EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

07.16.15

Hosting With Microsoft Software a Terrible Idea, as United Airlines Serves to Show

Posted in Microsoft, Security, Windows at 8:49 am by Dr. Roy Schestowitz

United Airlines

Summary: The United Airlines Web site, which uses Microsoft software, gets cracked, but the corporate media ignores the role of the underlying platform

“United hackers given million free flight miles,” says the BBC right now. Go to the United Airlines Web site and you will immediately see that they use Windows (ASPX is exposed at the URL of the front page, which is bad security practice in its own right). The United Airlines site is hiding behind Akamai (i.e. GNU/Linux), but it still shows a lot about the back end, which suggests that Microsoft frameworks are largely to blame (maybe poor programming, too).

This comes at an interesting time because, to quote other British media, “Microsoft Ends Windows Server 2003 Support But What Now?”

“The bottom line is, nobody should ever trust Microsoft for hosting of any kind of site.”Well, any company that still chooses Microsoft for public-facing site hosting would have to be dumb or seriously irresponsible. Microsoft is now hoping to also become the host of GNU/Linux sites. Microsoft’s booster Pedro Hernandez re-announces Microsoft propaganda right now (“Microsoft Rolls Out Linux Support Services on Azure”) even though it is not new, it is merely entrapment by Microsoft. Microsoft’s propaganda network “1105 Media”, featuring Microsoft’s booster Kurt Mackie, adds to it [1, 2] and promotes hosting by Microsoft. The latest Microsoft Channel 9 propaganda (we saw quite a bit of that recently), goes as far as openwashing Azure.

The bottom line is, nobody should ever trust Microsoft for hosting of any kind of site. The company is incompetent and it puts the NSA’s interests (e.g. back doors) first.

SUEPO Post Vanishes: Belated Self-Censorship or Threats From EPO Management?

Posted in Europe, Patents at 8:29 am by Dr. Roy Schestowitz

Benoit Battistelli

Summary: SUEPO (staff union of EPO) has just removed a post about Battistelli and his inner circle; we try to find out if union members or staff got threatened

LAST week SUEPO published some text and uploaded this PDF, which led us to writing this post.

Days later the PDF and the text both disappeared (it’s still not being reinstated and the PDF needed to be manually removed), so we have spent some time trying to find out what had happened. It’s almost certainly not accidental given the circumstances. One person told us that “the decision what is flagged public and what not is taken mostly by admins, and these are not members of the (political) SUEPO core team.”

Remember that SUEPO represents a great proportion of the EPO staff and also that the EPO engaged in censorship against SUEPO. There’s substantiate ground for fear. Battistelli’s inner circle is not speculative; this is just a list of names, their positions, and their family or professional ties. No defamation there, that’s for sure. No privacy violations, either.

We were not alone in wondering what had happened; there are already discussions about this online and offline (we may elaborate on this another day because some of the discussion is encrypted). Nobody seems to know for sure what is going on.

“No defamation there, that’s for sure. No privacy violations, either.”Does the EPO now induce self-censorship? First the EPO censored (deleted) E-mails, now it's censoring (blocking) entire Web sites such as Techrights. The People’s Republic of EPO might be a suitable new title for EPOnia, which views itself as independent from any country’s laws. Here is a new article about the EPO’s practice of censorship, composed and published yesterday morning. “EPO staff can still read TechRights at home or on mobile devices,” of course, “a fact that makes this attempt at censorship absolutely ridiculous. But it should also have access from its desktop computers at work just in case anyone finds links to prior art there.

“The EPO leadership has just scored an own goal: by blocking access to TechRights, it has now raised the profile of that blog.”

Dr. Glyn Moody, a journalist who covers issues including patents, calls it EPO “meltdown” (he wrote that 3 times over the past 24 hours). SUEPO, in the mean time, publishes another PDF, this time regarding the “120th Session of the ILO-AT” (it is a long 12-page paper).

As a side note, and it would be irresponsible to suggest that it is connected to the EPO’s actions (we have no such evidence except circumstantial), almost exactly on the same day (or the day after) the censorship was reported we got strongarmed by ICANN/ENOM to update records for the domain, as if someone complained that it was out of date. I received an authentic E-mail titled “IMPORTANT: Immediate Response Required – whois problem report: : techrights.org” on the same morning I wrote about the EPO’s censorship of techrights.org. ICANN/ENOM complaints are one way (among others) to induce domain-wide/universal blocking or expose one’s home address. I have been wrestling with this for 3 days now. It’s not as stressful as dealing with DDOS attacks, but it sure is a nuisance.

07.15.15

Links 15/7/2015: Linux in Prison, Canonical ‘IP’ Dispute

Posted in News Roundup at 8:52 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Why you need Open Source

    At the recent Red Hat Summit, Red Hat CEO James Whitehurst talks with Network World about new IT processes and why companies should focus on open source.

  • Xerte Project Joins Open Source Initiative

    Xerte Project’s Open Source Initiative membership furthers both organization’s commitment to growing open source community and collaboration within institutions of higher education.

  • NSA releases Linux-based open source infosec tool

    The US National Security Agency has offered up one of its cyber security tools for government departments and the private sector to use freely to help beef up their security and counter threats.

  • NSA’s new open source project is a cyber security tool
  • 10 outstanding open source server tools

    Not sure which tools belong in your open source server toolkit? Here are 10 solid go-to tools to get you started.

  • Events

    • Obsidian’s August Free Beer Session to toast open source

      Open source software supplier Obsidian Systems invites OS enthusiasts, developers, geeks and friends to the next ‘Free Beer Session’ on 27 August 2015. This session, the 17th in the series, will offer delegates fresh insight into the open source industry, challenges and opportunities.

  • Web Browsers

    • Mozilla

      • 10 things I want Firefox OS to do for me

        I’ve dogfooded Firefox OS since its early beginnings and have some of the early hardware (hamachi, unagi, One Touch Fire, ZTE Open, Geeksphone Keon, Flame and ZTE Open C). It was good to hear some of the plans for Firefox OS 2.5 that were discussed at Whistler, but I wanted to take the time and model of this post and remix it for Firefox OS. Firefox OS you are great and free but you are not perfect and you can be the mobile OS that I need.

      • Mozilla Disables Flash in Firefox

        As the zero days in Adobe Flash continue to pile up, Mozilla has taken the unusual step of disabling by default all versions of Flash in Firefox.

        The move is a temporary one as Adobe prepares to patch two vulnerabilities in Flash that were discovered as a result of the HackingTeam document dump last week. Both vulnerabilities are use-after-free bugs that can be used to gain remote code execution. One of the flaws is in Action Script 3 while the other is in the BitMapData component of Flash.

  • SaaS/Big Data

    • Teradata’s Configurable Hadoop Appliances Could Find a Niche

      Recently, all-in-one appliances have been much in the news. A few days ago, I covered Mirantis Unlocked Appliances, which deliver OpenStack and all the hardware resources you need for a deployment in one hardware/software entity. Then, Cloudera, which focuses on Apache Hadoop, and Teradata, a big data analytics and marketing tools company, announced the Teradata Appliance for Hadoop with Cloudera.

    • SafeStack attacks with a purpose

      Laura is the founder and lead consultant for SafeStack, a security training, development, and consultancy firm. What does that mean exactly? SafeStack helps organizations choose the right kind of security best practices for them. Then, Laura’s team shows them how to implement those new-found security protocols. This usually calls for a strong dose of workplace culture change, which might sound like a tall order, but Laura tells me in this interview “we want security to be any empowering tool for growth rather than a costly hindrance to innovation.”

    • SwiftStack Founder Plots a Path Forward for Cloud Storage [VIDEO]

      In the beginning of the open source OpenStack cloud effort, there were two projects – Nova Compute and Swift Storage. Swift is an integrated part of most OpenStack distributions but it is also the focus for a standalone company called SwiftStack, which was founded by Joe Arnold.

  • Oracle/Java/LibreOffice

  • CMS

    • Drupal 8 Nears Finish Line

      After over four years of development, including missed deadlines on general availability, the open source Drupal 8 content management system (CMS) finally appears to be nearing the finish line.

      Drupal, one of the world’s most popular CMS technologies, is used by many high-profile organizations, notably Whitehouse.gov, the flagship website of the U.S. government. While Drupal founder Dries Buytaert in 2012 announced Drupal 8 would be generally available in December 2013, that date passed with no release.

    • Building open source e-commerce sites with PrestaShop

      Why is being open source so important to us? At its most basic, being open source means users have access to and can manipulate PrestaShop code to make improvements or develop technical answers to address specific business needs. But more importantly, open source represents accessibility and flexibility. It’s an open-door policy versus the private club mentality of proprietary software. Our community is built around this open source ethos; it’s the source of our strength and it’s how we’re contributing to a more democratic e-commerce market.

    • Drupal early adoption at Memorial Sloan Kettering

      At Memorial Sloan Kettering (MSK), the world’s oldest and largest private cancer center, our researchers and clinicians have pushed boundaries to generate new knowledge in patient care and cancer research for more than 130 years. This culture of innovation allows our scientists to continually develop new methods for treatment and work tirelessly to discover more effective strategies to prevent, control, and ultimately cure cancer.

  • Education

    • First open source school management software developed in Haiti

      SIGES is a free, open source, available in French, Haitian Creole, and English. It is customizable to suit the schools: primary and secondary; professional and technical; private and public; in urban and rural areas, the school networks, sponsorship organizations, educational projects, etc…

  • Business

  • Funding

    • Container and Cloud Firm Sysdig Gets $10.7 Million Funding

      If you need further evidence that container technology is all the rage, just follow the money. Sysdig, focused on bringing infrastructure and application monitoring to the world of containers and microservices, has announced a $10.7 million Series A funding round led by Accel and Bain Capital Ventures (BCV). In conjunction with the funding, Sysdig announced the general availability of Sysdig Cloud, which it bills as “the first monitoring, alerting, and troubleshooting platform specializing in container visibility, which is already used by more than 30 enterprise customers.

  • BSD

    • PC-BSD Releases Lumina Desktop 0.8.5

      The PC-BSD crew has released version 0.8.5 of their Lumina desktop.

      Lumina 0.8.5 has a speed boost for the user button, desktop icons have improved styling and appearance, a new desktop plug-in is present for monitoring system hardware sensors, and there’s a desktop plugin container for custom QML/QtQuick scripts. There are also updated translations, new PC-BSD/FreeBSD packages, etc.

  • FSF/FSFE/GNU/SFLC

    • ​Canonical and Free Software Foundation come to open-source licensing terms

      Canonical, Ubuntu Linux’s parent company, has often rubbed other free software groups the wrong way when it came to open-source licenses. On July 15, Canonical, with support from the Free Software Foundation (FSF) and the Software Freedom Conservancy (SFC), have changed Ubuntu’s licensing terms. The FSF states that Canonical’s new intellectual property (IP) policies “unequivocally comply with the terms of the GNU General Public License (GPL) and other free software licenses.”

    • Ubuntu Policy Complies With GPL But Fails To Address Other Important Software Freedom Issues
    • Statement on Canonical’s updated licensing terms for Ubuntu GNU/Linux
    • Canonical’s Ubuntu IP policy is garbage

      Canonical have a legal policy surrounding reuse of Intellectual Property they own in Ubuntu, and you can find it here. It’s recently been modified to handle concerns raised by various people including the Free Software Foundation[1], who have some further opinions on the matter here. The net outcome is that Canonical made it explicit that if the license a piece of software is under explicitly says you can do something, you can do that even if the Ubuntu IP policy would otherwise forbid it.

    • Free software fans land crucial punch in Ubuntu row – but it’s not over

      The Free Software Foundation (FSF) and the Software Freedom Conservancy (SFC) have been bickering with Canonical since 2013 over concerns that certain clauses of the Ubuntu IP rights policy seemed to claim to override provisions of the GNU General Public License (GPL) – something the GPL explicitly forbids.

    • Conservancy & the FSF Achieve GPL Compliance for Canonical, Ltd. “Intellectual Property” Policy

      Today, Canonical, Ltd. announced an updated “Intellectual Property” policy. Conservancy has analyzed this policy and confirms that the policy complies with the terms of the GNU General Public License (GPL), but Conservancy and the FSF believe that the policy still creates confusion and possible risk for users who wish to exercise their rights under GPL.

    • Compilation Copyright Irrelevant for Kubuntu

      Compilation copyright is an idea exclusive to the US (or North America anyway). It restricts collections of items which otherwise have unrelated copyright restrictions. A classic example is a book collection of poetry where the poems are all out of copyright but the selection and ordering of poems is new and has copyright owned by whoever did it.

  • Project Releases

  • Openness/Sharing

    • Open Data

      • Electronic Public Records in Norway

        OEP is part of the Norwegian Government’s work to promote transparency and democracy within the public sector. OEP aims to make the Norwegian public sector more open and accessible to citizens. OEP is based upon the Freedom of Information Act and related regulations.

  • Programming

    • Zend Server 8.5 Announced as PHP 7 Release Nears

      Zend, the PHP company, is updating its namesake PHP application server to version 8.5 providing new features and performance for users. The Zend Server 8.5 release builds on the Zend Server 8 milestone which debuted with the Z-Ray application insight technology.

    • Interview: Larry Wall

      Perl 6 has been 15 years in the making, and is now due to be released at the end of this year. We speak to its creator to find out what’s going on.

Leftovers

  • Security

  • Defence/Police/Secrecy/Aggression

    • The Embargo on the Truth About the Iranian Arms Embargo

      The corporate media in both the UK and US are attempting to portray the Iranian desire to have the arms embargo lifted, as a new and extraneous demand that could torpedo the nuclear deal. This is an entirely false portrayal.

    • Iran Breakthrough

      There is a parallel danger in Iran. The Iraq War was totally unjustified and illegal, but Saddam Hussein might nonetheless have evaded it had he boxed a bit more cleverly and allowed some foolish inspectors to wander around his palaces prodding at the teaspoons. Yes the inspections regimes will be galling, even humiliating. But patience will have its rewards. There is real danger though that the hardliners on the Iranian side will be able to muster sufficient local points of power to hamper inspections, thus giving the US and Israeli hardliners an opportunity.

  • Environment/Energy/Wildlife

    • U.S. firm sues Canada for $10.5 billion over water

      An American-owned water export company has launched a massive lawsuit against Canada for preventing it from exporting fresh water from British Columbia.

      Sun Belt Water Inc. of California is suing Canada for $10.5 billion US, the Canadian foreign ministry said Friday.

      The suit has been filed under Chapter 11 of the North American Free Trade Agreement. Sun Belt says it has been “mistreated” by the B.C. government.

    • Ted Cruz at Secret Koch-Backed Fracking Lobby Group Meeting

      Senator Ted Cruz, raising cash for a 2016 presidential bid, was to meet privately Monday in Denver, Colorado with executives from major oil and gas corporations, all members of the pro-fracking lobby group Western Energy Alliance (WEA), according to details of the secret meeting shared with the Center for Media and Democracy.

      The Republican presidential candidate, a climate change denier, is also a leading proponent of opening up federal lands in the west–in fact virtually all lands everywhere–to energy development, and for scrapping regulations on oil and gas development.

  • Finance

  • PR/AstroTurf/Lobbying

  • Privacy

  • Civil Rights

    • The Mainstream Discovers Mhairi Black

      Having spoken alongside Mhairi at a few meetings, and much admired her, it is rather strange to find her in danger of becoming an object of cult veneration. Just as with Nicola Sturgeon, it seems the shock of seeing the coherent and intelligent articulation of views outside the narrow consensus manufactured by the corporate media and political class, really does strike home to people. They almost never get to hear such views put; Mhairi is being given a hearing because of her youth in her position, but the marginalisation and ridicule will soon kick back in. Above all, Mhairi should remind us of how the Labour Party has completely sold out those they used to represent, and abandoned the task of proposing an intellectually compelling alternative to trickledown.

  • Intellectual Monopolies

    • Email addresses as a trade secret; email addresses as a Trojan Horse?

      What exactly is of trade secret concern here? The answer is: the aggregate email addresses of the subscribers. Anyone who wants to show the broad scope of what is protectable as a trade secret will likely mention a customer list. What could be further from patentable subject matter, yet still be of value to its owner as a trade secret, than a customer list? Email addresses of subscribers can be likened in this respect to the classic customer list. Thus misappropriation of the email addresses might be a concern.

    • Copyrights

      • Mega Threatens Legal Action Against Search Engine

        Mega.co.nz has lodged legal threats against a New Zealand based search engine. MegaSearch.co.nz allows users to search Mega.co.nz for content but has attracted the attention of the file-hosting company after using its logos and trademarks without permission. Mega.co.nz is demanding a full shutdown.

      • FBI Assists Overseas Pirate Movie Site Raids

        Romanian authorities and the FBI have reportedly coordinated to shut down three sites involved in the unauthorized distribution of movies and TV shows. Several men were detained and various domains were seized amid allegations of criminal copyright infringement, tax evasion and money laundering.

07.14.15

As Demise of Software Patents (and More) in Line With Alice/Section 101 Accelerates, Hashtag #AliceStorm Introduced to Highlight Examples

Posted in America, Law, Patents at 2:31 pm by Dr. Roy Schestowitz

In Lieu of Decades of Bad Practice

Bilski Blog chart
Credit: Bilski Blog

Summary: The so-called ‘AliceStorm’ is eliminating software patents (and other abstract patents) at an alarming (to patent lawyers) rate

LAST WEEK we wrote about Michelle Lee's remarks on patent law, conjoined with the report about the Alice case beating Microsoft's patent troll, Intellectual Ventures. Lee’s remarks were important because she is now the leading face of the USPTO (no matter her job title) and Alice is killing software patents very fast, impeding Microsoft’s attacks on Free software in the process. It was only four days ago that we last cited a new example where Alice slaughtered software patents, paving the way (by citation or argument/strategy) for future legal cases where software patents are at stake. This is one of the most fantastic developments that Techrights has seen in nearly a decade and if Groklaw was still active, it too would be jubilant (it partly celebrated the Alice ruling in News Picks, coming back to life after less than a year of total silence).

“Lee is finally recognising that everything has changed and therefore the USPTO needs somewhat of an examination overhaul, for courts almost always disagree on software patents granted by the USPTO.”Michelle Lee now claims that the USPTO needs more Section 101 guidance, based on this patent lawyers’ site. Lee is finally recognising that everything has changed and therefore the USPTO needs somewhat of an examination overhaul, for courts almost always disagree on software patents granted by the USPTO. Just look at the statistics.

According to Patent Buddy, this new ruling [PDF] is yet another victory. “Another case where application of Alice/101 to kill patents has jumped the fence from business methods to software,” to quote Patent Buddy, who added: “We are seeing 101/Alice rejections for everything from MRI devices to adhesives!” According to another new find from Patent Buddy, “US Pat. 6728877 and 7346766 Killed with 101/Alice in Summary Judgment in Lawsuit Against Lenovo by Tranxition in Oregon Dist. Ct.”

This isn’t being overlooked, except by patent lawyers who probably hope that nobody will pay attention. They cherry-pick the few cases where software patents somehow survive. Here is a software patents’ booster whining about this. He wrote: “Deals are still being done in the software patent world, but patent valuation is significantly less than even just a few years ago.”

It’s hardly shocking.

“The Alice/101 Kill Rate Is Accelerating,” Patent Buddy added, linking to a “MUST READ From Bilski Blog” where Robert R. Sachs coins (or advertises) the word/hashtag “AliceStorm”. To quote Sachs: “In just the first ten days of July, there have been ten decisions on patent eligibility—more decisions in first ten days of any month since Alice was decided last year. At this pace, we could see some twenty to thirty decisions this month. #AliceStorm is accelerating.”

It sure looks like even some of the most respected legal blogs (like Bilski Blog in this case) recognise that software patents are weakened by Alice orders of magnitude more often then they were weakened (or invalidated) by the famous Bilski case (it did happen albeit very infrequently).

Shamelessly Rewriting the History of Nokia to Embellish Massive Microsoft Layoffs

Posted in Deception, Microsoft at 1:54 pm by Dr. Roy Schestowitz

Nokia

Summary: As Nokia is reduced to rubble in Microsoft’s fist (after epic entryism) the story of both companies is seriously distorted by Microsoft-friendly media in order to bolster Microsoft’s fictional version of the events

AMID the latest Microsoft layoffs we are deeply bothered to see misdirection and propaganda, almost surely coordinated behind the scenes by Microsoft's 'damage control' experts. The same thing happened some months ago when Microsoft announced an even bigger round of layoffs. Microsoft is trying to blame it all on Nokia, which is actually a victim of Microsoft, not an inherited liability. Nokia was doing a lot better before Elop (the Microsoft mole) stepped into the scene and gave Nokia to Microsoft as a gift, in exchange for a massive bonus that he was assured by Microsoft and later received from Microsoft (he has been set free again, potentially to find his next victims, Nokia not being his first).

“Actually, Nokia was starting to do pretty well with Linux (MeeGo) and was exploring Android, which now dominates the market with over 80% market share (i.e. about 2 orders of magnitude better than Windows).”The layoffs are explained a lot better by this Nokia guru, who foresaw a lot of what is happening right now. “Microsoft has now done THREE rounds of layoffs in less than 12 months,” he wrote, “firing 80% of the people it bought” (and many who are not from Nokia at all, possibly as many as 10,000 if not more, excepting temporary workers).

Watch how AOL rewrites the history of Nokia. This is “revisionism on ‘burning platform’,” as iophk put it in an E-mail to us. Some Microsoft-affiliated sites did the same thing, using euphemisms such as “Writedown” (euphemism of convenience for shutdown with layoffs) or “Misadventures” (again, for shutdown with layoffs).

“History tells us that Nokia did not defeat the odds,” wrote one person. “But inside the last five years are a number of lessons that the modern smartphone entrepreneur should think about.”

Actually, Nokia was starting to do pretty well with Linux (MeeGo) and was exploring Android, which now dominates the market with over 80% market share (i.e. about 2 orders of magnitude better than Windows). To say that Nokia was a lost cause and that it had to “defeat the odds” is to totally distract from Microsoft’s destruction of Nokia. Then again, Microsoft and its copywriters are always skilled at rewriting history in Microsoft’s favour. In the media we might even find Microsoft portrayed as the poor victim (e.g. of Nokia’s demise) rather than the predator that has had countless victims. Today’s articles about Netscape’s history are unbelievably watered down; some deleted Netscape from the history of Web browsers altogether.

“Microsoft is, I think, fundamentally an evil company.”

Former Netscape Chairman James H. Clark

Gross Openwashing of Microsoft and Windows, Propaganda About Associated Costs

Posted in Deception, GNU/Linux, Microsoft, Windows at 1:27 pm by Dr. Roy Schestowitz

Mask

Summary: Propaganda of assimilation, or trying to make Windows look comparable/on par with GNU/Linux cost and freedom, is the latest propaganda pattern

AS Microsoft so desperately combats the zero-cost advantage of GNU/Linux it uses not facts but fiction. We have grown accustomed to seeing advertising pieces like this one (journalists as Microsoft couriers or copywriters), pretending that Windows is “free” and that it may become “open source” because of some blurb from three months ago. “A per this Wired article,” wrote this author, “open sourcing is no longer optional, even for Apple. Even for Microsoft. Even for Windows.” Actually, all of these are proprietary, so evidence does not support the argument. Nice try though…

“They are blurring the distinction between “open” and “closed” or between “free” and “proprietary”.”Wired has been quite notable in the "googlebombing" of "Microsoft open source" or "Windows open source". It has been quite an effective propaganda campaign that culminated over the past year and we see more of it in light of this proprietary software release that is heralded with headlines such as “Microsoft’s Power BI is coming July 24th, adds a bit of open source and Android seasoning” and “Microsoft Says Power BI Will Come Out Of Preview On July 24, Open Sources Visualization Stack”. This is not Open Source at all, but Microsoft-friendly sites are openwashing Microsoft’s proprietary software. Sometimes even Linux sites fall for it as it’s not helping when Microsoft’s propaganda channel (Channel 9) is openwashing proprietary software such as Visual Studio. This example from Channel 9 is again fitting a pattern that we first noted one week ago. This openwashing ‘thing’ is very much ‘in’. The Microsoft-controlled Channel 9 increasingly chimes in to amplify the noise.

“Embrace, extend, extinguish” moves are now being used to make Apache software tied to Windows-powered and Microsoft-controlled servers (Azure). Isn’t that great? They are blurring the distinction between “open” and “closed” or between “free” and “proprietary”.

“Hadoop,” says ZDNet, “started out using an open source implementation of Google’s MapReduce as its exclusive processing engine.” Well, now Microsoft wants it all for itself, to run under Windows (proprietary and pricey) as well as under Microsoft’s control (with rental payments for hosting).

Microsoft is acting like a bandit, operating from the inside when it comes to Android as well (see “Windows 10 to allow easy porting of apps from Android and iOS platforms”), not to mention the underlying kenrel, Linux. Watch this new example of bad code that Microsoft has put inside Linux to promote proprietary software like Hyper-V, which runs on Windows (hyper-visor with NSA back doors implied) to control GNU/Linux guests.

“I would love to see all open source innovation happen on top of Windows.”

Steve Ballmer, Microsoft CEO

Governments-Connected ‘Hacking Team’ Targets UEFI, Reveal Leaks

Posted in Hardware, Microsoft, Security at 12:54 pm by Dr. Roy Schestowitz

Dusty computer

Summary: The insecurity and abundant complexity/extensibility of UEFI is already exploited by crackers who are serving corrupt regimes and international empires

TECHRIGHTS has spent many years writing about dangers of Microsoft back doors and about 3 years writing about UEFI which, according to various citations we gathered, enables governments to remotely brick (at hardware level) computers at any foreign country, in bulk! This is a massive national security threat and Germany was notable in reacting to it (forbidding the practice). Among our posts which cover this:

Today we learn that UEFI firmware updates spread to the most widely used GNU/Linux desktop distribution and yesterday we learned that “HackingTeam has code for UEFI module for BIOS persistency of RCS 9 agent (i.e. survives even HD replace)…”

Rik Ferguso wrote this with link to the PowerPoint presentation, pointing to leaked E-mails via Wikileaks. The push back against UEFI ought to be empowered by such revelations, perhaps in the same way that these leaks now threaten to kill Adobe Flash for good.

Links 14/7/2015: Android in Enterprise, TOP500 Has 486 on GNU/Linux

Posted in News Roundup at 12:11 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • True confessions: I wrote for an Internet content mill

    The list goes on; it’s seemingly infinite. Such search terms offer insight into both our fears (“how bad is caffeine during pregnancy”) and desires (“bronies”). And thanks to thousands of poorly paid freelance writers looking to pick up some extra cash or toiling for wages, the results we’re served in these vulnerable moments are often hastily scribbled, poorly written, ungrammatical filler text. This old world relic represents a time when getting to the top of Google rankings wasn’t dependent on the quality of information you supplied but how many people linked to your site.

    This kind of text—the equivalent of fast food or hangover-friendly TV—is the preserve of content mills, an Internet subculture where for-hire workers are tasked with writing vast amounts of online copy for a pittance. Today, when more media outlets and self-publishing tools exist than ever before, such word factories somehow continue to exist.

  • Science

    • Solved? How scientists say mystery craters were formed in northern Siberia

      A new expedition to the craters in Yamal, in northern Russia, shows how they have rapidly altered since they were first noticed last year, but also indicates the possibility that not all the craters were formed in identical ways. The holes – first noticed last year – intrigued and perplexed scientists from around the world, initially provoking a number of explanations as to their cause, the most outlandish of which was that they were caused by stray missiles or even aliens from outer space.

    • Mammal–Carnivorous Plant Mutualism

      A pitcher plant species in Borneo attracts bat inhabitants by reflecting sonar signals from the flying mammals, advertising a cozy roost, and getting nitrogen-rich guano in return.

  • Security

    • Security advisories for Monday
    • rolling expired certs

      My cert expired after a year because that seems to be the thing to do. I imagine there’s some nebulous threat model where somebody stole my server key and has been impersonating me for the past six months, but now they can’t. Although, if they stole the old key, they can probably steal the new key. I suppose we do this because revocation doesn’t work, but a six month half life is a long time to sit exposed.

    • Hacking Team claims terrorists can now use its tools
    • Hacking Team: government-sponsored cyberattack company likely hacked by another country, it claims

      An elite cyberattack group that was employed by governments and agencies was probably hacked by another country, it has said — and the attack has led to its powerful hacking tools being released into the wild.

      Hacking Team was hacked last week, revealing private emails and documents as well as insights into its tools. The leaked documents showed many of the vulnerabilities that were being used by the group — such as a bug in Adobe Flash that can be exploited to get complete control of a computer — which has meant that anyone can counteract them as well as use them for their own ends.

    • Flash HOLED AGAIN TWICE below waterline in fresh Hacking Team reveals
    • Adobe to Patch Two More Zero-Day Flaws in Flash
    • Mozilla blocks Flash as Facebook security chief calls for its death

      After yesterday’s news that Facebook’s new chief security officer wants to set a date to kill Flash once and for all, the latest version Mozilla’s Firefox browser now blocks Adobe’s vulnerability-riddled software as standard. Mark Schmidt, the head of the Firefox support team at Mozilla, tweeted that all versions of Flash Player are blocked in the browser as of its latest update, accompanying the news with an image showing a raised fist and the phrase “Occupy Flash.”

    • Can we kill Adobe Flash?

      Yesterday the usual tech news outlets were buzzing over an accidental tweet which the media incorrectly interpreted as Mozilla was ditching flash (Blame The Verge for the chain reaction of copied news articles) entirely as a policy. While that is not the case, I was just as excited as many at the faux-news. This got me thinking: what would it really take for the web to kill Adobe Flash? Could Mozilla really make such a move and kill Flash on its own if it wanted to?

    • No Flash 0.5 – still fighting the legacy

      Last week I released No Flash 0.5, my addon for Firefox to fix the legacy of video embedding done with Flash. If you are like me and don’t have Flash installed, sometime you encounter embedded video that don’t work. No Flash will fix some by replacing the Flash object with a HTML5 video. This is done using the proper video embedding for HTML5.

    • Facebook’s New Security Chief Calls On Adobe To Kill Flash

      This message comes after it was revealed that the recently hacked “Hacking Team” was using Flash zero-day vulnerabilities to hack journalists, activists, governments and more. Alex Stamos, like other security experts, must have also gotten tired of hearing about so many security vulnerabilities that Flash has had during its entire lifetime.

    • How to disable Flash Player: Why now’s a better time than ever

      Now more than ever, leaving Adobe Flash Player on your system is looking like a dubious proposition.

      While Flash has long been a popular vector for malware, last week’s security breach of surveillance software firm Hacking Team underscored just how vulnerable Flash can be. Hacking Team was relying on at least three unpatched Flash exploits, which cybercriminals immediately adapted for their own nefarious uses. Adobe is scrambling to patch the exploits, but at least one remains unfixed as of this writing.

    • Linux Foundation serves up a tasty dish of BUGS [Ed: FUD theme]
    • Linux tools infested by huge bugs [Ed: FUD theme]

      Dubbed the Census Project the initiative has been finding an embarrassing number of flaws in common core Linux system utilities that have network access. Some of them have nowhere near enough development relative to their importance.

  • Defence/Police/Secrecy/Aggression

    • Texans to “practice counter-insurgency” while U.S. special forces participate in Operation Jade Helm

      In response to the multi-state military exercise organized by the federal government, a group of very concerned Texans have organized what they’re calling “Counter Jade Helm,” in which “citizens will participate in an unofficial fashion to practice counter-insurgency, organizational and intelligence gathering and reporting skills.”

      Operation Jade Helm begins on July 15th, but as the media is barred from covering the exercise, citizen surveillance is the only option that people like retired firefighter Eric Johnson have to assuage their concerns about what the SEALs, Green Berets, and Air Force Special Ops are actually up to.

  • Environment/Energy/Wildlife

  • Finance

    • Yanis Varoufakis full transcript: our battle to save Greece

      Yanis Varoufakis: I’m feeling on top of the world – I no longer have to live through this hectic timetable, which was absolutely inhuman, just unbelievable. I was on 2 hours sleep every day for five months. … I’m also relieved I don’t have to sustain any longer this incredible pressure to negotiate for a position I find difficult to defend, even if I managed to force the other side to acquiesce, if you know what I mean.

    • The Laziness Dogma
  • PR/AstroTurf/Lobbying

  • Censorship

    • Authors Guild: ISPs Should Monitor and Filter Pirated Content

      The Authors Guild has sent a letter to the U.S. Congress asking lawmakers to strengthen current copyright law. To stop dozens of millions in claimed losses, the authors want to increase liability for Internet service providers and make it mandatory for the companies to monitor and filter pirated content.

    • Australian woman jailed in Abu Dhabi for ‘bad words’ posted on social media

      A 39-year-old Australian woman has been arrested and jailed in Abu Dhabi in the United Arab Emirates after she was found guilty of “writing bad words on social media”.

      West Australian Jodi Magi remains in jail and it’s not known how long she will be held for.

      Middle East correspondent Sophie McNeill reports.

      SOPHIE MCNEIL: In February, 39-year-old Jodi Magi took a photo of a car in her apartment block in Abu Dhabi that was parked across two disabled parking spaces without any disability stickers.

    • Seven in ten Sky internet users block out porn: Now rival providers face pressure to follow suit

      Almost three-quarters of Sky’s internet customers have opted to block online pornographic websites after being forced to choose.

      The company announced an automatic block on harmful sites six months ago in a bid to prevent children from stumbling across hardcore images and videos.

    • China’s new Internet law introduces stricter censorship, surveillance powers

      Powers to require online surveillance, remove content, block foreign web sites and shut down parts of the network are contained in the draft of a new Internet security law recently published by the Chinese government. Although these approaches have all been used in the past, their legal basis has sometimes been unclear. If approved, the new law will make it much easier for the Chinese authorities to force compliance from Internet service providers, which will have major knock-on effects for users in the country.

  • Privacy

    • Privacy talk at DEF CON canceled under questionable circumstances

      Earlier this month, several news outlets reported on a powerful tool in the fight between those seeking anonymity online, versus those who push for surveillance and taking it away.

      The tool, ProxyHam, is the subject of a recently canceled talk at DEF CON 23 and its creator has been seemingly gagged from speaking about anything related to it. Something’s off, as this doesn’t seem like a typical cancellation.

    • Feds can read every email you opened last year without a warrant

      It’s no longer a surprise that the government is reading your emails. What you might not know is that it can readily read most of your email without a warrant.

      Any email or social networking message you’ve opened that’s more than six months old can also be accessed by every law enforcement official in government — without needing to get a warrant. That’s because a key provision in a law almost three decades’ old allows this kind of access with a mere subpoena, which doesn’t require a judge.

    • All Instant Messaging Could Be Killed In The UK Within Weeks

      UK Prime Minister David Cameron is pressing ahead with new powers that plan to stop people from sending any form of encrypted messages. Under the rather Orwellian “Draft Communications Data Bill” (nicknamed Snooper’s Charter) the legislation proposed would require ISPs and mobile providers to maintain records of each user’s internet browsing activity (including social media), email correspondence, voice calls, and mobile phone messaging services and store the records for 12 months.

    • How the NYPD Uses Facebook to Surveil, Entrap and Arrest Teenagers

      In October 2012, then-New York Police Commissioner Ray Kelly announced a new initiative, called “Operation Crew Cut,” which would target gang activity by focusing on so-called street crews. Kelly doubled the size of the anti-gang unit to 300 police officers, assigned to the task of surveilling teenagers on Facebook. Many of these kids are under 18, some as young as 12, and just about all of them are black and brown, from low-income neighborhoods. The officers involved are encouraged to make fake Facebook profiles in order to spy on individuals’ Facebook statuses. The operation often entails reading private Facebook messages between friends and is sometimes coupled with phone and video surveillance. Soon press releases were coming out of the NYPD offices announcing dozens of alleged gang members had been arrested due to the Crew Cut initiative.

    • Warning – Firefox Has You in the Pocket
    • Hacking Team’s ‘Project X’ Wants To Spy on Tor Users

      After the Edward Snowden revelations and the rise of deep web marketplaces, more and more people are using the anonymity network Tor to take back their privacy or access hidden sites, sometimes to break the law.

      In response to this trend, surveillance tech company Hacking Team let slip last month that they were working on a solution to de-anonymize users of Tor for their customers, which include US law enforcement agencies and authoritarian regimes. After the massive Hacking Team leak last week, details of a work-in-progress system to monitor Tor and other encrypted traffic have emerged.

      Called “Project X,” Hacking Team’s method proposes to re-route a target’s internet traffic before it enters the Tor network, so it could be monitored by the company’s clients. This is described in two PowerPoint presentations included in the 400 GB Hacking Team breach.

  • Civil Rights

    • Man arrested after charging iPhone on London Overground train

      A man has accused British Transport police of being “overzealous” and “ridiculous” after he was arrested for charging his iPhone using a socket on a London Overground train.

      Robin Lee, a 45-year-old artist based in Islington, was handcuffed and taken to a British Transport Police station on Caledonian Road after his arrest for “abstracting electricity”.

    • Teenager handcuffed by police after giving £1 to a homeless man wins £5,000 pay out for unlawful detention

      A student who stopped to give money to a homeless person was handcuffed by a police officer who thought they were swapping drugs.

      Apprentice George Wilson, from Wallasey, received a £5,000 pay out after police accepted he had been detained unlawfully.

      A shocking recording of the incident reveals that when Mr Wilson denied he was behaving in a drunk and disorderly manner, as police had alleged, the officer replies: “That’s not how I’ll write it up pal.”

    • Nicky Hager heads to court over raid

      Investigative journalist Nicky Hager is set to make his case against a police raid on his Wellington home.

      Mr Hager will appear in the High Court in Wellington today for a judicial review into how police obtained a warrant for, and undertook, the raid on October 2, 2014.

      The 10-hour search of Mr Hager’s home was part of the police investigation into the hacking of Whale Oil blogger Cameron Slater’s emails, which were given to Mr Hager by anonymous hacker Rawshark and formed the basis of his book Dirty Politics.

    • Oscar and Pulitzer Award-Winning Journalist Laura Poitras Sues U.S. Government To Uncover Records After Years of Airport Detentions and Searches
    • Laura Poitras Sues U.S. Government to Find Out Why She Was Repeatedly Stopped at the Border

      Over six years, filmmaker Laura Poitras was searched, interrogated and detained more than 50 times at U.S. and foreign airports.

      When she asked why, U.S. agencies wouldn’t say.

      Now, after receiving no response to her Freedom of Information Act requests for documents pertaining to her systemic targeting, Poitras is suing the U.S. government.

      In a complaint filed on Monday afternoon, Poitras demanded that the Department of Justice, the Department of Homeland Security, and the Office of the Director of National Security release any and all documentation pertaining to her tracking, targeting and questioning while traveling between 2006 and 2012.

    • ​Ross Ulbricht Is Tutoring Inmates, Keeping a Pet Mouse in Prison

      More than a month after being sentenced to spend the rest of his life in prison, convicted Silk Road mastermind Ross Ulbricht is trying to keep his head up and help other inmates out, his mother Lyn said.

  • Intellectual Monopolies

    • Copyrights

      • Mega’s biggest shareholder leaves board

        Mega’s biggest shareholder, Shen Zhao Wu, has left the board of the file storage and encryption firm and transferred his stake to a Beijing-based Chinese national just days after a constitution re-write made it easier to go public, while Auckland businessman William Yan increased his influence over the company after an entity linked to his wife took a small shareholding.

      • Pirate Bay’s founders acquitted in Belgian court

        The four founders of the piracy website, The Pirate Bay, have been acquitted on charges alleging criminal copyright infringement and abuse of electronic communications in a Belgian court. The court decided that because they sold the website in 2006 that they could not be held accountable for what the site was used for afterwards.

      • Pirate Bay Founders Acquitted in Criminal Copyright Case

        Four key Pirate Bay figures have a little something to celebrate this morning. After standing accused of committing criminal copyright infringement and abusing electronic communications, yesterday a Belgian court acquitted Gottfrid Svartholm, Fredrik Neij, Peter Sunde and Carl Lundström.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts