiations. To understand the Kurds’ mindset, Erdogan will do well to revisit, however cursorily, their history and the hardship they have experienced since the end of World War I.

  • Environment/Energy/Wildlife/Nature

    • Dakota Access Blackout Continues on ABC, NBC News

      The Sacred Stone Camp established by the Standing Rock Sioux tribe in North Dakota has brought together thousands of demonstrators in opposition to the construction of the Dakota Access Pipeline, a 1,172-mile conduit designed to carry some 200 million barrels of crude oil per year from fracking fields in North Dakota to Southern Illinois. An unprecedented coalition of hundreds of Native American tribes has faced down attack dogs and pepper spray in defense of sacred and historic sites, irreplaceable water resources and the planet’s climate.

      The action has won the support of environmental groups, some labor activists and numerous celebrities, and has halted pipeline construction at least temporarily. The Obama administration issued a statement calling for a work stoppage and saying, “This case has highlighted the need for a serious discussion on whether there should be nationwide reform with respect to considering tribes’ views on these types of infrastructure projects.”

      Nevertheless, to this day, ABC News and NBC News have yet to broadcast a word about the pipeline struggle, according to searches of the Nexis news database.

    • Drone video from independent investigation exposes illegal of 3000 hectares

      A drone video captured the extent of burnt oil palms and the clearing of land in the western region of Indonesia. The burning of land is believed to be the cause of the haze that has blanketed Singapore, Malaysia, and Indonesia every year.

      The drone’s launch was part of an investigation by Eyes on the Forest Indonesia (EOF), a coalition of three environment groups which was established in 2004 to study the recurring forest fires.

      According to EOF, the video gave proof that 3,000 hectares of land allegedly owned by plantation company Andika Permata Sawit Lestari (APSL) were ‘deliberately burned’.

      The video can be used as an additional evidence against the company, which is facingcharges of land grabbing and operating without a proper license.

    • Climate change is not a problem for 2100, it’s here now

      It was not just at the Olympics that records were broken during the summer just past. July and August were the joint hottest months in 136 years of modern record keeping.

      There may be a familiar ring to this story. That’s because, in an unprecedented streak, every month for the past 16 has set a new global record. This year will not just break the record for the warmest year (set just last year), it will shatter it. The odds of this occurring without man-made climate change are infinitesimally small.

      Younger millennials, who will live to see a world utterly transformed by climate change, rank it as the biggest threat to their future. This is unsurprising, considering the NextGen Climate action group estimate that it will cost each 2015 graduate €160,000 in lost wealth over their lifetime. But older cohorts, especially older males, are more likely to engage in climate denial and less likely to see climate change as a threat.

      But let’s be clear: this debate is over. Climate change is not something for 2100, it is happening now in the world around us.

      The wildfires that ravaged Northern Alberta in June received considerable media attention, as did the staggering one-in-a-thousand-year rains that swamped southern Louisiana in August.

  • Finance

    • CETA To Be Signed (Again) During EU-Canada Summit In Mid-October

      European Union trade ministers at an informal meeting in Bratislava, Slovakia today agreed on the final steps to enact CETA, the Comprehensive Economic and Trade Agreement between Canada and the EU. There will be no other reopening of the text, assured EU Trade Commissioner Cecilia Malmstroem after the meeting. But ministers have agreed, according to Slovak Minister of Economy Peter Ziga, that some sensitive issues have to be straightened out in an additional annex to the CETA text.

    • EU Commission refuses to revise Canada CETA trade deal

      The European Commission has ruled that a controversial EU-Canada free trade deal – CETA – cannot be renegotiated, despite much opposition in Europe.

      “CETA is done and we will not reopen it,” said EU Trade Commissioner Cecilia Malmstrom.

      Ms Malmstrom was speaking as EU trade ministers met in Slovakia to discuss CETA and a similar deal with the US, TTIP, which has also faced criticism.

      A draft CETA deal has been agreed, but parliaments could still delay it.

    • I Worked For Wells Fargo: They Made Us Do Some Shady Sh!t

      So it looks like Wells Fargo is the latest big bank to come under fire for doing shitty, illegal things to millions of people. Federal regulators have revealed that the company’s employees created more than two million fraudulent bank and credit card accounts in order to meet quotas. 5,300 employees were fired, Wells Fargo paid a $185 million fine, and the government released statements like this absolving the executives of any responsibility.

    • Elizabeth Warren Just Gave Hillary Clinton a Big Warning

      Senator Elizabeth Warren fired an unmistakable warning shot to Hillary Clinton and her advisers on Wednesday, cautioning against appointing cabinet or administration members who are linked to Wall Street while name-checking a firm closely tied to Clinton and the Democratic Party.

      Warren’s speech, delivered at the liberal Center for American Progress Action Fund, cast the upcoming presidential election in stark economic terms. She described the tax-slashing, deregulatory approach laid out by Donald Trump and contrasted it to a laundry list of populist economic policies embraced by Hillary Clinton. Clinton has faced criticism recently for focusing too heavily on Trump’s competency and not enough on fundamental economic issues, and so Warren’s speech was well-timed and well-received.

    • NYT Promotes Protectionism in Guise of ‘Free Trade’

      The Trans-Pacific Partnership (TPP) has little to do with free trade. The trade barriers between the United States and the other countries are already very low, with few exceptions; in fact, the US already has trade deals with six of the 11 countries in the TPP. The TPP is primarily about installing a corporate-friendly structure of regulation, as well as increasing protectionist barriers in the form of stronger and longer patent and copyright and related protections. (It doesn’t matter if you and your friends like patent and copyright protection; they are still protectionism.)

      President Obama is pulling out all the stops in pushing the TPP, and it seems the New York Times has decided to abandon journalistic principles to join this effort. It reported that people in the United States favored trade in a confused article (9/21/16), which randomly flipped back and forth between the terms “trade,” “trade agreements” and “free trade.” As everyone knows, except apparently the people who work for the New York Times, these are not the same thing.

      It is hard to believe that many people in the United States would be opposed to trade. Imports and exports combined are more than a quarter of GDP. Many of the products we now import, like coffee, would either not be available at all, or extremely expensive without trade. It’s difficult to believe that many people in the United States would support autarky as an alternative to the current system.

      If people are asked about “trade agreements,” it is not clear what they think they are referring to. The United States has been involved in hundreds of trade agreements over the last seven decades. These agreements hugely reduced trade barriers between the US and the rest of the world, leading to large increases in trade and large drops in price. Of course, most of these benefits accrued before 1980, but it seems unlikely that many of the people polled on the topic would have a clear idea of the costs and benefits of the trade deals negotiated since World War II.

    • Amazon Defends Its Pricing Algorithm, But Leaves Out Billions in Sales

      Earlier this week, we reported how Amazon often makes its products look like better deals than they actually are. When the website ranks products by price that are available from Amazon and other sellers, the company excludes the cost of shipping only on the products sold by Amazon and vendors that pay the company.

      Amazon has long described itself as “Earth’s most customer-centric company.” But it declined to answer our questions about why the detailed Amazon’s product rankings excluded shipping costs only for itself and its paid partners.

    • Naked Shorts Can’t Stay Naked Forever

      Who engages in massive trades in penny stocks on the industry’s own “chill list”? And what happens when you sell a stock you don’t have? Victimized investor Chris DiIorio finds the answers in plain sight and wonders why no one else seems to care.

    • Accenture Touts Need For Blockchain Editing Tool

      Editable blockchain controversery, but Accenture insists it would only be used under ‘extraordinary circumstances’

      One of the core principles of Blockchain technology has potentially been undermined by the creation of an editing tool.

      The company responsible however, Accenture, says edits would only be carried out “under extraordinary circumstances to resolve human errors, accommodate legal and regulatory requirements, and address mischief and other issues, while preserving key cryptographic features.”

    • Cherry-Picking Trade Polls to Pave Way for a TPP Flip-Flop

      But when you look at the actual numbers from the report, you find that when people were asked about TPP specifically, a plurality opposed it, 38–35 percent. When asked to rate their feelings about TPP, 27 percent gave unfavorable ratings, while only 18 percent were favorable. The polling also found that people found anti-TPP arguments much more convincing than pro-TPP arguments (which suggests, I would note, that they haven’t been exposed to as many critiques of TPP in media accounts).

      [...]

      Calmes concluded her story by suggesting that either Hillary Clinton or Donald Trump would likely be more supportive of the TPP than they have been on the campaign trail, citing Atlanta Mayor Kasim Reed: “People who run for office often campaign against trade, but people who become president of the United States end up supporting trade.”

      If that happens, the New York Times will have paved the way for such a flip-flop—having assured us that that’s what we really want anyway.

    • Education Department Terminates Agency That Allowed Predatory For-profit Colleges to Thrive

      The Education Department announced today that it is stripping the powers of one of the nation’s largest accreditors of for-profit schools.

      The Accrediting Council for Independent Colleges and Schools, or ACICS, has been under scrutiny for continuing to accredit colleges whose students had strikingly poor outcomes.

      As ProPublica has reported, schools accredited by the agency on average have the lowest graduation rates in the country and their students have the lowest loan repayment rates.

      Accreditors are supposed to ensure college quality, and their seal of approval gives schools access to billions of federal student aid dollars.

  • AstroTurf/Lobbying/Politics

    • Which Voters Show Up When States Allow Early Voting?

      One-third of voters took advantage of early voting options in 2012. But does so-called convenience voting increase turnout overall and minority turnout in particular?

    • Obama used a pseudonym in emails with Clinton, FBI documents reveal

      President Barack Obama used a pseudonym in email communications with Hillary Clinton and others, according to FBI records made public Friday.

      The disclosure came as the FBI released its second batch of documents from its investigation into Clinton’s private email server during her tenure as secretary of state.

      The 189 pages the bureau released includes interviews with some of Clinton’s closest aides, such as Huma Abedin and Cheryl Mills; senior State Department officials; and even Marcel Lazar, better known as the Romanian hacker “Guccifer.”

      In an April 5, 2016 interview with the FBI, Abedin was shown an email exchange between Clinton and Obama, but the longtime Clinton aide did not recognize the name of the sender.

      “Once informed that the sender’s name is believed to be pseudonym used by the president, Abedin exclaimed: ‘How is this not classified?’” the report says. “Abedin then expressed her amazement at the president’s use of a pseudonym and asked if she could have a copy of the email.”

    • The mystery of Donald Trump’s man in Moscow

      In March, in a bold “Oh yeah?” moment during an interview with the Washington Post’s editorial board, Donald Trump took the paper’s dare and revealed, then and there, his very short list of foreign policy advisers. There were just five, though he said, “I have quite a few more.” The list was a head-scratcher, a random assortment of obscure and questionable pundits. One of the names, offered without elaboration, was, “Carter Page, PhD.”

      Who?

      Reporters quickly Googling found that Page is the founder and managing partner of an investment fund called Global Energy Capital, and that he claims to have years of experience investing in Russia and the energy sector. As for his connection to Trump, when Page was reached for comment by the New York Times the day after Trump’s big reveal, he said he had been sending policy memos to the campaign and the paper said he “will be advising Mr. Trump on energy policy and Russia.”

    • The TV Interview That Haunts Hillary Clinton

      Now, as she gets closer to the presidency than any woman ever has, she is struggling with unfavorable ratings that would be historically high if it weren’t for her opponent’s being even higher. There are substantive reasons, as with any politician with a long public record, but underlying them are the same frictions that came to the fore in that 60 Minutes interview—sentiments that, fair or not, have grown only more pronounced with Clinton’s perennial, awkward and generally unsuccessful efforts to re-introduce herself, to redefine herself.

    • Labour leadership: Jeremy Corbyn defeats Owen Smith

      Jeremy Corbyn has been re-elected as Labour leader, comfortably defeating his challenger Owen Smith.

      Mr Corbyn won 61.8% of the total vote, a larger margin of victory than last year.

      He vowed to bring the party back together and “make Labour the engine of progress for our country”, insisting the party could win the next election.

    • Yvette Cooper reveals Twitter user threatened to behead her as she demands Corbyn takes stronger action against abuse

      The former Labour Cabinet minister, Yvette Cooper, has revealed how she has been subjected to death threats online, with one abuser telling her she should be “beheaded”.

      Writing in The Sunday Telegraph, Ms Cooper said it was an example of the increasingly vicious internet abuse that Labour MPs suffer and demanded that Jeremy Corbyn act to stamp it out.

      Mr Corbyn, who was last night re-elected as Labour leader by another landslide, was accused of failing to stop bullying and abuse by a minority of Labour members, despite being warned about it a year ago.

    • With Sanders not an option, some millennials going third-party

      Clinton’s 21-point lead among 18-34-year-olds in a two-way matchup against Trump shrinks to 5 points in a four-way race with Johnson and Stein, a Sept. 14 Quinnipiac University poll showed. And in a McClatchy-Marist national poll of likely voters released Friday, third-party candidates lopped 10 points off Clinton’s 38-point lead over Trump among 18-29-year-olds. In that age group, Clinton gets 47%, Trump and Johnson get 19% each, and Stein gets 13%.

    • Clinton used private Gmail as secretary of state

      Hillary Clinton used a previously undisclosed Gmail account during her tenure as secretary of state, as revealed in summaries of interviews released by the FBI on Friday.

      According to one unnamed former aide, the Gmail account was set up in 2010 after he purchased an iPad for Clinton so that she could read “articles of interest” sent to her.

      “[NAME REDACTED] stated that she could not view the articles on her Blackberry and the iPad and email account were set up as a way to test a different delivery method,” the FBI’s account of the interview reads. The unnamed aide said he was “fairly sure” the Gmail account wasn’t used after its initial setup, however.

      The aide also recounted how, “after he gave the Secretary the iPad, the Secretary fell asleep holding the unopened packaging in her arms.”

      “This struck [NAME REDACTED] as funny because, in contrast, he would not be able to sleep if he had just received a new iPad,” the summary reads. “He noted that this episode was foreshadowing for how little she would use the iPad.”

    • Top Earners Back Clinton in Bloomberg Poll After Decades With GOP

      Higher-income voters are narrowly supporting Democratic presidential nominee Hillary Clinton in another sign of how the 2016 presidential race is fracturing traditional voting blocs.

      In a two-way contest, Clinton beats Republican Donald Trump 46 percent to 42 percent among likely voters with annual household incomes of $100,000 or more, the latest Purple Slice online poll for Bloomberg Politics shows.

      The findings may sound an alarm for Trump because they show he’s failing, at least so far, to dominate among a group of voters who historically have supported Republicans, including Mitt Romney in 2012. In that election, the group made up 28 percent of the electorate and backed Romney over President Barack Obama by 10 percentage points, exit polls show.

    • Are US Presidential Debates Worthless — or Less?

      Let’s call the whole thing off. Not the election, although if we only had a magic reset button we could pretend this sorry spectacle never happened and start all over. No, we mean the presidential debates — which, if the present format and moderators remain as they are, threaten an effect on democracy more like Leopold and Loeb than Lincoln and Douglas.

      We had a humiliating sneak preview Sept. 7, when NBC’s celebrity interviewer Matt Lauer hosted a one-hour “Commander-in-Chief Forum” in which Hillary Clinton and Donald Trump spoke with Lauer from the same stage but in separate interviews.

  • Censorship/Free Speech

    • New Book Covers Hot Button Topics Of Censorship And Moral Panic

      A new book from author Jerry Barnett was recently published and is currently available as a digital download or in physical paperback form. The name of the book? Porn Panic!: Sex and Censorship In The UK.

      Now I know what you’re all thinking “This has nothing to do with video games!” and you’re absolutely right, but some readers suggested for Barnett’s book to get a little face time here on the site and since it relates directly with the recent topic of heavy censorship both from the establishment and from party ideologues, it’s hard to dismiss it.

      The book is actually about the recent rise in moral panics being spread throughout the media, as well as the prominent attacks on how we view sexuality in today’s society. It’s not too far removed from the current topic of discussion in gaming regarding various risque video games dealing with some sexual material that have been heavily censored or outright banned recently, such as Meiq or Criminal Girls 2, amongst many others.

    • YouTube “Heroes” Program Makes Censorship Into a Role-Playing Game

      YouTube is shamelessly incentivizing censorship by involving its users in a new program called “YouTube Heroes,” wherein creators and consumers are awarded points and exclusive perks for reporting negative videos and policing negative community content.

      [...]

      YouTube Heroes comes as no surprise to anyone who’s been paying attention to Google or its subsidiaries in recent months, as many of those on its “Google Ideas” council have been collaborating to defeat online trolls in the public eye. Montage and other Google apps have enabled the platform the perform analysis on a massive scale without individually watching each video and assessing its content. There’s even been talk of crowd-sourcing video moderation and allowing artificial intelligence to weed out trolls who target people such as Anita Sarkeesian or Zoe Quinn.

    • More online police possible in fight against hate speech

      Finland’s Interior Minister wants the police to be more proactive in taking on hate speech online. Paula Risikko says that police leaders should consider new ways of working to uncover, investigate and prevent extremist groups operating online.

      In addition, she says that the Justice and Interior Ministries should jointly consider if legislative changes are needed.

      “Under the current legislation it seems difficult to investigate the background and motives of figures involved in hate speech, and to intervene,” said Risikko in a statement. “The legislation is also fragmented.”

      On Friday Helsinki-based police officer Jarmo Heinonen, who works with online offences, told Yle that the law needs to be clarified. At present it does not define clearly what constitutes hate speech and what does not.

    • The Good, The Bad And The Misunderstood Of ‘YouTube Heroes’

      Whether or not you watched the video, let’s discuss its points. Firstly, though my initial instinct was that moderation was the primary goal of YouTube Heroes, the rewards make it clear this isn’t the case: adding closed captioning or translated subtitles to videos is by far the most efficient way to rack up points. Internationalizing its huge library of videos, and making them accessible, is a big deal for YouTube and it makes sense that this is the main thrust of the program. In this sense (and perhaps this sense alone) it’s a great idea.

      There are still three main complaints, each of a different nature: one is based on a complete misunderstanding, one is legitimate but likely to never come to fruition, and one (yes, the moderation) represents a genuine concern, at least in part.

      First, the misunderstanding: the graphics and vague language in YouTube’s promotional video give the distinct impression that in addition to mass-flagging videos, ‘Heroes’ will gain the ability to moderate comments. Not only does this sound ripe for abuse (the YouTube commenting community is frequently toxic and hardly above gaming the system), it also irritated content creators who (unlike on many similar platforms) are unable to even designate their own community moderators for their YouTube channels. But: it isn’t true. Heroes only gain the ability to moderate posts on a YouTube creators forum that is barely-known and comically hard to find (watch the video to see what I mean). So let’s put that one aside.

    • Quick Take: Censorship and Comics

      Library technician Katherine Keller is fighting censorship of comic books and graphic novels through her work with the Comic Book Legal Defense Fund.

    • How Iran Is Building Its Censorship-Friendly Domestic Internet

      In the early spring of 2011, Iranian authorities made a series of bombastic public statements about government plans to strengthen their control over information. What emerged is the enduring specter of a “halal Internet” — a network cleansed of immorality and disconnected from the global Internet.

      Over the next several months, the political and religious establishment began to aggressively challenge the morality and security of the Internet, calling instead for a network that promoted the strict religious values promoted by the Islamic Republic. The then-Deputy Vice President for Economic Affairs described the vision for a national Internet as “a genuinely halal network, aimed at Muslims on an ethical and moral level.”

    • Censorship and healthcare’s redactable blockchain trapdoor

      Censorship has been explained actions taken in the best interests of the public. A benevolent public concern for morality. China’s censorship of WeChat for Uber. The decision by India’s film censor to cut 94 scenes from a movie about Punjab’s drug problem. Michelangelo’s 1565 “The Last Judgement.”

      Freedom of speech is the right to articulate one’s opinions and ideas without fear of government retaliation or censorship, or societal sanction. The right to be heard.

      Does a network hold trust if all voices are not heard? Are we talking about the ability to edit a transaction or present proof-of-trust, of immutability? The concepts are mutually exclusive.

    • Mexico Catholic Church Claims Censorship Over Marriage Equality Opposition

      A spokesman for Mexico’s Catholic Church claims that clergy members are being “censored” over their opposition to marriage equality.

      Father Hugo Valdemar, a representative of the Archdiocese of Mexico, believes that Conapred — the country’s council to prevent discrimination — is persecuting the church, broadcaster Telesur reports. Following nationwide anti-marriage equality protests that rocked the Latin American nation, Conapred advised church officials to avoid speaking publicly about the demonstrations.

      “There is persecution against the church,” Valdemar said in a press release. He warned of a “gay dictatorship” that threatening to take over Mexico.

    • West Bengal: Blogger arrested for criticising Islam on social media

      A blogger from West Bengal, Tarak Biswas was arrested by police for allegedly committing blasphemy against Islam. Tarak Biswas was arrested for writing critical post on Islam on social media. The arrest of the freethinker blogger came after a local Trinamool Congress leader Sanaullah Khan registered a first information report with the Howrah Police against for mocking at Islam. Tarak Biswas was charged under sections 295 A (insulting religion), 298 (hurt religious feelings) of the Indian Penal Code as well section 66, 67 and 67A of the Information Technology Act (posting and sending offensive messages).

    • Facebook is expanding its campaign to combat hate speech

      Facebook is expanding its efforts to combat online hate speech, according to a report from The Wall Street Journal. The company’s Online Civil Courage Initiative, announced in January, will transition from a pilot phase to offer advertising credits and marketing advice to a wider range of groups that counteract extremist messaging. The Berlin-based program has so far focused its efforts on France, Germany, and the UK.

      The announcement marks Facebook’s latest effort to combat propaganda from terrorist organizations and far-right groups. Facebook, Twitter, Google, and other major web companies have faced increased pressure to escalate anti-hate speech campaigns, and to more swiftly remove propaganda from groups like ISIS and far-right extremists. While the companies have touted an increase in takedowns of extremist content, the Online Civil Courage Initiative is focused on so-called counter-messaging, which seeks to discredit hate speech and propaganda. A Google-funded study published over the summer found that such campaigns can be an effective means of sparking debate online.

    • Judge Claims Facebook Not Taking Terrorism Threat Seriously

      A federal judge slammed Facebook Inc., saying the social media giant might not be doing enough to deter terrorists from using its platform.

      U.S. District Judge Nicholas Garaufis in Brooklyn, New York, also accused Facebook’s lawyers — by sending a first-year associate to a hearing — of not taking seriously lawsuits with implications of international terrorism and the murder of innocent people.

    • Facebook Plans to Expand Program to Fight Against Online Hate-Speech

      Facebook Inc. plans to broaden a program that gives free advertising to online activists who fight back against online hate speech, the latest expansion of tech-industry efforts to undermine internet propaganda from Islamist terrorists and far-right radicals.

    • Spain fails to turn page on Franco’s legacy of censorship

      In the case of Hemingway’s Across the River and Into the Trees, even recent Spanish editions include a string of changes made by the censors.

    • Telegraph’s managing editor resigns from Nashua newspaper over ‘censorship’

      A newspaper known for promoting transparency has lost its executive managing editor, Roger Carroll, who resigned after a dispute over what he believes was censorship.

      Carroll said he recently resigned from his position with The Telegraph of Nashua after concerns were raised about an article published in the paper that detailed the organization’s future move from its current location in Hudson to Main Street in Nashua.

      He confirmed that after the article was published, higher-ups at the newspaper asked that the purchase price of the downtown building, along with the assessment value, be removed from the story for the online version.

    • Telegraph editor resigns over censorship of story about downtown Nashua move
    • DA petitions against Censorship Bill
    • FPB’s Bill could ruin online gaming in South Africa
    • How South Africans are fighting back against the Internet Censorship Bill
    • Facebook Disables Accounts of Palestinian Editors
    • Evidence of Feared Israel-Led Censorship as Facebook Bans Palestinian Editors
  • Privacy/Surveillance

    • Hillary Claims to Support Targeted Spying But Advisor Matt Olsen Was Champion of Bulk Spying

      It appalls me that Hillary is getting advice from Mike Morell, who has clearly engaged in stupid propaganda both for her and the CIA (though he also participated in the Presidents Review Group that advocated far more reform than Obama has adopted). I take more comfort knowing Mary DeRosa is in the mix.

      But I do wonder how you can take advice from Matt Olsen — who was instrumental in a lot of our current spying programs — and claim to adopt a balanced approach.

      Olsen was the DOJ lawyer who oversaw the Yahoo challenge to PRISM in 2007 and 2008. He did two things of note. First, he withheld information from the FISC until forced to turn it over, not even offering up details about how the government had completely restructured PRISM during the course of Yahoo’s challenge, and underplaying details of how US person metadata is used to select foreign targets. He’s also the guy who threatened Yahoo with $250,000 a day fines for appealing the FISC decision.

      Olsen was a key player in filings on the NSA violations in early 2009, presiding over what I believe to be grossly misleading claims about the intent and knowledge NSA had about the phone and Internet dragnets. Basically, working closely with Keith Alexander, he hid the fact that NSA had basically willfully treated FISA-collected data under the more lenient protection regime of EO 12333.

    • Snowden-Slamming Lawmakers Accused of Embarrassing Errors in Report

      A three-time Pulitzer Prize-winning journalist says the House Intelligence Committee made surprisingly erroneous claims in the three-page executive summary of a report that denounces exiled whistleblower Edward Snowden.

      The summary asserts that Snowden caused “tremendous damage to national security” and is “a serial exaggerator and fabricator.” The full and unreleased report, 36 pages, was unanimously adopted last week after two years of work, says a committee release.

      Barton Gellman, the former Washington Post journalist who first reported some of the most explosive 2013 Snowden revelations about mass surveillance, says two details in the committee summary are demonstrably false and others arguably so.

      “A close review of Snowden’s official employment records and submissions reveals a pattern of intentional lying,” the committee summary says before detailing alleged lies.

      The first example offered by lawmakers: “He claimed to have left Army basic training because of broken legs when in fact he washed out because of shin splints.”

      Gellman writes in an article posted Friday on the Century Foundation’s website that the sentence “is verifiably false for anyone who, as the committee asserts it did, performs a ‘close review of Snowden’s official employment records.’

    • House Intel Claim that Snowden Had Whistleblower Protection Is False and Misleading

      In a brief 3-page report dated September 15, 2016, the House Intelligence Committee concluded that Edward Snowden “was not a whistleblower” because there were “laws and regulations in effect at the time” that “afforded him protection” and he failed to exercise those whistleblower rights. The Committee report specifically cited the Intelligence Community Whistleblower Protection Act of 1998 (IC WPA) that does permit employees, like Snowden, to make disclosures of wrongdoing to Congress if certain other conditions are met.

      However, the House Intel Committee failed to state the obvious. That the IC WPA contains no whistleblower protections whatsoever if an employee were to exercise the right to disclose information about agency wrongdoing to Congress.

    • Department of Homeless Security

      For example, the city of New York boasts it has more than 8,000 cameras pointed at Manhattan streets. The NYPD calls it the city’s “Ring of Steel.”

      Images from those cameras feed into the Lower Manhattan Security Coordination Center. Officers there also keep track of biological, chemical, radiation, and shot-spotter sensors (which detect gunfire), throughout the city.

      Data from the cameras and the detectors, as well as 911 calls, license plate readers, and crime databases is fed into a map-based Domain Awareness System, which analyzes information. The NYPD also has a “Dashboard” system that receives alerts on unattended packages, stolen vehicles crossing tunnels and bridges, and suspicious odors of hazardous materials.

      In addition, the Lower Manhattan Center maintains a “vehicle of interest” listing to track vehicles utilizing license plate readers, and can go back 30 days to find suspect vehicles. More than 200 license plate readers within the city triangulate information with GPS systems.

      That is a helluva lot of watching, all keeping us safe. Except it didn’t.

    • A Walking Tour of New York’s Massive Surveillance Network

      Earlier this month, on the 15th anniversary of the 9/11 attacks, the lower tip of Manhattan was thronged with soldiers in uniform, firefighters marching with photos of lost friends pinned to their backpacks, and tourists bumbling around the new mall at the World Trade Center. Firetrucks and police cars ringed Zuccotti Park and white ribbons adorned the iron fence around the churchyard on Broadway. Trash cans were closed up, with signs announcing “temporary security lockdown.”

      So it felt a bit risky to be climbing up a street pole on Wall Street to closely inspect a microwave radar sensor, or to be lingering under a police camera, pointing and gesturing at the wires and antenna connected to it. Yet it was also entirely appropriate to be doing just that, especially in the company of Ingrid Burrington, author of the new book “Networks of New York: An Illustrated Field Guide to Urban Internet Infrastructure,” which points out that many of the city’s communications and surveillance programs were conceived and funded in response to the attacks.

    • The price of connection: ‘surveillance capitalism’

      Imagine, if you can, a period long before today’s internet-based connectivity. Imagine that, in that distant time, the populations of every country were offered a new plan. The plan would involve linking up every space of social interaction, most sites of work, a large proportion of private moments of reflection, and a significant proportion of family interactions.

      Once linked up miraculously, all these diverse spaces of human life would be transposed onto a single seamless plane of archiving, monitoring and processing.

      This link-up, those populations are told, would have some remarkable consequences. Each one of those once separate sites could be connectable in real time to every other. The contents of what went on there would become linkable to and from everywhere.

    • The Justice Department’s Refusal to Prosecute CIA for Illegal Surveillance

      Had the Justice Department decided to prosecute, we would be looking at a very different world today. Even a failed prosecution would have sent the message that the potential for legal consequences was there. Instead, it reinforced the attitude of some in national security circles that they didn’t have to worry about the legal ramifications – only a public relations “flap.”

      It’s a mistake the Justice Department seems to keep making – but it doesn’t have to.

      Below, you can read the Report of the Department of Justice Concerning Its Investigation and Prosecutorial Decisions with Respect to Central Intelligence Agency Mail Opening Activities in the United States.

    • Indian Students Score a Partial Win in Facebook Privacy Dispute

      Two Indian students scored a partial victory over Facebook Inc. in a closely watched legal battle over privacy, though they failed to get the internet giant to reverse policies they say threaten the rights of millions of users.

      WhatsApp revised its privacy policy last month to share data with owner Facebook and allow targeted ads and messages from businesses, laying the groundwork for the free messaging service to begin making money. Students Karmanya Singh Sareen and Shreya Sethi, 19 and 22 respectively, then filed a public-interest litigation — akin to a class action — seeking to block those changes. They wanted a rollback of those updates, in a lawsuit that’s attracted attention as a test case for how legal authorities around the world may respond.

    • Don’t use Google Allo
    • NSA’s Failure to Report Shadow Broker Vulnerabilities Underscores Need for Oversight
    • Did Russia Hack The NSA? Maybe Not
    • NSA hacking tools were likely stolen after an operative accidentally left them on a computer
    • NSA operative might have accidentally leaked its hacking tools
    • Shadow Broker security leak was probably down to NSA error
    • The NSA’s Hubris and the Shadow Brokers 0-day
    • One NSA Employee’s Mistake Caused The Worst Leak Since Snowden
    • Probe of leaked US NSA hacking tools examines operative’s ‘mistake’
    • Former NSA Employee’s Mistake May Have Led to Hack
    • Report: NSA operator left source code exposed before breach
    • Woman sues parents for sharing embarrassing childhood photos

      She claims that since 2009 they have made her life a misery by constantly posting hundreds of photos of her, including embarrassing and intimate images from her childhood.

      Legal expert Michael Rami was quoted by Austrian media as saying he believes she has a good chance of winning in court.

      The shared images include baby pictures of her having her nappy changed and later potty training pictures.

      “They knew no shame and no limit – and didn’t care whether it was a picture of me sitting on the toilet or lying naked in my cot – every stage was photographed and then made public,” the 18-year-old said. The photos were shared on Facebook with her parents’ 700 friends.

      Despite her requests, they have refused to delete the photos – prompting her to sue them. “I’m tired of not being taken seriously by my parents”, she said. Her father believes that since he took the photos he has the right to publish the images.

      Rami says that if it can be proven that the images have violated her rights to a personal life, then her parents may lose the case. This is the first case of its kind in Austria, but he says that based on similar cases abroad the girl’s parents may have to pay some financial compensation for her pain and suffering, and will also be liable for her legal costs.

      The case will be heard in November – and if the parents lose this could have repercussions for Austrians who post countless images of their children on social media without their consent.

    • Austrian Teenager Sues Parents For Posting Pictures From Her Childhood To Facebook

      When we talk about young people filing lawsuits over “oversharing” of information and/or media on social media sites, schools are typically the targets of the suits. Inevitably, whether school personnel originally sought access to a student’s social media accounts for good intentions or simply to be a slut-shaming dick, the contents within the accounts are then weaponized for humiliation purposes.

      But a recent lawsuit filed by an eighteen year old woman in Austria must have parents the world over wincing. At issue wasn’t some random person or school official attempting to shame the girl. It was just her parents’ sharing photos of a family member and now they face a lawsuit.

  • Civil Rights/Policing

    • Police seize Montreal reporter’s computer to find source for story

      A Montreal journalist whose computer was seized by police after reporting on the alleged abusive behaviour of a judge did nothing wrong and broke no laws, said his managing editor on Thursday.

      Provincial police seized Journal de Montreal reporter Michael Nguyen’s computer at the behest of Quebec’s judicial council on Wednesday at the offices of the tabloid newspaper.

      Managing Editor George Kalogerakis said Thursday the search warrant indicated the council suspected Nguyen illegally accessed its website for details about a complaint against a Quebec Court judge.

      “I can tell you that our reporter did not break any laws to get his story,” Kalogerakis said. “We do not break laws at the Journal. We will contest the validity of the search warrant as far as we can.”

      Nguyen reported in the newspaper last June that judge Suzanne Vadboncur allegedly hurled insults and acted abusively towards constables after a Christmas party in December at the Montreal courthouse.

    • The Body Count Rises: A Call for International Oversight of U.S. Police Killings

      The police killing of Keith Scott in Charlotte is simply the latest evidence that the United States is fundamentally unable to protect communities from state-sanctioned violence. Therefore, I’m calling for an international response from agencies designed to monitor and hold accountable those responsible for human rights violations around the world.

      While the media tends to see each of these incidents in a vacuum, the bigger picture underscores the need for oversight and action from another source: According to a comprehensive database published by The Guardian entitled The Counted: People Killed by Police in the U.S., law enforcement has killed 791 people in 2016 alone. This is a staggering and unacceptable figure. Only 13 police officers have been convicted of murder or manslaughter since 2005, in spite of the abundance of cell phone and police videos that suggest a much higher murder rate.

    • The Counted: tracking people killed by police in the United States
    • DOJ Tells Forensic Experts To Stop Overstating The ‘Scientific Certainty’ Of Presented Evidence

      The DOJ is finally addressing some long-ignored problems with the forensic evidence its prosecutors rely on. For two decades, FBI forensics experts handed out flawed testimony in hundreds of criminal cases, routinely overstating the certainty of conclusions reached by forensic examination. Of those cases, 28 ended in death penalty verdicts.

      An earlier attempt to address issues with flawed science and flawed testimony swiftly ran aground. Federal judge Jed S. Rakoff very publicly resigned from a committee formed to examine these issues after he was informed by the attorney general’s office that he wasn’t actually supposed to be examining these issues.

    • NYPD Says Releasing Basic Stingray Contract Info Will Result In A Supercriminal Apocalypse

      Soghoian also points out that the release of other information would similarly have zero effect on the devices’ capabilities. Because they spoof cell towers, it does criminals no good to know how many the NYPD has or even where they tend to deploy them. A cellphone can’t tell it’s connected to a BS “tower.” And just because the NYPD may be more likely to deploy them in certain areas does not guarantee that avoiding those areas will allow criminals to avoid detection.

    • NYPD Says Software Built To Track Seized Property Can’t Actually Do The One Thing It’s Supposed To Do

      Where accountability is needed most, it almost always seems to go missing. Asset forfeiture — in multiple, mostly-nefarious forms — is a law enforcement tool seemingly handcrafted for abuse and exploitation. When the NYPD isn’t seizing cash and cars simply because Officer Smith thought he spotted a fleck of marijuana somewhere in a three-mile radius, it’s taking ownership of people’s personal belongings (phones, cash, etc.) simply because they happened to be in their pockets when they were arrested.

      The NYPD’s inability to quantify its sketchy takings isn’t surprising. There’s nothing to be gained from keeping a tracking system like this in working order. The more data the NYPD can provide to overseers, FOIL-wielding citizens, and meddling defense lawyers, the more likely it is that someone will uncover abuse of the forfeiture process.

    • NYPD can’t count cash they’ve seized because it would crash computers
    • Cop To Court: This Normal Behavior I Literally Observe All The Time Is Suspicious Behavior Justifying A Traffic Stop

      Carlos Velazquez was pulled over by Officer Ken Scott, a “traffic investigator” patrolling the Ft. Bragg military base in North Carolina. Scott observed Velasquez make a right-hand turn at a stop sign, then reverse course when he encountered a gate preventing traffic from entering the Ft. Bragg Special Operations Compound. The stop resulted in the search of the vehicle and, eventually, the discovery of illegal drugs.

      Velazquez moved to suppress the evidence, arguing that the stop was suspicionless. The government disagreed, but Scott’s own testimony indicates it was a suspicionless stop. Scott claimed the stop was justified because he believed Velazquez was “intoxicated or lost.” That last part Scott himself ignored, even during his testimony as the government’s sole witness. The actions Scott viewed as “suspicious” during his justification of the traffic stop were also actions Scott had witnessed numerous times while patrolling the area around the military base.

    • Cops pepper-spray 15-year-old girl who fell off her bike

      This is very sad and infuriating. A 15-year-old girl from Hagerstown, Maryland was riding her bike and collided with a car. When police arrived they told her an ambulance was going to take her to the hospital. She didn’t want to go. She got back on her bike, but before she could get away, an officer grabbed her from behind. The next thing you know, she was roughed up, cuffed, put in the back of a patrol car, and then pepper sprayed. Instead of taking her to the hospital, the officers took her to the police station for interrogation.

      The girl was black, and the police officers were white. It made me sick to watch this video. She’d just been in a bad accident, flew 15 feet through the air, and was knocked out. The police were cold, harsh, and violent with her. They kept aggressively shouting at her “Stop!” and “What’s your name!” Imagine your own child suffering a head injury and then being treated like this. Her frightened shrieks are heartwrenching.

    • Cops Pepper-Spray Girl Who Fell Off Bike

      A 15-year-old girl crashed into a car and tried to refuse medical care, which Maryland police said is an arrestable offense so they roughed her up and took her away.

    • Congo’s Female Tech Activists Risk Violence, Jail, and Rape to Speak Out

      In the dusty yard of a youth centre, Christiane Binja posed for a portrait in front of a colourful mural.

      “Take my picture with this strong African woman,” said the lawyer and women’s rights activist, smiling for the camera.

      Activism is a dangerous business in the eastern province of North Kivu in the Democratic Republic of the Congo (DRC). Between violent rebel groups and government crackdowns, young people challenging the status quo risk harassment, violence, jail time, and even death. Sexual violence—particularly rape—is another punishment reserved almost exclusively for female activists.

      Despite the danger, Binja is undeterred. The 29-year-old loves her province and is determined to see lasting peace in her lifetime. Her goal: empower female leaders to spread their message of positive change using technology.

    • Naureckas to AlterNet: ‘Treat Police Statements as Claims’

      Writing about the protests over the killing of Keith Lamont Scott by Charlotte, N.C., police, AlterNet‘s Sarah Lazare (9/22/16) quoted FAIR’s Jim Naureckas on the need to be skeptical about information coming from police…

    • Four arrested over Gothenburg riots

      Four people have been arrested in connection with riots in a Gothenburg suburb this week.

      Two police officers were injured after a green laser was pointed at them and the window of a police car was shattered by rocks being thrown at officers during riots, involving around 15-20 youths, in the Bergsjön area of Sweden’s second-biggest city on Wednesday night.

      A bystander also received minor injuries after being hit by rocks in the back and hand. He called an ambulance which was not able to reach the scene because of the disturbances.

      Four cars were set on fire in the area on the night, said police.

      Four people have so far been arrested by a prosecutor in connection with the riots, including three men aged 18-25 who were seized overnight, said Gothenburg police on Friday, adding more were set to be questioned.

    • De Lima on UN probe don’ts: Censorship

      Embattled Sen. Leila de Lima scored the government on Saturday for imposing restrictions on the United Nations and other investigators from international bodies it plans to invite to check on President Duterte’s war on drugs that has left over 3,000 suspects dead so far.

      De Lima said the administration’s conditions betrayed the intent of what are supposed to be independent investigations into the killings. She said the Department of Foreign Affairs’ (DFA) restrictions were tantamount to “censorship and control.”

    • De Lima questions ground rules for UN visit
    • De Lima questions parameters on UN probe
    • Duterte Lets The World Know What He Thinks Of The EU
    • Duterte tells De Lima, Critics: My mouth is not the problem
    • Legaspi: What is the truth?
    • Duterte under anti-drug investigation

      “Opposition to an impartial investigation into these killings only intensifies the spotlight on Duterte and his administration’s disregard for basic human rights protections for all Filipinos”.

      President Duterte invites the European Union to consider that even if accusations against him are true, those whom he killed had killed more.

      Since his election, 3,000 have been reportedly killed in Duterte’s new national drug war.

      Explaining why he was “bullshitting” the European body, Mr. Duterte said on Wednesday he took offense because he felt he was being unfairly reprimanded.

      Duterte said Saturday he did not realize the severity of the problem until he became president. It’s likely the panel will back off; de Lima’s replacement, Senator Richard Gordon, is an ally of the president.

      Bank robber Herbert Colangco told Congress he had paid 3 million pesos ($62,637) a month since October 2013 to De Lima, then justice secretary, to let him hold concerts and sell beer to inmates.

      The statement from the President came after EU Parliament passed a five-page resolution last week urging the Philippines “to put an end to the current wave of extrajudicial executions and killings” of individual involved in illegal drugs.

    • ‘He doesn’t have a gun!’ Keith Scott’s wife releases footage of fatal shooting (VIDEO)

      Keith Scott’s family has released a video of police officers fatally shooting him that was recorded by his wife, who was talking to police from a distance. It was released to NBC News after law enforcement once again refused to release their footage.

      Despite law enforcement’s refusal to release any footage, Scott’s family made the video recorded by his wife public.

    • More Cops Will Worsen, Not Help, Chicago’s Violence Problem

      So the Chicago is going to hire yet more cops. Five hundred more. Yet more, you say? Yes – the city already almost leads the nation in its level of sworn officers, and has got precious little to show for it.

      When politicians say we need more police, from Bill Clinton’s 1990s call for 100,000 more cops, to the 2012 Chicago mayoral election, a certain amount of fact-free electioneering is expected.

      But when Crain’s Chicago Business’s Greg Hinz is joined by his editorial board in this fact-free nonsense, we’ve reached a new low in the civic discussion about how to save more lives in our city. Like the mass incarceration boom of the 1990s, the City is escalating a disastrous trend which our communities (and wallets) will spend many years trying to extricate ourselves from.

    • CIA Torture Whistleblower: ‘Quest for Peace Must Be Part of Election’

      The CIA agent who was jailed for blowing the whistle on the United States’ illegal torture program has made a statement about what the nation’s electorate must demand from White House hopefuls this election season.

      The whistleblower, John Kiriakou, was sentenced to 30 months in prison in 2013 after pleading guilty to releasing the name of an officer implicated in a CIA torture program to the media and violating the Intelligence Identities Protection Act.

      “Our country is in crisis, whether it is because of our apparently seamless escalation into a permanent wartime economy, our inability to wage peace in the Middle East and South Asia, or our national compulsion to prosecute and humiliate national security whistleblowers,” he said in a statement.

    • Chelsea Manning Sentenced to Solitary Confinement for Suicide Attempt

      U.S. Army whistleblower Chelsea Manning has been sentenced to 14 days in solitary confinement — punishment the U.N. recognizes as torture — for charges related to her suicide attempt in July, and for possession of an unmarked book in her cell.

      Half of her 14-day punishment was “suspended,” meaning it can be reinstated later, so Manning now faces seven days in isolation. It is unclear when Manning’s sentence will begin.

      According to a dictated statement from Manning, once she receives notification of her punishment in writing, she will have 15 days to appeal it.

      At a four-hour disciplinary hearing Thursday, at which Manning was not allowed a lawyer, Manning was found guilty of “conduct that threatens,” broadly defined as “any conduct which interferes with the orderly running, safety, good order and discipline, or security of the facility.”

  • Internet Policy/Net Neutrality

    • Arguments Over Internet Governance Transition Get Even More Stupid

      First, the plan does not hand over control to Russia, China and Iran — and keeping IANA under the Commerce Dept. makes it A LOT MORE LIKELY that that coalition of countries is able to grab control of the IANA functions from ICANN and the US. But, uh, even more importantly, claiming that Trump is in favor of “free speech online” is laughable. This is the candidate who has repeatedly talked about “opening up our libel laws” to go after speech he doesn’t like, has threatened to sue many publications for protected speech, and has flat out declared that we should turn off parts of the internet and anyone who responded with “freedom of speech” was “foolish.”

  • DRM

    • HTML standardization group calls on W3C to protect security researchers from DRM

      The World Wide Web Consortium has embarked upon an ill-advised project to standardize Digital Rights Management (DRM) for video at the behest of companies like Netflix; in so doing, they are, for the first time, making a standard whose implementations will be covered under anti-circumvention laws like Section 1201 of the DMCA, which makes it a potential felony to reveal defects in products without the manufacturer’s permission.

      This is especially worrisome because the W3C’s aspiration for the new version of HTML is that it will replace apps as the user-interface for the Internet of Things, making all sorts of potentially compromising (and even lethal) bugs difficult to report without serious legal liability.

      The EFF has proposed that W3C members should be required to promise not to use the DMCA and laws like it this way; this has had support from other multistakeholder groups, like the Open Source Initiative, which has said that the W3C work will not qualify as an “open standard” if it doesn’t do something to prevent DMCA abuse.

    • DRM and Web security

      For a few years now, the W3C has been working on a specification that extends the HTML standard to add a feature that literally, and intentionally, does nothing but limit the potential of the Web. They call this specification “Encrypted Media Extensions” (EME). It’s essentially a plug-in mechanism for proprietary DRM modules.

      Much has been written on how DRM is bad for users because it prevents fair use, on how it is technically impossible to ever actually implement, on how it’s actually a tool for controlling distributors, a purpose for which it is working well (as opposed to being to prevent copyright violations, a purpose for which it isn’t working at all), and on how it is literally an anti-accessibility technology (it is designed to make content less accessible, to prevent users from using the content as they see fit, even preventing them from using the content in ways that are otherwise legally permissible, e.g. in the US, for parody or criticism). Much has also been written about the W3C’s hypocrisy in supporting DRM, and on how it is a betrayal to all Web users. It is clear that the W3C allowing DRM technologies to be developed at the W3C is just a naked ploy for the W3C to get more (paying) member companies to join. These issues all remain. Let’s ignore them for the rest of post, though.

      One of the other problems with DRM is that, since it can’t work technically, DRM supporters have managed to get the laws in many jurisdictions changed to make it illegal to even attempt to break DRM. For example, in the US, there’s the DMCA clauses 17 U.S.C. § 1201 and 1203: “No person shall circumvent a technological measure that effectively controls access to a work protected under this title”, and “Any person injured by a violation of section 1201 or 1202 may bring a civil action in an appropriate United States district court for such violation”.

  • Intellectual Monopolies

    • WIPO Traditional Knowledge: Text Passes Committee Approval, Goes To Next Session [Ed: Incredible that the thugs who run WIPO try to distinguish between private/monopolised knowledge and “traditional”[

      World Intellectual Property Organization delegates today agreed on a text compiling divergent views on how traditional knowledge should be protected in the intellectual property system to be forwarded to the next session of its committee on the protection of traditional knowledge. Some clear dividing lines remain, such as traditional knowledge which is widely known and could have been placed in the public domain, or if conditions of eligibility should be part of a potential treaty.

      The 31st session of the Intergovernmental Committee on Intellectual Property and Genetic Resources (GRs), Traditional Knowledge (TK)and Folklore (IGC) took place from 19-23 September.

    • Law & Economics – The Italian Edition

      A hot topic at EALE was understanding “Pay for Delay,” aka a reverse payment patent settlement. It’s the bizarre phenomena in the US where patent holders pay potential competitors not to challenge their patent or enter the market. This is most common in the pharmaceutical industry when companies seeking to keep generics out of their market. Ramsi Woodcock, in a presentation entitled, “Innovation, Litigation and New Drugs” looked at the consumer welfare impact of these payments. Using a theoretical model in combination with empirical data, he estimates that payments which delay the entry of a generic drug by more than 15 months result in consumer harm.

    • Copyrights

      • German Library Claims Copyright on “Nazi Anthem,” Censors Documentary on YouTube

        YouTube has faced its fair share of copyright controversies, one even more absurd than the others. In what appears to be an indirect censorship effort, the German National Library is now claiming copyright on the 87-year-old Nazi anthem, taking down a historical documentary in the process.

      • For The Gander: Bahnhof Sends Copyright Troll Spridningskollen A Trademark Violation Settlement Letter

        We were just talking about Bahnhof, the Swedish ISP with a reputation for protecting its customers privacy, and its script-flipping battle with a copyright troll called Spridningskollen. At issue is that Bahnhof has for some time operated a website, Spridningskollen.org, and has applied for a trademark registration for it more recently. The copyright troll is new in town, so to speak, and Bahnhoff is relying on common law trademark rights while its application goes through the process, but that isn’t keeping the ISP from continuing to give Spridningskollen a taste of its own medicine.

        In a move laced with irony, Bahnhof has sent Spridningskollen a settlement letter on the basis of its trademark infringement.

      • Macedonia Copyright Collection Group Forces All Macedonian Music Off Of All Macedonian Broadcasts

        This is a strange one, for sure. Often times when we discuss disputes from copyright licensing or collection groups, which will universally complain that they are not collecting enough money when given any opportunity, some will comment that the artists should just pull their music from all broadcasts if they’re not happy with the arrangement. This kind of nuclear option is rarely, if ever, invoked for a whole host of reasons that include compulsory licensing arrangements and rules, the sincerity of the complaints from the licensing groups, and the simple business interests behind the benefits of having music heard on the radio.

        But in Macedonia, one such licensing group has quite literally taken its musical ball and stomped home. This whole spat has been initiated by ZAMP, previously the sole music copyright collection organization in all of Macedonia, all because a second collection group has been started in the country, alongside more strict rules governing how much money ZAMP can collect for the artists it represents. As a result, ZAMP has informed Macedonia’s broadcasters that they are henceforth banned from playing any music created by Macedonian artists, whom ZAMP claims to represent.

09.23.16

Links 23/9/2016: Latest Microsoft and Lenovo Spin (Now in ‘Damage Control’ Mode)

Posted in News Roundup at 6:56 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • Science

    • Indigenous Australians the oldest living civilisation on Earth, study affirms

      An extensive DNA study confirms what Aboriginal and Torres Strait Islander people have always believed: they’re the oldest living civilisation on the planet.

      “We know that we were here forever, but Western science is slowly catching up,” says a Facebook post from Indigenous Australian rights organisation Sovereign Union, led by activist and Euahlayi leader Ghillar Michael Anderson.

      In fact, their relationship to the land stretches back over 50,000 years, according to new scientific research published in the journal Nature. Led by Professor Eske Willerslev of the University of Cambridge, in collaboration with a host of Indigenous elders, the research team sequenced the genome of 83 Aboriginal Australians (from groups covering 90 percent of Australia’s land mass) and 25 Highland Papuans.

    • Horses can use symbols to talk to us

      There will never be a horse like Mr. Ed, the talking equine TV star. But scientists have discovered that the animals can learn to use another human tool for communicating: pointing to symbols. They join a short list of other species, including some primates, dolphins, and pigeons, with this talent. Scientists taught 23 riding horses of various breeds to look at a display board with three icons, representing wearing or not wearing a blanket. Horses could choose between a “no change” symbol or symbols for “blanket on” or “blanket off.” Previously, their owners made this decision for them. Horses are adept at learning and following signals people give them, and it took these equines an average of 10 days to learn to approach and touch the board and to understand the meaning of the symbols.

  • Health/Nutrition

  • Security

    • A pile of security updates for Thursday
    • What this Yahoo data breach means for you

      On Thursday afternoon Yahoo confirmed a massive data leak of at least 500 million user accounts, which is a very big deal.

      Though the data breach obviously spells trouble for those with YahooMail accounts, users with hacked accounts need to keep in mind that the breach goes so much further.

      Yahoo owns a bunch of other major sites like Flickr, Tumblr and fantasy football site Rivals.com, which means the 500 million users affected by the data breach also have to worry about their personal information associated with all additional Yahoo services.

    • Hackers now have a treasure trove of user data with the Yahoo breach
    • Half! a! billion! Yahoo! email! accounts! raided! by! ‘state! hackers!’

      Hackers strongly believed to be state-sponsored swiped account records for 500 million Yahoo! webmail users. And who knew there were that many people using its email?

      The troubled online giant said on Thursday that the break-in occurred in late 2014, and that names, email addresses, telephone numbers, dates of birth, hashed passwords and, in some cases, encrypted or unencrypted security questions and answers, were lifted.

      This comes after a miscreant calling themselves Peace was touting copies of the Yahoo! account database on the dark web. At the time, in early August, Yahoo! said it was aware of claims that sensitive information was being sold online – and then today, nearly two months later, it alerted the world to the embarrassing security breach.

    • Brian Krebs’ blog banged in bloody massive DDoS

      YOU KNOW that Brian Krebs guy? Well, his website has been hit with a huge denial-of-service (DDoS) attack that he couldn’t handle on his own.

      Krebs is that security guy. He is bound to have some enemies out there, so we expect that sooner or later someone will take the credit for ruining the pathway to his pages.

      For now we have Krebs to explain what happened and who helped him deal with it. The short version is that there was great big whack of an attack on him, and that he needed assistance from security firm Akamai.

  • Defence/Aggression

    • Next-Generation Destroyer Zumwalt Sidelined for Repairs After Engineering Casualty

      Less than a month ahead of its commissioning, the Navy’s next-generation destroyer Zumwalt (DDG-1000) suffered an engineering casualty that could take up to two weeks to repair, Navy officials confirmed to USNI News on Tuesday.
      The ship’s crew – currently pier side at Naval Station Norfolk, Va. – found the fault in the ship’s engineering plant on Sept. 19 ahead of at-sea tests. Zumwalt is now undergoing repairs that may take anywhere from 10 days to two weeks.

    • Obama vetoes 9/11 bill

      President Obama on Friday vetoed legislation that would allow families of 9/11 victims to sue Saudi Arabia in U.S courts, setting up a high-stakes showdown with Congress.

      “I recognize that there is nothing that could ever erase the grief the 9/11 families have endured,” Obama wrote in his veto message. “Enacting JASTA into law, however would neither protect Americans from terrorist attacks nor improve the effectiveness of our response to such attacks.”

      Obama’s move opens up the possibility that lawmakers could override his veto for the first time with a two-thirds vote in both chambers.

      Republican and Democratic leaders have said they are committed to holding an override vote, and the bill’s drafters say they have the support to force the bill to become law.

      The Justice Against Sponsors of Terrorism Act (JASTA) unanimously passed through both chambers by voice vote.

      But the timing of the president’s veto is designed to erode congressional support for the bill and put off a politically damaging override vote until after the November elections.

  • Transparency/Investigative Reporting

    • EFF Heads To Court To Fight Off Smart Grid Company That Can’t Wrap Its Mind Around Section 230 Protections

      Apparently the legal battle between a bunch of contractors providing “smart meter” equipment to the city of Seattle and FOIA clearinghouse MuckRock isn’t over. The last time we checked in, a judge had overturned his own hastily-granted injunction, relieving MuckRock of the impossible demands placed on it by miffed tech provider Landis+Gyr — which included handing over the details of everyone who might have seen Landis+Gyr’s documents and “retrieving protected information that may have been downloaded” from the site.

      MuckRock was allowed to reinstate the documents and Landis+Gyr walked away from a debacle of its own making. Another contractor utilized by Seattle Power and Light (Ericsson) had pursued a similar injunction but dropped MuckRock from its complaint, following Landis+Gyr into battle against the entity that had released the documents to requester Phil Mocek: the city of Seattle.

      But there’s still one company pursuing a case against MuckRock. The EFF, on its way back into court to fight the tenacious litigant, points out that Elster Solutions, LLC is still hoping to hold MuckRock accountable for publishing documents received from the city of Seattle. But it’s impossible to ascertain why it’s going after MuckRock.

  • Environment/Energy/Wildlife/Nature

    • Recalculating the Climate Math

      The future of humanity depends on math. And the numbers in a new study released Thursday are the most ominous yet.

      Those numbers spell out, in simple arithmetic, how much of the fossil fuel in the world’s existing coal mines and oil wells we can burn if we want to prevent global warming from cooking the planet. In other words, if our goal is to keep the Earth’s temperature from rising more than two degrees Celsius—the upper limit identified by the nations of the world—how much more new digging and drilling can we do?

      Here’s the answer: zero.

  • Finance

    • The U.S. Food and Drug Administration has been arm-twisting journalists into relinquishing their reportorial independence, our investigation reveals. Other institutions are following suit

      CNN Money has found multiple whistleblowers from Wells Fargo who were willing to go on the record and report that they were fired in retaliation for coming forward to report the massive fraud in which Wells Fargo employees opened up 2,000,000 fake accounts in their customers’ names, raiding their real accounts to open them, then racking up fees and penalties, and trashing their customers’ credit ratings.

      CNN also spoke to a former Wells Fargo HR manager who explained how the retaliatory firings worked: employees who blew the whistle would be monitored closely for minor infractions (e.g. being two minutes late for work), then fired “with cause.”

      The Sarbanes-Oxley Act, passed in the wake of the Enron fraud, makes it a jailable, criminal offense to fire whistleblowers; it also makes the CEO and CFO personally, criminally liable for failures to create secure means by which whistleblowers can come forward without fear of retaliation.

    • China’s elites appear to be exfiltrating billions while on holidays

      China has a massive “tourism deficit” — the difference between the money that tourists spend in China and the money that Chinese people spend abroad: $206B from June 2015-June 2016, up from $77B in 2013. The missing money is hard to explain, since China doesn’t export that many tourists.

      But there’s one explanation that fits the facts, according to Bloomberg: Chinese millionaires going abroad with “suitcases full of cash,” which they convert to overseas real-estate, undeclared luxury goods, or just anonymous deposit accounts in offshore banks. Chinese corruption has hit surreal levels: for example, one civic official had so much cash in his apartment that the police who raided him were unable to count it with bill-counting machines. Instead, they weighed it by the ton and estimated its value by weight.

    • Tesla wants to sell cars directly in Michigan, so it’s suing state officials

      On Thursday, Tesla filed a lawsuit against three Michigan officials (PDF)—Secretary of State Ruth Johnson, Attorney General Bill Schuette, and Governor Rick Snyder—on the grounds that the state is violating the electric vehicle company’s right to sell Teslas directly from the manufacturer instead of through a dealer.

    • Barroso says Goldman is ‘no drug cartel’, blasts EU judgment

      Former European Commission President Jose Manuel Barroso on Friday put up a spirited defense of his right to work for U.S. bank Goldman Sachs, after the commission opened an ethics probe into his move, and he accused it of acting arbitrarily.

      “Why would I not have the right to work where I choose, if it is a legal entity, obviously, not a drug cartel?” a visibly agitated Barroso, who is a former Portuguese prime minister, said in his first public comments to reporters at an event in Cascais near Lisbon.

      Goldman appointed Barroso as non-executive chairman of its international arm in London two weeks after Britons voted for Brexit in June and he said he would advise it on issues arising from the negotiations for Britain to leave the European Union.

  • AstroTurf/Lobbying/Politics

    • Could Jill Stein Be Invited To The Presidential Debates? All Hope Is Technically Not Lost

      The presidential election cycle will progress to the next phase with the much-anticipated presidential debates. Democratic Party presidential nominee Hillary Clinton and Republican Party presidential nominee Donald Trump will take the debate stage on Sept. 26 at Hofstra University for the first of three scheduled debates. But for the third party candidates – Independent Party presidential nominee Gary Johnson, and Green Party presidential nominee Jill Stein – did not qualify to participate and therefore will not be included in the televised event. But, could Stein be invited to the presidential debates? Well, not to the first one, but she still has a chance to participate in the debates following.

      In order to qualify to participate in the presidential debates, candidates must be polling at 15 percent in five national surveys leading up to the debates. As it stands now, according to a NBC News poll, Johnson is polling at 10 percent and Stein is polling at 4 percent. Different polls show varying percentages; for instance, a recent Reuters poll put at Johnson at 6.6 percent and Stein at 2.2 percent. Regardless, the two candidates are well below the threshold and will not participate in next week’s debate. Instead, Clinton and her running mate, Virginia Sen. Tim Kaine, and Trump and his running mate, Indiana Gov. Mike Pence, will have their voices heard on Monday as they battle it out on the issues.

    • 5 Signs NBC Is Unofficially Endorsing Trump For President

      The mainstream media is getting a lot of flack for not doing enough to stop Donald Trump’s rise to the cusp of having all the power, and deservedly so. In fact, I’m going to that exact thing here today. But rather than focus on the news as a whole, I want to focus on one outlet in particular: NBC. I’m singling them out because it’s not just that they haven’t done enough to stop the potential threat that is Donald Trump’s impending presidency — it’s that they’re actively endorsing it, all while pretending they cut ties well over a year ago with the man they helped make a star. We talk about it on this week’s Unpopular Opinion podcast …

    • Powell leakers strike again with alleged White House staffer emails, Michelle Obama passport

      The hacker website that leaked Colin Powell’s politically embarrassing emails struck again Thursday, this time releasing what appears to be the personal emails of a White House staffer working with Hillary Clinton’s campaign — and what purports to be an image of Michelle Obama’s passport.

      An initial scan of the messages appear to show chatter mostly regarding event planning details, such as requesting an invoice for a stage used at a Clinton campaign event. In one exchange, the advanced planning team expresses concern that the media might notice a group of protesters at one event.

    • Palmer Luckey: The Facebook Near Billionaire Secretly Funding Trump’s Meme Machine

      A Silicon Valley titan is putting money behind an unofficial Donald Trump group dedicated to “shitposting” and circulating Internet memes maligning Hillary Clinton.

      Oculus founder Palmer Luckey financially backed a pro-Trump political organization called Nimble America, a self-described “social welfare 501(c)4 non-profit” in support of the Republican nominee.

      Luckey sold his virtual reality company Oculus to Facebook for $2 billion in 2014, and Forbes estimates his current net worth to be $700 million. The 24-year-old told The Daily Beast that he had used the pseudonym “NimbleRichMan” on Reddit with a password given him to by the organization’s founders.

      Nimble America says it’s dedicated to proving that “shitposting is powerful and meme magic is real,” according to the company’s introductory statement, and has taken credit for a billboard its founders say was posted outside of Pittsburgh with a cartoonishly large image of Clinton’s face alongside the words “Too Big to Jail.”

      “We conquered Reddit and drive narrative on social media, conquered the [mainstream media], now it’s time to get our most delicious memes in front of Americans whether they like it or not,” a representative for the group wrote in an introductory post on Reddit.

    • Green party may try to ‘escort’ Jill Stein into the presidential debates

      Kevin Zeese told the Guardian that Stein, her vice-presidential candidate Ajamu Baraka and 100 of her supporters were willing to risk arrest at the debates, the first of which will be held at New York’s Hofstra University on Monday.

      “About 300 people have already signed up to protest, 100 are willing to risk arrest,” Zeese said.

      “We hope Jill and Ajamu will not get arrested as we want them to respond in live time to the debate but when you are on the frontlines, things are not always in our control.”

      The Commission on Presidential Debates announced on Friday that the third-party candidates Stein and Libertarian Gary Johnson had failed to qualify for the first debate.

      To earn a spot on the debate stage, the commission requires each candidate meet a 15% support threshold, determined by an average of five pre-selected national polls, and qualify for the ballot in enough states that it would be mathematically possible to receive the 270 electoral votes needed to win the presidency.

      The commission calculated that Stein had 3.2% support in an average of the five selected polls. Johnson also failed to make the cut, with a polling average of 8.4%.

    • DNC Files Scathing Rebuttal, Wants Fraud Lawsuit Filed by Bernie Backers Thrown Out

      ‘The DNC was biased in favor of one candidate – Hillary Clinton – from the beginning and throughout the process,” the plaintiffs wrote in their original lawsuit. The complaint, which was filed in federal court in Florida, alleges fraud, as well as negligence as it relates to a Russian Hack on the DNC server. The Bernie backers contend that the trove of DNC emails posted by Wikileaks further proves that the Democratic Party was working against Bernie Sanders from the start.

      However, in a motion to dismiss the lawsuit filed this week, attorneys with the DNC fired back. They believe that the lawsuit is completely without merit, and that the Bernie supporters are using “litigation as a political weapon against a national party (and to support their SuperPAC) in the middle of an election.” They also don’t believe the Bernie backers have standing to even bring the lawsuit.

    • If Trump Wins, Blame Clinton

      Now that Hillary Clinton is statistically tied with Donald Trump in the polls according to Real Clear Politics, Democratic Party loyalists are looking for a new scapegoat. Some individuals have decided to attribute blame to millennials. Mother Jones’ Editor-in-Chief, Clara Jeffery, took to Twitter to declare her hatred for millennials after learning that Hillary Clinton loses a substantial amount of millennial voters to third-party candidates.

      Echoing this frustration with millennials, James Kirchick of The Daily Beast—an outlet that does not disclose to readers the fact that Chelsea Clinton sits on the board of their parent company, IAC—smugly purports that these pesky millennials would probably be more inclined to support Hillary Clinton if it weren’t for their “moral relativism, historical ignorance, and narcissism.” Some want to hold Jill Stein accountable for a potential Trump victory, while others argue Bernie Sanders will be culpable if Trump wins, given that he “convinced” millennials that “Clinton was in the pocket of Wall Street,” and is “a tool of wealthy elites.”

      I, too, would like to jump on this bandwagon and advance my own hypothesis as to which individual we can blame in the event Trump wins. If Clinton loses, really, there’s only one person you can blame: Hillary Rodham Clinton.

  • Censorship/Free Speech

    • How Nigeria’s cybercrime law is being used to try to muzzle the press

      Since Nigeria’s cybercrime act was voted into law in May 2015 authorities have used the accusation of cyber stalking to harass and press charges against at least five bloggers who criticized politicians and businessmen online and through social media.

      Cyber stalking, which falls under Section 24 of the act, carries a fine of up to 7 million naira (USD$22,000) and a maximum three-year jail term for anyone convicted of knowingly sending an online message that “he knows to be false, for the purpose of causing annoyance, inconvenience danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, ill will or needless anxiety to another.”

    • EDITORIAL: Instagram allows customizable censorship

      If you have been using social media for a while, you’re probably familiar with people being offended by online content.

      The debate over how media should censor their apps is not new.

      What is new, however, is Instagram’s new feature in answer to this complaint. They have created a way that users can make personalized lists of words they don’t wish to see in the comments on their feeds.

      The words can be anything, from swear words to words surrounding discourses such as gender and race. If you don’t want those words commented on your pictures, poof, they’re gone.

      We think this is a great move. In the past, many people have been angry with companies for their censorship policies.

      Twitter bans many offensive words altogether. Instagram’s solution seems to be a simple yet brilliant one. Instead of banning words for every user, the individual gets to make their own choice on what their Instagram comments will show, based on what offends them personally.

      This makes a lot of sense, since offensiveness, like many things, is very subjective. Words, particularly swear words, that offend one person may be a common part of another’s vocabulary.

    • Beijing’s great wall of film censorship
    • ‘No ghosts. No gay love stories. No nudity’: tales of film-making in China
    • Why Hollywood Needs To Cease Grovelling To China
    • YouTube Gets Step Closer to Full Censorship With ‘Heroes’ Program, and YouTubers Aren’t Happy
    • Don’t censor content, consumers flag issues: YouTube India official
    • Sanders: YouTube demonetizing YouTubers
    • YouTube Heroes program seeks crowdsourced moderation, but panned as censorship

      YouTube is looking for “heroes” to help moderate its content and comments sections, but early feedback has been overwhelmingly negative with users describing it as crowdsourced censorship.

      Users who join the Heroes program, which was announced Tuesday, will earn points for adding captions and subtitles to videos, flagging inappropriate videos and answering questions on the site’s Help forum.

      Accruing points will earn them privileges like joining video chats with others in the Heroes program, exclusive previews of upcoming product launches and the ability to flag abusive videos en masse instead of one at a time.

  • Privacy/Surveillance

    • As Kuwait imposes world’s first DNA collection law, attorney tries to fight it

      A Kuwaiti lawyer has filed a formal constitutional challenge to his country’s controversial mandatory DNA law, which is reportedly set to take effect in November 2016.

      The law mandates DNA collection from all citizens and resident foreigners, a total of about 3.5 million people, plus all visitors to the tiny Gulf state. The law was quickly passed by the Kuwaiti Parliament after a July 2015 terrorist attack in the capital left nearly 30 people dead. By having a large database of everyone’s DNA, presumably it would be easier to identify victims of terrorism or perhaps even criminal suspects.

      The law, believed to be the first of its kind anywhere in the world, is viewed by many critics as being not only ineffective as a tool to combat terrorism but as being a potentially huge privacy liability if this database were to be stolen or hacked. Still, anyone who refuses collection could be subject to imprisonment or a fine of about $33,000, according to the Kuwait Times.

    • On Her Majesty’s secret servers: GCHQ taps startups to fight cyber attacks

      Britain’s spooks are tapping startup geeks to help fight the growing battle against cyber threats, opening the insular intelligence agency to innovation and kickstarting ambitious plans for Britain to become a world leader in cyber security.

    • Big Security Bug Affects Hundreds Of Thousands Of Cisco Devices

      Hackers using NSA-related hacking tools could exploit a major cyber security vulnerability impacting hundreds of thousands of Cisco switches, routers, and other networking gear.

      The vulnerability, disclosed by Cisco csco last week, has impacted at least 859,000 devices, according to Shadowserver Foundation, an independent cyber security group and Cisco partner that has been scanning Cisco routers and switchers worldwide.

      Of those devices affected, 259,000 are located in the U.S., 44,000 are in Russia, and another 43,000 are in the U.K. Cisco said Shadowserver would share data with owners of the affected devices and related IP addresses. If customers want detailed reports, they “can contact Shadowserver and get their section of the scan results,” said a Cisco spokesperson.

    • A Good American review – troubling, fascinating glimpse of NSA surveillance

      Less scoping with its all-seeing eye than apparently shooting itself in the foot, the NSA gets another battering in this intriguing but troubling documentary, released in the slipstream of Oliver Stone’s Snowden. It’s a tale of two surveillance systems: Trailblazer, the pre-2006 digital-comms sweep that failed to anticipate 9/11, vs ThinThread, the DIY precursor developed on the downlow by former NSA technical director-turned-whistleblower Bill Binney. A crack analyst who pioneered the concept of meta-data (“the data about the data”), Binney is a conduit for a fascinating run-through of postwar intelligence-gathering, starting with the 1968 Soviet invasion of Czechoslovakia, which he claims he predicted. Yet lambasting rival security factions for their incompetence and cronyism, while compacting bigger issues about privacy and democracy, A Good American is in danger of coming across like an NSA internal review. Rather than adversarially pinning him, it cheerleads Binney as a homespun American mathmo maverick bucking big government. At one point he says of his methodology: “You never ask for permission, only forgiveness.” In the film, as in real life, the crucial questions are posed too fleetingly too late.

    • Up Creatives designs posters and titles for NSA film A Good American

      London design studio Up Creatives has created posters, titles and animated sequences for A Good American, a documentary about NSA whistleblower William Binney and his ThinThread surveillance system

    • What’s Going on with Ed Snowden and the Washington Post?

      As Oliver Stone’s Snowden struggles at the box office—moviegoers, apparently, prefer the unambiguous heroism of Captain “Sully” Sullenberger—the fate of the real Edward Snowden, and the meaning of his actions, is once again the subject of heated debate.

      To bring you up to speed: Last week, the United States’ three largest human rights organizations—the American Civil Liberties Union, Human Rights Watch, and Amnesty International—launched a campaign to pressure the Obama administration to pardon Snowden. A few days later, in a rather ham-fisted effort to counter the flattering portrait in the Stone film, the House Permanent Select Committee on Intelligence released three pages of a classified report denouncing Snowden as a “serial exaggerator and fabricator,” who did “tremendous damage to national security.” As my colleague Barton Gellman, who received and reported on the Snowden leaks for the Washington Post, put it, the House’s report was “one-sided,” “incurious,” “contemptuous of fact,” and “trifling.” (Bart, you’ll notice, has misplaced his word-mincer. In fact, he may never have owned one.)

    • Judge Orders Release Of Information On Cases Involving Electronic Surveillance

      This is a response to a petition by Leopold and Vice to unseal court dockets containing electronic surveillance affidavits, orders, etc. The step forward towards more transparency is welcome news, but it appears the wheels of justice aren’t grinding any faster. This petition was submitted to the court in 2013.

      Default mode for nearly any case involving law enforcement surveillance is pitch-black darkness. The government asks for cases to be sealed with alarming (and annoying) frequency, often claiming the potential exposure of law enforcement means and methods would be detrimental to the business of catching criminals. This makes no sense considering the technology used is decades old and the methodology has been common knowledge for nearly the same length of time.

      And yet, these requests are granted more often than not. Howell’s district (Washington DC) presides over an extremely high percentage of sealed cases.

    • Opera’s Free VPN Takes On Internet Privacy Challenge

      Opera earlier this week released a new version of its browser, Opera 40, which comes with a free virtual private network service built in. The official rollout follows five months of user experimentation with a beta version. The company evaluated beta users’ feedback and subsequently brought on additional servers, added options for global or private browsing, and created versions that would run on iOS and Android. The VPN creates a secure connection to one of Opera’s five servers around the world, letting users spoof their IP address.

    • FBI investigation of leaked NSA hacking tools examines operative’s ‘mistake’

      A careless agent. A cache of hacking tools left on a remote and unsecured computer. A shadowy group of Russian hackers. A fire-sale on the deep web.

      This is the current focus of a inquiry into a cache of NSA exploits that were dumped on to public websites last month by a group calling itself the Shadow Brokers, four people with direct knowledge of the probe investigation told Reuters.

      The tools enabled hackers to exploit software flaws in computer and communications systems from vendors such as Cisco Systems and Fortinet.
      Hacking group auctions ‘cyber weapons’ stolen from NSA
      Read more

    • Probe of leaked U.S. NSA hacking tools examines operative’s ‘mistake’
    • NSA cyberweapons leak: FBI probe investigating former operative’s mistake during active operation
    • NSA hacking tools were reportedly left unprotected on remote computer
    • Report: NSA hushed up zero-day spyware tool losses for three years

      Sources close to the investigation into how NSA surveillance tools and zero-day exploits ended up in the hands of hackers has found that the agency knew about the loss for three years but didn’t want anyone to know.

    • I have found a secret tunnel that runs underneath the phone companies and emerges in paradise

      Calyx is a famous, heroic, radical ISP that has been involved in groundbreaking litigation — they were the first company to ever get a secret Patriot Act warrant unsealed, fighting for 11 years to overturn the gag order.

      Calyx is structured as a 501(c)3 nonprofit, meaning that they can accept donations and provide tax-receipts for them.

      Here’s where things get interesting!

      In 2013, Sprint acquired a competitor called Clearwire in order to gain control of the company’s wireless spectrum in order to launch Sprint’s LTE/4G business. Now, that spectrum was originally allocated for educational purposes before being sublicensed to Clear, and it came with the requirement that non-profits get unlimited access at very low prices.

      And Calyx, remember, is a nonprofit.

  • Civil Rights/Policing

    • A Good American – Bill Binney

      I have for a number of years now been involved with a global group of whistleblowers from the intelligence, diplomatic and military world, who gather together every year as the Sam Adams Associates to give an award to an individual displaying integrity in intelligence.

      This year’s award goes to former CIA officer, John Kiriakou, who exposed the CIA’s illegal torture programme, but was the only officer to go to prison – for exposing CIA crimes.

      The award ceremony will be taking place in Washington on 25 September at the “World Beyond War” conference.

      Last year’s laureate, former Technical Director of the NSA Bill Binney, is currently on tour across Europe to promote an excellent film about both his and the other stories of the earlier NSA whistleblowers before Edward Snowden – “A Good American“.

    • Chelsea Manning’s disciplinary board happens today

      As soon as we get a call from Chelsea, we will let you know the news. (It will most likely be in the mid-late afternoon Central Standard Time.)

      In a blog post that Fight for the Future released yesterday, Chase Strangio, Chelsea’s ACLU attorney, explained that there is some concern about whether she will even be able to call us after the hearing. (This is because the board could decide to punish her with indefinite solitary confinement, which could start immediately.)

    • Jill Stein on Charlotte Shooting: In All These Cases it’s a Matter of Very Aggressive Policing

      Along with Stein’s concerns about aggressive policing, she viewed the climate of fear as adding to the tension.

      “There are background elements here in which there is fear across the board. We live in a Garrison State now, we live in a society divided by fear. That’s why we call not only for accountable policing and community control, but also for a truth and reconciliation commission.”

      Stein says these fears are particularly prevalent in the African-American community.

      “People are up in arms and feel like they are on the firing lines simply for sitting in their car while black.”

    • This photo from Charlotte tells you all you need to know about policing in America

      A line of police officers stand in the dark on a Charlotte, North Carolina, highway. They look like an occupying force with their helmets and face shields and various weaponry strapped all over their armored clothing. A large bus illuminates them with its headlights. The front of the bus declares in bright lights: “NOT IN SERVICE”.

      It’s as if these police responding to protests of Tuesday’s shooting death of Keith Scott are carrying with them a lighted banner that declares what black Americans already know: they are not in service. Not for us.

      It’s the message that police have always been sending black Americans. Blacks make up about 13% of the US population, and yet accounted for 27% of the approximately 1,146 people killed by police in 2015. “Not in service” is the message we got when Tamir Rice was killed, when Freddie Gray was killed, when Eric Garner was killed. This was the message we got when Terence Crutcher was killed this week while asking for service. We understand that if our police force really does exist to protect and serve, it does not exist to protect and serve us.

    • Before Forfeiture Is Finalized, Sheriff Racks Up 54k Miles On Seized Vehicle, Sells It To Private Buyer

      The department’s actions are indicative of an agency that seldom has trouble retaining anything it designates as “guilty” property. So secure was the sheriff’s office in its belief that it would ultimately prevail — despite never bringing criminal charges against the couple whose assets it seized — that it moved ahead with converting the property to cash without having any legal right to do so.

      The Ostipows are now suing [PDF] the sheriff and his deputies in federal court for blithely blowing past even the minimal protections granted to victims of asset forfeiture. In addition to $1 million+ in damages, the Ostipows are seeking declarations that the asset forfeiture processes deployed by the sheriff’s department are Constitutional violations and the compelled released of documents requested by the couple in an earlier FOIA request.

    • Falsely-accused Dane accepts settlement from New York

      Malthe Thomsen on Tuesday accepted a settlement offer amounting to 500,000 kroner in his lawsuit against the New York City Police Department and the State of New York for unlawful detainment and coercing a false confession in a sexual abuse case.

      Thomsen had sought $7 million (48 million kroner) in the case but settled for the much smaller amount, his lawyer Jane Fischer-Byrialsen told Danish media.

      “I think that Malthe deserved much more and should be compensated with much more than he was. But sometimes one needs to be realistic and weigh the risks of continuing a legal case against the money you know you can get here and now,” she told TV2.

      Thomsen sued both the former coworker who accused him of sexually assaulting children at an upscale Manhattan daycare institution and the New York City Police Department, which he says coerced a false admission out of him.

    • SWEDEN IN CHAOS: Number of ‘no-go zones’ INCREASED as police lose control over violence

      In February Express.co.uk reported the Scandinavian country has seen a huge surge in crime since the start of the migrants crisis in Europe with a rise in sex assaults, drug dealing and children carrying weapons.

      The force’s increased lack of control in the country was revealed in a report by Sweden’s National Criminal Investigation Service, where attacks on officers were detailed, including police cars being stoned by masked groups.

      At the time around 50 areas were put on a “blacklist” which are then divided into three categories from “risk areas” to “seriously vulnerable”.

    • Charlotte protests: governor of North Carolina declares state of emergency

      Violence and confusion has spread across Charlotte after a second night of protests was interrupted by gunfire when one protester shot another.

      North Carolina governor Pat McCrory declared a state of emergency on Wednesday, and called for help from the National Guard and the Highway Patrol.

    • Charlotte police chief says why he won’t release video of cop killing black man

      A day after North Carolina’s governor declared a state of emergency amid violent protests following the police killing of a black man, Charlotte’s police chief said Thursday the agency will not publicly release video footage of Keith Lamont Scott’s death.

      A black officer from the Charlotte Mecklenburg Police Department killed Scott, 43, on Tuesday outside an apartment complex while serving a warrant on somebody else. The officer, who has been placed on administrative leave, said Scott had a handgun as he got out of a vehicle and did not follow orders to drop it. Friends and family members maintain Scott was carrying a book—an assertion flatly denied by Kerr Putney, the police chief. At a press conference, he said the authorities retrieved a handgun Scott “was holding in his hand when he got out of the vehicle.”

      [...]

      The Charlotte police agency requires officers to wear body cams. At least three officers on the scene were wearing body cams. Officer Brentley Vinson, the shooter, was not wearing one at the time of the incident.

    • Man who murdered Glasgow shopkeeper for ‘disrespecting Islam’ calls for beheadings in prison YouTube video

      A man who murdered a Glasgow shopkeeper for “disrespecting Islam” has released messages from prison calling on supporters to behead other “insulters”.

      Tanveer Ahmed, 32, admitted stabbing Asad Shah to death in his shop because he felt his victim was “disrespecting the prophet Mohamed” with his beliefs as an Ahmadi Muslim.

      Now, he is encouraging others to do the same in extremist audio messages that appear to have been recorded and released after he was jailed for life.

    • Army Punishes Chelsea Manning With Two Weeks Of Solitary Confinement

      Chelsea Manning went before a three-member disciplinary board at Fort Leavenworth on September 22 and was punished with 14 days of solitary confinement.

      The punishment stems from administrative charges the United States Army brought against Manning after she attempted suicide in July. The Army charged her with “resisting the force cell move team,” “prohibited property,” and “conduct which threatens” the “good order and discipline” of the facility.

      In a statement from Manning, she indicated the Army acquitted her of the “resisting” charge. But she was found guilty of the “conduct which threatens” offense and the “prohibited property” charge, which was for having an “unmarked copy” of Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous by Gabriella Coleman.

    • Women in Iran post photos and videos defying new fatwa against cycling

      Iranian women have been posting photographs and videos of themselves cycling in public, in defiance of a fatwa that claims riding a bike poses a threat to a woman’s chastity. Journalist Masih Alinejad, the founder of My Stealthy Freedom, has urged women to post the images of themselves with the hashtag #IranianWomenLoveCycling.

      Earlier this month, Iran’s leader Ayatollah Ali Khameini issued a fatwa prohibiting women from cycling in public. “Riding a bicycle often attracts the attention of men and exposes the society to corruption, and thus contravenes women’s chastity, and it must be abandoned,” he told state media.

      In one courageous video, a mother and daughter are seen riding together, and issuing a direct message to Ayatollah Khameini, saying, “It is our absolute right and we are not going to give up.”

      In July, it was reported that a group of women in the country’s north were stopped by law enforcement while riding bicycles and required to sign pledges not to repeat the ‘violation.’

  • Internet Policy/Net Neutrality

    • Senate Comes To Its Senses: Does NOT Support Ted Cruz’s Plan To Block Internet Governance Transition

      So, just a few hours ago, the reports were still spreading that the Senate would absolutely include Ted Cruz’s preferred language that would block the (largely symbolic, but really important) transfer of control over the IANA functions of ICANN away from the Commerce Department. We’ve explained over and over and over again why this is important — including once this morning in response to Donald Trump suddenly taking a stand (an incredibly ignorant one, but a stand) on the issue.

  • Intellectual Monopolies

    • Trademarks

      • Texas Rangers Oppose Bacardi’s Logo For Green Tea Spirit Because Of The ‘T’

        Now, while the letters “T” in both logos do look kinda-sorta similar, there’s a slight chance that’s because it’s a single freaking letter in the English language and there are only so many ways to depict a capital “T” in a recognizable way. The only real stylistical similarity in the two “T”s is the outjuts in the mid-section of the stem in each letter — known as “median spurs” and found on lots and lots of typefaces. Other than that, the letters are actually fairly distinct in style. And, of course, the rest of each logo has a shit-ton of other components which all severely demonstrate the source of each logo. This makes customer confusion laughably unlikely, particularly given that the Texas Rangers are known by the public to be in the sporting industry, even though the team claims it holds trademarks on its logo for use on beverages and food services.

    • Copyrights

      • ISP Trolls Copyright Troll With A Taste of Its Own Medicine

        Swedish Internet service provider Bahnhof is giving copyright trolls a taste of their own medicine. The company has sent a settlement request to the group that’s spearheading the copyright trolling efforts in Sweden, asking them to pay up for alleged trademark infringement, or else.

      • European Commission promises harshened copyright and untraceable free wifi everywhere on the same day

        The European Commission has promised a number of things related to IT in its State of the European Union address. Two promises that stand out are another harshening of the copyright monopoly in combination with a promise of public and free wifi from all public authorities. These are obviously in direct conflict, as a public wifi is easily (and commonly) used to circumvent digital distribution monopolies – and politicians seem completely unaware that these two promises probably shouldn’t be in the very same set of press releases.

        In the European Commission’s Digital Agenda RSS feed, there was a recent barrage of press releases related to the evaluation of the European Union Copyright Directive – the EU’s equivalent of the DMCA – where the Commission decided it was a good idea to introduce the “ancillary copyright” on news snippets for legacy news organizations. Yes, that’s the complete moronity commonly known as the “Google Tax”, which I wrote about in a previous post.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts