EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

08.10.13

Entryism at Work: Microsoft Nick Grooms Bill Gates at Slashdot

Posted in Bill Gates, Deception, Marketing, Microsoft at 12:59 am by Dr. Roy Schestowitz

Seeding the PR at the wrong places to drive away longtime readers

Slashdot

Summary: How the Gates propaganda machine has spread as far as Slashdot, which was originally known and even renowned for its geeks-oriented focus

Microsoft moles and boosters are being used for PR even in less expected sites, such as Slashdot. As is often the case with those people, they serve a dual role of grooming Microsoft and also the Gates Foundation, which they try to charitywash Microsoft with.

The Microsoft plant in Slashdot [1, 2] is at it again this week. “Microsoft Nick is active promoting His Billness,” told us iophk, basing his statement on the alias seen here (he uses known aliases now). It’s always just PR, never any reporting. He did the same thing for years in a site called “Microsoft Watch” (which was a misnomer because it was nonstop Microsoft promotion after he had taken over).

“The site is now run by people who deem it their duty to make Microsoft stronger.”How about Microsoft Nick doing some real reporting for a change? Maybe he can comment on the money Gates was funnelling to ALEC [1, 2], which is now denying global warming (Gates does it yet again) and attacking the working class. No, that would not be a good story, would it? It’s not Nick’s job. He may think he is a journalist, but his profession is more like a mole for Microsoft in various sites, tugging along the official party line.

What can one do to restore Slashdot, bringing it back to its roots? There is not much that can be done, as it increasingly looks like entryism. The site is now run by people who deem it their duty to make Microsoft stronger.

Those who favour FOSS-oriented sites are running low on options, as good sites are shutting down or becoming less active (we covered several examples recently), leaving a lot more room for fake journalism or marketing.

Microsoft Enters the Bricks Business and Beams Users’ Passwords

Posted in Microsoft, Security, Windows at 12:44 am by Dr. Roy Schestowitz

Primitive, bogus security

Security

Summary: Microsoft’s platforms for phones are just about as bad as a phone platform can get

KIN and SideKick were horrible, not to mention Windows Mobile. But Microsoft can make things worse,

The NSA’s big ally (perhaps biggest ally) Microsoft is proving its faithfulness again, not just by providing Windows back doors and real-time audio/video Skype access but also by making self-bricking phones (a back door lets it be converted into a listening device and more).

According to this, Windows phones now brick themselves:

BLOG: What’s With The Bricked Windows Phones?

There’s no sense in beating around the bush: the Windows Phone is having a hard time of it. It’s certainly not a bad OS by any means; it is, after all, still around. But there’s no denying that it’s having a very difficult time gaining any traction in the mobile market, which is dominated by iOS and Android.

Here is where it gets worse, maybe by design:

Microsoft is warning users that their Windows Phone 8 and Windows Phone 7.8 devices could be easily tricked into revealing login credentials for corporate Wi-Fi access points secured with WPA2 protection. The vulnerability appears to build on a known security weakness in a Microsoft authentication protocol as well as the way Windows Phones connect to WPA2 networks.

This type of thing should get Microsoft banned, but the CIA/NSA would treat it like a feature. According to new reports, the CIA is now preparing TV propaganda with which to advertise and defend its abduction of wireless networks around the world (no, not just Google) and it is possible that flaws like the above are not an accident. Back doors in phones, for example, are now part of the specification/requirements.

“Nokia should know how it’s done because many of its phones have back doors.”By the way, the ongoing death of Nokia is not going to be mitigated following the reports above. There are “possibly as many as 8,500 more layoffs, according to reports.”

Maybe they can find a new job. The NSA is recruiting; not systems administrators, just people who code to spy, crack, and infiltrate. Nokia should know how it’s done because many of its phones have back doors.

08.09.13

Links 9/8/2013: Linux/Android Share in Tablets Soars

Posted in News Roundup at 4:22 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • KDE Konnect: control your KDE devices from your phone

        Today we are surrounded by ‘smart’ devices all around us – smartphones, tablets, TVs, PCs and many more. These devices naturally don’t interact with each other. There are some device specific apps developed by some companies but those work within the device spectrum of that company, for example Samsung All Share comes only for Samsung Android devices and work only with Samsung smart TVs.

  • Distributions

    • New Releases

      • Maintenance Release: PCLinuxOS-KDE-FullMonty 2013.08

        PCLinuxOS KDE FullMonty 2013.08 (32/64 bit) is now available for download.

      • Porteus 2.1 final and Porteus Kiosk Edition 2.1 are out!

        The Porteus Community is pleased to announce the distribution release of Porteus 2.1 (Standard Desktop Edition), as well as Porteus Kiosk Edition 2.1! Major additions since our 2.0 release include restructuring our layout to have standalone iso’s for five desktop environments (KDE4, RazorQT, Mate, Xfce and LXDE) and adding optional prepackaged modules for Google-Chrome, Opera, Libreoffice, Abiword, print/scan support and development software, all available through a new download interface that allows users to build and download customized ISO’s at http://build.porteus.org.

    • Debian Family

      • 20 Years of Debian GNU/Linux

        Debian GNU/Linux celebrates its 20th birthday anniversary this month. I have been using Debian GNU/Linux only a few years and I regret not having known Debian earlier. The growth, vitality, and quality of the project has been amazing. With Debian GNU/Linux I have been able to do a lot with a tiny investment in IT. It is a force-multiplier for good Free Software.

      • Derivatives

        • Canonical/Ubuntu

          • Ubuntu Edge Passes $9 Million, Smashes Crowd-Funding Record

            Over $9 million has now been pledged to the Ubuntu Edge campaign on IndieGoGo, helping it smash yet another crowd-funding record.

            This figure, whilst $23 million short of the required $32 million goal, makes Ubuntu Edge the second largest crowd-funding campaign in history. It shunts the Ouya games console, which raised $8.5 million over a 30 day period, into 3rd place.

          • Canonical Pushes Linux to the Edge With Bloomberg Backing

            The goal is to raise $32 million in 30 days to build 40,000 Ubuntu Edge next-generation smartphones.

          • Canonical lowers Edge pricing, launches app contest

            Canonical dropped the Indiegogo price for its Ubuntu Edge phone from $775 to $695. Meanwhile, the Ubuntu project launched an Ubuntu App Showdown contest for the best Ubuntu for Phones app that can be developed between now and Sept. 15.

          • Flavours and Variants

            • Mysterious countdown appears on elementary OS website

              It would appear that either yesterday, or the day before yesterday, a mysterious countdown was added to the elementary OS website. Or rather, the whole website was replaced by a countdown. So far, I haven’t found any definite indications of what exactly we’re counting down to.

  • Devices/Embedded

Free Software/Open Source

Leftovers

  • Some Xerox Scanners Can Alter Documents by Accident

    On the scale of things too horrible to contemplate, “document-altering scanner” is right up there with “flesh-eating bacteria.” This week Xerox (XRX) acknowledged that some of its scanners can, with certain settings, change the numbers in scanned documents. On Wednesday it announced a fix for the problem, which a spokesman called “really an anomaly.”

    The problem came to light when David Kriesel, a German computer scientist, scanned a construction plan on a Xerox machine and noticed that the document that came out wasn’t identical to the one that went in: Numbers for some room measurements had changed. Kriesel alerted Xerox, wrote about the problem on his blog and began to investigate how widespread the problem is.

  • Defence/Police/Secrecy/Aggression

    • Drone Warfare Makes Killing a Spectator Sport

      Oh, the serious news! I read it with ever-fresh incredulity. It’s written for gamers. It reduces us to gamers as it updates us on the latest bends and twists in the geopolitical scene. We’re still playing War on Terror, the aim of which is to kill as many insurgents as possible; when they’re all dead, we win (apparently). The trick is to avoid inflaming the locals, who then transition out of passive irrelevance and join the insurgency. They get inflamed when we kill civilians, such as their children.

    • Redefining Security and Intelligence in an independent Scotland

      Military and intelligence stories have been all over the news recently. Be it indiscriminate eavesdropping programs, WMD infrastructure, or our impending doom at the hands of terrorists if we vote “yes”, there is a common denominator in the statements of the high heid yins: these are issue for the big boys, the role set out for the rest of us is to cower in fear and not to hurt our wee brains trying to understand. In the independence debate, we are warned that an independent Scotland is going to be overrun by terrorists, disastrously cyber-attacked, or run out of money trying to prevent these disasters from happening. The catalyst of the recent wave of scare stories is a report by a bunch of military and intelligence insiders, the crowd treated in the mainstream media as holding an exclusive grasp of the serious issue of our national security. But this deference is exactly the type of elitist approach that led us into the intelligence SNAFU we are in at the moment – with the agencies at odds with the democratic process and public control. The independence debate is a chance for us to crack open the debate on intelligence and the military, and imagine what a security apparatus actually subservient to democracy might look like.

  • Transparency Reporting

  • Finance

    • ‘We Won’t Pay’: Greek activists reconnect power to poverty-stricken homes

      With a Eurozone record of 27 percent of Greeks unemployed, people are taking a pro-active approach to the crisis. Activists from the ‘We Won’t Pay’ movement, which boasts 10,000 members, are illegally reconnecting power to hundreds of homes.

      Tough austerity measures have left many people in Greece unable to pay their electricity bills. The ‘We Don’t Pay’ movement which has over 10,000 members helps many of those by illegally reconnecting power to their homes, despite legal action against them.

    • Greece becoming new Kosovo as youth jobless hits 65pc

      Greek youth unemployment has soared to a record 64.9pc as the country’s downward spiral continues almost unchecked.

    • Watch as plutocrats mold us into a New America, a nation more pleasing to their sight

      Increasing wealth creates positive feedback, much like a hurricane moving over warm water. A more powerful 1% allows them to command the political and economic high ground of America, so that they can gain further wealth — and shape a New America more to their liking. This process has run for several generations; now the results are plain to see — for all that wish to look. Today we have first of three tales of New America.

    • Greg Palast: Why Are the Greek People Agreeing to Their Own Destruction?

      In his career as an investigative journalist, economist, and bestselling author – Vultures’ Picnic, Billionaires and Ballot Bandits, The Best Democracy Money Can Buy – Greg Palast has not been afraid to tackle some of the most powerful names in politics and finance. From uncovering Katherine Harris’ purge of African-American voters from Florida’s voter rolls in the year 2000 to revealing the truth behind the “assistance” provided by the International Monetary Fund and the World Bank to ailing economies, Palast has not held back in revealing the corruption and criminal actions of the wealthy and powerful. In a recent interview on Dialogos Radio, Palast turned his attention to Greece and to the austerity policies that have been imposed on the country by the IMF, the European Union, and the European Central Bank.

  • Censorship

    • Microsoft’s Bing Removes Several Hundred Thousand “Pirate” Search Results

      Over the past month copyright holders and Google have clashed over infringing search results and how they should be dealt with. Due to its smaller market share Microsoft’s Bing has rarely been mentioned, but the company informs TorrentFreak that they also remove hundreds of thousands of infringing URLs each month. Interestingly enough, Microsoft itself is one of the most active senders of DMCA notices to Bing.

    • Pirate Party Reports IT Minister to the Police for Copyright Infringement

      As the crackdown on copyright infringement in Sweden continues, the local Pirate Party has today held up a mirror to the politicians who support the tough enforcement regime. Marking the ten-year anniversary of The Pirate Bay, the Pirate Party have reported Sweden’s IT Minister to the police after she was spotted infringing copyright online on a number of occasions.

  • Privacy

  • Civil Rights

    • Feds Instruct Law Enforcement to Cover Up Investigations of Americans

      Agencies of the federal government are sharing the massive database of personal information being obtained by surveillance, and police are being taught how to hide the details from judges and lawyers, a Reuters report reveals.

    • Sen. Feinstein During ‘Shield’ Law Debate: ‘Real’ Journalists Draw Salaries

      I can see this stipulation working against whoever the government feels is worthy of the title “journalist.” News develops. It seldom has a distinct starting point. Of course, if someone is a journalist, it stands to reason that they’re always “planning” to publish their findings. But that might be a lot harder to prove when the government starts slinging subpoenas.

  • Intellectual Monopolies

    • Copyrights

      • Cable and TV Networks Fee Fight Fallout— Who Pays? The Public

        Public Knowledge has a couple of pieces up on the fight between CBS and Time Warner Cable over TWC’s payment for the right to rebroadcast broadcasts and then charge the public link here and link here. CBS has already been amply rewarded through advertising on its over the air broadcasts free use of the public airwaves. But in the current fight, it wants still more money. Congress set this up in 1992 legislation which allowed the networks to charge for retransmission permission of its broadcasts.

Tor Compromised by Microsoft Windows, Not Mozilla Firefox

Posted in Microsoft, Security, Windows at 1:04 pm by Dr. Roy Schestowitz

Tor logo

Summary: Correcting irresponsible press coverage which rather than discourage use of Windows discourages use of Tor and Free software such as Firefox

A lot of Mozilla flaws routinely affect only Windows users, but corporate media is too negligent to point out the real weak links. Windows is just assumed to be a given; it is almost like journalists at corporate media try to reinforce the Microsoft monopoly with all the security holes.

“The Internet as a whole is being compromised by Microsoft yet again (not just botnets and spam).”Firefox is being blamed for what’s essentially a Windows issue that let Tor be compromised. Some try to say that the NSA was not behind it, but an FBI Tor exploit and analysis of IP blocks does suggest that the US government was behind the cracking of Tor, exploiting Windows (which has NSA back doors).

Addressing this Microsoft/NSA issue, one blogger writes: “I like the expression, “Just when you thought it was safe to get back in the water.” I almost used it to open this article, but I didn’t. It would be inaccurate. Nobody in his right mind would consider the Internet waters safe at this junction in time.”

The Internet as a whole is being compromised by Microsoft yet again (not just botnets and spam). Tor with Microsoft sure makes a scary spectacle and a dangerous one for human rights.

Sean Michael Kerner says he foresaw this:

Approximately two and a half years ago, Tor (The Onion Router) Web anonymity project announced that was was going to build its own Web browser, to be known as the Tor Browser.

The Tor network provides a way for users to anonymize their online activities by running data packets through a number of “onion routers” that are servers that relay the user traffic but not the original header information (which indicates the user IP address). Prior to the Tor Browser, what many users did (myself included) was to simply use the Tor Button, which was a Firefox add-on that enabled Tor access on top of Firefox.

The Tor people back in 2011 thought that the Tor Button was a less-than-ideal solution and that building their own browser was a better idea. I wrote a blog post in May of 2011 warning of the risks of that approach and that it could lead to ruin.

I was right.

This is a problem only on Windows though. It is a shame that the press does not properly cover this crucial point. it leaves people more vulnerable to illegal intrusion.

US Government Should Kill Bill’s and Nathan’s Criminal Patent Racket and Pyramid Scheme, Intellectual Ventures

Posted in Bill Gates at 12:51 pm by Dr. Roy Schestowitz

Bill and Nathan

Summary: As patent trolls devour the economy, working secretly to enrich profiteers who run classic pyramid schemes, federal action becomes imperative and it must target the ringleaders, not just the ‘assassins’ down the chain (plaintiffs in the pyramid schemes)

Now that Google ‘donates’ 79 more patents to shield Fog Computing from lawsuits (a bizarre form of marketing that we criticised before) we can assume that Google is worried about patent trolls, not just important leaks that reveal how suicidal it is to store or process data on remote servers.

There is a bipartisan [1, 2] movement against patent trolls and it is being noticed by prominent publications, one of which says: “Conor Friedersdorf of The Atlantic identifies patent reform as one of several policy interventions libertarian-minded voters might embrace to redress certain entrenched inequalities. Assuming GOP elected officials really do embrace patent reform, as seems reasonably likely, one wonders if this reflects a larger willingness to embrace new anti-incumbent policy initiatives or if it merely reflects the fact that Republican lawmakers aren’t as beholden to advocates of software patents as they are to, say, the doctors’ cartel. My guess is that both factors play a role.”

The main problem we have is, it remains unclear whether racketeering operations like Intellectual Ventures will be shut down in the process.

Detkin, one of Nathan’s minions (Nathan, in turn, is a minion of Bill Gates) is trying to lie but fails miserably. As IP Troll Tracker put it, “I read this blog post by Peter Detkin and almost tripped over the dog, I was running so fast towards my Patent Troll Translater™. This type of stuff just begs to be run through, no?

“According to IV, there’s a list of five things you should or should not do when considering patent reform. Which I’m not sure IV is actually considering because if the patent system were ever to be reformed? Hello? You’d be out of a business model. Duh.”

Yes, well, just as terrorists never call themselves terrorists, trolls never admit being trolls. We have accumulated this collection of trolls in our wiki for convenience (far from a complete list and it does not include hybrid trolls like Apple and Microsoft). For those who can’t recall how criminal the enterprise of Bill and Nathan is, here is a fresh reminder from the news:

Shell Company Related To Cowardly Patent Troll, Nathan Myhrvold’s Intellectual Ventures, Forced To Settle Frivolous Lawsuit Against One-Man Business After Law Firm Donates Nearly $200,000 Worth Of Defense

This story will circulate a lot today. I’d like to suggest a more informative and accurate headline than the likely “Lodsys dismisses a lawsuit and donates to charity”.

Let’s cut through four big bullshit points immediately:

“Lodsys” is allegedly one of many fake, meaningless entities created to absorb negativity from Intellectual Ventures’ real business: large-scale patent trolling and extortion of the majority of the tech industry.

Maybe Nathan Myhrvold doesn’t want to admit (to himself?) what his company really does. Or maybe he doesn’t want to tarnish his new reputation as a high-end culinary icon with the people and small businesses his company shakes down and the huge tax he extorts out of one of the world’s biggest industries.

Assigning negative press to “Lodsys” instead of Intellectual Ventures and Myhrvold is exactly what they want the public to do, but it’s dishonest by omission to ignore Intellectual Ventures’ involvement in the Lodsys patents. Bring the fight to their door, not their shell company’s fake office.

[...]

There are no winners in this case. Nothing has changed for the better. If anything, the system has been strengthened and validated.

We’re all losers — except patent trolls like Intellectual Ventures and Nathan Myhrvold, who continue to steal time, money, and willpower from thousands of hard-working people and make the world a worse place, with no repercussions for themselves. Hell, the culinary world thinks Myhrvold’s some sort of genius hero.

I don’t know how anyone in this racket sleeps at night.

Here is what the victim wrote this week:

Lodsys has dismissed the patent infringement lawsuit it filed against my company TMSOFT. The dismissal is with prejudice which means they can never sue my company again for infringing its patents. I did not have to pay any money to Lodsys or sign a license agreement. I also did not sign a confidentially agreement so I’m free to talk about this matter.

Any patent reform or any crackdown on trolls which overlooks Nathan and Bill’s criminal enterprise of patents will be utterly pointless. The whole economy is messed up because of pyramid schemes like these. It is about taxing everyone, looting the nation. The Gates Foundation, an Intellectual Ventures partner, does something similar with patents, trying to dress it up as ‘charity’ (another clever deception campaign). Parasitical elements often establish a method of systematic, non-ending wealth transfer which in no way benefits anyone but a set of plutocrats. There are some analogous scams, but Intellectual Ventures is unique in the area of patents.

Apple Sees Ever-Developing Exodus of Key Apple People as Its Litigation Strategy Fails and Becomes Political Strategy

Posted in Apple, BSD, Patents, UNIX at 12:30 pm by Dr. Roy Schestowitz

Special relationships last even after death

Obama and Jobs

Summary: Nepotism incarnated; Apple now appeals to politicians rather than judges, having lost the technical race to Linux; Apple’s top UNIX guru quits

Apple’s patent chief recently left the company, joining some prominent technical people who left this declining marketing and litigation company. The latest departure is that of Apple’s operating systems asset, who quit. As one article put it, “Hubbard left Apple last month to return to the world of open source UNIX, taking the chief technology officer post at a iXsystems, a company that offers servers and other data center hardware that runs FreeBSD.”

Concurrently, Apple continues pursuing embargo against Android devices. Apple uses the ITC and also litigates against Google through Motorola.

Mr. Pogson said, “When Is Prior Art Not Prior Art? When The US Federal Circuit Ignores It.

Yes, Apple enjoys special treatment again. As Pamela Jones put it, “Apple started the show in this particular tent of the overall smartphone patent wars circus, suing Motorola at the ITC for infringement of various claims of Apple’s ’607 and ’828 patents, which are about touchscreens and multi-touch.”

“Apple keeps trying to cheat and game the system; when its claims are found to be empty it cries to its government and gets its way.”And let’s not forget the recent pardon to Apple from the president of drone assassinations, illegal surveillance and torture. The US government is superseding the law especially for Apple as the Obama administration pushed back against an embargo. Jones had this to say about it: “So, it was a bit like the papal special dispensations of history, where the law said X, but you are let off the hook from having to keep it. That makes Apple’s reported public response particularly offensive, when it said, “Samsung was wrong to abuse the patent system in this way.” Samsung didn’t abuse the patent system. It was, as you will see, exactly the opposite, according to the ITC Opinion. And while the President can do whatever he wishes regarding public policy, the ITC followed the statute, since it has no policy powers. In short, one unavoidably must conclude that if Samsung had been the US company and Apple the Korean one, there would have been no pardon. That’s the bottom line, I’m afraid. As Jamie Love tweeted, “What Froman and USTR will now have to explain is why India and other countries can’t also consider public interest in patent cases.” As I’ll show you, one of the things the ITC considered was public comments warning that changing the terms for FRAND patent owners would make sweeping changes to trade laws, and Korea has already registered its concerns. I’m all for reforming the patent system, as you know, but if you want to reform it, how about making it *more* fair, not less? Playing favorites based on country of origin doesn’t aim for that noble goal. It’s indisputable that this has harmed Samsung, and since the ITC, which examined the facts in detail, found it was the innocent party in this picture, what can be the justification for Apple’s comment?”

The US press and the US government have given Apple special treatment for far too long. The corporate press covers this like it’s a sporting match, not science. Apple keeps trying to cheat and game the system; when its claims are found to be empty it cries to its government and gets its way. One writer for CNN (corporate press) wrote:

Apple and Samsung’s fiercest battle isn’t playing out in the smartphone market.

This is simply not true. Be sure to watch the image they use. Samsung was the one attacked by Apple, it’s not mutual.

More OEMs Turn to Linux-based Platforms Because Dependence on Windows is Killing Them

Posted in GNU/Linux, Google, Steve Ballmer, Windows at 12:15 pm by Dr. Roy Schestowitz

Worn out and defeated

Killing ground

Summary: Acer is the latest large company to officially move away from Microsoft Windows because no OEM — not even Microsoft with its “Surface” disaster — can sell hardware with shoddy software preinstalled

Some new numbers suggest stagnation in the target market of Microsoft, which led Acer, one of the largest OEMs Microsoft works with (see this old Microsoft OEM agreement with Acer), to losses and subsequent exploration of Linux-based alternatives. As Microsoft booster Nancy Gohring put it, citing he employer’s numbers (IDG citing IDC without disclosure again), “Acer the latest to turn to Google after poor Windows sales”:

Acer, the electronics maker that once seemed to be a big Windows 8 booster, is turning its back on Microsoft.

After posting a second quarter loss this week, it said it’s going to aggressively work on selling more Chromebooks and Android devices. According to the Wall Street Journal, Acer’s chairman said he hopes to grow revenue from Google smartphones, tablets and Chromebooks to 10 percent to 12 percent of revenue by the end of this year and to as much as 30 percent next year. He apparently didn’t say exactly how much revenue comes from Google software today, but said Chromebooks made up nearly 3 percent of shipments in the second quarter, according to the Wall Street Journal.

Acer is the latest vendor to shift its weight toward Google products and away from Microsoft. HP and Lenovo, long-time hardware partners of Microsoft, have also started making Chromebooks.

Mr. Pogson says that Acer had been squeezed by Microsoft and it is not the first. As he notes in this earlier post:

When a monopolist pushes an OS at a price above the market on OEMs, they suffer. While the monopolist gets a huge cash-flow, the OEM works for nothing, just a tiny margin. While OEMs take a commission on the price of that other OS, they sell their hardware for next to nothing. OEMs are manufacturers, not salesmen for M$. Do framers work for $0 per hour plus a penny per nail? No.

Christine Hall, another GNU/Linux proponent, says that “The consensus on [Windows] RT is that it’s something of a toy operating system. Some say it’s done nothing but weaken the Windows on tablet brand–as if that’s possible. The smart money crowd is expecting Microsoft to give-up on RT sooner rather than later. Almost everybody says RT isn’t long for this world.”

Microsoft has got nothing that can truly challenge Linux-based operating systems and one GNU/Linux proponent proclaims that “Microsoft Surface is Doomed, Steve Ballmer Should Be Fired” (others say the same after the Surface oversupply fiasco [1, 2, 3]).

Firing Ballmer would not save Microsoft. But it would be a face-saving move, that’s for sure.

08.08.13

Links 8/8/2013: Ubuntu Edge Gets Priced at $695, Bloomberg Backs It

Posted in News Roundup at 6:59 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Open Source Code At Heart of Wall Street Programmer’s Bust

    Programmers and Wall Street haters alike may join together to support a convicted computer programmer from Goldman Sachs after reading the full-throated defense he receives at Vanity Fair by noted financial journalist Michael Lewis.

    [...]

    During the last six weeks of his employment, Aleynikov emailed himself four times the source code he was working with. The files contained open source code, code that the programmer had tweaked and Goldman Sachs proprietary coding. The government claims the programmer sent himself 32 megabytes of code, but it was essentially the same 8 megabytes of code sent four times over. Goldman Sachs’ entire system contains more than one gigabyte of code—so what the Russian took was minuscule in comparison to the whole.

  • Boffin Provides a List of Open Source Audio Recorder Software for Its Readers
  • List of Open Source Email Software Published by Boffin Today
  • Open Source Chat Software Listing Released In SoftwareReviewBoffin.Com
  • Is This Finally the Year of Open Source…in China?

    One of the long-running jokes in the free software world is that this year will finally be the year of open source on the desktop – just like it was last year, and the year before that. Thanks to the astounding rise of Android, people now realise that the desktop is last decade’s platform, and that mobile – smartphones and tablets – are the future. But I’d argue that there is something even more important these, and that is the widespread deployment of open source in China.

  • For The Greater Good

    I often wonder about the motivations of others involved with the open source community, as I did last month. Linux.com reposted an article by Jeremy Kahn titled Open source as a civic duty that answers the question in the best way possible. Open source is not about you, it’s about us, all of us.

  • Open Source Poised for Innovation Explosion

    Open source software is now a common component in most organizations’ IT infrastructure, particularly at the server OS layer where Linux has made significant inroads. Now open source software is becoming more common in other data center realms such as storage, and is poised for significant growth.

  • Open-Source Apache Flex Finally Comes to Linux

    NEWS ANALYSIS: The Flex Framework for rich Internet application development continues its evolution beyond Adobe’s confines as adoption and interest grows.

  • Colosa Partners with OSSCube on Open Source BPM Workflow Solution

    Colosa, which develops the ProcessMaker Open Source Process Management (BPM) and Workflow Suite, has announced a channel partnership with OSSCube aimed at integrating Colosa’s Business BPM platform into enterprise application software environments.

  • Say something to the youth of America about open source

    Selena Deckelmann, a data architect and contributor to PostgreSQL, gave a keynote speech at the Computer Science Teachers Association conference this year called, What open source communities can do for teachers. At the end she encouraged the audience (of teachers) to connect with free and open source developers in their communities to work with them to schedule 15-20 minute talks about their work students.

  • Big IT comes together to open source some IBM hardware and software

    Google, IBM, Mellanox, NVIDIA and Tyan today announced plans to form the OpenPOWER Consortium — an open development alliance based on IBM’s POWER microprocessor architecture. The Consortium intends to build advanced server, networking, storage and GPU-acceleration technology aimed at delivering more choice, control and flexibility to developers of next-generation, hyperscale and cloud data centers.

  • Boffin Provides a List of Open Source Audio Recorder Software for Its Readers
  • Is Apache the Most Important Open Source Project?

    Back in the mists of time – I’m talking about 2000 here – when free software was still viewed by many as a rather exotic idea, I published a book detailing its history up to that point. Naturally, I wrote about Apache (the Web server, not the foundation) there, since even in those early days it was already the sectoral leader. As I pointed out:

  • Solari Update: Open Source Ecology with Marcin Jakubowski

    This Thursday we will post my interview with Marcin Jakubowski. Marcin is a physicist and technologist who became a farmer. After learning the economics of small farming in rural Missouri, Marcin started Open Source Ecology (OSE) to apply open source techniques to small farm and enterprise hardware. His vision of 50 open source blueprints is called the Global Village Construction Set – radically lowering the cost of machines and tools that ensure the success of small farms and communities.

  • How open source is your business / team / developer?
  • Events

  • Web Browsers

    • Chrome

    • Mozilla

      • Firefox 23 Adds Features, Security to Open-Source Browser

        Mozilla adds new social-sharing features, issues 13 security advisories and deploys a mixed-content security capability to limit the risk of mixing unencrypted data with secured content.
        The open-source Mozilla Foundation is out today with its Firefox 23 Web browser for multiple platforms, including Windows, Mac, Linux and Android devices. The new release comes just six weeks after the last major Firefox release, and brings a number of feature and security updates to the browser.

      • Firefox 23 Out: Comes with Social API, Network Monitor

        It’s finally up for grabs! After about one and a half months since its last stable release, Firefox is out in its new avatar, version 23. FF 23 brings in a whole lot of changes, apart from new logo; not precisely a new logo, but a retouched one (last change was made in FF 3.5). Among a myriad of changes are—Social share functionality, Network Monitor (a developer tool), and mixed content blocking (http stuff on https page).

      • Firefox 23 released for Windows, Mac, Linux and Android users

        Mozilla Corporation has released an updated Firefox – Firefox 23 – for its Windows, Mac, Linux, and Android users.

      • Firefox 23 lands with a new logo and mixed content blocking

        Firefox 23, released today, contains the usual mix of security work, standards conformance improvements, and minor bug fixes that we’ve come to expect from the regular browser releases. On top of these, it sports a trio of changes that you might actually notice.

      • End of an era as Firefox bins ‘blink’ tag
      • The blink tag is finally dead, killed off by Firefox 23

        When Mozilla released Firefox 23 on Tuesday, the updated browser put an unofficial end to one of the annoyances of the early Web—the “blink” tag.

        According to the release notes for the new browser, Firefox 23 completely drops support for the “blink” element, preventing browsers from rendering text that, well, blinks.

      • Firefox says goodbye to the blink tag
      • Mozilla and Bango Bring Phone Bill-based Payments to Firefox OS Users

        Bango PLC, a mobile payment and analytics company, has announced the integration of its Bango Payments Platform with Mozilla’s Firefox Marketplace. Among other things, the news represents an important step forward for Mozilla’s Firefox OS strategy, because it will allow users of Firefox OS-based mobile phones to pay for the apps they buy directly from their phone bills.

  • SaaS/Big Data

    • Why open hybrid clouds are the future

      A well-designed hybrid cloud enables organizations to take advantage of the scalability and cost efficiency of a public cloud, and retain the data governance, security and control of a private cloud

    • IBM Hardware Furloughs: Blame Cloud Computing

      IBM will furlough U.S. hardware employees to cut costs in late August and early September 2013. Employees will take a week off with one-third pay, Bloomberg reported. Ouch. The key takeaway: Cloud computing is squeezing IBM’s hardware business, and the value of IBM’s x86 server business could be falling — even more — each quarter.

    • Drilling into Big Data with Apache Drill

      Apache’s Drill goal is striving to do nothing less than answer queries from petabytes of data and trillions of records in less than a second.

  • Databases

  • Oracle/Java/LibreOffice

  • CMS

    • Destination in sight for Flight Centre’s Drupal journey

      Brisbane-headquartered travel agency Flight Centre is undergoing a wholesale transition to the open-source Drupal Web platform for its network of websites, which collectively handle millions of page views per week.

      The shift, away from IBM Web Content Manager has been underway for about 12 months now, according to Flight Centre’s area leader of digital solutions, Jamie Glenn. The travel company is about two-thirds of the way through the transition, Glenn said. The company has around 30 brands and some 60 websites.

  • Business

  • Funding

  • BSD

  • FSF/FSFE/GNU/SFLC

    • First batch of videos from LibrePlanet 2013 published!

      The first round of videos from LibrePlanet 2013 is now available for streaming and downloading. LibrePlanet is an annual conference sponsored and organized by the Free Software Foundation, with LibrePlanet 2013 being the best one yet. All current associate members of the FSF enjoy the perk of being able to attend LibrePlanet without paying an entry fee. This year we set out to make sure LibrePlanet featured fully functioning live video streaming using only free software, and it was a great success. The videos are now available for viewing in VP8/Vorbis, both free media formats, and are hosted on an instance of GNU MediaGoblin, the social media sharing platform which many of you helped support.

    • Go Ahead and Try to Lead a Secure, Private Online Life

      E-mail is the obvious starting point and, if you don’t trust that government agencies won’t get their hands on Microsoft (MSFT) and Google’s (GOOG) master keys, you should set up your own private e-mail service. A good package is Mozilla’s Thunderbird client, combined with the Enigmail security extension and the GNU Privacy Guard (GnuPG). Here’s a guide to setting these up. Follow those instructions and set up a self-hosted e-mail server such as Kolab (not a trivial task), and you’re about as protected as you can get on that front.

  • Public Services/Government

    • Open source as a civic duty

      I occasionally get asked why I spend so much of my free time writing software and giving it away for free. There are a number of reasons for this—I like to build things and I use it as an excuse to practice and improve my skills—but one of the most driving motivators for me is that I see open source contributions as a civic duty, a moral obligation to the rest of the world.

    • Radware adds open source DDoS protection to OpenDaylight Project

      Application delivery and security vendor Radware has contributed an open source distributed denial-of-service protection application to the OpenDaylight Project.

    • The good, the bad and the ugly of NHS open source adoption

      The drive to bring open source technologies into focus for public services and the NHS in particular has been a recurring theme for more than half a decade now.

      VP of Harris Healthcare EMEA Wayne Parslow has been calling on the NHS to “embrace” open platforms, standards and software — but he also heeds that we need to take care.

      Parslow has spoken out on PublicService.co.uk highlighting the general reduction in software license fees that should be possible with any move to open technologies.

      There is also huge potential for the NHS to develop more custom built applications and IT solutions bespoke to its core needs.

    • NHS technology: Being open to open source

      An opinion piece debating the idea of implementing open source NHS technology in today’s healthcare marketplace

    • When open source and drones mix: US Navy better than Army and Air Force

      The US Navy makes more efficient use of open source technology in complex unmanned aircraft than its counterparts in the Army and Air Force.

  • Licensing

    • What motivates free software developers to choose between copyleft and permissive licences?

      Free software licenses can be divided into two broad categories: copyleft licenses (like the GPL), which require derivatives of the software to be licensed under the same terms; and permissive licenses (like the MIT/X11 license), which allow the software to be reused in any project, even closed-source projects. There are variations, of course—the LGPL, for example, is a ‘weak copyleft’, allowing licensed works to be used in closed-source works, but requiring improvements to the work itself to be released under a copyleft license.

  • Openness/Sharing

Leftovers

  • Security

    • Network Security Remains a Blind Spot for Businesses

      Areas of blind spots within the typical enterprise are many, including applications, network traffic, network devices and user activity.

    • Fort Disco: The new brute-force botnet

      Internet security firm Arbor Networks reports that a new botnet, Fort Disco, is made up of over 25,000 Windows PCs and is targeting blog sites and content management systems (CMS)es. Once these are infected, they can then be used to spread the botnet’s malware and to attack other systems.

  • Defence/Police/Secrecy/Aggression

    • Ted Koppel and Terrorism

      OK–so the right way to deal with the threat of terrorism is to announce that the U.S. response to any act of terrorism anywhere will be to attack Iran.

      Who wrote this? Ted Koppel. Either his analysis is evolving, or he believes that threatening to unleash massive unprovoked military attacks on another country is not terrorism.

    • US Officials Cite Deadly Drone Strike in Yemen to Defend NSA Spying Operations

      US drones launched missiles at vehicles carrying four men, alleged to be members of Al Qaeda in the Arabian Peninsula, in Yemen’s Marib province early Tuesday. The attack was the latest development in the global terror alert announced by the Obama administration last Friday. On Monday, the administration indicated that the alleged terror plot was centered in Yemen.

    • Happy Gulf of Tonkin Anniversary (and Thanks, NSA, for Lying about It for 40 Years)!

      So yesterday marked an unhappy anniversary: 49 years since Congress passed the Gulf of Tonkin Resolution authorizing the Vietnam War. (H/T Caleb Brown.)

      LBJ compared the resolution to “grandma’s nightshirt” because it “covered everything.” Like the 2002 Iraq War Resolution, it was worded broadly enough to allow the president to make the final decision about war all by himself—and vaguely enough to allow those who voted for it to deny responsibility for the war they’d authorized.

    • 3 suspected US drones kill 12 militants in Yemen

      Three U.S. drone strikes killed a total of 12 suspected al-Qaida militants Thursday, a Yemeni military official said, raising to eight the number of attacks in less than two weeks as the Arab nation is on high alert against terrorism.

    • US Drone Strikes Kill 11, Yemen Says Plot ‘Foiled’

      According to Yemeni officials, AQAP plotted to take over several cities in southeastern Yemen, including key port towns and the major cities of Hadramaut Province, blowing up pipelines in an attempt to sew confusion.

    • Double-Tap Drone Strikes In Pakistan Killed Rescuers, Report Says

      The Bureau of Investigative Journalism (TBIJ) published a report last week confirming that the Central Intelligence Agency appears to have briefly revived its controversial “double-tap” drone tactic in a Pakistani region in mid-2012.

    • CIA: more Libyan secrets coming out
    • CIA, FBI, and NSA taking steps to limit intelligence leaks
    • Amazon’s CIA cloud renews questions around what is a private cloud
    • Jay Carney on CNN’s big CIA/Benghazi scoop: I don’t know nothing ’bout nothing

      Via Ace, consider this post an apology to our readership. A few days ago I led you to believe that it was somehow important for the White House press corps to ask the press secretary about one of the biggest foreign policy scoops in weeks. That was obviously in error, as I suspected at the time. It wasn’t important; this guy wouldn’t give you a straight answer on what his favorite color is (“I would refer you to my kindergarten finger-paintings on that”), never mind accusations about top-secret CIA activity linked to a major terror attack. Like I said in the earlier post, the press briefing now operates not as the White House’s conduit to the public but rather as an opportunity for the media to show the public that it’s asking worthwhile questions of the president even though there’s not a whisper of a chance that they’ll get useful information from them. The Brits have question time with the prime minister in parliament, we have this travesty. Second look at monarchy?

    • CIA official terms Syria war biggest threat to US security

      The war in Syria poses the greatest threat to US security because of the risk of the government falling and the country becoming a weapons-rich haven for Al Qaeda, according to a CIA official.

    • Did the CIA Just Run an Intel Operation on the Daily Beast?

      Today the Daily Beast reported that an intercepted conference call between “more than 20 al Qaeda operatives” led nearly two dozen U.S. embassies scattered across Southwest Asia and North Africa to shut down over the weekend, a precautionary measure that American officials later extended through August 10. Based on testimony from three unnamed U.S. officials, reporters Eli Lake and Josh Rogin say al Qaeda lieutenants in Nigeria, Uzbekistan, Egypt and Islamic Maghreb discussed vague plans of attack with al Qaeda chief Ayman al-Zawahiri and the terrorist group’s Yemeni leader, Nasser al-Wuhayshi. One of the unnamed officers compared the call to a meeting of the “Legion of Doom.”

    • Syria war biggest threat to US security: CIA official
  • Transparency Reporting

  • Environment/Energy/Wildlife

    • Japan says Fukushima leak worse than thought

      Highly radioactive water from Japan’s crippled Fukushima nuclear plant is pouring out at a rate of 300 tons a day, officials said on Wednesday, as Prime Minister Shinzo Abe ordered the government to step in and help in the clean-up.

  • Finance

    • Group builds tiny homes for local homeless

      Madison resident Betty Ybarra has never owned a home, but that’ll soon change.

      “I was very skeptical this could even happen” she tells NBC15 about her new home she’s currently helping to build through an Occupy Madison project.

      The group is currently building small homes. It isn’t much. Each are about 100 square feet. But it’s enough to help someone get back on their feet.

    • President announces ‘Guaranteed Minimum Income’ for all citizens

      PRESIDENT Nicos Anastasiades on Friday announced the complete reform of social policy based on the principle of securing a Guaranteed Minimum Income for all citizens.

      It should be fully in place by June 2014, he said.

    • WSJ Pretends Public Infrastructure Spending Has No Positive Effect On Economy

      The Wall Street Journal claimed that because private investment typically precedes infrastructure projects, President Obama’s call for increased infrastructure investments is misguided. This position, however, ignores the historically positive effect of public investment on private activity and the nation’s current need for infrastructure improvements.

  • PR/AstroTurf/Lobbying

    • Covering Weiner

      A candidate running well behind in New York’s Democratic mayoral primary is not usually someone national media pay attention to. But when the candidate is a former Congressman now involved in his second sex scandal, the media’s level of interest is considerably greater.

      [...]

      See, it turns out that spending so much time talking about Weiner is important– it gives corporate journalists a way to handicap the 2016 election.

    • Media Matters Founder David Brock Calls On NBC, CNN To Cancel Clinton Specials
    • ALEC’s Chicago Conference Incites Protest, Multiple Arrests

      Six people were arrested Monday when protesters descended upon the Palmer House Hilton in Chicago to push back against the impending visit of the American Legislative Exchange Council (ALEC), whose conservative agenda, activists say, promotes policies and legislation that protects corporate interests and disenfranchises workers and voters.

    • The Conservative Strategy To Defeat Wendy Davis: Sexism

      Erick Erickson doubled down on his sexist attack on Texas State Senator Wendy Davis as “Abortion Barbie,” writing on RedState that the moniker “fits perfectly” and recommending it be used on the campaign trail.

    • NSA Defenders Take to the Airwaves

      The vague-yet-apparently-very-serious intelligence about a possible Al-Qaeda attack became a big issue on the Sunday chat shows–and a chance for supporters of National Security Agency (NSA) surveillance programs to claim that the agency’s controversial tactics are working.

    • ALEC 2013 Agenda Harkens Back to a Bygone Era
    • ALEC at 40: Turning Back the Clock on Prosperity and Progress

      Today, the Center for Media and Democracy (CMD) released a new report: “ALEC at 40: Turning Back the Clock on Prosperity and Progress.” The report identifies and analyzes 466 American Legislative Exchange Council (ALEC) bills introduced in 2013.

    • A Side of Climate Change Denial with Your Coffee? ALEC Dishes up Some Hard to Swallow Spin with the Heartland Institute

      This morning in Chicago hundreds of primarily Republican state legislators are getting more indoctrination against doing anything about climate change from the American Legislative Exchange Council (ALEC).

      This year, ALEC has chosen its long-time partner, the Heartland Institute, to help host the session. Heartland is so extreme on the issue of climate change that it sought to equate people who believe the climate is changing with the Unabomber, through a billboard campaign that featured a mugshot of Ted Kaczynski with the line: “I still believe in Global Warming. Do you?” Heartland lost numerous funders in response to a citizens campaign about the ad last year.

  • Privacy

    • Tox: A Replacement for Skype and Your Privacy?

      In the era of NSA spying and the rise of widespread government monitoring programs or even just the era of Skype, if you’re looking for something new and secure alternatives then Tox Messaging is coming soon for you.

    • Won’t someone think of the students…?

      For privacy campaigners, the issue of big data has been a cause for some time, with a growing trend of governments, businesses and other institutions gathering increasing amounts of data which is then analysed, often without consent from individuals.

      It seems that universities are increasingly thinking about using the vast amount of data collected to analyse how facilities are used and identify students who may fail or drop out of their course. By doing this, universities are acting like they don’t require permission to use the data in this way and are seriously undermining student trust.

    • New Legislation To Make Smart Meters Mandatory For Entire Nation

      There is a sinister agenda underway to forcibly convert every standard electric meter in the U.S. to the “smart” variety under the guise of promoting renewable energy interests.

      [...]

      Landis Gyr recently had a company voicemail message that admitted smart meter technology is part of the NSA’s “PRISM” spying and surveillance program. Since gaining national attention about this admission, Landis Gyr has apparently altered its company voicemail message to omit this indicting information.

    • NSA PRISM: provides direct access to servers of Google, Facebook, Microsoft, Yahoo, Apple and others

      It is just a matter of time before unauthorised, real-time access to information about the behaviours and habits of you and your family at home are put under the microscope via Smart Meter data. Don’t give them the chance to put privacy-violating infrastructure in your home which can at any time be compromised and used against you by any number of parties – foreign and domestic. You have the right to refuse Smart Meters – use it! – See more at: http://stopsmartmeters.org.uk/nsa-prism-provides-direct-access-to-servers-of-google-facebook-microsoft-yahoo-apple-and-others/#sthash.gMYZYr3G.dpuf

    • Open Source Encryption for everybody

      With an increasing importance placed on communication via social media, privacy is imperative now more than ever over the Internet. The NSA scandal has shown that there is a great demand for secure communication on the Internet. However, many people do not try to protect their privacy by any means either because encryption is difficult to implement in social media or simply because they are unaware of the resources out there for encryption. Encryption needs to be made easily available for everyone so that privacy is no longer a concern.

    • NY Times Reveals NSA Searches All Emails In & Out Of The US; Will It Offer Up Its Source For Prosecution?

      Again this is the kind of thing that many people had assumed was going on, but it hadn’t been confirmed until now. Of course, the NSA’s response was not to talk about whether or not this was true, but to claim, yet again, that everything it’s doing is “authorized,” which is a way of deflecting the fact that it’s almost certainly unconstitutional. In this case, the claim is that the NSA isn’t storing these emails, but rather: “temporarily copying and then sifting through the contents of what is apparently most e-mails and other text-based communications that cross the border,” and the whole process only takes “a small number of seconds” before the records are deleted.

    • NSA monitoring Americans’ emails for mentions of terrorists: report
    • No domestic spying? How NSA collects Americans’ cross-border emails
    • NSA captures Americans’ Internet content if it mentions overseas suspects
    • The NSA Is Collecting Emails and Texts for Just Mentioning “Targets”

      There’s a story in the New York Times today that details how the NSA hasn’t just been tracking communications to and from (potential) foreigners of interest—it’s actually tracking all emails and text messages that potentially mention these targets. That dragnet just got a lot wider. This is the actualization of the tired and at one time absurd “oops better not say bomb on email” jokes.

    • The NSA Searches US Citizens’ Cross-Border Email That Mentions Foreign Targets

      It’s difficult to keep track of what the NSA does and doesn’t do, and today, the New York Times piled on. Citing “senior intelligence officials,” the paper is reporting that, under a broad interpretation of the FISA Amendments Act, the NSA intercepts communications of U.S. citizens whose communications cross borders and mention foreign targets. You don’t have to communicate with someone being targeted directly to potentially have the NSA collect and search your email.

    • US taxmen told to hush up shadowy drug squad unit laundering NSA intel

      A manual for America’s taxmen detailing US drug squads’ access to NSA intelligence has emerged – and revealed that the controversial supply of information has been an open secret in government for years.

      Reuters reports that the handbook, which was issued to IRS tax collectors between 2005 and 2006, instructs officials to omit reference to any tip-offs supplied by the US Drug Enforcement Administration’s Special Operations Division, especially from affidavits and court proceedings.

    • U.S. officials say NSA leaks may hamper cyber policy debate

      Weeks of revelations about secret U.S. surveillance programs could stymie progress on negotiations over new laws and regulations meant to beef up the country’s defences against the growing threat of cyber attacks, cyber security experts say.

    • The N.S.A. and Its Targets: Lavabit Shuts Down

      Not every suspension-of-service notice for an e-mail company comes with a link to a legal-defense fund. Ladar Levison, the owner and operator of Lavabit, whose clients, reportedly, have included Edward Snowden, made it sound today as though he could use the help. “I have been forced to make a difficult decision: to become complicit in crimes against the American people or walk away from nearly ten years of hard work by shutting down Lavabit,” Levison wrote in a note posted on his site.

    • Fears over NSA surveillance revelations endanger US cloud computing industry
    • NSA spy leaks: US, Russia to hold talks despite Snowden

      Some members of Mr Snowden’s family are applying for visas to visit him in Russia, his lawyer says.

    • If You’ve Communicated With Someone Outside Of the U.S., the NSA Has Spied On You
    • Cyberscare: Ex-NSA chief calls transparency groups, hackers next terrorists

      The cyberscare, like the redscare or the greenscare of the ’90′s, is already under way. We’ve seen it take root with the fierce federal persecution of Aaron Swartz, the hefty charges and prison sentence facing LulzSec hacktivist Jeremy Hammond and the three-year jail sentence handed down to Andrew “Weev” Auernheimer for pointing out and sharing a vulnerability in AT&T’s user information network. On Tuesday, former NSA chief Michael Hayden put it into words.

    • Carney on email: ‘It’s not being read’
    • New revelations: Germany sends ‘massive amounts’ of phone, email data to NSA

      Germany’s BND intelligence service sends “massive amounts” of intercepts to the NSA daily, according to a report based on Edward Snowden’s leaks. It suggests a tight relationship has been developed between the two agencies – which the BND claims is legal.

      Documents leaked by former NSA contractor Snowden and obtained by Der Spiegel revealed that the 500 million pieces of phone and email communications metadata collected by the NSA in Germany last December were “apparently” provided with the BND’s approval.

    • IRS gets help from DEA and NSA to collect data

      The Internal Revenue Service reportedly received incriminating information on US citizens from the Drug Enforcement Agency, with the assistance of the National Security Agency, before concealing the paper trail from defendants.

      Details of a Drug Enforcement Administration (DEA) program that provides tips to the Internal Revenue Service (IRS) and then advises them to “recreate the investigative trail” were published in a manual used by IRS agents for two years, Reuters revealed.

    • NSA ‘dragnet’ wider than previously suspected, says NYT
    • NSA after superconducting supercomputers

      According to Computerworld such a low-energy system move evolve into an exascale system, which would be about 1,000 faster than today’s petaflop system.

      The US Director of National Intelligence published a notice asking for help to develop superconducting systems. Such a system can offer “an attractive low-power alternative” to current technology.

    • Spygate Will End the NSA and Invasion of Privacy by Our Government

      Thursday an NSA source informed the world of a primary and egregious lie by President Obama about the information collected by the program called PRISM. Obama’s ‘Spygate’ will force the end of the NSA operation, and end the invasion of privacy by our elected officials.

    • Opposition May Bring Change to NSA
    • Tit-for-tat in dispute over NSA data sharing

      Germany’s opposition has condemned aspects of information-sharing between the country’s intelligence services and their US counterparts. Chancellor Angela Merkel’s coalition-leading Christian Democrats have cried foul.

    • The NSA Searches Some Americans’ Emails for Any Mention of Foreign Suspects
    • NSA examines ‘all’ cross-border text-based messages for ‘target’ keywords
    • Former NSA boss compares privacy activists to al Qaida terrorists

      Former NSA chief Michael Hayden, who ran the shady US spying bureaucracy from 1999 to 2009, responded to a question about Edward Snowden by painting privacy activists as terrorists and comparing them to al Qaida.

      “If and when our government grabs Edward Snowden, and brings him back here to the United States for trial, what does this group do?” Hayden asked, reffering to “nihilists, anarchists, activists, Lulzsec, Anonymous, twentysomethings who haven’t talked to the opposite sex in five or six years”.

      He continued: “They may want to come after the US government, but frankly, you know, the dot-mil stuff is about the hardest target in the United States”.

    • US: Snowden Leaked 20,000 Files from NSA

      There are many more revelations to come from the leaks about US spying from Edward Snowden, with journalist Glenn Greenwald testifying that he had received around 20,000 files from the American whistleblower and fugitive.

      Greenwald has been the journalist working with Snowden to release information about the US spying programmes both domestic and international that have caused such controversy around the globe. He has worked with The Guardian the UK to reveal secrets about NSA spying within US borders and on Western Europe, as well as with Brazillian newspaper O Globo, where he has focused his revelations on those affecting Brazil and South America.

    • Why believe anything the government says about the NSA?
  • Civil Rights

    • Putin opposes communist initiative for government dissolution

      Speaking at a youth camp President Vladimir Putin has hinted that he was not planning to sack the government in the foreseeable future and said that he was satisfied by its work.

    • August 2 Project Censored Show with Howard Zinn

      Mickey Huff in studio with Peter Phillips review the NEW award-winning documentary “Project Censored the Movie: Ending the Reign of Junk Food News” AND newly released interview outtakes with Howard Zinn and Noam Chomsky talking about Project Censored, war, history, and the media. These are only available to the general public here and now for the first time!

    • Latvia to extradite alleged hacker to US despite sentence concerns

      The Latvian government says it will extradite a 28-year-old man accused of creating the Web injects for the highly destructive Gozi malware, which targeted over a million computers globally, specifically aimed at bank accounts. US prosecutors say the malware was used to steal millions of dollars from its targets.

    • [Old] No shooting at protest? Police may block mobile devices via Apple

      Apple has patented a piece of technology which would allow government and police to block transmission of information, including video and photographs, from any public gathering or venue they deem “sensitive”, and “protected from externalities.”

    • Senators ponder if bloggers deserve First Amendment protection

      As the U.S. Senate continues to debate a national law to protect journalists from protecting their sources, two Senators believe unpaid bloggers and websites like WikiLeaks shouldn’t get extended First Amendment protections.

    • NDAA opponents take fight to Coos Bay

      While local opponents of the National Defense Authorization Act won a partial victory at the county level last week, they may encounter an even tougher battle within the city limits.

      The Coos Bay City Council voted 5-2 Wednesday night to postpone further discussion of an anti-NDAA resolution until councilors had time to research the issue.

  • Internet/Net Neutrality

  • Intellectual Monopolies

    • Copyrights

      • Russia Prepares to Broaden Brand New Anti-Piracy Law

        Anti-piracy legislation introduced in Russia less than a week ago is already back with legislators. The Ministry of Culture says that the law will be amended to include not only movies and TV shows as previously planned, but a wide range of other creative content. Website owners will be required to make their contact details available to rightsholders in order to speed up complaints while tech companies such as Google have until Friday to put forward their suggestions.

      • Hollywood Keeps Censoring Pirate Bay Documentary, Director Outraged

        Over the past few months several Hollywood studios have asked Google to remove links to the “free-to-share” Pirate Bay documentary TPB-AFK. The film’s director, Simon Klose, has contacted the search engine in an attempt to have the links put back online but thus far without success. Meanwhile, film studios continue to submit new DMCA requests to censor the documentary.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts