07.27.14
Posted in News Roundup at 11:34 am by Dr. Roy Schestowitz

Contents
-
Kernel Space
-
Benchmarks
-
Complementing yesterday’s Radeon, Intel, and Nouveau benchmarks using the very latest open-source driver code, here’s some power consumption, performance-per-Watt, and thermal numbers when using an assortment of graphics processors on the latest open-source drivers.
-
Applications
-
Atraci is a new open source music player which uses YouTube as a source. The app supports creating playlists and comes with some basic features like repeat, shuffle and so on.
-
-
-
-
-
Instructionals/Technical
-
Games
-
-
-
Epic Games has posted another video about their upcoming free Unreal Tournament game that is natively supporting Linux.
-
Frozen Synapse developer Mode 7 has renamed its strategic future sports sim, switching from Frozen Endzone to Frozen Cortex, which sounds less like what happens if you sit on an iceblock.
-
The online sale and distribution service of PC games, GOG Ltd. accidentally gave away a whole bunch of Linux games to its users.
-
-
-
Desktop Environments/WMs
-
Unlike Windows or Mac OS X, Linux offers a wide variety of desktop environments. Here are my picks of the most important of these PC interfaces.
-
K Desktop Environment/KDE SC/Qt
-
After the KDE 4.0 debacle I wrote KDE off as a lost cause. Only in the past year have I rediscovered just how good KDE is, but that doesn’t excuse a 9 year old bug, and possibly a show-stopping bug from being ignored. Imagine with me for a moment. Your buddy tells you how great Linux is and he gives you a disk to use and install. Since you are tired of the horse crap Microsoft has been feeding you for two decades, you decide to do something about it.
-
While not incorporating Plasma 5 and KDE Frameworks 5 (coming later this year will be a 4/5 mix release), the third beta to KDE 4.14 is now available.
-
Before heading into the weekend I thought about writing a small update about the KDecoration2 status. Since my last blog post I started integrating KDecoration2 into KWin. This was partially easier and partially more difficult than anticipated. Especially ripping out the old decoration code is rather complex. There are quite some design differences which make the transition complex and especially values inside KWin core are using enums defined in the decoration API – e.g. the maximized state is kept as a KDecorationDefines::MaximizedMode. This will need further work to move the enums and so at the moment the old decoration library is still compiled although the library is no longer in use.
-
This is a quick blog post to say that I’m working on support for the Node.js framework by the KDevelop QML/JS language plugin. Th e first part of my work is already finished: “require” is properly recognized and Node.js modules are properly looked-up and included. The “exports” and “module.exports” identifiers are also recognized and allow Javascript files to export symbols and to be used as modules. This means that you can now edit Javascript files using Node.js and have most of the modules recognized, included and parsed.
-
GNOME Desktop/GTK
-
GUADEC 2014 is taking place in Strasbourg. Because GNOME has been the default desktop environment in Fedora from the very beginning, and is going to be the environment for Fedora Workstation, I’ve decided to cover GUADEC for Fedora Magazine.
-
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
Flavours and Variants
-
Deepin is a rather interesting distribution of GNU/Linux. It’s especially useful if you haven’t tried out GNU/Linux before. Website makeuseof.com said recently: “It’ll be interesting to see how this distribution progresses… and seriously hope that it gets more popular because it definitely has the potential to be huge. More people just need to hear about it.”
-
-
Phones
-
Android
-
An administrator responded on the OnePlus blog by giving a clear indication the One will eventually be available to buy in India. At launch (even though there was no official launch) the OnePlus One was only available in North America and Europe. However it now seems that India is one of the country’s most eager to purchase the device. According to the OnePlus blog India ranks eight in the world via traffic trying to obtain the device through the OnePlus site. If this is correct than this ranks India higher than a number of the countries the device was actually launched in.
-
Sub-notebooks/Tablets
-
These are real people and organizations buying these tablets. The real PC is no longer a big box filled with air and fans, but a tiny energy-sipping small cheap computer running */Linux. OK, quite a few run iOS but iOS has certainly lost most of its early lead.
-
-
-
-
Docker will be using Orchard’s Fig orchestration tool to help automate deployment of the open source container-based virtualization platform, and will discontinue Orchard’s hosted Docker service.
-
The open source project OpenDaylight is on a mission to increase enterprise adoption of software-defined networking (SDN). Read about this ambitious effort to unite all SDN controllers.
-
Web Browsers
-
Modular, Open Source, Hackable – Breach is ticking all the boxes with the ambitious browser project they launched this month. The team, originally composed of TOTEMS (formerly Nitrogram) CTO Stanislas Polu, Socket.io (now Automattic)’s Guillermo Rauch, Alejandro Vizio & others, is now made up of around 80 developers collaborating on the project.
[...]
Built on Google’s open source Chromium project, Breach goes one step beyond Mozilla & Chrome, who enable developers to build 3rd party add-ons/plugins for the respective browsers – when you first start Breach, it has no functionality. Functionalities are brought in by modules, meaning that everything down to the core features of a browser – navigation, display, etc. – are hackable.
-
Chrome
-
Google is trying to migrate its Chrome browser away from the buggy OpenSSL cryptography library toward BoringSSL, its homegrown fork, but swapping out the crypto code is proving more difficult than it sounds.
-
SaaS/Big Data
-
When does a software project grow to the point where one must explicitly think about governance? The term “governance” is stiff and gawky, but doing it well can carry a project through many a storm. Over the past couple years, the crucial OpenStack project has struggled with governance at least as much as with the technical and organizational issues of coordinating inputs from thousands of individuals and many companies.
-
-
-
-
-
It looks like an open source, on-premise implementation of Dropbox. Look closer, though, and you’ll see a way to securely open up object stores on an OpenStack platform.
-
Zettaset will soon offer individual components of its Orchestrator security and management software for Hadoop and NoSQL Big Data platforms as standalone applications, starting with the data-encryption module.
-
Additionally, the companies will integrate their engineering strategies and work together to enable HP customers to deploy the Hortonworks Data Platform as the Hadoop component of HP HAVEn.
-
CMS
-
The open-source WordPress blog and content management system (CMS) software is widely deployed and is increasingly being targeted by attackers too.
-
Education
-
One of Germany’s top universities wants to ditch German and switch almost all of its master’s programmes to English in the next six years, prompting fears that the academic standing of the German language is under serious threat.
-
Business
-
Semi-Open Source
-
Actuate signed on with the Eclipse Foundation as a Strategic Developer back in 2004, just a few months after the organization was founded. The South San Francisco-based company proposed the industry’s first open-source Business Intelligence and Reporting Tools project (BIRT), and a decade later, BIRT is one of the best known open-source initiatives for data-driven development.
-
FSF/FSFE/GNU/SFLC
-
Linus Torvalds’ latest tirade is over the GCC 4.9 code compiler.
In a kernel mailing list thread about a random panic in a load balance function with the in-development Linux 3.16 kernel, Torvalds looked at the code being generated by GCC 4.9 and was disgusted with the output.
-
Last week in Cambridge (UK) was the GNU Tools Cauldron 2014 conference where a number of interesting GCC-related talks took place, including greater collaboration between the GCC and LLVM/Clang compiler crews.
-
At Red Hat, we take pride in the fact that we actively contribute to the projects that are used to build our set of leading enterprise solutions. And when one project’s community is distinguished for their exemplary efforts – we want to recognize them as well.
As such, we are pleased to announce that the GNU Compiler Collection (GCC) has received the Association for Computing Machinery’s (ACM) 2014 Programming Languages Software Award. Awarded to an institution or individuals that have developed a software system with lasting influence, the award recognizes GCC’s 27 years of success and the substantial impact it has had on the software industry, an example of which is its importance to modern datacenter operations.
-
-
Openness/Sharing
-
Open Hardware
-
-
The author is Craig Smith, a security researcher at Theia Labs and part of OpenGarages, a group of vehicle modding enthusiasts. Smith is looking for guest authors for future versions of the handbook. “Car hacking is a group activity and we welcome all feedback,” he writes.
-
Millions of people awaiting US travel documents have been left in limbo, as a major computer glitch crashed the United States global system for passport and visa services.
-
But he was allegedly turned away by border control when he tried to get back to the US for the Comic-Con conference in San Diego.
-
Science
-
Shortly before the mission, though, the CIA got word that Russia was about to send a two-man craft to orbit the moon. The U.S. couldn’t let Russia get ahead in the space race, so they changed the mission.
-
Health/Nutrition
-
It took 13 years for the United States to come to its senses and end Prohibition, 13 years in which people kept drinking, otherwise law-abiding citizens became criminals and crime syndicates arose and flourished. It has been more than 40 years since Congress passed the current ban on marijuana, inflicting great harm on society just to prohibit a substance far less dangerous than alcohol.
-
David Tredinnick, a member of Commons committees on health and science, says Britain should look to the stars to improve the nation’s health
-
-
A federal judge in Mexico overturned a permit that allowed Monsanto to plant GMO soy when evidence proved that the frankenplants endangered native honeybee colonies.
-
Security
-
-
In a world of always-on connectivity, Internet of Everything and Internet of Things, where most devices now have an embedded computer, the risk posed by hackers tampering with them cannot be overlooked.
-
Defence/Police/Secrecy/Aggression
-
-
-
A series of unanswered questions about the downing of Malaysia Airlines Flight 17 shows the limits of U.S. intelligence gathering even when it is intensely focused, as it has been in Ukraine since Russia seized Crimea in March.
-
U.S. intelligence officials suggest that the person who fired the missile that downed Malaysia Airlines Flight 17 may have been “a defector” from the Ukrainian army, an apparent attempt to explain why some CIA analysts thought satellite images revealed men in Ukrainian army uniforms manning the missile battery, writes Robert Parry.
-
The Russian government has finally realized that it has no Western “partners,” and is complaining bitterly about the propagandistic lies and disinformation issued without any evidence whatsoever against the Russian government by Washington, its European vassals, and presstitute media.
-
As the Gaza conflict intensified, the Palestinian death toll surpassed 700, more than two-thirds of them civilians. Add to that 4,000 injured, widespread infrastructure destruction, and 1.8 million Palestinians trapped in an area the size of Manhattan. On the Israeli side, the civilian death toll is three.
-
-
-
Israel has killed almost 800 Palestinians in the past twenty-one days in the Gaza Strip alone; its onslaught continues. The UN estimates that more than 74 percent of those killed are civilians. That is to be expected in a population of 1.8 million where the number of Hamas members is approximately 15,000. Israel does not deny that it killed those Palestinians using modern aerial technology and precise weaponry courtesy of the world’s only superpower. In fact, it does not even deny that they are civilians.
-
Hamas and its Palestinian and Western propagandists continue to insist that the Islamist movement does not use civilians in the Gaza Strip as human shields during war. But the truth is that Hamas itself has admitted that it does use innocent civilians as human shields, to increase the number of casualties and defame Israel in the eyes of the international community.
[...]
Palestinian sources have confirmed that Hamas has executed at least 13 Palestinians on suspicion of “collaboration” with Israel. None of the suspects was brought to trial, and the executions were reportedly carried out in the most brutal manner, with torture that included severe beating and breaking arms and legs.
-
Army says it has used ‘riot dispersal means’ against protesters but refuses to comment on live round use
-
An old foreign correspondent friend of mine, once based in Jerusalem, has turned to blogging. As the story he used to cover flared up once more, he wrote: “This conflict is the political equivalent of LSD – distorting the senses of all those who come into contact with it, and sending them crazy.” He was speaking chiefly of those who debate the issue from afar: the passions that are stirred, the bitterness and loathing that spew forth, especially online, of a kind rarely glimpsed when faraway wars are discussed. While an acid trip usually comes in lurid colours, here it induces a tendency to monochrome: one side is pure good, the other pure evil – with not a shade of grey in sight.
-
-
Once again the Gaza Strip is subject to intense attack from Israeli forces. As of yesterday the Palestinian Centre for Human Rights has documented 593 killed, among them 483 civilians – 151 children, 82 women – and 3,197 injured. Among the injured are 926 children and 641 women, although this does not include the figures for the border areas or the Shejeia area.
-
I don’t know about you, but if the attack had happened to me, I would be pretty damn angry. Yet on Monday, Human Rights Watch, one of the world’s leading human rights organizations, issued a report on the fighting in Gaza that accused Israel of “war crimes” because one of its “accurate missiles” had struck a hospital (unlike in my parable, no one was killed but four patients and staff were wounded). Therefore, according to Human Rights Watch, given the accuracy of the Israeli weapons, this must have been an “intentional or reckless attack” deserving of a war crimes prosecution even though, according to Israel, the hospital grounds were being used by Hamas to fire rockets and Israel had given an advance warning.
-
An estimated 45,000 people marched through London from the Israeli Embassy to Parliament Square, via Trafalgar Square and Whitehall, according to figures released by the Metropolitan Police.
-
-
-
The United States shut down its embassy in Libya on Saturday and evacuated its diplomats to neighbouring Tunisia under U.S. military escort amid a significant deterioration in security in Tripoli as fighting intensified between rival militias, the State Department said.
-
-
Militants resumed firings rockets into Israel from Gaza on Saturday, rejecting an extension to a ceasefire in a conflict in which more than 1,000 Palestinians, mostly civilians, have died.
-
Sunday, July 27, 2014 – Pakistan from the 1950s onwards, is insisting to go together with the US despite all the negative and even shameful experiences we have made in this relationship. The first Prime Minister of Pakistan Liaquat Ali Khan, preferred to visit the US instead of Moscow first, and was afterwards assassinated when he refused to give air bases to US for spying on USSR.
-
A Hamas official says the group has rejected a four-hour extension of a humanitarian truce proposed by Israel.
-
We’ve written twice about the Maryville, Tennessee restaurant that has seen it’s business go through the roof after posting signs that lawfully carried handguns were welcome.
-
On July 10, 2014, in New York State, Judge David Gideon sentenced Mary Anne Grady Flores to a year in prison and fined her $1,000 for photographing a peaceful demonstration at the U.S. Air National Guard’s 174th Attack Wing at Hancock Field (near Syracuse) where weaponized Reaper drones are remotely piloted in lethal flights over Afghanistan. Dozens have been sentenced, previously, for peaceful protest there. But uniquely, the court convicted her under laws meant to punish stalkers, deciding that by taking pictures outside the heavily guarded base she violated a previous order of protection not to stalk or harass the commanding officer.
-
Can’t Golding see the distinction between collateral killing of another nation’s civilians during ‘war’ and extrajudicial slaughter of Jamaican citizens by Jamaican police sworn to protect all citizens? For someone Booklist Boyne insists is brilliant, surely he could’ve found more suitable analogies such as the treatment of black Americans under Jim Crow laws particularly by crazed mobs, including law-enforcement officers hiding under white hoods. Still, the distinction is Jim Crow is defunct, while we still butcher innocents and guilty alike without troubling the courts.
-
Former Green MP Keith Locke is urging New Zealanders to demand information about the Kiwi killed in a drone strike overseas last year.
-
World history is filled with empires, e.g. the Roman and Byzantine empires, the European colonial empires, various ancient Iranian empires, the Arab Caliphate and Ottoman Empire, the Soviet Union to name a few. These historic empires have one thing in common: they no longer exist. As the lifecycle of empire wanes, rather than being a benefit to the home country, sustaining empire becomes more expensive than it is worth.
-
Around 5,000 people took part in a protest against the war in Tel Aviv on Saturday night, with a heavy police presence to deter rightwing extremists who abused and attacked the demonstrators.
-
Environment/Energy/Wildlife
-
A major drought across the western United States has sapped underground water resources…
-
“Your equipment will be confiscated if you try to return,” said a masked protester to contractors doing prep work for pipelines to proposed LNG terminals.
-
…struggle against the spread of fossil fuel pipelines.
-
Finance
-
Bitcoin is a digital currency that became popular in 2013. It’s not controlled by banks, or anyone. It’s a decentralised currency designed to free out money from those who would oppress us. But how does a digital currency work? How can it be valid if there’s no one to say who has what? Ben Everard investigates.
-
The cost of redundancy payments for NHS managers has hit almost £1.6bn since the coalition came to power and embarked on its sweeping reorganisation, according to the latest Department of Health accounts.
The total includes payouts to some 4,000 “revolving door” managers, who left after May 2010 with large payouts but have since returned either on full-time or part-time contracts.
-
China is supplanting America’s international role, new data from the Pew Research Global Attitudes Project shows the growing international consensus in this regard.
The median percentage of people naming US as the world’s leading economic power has dropped from 49% six years ago to 40% today. During the same period, the percentage of people naming China has risen from 19% to 31%, according to Pew’s analysts.
-
About one per cent of Chinese households own one-third of the nation’s wealth, a report has said, raising concerns about income inequality in the world’s most populous country led by Communist Party of China.
-
Presenting the radical new proposal, Natalie Bennett, the Green leader, said other political parties only offered minor tweaks to the UK’s failed economic system, instead of major changes to deal with inequality.
-
PR/AstroTurf/Lobbying
-
The revelation that undercover Met officers spied on the family of Jean Charles De Menezes after they murdered him, leaves me utterly appalled.
You have to consider this in the context of the lies that the Met assiduously spread about De Menezes – that he entered the tube without buying a ticket, that he vaulted the ticket gates, that he ran away from officers, that he was wearing a bulky jacket.
-
Censorship
-
Jimmy Wales says that “right to be forgotten laws” must not mean that a private company such as Google is in charge of deciding what parts of history are recorded and which are erased
-
A new open-source project called Streisand is designed to make it easy to setup a new server running a wide variety of anti-censorship technologies that can completely mask and encrypt all Internet traffic, and essentially circumvent most forms of online censorship.
-
Privacy
-
His audience was the crowd at the Hackers On Planet Earth conference, a group of people no one would ever mistake for attendees at a political convention. Amid the sea of black clothing were many unconventional fashion statements: purple bandanas and balloon pants, and tartan kilts, and white robes, and green hair. The only man in sight in a suit and tie was also toting around a pair of payphones of murky provenance. Even the federal agents present had found a way to blend into the crowd of EFF merchandise and white dude dreadlocks.
-
Two MPs, Tom Watson and David Davis, are to sue the government for introducing “ridiculous” emergency legislation allowing police and security services access to people’s phone and internet records.
-
-
Pen, notebook – and encryption key. It’s time to add digital security to the reporter’s toolkit, security experts say, and that includes journalists in New Zealand.
-
An Ontario judge has agreed to hear a Charter of Rights challenge brought by Telus and Rogers after they were asked by police in April to release cellphone information of about 40,000 to 50,000 customers as part of an investigation.
Justice John Sproat says that the case has highlighted important issues about privacy and law enforcement that should be challenged in open court, even though Peel regional police tried to withdraw the requests.
-
NSA in 2009 spied also on other leaders of the Balkan countries, like the PM of Bosnia and Herzegovina Federation, Nexhat Brankoviq and the former Croatian president, Stipe Mesiq. The news was made public by the digital library “Kriptom”, that deals with secret documents.
-
Civil Rights
-
The extortion case against Thomas DiFiore, a reputed boss in the Bonanno crime family, encompassed thousands of pages of evidence, including surveillance photographs, cellphone and property records, and hundreds of hours of audio recordings.
But even as Mr. DiFiore sat in a jail cell, sending nearly daily emails to his lawyers on his case and his deteriorating health, federal prosecutors in Brooklyn sought to add another layer of evidence: those very emails. The prosecutors informed Mr. DiFiore last month that they would be reading the emails sent to his lawyers from jail, potentially using his own words against him.
-
A combination of midazolam-hydromorphone led to Joseph Wood ‘gasping and snorting’ for almost two hours during his execution on Wednesday night
-
What if democracy as it has come to exist in America today is dangerous to personal freedom? What if our so-called democracy erodes the people’s understanding of natural rights and the reasons for government and instead turns political campaigns into beauty contests? What if American democracy allows the government to do anything it wants, as long as more people bother to show up at the voting booth to support the government than show up to say no?
-
The inspector general for the CIA obtained a “legally protected email and other unspecified communications” between whistleblower officials and lawmakers related to alleged whistleblower retaliation. The CIA inspector general allegedly failed to investigate claims of retaliation against an agency official for helping the Senate intelligence committee with the production of their report on torture, according to McClatchy Newspapers.
-
About a dozen former CIA officials named in a classified Senate report on decade-old agency interrogation practices were notified in recent days that they would be able to review parts of the document in a secure room in suburban Washington after signing a secrecy agreement.
-
About a dozen former CIA officials named in a classified Senate report on decade-old agency interrogation practices were notified in recent days that they would be able to review parts of the document in a secure room in suburban Washington after signing a secrecy agreement.
Then, on Friday, many were told they would not be able to see it, after all.
-
The European Court of Human Rights yesterday ruled against Poland, charging our ally with human rights violations for helping the CIA operate an ‘extraordinary rendition’ program in which two persons suspected of terrorism were delivered to a “black site” in 2002-2003, for detention, interrogation and torture — in the attempt to extract bogus confessions.
-
A tentatively titled and reported New York Times article glimpses former agency director George Tenet’s efforts to suppress and discredit a report accusing “former C.I.A. officials of misleading Congress and the White House” about the agency’s detention and interrogation program.
-
Over the past several months, Mr. Tenet has quietly engineered a counterattack against the Senate committee’s voluminous report, which could become public next month. The effort to discredit the report has set up a three-way showdown among former C.I.A. officials who believe history has been distorted, a White House carefully managing the process and politics of declassifying the document, and Senate Democrats convinced that the Obama administration is trying to protect the C.I.A. at all costs.
-
-
It’s the latest chapter in the drama and recriminations that have been playing out behind the scenes in connection with what some call the Senate torture report, a summary of which is being declassified and is expected to be released in the coming weeks.
“I am outraged,” said John Rizzo, one of the former officials who was offered, and then refused, a chance to see the summary report before publication. He retired in 2009 as the CIA’s top lawyer after playing a key role in the interrogation program.
-
Several former CIA officials are outraged that the Senate withdrew its offer to allow them to read an extensive report on interrogation techniques that many of them are implicated in.
-
The Senate Select Committee on Intelligence is set to publicly release — as early as next week — selected and carefully redacted portions of its 6,300 page report on controversial CIA detention, rendition, and interrogation techniques used after 9/11, several administration and intelligence officials said.
-
From El Salvador, Guatemala and Honduras, these people are coming from nations where the U.S. in the past frequently meddled in their internal affairs, often with quite negative effects.
-
-
Internet/Net Neutrality
-
Chattanooga and Wilson, North Carolina, are two of the most successful municipal fiber networks by a variety of metrics, including jobs created, aggregate community savings, and more. This has led to significant demand from surrounding communities for Wilson and Chattanooga to expand. We have profiled both of them in case studies: Wilson and Chattanooga.
[...]
And both Sam Gustin and Karl Bode were quick to post on the matter as well. Sam wrote on Motherboard at Vice:
In states throughout the country, major cable and telecom companies have battled attempts to create community broadband networks, which they claim put them at a competitive disadvantage.
Last week, Rep. Marsha Blackburn, the Tennessee Republican who has received tens of thousands of dollars in campaign contributions from the cable and telecommunications industry, introduced an amendment to a key appropriations bill that would prevent the FCC from preempting such state laws. The amendment passed in the House of Representatives by a vote of 233-200, but is unlikely to make it through the Senate.
-
We’ve written a few times about the highly cynical astroturfing practice in Washington DC, in which certain lobbyist groups basically have “deals” with certain public interest groups. The basic deal is that the lobbyists guarantee big cash donations from their big company clients, and then the lobbyists get to write letters “on behalf of” those organizations for whatever policy they want enacted (or blocked).
-
DRM/Locking
-
House gives in, passes the Senate version that unlocking activists preferred.
-
Nearly 900 authors across world back criticism of online retailer’s business tactics in ebooks dispute with US publisher Hachette
-
Intellectual Monopolies
-
Germany is to reject a multi-billion free trade deal between the European Union and Canada which is widely seen as a template for a bigger agreement with the United States, a leading German paper reported on Saturday.
Citing diplomats in Brussels, the Sueddeutsche Zeitung reported that Berlin objects to clauses outlining the legal protection offered to firms investing in the 28-member bloc. Critics say they could allow investors to stop or reverse laws.
-
Trademarks
-
Copyrights
-
We’ve been covering the discussion around copyright reform down in Australia for a while, and it’s continuing to get worse and worse. As you may recall, after a long and detailed process, involving careful input from a variety of stakeholders on all sides of the equation, the Australian Law Reform Commission (ALRC) came out with a set of proposals that were actually pretty good, including things like introducing fair use to Australia.
-
-
-
Peter Sunde might be sitting in a Swedish prison for the next few months but he’s still making his voice heard. Following a recent dispute with authorities over food, the Pirate Bay founder has filed a new complaint after he was denied a meeting with a representative from the ‘pirate’ Church of Kopimism.
Permalink
Send this to a friend
Posted in Apple, Deception, Free/Libre Software, Microsoft at 6:45 am by Dr. Roy Schestowitz
Summary: New examples where proprietary software giants are characterised as FOSS-embracing and FOSS-friendly by gullible or dishonest ‘journalists’
Apple has made many headlines recently because of its back doors and Microsoft has made many headlines recently because of its massive round of layoffs (almost 20% of the staff). Both companies are proprietary software companies and they have a lot in common.
Techrights is disturbed to have found continued distortion of the facts. “Microsoft might finally be committing to open source” is a new article (reprinted here) which says: “Microsoft is known for keeping its programming secrets to itself. But under CEO Satya Nadella, the maker of proprietary behemoths like Windows and Microsoft Office is starting to show up in the world of open-source software, whose code is public for anyone to see, borrow from and tinker with.”
No, this is fiction. This is the fairly recent PR strategy that tries to associate the new CEO with FOSS, even though he continues using patents to attack FOSS and is running blatantly dishonest attack ads against FOSS products, especially Google’s. If Microsoft brings proprietary software to Android, for instance, this has nothing to do with FOSS. Quite the contrary in fact; it is about contaminating FOSS with proprietary spyware. The puff piece continues: “Late last year Microsoft finally made itself an account on Github, now the de-facto platform that software writers use for sharing and working on open-source code. “Microsoft has changed as a company and is becoming more open in the way that we collaborate with others,” the account’s description reads.”
Wow! Microsoft “made itself an account on Github”! Imagine the heroic act! I already have two accounts on Github, one for my job and one for my personal projects. The article goes on and makes all sorts of softball claims, pretending to be giving Microsoft the sceptical treatment.
Here is another silly new article, pretending that a proprietary NSA-accessible platform called Azure has “Open Source Partnerships”. It then cites the Microsoft proxy/mole “Microsoft Open Tech” by saying: “Microsoft Open Tech (MS Open Tech), a wholly owned subsidiary of Microsoft, has added two new partnerships under its belt. Announced during the ongoing O’Reilly Open Source Convention (OSCON) in Oregon, they have teamed up with Packer.io and OpenNebula.”
This proxy has done nothing FOSS-like. It just wants to devour FOSS by putting it under a proprietary platform with surveillance. OSCON and O’Reilly have once again shown themselves to be soft on Microsoft. Based on the amount of press coverage this has received [1, 2], one might say that Tim O’Reilly keeps giving Microsoft an effective propaganda platform. Microsoft has paid him for this, ensuring that a proprietary surveillance platform gets coverage in a supposedly FOSS-centric conference.
But let’s not focus only on Microsoft. Misreporting is often seen when it comes to Apple, the most hyped-up company in the world. It’s all about perception and branding. One author’s bias (he is a “Mac”-branded PC user) can be found in this supposedly FOSS-centric site. He says that “Apple is a beloved company in the open source community,” but based on our experiences, this is patently false. There is other promotional language there, including: “Despite being one of the most well run technology companies ever, Apple has a surprisingly complicated relationship with open source. Ironically, Apple is a beloved company in the open source community, but, now more than ever, it needs to hear the call to become more open. I’ve also always noted here on OStatic that many open source enthusiasts favor the Mac over Windows systems. That’s no surprise. Apple’s culture closely aligns with many open source principles, though its culture certainly isn’t totally open.”
What?!
“Apple’s culture closely aligns with many open source principles”?
In what universe?
There are other large companies that try to openwash themselves these days. We recently covered HP’s publicity stunts and here we have another, pretending that defanging one’s software patents is somehow an act of becoming “Open Source” (Tesla uses this type of propaganda).
A man from HP, speaking about OpenStack, says that “just as we indemnified Linux 15 years ago, we are doing exactly the same thing now.” Well, indemnification does not achieve much. Why acquire software patents in the first place? Why has HP been so hostile towards GNU/Linux, including in Munich? Why is HP hiring so many executives from Microsoft? Why is HP lobbying for software patents?
The bottom line is that many companies (if not all) want to be seen as “open”, but most of them are faking it. For the press to play along with their marketing/PR ambitious is worse than irresponsible; it is reckless. █
Permalink
Send this to a friend
Posted in Deception at 6:14 am by Dr. Roy Schestowitz
Summary: Bloomberg delivers ‘damage control’ and PR ahead of the layoffs announcement; Microsoft uses Nokia to hide it and Bloomberg helps Microsoft by radically modifying headlines
THERE has been something notably insidious about the coverage of Microsoft matters (and its rivals) in the Wall Street-friendly, plutocrat-owned Bloomberg.
Years ago we found explosive evidence about Dina Bass from Bloomberg. It showed how Microsoft had been grooming her and using her to produce puff pieces. Earlier this month Bass 'broke' the story about Microsoft layoffs but mostly delivered 'damage control', PR and spin. She was acting like a messenger of Microsoft. Microsoft is basically trying to blame it on Nokia, which Microsoft itself just merely destroyed (so much for the “job creator” nonsense).
The reality of Microsoft’s numbers is quite grim. For starters, actual sales (numbers) were down, which has nothing to do with Nokia. Watch this Bloomberg report titled “Microsoft’s Quarterly Profit Hurt by Nokia Acquisition”. This article actually had the headline “Microsoft Profit Misses Estimates on Weak Demand”, but this headline was changed by the editor. Fortunately we spotted this discrepancy and it shows that someone inside Bloomberg is changing the story. Suddenly it’s the fault of “Nokia Acquisition” rather than “Weak Demand”. Big difference, eh? We saw similar misdirections years ago when Microsoft announced other major layoffs.
If one looks closely at the cause, GNU/Linux (in the form of Chrome OS for the most part) is gaining as Microsoft simply scrambles to keep up (dumping) and still fails. As one article put it, “Microsoft (MSFT) has good reason to be worried about Chromebooks, the cheap laptops that run Google’s (GOOG) Chrome operating system.” Sales of Windows are down significantly and a lot of staff is being laid off. As for Nokia, Ahonen says there are “still no profits out of the ex-Nokia handset businessthat Elop wrecked. The smartphone unit has now produced 12 consecutive quarters of losses!” That’s since Microsoft stepped in. “Nokia Xpress Browser and MixRadio are likely to be spun off into a separate business,” says this article, so maybe we have another Jolla in our hands, or another Digia.
“I see that Microsoft has deployed another “Get The FUD” campaign against Chromebooks,” Ryan said in the IRC channels, “like they did when they lost their lunch to Linux in the server market. This time they’re even buying Google ads. I can’t blame them. Nobody uses Bing. It’s even thrown in your face in Vista 8.1, but it must be the first thing people turn off, because even that isn’t helping them.” █
Permalink
Send this to a friend
Posted in Microsoft, Security at 5:52 am by Dr. Roy Schestowitz
Summary: The vulnerabilities which Microsoft tells the NSA about (before these are patched) are significantly growing in terms of their numbers
NOT ONLY Apple should be in the headlines for its back doors, which Apple is hardly denying. Apple admits putting them in there, but is being evasive about the motives. What about Microsoft? Why is the press not covering Microsoft back doors, as confirmed last year?
The other day we found this report [via] about “Internet Explorer vulnerabilities increas[ing] 100%” (year-to-year):
Bromium Labs analyzed public vulnerabilities and exploits from the first six months of 2014. The research determined that Internet Explorer vulnerabilities have increased more than 100 percent since 2013, surpassing Java and Flash vulnerabilities.
Here is more on the subject:
The report summarises public vulnerabilities and exploit trends that the firm observed in the first six months of 2014 and found that Microsoft’s web browser set a record high for reported vulnerabilities in the first half of 2014 while also “leading in publicly reported exploits”.
Remember that Microsoft tells the NSA about these vulnerabilities before they are patched. Perhaps the media should stop focusing only on Apple’s back doors. █
Permalink
Send this to a friend
07.26.14
Posted in Free/Libre Software, FUD at 11:22 am by Dr. Roy Schestowitz
Summary: Symantec enters the AllSeen Alliance and Sonatype is once again trying to claim great insecurity in FOSS due to software licensing
THE surveillance-oriented AllSeen Alliance has welcomed Microsoft and other patent aggressors (such as Red Bend Software) into its ranks. Now we discover that Symantec, which has been disseminating FUD about GNU/Linux, joins this Alliance, as revealed by the Linux Foundation a couple of days ago. To quote: “Symantec is an AllSeen Alliance Community Member, one of the world’s largest software companies and a leader in security, backup and availability solutions. Roxane Divol, SVP Product and Services Acceleration Group for Symantec, shares why the company decided to join the AllSeen Alliance and how they plan to contribute to AllJoyn for a connected experience that will change the Internet of Things.”
Well, Symantec, like some other companies, has been making money from creation of fear, putting aside its Microsoft connections and history of hostility towards Linux and FOSS. Symantec is one of several.
There are those who cover a “legal” security angle (they call their licensing FUD ‘security’, as per a deceiving headline from some weeks ago). Some of those are well linked to Microsoft (e.g. OpenLogic and Black Duck) and another such player is Sonatype (it targets Microsoft’s proprietary software and .NET developers). We covered its FUD quite recently, after we had observed Sonatype’s FUD reports from last year. Watch the gross misuse of the word “suspected” to insinuate that many organisations don’t comply with FOSS licences. As if proprietary software licences are always obeyed, without leading to assaults from the BSA et al. It is not so hard — let alone expensive — to comply with FOSS licences. █
Permalink
Send this to a friend
Posted in OpenDocument at 11:08 am by Dr. Roy Schestowitz
Summary: Renewed activity in FOSS-leaning legal site Groklaw amid numerous victories for FOSS
IN LIGHT of the good news about ODF, Groklaw has broken its silence and come back to life for the first time in nearly a year. The Document Foundation [1], its members [2], and some FOSS [3] or general news sites [4] have covered this as well because it’s a major breakthrough. There is other good news, such as the USPTO narrowing the scope of software patents, eliminating many of them. The “USPTO’s Scrutiny Of Software Patents Paying Off,” says this one article, which adds: “Though recent U.S. Supreme Court rulings have not provided much help, the U.S. Patent and Trademark Office’s efforts to more closely scrutinize software patents is reducing the incentive for patent applicants to seek vague, broad claims, experts told USPTO officials at a forum Tuesday.”
No wonder Groklaw is eager to say something and perhaps come back for good. It will hopefully return to covering FOSS issues, such as the IRS assault on FOSS, patents against Android (China revealed Microsoft’s patents and Microsoft’s booster Richard Waters reveals that Qualcomm too might be affected [5]), among many other issues that never received an extensive legal coverage. █
Related/contextual items from the news:
-
-
On Tuesday the news that the UK Government had decided to use ODF as its official and default file format started to spread. The full announcement with technical details may be found here; the Document Foundation published its press release on Thursday morning there.
-
-
The UK government has announced the open standards it has chosen for sharing and viewing official documents.
The government has formally adopted the Open Document Format (ODF) as the standard for sharing and collaborating on documents and PDF/A or HTML as the standard for viewing documents. These standards are expected to be used across all government bodies.
-
Qualcomm became the latest US technology company to suffer a reversal in China, as it warned on Wednesday that a government investigation there had added to its difficulties in collecting licensing fees on new mobile devices.
[...]
The warning follows a dent to Chinese revenues at other US IT companies such as Cisco and IBM, which have been hit by falling demand amid reports of official Chinese moves to discourage purchases of US technology in the wake of the intelligence revelations by former CIA contractor Edward Snowden.
Permalink
Send this to a friend
Posted in News Roundup at 8:28 am by Dr. Roy Schestowitz

Contents
-
-
Desktop
-
Acer has seen booming sales of Chromebooks, including government procurement orders for educational purposes in many countries, and therefore has asked supply chains to increase production to reduce supply shortages, according to company CEO Jason Chen, adding that global Chromebook shipments in 2014 are expected to increase 70% on year.
-
Kernel Space
-
The Linux Foundation is honoring some of its very own SysAdmins in celebration of SysAdmin Day 2014 by profiling them here on Linux.com.
-
System administration can be a thankless job. To all of the tireless administrators out there who keep the systems we reply upon up and running, today is the day that we say thank you!
-
Happy SysAdmin Day 2014! Over the past three weeks we’ve been profiling the Linux Foundation’s heroic team of system administrators in honor of the amazing work they do behind the scenes to keep this organization and our collaborative projects humming. Here are some of their best quotes, which highlight just how talented, passionate and also fun-loving Linux SysAdmins really are.
-
Graphics Stack
-
For the better part of a year, the X.Org Foundation has been evaluating a possible merger with SPI. That work is still ongoing and could be put up for a vote in the weeks ahead.
-
Benchmarks
-
As the second part of our Linux graphics testing this week after a Radeon R600/RadeonSI performance update with the Linux 3.16 kernel and Mesa 10.3-devel are some comparative numbers that include Intel’s Haswell HD Graphics and various NVIDIA GeForce graphics cards on the Nouveau driver.
-
Applications
-
Rygel, a home media solution (UPnP AV MediaServer) that allows users to easily share audio, video, and pictures to other devices, is now at version 0.23.2.
-
Instructionals/Technical
-
Wine or Emulation
-
The Wine development release 1.7.23 is now available.
What’s new in this release (see below for details):
- Better support for files drag & drop.
- Improvements to the HTTP cookie management.
- Initial support for 64-bit Android builds.
- Fixes to crypto certificates management.
- Various bug fixes.
-
-
Games
-
-
-
For long-suffering Linux users who have endured the dearth of high-quality action games on their open source desktops, the wait for better game developer support soon may be over.
-
-
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
KDE has released the third beta of the 4.14 versions of Applications and Development Platform. With API, dependency and feature freezes in place, the focus is now on fixing bugs and further polishing. Your assistance is requested!
-
GNOME Desktop/GTK
-
-
-
Here the new GNOME release just in time for GUADEC, this time from Strasburg!! Remember this is a development release, so go ahead and test it, break it, send bug report and patches!
-
-
-
-
Red Hat Family
-
Global Knowledge , the world’s leading IT and business skills training provider, today announced the availability of new courses to support the recently launched Red Hat Enterprise Linux (RHEL) 7 . Red Hat Enterprise Linux 7 establishes the foundation for the open hybrid cloud and serves enterprise workloads across converged infrastructures – pushing the operating system beyond today’s position as a commodity platform.
-
Debian Family
-
-
TAILS Linux, used by Edward Snowden to communicate with journalists, is patching holes in one of its network overlays
-
If you want to use Tor, then Tails is your best friend. Tails is a version of Linux that sends data through the Tor network.
All Internet traffic to/from Tails goes through Tor, making it resistant to end user mistakes. Tails is not normally installed on a computer, instead it’s run from a bootable DVD, USB flash drive or flash memory card. Compared to the Tor Browser Bundle, Tails is unquestionably the way to go. Ed Snowden uses it.
-
Elive 2.3.4 Beta, a complete operating system for your computer, built on top of Debian GNU/Linux and customized to meet the needs of any user while still offering the eye-candy with minimal hardware requirements, has been released and is now available for download and testing.
-
Cornell University’s Gemini AUV will compete in next week’s 2014 RoboSub competition. The sub runs Debian Linux on an Intel Core-based computer-on-module.
The Cornell University Autonomous Underwater Vehicle (CUAUV) team’s Gemini AUV will enter next week’s 17th Annual International RoboSub competition with the help of Adlink, whose ‘Express-HL’ COM Express style computer-on-module will power the autonomous sub using a stripped down version of Debian ‘Wheezy’ Linux. The competition will be held at the Space and Naval Warfare Command Research facility in San Diego, from July 28 through August 3.
-
Derivatives
-
Canonical/Ubuntu
-
Canonical has announced that Ubuntu 14.04.1 LTS, the first point release in the new series, has been released and is now available for download.
-
In today’s open source roundup: Canonical releases an update to Ubuntu 14.04. Plus: The NY Times bashes open source for not making enough money, and a review of Deepin 2014
-
Canonical announces that a number of Apache HTTP Server vulnerabilities have been found and fixed in its Ubuntu 14.04 LTS, Ubuntu 12.04 LTS, and Ubuntu 10.04 LTS operating systems.
-
-
Denon debuted a line of Sonos-like wireless multi-room HiFi speakers that stream audio from both Internet and local sources, and run on embedded Linux.
Like the similarly Linux-powered devices available from Sonos, Denon’s ‘Heos’ wireless streaming speakers offer multi-room (multi-speaker) synchronized audio, and can deliver multiple audio streams from disparate sources to individual speakers or stereo-configured speaker pairs distributed around the home. Subscription streaming sources initially offered by Denon include Rhapsody, Pandora, Spotify, and TuneIn, with additional services offering DRM-free tracks ‘coming soon,’ says the company.
-
First off, Happy SysAdmin Day. We think we have a pretty good SysAdmin surprise in store for you today as we are announcing the CoreOS stable release channel. Starting today, you can begin running CoreOS in production. This version is the most tested, secure and reliable version available for users wanting to run CoreOS. This is a huge milestone for us.
-
CoreOS, the lightweight Linux distribution designed for clustered deployments and depends upon utilization of Docker/LXC software containers, has experienced its first stable release.
-
SaaS/Big Data
-
The future of cloud computing lies in open source. That’s the message this week enterprise software giant SAP, which has announced significant new endorsement of open source cloud projects OpenStack and CloudFoundry, as well as the release of related developer resources.
-
Oracle/Java/LibreOffice
-
Anyway, I took the leap of faith and proceeded with the installation. OpenMandriva Lx worked like a charm: it took care of the partitioning (interestingly, it said “Moondrake” instead of “OpenMandriva” :D) and installed itself in less than 10 minutes. When we booted the machine (expecting a catastrophe, if I must be honest), none of our visions of doom panned out. GRUB2 picked up Windows 7, that OS was fully operational, and OpenMandriva also launched (desktop effects included, yay!).
-
We’ve now converted all but 54 of LibreOffice’s classic fixed widget size and position .src format elements to the GtkBuilder .ui format. This is due to the much appreciated efforts of Palenik Mihály and Szymon K’os, two of our GSOC2014 students, who are tackling the last bunch of hard to find or hard to convert ones.
-
Healthcare
-
Will the next revolution in healthcare be built on open source collaboration and principles? There are increasing signs that it will be, and that the old model of scientists and doctors pursuing breakthroughs behind closed doors might be broken. Samsung, for example, has announced the Samsung Digital Health Initiative, which will be based on open hardware platforms and open software architecture. The initiative has several arms, and one surrounds an open healthcare platform called SAMI. Apple, too, announced its HealthKit at this year’s Worldwide Developer Conference, although it remains to be seen how open that effort will be.
-
BSD
-
The FreeBSD project has issued their latest quarterly status report that covers activities for the open-source operating system made between April and June of 2014.
-
FSF/FSFE/GNU/SFLC
-
GNU Octave is a project started by James Rawlings and John Ekerdt, but its main developer is John Eaton, with the name inspired by the chemist Octave Levenspiel.
-
The Guix package manager that’s designed to be a purely-functional package manager for GNU with an emphasis on being dependable, hackable, and liberating is out with its latest release.
-
Openness/Sharing
-
Programming
-
“All software contains security flaws,” touts the homepage of Bugcrowd, a new site that seeks to streamline the way flaws are reported by enforcing crowdsourced “responsible disclosure” policies. The Bugcrowd statement is probably pretty close to correct, too. As we’ve reported, Google, Mozilla and other companies have had success offering cash bounties for people who find security flaws, and those who find them are often security researchers.
-
Security
-
Defence/Police/Secrecy/Aggression
-
-
-
An 80-year-old local Navy veteran is facing a potential year in prison if convicted of charges stemming from his involvement in an anti-drone protest at a New York Air Force base in April.
-
The results of this three-trillion-dollar effort included 4500 U.S. soldiers dead and another 32,000 seriously wounded;150,000 to 400,000 Iraqis killed; and another 2.3 million Iraqis turned into refugees.
-
The United States has boosted the number of surveillance flights over Iraq to nearly 50 a day from one a month as it faces militants who control swaths of Iraqi territory, a top State Department official said on Wednesday.
-
U.S. efforts to undermine democracy were spectacularly illustrated in Guatemala. Its “democratic spring” was ended by a CIA coup in 1954. A bloody, three-decade civil war followed. Hundreds of thousands, mostly non-combatants, were killed. Guatemala today is still characterized by extreme social inequality, pervasive drug violence and corruption, and impunity for human rights violations.
-
Repeated inconsistencies in Israeli descriptions of the situation have sparked debate over whether Israel wanted to provoke Hamas into a confrontation. Israeli intelligence is also said to have known that the boys were dead shortly after they disappeared, but to have maintained public optimism about their safe return to beef up support from the Jewish diaspora.
-
In 2006, the CIA released documents showing that it wrote to its West German counterpart in 1958, saying it had information that Eichmann “is reported to have lived in Argentina under the alias ‘Clemens’ since 1952″.
-
As the Israeli killing of Palestinians spreads from Gaza to the West Bank, Prime Minister Netanyahu weighs his pursuit of military objectives against growing world outrage. But his trump card remains the fear of U.S. politicians to voice any criticism of Israel, as ex-CIA analyst Paul R. Pillar notes.
-
These past weeks, Israel has established its dominion possibly for the first time since A.D. 70 by destroying holes in the ground built by terrorists to kill them. Israel is no longer a Washington abstraction. It no longer asks Washington or anyone else for permission to be. It is now a Jewish place. Hamas fights for abstractions, as do Sen. John McCain (R-Ariz.) and Secretary of State John Kerry. Jews today fight for earth; filling holes of terror which go back to the Oslo Accords and to the “co-presidency” of Hillary and Bill Clinton in their fleeting moment of global arrogance which has cost the death of thousands.
-
A 12-hour truce has begun in Gaza, as efforts continue to secure a longer ceasefire between Israel and Hamas and the scale of damage becomes clear.
-
-
After days of placing hostile blame for the downing of the Malaysian airliner on Russia, the White House permitted US intelligence officials to tell reporters that there is no evidence of the Russian government’s involvement.
-
Both these politicians have shamelessly sought to exploit this terrible tragedy to step up their pro-war and imperialist propaganda and they have been urged on by the capitalist media.
-
-
-
-
-
French soldiers recovered a black box from the Air Algerie wreckage site in a desolate region of restive northern Mali on Friday, officials said. Terrorism hasn’t been ruled out as a cause, although officials say the most likely reason for the catastrophe that killed all 118 people onboard is bad weather.
-
Israel has attacked targets in Sinai by drone previously, though such involvement is unpopular within Egypt, and the Egyptian Defense Ministry denied the reports, saying there were no drones in Sinai.
-
-
-
Jha begins by recounting the most important moment in Nepal’s contemporary history – the 2006 Jana Andolan, which forced the monarch King Gyanendra to step aside. He traces the development of the Maoist-led armed struggle from the first weapons they obtained: two rifles that the CIA airdropped in 1961 for Tibetans to use against the Chinese Government. He chronicles how the Maoist movement in Nepal then drew upon discontentment against prevailing conditions and power equations in society, as well as police abuses and disenchantment with ‘moderate left’ politics.
-
A Gallup poll found that 79 percent of Americans think that the government should not use drones to kill other Americans — even if they are suspected terrorists. Why should it be any more palatable for the government to use lethal injections or electric chairs to kill other Americans — even if they have done horrifying things?
-
Finance
-
Heritage Foundation chief economist Stephen Moore was caught using incorrect statistics to mislead readers about the relationship between tax cuts and job creation in the United States.
-
-
According to the proposed 17th July bitcoin regulation from New York State, the public now has 45 days to comment and then a 45-day grace period prior to full adoption. But what’s after 17th October? More importantly, what’s after New York?
-
PR/AstroTurf/Lobbying
-
Censorship
-
Ofcom has just published a report that shows that some 60% of households are actively switching off filters despite the best efforts of companies. ISPs that aren’t pushing filters are reporting even lower stats, with well over 90% declining filters. Ofcom’s report on Network Level Filtering Measures was based on survey questionnaires sent to the big four ISPs: BT, Sky, TalkTalk and Virgin Media.
-
Earlier in 1967, Kermode had resigned from the co-editorship of Encounter magazine over revelations – which came as news to just about no one – that its original backer, the Congress for Cultural Freedom, was in turn being funded by the CIA.
-
Google’s interpretation of the European Court of Justice’s “right to be forgotten” ruling is prejudicing the intention of the court, the State’s data protection watchdog said yesterday, as regulators and search engine giants met in Brussels to discuss the matter.
-
Privacy
-
-
You may be dead, but the U.S. government won’t take you off its terrorist roster.
That’s according to newly leaked internal guidelines from last year that reveal intimate details regarding the government’s process for determining whether an individual should be designated as a possible terrorist suspect.
-
-
-
-
-
-
-
-
-
According to an online job posting, the spy agency is looking for a new director of strategic communications who will serve as its primary representative and walk the fine line between transparency and the necessary secrecy for an intelligence agency.
-
Spooks ask Dabbsy to suggest a nice hotel with pool
-
The actions of the US and UK stand in stark contrast to a groundbreaking and forceful report released last week by the UN high commissioner for human rights, Navi Pillay, about privacy in the digital age. Many of her findings directly challenge US and UK arguments defending secret, mass surveillance.
-
Federal law enforcement and intelligence authorities say they are increasingly struggling to conduct court-ordered wiretaps on suspects because of a surge in chat services, instant messaging and other online communications that lack the technical means to be intercepted.
-
The president who promised an unprecedented level of transparency has been disturbingly opaque during his current fundraising trip to the West Coast, as far as reporters are concerned. As Barack Obama meets with large, influential private donors like Costco co-founder James Sinegal and Silicon Valley moguls, the media is being denied even moderate access. Christi Parsons, president of the White House Correspondents’ Association, told Politico: “We think these fundraisers ought to be open to at least some scrutiny, because the president’s participation in them is fundamentally public in nature.”
-
-
The same techniques to circumvent backup encryption could be used by law enforcement or others with access to the “trusted” computers to which the devices have been connected, according to the security expert who pushed Apple’s admission.
-
-
The White House and the NSA have something in common; they both track website user data. But it looks like the folks at the White House might not have known it was happening, and the tracking could be a violation of the White House privacy policy.
-
A five-day hearing before the UK’s Investigatory Powers Tribunal (IPT) on the operations of Britain’s Government Communications Headquarters (GCHQ) spying operations concluded July 18.
Civil liberties and human rights organisations, including Privacy International, Amnesty International, Liberty and the US Civil Liberties Union, brought the legal case before the Tribunal. They are attempting to establish whether GCHQ’s massive state surveillance operations are a violation of British and international law.
-
-
Four Democratic senators have sent a letter to the director of national intelligence expressing concerns about the scope of the collection of Americans’ e-mails and phone calls under a National Security Agency program that targets foreigners overseas.
-
Law enforcement and intelligence agencies want to be able to wiretap social media, instant message and chat services. But building in ways to wiretap these kinds of communication can lead to less secure systems, say technical experts, including former National Security Agency officials.
-
-
-
In a recent debate on Rethinking the U.S. National Security Apparatus, Michael Hayden, a retired general and the former director of the National Security Agency and the Central Intelligence Agency, said that Edward Snowden “blew the whistle” on the NSA’s use of the Patriot Act’s Section 215 to collect phone records of nearly every American.
-
-
-
-
-
-
-
-
-
-
-
-
-
The Russian government is offering four million roubles (£65,000) to anyone who can crack the anonymous Tor network.
-
In an effort to increase surveillance and censorship efforts, the Russian government is putting up a bounty to anyone who can make significant inroads to reveal users on Tor, the anonymizing network for privacy seekers.
Tor, most often accessed via the Tor Browser, is a network that encrypts user browsing data and redirects it randomly across multiple servers (known as ‘chops’) before reaching its destination. This keeps the location, IP address, and identity of the user relatively anonymous, though the fact that Tor is being used won’t be secret.
-
-
-
-
A warning to those who might do a little online research about Internet privacy software: The NSA is tracking you, a report by the German public broadcasting group ARD concludes, according to a story published by The Independent.
-
The question to bear in mind, when reading this whole sorry tale, is this: if Americans are, on average, no stupider than Germans, then why are their intelligence services so stupid?
-
-
-
-
Given recent German indignation about the National Security Agency, it has been easy to overlook the fact that for decades the German government has cooperated extensively with the NSA on surveillance activities. But after a high-level meeting in Berlin this week, this long-standing but veiled cooperation may have a firmer legal and political base.
The two countries’ past partnership became so extensive that they even developed a special logo for their joint signals-intelligence activity, known by its initials, ‘JSA.’ It shows an American bald eagle against the colors of the German flag, next to the words Der Zeitgeist, or ‘the spirit of the age.’
-
On a visit to Munich, Germany, wildly differing views between the European Union and the U.S.A. are immediately apparent on the frequently talked about (over here) subjects of information capitalism, NSA spying, and American ‘dominance.’ They can teach a lot about ourselves. The German and French perspectives on issues pose genuine cognitive dissonance.
-
…embedding of computers, sensors, and Internet capabilities into more and more physical objects.
-
Hekmati, a dual U.S.-Iranian citizen born in Arizona and raised in Michigan, was arrested in August 2011 and sentenced to death for spying. Iran’s Supreme Court annulled the sentence. He later was convicted of ‘cooperating with hostile governments’ and sentenced to 10 years in prison.
-
Civil Rights
-
-
And while you’re at it, don’t photograph the water tower in Farmer’s Branch, Texas (as professional photographer Allison Smith found out), or planes taxiing to takeoff at the Denver airport (if you have a Middle Eastern look to you), or that dangerous “Welcome to Texas City” sign (as Austin photographer Lance Rosenfield discovered when stopped by BP security guards and only let off after “a stern lecture about terrorists and folks wandering around snapping photos”), or even the police handcuffing someone on the street from your own front lawn (as Rochester, New York, neighborhood activist Emily Good was doing when the police cuffed and arrested her for the criminal misdemeanor of “obstructing governmental administration”).
-
Senator Ron Wyden is apparently getting tired of waiting for the White House to use up its buckets of black ink in redacting everything important in the Senate’s big torture report. He’s publicly pondering the idea of using Senate privilege to just release it himself.
As you may recall, the Senate Intelligence Committee spent years and $40 million investigating the CIA’s torture program, and the 6,000+ page report is supposedly devastating in highlighting (1) how useless the program was and (2) how far the CIA went in torturing people (for absolutely no benefit) and (3) how the CIA lied to Congress about all of this. The CIA, not surprisingly, is not too happy about the report. At all. Still, despite its protests, the Senate Intelligence Committee voted to declassify the executive summary of the report.
-
-
-
-
The National Security Agency last year significantly expanded its cooperative relationship with the Saudi Ministry of Interior, one of the world’s most repressive and abusive government agencies. An April 2013 top secret memo provided by NSA whistleblower Edward Snowden details the agency’s plans “to provide direct analytic and technical support’ to the Saudis on “internal security” matters.
The Saudi Ministry of Interior “referred to in the document as MOI” has been condemned for years as one of the most brutal human rights violators in the world. In 2013, the U.S. State Department reported that “Ministry of Interior officials sometimes subjected prisoners and detainees to torture and other physical abuse,” specifically mentioning a 2011 episode in which MOI agents allegedly ”poured an antiseptic cleaning liquid down [the] throat” of one human rights activist. The report also notes the MOI’s use of invasive surveillance targeted at political and religious dissidents.
-
The CIA obtained a confidential email to Congress about alleged whistleblower retaliation related to the Senate’s classified report on the agency’s harsh interrogation program, triggering fears that the CIA has been intercepting the communications of officials who handle whistleblower cases.
-
The CIA obtained a legally protected, confidential email between whistleblower officials and Congress this spring, raising questions over whether the agency illegally has access to other communications regarding whistleblowers, McClatchy reported.
It is unclear how the CIA got hold of the email and other unspecified communications between Daniel Meyer – the intelligence community’s top official for whistleblower cases – and lawmakers, people familiar with the matter told McClatchy.
-
The executive branch will not eavesdrop on the computer keystrokes and Internet use of members of Congress and legislative staff members with security clearances as part of its stepped-up efforts to prevent unauthorized disclosures of classified information, the nation’s top intelligence official told lawmakers on Friday.
The director of national intelligence, James R. Clapper Jr., made that promise in a letter to Senators Charles E. Grassley, Republican of Iowa, and Ron Wyden, Democrat of Oregon. The lawmakers had raised constitutional concerns about a new ‘insider threat’ detection program amid a controversy over the C.I.A.’s search of computers used by Senate staff members who were at a C.I.A. site preparing a report on agency interrogation practices during the Bush administration.
-
A little over a decade ago, federal prosecutors used keystroke logging software to steal the encryption password of an alleged New Jersey mobster, Nicodemo Scarfo Jr., so they could get evidence from his computer to be used at his trial.
The technique was classified and FBI technicians warned prosecutors that if the case went to trial, details about the tool could get disclosed in court.
-
-
-
-
Polish Prime Minister Donald Tusk said on Friday Warsaw will probably appeal against a European Court of Human Rights ruling that Poland hosted a secret CIA jail.
-
One of the most frustrating and depressing aspects of following extremism-related stories in the UK is the predictable frequency with which the denialist brigade rush to the fore to hush things up.
-
While Gazans, their Hamas leadership and pro-Palestinian supporters around the world condemn Israel’s Operation Protective Edge, it’s time Muslims examined the other occupation: the inexorable advance of political Islamism over Islam.
-
-
Sen. Rand Paul (R-Ky.) is looking to defend the Fifth Amendment to the Constitution not just from the Obama administration, but from states that are finding it too easy to seize private property without first charging and convicting property owners.
-
Plus, Europe’s top rights court slams Poland over CIA renditions and two more anti-Putin protesters receive long prison sentences.
-
A senior Senate Democrat is firing a warning shot at the White House against stalling the release of a report about the past use of torture by the U.S. intelligence community.
Sen. Ron Wyden is talking with his colleagues about the possibility of using a seldom-invoked procedure to declassify an Intelligence Committee report on the use of torture in the event the White House does not move ahead quickly.
-
DRM
-
Amazon has reportedly warned of slower sales in the current quarter after it incurred a loss of 126 million dollars in the second quarter. According to the BBC, Amazon forecast third quarter sales of between 19.7 billion dollars and 21.5 billion dollars, which could mean sales growth of as little as 15 percent – well down on previous quarters.
Permalink
Send this to a friend
07.25.14
Posted in News Roundup at 11:29 am by Dr. Roy Schestowitz

Contents
-
Desktop
-
The Linux faithful have mixed opinions on the success of Google’s Linux- and Chrome browser based Chrome OS. The lightweight OS came along years after Fedora, Ubuntu and other Linux distros, and shares relatively little of their mainstream Linux codebase. Some dismiss it as a limited, browser-only platform — a complaint often applied to Firefox OS — while others warn that Google is co-opting and subjugating Linux, a process already begun with Android.
-
Google is all geared up to push Chromebooks to students in the US. They have uploaded a new ad on YouTube targeting students. The video titled Chromebook: For Students shows student lockers and a very clear text ‘everything a student needs in a laptop’.
-
-
Server
-
With the rise of containers as an alternative to virtual machines in Linux environments, IT organizations that make that shift will need a way to potentially manage thousands of containers. Looking to become one of the vendors that not only supplies those Linux containers but also manages them, Docker today announced it has acquired Orchard Laboratories Ltd.
-
Kernel Space
-
Fresh off the release of ACPI 5.1 by the UEFI Forum, Linux developers are updating their support against this latest revision to the Advanced Configuration and Power Interface. In particular, ACPI 5.1 is supposed to help out ARM.
While accessing the ACPI/UEFI specifications still require jumping through some hoops, the ACPI 5.1 update is reported to fix major gaps in supporting ACPI on ARM. Hanjun Guo has already laid out patches for providing Linux ARM64 support compliant with the ACPI 5.1 specification. ACPI 5.1 has “major changes” to the MADT, FADT, GTDT, and _DSD for bettering up this non-x86 platform support.
-
Eric Searcy is the IT Infrastructure Manager at the Linux Foundation. Here he tells us how he got started as a sysadmin and at the Linux Foundation, describes his typical day at work, and shares his favorite sysadmin tools, among other things.
-
Aric Gardner is a Linux Foundation SysAdmin who works on the OpenDaylight collaborative project. Here he tells the story of how became a sysadmin, shares his specialty in scripting and automation, and describes a typical day at work, among other things.
-
Graphics Stack
-
While the Radeon R9 290 series is now mature in the marketplace, the open-source Linux driver support has lagged. The Hawaii support had been broken for months (no working 3D on the open-source driver, but will work under the Catalyst Linux driver) and the few open-source AMD developers weren’t tasked with fixing it over not being sure why it wasn’t working and having no immediate business cases for fixing the support. Fortunately, with a bug comment made tonight, it seems things might be in order.
-
Applications
-
-
I’ve gotten a little tired of typing out ls vimwiki/ | shuf -n1 all the time, and that’s usually proof positive that it’s time to give it an alias. So it’s in my .bashrc now as “tokolosi,” and here’s what the little demon dragged home today:
-
The Calibre software provides some important functions for its users, like the ability to read, edit, and manage eBooks. The developer has issued a new update and the new version brings a few major features.
Even if people mostly use Calibre for converting eBooks from one format to another or as a reader, the application is also capable of editing books as well. This new function was implemented recently and the developer is still adding features and fixes for it.
-
Photocrumbs has served well as a working name for my spare-time coding project. But the time has come to give my forgetful photo publishing PHP script a proper name. It took me a while to come up with a good name. I wanted a short and catchy name that reflects my deep interest in Japan. While trawling the web, I stumbled across the Japanese white-eye bird called mejiro in Japanese. It’s small, it’s cute, and it has a short name that sounds unmistakably Japanese — in other words, exactly the name I was looking for. So here it is, Photocrumbs is now Mejiro.
-
Instructionals/Technical
-
Games
-
A while ago, we’ve announced our plans to add Linux support as one of the features of our digital platform, with 100 games on the launch day sometime this fall. We’ve put much time and effort into this project and now we’ve found ourselves with over 50 titles, classic and new, prepared for distribution, site infrastructure ready, support team trained and standing by, and absolutely no reason to wait until October or November. We’re still aiming to have at least 100 Linux games in the coming months, but we’ve decided not to delay the launch just for the sake of having a nice-looking number to show off to the press. It’s not about them, after all, it’s about you. So, one of the most popular site feature requests on our community wishlist is granted today: Linux support has officially arrived on GOG.com!
-
-
-
-
“The year of the Linux desktop” is a phrase people have tossed around with increasing irony since the nineties, but it was never going to arrive explosively. Linux has slowly grown and spread into homes through friendly distributions like Ubuntu and Mint, installed as easy and safer alternatives to Windows or to freshen up old duffers (my netbook is Minty fresh now). Games have followed.
-
-
If you have been following our coverage of the gaming scene, then you might remember us speculating on the possibility of Good Old Games (GOG.com) going to introduce Linux games. A few days following that article, GOG actually confirmed that they did indeed plan on getting Linux as another platform where they would introduce games regularly and promised about a 100 games by fall of this year. Now it seems that GOG managed to push their worker elves and the penguin folks hard enough that they are ready to release about 50 of the promised games for Linux.
-
The game is set to release on Linux, Mac, Windows, Xbox One, PS4 & Wii U simultaneously. More information can be found over at the Project Tools website, along with the different game packages.
-
-
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
I’m sorry to bring bad news, but after trying to fight some last minute bugs in the new Gmail resource today, I realized that pushing the resource into KDE Applications 4.14 was too hurried, and so I decided not to ship it in KDE Applications 4.14. I know many of you are really excited about the Gmail integration, but there are far too many issues that cannot be solved this late in 4.14 cycle. And since this will probably be the last 4.x release, shipping something that does not perform as expected and cannot be fixed properly would only be disappointing and discouraging to users. In my original post I explained that I was working on the Gmail integration to provide user experience as close as possible to native Gmail web interface so that people are not tempted to switch away from KMail to Gmail. But with the current state of the resource, the effect would be exactly the opposite. And if the resource cannot fulfil it’s purpose, then there’s no point in offering it to users.
-
With the Plasma 5.0 release out the door, we can lift our heads a bit and look forward, instead of just looking at what’s directly ahead of us, and make that work by fixing bug after bug. One of the important topics which we have (kind of) excluded from Plasma’s recent 5.0 release is support for Wayland. The reason is that much of the work that has gone into renovating our graphics stack was also needed in preparation for Wayland support in Plasma. In order to support Wayland systems properly, we needed to lift the software stack to Qt5, make X11 dependencies in our underlying libraries, Frameworks 5 optional. This part is pretty much done. We now need to ready support for non-X11 systems in our workspace components, the window manager and compositor, and the workspace shell.
-
KDE’s Sebastian Kügler has provided an update regarding KDE Frameworks 5 and Plasma 5 support for Wayland as an alternative to running on an X11/X.Org Server.
-
The work on revisiting and expanding the Human Interface Guideline on tooltips has begun. If there’s something that has always bothered you about how tooltips in KDE Applications and Plasma look and feel consider to join in. The work is still in its early stages, so now would be the best time to voice your concerns. [https://forum.kde.org/viewtopic.php?f=285&t=121892]
-
Cutelyst uWSGI plugin now has support for –thread, which will create a QThread to process a request, however I strongly discourage its usage in Cutelyst, the performance is ~7% inferior and a crash in your code will break other requests, and as of now ASYNC mode is not supported in threaded mode due to a limitation in uWSGI request queue.
-
from today on, the master branch of kate.git is KF5 based.
That means, for the next KDE applications release after 4.14, Kate will use the awesome KF5 stuff!
The KTextEditor framework is already in a good shape and most active KatePart development is since months pure KF5 based.
-
GNOME Desktop/GTK
-
-
GUADEC 2014 is almost upon us, and we are talking to the three keynote speakers who are lined up for this year’s conference. Nathan Wills – LWN editor, typeface designer and author – is one of these keynote speakers. His talk, titled Should We Teach The Robot To Kill, addresses issues relating to Free Software and the automative industry. We caught up with him to find out a bit more about this fascinating subject, as well as his views on Free Software conferences.
-
-
We’re halfway through 2014, and a handful of Linux distributions have already made a big splash in the community. Which distributions are the best ones for this year? Let’s take a look.
-
Kali Linux 1.0.8, a more mature, secure, and enterprise-ready version of BackTrack Linux, has been announced by Offensive Security and brings support for EFI systems, among other updates and changes.
The developers of Kali Linux 1.0.8 took advantage of this version change and decided to make other improvements to the operating system, although you will need a user account to see exactly what has been modified.
-
In today’s news feeds is MakeUseOf.com’s top five Linux distributions for 2014. One of their picks is said to vulnerable to attack and the proof has been posted. In other news, GOG.com has rolled out support for 50 DRM-free Linux games. And finally tonight, Fedora 21 has been delayed.
-
Red Hat Family
-
-
Oracle sees continued potential for growth as it rolls out its latest Linux distribution release.
-
-
-
-
Fedora
-
Fedora is a big project, and it’s hard to follow it all. This series highlights interesting happenings in five different areas every week. It isn’t comprehensive news coverage — just quick summaries with links to each. Here are the five things for July 22nd, 2014:
-
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
-
Canonical is working on the upcoming Ubuntu 14.04 (Utopic Unicorn), but its developers are also trying to improve some technologies that haven’t made it just yet to the desktop version, such as Unity 8 and the Mir display server.
-
Canonical has revealed details in a security notice about an acpi-support vulnerability in Ubuntu 12.04 LTS (Precise Pangolin) operating system that has been found and corrected.
-
The Ubuntu team is pleased to announce the release of Ubuntu 14.04.1 LTS…
-
The first stable point release update to the Long Term Support Ubuntu 14.04 is now available.
-
Canonical is working in parallel at both the desktop and the mobile versions of Ubuntu, Ubuntu Touch already using Unity 8 and Mir as default, since the development branch was based on Ubuntu 13.10.
-
Recently, the developers have implemented the Kernel 3.16 RC3 as default on the unstable branch of Ubuntu 14.10, scheduled for release on the 23rd of October, 2014.
-
-
Over the past two years we’ve come to really grow fond of the design of the Raspberry Pi. It’s almost iconic in a way, and we don’t think we’re the only ones to believe this: as you can have see with the Banana Pi review on the previous page the layout is almost identical to the standard model B.
-
TinyGreenPC launched a Raspberry Pi and Linux based digital signage player that runs on just 7 Watts, and offers optional WiFi and an OPS interface.
The Pi Media Player is one of the most power-efficient signage players on the market, according to TinyGreenPC, a subsidiary of UK-based embedded manufacturer and distributor AndersDX. It helps that the 7 Watt, Raspian Linux-enabled signage player runs on a Raspberry Pi.
-
Three Bulgarian engineers who co-founded a firm called StorPool – which builds a virtual SAN using the aggregated storage of Linux KVM servers – are aiming to expand the reach of their three-year-old project.
Boyan Ivanov, CEO, Boyan Krosnov, chief product officer, and Yank Yankulov, the chief tech officer, started the firm in November 2011 with $261,600 seed funding. In February this year they raised an undisclosed amount of cash in an A-round. We’d guess it’s in the $1m – $2.5m area.
-
Phones
-
Android
-
-
Disney movies have the uncanny ability to make us laugh, cry, and dance with joy at the same time. Whether you are a young kid or an adult, these films have a special place in many people’s hearts. Apart from winning many Oscars, these movies have garnered fans across all generations. From overbearing grandmas to unapologetically brash kids, Disney movies are so irresistible that they can make anyone laugh or cry. That’s why today we have for you a list of some of the best Android apps out there that are made for Disney fans.
-
-
About 10 years ago, when I got my first mobile phone, I hardly knew anything about its operating system or its processor. Even its screen size didn’t matter. I was just happy to have a ‘mobile’ phone.
Today, the mobile phone paradigm has shifted from feature phones to smart phones. When people consider purchasing a new mobile phone, they examine its operating system, its configuration, and its screen size. Increased attention to these details can be attributed to technological advancements—and, more importantly, to the slew of new mobile operating systems available today. In this highly competitive market, Android has obtained about 80 percent of the global market share, making it the clear leader among mobile operating systems.
What makes Android so popular? Why has the mobile market swung toward Android lately? Let’s take a quick look at how Android has achieved this, as well as the role of open source in the Android story.
-
OnePlus have developed quite a buzz over the last few months with the release of their first device the OnePlus One. Part of the allure is the incredibly low asking price of $300 – which is typically half the cost of its on-spec rivals. However another feature which has greatly attracted attention is the OnePlus One comes with CyanogenMod (CM) custom ROM as stock out of the box.
-
Events
-
Web Browsers
-
Chrome
-
Today Google announced Chrome Beta has received a relatively major update. Chrome Beta is the testing version of Chrome. To all purposes it is the same as Chrome although the Beta version incorporates all the small tweaks and experimental aspects Google are testing. By using the Beta version the user gets a first glimpse at features which quite likely will be available on the standard Chrome and also provides Google with the necessary test data.
-
Mozilla
-
-
-
Mozilla recently released Firefox version 31, and now this updated version of the Fedora default web browser is available for download in Fedora 20.
-
SaaS/Big Data
-
SAP may not be on every individual user’s radar, but the company is a giant global force in running enterrprise back-end systems, new forays into the cloud and other new platforms, and managing enterprise class applications. Now, SAP has announced that it is committing to Cloud Foundry and OpenStack, providing a clear path forward for an open cloud ecosystem.
-
Yesterday, we released ownCloud 7. You might have read that somewhere on the internet – it was widely announced and broadly picked up. If you do not have ownCloud yet, you really should try it now, and if you are one of the people happily using ownCloud for a while, update soon!
-
Oracle/Java/LibreOffice
-
The Document Foundation has announced that the second Release Candidate version of LibreOffice 4.2.6 is now available for download and that users can test it.
-
Education
-
In the world of the Internet, where everything is so easily available, it seems like all technology is a benefit to online learners. For those who aren’t able to use the available traditional resources for various reasons, open source technology specifically is a huge boon. Let me share my seven-year journey of using open source and how it helped me add more value to both my personal and professional lives.
-
Business
-
Semi-Open Source
-
Nginx, the lead commercial sponsor behind the open-source Nginx Web server, is out today with a new release of its Nginx Plus server. The Nginx Plus r4 release provides users with new security and load balancing features.
-
BSD
-
After more than a half-year in development and working on tens of thousands of lines of code, Pkg 1.3.0 has been released by FreeBSD developers.
Pkg 1.3.0 introduces a new solver to automatically handle conflicts and dynamically discover them, pkg install can now install local files and resolve their dependencies via remote repositories, sandboxing of the code has happened, improved portability of the code took place, the pkg API has been simplified, improvements to the multi-repository mode, and a ton of other changes and fixes took place.
More on the pkg 1.3.0 release for improved package management on FreeBSD can be found via this mailing list post.
-
-
FSF/FSFE/GNU/SFLC
-
In some ways we have actually made improvements to the Unix Philosophy with Richard Stallman’s GPL. We also have a mostly standardized graphical system with the X Window System. I can’t find any overt references to sharing of source code from the early days of Bell Labs but it clearly did happen even if it was de facto
rather than de jure.
-
We are pleased to announce the next alpha release of GNU Guix, version 0.7.
This release is an important milestone for the project since it is the first to provide an image to install the GNU system from a USB stick.
-
Public Services/Government
-
The United Kingdom recently made an announcement about its decision to adopt the Open Document Format (ODF) as its in-house standard for all new documents. And now, Microsoft has lost another important fight in yet another European city.
Toulouse, France’s fourth largest city, has ditched Microsoft Office in favor of LibreOffice.
-
Licensing
-
Karen Sandler is a veteran of the free and open source software world. Having completed an engineering degree, she has worked as a lawyer for the Software Freedom Law Center, was Executive Director of the GNOME Foundation, and recently accepted a position as Executive Director of the Software Freedom Conservancy. I interviewed Karen via email to ask her about her background and insight into various issues in the free and open source world.
-
Openness/Sharing
-
Recently I had the opportunity to watch a soccer game (football to the majority of the world). This game was one of the most amazing displays of team effort I’ve ever had the privilege of watching. (Here’s an obligatory link if you don’t know to which game I refer). Almost every score was predicated with a series of passes and touches by various players. There was a level of unselfish play and team spirit I don’t often see when observing professional sports.
-
Benetech started out in the 90s without even understanding the meaning of the term open source. They just “needed an easy way to interface with different voice synthesizers” to develop readers for people who are blind and “shared the code to be helpful.”
-
Programming
-
PHP 5.5.15, an HTML-embedded scripting language with syntax borrowed from C, Java, and Perl, with a couple of unique PHP-specific features thrown in, has been released and it’s now available for download.
-
The battle started when a government-hired crew tore down the metal cross atop the one-room church in this village surrounded by rice paddies last month.
-
Science
-
As the world celebrates the 45th anniversary of the Apollo 11 mission, a revelation has come to fore that during the Cold War race to the moon between the US and the former USSR, the former had “kidnapped” a Soviet mooncraft in the 60s called Lunik, studied it in detail and returned it intact.
-
Security
-
-
Personally, while I still think the DHS is an unlikely sponsor for this project — the National Security Agency (NSA) or NIST seem like its more natural home — I think the SWAMP sounds like a very useful one-stop for anyone wanting to double-check their pre-production code for errors before release.
-
Defence/Police/Secrecy/Aggression
-
Judicial Watch announced today that on June 17, 2014, it filed a Freedom of Information Act (FOIA) lawsuit against the United States Department of Defense (DOD) to obtain records of communications relating to its May 2, 2011, FOIA request for bin Laden death photographs and videos (Judicial Watch v U.S. Department of Defense (No. 1:14-cv-01027)).
-
-
-
The birth of the armed-drone program underscores two central ironies. First, the weapon that the U.S. deployed so eagerly after 9/11 was a hot potato that it juggled around internally beforehand. (Indeed, the George W. Bush administration devoted most of its lone pre-9/11 cabinet-level meeting on al Qaeda—convened on Sept. 4, 2001—to wrangling about the drone program.) Second, for a program now so widely criticized in the Muslim world for killing civilians, pre-9/11 policy makers were actually driven toward armed drones because the more traditional alternatives involved unacceptable risks of collateral damage.
-
-
The UK, which has carried out over 300 drone strikes in the country, has consistently stated it is aware of only one incident in which non-combatants died: a March 2011 strike that killed four farmers. In December 2013, three months after the Watapur strike, then defence secretary Philip Hammond reiterated this claim in a Guardian op-ed.
-
On the afternoon of September 7 last year, in the Watapur region of Afghanistan’s Kunar province, a farmer named Miya Jan heard a buzzing overhead. He looked up to see a drone, he told the Los Angeles Times, and minutes later, he heard an explosion.
-
Afghanistan has been targeted by more drone strikes than any other country in the world, yet almost nothing is known about where those attacks took place, or who they killed.
A new study by the Bureau’s drones team, published today, examines the official opaqueness that surrounds drone operations and explores how outside organisations – such as the Bureau – might be able to lift this veil of secrecy.
-
An 80-year-old local Navy veteran is facing a potential year in prison if convicted of charges stemming from his involvement in an anti-drone protest at a New York Air Force base in April.
Andrew Schoerke, of Shaftsbury, is a retired U.S. Navy captain and a member of Veterans for Peace Will Miller Green Mountain Chapter. On April 28 he was part of a group of 300 protesters at the Hancock Field Air National Guard Base which shares space with the Syracuse Hancock International Airport in Syracuse, New York.
-
On July 10, 2014, in New York State, Judge David Gideon sentenced Mary Anne Grady Flores to a year in prison and fined her $1,000 for photographing a peaceful demonstration at the U.S. Air National Guard’s 174th Attack Wing at Hancock Field (near Syracuse) where weaponized Reaper drones are remotely piloted in lethal flights over Afghanistan. – See more at: http://www.progressive.org/news/2014/07/187788/grandmother-gets-year-prison-taking-picture%E2%80%A8#sthash.34Km49MC.dpuf
-
On July 10, 2014, in New York State, Judge David Gideon sentenced Mary Anne Grady Flores to a year in prison and fined her $1,000 for photographing a peaceful demonstration at the U.S. Air National Guard’s 174th Attack Wing at Hancock Field (near Syracuse) where weaponized Reaper drones are remotely piloted in lethal flights over Afghanistan. Dozens have been sentenced, previously, for peaceful protest there. But uniquely, the court convicted her under laws meant to punish stalkers, deciding that by taking pictures outside the heavily guarded base she violated a previous order of protection not to stalk or harass the commanding officer.
-
-
-
“Do you honestly believe that this land is yours because God said so?”
-
The supporters of CUFI moved up the convention center escalators and took their seats for a plenary session. Onstage were the first guests, all recognizable from Fox News—Weekly Standard editor-in-chief Bill Kristol, onetime CIA director James Woolsey, and the Council on Foreign Relations fellow Elliott Abrams, a presidentially pardoned veteran of foreign policy disasters on two continents. Sitting right next to them was John Hagee, the burly Christian Zionist pastor who founded CUFI in 2006 He leaned into a microphone, passionately explaining why supporters of Israel should not be tricked by casualty reports.
-
Iraq’s security forces have killed at least 75 civilians and wounded hundreds of others in indiscriminate air strikes on four cities since June 6, according to Human Rights Watch. The New York-based human rights watchdog says it documented 17 airstrikes, the majority in the first half of July, in which barrel bombs were used.
-
More than 50 former Israeli soldiers have refused to serve in the nation’s reserve force, citing regret over their part in a military they said plays a central role in oppressing Palestinians, the Washington Post reported on Wednesday.
“We found that troops who operate in the occupied territories aren’t the only ones enforcing the mechanisms of control over Palestinian lives. In truth, the entire military is implicated. For that reason, we now refuse to participate in our reserve duties, and we support all those who resist being called to service,” the soldiers wrote in a petition posted online and first reported by the newspaper.
While some Israelis have refused to serve in the Palestinian territories of the West Bank, the military’s structure is such that serving in any capacity forces one to play a role in the conflict, said the soldiers, most of whom are women who would have been exempted from combat.
-
In a campaign to improve its image abroad, the Israeli government plans to provide scholarships to hundreds of students at its seven universities in exchange for their making pro-Israel Facebook posts and tweets to foreign audiences.
The students making the posts will not reveal online that they are funded by the Israeli government, according to correspondence about the plan revealed in the Haaretz newspaper.
-
Former Defense Secretary Robert Gates says he’s worried there’s a perception of the United States “disengaging” from global affairs.
Gates, who also once headed the CIA, says he recognizes the ocean-to-ocean diplomacy the Obama administration has been carrying out in the Mideast and Eastern Europe and other world hot spots like Africa.
-
“Rise of the Politics of Fear”: “The first part of the series explains the origin of Islamism and Neo-Conservatism. At the same time in the United States, a group of disillusioned liberals, including Irving Kristol and Paul Wolfowitz, look to the political thinking of Leo Strauss after the perceived failure of President Johnson’s “Great Society”.
-
“I think Russia saved us in Syria. If we had rushed in surface-to-air missiles to the Syrian opposition and they were then stolen by ISIS and they were now shooting down civilian airliners it would have been a different story,” Baer said.
-
Environment/Energy/Wildlife
-
Since the political crisis erupted in Yemen in 2011, the country has begun to move towards democracy. Many challenges remain in the country, wracked by civil unrest and widespread water and food insecurity, says Bishow Parajuli, the UN World Food Programme’s representative in Yemen.
-
Plans for a cable car attraction and a shopping and entertainment complex mean the Grand Canyon is facing the biggest threat in its history, the US National Parks Service claims
-
Finance
-
Bernard Madoff’s massive Ponzi scheme relied on reams of fake trading documents to fool regulators for decades.
Now he may be the victim of a forgery himself, after a U.S. judge on Wednesday denied a bizarre motion supposedly filed by Madoff that claimed the U.S. int
-
PR/AstroTurf/Lobbying
-
Democratic congressman Jim Himes was on C-SPAN early this morning, and was on the receiving end of an angry complaint by a Republican caller over basically everything that anyone has ever said negatively about the Obama administration in the past four-plus years. Himes’ response? Suggesting this person maybe not watch so much Fox News.
The caller, Bob, went on a rant about issues from Benghazi, the NSA, Fast & Furious, Syria, Obamacare, the EPA, the government shutdown, Eric Holder, Van Jones, et cetera, et cetera. He concluded, “Any other president would have been laughed out of office right now.”
-
Most members and staffers of the US House of Representatives won’t be able to edit pages on Wikipedia for more than a week. Administrators of the popular Web encyclopedia have imposed a 10-day ban on the IP address connected to Congress’ lower house.
-
Privacy
-
-
-
Apple has “inadvertently admitted” to creating a “backdoor” in iOS, according to a new post by a forensics scientist, iOS author and former hacker, who this week created a stir when he posted a presentation laying out his case.
-
Privacy has always been one big issue when it came to using smartphones, but no one knew precisely why. Many of us feared social networks and apps that required private information and payed less attention to the actual device and its OS system. It would seem Apple’s iOS features a so called “backdoor” that allows agencies like the NSA to have almost complete access to every iOS running device. Forensic scientist and writer Jonathan Zdziarski, presented some slides at the HOPE conference in New York, in which he proved that, in general, the iPhones are well secured, specially the iPhone 5S that runs iOS 7, but they will never be protected from the government or Apple itself.
-
APPLE has shed some light on the diagnostic capabilities in its iOS operating system, in a response allegations that it purposefully installed a “backdoor” on its mobile devices.
-
A US researcher has mounted a very strong case that Apple has deliberately left security holes in iOS. Apple’s response is underwhelming.
-
-
-
-
A key government document obtained by The Intercept confirms that the Obama administration does not require “concrete facts” or “irrefutable evidence” to brand Americans or foreigners as suspected terrorists.
-
-
The 166-page “sensitive security information” document that details how the government decides whether someone should be on a terrorist watchlist has been leaked to the press.
-
-
The Intercept on Wednesday published the U.S. government’s 166-page rulebook that guides the creation of its famous internal “terrorist watchlist.”
Both the Bush and Obama administrations have resisted spelling out how individuals, including its own citizens, wind up on the list, or how they can be removed. The registry supplies the names for the no-fly list that has grounded many a confused traveler, and includes thousands of names of those who are merely suspected of possibly having ties to others who may themselves be suspected of ties to terrorism.
-
“Immediate family of suspected terrorists,” according to Scahill and Devereaux, such as “their spouses, children, parents or siblings,” may be placed on a list “without any suspicion that they themselves are engaged in terrorist activity.”
-
As Jeremy Scahill and Ryan Devereaux point out in their analysis, the document is positively Kafkaesque, allowing agencies to add you to the watchlist if you are suspected of associating with a person who is suspected of being under suspicion of being a terrorist — and “terrorist” has been redefined to include “people who damage government property,” and people who seek to “influence government policy through intimidation.”
-
As writers and artists, we join PEN American Center in urging Congress to act to end mass surveillance. We recognize the need for strong protections for U.S. national security, and acknowledge that such measures will sometimes entail difficult tradeoffs. However, the NSA’s shockingly broad and indiscriminate surveillance programs threaten our most cherished democratic ideals and violate our constitutional and international human rights to free expression and privacy. The Washington Post’s recent report that nine out of 10 individuals whose communications are being intercepted are not the intended targets of investigation underscores the total lack of proportionality of NSA mass surveillance, and the need for reform.
-
Canadian government officials requested subscriber information from telecoms at least 1.13 million times per year between 2006 and 2008, according to documents obtained by e-commerce law expert Michael Geist.
-
In early April, Sen. Charles E. Grassley summoned FBI officials to his Capitol Hill office. He said he wanted them to explain how a program designed to uncover internal security threats would at the same time protect whistleblowers who wanted to report wrongdoing within the bureau.
-
Civil rights group Liberty is representing MPs Tom Watson and David Davis in a fresh case challenging the UK government’s recently passed Data Retention and Investigatory Powers (DRIP) bill.
-
After recent comments in Moscow by Edward Snowden about the extent to which private telecoms data is used by the UK and US governments, you might have expected British lawmakers to think twice about the Data Retention and Investigatory Powers bill.
A yarn attributed to Sean McBride recounts an interview from the 1950s when, while serving as Irish Foreign Minister, a journalist asked him: “What about the role of British Intelligence in Dublin?”
“If the British had some intelligence, that’d be great,” replied the man who once led Amnesty International.
-
-
A vulnerability broker published a video demonstrating one of several flaws it has found in the privacy-focused Tails operating system, which is used by those seeking to make their Web browser harder to trace.
Exodus Intelligence of Austin, Texas, said its short clip shows how the real IP address of a Tails user can be revealed using the flaw. The company said it hoped publicizing its findings would serve as a warning to users about putting “unconditional trust” in a software platform.
-
Putting aside certain rhetorical devices that have cropped up in this debate, like name-calling or guilt-by-association, let’s examine some of Shava’s points to see if we can take the conversation in a constructive direction.
-
-
-
The co-creator of a system designed to make internet users unidentifiable says he is tackling a “bug” that threatened to undermine the facility.
-
Max Schrems’s case against the Irish Data Protection Commissioner is likely to have profound implications
-
Whether you think NSA whistleblower Edward Snowden is a hero or a traitor, you have to admit: The guy knows how to keep his information secure.
The fact that Snowden isn’t sitting in Guantanamo right now with ankle cuffs and a bag over his head demonstrates his ability to avoid detection.
-
Dutch intelligence services can receive bulk data that might have been obtained by the U.S. National Security Agency (NSA) through mass data interception programs, even though collecting data that way is illegal for the Dutch services, the Hague District Court ruled Wednesday.
-
The Dutch intelligence services AIVD/MIVD may exchange information with the US NSA…
-
John Napier Tye, a former State Department official, says Americans’ data remains vulnerable until executive order that provides NSA with a path to collect data is reformed
-
An independent privacy watchdog agency announced Wednesday that it will turn its focus to the largest and most complex of U.S. electronic surveillance regimes: signals intelligence collection under Executive Order 12333.
-
-
-
-
-
A deal between the Senate and the Obama administration on NSA reform legislation may be in sight. The Privacy and Civil Liberties Board will get an earful from privacy advocates today. The House passed a bill to reauthorize the satellite TV law STELA, but the Senate has more ambitious plans for the must-pass legislation. Yahoo pays a visit to the FCC to talk about net neutrality.
-
-
Angela Merkel’s old mobile phone is an icon of our time. A Nokia 6210 Slide – it was accessed and monitored by the US spy agency the National Security Agency.
The US monopoly over much of the world’s information and communication technologies gave the NSA – piggybacking on a complicit private sector – one-click instant access to her policy musings and personal whims.
-
But Dark Mail takes the extra step of cloaking your email’s metadata, which includes the subject line and the ‘To’ and ‘From’ fields. That way, spies can’t easily identify who’s sending emails.
-
Since the Snowden revelations, it has become clear that email as a basic internet protocol is essentially insecure, and other options — texting, messaging apps, and the like — are not much better.
-
Gigglebit is Siliconrepublic’s daily dose of the funny and fantastic in science and tech, to help start your day on a lighter note.
-
-
-
-
I arrived in Berlin last week, hoping to see something rare: A country that is prosperous, well-governed and even happy, if only because it had just been crowned champion of the football World Cup.
-
-
The decision comes in response to Snowden’s NSA revelations, and follows two recent cases of German officials accused of spying for the U.S.
-
Germany will monitor US and UK agents as part of its long discussed counter-espionage ’360 degree view’ plan, shifting its focus from China, Russia, and Iran, according to local media.
-
Germany’s intelligence services have been instructed to add the US embassy in Berlin to its list of surveillance targets in retaliation for US spying on the German government and communication.
-
Tensions between the U.S. and Germany over American intelligence gathering could have a decisive impact on whether the European Union adopts harsher sanctions on Russia.
-
Willie contends, “Here’s the big, big consequence. The U.S. is basically telling Europe you have two choices here. Join us with the war against Russia.
Join us with the sanctions against Russia. Join us in constant war and conflicts, isolation and destruction to your economy and denial of your energy supply and removal of contracts. Join us with this war and sanctions because we’d really like you to keep the dollar regime going.
-
We’re all too familiar with the bulk collection of cellphone metadata—information on whom you contact and when—that Edward Snowden revealed. However, Executive Order 12333 from 1981 (thanks, President Reagan) allows the NSA to collect the actual content from phone calls and Internet communications if they are amassed from outside U.S. borders. John Napier Tye, former section chief for Internet freedom in the State Department’s Bureau of Democracy, Human Rights, and Labor, recently wrote about this issue in The Washington Post.
-
Bitcoin is safe, except when it is not. It can become not safe when the devices that hold them are compromised. Just as bitcoins stored on an exchange are only as secure as that exchange, bitcoins stored on your computer or cell phone are only as secure as those devices.
-
Advertisers really want to track you. Your browsing history is one of the best clues as to what ads you are most likely to see. Perhaps more nefariously, advanced tracking methods can help other entities (like the NSA) know what privacy-oriented web surfers are doing on the web.
-
Russian President Vladimir Putin has authorized a new law that forces Internet companies conducting business in the country’s borders to store Russian citizens’ data there, further tightening the government’s grip on Russians’ online activity.
-
House Minority Leader Nancy Pelosi opposed ending bulk collection of telephone records by the NSA in 2013, and in 2014 tells President Obama that no Congressional approval is needed in order to take action in Iraq.
-
-
The NSA sits at the nexus of violations of both the Fourth and Fifth Amendments with a legal dodge called Parallel Construction.
Parallel Construction is a technique used by law enforcement to hide the fact that evidence in a criminal case originated with the NSA. In its simplest form, the NSA collects information showing say a Mr. Anderson committed a crime. This happens most commonly in drug cases. The conclusive information is passed to the Drug Enforcement Agency (DEA), who then works backwards from the conclusion to create an independent, “legal” body of evidence to use against Mr. Anderson.
-
Given the importance of the privacy rights established in the Charter of Fundamental Rights of the EU, which include an explicit right to the protection of personal data, the EU institutions’ actions were appropriate. The treaties that underpin the EU’s authority further emphasise that the Union’s international relations must be “guided by” basic democratic principles and respect for human-rights laws.
-
-
No-nonsense German police on July 10 searched the home and office of a military employee who is accused of passing sensitive secrets to the U.S. government. Just before this event, there was an announcement that a member of German BND intelligence has been arrested, accused of selling an estimated two hundred documents to the CIA. They reportedly contained details of investigations by a German parliamentary panel into the vast electronic surveillance of European populations by the NSA, which included hacking Chancellor Merkel’s cell phone.
-
The new system, called OpenPDS, protects your privacy while still letting apps access information they need to work.
-
Move over Edward Snowden, there’s a new surveillance whistleblower on the scene. His name is John Napier Tye and he’s warning Americans about illegal spying. John Tye claims he filed a complaint with the State Department before leaving. In other words, he’s no leaker like Edward Snowden.
-
Bill Binney worked at the National Security Agency nearly three decades as one of its leading crypto-mathematicians. He then became one of its leading whistleblowers.
Now 70 and on crutches, both legs lost to diabetes, Binney recalls the July morning seven years ago when a dozen gun-wielding FBI agents burst through the front door of his home, at the end of a cul-de-sac a 10-minute drive from NSA headquarters in Fort Meade, Md.
-
So Google reminds us that it has invested heavily in security, including encrypting data as it moves between datacentres, and is now looking towards securing stuff by other people on the Internet.
-
People don’t tend to vote on foreign policy. But reflecting on the crises in Ukraine, Gaza, Syria and Iraq that followed him as he headed to the West Coast for a fundraising swing, President Barack Obama acknowledged that they’re adding to an anxiety that’s feeding cynicism that could hurt his party in the midterms.
-
Given recent German indignation about the National Security Agency, it has been easy to overlook the fact that for decades the German government has cooperated extensively with the NSA on surveillance activities. But after a high-level meeting in Berlin this week, this long-standing but veiled cooperation may have a firmer legal and political base.
-
You’ve probably heard about Tor. Technically speaking, it is a global mesh of nodes, also known as relays, which encrypt and bounce traffic between client computers and servers on the Internet. That encryption and bouncing of traffic is done in such a way, that it is practically impossible to know who visited a web site or used a network service in general. To put it simply, anytime I choose to surf the web using Tor it’s impossible for the administrators of the sites I visit to know my real IP address. Even if they get subpoenaed, they are just unable to provide the real addresses of the clients who reached them through Tor.
-
-
Civil Rights
-
-
Europe’s top human rights court ruled Poland violated the rights of two terror suspects by allowing the CIA to secretly imprison them on Polish soil from 2002-2003 and facilitating the conditions under which they were subject to torture.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Europe’s top human-rights court ruled Thursday that Poland allowed the CIA to detain two terrorism suspects at a secret prison on its territory where they were exposed to “torture and inhuman or degrading treatment.”
[...]
The court ordered Poland to pay $175,000 to Zubaydah and $135,000 to Nashiri.
-
-
-
Europe’s top human rights court condemned Poland on Thursday for hosting secret CIA prisons, saying Warsaw knowingly abetted unlawful imprisonment and torture of two Guantanamo-bound detainees.
The European Court of Human Rights ruled in favour of a Palestinian and a Saudi national locked up in a US “black site” for several months in Poland in 2002-2003 before being transferred to Guantanamo Bay, where they are still being held.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
In the first rulings of their kind, the European Court of Human Rights found Poland liable for enabling the CIA torture of two suspected terrorists in a forest north of Warsaw, and letting them be sent to Guantanamo Bay to potentially face a “flagrantly unfair trial” by military commission.
-
Europe’s top human rights court has ruled that Poland violated the European Convention on Human Rights by allowing the CIA to imprison and torture two alleged terrorists on Polish soil.
The court in Strasbourg, France, said that Poland failed to stop the “torture and inhuman or degrading treatment” of Abd al-Rahim al-Nashiri and Abu Zubaydah, who were taken to Poland in 2002.
-
A US man was left gasping for air for almost two hours after his lethal injection execution went wrong, leading to calls for the return of the firing squad.
-
A heartbroken woman is suing the city of St. Clair Shores and police after officers shot her dog dead in November. The encounter was filmed by the cops’ dashboard camera.
-
Governments are a key offender, he stresses, advising use of HTTPS and OpenPGP to block software-based security threats
-
Former Prime Minister Bruce Golding, while eschewing extrajudicial killings, says the United States lacks the moral authority to cite human-rights abuses as reasons to withdraw support from the Jamaican security forces. Golding complained that the US has a long history of carrying out heinous actions against other countries, and the drone strikes which are aerial vehicles remotely controlled by CIA operatives are tantamount to extrajudicial killings.
-
The truth about renditions and detentions at the island of Diego Garcia has to be revealed.
-
Intellectual Monopolies
-
Copyrights
-
There are many ways to tackle the issue of online piracy and Louisiana State University has decided on its approach. At the bottom end, offenders will experience a temporary Internet disconnection, with repeat offenders receiving fines and potentially career-damaging notes on their education records.
-
A leading YouTube entrepreneur is facing legal action for alleged copyright infringement in her videos.
-
The British government has now decriminialised the piracy of films, music and games – meaning that users caught downloading and sharing pirated material will no longer be fined or prosecuted.
-
In a blatant act of democracy that would make Mussolini spin in his grave, the UK government reluctantly conceded that if everybody does it, it probably shouldn’t be a crime.
Instead, as a nod to the intellectual monopoly gangsters, those dastardly “pirates” (i.e. everyone) will receive four spam letters a year from the Content® manufacturing industry, in a futile attempt to convince the rigidly bored audience to pay for Hollywood’s increasingly derivative and uninspiring garbage.
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »