EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

06.26.15

Proprietary Software on Top of Proprietary Software (AV on Windows) Only an Illusion of Security

Posted in Free/Libre Software, Microsoft, Windows at 11:21 am by Dr. Roy Schestowitz

“Our products just aren’t engineered for security.”

Brian Valentine, Microsoft executive

Summary: Remarks on the recent revelations about code and communication interceptions targeting insecurity firms and Microsoft’s claim that ‘transparency’ alone would be enough to assure security

RECENT reports about state surveillance on anti-malware/virus software (which could not detect Stuxnet, for example, making this more like snake oil) have led to the claim that Microsoft Windows cannot be made secure, not even with additional ‘security’ software. “Security by obscurity” does not work when the state can see everything and also sponsors the world’s biggest (and best funded) cybercrime operations. Windows is simply not designed to be secure and security is not the goal as the underlying design serves to prove. As Pogson put it this week:

Given That Other OS is just about everywhere and is helpless without anti-malware software, the NSA and others have studied the anti-malware software to exploit it as a back door to TOOS… Ironic, isn’t it?

Microsoft and security don’t belong in the same sentence. As FOSS Force reminds us, this NSA ally with worst of spyware uses the “transparency centers” [1] sham that we wrote about earlier this month. They are replacing software freedom with “transparency” nonsense. They pretend that “transparency” somehow improves security. It doesn’t.

The only way to perpetually and universally verify (by audit) the security of software, or pressure its maker/distributor to pursue genuine security at all times, is to ensure the software is Free software. Microsoft’s longtime employee (on and off for years at a time) and occasional mole inside FOSS [1, 2, 3, 4] says that Free software has not won and even uses a picture of a pig to prove it or at least make his case (crass, but typical of him). Don’t let these people shape the consensus; after the NSA leaks a lot of semi-technical people can easily understand that Free software is the only way to go. Secrecy, like secret (proprietary) code, is as trustworthy as politicians. It’s time for proprietary software to go. Backbone infrastructure sure is heading towards Free software-only (as a matter of policy), as several consortia already serve to demonstrate. It’s going to be a harsh reality for Microsoft.

Related/contextual items from the news:

  1. The NSA, Windows & Antivirus

    Poor Microsoft. The beleaguered company just can’t catch a break. We’ve already told you about how Snowden’s revelations have forced the pride of Redmond to spend who knows how many millions opening two “transparency centers” to allow government IT experts to pore through source code to prove there’s no back doors baked into Windows or other Microsoft products. Trouble is, while its engineers have been busy plastering over all traces of old back doors, they’ve left a side door standing wide open, waiting to be exploited.

    [...]

    The spooks have been reverse engineering. They’ve been dismantling Karpersky’s software, searching for weaknesses. They’ve been mining sensitive data by monitoring the email chatter between Kaspersky client and server software. In other words, while IT security folks outside the U.S. have been keeping a wary eye on their Windows servers while trusting their antivirus to be a tool to help them secure the unsecurable…well, their antivirus software has been being a Trojan in the truly Homeric sense of the word.

    [...]

    In the meantime, Windows becomes less safe by the minute for corporations and governments hoping to keep private data private. I’m certain that Red Hat, SUSE, and even Ubuntu are taking advantage.

The EPO’s Circus of Nepotism, Corporatism and Gross Abuse is Promoting the Unitary Patent

Posted in Europe, Patents at 6:55 am by Dr. Roy Schestowitz

Corporations now run the European Patent Office (EPO)

Ray of light

Summary: The shameful management of the EPO, which Benoît Battistelli constructed based on his nefarious self-serving agenda, keeps pushing forth in a direction that greatly harms European citizens while mistreating the EPO’s technical staff (scientists and examiners)

THE EPO scandals continue and there is no denying that there is trouble when a huge proportion of the staff goes out to demonstrate right in front of the employer. Only a shameless liar would try to blame some “disgruntled employee” or “defamation”. The EPO, more so these days than ever before, is not a public service. It just sucks in public money. It is essentially a corporate entity masquerading as a public institution because it provides benefits like legal immunity, welfare (“too big to fail”), etc.

The EPO Administrative Council (AC), which has become Benoît Battistelli’s number one fan after some entryism, is trying to destroy the European industry with more patent monopolies and fees. According to patent lawyers’ media, Mr Kongstad’s office is at the forefront of this atrocious move:

The Select Committee of the EPO Administrative Council, which represents the 25 EU states expected to be covered by the Unitary Patent, adopted the so-called true top 4 proposal by a three-quarter majority yesterday.

One of the selling points of the planned Unitary Patent is that a single annual renewal fee payable to the EPO will maintain the right in the participating EU member states, meaning that national fees will no longer have to be paid.

The above says that the AC “represents the 25 EU states”, but in reality it seems to represent Battistelli and his rich friends, who want to become even richer.

The AC’s Kongstad is finding himself under fire again, this time from his own staff. SUEPO’s Web site says that “Ms Bergot, Principal Director of Human Resources of the EPO, has scheduled new meetings of the working group on “union recognition” between the administration and union officials. However, Mr Kongstad (Chairman of the Administrative Council) has still not reacted to the letter sent by SUEPO Central concerning the investigation of staff representatives and/or union executives during trilateral talks.

“Pending Mr Kongstad’s written answer, as also reiteratered in the Council meeting of 24/25 June 2015, SUEPO regrets it must decline the invitation at present. Of course, SUEPO is looking forward to developments making the resumption of meaningful discussions possible.”

SUEPO has this PDF reply letter, sent to Ms Bergot:

Dear Ms Bergot,

You have scheduled new meetings of the working group on “unions recognition” between the administration and union officials.

You must be aware of the letter sent by SUEPO Central to the Chairman of the Administrative Council, Mr Kongstad, which was made public on 10 June 2015 (*).

Pending Mr Kongstad’s written answer to our requests, as also reiteratered in the Council, we regret we must decline your invitation at present. Of course, we look forward to developments making the resumption of meaningful discussions possible.

Recall that Gilles Requena, the EPO’s Administrator (Presidential Office), is the spouse of Ms Bergot [PDF]. Bergot, the Principal Director of Human Resources, is clearly there because of connections, not skills. She’s far from the only such instance. Battistelli has quickly turned the EPO into an international laughing stock. It’s time to reclaim the EPO or reboot it.

Links 26/6/2015: Ardour 4.1, GNOME 3.17.3 Released

Posted in News Roundup at 6:03 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • BMW: ‘Our competitor is not Audi, Jaguar Land Rover or Mercedes but consumer electronics players’

    BMW is bringing software back in-house so it can deliver seamless digital experiences for its customers – something more valued than horsepower or engines in today’s market, its digital business models lead said.

  • Science

    • 10 Reasons Tape Backup Remains Important to the Enterprise

      Digital tape is about the hardest-to-kill storage IT there is, unless you count carving out data onto rocks, the way it was done hundreds of thousands of years ago. Tape technology celebrated its 63rd birthday on May 21; IBM first made available its IBM 726 Magnetic tape reader/recorder in 1952. Strangely, unlike later IBM tape drives, the original 726 could read tape backward and forward. Tape has managed to get better with age. When tape first went to market, the media itself weighed 935 pounds and held 2.3MB of data. In 2015, that much tape weighs closer to 12 pounds, and 2.3MB would comprise one large photo or a short pop song. Tape storage densities are broken regularly; IBM’s tape team recently demonstrated an areal recording density of 123 billion bits of uncompressed data per square inch on low-cost, particulate magnetic tape. The breakthrough represents the equivalent of a 220TB tape cartridge that could fit in the palm of your hand. Companies such as Iron Mountain, Spectra Logic, IBM and others maintain large installed bases of tape storage around the world. Here are some key facts about tape storage.

  • Security

  • Defence/Police/Secrecy/Aggression

    • Charleston Massacre Media Coverage: Recognizing the Crime, Downplaying the Causes

      When a white male kills people in a mass shooting in the US, the corporate media follow an algorithm not unlike the Kübler-Ross model of the five stages of grief.

      First, media deny that the attack constitutes terrorism. In their view, acts of political violence carried out against civilians are indisputably terrorism when they are committed by a Muslim, but this is not necessarily the case when they are committed by a white person.

      This is the stage in which most media coverage of shootings by white Americans remains stuck. When Elliot Rodger massacred six people and injured 14 more in May 2014, he was not classified as a terrorist–even though he explicitly stated that his attack was motivated by an intense hatred of women, and that he sought to “punish” women, collectively, for “rejecting” him in the past.

      Yet because of mounting pressure and criticism from independent media, activists and social media, in the wake of mass shooting after mass shooting carried out disproportionately by white men, corporate media are no longer able to remain in a state of such denial.

    • That Most Terrorists Aren’t Muslim May ‘Come as a Surprise’–if You Get Your News From Corporate Media

      The “surprise” is that more people are killed by “white supremacists, antigovernment fanatics and other non-Muslim extremists than by radical Muslims”: 48 vs. 26 since 9/11, according to a study by the New America Foundation. (More comprehensive studies cited in a recent New York Times op-ed–6/16/15–show an even greater gap, with 254 killed in far-right violence since 9/11, according to West Point’s Combating Terrorism Center, compared to 50 killed in jihadist-related terrorism.)

      The Times suggests that “such numbers are new to the public”–but they won’t come as much of a surprise to those familiar with FAIR’s work. In articles like “More Terror, Less Coverage” (Extra!, 5/11) and “A Media Microscope on Islam-Linked Violence” (Extra!, 8/13), FAIR’s Steve Rendall has debunked the claim that terrorism is mostly or exclusively a Muslim phenomenon, pointing out that white, right-wing Christians are responsible for the bulk of political violence in the United States.

  • Transparency Reporting

    • With Its French NSA Leak, WikiLeaks Is Back

      Classified documents appear on WikiLeaks.org, revealing that the American government is spying on its allies. American officials rush to deal with a sudden diplomatic crisis while publicly refusing to comment on leaked materials. And WikiLeaks proclaims that it’s just getting started.

  • Environment/Energy/Wildlife

    • What’s Killing the Babies of Vernal, Utah?

      Every night, Donna Young goes to bed with her pistol, a .45 Taurus Judge with laser attachment. Last fall, she says, someone stole onto her ranch to poison her livestock, or tried to; happily, her son found the d-CON wrapper and dumped all the feed from the troughs. Strangers phoned the house to wish her dead or run out of town on a rail. Local nurses and doctors went them one better, she says, warning pregnant women that Young’s incompetence had killed babies and would surely kill theirs too, if given the chance.

      [...]

      Then there’s pollution of the eight-wheeled sort: untold truck trips to service each fracking site. Per a recent report from Colorado, it takes 1,400 truck trips just to frack a well — and many hundreds more to haul the wastewater away and dump it into evaporation ponds. That’s a lot of diesel soot per cubic foot of gas, all in the name of a “cleaner-burning” fuel, which is how the industry is labeling natural gas.

  • Finance

    • Unregulated Capitalism Is Destroying the Planet

      We are in the middle of the first great mass extinction since the end of the age of the dinosaurs.

      That’s the conclusion of a shocking new study published Friday in a journal called Science Advances.

      The study, which was conducted by a group of scientists from some of the United States’ leading universities, found that over the past century-plus, vertebrate species have gone extinct at a rate almost 114 times faster than average.

      See more news and opinion from Thom Hartmann at Truthout here.

      That’s right – not one, not two, not 50, but 114 times faster than average!

      The study also found that as many 477 different vertebrate species have disappeared since 1900, a mind-boggling statistic because it usually takes between 800 to 10,000 years for that many species to disappear.

    • The Senate Passes Fast Track—But We Can Still Prevent the TPP Train Wreck

      The U.S. Senate has paved the way for the passage of Fast Track legislation, to give the White House and the U.S. Trade Representative almost unilateral power to negotiate and finalize secret anti-user trade deals like the Trans-Pacific Partnership (TPP). Yesterday a “cloture” vote was held—this was a vote to end debate on Fast Track and break any possibility for a filibuster, and it passed by the minimum votes needed—60 to 37. Today, the Senate voted to pass the legislation itself. TPP proponents only needed 51 votes, a simple majority, to actually pass the bill, and they got it in a 60 to 38 vote. Following months and months of campaigning, Congress has ultimately caved to corporate demands to hand away its own constitutional mandate over trade, and the President is expected to the sign the bill into law as early as tonight or later this week.

    • Senate approves fast-track, sending trade bill to White House

      he Senate voted Wednesday to approve fast-track authority, securing a big second-term legislative win for President Obama after a months-long struggle.

      The 60-38 Senate vote capped weeks of fighting over the trade bill, which pitted Obama against most of his party — including Senate Democratic Leader Harry Reid (Nev.) and House Minority Leader Nancy Pelosi (D-Calif.).

      Passage of the bill is also a big victory for GOP leaders in Congress, including Senate Majority Leader Mitch McConnell (R-Ky.) and Speaker John Boehner (R-Ohio). The Republican leaders worked closely with an administration they have more frequently opposed to nudge the trade bill over the goal line.

    • Network Rail upgrade delayed by government

      The government says it will delay or cut back a number of modernisation projects planned for Network Rail.

      Transport Secretary Patrick McLoughlin says rising costs and missed targets make the £38.5bn plan untenable.

      He blamed Network Rail, saying it should have foreseen the improvements would cost more and take longer.

      Labour said it had warned the government needed to change how the railways were run but had “dithered” over taking action.

      Network Rail said the plan, which was launched last year as the “largest modernisation of the railways since Victorian times”, was too ambitious.

      Network Rail controls 2,500 stations as well as tracks, tunnels and level crossings.

    • Why Catholic Americans are rejecting the Pope: They worship the free market now

      Pope Francis’ much-anticipated climate change encyclical, released last week, is every bit as strong as environmentalists and other proponents of dramatic action on climate change had hoped. The pontiff affirms the scientific consensus that climate change is largely the result of human activity, calls for “urgent action” to develop renewable energy alternatives, and slams global development paradigms that create an “ecological debt” between the Global South and the wealthier North.

      Many are predicting that the encyclical will be a game changer that will mobilize religious groups and galvanize lagging western nations, particularly the United States, to address climate change. And the encyclical will undoubtedly give the cause a huge moral push, especially at the upcoming international climate negotiations. But there are ominous warning signs already that a significant percentage of American Catholics — the very faith constituency that should be most receptive to the pope’s message — may turn a deaf ear to Francis. This means that not only are they unlikely to give up their SUVs, but also to support policies to address climate change or the candidates that back them.

    • Divide-and-Conquer Walker Thinks Equal Pay Is Divisive

      Scott Walker is taking heat for claiming that supporting equal pay for women “pit[s] one group of Americans versus another.”

      Here in Wisconsin, howls of laughter could be heard echoing through the marble walls of the state capitol: after all, this is a governor whose divisive approach has helped make his state one of the most bitterly polarized in the country.

  • PR/AstroTurf/Lobbying

    • Federal Documents Debunk Baltimore ‘Gang Threat’ Narrative

      This fact—that there are always young kids at Mondawmin (it’s a major transportation hub, and the only way thousands of kids can get home)—is erased entirely from the equation. The use of the term “juveniles” is meant to prejudice the reader and criminalize otherwise legal and peaceful assembly. From the beginning of the Baltimore Uprising, in other words, it’s been evident the Baltimore Police Department was far more interested in manipulating the press and hyping the threat than they were protecting First Amendment activity and people’s property.

  • Censorship

  • Privacy

    • Dropbox Is Struggling and Competitors Are Catching Up

      Dropbox made itself a household name by giving away cloud storage. The eight-year-old company, valued at $10 billion, had 300 million registered users a year ago; now it’s got 400 million. Its two-year-old effort to make money from business users has been less impressive. While Dropbox led the $904 million global market for business file-sharing last year with about a 24 percent share, No. 2 Box and No. 3 Microsoft each took about 21 percent and doubled their slice of the pie, growing almost twice as fast, according to researcher IDC.

    • The NSA, Windows & Antivirus

      Poor Microsoft. The beleaguered company just can’t catch a break. We’ve already told you about how Snowden’s revelations have forced the pride of Redmond to spend who knows how many millions opening two “transparency centers” to allow government IT experts to pore through source code to prove there’s no back doors baked into Windows or other Microsoft products. Trouble is, while its engineers have been busy plastering over all traces of old back doors, they’ve left a side door standing wide open, waiting to be exploited.

      [...]

      The spooks have been reverse engineering. They’ve been dismantling Karpersky’s software, searching for weaknesses. They’ve been mining sensitive data by monitoring the email chatter between Kaspersky client and server software. In other words, while IT security folks outside the U.S. have been keeping a wary eye on their Windows servers while trusting their antivirus to be a tool to help them secure the unsecurable…well, their antivirus software has been being a Trojan in the truly Homeric sense of the word.

      [...]

      In the meantime, Windows becomes less safe by the minute for corporations and governments hoping to keep private data private. I’m certain that Red Hat, SUSE, and even Ubuntu are taking advantage.

    • Norway needs more digital border surveillance, spy agency says
    • Commission proposal on new data protection rules to boost EU Digital Single Market supported by Justice Ministers

      On the 16 of June, Ministers in the Justice Council have sealed a general approach on the Commission proposal on the Data Protection Regulation. Modern, harmonised data protection rules will contribute to making Europe fit for the digital age and are a step forward to the EU Digital Single Market. Trilogue negotiations with the Parliament and the Council will start in June; the shared ambition is to reach a final agreement by the end of 2015.

    • French Surveillance Bill: LQDN Files an Amicus Brief to the Constitutional Court

      La Quadrature du Net, French Data Network and the FDN Federation are publishing an essay to accompany their legal action before the French Constitutional Court against the French Surveillance Bill. The three associations, opposed to the French Surveillance Bill since its introduction in the Council of Ministers on 19 March, continue their mobilisation against this unjust law, in spite of its adoption in the National Assembly1 and the Senate2. Citizens are invited to support this approach by sharing and commenting on this essay by Thursday 7am to bring their thoughts or suggestions for improvement before sending it to the Constitutional Council.

    • Secure Server Deployments in Hostile Territory

      Would you change what you said on the phone, if you knew someone malicious was listening? Whether or not you view the NSA as malicious, I imagine that after reading the NSA coverage on Linux Journal, some of you found yourselves modifying your behavior. The same thing happened to me when I started deploying servers into a public cloud (EC2 in my case).

      Although I always have tried to build secure environments, EC2 presents a number of additional challenges both to your fault-tolerance systems and your overall security. Deploying a server on EC2 is like dropping it out of a helicopter behind enemy lines without so much as an IP address.

      In this article, I discuss some of the techniques I use to secure servers when they are in hostile territory. Although some of these techniques are specific to EC2, most are adaptable to just about any environment.

  • Civil Rights

    • France proposes empty ISDS reforms

      The French proposal would grant for-profit arbitrators, working in a system that creates perverse incentives, vast discretionary powers. This creates a serious risk on expansionist interpretations. Foreign investors would be able to use this biased system to challenge governments. As it is practically impossible to withdraw from trade agreements, the EU would be locked in.

  • Internet/Net Neutrality

    • BT aims to shut down traditional phone network to help it battle US tech giants

      BT is calling on the communications watchdog to let it scrap the traditional telephone network, as part of a campaign to loosen regulations that it says will help telecoms companies compete better with US internet companies such as Apple and Facebook.

      The telecoms giant is planning to move all domestic and business customers to internet-based voice calls within a decade, but under current Ofcom rules must continue to provide a traditional phone service.

    • Major internet providers slowing traffic speeds for thousands across US

      Study finds significant degradations of networks for five largest ISPs, including AT&T and Time Warner, representing 75% of all wireline households in US

  • Intellectual Monopolies

    • Copyrights

      • Cox Wants Rightscorp’s Piracy Tracking Source Code

        Cox Communications, one of the largest Internet providers in the United States, has asked the court to order anti-piracy firm Rightscorp to hand over its tracking source code. The ISP describes the company’s settlement scheme as extortion and hopes to punch a hole in its evidence gathering techniques.

06.25.15

An Estimated 1,000 EPO Staff in Munich Demonstrated Against EPO Management Yesterday Afternoon

Posted in Europe, Patents at 7:01 am by Dr. Roy Schestowitz

Summary: Earliest coverage of yesterday’s protest against EPO corruption and abuses

THE EPOlike Microsoft — spies on people for business reasons, not for security reasons. Staff of the EPO decided to protest again, as we wrote earlier this week, and Microsoft Florian was there to document it.

Florian Müller, who used to lobby against software patents before defecting (Microsoft and other companies paid him for this), was there at the scene to cover the protest. “Yesterday,” he wrote early this morning, “the Staff Union of the European Patent Office (SUEPO) held a demonstration in front of the EPO’s main building in Munich. While there have already been various other SUEPO demonstrations in Munich, a couple of which I reported on, yesterday’s protest had a new (though not exclusive) focus: surveillance by means of hidden cameras and keyloggers. Participants in the demonstration carried signs showing surveillance cameras…”

There is an estimate of the number of staff in attendance. “It appears credible to me,” he said, that “approximately 1,000 EPO employees participated — a fairly high percentage of all Munich-based EPO staff.”

There are some photos there to prove it (without people’s faces, obviously for their own protection, knowing Benoît Battistelli’s modus operandi).

Separately, the London-based patent lawyers’ blog IP Kat warns us of the threat of UPC looming over the UK:

But first, a digression, which may be of more general interest than the specifics of the particular consultation. The IPKat, ever eager to seek news for his dear readers, took the opportunity to ask whether there was any truth in the speculation that has appeared repeatedly in comments on this blog and elsewhere that the current UK Government might delay ratification of the UPC Agreement until after the UK Referendum on membership of the EU, which is not scheduled until 2017. The Intellectual Property Office, as it turns out, has an answer prepared for this question, and the IPKat is delighted to share it with you.

The horrible UPC (making patents even worse and more wide-reaching) is trying to creep into Europe as quickly as possible (while the public is mostly asleep). The EPO is largely responsible for this and more scrutiny is needed. It’s similar to those awful ‘trade’ agreements, but awareness among the public is severely lacking.

“Staff at the European Patent Office went on strike accusing the organization of corruption: specifically, stretching the standards for patents in order to make more money.

“One of the ways that the EPO has done this is by issuing software patents in defiance of the treaty that set it up.”

Richard Stallman

Microsoft Windows So Insecure That Even Fonts Are Remotely Exploitable

Posted in Microsoft, Security, Windows at 5:28 am by Dr. Roy Schestowitz

Turning the alphabet into a security nightmare

Alphabet

Summary: Windows userbase is once again under serious threat and high risk because something as simple as fonts (rendering of text/pixels on the screen) isn’t done securely in Windows

THERE IS plenty evidence which shows that Microsoft is not interested in security, maybe because there are commitments to the NSA (the motivations are hard to reason about, but Microsoft’s reluctant to patch known holes is easily demonstrable).

Now we are being reminded that even fonts are a security risk in Windows. Yes, Microsoft continues to put users under remote execution threat because of fonts. As the British media put it:

Get patching: Google Project Zero hacker Mateusz Jurczyk has dropped 15 remote code execution vulnerabilities, including a single devastating hack against Adobe Reader and Windows he reckons beats all exploit defences.

The accomplished offensive security researcher (@j00ru) presented findings at the Recon security conference this month under the title One font vulnerability to rule them all: A story of cross-software ownage, shared codebases and advanced exploitation [PDF ] without much fanfare and published a video demonstration of the exploit overnight.

As one commenter (found by Robert Pogson) put it, “Adobe (and I guess MS as well) put font handling in the kernel from NT 4.0 to gain speed at the expense of having privileged-based protection, and against Dave Cutler’s original micro kernel plans. What could possibly go wrong?”

Proprietary software is so bad that even fonts are a huge risk. This isn’t the first such incident. It serves also as a reminder for GNU/Linux users because some users continues to install proprietary software from Adobe, despite Free/libre alternatives being equally potent.

To quote the part which shows why Windows makes things even worse: “The nastiest vulnerabilities for 32-bit (CVE-2015-3052) and 64-bit (CVE-2015-0093) systems exist in the Adobe Type Manager Font Driver (ATMFD.dll) module which has supported Type 1 and Type 2 fonts in the Windows kernel since Windows NT 4.0.”

“Our products just aren’t engineered for security.”

Brian Valentine, Microsoft executive

Microsoft is ‘Buying’ the Media Ahead of Vista 10 Launch

Posted in Microsoft at 5:13 am by Dr. Roy Schestowitz

Ghostwriting and PR disguised as ‘news’

Typewriting machine

Summary: Signs serve to indicate that Microsoft is already tightening its grip on technology news sites, ensuring that they give Microsoft disproportionate levels of coverage

“Welcome to the Microsoft Slashdot,” wrote a reader to us, alluding to the recent bias (more extreme than before) of that once-upon-a-time-decent news site. This reader is obviously concerned about Slashdot AstroTurfing, especially after what we saw recently, in part because of Microsoft Nick, who had joined as "Senior Editor".

We are already seeing puff pieces about Vista 10, basically Microsoft marketing framed as ‘news’. Microsoft AstroTurfing must have officially begun for Windows, for several sites such as Ars Technica UK (launched with aid from Microsoft ads, conditional upon them appearing in every page and editors thus unable to fearlessly criticise Microsoft), Slashdot, and The Register are truly stuffed.

“Microsoft is now trying to save its biggest cash cow by making Android essentially a Microsoft Office platform.”“Currently on the Slashdot front page,” wrote the reader, “9 mentions of Microsoft and 11 mentions of Windows. They’re getting almost as bad as the Register and this (arstechnica.co.uk) shower. It’s all fake adverts being pushed by a Microsoft still desperately trying to be relevant. [At] arstechnica.co.uk 8 mentions of Windows and 4 mentions of Microsoft…”

Microsoft is a company that shrinks (with layoffs), but it doesn’t mean it can no longer control the media through its extensive network of unethical PR agencies (Microsoft has copywriters). Over time Microsoft may be less able to bribe officials, journalists and hire/commission assault teams (euphemistically called "compete teams" because they are inherently anti-competitive). It’s going to be increasingly hard or challenging because the budget is smaller. Microsoft fired many of its marketing staff last year. Nevertheless, we need to keep watching. Microsoft is a master of manipulation of the media. It has decades of experience and it has no ethical constraints, as we have demonstrated over the years.

Microsoft is now trying to save its biggest cash cow by making Android essentially a Office Microsoft platform. Data is being transmitted to Microsoft, but does anyone care? Even Linux sites carry water for Microsoft right now (regarding Android), not just Microsoft media moles (former staff) like Sarah Perez at AOL (seeding further coverage). Don’t think that Microsoft isn’t playing dirty games behind the scenes to make it so.

“Working behind the scenes to orchestrate “independent” praise of our technology, and damnation of the enemy’s, is a key evangelism function during the Slog.”

Microsoft, internal document [PDF]

DockerCon 2015 Infiltrated by Microsoft

Posted in Deception, GNU/Linux, Microsoft at 4:48 am by Dr. Roy Schestowitz

“I’ve killed at least two Mac conferences. [...] by injecting Microsoft content into the conference, the conference got shut down. The guy who ran it said, why am I doing this?”

Microsoft's chief evangelist

Summary: DockerCon gives room to Microsoft propagandists who want to divert the audience’s attention from secure GNU/Linux focus to proprietary Windows with back doors and surveillance

DOCKER rapidly grows in terms of adoption (and hype). It is Free/libre software and it is predominantly a GNU/Linux technology, like much of the whole container phenomenon. This is why Microsoft cannot just leave it alone (read: tolerate it).

Days ago we saw two misleading articles from Matt Weinberger about the Russinovich spiel, pretending that Microsoft and GNU/Linux can now sing Kumbaya. “Microsoft loves Linux” pins are now being distributed, according to a photo from this new article which says “Microsoft has doubled down on its support for Docker, further integrating the software container tech with Azure and Visual Studio Online and demoing the first-ever containerized application spanning both Windows and Linux systems.”

Proprietary software is the last thing Docker needs. Docker staff needs to learn to say “no”, having witnessed what happens to just about every company that liaises with Microsoft (even charities like OLPC). A lot of Microsoft proxies like ‘Open Tech’, CodePlex and others have virtually become non-existent, but the Trojan horse strategy has not completely failed yet. It just keeps evolving.

“To drive the point home,” wrote Neil McAllister, “there were plenty of free T-shirts available at the Microsoft booth on the subject of uniting Windows and Linux via Docker. There were even buttons with the catchphrase that Microsoft CEO Satya Nadella coined in November, “Microsoft ♥ Linux.””

For those who actually believe that Microsoft has changed its colours, here are just some recent doings (of Nadella) which ought to remind us that Microsoft actually hates GNU/Linux:

What next after “Microsoft ♥ Linux” PR? “UEFI ♥ Linux”? “SCO ♥ Linux”? “Novell ♥ Red Hat”? The bigger the lie, the more confusing and provocative it becomes. Perhaps provocation really is the goal (see Microsoft’s quote at the top of this article).

Microsoft loves Linux
Photo credit: Neil McAllister

06.24.15

Links 25/6/2015: Docker Focus, NVIDIA Opening Slightly

Posted in News Roundup at 6:27 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Different Types of Open Source End Users

    The use of open source software has become more and more commonplace as the technological world advances. It powers millions of devices many of which we depend on every single day. In fact this very web page you are reading this post on is powered by bits of open source code.

    Software would be useless if there were not people there to use it and there are many different types of people who use open source software every day.

  • Arno, the first open source platform for NFV

    The OPNFV Project, a carrier-grade, integrated, open source platform for accelerating the introduction of new Network Functions Virtualization (NFV) products and services. We recently issued our first community-led software release, OPNFV Arno. This foundational release is intended for anyone exploring NFV deployments, developing Virtual Network Functions (VNF) applications, or interested in NFV performance and use case-based testing. With developers in mind, Arno provides an initial build of the NFV Infrastructure (NFVI) and Virtual Infrastructure Manager (VIM) components of the ETSI NFV architecture.

  • Facebook open-sources Nuclide source code for Atom
  • Facebook Open Sources Nuclide, the Company’s Internal Code Editor
  • Facebook Nuclide Is Now Open Source
  • Facebook open-sources IDE based on GitHub Atom

    Facebook has begun opening up source code for its Nuclide IDE, which is designed to offer a unified experience for Web and native mobile development.

  • Events

  • SaaS/Big Data

    • OpenStack Cinder: Block storage on the open-source cloud platform

      The OpenStack platform is an open-source collaboration to develop a private cloud ecosystem, delivering IT services at web scale.

      OpenStack is divided into a number of discrete projects, each with a code name with parallels to the purpose of the project itself.

  • Education

    • 8 open source platforms for IT consideration

      Usually, the higher-ed industry has a reputation as being one of the slowest adopters of new technology. But when it comes to open source software (OSS), campus IT departments are ahead of other industry and consumer tech adoption curves, says Scott Wilson, service manager of OSS Watch at the University of Oxford.

      “On the face of it, higher education has been relatively quick to realize the benefits, notes Wilson. “Over 50 percent of higher education institutions use open source, both on the server and on the desktop. And one of the great open source success stories in higher education is the Moodle Virtual Learning Environment (VLE).”

  • Funding

    • Massive open source email & collaboration platform Roundcube beats Indiegogo funding goal

      Simply put, Roundcube is the unsung work horse of web mail.

      But a decade is an eternity in technology. When Roundcube started, mobile devices were large, clunky affairs used by the few. Today they are the most commonly used communication device. Roundcube Next is today’s answer to that radical change. Instead of once more embarking alone on that ten year journey, Roundcube Next is about building a strong, healthy and diverse Open Source community to achieve that task within 12 to 18 months.

Leftovers

  • [OT] Manchester Storm reform and replace Hull in Elite League

    Manchester Storm are to reform and make a return to ice hockey’s Elite League next season.

    The will replace Hull Stingrays in the league following their liquidation.

  • No joke: Iceland’s Pirate Party surges into first place in the polls

    Iceland has long been one of the more right-leaning Nordic countries. In contrast to Denmark, Finland, Norway, and Sweden, which all have a long tradition of electing Social Democratic governments, Iceland’s parliament has been dominated by right-of-center parties for all but four years since World War II. The only break in that streak came in 2009, when the left won for the first time ever—and elected the world’s first openly gay head of state. The unusual result came about because the global financial meltdown hit Iceland with particular ferocity, but tradition seemingly reasserted itself four years later when the right-leaning Independence and Progressive parties regained power in a landslide.

  • Defence/Police/Secrecy/Aggression

    • GCHQ documents raise fresh questions over UK complicity in US drone strikes

      British intelligence agency GCHQ is facing fresh calls to reveal the extent of its involvement in the US targeted killing programme after details of a fatal drone strike in Yemen were included in a top secret memo circulated to agency staff.

      A leading barrister asked by the Guardian to review a number of classified GCHQ documents said they raised questions about British complicity in US strikes outside recognised war zones and demonstrated the need for the government to come clean about the UK’s role.

      The documents, provided to the Guardian by NSA whistleblower Edward Snowden and reported in partnership with the New York Times, discuss how a joint US, UK and Australian programme codenamed Overhead supported the strike in Yemen in 2012.

      The files also show GCHQ and Overhead developed their ability to track the location of individuals – essential for the targeted killing programme – in both Yemen and Pakistan. The legality of the US’s lethal operations in both countries has been questioned by international lawyers and human rights groups.

    • WaPo: Don’t Say ‘Terrorist’ About ‘White People Like Ourselves’

      Corporate media are demonstrably reluctant to use the word “terrorist” with regards to Charleston shooting suspect Dylann Roof–even though the massacre would seem to meet the legal definition of terrorism, as violent crimes that “appear to be intended…to intimidate or coerce a civilian population.”

      Generally, news outlets don’t explain why they aren’t calling Roof a terrorist suspect; they just rarely use the word. But the Washington Post‘s Philip Bump gave it a shot in a piece headlined “Why We Shouldn’t Call Dylann Roof a Terrorist” (6/19/15), and his rationale is worth taking a look at.

    • How One Outlet Covered the Charleston Massacre Right

      Yet there was at least one news item that ran the day after the shooting that was not afraid to refer to it as a terrorist attack: “US State Senator Killed by Terrorist With White Supremacist Sympathies, 8 Others Dead,” reads the headline of a news item that appeared on Sahara Reporters, a New York City-based news website that primarily covers government corruption in Africa, with a particular focus on Nigeria.

      The Sahara Reporters piece uses the word “terrorist” six times to describe Roof and his alleged action, including in the headline, the subhead and a photo caption. The words “mental illness,” “troubled” and “loner” do not appear — in fact, no speculation whatsoever is made regarding Roof’s mental state or stability. Instead, South Carolina’s “known hate groups” are mentioned to provide context for Roof’s alleged actions, and Roof’s white supremacist activities and the historic allusions made by the patches on his jacket are front and center in the piece. And the massacre is clearly contextualized as occurring at “a time where the persecution of black ethnic minorities in the United States has been making world headlines.”

    • For Media Factcheckers, It’s ‘Mostly False’ to Say Mass Violence Is More Frequent in US

      In theory, factchecking is one of the most important functions of journalism. In practice, systematic efforts by corporate media to “factcheck” political statements are often worse than useless.

      Take PolitiFact, a project of the Tampa Bay Tribune, and its recent offering “Is Barack Obama Correct That Mass Killings Don’t Happen in Other Countries?”

  • Environment/Energy/Wildlife

    • Netherlands loses landmark global warming case, ordered to cut emissions

      In a landmark case that may set a very important precedent for other countries around the world, especially within Europe, the Dutch government has been ordered by the courts to cut greenhouse gas emissions by 25 percent.

      The ruling came from a class-action lawsuit that was brought before the Dutch courts by Urgenda in 2012. The case, rather magnificently, was based on human rights laws. Specifically, Urgenda asked the courts to “declare that global warming of more than 2 degrees Celsius will lead to a violation of fundamental human rights worldwide,” and that the Dutch government is “acting unlawfully by not contributing its proportional share to preventing a global warming of more than 2 degrees Celsius.”

    • Royal Navy bomb explosions caused mass whale deaths, report concludes

      Four large bombs exploded underwater by the Royal Navy were to blame for a mass stranding which killed 19 pilot whales on the north coast of Scotland in 2011, government scientists have concluded.

      A long-delayed report released on Wednesday by the Department for Environment Food and Rural Affairs says that the noise from the explosions could have damaged the hearing and navigational abilities of the whales, causing them to beach and die.

  • Finance

  • PR/AstroTurf/Lobbying

    • Coalitions of the willing are latest lobbying trend

      The single-minded groups are popping up on all manner of issues, including to lobby on rules regulating commercial drones that weigh less than 55 pounds, to rewrite the nation’s patent laws and to engage in the big legislative fight over the Export-Import Bank.

      Coalitions offer lobbyists a big advantage by allowing firms to collect combined fees from a number of corporations and interest groups that may not otherwise engage on an issue. For instance, a company may not consider an issue pressing enough on which to spend hundreds of thousands of dollars, but the idea of spending a few thousand dollars — that’s then combined with similarly smaller fees from other coalition members — is more enticing.

    • Scott Walker’s Unprecedented Voucher Expansion

      In crafting the budget, Walker is taking his cues from the American Federation for Children (AFC), a major force for school privatization nationwide. It is funded and chaired by billionaire Betsy DeVos, and pushes its privatization agenda in the states with high-dollar lobbying and attack ads.

  • Censorship

    • Australia’s own Immortan Joe turns off the water, I mean, Internet

      In the documentary Mad Max: Fury Road, we learned how Australia is controlled by a psychotic strongman who believes in traditional gender roles, strict limits on immigration, and social control through imposed scarcity. This is why Tony Abbott, current Prime Minister of Australia, announced his new Internet censorship plan by warning Aussies, “Do not, my friends, become addicted to the Web.”

  • Privacy

    • Is the Council Selling Our Personal Data to Private Companies?

      Finally, no measures were agreed on on the anonymisation of data. Only the pseudonymisation is considered, which is totally insufficient to preserve the anonymity of a person. Pseudonymisation within the processing of personal data is not protection at all and is only another gift for private companies which will allow them to work, with complete impunity, on data whose the origin can be easily found. This gift is re-enforced by the will to authorise profiling person with their explicit agreement. Such an authorisation is necessary but insufficient if there is not a strict framework on the finalities of the profiling. The absence of a regulation of the issue of Safe Harbor in spite of the adoption of the Moraes 2014 report is making the breaches in the protection of personal data every time wider.

    • France in the Era of Mass Surveillance! We must resist!

      It’s a sad day for freedom! French representatives just adopted the French Surveillance Law. As an ironic echo to the recent WikiLeaks revelations about NSA spying on French political authorities, this vote calls for a new type of resistance for citizens.

    • François Hollande holds emergency meeting after WikiLeaks claims US spied on three French presidents

      The French president, François Hollande, is holding an emergency meeting of his country’s defence council after claims that American agents spied on three successive French presidents between 2006 and 2012. According to WikiLeaks documents published late on Tuesday, even the French leaders’ mobile phone conversations were listened to and recorded.

      The leaked US documents, marked “top secret”, were based on phone taps and filed in an NSA document labelled “Espionnage Elysée” (Elysée Spy), according to the newspaper Libération and investigative news website Mediapart. The US was listening to the conversations of centre-right president Jacques Chirac, his successor Nicolas Sarkozy, and the current French leader, Socialist François Hollande, elected in 2012.

    • French president holds emergency meeting over NSA intercepts
    • Revealed: how US tapped phones of three French presidents

      The United States has eavesdropped on at least three French presidents and a whole raft of senior officials and politicians in France for at least six years, according to secret documents obtained by WikiLeaks and revealed here by Mediapart. The top secret reports from America’s National Security Agency (NSA) show that the phones of presidents François Hollande, Nicolas Sarkozy and Jacques Chirac were all tapped. But they also show that the espionage carried out on a supposedly key ally of Washington’s went even further and deeper, and that senior diplomats, top civil servants and politicians also routinely had their phones tapped. The documents seen by Mediapart reveal proof of the spying on the French state that took place from 2006 to 2012 but there is no reason to suggest that this espionage did not start before 2006 and has not continued since. The revelations are certain to spark a major diplomatic row and highlight once again the uncontrolled and aggressive nature of American spying on friends and foes alike, as first revealed by NSA whistleblower Edward Snowden in 2013. Mediapart’s Fabrice Arfi and Jérôme Hourdeaux and Julian Assange of WikiLeaks report.

    • Espionnage Élysée

      Today, 23 June 2015, WikiLeaks began publishing “Espionnage Élysée”, a collection of TOP SECRET intelligence reports and technical documents from the US National Security Agency (NSA) concerning targeting and signals intelligence intercepts of the communications of high-level officials from successive French governments over the last ten years.

    • French president: Obama promises to stop US spying tactics

      Hollande said in a statement that the two spoke by telephone Wednesday after the release of WikiLeaks documents about NSA intercepts of conversations involving Hollande and his two predecessors between 2006 and 2012.

    • US embassy in Paris is ‘home to secret spy nest’

      Reports in France suggest the US spied on French presidents from a secret spy nest on the roof of its embassy in Paris, which stands just a stone’s throw from the Elysée palace.

    • The NSA, and America’s madness

      It’s hard to pretend to be surprised. Since Edward Snowden revealed, in June 2013, the planetary scope of the electronic surveillance and data collection programs carried out by American intelligence agencies, we have gone from surprise to surprise. We discovered, amongst other things, that this mass surveillance went as far as eavesdropping on the German chancellor’s phone conversations. It also enabled Airbus to be spied on by the German secret services on behalf of the American agencies. Nothing, therefore, should surprise us any more. Sooner or later, we were bound to have a confirmation that the French presidents and top-ranking officials were also spied on by the United States. We now have the proof, according to the WikiLeaks documents published, on June 23rd, by the French daily newspaper Libération and and the Mediapart investigative website

      Knowing is one thing, accepting is another. Such practices are obviously unacceptable! Nevertheless, we must not be naive. Intelligence is a crucial tool in the struggle against terrorism. The French parliament has recently approved a far ranging bill to reinforce its interception capabilities. Some provisions of the text have been vividly criticised by civil liberties campaigners, who point out French intelligence services could use them to bypass the right to privacy of French citizens – and even more so, the right to privacy of foreign nationals. In this fight, intelligence services across Europe do need to cooperate with the US, and they have to be able to keep doing so… But only within the framework of the law.

    • Obama reassures France after ‘unacceptable’ NSA spying

      U.S. President Barack Obama reaffirmed in a phone call with his French counterpart Francois Hollande on Wednesday Washington’s commitment to end spying practices deemed “unacceptable” by its allies.

      The presidents’ conversation, announced by Hollande’s office, came after transparency lobby group WikiLeaks revealed on Tuesday that U.S. National Security Agency (NSA) had spied on the last three French presidents.

    • Uniquely Nasty: J. Edgar Hoover’s war on gays

      The directive was stern and uncompromising. In the depths of the Cold War, then-FBI Director J. Edgar Hoover ordered his agents to undertake a new mission: Identify every gay and suspected gay working for the federal government.

      Only Hoover didn’t describe his targets as gays. He called them “sex deviates.”

    • GCHQ’s surveillance of two human rights groups ruled illegal by tribunal

      GCHQ’s covert surveillance of two international human rights groups was illegal, the judicial tribunal responsible for handling complaints against the intelligence services has ruled.

      The UK government monitoring agency retained emails for longer than it should have and violated its own internal procedures, according to a judgment by the investigatory powers tribunal (IPT). But it ruled that the initial interception was lawful in both cases.

    • Spies Hacked Computers Thanks to Sweeping Secret Warrants, Aggressively Stretching U.K. Law

      British spies have received government permission to intensively study software programs for ways to infiltrate and take control of computers. The GCHQ spy agency was vulnerable to legal action for the hacking efforts, known as “reverse engineering,” since such activity could have violated copyright law. But GCHQ sought and obtained a legally questionable warrant from the Foreign Secretary in an attempt to immunize itself from legal liability.

      GCHQ’s reverse engineering targeted a wide range of popular software products for compromise, including online bulletin board systems, commercial encryption software and anti-virus programs. Reverse engineering “is essential in order to be able to exploit such software and prevent detection of our activities,” the electronic spy agency said in a warrant renewal application.

    • GCHQ psychological operations squad targeted Britons for manipulation

      The once-secretive, now-notorious Joint Threat Research Intelligence Group ran its online propaganda and manipulation operations at home as well as abroad.

      JTRIG’s domestic operations used fake accounts to “deter,” “promote distrust” and “discredit” in political discussions on social media, uploaded fake book/magazine articles with “incorrect information,” hacked websites, set up ecommerce sites that were fraudulent operations designed to rip off their adversaries and so on. They relied on psychological research on inspiring “obedience” and “conformity” to inform their work.

    • Controversial GCHQ Unit Engaged in Domestic Law Enforcement, Online Propaganda, Psychology Research

      The spy unit responsible for some of the United Kingdom’s most controversial tactics of surveillance, online propaganda and deceit focuses extensively on traditional law enforcement and domestic activities — even though officials typically justify its activities by emphasizing foreign intelligence and counterterrorism operations.

      Documents published today by The Intercept demonstrate how the Joint Threat Research Intelligence Group (JTRIG), a unit of the signals intelligence agency Government Communications Headquarters (GCHQ), is involved in efforts against political groups it considers “extremist,” Islamist activity in schools, the drug trade, online fraud and financial scams.

    • DoJ’s Gag Order On Reason Has Been Lifted — But The Real Story Is More Outrageous Than We Thought

      Last Friday the folks at Reason confirmed what I suggested on Thursday — that the U.S. Attorney’s Office for the Southern District of New York, after hitting Reason with a federal grand jury subpoena to unmask anonymous hyperbolic commenters, secured a gag order that prevented them from writing about it.

      Nick Gillespie and Matt Welch describe how it all went down. Read it.

      So, the truth is out — and it’s more outrageous than you thought, even more outrageous than it appears at first glance.

      What, you might ask, could be more outrageous than the United States Department of Justice issuing a questionable subpoena targeting speech protected by the First Amendment, and then abusing the courts to prohibit journalists from writing about it?

      The answer lies in the everyday arrogance of unchecked power.

  • Civil Rights

  • Internet/Net Neutrality

    • Net Neutrality in Europe in danger

      Net neutrality is the principle that Internet Service Providers should treat all data on the Internet equally. It’s about minimising the restrictions on which parts of the Internet you can access. And it’s about allowing startups to compete with big Internet firms and supporting innovation in the digital economy.

    • Letter to S&D and ALDE MEPs: Stand Up for Net Neutrality

      Negotiations on Net Neutrality between the European Parliament, the European Commission and the Council of the European Union (trialogue) started on 11 March in order to settle an agreement on the final regulation. Political groups send few representatives to the trialogue but political groups do not necessarily adopt it and compromise with a text that does not respect main democratic values. Citizens shall urgently call all S&D and ALDE Members of European Parliament (MEPs), who are about to decide, in the next days, of their group positions, and urge them to resist against a text that would infringe fundamental rights and liberties of any European citizen. La Quadrature has sent MEPs the following letter.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts