EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

10.13.16

Links 13/10/2016: Major Ubuntu and OpenSUSE Releases

Posted in News Roundup at 7:43 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • They Said Nobody in Jordan Knew About Linux but They Were Wrong

    In this story, “Roblimo” takes us back to 2002, to an open source conference in a country where the common belief was that “nobody knew anything about Linux.” Boy, were they in for a surprise.

    In December, 2002, I gave the keynote speech at an open source conference in Amman, Jordan. It was a tense time in that part of the world. Not long before I was there, the U.S. Agency for International Development (USAISD) chief in Amman was assassinated. Anti-U.S. demonstrations had been shut down by Jordan’s armed forces earlier in the year. King Abdullah II was still new in the job and did not yet have as certain a hand on the helm as his father, Hussein (amateur radio call JY1) did during previous decades. To make things even more fun, the country was flooded with refugees from Iraq, and rumors were rife that the U.S. would soon go to war with Saddam Hussein over 9/11. Or something. Of course, the war rumors turned out to be true.

  • 7 Mistakes New Linux Users Make

    Changing operating systems is a big step for anybody — all the more so because many users are uncertain about exactly what an operating system is.

    However, switching from Windows to Linux is especially hard. The two operating systems have different assumptions and priorities, as well as different ways of doing things. As a result, it is easy for new Linux users to wind up confused because the expectations they have developed using Windows no longer apply.

  • Distribute And Win

    There are many instances, both in nature and business, of the virtues of distributed systems as compared to monolithic systems. One of the most obvious is the rise of open-source software, as argued persuasively by Eric Raymond in The Cathedral and the Bazaar (available online).

    He argues that “cathedrals” (hierarchical, well-organised companies which are the western norm, e.g., IBM, Microsoft) will in the long run be defeated by “bazaars” (loosely federated groups of workers).

    In the context of operating systems (the software that controls devices), and specifically of the UNIX and Linux systems (which is what Eric was focusing on), this prophecy has largely come true. Microsoft, so dominant in the last century, has now lost its monopoly.

  • Linux And Its Impact On Modern IT Infrastructure

    Linux came into existence 25 years ago, but since then, it has been on the path of evolution, and has crept into the modern IT infrastructure like little else. What started as a rebellion movement of sorts, has now become the backbone of enterprise grade computing for sometime now, and been behind the success stories of more than a few enterprises.

    To gauge the historical link of Linux with enterprise servers, Senior Solutions Architect at Red Hat Martin Percival’s words come to mind, who said “Linux was regarded as an alternative to proprietary Unix. But RHEL switched it to becoming an alternative to Windows Server.” However, when the 90’s came around, computing was to be turned on it’s head, when the consumer segment, more so with PCs, began to take off, even with the famous separation of Microsoft and IBM. While Windows 3.x became a sort of industry standard, IBM’s own OS/OS 2 didn’t create so much of an impression.

  • Desktop

  • Server

    • Carriers Embrace Trial & Error Approach as NFV Becomes Real

      Telcos kicked off the SDN World Congress here with boasts about how un-telco-like they’ve become, influenced by software-defined infrastructure and the world of virtualization.

      Specifically, they’re starting to adopt software’s “agile” philosophy by being willing to proceed in small steps, rather than waiting for technology to be fully baked.

    • How to stay relevant in the DevOps era: A SysAdmin’s survival guide [Ed: How to stay relevant in the [stupid buzzword] era: rewrite the CV with silly buzzwords like DevOps]

      The merging of development and operations to speed product delivery, or DevOps, is all about agility, automation and information sharing. In DevOps, servers are often treated like cattle”that can be easily replaced, rather than individual pets”to be nurtured.

    • Fear Makes The Wolf Look Bigger

      DevOps is based on 3 key pillars: People, Process and Automation. I believe their importance to a business should be considered in that order.

    • TNS Guide to Serverless Technologies: The Best of FaaS and BaaS

      Like the terms “microservices” and “containers” before it, “serverless” is a loaded word. Countless blogs have argued about the meaning or importance.

      The first, obvious statement everyone makes is that, yes, there are servers or hardware of some sort somewhere in the system. But the point of “serverless” is not that servers aren’t used; it’s just that developers and administrators do not have to think about them.

      Serverless architectures refer to applications that significantly depend on third-party services. “Such architectures remove the need for the traditional ‘always on’ server system sitting behind an application,” said software developer Mike Roberts, in an article on Martin Fowler’s site. Inserting serverless technologies into systems can reduce the complexity that needs to be managed, and could also potentially save money.

    • One Day Is a Lifetime in Container Years

      The average life span of a container is short and getting shorter. While some organizations use containers as replacements for virtual machines, many are using them increasingly for elastic compute resources, with life spans measured in hours or even minutes. Containers allow an organization to treat the individual servers providing a service as disposable units, to be shut down or spun up on a whim when traffic or behavior dictates.

      Since the value of an individual container is low, and startup time is short, a company can be far more aggressive about its scaling policies, allowing the container service to scale both up and down faster. Since new containers can be spun up on the order of seconds or sub seconds instead of minutes, they also allow an organization to scale down further than would previously have provided sufficient available overhead to manage traffic spikes. Finally, if a service is advanced enough to have automated monitoring and self-healing, a minuscule perturbation in container behavior might be sufficient to cause the misbehaving instance to be destroyed and a new container started in its place.

      At container speeds, behavior and traffic monitoring happens too quickly for humans to process and react. By the time an event is triaged, assigned, and investigated, the container will be gone. Security and retention policies need to be set correctly from the time the container is spawned. Is this workload allowed to run in this location? Are rules set up to manage the arbitration between security policies and SLAs?

  • Kernel Space

    • The Open Source SDN Distro That Keeps Microsoft’s WiFi Secure

      Dr. Bithika Khargharia, a principal solutions architect at Extreme Networks and director of product and community management at the Open Networking Foundation (ONF), then elaborated on the new approach by discussing a project called Atrium Enterprise. Atrium Enterprise is an open source SDN distribution that’s ODL-based and has an integrated unified communications and collaboration application. It runs on Atrium partner hardware according to Khargharia.

    • Blockchain Adoption Faster Than Expected

      A study released last week by IBM indicates that blockchain adoption by financial institutions is on the rise and beating expectations. This is good news for IBM, which is betting big on the database technology that was brought to prominence by Bitcoin. Yesterday, Big Blue announced that it has made its Watson-powered blockchain service available to enterprise customers.

      For its study, IBM’s Institute for Business Value teamed with the Economist Intelligence Unit to survey 200 banks spread through 16 countries about “their experience and expectations with blockchains.” The study found that 15 percent of the banks surveyed plan to implement commercial blockchain solutions in 2017.

    • Cloud Native Computing Foundation Adds OpenTracing Project

      The Cloud Native Computing Foundation (CNCF) today officially announced that the open-source OpenTracing project has been accepted as a hosted project.

    • System calls again

      And speaking of searching — there is filter box now. You can type syscall name (or part of it) there and have table filtered. Same can be done with system call number as well. You used Valgrind and it said that has no idea how to handle syscall 145? Just enter number and you see that it is getresuid(), nfsservctl(), readv(), sched_getscheduler(), setreuid() or setrlimit() — depends which architecture you are testing.

    • UBIFS Supports OverlayFS In Linux 4.9, Readying UBI For MLC Support

      The UBI/UBIFS pull request for the Linux 4.9 kernel for those interested in the Unsorted Block Image tech on Linux.

      First up, for those running UBIFS on raw flash memory, there is now OverlayFS support. OverlayFS, as a reminder, provides a union mount for other file-systems. O_TMPFILE, RENAME_WHITEOUT/EXCHANGE are now supported by UBIFS for handling OverlayFS.

    • KThread Improvements Coming To Linux 4.9

      Andrew Morton’s pull request for Linux 4.9 has landed some improvements for kernel threads.

      For the kthread code in Linux 4.9 there is an API cleanup, a new kthread_create_worker() call (and kthread_create_worker_on_cpu()) to hide implementation details, kthread_destroy_worker() as an easier way to end a worker, support for delayed kthreads, better support for freezable kthread workers, and related kthread work.

    • Linus Torvalds: “Linux Kernel 5.0 Will Be Released When We Hit 6 Million Git Objects”

      Linux creator Linus Torvalds has shared the news that we are half-way between Linux 4.0 and 5.0 as the Git object database has crossed the 5 million object mark. Some of you might be knowing that major version transition happens at every two million objects in the database. So, after 1 more million Git objects, we can expect the release of Linux kernel 5.0 in 2017.

    • Graphics Stack

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • How to make animated videos with Krita

        There are lots of different kinds of animation: hand-drawn, stop motion, cut-out, 3D, rotoscoping, pixilation, machinima, ASCII, and probably more. Animation isn’t easy, by any means; it’s a complex process requiring patience and dedication, but the good news is open source supplies plenty of high-quality animation tools.

        Over the next three months I’ll highlight three open source applications that are reliable, stable, and efficient in enabling users to create animated movies of their own. I’ll concentrate on three of the most essential disciplines in animation: hand-drawn cel animation, digitally tweened animation, and stop motion. Although the tools are fairly specific to the task, these principles apply to other styles of animation as well.

        You can read about some of the more technical details about animation in Animation Basics by Nikhil Sukul.

      • Kdenlive 16.08.2 Open-Source Video Editor Released with Over 35 Improvements

        Today, October 13, 2016, Kdenlive developer Farid Abdelnour announced the release and immediate availability of the second maintenance update to the Kdenlive 16.08 open-source video editor software project.

        Distributed as part of the soon-to-be-released KDE Applications 16.08.2 software suite for the latest KDE Plasma 5.8 LTS desktop environment, Kdenlive 16.08.2 is here five weeks after the release of the previous maintenance version with no less than 36 improvements and bug fixes, addressing keyframe, UI, workflow, compilation, and proxy clip rendering related issues reported by users.

      • Qt 5.6.2 Toolkit Officially Released with Almost 900 Improvements and Bug Fixes

        Today, October 12, 2016, the Qt Company, through Tuukka Turunen, announced the general availability of the second maintenance release to the long-term supported Qt 5.6 open-source and cross-platform GUI toolkit.

        Qt 5.6.2 is here four months after the release of the first maintenance version, Qt 5.6.1, bringing approximately 900 improvements and bug fixes to keep Qt 5.6 a stable and reliable release for Qt application developers on GNU/Linux, Mac OS X, and Microsoft Windows operating systems.

        “This is the second patch release to the long-term supported Qt 5.6, and there will still be more patch releases to come. While a patch release does not bring new features, it contains security fixes, error corrections and general improvements,” says Tuukka Turunen in today’s announcement.

      • KDE Applications 16.08.2 Released for KDE Plasma 5.8 LTS with over 30 Bug Fixes

        As expected, KDE announced today, October 13, 2016, the general availability of the second point release of their KDE Applications 16.08 software suite for the latest KDE Plasma 5 desktop environments.

        That’s right, we’re talking about KDE Applications 16.08.2, which comes five weeks after the first maintenance update, promising to address over 30 issues and annoyances that have been reported by users since KDE Applications 16.08.1, which launched last month on the 8th of September.

    • GNOME Desktop/GTK

      • GNOME 3.22 Desktop Environment Gets Its First Point Release, Brings Improvements

        As expected, today, October 12, 2016, GNOME 3.22.1 has been announced by GNOME developer Frederic Peters as the first point release of the stable GNOME 3.22 desktop environment for GNU/Linux operating systems.

      • GNOME 3.22.1 Released

        For those on rolling-release distributions that tend to wait until the first point release before upgrading your desktop environment, GNOME 3.22.1 is now available as the first update since last month’s GNOME 3.22 debut.

  • Distributions

  • Devices/Embedded

    • Open-spec COM version of Chip SBC sells for $16

      The Next Thing unveiled a $16 COM version of the Chip SBC called the Chip Pro, plus a dev kit and a $6 SiP version of the Allwinner R8 SoC called the GR8.

      The Next Thing, which gave us the $9-and-up Chip SBC and Chip-based PocketChip handheld computer, has unveiled a $16, open-spec computer-on-module version of the Chip called the Chip Pro. The Chip Pro measures 45 x 30mm compared to 60 x 40mm for the Chip. The Pro has half the RAM of the Chip with 256MB DDR3, and only 512MB NAND flash instead of 4GB NAND, but it retains the onboard WiFi and Bluetooth 4.2.

    • Linux-based smart home hubs advance into AI
    • Smart Linux Home Hubs Mix IoT with AI

      Industrial, rather than home, applications will likely dominate the Internet of Things (IoT) market in the years to come. Yet, in the early going, the home automation market has had the greatest visibility. And it hasn’t always been pretty.

      Despite steady growth, retail sales have yet to achieve inflated expectations. Too many companies promised and failed to deliver interoperability with a growing catalog of often buggy smart home products. The lack of essential applications, complex installation, and in many cases, high prices, have also conspired against the segment.

      Yet the smart home segment appears to be rebounding with the help of maturing technology and IoT interoperability standards. There is particular interest in connecting voice-enabled AI assistants with the smart home in products such as Amazon’s Echo. Google recently announced Google Home, a major competitor to Alexa. These are being joined by open source Linux smart home voice agents like Mycroft, Silk, and ZOE (see below).

    • COM Express Type 7 module has dual 10GbE and 32 PCIe lanes

      Congatec unveiled the “Conga-B7XD,” one of the first COM Express Type 7 modules, featuring Intel “Broadwell” CPUs, 2x 10GbE Ethernet, and 32x PCI lanes.

    • Pixel Takes Raspbian to the Next Level

      A couple of weeks ago, the Raspberry Pi Foundation announced they had tuned up the look and feel of Raspbian. The new buzzword created to help bring about the message that the UI had changed was dubbed “Pixel,” which stands for “Pi Improved Xwindows Environment, Lightweight.” While I’m not completely sold on trying to make Pixel stand for something, what I am completely sold on is what it has brought to the table for the Raspberry Pi. With Pixel, Raspbian has the look and feel of an elegant OS and I’m beyond happy that they have put this together for the Raspberry Pi community. I’ve tried out Pixel for the past week and here’s my take to date.

    • Build a Spooky Halloween Music-Light Show with Raspberry Pi and Linux

      My son just turned 4, and he is super-excited about Halloween and zombies. So I planned to create a haunted house-like experience for him. The biggest challenge was to get audio-visual effects. I wanted spooky music synchronized with well-placed lighting.

      Instead of buying some expensive Halloween decorations, I wanted to build them myself. I also wanted to be able to control the lights over the network. I looked around and didn’t find the perfect solution, so I did what DIY people do best: I picked and chose different pieces to create what I needed.

      In this tutorial, I am going to share how you can build a board with Raspberry Pi and open source software that synchronizes music with lights for less than $20. You can place this board inside a plastic pumpkin decoration, for example, or attach LEDs to props and create spooky displays for Halloween. Be creative!

    • PocketCHIP Shipping In Mass Next Month – Makes Fun $69 Debian Linux Handheld

      It’s been a few months since Next Thing Co’s C.H.I.P. computer was successfully funded on Kickstarter as “the world’s first $9 computer” along with the PocketCHIP, a C.H.I.P. powered, battery-backed handheld with physical keyboard. Next Thing Co shipped to their backers over the summer whole in November they expects to begin shipping mass production orders on the CHIP and PocketCHIP. Over the past few weeks I’ve been playing with these low-cost ARM devices.

    • Phones

      • Tizen

        • Huawei Teases Honor S1 smartwatch, No mention of Android Wear

          Huawei is currently teasing their new smartwatch which is to be released under the Honor brand named as the Honor S1. The Chinese manufacturer has an event scheduled for October 18 at which we expect the S1 to be unveiled. But could it be running Tizen ? Huawei are already known as stating they will not release anymore Android wear smartwatches for the remainder of this year, so this leaves either Tizen or some other proprietary OS. According to a report in the JoongAng Ilbo newspaper Huawei are currently working with Samsung to deploy the Tizen operating system in its next smartwatches.

        • Game: Gully Cricket 2016 for all Tizen Smartphones

          Hey cricket fans, Games2win brings the popular Indian gully Cricket game on mobiles for the first time and now it is on the Tizen Store. Play 85 different matches in real Indian gullies (name for an alleyway). Break neighbor’s window panes and car windshields, hit passing auto rickshaws and knock down the milkman in order to get an extra reward. Select your favorite team combination in order for you to win all matches. 3 game modes are available: Arcade Mode, Tournament Mode and Gully Ka Raja mode.

        • Game: Bubble Bash Bubble Struggle is available in Tizen Store

          The DadStudio team have added their best bubble shooting game, named “Bubble Bash Bubble Struggle”, to the Tizen store. The game promises to be one of the best bubble shooter games that has spectacular graphics and great music that is simple to operate.

        • Samsung’s 14nm wearable SoC debuts on Gear 3 watch

          Samsung unveiled a 14nm, dual Cortex-A53 “Exynos 7 Dual 7270” SoC with built-in LTE, which runs Tizen Linux on its new Gear S3 watch.

          Samsung may be suffering through one of the worst months in its history, culminating with this week’s recall of the exploding Galaxy Note 7, but the company is so diverse it can also produce some feel-good news at the same time. This week, Samsung Electronics announced the beginning of mass production of a new wearables system-on-chip called the Exynos 7 Dual 7270. Billed as the first wearables-oriented SoC fabricated with a 14-nanometer (nm) FinFET process, the Exynos 7 Dual 7270 will first appear later this year in its Gear 3 smartwatches (see farther below).

      • Android

Free Software/Open Source

  • StormCrawler: An Open Source SDK for Building Web Crawlers with ApacheStorm

    StormCrawler (SC) is an open source SDK for building distributed web crawlers with Apache Storm. The project is under Apache license v2 and consists of a collection of reusable resources and components, written mostly in Java. It is used for scraping data from web pages, indexing with search engines or archiving, and can run on a single machine or an entire Storm cluster with exactly the same code and a minimal number of resources to implement.

  • Study: ‘Open source coders more aware of security’

    Developers of open source software are generally more aware of code security issues than developers working for the European institutions, according to a study for the European Commission and European Parliament. Developers working for the European institutions have more tools available for management and testing of code security, but using them is not yet a standard practice.

  • Begin Broadcasting with a Powerful Open Source Media Platform

    But what a lot of people don’t realize is that that it’s definitely not just a media player. You can use it to stream and broadcast video, podcasts and other media content, and that includes streaming content to mobile devices of all kinds. Some organizations are integrating these streaming features with their networks and cloud deployments, embracing shared multimedia content. Here is our collection of guides for streaming with VLC, including guides for integrating it with your organization’s publishing strategy. This newly updated collection has been expanded to include some very valuable new, free documentation.

  • AT&T (T) to Unveil ECOMP in Open Source Industry in 1Q17

    U.S. telecom giant AT&T Inc. T is moving ahead with plans to introduce its Enhanced Control, Orchestration, Management and Policy (ECOMP) virtualization platform in the open source industry in the first quarter of 2017. In relation to this, the company announced that it will release all 8.5 million lines of code for ECOMP. AT&T further claims that it has plans to standardize ECOMP as one of the best automated platforms for managing virtual network functions and other software-centric network operations in the telecom industry.

    Earlier in Sep 2016, AT&T and French telecom Orange S.A. ORAN had teamed up on open source initiatives in order to accelerate the standardization of software-defined networking (SDN) and network function virtualization (NFV). In relation to this, AT&T declared Orange as its first telecom partner to test its open-source Enhanced Control, Orchestration, Management, and Policy (ECOMP) platform.

  • Events

  • Web Browsers

    • Chrome

  • SaaS/Back End

    • OpenStack Newton promises better resiliency, scalability and security

      OpenStack has released the latest edition of its popular open-source Infrastructure-as-a-Service (IaaS) cloud: Newton. With broad industry support from more than 200 vendors — including Cisco, Dell, HP Enterprise, IBM, Intel, Oracle, Rackspace, Red Hat, SUSE and VMware — this version should quickly see wide deployment.

      This release features numerous new features. Perhaps the most important is simply making OpenStack easier to use. OpenStack is powerful, but it’s notoriously hard to master. While OpenStack classes are becoming more common, even with help, mastering OpenStack isn’t easy.

    • Lessons learned as an OpenStack Day organizer
    • Recognizing OpenStack Cloud Contributors–Including Those Who Don’t Code

      Although it is still a very young cloud computing platform, each week there is more evidence of how entrenched OpenStack has become in enterprises and even in smaller companies. In fact, just this week, we reported on findings that show OpenStack adoption in the telecom industry to be widespread.

      Contributors are a big part of what has driven OpenStack’s success, and as the OpenStack Summit approaches, there are several new initiatives being put in place to serve up recognition for meaningful contributors. Notably, the recognition is going to partially go to those who actually contribute code, but there will also be recognition of other forms of giving to OpenStack.

    • Veritas to Showcase Software-Defined Storage at OpenStack Summit

      With the OpenStack Summit event in Barcelona rapidly approaching, news is already arriving on some important new technologies in the OpenStack ecosystem. Veritas Technologies announced that it will showcase two of its software-defined storage solutions—HyperScale for OpenStack and Veritas Access—at the summit.

      With OpenStack quickly gaining traction as an open source software platform of choice for public and private clouds, storage management and support for enterprise production workloads is becoming critical for many enterprises.

  • Funding

    • How to Find Funding for an Open Source Project

      Ask people how to find funding for a technology project, and many of them will point to crowdsourcing sites. After all, the Oculus Rift virtual reality headset, the Pebble smartwatch, and even the low-cost Raspberry Pi computer were launched after their inventors collectively raised millions of dollars from contributors. If you happen to have an open source project that you want to get funded, what are some of your options?

  • BSD

    • vmm enabled

      With a small commit, OpenBSD now has a hypervisor and virtualization in-tree. This has been a lot of hard work by Mike Larkin, Reyk Flöter, and many others.

      VMM requires certain hardware features (Intel Nehalem or later, and virtualization enabled in the BIOS) in order to provide VM services, and currently only supports OpenBSD guests.

  • FSF/FSFE/GNU/SFLC

    • GNU Guile 2.0.13 released [security fixes]

      We’ve just released a new version of GNU Guile, version 2.0.13, which is a security release for Guile (see the original announcement).

      This handles a significant security vulnerability affecting the live REPL, CVE-2016-8606. Due to the nature of this bug, Guile applications themselves in general aren’t vulnerable, but Guile developers are. Arbitrary Scheme code may be used to attack your system in this scenario. (A more minor security issue is also addressed, CVE-2016-8605.)

      There is also a lesson here that applies beyond Guile: the presumption that “localhost” is only accessible by local users can’t be guaranteed by modern operating system environments. If you are looking to provide local-execution-only, we recommend using Unix domain sockets or named pipes. Don’t rely on localhost plus some port.

    • Free Software Directory meeting recap for October 7th, 2016
    • The Free Software Foundation seeks nominations for the 19th annual Free Software Awards

      This award is presented annually by FSF president Richard Stallman to an individual who has made a great contribution to the progress and development of free software, through activities that accord with the spirit of free software.

      Individuals who describe their projects as “open” instead of “free” are eligible nonetheless, provided the software is in fact free/libre.

      Last year, Werner Koch was recognized with the Award for the Advancement of Free Software for his work on GnuPG, the de facto tool for encrypted communication. Koch joined a prestigious list of previous winners including Sébastien Jodogne, Matthew Garrett, Dr. Fernando Perez, Yukihiro Matsumoto, Rob Savoye, John Gilmore, Wietse Venema, Harald Welte, Ted Ts’o, Andrew Tridgell, Theo de Raadt, Alan Cox, Larry Lessig, Guido van Rossum, Brian Paul, Miguel de Icaza, and Larry Wall.

  • Public Services/Government

    • NL Parliament makes open standards mandatory

      The use of open standards will be made mandatory for public administrations. A law proposal by MP Astrid Oosenbrug was adopted by the Parliament’s lower house yesterday. According to the MP, the open standards requirement will be one of several changes to the country’s administrative law, introduced next year. “The minister has earlier agreed to make open standards mandatory”, she said. “The parliament is making sure this actually happens.”

      The first public administration that should improve its use of open standards, is the Parliament’s lower house itself, MP Oosenbrug said. “Ironically, lower house published the adopted law on its website by providing a download link to a document in a proprietary format.”

    • France adds source code to list of documents covered by freedom of information laws

      French freedom of information law now treats source code as disclosable in the same way as other government records.

      The new “Digital Republic” law took effect Saturday, with its publication in France’s Official Journal.

      It adds source code to the long list of government document types that must be released in certain circumstances: dossiers, reports, studies, minutes, transcripts, statistics, instructions, memoranda, ministerial replies, correspondence, opinions, forecasts and decisions.

      But it also adds a new exception to existing rules on access to administrative documents and reuse of public information, giving officials plenty of reasons to refuse to release code on demand.

      These rules already allow officials to block the publication of documents they believe threaten national security, foreign policy, personal safety, or matters before court or under police investigation, among things.

      Now they can oppose publication if they believe it threatens the security of government information systems.

    • Midi-Pyrenees French Region remains committed to Free Software

      “Free software is one of three pillars of our digital strategy”, has confirmed Nadia Pellefigue, the vice-president of the regional council of the Midi-Pyrenees (South-West of France).

      “Free software and open source will help the regional industry and employment, because it can mobilise people”, Nadia Pellefigue said. “Public procurement has been spurred but there is still room for improvements”, she added. Cost savings, meaningful local jobs and lower dependencies on foreign firms are the three advantages of free software she listed.

      Ms Pellefigue was one of the officials at the Rencontres Régionales du Logiciel Libre (RRLL), which took place in Toulouse in October.

      Read more

  • Openness/Sharing/Collaboration

    • Open Data

      • CMPD launches ‘Open Source Data’ page to share police info with public

        Charlotte-Mecklenburg Police announced Wednesday the launch of its “Open Source Data” page on the department’s website.

        Police say the information source is a step forward in how they share information with the public and is an “opportunity for even greater accountability and transparency” with the Charlotte community. The department faced criticism in the wake of the Keith Scott shooting as protesters said CMPD should have been more transparent during their investigation of the incident.

  • Programming/Development

    • 50 tips for improving your software development game

      How do you keep improving as a software engineer? Some pieces of advice are valid no matter your experience level, but often the advice will depend on where you are in your career.

      If you’re a beginner, the best advice is to simply learn your language, frameworks, and tools top to bottom and gain more experience with a variety of different projects.

      If you’re an experienced software developer, you should constantly try to find new ways to optimize your code for readability, performance, and maintainability, and then practice making well-reasoned decisions about where to focus time and resources in your code—whether it’s testing, performance optimization, or other technical debt.

Leftovers

  • poll on mac 10.12 is broken

    When Mac OS X first launched they did so without an existing poll function. They later added poll() in Mac OS X 10.3, but we quickly discovered that it was broken (it returned a non-zero value when asked to wait for nothing) so in the curl project we added a check in configure for that and subsequently avoided using poll() in all OS X versions to and including Mac OS 10.8 (Darwin 12). The code would instead switch to the alternative solution based on select() for these platforms.

    With the release of Mac OS X 10.9 “Mavericks” in October 2013, Apple had fixed their poll() implementation and we’ve built libcurl to use it since with no issues at all. The configure script picks the correct underlying function to use.

  • How to ask why at work without upsetting anyone
  • Health/Nutrition

    • Gorilla escapes from enclosure at London Zoo

      According to the zoo’s website there are at least seven gorillas living in its Gorilla Kingdom.

      Among them is Kumbuka, a western lowland silverback, who arrived at ZSL London Zoo in early 2013 from Paignton Zoo in Devon.

      Others include Zaire, who came to London Zoo in 1984 after being born in Jersey Zoo, Mjukuu and her daughter Alika, “teenager” Effie, and Gernot, the latest addition who was born in November last year to Effie and Kumbuka.

    • ‘A famine unlike any we have ever seen’

      They survived Boko Haram. Now many of them are on the brink of starvation.

      Across the northeastern corner of this country, more than 3 million people displaced and isolated by the militants are facing one of the world’s biggest humanitarian disasters. Every day, more children are dying because there isn’t enough food. Curable illnesses are killing others. Even polio has returned.

      About a million and a half of the victims have fled the Islamist extremists and are living in makeshift camps, bombed-out buildings and host communities, receiving minimal supplies from international organizations. An additional 2 million people, according to the United Nations, are still inaccessible because of the Boko Haram fighters, who control their villages or patrol the surrounding areas.

    • Flint resident seeks grand jury probe of Gov. Snyder

      A Flint resident is requesting a one-person grand jury to investigate whether Gov. Rick Snyder committed criminal misconduct in office by using public funds to hire private attorneys representing him in criminal probes of the city’s water contamination crisis.

      Attorney Mark Brewer, former chairman of the Michigan Democratic Party, filed a complaint late Tuesday in Ingham County Circuit Court on behalf of Keri Webber, who said members of her family have suffered health complications from lead exposure and Legionnaires’ disease.

      Webber told The Detroit News she is “appalled” that taxpayers are being forced to fund the governor’s legal team while Flint residents pay medical bills and still cannot drink their municipal water without a filter. She personally uses only bottled water.

    • Big soda is buying off big health orgs to keep profits and Americans fat

      Under the guise of sweet charitable giving, soda makers are handing out millions to big name health organizations so that the groups stay quiet about health issues that threaten to slim down drink profits—not to mention Americans themselves—a new study suggests.

      Between 2011 and 2015, Coca-Cola Company and PepsiCo sponsored 96 national health organizations, including the American Diabetes Association, the American Heart Association, and the American Society for Nutrition, researchers report in the American Journal of Preventative Medicine. Meanwhile, lobbyists for the beverage makers successfully campaigned against nearly 20 proposed state and federal regulations aimed at protecting public health, such as improvements to nutrition labeling and soda taxes.

      The pop makers’ efforts to defeat public health policies casts doubt on the sincerity of their charitable giving to health groups. But the sponsorships alone are concerning, according to the study authors, Daniel Aaron and Michael Siegel of Boston University. Earlier studies have found that “sponsorships of health organizations can have a nefarious impact on public health,” they wrote, noting the efforts of Big Tobacco decades ago. Sponsors may directly or indirectly—through feelings of indebtedness—get an organization to take on their interests. As such, the Federal Trade Commission considers sponsorships a marketing tool. All in all, Aaron and Siegel conclude that the soda sponsorships “are likely to serve marketing functions, such as to dampen health groups’ support of legislation that would reduce soda consumption and improve soda companies’ public image,” they wrote.

    • DEA reverses decision on kratom; drug stays legal for now

      The Drug Enforcement Administration is withdrawing its plan to ban the opioid-like herbal drug kratom—at least for now—according to a preliminary withdrawal notice posted today.

      The notice, which will appear in the Federal Registry Thursday, nixes the agency’s emergency decision in late August to list kratom as a Schedule I Controlled Substance, the most restrictive category that also includes heroin and LSD. The DEA deemed the plant’s use an urgent threat to public health—based on concern that it could be abused and addictive—and set the date for a ban as early as September 30. But the abrupt plan drew intense backlash from public health experts, lawmakers, and thousands of devoted users, who argue that the currently unregulated herbal supplement treats chronic pain and prevents deadly opioid addictions.

      After the initial notice, kratom advocates swiftly organized protests, collected more than 140,000 petition signatures, and convinced more than 50 Congress members to sign letters urging the DEA to reverse course. One of the letters highlighted the ongoing, federally funded research looking at using kratom for opioid withdrawal. That research would likely be shut down by a Schedule I listing.

    • Netherlands may extend assisted dying to those who feel ‘life is complete’

      The Dutch government intends to draft a law that would legalise assisted suicide for people who feel they have “completed life” but are not necessarily terminally ill.

      The Netherlands was the first country to legalise euthanasia, in 2002, but only for patients who were considered to be suffering unbearable pain with no hope of a cure.

      But in a letter to parliament on Wednesday, the health and justice ministers said that people who “have a well-considered opinion that their life is complete, must, under strict and careful criteria, be allowed to finish that life in a manner dignified for them”.

  • Security

    • Security advisories for Wednesday
    • Just Too Much Administration – Breaking JEA, PowerShell’s New Security Barrier

      Just Enough Administration (JEA) is a new Windows 10/Server 2016 feature to create granular least privilege policies by granting specific administrative privileges to users, defined by built-in and script-defined PowerShell cmdlets. Microsoft’s documentation claimed JEA was a security boundary so effective you did not need to worry about an attacker stealing and misusing the credentials of a JEA user.

      But every JEA role capability example I found Microsoft had published had vulnerabilities that could be exploited to obtain complete system administrative rights, most of them immediately, reliably, and without requiring any special configuration. I find it hard to believe most custom role capabilities created by system administrators in the wild are going to be more secure than these, given the track record of the functionally similar features in Linux, the non-obvious nature of vulnerabilities, and the importance of dangerous cmdlets to routine system troubleshooting and maintenance.

      I recommended Microsoft invert what their JEA articles and documentation said about security. Instead of leading with statements that JEA was a security barrier, users with JEA rights should not be considered administrators, and their credentials do not need to be protected like real administrators with a note that this may not be the case if you are not careful; Microsoft’s JEA documentation should lead with statements that JEA should not be treated like a security barrier and users with JEA rights and their credentials should be tightly controlled exactly like normal administrators unless the role capabilities have been strictly audited by security professionals. Additionally, the README files and comments of their example role capabilities should start with stern reminders of this.

    • Thousands of internet-connected devices are a security disaster in the making

      The first problem: many IoT devices, like those cameras, are consumer-oriented, which means their owners don’t have a security-conscious IT department. “Individuals do not have the purchasing power of a large corporation,” says John Dickson, principal of Denim Group, “so they cannot demand security features or privacy protections that a large corporation can of an a product or software vendor.”

      PC Pitstop Vice President of Cyber Security Dodi Glenn points out that many IoT purchasers neglect basic security measures, failing to change passwords from obvious defaults. And even if they did want to secure their devices, there are limits to what they can do: “You can’t secure these devices with antivirus applications.”

    • A SSHowDowN in security: IoT devices enslaved through 12 year old flaw

      In what researchers call the “Internet of Unpatchable Things,” a 12-year-old security flaw is being exploited by attackers in a recent spate of SSHowDowN Proxy attacks.

      The Internet of Things (IoT) is an emerging market full of Wi-Fi and networked devices including routers, home security systems, and lighting products. While the idea of making your home more efficient and automating processes is an appealing one, unfortunately, vendors en masse are considering security as an afterthought for thousands of devices now in our homes, leaving our data vulnerable.

    • Microsoft was unable to meaningfully improve the software

      Documents in a class-action lawsuit against Ford and its original MyFord Touch in-vehicle infotainment (IVI) system reveal that the company’s engineers and even its top executive were frustrated with the problematic technology.

      The documents from the 2013 lawsuit show Ford engineers believed the IVI, which was powered by the SYNC operating system launched in 2010, might be “unsaleable” and even described a later upgrade as a “polished turd,” according to a report in the Detroit News, which was confirmed by Computerworld.

      The SYNC OS was originally powered by Microsoft software. Microsoft continued releasing software revisions it knew were defective, according to the lawsuit.

      “In the spring of 2011, Ford hired Microsoft to oversee revisions, and hopefully the improvement, of the [software]. But … Microsoft was unable to meaningfully improve the software, and Ford continued releasing revised software that it knew was still defective,” the lawsuit states.

      Last week, a U.S. District Court judge certified the case as a class action.

    • Senator wants nationwide, all-mail voting to counter election hacks

      “It’s not a question of if you’re going to get hacked—it’s when you’re going to get hacked.”

      Those were the words of Verizon CEO Lowell McAdam as he sought to assure investors last week that the company is still interested in purchasing Yahoo despite the massive data breach of Yahoo consumer accounts.

      Whether McAdam’s words ring true for the hodgepodge of election systems across the US is anybody’s guess. But in the wake of the Obama administration’s announcement that the Russian government directed hacks on the Democratic National Committee and other institutions to influence US elections, a senator from Oregon says the nation should conduct its elections like his home state does: all-mail voting.

    • SourceClear Adds Atlassian Stack to Its Open Source Security Platform

      Open source security company SourceClear said it is integrating Atlassian’s suite of developer tools including Bitbucket Pipelines, JIRA Server, JIRA Cloud, and Bamboo into the company’s open source platform. The integration will result in automated security checks being a part of the developer workflow before they ship code.

    • Why You Should Seriously Care About SSH User Keys

      A recent film chronicled the downfall of the US subprime home loan market, and its parallels to the current state of Secure Shell (SSH) protocol and SSH user keys were astonishing.

    • 5900 online stores found skimming [analysis]

      Online card skimming is up 69% since Nov 2015

      [...]

      In short: hackers gain access to a store’s source code using various unpatched software flaws. Once a store is under control of a perpetrator, a (Javascript) wiretap is installed that funnels live payment data to an off-shore collection server (mostly in Russia). This wiretap operates transparently for customers and the merchant. Skimmed credit cards are then sold on the dark web for the going rate of $30 per card .

  • Defence/Aggression

    • U.S. Spent $14.6 Million Taxpayer Dollars on Failed Hospital in Afghanistan

      The war in Afghanistan is ready to enter its 16th year (if it was a kid it’s be ready to start driving) and by most definitions is pretty much a bust.

      Despite that, both mainstream candidates have made it clear in public statements they intend to continue pouring money — and lives — into that suppurating sore of American foreign policy. Despite that, there has been no mention of the war in two debates.

      Anyway, while we worry a lot about who call who naughty names in the final presidential debate, can you check around where you live and let me know if your town could use a new hospital, all paid for by someone else’s tax dollars, you know, free to you? ‘Cause that’s the deal Afghanistan got from the USG, only even that turned into a clusterfutz when no one paid much attention to how the facility was thrown together.

    • 5 Shady Things The USSR Did That You Can’t Even Exaggerate

      Can you believe that both poor people and petty criminals had the unbelievable gall to exist in 1930s Russia? If people were to see all those undesirables, why, they might think that communism wasn’t actually a perfect utopia. Something had to be done, and seeing as Soylent Green hadn’t yet been invented, Stalin decided on the next best thing: Cannibal Island.

      Anyone who tried to escape was hunted for sport by the soldiers. There were no shelters or animals on the island, little vegetation, and absolutely no food. It didn’t take long for the prisoners to start eating the dead, and then helping the living become the dead a bit faster so they could eat them too. Here’s a detailed account of a girl stranded on the island who suffered this very fate, but you shouldn’t read it without first looking at pictures of kittens for an hour.

    • Yemen war: ‘My children are starving to death’

      In a shantytown in a deserted area of Yemen’s al-Tohaita district, six-year-old Ahmed Abdullah Ali and his 13 siblings often go to sleep hungry.

      The effects of malnutrition have been the most dramatic on young Ahmed, whose small, frail body looks much younger than his age.

      “I get 500 Yemeni rials [$2] per day, and I have 14 children, so I can hardly provide them with bread, tea and goat’s milk to drink,” the boy’s father, Abdullah Ali, told Al Jazeera.

      “They are suffering from malnutrition. Always, they need food.”

      Many residents of this sparsely populated area, located in the western Hodeidah province, earn some income by breeding animals, but it is not enough to make a living.

    • Obama Promises ‘Proportional’ Response To Russian Hacking, Ignores That We Started The Fight

      Again though, the very idea that the United States would be “responding” is fundamentally incorrect. We’ve been engaged in nation state hacking and election fiddling for decades, happily hacking the planet for almost as long as the internet has existed. We use submarines as underwater hacking platforms, the U.S. government and its laundry list of contractors routinely hacking and fiddling with international elections and destroying reputations when and if it’s convenient to our global business interests. Our behavior in 1970s South America giving tech support to Operation Condor is the dictionary definition of villainy.

      Yet somehow, once countries began hacking us back, we responded with indignant and hypocritical pouting and hand-wringing. But the reality is we are not some unique, special snowflake on the moral high ground in this equation: we’ve historically been the bully, and nationalism all too often blinds us to this fact. Long a nation driven to war by the weakest of supporting evidence, hacking presents those in power with a wonderful, nebulous new enemy, useful in justifying awful legislation, increased domestic surveillance authority, and any other bad idea that can be shoe-horned into the “because… cybersecurity” narrative.

      And as we’re witnessing in great detail, hacking has played a starring role in this nightmarish election, with Donald Trump giving every indication he intends to only ramp up nation state hacking as a core tenet of his idiocracy, and Hillary Clinton lumping Russia, hackers, and WikiLeaks into one giant, amorphous and villainous amoeba to help distract us from what leaked information might actually say about the sorry state of the republic.

    • The long history of the U.S. interfering with elections elsewhere

      One of the more alarming narratives of the 2016 U.S. election campaign is that of the Kremlin’s apparent meddling. Last week, the United States formally accused the Russian government of stealing and disclosing emails from the Democratic National Committee and the individual accounts of prominent Washington insiders.

      The hacks, in part leaked by WikiLeaks, have led to loud declarations that Moscow is eager for the victory of Republican nominee Donald Trump, whose rhetoric has unsettled Washington’s traditional European allies and even thrown the future of NATO — Russia’s bête noire — into doubt.

      Leading Russian officials have balked at the Obama administration’s claim. In an interview with CNN on Wednesday, Foreign Minister Sergei Lavrov dismissed the suggestion of interference as “ridiculous,” though he said it was “flattering” that Washington would point the finger at Moscow. At a time of pronounced regional tensions in the Middle East and elsewhere, there’s no love lost between Kremlin officials and their American counterparts.

      To be sure, there’s a much larger context behind today’s bluster. As my colleague Andrew Roth notes, whatever their government’s alleged actions in 2016, Russia’s leaders enjoy casting aspersions on the American democratic process. And, in recent years, they have also bristled at perceived U.S. meddling in the politics of countries on Russia’s borders, most notably in Ukraine.

    • Hillary Clinton Acknowledges Saudi Terror Financing in Hacked Email, Hinting at Tougher Approach

      Saudi Arabia and the U.S. have maintained their alliance for seven decades despite disagreements over oil prices, Israel, and, more recently, the Obama administration’s rapprochement with Iran.

      Judging by a 2014 email purportedly written by Hillary Clinton to John Podesta, her current campaign chairman, and published by WikiLeaks, there have been serious tensions over Saudi Arabia’s role in the Syria conflict as well. In the midst of a nine-point overview of U.S. strategy in the Middle East, Clinton wrote:

      “… we need to use our diplomatic and more traditional intelligence assets to bring pressure on the governments of Qatar and Saudi Arabia, which are providing clandestine financial and logistic support to ISIL and other radical Sunni groups in the region.”

      Clinton’s private comments differ from the public line taken by members of the Obama administration. Speaking at the 9/11 Memorial and Museum in New York, John Brennan, the director of the CIA, recently called the Saudis “among our very best counterterrorism partners globally.” Last month, Obama, who long ago referred to Saudi Arabia as a “so-called” ally, acted to protect the Saudi government from litigation by vetoing the Justice Against Sponsors of Terrorism Act, which would allow 9/11 victims to sue the Saudi government for damages in U.S. federal court. Congress overturned Obama’s veto, leaving the door open for Saudi Arabia to be named as a defendant in future lawsuits.

  • Transparency/Investigative Reporting

    • Questioning of Julian Assange by Swedish authorities postponed

      The questioning of Julian Assange by Swedish prosecutors at the Ecuadorean embassy in London has been postponed until mid-November.

      Ecuador’s attorney general said on Wednesday that the long-awaited interview, due to take place on Monday, would be delayed until 14 November to ensure that Assange’s legal team could attend.

      Assange has been confined to the embassy since June 2012, when he sought and was granted asylum by Ecuador. He is wanted for questioning by Sweden over an allegation of rape in August 2010, which he denies. The Australian WikiLeaks founder has said he fears he could be transferred to the US to face potential espionage charges arising from WikiLeaks’ publishing activities.

    • The State Department Has Taken Over Three Years On A FOIA Request About How Long It Takes To Process FOIA Requests

      Back in 2013, a young Shawn Musgrave filed a FOIA request with the State Department for its cables regarding former British Prime Minister Margaret Thatcher. To his surprise, he was given an estimated completion date (ECD) of December 2015 — a full 18 months of processing time.

      Curious about where the agency got that oddly specific number from — and with plenty of time on his hands — Shawn filed a follow-up request for any documentation outlining State’s methodology for estimating FOIA completion dates. This is on August 5th, 2013, and he gets an acknowledgement back August 8th, just three days later.

    • On WikiLeaks, Journalism, and Privacy: Reporting on the Podesta Archive is an Easy Call

      For years, WikiLeaks has been publishing massive troves of documents online – usually taken without authorization from powerful institutions and then given to the group to publish – while news outlets report on their relevant content. In some instances, these news outlets work in direct partnership with WikiLeaks – as the New York Times and the Guardian, among others, did when jointly publishing the Iraq and Afghanistan war logs and U.S. diplomatic cables – while other times media outlets simply review the archives published by WikiLeaks and then report on what they deem newsworthy.

      WikiLeaks has always been somewhat controversial but reaction has greatly intensified this year because many of their most significant leaks have had an impact on the U.S. presidential election and, in particular, have focused on Democrats. As a result, Republicans who long vilified them as a grave national security threat have become their biggest fans (“I love WikiLeaks,” Donald Trump gushed last night, even though he previously called for Edward Snowden to be executed), while Democrats who cheered them for their mass leaks about Bush-era war crimes now scorn them as an evil espionage tool of the Kremlin.

  • Environment/Energy/Wildlife/Nature

    • A Mega-Drought Is Coming to America’s Southwest

      Between 1545 and 1548, an epidemic swept through the indigenous people of Mexico that is unlike anything else described in the medical literature. People bled from their face while suffering high fevers, black tongue, vertigo, and severe abdominal pain. Large nodules sometimes appeared behind their ears, which then spread to cover the rest of their face. After several days of hemorrhage, most who had been infected died.

      The disease was named cocoliztli, after the Nahautl word for “pest.” By contemporary population estimates, cocoliztli killed 15 million people in the 1540s alone—about 80 percent of the local population. On a demographic basis, it was worse than either the Black Death or the Plague of Justinian. For several centuries, its origin remained a mystery.

    • What if nature, like corporations, had the rights of a person?

      In recent years, the US supreme court has solidified the concept of corporate personhood. Following rulings in such cases as Hobby Lobby and Citizens United, US law has established that companies are, like people, entitled to certain rights and protections.

      But that’s not the only instance of extending legal rights to nonhuman entities. New Zealand took a radically different approach in 2014 with the Te Urewera Act which granted an 821-square-mile forest the legal status of a person. The forest is sacred to the Tūhoe people, an indigenous group of the Maori. For them Te Urewera is an ancient and ancestral homeland that breathes life into their culture. The forest is also a living ancestor. The Te Urewera Act concludes that “Te Urewera has an identity in and of itself” and thus must be its own entity with “all the rights, powers, duties, and liabilities of a legal person”. Te Urewera holds title to itself.

      Although this legal approach is unique to New Zealand, the underlying reason for it is not. Over the last 15 years I have documented similar cultural expressions by Native Americans about their traditional, sacred places. As an anthropologist, this research has often pushed me to search for an answer to the profound question: What does it mean for nature to be a person?

      A majestic mountain sits not far north-west of Albuquerque, New Mexico. Like a low triangle, with long gentle slopes, Mount Taylor is clothed in rich forests that appear a velvety charcoal-blue from the distance. Its bald summit, more than 11,000 feet high, is often blanketed in snow – a reminder of the blessing of water, when seen from the blazing desert below.

  • Finance

    • Outsourced IT workers ask Feinstein for help, get form letter in return

      A University of California IT employee whose job is being outsourced to India recently wrote Sen. Dianne Feinstein (D-Calif.) for help.

      Feinstein’s office sent back a letter addressing manufacturing job losses, not IT, and offered the worker no assistance.

      The employee is part of a group of 50 IT workers and another 30 contractors facing layoffs after the university hired an offshore outsourcing firm. The firm, India-based HCL, won a contract to manage infrastructure services.

      That contract is worth about $50 million over five years and can be leveraged by other university campuses — meaning they could also bring in HCL if they so choose.

      The affected IT employees, who work at the school’s San Francisco (UCSF) campus, are slated to lose their jobs in February and say they will be training foreign replacements.

    • What Wells Fargo knew

      A Wells Fargo bank manager tried to warn the head of the company’s regional banking unit of an improperly created customer account in January 2006, five years earlier than the bank has said its board first learned of abuses at its branches.

      In recent months, the discovery of as many as 2 million improperly created accounts has widened into a public scandal for Wells Fargo, one of the country’s largest banks by assets. Some lawmakers, including Sen. Elizabeth Warren of Massachusetts and Rep. Roger Williams of Texas, have called for CEO John Stumpf to step down. A letter written in 2005 and obtained by VICE News details unethical practices that occurred at Washington state branches of the bank, suggesting the conduct began years before previously understood.

    • Ex-Wells Fargo worker: Intimidation included no bathroom breaks

      Harassment, intimidation, even bathroom breaks denied. That’s some of the “unconscionable behavior” a former Wells Fargo worker drove five hours to confront a bank executive about.

      Nathan Todd Davis said at a California State Assembly hearing on the Wells Fargo (WFC) fake account scandal that he filed 50 ethics complaints during his decade of working at Wells Fargo — but nothing was ever done.

      “I’ve been harassed, intimidated, written up and denied bathroom breaks,” said Davis, who drove 350 miles from his home in Lodi, California, to speak at the hearing.

    • Ericsson shares in free fall on stock market

      Ericsson shares, which have lost more than half their value in the last 18 months, plunged around 16-18 percent shortly after trading opened in Stockholm, as the company’s warning that its third-quarter profits would significicantly miss target sent shockwaves through the Swedish business community.

      “The forecasts and expectations on Ericsson ahead of the report were low, really low. That they would surprise on the negative side, that comes as a big surprise to me. Especially that it is by so much,” Joakim Bornold, savings economist at Nordnet, told the TT newswire.

      Sales sunk 14 percent between July and September compared to the same period a year earlier, to 51.1 billion kronor ($5.8 billion), Ericsson said in a statement on Wednesday morning.

      Operating income is expected to be 300 million kronor for the third quarter, compared to 5.1 billion in the third quarter of 2015, it said, citing poor demand in developing markets.

    • Facebook tells IRS it won’t pay billions over Irish tax maneuver

      Apple isn’t alone in taking advantage of the US tax system. Facebook also established an overseas subsidiary in Ireland largely for tax purposes—using what is known as the “Double Irish” technique—and named Dublin its base for business outside North America. But the Internal Revenue Service claims Facebook undervalued the move, and the IRS wants the California company to pay $1.7 million in taxes, plus interest, for the year 2010 and possibly subsequent years—an amount that Facebook says could reach billions.

      Facebook, however, told the IRS late Tuesday in a court filing that it shouldn’t have to pay. It’s a tax fight likely to fuel the debate over tax loopholes, which have become a hot-button topic in the presidential race between Hillary Clinton and Donald Trump.

      The social-networking site asked a US Tax Court to reverse the IRS’ conclusion that Facebook undervalued property when it was transferred to Facebook Ireland Holdings Ltd. Not including intellectual property, Facebook assumed a value of roughly $5.8 billion; the IRS claimed nearly $14 billion.

    • The four tensions of Brexit

      The story of Brexit can be set out as four tensions.

      How these tensions are resolved (or not resolved) will determine how (and if) Brexit plays out.

    • German trade bodies back Angela Merkel’s tough stance over Brexit

      Two of the largest German trade associations have come out in support of Angela Merkel taking a firm stance during negotiations over Britain’s exit from the EU, even if it comes at a short-term cost.

      Speaking at a briefing in Brussels, the presidents of the Association of German Chambers of Commerce and Industry (DIHK) and the German Confederation of Skilled Crafts (ZDH) said that granting Britain an opt-out from the four freedoms – free movement of goods, services, capital and persons – could amount to the “beginning of the end” of the single market.

      “You cannot say: ‘I take part on three counts but not on the fourth,’” said the DIHK’s Eric Schweitzer. Untangling the unity of the four freedoms, he argued, “creates the risk that the whole of Europe would fall apart”.

      “The economic consequences would be dramatic. The single market has played an important part in us having growth and prosperity in Europe.”

      Hans Peter Wollseifer, the president of the ZDH, said he agreed with his counterpart from an economic point of view, but warned that the rest of Europe should not let the UK “drift off too far”. The EU had to learn from Brexit, Wollseifer said, and “maybe be a bit more restrained in passing laws and regulations that affect even the smallest business”.

    • Why the Article 50 case may be the most important constitutional case for a generation

      13th October 2016

      Today at the High Court in London the hearing begins of the challenge to the government about whether it can trigger Article 50 instead of Parliament.

      The case is not about whether Article 50 is triggered or not. The case is instead about who makes the decision. Is the decision to be made by the government or by Parliament?

      As a matter of law, the answer is not clear.

      There are outstanding lawyers who in good faith disagree.

      Because there is no exact precedent, the arguments on both sides draw on first principles.

      Nobody can predict with certainty which way the court will go.

      And whichever way the court goes, there will (no doubt) be a “leap-frog” appeal to the Supreme Court, where the case will probably be joined to the similar Northern Irish case (which also covers the Good Friday Agreement). I understand the Scottish government may also intervene at the appeal stage.

      The Supreme Court hearing may take place as early as December, and so this may be over by Christmas. We may know before the end of the year whether, as a matter of domestic law, it is for the government or Parliament to decide.

    • Hacked Emails Show Hillary Clinton Repeatedly Praised Wal-Mart in Paid Speeches

      When a group of labor activists demanded in 2014 that Hillary Clinton use her influence with Wal-Mart — where she sat on the board of directors for six years — to raise workers’ wages, Clinton’s top aides turned to Wal-Mart’s former top lobbyist for advice on how to respond.

      And in a series of highly paid appearances after leaving the State Department, Clinton praised the company’s practices and spoke fondly of its founder in speeches that were kept secret from the public.

      Wal-Mart, America’s largest private employer, has become a top target of progressives because of its aggressive union-busting and notoriously low wages and lack of benefits. But emails documenting a continued warm relationship between Clinton and the massive retailer are among thousands posted by Wikileaks over the past week from Hillary Clinton campaign chairman John Podesta’s gmail account.

      One emailed document is an 80-page list prepared by Clinton’s own research department, detailing the most potentially damaging quotes from the secret speeches. The last four pages are devoted to Wal-Mart.

    • German High Court Paves Way For Government To Sign CETA, Hands Down Conditions

      The German Constitutional Court in a fast-track decision today rejected the granting of emergency injunctions against a German signature of the Comprehensive Economic and Trade Agreement (CETA) of Europe with Canada.

      Four groups with a total of close to 200,000 people (2 BvR 1368/16, 2 BvR 1444/16, 2 BvR 1823/16, 2 BvR 1482/16, 2 BvE 3/16) (English version here) had appealed to the highest German court to stop their government from signing the free trade deal with Canada at a meeting of the European Council of trade ministers on 18 October.

  • AstroTurf/Lobbying/Politics

    • Physically Attacked by Donald Trump – a PEOPLE Writer’s Own Harrowing Story

      In December 2005, PEOPLE writer Natasha Stoynoff went to Mar-a-Lago to interview Donald and Melania Trump. What she says happened next left her badly shaken. Reached for comment, a spokeswoman for Trump said, “This never happened. There is no merit or veracity to this fabricated story.” What follows is Stoynoff’s account.

      “Just for the record,” Anderson Cooper asked Donald Trump, during the presidential debate last Sunday, “are you saying … that you did not actually kiss women without (their) consent?”

      “I have not,” Trump insisted.

      I remember it differently.

      In the early 2000s, I was assigned the Trump beat for PEOPLE magazine. For years I reported on all things Donald.

      I tracked his hit show The Apprentice, attended his wedding to Melania Knauss and roamed the halls of his lavish Trump Tower abode. Melania was kind and sweet during our many chats, and Donald was as bombastic and entertaining as you would expect. We had a very friendly, professional relationship.

      Then, in December 2005, around the time Trump had his now infamous conversation with Billy Bush, I traveled to Mar-a-Lago to interview the couple for a first-wedding-anniversary feature story.

    • Official Who Developed Superdelegate System Offered Clinton Campaign Plan To Dupe Sanders Supporters

      Mark Siegel, a former Democratic Party official, played a key role in drafting the superdelegate provisions, which the party adopted in response to what happened with George McGovern at the 1972 convention. In a Clinton campaign email released by WikiLeaks, he offers the campaign a plan to dupe Bernie Sanders supporters into feeling like they “won” a major superdelegate “reform” at the Democratic National Convention.

      As Siegel highlights, the Democratic Party establishment went against the liberal wing of the party and added party officials. The Democratic National Committee voted on delegate selection rules and made themselves “automatic delegates.”

      “Bernie and his people have been bitching about super delegates and the huge percentage that have come out for Hillary,” Siegel writes. “Since the original idea was to bring our elected officials to the convention ex-officio, because of the offices and the constituencies they represent, why not throw Bernie a bone and reduce the super delegates in the future to the original draft of members of the House and Senate, governors and big city mayors, eliminating the DNC members who are not state chairs or vice-chairs?”

    • Clinton answers written questions under penalty of perjury in email lawsuit

      Hillary Clinton submitted formal answers under penalty of perjury on Thursday about her use of a private email server, saying 20 times that she did not recall the requested information or related discussions, while also asserting that no one ever warned her that the practice could run afoul of laws on preserving federal records.

      “Secretary Clinton states that she does not recall being advised, cautioned, or warned, she does not recall that it was ever suggested to her, and she does not recall participating in any communication, conversation, or meeting in which it was discussed that her use of a clintonemail.com e-mail account to conduct official State Department business conflicted with or violated federal recordkeeping laws,” lawyers for Clinton wrote.

    • If Trump leaks are OK and Clinton leaks aren’t, there’s a problem

      The 2016 presidential campaign isn’t turning out to be the Facebook election, as some people have dubbed it. More than anything else, it’s now the Election Dominated By Leaks.

      In the final month of the race, the Clinton and Trump campaigns’ main attack points now revolve around several major leaks that have put their opposing candidate on the defensive. Both campaigns or their supporters have been actively encouraging leaks about the other side, while claiming leaks involving them are either illegitimate or illegal.

      Either way, it’s yet another example of why leaks are very much in the public interest when they can expose how presidential candidates act behind closed doors – and the motivations of the leakers shouldn’t prevent news organizations from reporting on them.

    • What the WikiLeaks Emails Say About Clinton

      “There is no other Donald Trump,” Hillary Clinton likes to say about her opponent. “This is it.”

      The events of the last two weeks—Trump’s two debate performances, the release of his bawdy comments about women in a 2005 video clip, his lashing out against Republicans who are deserting him—have proven Clinton correct on that count.

      But the leak of thousands of hacked email exchanges among Clinton’s top advisers suggest the same can be said about her—at least in her role as a public figure. They capture a candidate, and a campaign, that seems in private exactly as cautious, calculating, and politically flexible as they appeared to be in public. The Clinton campaign underestimated and then fretted about rival candidate Bernie Sanders, worried about Joe Biden entering the primary race and Elizabeth Warren endorsing her opponent, plotted endlessly about managing Clinton’s image in the press, took advantage of its close ties to the Obama administration and the hierarchy of the Democratic Party, and took public positions to the left of comments Clinton herself made during private paid speeches to Wall Street firms.

    • Before Campaign Ever Launched, Clinton Planned To Support TPP If Elected

      An email published by WikiLeaks from Hillary Clinton’s presidential campaign shows staff carefully tailored her remarks on the Trans-Pacific Partnership (TPP) agreement and fast-track negotiating authority for the trade deal so she could eventually support them if elected president.

      The email comes from Clinton campaign chairman John Podesta’s account, which he says was hacked.

      In March 2015, before she officially launched her campaign, Dan Schwerin, who is a director of speechwriting, sent out a draft letter of planned remarks on trade.

      “The idea here is to use this to lay out her thinking on TPA & TPP ahead of action on the Hill and a joint letter by all the former secretaries of state and defense,” Schwerin stated. “This draft assumes that she’s ultimately going to support both TPA and TPP.”

      “It focuses on what needs to happen to produce a positive result with TPP, and casts support for TPA [fast-track] as one of those steps. It also says that we should walk away if the final agreement doesn’t meet the test of creating more jobs than it displaces, helping the middle class, and strengthening our national security,” Schwerin added.

      Schwerin maintained the remarks spoke directly to “prominent concerns” of labor and Democrats on Capitol Hill, including concerns expressed by Senator Elizabeth Warren.

    • Donald Trump was accused of sexual harassment, assault, or inappropriate behavior 11 times in the past 24 hours

      It was a long Wednesday for Donald Trump. Oct. 12 started off with a revelation from a former Miss Teen USA that Donald Trump would walk in on the show’s teenage contestants while they were changing (something he had actually bragged about doing to Howard Stern), included a series of sexual assault accusations from several different women, and ended with a cringe-worthy video of him joking about dating a young girl.

      These are not the first times Trump has been accused of sexual harassment, assault, or inappropriate behavior.

    • More allegations, questionable Trump comments on women surface

      As Republican nominee Donald Trump’s campaign tries to move past a recently released 2005 tape of his lewd remarks about women, more video of similar comments made by Trump is surfacing.

      In an “Entertainment Tonight” Christmas feature in 1992, Trump looked at a group of young girls and said he would be dating one of them in ten years. At the time, Trump would have been 46 years old.

    • FBI Source: Majority Of Staff On Clinton Case Wanted Her Prosecuted

      The decision at the FBI to not prosecute Hillary Clinton over her mishandling of classified information was solely from the top down, a source told Fox News.

      “No trial level attorney agreed, no agent working the case agreed, with the decision not to prosecute — it was a top-down decision,” said the source who is described as an official close to the Clinton case.

    • “High agitated” Trump shouts at NYT reporter asking him about sex assault claims: “You are a disgusting human being”

      Jessica Leeds, 74, a retired businesswoman, says Trump sexually assaulted her on a plane flight in the early 1980s, forcing her to change seats: “He was like an octopus,” she said. “His hands were everywhere.”

      Rachel Crooks, then a 22-year-old receptionist working in Trump Tower, says he forced a kiss on her in 2005: “It was so inappropriate,” Ms. Crooks recalled in an interview. “I was so upset that he thought I was so insignificant that he could do that.”

    • Two Women Say Donald Trump Touched Them Inappropriately

      Donald J. Trump was emphatic in the second presidential debate: Yes, he had boasted about kissing women without permission and grabbing their genitals. But he had never actually done those things, he said.

      “No,” he declared under questioning on Sunday evening, “I have not.”

      At that moment, sitting at home in Manhattan, Jessica Leeds, 74, felt he was lying to her face. “I wanted to punch the screen,” she said in an interview in her apartment.

      More than three decades ago, when she was a traveling businesswoman at a paper company, Ms. Leeds said, she sat beside Mr. Trump in the first-class cabin of a flight to New York. They had never met before.

      About 45 minutes after takeoff, she recalled, Mr. Trump lifted the armrest and began to touch her.

    • Democrats Say WikiLeaks Is a Russian Front, U.S. Intelligence Isn’t So Sure

      The Hillary Clinton campaign and the Democratic National Committee are publicly accusing WikiLeaks of being a front for the Russian government and an ally in efforts to help elect Donald Trump, but U.S. intelligence officials aren’t so sure.

      On Monday, Clinton’s spokesman called WikiLeaks “a propaganda arm” of the Kremlin and accused the site’s founder, Julian Assange, of “colluding with [the] Russian government to help Trump” by leaking embarrassing emails taken from the Democratic National Committee and from the account of Clinton campaign chair John Podesta. That statement went further than an assessment by U.S. intelligence agencies and the Homeland Security Department last week that stopped short of explicitly naming WikiLeaks as a Russian agent. (It also made no mention of Trump or his campaign.)

      Then, on Tuesday, the interim chair of the DNC tied WikiLeaks to an ongoing campaign to meddle with the U.S. elections. “Our Intelligence Community has made it clear that the Russian government is responsible for the cyberattacks aimed at interfering with our election, and that WikiLeaks is part of that effort,” Donna Brazile said in a statement.

    • WikiLeaks pumps out Clinton emails

      WikiLeaks is trying to take an active role in the presidential election, even as federal intelligence officials are openly speculating that the group has become a mouthpiece for the Russian government.

      The anti-secrecy organization on Tuesday released its third cache of material allegedly stolen from the email account of John Podesta, Hillary Clinton’s campaign chairman.

    • Clinton campaign dubs WikiLeaks ‘Russian propaganda’ after latest hack

      Hillary Clinton’s campaign fired back on Tuesday as WikiLeaks released a new tranche of hacked emails from the account of its chairman, John Podesta, dubbing the website a “propaganda arm of the Russian government” seeking to help elect the Republican nominee, Donald Trump.

      The latest batch of more than 2,000 emails, disclosed on Monday, offered a glimpse into the inner workings of the Clinton campaign. They included insights on multiple fronts, such as a lack of preparedness for Bernie Sanders’ insurgent campaign, concerns raised by Chelsea Clinton over potential conflicts of interest for the family’s foundation, and efforts by aides on how to best frame the former secretary of state’s second bid for the White House.

  • Censorship/Free Speech

    • Upload Filtering Mandate Would Shred European Copyright Safe Harbor
    • The Weird Facebook Politics of Dakota Pipeline Protests

      Yesterday, on Indigenous People’s Day, a group of 27 protesters was arrested at a Dakota Access Pipeline (DAPL) site in North Dakota. One of these people was actress Shailene Woodley, who is known for her role in Divergent, as well as for being a general celebrity.

      Protesters and the Standing Rock Sioux tribe have been peacefully opposing the pipeline over land and water risks, as well as its disturbance of sacred sites. Last month, a federal judge overturned the tribe’s request for an injunction to halt the crude oil pipeline’s construction.

    • Facebook deactivates mother’s account after she posts photo of her breastfeeding stranger’s child

      Facebook disabled a mother’s account after she posted a photo of her breastfeeding a stranger’s child with her own.

      Rebecca Wanosik, from Missouri, uploaded the picture online showing how she helped a mother she had never met after recieving a text message from a friend.

      The baby in question had only ever been breast fed and was refusing a bottle after her mother had been hospitalised.

    • Facebook has repeatedly trended fake news since firing its human editors

      The Megyn Kelly incident was supposed to be an anomaly. An unfortunate one-off. A bit of (very public, embarrassing) bad luck. But in the six weeks since Facebook revamped its Trending system — and a hoax about the Fox News Channel star subsequently trended — the site has repeatedly promoted “news” stories that are actually works of fiction.

      As part of a larger audit of Facebook’s Trending topics, the Intersect logged every news story that trended across four accounts during the workdays from Aug. 31 to Sept. 22. During that time, we uncovered five trending stories that were indisputably fake and three that were profoundly inaccurate. On top of that, we found that news releases, blog posts from sites such as Medium and links to online stores such as iTunes regularly trended. Facebook declined to comment about Trending on the record.

      “I’m not at all surprised how many fake stories have trended,” one former member of the team that used to oversee Trending told the Post. “It was beyond predictable by anyone who spent time with the actual functionality of the product, not just the code.” (The team member, who had signed a nondisclosure agreement with Facebook, spoke on the condition of anonymity.)

    • Facebook still has a nipple problem

      Facebook has come under criticism for censoring a news article on mammograms due to an image of a woman’s exposed breast. The company apologized for removing the post and restored it late Tuesday, though the incident adds to an ongoing controversy over a moderation policy that some have described as sexist.

      The article, published Tuesday by Les Décodeurs, a data-focused website run by the French newspaper Le Monde, reported on a recent government initiative to overhaul mammogram screening in France. Its lead image showed a woman undergoing a mammogram, with one of her nipples exposed. Facebook removed the article shortly after it was posted to Les Décodeurs’ page, apparently because the image of a nipple violated the company’s community standards.

    • We must have the freedom to mock Islam

      How did mocking Islam become the great speechcrime of our times? Louis Smith, the gymnast, is the latest to fall foul of the weird new rule against ridiculing Islam. A leaked video shows Smith laughing as his fellow gymnast, Luke Carson, pretends to pray and chants ‘Allahu Akbar’. Smith says something derogatory about the belief in ‘60 virgins’ (he means 72 virgins). Following a firestorm online, and the launch of an investigation by British Gymnastics, Smith has engaged in some pretty tragic contrition. He says he is ‘deeply sorry’ for the ‘deep offence’ he caused. He’s now basically on his knees for real, praying for pity, begging for forgiveness from the guardians of what may be thought and said.

      The response to Smith’s silly video has been so mad you’d be forgiven for thinking he’d been caught snorting coke or hanging with prostitutes. But all he did was have an innocent laugh at the expense of a global religion. He made light fun of a faith system. That’s not allowed anymore? This was a ‘shock video’, yells the press, as if it were a sex tape. Angry tweeters want Adidas and Kellogg’s to stop using Smith in their ads, as if he’d been exposed as a violent criminal. In truth, he has simply been revealed as having an opinion — a jokey opinion, he insists — about a religion. He faces public ridicule and potential punishment for taking the mick out of a belief system. Whatever happened to the right to blaspheme?

      Smith’s travails confirm the authoritarian impulse behind the desire to stamp out Islamophobia. Campaigners against Islamophobia insist they simply want to protect Muslims from harassment, which is a noble goal. But in truth they often seem concerned with protecting Islam from ridicule. Indeed, Mohammed Shafiq, chief executive of the Ramadan Foundation, says Smith must ‘apologise immediately’ (he did) because ‘our faith is not to be mocked, our faith is to be celebrated’. Excuse me? Mr Shafiq, and a great many other people, should acquaint themselves with the principle of freedom of speech, which absolutely includes the right to mock faiths. Including Islam.

    • Why RedHack challenges Turkey’s political establishment

      In their 20 years of operation, the hacktivist group RedHack has pulled off many high-profile breaches, such as leaking documents from Turkish National Police, penetrating the Turkish army’s Commando Brigade, wiping out electricity bills in protest of a power plant, and defacing milk companies that delivered tainted milk in primary schools.

      But most of their activities go unreported in Turkey’s censored media, which aims to hide the government corruption and incapacity RedHack often reveals.

      The news about their latest leak, a 17GB email archive from Turkey’s Energy Minister and President Recep Tayyip Erdoğan’s son-in-law, Berat Albayrak, is sharing the same fate—this time with the Turkish government’s expanded online censorship powers.

    • Facebook is under fire for censorship again, this time for blocking an image of a mammogram

      Facebook just can’t help itself.

      Less than a month after facing backlash over its censorship of the Vietnam War’s iconic “Napalm Girl” image, the social media giant is now under fire for removing an article published by Les Décodeurs, a data-focused website affiliated with French newspaper Le Monde. The story, about the French government’s efforts to overhaul mammogram-screening in the country, included a lead image of an exposed female breast. The nipple in the photograph apparently violated Facebook’s nudity policy.

    • Europe’s Brilliant Strategy to Defeat ISIS Is…Censorship?

      Let us leave aside for the moment the fact that social media and the internet mean that newspapers trying to control the flow of information on such a topic is utterly futile. Such suggestions are gross insults to ordinary people and demonstrate a remarkable arrogance. They assume that the regular man or woman on the street cannot be trusted with reality; that they are incapable of reading the newspaper (even one as sober as Le Monde) without being whipped up into a frenzy of xenophobia and anti-Muslim feeling.

    • Grabbing Tr**p by the Pussy: Censorship in the Media

      Since the video of Donald Trump bragging about sexually assaulting women was released, news organizations have been questioning whether they should publish exactly what he said word for word, obscenity for obscenity. Ultimately, the words he used and how he used them were newsworthy and news organizations should not water down what he said to avoid publishing profanity.

      Organizations like the New York Times, CNN, Politico, Reuters and NBC News all decided against censoring “pussy,” “bitch,” “tits,” or “fuck.” Other organizations, like the LA Times, decided to use substitute words like “crotch” or “genitals” instead. Some organizations decided to put a dashes in place of most letters of the word. The Washington Post, who broke the story, decided to use the hyphen method. The New York Times who, although it did not initially censor the story, is now using the hyphen too.

    • PINAC’s Executive Director Sues Miami Beach Mayor over Social Media Censorship

      Like most politicians, Miami Beach Mayor Philip Levine campaigned on a platform of promising better transparency to his constituents.

      And like most politicians, he proved to be a liar.

      But unlike most politicians, he is being sued over his broken promise.

    • Australia Senate lifts media censorship rules after 25 years

      The Australian Senate on Thursday lifted tough censorship rules on media coverage of its sessions at the urging of a senator who himself was recently snapped snoozing in the chamber.

      Independent lawmaker Derryn Hinch, who is a former journalist, was caught napping by a photographer in the Senate in August when it sat for the first time after July elections.

      The extraordinary restrictions on press photographers working in the Senate have banned such candid and unflattering pictures for the past 25 years. Senators can be snapped only when they stand to speak.

    • Photography censorship in the Senate lifted after 25-year battle
    • Senate scraps archaic photography ban following 25-year fight for transparency
    • Guantánamo judge approves retroactive censorship of open-court hearings
    • Still A Bad Idea: Gawker Exploring Lawsuit Against Peter Thiel
    • Gawker Looking Into Lawsuit Against Peter Thiel
  • Privacy/Surveillance

    • Bangladesh Introduces ‘Smart’ National Identity Cards

      The NID cards replace existing laminated cards used by the Election Commission, but they have many other functions. Banking, passport details, driving licenses, trade licenses, tax payments, and share trading are among the 22 other services that can be accessed through the cards, with more to follow. The cards will also be associated with an individual’s mobile phone SIM card.

    • Bangladesh Brings In Nationwide Digital Identity Cards Linking Biometrics To Mobile Phone Numbers

      Sadly, it seems that governments in India and Bangladesh are too excited by the prospect of the “efficiencies” such a digital identity framework could in theory offer — to say nothing of the unmatched surveillance possibilities — to worry much about tiresome practical details like the system not working properly for vast swathes of their people.

    • Step aside, Snowden: new theft on the rise
    • What can government contractors do to stop insider threats?
    • NSA contractor thought to have taken classified material the old-fashioned way
    • NSA Contractor Busted In Alleged Theft of Secret Documents
    • What are U.S. officials saying about a potential NSA-CYBERCOM split?

      A number of lawmakers on Capitol Hill are vehemently opposed to severing the dual-hat position between the director of the National Security Agency and commander of US Cyber Command.

      What are the prospects that the NSA and CYBERCOM will split in the final months of President Barack Obama’s final term?

    • Google and Facebook are building the fastest trans-Pacific cable yet

      Google and Facebook are teaming up to build a 120 Terabits per second (Tbps) submarine cable that will connect Los Angeles with Hong Kong. The two companies are working with Pacific Light Data Communication — a wholly owned subsidiary of China Soft Power Technology that’s relatively new to the sub-sea cable game.

      Once the new 12,800 km cable is at full capacity, it’ll be the highest-capacity trans-Pacific cable yet. Until now, that record was held by the FASTER cable, which Google also has a stake in.

    • Examining Yahoo’s nightmare vision of ‘smart’ billboards

      On October 6th, when the company frankly had bigger PR problems to worry about, Yahoo filed a patent application for a smart billboard – a poster hoarding which proposes using an array of privacy-invading tools to deliver targeted ads to passers-by or motorists.

      Anyone who has seen the 2002 SF epic Minority Report will find the concept familiar, and perhaps rather chilling – in it we see the central protagonist trying to blend into a shopping mall while ‘smart’ advertisements call out to him by name, in a public context where no anonymity is available.

      The billboard proposed is very smart indeed – a real-world analogue of the very personalised ad-targeting which has become so controversial in the past couple of years, yet with no analogous technological remedy, such as adblocking software provides online. The systems envisaged would use an array of data-exploiting techniques and technologies to personalise the ambient advertising experience, including cell-tower location data, facial recognition, and vehicle and license-plate recognition. The scheme proposes many sensors, including drone-based cameras, to facilitate this level of targeting.

  • Civil Rights/Policing

    • Iranian child bride to be executed within days after ‘grossly unfair trial’

      Amnesty International has urged the Iranian authorities to halt the execution of a 22-year-old woman accused of murdering her husband at the age of 17.

      Zeinab Sekaanvand is due to be executed by hanging as soon as Thursday 13 October, after what Amnesty International has described as a “grossly unfair trial”.

      Ms Sekaanvand was arrested on February 2012 for the murder of her husband, whom she married at the age of 15.

    • European jails are ‘breeding ground’ for militants warns report

      Europe’s prisons have become a “breeding ground” for Islamic State and Al-Qaeda militants, with a report finding almost two thirds of European “jihadists” were previously involved in violent crime.

      The report, released by the International Centre for the Study of Radicalisation (ICSR) at London’s King’s College, warned of the development of a “new crime-terror nexus” in which criminal networks in prisons and in communities gave way to recruitment into militant groups. Prisons, in particular, are a major hub for such groups.

      “Prison is becoming important as a place where a lot of networking happens,” said Peter Neumann, director of the ICSR and co-author of the report.

      “Given the recent surge in terrorism-related arrests and convictions… we are convinced that prisons will become more – rather than less – significant as breeding grounds for the jihadist movement.”

      The generation who have gone to join IS is, in contrast to previous generations, heavily drawn in Europe from criminal backgrounds. The report, which is drawn from profiles of 79 recent European militants found that 57 percent of them had previously been incarcerated and that 65 percent had been involved in violent crime.

      This contrasts with previous generations of Islamic militants who were recruited from religious establishments or universities and often came from relatively well-established middle-class families.

    • Self-Driving Mercedes Will Prioritize Occupant Safety Over Pedestrians

      The technology is new, but the moral conundrum isn’t: A self-driving car identifies a group of children running into the road. There is no time to stop. To swerve around them would drive the car into a speeding truck on one side or over a cliff on the other, bringing certain death to anybody inside.

      To anyone pushing for a future for autonomous cars, this question has become the elephant in the room, argued over incessantly by lawyers, regulators, and ethicists; it has even been at the center of a human study by Science. Happy to have their names kept in the background of the life-or-death drama, most carmakers have let Google take the lead while making passing reference to ongoing research, investigations, or discussions.

    • After A Sensitive Story, A Pakistani Journalist Is Barred From Leaving

      Cyril Almeida has a reputation for being one of Pakistan’s most astute political observers. His columns for the venerable English-language Dawn newspaper are widely read by South Asia-watchers. More than 100,000 people follow him on Twitter.

      So it was inevitable that the decision by the Pakistani government to ban him from leaving the country would be met with widespread indignation.

    • Finalists named for EU’s Sakharov Prize

      Last year’s winner was Saudi blogger Raif Badawi.

    • University Of Michigan Gets Lost In The Tall SJW Weeds

      The University of Michigan, my alma mater, will spend $85 million on “diversity” efforts over the next five years, including a disturbing cultural sensitivity program that will monitor students’ progress in being indoctrinated.

    • Asia Bibi blasphemy case to be heard by Pakistan supreme court

      The most notorious cases involving Pakistan’s blasphemy laws will be heard by the country’s supreme court on Thursday in a legal showdown that lawyers hope will spare the life of a poor Christian woman and curb future convictions.

      Asia Bibi was sentenced to death in 2010 for allegedly insulting the prophet Muhammad following a bad-tempered argument with Muslim women in Itanwali, the small village in Punjab where she used to live.

      She became a touchstone for liberals and Islamists alike after her case was linked to the assassination in January 2011 of Salmaan Taseer, then governor of Punjab.

    • The Social Media Revolution to Save Asia Bibi – Abolish Blasphemy Laws

      72 hours remain until Asia Bibi’s final appeal to overcome her death sentence for blasphemy in Pakistan. It is imperative that people act now! You can help save this innocent woman by simply posting on social media. I know that for many this assertion sounds far-fetched, but it is a fact. A 2012 study published in the journal Nature, “A 61-Million-Person Experiment in Social Influence and Political Mobilization,” tested the idea that voting behaviour can be significantly influenced by messages on Facebook. Further, The Centre for European Studies released a publication entitled, ‘Social Media – The New Power of Political Influence’, in which the authors demonstrated the power of social media on global politics, evincing the dramatic impact of social media on the 2008 US presidential election, the 2011 Egyptian Revolution, among various other global events. Social media’s power to influence governmental decision making may also be implied by the efforts of certain governments to limit its citizens access to it. During Obama’s visit to Vietnam in May of this year (2016), the Vietnamese government blocked its citizen’s access to Facebook in a bid to silence human rights activists who might have embarrassed the government. It should come as no surprise that Pakistan was ranked the 10th worst country for internet censorship in 2014 by Freedom House. In their report they stated:

    • Iranian vice president faces calls to resign over claims she shook hands with male politician

      Iranians have called for their vice president to stand down after it was wrongly claimed she had shaken hands with a male politician.

      State broadcasters indicated Masoumeh Ebtekar had shaken hands with a male minister at a meeting, triggering a furore.

      Instead, she met German female environment minister, Barbara Hendriks, who was wearing a suit and had short hair.

    • Pigs can’t fly – Qantas bans pork on in-flight menu to respect Islam

      QANTAS has removed pork from its in-flight menu on flights to and from Europe as a result of its partnership with Middle Eastern airline Emirates.

      No food containing pork or pork products will be served on those flights – which now has a stopover in Dubai – because it is strictly forbidden in Islam and is considered “unholy”.

      All meals offered on the route in first, business and economy classes will also be prepared without alcohol in keeping with the Islamic religion. A note on the Qantas menus on flights in and out of Dubai states that the meals do not contain pork products or alcohol. The airline has also introduced a mezze plate offering traditional Middle Eastern fare in its upper classes and has Arabic translations after in-flight announcements.

    • Attorney, family rebuke DA’s decision in tasing death

      The attorneys representing the family of Chase Sherman criticized the Coweta district attorney’s decision not to press charges in Sherman’s death at a press conference held Wednesday.

      Attorney Chris Stewart called it “one of the most horrible decisions” he had ever seen a district attorney make.

    • Car Attacks in Denmark Spread ‘Like an Infection’

      The arsonists appear to operate with little deference to class, equally at ease scorching a shiny new BMW or Mercedes as they are setting a battered old van ablaze.

      And they almost always follow a pattern — smashing a window and dousing the interior of the vehicle with gasoline before setting it on fire.

      At least 185 cars have been set ablaze in Copenhagen, the Danish capital, so far this year, the police say, with a sudden and mysterious increase over the past two months or so, when about 80 automobiles were burned.

      [...]

      Even after the Danish police arrested a 21-year-old man in August in relation to the arson, cars continued to burn. Mr. Moller Jensen said that both of the men who were arrested came from a working-class neighborhood in Amager, a Danish island. Playing down the idea that the burnings could be related to immigration, he said that one suspect was an ethnic Dane, while the other was not.

      Mr. Moller Jensen said the car burning may have spread from neighboring Sweden, where more than 70 cars have been burned in the city of Malmo since early July. Dozens of cars have also been set on fire in Stockholm, and Goteborg, on the west coast of the country. Car burning has become such a scourge there that the Swedish authorities have turned to drones to try to catch the arsonists.

    • “Do Not Resist”: The Police Militarization Documentary Everyone Should See

      On a sunny afternoon last summer, Craig Atkinson, a New York City-based filmmaker, stood in a front yard in South Carolina surrounded by several heavily armed police officers.

      The officers, members of the Richland County Sheriff’s Department tactical team, were descending on a modest one-story house looking for drugs and guns. The team smashed through the windows of the home with iron pikes, then stormed the front door with rifles raised.

      Inside, they found a terrified family of four, including an infant. As the family members were pulled outside, Atkinson’s camera captured a scene that plays out with startling regularity in cities and towns across the country, one of many included in his new documentary, “Do Not Resist,” an examination of police militarization in the United States.

    • Turkish Prisons Are Filled With Professors — Like My Father

      A Turkish professor who was my father’s colleague and frequently visited our house is now incapable of counting right amount of money to pay for a bottle of water at a prison canteen. He is traumatized as a result of days of harsh treatment during the interrogation. He is sharing a prison cell with my father, longtime friends, in western Turkey.

      My father, a professor at Sakarya University for 16 years, is among nearly 2,500 academics who were dismissed and arrested in connection to the failed coup attempt on July 15. He would have never imagined that police would storm our house, just several days after the failed plot, and take him into custody. He was asked endless questions in 10 days under detention, for hours every day — questions that he has no answers for. He was rounded up just four days after Turkish President Recep Tayyip Erdogan signed a state of emergency rule that allows anyone to be detained up to 30 days without any charges. Turkey suspended European Convention on Human Rights and International Covenant on Civil and Political Rights and there is no due process in a country that is still seeking to become a member of the European Union.

    • Hate crimes soared after EU referendum, Home Office figures confirm

      The number of hate crimes leaped by 41% in the month after the vote to leave the European Union, new Home Office statistics confirm.

      A daily breakdown of the hate crime offences reported to the police showed the number of incidents doubled in the days after the referendum. The level peaked at 207 incidents on 1 July, twice as many as before the vote, when the level was already unusually high.

      In July, there were 5,468 hate crimes – 41% higher than July 2015. A Home Office report on the data noted that the “sharp increase” in hate crime was not replicated in equivalent offences at the time.

    • After Torture, Ex-Detainee Is Still Captive of ‘The Darkness’

      At first, the Americans seemed confused about Suleiman Abdullah Salim. They apparently had been expecting a light-skinned Arab, and instead at a small airport outside Mogadishu that day in March 2003, they had been handed a dark-skinned African.

      “They said, ‘You changed your face,’” Mr. Salim, a Tanzanian, recalled the American men telling him when he arrived. “They said: ‘You are Yemeni. You changed your face.’”

      That was the beginning of Mr. Salim’s strange ordeal in United States custody. It has been 13 years since he was tortured in a secret prison in Afghanistan run by the Central Intelligence Agency, a place he calls “The Darkness.” It has been eight years since he was released — no charges, no explanations — back into the world.

      Even after so much time, Mr. Salim, 45, is struggling to move on. Suffering from depression and post-traumatic stress, according to a medical assessment, he is withdrawn and wary. He cannot talk about his experiences with his wife, who he says worries that the Americans will come back to snatch him. He is fearful of drawing too much attention at home in Stone Town in Zanzibar, Tanzania, concerned that his neighbors will think he is an American spy.

    • Ethiopia has finally admitted to the deaths of more than 500 anti-government protestors

      After almost a year of anti-government protests, Ethiopia on Tuesday (Oct. 11) admitted that the death toll from police crackdowns and deadly stampedes could exceed more than 500 people. The admission came a few days after the government declared a country-wide six-month state of emergency, and blamed external forces for trying to break up the nation of over 100 million people.

      Hailemariam Desalegn, the country’s prime minister, said that the death toll in Oromia region had been at least 170, while another 120 died in Amhara since the demonstrations began. But “when you add it up it could be more than 500,” he said. Activists and opposition groups have disputed these numbers in the past, arguing that more people died when security officers dispersed demonstrations.

    • Study Says Body Cameras Can Reduce Force Usage… But Only If Officers Turn Them On

      A couple of months ago, a study was released claiming to show a link between body camera use and a rise in shootings by officers. The small increase in shootings in 2015 — an increase that wasn’t shown in 2013 and 2014 — could be nothing more than a normal deviation, but it was portrayed by the authors as something a bit more sinister.

      [...]

      Accountability tools are only as good as the departments deploying them. Very few officers are punished for treating their cameras as optional — something that only needs to be activated when capturing interactions that are innocuous or show the officers in their best light.

      It’s a persistent problem that predates body cameras. Dash cams and body mics are still routinely disabled by officers even though these two recording methods have been in use for dozens of years. Officers who haven’t been punished for thwarting these accountability tools aren’t going to change their ways just because the camera is now on their body. And more recent additions to the workforce aren’t going to need much time on the job to figure out that failing to capture footage of use of force incidents will have almost zero effect on their careers.

      Obviously, it would be impossible to remove all control from officers wearing cameras. But there are steps that can be taken to reduce the number of times use of force incidents occur without anyone “seeing” them. In edge cases, the lack of footage — especially if everything else that day was captured without difficulty — should weigh heavily against officers when investigating use of force incidents. If an officer has the capability to capture footage of a disputed incident but doesn’t, the burden of proof should shift to the officer, rather than the person making the complaint.

      If police departments don’t want to see themselves targeted with more possibly frivolous complaints and lawsuits, they need to ensure officers whose cameras routinely “malfunction” or aren’t activated are held accountable for their refusal to maintain a record of their interactions with citizens. Law enforcement’s history with older forms of recording technology is exactly spotless. Granting officers the benefit of a doubt with body cams is nothing more than the extension of unearned trust — a gift law enforcement agencies seem to give themselves repeatedly.

    • Court Says Deleting Browser History To ‘Avoid Embarrassment’ Isn’t Destruction Of Evidence

      The court found that the documents central to the lawsuit were not affected by Moyse’s actions. They were available through Dropbox accounts and forensic examiners found no evidence Moyse had ever transferred the documents to his personal Dropbox account. In addition, they found the last time he accessed his account predated his work on the disputed documents.

      As for Moyse, his attempt to keep his access of porn sites under wraps backfired. He may have been cleared of evidence spoliation accusations, but his personal web browsing habits still made it into the public record — albeit without the excruciating level of detail that would have been present if he hadn’t thought to scrub his browsing history before turning over the computer.

  • Internet Policy/Net Neutrality

    • A decentralized web would give power back to the people online

      Recently, Google launched a video calling tool (yes, another one). Google Hangouts has been sidelined to Enterprise, and Google Duo is supposed to be the next big thing in video calling.

      So now we have Skype from Microsoft, Facetime from Apple, and Google with Duo. Each big company has its own equivalent service, each stuck in its own bubble. These services may be great, but they aren’t exactly what we imagined during the dream years when the internet was being built.

      The original purpose of the web and internet, if you recall, was to build a common neutral network which everyone can participate in equally for the betterment of humanity. Fortunately, there is an emerging movement to bring the web back to this vision and it even involves some of the key figures from the birth of the web. It’s called the Decentralised Web or Web 3.0, and it describes an emerging trend to build services on the internet which do not depend on any single “central” organisation to function.

    • Facebook Wants To Bring Controversial Zero Rated ‘Free Basics’ Service To The States

      Last year the Indian government forged new net neutrality rules that shut down Facebook’s “Free Basics” service, which provided a Facebook-curated “light” version of the internet — for free. And while Facebook consistently claimed its program was simply altruistic, critics (including Facebook content partners) consistently claimed that Facebook’s concept gave the company too much power, potentially harmed free speech, undermined the open nature of the Internet, and provided a new, centralized repository of user data for hackers, governments and intelligence agencies.

      In short, India joined Japan, The Netherlands, Chile, Norway, and Slovenia in banning zero rating entirely, based on the idea that cap exemption gives some companies and content a leg up, and unfairly distorts the inherently level internet playing field. It doesn’t really matter if you’re actually altruistic or just pretending to be altruistic (to oh, say, lay a branding foundation to corner the content market in developing countries in 30 years); the practice dramatically shifts access to the internet in a potentially devastating fashion that provides preferential treatment to the biggest carriers and companies.

    • Facebook is talking to the White House about giving you ‘free’ Internet. Here’s why that may be controversial.

      Facebook has been in talks for months with U.S. government officials and wireless carriers with an eye toward unveiling an American version of an app that has caused controversy abroad, according to multiple people familiar with the matter.

      The social media giant is trying to determine how to roll out its program, known as Free Basics, in the United States without triggering the regulatory scrutiny that effectively killed a version of the app in India earlier this year. If Facebook succeeds with its U.S. agenda for Free Basics — which has not been previously reported — it would mark a major victory for the company as it seeks to connect millions more to the Web, and to its own platform.

  • DRM

    • Netflix Now Only Has 31 Movies from IMDB’s Top 250 List

      My wife and I popped a bottle of wine on a Friday night last month. It was movie night in our house, which typically means surfing the iTunes movie catalog on our Apple TV until we find something that’s rent-worthy.

      There was plenty to pick from, but nothing that grabbed our attention. Maybe next month. Our next stop? The Netflix app.

      But we noticed Netflix’s movie selection is rather… bare? Uninteresting? My wife actually said, “I haven’t heard of any of these movies. Aren’t there any good movies on here?”

  • Intellectual Monopolies

    • Appeal dismissed in pregabalin patent case

      The England & Wales Court of Appeal has upheld Mr Justice Arnold’s finding that key claims of Warner-Lambert’s patent for Lyrica are invalid for insufficiency. The judgment also reiginites the debate over the scope of second medical use patents

    • Copyrights

      • Backup copies of software can’t be re-sold, rules top EU court

        The initial buyer of software that comes with an unlimited user licence may resell that copy and the licence, Europe’s top court has ruled—however, where the original physical medium has been damaged, destroyed, or lost, a tangible backup copy mustn’t be sold in its place.

        The case considered by the the Court of Justice of the European Union (CJEU) concerned two Latvian nationals, who were alleged to have sold thousands of copies of Microsoft products in an online marketplace in 2004.

        The court said: “It is estimated that they sold more than 3,000 copies of programs and the material damage caused to Microsoft by the activities of Mr Ranks and Mr Vasiļevičs has been evaluated at €265,514.”

        The criminal law division of the Riga regional court in Latvia, which is hearing the case, asked the CJEU for its opinion on a specific issue that had arisen: whether the acquirer of a backup copy of a program, stored on a non-original medium, could re-sell that copy if the original had been damaged, and the initial acquirer no longer possessed or used the program.

      • A Weekend Full Of The NFL Violating Its Own Social Media Video Content Rules

        Ok, so what do we make of this? Well, as with many things to do with the NFL, the takeaways are both good and bad. The good is that the NFL clearly understands that video content blackouts are a thing of the past and that such content is a great driver for ratings, and not the opposite. But the bad is that the NFL seems to think that a top-down approach to controlling such content is the best approach to targeting viewers.

        And that’s just dumb. Not only dumb, in fact, but demonstrably silly. As I mentioned in the original post, the markets that host NFL teams are wildly diverse, from major markets like New York and Chicago — and now Los Angeles –, to relatively tiny markets like Green Bay and Charlotte. A one-size-fits-all marketing approach never made sense for NFL teams, but before the days of digital media there wasn’t a great deal in terms of diversity that could be achieved. But in the social media age? Marketing can be targeted and approached in a way tailored to specific fan-bases and markets. Why in the world would the NFL think that it had a better handle than each individual team, all of which employ their own social media managers, as to how to best drive viewership and attendance?

      • CJEU clarifies copyright exhaustion in Microsoft case

        The acquirer of a copy of a computer program may not provide their legitimate back-up copy to a new acquirer without the copyright holder’s permission, the CJEU has ruled

        [...]

        Article 4 of the Directive grants the copyright holder the right to do or authorise permanent or temporary reproduction of a computer program. But it provides that the first sale in the EU of a copy of a computer program exhausts the distribution right, except for the right to control further rental of the program or a copy.

      • Tell the Copyright Office: Copyright Law Shouldn’t Punish Research and Repair

        After eighteen years, we may finally see real reform to the Digital Millennium Copyright Act’s unconstitutional pro-DRM provisions. But we need your help.

        In enacting the “anti-circumvention” provisions of the DMCA, Congress ostensibly intended to stop copyright “pirates” from defeating DRM and other content access or copy restrictions on copyrighted works and to ban the “black box” devices intended for that purpose. In practice, the DMCA anti-circumvention provisions haven’t had much impact on unauthorized sharing of copyrighted content. Instead, they’ve hampered lawful creativity, innovation, competition, security, and privacy.

        In the past few years, there’s been a growing movement to reform the law. As locked-down copyrighted software shows up in more and more devices, from phones to refrigerators to tractors, more and more people are realizing how important it is to be able to break those locks, for all kinds of legitimate reasons. If you can’t tinker with it, repair it, or peek under the hood, then you don’t really own it—someone else does, and their interests will take precedence over yours.

      • New Anti-Piracy Unit Takes Over UK Anti-Camming Operations

        Those thinking about camming movies in a UK cinema have a fresh adversary to contend with. A new anti-piracy unit called the Film Content Protection Agency has just been launched with a mission to prevent people recording first-run movies. Unfortunately, the unit is already citing misleading legal information on its website.

      • Torrent admin spared jail as Swedish court baulks at industry demands

        A COURT IN SWEDEN has taken a less than heavy line on the administrator of a popular torrent site by resisting prosecution demands for a jail sentence and handing out community service and a fine instead.

        It’s a big fine at kr1.7m (about £157,000), and a large amount of the unnamed admin of the SwePiracy site’s time will now be spent clearing up canal banks and jet spraying graffiti, but it is not jail.

        TorrentFreak reported that the 25-year-old was found in charge of the local piracy site and ended up in a lot of trouble with an anti-piracy group that used to be called Antipiratbyrån but is now called the Rights Alliance.

10.12.16

Links 12/10/2016: Ansible Galaxy is Free Software, FreeBSD 11 Released

Posted in News Roundup at 1:45 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • The 5 most common support issues for open source developers

    What is the number one factor that software developers consider when choosing which open source software packages to use? A recent survey conducted by Rogue Wave Software says support. What is the second most important factor? Who will carry the burden of providing that support.

    Between developers, a dedicated internal open source software (OSS) support team, an internal IT department, and contractors (or an OSS support vendor) an unsurprising 67% of developers in the survey said they are expected to be responsible for support. We also analyzed 34,000 internal support requests to glean additional insights.

  • MOD Duo: Building an open source guitar stomp box

    Some time ago the MOD Duo jumped onto my radar. In a nutshell, it is a guitar stomp box that comes loaded with different effects and sounds. Instead of buying the multitude of guitar pedals that many musicians string together in complex, if somewhat beautiful ways, the MOD Duo negates all that. It is a single box and what’s more, it is powered by open source.

  • 27 Open Source DevOps Tools In 7 Easy Bites

    I recently wrote an article featuring 25 DevOps vendors worth watching. However, in the world of DevOps, there are an awful lot of good tools that don’t really have a vendor attached, and I thought it was time to give the open source tools their due.

    While I wrote that there are tools that don’t have vendors, there are vendors that are attached to some of these open source tools. Those vendors provide development support, along with, in some cases, customer support and even proprietary versions of some of the tools that exist alongside their open source cousins. As long as there was an open source version that wasn’t “crippleware,” it was eligible for the cut.

  • Apache Milagro: A New Security System for the Future of the Web

    With 25 billion new devices set to hit the Internet by 2025, the need for a better worldwide cryptosystem for securing information is paramount. That’s why the Apache Milagro project is currently incubating at the Apache Software Foundation. It’s a collaboration between MIRACL and Nippon Telegram and Telegraph (NTT), and Brian Spector, MIRACL CEO and Co-Founder, discussed the project in his keynote at ApacheCon in May.

    Spector said the project was born in a bar on the back of a napkin after a brainstorm about how one would rebuild Internet security from the ground up. That sounds like a lot of work, but Spector believes it’s absolutely necessary: the future of the Web is going to be very different from the past.

  • Flanders to publish soil erosion monitoring tool

    The new method, now used by 5 soil erosion specialists, is based on well-known open source Geographic Information Systems (GIS) tools, including the data viewing tool QGis and the Geospatial Data Abstraction Library. “QGis is the perfect platform for building GIS applications”, Huybrechts said at the FOSS4G 2016 conference in Bonn last August. “It’s open source, it is supported by a great community and it comes with a collection of tools and toolkits.”

  • DE radiation protection agency overcomes lock-in

    Germany’s Federal Office for Radiation Protection (Bundesamt für Strahlenschutz, BfS) is taking steps to rid itself of IT vendor lock-in. Within the next few years, it plans to have replaced its legacy proprietary analysis and reporting tools by modern, open source-based tools. Moreover, the new system, which is being tested, will improve the geographic information capabilities, and will lower costs significantly.

    The radiation protection agency was in set up in 1989, three years after the catastrophic nuclear accident in Chernobyl. Its main task is to protect population and environment from damages due to radiation.

    To help with decision-making and with generating of reports, the BfS’ crisis unit has for years been using a customised, proprietary software solution. This ‘Integrated Measuring and Information System’ (IMIS) lets BfS make sense of the data generated by some 1800 radiation measuring stations across the country. IMIS continuously monitors the environment and is able to detect small changes in radioactivity. Its results are merged, evaluated, refined and presented in well-arranged documents.

  • Pieter Alexander Hintjens: 3 December 1962 – 4 October 2016

    After a long and painful illness, a battle with cancer over the last six years, my brother has died in Brussels, aged only 53.

    My love for him has always been the adoring, muted kind that looked up to the light he shone, that basked in his enthusiasm and tried, and failed, to keep up with the thousand-and-one ideas he gave voice and form to. Many of his passions were beyond my comprehension but very real, nevertheless. As a computer programmer, writer of internet protocols and founder of on-line communities, his interests went way over my head. As an author, latterly, we connected and I was able to collaborate with him on one of his books – The Psychopath Code – an involvement for which I am profoundly grateful: Not only has this particular book helped me to navigate a few tricky moments in my own life, but the understanding we shared was like coming home.

    I can’t begin to do justice to my brother’s legacy as a professional innovator, thinker, and networker. Pieter was one of these rare people totally unafraid to take chances, to think not just outside the box but into the next universe. How he maintained his enthusiasm and energy, where his inspiration came from, I shall not know in this lifetime.

    His death last Tuesday has opened up a hole in my life, a tear in the fabric of my normal. Poignantly – and painfully – it is only as his legacy becomes clearer that I notice the loss of his quiet, determined contribution in my life. Always, in the background, he encouraged me, supporting my modest hopes for an ordinary life: my ambitions to study, to write, to marry and have a child. In all these attempts he was unwaveringly supportive, while seeking so little from me in return. Of course, elder brothers are looked up to, and often expected to take the lead. But lately, in these last few years, while he faced pain and uncertainty – about which he has written so candidly on his blog – while he battled fear and the shadows of disappointment with his trademark wry humour, he faced these challenges fearlessly and with a fiery determination that is frankly awe-inspiring.

  • Software AG Launches Open Source Internet of Things Analytics Kit

    Software AG (Frankfurt TecDAX: SOW) has significantly expanded the capabilities of its Apama Community Edition with a new Internet of Things (IoT) Analytics Kit, provided free of charge as Open Source Software under the Apache License, v2.0, along with the ability to run on Raspberry Pi. A different version of Apama Community Edition is also now available as a re-distributable runtime.

  • PhatWare Releases WritePad Handwriting Recognition Engine as Open Source

    PhatWare Corporation, a leading professional software and application developer, is pleased to announce that the entire source code of its award-winning, multilingual WritePad handwriting recognition engine is now available under GPL v.3 license.

  • Events

    • Announcing Google Code-in 2016 and Google Summer of Code 2017

      The Google Open Source Programs Office has announced Google Code-in 2016 and Google Summer of Code 2017. Google Code-in is for students from 13-17 years of age who would like to explore open source. “Students will find opportunities to learn and get hands on experience with tasks from a range of categories. This structure allows students to stretch themselves as they take on increasingly more challenging tasks.” Students will begin on November 28.

  • Web Browsers

    • Mozilla

      • Maker Party 2016: Stand Up for a Better Internet

        Each year, Mozilla hosts a global celebration to inspire learning and making online. Individuals from around the world are invited. It’s an opportunity for artists to connect with educators; for activists to trade ideas with coders; and for entrepreneurs to chat with makers.

        This year, we’re coming together with that same spirit, and also with a mission: To challenge outdated copyright laws in the European Union. EU copyright laws are at odds with learning and making online. Their restrictive nature undermines creativity, imagination, and free expression across the continent. Mozilla’s Denelle Dixon-Thayer wrote about the details in her recent blog post.

  • SaaS/Back End

    • Cloudera Accelerates Portfolio of Self-Paced Big Data Training Courses
    • Survey Finds OpenStack Deeply Entrenched in the Telecom Space

      What percentage of players in the telecom industry now consider the OpenStack cloud platform to be essential or important to their success? According to a survey commissioned by the OpenStack Foundation, a whopping 85.8 percent of them do. That is more hard evidence that we are seeing actual deployments take the place of evaluation when it comes to OpenStack in the enterprise.

      The survey was executed by Heavy Reading and received 113 responses from representatives of telecom companies around the world: 54 percent from the US, 14.2 percent from Europe, 11.5 percent from the Asia Pacific region, 8.9 percent each from Central/South America and Canada; and 2.7 percent from the Middle East. Here are more of the key findings.

    • Recognizing active user contributors to OpenStack

      Within the OpenStack community, there are countless people conducting tests, maintaining infrastructure, writing documentation, organizing community events, providing feedback, helping with project promotion, and countless other roles that may or may not show up under the traditional list of contributors. Since a fundamental tenant of OpenStack is that much of the project’s governance comes from its active contributors, finding a way to expand the types of contributions that are “officially” recognized is an important step in bringing everyone’s voice to the table.

    • How to succeed as a remote documentation contributor in OpenStack

      Alexandra Settle, an information developer at Rackspace, will be speaking at OpenStack Summit in Barcelona. Alexandra is a core reviewer for OpenStack manuals, also working on the OpenStack Ansible and Swift project documentation, and serves as a mentor in documentation for the Outreachy project. She’s been interested in information technology since high school and is a fan of Fedora Linux. She began her career as an intern at Red Hat and after spending years using Windows machines, and love the ease of use and functionality that came with using Linux.

  • Databases

    • Couchbase and the future of NoSQL databases

      Well, I’ve built and led developer communities for 10+ years at Sun, Oracle, and Red Hat, so I have experience in leading crossfunctional teams to develop and execute strategy, planning, and execution of content, and marketing campaigns and programs. I’ve also led engineering teams at Sun, and I’m a founding member of the Java EE team.

      At Couchbase, a developer advocate helps developers become effective users of a technology, product, API, or platform. This can be done by sharing knowledge about the product using the medium where developers typically hangout. Some of the more common channels include blogs, articles, webinars, and presentations at conferences and meetups. Answering questions on forums and Stack Overflow, conversations on social media, and seeking contributors for open source projects are some other typical activities that a developer advocate performs on a regular basis.

  • Pseudo-Open Source (Openwashing)

    • Facebook Yarn’s for your JavaScript package

      Facebook, working with Exponent, Google, and Tilde, has released software to improve the JavaScript development experience, which can use all the help it can get.

      Yarn, introduced on Tuesday under a BSD license and without the patent clause that terminates Facebook’s React license for those involved in patent litigation against the company, is an alternative npm client. It’s not to be confused with Apache Hadoop YARN (Yet Another Resource Negotiator), which is cluster management software.

  • BSD

  • Public Services/Government

    • Russia’s Preference for Open-Source to Hurt U.S. Tech Stocks

      Amid rising political tensions with the U.S., Russia is planning to further lower its usage of licensed software from IT giants like International Business Machines Corp IBM , Microsoft Corporation MSFT , SAP AG SAP and Oracle Corporation ORCL .

      Per Bloomberg, “The State Duma, Russia’s lower house of parliament, is drafting a bill to restrict government agencies from buying licensed software, giving preference to open-source software.”

      The proposed law is an addition to an already existing federal law that came into effect on Jan 1, 2016, which restricts the use of foreign software in the public sector, if there is a domestic version available.

  • Openness/Sharing/Collaboration

    • Paediatric Cancer Drug Being Developed Entirely In The Open

      The Medicines for Malaria Venture (MMV) has posted a Malaria Box, containing over 400 compounds that might be effective against malaria to almost 200 research groups in two years. It’s an open science project, because the only stipulation is that information is deposited in the public domain (and therefore cannot be patented).

      GlaxoSmithKline (GSK)’s Open Lab project, the Tres Cantos Medicines Development Campus near Madrid, Spain, enables visiting scientists to use GSK’s high-tech facilities to research neglected diseases such as malaria and TB.

      Even Bill Gates has tweeted that open-source collaboration between scientists could become a drug discovery catalyst.

      Now, one scientist is embarking upon a virtual pharmaceutical company that will develop a paediatric cancer drug in the open.

    • Open Hardware/Modding

      • Shendy: A Low Cost Arsenic Detector for Drinking Water

        If you are designing life-saving tech to help refugees living in refugee camps, you’re probably not going to design a proprietary product, because doing so would be tantamount to signing the death warrant of a percentage of the refugee camp residents. Open source is how the most number of refugees can be helped. In that vein, learn about an initiative to design a low-cost. open source arsenic detector for use in ensuring safe drinking water in refugee camps.

  • Programming/Development

    • The State Of JavaScript

      Depending on who you ask, right now JavaScript is either turning into a modern, reliable language, or a bloated, overly complex dependency hell. Or maybe both?

      What’s more, there’s just so many options: Do you use React or Angular 2? Do you really need Webpack? And what’s this month’s recommended way of dealing with CSS?

    • A Javascript journey with only six characters

      Javascript is a weird and wonderful language that lets us write some crazy code that’s still valid. It tries to help us out by converting things to particular types based on how we treat them.

      If we add a string to something, it’ll assume we want it in text form, so it’ll convert it to a string for us.

      If we add a plus or minus prefix to something, it’ll assume we want its numerical representation, and will convert the string to a number for us, if possible.

    • rra-c-util 6.1
    • remctl 3.13

      remctl is a client and server that forms a very simple remote RPC system, normally authenticated with Kerberos, although including a remctl-shell variant that works over ssh.

    • Vala and Reproducibility

      This will help build process to avoid call valac in order to generate C source code, VAPI and GIR files from your Vala sources.

      Because C source is distributed with a release’s tarball, any Vala project could be binary reproducible from sources.

      In order to produce development packages, you should distribute VAPI and GIR files, along with .h ones. They should be included in your tarball, to avoid valac produce them.

    • Fuck You Startup World

      Fuck your crazy work hours. Nobody gives a fuck that Elon musk is working 100 hours a week, and Marissa Mayer pulling it to 130 hour work week while still breastfeeding her newborns. You’re not Elon Musk , you ain’t Marissa Mayer, you’re not going to get to space, and you won’t build the next Space X. Do me a favor, put your fucking Mac away and go play with your kids.

      [...]

      Fuck you startups with your extravagant parties and crazy off-site events that cost way too much money, you’re supposed to buy some fucking servers instead! Fuck spending money on ping pong tables that no one ever uses, fucking music rooms, nap rooms, meditation rooms, stress-free rooms, and pilates rooms. Fuck your ridiculous incentives that you give, too. Fuck your unlimited vacation policy, it’s fucking bullshit. We all know that your employees will take less time off.

    • Nailing Down Architectural Principles

      Software architecture needs to be documented. There are plenty of fancy templates, notations, and tools for this. But I’ve come to prefer PowerPoint with no backing template. I’m talking good old white-background slides. These are way easier to create than actual text documents. There are no messy worries over complete sentences. Freedom from grammatical tyranny! For a technical audience, concision and lack of boilerplate is a good thing. A nice mix of text, tables and diagrams gets the point across just fine. As a plus, this is naturally presentable — you don’t need a separate deck to describe your architecture when the deck is the reference document to begin with. As the architecture evolves, the slides evolve.

Leftovers

  • Amazon Wants to Get College Students Addicted to Prime

    Vincent Wang needed new jeans and a coat just before classes began this semester at the University of California, Davis, where he studies nutrition. Rather than trek several miles off campus to the nearest Target or Walmart, he ordered the clothes from Amazon.com Inc. and retrieved them from new Amazon pickup lockers right next to the university store that sells Aggies T-shirts and hoodies.

    Wang, 21, is one of millions of students who have taken advantage of Amazon Prime Student, which offers all the benefits of a regular Prime membership — quick delivery, music and video streaming and free online photo storage — for $50 a year, half the regular price. Amazon’s strategy echoes the one used for decades on college campuses by the credit card companies: snag young consumers early and, with artful promotions, try to make them loyal for life.

  • Science

    • Barack Obama: America will take the giant leap to Mars

      One of my earliest memories is sitting on my grandfather’s shoulders, waving a flag as our astronauts returned to Hawaii. This was years before we’d set foot on the moon. Decades before we’d land a rover on Mars. A generation before photos from the International Space Station would show up in our social media feeds.
      I still have the same sense of wonder about our space program that I did as a child. It represents an essential part of our character — curiosity and exploration, innovation and ingenuity, pushing the boundaries of what’s possible and doing it before anybody else. The space race we won not only contributed immeasurably important technological and medical advances, but it also inspired a new generation of scientists and engineers with the right stuff to keep America on the cutting edge.

    • Technology Brings Peace, Not Peril

      Peres’ vision stands in stark contrast to Lord Jonathan Sacks’ dystopian commentary calling computers and radical Islamists the “two dangers” of this century, defeated only by “an insistence on the dignity of the human person and the sanctity of human life.”

      On the contrary, I believe innovation and technology will help defeat terrorists and sustain and enhance human life.

      Innovation and technology have extended our lives – most children born in the early 1900s didn’t live past the age of 50, but the average U.S. lifespan is now almost 79 years. Artificial intelligence is helping doctors make complex diagnoses. 3D printing is producing low-cost prosthetics for children and those who otherwise couldn’t afford care. Drones are delivering blood and emergency medicine in developing countries. The rabbi should explain his point that “Every new technology…benefits the few at the cost of the many” to the paraplegic patients learning how to walk thanks to virtual reality.

      While Sacks decries the idea of self-driving cars, this innovation can save tens of thousands of lives a year in the U.S. alone. More than 35,000 people died on our roads last year, and the federal government estimates over 90 percent of crashes are caused by human error. Eliminating the great majority of automobile deaths and serious injuries would certainly meet Sacks’ goal of preserving “the sanctity of human life.”

  • Health/Nutrition

    • The Long-lasting Wages of Neglect: Flint Residents Plagued Again by Water Crisis

      One year since a public health emergency was declared in Flint due to lead-contaminated water, the struggle continues for residents of the hard-hit city. The most recent issue they’re facing is an outbreak of shigellosis, a highly contagious bacterial infection that is transmitted through the accidental ingestion of infected fecal material and causes diarrhea, fever, and abdominal pain.

      Matt Karwowski, a medical epidemiologist with the CDC, says, “There is definitely some question about whether changes in hand-washing and hygiene practices may be playing a role. People in Flint have been concerned about the safety of their water supply, and that may be playing a role in their hygiene practices.”

    • Antitrust Suit Alleges Pharma Company Rubbished Its Own Product In Order To Stave Off Competition From Generics

      Techdirt has written a number of stories about how Big Pharma is never content with the patent bargain — that, in return for a time-limited, government-enforced intellectual monopoly, products will afterwards enter the public domain. Instead, companies have come up with various schemes to extend the life of that monopoly — and thus to cheat the public of the low-cost generic versions of the drug in question that should have appeared. The Daily Beast points to an antitrust lawsuit brought by 35 states and the District of Columbia against the makers of Suboxone, a prescription drug used to treat opioid addiction, over the alleged use of one such scheme, known as “product hopping”.

  • Security

    • Security advisories for Monday
    • Crash: how computers are setting us up for disaster

      When a sleepy Marc Dubois walked into the cockpit of his own aeroplane, he was confronted with a scene of confusion. The plane was shaking so violently that it was hard to read the instruments. An alarm was alternating between a chirruping trill and an automated voice: “STALL STALL STALL.” His junior co-pilots were at the controls. In a calm tone, Captain Dubois asked: “What’s happening?”

      Co-pilot David Robert’s answer was less calm. “We completely lost control of the aeroplane, and we don’t understand anything! We tried everything!”

      The crew were, in fact, in control of the aeroplane. One simple course of action could have ended the crisis they were facing, and they had not tried it. But David Robert was right on one count: he didn’t understand what was happening.

      As William Langewiesche, a writer and professional pilot, described in an article for Vanity Fair in October 2014, Air France Flight 447 had begun straightforwardly enough – an on-time take-off from Rio de Janeiro at 7.29pm on 31 May 2009, bound for Paris. With hindsight, the three pilots had their vulnerabilities. Pierre-Cédric Bonin, 32, was young and inexperienced. David Robert, 37, had more experience but he had recently become an Air France manager and no longer flew full-time. Captain Marc Dubois, 58, had experience aplenty but he had been touring Rio with an off-duty flight attendant. It was later reported that he had only had an hour’s sleep.

      Fortunately, given these potential fragilities, the crew were in charge of one of the most advanced planes in the world, an Airbus 330, legendarily smooth and easy to fly. Like any other modern aircraft, the A330 has an autopilot to keep the plane flying on a programmed route, but it also has a much more sophisticated automation system called fly-by-wire. A traditional aeroplane gives the pilot direct control of the flaps on the plane – its rudder, elevators and ailerons. This means the pilot has plenty of latitude to make mistakes. Fly-by-wire is smoother and safer. It inserts itself between the pilot, with all his or her faults, and the plane’s mechanics. A tactful translator between human and machine, it observes the pilot tugging on the controls, figures out how the pilot wanted the plane to move and executes that manoeuvre perfectly. It will turn a clumsy movement into a graceful one.

    • Canonical Patches New Linux Kernel Vulnerabilities in All Supported Ubuntu OSes

      Today, October 11, 2016, Canonical published several security advisories to inform Ubuntu users about new Linux kernel updates for their supported operating systems.

      Four new kernel vulnerabilities are affecting Ubuntu 16.04 LTS (Xenial Xerus) and Ubuntu 14.04 LTS (Trusty Tahr) or later versions, and three the Ubuntu 12.04 LTS (Precise Pangolin) series of operating systems. They are also affecting the Ubuntu 16.04 LTS for Raspberry Pi 2 kernel.

      The first security flaw is an unbounded recursion in Linux kernel’s VLAN and TEB Generic Receive Offload (GRO) processing implementations, which could have allowed a remote attacker to crash the system through a denial of service or cause a stack corruption. It was discovered by Vladimír Beneš and affects Ubuntu 16.04 and 14.04.

    • Security updates for Tuesday
    • Systemd and Ubuntu users urged to update to patch Linux flaws

      Linux users should beware of a recently discovered systemd vulnerability that could shut down a system using a command short enough to send in a tweet and Ubuntu users should update to new Linux kernel patches affecting supported operating systems.

      SSLMate founder and Linux administrator Andrew Ayer spotted the bug which has the potential to kill a number of critical commands while making others unstable, according to Betanews.

    • Microsoft: No More Pick-and-Choose Patching

      Adobe and Microsoft today each issued updates to fix critical security flaws in their products. Adobe’s got fixes for Acrobat and Flash Player ready. Microsoft’s patch bundle for October includes fixes for at least five separate “zero-day” vulnerabilities — dangerous flaws that attackers were already exploiting prior to today’s patch release. Also notable this month is that Microsoft is changing how it deploys security updates, removing the ability for Windows users to pick and choose which individual patches to install.

    • Ministry of Defence CIO – defending the data assets of the nation

      An interesting example of knowing what is actually important, such as being ‘secure’ does not mean pulling up drawbridges and never talking. It does seem possible that the MoD has lesson it can teach industry in building security defences in depth, using a wide range of tools, that then map onto the future world of mobile and cloud infrastructures.

  • Defence/Aggression

    • New Clinton email reveals direct support for ISIS from two powerful Western allies

      A new Hillary Clinton email published by WikiLeaks as part of the ongoing release of hacked campaign files confirms that Daesh (Isis/Isil) has state backing. And from powerful Western allies, no less.

      Anti-terrorism analysts have long seen Daesh as a non-state-affiliated actor which grew out of an al-Qaeda insurgency in Iraq (and later Syria). But the email sent by Clinton herself (dated 27 September 2014) shows there’s much more to the story.

    • Russkies at the Doorstep

      In a year noted for crude political discourse, eagerly serialized in the mainstream media, the MSM are themselves bellowing anti-Russian rhetoric, conspiracy theory, and fear-mongering. Of the two “evil of two lessers” contenders, Trump is the one who regularly gets hammered, justifiably in the case of his anti-Muslim and other racist and sexist slurs, while Clinton gets a pass, even an A+, for her repeated verbal assaults on Russia and its president, even as she reeks of class hostility toward Trump supporters.

      During the McCarthy era, the most perverse propaganda was about Russians hiding under beds; during the new cold war, it’s about Russians inside every telephone, computer, email, and website, while linking Putin to everything, says Guardian contributor Trevor Timm, “from Brexit, Jeremy Corbyn, Greece, and Spain.” It’s hard to reconcile mainstream bogeymania with the missing media attention to the massive Big Brother spying on US citizens, the moral transgressions of which are lately presented in Oliver Stone’s humanizing portrait, “Snowden.”

      The quite literal femme fatale (without the alluring charm) has quite a deadly track record in the Middle East, but the MSM, which tout Clinton’s compassion for children and concern for human rights don’t bother to note her criminal record in the destruction of Libya and support for repressive Arab dictators, her backing of the coup in Honduras, or her threats to make war on Russia and destabilize and destroy yet another Arab country, Syria. Netanyahu is her favorite foreign statesman, while Trump is attacked for not being sufficiently obsequious toward the butcher of Gaza. MSM “debate” hosts never think to ask the right questions, such as why has she supported assaults on the main enemies of Saudi Arabia, Qatar, and Bahrain: Iraq, Libya, Yemen, Iran, and Syria? Like her underworld counterpart, Willie Sutton, she’d have to say it’s because that’s where the money is. Despite his many crackpot ideas, Trump is more pragmatic, less neocon, about US intentions in the Middle East. Just take the oil, he says, and forget about regime change.

      Clinton’s eponymous Foundation is built on millions of dollars of generous payola from “too big to jail” financiers along with feudalistic Qatar, the UAE, Oman, and the head chopping capital, Saudi Arabia. Bahrain gave a mere $100 thousand to the Foundation but $32 million to another money laundering operation, the Clinton Global Initiative. Syria, Iran, and Russia didn’t pay the bribes and are paying the price. The MSM choose not press her on the issue. Wikileaks has become the newspaper of record.

    • US government warned last year that selling arms to Saudi Arabia could ‘implicate it in war crimes’

      Officials within the Obama administration raised concerns over a 2015 $1.3billion arms sale to Saudi Arabia, citing worries that the Saudi military did not have the ability to intervene in Yemen without harming civilians, an investigation from Reuters has found.

      Full scale civil war between the Western and Saudi-backed government and Houthi rebels broke out early last year. More than 10,000 people have been killed in the fighting, the UN estimates, and three million displaced from their homes. Saudi-led air strikes on the rebel-held city of Sanaa since March 2015 have killed thousands of civilians.

      According to emails, documents and interviews with several current and former officials familiar with the discussions, the US government’s lawyers ultimately did not reach a conclusion on whether supplying arms for the Saudi campaign could make the US a ‘co-belligerent’ in the conflict under international law.

    • Pentagon Confronts a New Threat From ISIS: Exploding Drones

      Kurdish forces fighting the Islamic State in northern Iraq last week shot down a small drone the size of a model airplane. They believed it was like the dozens of drones the terrorist organization had been flying for reconnaissance in the area, and they transported it back to their outpost to examine it.

      But as they were taking it apart, it blew up, killing two Kurdish fighters in what is believed to be one of the first times the Islamic State has successfully used a drone with explosives to kill troops on the battlefield.

      In the last month, the Islamic State has tried to use small drones to launch attacks at least two other times, prompting American commanders in Iraq to issue a warning to forces fighting the group to treat any type of small flying aircraft as a potential explosive device.

    • Photos Show Fragments of U.S. Bombs at Site of Yemen Funeral Massacre

      Fragments of what appear to be U.S.-made bombs have been found at the scene of one of the most horrific civilian massacres of Saudi Arabia’s 18-month air campaign in Yemen.

      Aircraft from the Saudi-led coalition on Saturday bombed a community hall in Sana’a, Yemen’s capital city, where thousands of people had gathered for a funeral for Sheikh Ali al-Rawishan, the father of the rebel-appointed interior minister. The aircraft struck the hall four times, killing more than 140 people and wounding 525. One local health official described the aftermath as “a lake of blood.”

  • Environment/Energy/Wildlife/Nature

    • EU draws fire for allowing ‘overfishing’ of Baltic cod

      European Union ministers have agreed to cuts in Baltic cod catch quotas for next year that fall well short of calls by scientists worried about the stock’s eventual collapse.

      The fisheries ministers agreed overnight Monday to reduce catches of western Baltic cod by 56 percent in 2017, despite calls by scientists for a 90-percent cut they say is needed to sustain stocks in Danish and German waters.

      EU fisheries commissioner Karmenu Vellu said the commission, the bloc’s executive, had proposed a reduction of 88 percent “to bring back the stock to sustainability as soon as possible,” but had to accept a compromise to reach a deal among all member states.

      Listening to the potential impacts on the different fishing fleets, Vellu said: “I have accepted a lower reduction that is still well above the lower limit of the scientific advice.”

    • Danish cod quotas slashed … but not enough, says environmental group

      Denmark’s environmental and food minister Esben Lunde Larsen has just completed tough negotiations in Luxembourg on next year’s fishing quotas in the Baltic Sea.

      Danish cod fisheries were hit hard, but not as hard as the EU Commission had originally planned.

      The EU Commission had originally envisaged a reduction of cod quotas in the western Baltic Sea of 88 percent. Larsen managed to negotiate that down to a reduction of 56 percent. In the eastern Baltic, the EU originally called for a reduction of 39 percent. The parties agreed on a 25 percent decrease.

    • Huge area of US West burned due to warming climate

      Wildfires in the American West can make for apocalyptic images, but they’re also routine, as the heat of the dry season can turn large areas of forest into fires-in-waiting. One lightning strike—or one careless human—can set off a blaze that consumes tens of thousands of acres.

      Several factors contribute to the extent of these wildfires. We’ve made efforts to put them out as soon as possible—it’s well intentioned and sometimes necessary to protect ever-expanding human communities. But in many places, putting out the fires has disrupted a natural process of forest housekeeping. With small bits of fuel allowed to accumulate on the forest floor for longer, fires become less frequent but much more intense.

      Climate also plays a role. Year-to-year variability leaves some summers noticeably drier and hotter than others. And then there’s climate change. What can we say about its influence on fires in the West?

  • AstroTurf/Lobbying/Politics

    • New WikiLeaks emails show influence of Univision chairman in Clinton campaign

      The clashes between presidential candidate Donald Trump and the Spanish-language Univision television network began within days of Trump’s announcement last year that he was seeking the Republican nomination.

      Now, a series of emails pirated from the Democratic National Committee and published in the past week by the anti-secrecy website WikiLeaks show that within days of Trump’s June 16, 2015, announcement of his candidacy, Univision’s chairman, Haim Saban, was urging the Clinton campaign to take a tougher stance on Trump’s anti-immigrant agenda.

    • Media, Politics & The Death Of Intellectual Honesty

      Yeah, so I get that it’s political silly season, and people like to throw around all kinds of arguments of “bias” — especially towards the media. I’ve been on the receiving end of those accusations, but for the most part, I think claims of media bias are silly and over-hyped. What’s true, though, is that it’s all too easy to be sloppy in reporting and to try to hype up a nothing story into a something story. Here’s a story where no one comes out of it looking very good and the end result is a complete mess. It starts with Newsweek reporter Kurt Eichenwald. Last night I saw a marginally interesting story by Eichenwald about how a Russian government connected news website, Sputnik, misread an email leaked via Wikileaks from Hillary Clinton pal Sidney Blumenthal to campaign chief John Podesta. The email contained a link and full text to a much earlier Eichnwald story about Benghazi and Clinton. The Sputnik story incorrectly stated that the text in the email was by Blumenthal, and not by Eichenwald. It took one sentence out of this longer article, and falsely claimed that Blumenthal was admitting that the mess in Benghazi was “preventable.”

    • Gary Johnson: The more you know him, the less you like him

      Personally, I like Gary Johnson. I got to know him in the 1990s when he was governor of New Mexico. I was working to end the drug war, legalize marijuana and treat hard drugs as a public health, not criminal issue. Johnson came out for marijuana legalization, so I spent some time in New Mexico helping that agenda.

      But, the more I got to know him the less I liked his political views. He took money from the private prison industry and proudly supported private prisons. Making prisons into profit centers creates ongoing human rights violations. Prisons should be a function of government not a corporate profit center. Johnson opposed needle exchange to prevent HIV/AIDS, drug treatment and programs to help people with drug problems get their lives going in a positive direction.

    • 8 Most Damning Takeaways from ‘October Surprise’ Email Hack from WikiLeaks–This Looks REALLY Bad
    • In the Democratic Echo Chamber, Inconvenient Truths Are Recast as Putin Plots

      Donald Trump, for reasons I’ve repeatedly pointed out, is an extremist, despicable, and dangerous candidate, and his almost-certain humiliating defeat is less than a month away. So I realize there is little appetite in certain circles for critiques of any of the tawdry and sometimes fraudulent journalistic claims and tactics being deployed to further that goal. In the face of an abusive, misogynistic, bigoted, scary, lawless authoritarian, what’s a little journalistic fraud or constant fearmongering about subversive Kremlin agents between friends if it helps to stop him?

      But come January, Democrats will continue to be the dominant political faction in the U.S. — more so than ever — and the tactics they are now embracing will endure past the election, making them worthy of scrutiny. Those tactics now most prominently include dismissing away any facts or documents that reflect negatively on their leaders as fake, and strongly insinuating that anyone who questions or opposes those leaders is a stooge or agent of the Kremlin, tasked with a subversive and dangerously un-American mission on behalf of hostile actors in Moscow.

    • WikiLeaks posts more John Podesta emails

      WikiLeaks Monday morning posted an additional 2,000 emails that appear to be from the account of Hillary Clinton’s campaign chairman, John Podesta.
      This is the second hack in four days from WikiLeaks, which claims it has a trove of more than 50,000 emails from Podesta.

      The emails appear to be mostly from 2015, covering a litany of policy and strategy discussions between Clinton staffers on how to handle issues of the day and the press, including the release of the book “Clinton Cash” alleging nefarious activity by the Clinton Foundation. Another email has long-time Clinton aide Doug Band referring to Chelsea Clinton as a “spoiled brat.”

      Clinton campaign responded to the release by slamming the Trump campaign for “cheering on a release today engineered by Vladimir Putin,” after Trump adviser Jason Miller tweeted a link to the document page with the phrase “And here…we…go.”

    • Hillary Clinton’s Campaign Strained to Hone Her Message, Hacked Emails Show

      On the eve of the New Hampshire primary in February, a longtime aide to Bill Clinton was worried. Hillary Clinton was about to go down to defeat in the state, and the former president was despondent.

      “He’s losing it bad today,” Mr. Clinton’s chief of staff, Tina Flournoy, wrote to John D. Podesta, Mrs. Clinton’s campaign chairman, in an email. She added, “If you’re in NH please see if you can talk to him.”

      The email was one of thousands released by WikiLeaks on Monday that provided a revealing glimpse into the inner workings of Mrs. Clinton’s campaign. They show a candidacy that began expecting a coronation and was thrown badly off course by a misreading of the electorate and a struggle to define what she stood for.

      Stretching over nine years, but drawn mainly from the past two years, the correspondence captures in detail the campaign’s extreme caution and difficulty in identifying a core rationale for her candidacy, and the noisy world of advisers, friends and family members trying to exert influence.

    • Bernie Sanders endorses his brother in race to replace David Cameron

      US presidential hopefuls do not often intervene in British parliamentary byelections. But then, not many presidential candidates are Bernie Sanders. And more than that, he is intervening on behalf of his older brother.

      Sanders, who missed out on taking the Democratic nomination from Hillary Clinton, has recorded a brief but heartfelt campaign video aimed at voters in Witney, Oxfordshire, that talks up the attributes of his brother, Larry.

      Larry Sanders, who has lived in the UK since 1969, is standing for the Green party in the constituency, which will elect a new MP on 20 October to replace David Cameron, who quit the Commons last month.

    • Jill Stein Would Be a Blessing for the Supreme Court; Gary Johnson Would Be a Disaster
    • Hillary Clinton Campaign Avoided Helping Single-Payer Ballot Measure, Emails Show

      Hillary Clinton’s campaign was no fan of a major ballot measure to create a universal health care system — at least according to newly released documents from her campaign chairman’s email account.

      The emails from John Podesta’s account last November coincided with Clinton’s trip to the swing state of Colorado, where health insurers are funding the opposition to a ballot measure that would create a single-payer health care system in the state. Podesta and the Clinton campaign have not confirmed the authenticity of the emails but have not disputed them, and Wikileaks noted that Clinton appeared to confirm their authenticity during her Sunday night debate with Donald Trump.

    • Trump tells supporters to go vote on ‘November 28th’

      Donald Trump is asking his supporters to go out and vote him — 20 days after the presidential election is scheduled to take place.

      “Make sure you get out and vote,” Trump told supporters on Tuesday at rally in Florida. “November 28th.”

      Election Day is Nov. 8, 2016.

      To make matters worse, voters in the Sunshine State don’t have much time to register for the election.

    • In private correspondences, Ford Foundation president Darren Walker rubbished Sunday Guardian’s stories, calling it a “mouthpiece for the BJP”

      John Podesta, Hillary Clinton’s campaign chairman for the 2016 US presidential elections, closely monitored and may have intervened in the controversy surrounding the Ford Foundation and other foreign charitable foundations last year, according to to a set of leaked emails released by Wikileaks on Tuesday.

      In the first half of 2015, Ford Foundation president Darren Walker sent a number of emails to Podesta, most of which were updates on events taking place in India after the Modi government tightened the rules governing foreign charitable foundations and NGOs. During this time, the Ford Foundation was put on a government watch list over funding it gave to activist Teesta Setalvad in 2009.

      One e-mail, for instance, appears to be a deep-dive monitoring of how the Indian media reported the government’s probes into foreign funding, and specifically how various newspapers and editorials viewed the Ford Foundation’s troubles.

      [...]

      One e-mail from Walker to Podesta, sent on June 8th 2015, strikes a note of frustration and notes that the Ford Foundation “ had sent urgent notes to the Reserve Bank of India asking for assistance” in transferring funds in order to ensure that the foundation could sustain its basic operations in India.

      “I promised I’d give you an update on any developments in India,” Walker writes. “At this point this point, we’ve heard nothing further from the GOI. I sent urgent notes to the Ministry of Home Affairs and Reserve Bank of India last week asking for assistance in immediately releasing our bank accounts from their current status so we can transfer funds from NY for basic operations (mostly salary support, not grants),” the email reads.

      The Ford Foundation president also angrily references the article carried by the Sunday Guardian in early June, which profiled the Ford Foundation’s activities in India while describing it as an “entity outside the law”.

      “I’m attaching an article from the Guardian, which purports to be an independent newspaper, but is really the mouthpiece for the government and BJP. It’s rife with misrepresentations and erroneous information…not a very encouraging article. I appreciate your help,” Walker wrote.

    • Is there actually evidence that Trump allies had a heads-up on what WikiLeaks was doing?

      On a plane somewhere over the United States on Tuesday, Hillary Clinton campaign chairman John Podesta spoke to reporters about his email being hacked and the contents ending up at WikiLeaks.

      Podesta suggested that Roger Stone, a longtime ally of Donald Trump’s who is working with a pro-Trump super PAC, may have known about the email hacking before the release.

      “I think it’s a reasonable assumption to — or at least a reasonable conclusion — that Mr. Stone had advance warning and the Trump campaign had advance warning about what Assange was going to do,” Podesta said.

      Is that a reasonable assumption, much less a reasonable conclusion?

  • Censorship/Free Speech

    • Why the ‘Safe-Space’ Debate Is a Problem for Adjuncts

      The University of Chicago lit up social-media feeds last month after its dean of students published a letter informing incoming freshmen that “safe spaces” and “trigger warnings” had no place on a campus dedicated to “freedom of inquiry and expression.”

      Although some journalists noted that the letter may have been aimed at pleasing high-profile right-wing donors, opposition to such measures doesn’t track neatly along party lines. Neither the Marxist philosopher Slavoj Žižek nor the paleoconservative pundit Ann Coulter has much use for so-called “political correctness” measures.

    • Zambia: Internet censorship during the 2016 general elections?

      A research study by the Open Observatory of Network Interference (OONI) and Strathmore University’s Centre for Intellectual Property and Information Technology Law (CIPIT).

    • Peter Thiel’s Lawyer Says He’s Stopped ‘Monitoring’ Gawker, But Still Sending It Bogus Takedown Demands

      Remember how the billionaire funder of Facebook and Palantir, Peter Thiel, insisted that he was bankrupting Gawker to protect your privacy? Well, the lawyer, Charles Harder, that Thiel set up with a monthly retainer, specifically to focus on lawsuits that could kill Gawker dead, has become something of a “celebrity” in the “let’s stomp out free speech” circle of celebrities. Last month, the Hollywood Reporter did a big profile on Harder and his newfound fame (and rapidly growing client list of famous people upset about press coverage). In some “bonus cuts,” reporter Eriq Gardner noted on Twitter that Harder told him he no longer “monitors” what’s left of Gawker (now called Gizmodo Media, and owned by Univision).

      [...]

      This is, to put it mildly, a load of complete bullshit. Harder, who in that profile claims “I believe very strongly in a free press” doesn’t seem to understand how the First Amendment works. Cook’s statement is clearly one of opinion, and it’s clearly protected speech. And despite Harder also saying in that profile that he’d like to change the standard for defamation of public figures, the law as it stands requires not just that the statements be false statements of fact, but also that they be said maliciously. And, yes, Harder is a public figure (remember, there was just a whole Hollywood Reporter feature about him).

      What Harder appears to be doing here is little more than threatening a SLAPP suit to try to shut up the press from saying negative things about him. Even the references to Cook being sued in the past are ridiculous, since most of those lawsuits are from Harder himself, and most of them are completely bogus.

      So far, it does not appear that Univision is complying with any of these demands (which is good to see). So, let’s see what Harder does next. Is he now going to go after Univision too? Will Thiel continue to fund that as well? Because most of the threats seem entirely bogus, and would be laughed out of court.

      And, of course, this is yet another reminder of why we really need a federal anti-SLAPP law to stop such bogus threats in their tracks.

    • Banned by the bureau: Censorship in Lebanon

      When Darine Hotait, the Lebanese-American filmmaker, learned that her film I say dust had been banned from screening at the Lebanese Film Festival (LFF), she was confused. She couldn’t think of a reason why the film got censored although some people had told Darine in advance that it was obvious that they would ban the film.

      They. The Bureau of Censorship, a division of General Security, one of Lebanon’s many military bodies. The bureau is not known for transparency and rarely discloses what exactly they have censored and why. They don’t want to be held accountable. They don’t want to leave any trace.

    • More Details Uncovered On Bogus Defamation Lawsuits Being Used To Delist Negative Reviews

      More details have also surfaced in a case Levy is still dealing with — the filing of a bogus defamation lawsuit on behalf of dentist Mitul R. Patel against an unhappy patient. In this peculiar case, both the supposed plaintiff and defendant claim to have had their signatures forged on the court documents used to secure an order to delist content.

      Patel’s motion to vacate the bogus lawsuit points a finger at a reputation management firm SEO Profile Defense LLC — led by Richart Ruddie — which Patel alleges filed the suit (and forged his signature) without his knowledge after he signed a contract with it for reputation management services.

      Additional details uncovered by Levy and Volokh suggest this isn’t the reputation management firm’s first bogus lawsuit rodeo.

    • NBC Delayed Story About Trump’s Access Hollywood Recording Over Fear That He Might Sue

      So just this past Thursday, we wrote about Trump’s habit of threatening to sue the press over any coverage he considers negative. In the past, we’ve also covered his stated plans to open up libel laws. The comments on that post got pretty ridiculous after people who can’t possibly be regular Techdirt readers complained that I was clearly just stirring up shit because I’m a Hillary Clinton supporter. This despite the fact that pretty much everything we’ve ever written about her has been critical too — including her own ridiculous comments mocking free speech and praising censorship. It also ignores that just a few days earlier I had also sided with the Trump campaign when it received a bogus, censorious, cease & desist letter from the city of Phoenix. We’re staying pretty consistent here: we don’t support censorship, no matter whose team you’re on. But, sure, I know. It’s crunch time and people are really concerned about supporting their team, rather than actually discussing issues.

      But this is an important issue. Threatening a free press with bogus defamation lawsuits and SLAPP (strategic lawsuits against public participation) claims are a really big problem. Case in point: on Friday, as I’m sure you’re already aware, the Washington Post published a video of Donald Trump happily discussing sexually assaulting women, and how it’s okay because he’s a celebrity. As you also know, this became the story of Friday and the weekend, as it appeared to push a bunch of people who had previously supported Trump over the edge to pull their support (why this story rather than earlier ones, I don’t fully understand, but…).

      Either way, the story led to a few different varieties of followup stories about how the Washington Post got the story. And all of them note that Access Hollywood found the tape itself last Monday, and realized it was newsworthy. They then took it to their corporate parent, NBC, and some work was done on getting the story out — but it kept getting pushed back. This led many to ask why it could possibly take so long for NBC to report on this. They knew the tape was authentic, so they didn’t need to confirm that.

    • Users enraged, confused over YouTube censorship
    • YouTube announces initiative for digital clean-up

      YouTube has launched a program called YouTube Heroes that will allow users to report inappropriate content in the form of a game.

      Members will earn points, advance in levels and gain access to exclusive rewards and features on the site dependent on the quality of their contributions.

      How do these “Heroes” earn points? By flagging inappropriate videos, adding captions to content and sharing their knowledge with other Heroes in message boards and Google Hangout sessions.

    • Censorship Kills Potential Twitter Acquisition

      Last year, I wrote about how Twitter (NYSE:TWTR) may be acquired by either Microsoft (NASDAQ:MSFT) or Alphabet (GOOG, GOOGL). Early this year, I soured on Twitter stock because economic weakness would hurt ad spending. I further soured on it after incidents of it censoring users for their political statements and its mismanagement of Periscope.

      In the past few weeks, the rumors of Twitter being bought crept up again. This list consisted of Saleforce.com (NYSE:CRM), Alphabet, Apple (NASDAQ:AAPL), Verizon (NYSE:VZ), Microsoft, and Disney (NYSE:DIS). I think traders were bidding Twitter stock up because if Alphabet (the most likely buyer) had to compete with another firm, it would drive the price up.

      [...]

      Twitter isn’t like any other acquisition for the companies looking at it. Even for Microsoft, buying Twitter would be nothing like buying LinkedIn. The reason it is different is its public nature. While most companies are trying to avoid political controversy, Twitter would put them front and center of the action. This situation isn’t inherently bad, but with the way Twitter is treating free speech with disdain, it has become a potential problem for buyers.

      There have been many examples of Twitter suspending accounts which are politically incorrect. One example of this was journalist Glenn Reynolds getting his account suspended for tweeting “run them down” in reference to drivers being in a situation where protesters were blocking the streets and attacking cars which stopped. It’s not my place to discuss the veracity of this statement, but it isn’t Twitter’s place either! Twitter has become known for wielding a heavy hand when dealing with political statements. Deleting accounts is the last thing a firm with user growth problems needs. 17 million tweets were sent out pertaining to the recent presidential debate. This shows that political expression is paramount to the website’s existence. It needs to foster debate instead of stifling it.

    • Suit alleges censorship on Elkhart city Facebook page

      The accusation is one of censorship.

      “I think basically I was posting about issues around the Lerner Theater and the A.D.A. violations and discrimination the city was engaged in and they didn’t care for that too much and they deleted all those posts and eventually banned me from commenting,” said Richard Wolf.

    • Seh Calaz defies Censorship Board

      MABHANDITI frontman, Seh Calaz, on Saturday performed the controversial track, Hohwa — No Under 18, at a concert in Gweru at the weekend in defiance of the Censorship Board’s ban imposed of sexually-explicit song.

    • ‘End this censorship… and bring back library artwork’
    • NMC is not to bring a media censorship
    • National Media Center is not to censor media, aims to build reconciliation – Chairman
  • Privacy/Surveillance

    • Comcast in middle of Oregon fight over taxes and censorship

      Experienced television buyers say some television stations occasionally flag advertisements that use footage from rival stations, though most ultimately relent.

      The video-on-demand service — used by customers who want to watch a show after it has aired — reach a relatively small number of viewers. The pro-97 ads that mention Comcast have run on other Oregon cable and network providers.

    • Does NSA support of CYBERCOM blur lines?

      The Title 10 versus Title 50 debate has long surrounded the way intelligence and covert activity is conducted in accordance with the law. A key issue surrounding intelligence and war fighting efforts is the blurring of lines clearly identified in statutes. For example, intelligence organizations are barred from spying domestically on American citizens.

      As the discussions of a potential split between the National Security Agency and US Cyber Command continue to swirl, what would an empty-nested NSA, freed from its child organization, CYBERCOM, look like?

    • A Good American: Surveillance, 9/11 and the NSA

      The idea of small digital events linked together in a dance of relationships is illustrated elegantly on screen. There are shots of clouds of gnats buzzing in sunbeams, perhaps in reference to Binney’s rural Appalachian birthplace.

      The NSA’s response to the 9/11 revelations was to shelve ThinThread in favour of a much more expensive program, TrailBlazer. After NSA director Michael Hayden was appointed in 1999, Binney had been asked how he could use $1.2bn to revamp his operation. He calculated that he could organise surveillance on the entire planet in near real time, for just $300,000.

      Money may lie at the heart of the NSA’s questionable decision making. After 9/11, Binney recalls the order that came through from Maureen Baginski, the NSA’s head of Signals Intelligence (Sigint), to not rock the boat or embarrass large technology companies. “We can milk this cow for 15 years. 9/11 is a gift to the NSA. We’re going to get all the money we need and then some,” she is alleged to have said.

    • Encrypted communications could have an undetectable backdoor

      Researchers warn that many 1024-bit keys used to secure communications on the internet today might be based on prime numbers that have been intentionally backdoored in an undetectable way.

      Many public-key cryptography algorithms that are used to secure web, email, VPN, SSH and other types of connections on the internet derive their strength from the mathematical complexity of discrete logarithms — computing discrete logarithms for groups of large prime numbers cannot be efficiently done using classical methods. This is what makes cracking strong encryption computationally impractical.

      Most key-generation algorithms rely on prime parameters whose generation is supposed to be verifiably random. However, many parameters have been standardized and are being used in popular crypto algorithms like Diffie-Hellman and DSA without the seeds that were used to generate them ever being published. That makes it impossible to tell whether, for example, the primes were intentionally “backdoored” — selected to simplify the computation that would normally be required to crack the encryption.

    • NSA-style agency could install ‘trapdoors’ in many cryptographic keys – study

      It took the research team “a little over two months” to break a weakened 1,024-bit key using “an academic cluster” of 2,000 to 3,000 CPUs.

      Two years after Snowden revelations exposed “Bullrun,” Heninger and others published research posting that the NSA could break powerful encryption. Getting past 1024-bit primes would require a machine that costs a few hundred million dollars, they wrote, yet that supercomputer would still only be able to crack about one 1024-bit prime a year. A well-funded and determined institution like the NSA could fit the bill.

      Since 2010, the National Institute for Standards and Technology has recommended using keys of at least 2,048 bits, though 1,024-bit keys are still common, Ars Technica wrote.

    • NSA could put undetectable “trapdoors” in millions of crypto keys

      Researchers have devised a way to place undetectable backdoors in the cryptographic keys that protect websites, virtual private networks, and Internet servers. The feat allows hackers to passively decrypt hundreds of millions of encrypted communications as well as cryptographically impersonate key owners.

      The technique is notable because it puts a backdoor—or in the parlance of cryptographers, a “trapdoor”—in 1,024-bit keys used in the Diffie-Hellman key exchange. Diffie-Hellman significantly raises the burden on eavesdroppers because it regularly changes the encryption key protecting an ongoing communication. Attackers who are aware of the trapdoor have everything they need to decrypt Diffie-Hellman-protected communications over extended periods of time, often measured in years. Knowledgeable attackers can also forge cryptographic signatures that are based on the widely used digital signature algorithm.

      As with all public key encryption, the security of the Diffie-Hellman protocol is based on number-theoretic computations involving prime numbers so large that the problems are prohibitively hard for attackers to solve. The parties are able to conceal secrets within the results of these computations. A special prime devised by the researchers, however, contains certain invisible properties that make the secret parameters unusually susceptible to discovery. The researchers were able to break one of these weakened 1,024-bit primes in slightly more than two months using an academic computing cluster of 2,000 to 3,000 CPUs.

    • Massive report details the surveillance powers of 12 Central and South American nations

      Unblinking Eye, EFF’s giant, deep research report (available in Spanish, English and Portuguese) on the state of surveillance law in latinamerica, reveals an alarming patchwork of overbroad powers given to police forces and government agencies.

      In the 1980s and 1970s, the military dictatorships of Argentina, Chile, Paraguay, Bolivia, Uruguay and Brazil pooled their resources in something called “Operation Condor,” which was used to effect mass kidnappings, torture, murders and disappearances. Today, less than a generation later, these countries and their neighbors are effecting surveillance dragnets that are one click away from totalitarianism. Following a military coup in one of these countries, the new generalissimos would be able to quickly crush their opposition and undertake mass arrests of all potential dissidents.

      The surveillance laws in these countries have severely lagged behind the powers that the countries’ spies have bought for themselves through purchasing new high-tech toys from companies in the USA and EU. These old laws assume that wiretapping happens to one phone line at a time, not across a whole country’s communications — communications that yield far more intimate and compromising information than could be gleaned by spying on the old wireline telephone system.

    • Facebook, Twitter and Instagram sent feeds that helped police track minorities in Ferguson and Baltimore, report says

      A powerful surveillance program that police used for tracking racially charged protests in Baltimore and Ferguson, Mo., relied on special feeds of user data provided by Twitter, Facebook and Instagram, according to an ACLU report Tuesday.

      The companies provided the data — often including the locations, photos and other information posted publicly by users — to Geofeedia, a Chicago-based company that says it analyzes social media posts to deliver real-time surveillance information to help 500 law enforcement agencies track and respond to crime. The social media companies cut off Geofeedia’s access to the streams of user data in recent weeks after the ACLU discovered them and alerted the companies about looming public exposure.

      The popularity of Geofeedia and similar programs highlights how the rise of social media has given governments worldwide powerful new ways to monitor crime and civil unrest. Authorities often target such surveillance at minority groups or others seeking to publicly air political grievances, potentially chilling free speech, said the ACLU’s California affiliate, which unearthed Geofeedia’s relationship with social media companies through a public records request of dozens of law enforcement agencies.

    • Twitter’s Woes Signal the End of the Social Wars

      Two buzzwords define the past decade of computing: mobile and social. Those days are coming to an end. Although smartphones and social media remain as important as ever, the war to control those platforms are over. Winners are being coronated as the losers are, at last, conceding.

      Microsoft plans to unload what’s left of its Nokia purchase, and BlackBerry—remember them?—is abandoning the hardware business. That essentially ends the smartphone wars, leaving iOS and Android as the dominant operating systems. Now, Twitter’s ongoing woes suggest the end of the social platform wars are nigh.

    • Facebook, Twitter cut access to monitoring tool used by police

      Facebook, Instagram, and Twitter were handing over data to a monitoring tool that law enforcement agencies were using to track protesters, according to the American Civil Liberties Union.

      The social media analysis tool, called Geofeedia, had been harvesting posts from the social media networks for surveillance purposes, and more than 500 law enforcement and public safety agencies have been using it, the ACLU said in a Tuesday report.

      Through a public records request, the ACLU found that Geofeedia had entered into agreements with Facebook, Twitter, and Instagram for their users’ data.

      In uncovered emails, Geofeedia said the tool was useful for monitoring protests in Ferguson, Missouri, involving the 2014 police shooting death of Mike Brown.

      The ACLU is concerned that the tool can “disproportionately impact communities of color,” through its monitoring of activists and their neighborhoods. Among Geofeedia’s features is an interactive map of real-time Instagram posts showing user locations.

    • Why PIA doesn’t fly a warrant canary: it’s solving the wrong problem

      Private Internet Access doesn’t have a warrant canary. That’s because warrant canaries alert somebody to damage that has already happened. The right way to go about the problem is to prevent the damage from happening in the first place.

      At PIA, privacy is at the soul of what we do. Our business partners have occasionally been surprised when we say upfront that we’re in privacy first, business second – but that’s the passion we have. Making money is a matter of being able to continue pursuing the primary goal, privacy, on a sustainable basis.

    • Twitter yanks data feeding tube out of police surveillance biz

      Twitter has suspended its commercial relationship with a company called Geofeedia – which provides social media data to law enforcement agencies so that they can identify potential miscreants.

      The social media company announced the change through its Policy account on Tuesday morning following the publication of a report by the American Civil Liberties Union (ACLU) of California.

      The civil liberties advocacy organization obtained records indicating that Facebook, Instagram, and Twitter provided bulk user post data to Geofeedia, which markets its social media monitoring software to law enforcement agencies as a way to track activists, among other uses.

      Following reports alleging increased use of social media surveillance last month, both Facebook and its Instagram division ceased providing data to Geofeedia on commercial terms. Facebook did not respond to a request to provide further details.

    • Ron Wyden Discusses Encryption, Data Privacy and Security

      After Apple and the F.B.I. made their battle over encryption public in February, members of Congress quickly jumped into the debate. Some lawmakers promised new rules that would give authorities more access to smartphones, while others promised to fight off those laws.

      Yet after several hearings and bills, and the formation of congressional working groups, little has been done to resolve the central tug of war between the tech industry and federal authorities over civil rights versus national security.

      Law enforcement officials have argued that hundreds of criminal investigations have been held up by their inability to get access to locked smartphones and encrypted apps. Privacy advocates and tech companies say such access would cost people their personal information and lead to a slippery slope of surveillance.

    • “A First Amendment in the Digital Age”—Peter Zenger Lecture

      I had the honor of delivering the inaugural Peter Zenger lecture at Columbia Journalism School last week. The lecture is named for a newspaper publisher who was tried for libel in the 1730s for printing articles mocking and criticizing William Cosby, New York’s royal governor. Many historians consider Zenger’s acquittal to have been a milestone in the development of American press freedom. In my lecture last week, I offered some thoughts about digital-age threats to the freedoms of speech and the press, focusing mainly on government surveillance and secrecy. The text of my remarks is below. If readers have reactions, I’d love to hear them—I’m at Jameel.Jaffer [at] Columbia.edu.

    • Facebook’s Version of Slack Is Coming for Your Workplace. What Now?

      Sitting at work all day scrolling through Facebook is almost definitely frowned upon by your bosses, but Facebook wants to change that with the launch of a new version of Facebook—specifically designed for work—called Workplace.

      Facebook is ubiquitous. If it’s not Mark Zuckerberg handing out “Free Basics” to developing countries, it’s internet connectivity beamed down from giant, solar-powered drones. As of July 2016, the social network had 1.71 billion monthly users. Facebook is without doubt one of the most pervasive technological phenomenons of the 21st Century. Thing is, Facebook’s hit a brick wall when it comes to growth. Everybody who would want to use Facebook, generally speaking, is already, or at least will be using Facebook very soon. So, to eke out the last embers of growth in a saturated market, Facebook has now, officially, entered your workplace.

    • Toyota, BMW, Allianz ink data-sharing deal with autonomous start-up Nauto

      Global automakers Toyota, BMW and insurer Allianz will license technology from Silicon Valley start-up Nauto, which uses cameras and artificial intelligence systems in cars to understand driver behavior, Nauto said on Friday.

      Nauto Chief Executive Stefan Heck told Reuters the carmakers and insurer will integrate the technology into their test vehicles and use the aggregate and anonymized data – whether on driving habits, difficult intersections, or traffic congestion – to help develop their autonomous vehicle strategies.

      The investment by BMWi Ventures, Allianz Ventures and the Toyota Research Institute underscores the auto industry’s demand for smart systems to improve vehicle and driver safety, reduce liability and make fleet operations more efficient, while preparing for self-driving cars of the future.

    • Want to Remove a Google Result? File a Trumped-Up Lawsuit

      Across the US, dozens of lawsuits have been filed in order to remove defamatory material from review sites such as Yelp, or Google’s search results. That’s not unusual, but, the thing is, many of the defendants’ addresses are seemingly made-up, some of those named in the cases have never been informed of the suits, and some of the court documents contain forged signatures, according to The Washington Post.

      Linked to at least some of the cases is a selection of companies run by a Richart Ruddie, including SEO Profile Defense Network LLC, and Profile Defenders. Profile Defenders specialises in “online reputation management,” according to its website. In short, these companies and others are allegedly carrying out a pretty novel tactic to clean up content that would reflect negatively on its clients: filing fake lawsuits to encourage websites or online services to remove content.

    • Yahoo disables automatic email forwarding feature: AP

      Yahoo Inc disabled automatic email forwarding at the beginning of the month, the Associated Press reported, citing several users.

      While those who have set up forwarding in the past are unaffected, users who would want to leave following recent hacking and surveillance revelations are struggling to shift to rival services, the AP reported on Monday. (apne.ws/2dKpUW3)

      The company has been under scrutiny from investors after disclosing last month that at least 500 million user accounts were stolen from its network in 2014.

      Reuters reported last week, citing sources, that Yahoo last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials, a move that raised a lot of human rights concerns.

    • Power, secrecy and cypherpunks: how Jacob Appelbaum ripped Tor apart

      Edward Snowden’s face seems ever present in Berlin, where stickers on doors and lamp-posts promise there’s always “A bed for Snowden” and posters plug Oliver Stone’s eponymous film.

      The whistleblower’s explosive 2013 revelations about international government surveillance generated some good advertising for Berlin, cementing its reputation as hipster technology activist capital of the world. The city’s cheap lifestyle and post-second world war aversion to surveillance, as well as sympathetic Germany residency rules, have created a powerful network of support and infrastructure for its dedicated cyberactivism community. We are “poor, but sexy”, its residents like to say.

      Many of Berlin’s technologists work freelance, employed by anti-surveillance projects or secure messaging tools. And some are employed by Tor, a long running web anonymity project with something of a cult following.

      That community recently met in Seattle to tackle a new challenge: a long-running saga of allegations of sexual assault, bullying and harassment that has ripped Tor’s community apart.

  • Civil Rights/Policing

    • Delta State Police Expose Another Illegal ‘Baby Factory’ In Asaba

      On Friday, Delta State Police Command discovered another ‘baby factory’ in Asaba, the Delta State capital, following a tip-off. The police, who stormed the factory located at Oduke area within Asaba metropolis, arrested the proprietor’s husband and a female syndicate who is alleged to be the operator – as a Nurse. Sunday Vanguard gathered that the husband’s duty was to impregnate the women, whose age-range is between 18 and 20; the wife then allegedly sells the children upon delivery. The Command rescued seven pregnant girls.

    • Wheelchair-bound woman gang raped in refugee centre after asking to use the toilet

      The victim had shared a taxi home with a man after going for dinner in a restaurant in Visby, Sweden, when she said she needed to use the toilet.

      Believed to be in her thirties, the woman was then offered to use the one at her fellow passenger’s home.

      Her lawyer Staffan Fredriksson said: “She followed him in and had no fears that something would happen. Then the man took advantage of the situation. The abuse started in the toilet.”

    • Law and Order – Trump Unit
    • Judge Posner Smacks Around Cabbies For Thinking That Cities Allowing Uber Violates Their ‘Property Rights’

      It’s no secret that cab companies and many cab drivers don’t much like Uber and Lyft. Competition is tough. And cabs in most cities have survived thanks to artificial limits on competition through medallions and the like. This has always been a stupid, and frequently corrupt, system. For years, before Uber and Lyft came along, people talked about the ridiculousness of artificially limiting competition in this manner, but it was only once those companies came along that the true ridiculousness was made clear. While some forward looking cabbies have embraced these and similar systems, others have been fighting the new reality, often in fairly ridiculous ways. In Milwaukee and Chicago, cab companies sued those cities, arguing that allowing this type of competition amounted to a Fifth Amendment violation, in the form of “taking private property for public use without just compensation.” What private property, you might ask? Well, according to the cab companies, the artificially restricted competition is their property. No, really.

    • 27 Arrested Resisting Dakota Access Pipeline on Indigenous Peoples’ Day

      On Monday, protests and actions were held across the country to mark Indigenous Peoples’ Day and to oppose further construction of fossil fuel infrastructure. In North Dakota, hundreds of Native Americans and their allies gathered to resist the construction of the $3.8 billion Dakota Access pipeline, which has faced months of resistance from the Standing Rock Sioux Tribe and members of hundreds of other tribes from across the U.S., Canada and Latin America. At least 27 people were arrested blockading construction at two separate worksites, including Hollywood actress Shailene Woodley.

    • DHS Inspector General Says Office Has No Idea How New Cybersecurity Act Is Supposed To Be Implemented

      The reanimated CISA, redubbed The Cybersecurity Act (a.k.a., OmniCISA) and hurried through the legislative process by stapling its 2000 pages to the back of a “must-pass” budget bill, is still in the processes of implementation. Not much is known about what the law is intended to do on the granular level, other than open up private companies to government surveillance so the USA can beat back “the cyber.”

      Surveillance aficionados were quick to lean on private companies to start sharing information, but the government needs to be taught new tricks as well. There’s plenty of info siloing at the federal level, which keeps the DHS, FBI, and others involved in the cyberwar from effectively communicating, much less sharing anything interesting they might have had forwarded to them by the private sector.

      The federal government has been less than successful in securing its own information — something CISA was also supposed to fix. The DHS’s Inspector General has performed a follow-up investigation on the department’s implementation of CISA’s requirements. For the most part, things seem to be moving forward, albeit in a vague, undefined direction.

      The OIG notes that the DHS has put together policies and procedures and, amazingly, actually implemented some of them. Better still, it has moved many critical account holders to multi-factor authorization. Unfortunately, the DHS still has a number of standalone systems that can’t handle multi-factor authorization, which will make them more vulnerable to being breached.

    • How U.S. Torture Left a Legacy of Damaged Minds

      Before the United States permitted a terrifying way of interrogating prisoners, government lawyers and intelligence officials assured themselves of one crucial outcome. They knew that the methods inflicted on terrorism suspects would be painful, shocking and far beyond what the country had ever accepted. But none of it, they concluded, would cause long lasting psychological harm.

      Fifteen years later, it is clear they were wrong.

      Today in Slovakia, Hussein al-Marfadi describes permanent headaches and disturbed sleep, plagued by memories of dogs inside a blackened jail. In Kazakhstan, Lutfi bin Ali is haunted by nightmares of suffocating at the bottom of a well. In Libya, the radio from a passing car spurs rage in Majid Mokhtar Sasy al-Maghrebi, reminding him of the C.I.A. prison where earsplitting music was just one assault to his senses.

      And then there is the despair of men who say they are no longer themselves. “I am living this kind of depression,” said Younous Chekkouri, a Moroccan, who fears going outside because he sees faces in crowds as Guantánamo Bay guards. “I’m not normal anymore.”

  • Internet Policy/Net Neutrality

    • FCC: Comcast Routinely Charges Customers For Hardware, Services Never Ordered

      When you’re among the worst ranked companies for customer service in America, you consistently need to find new ways to ramp up your game if you want to take malicious incompetence to the next level. Enter Comcast, which despite constant promises that it’s getting better, routinely keeps finding itself in the headlines for immeasurably shady business practices. Earlier this year, for example, the company was sued by Washington’s Attorney General for charging users a $5 per month “Service Protection Plan,” then routinely and intentionally charging users for repairs that should have been covered under it.

      This week, America’s least-liked companies is finding itself in the headlines for another misleading practice: errantly and routinely billing customers for hardware or services they never ordered. According to a new FCC announcement, Comcast will be paying the agency $2.3 million to settle an investigation into the behavior.

    • To Combat Dropping Ratings, The NFL Thinks Fining Its Teams For Sharing Video On Social Media Is The Answer

      It’s been a time of remarkable progress of late when it comes to professional sports organizations being smart about how to pursue viewers in this here digital era. Major athletic institutions are finally opening up the door to wider streaming options, putting aside the doomsayers. Add to that that other leagues are starting to realize what a boon Major League Baseball’s Advanced Media product has been to viewership and attendance and it seemed like we were on the precipice of a golden age in digital sports media.

      Leave it to the NFL to ensure that we take at least one step backwards. What once seemed like a never ending funnel of money and upward trending viewership, the NFL has undergone something of a ratings correction as of late. It seems that amidst the controversy over head injury, bad officiating, the contraction of one-day fantasy football, and what some think is a generally declining quality of the on-field product, less people are watching games, both in person and on television. This had to happen at some point, if for no other reason than because NFL ratings over the past 2 decades were completely boffo. But the NFL’s choice to combat this inevitable decline takes a page from the days we finally just got over.

  • Intellectual Monopolies

    • WIPO Assembly Adopts Revisions For Stronger Oversight, Protection Of Whistleblowers [Ed: it’s hogwash, it won’t change anything unless Gurry et al resign]

      After much negotiation, amendments to a World Intellectual Property Organization internal oversight mechanism were adopted today by the annual WIPO General Assembly. Under the amendments, investigating allegations of wrongdoing of high-ranking WIPO officials will be made more transparent and facilitate access to documents by WIPO member states in case of an investigation.

    • WIPO General Assembly Agrees On Two New WIPO Offices; No Deal On Design Treaty[Ed: paywall]
    • BGH rules for patentees on appeal – again

      In two decisions published yesterday on its website, the German Federal Court of Justice (Bundesgerichtshof, BGH) overturned two decisions by the Federal Patent Court (Bundespatentgericht) invalidating the patents in suit for lack of novelty. Both decisions are remarkable not because they break new ground in (patent) law (they don’t), but rather because the BGH corrects the fact finding of the lower court and finds in favour of the patentees. They fuel the impression that the Federal Court of Justice is more patent-friendly than the Bundespatentgericht, or, to put it another way, that the Federal Patent Court has become overly strict.

    • Trademarks

      • TTAB issues final rules to increase efficiency

        The Trademark Trial and Appeal Board has issued final rules that will take effect in January. The biggest focus is on making filing completely electronic

      • Sanity: MasterCard Loses Absolutely Idiotic Trademark Challenge Against An Athletic Competition

        One wonders if there is a gas leak in the legal department at MasterCard HQ. Because there is nothing in those logos that would mislead a drunken chimp, never mind a human being. Yet MasterCard moved forward with challenging the trademark application for World Masters Games, because trademark bullying knows no limits. The Intellectual Property Office of New Zealand, fortunately, essentially laughed this out of the trademark office.

      • General Court confirms that body-builder silhouette cannot be registered as a trade mark for nutritional supplements

        In 2014 the applicant, Universal Protein Supplements Corp, filed an application with the EUIPO to have the EU territory designed in respect of the international registration of a figurative sign representing a body-builder. The application was for goods and services in the classes indicated above.

        The EUIPO examiner rejected the application, on grounds that the mark lacked any distinctive character and was descriptive for the purpose of Article 7(1)(c) of Regulation No 207/2009 on the (now) European Union Trade Mark (EUTMR).

        In late 2014 Universal Protein appealed the examiner’s decision.

    • Copyrights

      • Which “Brazil” Will Chair The Marrakesh Treaty Assembly?

        The supposedly impossible happened: The Marrakesh Treaty entered into force on 30 September, three months after reaching the necessary minimum of 20 ratifications. By then, 22 countries had done so – two more did so during the Marrakesh Assembly.

      • Court Rejects Massive Torrent Damages Claim, Admin Avoids Jail

        A former torrent site operator has largely avoided the goals of an aggressive movie industry prosecution in Sweden. Against a backdrop of demands for years in prison and millions in damages, the 25-year-old owner of private tracker SwePiracy was handed 100 hours community service and told to pay $194,000.

      • BREIN Tracks Down YouTube Pirate, Warns Others

        Dutch anti-piracy group BREIN continues to put pressure on pirates all over the Internet, including those on YouTube. This week they forced a pirating film uploader to cease his activities, warning that repeat infringers may have to pay penalties that could run into the thousands of euros.

      • MPAA Reports Pirate Sites and Hosting Providers to U.S. Government

        The MPAA has reported several piracy-promoting websites and services to the U.S. Government. The list features major torrent sites The Pirate Bay and Extratorrent, file-hosting services such as Openload and Rapidgator, and for the first time it also includes several of their hosting companies.

      • The Copyright Office wants your comments on whether it should be illegal to fix your own stuff

        Under Section 1201 of the DMCA, a law passed in 1998, people who fix things can be sued (and even jailed!) for violating copyright law, if fixing stuff involves bypassing some kind of copyright lock; this has incentivized manufacturers so that fixing your stuff means breaking this law, allowing them to decide who gets to fix your stuff and how much you have to pay to have it fixed.

        What’s more, DMCA 1201 has been used to punish and threaten security researchers who revealed defects in products with these locks, on the grounds that knowing about defects in these products make it easier to jailbreak them. That’s turning an ever-larger slice of the products we entrust with our private data, finances, health and even our lives into no-go zones for security r

10.11.16

Links 11/10/2016: Torvalds’ ARM Rant, End of Production of Galaxy Note 7

Posted in News Roundup at 5:37 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • A Look At The Most Promising Next-Gen Linux Software Update Mechanisms

    With traditional software package management solutions like APT and Yum showing their age and not adapting well to the embedded world and the slew of new areas for Linux like IoT, a new generation of atomic-based Linux software update solutions continue to be worked on. Matt Porter of the Konsulko Group is presenting at this week’s Embedded Linux Conference Europe 2016 with a comparison of these update technologies.

    Incremental atomic updates have been what’s being pursued by multiple Linux software vendors for delivering more reliable distribution updates, smaller sized updates via binary deltas, and generally allow rollbacks in case of problems. Some of the new distribution update mechanisms covered included SWUpdate, Mender, OSTree, and swupd. Interestingly, not mentioned in the slide deck is Ubuntu’s Snappy.

  • Desktop

    • Microsoft remains silent as Surface Pro 3 battery woes pile up

      Surface Pro 3 battery woes have gone from bad to dire. Microsoft, meanwhile, is hiding and stonewalling again.

      SP3 owners with LGC batteries have been complaining since the middle of September about bad batteries — greatly diminished capacities, tablets that refuse to run unless they’re plugged into the wall, and charge times measured in minutes, not hours. A month later, and the Microsoft Answers forum thread about bad LGC batteries is up to 18 pages. A separate thread for general SP3 battery problems is at 131 pages and growing rapidly.

  • Server

    • No SDN Kubernetes

      How these requirements are implemented is up to the operator. In many cases this means using a software defined network “SDN” also called an overlay network (e.g. flannel, weave, calico) or underlay network (MACvlan, IPvlan). The SDNs all accomplish the same three goals but usually with different implementation and often unique features.

      But the networking requirements doesn’t mean you have to run an SDN. It also means you can implement a traditional SDN product in a non-traditional way. Let’s look at the simplest solution for networking in Kubernetes.

  • Kernel Space

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

    • GNOME Desktop/GTK

      • GNOME’s Epiphany Browser Is Quick To Working On 3.24 Features

        It’s been just over two weeks since GNOME 3.22 was released while already a ton of feature work has been landing in Epiphany, GNOME’s Web Browser.

        It’s looking like the Epiphany web-browser update in GNOME 3.24 will be another feature-packed release. Some of the work that’s landed in the past two weeks already includes a lot of work around redoing the browser’s bookmarks support, removing obsolete code in different areas, a lot of work on sync support, asynchronous Storage Server support, a new preferences dialog user-interface, and more.

  • Distributions

    • Reviews

    • New Releases

      • GoboLinux 016 Joins the 64-bit Revolution, First Alpha Is Based on Awesome WM

        GoboLinux developer Lucas C. Villa Real announced today, October 10, 2016, the general availability of the first Alpha pre-release version of the upcoming GoboLinux 016 GNU/Linux operating system.

      • Bodhi Linux 4.0.0 Beta released-Final release is expected at the end of month

        Bodhi Linux 4.0.0 is making its way to final release and it is now one more step closer to this by having its beta release.Yes, the Ubuntu based beauty with Moksha DE(Moksha is a forked version of well known Enlightenment DE) got its beta release i.e. Bodhi LInux 4.0.0 Beta after months of release of Alpha version.Back in July,Bodhi Linux 4.0.0 alpha released.

      • Bodhi Linux 4.0.0 Beta Out, Final Release Lands This Month Based on Ubuntu 16.04

        Today, October 10, 2016, Bodhi Linux developer Jeff Hoogland proudly announced the release and immediate availability of the Beta pre-release of the upcoming Bodhi Linux 4.0.0 operating system.

        Bodhi Linux 4.0.0 Beta comes exactly one month after the release of the second Alpha milestone, bringing the development cycle to an end, as the developer plans to launch the final version of the Ubuntu-based distribution by the end of the month. As expected, the Beta contains many improvements and fixes to some of the bugs reported by users since the Alpha builds.

    • Arch Family

      • Antergos – Best Arch based distro for beginners, whoever want to taste arch, give a try

        As we know Arch Linux is one of the best Linux Distribution ever because we can customize whatever we want. We can get all the latest software’s because of rolling release but its very difficult for freshers, installation & configuration. Today i’m going to show you, how to install Antergos – The Best Arch based distro for beginners, whoever want to taste arch Linux give a try, i can assure worth to try.

    • Slackware Family

      • You Can Now Run Linux Kernel 4.8.1 on Your Slackware 14.2 System, Here’s How

        GNU/Linux developer Arne Exton announced earlier, October 10, 2016, that he made a new, special kernel based on Linux kernel 4.8.1 for Slackware and Slackware-based distributions.

        Linux kernel 4.8.1 is the first point release to the Linux 4.8 series, which is the latest and most advanced stable kernel to date, and now you can install it on your Slackware operating system thanks to Arne Exton. The new build is designed for 64-bit (x86_64) installation and works with Slackware 14.2 (Current), Zenwalk, Slax, and SlackEX, but it should work on any 64-bit Slackware 14.2 derivative, such as Salix.

    • Red Hat Family

      • Arrow now offering Red Hat’s hybrid cloud solutions in UK

        Arrow has announced it has joined the Red Hat Certified Cloud and Service Provider programme, allowing it to distribute the company’s hybrid cloud solutions to its channel customers in the UK.

        Now customers and independent software vendors can benefit from Arrow’s extensive partner network, which in turn, will be fully supported to sell Red Hat’s innovations.

        The products Arrow will be selling will help cloud hosting, system integrators and managed service providers resell Red Hat’s full range of products using its on-demand, via multi-tenant, dedicated, and managed models.

      • Finance

      • Fedora

        • Ease of 3D Printing in Fedora

          Fedora has been known to be the best OS for 3D printing already for some time, mainly due to the work of Miro (he packaged all the available open source software for 3D printing, prepared udev rules to automatically connect to 3D printers etc.), but I was still surprised how easy it is to 3D print with Fedora these days. It really took just a couple of minutes from a stock system to start of the actual printing. It’s almost as simple as printing on papers.
          There is still room for improvements though. Some 3D printing apps (Cura Lulzbot Edition is one of them) are available in the official repositories of Fedora, but don’t have an appdata file, so they don’t show up in GNOME Software. And it would also be nice to have “3D Printing” category in GNOME Software, so that the software is more discoverable for users.

    • Debian Family

      • Debian is participating in the next round of Outreachy!

        Following the success of the last round of Outreachy, we are glad to announce that Debian will take part in the program for the next round, with internships lasting from the 6th of December 2016 to the 6th of March 2017.

        From the official website: Outreachy helps people from groups underrepresented in free and open source software get involved. We provide a supportive community for beginning to contribute any time throughout the year and offer focused internship opportunities twice a year with a number of free software organizations.

        Currently, internships are open internationally to women (cis and trans), trans men, and genderqueer people. Additionally, they are open to residents and nationals of the United States of any gender who are Black/African American, Hispanic/Latin@, American Indian, Alaska Native, Native Hawaiian, or Pacific Islander.

      • Debian Fun in September 2016
      • Derivatives

        • Canonical/Ubuntu

          • The Open Source Era: A Q&A With Canonical CEO Jane Silber

            Canonical, a 750-person company with employees in more than 42 countries around the world, is the driving force behind Ubuntu open-source software. Although Canonical and Ubuntu are well-known and well-respected among hardcore technologists, most consumers have probably never heard of either.

            This is an unfortunate reality of open-source software. Products and projects dedicated to democratizing technology by making computer use free and fair for everyone often fly under the radar. Whether Canonical and Ubuntu become synonymous with the general consumer is largely dependent on whether or not consumers move away from traditional device usage. Can Canonical’s vision for a converged computing experience across a spectrum devices make the Canonical name as synonymous with desktop users as it is with users of its enterprise cloud and application performance management (APM) solutions?

            I chatted with Canonical CEO Jane Silber, a remarkable executive with a rich technological background, over email about the challenges Canonical faces in consumer computing and even television, as well as how the company plans to maintain its status in the enterprise cloud and software markets.

  • Devices/Embedded

Free Software/Open Source

  • ETSI releases first SDN software stack as open source

    This week, standardisation organisation ETSI published OSM Release ONE, an open-source software stack to implement Software-Defined Networking (SDN). SDN, or network virtualisation, brings the management of computer networks to a higher level by abstracting the physical infrastructure. This allows network administrators to manage their networks in a more flexible, or even a fully automated, dynamic way.

  • Google’s Open-Source Noto Font Covers All Languages
  • Google Noto is an open source font family for more than 800 languages
  • Google releases open source font Noto to eliminate the tofu problem

    You may not have heard of the tofu problem, but you have almost certainly experienced it. If you visit a website or open a document that can’t display a particular character, you’ll see a white box symbol resembling a cube of tofu. Now Google has a solution.

    The Noto font project (it’s a mashup of ‘NO more TOfu’) has been something of a labor of love, taking five years to reach its conclusion. But the result is an open source Noto font family which Google says includes “every symbol in the Unicode standard, covering more than 800 languages and 110,000 characters”.

    Talking about the new font family, Google says: “The Noto project started as a necessity for Google’s Android and ChromeOS operating systems. When we began, we did not realize the enormity of the challenge. It required design and technical testing in hundreds of languages, and expertise from specialists in specific scripts. In Arabic, for example, each character has four glyphs (i.e., shapes a character can take) that change depending on the text that comes after it. In Indic languages, glyphs may be reordered or even split into two depending on the surrounding text”.

  • Google’s New Fonts Chip Away at Written Language Barriers

    Project Noto, one of Google’s most ambitious undertakings ever, has reached a milestone. Noto now supports 800 languages and 100 writing scripts, the companies announced last week. Google and Monotype launched the open source initiative to create a typeface family that supports all the languages in the world, even rarely used languages. Both serif and sans serif letters with up to eight weights are supported, as well as numbers, emoji, symbols and musical notation. “Noto” is short for “no tofu.”

  • Syncano makes it’s dashboard open source

    Syncano has open-sourced its Dashboard platform, so that more developers will be able to access the libraries and repositories to help them build apps faster.

    Up to now, Syncano’s Dashboard has been a private project. With the company’s release of the Dashboard on GitHub, a new repository has been created that allows contributions, pull requests, and issue requests from any developer with a GitHub account.

  • AT&T plans to launch ECOMP into the open source community by Q1 2017

    AT&T is hopeful that it can launch its Enhanced Control, Orchestration, Management and Policy (ECOMP) virtualization platform into the open source community during the first quarter of 2017.

    The telco said that this will further its goal to make ECOMP the telecom industry’s standard automation platform for managing virtual network functions and other software-centric network capabilities.

    Chris Rice, SVP of AT&T Labs Domain 2.0 architecture and design, said in a blog post that by launching ECOMP into open source, “community members can use and contribute to the evolution of this software platform.”

  • Open Source Initiative Welcomes Open edX as Newest Affiliate Member
  • Ulterius Dials In With Open-Source Remote Desktop PC Management
  • SaaS/Back End

  • Oracle/Java/LibreOffice

  • CMS

    • Best Open Source CMS

      Trying to determine the best open source CMS is a lot like choosing the best shoes. In the end, it’s a matter of perspective. However, it’s accurate to point out that the real differences between each open source CMS are usually feature related. The main items of concern range from add-ons to security and are factors you should consider when choosing the best CMS for your needs.

      In this article, I’ll share what I believe are the best open source CMS options available today. Bear in mind that not everyone is willing to sacrifice ease of use for security or security for ease of use. There is no single answer for everyone. Let’s get started, shall we?

  • Pseudo-Open Source (Openwashing)/Microsoft

  • BSD

    • FreeBSD 11.0 Officially Released

      Following the recent delays, FreeBSD 11.0-RELEASE is now officially available.

      FreeBSD 11.0-RELEASE was announced this morning as the latest major update to this BSD operating system.

      Among the many changes for FreeBSD 11 is 802.11n WiFi support, better WiFi/wireless support in general, native graphics support for the Bhyve hypervisor, official support for ARM 64-bit / AArch64, vastly improved/updated DRM graphics driver code, and much more.

      FreeBSD 11.0 can be downloaded from the FreeBSD.org announcement.

    • FreeBSD 11.0 Operating System Officially Released, Here’s What’s New

      Today, October 10, 2016, the FreeBSD Foundation proudly announced the release and general availability of the FreeBSD 11.0 operating system based on the latest BSD and Open Source technologies.

      FreeBSD 11.0 has been in development since March 2016, during which it received a total of four Beta builds and three Release Candidates. FreeBSD 11.0 packs a large number of new features and improvements, among which we can mention support for the open source RISC-V instruction set architecture, support for NUMA memory allocation and scheduler policies, as well as out-of-the-box support for Raspberry Pi, Raspberry Pi 2, and Beaglebone Black peripherals.

  • Openness/Sharing/Collaboration

    • Open Data

      • State Of The Map, Thanks!

        Thanks to everyone who made it to the international State Of The Map conference in Brussels two weeks ago. With around 400 attendees from 52 different countries, this was a fantastic event bringing our community together.

        Huge thanks to the team of organisers, and local volunteers in Belgium who helped make it such a success. We saw some of these people up on stage at the end of the conference:

    • Open Hardware/Modding

      • Zula Open Source Audiophile Amplifier Hits Kickstarter (video)

        Audioberry has unveiled a new open source amplifier they have created which has been designed to provide audiophile amplification for streaming devices as well as mini PCs such as the Raspberry Pi.

        The Zula amplifier has been developed to be the best in class, providing both exceptional value together with superb sound, and is now available to back. With pledges starting from just £24 for the Zula Raspberry Pi internal mount kit which will start shipping during November 2016.

  • Programming/Development

    • More software engineers over age 40 may join a lawsuit against Google

      Google suffered a setback in an age discrimination suit this week. A judge ruled that other software engineers over age 40 who interviewed with the company but didn’t get hired can step forward and join the lawsuit.

      The suit was brought by two job applicants, both over the age of 40, who interviewed but weren’t offered jobs.

      Specifically, the judge has approved turning the suit into a “collective action” meaning that people who “interviewed in person with Google for a software engineer, site reliability engineer, or systems engineer position when they were 40 years old or older, and received notice on or after August 28, 2014, that they were refused employment, will have an opportunity to join in the collective action against Google,” the ruling says.

    • RISC-V Backend For LLVM Making Progress

      The ongoing development of a RISC-V back-end for the LLVM compiler stack continues making progress and stepping closer to merging to mainline.

      Alex Bradbury issued a status update concerning the state of the RISC-V patches for LLVM. Six of the patches so far have been reviewed and ready to land, three are being reviewed still, and two patches are yet to be reviewed. It’s looking like within the months ahead this RISC-V back-end will be merged so LLVM can support this open-source CPU ISA.

  • Standards/Consortia

    • French Company Sues Apple Because of Improper HTML5 Support in iOS

      Nexedi, a French software development company, is suing Apple in a French court because of the sorry state of HTML5 support on iOS, and because Apple actively prevents third-party browser engines from running on iOS.

      The company filed a civil lawsuit in France because a local law gives it the best chances of succeeding in its effort. A local French law passed a few years back prevents large companies from imposing unbalanced contracts on smaller businesses.

      Nexedi says that Apple forces software developers to sign an unfair contract when submitting an app to the iOS App Store that states that all web content should be handled by a WebKit-based browser engine.

      The French company’s problem is that the WebKit engine is seriously lagging behind when it comes to supporting modern HTML5 features. Because Apple forces iOS app developers to use WebKit-based browsers, developers must invest serious time and effort into porting modern apps to work with the limited version of HTML5 supported in iOS, indirectly cutting down their profits.

    • Here’s Why These Open Source Programmers Have Sued Apple

      Nexedi, a French open source software vendor has sued Apple. The lack of support for standard web technologies on iOS irked the company, resulting in the allegations that Apple’s App Store contract is unfair. We have contacted Apple for a clarification and we’ll be keeping you in the know.

Leftovers

  • Science

    • WikiLeaks Reveals UFO ​Messages in Clinton Campaign Emails

      The former lead singer of the band Blink 182 was in recent contact with ‘s campaign chairman John Podesta about UFOs, newly disclosed emails show.

    • Neural Net Computing Explodes

      Neural networking with advanced parallel processing is beginning to take root in a number of markets ranging from predicting earthquakes and hurricanes to parsing MRI image datasets in order to identify and classify tumors.

      As this approach gets implemented in more places, it is being customized and parsed in ways that many experts never envisioned. And it is driving new research into how else these kinds of compute architectures can be applied.

    • Vint Cerf Warns Humanity: Can Our Data Survive Longer Than A Century?

      Transmission Control Protocol (TCP) co-author Vint Cerf is hailed as “the father of the internet,” but now he’s worried about an even larger communications protocol, on a scale of thousands of years. How will our civilization communicate with people in the future? When it comes to generations yet to come, how will we preserve the glory that is present-day, 21st-century society?

      Yes, we’ve got storage media — but for long-lasting durability, does it really compare with centuries past? “We’re going backward,” Cerf argued in his column published in Communications of the ACM looking fondly back at the history of humankind — and the way bygone eras preserved glimpses of their lives to echo down through the ages. It’s like a tour of humanity’s mediums over the last 17 millennia, offering the breath-taking perspective of a tumble through time.

  • Health/Nutrition

    • Michigan paid more than FEMA for Flint emergency supplies

      The State of Michigan likely paid hundreds of thousands of dollars too much for emergency supplies related to the Flint drinking water crisis because it used no formal bidding process, relied almost exclusively on one out-of-state company with ties to a top aide to Gov. Rick Snyder, and didn’t turn to Michigan companies already approved to do business with the state, a Detroit Free Press investigation has found.

      The Free Press compared Flint purchasing records by the State of Michigan between October and January with purchasing by the Federal Emergency Management Agency between January and August.

    • New parents charged £30 to hold their newborn baby as part of popular skin-to-skin bonding experience

      A dad claims a hospital charged him and his wife £30 to hold their newborn son.

      Ryan Grassley says he had to pay the fee, worth $39.35 in US money, for his wife to hold their tiny newborn immediately after he was delivered by C-section.

      The Utah father shared a snap of the itemized bill, which included a charge for “skin-to-skin after c-sec,” on Reddit – with readers offering a mixed rection.

      Grassley said when his son was born by C-section at Utah Valley Hospital on September 4, the operating room nurse asked if the couple wanted to do “skin to skin.”

      They agreed and their baby was cleaned-up and handed over for his time with mum.

      The practice, viewed to have many benefits, is when a new baby’s bare skin is placed against its mother’s to help them bond.

    • US Media Don’t Need to Look Abroad to Find an Abortion Crisis

      US media saw a story in the work boycott and street protests by some 6 million women in Poland that led to a reversal of government plans to put through a complete ban on abortion, including in cases of rape or danger to a woman’s life. Stories in major outlets pointed out that Poland’s laws are already among the most restrictive in Europe; they noted the concerns of human rights advocates that the ban would criminalize women and doctors, and make women who have miscarriages subjects of suspicion and investigation. It was good to see, but it did make one wonder: If those conditions are unacceptable, they’re unacceptable whether they’re de jure or de facto, right?

    • It’s Time to Go, Hyde Amendment

      Enacted in 1976, the Hyde Amendment turns 40 years old this year. The Hyde Amendment was introduced by the late Henry Hyde, a Republican from Illinois who sought to ban abortions outright. Disappointed that the Supreme Court had just ruled that the Constitution protects the right to an abortion, Rep. Hyde introduced the amendment to restrict abortion access for those who qualify for Medicaid.

      The amendment withholds insurance coverage for abortion care in virtually all cases from women who qualify for Medicaid and others who access their health insurance through the federal government. Effectively, it reserves the right to an abortion for those privileged to afford it.

    • Is toxic trade in your backyard?

      If passed by Congress, two pending U.S. trade deals – the Trans-Pacific Partnership (TPP) and the Transatlantic Trade and Investment Partnership (TTIP) – would give some of the world’s largest fossil fuel corporations broad new rights to challenge our climate protections in private tribunals. For the first time, these corporations could ask unaccountable panels of corporate lawyers to order U.S. government compensation if such protections interfered with their widespread fossil fuel projects.

  • Security

    • One election-system vendor uses developers in Serbia

      The use of proprietary systems in elections has its critics. One Silicon Valley group, the Open Source Election Technology Foundation, is pushing for an election system that shifts from proprietary, vendor-owned systems to one that that is owned “by the people of the United States.”

    • Europe to Push New Security Rules Amid IoT Mess

      The European Commission is drafting new cybersecurity requirements to beef up security around so-called Internet of Things (IoT) devices such as Web-connected security cameras, routers and digital video recorders (DVRs). News of the expected proposal comes as security firms are warning that a great many IoT devices are equipped with little or no security protections.

    • Internet of Things botnets: You ain’t seen nothing yet

      Internet of Things (IoT) botnet “Mirai” is the shape of things to come and future assaults could be even more severe, a leading security research firm warns.

      Mirai powered the largest ever DDoS attack ever, spawning a 620Gbps DDoS against KrebsOnSecurity. Source code for the malware was released on hacker forums last week.

      The malware relied on factory default or hard-coded usernames and passwords to compromise vulnerable IoT devices such as insecure routers, IP cameras, digital video recorders and the like.

      PenTestPartners, the UK security consultancy behind numerous hack on Iot devices ranging from Wi-Fi enabled kettles to cars, said that the botnet finally illustrates the consequences of IoT vendors cutting the corners on security.

    • The top three Wi-Fi pen testing tools in Kali Linux

      Every hacker and security researcher loves Kali Linux. The developers of Kali Linux ethical hacking distro have released the second Kali Rolling ISO release i.e. Kali 2016.2. Just like the previous one, Kali promises to deliver lots of new updates and changes in this release. Over the course of past few months, Kali developers have been busy adding new tools to Kali and fixing multiple bugs. For example, they have added HTTPS support in busybox that allows secure installation over SSL.

      Kali Linux provides you the flexibility to install your favorite desktop environment and personalizing your experience. However, Kali developers note that users often talk about how they would love to see another desktop environments instead of GNOME.

    • How ‘Security Fatigue’ Affects Our Choices Online

      A new study claims many users suffer from ‘security fatigue,’ which affects the choices we make online. What’s the real answer and where does the root cause sit?
      An overabundance of security news and alerts has led to “security fatigue,” which is causing users to make bad choices when it comes to online security, suggests a report from the National Institute of Standards and Technology (NIST).

    • Apache Milagro: A New Security System for the Future of the Web
    • Ransomware hackers are hitting the NHS in the knackers [ophk: "politicians’ heads should roll for running MS anywhere near the NHS”]

      Rashmi Knowles, chief EMEA security architect at RSA, said: “Ransomware is an extremely lucrative business for cyber criminals as once they are in they just need to encrypt the data. Whereas actually stealing data and then trying to resell makes it a much longer process.

      “Current data shows that ransomware cases are expected to double from 2015 to 2016, and it should come as no surprise that breaches continue to happen as frequently as they do.

      “The results show organisations relying on a fragmented foundation of data and technologies. Because it remains siloed, visibility is incomplete, making attacker activity difficult to scope.

      “As a result the speed with which they can detect and investigate threats becomes a real challenge.”

  • Defence/Aggression

    • Exclusive: As Saudis bombed Yemen, U.S. worried about legal blowback

      The Obama administration went ahead with a $1.3 billion arms sale to Saudi Arabia last year despite warnings from some officials that the United States could be implicated in war crimes for supporting a Saudi-led air campaign in Yemen that has killed thousands of civilians, according to government documents and the accounts of current and former officials.

      State Department officials also were privately skeptical of the Saudi military’s ability to target Houthi militants without killing civilians and destroying “critical infrastructure” needed for Yemen to recover, according to the emails and other records obtained by Reuters and interviews with nearly a dozen officials with knowledge of those discussions.

      U.S. government lawyers ultimately did not reach a conclusion on whether U.S. support for the campaign would make the United States a “co-belligerent” in the war under international law, four current and former officials said. That finding would have obligated Washington to investigate allegations of war crimes in Yemen and would have raised a legal risk that U.S. military personnel could be subject to prosecution, at least in theory.

    • Obama DOJ drops charges against alleged broker of Libyan weapons

      The Obama administration is moving to dismiss charges against an arms dealer it had accused of selling weapons that were destined for Libyan rebels.

      Lawyers for the Justice Department on Monday filed a motion in federal court in Phoenix to drop the case against the arms dealer, an American named Marc Turi, whose lawyers also signed the motion.

      The deal averts a trial that threatened to cast additional scrutiny on Hillary Clinton’s private emails as Secretary of State, and to expose reported Central Intelligence Agency attempts to arm rebels fighting Libyan leader Moammar Qadhafi.

    • The Nobel Peace Prize Has Become A Cruel Joke

      Notable peace activists needn’t apply. Despicable war criminals time and again become Nobel Peace Prize honorees.

      This year was no exception, Colombian President Juan Manuel Santos the latest recipient for negotiating dubious peace with FARC-EP freedom fighters.

      James Petras earlier called them “the longest standing, largest peasant-based guerrilla movement in the world…founded in 1964…legitimate resistance” against ruthless Colombian repression.

    • Isis recruiting violent criminals and gang members across Europe in dangerous new ‘crime-terror nexus’

      “Sometimes people with the worst pasts create the best futures,” reads the slogan, emblazoned on an image of a masked fighter wielding a Kalashnikov, walking into blinding light.

      The poster was shared on Facebook by Rayat al-Tawheed, a group of British Isis fighters from London calling themselves the “Banner of God”.

      Their target is young men looking for redemption from crime, drugs or gangs, willing to save their souls by waging jihad for the so-called Islamic State.

  • Transparency/Investigative Reporting

    • WikiLeaks releases Hillary Clinton’s Wall Street speeches in ‘handy Kindle format’

      After months of calls upon Hillary Clinton to release her Wall Street speeches, they are now more available and accessible than ever before, with WikiLeaks publishing them in Kindle format.

      If a word document or a PDF does not suit the reader, all they need to do is download to file to their Kindle and read the extracts on the move.

      WikiLeaks dumped the excerpts online last Friday, claiming they showed excerpts of paid, closed-door speeches to Wall Street executives, out of a batch of more than 2,000 emails belonging to Clinton campaign chair John Podesta.

    • Wikileaks: New York Times Caught Providing Bill Clinton Questions Before ‘Interview’

      The New York Times provided questions to former President Bill Clinton before an interview with Nicholas Kristoff, the Wikileaks release of Clinton campaign chairman John Podesta emails has revealed.

  • Environment/Energy/Wildlife/Nature

    • A military view on climate change: It’s eroding our national security and we should prepare for it

      In this presidential election year we have heard much about some issues, such as immigration and trade, and less about others. For example, climate change was discussed for an estimated 82 seconds in the first presidential debate last week, and for just 37 minutes in all presidential and vice presidential debates since the year 2000.

      Many observers think climate change deserves more attention. They might be surprised to learn that U.S. military leaders and defense planners agree. The armed forces have been studying climate change for years from a perspective that rarely is mentioned in the news: as a national security threat. And they agree that it poses serious risks.

      I spent 32 years as a meteorologist in the U.S. Navy, where I initiated and led the Navy’s Task Force on Climate Change. Here is how military planners see this issue: We know that the climate is changing, we know why it’s changing and we understand that change will have large impacts on our national security. Yet as a nation we still only begrudgingly take precautions.

    • Dahr Jamail on Climate Disruption, Richard Phillips on Trump’s Taxes

      This week on CounterSpin: From vanishing ice to animal die-offs to increasing wildfires, scientists use words like “unprecedented” and “staggering” to describe the evident impacts of human-driven climate disruption. Elite media say they take it all very seriously…. How far are they from taking it seriously enough?

      Dahr Jamail is a staff reporter at Truthout and author of a number of books, including Beyond the Green Zone: Dispatches From an Unembedded Journalist in Occupied Iraq and the forthcoming The End of Ice.

    • Coverage of Haiti and Hurricane Reinforces a Sad, Static Storyline

      While the extent of the damage exacted by Hurricane Matthew on Haiti is not yet known, more than 500 deaths have been reported. But with the storm moving toward the US, media too are moving, leaving in their wake the sorts of stories you would predict: “Fragile Haiti in the Line of Fire From Matthew” (USA Today, 10/3/16), “Impoverished Haiti Braces for ‘Catastrophic’ Floods as Hurricane Approaches” (Reuters, 10/4/16) and, from the New York Times (10/4/16), “A List of Previous Disasters in Haiti, a Land All Too Familiar With Hardship.”

    • Proposed Pipeline Sparks Widespread Dissent

      The People over Pipelines march packed the streets with local activists in July who came together in protest and embarked on a five day trek across 55 miles, covering only a fraction of the proposed path for the high-pressure fracked natural gas pipeline we seek to stop. Despite such a powerful and outspoken movement, policymakers have neglected to restrain Spectra Energy from constructing the Algonquin Incremental Market (AIM) pipeline. Such disregard for the resolution of the people, and a tendency to overlook what is truly best for our wellbeing, is not only a clear sign of rapacious ignorance, it’s simply undemocratic.

      Many people, including high schoolers like me, have raised countless concerns about this pipeline, ranging from local safety threats to the consequences of climate change. From neighborhood-disrupting construction and family displacement from the abuses of eminent domain, to water pollution from hydraulic fracturing, to transporting the explosive gas through leak-prone pipelines, to climate disruption—essentially every aspect of this pipeline is hazardous. Not to mention, scientists say we can’t afford to build even one more pipeline if we’re serious about avoiding catastrophic climate change.

    • ‘We Must Honor Our Mother’: Actress Shailene Woodley Arrested at DAPL

      Actress Shailene Woodley has been arrested for trespassing at one of the construction sites for the Dakota Access oil pipeline, multiple reports confirm.

      She was one of 28 people taken in for criminal trespassing, according to the Bismarck Tribune, which reported that more than 200 people were demonstrating at one of the construction sites outside a 20-mile buffer that the federal government had requested the company respect.

    • Hillary Clinton Touted Her Record of Spreading Fracking in Secret, Paid Speeches

      Behind closed doors on the paid speaking circuit, Hillary Clinton was far more candid than she has been in public about her prominent role as Secretary of State in exporting American-style hydraulic fracturing — the controversial, environmentally damaging technique best known as fracking — to countries all over the world.

      “I’ve promoted fracking in other places around the world,” she declared during a 2013 paid talk to Deutsche Bank, adding that she launched a new wing of the State Department devoted to the initiative.

      During a paid speech in Canada the following year, Clinton touted her role in “accelerating” natural gas development in Europe, calling attention to Poland’s embrace of fracking as a positive step.

      The contrast with the rhetoric Clinton has used on the campaign trail is striking. Clinton has rarely spoken in public of her role selling fracking abroad, and at times positioned herself as a skeptic of the controversial drilling technique. In the lead-up to the New York Democratic primary, Clinton’s campaign released a television advertisement that gave the impression that she has worked to discourage fracking.

    • The $20 Billion Arctic Pipeline That Will Haunt Canada Forever

      The vision came to Jonas Antoine during a drum session with the other men of the tribe. Jonas is not a medicine man, but it was a medicine dream, of the kind that visited his Dene ancestors. He was in the village of Wrigley in a remote section of Canada’s Northwest Territories, standing at the cliff on the edge of town, looking out over the massive river valley, and as he beat the hand-held drum and chanted with the men he saw something out on the horizon.

      “I saw skyscrapers rise out of the ground,” Antoine told me. “We’re drumming, drumming, and I saw them. In the distance, rising out of our beautiful mountains. And I thought, ‘This can’t happen here.’ I knew I had to stop it.”

    • Why Rush Limbaugh thinks Hurricane Matthew is liberal propaganda

      Conservative pundit Rush Limbaugh offered a bold assessment of Hurricane Matthew on Wednesday: the category 4 storm was exaggerated by the Obama administration in order to validate climate change theories.

      At the crux of Limbaugh’s argument was the so-called ‘hurricane drought’ in the United States, which ended when Matthew made landfall in Florida last week. After Hurricane Katrina struck New Orleans in 2005, former vice president Al Gore predicted that hurricane activity would increase as a result of man-made warming.

      “And then what happened? We had 11 years of no hurricanes – 11 straight years of no major hurricanes striking land in the United States, which just bores a hole right through the whole climate change argument,” Limbaugh said on his talk radio show. “They want people to think this way: Hurricane reported. Must be climate change.”

    • Climate Change Doubled the Size of Forest Fires in Western U.S., Study Says

      “No matter how hard we try, the fires are going to keep getting bigger”

      Man-made climate change has doubled the total area burned by forest fires in the Western U.S. in the past three decades, according to new research.

      Damage from forest fires has risen dramatically in recent decades, with the total acres burned in the U.S. rising from 2.9 million in 1985 to 10.1 million in 2015, according to National Interagency Fire Center data. Suppression costs paid by the federal government now top $2 billion.

      Now a new study, published in the journal Proceedings of the National Academy of Sciences, has found that a significant portion of the increase in land burned by forest fires can be attributed to man-made climate change. Other factors are also at play, including natural climate shifts and a change in how humans use land, but man-made climate change has had the biggest impact. That trend will likely continue as temperatures keep rising, researchers said.

  • Finance

    • The Dash For Cash: Leaked Files Reveal RBS Systematically Crushed British Businesses For Profit

      The Royal Bank of Scotland killed or crippled thousands of businesses during the recession as a result of a deliberate plan to add billions of pounds to its balance sheet, according to a leaked cache of thousands of secret documents.

      The RBS Files – revealed today by BuzzFeed News and BBC Newsnight – lay bare the secret policies under which firms were pushed into the bank’s feared troubled-business unit, Global Restructuring Group (GRG), which chased profits by hitting them with massive fees and fines and by snapping up their assets at rock-bottom prices.

      The internal documents starkly contradict the bank’s public insistence that GRG acted as an “intensive care unit” for ailing firms, tasked with restructuring their loan agreements to “help them back to health”.

    • Yle: State funding for sports bodies used mainly for admin and personnel costs, not athletes

      An Yle Sports analysis of available data has shown a sizeable 64-percent increase in state funding for Finnish sporting associations, much of it used to cover administrative and personnel costs, leaving athletes largely to fend for themselves. In many cases sports administrators are earning over 100,000 euros annually, while top athletes are trying to make ends meet on less than 1,200 euros a month.

    • ‘Poverty Is a Product of the Institutions We Have in Society’

      The new census data show the steepest one-year decline in the US poverty rate in decades. The dip from 14.8 percent to 13.5 percent was widely heralded, if some did indicate that declarations like the New York Times’ “Millions in US Climb Out of Poverty at Long Last” might be overblown. The rate was 11.3 percent in 2000, after all, and the gains aren’t evenly spread around, or necessarily sustainable.

      When corporate media talk about poverty, this is often what it looks like. “Experts” talk about what amount and sorts of resources it “makes sense” to allow people to have before they’re eligible for what amount or sort of assistance from the state, and how tweaks to those rules may affect the overall number of people who qualify to be labeled poor.

    • Facebook accused of ‘picking and choosing’ tax rules after paying just $5 million in UK

      Facebook ended up with an £11.3 million ($14 million) tax credit in the U.K. last year, which more than offset the amount it was charged, according to a new company filing, adding to concerns that the social media giant isn’t paying enough into the country’s coffers.

    • Facebook paid $5.16 million in UK taxes last year, 1,000 times what it paid in 2014

      Facebook paid £4.16 million ($5.16 million) in UK corporation tax last year, the company revealed on Sunday, a huge increase on the paltry £4,327 (around $5,367 at current exchange rates) it paid the year before. The company’s accounts show a turnover of £210 million, and a taxable profit of £20 million, on which it paid standard UK corporation tax rate.

      While technically compliant with UK tax laws, Facebook’s previous payments drew criticism from campaigners and politicians, who complained that the billion-dollar company was shirking its moral responsibility to pay tax in countries that it did business in. The criticism prompted Facebook to overhaul its UK tax structure, changing its policy so it counted UK ad sales as taking place the UK, rather than in Ireland — a tax loophole that had allowed to to pay minimal levels of tax on billions of dollars in profits.

  • AstroTurf/Lobbying/Politics

    • A Government Is Seizing Control Of Our Election Process (And It’s Not The Russians)

      There is an attempt underway for a government to take control of our election process and throw the election to Hillary Clinton. It is not the Russian government. Mark this day – it is when we came to understand that the American government decided to elect a president.

    • GOP ex-prosecutors slam Trump over threat to ‘jail’ Clinton

      Donald Trump’s debate-night vow to appoint a special prosecutor to investigate Hillary Clinton’s email setup and put her “in jail” provoked a sharp blowback from former U.S. prosecutors, who said Trump’s view of the Justice Department serving the whims of the president is antithetical to the American system.

      While presidents appoint the attorney general, they do not make decisions on whom to prosecute for crimes — and were Trump to do so, prosecutors warned, he would spark a constitutional crisis similar to that of the “Saturday Night Massacre” in the Nixon administration. In that case, Nixon attempted to fire the prosecutor investigating the Watergate scandal, and the top two Justice Department officials resigned on the spot.

    • Trump Is Not the Only Grabber Who Must Go

      As far as I’m concerned, there are 54 Trumps in the US Senate and 237 Trumps in the House. You can’t make this look good by removing your endorsement from Trump. Yes, Trump has to go — but so do you, all of you. Starting with the election on November 8th, we need to show up at the polls and remove as many of you as possible. This abuse of women stops now. I believe that most women and many men are going to determine their vote with this one thought, thanks to you and Trump:

    • New Jersey’s Student Loan Agency Has Started Getting Good Reviews — By Giving Free Stuff

      Over the past few years, dozens of borrowers have written devastating reviews of the New Jersey state agency whose student loans, as we have detailed, have strikingly onerous terms.

      “This place doesn’t even deserve one star,” posted Ashante Patterson on Google’s review platform. “It is a scam and horrendous organization that preys on and belittles borrowers.”

      “You are better off not going to college,” wrote another reviewer, Nik Sharma, about the Higher Education Student Assistance Authority, also known as HESAA. “They are the absolute worst and are inhumane.”

    • NBC waited for green light from lawyers before airing Trump video

      NBC News was aware of video footage of Donald Trump making lewd and disparaging remarks about women for nearly four days, a network executive said Saturday, but held onto the recording until lawyers finished reviewing the material.

      The network’s caution led to an awkward result: NBC News was scooped by The Washington Post, which took just five hours to vet and post its story. A tip from an individual led to The Post breaking one of the most consequential stories of the 2016 presidential campaign.

    • Trump Shows His Inner Dictator

      “I didn’t think I’d say this,” Donald Trump said to Hillary Clinton, as he took a couple of steps across the stage at the second Presidential debate, on Sunday night in St. Louis. “But I’m going to say it—and I hate to say it.” At that point, just nineteen minutes in, it was already hard to imagine what might give Trump any qualms. He had already said that her record was “terrible” and “disgraceful,” and that she “should be ashamed”; called Clinton’s husband, Bill, the worst abuser of women “in the history of politics in this nation,” and claimed that Hillary had “viciously” attacked women who had made allegations against him (three of those women were Trump’s guests at the debate); accused her of “laughing at the girl who was raped” by a man she had represented as a young lawyer (he’d brought her, too); accused her of being behind birtherism, which he himself had pushed; and objected when Clinton referred to Michelle Obama, who has been campaigning for her, as her friend—objected, it seemed, to the idea that Clinton could have any friends but Sidney Blumenthal (“he’s another real winner that you have”).

      In those first nineteen minutes, Trump had also repeatedly insisted that a video that emerged last Friday—outtakes from “Access Hollywood,” in which he told the host, Billy Bush, that because Trump was “a star” he could do whatever he wanted to women without their consent (Anderson Cooper, the moderator, paraphrased one line as “grabbing their genitals”)—was an example of “locker-room talk.” Trump made a vague expression of contrition, but with the air of a man looking over the moderators’ shoulders for a sign pointing to said locker room. And he had claimed that Clinton had cheated in her primary victory over Senator Bernie Sanders. Referring to Sanders’s endorsement of Clinton, Trump said, “I was so surprised to see him sign on with the devil.” That was a few seconds before he sighed, overcame his supposed reluctance to speak harshly, and pushed American political discourse to even lower depths.

    • The media’s Weimar moment

      In June 1954 on national television, Joe Welch, the US Army’s chief counsel, exposed Senator Joseph McCarthy’s dubious morality with those two legendary questions: “Have you no decency, sir? At long last, have you left no sense of decency?” Such was the novelty of television back then that having given McCarthy an authoritative forum for his views, TV could now serve as the instrument of his destruction.

      We all know what followed. The media attained the highest point of its legitimacy and authority during the Vietnam War with the publication of the Pentagon Papers and then the unfolding of the Watergate scandal. That ascendancy ran parallel to the rapid discrediting of politics as a vocation. Journalists were heroes. Politicians were scoundrels.

      Thirty years later, with the revelations of the media’s blindness to and sometimes complicity with the lies that led America into the Iraq War, journalists joined politicians in the space of detention into which public opinion puts those figures who betray the people’s trust. From that point on, America, once dubbed the oldest young country in the world by Gertrude Stein, began to experience the historical version of a senior moment. It began to undergo a Weimar moment.

      Existing between 1919 and 1933, the Weimar Republic was Germany’s first experience of democracy. Transparency of the political process, freedom of association, an openness to all groups and factions to express themselves and vie, through legitimate means, for power became established features of social and political life. Culture underwent a revolution as well. To borrow a formulation from Peter Gay’s landmark study of the Weimar period, outsiders such as Jews, homosexuals, experimental artists, and daring psychologists became insiders.

      The results, however, were disastrous. The instruments of democracy were appropriated by anti-democratic forces and used to undermine the democratic institutions that had made them available. And the breaking of cultural taboos reverberated from high culture into the depths of popular culture and custom, making once-taboo practices, from bestiality to pedophilia, semi-underground styles of gratification. Occurring simultaneously, the twin specters of economic despair and profligate wealth beset the population.

    • Donald Trump in 1993: ‘It’s fortunate I don’t have to run for political office’ – video

      In a 23-year-old video interview unearthed in New Zealand on Monday, Donald Trump says it is fortunate he is not running for political office given his belief that ‘certain women are more beautiful than others’. The TV interview by reporter Owen Poland was recorded in 1993, when Trump was making an ultimately unsuccessful bid to start a casino in New Zealand

    • Trump Taj Mahal Closes After 26 Years on Atlantic City Boardwalk

      Donald Trump opened his Trump Taj Mahal casino 26 years ago, calling it “the eighth wonder of the world.”

      But his friend and fellow billionaire Carl Icahn closed it Monday morning, making it the fifth casualty of Atlantic City’s casino crisis.

    • UN Critic of Donald Trump Must Be Silenced, Russia Says

      Russia’s ambassador to the United Nations filed a formal complaint last month demanding that the head of the world body’s human rights organization cease criticizing Donald Trump and other anti-Muslim politicians.

      Russia’s ambassador to the UN, Vitaly Churkin, confirmed to the Associated Press on Friday that he had delivered a démarche, a form of diplomatic protest, to Secretary General Ban Ki-moon last month. The complaint was in response to comments from Zeid Ra’ad Al Hussein, the UN high commissioner for human rights, denouncing the racist rhetoric of Trump and European nationalists, including Geert Wilders, the Dutch populist who has promised to close mosques and ban the Koran if elected.

      “Prince Zeid is overstepping his limits from time to time and we’re unhappy about it,” Churkin told the AP.

      There was no indication that Trump requested Russia’s intercession on his behalf, or that he was even aware of the comments from the head of the UN rights group. Across the West, Russia has been accused of supporting inward-looking, nationalist demagogues who are considered less likely to be critical of Russian foreign and domestic policies. Hillary Clinton and her supporters have seized upon Trump’s boasts about being praised by Russian President Vladimir Putin as evidence of his naivety in world affairs.

    • What Got Left Out–and Right-Spun–at VP Debate

      The vice presidential debate (10/4/16) provided a stark picture of just how distorted corporate media’s priorities are compared to issues of actual consequence in people’s lives. Questions of national security and national debt consumed the evening, while issues such as abortion, poverty, LGBTQ rights and climate change were never asked about.

      Some of the topics that moderator Elaine Quijano of CBS News asked about: Russia, North Korea nuking the United States, ISIS/terrorism, why the US should bomb the Syrian and Russian air force and Donald Trump’s taxes.

      Topics that Quijano did not ask about: climate change, poverty, abortion, healthcare, student debt, privacy, LGBTQ rights or drug policy. There were no questions about these issues in the first presidential debate, either (FAIR.org, 9/27/16).

      Quijano did ask about immigration, a topic overlooked in the presidential debate. The economy was addressed via questions about the national debt and Social Security “run[ning] out of money.” Jobs and trade issues, which were discussed at some length by the presidential candidates, were not topics of questions in the VP debate.

      This is the 11th consecutive debate with a Democratic candidate for president or vice president that did not ask about poverty or abortion (FAIR.org, 5/27/16). The candidates did discuss abortion, but only in the context of an open-ended question about “balanc[ing] your personal faith and a public policy position,” which invited a religious reading of reproductive rights.

    • Both Campaigns Enthusiastically Violate Ban on Super PAC Coordination, Watchdog Says

      In another noble, doomed attempt to encourage the Federal Election Commission to enforce campaign finance law, the Campaign Legal Center filed complaints Thursday against Donald Trump, Hillary Clinton, and several Super PACs supporting them for illegal coordination.

      The Campaign Legal Center is a nonpartisan Washington, D.C., nonprofit that frequently files such complaints — including one based on The Intercept’s reporting — on which the FEC then generally takes no action.

      The FEC’s coma-like state is due to the ferocious opposition of its three Republican members to almost any restriction on money in politics. The FEC has six members, and by law no more than three can be from any one political party, so on many significant votes the commission deadlocks 3-3.

      Based on the CLC’s current complaints, it’s difficult to say whether the Trump or Clinton campaign more joyfully violates campaign finance rules.

      Several 2010 court decisions, including Citizens United, made it possible for Super PACs to raise and spend unlimited amounts of money supporting candidates for federal office. The Supreme Court determined that this would not “give rise to corruption or the appearance of corruption” so long as Super PACs’ expenditures were truly independent — i.e., not coordinated with candidates’ campaigns.

    • We’re Not With Him: GOP Discovers Women’s Rights, Slams Donald Trump

      It takes a lot to rouse the feminist indignation of the GOP, but even Washington’s most diehard opponents of women’s rights are condemning Donald Trump’s comments in a 2005 recorded conversation with Access Hollywood’s Billy Bush. The Republican presidential nominee said, among other things: “When you’re a star, they let you do it,” and “Grab them by the pussy. You can do anything.”

      Mike Pence, Paul Ryan, Mitch McConnell, and other members of the Republican leadership distanced themselves from Trump’s comments.

      Pence issued a statement rejecting his running mate’s conduct. “As a husband and father, I was offended by the words and actions described by Donald Trump in the eleven-year-old video released yesterday. I do not condone his remarks and cannot defend them,” Pence said.

      Yet Pence’s record is not exactly out of sync with Trump’s words. Indeed, as a governor and legislator, Pence has been an innovator when it comes to measures that obstruct women’s rights. In Congress in 2007, he sponsored the first bill to defund Planned Parenthood. He is credited with starting the fight against the organization, which offers contraception, STI screenings, and primary care — as well as abortions.

  • Censorship/Free Speech

    • Kosher Internet: A Niche, But Necessary Market for Ultra-Orthodox Jews

      Jonathan was 20 when he left orthodox Jewish school, or yeshiva, and got his first computer: a ThinkPad laptop to get him through his college program in engineering. Having grown up in Jerusalem in the 1980s and 90s, he had gone the entirety of his life without a computer, or even a television at home—as was, and remains customary to varying degrees among Haredim, or ultra-Orthodox Jews. Still, that didn’t stop the future programmer from falling in love with computers.

      While packs of yeshiva boys would sneak into town, crowding internet cafes to watch soccer or porn, or merely to cruise the web—the secular world only a click away—Jonathan hacked his school’s internet filters blocking certain websites in the name of ruchnius, or spirituality. Though he had ventured outside the insular Haredi community where he grew up, the Jerusalem College of Technology still adhered to strict codes of religiosity, which included filtering the internet.

    • Torrent-based websites that cannot be censored?

      This is exciting. The Web2Web project claims to be able to put web pages on the Internet that cannot be taken down, using torrents and Bitcoin. And it can be run from any modern browser.

    • Too many academics are now censoring themselves

      My colleague at another university showed a picture of an emaciated Hungarian Jewish woman liberated from a death camp. A student, yelled out, “stop showing this, I did not come here to be traumatised”, disrupting his lecture on the Hungarian Holocaust. After the student complained of distress, caused by the disturbing image, my colleague was told by an administrator to be more careful when discussing such a sensitive subject. “How can I teach the Holocaust without unsettling my students?” asked my friend. Academics who now feel they have to mind their words are increasingly posing such questions.

    • Users enraged, confused over YouTube censorship

      YouTube users are up in arms over the platform’s recent censorship of content, the most notorious example being the removal of videos showing Hillary Clinton stumbling during a 9/11 event.

      Users have already been complaining about the YouTube policy that denies revenue to content it deems as not “advertiser friendly.”

      Since late August, some users noticed that YouTube had removed ads from any videos that go against newly updated guidelines, which means the people who uploaded the videos wouldn’t make any money. The process is called “demonetization.”

    • What would Sixties rebels make of consent classes?

      If you want an example of how thoroughly today’s campus activists have lost the plot, look no further than mandatory consent classes. After starting life in the US, these workshops – now rolled out at more than 20 UK campuses – are at the cutting edge of campus Orwellianism. (As Brendan O’Neill has pointed out, there is a profound irony in making classes on consent mandatory.) But, more crucially, this creepy desire to regulate students’ sex lives – pushed, in the main, by student leaders themselves – is undermining the hard-won gains of student activism itself.

      As this new academic year has begun, there have been pockets of resistance to consent classes. At the University of York, students staged a walkout. ‘Consent talks are patronising’, 23-year-old student Ben Froughi told the Mail. ‘If students really need lessons in how to say yes or no then they should not be at university.’ Last week, at Clare College, Cambridge, a consent class was held, and no one showed up. Clare’s women’s officer posted a picture of the empty lecture hall on social media, decrying students’ evident apathy as a ‘huge step backwards’. She later deleted the post.

    • Ben Affleck’s ‘PR Dopes’ Called Out for ‘Censorship’ At Press Junket
    • NDTV’s Censorship Of Chidambaram’s Interview Is Rather Curious
  • Privacy/Surveillance

    • Facebook Workplace Tries to Muscle In on Your Job [iophk: "centralized surveillance"]

      One in four people on Earth use Facebook to connect with friends and family. But Mark Zuckerberg and company really want all those people to use the social network for office chatter, too.

      This morning, at an event in London, the company formally released Facebook Workplace, a service designed specifically for business communication. It first unveiled the service—originally called Facebook for Work—eighteen months ago, testing it with many businesses. Now, Workplace is available to any organization that wants it. Facebook will charge a monthly fee to businesses who use the service—the first time it will generate revenue through fees instead of ads.

    • Facebook Wants to Kill Work Email With This New App

      You can officially add Facebook to the list of software companies seeking to all-but-eliminate corporate email.

      The social network’s much-anticipated business edition—formally dubbed Workplace by Facebook, rather than the Facebook at Work moniker used during its 18-month beta test—has already been adopted by more than 1,000 companies, according to information that Facebook plans to share Monday evening during the product’s official launch event in London.

    • Apple Watch banned from UK cabinet meetings over Russian hacking fears

      Politicians in the UK have reportedly been banned from wearing the Apple Watch to cabinet meetings over fears the device could be hacked. According to a report from The Telegraph, the government is worried that the Apple Watch’s microphone could be used to listen in on high-level policy discussions, especially by Russian spies.

      It’s a justified paranoia, especially after the announcement last week from the US government that it is officially blaming Russia for the hack on the Democratic National Committee. A source in the UK told The Telegraph: “The Russians are trying to hack everything.”

    • In the UK, running a blog over HTTPS is an act of terrorism, says Scotland Yard

      In a bizarre case, Scotland Yard is accusing a person for six separate acts of preparing terrorism. Those six acts include researching encryption, developing an “encrypted version” of his blog, and instructing others how to use encryption.

      This is one of those cases where you do a double take. As reported by Ars Technica, UK’s Scotland Yard is charging a Cardiff person with preparing for terrorism – but the list of charges shows activities we associate with very ordinary precautionary privacy measures. “Developing an encrypted version of a blog” can be read as, and probably means, publishing it over HTTPS – such as this blog and many others, simply because it’s considered best practice.

    • U.S. Tech Giants Are Investing Billions to Keep Data in Europe

      In the battle to dominate Europe’s cloud computing market, American tech giants are spending big to build up their local credibility.

      Amazon Web Services, the largest player, announced last week that it would soon open multiple data centers in France and Britain. Google, which already has sites in countries like Finland and Belgium, is expected to finish a new multimillion-dollar data complex in the Netherlands by the end of the year.

    • NSA In Support Of Encryption Is ‘Disingenuous’: EFF Purports

      On Wednesday, CAMBRIDGE, Ma. – The NSA, National Security Agency appeared in support of encryption. But the stance was quickly contested by the privacy advocates, who criticizes the agency for peculiar definition of the term “encryption” than others.

      The general counsel for the NSA, Glenn Gerstell, asserted that the company “believes in strong encryption” during the panel, “Privacy vs. Security: Beyond the Zero-Sum Game,” on (CCS) Cambridge Cyber Summit conducted by MIT.

    • Unblinking Eyes: The State of Communications Surveillance in Latin America

      In December 1992, following a hastily-drawn sketch of a map given to him by a whistleblower, the Paraguayan lawyer Martin Almada drove to an obscure police station in the suburb of Lambaré, near Asunción. Behind the police offices, in a run-down office building, he discovered a cache of 700,000 documents, piled nearly to the ceiling. This was the “Terror Archive,” an almost complete record of the interrogations, torture, and surveillance conducted by the Paraguayan military dictatorship of Alfredo Stroessner. The files reported details of “Operation Condor,” a clandestine program between the military dictatorships in Argentina, Chile, Paraguay, Bolivia, Uruguay, and Brazil between the 1970s and 1980s. The military governments of those nations agreed to cooperate in sending teams into other countries to track, monitor, and kill their political opponents. The files listed more than 50,000 deaths and 400,000 political prisoners throughout Argentina, Bolivia, Brazil, Chile, Paraguay, Uruguay, Colombia, Peru, and Venezuela.

    • Subpoena to Encrypted App Provider Highlights Overbroad FBI Requests for Information

      A recently revealed grand jury subpoena shows that the FBI is likely continuing to ask companies for more information than the law allows, according to technology and privacy attorneys interviewed by The Intercept.

      Earlier this year, the FBI served Open Whisper Systems, the creator of Signal, a popular end-to-end encrypted messaging application, with its first criminal grand jury subpoena. On Tuesday, Open Whisper Systems and its lawyers at the American Civil Liberties Union successfully challenged a gag order forbidding the company from speaking about that request.

      The published documents show that the FBI requested “any and all subscriber information and any associated accounts to include subscriber name, address, telephone numbers, email addresses, method of payment, IP registration, IP history logs and addresses, account history, toll records, upstream and downstream providers, any associated accounts acquired through cookie data, and any other contact information from inception to the present” for two phone numbers.

    • What would a CYBERCOM-NSA split mean?

      Much has been made over the discussions surrounding a potential separation of the National Security Agency and US Cyber Command. Such a determination would involve severing the “dual-hat” leadership of these organizations, which share the same chief, as well as raise questions of what CYBERCOM standing up as its own independent organization might look like.

    • Briefing Unsealed in Court Battle Over National Security Letters

      EFF Argues that NSL Secrecy Violates First Amendment and Chills Debate on Government Surveillance

      San Francisco – An appeals court published redacted briefing by the Electronic Frontier Foundation (EFF) today arguing that national security letters (NSLs) and their accompanying gag orders violate the free speech rights of companies who want to keep their users informed about government surveillance.

      EFF represents two service providers in challenging the NSL statutes in front of the United States Court of Appeals for the Ninth Circuit. Most of the proceedings have been sealed since the case began five years ago, but some redacted documents have been released after government approval.

    • USA FREEDOM Act Requires Government to Declassify Any Order to Yahoo

      In the wake of reports this week that the secretive Foreign Intelligence Surveillance Court (FISC) ordered Yahoo to scan all of its users’ email in 2015, there are many unanswered legal and technical questions about the mass surveillance.

      But before we can even begin to answer them, there is a more fundamental question: what does the court order say?

      We should be able to answer this question. Section 402 of the USA FREEDOM Act, passed in June 2015, specifically requires government officials to “conduct a declassification review of each decision, order, or opinion issued” by the FISC “that includes a significant construction or interpretation of any provision of law.” The Yahoo order would appear to fall squarely within this provision.

      Congress passed Section 402 to end decades of secret FISC-created law after learning that the court was interpreting federal statutes and the U.S. Constitution in secret and without the benefit of any other voices to counter arguments by the Executive Branch.

    • Experience and updated recipe for using the Signal app without a mobile phone

      In July I wrote how to get the Signal Chrome/Chromium app working without the ability to receive SMS messages (aka without a cell phone). It is time to share some experiences and provide an updated setup.

      The Signal app have worked fine for several months now, and I use it regularly to chat with my loved ones. I had a major snag at the end of my summer vacation, when the the app completely forgot my setup, identify and keys. The reason behind this major mess was running out of disk space. To avoid that ever happening again I have started storing everything in userdata/ in git, to be able to roll back to an earlier version if the files are wiped by mistake. I had to use it once after introducing the git backup. When rolling back to an earlier version, one need to use the ‘reset session’ option in Signal to get going, and notify the people you talk with about the problem. I assume there is some sequence number tracking in the protocol to detect rollback attacks. The git repository is rather big (674 MiB so far), but I have not tried to figure out if some of the content can be added to a .gitignore file due to lack of spare time.

      I’ve also hit the 90 days timeout blocking, and noticed that this make it impossible to send messages using Signal. I could still receive them, but had to patch the code with a new timestamp to send. I believe the timeout is added by the developers to force people to upgrade to the latest version of the app, even when there is no protocol changes, to reduce the version skew among the user base and thus try to keep the number of support requests down.

      Since my original recipe, the Signal source code changed slightly, making the old patch fail to apply cleanly. Below is an updated patch, including the shell wrapper I use to start Signal. The original version required a new user to locate the JavaScript console and call a function from there. I got help from a friend with more JavaScript knowledge than me to modify the code to provide a GUI button instead. This mean that to get started you just need to run the wrapper and click the ‘Register without mobile phone’ to get going now. I’ve also modified the timeout code to always set it to 90 days in the future, to avoid having to patch the code regularly.

    • Self-driving cars won’t just log miles and road markers; they’ll be logging you

      A Silicon Valley company called Nauto announced a partnership with Toyota’s Research Institute, BMWi Ventures (a venture capital company founded by BMW), and insurance company Allianz Ventures to bring driver analysis to autonomous vehicles.

      Nauto currently produces a $400 aftermarket camera- and sensor-equipped device that attaches to a car’s windshield to analyze driver behavior. According to Reuters, the device is part-dash cam—snapping footage and tagging “events” like accidents—and part-driver monitor—detecting possible driver distraction in the car like drinking or texting. Nauto then collects and anonymizes this information to draw conclusions about driver habits, intersections, and congestion in certain areas.

    • Remotely accessing an IP address inside a target computer is a search

      First, several readers pointed out that the government actually has made this argument. You can read the government’s argument here in the Michaud case (pages 6-7) and here in the Lemus case (pages 8-12). My apologies for the misstatement, and thanks to reader Jonathan Mayer for sending on the briefs.

      Second, some readers argued that a Tor user loses a reasonable expectation of privacy in IP addresses because the user must disclose his true IP address to Tor. This is essentially the argument the government (briefly) makes in Michaud: By using Tor, you are sending your IP address to Tor, which is ultimately hosted by “an unknowable collection of strangers” who are running Tor exit nodes. You have put out your IP address to lots of people, which means that you have no expectation of privacy in it.

  • Civil Rights/Policing

    • How Sweden became an exporter of jihad

      Sweden is a peaceful democratic state that has long been a safe haven for those fleeing conflict. Yet many young people whose families took refuge there are now turning their back on the country. More than 300 people have gone to fight in Syria and Iraq, making Sweden per capita one of the biggest exporters of jihadists in Europe.

      I meet a young woman in the basement of a building in Gothenburg, Sweden’s second city. She seems like any other young Western woman, wearing tight clothing and make-up. But she has recently returned from Raqqa in Syria, where her husband died fighting for the so-called Islamic State (IS).

    • Pimping charges over escort ads could erode tech firms’ legal protection: experts

      The CEO and owners of Backpage.com are accused of heinous crimes, but California Attorney General Kamala Harris’ indictment of the three men could lead to a major upheaval for some Silicon Valley tech companies, experts said Friday.

      [...]

      In going after Backpage, Harris — in the midst of a U.S. Senate campaign — might have been emboldened by last year’s courtroom victory over the operator of a revenge-porn website. Kevin Bollaert was sentenced to 18 years in prison — despite a Section 230 defense, Goldman said.

      It was Bollaert’s design and operation of the site, rather than just the hosting of third-party content, that helped Harris get a conviction, Goldman said. “It’s possible they think they can hold (the Backpage defendants) accountable for the design and operation of Backpage, which has been in (prosecutors’) opinion optimized to facilitate online prostitution ads,” Goldman said.

    • Police Unions Reject Charges of Bias, Find a Hero in Donald Trump

      During the first presidential debate, Donald Trump answered a question about how to heal the country’s racial divide by boasting of his law enforcement endorsements.

      “We have endorsements from, I think, almost every police group,” he said, before rephrasing to “a large percentage of them.” Later in the debate, in response to a question about cybersecurity, he boasted again: “I was just endorsed by ICE. They’ve never endorsed anybody before on immigration. I was just endorsed by ICE.”

      As is often the case, the candidate’s statements were hyperbolic in the first claim and plain incorrect in the second. U.S. Immigrations and Customs Enforcement, a federal agency operating under the Department of Homeland Security, did not, of course, endorse anyone, even though the National ICE Council, the union representing 7,600 of ICE’s 20,000 employees, did endorse Trump. And while the Fraternal Order of Police, the largest police association in the country, as well as some local police unions, also endorsed Trump, that’s hardly every police group in the country.

      But Trump did have a point: At a time when law enforcement is perhaps the only issue that divides Americans more than the presidential election itself, a notable number of police and immigration officers are throwing their weight behind his candidacy — at least through their unions and associations.

    • Ways You Can Be Killed During An Encounter with Police

      How do you defend yourself against individuals who have been indoctrinated into believing that they are superior to you, that their word is law, and that they have the power to take your life?

      Most of all, how can you maintain the illusion of freedom when daily, Americans are being shot, stripped, searched, choked, beaten and tasered by police for little more than daring to frown, smile, question, challenge an order or just exist?

      The short answer: you can’t.

      Now for the long answer, which is far more complicated but still leaves us feeling hopeless, helpless and vulnerable to the fears, moods and misguided training of every cop on the beat.

      If you ask police and their enablers what Americans should do to stay alive during encounters with law enforcement, they will tell you to comply (or die).

    • Avoiding Contempt of Court, Kansas Secretary of State Kris Kobach Says He’ll Let People Vote

      Under the threat of contempt of court, Kansas Secretary of State Kris Kobach has agreed to register thousands of eligible voters and to properly notify them that they are registered. His announcement came after a federal judge summoned him to a contempt hearing for failing to fully carry out the court’s order and add about 18,000 voters to the rolls.

      Kobach is the architect of laws across the country that have created barriers for eligible voters to register and vote, including requirements that people present citizenship documents at the time of registration and restrictions on the forms of ID voters must provide. Kobach has helped develop model legislation for these restrictions and coached legislators in how to pass them. Other states have eliminated same-day registration and narrowed time periods for voting — mainly affecting people of color.

      Some legislators have admitted that it is part of their political strategy to spread false fear of electoral fraud in order to issue stricter rules for voter registration. Judges in North Carolina, Wisconsin, Texas, and North Dakota have recently ruled that states restrictions on voters discriminate on the basis of race.

    • Gov. LePage’s Binder of Black and Brown People Is Actually Pretty White

      According to our count, more than half of the people in Gov. LePage’s binder are white.

      Last month, Maine’s Gov. LePage once again got our attention when he claimed to be keeping a binder of “every single drug dealer who has been arrested in our state,” 90 percent of whom, he said, are Black or Hispanic.

      We couldn’t believe that was true, so we filed a public records request for the binder. On Monday, we got in line at the state house to receive our copy on CD.

      What we received could best be described as a scrapbook: a random, incomplete collection of newspaper clippings and press releases from the Maine Department of Public Safety. Some press releases don’t include photos of the arrested. Some contain handwritten notes from the governor himself: “get photo for my album;” “please be sure we get all mugs with release;” “file pictures in my binder for historical value.”

      While the binder paints an incomplete picture of the demographics of drug arrests in Maine, it very clearly does not support the governor’s assertions that over 90 percent of the people in his scrapbook are Black or Hispanic. While it is impossible to tell the race of all arrestees included in the binder, at least 50 of the 90 people pictured appear to be white. In other words, the governor greatly exaggerated the role people of color play in Maine’s drug trade.

    • For Mexican Towns Attacked by Cartel, Few Answers and No Justice

      It was a brazen attack. Some 60 gunmen linked to the brutal Zetas cartel descended on a quiet cluster of towns just south of the Mexican border in the spring of 2011 and launched a door-to-door extermination campaign that went on for weeks, leaving an untold number of people dead or missing. Yet in the five years since the slaughter in the northern Mexican state of Coahuila, the Mexican government has failed to fully investigate, much less address the needs of the victims and their families, according to a preliminary report released today by a panel of scholars and human rights investigators.

      “It’s horrifying because it was all so blatant,” said Mariclaire Acosta, a veteran human rights investigator who advised the panel. “This wasn’t a hidden crime. It all happened out in the open, and not one government agency did anything to stop it.”

      Such charges have become a disturbing echo in Mexico, where hundreds of thousands of people have been killed by drug violence, either at the hands of traffickers or corrupt security forces, and the crippled — often complicit — justice system is incapable of pursuing those responsible. Sunday’s report suggests that Mexicans have begun to look for ways, at the very least, to get to the truth, rather than sitting idly and wait for justice from their government. They are increasingly calling for help from external experts, both at home and abroad, to oversee investigations into the most egregious crimes. And government leaders — who may or may not be committed to real reforms, but seem prickly about public opinion polls — are relenting.

    • Hell in “Dark Prison”: New forms of torture at CIA black site revealed

      Previously undisclosed methods of torture used by the U.S. Central Intelligence Agency have been revealed in a new report by Human Rights Watch.

      Two Tunisian men detained without charge or trial in a CIA black site in Afghanistan from 2002 to 2015 independently described to the rights group several excruciating forms of abuse they endured at the hands of the CIA.

      The detainees, who were subjected to extreme sensory deprivation and hunger, recalled being brutally beaten all over their bodies with batons by U.S. interrogators. They also said they were repeatedly punched and kicked. One man suffered broken bones in these beatings.

      Even more grueling were the many weeks the detainees endured chained by their hands to the ceilings of their cells for repeated 24-hour periods. These days of torment were only punctuated by short breaks for interrogations or other forms of torture. One man said he was forced to hang like this for roughly three months; another said he suffered through it for a month.

    • 40 boys in mass brawl at troubled Danish asylum centre

      Around 40 underage asylum seekers participated in a mass brawl at the children’ asylum centres Børnecenter Tullebølle on Sunday, local news site Fyens.dk reported.

      Boys from the same centre were also involved in a fight involving upwards of 100 minor asylum seekers during a football match against another centre in July.

      The following month, five teenage boys from the centre were charged for sexual assaults committed during the Langelandsfestival. Three were charged with groping, and two for raping a 16-year-old girl.

    • Malmö nightclub rocked by powerful explosion

      A popular nightclub in Malmö was damaged in a powerful explosion in the early hours of Monday.

      No one was injured in the blast, which was heard across large parts of central Malmö shortly after 1.30am on Monday.

      Babel, a popular nightclub and concert venue in the Möllevången area, was damaged in the explosion, which shattered windows on the first floor. A car parked on the street outside was also damaged.

      Police examined the property overnight. The explosion is believed to have been intentional, but in the morning it was still unclear what had caused the detonation.

    • Girl under 15 married every seven seconds, says Save the Children

      One girl under the age of 15 is married every seven seconds, according to a new report by Save the Children.

      The study says girls as young as 10 are forced to marry much older men in countries including Afghanistan, Yemen, India and Somalia.

      Save the Children says early marriage can trigger a cycle of disadvantage across every part of a girl’s life.

      Conflict, poverty and humanitarian crises are seen as major factors that leave girls exposed to child marriage.

      “Child marriage starts a cycle of disadvantage that denies girls the most basic rights to learn, develop and be children,” said Save the Children International CEO Helle Thorning-Schmidt.

    • The Freedom to Associate

      In 1854, an Austrian priest and physics teacher named Gregor Mendel sought and received permission from his abbot to plant a two-acre garden of pea plants on the grounds of the monastery at which he lived. Over the course of the next seven years, he bred together thousands upon thousands of the plants under carefully controlled circumstances, recording in a journal the appearance of every single offspring that resulted, as defined by seven characteristics: plant height, pod shape and color, seed shape and color, and flower position and color. In the end, he collected enough data to formulate the basis of the modern science of genetics, in the form of a theory of dominant and recessive traits passed down in pairs from generation to generation. He presented his paper on the subject, “Experiments on Plant Hybridization,” before the Natural History Society of Austria in 1865, and saw it published in a poorly circulated scientific journal the following year.

      And then came… nothing. For various reasons — perhaps due partly to the paper’s unassuming title, perhaps due partly to the fact that Mendel was hardly a known figure in the world of biology, undoubtedly due largely to the poor circulation of the journal in which it was published — few noticed it at all, and those who did dismissed it seemingly without grasping its import. Most notably, Charles Darwin, whose On the Origin of Species had been published while Mendel was in the midst of his own experiments, seems never to have been aware of the paper at all, thereby missing this key gear in the mechanism of evolution. Mendel was promoted to abbot of his monastery shortly after the publication of his paper, and the increased responsibilities of his new post ended his career as a scientist. He died in 1884, remembered as a quiet man of religion who had for a time been a gentleman dabbler in the science of botany.

  • Intellectual Monopolies

    • Members Still Debating Changes To Oversight At WIPO

      Stung by what some saw as a botched process for handling an investigation into allegations from senior officials about the head of the UN World Intellectual Property Organization, WIPO members are working this week to agree on changes to procedures. A new draft text circulated this morning introduces additional responsibility for governments in the process, and is under discussion today. At press time, ambassadors from the African Group were meeting among themselves and asked to hold up the process until internal agreement could be reached on the text. The plenary is scheduled to reconvene at four o’clock today.

      The annual WIPO General Assemblies are taking place from 3-11 October.

      The latest draft text of the proposed changes to the WIPO Internal Oversight Charter changes is available here [pdf]. The latest version accepted many of changes in the previous version [pdf], but the latest text goes much further.

    • Promoting Transparency in Trade Act Would Bring Long-Needed Reforms to the USTR

      The one important thing that the current legislation omits to do is to require the publication of consolidated draft texts of trade agreements after each round of negotiations. This reform, alone, would be a significant advance which would bring trade negotiations into line with other intergovernmental treaty negotiations such as those that take place at the World Intellectual Property Organization (WIPO). It is unfortunate that, although it was part of an earlier draft, this didn’t make it into the current draft bill. We are hopeful that the bill can be amended to include this in its final form.

      None of these three proposals, even including the omitted one, is particularly radical. They are far less radical, for example, than a separate proposal by Congressman Morgan Griffith that would actually divest the USTR of its authority and move it to a committee of Congress. EFF considers the Promoting Transparency in Trade Act to be an important and achievable step forward in making long-needed reforms to the USTR. Provided that it can be amended to include the publication of consolidated texts, EFF supports the bill.

    • Key takeaways from the IP Enforcement Forum 2016

      Graphical user interfaces (GUIs) provide a good example of a technology where different IP rights have a role to play, and Noam Shemtov, senior lecturer in IP at Queen Mary University of London, examined the merits of patents, trade marks, trade dress, unfair competition, registered designs and copyright in a discussion that covered cases including Apple’s slide-to-unlock feature and the pending dispute Microsoft v Corel (over Microsoft Office) in the US.

    • Examining the Madrid Protocol in Africa

      International Registrations are not being properly administered in several African countries, and take up by local businesses has been low. Wayne Meiring explains why this is a problem

      Much has been written about the Madrid Protocol in Africa. The focus has been on the common law issue and the issue regarding the accession of OAPI. This article, however, looks at two other issues. The first is that in many member countries International Registrations (IRs) are not being properly administered. The second is the fact that to a great extent, IRs are not being used by African IP rights holders to any significant degree.

    • Interview With Brazilian Culture Minister Marcelo Calero

      At last week’s first-ever Assembly of the Marrakesh Treaty, Intellectual Property Watch caught up with the Assembly Chair, new Brazilian Culture Minister Marcelo Calero. In a video interview with William New, he talked briefly about the importance of libraries and of implementing the Marrakesh Treaty.

    • The Whole VR Porn Industry Is Talking About These Patent Lawsuits

      For the past few years, the media’s been abuzz about the promise of VR porn. VR technology keeps getting better and more affordable, and adult entrepreneurs are eager to find a medium that might actually make them money. Throw in the fact that the immersive properties of VR are ideal for the intimate experience of porn viewing, and it starts to seem like a perfect storm for the future of high-tech erotic entertainment.

      What force could possibly derail the adult industry’s virtual reality dreams? Well, for starters, patents.

      Two weeks ago, the National Law Review reported that Virtual Immersion Technologies LLC had begun enforcing patent 6409599, an incredibly broad patent for an “interactive virtual reality performance theater entertainment system.” The patent is at the heart of a handful of active lawsuits—including one related to VR porn, and another about teledildonics—and other VR companies, even those that haven’t been sued themselves, are beginning to panic.

10.10.16

Links 10/10/2016: GNOME 3.24 With ownCloud Integration, Bodhi Linux 4.0.0 Beta

Posted in News Roundup at 4:22 am by Dr. Roy Schestowitz

Links xx/10/2016: Links for the day

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • On the State of Open Source

    I was just a teenager when I got involved in the open source community. I remember talking with an old bearded guy once about how this new organization, GNU, is going to change everything. Over the years, I mucked around with a number of different OSS tools and operating systems, got excited when symmetric multiprocessing came to BSD, screwed around with Linux boot and root disks, and had become both engaged and enthralled with the new community that had developed around Unix over the years. That same spirit was simultaneously shared outside of the Unix world, too. Apple user groups met frequently to share new programs we were working on with our ][c’s, and later our ][gs’s and Macs, exchange new shareware (which we actually paid for, because the authors deserved it), and to buy stacks of floppies of the latest fonts or system disks. We often demoed our new inventions, shared and exchanged the source code to our BBS systems, games, or anything else we were working on, and made the agendas of our user groups community efforts to teach and understand the awful protocols, APIs, and compilers we had at the time. This was my first experience with open source. Maybe it was not yours, although I hope yours was just as positive.

  • OpenType 1.8 and style attributes

    In last week’s look at the new revision of the OpenType font format, we focused primarily on the new variations font feature, which makes it possible to encode multiple design “masters” into a single font binary. This enables the renderer to generate a new font instance at runtime based on interpolating the masters in a particular permutation of their features (weight, width, slant, etc). Such new functionality will, at least in some cases, mean that application software will have to be reworked in order to present the available font variations to the end user in a meaningful fashion.

    But there is another change inherent in the new feature that may not be as obvious at first glance. Variations fonts redefine the relationships between individual font files and font “families.” There is a mechanism defined in the new standard to bridge the gap between the old world and the new, called the Style Attributes (STAT) table. For it to work in a meaningful fashion, though, it must be implemented by traditional, non-variations fonts as well—which may not be an easy sell.

    There is no formal definition of a font family, but in general usage the term refers to a set of fonts that share core design principles and, in most cases, use a single name and come from the same designer or design team. The Ubuntu Font Family, for example, includes upright and italic fonts in four weights at the standard width, one weight of upright-only condensed width, and two weights (in upright and italic) of a monospaced variant.

  • An open source font system for everyone

    A big challenge in sharing digital information around the world is “tofu”—the blank boxes that appear when a computer or website isn’t able to display text: ⯐. Tofu can create confusion, a breakdown in communication, and a poor user experience.

    Five years ago we set out to address this problem via the Noto—aka “No more tofu”—font project. Today, Google’s open-source Noto font family provides a beautiful and consistent digital type for every symbol in the Unicode standard, covering more than 800 languages and 110,000 characters.

  • Students Hacked a Chip to Give Your Smartphone a Sense of Touch

    Project Soli, which debuted at Google I/O in 2015, is a tiny chip that uses radar to detect discreet hand and finger motions. It was designed as a unique way to interact with mobile devices, but students at the University of St. Andrews found a way to use the simple chip to give electronics an actual sense of touch.

    The chip, developed by Google’s Advanced Technologies And Projects group, or ATAP, uses the same kind of radar as airports use to track arriving and departing planes. As radio waves bounce back to the Project Soli chip from your hand, the unique signals detected can be used to decipher even the tiniest of motions.

  • Caged Heat: Using Open Source in a Windows Workplace

    I work primarily with Windows but let me say that I, like many of you, have no choice in the matter. We don’t live in a world where the company tells us, “Well, here’s Microsoft Office and everything we do is on a web app. Have fun!” My goodness, that would be a relative paradise for many people. You could potentially go hog wild and use the applications you want.

    Still, a lot of us work with very clunky tools sometimes set on a gray-haired version of Java and birthed from Windows installers. It’s a sad reality that a lot of highly-specialized practice software applications, many of which attach to MICROSOFT databases, will only run on Windows because the developer is selling these apps for profit and not for fun. They also happen to know that 95% of the market is drenched in……Windows.

  • European Open Source Jobs Surge

    According to a recent report, European open source jobs may be more sought after and more rewarded than anywhere else in the world. These findings were a key feature in the results of The 2016 Open Source Jobs Report which was released by Dice, a career site for technology and engineering professionals in association with The Linux Foundation, the nonprofit advancing professional open source management for mass collaboration.

  • Multivendor & MANO Will Dominate NFV Discussions

    NFV management and network orchestration (MANO) is sure to be a hot topic at next week’s SDN & OpenFlow World Congress at The Hague, Netherlands. For many, MANO has been considered to be a roadblock to not only deploying network functions virtualization (NFV), but also to making NFV agile and efficient.

  • ETSI open source MANO work launches Release One stack

    ETSI continues to move on its open source MANO work in support of telecom NFV plans, releasing the latest OSM stack focused on VNF, SDN controller support

    The European Telecommunications Standards Institute’s Open Source MANO initiative continued to feed software into the management and orchestration community with the launch of its OSM Release One stack.

  • Open Source Forking Demystified: Threats and Benefits

    Two researchers, Gregorio Robles and Jesus M. Gonzalez-Barahona, from Universidad Rey Juan Carlos in Spain, had embarked on a study of forks. Their paper titled “A Comprehensive Study of Software Forks: Dates, Reasons and Outcomes,” studied the sustainability of software projects in an open environment of sharing software. Key questions answered were—how many forks were in actual existence, was forking frequency increasing and understanding the root-causes for forking. Also, the researchers looked into the outcomes of forking—a point that may be of specific interest to CIOs. But first, let us understand what a fork truly means.

  • Rethink Robotics Leads in Research and Education with Open Source SDK

    Rethink Robotics today unveiled its high performance Sawyer robot for the global research and education markets. Built on the open source Robot Operating System (ROS) and equipped with a software development kit (SDK), Sawyer will help leading educators and researchers innovate in fields including machine learning, human-robot interaction, mechatronics and grasping, machine vision and manufacturing skills.

  • Open source in the enterprise: It’s about culture, not technology, says Github

    Collaboration platform provider gives its top tips on ‘inner source’, the idea of adopting open source software development principles within the enterprise

  • Transparency and Independence Drive Open-Source Adoption

    Open-source software is now not only acceptable; in many companies, it is required. In the past, enterprises looked at open source projects as if they were science experiments, lacking the support and “single throat to choke” in case of an escalation. But the tide has turned. It is now common to have one or more companies offering support on open source projects, enabling enterprises to not only get the same level of service formerly reserved for proprietary commercial software, but to also benefit from the vibrant communities surrounding open source projects.

    What are the benefits of community for the enterprise? Independence and transparency.

  • Tech Insider: Open source business models

    This week we’ll step back and revisit a few fundamentals of competition and cooperation and how this results in the open source ecosystem.

  • The power of open source is customer freedom

    The open source community is a diverse and fractious collection of individuals and organizations. In its infancy, in many ways it could be compared to the hippie movements of the ’60s: a lot of passion, a lot of fun, a lot of weirdness, and not a lot of organization. Over the last decade or so, it has evolved into a respected software development force that relies on the support of its members.

    As it’s grown and diversified over the last decade, it has gotten more mainstream in the sense that there are now many different players that are making quite a bit of money based on open source principles. It has more prestige and a lot more respectability. As they say, money changes everything.

    That’s what I was thinking as I read Max Schireson’s article, “The money in open source software,” on TechCrunch: how much things in the open source community have changed, and how much they have stayed the same. The article is a breakdown of how to plan for a profitable company based on open source software. It provides a lot of common-sense points: Have and stick to a business plan, pick a licensing model that makes sense, and maintain customer satisfaction. None of these are particularly earth-shattering ideas.

  • Events

    • Slides from Linuxcon Europe 2016
    • LinuxCon Europe 2016 – Veni, Vidi, Vici

      There we are. It feels like a dream. It happened too fast, and I did not get to absorb the full aroma of the conference. But never mind. There will always be another opportunity, and LinuxCon will be there next year, waiting, beckoning. Despite a somewhat less than perfect circumstances, I am quite happy. I enjoyed my session, if I’m allowed to say that, and I think I served my audience well, and their feedback was good and open. There is nothing that would have made it better except a little more time to network, talk to people, pilfer some more free shirts and electronics, and actually see the city.

      Anyhow, I hope you find these little field reports entertaining. And maybe we will meet somewhere next year, and you will come over and say, oh so you are that crazy guy, why are you not wearing a fedora huh? Indeed. 2017, so let the countdown begin. The Final Countdown. By a band called Europe. What can be more appropriate? OMG. See you next autumn.

  • Web Browsers

    • Mozilla

      • Get Better Firefox Look on Linux With These Extensions

        Firefox is one of the most used web browsers on the Web. According to Clicky, it holds around 20% of the global market share. Firefox is also installed by default in almost all Linux distributions. So it’s very likely to see Linux users using it all the time, although many other alternatives are available like Chromium and Epiphany.

        Since the web browser’s window is all what many of us see the whole day, you may want to customize its appearance. We are not talking about “personas” or those simple backgrounds that you put to colorize a small part of the browser’s window. We are talking about changing the theme totally. Firefox does this using “Complete Themes“.

      • Firefox sandbox on Linux tightened

        As just announced on mozilla.dev.platform, we landed a set of changes in today’s Nightly that tightens our sandboxing on Linux. The content process, which is the part of Firefox that renders webpages and executes any JavaScript on them, had been previously restricted in the amount of system calls that it could access. As of today, it no longer has write access to the filesystem, barring an exception for shared memory and /tmp. We plan to also remove the latter, eventually.

      • Mozilla is working on Form Autofill for Firefox

        Mozilla is currently working on bringing form autofill functionality to its Firefox web browser.

        Firefox remembers form data by default that you enter on sites, but the browser does not ship with options to create profiles that you may use on any form you encounter while using the browser.

  • SaaS/Back End

  • Databases

    • RethinkDB database shuts down as its business falters
    • Company Behind RethinkDB Is Shutting Down, Database to Remain Open Source
    • BigchainDB Moves On From End Of RethinkDB
    • RethinkDB is shutting down

      I just installed RethinkDB 2.3.5 on a new laptop and took a few minutes to slow down and play with the product. I’m very proud of what we built alongside our community – RethinkDB’s technology more often feels like magic, and I hope it will continue to play an important role in advancing the state of the art in database technology.

      We’re working with members of our community to develop a continuity plan for RethinkDB and Horizon. Both projects will continue to be available, distributed under open source licenses. We hope to continue our open development process with a larger community of contributors.

      We’d like your help to ensure RethinkDB’s future as an open-source project! We don’t have all of the details figured out, but we wanted to be as open as possible during this process. If you’re interested in contributing, please join us in the #open-rethinkdb channel of our public Slack group. You can expect to see development slow down in the meantime, but everything will continue to be available on rethinkdb.com and horizon.io. We will post updates on our blog and Twitter as we continue working things out.

  • Oracle/Java/LibreOffice

  • Pseudo-Open Source (Openwashing)

  • FSF/FSFE/GNU/SFLC

    • An Emacs Update

      It’s been a while I have not written about Emacs and more particularly my personal use case for Emacs. I started using Emacs because I was looking for a text editor capable of handling formats such as HTML and CSS; then I found out Emacs had quite convenient IRC clients and I could even use a bit of Org mode for project management. That was in 2013 and early 2014. As I was impressed by the seemingly infinite power of Emacs, I started using Org-mode more and more on a daily basis (something I still do today); and I started learning (e)lisp both in order to understand Emacs a bit more in-depth and because I wanted to start to learn a programming language.

      Remember: I’m no software developer. When I’m not maintaining or creating websites for friends, I’m not doing much else in the way of “coding”. My Emacs usage remains however a daily experience that I would like to share here.

    • Report: Bash Skills Pay Off the Most (Wait, Bash?)

      It’s not surprising that a new skills survey rounds up the usual list of suspects for the most popular programming language, naming JavaScript, Python, Java, et al.

      What is surprising is the list of skills that pay off the most in terms of developer salaries: Bash, Perl and Scala. Bash topped the list at about $100,000.

      Bash?

      I read a lot of these surveys, and the Bash scripting language rarely makes a strong appearance. But it leads the list of respondents’ stated median salaries by programming language in a new report from Packt Ltd. titled “Skill Up 2016″ (free download upon providing registration info) which garnered more than 11,500 responses.

      “We’ve now seen what languages are the most popular,” the report says, “but what languages are the most lucrative in 2016? Our data shows that languages favored by more experienced developers command the highest salaries; it pays to be a Perl Monk or a Bash Scripter. Scala developers also manage to command high salaries, while the more ubiquitous JavaScript and Python hover around the middle, as they are likely favored by both highly-paid and more junior alike. If you’re still working with Visual Basic or PHP, you might want to consider an upgrade.”

  • Public Services/Government

    • Russia may require use of open source software

      The Russian government is reportedly drafting a Bill that would require government agencies to prefer the use of open source software, as part of efforts to reduce its reliance on US vendors Oracle, Microsoft and IBM.

      Russia’s Lower House of parliament is working on legislation that would further prohibit the use of foreign software, Bloomberg reported.

  • Openness/Sharing/Collaboration

  • Standards/Consortia

    • The anatomy of a Vulkan driver

      Jason Ekstrand gave a presentation at the 2016 X.Org Developers Conference (XDC) on a driver that he and others wrote for the new Vulkan 3D graphics API on Intel graphics hardware. Vulkan is significantly different from OpenGL, which led the developers to making some design decisions that departed from those made for OpenGL drivers.

Leftovers

  • Hardware

    • Smallest. Transistor. Ever.

      For more than a decade, engineers have been eyeing the finish line in the race to shrink the size of components in integrated circuits. They knew that the laws of physics had set a 5-nanometer threshold on the size of transistor gates among conventional semiconductors, about one-quarter the size of high-end 20-nanometer-gate transistors now on the market.

  • Security

    • Cybersecurity: Complexity is Our Biggest Vulnerability

      Confucius once said, “Life is really simple, but we insist on making it complicated.” For those of us in cybersecurity professions, we can easily relate to this philosophy. Cybersecurity has become exceedingly complicated in recent years, and the complexity might now be our biggest vulnerability.

      IT is evolving rapidly, but IT security is often left playing catch up in order to adapt to the changes in how businesses approach and deploy computing, applications, networks, databases, and devices. Many organizations rely on best practices such as defense in depth, secure development lifecycle, penetration testing, separation of duties, etc. However, these tactics do not allow cybersecurity to move at business speed, and they contribute to the lag in IT security.

    • Open source software is best for IoT security

      Art Swift, president of the prpl Foundation, pointed to high profile IoT hacking attacks saying that “regardless of whether these hacks were malicious or simply done in the name of research, the fact is that it is possible today to hack into just about any connected device.”

      Swift says that hackers can reverse engineer, exploit a weak implementation, modify or re-flash the firmware, and then move laterally across the system.

  • Defence/Aggression

    • Syria no-fly zone would mean ‘killing a lot of Syrians’ warned Clinton in leaked speech

      The US former Secretary of State made the admission in a Wall Street speech in 2013.

      In the latest dump of classified emails, Mrs Clinton noted the problems with imposing a no-fly zone over Syria.

      She said: “To have a no-fly zone you have to take out all of the air defenses, many of which are located in populated areas.

    • How WWIII Can Start In The Last Place You Expect (And Soon)

      Hey America! Just checking in with another update on how a recent presidential election is going to doom us all! I’m not talking about the election that’s happening in this country right now. I will at some point, but it’s an election that happened thousands of miles away which deserves the bulk of our attention today. I’m speaking, of course, about the this year’s presidential election in the Philippines, where a legitimately crazy person named Rodrigo Duterte took control of the highest office of in a country of more than 100 million people. He’s said and done a lot of insane things since then, but if you’re only keeping track of the highlights, you probably have no idea just how insane things might get.

  • Environment/Energy/Wildlife/Nature

    • Hillary Clinton Expresses Support For Fracking In Wikileaks Document

      During the fight for the Democratic presidential nomination, Hillary Clinton cast herself as a skeptic of hydraulic fracturing — the controversial process to extract natural gas. But newly released documents purporting to show excerpts of her paid speeches show that Clinton proudly touted her support for fracking, which environmental groups say can pollute groundwater and undermine the fight against climate change. The excerpts also show Clinton saying that some environmental organizations trying to restrict her work to promote fracking were front groups for Russian oligarchs.

      The transparency group Wikileaks published the document as part of what it says is a tranche of emails from John Podesta, Clinton’s campaign chairman. Podesta has refused to say whether the excerpts are authentic but has not denied their authenticity, either.

  • AstroTurf/Lobbying/Politics

    • EXCLUSIVE: New Email Leak Reveals Clinton Campaign’s Cozy Press Relationship

      Internal strategy documents and emails among Clinton staffers shed light on friendly and highly useful relationships between the campaign and various members of the U.S. media, as well as the campaign’s strategies for manipulating those relationships.

      The emails were provided to The Intercept by the source identifying himself as Guccifer 2.0, who was reportedly responsible for prior significant hacks, including one that targeted the Democratic National Committee and resulted in the resignations of its top four officials. On Friday, Obama administration officials claimed that Russia’s “senior-most officials” were responsible for that hack and others, although they provided no evidence for that assertion.

      As these internal documents demonstrate, a central component of the Clinton campaign strategy is ensuring that journalists they believe favorable to Clinton are tasked to report the stories which the campaign wants circulated.

      At times, Clinton’s campaign staff not only internally drafted the stories they wanted published but even specified what should be quoted “on background” and what should be described as “on the record.”

    • Two-Faced Hillary: Clinton Says She Has ‘Both a Public and a Private Position’ on Wall Street: WikiLeaks Release

      Hillary Clinton told top banking executives that she has “both a public and a private position” on Wall Street reform and is reliant on wealthy donors to fund her campaign, leaked excerpts of the former first lady’s speeches seem to show, fueling claims of hypocrisy on the part of Mrs. Clinton at a crucial moment in the presidential campaign.

  • Censorship/Free Speech

    • Youtube took down MEP’s videos about torture debate

      Marietje Schaake (previously) is a Dutch Member of the European Parliament who has a fantastic track-record for getting it right on issues related to technology, free speech, human rights, and privacy; she is the author of a report on export controls for spying technology used to identify dissidents to torture.

      She uploaded the videos from the debate about these tools to Youtube, only to receive a notice from Youtube informing her that a video had been removed had been reviewed and found to be in violation of Youtube’s standards, resulting a takedown for the video and a “strike” against Schaake’s Youtube account — enough of these strikes and she’ll permanently lose access to the service.

      The video that Youtube removed “included footage of European Trade Commissioner Cecila Malmstrom, who gave her opinion about the new law.”

    • When YouTube took down my video

      YouTube is now one of the most used platforms for videos online. It has over a billion users, and reaches more 18-49 year-olds than any cable network in the U.S. It has become a portal for sharing information and ideas, which is vital for any democratic society.

    • Russia Mulls Downloading Fines if Site Blocking Fails

      Faced with the possibility that website blocking may not achieve its goals, Russia is now considering fresh opportunities for decreasing online file-sharing. Sources familiar with negotiations say that authorities are mulling a system of fines which would target individual downloaders.

    • Internet Bill: Censorship or internet regulation?

      The Films and Publications Amendment Bill that was deliberated by the Portfolio Committee on Communications in Parliament last week has caused an uproar as people debate whether it is strictly an internet regulation or the government’s attempt at stifling and censoring freedom of speech.

      Also known as the Internet Bill, the proposed law aims to regulate the online distribution of digital films and digital games, among others, but it has come under attack from media organisations such as Multichoice, organisations such as the Right2Know campaign, and opposition parties such as the DA.

  • Privacy/Surveillance

    • The Fog of Cyber War

      A version of this post originally appeared in the Cyber Saturday edition of Data Sheet, Fortune’s daily tech newsletter.

      Last week produced a spate of cyber-security news, including revelations about Yahoo (again) and lousy counter intelligence at the NSA (again). But if there is a common thread, it’s that first reports often are false or incomplete and the story is not what it seems.

      Take the brouhaha over Yahoo using software to feed emails to the NSA. The news led to hyper-ventilating among privacy types and predictable high-horse behaviorf rom rival tech giants like Google and Microsoft. But as my colleague Robert Hackett explained, a lot of this fulminating took place before anyone really knew the facts — which are still emerging in dribs and drabs.

      Meanwhile, journalists (me included) breathlessly reported another security lapse at Edward Snowden’s old stomping groups, Booz Allen, which led the FBI to arrest a contractor for stealing secrets. But now it turns out the guy was probably just a kook and a hoarder. It’s still not a good situation but it sure doesn’t look like the stuff of a John LeCarre novel.

      Part of the trouble, from a media perspective, is that a lot of the incidents we learn about are delivered by anonymous sources and wrapped in national security laws. This makes it hard to verify information — easy to jump to conclusions.

      So call it the fog of cyber war. In an era where everyone is amped up about cyber attacks, a lot of first impressions are tinged with paranoia and misinformation or are just flat out wrong. I don’t know what to do about this except to say that, as with other dramatic events like mass shootings, it’s best to take first reports with a giant grain of salt.

    • Facebook Crowned Privacy Villain Of 2016 By European Privacy Rights Group

      A European civil society group defending rights and freedoms in the digital environment awarded Facebook the Belgian Big Brother Awards 2016 yesterday.

      The awards are based on a concept created by European Digital Rights initiative (EDRi) member Privacy International, and are negative prizes for “the worst privacy abuser.” The goal of those awards is to draw attention to violations of privacy, they said in a press release.

      The Belgian award was “unanimously granted to Facebook by the professional jury,” and the public confirmed Facebook’s title as the “ultimate privacy villain of the year.”

    • Yahoo May Have Exposed Rogers Customer Emails to US Spies

      On Friday, Motherboard reported that beleaguered US company Yahoo allowed someone—possibly a US intelligence agency such as the NSA or FBI—to install a backdoor on its servers, likely for scanning purposes, that afforded unfettered access to Yahoo’s systems, including users’ personal emails.

      “This backdoor was installed in a way that endangered all of Yahoo users,” a source familiar with the incident told Motherboard.

      This should concern Canadians, because Rogers, one of the largest telecom companies in the country, totally outsources its email systems to Yahoo. Emails sent from Rogers accounts are sent to Yahoo’s US servers for storage and processing, and Yahoo scans Rogers emails for spam, malware, and child pornography.

      This isn’t the first time that Rogers’ ties to Yahoo have compromised Canadians: The Toronto Star previously reported that Rogers customer data was included in the massive hack in September.

    • U.S. pressed to disclose secret court’s order on Yahoo email search
  • Civil Rights/Policing

    • Iranian judges sentence writer to jail for story about stoning to death

      Iranian judges have ordered a young female writer and activist to serve a six-year jail term for writing an unpublished fictional story about stoning to death in her country.

      Golrokh Ebrahimi Iraee received a phone call on Tuesday from judicial officials ordering her to Evin prison in Tehran, where her husband, Arash Sadeghi, a prominent student activist, is serving a 19-year sentence.

      Ebrahimi Iraee told Voice of America’s Persian network this week that she had been sentenced to five years in prison for insulting Islamic sanctities and one extra year for spreading propaganda against the ruling system.

      “They haven’t issued a written summons [as required by the law],” she said in a Skype interview. “They called me using the telephone of one of my friends, Navid Kamran; they had gone to his shop to arrest him and they called me from there to summon me.”

    • Leaflet ‘handed out at east London mosque’ tells Muslims to kill all who insult the prophet

      Police today launched a hate crime probe after literature saying those who insult Islam “must be killed” was allegedly handed out at a London mosque.

      A Standard investigation has uncovered claims that the booklet, which says “any Muslim should kill” those who insult the Prophet Mohammed, was distributed at a gathering in Walthamstow.

      It points to a classical manual of Islamic law to justify killings without waiting for court judgments and says apostates “deserve to be assassinated”.

      The booklet discusses the case of Mumtaz Qadri, a fanatic who murdered a governor in Pakistan in 2011 because of his support for liberal reforms to the country’s strict Islamic laws.

    • Final hearing for Christian woman facing execution for blasphemy in Pakistan

      A Christian woman who has been facing execution in Pakistan for six years after being accused of blasphemy has been granted her final appeal.

      Pakistan’s supreme court will hear the case of Asia Bibi, a mother-of-five from the rural village of Ittan Wali in Punjab, eastern Pakistan, who was convicted of blasphemy in 2010 after allegedly insulting the Prophet Muhamed during a row with other women over water.

      All of Ms Bibi’s appeals in the lower courts failed before the supreme court temporarily suspended her execution in July 2015 ahead of a fresh hearing now scheduled to be heard on 13 October.

      If her final appeal fails, Ms Bibi will be the first woman to be executed under the country’s controversial blasphemy laws.

    • Mormon Rebel Went to WikiLeaks for Help

      When Kate Kelly, founder of the Mormon feminist group Ordain Women, was accused of apostasy, she couldn’t readily access the Church Handbook of Instructions, Volume 1, for the definition. So Kelly and Nadine Hansen, a lawyer representing her in her hearings, had to turn elsewhere.

      “The only way that women can access that volume is by accessing it online at WikiLeaks,” Kelly told The Daily Beast.

  • Intellectual Monopolies

    • Gurry investigation dropped by WIPO member states; transparency and accountability are the losers

      The news that WIPO member states have endorsed a decision taken by the organisation’s Coordination Committee to drop any further investigation of the allegations of serious misconduct levelled against the organisation’s Director-General Francis Gurry is no surprise; a few days ago this blog predicted it would happen. However, for anyone who believes that the IP system is best served by transparency and accountability, the fact this outcome was so predictable does not make it any less depressing.

      Ever since the then WIPO deputy Director-General James Pooley first accused Gurry of being involved in taking WIPO staff members’ DNA and in interfering to alter the outcome of a procurement process in his April 2014 Report of Misconduct, IAM has taken no position on the claims. We don’t know if they were true; but we do know that they should have been investigated quickly, thoroughly, independently and with full protection for witnesses.

    • WIPO Workshop: African States Are Themselves To Blame, Should Compile, Publicize IP Statistics

      Each year, the World Intellectual Property Organization Economic and Statistics Division sends out questionnaires, which intellectual property offices worldwide are expected to complete and return.

      But because the survey is voluntary, many African countries, including some Africa Regional Intellectual Property Organisation (ARIPO) member states, do not respond to the questionnaires.

    • EU, US negotiators officially drop aim of concluding TTIP in 2016

10.09.16

Links 9/10/2016: Wine 1.8.5, KDE Frameworks 5.27, GDB 7.12

Posted in News Roundup at 2:26 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • The legacy of Pieter Hintjens

    When I watched Chad Fowler’s GOTO Amsterdam 2014 Keynote it got me thinking about what our aims should be in life.

    He mentions Joel Spolsky’s post from 2001: Good Software Takes Ten Years. Get Used To It, and says software typically only lasts five years so rarely gets to be very good.

    He asks, what does it take create legacy software with a positive meaning, that is software so good that you are fondly remembered for it for many years to come.

    How many very famous developers, or ex-developers are there in the world. You may disagree, but I would argue that Bill Gates is the only living person with worldwide fame partly associated with writing code.

    Only big company CEOs have any chance of becoming a household name. Even Sir Tim Berners Lee has only about half as many Twitter followers as Grumpy Cat.

  • AT&T Will Launch ECOMP Into Open Source in 2017

    A top AT&T executive said the company will launch its Enhanced Control, Orchestration, Management, and Policy (ECOMP) platform into open source by the first quarter of 2017. And the Linux Foundation will be the host of the open source project.

    In a blog post, Chris Rice, SVP of AT&T Labs Domain 2.0 Architecture and Design, said that after the company developed ECOMP, it received a tremendous amount of feedback from service providers and virtual network function (VNF) providers that wanted more details about the platform. He also said the companies wanted AT&T to publicly state that it was going to open source the project.

  • What to Expect from OSCON London 2016

    It’s autumn/fall technology conference season… but you already knew that, so what’s coming next? O’Reilly’s OSCON event is just around the corner and the conference itself has seen the launch of many new projects from OpenOffice.org to OpenStack.

  • 8 Years Later: Saeed Malekpour Is Still In An Iranian Prison Simply For Writing Open Source Software

    We talk a great deal on Techdirt about the importance of free speech alongside the importance of not damning technological tools for the way third parties choose to use them. These matters can delve into minutiae in the American and Western forms of this conversation, with discussions about Section 230 protections and the like. But in other parts of the world, the conversation is much different.

    Back in 2008 in Iran, for instance, the government there elected to imprison a Canadian resident of Iranian lineage, initially under a death sentence, but later commuting that sentence to mere life imprisonment. His crime? Saeed Malekpour created some open source code for sharing photos on the internet that others within Iran used for pornography.

  • Why Implanted Medical Devices Should Have Open Source Code

    As medical implants become more common, sophisticated and versatile, understanding the code that runs them is vital. A pacemaker or insulin-releasing implant can be lifesaving, but they are also vulnerable not just to malicious attacks, but also to faulty code. For commercial reasons, companies have been reluctant to open up their code to researchers. But with lives at stake, we need to be allowed to take a peek under the hood.

    Over the past few years several researchers have revealed lethal vulnerabilities in the code that runs some medical implants. The late Barnaby Jack, for example, showed that pacemakers could be “hacked” to deliver lethal electric shocks. Jay Radcliffe demonstrated a way of wirelessly making an implanted insulin pump deliver a lethal dose of insulin.

    But “bugs” in the code are also an issue. Researcher Marie Moe recently discovered this first-hand, when her Implantable Cardioverter Defibrillator (ICD) unexpectedly went into “safe mode”. This caused her heart rate to drop by half, with drastic consequences.

    It took months for Moe to figure out what went wrong with her implant, and this was made harder because the code running in the ICD was proprietary, or closed-source. The reason? Reverse-engineering closed-source code is a crime under various laws, including the US Digital Millennium Copyright Act 1998. It is a violation of copyright, theft of intellectual property, and may be an infringement of patent law.

  • Google releases open-source Cartographer 3D mapping library

    Google has released open-sourced Cartographer, a real-time simultaneous localization and mapping (SLAM) library in 2D and 3D with ROS (Robot Operating System) support. This technology which works with the open source ROS can be used by developers for many things, such as robots, drones and self-driving cars.

  • LinuxCon

    • Open Source Jobs Report Highlights European Trends
    • Google Open Sources Two Far Reaching New Tools
    • Hyperledger chain gang man explains Penguins’ blockchain play

      Jim Zemlin raises an eyebrow when I say Hyperledger is rather outside Linux Foundation’s usual domain, being a bit, er, consumery.

      “It’s totally enterprise,” the Foundation’s executive director tells me. “It’s infrastructure.” Just like Linux, he reckons. Hyperledger is the layer above the operating system, above Linux.

      Linux is the Linux Foundation’s oldest and hardest of hard-core projects – a technology fundamental that drives economies.

    • Why J.P. Morgan Chase Is Building a Blockchain on Ethereum

      J.P. Morgan Chase is developing a blockchain, commonly referred to as a public ledger, atop a crypto-network called Ethereum.

      The system, dubbed “Quorum,” is designed to toe the line between private and public in the realm of shuffling derivatives and payments. The idea is to satisfy regulators who need seamless access to financial goings-on, while protecting the privacy of parties that don’t wish to reveal their identities nor the details of their transactions to the general public.

  • SaaS/Back End

    • Marrying Apache Spark and R for Next-Gen Data Science

      Recently, we caught up with Kavitha Mariappan, who is Vice President of Marketing at Databricks, for a guest post on open source tools and data science. In this arena, she took special note of The R Project (“R”), which is a popular open source language and runtime environment for advanced analytics. She also highlighted Apache Spark and its distributed in-memory data processing, which is fueling next-generation data science.

      Now, R users can leverage the popular dplyr package to sift and work with Apache Spark data. Via the sparklyr package, a dplyr interface for Spark, users can filter and aggregate Spark datasets then bring them into R for analysis and visualization, according to an RStudio blog post.

    • OpenStack Newton Debuts With Improved Container Features

      The latest release of widely deployed open-source cloud platform improves security, virtualization and networking.
      The open-source OpenStack project released OpenStack Newton on Oct. 6, providing the second major milestone update for the cloud platform in 2016.

      OpenStack Newton follows the Mitaka release, which debuted in April with a focus on simplifying cloud operations. In contrast, OpenStack Newton provides a long list of incremental updates and improvements, including improved security, container support and networking capabilities.

    • OpenStack’s latest release focuses on scalability and resilience

      OpenStack, the massive open source project that helps enterprises run the equivalent of AWS in their own data centers, is launching the 14th major version of its software today. Newton, as this new version is called, shows how OpenStack has matured over the last few years. The focus this time is on making some of the core OpenStack services more scalable and resilient. In addition, though, the update also includes a couple of major new features. The project now better supports containers and bare metal servers, for example.

      In total, more than 2,500 developers and users contributed to Newton. That gives you a pretty good sense of the scale of this project, which includes support for core data center services like compute, storage and networking, but also a wide range of smaller projects.

    • OpenStack Newton, the 14th Official Release, Arrives

      The OpenStack community today released Newton, and it’s hard to believe that this is the 14th version of the most widely deployed open source software for building clouds. “New features in the Ironic bare metal provisioning service, Magnum container orchestration cluster manager, and Kuryr container networking project more seamlessly integrate containers, virtual and physical infrastructure under one control plane,” the announcement notes. “These new capabilities address more use cases for organizations with heterogeneous environments, who are looking for speed and better developer experience with new technologies like containers, alongside workloads that require virtual machines or higher availability architectures.”

      Here is more on what’s under the hood and how this new version embraces virtualization and containers.

      The 14th release improves the user experience for container cluster management and networking, and the Newton release addresses scalability and resiliency. These capabilities will be demonstrated at the upcoming OpenStack Summit, happening October 25-28, in Barcelona Spain.

      “The OpenStack community is focused on making clouds work better for users. This is clearly evident in the Newton release, which tackles users’ biggest needs, giving cloud operators and app developers greater security, resiliency and choice,” said Jonathan Bryce, executive director of the OpenStack Foundation. “The new features and enhancements in Newton underscore the power of OpenStack: it handles more workloads in more ways across more industries worldwide. OpenStack is a cloud platform that ties everything together—compute, network, storage, and innovative cloud technologies.”

  • Oracle/Java/LibreOffice

  • FSF/FSFE/GNU/SFLC

    • Reverse lookups in GNS

      DNS allows to resolve the name of an IP address. This is sometimes called “reverse lookup”. In fact, it is actually “normal” resolution of a PTR record. The name of such a record would be, for example, 4.4.8.8.in-addr.arpa. The .arpa TLD is managed by IANA.

      This blogpost is meant to spread ideas that have been exchanged via private email and might be interesting for a broader audience. If you feel like you have useful comments, don’t hesitate to do so.

  • Openness/Sharing/Collaboration

  • Programming/Development

    • GDB 7.12 released!

      Release 7.12 of GDB, the GNU Debugger, is now available via anonymous FTP. GDB is a source-level debugger for Ada, C, C++, Objective-C, Pascal and many other languages. GDB can target (i.e., debug programs running on) more than a dozen different processor architectures, and GDB itself can run on most popular GNU/Linux, Unix and Microsoft Windows variants.

    • GDB 7.12 Released With Rust Debugging, Python Enhancements

      GDB 7.12 is now available as the latest feature release of the GNU Debugger.

      Arguably most exciting about GDB 7.12 is that it now supports debugging programs written in Rust! But if Rust support doesn’t excite you, there is also some Fortran support improvements and various Python language enhancements.

    • Should Math be a Prerequisite for Programming?

      In her LinuxCon Europe talk, “The Set of Programmers: How Math Restricts Us,” Carol Smith, Education Partnership Manager at GitHub, got us thinking about how math requirements impact our ability to bring more people into the field of computer programming.

      Carol kicked off her talk with a story about how she traveled to New Zealand with two friends, Boris and Natasha (not their real names), and learned that Boris has agoraphobia, which causes him extreme anxiety in open spaces. New Zealand, as it turns out, is full of wide open spaces. During one hike, Boris really struggled with crossing the long bridge across a gully. The more he told himself he could do it, the harder it was. He felt like he should be able to do this and felt like he was the only person who couldn’t do it. A lot of people get this feeling when they try to do math. They feel like everyone else can do math, and the more they think this, the more they feel like they are the only person who can’t do math.

    • Rust and Automake

      Yes it is. But it is also limited to build the Rust crate. It does one thing, very well, and easily.

      Although I’m writing a GNOME application and this needs more than building the code. So I decided I need to wrap the build process into automake.

      Let’s start with Autoconf for Rust Project. This post is a great introduction to solving the problem and give an actual example on doing it even though the author just uses autoconf. I need automake too, but this is a good start.

    • The most important coding languages for IoT developers

      We have seen a changing of the guard in the past few years as software takes center stage and once-beloved hardware simply becomes a canvas for developers. The ability to code is an important skill for the production of any modern technology, especially a product that falls within the “internet of things.” If IoT developers are to create the next big thing in tech, they will need to know the most important and popular IoT coding languages. Here is a list of top coding languages providing the backbone of IoT software:

    • French programmers haul Apple into court over developer rules

      Nexedi, an open source software company based in France, has filed a lawsuit against Apple in Paris alleging that Apple’s App Store contract is unfair.

      In a blog post, founder and CEO Jean-Paul Smets and UI designer Sven Franck said that the company has undertaken the lawsuit to force Apple to improve its support for the latest web technology in iOS.

      Smets and Franck point to technical shortcomings in mobile Safari such as lack of support for HTML5 service workers, webRTC, and WebM – web technologies necessary for running applications like the OfficeJS spreadsheet and Hubl.in online conferencing.

    • Why we are suing Apple for better HTML5 support in iOS?

      The primary reason for starting this lawsuit is because we hope that it will help Apple to sooner support the latest Web and HTML5 standards on its iOS platform – the operating system used by all iPhones.

      Anyone running html5test (http://html5test.com/) on his iPhone will find out that current iOS support of HTML5 Web technologies is lagging behind other platforms.

  • Standards/Consortia

Leftovers

  • Skype issues fixed, iTWire editor gets back account

    On Thursday evening, Beer found himself locked out of his Skype account and had to chase Microsoft support for help.

    His emails finally made their way to Microsoft’s Global Escalation Services.

    On Friday evening, he was told that there were multiple users who were having trouble signing into their Skype accounts. “I believe we may be experiencing a bit of an outage,” the escalation supervisor wrote.

  • Security

    • Security advisories for Friday
    • surveillance, whistleblowing, and security engineering

      Imagine for a moment that you are a security engineer who discovers a backdoor that your company execs have been trying to hide from your team. Would you quit on ethical grounds or stay so that you can prevent this from happening again? I don’t think there is one right answer. Personally I am grateful both for those who left and blew the whistle, and for those who stayed to protect Yahoo’s 800 million users.

      Part of the job function of security engineers and pen testers is being ready for the moment you encounter something that you think should be disclosed but your company wants to keep secret. Think about what you would be willing to lose. Be prepared to escalate internally. Know the terms of your NDA and your exit agreement; try your best to honor them. Most of all, keep pushing for end-to-end encryption.

    • Digital Vigilantes Want to Shame DDoS Attackers And Their Corporate Enablers

      Hacker attacks that try to take down websites with a flood of bogus traffic, technically known as Distributed Denial of Service (DDoS) attacks, have become a daily occurrence on the internet. The rise of DDoS has created a cottage industry of companies dedicated to mitigating the attacks, and, on the flip side, professional DDoS-for-hire services and gangs.

      Now, a group of security researchers wants to name and shame not only the hackers responsible for such crippling attacks, but also the internet providers and traffic carriers that enable them by turning a blind eye to their actions, with a project called SpoofIT.

    • Russia Drafting Law to Favor Open Source

      I wrote the original cyber-vulnerability letter to the White House in 1994, and instead of acting responsibly, the US Government allowed NSA — with the active complicty of US communicaitons and computing provider CEOs — to compromise all US offerings. Not only are the communications and computing devices and related consulting compromised, but so are larger offerings (e.g. Boeing aircraft, which come with a computer system pre-configured for US Government remote control take-over — Lufthansa is reported to have discovered this and at great expense removed all US computers from every aircraft). NOTE: I am quite certain about both of the above indictments, but only a proper European Commission investigation can satisfy the public interest; I believe that the same problems infect C4I systems from China, France, Israel, and Russia, and I do not believe most people are aware that the electrical system is now easily used to enter computers that are nominally disconnected from the Internet.

    • Systemd vulnerability crashes Linux systems

      A new vulnerability has been discovered that could shut down most Linux systems using a command short enough to fit in a tweet.

    • Routers, IP Cameras/Phones & IoT Devices can be Security Risks even with the Latest Firmware, and a Strong Admin Password

      I’ve just read an interesting article entitled “who makes the IoT things under attack“, explaining that devices connected to the Internet such as router, IP cameras, IP Phones, etc.. may be used by Botnet to launch DDoS attacks, and they do so using the default username and password. So you may think once you’ve updated the firmware when available, and changes the default admin/admin in the user interface, you’d be relatively safe. You’d be wrong, because the malware mentioned in the article, Mirai, uses Telnet or SSH trying a bunch of default username and password.

      That made me curious, so I scanned the ports on my TP-Link wireless router and ZTE ZXHN F600W fiber-to-the-home GPON modem pictured below, and installed by my Internet provider, the biggest in the country I live, so there may be hundred of thousands or millions of such modems in the country with the same default settings.

    • US Gov’t Officially Accuses Russia Of Hacking… Question Is What Happens Next

      As I noted just the other day, cybersecurity should be a defensive game. Going offensive is really, really dangerous, because things will get worse, and we really don’t know what the capabilities of the other side(s) truly are. Focus on protecting critical infrastructure, not on some meaingless symbolic strike back.

      But, of course, in this day and age, people seem to feel that every action requires some sort of reaction, and in a computer security realm, that’s just stupid. But it seems to be where we’re inevitably heading. The cybersecurity firms will get wonderfully rich off of this. But almost everyone will be less safe as a result.

  • Defence/Aggression

    • Attack on mourners in Yemen kills more than 140, say local health officials

      Saudi-led warplanes struck a funeral at a community hall in the Yemeni capital Sanaa, the country’s Houthi-run administration said on Saturday, but the coalition denied any role in the attack. More than 140 mourners were killed, according to local health officials cited by the United Nations, in an attack that prompted a strong rebuke from Washington, a key Saudi ally.

      Jamie McGoldrick, a UN official in charge of humanitarian efforts in the country, said more than 525 were injured.

      The death toll was 82, according to Ghazi Ismail, the administration’s acting health minister. The reason for the discrepancy in numbers was not immediately clear.

    • Russia warns it will shoot down alliance jets over Syria if US launches air strikes against Assad

      Russian forces could shoot down coalition jets if the United States launches airstrikes against pro-government forces in Syria, the Russian ministry of defence has said.

      American officials have reportedly discussed using limited airstrikes to force Bashar al-Assad’s government to halt its assault on Aleppo and return the negotiating table after a ceasefire collapsed last month.

      In Moscow’s starkest warning yet against Western intervention in the war, Russia’s chief military spokesman said that any airstrikes on government-held territory in Syria would be considered a “clear threat” to Russian servicemen.

    • Why We Should Close America’s Overseas Military Bases

      Despite our unorthodox presidential election, America’s overseas military bases are largely taken for granted in today’s foreign policy debates. The U.S. maintains a veritable empire of military bases throughout the world—about 800 of them in more than 70 countries. Many view our bases as a symbol of our status as the dominant world power. But America’s forward-deployed military posture incurs substantial costs and disadvantages, exposing the U.S. to vulnerabilities and unintended consequences.

      Our overseas bases simply do not pay enough dividends when it comes to core national interests. Here are seven reasons why it’s time to close them.

    • A Blatant Neo-Con Lie

      It is a plain lie that Russia was responsible for the leak of the Democratic National Committee emails to WikiLeaks. It is quite extraordinary that the Obama administration formally adopted the accusation yesterday.

      The US motivation is apparently to attempt to discredit in advance the further Hillary material that WikiLeaks plans to release in the coming month. The official statement that the leak was “consistent with the methods and motivation of Russian directed efforts” is carefully written by the NSA and, when you analyse it, extremely weak. What it says is “there is no evidence whatsoever but this is the sort of thing we think the Russians do”. As it happens, I have direct knowledge that there could not have been any evidence as it was not the Russians.

    • Washington Leads The World To War

      What must the world think watching the US presidential campaign? Over time US political campaigns have become more unreal and less related to voters’ concerns, but the current one is so unreal as to be absurd.

      The offshoring of American jobs by global corporations and the deregulation of the US financial system have resulted in American economic failure. One might think that this would be an issue in a presidential campaign.

      The neoconservative ideology of US world hegemony is driving the US and its vassals into conflict with Russia and China. The risks of nuclear war are higher than at any previous time in history. One might think that this also would be an issue in a presidential campaign.

      Instead, the issues are Trump’s legal use of tax laws and his non-hostile attitude toward President Putin of Russia.

    • The Headless UK European Movement

      What Freedland does not understand is that it was hatred of his political bubble chums which caused Brexit in the first place. The official Remain campaign director was Jack Straw’s son Will. Peter Mandelson was Vice-President. The top-down campaign was devoid of popular enthusiasm with an almost total lack of popular engagement and community events. It continually paraded figures like Blair, Cameron, Osborne, Straw, Clegg, Kinnock and others, which gave ordinary people a chance to give those they rightly despise a political kick in the pants by voting against their will. Brexit has been caused by a justified hatred of the UK political class.

      That those who caused the disaster see themselves as the answer to it is laughable. I remain hopeful that the English in particular will recover from the wave of jingoism which appears to have swept over them like a plague. But resistance must be organic and arise from the people themselves. I hope to see the emergence of a new, untainted and dynamic generation of young activists. My generation have bequeathed a terrible legacy.

  • Transparency/Investigative Reporting

    • The Podesta Emails; Part One

      In April 2015 the New York Times published a story about a company called “Uranium One” which was sold to Russian government-controlled interests, giving Russia effective control of one-fifth of all uranium production capacity in the United States. Since uranium is considered a strategic asset, with implications for the production of nuclear weapons, the deal had to be approved by a committee composed of representatives from a number of US government agencies. Among the agencies that eventually signed off the deal was the State Department, then headed by Secretary Clinton. The Committee on Foreign Investment in the United States (CFIUS) comprises, among others, the secretaries of the Treasury, Defense, Homeland Security, Commerce and Energy.

      [...]

      What the Clinton campaign spokesman failed to disclose, however, was the fact that a few days before sending his rebuttal to the New York Times, Jose Fernandez wrote on the evening of the 17 April 2015 to John Podesta following a phone call from Mr Podesta (Email ID 2053): “John, It was good to talk to you this afternoon, and I appreciate your taking the time to call. As I mentioned, I would like to do all I can to support Secretary Clinton, and would welcome your advice and help in steering me to the right persons in the campaign”.

      Five days after this email (22 April 2015), Clinton spokesman Brian Fallon wrote a memo to the New York Times, declaring that “Jose Fernandez has personally attested that ‘Secretary Clinton never intervened with me on any CFIUS matter’,” but Fallon failed to mention that Fernandez was hardly a neutral witness in this case, considering that he had agreed with John Podesta to play a role in the Clinton campaign.

      The emails show that the contacts between John Podesta and Jose Fernandez go back to the time of internal Clinton campaign concern about the then-forthcoming book and movie “Clinton Cash” by Peter Schweizer on the financial dealings of the Clinton Foundation.

    • Wikileaks founder Assange reveals his next target: Google

      Assange, the notorious founder of Wikileaks, detailed plans to unleash a fresh batch of leaked documents each week until the November 7 presidential election. The first of these leaks was due yesterday, but instead of documents intended to derail the Clinton campaign, we got a plug of Assange’s book and an echo of previous statements that the leaks would come once a week between now and the election.

      The documents are said to expose Clinton, the military, the oil industry, and Google.

      Seriously. Google.

      Eric Schmidt, former CEO of Google and its current chairman seems to be the lynchpin in Assange’s new master plan. In an excerpt from his 2014 book ‘When Google Met Wikileaks,’ Assange accuses Schmidt of having ties to the State Department when Hillary Clinton was Secretary of State and working closely with her campaign.

    • WikiLeaks Releases Alleged Clinton Wall Street Speeches In Batch Of Campaign Emails

      The controversial whistleblower organization WikiLeaks on Friday released emails that they say are linked to Hillary Clinton campaign chairman John Podesta.

      While much of the new batch of hacked emails are benign newsletters and shared articles, one note in particular has gotten attention for offering a glimpse into Hillary Clinton’s paid Wall Street speeches. The email depicts Clinton acknowledging the security issues with using her BlackBerry and suggests that she considers herself a political moderate. It also alleges that she dreams of “open trade and open borders,” among other topics.

      But some of the most intriguing excerpts come when Clinton is addressing issues of Wall Street while actually on Wall Street. In the hacked email, the Democratic presidential nominee discusses the “rigged system,” and the causes of and solutions to the financial crisis in an unguarded tone, framing large banks and investment firms as partners rather than problems.

  • Environment/Energy/Wildlife/Nature

    • Solar panels surpass coal-fired electricity in previously ‘unthinkable’ feat

      Solar panels generated more electricity than coal in the past six months in a historic year for getting energy from the sun in the UK, according to a new analysis.

      Research by the Carbon Brief website found that solar generated nearly 7,000 gigawatt hours of electricity between April and September, about 10 per cent more than the 6,300GwH produced by coal during the same period.

      The figures represent a dramatic turnaround in the UK’s electricity supplies.

      The first ever day when solar produced more than coal was only on 9 April – when there was no coal-fired electricity for the first time since 1882. But then May became the first ever month when this happened.

    • Hurricane Matthew: In Haiti the death toll stands at 877 but the US media does not seem to care

      Four minutes before 10am on Friday morning, Reuters provided an update on the death toll in Haiti. At a minimum, the news agency said, 572 people had lost their lives as a result of Hurricane Matthew.

      At almost precisely the same time, CNN was broadcasting live footage of the storm as it passed northwest along the coast of Florida, from where more than two million people had fled. The winds were strong, the waves powerful and there was genuine concern about the potentially deadly impact of the storm surge.

      But at that moment, the number of US fatalities as a result of the category four storm was zero. The Haitian death toll barely made a mention in the network’s rolling coverage.

    • After Hurricane Matthew, Haiti Faces Crisis and Media Instantly Forgets

      Hurricane Matthew’s devastation in Haiti has left the nation facing a humanitarian crisis as corporate media shifts its focus to the storm’s encroachment onto U.S. shores.

      As the brief U.S. news coverage of Haiti dissipates, aid groups on the ground are still struggling to reach the most impacted regions, while residents grapple with flooding, mudslides, and a shortage of shelters. The storm’s 145 mile-per-hour winds also took down a bridge, tore the roofs off of houses, and damaged at least one hospital and clinic.

      Matthew killed at least 11 people in the Caribbean on Tuesday, with five of those in Haiti, including a 26-year-old man who was attempting to rescue a child from a rushing river, according to the Weather Channel. However, civil protection officials warned that the death toll is hard to calculate due to the extensive damage.

      “It’s the worst hurricane that I’ve seen during my life,” one official, Fidele Nicolas of Nippes, told the Associated Press. “It destroyed schools, roads, other structures.”

      Marie Alta Jean-Baptiste, director of the Civil Protection Agency, also said Tuesday, “It’s much too early to know how bad things are but we do know there are a lot of houses that have been destroyed or damaged in the south.”

    • Hawaiian Deep Coral Reefs Reveal Unique Species

      NOAA-supported scientists working in the Hawaiian Archipelago have characterized the most extensive deep coral reefs on record. They found several large areas with 100 percent coral cover and concluded that deep coral reefs have twice as many species that are unique to Hawaii than their shallow-water counterparts.

  • Finance

    • LSE foreign academics told they will not be asked to advise UK on Brexit

      Leading foreign academics from the LSE acting as expert advisers to the UK government were told they would not be asked to contribute to government work and analysis on Brexit because they are not British nationals.

      The news was met with outrage by many academics, while legal experts questioned whether it could be legal under anti-discrimination laws and senior politicians criticised it as bewildering.

      “It is utterly baffling that the government is turning down expert, independent advice on Brexit simply because someone is from another country,” said Nick Clegg, the Liberal Democrats’ EU spokesman.

      “This is yet more evidence of the Conservatives’ alarming embrace of petty chauvinism over rational policymaking.”

      Sara Hagemann, an assistant professor at the London School of Economics who specialises in EU policymaking processes, EU treaty matters, the role of national parliaments and the consequences of EU enlargements, said she had been told her services would not be required.

    • Leaked documents reveal the EU’s desperation on Canada trade deal

      In an attempt to keep the EU-Canada trade deal CETA on track, the European Commission has drawn up a declaration aimed at reassuring those worried by the implications of the deal. A five page document was leaked last night and has been scrutinised by lawyers and trade experts.

      Guy Taylor, the trade campaigner for Global Justice Now said

      “These leaked documents prove just how much trouble this toxic trade deal is in. They show a panicky commission in Brussels issuing a series of defensive declarations, organising extraordinary meetings of ministers, and staying in a permanent state of crisis to try and legitimise a trade deal that is deeply unpopular and deeply undemocratic.

    • I’m being stripped of my citizenship – along with 65 million others

      Britons are EU citizens too. What’s missing from the practical arguments about Brexit is the recognition that a solemn social contract is being destroyed

      [...]

      Theresa May values “the spirit of citizenship”. I know because she said so in her speech at the Conservative party conference. She waxed lyrical about an ethos “that means you respect the bonds and obligations that make our society work. That means a commitment to the men and women who live around you.”

      Forgive me if I choke on my rich tea biscuit, Theresa. I have a citizenship that I am proud of, that links me to a wider community, that guarantees me rights and freedoms, and it’s being revoked against my will.

    • The Poisoned Chalice: From Eurozone to Dead Zone

      James Galbraith’s articles and interviews collected in his book Welcome to the Poisoned Chalice trace his growing exasperation at the “troika” – the European Central Bank (ECB), IMF and EU bureaucracy – which refused to loosen their demand that Greece impoverish its economy to a degree worse than the Great Depression. The fight against Greece was, in a nutshell, a rejection of parliamentary democracy after the incoming Syriza coalition of left-wing parties won election in January 2015 on a platform of resisting austerity and privatization.

  • AstroTurf/Lobbying/Politics

    • Excerpts of Hillary Clinton’s Paid Speeches to Goldman Sachs Finally Leaked

      Excerpts of Hillary Clinton’s remarks during paid speeches to Goldman Sachs, Deutsche Bank, Morgan Stanley, and other groups were leaked online Friday afternoon by WikiLeaks. Clinton, who was paid upwards of $225,000 per speech, earned more than $22 million on the paid speaking circuit after resigning as secretary of state.

      The excerpts are revealed in an email from Tony Carrk, the research director of the Clinton campaign, to John Podesta, the campaign chairman, and other top campaign officials. Carrk, who did not respond to a request for comment, highlighted in the memo the most politically damaging quotes from each paid speech, under headers including “CLINTON ADMITS SHE IS OUT OF TOUCH,” “CLINTON SAYS YOU NEED TO HAVE A PRIVATE AND PUBLIC POSITION ON POLICY,” and “CLINTON REMARKS ARE PRO KEYSTONE AND PRO TRADE.”

      The wealth Clinton accumulated was a topic at the paid events.

      Discussing middle class economic anxieties, Clinton told a crowd at a Goldman Sachs-sponsored speech that she is now “kind of far removed because the life I’ve lived and the economic, you know, fortunes that my husband and I now enjoy, but I haven’t forgotten it.”

      But the discussions were also an opportunity for Clinton to speak candidly about policy, politics, and her approach to governing.

    • US government: Russia behind hacking campaign to disrupt US elections

      The Office of the Director of National Intelligence and the Department of Homeland Security today jointly charged that the Russian government was responsible for directing a series of intrusions into the networks of US political organizations and state election boards. In a “joint security statement,” officials from the two agencies declared they were “confident” that the government of President Vladimir Putin was behind the hacks and the publication of data obtained from them—some of it doctored—specifically to impact the results of the upcoming US elections.

    • U.S. Publicly Blames Russia for Hacking to Disrupt Elections

      The U.S. said publicly for the first time that intelligence agencies are “confident that the Russian government directed” the hacking of American political groups and leaked stolen material in order to interfere with the Nov. 8 election.

      “These thefts and disclosures are intended to interfere with the U.S. election process,” the Office of Director of National Intelligence and the Department of Homeland Security said in a joint statement on Friday. “We believe, based on the scope and sensitivity of these efforts, that only Russia’s senior-most officials could have authorized these activities.”

      While intelligence officials had previously said privately that they blamed Russia for the attacks, Friday’s announcement puts pressure on President Barack Obama’s administration to respond even as relations with Moscow rapidly deteriorate over everything from Syria and Ukraine to nuclear cooperation.

    • US intel officially blames the Russian government for hacking DNC

      In an official statement today, the Director of National Intelligence and Department of Homeland Security officially blamed Russia for stealing and publishing archived emails from the Democratic National Committee this summer.

      “The recent disclosures of alleged hacked e-mails on sites like DCLeaks.com and WikiLeaks and by the Guccifer 2.0 online persona are consistent with the methods and motivations of Russian-directed efforts,” the statement reads. “We believe, based on the scope and sensitivity of these efforts, that only Russia’s senior-most officials could have authorized these activities.”

    • Top GOP strategist shreds Trump: ‘He is not fit to be called a man’

      Republican strategist Ana Navarro delivered a passionate rebuke of Donald Trump during an appearance on CNN Friday night.

      Reacting to sexually aggressive comments about women the GOP nominee made in a leaked tape from 2005, Navarro said it was high time for the Republican party to call him out.

      “How many times does he get away with saying something misogynistic before we call him a misogynist?” she asked. “How many times does he get away with saying something sexist before we acknowledge that he is a sexist? It is time to condemn the man.”

      The former Jeb Bush supporter and John McCain adviser called Trump a “pig” and said his comments were “vile.”

    • Trump’s Tape Scandal: The Latest Updates

      With only 31 days to go until Election Day, a growing number of elected Republicans are demanding Donald Trump, their party’s nominee for president, step down.

    • The Crucial Campaign Day Most TV Journalists Won’t Tell You About

      States With an October 11 Voter Registration Deadline Florida, Georgia, Illinois, Indiana, Kentucky, Louisiana, Michigan, Montana, New Mexico, Ohio, Pennsylvania, Tennessee, Texas, Utah Territories: American Samoa, District of ColumbiaNext to November 8, the most significant day in the electoral calendar this cycle may be October 11. That’s the deadline for voter registration in 16 states and territories, representing some two-fifths of the US population. The list includes seven of the top 10 states in terms of electoral votes, and several of the most hotly contested campaign battlegrounds, including Florida, Ohio and Pennsylvania.

      In the 2012 election, some 66 million eligible voters, or 30 percent of the total, were unable to vote due to lack of registration. Unregistered voters account for the bulk of the US’s comparatively low voter turnout, as 90 percent of citizens who register typically go on to vote. Compared with registered voters, those who don’t register are more likely to be young, lower-income and people of color.

      Despite this—or perhaps because of this—corporate media have done little to alert the public about the upcoming deadline, or about voter registration in general. A search of Nexis transcripts from the three major broadcast news outlets—ABC, CBS and NBC—turned up no stories on any news show talking about registration deadlines over the past month. (These networks do have information about voter registration deadlines on their websites—but people looking online for information about the deadlines are people who don’t need to be informed that there are deadlines.) Considering the way shows like Meet the Press and This Week and Face the Nation are obsessed with the minutiae of campaign strategy, the failure to discuss the critical factor of the voter registration timeline seems like a major gap.

    • A Government is Seizing Control of Our Election Process, and It Is Not the Russians

      Here’s how:

      — Two days before the second presidential debate, the government of the United States officially accused Russia of a hacking campaign aimed at interfering in the U.S. election. In a joint statement, absent any specifics or technical details, the Department of Homeland Security and the Director of National Intelligence stated “the recent [hacked email] disclosures… are consistent with the methods and motivations of Russian-directed efforts… based on the scope and sensitivity of these efforts, only Russia’s senior-most officials could have authorized these activities.”

      — The statement goes on to detail how only Democratic servers were attacked, meaning the American government is claiming that Russia is trying to throw the election to Donald Trump, plain and simple. It is left unsaid why the Russians would risk cyberwar with the United States to do this, as many have suggested Trump is a neocon in spirit whose loose finger will be on the nuclear button from day one. Clinton is much more of a political realist, comfortable with the business-as-usual of the past eight years that has gone in Russia’s favor in the Ukraine and Syria. She in fact seems like the stable known known, always a preference.

      — Though the first “Russian” hacks were reported in July, it is only 48 hours before the second presidential debate that the statement was released. It could easily have been held until Monday, there is no national security urgency for this to come out Friday. However, with the timing, Trump, essentially tied with Clinton in the polls, will now spend much of the debate defending himself. Since the statement includes no details, only accusations, it is hard to see how anyone could defend themselves. It would be near-impossible for Trump to come out ahead Sunday night; this is a near-coup.

      — Despite the certainty with which the U.S. government has accused Russia of trying to influence the election by hacking into secured email servers, the FBI maintains there is no evidence the Russians or anyone else accessed Clinton unsecured, unencrypted email server laden with actual classified materials, including during Clinton’s first trip to Moscow when she sent and received encrypted email over the Internet and WiFi.

  • Censorship/Free Speech

    • Youtube grilled on censorship of Christian movie

      For some 11 months, the makers of the new movie “I’m Not Ashamed” about the young girl who was the first victim of the Columbine killers in Colorado in 1999 were unable to promote their movie through Youtube.

      The trailer was taken down late in 2015, and the movie’s entire channel then was suspended.

      It’s back now, with the movie opening on Oct. 21, but the makers still want to know why the Internet company took the damaging action.

    • Tom DeFrank explains past student media censorship, rivalry with Rudder

      Standing in Rudder Tower, the building named after his former rival, award-winning journalist and Aggie Tom DeFrank told the story of The Battalion’s censorship from Texas A&M administration during his time as an editor exactly 50 years ago on the birthday of the university.

      DeFrank is currently a contributing editor for the National Journal and was the White House correspondent for Newsweek. DeFrank has covered every president since President Lyndon B. Johnson, and has written a book on President Ford titled “When I’m Gone.”

      DeFrank was the speaker during the latest Aggie Agora session, a seminar and speaker series meant to educate students and community members willing to come. DeFrank’s speech focused on his time at The Battalion dealing with his advisor, Jim Lindsey, and James Earl Rudder, the 16th president of Texas A&M University, for articles depicting the university in a non-flattering light. The events eventually led to DeFrank being fired from The Battalion.

    • ‘Racist’ Gandhi statue banished from Ghana university campus

      A statue of Mahatma Gandhi will be removed from a university campus in Ghana after professors launched a petition claiming the revered Indian independence leader and thinker was racist.

      The statue of Gandhi was unveiled in June at the University of Ghana campus in Accra by Pranab Mukherjee, the president of India, as a symbol of close ties between the two countries.

    • Amazon forced to remove ‘disgusting’ costumes which turn traditional Muslim robes into skimpy party dress

      It could be bought for just under £20 and was described as a “sexy Saudi burka Islamic costume” with “a lovely soft stretch material”.

      Amazon users outraged by the product branded the online store as “disgusting racists”.

      One person said: “You’re all disgusting racists. My culture is not your costume.”

      While another commented: “A person’s culture is NOT a fancy dress costume,” and one more added: “Is this some sort of mockery to the religion.”

    • Digital Homicide Drops Its Lawsuit Against Steam Users, Says It’s Shutting Down Completely

      While we’ll try to keep the grave-dancing at a minimum, it wasn’t difficult to see this coming. Game publisher Digital Homicide has something of a history of lashing out against any negative reviews it might receive, of which there are many. Whether it is more high profile targets like well-followed YouTube game reviewers, or merely lowly Steam customers that offered reviews of Digital Homicide games, the company has taken to simply suing everyone for all the things as its reaction. It seemed easy to recognize that this was not a winning business strategy in general, but when Steam reacted to the latest attempts at litigation by simply dropping all Digital Homicide games from its store, things clearly became dire for the company.

      And now the story comes to a close with a conclusion pretty much everyone saw coming: Digital Homicide has filed a motion to dismiss its lawsuit against those Steam customers, declaring the company to be financially ruined and unable to move forward with the litigation.

    • Digital Homicide Drops $18 Million Lawsuit Against Steam Users, Says Their Company’s Been ‘Destroyed’

      A couple weeks ago, notorious developer of crappy Steam games Digital Homicide made waves by suing 100 anonymous Steam users, who they deemed a “hate and harassment group,” for $18 million. Now, however, the suit’s been dismissed.

      In a motion to dismiss filed last week, Digital Homicide said that their business had been “destroyed,” rendering them unable to continue pursuing the suit. On Friday, it was approved.

    • Protesters at Zuckerberg House Allege Censorship

      Waving a large Palestinian flag and holding signs reading “Stop censoring our movement,” some 15 protesters gathered outside of Mark Zuckerberg’s San Francisco house on Friday to protest Facebook’s temporary suspension of social media accounts that belong to Palestinian journalists.

      Nick Pardee, a member of the Party for Socialism and Liberation, which put the protest together said the suspension of Palestinian accounts showed a pro-Israel bias. Accounts in Israel, including those of government officials, are not removed despite inciting violence against Palestine, he said.

      “These people are genocidal, and Mark Zuckerberg has no interest in censoring them,” he said.

    • ‘Unprofessional!’ Ben Affleck PR Team Accused Of ‘Censorship’ During Interviews

      Ben Affleck may have sat down for a slew of in-depth interviews promoting his new film The Accountant this week, but chances are you won’t get to see them in full.

    • Newton Emerson: Move to ban ‘Sun’ in North hypocritical

      Derry City and Strabane District Council has asked newsagents to stop selling the Sun to show “solidarity” with the families of the 1989 Hillsborough Stadium disaster, which was gratuitously misreported by the Tory tabloid. The council also backed a Liverpool-based campaign for all shops to boycott the newspaper.

      The request was proposed by Independent councillor Paul Gallagher, who has previously stood for the Irish Republican Socialist Party (IRSP), the political wing of the INLA. His motion received unanimous backing from Sinn Féin, the largest party on the council, and the SDLP. All the unionists abstained, apart from one who voted against.

    • Art censorship concerns in South Korea affect film industry at Asia’s largest festival

      The disappointment is echoed by others in the audience as many are still unsure where the festival stands with its ongoing controversy over artistic freedom.

      Still, most are staying hopeful the festival will return to its former glory, back to normal again.

      For the past two years, Asia’s premier film festival has been in a fierce battle with the Busan metropolitan Government over its decision to screen a documentary that the Busan city mayor and former BIFF chairman adamantly opposed.

      The contentious film, The Diving Bell, criticized the South Korean Government’s rescue efforts in the aftermath of the Sewol Ferry disaster, which took the lives of more than 300, most of whom were high school students.

    • ‘Objectionable content’: SC tells govt to stop harassing film director

      The Supreme Court urged on Friday the federal government to stop harassing the director of feature film ‘Maalik’ and submit a report on objectionable content in the movie.

      Meanwhile, the Central Board of Film Censors (CBFC) admitted before the court that the ban on ‘Maalik’ had been imposed without investigating complainants.

      The court observed that there was nothing objectionable in the film under Section 9 of the Motion Pictures Ordinance, 1979.

      The two-judge bench, comprising Justice Umar Ata Bandial and Justice Qazi Faez Isa, is hearing the federal government’s appeal against the Sindh High Court judgment.

    • Justice Qazi blasts CBC chairman over censorship of movie ‘Maalik’
    • Banned Books Week celebrated the freedom to read
    • Censorship is alive and well in 2016: Banned Books Week, Sept. 25 is Oct. 1, is a celebration of intellectual freedom
    • To stage or not to stage: Theatre censorship in India
    • Play censorship: HC asks govt to file affidavit on Palekar’s
    • Maharashtra firm on censoring plays, scripts
    • Maharashtra government to pre-censor plays, scripts and drama
  • Privacy/Surveillance

    • Why Snowden the Movie Matters

      I’ve reviewed Oliver Stone’s movie Snowden elsewhere, and it’s well worth seeing just as a movie. But of course the issues brought up by Snowden the man, and Snowden the movie, are more complex than fit into two hours.

    • NYT Declares Snowden a Thief–and Journalism a Crime

      The article goes on to say, “The information believed to have been stolen by Mr. Martin appears to be different in nature from Mr. Snowden’s theft, which included documents that described the depth and breadth of the NSA’s surveillance.”

      The problem with all this talk about the “theft” and “stealing” of secrets is that while Snowden, one of the most prominent whistleblowers of the modern era, has indeed been charged by the federal government with theft—along with two violations of the Espionage Act—he’s been convicted of no crime. Were he to stand trial, he would no doubt try to offer a public interest defense of his actions—as the Parliamentary Assembly of the Council of Europe has urged that he be allowed to do—saying that the need to expose government wrongdoing overrode the law against unauthorized release of government documents.

      The Times may believe that such a defense would be unsuccessful—and no doubt many legal experts would agree with that assessment. Still, it’s unusual for journalists to assume that someone accused of a crime is guilty, in effect taking the role of judge and jury upon themselves.

      Such an assumption is particularly problematic in this case, because the same section of the legal code that is used to charge Snowden with theft of “any record, voucher, money, or thing of value” also criminalizes “whoever receives, conceals, or retains the same with intent to convert it to his use or gain, knowing it to have been embezzled, stolen, purloined or converted.” There is no explicit exception for journalists there, any more than there’s an exception for whistleblowers.

      If we’re going to call Snowden’s documents “stolen,” then journalists frequently receive “stolen” records from sources and use them as the basis for stories—as the Times itself has done with documents released by Snowden. If Snowden is a thief, then the New York Times is a fence.

    • FCC’s Final Internet Privacy Rules Will Likely Align With FTC

      In a shift from an earlier proposal, the Federal Communications Commission’s final rules to regulate the privacy practices of internet service providers are expected to be in line with the Federal Trade Commission’s approach, according to telecom and agency sources.

      FCC Chairman Tom Wheeler has two other big-ticket items on his year-end agenda, cable set-top boxes and pricing for business data lines used by banks, hospitals and the like. As such, it appears the top telecom regulator will grant the private sector’s pleas to make the new privacy regulations distinguish between “sensitive” and “nonsensitive” data.

    • Continued Disagreement And Confusion Over Yahoo Email Scanning

      I’m guessing this is the same source who went to both publications, but it continues to raise more questions about this. Forcing Yahoo to actually install code is a big, big deal and gets back to the questions raised by the DOJ trying to force Apple to do the same thing. And, once again, this is the kind of thing the government isn’t supposed to be able to do in secret. Yes, individual orders and details about who or what is being searched can and should be kept secret, but requiring a company to install code that sniffs through every email… that’s not how these things are supposed to work.

    • EFF: NSA’s Support of Encryption ‘Disingenuous’

      The National Security Agency came out in support of encryption again Wednesday, but privacy advocates were quick to contest the agency’s stance, criticizing it for having a different definition of the term than others.

      Glenn Gerstell, general counsel for the NSA, stressed that the agency believes in strong encryption multiple times during a panel, “Privacy vs. Security: Beyond the Zero-Sum Game,” at Cambridge Cyber Summit here at MIT, on Wednesday.

    • Former NSA hacker demos how Mac malware can spy on your webcam
    • Former NSA employee: This hack gains access to your Mac’s webcam
    • Former NSA employee shows how any MacBook’s webcam and microphone can be hacked
    • NSA spy details how to tap into webcam on Mac without user noticing
    • The Intercept: There’s an NSA Data Center in the UK

      Technology has always played an inextricable role in spying, and today, that means one or more data centers underpin any spying operation.

      It comes as no surprise that a US surveillance outpost in the UK has a data center, as revealed by a story published last month by The Intercept, the aggressively anti-NSA investigative online magazine published by First Look Media. The story reveals an unprecedented amount of detail about the activities taking place at Menwith Hill Station, relying on classified US government documents leaked by former NSA contractor Edward Snowden.

      Glenn Greenwald, one of The Intercept’s founding editors, was one of the key journalists who wrote the first series of stories based on the Snowden leaks in 2013. Greenwald wrote his for The Guardian.

    • Yahoo didn’t install an NSA email scanner, it was a “buggy” NSA “rootkit”

      Ex-Yahoo employees have spoken anonymously to Motherboard about the news that Yahoo had built an “email scanner” for a US security agency, likely the FBI or the NSA. These sources — at least one of whom worked on the security team — say that in actuality, the NSA or FBI had secretly installed a “rootkit” on Yahoo’s mail servers and that this was discovered by the Yahoo security team (who had not been apprised of it), who, believing the company had been hacked, sounded the alarm, only to have the company executives tell them that the US government had installed the tool.

      The sources in the article say that the “rootkit” was “buggy” and “poorly designed.”

      In the security world, a rootkit is a program that changes the operating system to create administrative (“root”) access that is invisible to the system’s actual administrator. For example, in 2005, Sony-BMG put a covert rootkit installer on more than six million audio CDs; when inserted into Windows computers, these CDs silently updated the Windows kernel so that it would not report the existence of files or processes whose names started with “$sys$”. Then the CDs installed an anti-ripping program that started with $sys$ and tried to shut down any attempt to rip an audio CD — because the program started with $sys$, users and their anti-virus software couldn’t see the programs’ files on their drives, nor would the programs appear in the computers’ process list.

    • Senator Ron Wyden Says White House Is Required By Law To Reveal Details Behind Yahoo Scanning

      So, one of the things in the USA Freedom Act is a provision requiring that the White House declassify any “novel interpretations” of the law in ordering surveillance. This was to avoid the situations, such as under the Section 215 program, where the intelligence community reads words to mean things differently than anyone else would read them. Now, given what we’ve learned so far about the Yahoo email scanning case and the fact that it clearly goes beyond what people thought the law enabled, it seems clear that there’s some interpretation somewhere that’s “novel.”

    • Court Shuts Down Argument That Warrantless Seizures Of Cell Phones Is Fine Because Criminals Use Cell Phones

      Furthermore, it finds that the 68-day gap between the seizure and search was unreasonable. The state argued that the investigation was “complex,” but the court points out investigators obtained five other search warrants during that same time period.

      Even if it had been more timely in its acquisition of a warrant, that still wouldn’t have been able to rescue the evidence it located on the suspect’s phone. Because the underlying seizure was performed without probable cause, the use of a warrant for the search did nothing but create a paper trail for “poisoned fruit.”

      Hopefully this reversal will deter future seizure attempts by state and local law enforcement. Without the ruling in place, anything from cars to computers could end up being taken and held by police under the assumption that criminals use such items. That’s not probable cause. That’s not even reasonable suspicion. It’s fishing expeditions waiting to happen and speculation taking precedent over Fourth Amendment protections.

    • Surprise: Intelligence Community Comes Out Against Congressional Plan To Weaken Intelligence Oversight

      Well, this is somewhat unexpected. Earlier this year, we noted that Congress was working on a plan to undermine the Privacy and Civil Liberties Oversight Board (PCLOB). But apparently, the Intelligence Community, in the form of Director of National Intelligence, James Clapper, is against this idea.

      The PCLOB was initially created as part of the PATRIOT Act, but was basically given no real power. In 2007, Congress finally gave it a bit more power and independence, only to watch both the Bush and Obama administrations ignore it by not appointing anyone to the board. That finally changed in 2012 — just in time for the Snowden leaks (though it has been without a chairperson, since the last one left earlier this year). The PCLOB then put out a scathing report about the NSA’s mass surveillance on Americans under the Section 215 program, though it wasn’t as concerned about PRISM and upstream collection under the Section 702 program. For years now, the PCLOB has supposedly been investigating surveillance under Executive Order 12333, which we’ve been told by insiders is the main program the NSA relies on for surveillance (the others just fill in the gaps).

    • Yahoo Email Scanning May Sink EU Privacy Shield Agreement

      After the US/EU “safe harbor” on data protection was tossed out thanks to NSA spying being incompatible with EU rights, everyone had tried to patch things up with the so-called “Privacy Shield.” As we noted at the time, as long as the NSA’s mass surveillance remained in place, the Privacy Shield agreement would fail as well. This wasn’t that difficult to predict.

      And there are already some challenges to the Privacy Shield underway, including by Max Schrems, who brought the original challenge that invalidated the old safe harbor. But things may have accelerated a bit this week with the story of Yahoo scanning all emails. This news has woken up a bunch of EU politicians and data protection officials, leading to some serious questions about whether it violates the Privacy Shield agreement.

    • Inspector General’s Report Notes Section 215 Requests Down Sharply Since 2013

      The Snowden Effect continues. In addition to actual oversight finally being applied to surveillance programs, the breadth and scope of some programs continues to be narrowed. Some of this narrowing has been forced on the NSA by legislation. But some of it also appears to be shame-related. It’s no longer as acceptable to harvest vast amounts of data domestically, apparently.

      Shane Harris at The Daily Beast notes that the latest Inspector General’s report [PDF] details a sharp decline in Section 215 requests since Snowden’s debut leak in June 2013.

    • Welcome to the machine—Yahoo mail scanning exposes another US spy tool

      Imagine a futuristic society in which robots are deployed to everybody’s house, fulfilling a mission to scan the inside of each and every residence. Does that mental image look far-off and futuristic? Well, this week’s Yahoo e-mail surveillance revelations perhaps prove this intrusive robot scenario has already arrived in the digital world.

      Days ago, Reuters cited anonymous sources and reported that Yahoo covertly built a secret “custom software program to search all of its customers’ incoming e-mails for specific information.” Yahoo, the report noted, “complied with a classified US government directive, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI.”

      Reuters then followed up, saying Yahoo acted at the behest of the secret Foreign Intelligence Surveillance Court. Not to be outdone, The New York Times reported Yahoo used its system designed to scan for child pornography and spam to search for messages containing an undisclosed “signature.” The Times said a FISA judge found probable cause to believe that this digital signature “was uniquely used by a foreign power.” The scanning has ceased, the report noted, but neither of the news agencies said how long the search lasted and when it began.

      Yahoo denies how the reports portrayed its assistance, saying they are “misleading.” Other tech companies have denied participating in such surveillance as it was outlined in those reports.

    • Accused NSA contractor was workaholic hoarder into computers, says ex-wife

      Elizabeth Martin told the New York Times she would be shocked if her former husband Harold, whom she has not seen since 2009, betrayed his country by deliberately passing on government secrets.

      Harold Martin, 51, from Glen Burnie, Maryland, was secretly arrested by the FBI in August after federal prosecutors said he illegally removed highly classified information and stored the material in his home and car. Martin worked for the same NSA contractor, Booz Allen Hamilton, that employed the whistleblower Edward Snowden, but his own motive remains a mystery.

    • Arrested NSA contractor may have hoarded secrets to work from home

      Investigators have little doubt that a National Security Agency contractor arrested in August hoarded mountains of classified material, but so far they’ve found no evidence that he leaked anything to anyone, The New York Times reported Friday.

    • Early Observations In Latest NSA Contractor Arrest

      “While very few details are available about the case of another NSA contractor stealing confidential information, based on the information available thus far, there are some observations that can be made.

      Mainly, there is no easy way to characterize insider threats.

    • Former Mentor Recalls NSA Contractor as Torn, Affected by War
    • N.S.A. Suspect Is a Hoarder. But a Leaker? Investigators Aren’t Sure.

      On a half-dozen occasions in the last three years, top-secret information has leaked from the National Security Agency and appeared on the web. Government analysts concluded with alarm that the documents, including intercepted communications from Europe and Japan and the computer code for the N.S.A.’s hacking tools, had not come from the huge collection taken by Edward J. Snowden.

      That meant there was at least one more leaker still at large, and when F.B.I. agents found in August that a former agency contractor had been taking home top-secret material, they thought they might have the culprit.

      Now they are not so sure.

      Harold T. Martin III, the contractor arrested by the F.B.I. on Aug. 27, brazenly violated basic security rules, taking home a staggering quantity of highly classified material. He had been doing this undetected, agency officials were chagrined to learn, since the late 1990s. But, officials say, they have not been able to definitively connect Mr. Martin, 51, a Navy veteran, to the leaked documents.

    • EU privacy watchdogs have questions about Yahoo’s secret email scanning

      European Union privacy watchdogs are concerned by reports that Yahoo has been secretly scanning its users’ email at the request of U.S. intelligence services.

      “It goes far beyond what is acceptable,” said Johannes Caspar, Commissioner for Data Protection and Freedom of Information in Hamburg, Germany.

      Reuters reported on Tuesday that Yahoo had built a system for U.S. government agencies to search all of its users’ incoming emails. Other tech companies were quick to distance themselves, saying they would have challenged any such request in court.

    • Yahoo’s email snooping: It’s all legal

      The revelation this week that Yahoo scanned the incoming emails of hundreds of millions of Yahoo users set off a storm of condemnation. The real outrage is that this kind of government surveillance, frequently abetted by the collaboration of telecom and tech companies, is pervasive and has little or no oversight.

      As told by Reuters and the New York Times, Yahoo received a secret order last year from a judge of the Foreign Intelligence Surveillance Court (FISC) that compelled the company to customize an existing scanning system (used to find and report child pornography and malware) to search emails for a computer “signature” tied to the communications of a state-sponsored terrorist organization. Emails containing the signature were turned over to the NSA or FBI — and Yahoo was barred from disclosing the matter.

    • FBI says Minnesota mall attack was premeditated
    • FBI Tests The Waters On Another Attempt To Force Apple To Unlock An iPhone

      Earlier this year, as you recall, there were two big cases in which the DOJ and FBI sought to force Apple to make significant technological changes to iPhone software in order to allow the DOJ to brute force the passcode on some iPhones used by some criminals. Eventually, after Apple (and others) pushed back, and public opinion was turning against the FBI, the DOJ miraculously announced that it found its way into both iPhones and the cases were dropped. But the issue of forcing companies (and Apple especially) to backdoor their way into encrypted iPhones certainly has not been dropped. And it appears that the FBI may be testing the waters to see if it can try again.

    • The FBI wants to unlock another iPhone and is making big deal out of it

      IT IS TIME to look up déjà vu in the dictionary. The FBI needs to unlock another iPhone and it still doesn’t know how to do it, despite making all that fuss about the San Bernadino one.

      A report on Wired from an FBI press conference after a mass stabbing in America said that the FBI is in possession of an iPhone that belonged to now dead assailant Dahir Adan.

      FBI special agent Rich Thorton told the conference that it would be handy to get into the phone and find out more about Adan, but that the FBI can’t. He explained that the search for a solution is on. Again.

      “Dahir Adan’s iPhone is locked. We are in the process of assessing our legal and technical options to gain access to this device and the data it may contain,” he said.

      We thought that the FBI had this sorted. The agency made a lot of fuss when it set about breaking into the iPhone 5C of San Bernardino gunman Syed Farook earlier this year.

    • Facebook wins ‘Big Brother’ award in Belgium

      Facebook is watching you.

      The social media giant won the “Big Brother” Award in Belgium on Thursday. The award is named after the dystopian government surveillance in George Orwell’s “1984,” and given to the “biggest privacy-offender of the year,” according to the Flemish League for Human rights, which runs the awards, and its partners.

      Facebook, nominated by international digital advocacy group EDRi, won after being criticized for its default privacy settings in a unanimous decision. The social network didn’t respond to requests for comment.

      “Facebook has access to a wide range of personal data, and it tracks your movements across the web, whether you are logged in or not,” EDRi said. “And the devil is in the default: To opt out, you are expected to navigate Facebook’s complex web of settings.”

  • Civil Rights/Policing

    • See What A Great Excuse The Drug War Is For Cops To Violate People’s Civil Liberties?

      It’s harder to get the police to believe somebody has 26 bodies buried in their backyard — which is probably why the police so rarely get tipped off about that sort of thing.

    • In the Chicago Police Department, If the Bosses Say It Didn’t Happen, It Didn’t Happen

      On May 31, the city of Chicago agreed to settle a whistleblower lawsuit brought by two police officers who allege they suffered retaliation for reporting and investigating criminal activity by fellow officers. The settlement, for $2 million, was announced moments before the trial was to begin.

      As the trial date approached, city lawyers had made a motion to exclude the words “code of silence” from the proceedings. Not only was the motion denied, but the judge ruled that Mayor Rahm Emanuel could be called to testify about what he meant when he used the term in a speech he delivered to the City Council last December, at the height of the political firestorm provoked by the police shooting of 17-year-old Laquan McDonald.

      In that speech, Emanuel broke with the city’s long history of denying the existence of the code of silence. He spoke of “problems at the very heart of the policing profession,” and said: “This problem is sometimes referred to as the Thin Blue Line. Other times it’s referred to as the code of silence. It is the tendency to ignore, deny, or in some cases cover up the bad actions of a colleague or colleagues.”

    • Corrupt Chicago Police Were Taxing Drug Dealers and Targeting Their Rivals
    • How the Chicago Police Department Covered Up for a Gang of Criminal Cops
    • Chicago Police Bosses Targeted Cops Who Exposed Corruption
    • I’m a pro-democracy activist. Is that why Thailand chose to deport me?

      My flight touched down at Bangkok’s Suvarnabhumi airport without any problems, at about midnight on 5 October. I had been invited to share my experiences of Hong Kong’s umbrella movement at two universities in Bangkok and to talk about becoming a young politician.

      But as I left the plane, I started to feel paranoid that officials at the immigration counter might take me away and deport me back to Hong Kong on the very same flight. A strange feeling came over me. I could see more staff than usual ahead of me. But there was nowhere else to go. When I stepped on to the bridge leading off the plane, I saw a crowd of immigration police. I knew something was wrong.

      What surprised me was that, unlike when I was refused entry to Malaysia – in May 2015, this time I didn’t have to go to the counter to be taken away. This time the officials came to meet me.

      They asked if I was Joshua Wong. I told them I was.

    • Yahoo CEO Marissa Mayer led illegal purge of male employees, lawsuit charges

      A prominent local media executive fired from Yahoo last year has filed a lawsuit accusing CEO Marissa Mayer of leading a campaign to purge male employees.

      “Mayer encouraged and fostered the use of (an employee performance-rating system) to accommodate management’s subjective biases and personal opinions, to the detriment of Yahoo’s male employees,” said the suit by Scott Ard filed this week in federal district court in San Jose.

      Ard, who worked for Yahoo for 3 ½ years until January 2015, is now editor-in-chief of the Silicon Valley Business Journal. His lawsuit also claims that Yahoo illegally fired large numbers of workers ousted under a performance-rating system imposed by Mayer. That allegation was not tied to gender.

      Yahoo spokeswoman Carolyn Clark defended the company’s hiring and performance-review processes, which she said are guided by “fairness.”

      “This lawsuit has no merit. With the unwavering support of our CEO, we are focused on hiring employees with broad and varied backgrounds, and perspectives,” Clark said. “Our performance-review process was developed to allow employees at all levels of the company to receive meaningful, regular and actionable feedback from others.

    • Yahoo hit with another lawsuit claiming anti-male discrimination

      The complaint (PDF) filed by Scott Ard says that Yahoo’s “stack ranking” system was “without oversight or accountability” and was “more arbitrary and discriminatory” than stack ranking used by other companies.

      The lawsuit claims that Yahoo’s Media Org employees were ranked from 0.0 to 5.0 before being subject to a “calibration” process by higher-level management. Ard claims employees weren’t told their numeric ranking but were only informed of their “Bucket” ranking, labeled “Greatly Exceeds, “Exceeds,” “Achieves,” “Occasionally Misses,” or “Misses.”

      Ard was hired at Yahoo in 2011, where he had editorial control of the Yahoo.com homepage. In 2014, following a leadership change that put Chief Marketing Officer Kathy Savitt in charge of Media Org, Ard was shifted to a role in which he managed Yahoo Autos, Yahoo Shopping, and Yahoo Small Business.

    • The Hong Kong outcasts who gave up their beds for Edward Snowden

      Vanessa Rodel didn’t realize she was sheltering the most wanted man in the world until the morning after he showed up unexpectedly at her door.
      Her houseguest from the United States had requested a newspaper. She discovered his high-profile identity when she recognized Edward Snowden’s face on the front page of the Hong Kong daily.

      “I said ‘oh my God,’” Rodel told CNN. “The most wanted man in the world is in my house!”
      The next Snowden arrested?
      Rodel — who fled the Philippines — is one of several asylum seekers in Hong Kong who are now going public with a secret they kept for years.
      For weeks in 2013, these impoverished people took turns hiding the man behind one of the biggest intelligence leaks in US history.

    • Argentina Not Only Wants To Bring In E-Voting, It Will Make It Illegal To Check The System For Electoral Fraud

      It’s one thing to bring in an e-voting system that most experts say is a bad idea in theory. But making it effectively illegal to point out flaws that exist in practice is really asking for trouble. Unless this proposed law is changed to allow independent scrutiny of the systems, Argentina will probably find this out the hard way.

    • Government must stop hiding torture record

      Just last week, there were fresh claims about CIA torture of detainees at a black site in Afghanistan. Two Tunisian men told Human Rights Watch they were strapped to a board and held with their heads upside down in a barrel of water. They were beaten with metal rods, anally raped and threatened with a makeshift electric chair.

      Yet the Senate Intelligence Committee, led by Sen. Richard Burr, still won’t release its full report on what was done to CIA captives.

    • What did the Foreign and Commonwealth Office say to the London School of Economics about foreign academics?

      In short: the government has not barred foreign academics from providing policy advice, at least not in any legal or other formal way.

      To do so would be almost certainly unlawful: for example, the government would be in breach of the law of public procurement if it discriminated in favour of UK citizens instead of EU citizens when commissioning research services.

      And there is no such bar set out in any published government document; it seems not to be in any contract specification or tendering document; and there does not even seem to be any written communication from the FCO stating the bar.

      But senior managers at the London School of Economics (LSE) believed they had been told by the Foreign and Commonwealth Office (FCO) that there was now such a bar.

      How did LSE senior managers come to believe the FCO had said there was such a bar?

    • Opposing Populist Chauvinism is not Elitism

      History demonstrates the evils that arise from whipping up popular xenophobic nationalism. After the Tories trumpeted that companies will have to declare how many foreigners they employ, that foreign doctors will be phased out of the NHS, that taxi drivers will have to prove their immigration status, that fewer foreigners will be allowed to study at British universities and that landlords will have to check the papers of their foreign tenants, we will now be told by Theresa May that to oppose this surge of fascism is elitism. I call it fascist after careful consideration; I don’t know what else to call it. Immigrants to Britain are going to be hauled up to produce documents at numerous moments of daily life to prove their right to be here. They will not yet need to be identified by yellow stars, but anybody who does not see the direction of travel is a fool.

      The ability of politicians and media to whip up popular racism is well demonstrated historical fact. I am simply appalled by the catalogue I have outlined above. It is astonishing to me that popular opinion, particularly in England, has been conditioned to the point where outright racism has become the accepted everyday level of political discourse. And it is not just the Tories. Blairites are using populist anti-immigrant rhetoric as their most potent attack on Corbyn. Rachel Reeves made a speech last week that channelled Enoch Powell in predicting violent reaction to immigrants, and in some ways was worse than Powell’s classical allusion. But while Powell’s anti-immigrant rant ended his chances of becoming Prime Minister in a more decent age, Reeves is firmly in today’s UK establishment mainstream.

      The argument that immigration is impacting the living standards of ordinary working people is a demonstrable falsehood. If mass immigration made a country’s people poorer, then Germany and the USA would have the lowest living standards for ordinary citizens in the world. An economy is not a thing of fixed size with a set number of jobs. If it were not for immigration, there would have been no economic growth in the UK at all since the millennium.

    • Film Directors’ Peculiar Choice: Teaching Children That Nonwhite = Evil

      But Burton seems not to be alone in feeling the need to convey that message to a young audience. The animated film How to Train Your Dragon 2 also featured an all-white cast of characters—except for the villain, Drago Bludvist, who is depicted as dark-skinned, hook-nosed and dreadlocked, and voiced by Djimon Hounsou, an actor from Benin…

  • Internet Policy/Net Neutrality

    • Report: Facebook Wants to Expand ‘Free Basics’ Internet Service to US

      Facebook is reportedly bringing its campaign to connect millions more people to the Web to its own backyard.

      As The Washington Post reports, the social network is reportedly in talks with government officials and wireless carriers to bring its Free Basics mobile app to North America and serve the 37 million US residents who are not currently using the Internet. Facebook is reportedly looking for a way to roll out Free Basics without running afoul of net neutrality rules, which derailed the program in India.

      Similar to global versions, the US Free Basics would target low-income and rural Americans who can’t afford a reliable, high-speed Web connection at home or on their phone. The app allows folks to stretch their data plans by offering free Internet access to online resources like news, health information, and job offers.

      Exactly which apps will be included have not been determined, though Facebook will likely be among them.

    • Taking down the internet: possible but how probable?

      The hack of the Democratic National Committee this past summer, allegedly by Russia, prompted a political firestorm, but didn’t cause even a ripple in the US economy.

      But imagine the economic firestorm that would result if online attackers brought the entire internet down, even temporarily.

      You may not have to imagine it, according to Bruce Schneier, CTO of Resilient Systems, cryptography guru, blogger and international authority on internet security. In a recent post titled, “Someone is Learning How to Take Down the Internet,” he wrote that he had been told by multiple sources that, ““someone has been probing the defenses of … some of the major companies that provide the basic infrastructure that makes the Internet work.”

      But according to some of his fellow security experts, you don’t really need to imagine it, since the chances of the internet really being taken down are remote. And even if it happens, it won’t cause catastrophic damage. Several commenters on Schneier’s post wondered why even hostile actors would want to take down the internet, since if they do, they won’t be able to use it either.

    • Comcast Dramatically Expands Unnecessary Broadband Caps — For ‘Fairness’

      For years, we’ve noted how there’s absolutely zero financial or technical justification for usage caps on fixed-line networks. They don’t really help manage congestion, and as any incumbent ISP earnings report indicates, flat-rate broadband has proven incredibly profitable. But thanks to limited competition, caps are a great way to raise rates, hamstring streaming video competitors, and give incumbents a distinct advantage for their own services (aka zero rating). Ultimately, caps disadvantage startups and small businesses, while making broadband more expensive and confusing for everyone.

      Needless to say, Comcast is pursuing this option with reckless abandon.

  • DRM

    • Tim Berners-Lee just gave us an opening to stop DRM in Web standards

      This week, the chief arbiter of Web standards, Tim Berners-Lee, decided not to exercise his power to extend the development timeline for the Encrypted Media Extensions (EME) Web technology standard. The EME standardization effort, sponsored by streaming giants like Google and Netflix, aims to make it cheaper and more efficient to impose Digital Restrictions Management (DRM) systems on Web users. The streaming companies’ representatives within the World Wide Web Consortium (W3C) were unable to finish EME within the time allotted by the W3C, and had asked Berners-Lee for an extension through next year.

      Berners-Lee made his surprising decision on Tuesday, as explained in an email announcement by W3C representative Philippe Le Hégaret. Instead of granting a time extension — as he has already done once — Berners-Lee delegated the decision to the W3C’s general decision-making body, the Advisory Committee. The Advisory Committee includes diverse entities from universities to companies to nonprofits, and it is divided as to whether EME should be part of Web standards. It is entirely possible that the Advisory Committee will reject the time extension and terminate EME development, marking an important victory for the free Web.

    • Homicide Commits Suicide, HP Says It’s Sorry & More…

      HP to remove DRM from printers: In a statement that was full of we-did-it-to-protect-you rhetoric, HP has said that it’s going to remove DRM that it installed as an update on certain models of its printers that prevented users from using ink cartridges with security chips not manufactured by HP.

  • Intellectual Monopolies

    • Gurry Off The Hook, Investigation Ends, WIPO Says [Ed: see some background]

      The member governments of the UN World Intellectual Property Organization, after considering a confidential UN investigation report on whistleblower charges against WIPO Director General Francis Gurry, have decided to end the case without discipline, WIPO has said. Instead, members are working to bolster whistleblower protections, internal oversight and procurement procedures at the agency for the future.

    • WIPO Members Work To Toughen Up Procedures For Investigations Of High-Level Officials

      Member governments of the UN World Intellectual Property Organization (WIPO) are working intensively in a closed-door session today to make changes to the way allegations of wrongdoing against high-ranking WIPO officials are handled. What is not clear from the secretive discussions is whether any action will be taken against the director general as a result of a UN investigation of his activities, for which the UN report is on the meeting agenda.

    • Details Of Charges Against Backpage Execs For ‘Pimping’ Look Totally Bogus

      Backpage.com has been the target of lots of moralizing, grandstanding law enforcement types, who absolutely hate the fact that there’s a classified site out there where some users use it for prostitution (I know that some of the comments will discuss the question of whether or not prostitution should even be a crime, but right now it is, and so this article won’t focus on that other discussion). As we’ve noted time and time again, it’s bizarre that law enforcement folks keep blaming the platforms, when those platforms are actually really useful for law enforcement to track down, arrest, prosecute and convict people actually breaking the law. Still, the grandstanding forced Craigslist to completely shut down its adult section, and most of that traffic moved over to Backpage.

      And now, the CEO of Backpage, Carl Ferrer, has been arrested in Texas for “pimping,” with both Texas Attorney General Ken Paxton and California Attorney General Kamala Harris pushing out grandstanding press releases to talk about how tough on prostitution and pimping they are.

      There’s just one big problem in all of this: the charges are almost certainly completely bogus, and Harris and Paxton are flat out ignoring federal law on this matter. Specifically, they’re ignoring the law we talk about all the time: Section 230 of the Communications Decency Act. As we’ve noted over and over again, CDA 230 says that internet platforms are not liable for the content created by users. There’s an exception for federal criminal acts, but not for states. Various state Attorneys General have been whining about this for years, and demanding Section 230 get a new exception just for them, but that hasn’t happened. So Harris and Paxton clearly know about Section 230, and clearly know that they’re just ignoring the law. They apparently don’t care. They’re either too focused on the publicity grandstanding value of pretending like they’re “tough on crime,” or they’re hoping that by presenting emotional stories, they’ll win over judges and convince them to ignore Section 230.

    • Gurry investigation dropped by WIPO member states; transparency and accountability are the losers

      The news that WIPO member states have endorsed a decision taken by the organisation’s Coordination Committee to drop any further investigation of the allegations of serious misconduct levelled against the organisation’s Director-General Francis Gurry is no surprise; a few days ago this blog predicted it would happen. However, for anyone who believes that the IP system is best served by transparency and accountability, the fact this outcome was so predictable does not make it any less depressing.

      Ever since the then WIPO deputy Director-General James Pooley first accused Gurry of being involved in taking WIPO staff members’ DNA and in interfering to alter the outcome of a procurement process in his April 2014 Report of Misconduct, IAM has taken no position on the claims. We don’t know if they were true; but we do know that they should have been investigated quickly, thoroughly, independently and with full protection for witnesses.

    • Copyrights

      • Father Sues for Copyright Infringement After Live-Streaming Baby’s Birth

        It seems each day more people are willing to share ever more personal things on the Internet. Along these lines, in May of this year Kali Kanongataa a California resident used Facebook to live stream his wife giving birth. After portions the live stream ended up on television and publicized on the Internet, he sued ABC and Yahoo for allegedly infringing his copyright by displaying the video.

        The day after the live stream, ABC’s “Good Morning America” ran a short segment about the live stream and showed a brief excerpt from the video that was up loaded by Mr. Kanogataa which had been widely viewed online since this airing. The clip also appeared on Yahoo, which has a partnership with ABC.

      • Court Asks How it Can Ban Illegal Pokemon Go Downloads

        Pokémon Go is not available to buy in India so the game is being heavily pirated by fans. With legal moves underway to try and bring this behavior to a halt, the Gujarat High Court is now seeking advice on how to stop downloads to protect the public interest.

      • Pirate Kodi Add-Ons Gain Massive Popularity

        Streaming piracy is on the rise with the popular media center Kodi at the center of attention. While Kodi itself is a neutral platform, millions of people use third-party add-ons to turn it into the ultimate pirate machine. In less than a year, the leading add-on repository has seen the number of unique users double, which may be just the beginning.

10.07.16

Links 7/10/2016: Linux Kernel 4.8.1, Wine Staging 1.9.20

Posted in News Roundup at 10:06 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Tesla vehicles to get a much-needed updated browser with new Linux OS in December, says Musk

    There are plenty of useful and well-thought-out features on Tesla’s 17-in touchscreen, but the internet browser is not one of them. For years now, we have been used to high-speed internet browsing on our laptops, desktop and now even or phones, but Tesla’s browser is so slow that it feels like it’s from another era.

    Model S and X owners have been asking for an update to the browser for a long time and unfortunately, it didn’t come with the recent 8.0 update, but Tesla CEO Elon Musk said yesterday that it will with an upcoming update, which will likely be in December.

    Tesla’s operating system is built on a modified version of Linux Ubuntu. Musk says that Tesla aims to upgrade the Linux OS to 4.4 in Tesla vehicles in December. That’s when he expects they will be able to update the browser.

  • Desktop/Microsoft

    • Detested snooping patch KB 2952664 reappears

      Perhaps the world has gone truly mad. Or maybe Microsoft’s trying to pull the wool over our eyes prior to its major shift in patching strategy — the patchocalypse — widely anticipated this month. It’s even possible Microsoft wants to bring back the “Get Windows 10″ campaign, to drive Windows’ reputation even deeper into the dirt.

      A Microsoft spokesman says it isn’t bringing back the “Get Windows 10″ campaign, but our old nemesis KB 2952664 reappeared suddenly yesterday afternoon, and Windows users are livid — and scared.

    • Microsoft’s Skype locks out iTWire editor-in-chief

      Login issues at Skype have bitten iTWire, with editor-in-chief Stan Beer being told his account has been suspended. After 16 hours of waiting, he is still unable to log in, and Microsoft now says it has lost his account and all its data.

      A furious Beer would not rule out legal action. “This is unacceptable. I have been using my account practically every day for the past 10 years. It is vital to the operation of my company. If I do not have it reinstated immediately I will have no alternative but to consider my options and take legal action,” he said.

      An email just received from Microsoft’s support team said: “We have checked our records and your account does not exist in the Microsoft system. Please check the spelling of your account. If you are sure this is the correct Microsoft account, it is also possible that it has expired due to inactivity.

      “Your account will expire if you do not sign in regularly or within the first 10 days after registration. When the account is deleted, all messages, folders, and contacts are deleted as well. Incoming messages will be sent back to the sender as undeliverable, but the user name is immediately available for registration.”

      After suffering repeated issues with Windows over many years, Beer thought he had escaped the clutches of Microsoft when he switched to OS X.

      But last evening he was given a sharp reminder that the Typhoid Mary of the Internet has a long reach and can still foul up one’s day.

    • Data loss services: Microsoft leads all the way

      When you have data you want to get rid of forever, whom are you going to call? There’s one sure place to go: Redmond. You are assured of losing your data when you hand it to Microsoft.

      The company is not in the habit of keeping backups. That’s so yesterday.

      No, Microsoft is out there in front of them all, modern-looking chief executive Satya Nadella in the lead, preaching the gospel of getting rid of the old and welcoming in the new.

      The bitter truth must now be acknowledged: veteran tech journo Bob Cringely said it first and I have repeated it for some time, but never seen it up so close. Microsoft is a marketing company, not a technology company.

    • BIOS Problems and Solutions

      When Lenovo released the Yoga 900-13ISK2 it became apparent that Linux and BSD users could not rely on closed source BIOSes. Of course while it is rather naive to think that a Microsoft Signature Edition PC would be Linux friendly, one could hope that at least it would not be Linux or BSD hostile. On further analysis one can see that this is not the case, and any would-be Linux user is in for a very difficult time trying to load any operating system other than Windows 10.

      The exact reasons for this problem boil down to the inability of the BIOS to set Advanced Host Controller Interface (AHCI) mode for the SSD. Now I knew long ago that closed source BIOSes could become a problem back in the mid-1990s. I’ve spent considerable time researching the ways one can obtain a computer with FOSS firmware.

      Before I go into the specifics of which computers actually have a BIOS with freely available source code allow me to recap some computer history. When we look at the original IBM PC BIOS we can see that it’s been well analyzed and that no other operating systems have been locked out. In addition to this there was no way to alter the BIOS save for swapping out the BIOS chip and putting in a different one. So for several years people didn’t give much thought to the BIOS, as long as their computer booted they could load whatever operating system they wanted, be it Unix, Minix, MS-DOS, CP/M, etc.

  • Server

    • OCI Announces New Tools Projects and 1.0 Release Candidates

      With ContainerCon Europe currently underway in Berlin, we want to share some of the great progress the Open Container Initiative (OCI) has made.

      The OCI was launched with the express purpose of developing standards for the container format and runtime that will give everyone the ability to fully commit to container technologies today without worrying that their current choice of infrastructure, cloud provider or tooling will lock them in.

    • Never explain, never apologize: Microsoft silent on Outlook.com email server grief

      A tweak to Microsoft’s Outlook.com cloud service has blocked a good number of people from accessing their messages.

      Specifically, the baffling and unannounced change affects Outlook.com users with connected accounts: these are email accounts hosted on third-party servers (such as a company’s private server or an ISP’s mail server) that are accessed via the Outlook.com cloud. People with this setup are no longer able to send or receive mail through Redmond’s webmail service.

      Reg reader David Barrett, who runs an internet-facing server for his friends and a UK health charity, said the issue has left those users who run Outlook.com with outside mail systems unable to get their email for days now.

      “It happened around the end of last week/over the weekend and seems to have been a gradual rollout,” he told us.

  • Kernel Space

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • New “Qt Lite” adds 2D renderer, targets 16MB RAM Linux systems

        Qt 5.8 will include IoT-oriented “Qt Lite” technology that enables fine-grained configuration and supports small-footprint IoT gizmos without OpenGL.

        The Qt Company announced a Qt Lite project that aims to extend the Qt development framework to smaller footprint Internet of Things devices with as little as 16MB RAM and flash. The Qt Lite technology will initially appear in Qt 5.8, including a more flexible configuration system for the cross-platform development framework, as well as a new 2D renderer for devices that can’t run OpenGL. Qt Lite also provides a more accessible, lightweight set of development tools.

      • Plasma 5.8 LTS now available in KDE Neon

        KDE Neon, the newly popular distribution produced by KDE and Kubuntu developer Jonathan Riddell and based on Ubuntu is now available in version 5.8. The best part of this latest release? It includes the latest long term stable release of Plasma 5.8. You can get additional details about this release from Jonathan Riddell’s blog.

      • KDE neon 5.8 Linux Distribution Arrives With Plasma 5.8 LTS Desktop
    • GNOME Desktop/GTK

      • Wrapping up Outreachy

        Now that my time as an intern is over, I want to take a moment to thank Outreachy for giving me the opportunity to be a part of this amazing experience. Also a big thank you to my mentor Jim Hall and the GNOME design team (Allan and Jakub) for the guidance and encouragements they provided throughout these months. And finally, a thank you to GNOME community for being awesome ^_^

  • Distributions

    • New Releases

      • Linux Lite 3.2 Beta Released With Lite Desktop Widget

        The Linux Lite 3.2 Beta release has arrived for developer testing and to give an idea about the recent changes made to the Linux Lite distro. It now features a new Lite Desktop widget. The GRUB bootloader has been set to its default configuration which enables multibooting other operating systems alongside Linux Lite.

    • Arch Family

      • The Arch Terminal Desktop

        This linux desktop is an homage to one of our favorite distributions, Arch Linux-and reader KudalGadgil shared it with us in our desktop show and tell pool. Here’s how you can get a similar look.

    • Slackware Family

    • Red Hat Family

      • #RedhatDID: Retrospective and a look ahead to future events

        The day several Redhat trainers and industry folks met to talk about best practices and give feedback on the vision and mission ( and speed of progression) of Redhat Enterprise Linux (RHEL) and upstream / downstream projects and products. Among one of the most popular Sessions was the one by Robin Price and Martin Priesler on OpenSCAP which was a standing room only session with nearly 1/3 of attendants in attendance for this talk / session. Rita Carroll and others setup a interest list for those that would like to attend another OpenSCAP Workshop (mainly centered on a hands-on event but other venues seemed open for debate). If you’d be interested regardless of whether you like me were in attendance please email Rita @ rita@redhat.com with a simple subject line referencing OpenSCAP Workshop (Tysons Area).

      • Installing the Red Hat Container Development Kit 2.2 Release

        When an application developer or architect tasked with exploring the possibilities that containerized applications offer, nothing is easier than the Red Hat Container Development Kit (CDK).

        The Red Hat CDK has all the Cloud tooling you need for your local OSX, Linux or Windows environment and it has a few containers pre-configured for you to explore.

      • RHEL containers on non-RHEL hosts
      • Finance

      • Fedora

        • Libre Application Summit 2016

          I had a great time at the Libre Application Summit in sunny, hipster moustachioed Portland – many thanks to Sri for inviting me. Sorry this blog post is a bit late, but things have been really busy with the Fedora 25 Beta release (which we signed off on today).

          For a first year conference without a crazy marketing budget or anything, attendance was great – it was a good size for the venue, the number of sessions, and the social events, things felt busy and there was a lot of people-getting-to-know-each-other going on. Sri, Adelia and friends did a great job of finding a good venue and getting a solid wifi network, providing food and coffee, and setting up some fun social events.

        • Design – Steps into tickets – the Track ticket.

          The first step in this is to make sure that the subject completely design team fedora. A second step is to check the validity according to legal terms.

          In this category are the rules established by the international community and the teams fedora.

        • Flatpak 0.6.12 Linux Application Sandboxing Makes Kernel Keyring Non-Containable

          Alex Larsson from the Flatpak project, an open source initiative sponsored by Red Hat in an attempt to make cross-platform app deployment easier, announced on October 6, 2016, the release of Flatpak 0.6.12.

        • Fedora 25 Is Still On Track To Use Wayland By Default

          Back in August Fedora 25 switched to using Wayland by default in time for the project’s alpha release. With next week’s beta release, Fedora 25 is still using Wayland by default and it looks like it will remain that way unless any showstoppers appear.

          Initially it wasn’t clear if Fedora 25 would continue using Wayland by default as it neared the final release, but so far so good. Adam Williamson of Fedora QA confirmed in the forums, “Wayland is the default for Fedora Workstation in F25 Beta, and barring any crazy showstoppers we didn’t know about showing up between now and Final, is likely to be the default for Final too.”

        • Fedora 25 Beta Will Be Released Next Week

          The beta of Fedora 25 will be released on-time next week.

          It’s a bit rare in the Fedora space, but all relevant parties have signed off on the Fedora 25 Beta for it to ship on-time, 11 October. Often Fedora releases are challenged by delays due to blocker bugs, including earlier with Fedora 25 Alpha, but all appears to be in shape for shipping the beta next week.

        • Outreachy with Fedora, Fall 2016

          GNOME Outreachy is a global program that offers historically underrepresented people of gender and race stipends to write code for several participating FOSS projects . Inspired by Google Summer Of Code, Outreachy offers participants hands-on internships for contributing to open source projects.

          In 2016, the Outreachy internship dates are from December 6, 2016 to March 6, 2017. Participants work remotely from home while getting guidance from an assigned mentor and collaborating within their project’s community.

    • Debian Family

      • Isenkram, Appstream and udev make life as a LEGO builder easier

        To help out making life for LEGO constructors in Debian easier, please join us on our IRC channel #debian-lego and join the Debian LEGO team in the Alioth project we created yesterday. A mailing list is not yet created, but we are working on it. :)

      • About Pacemaker HA stack in Debian Jessie

        People keep ignoring the status of the Pacemaker HA stack in Debian Jessie. Most people think that they should stick to Debian Wheezy.

        Why does this happen? Perhaps little or none publicity of the situation.

        Since some time now, Debian contains a Pacemaker stack which is ready to use in both Debian Jessie and in Debian Stretch.

      • Reproducible Builds: week 75 in Stretch cycle
      • Derivatives

        • Canonical/Ubuntu

          • Canonical Announces Snapcraft 2.19 Snap Creator Tool for Ubuntu 16.04 LTS

            Canonical’s Sergio Schvezov announced recently the release and immediate availability of the Snapcraft 2.19 tool for creating Snap universal packages, in the Ubuntu 16.04 LTS and Ubuntu 16.10 repos.

          • Dell Launches Its New Ubuntu-Powered XPS 13 Developer Edition Laptop in US & EU

            Dell just launched its new XPS 13 Developer Edition laptop in the US and European markets, and, as usual, they’re partnering with Canonical to deliver you the best Ubuntu Desktop experience as possible.

            For those of you that aren’t aware yet, the Dell XPS 13 Developer Edition laptop was made possible as a part of a project called Sputnik, which attempted to identify the needs of developer when running an open source operating system like Ubuntu, which is currently one of the most popular GNU/Linux distributions in the world. Therefore, Dell XPS 13 Developer Edition laptop now ships with Ubuntu 16.04 LTS (Xenial Xerus).

          • Ubuntu 16.10 (Yakkety Yak) Final Freeze Now in Effect, It Launches on October 13

            A few hours ago, October 6, 2016, Canonical’s Adam Conrad announced that the upcoming Ubuntu 16.10 (Yakkety Yak) operating system has entered the Final Freeze development stage.

          • Flavours and Variants

  • Devices/Embedded

    • Tiny i.MX6 COMs gain enhanced CAN and wireless, eMMC option

      SolidRun has updated its tiny, Linux-ready i.MX6 based MicroSoM modules with optional eMMC and NOR flash, improved FlexCAN, and TI WiLink8 wireless.

      SolidRun has refurbished its NXP i.MX6-based MicroSoM computer-on-modules with new rev 1.5 versions featuring optional eMMC and/or NOR flash, among other additions. Despite some minor mechanical redesigns, the modules have the same 47 x 30mm dimensions, and are backward compatible. They can be plugged into existing MicroSoM companion products such as SolidRun’s sandwich-style, open-spec HummingBoard SBCs and CuBox-i mini-PCs. All the modules continue to run Linux or Android.

    • Desert Rotor’s Next Generation Drone Controller to Use Logic Supply’s ML100 NUC

      Logic Supply informs Softpedia about a recent case study they’re doing featuring drone control specialists Desert Rotor, a drone controller company that uses their ML100 industrial PC for its next-gen UAV control system.

      First, we’d like to inform the reader that Logic Supply is the leading industrial and embedded computer hardware manufacturer. The company is being known for creating some of the most powerful industrial products, from mini and rugged panel PCs and thin client computers to dust-resistant, fanless, and ventless units that can be used in virtualization and IoT (Internet of Things) markets, or other applications.

    • Phones

      • Tizen

        • Samsung might soon be announcing a partnership with Mediatek

          It is no secret that Samsung uses Spreadtrum’s SOCs for most of its budget and mid range smartphones. Spreadtrum’s current best chip happens to be the SC9860- a 16nm process based 2GHz octacore 64 bit Cortex A53 SOC; these are chipset specifications from the yester-year and the technology is now moving into more powerful heterogeneous architectures involving ARM’s Cortex A73, A72 and A57 standards(and the low powered A53 cores for better battery efficiency). Now, this might not make any sense to a normal user. But over at Samsung, Spreadtrum’s slow development pace for its chips seems to be holding the Korean smartphone giant down from offering better (or more) midrange products.

      • Android

        • BMW Connected service adds Alexa and, finally, Android

          The smart car market hasn’t exactly settled along the usual Google vs Apple camps and some do take both sides, if not their own. When BMW launched its BMW Connected service early this year, it seemed to have actually put up a stake on Apple’s iOS side of the fence. Apparently, it was only bidding its time. In its new update, the service finally gets its first Android app. But that’s not the only thing that’s new, as BMW Connected is also gaining support for the Apple Watch 2 and Amazon’s Alexa.

        • Nexus 9 LTE Android 7.0 Nougat Update Officially Rolls Out
        • Upcoming HTC Bolt Smartphone To Run Android 7.0 Nougat
        • Google Pixel phone’s best feature won’t be coming to other Android phones, company suggests

          Google got us all hot and bothered with the launch of a new pair of smartphones earlier this week, but you can be forgiven for missing a major announcement regarding Android.

          The details of the latest version of the operating system, 7.1 Nougat, have been revealed, and it’s missing some of the key features Google waxed lyrical about on Tuesday.

          The biggest news is that Google Assistant, which is sort of like a souped-up version of Siri for Android, will remain exclusive to the Pixel and Pixel XL, in the near future at least. The virtual helper played a central role in Google’s event, with the company taking time to demonstrate how it supports two-way conversation and learns from you as you spend more time using it.

        • Android 7.1 Nougat won’t bring Assistant to everyone

          If, after seeing all the software goodies on Google’s new Pixel phones, you hoped that some of those cool features will trickle down to other Android phones capable of running Android 7.1 Nougat, you’ll be disappointed.

          Google’s smart personal assistant Assistant (Google did not do us a favor when naming this one), as well as unlimited, free backup for full-resolution photos and videos will remain Pixel-only for the time being. Somewhat less surprisingly, non-stop customer support service won’t be included, either.

        • Pixel won’t share Google Assistant with other Android phones
        • When is Android 7.1 Nougat coming to my phone?
        • Giphy Cam finally arrives on Android
        • Android and iPhone fail: Our lust has petered out
        • Verizon will control Android updates for Google Pixel phones it sells
        • Chatting with Google’s Hiroshi Lockheimer about Pixel, Android OEMs, and more

          There were big changes announced at Google this week as the company’s “Google Hardware” team came out of hiding and announced a slew of products. The star of the show was definitely the Google Pixel, Google’s new pair of smartphones that the company is saying it designed while using HTC as a manufacturer. The advent of Pixel phones means Google is an Android OEM again, harkening back to the days when it owned Motorola. This time, though, the company is serious about hardware and software integration.

          Android, however, is the world’s most popular operating system because of OEM partners like Samsung, Huawei, Xiaomi, and LG. And if Google wants Android to continue to deliver Google services to billions of people, it will still need all those partners. Google once again has a delicate balancing act to pull off. The company must do its best to deliver a Google-y Android phone while not stealing the thunder from other OEMs or putting them at a serious competitive disadvantage.

Free Software/Open Source

  • Netizen Report: Open Source Developers Endure Long Prison Sentences, And Worse

    It has been one year since Syrian-Palestinian open technology leader Bassel Khartabil disappeared from his prison cell in Syria.

    Bassel served as the public affiliate for Creative Commons Syria and contributed to Mozilla Firefox, Wikipedia, and other open communities online. He also was the CTO of Al-Aous, a publishing and research institution dedicated to archaeological sciences and arts in Syria. In November 2012, Foreign Policy named Bassel one of the world’s 100 top global thinkers.

  • Open source IT pros are in high-demand in Europe

    Open source employees in Europe have it good, especially when we compare that market to the rest of the world. This is according to a new report by Dice and The Linux Foundation. The report says that out of 1,000 European respondents 60 percent believe it would be fairly easy to find a new job this year. Globally, the figure stands at about 50 percent.

    “Demand for open source talent is growing and companies struggle to find experienced professionals to fill open roles”, says Bob Melk, president of Dice. “Rising salaries for open source professionals indicate companies recognize the need to attract, recruit and retain qualified open source professionals on a global scale. Regardless of where they reside around the world, these professionals are motivated by the opportunity to work on interesting projects”.

    Most sought after skills are application development, the report says, adding that European businesses are doing more than their counterparts in other parts of the world in order to keep hold of the staff. Four out of ten professionals in Europe say the best part about their jobs is that they get to work on interesting projects, as well as the fact that they get to use “cutting-edge technology”.

  • Google’s open source Noto: Free font covers 800 languages, including dead ones

    Google has released a new open-source font called Noto, which supports 800 languages and covers 110 writing systems.

    Short for ‘No more Tofu’, the name of the new typeface is a nod to what people call the default white boxes that appear when a computer doesn’t understand a character on a website.

    “One of the goals of the project was to support every language and every character, so one of the things we wanted to do was make sure there’s no tofu for all our users,” said Bob Jung, an director of internationalization at Google.

  • Google Releases Indoor Mapping Tool to Open-Source Community

    Cartographer, which Google initially used internally only, enables real-time mapping inside buildings, the company says.
    Like it often does, Google has released into the open-source community an indoor mapping tool called Cartographer that it has used internally.

    Cartographer is designed to enable what is known as real-time simultaneous localization and mapping (SLAM)—or the ability to build a 2D or 3D map while at the same time keeping track of an individual or robotic agent’s location within that map.

    The algorithms used in SLAM combine data from various sensors such as Light Detection and Ranging (LIDAR) systems and cameras to determine the position of an object within an environment and to map that environment.

  • Open Source Explained in Less Than Three Minutes

    Free Code Camp is an organization that teaches people to code. As part of this free training, student coders produce free code needed by nonprofit organizations. Free Code Camp doesn’t accept donations, but you can support them by buying t-shirts, hoodies and audiobooks through their store.

  • Web Browsers

    • Mozilla

      • Promoting Cybersecurity Awareness

        We are happy to support National Cyber Security Awareness Month (NCSAM), a global effort between government and industry to ensure everyone has the resources they need to be safer, more secure and better able to protect their personal information online.

        We’ve talked about how cybersecurity is a shared responsibility, and that is the theme for National Cybersecurity Awareness Month – the Internet is a shared resource and securing it is our shared responsibility. This means technology companies, governments, and even users have to work together to protect and improve the security of the Internet. We all have to do our part to make the Internet safer and more secure for everyone. This is a time for all Internet users to Stop. Think. Connect. This month, and all year long, we want to help you be more “CyberAware.”

  • CMS

    • Why I hate (all) software

      This article will be about OTRS, a ticket system we’re using at the FSFE for handling things like swag orders, internship applications and so on. But it could actually be about any software. OTRS just happened to be in the line of fire this time.

      This will be an example in how to (not) manage user expectations. You may know the principle of least astonishment, and this will be a typical example of where it fails. The problem is in how a program communicates (or fails to communicate) to the user what it will do based on some input.

      The design principle of least astonishment simply means you should aim for designing your software in a way that what the user expects should happen when performing a certain operation, should also happen. If something else happens, that’s bad design.

  • Education

    • Why public libraries need to support open source

      People turn to public libraries for answers, and a lot of times libraries are superb at providing them. But when it comes to providing answers about open source, libraries have an uneven track record.

      What can we do to make this better so that more people can turn to their public library to learn about open source software, hardware, and principles?

      Right now, if you walked into my public library and pelted me with questions about open source—like, “What is it?” “How does it work?” “How can I use open source?”—I’d rattle off answers so fast you’d be walking out with a new tool or technology under your belt. Open source is a big world, so of course there are some things I don’t know, but guess what? We have the Internet and books right at our finger tips. Saying that you don’t know the answer is fine, and patrons will respect you for it. The key is helping them find the answer.

  • BSD

  • FSF/FSFE/GNU/SFLC

    • An even more distributed ActivityPub

      So ActivityPub is nearing Candidate Recommendation status. If you want to hear a lot more about that whole process of getting there, and my recent trip to TPAC, and more, I wrote a post on the MediaGoblin blog about it.

      Last night my brother Stephen came over and he was talking about how he wished ActivityPub was more of a “transactional” system. I’ve been thinking about this myself. ActivityPub as it is designed is made for the social network of 2014 more or less: trying to reproduce what the silos do, which is mutate a big database for specific objects, but reproduce that in a distributed way. Well, mutating distributed systems is a bit risky. Can we do better, without throwing out the majority of the system? I think it’s possible, with a couple of tweaks.

    • Register now for LibrePlanet 2017: “The Roots of Freedom” March 25-26, 2017 in Boston, MA
    • FSFE Newsletter – October 2016

      We’re still not over how cool it was to see so many from our community join the FSFE Summit in September. It was a good experience and we’re keen to repeat it. One of the highlights was the ending keynote where Julia Reda called out proprietary software as a threat to democracy. Be sure to view the keynote and some of the other talks from the Summit, either on our YouTube channel, or from our download server where you can get the available videos in webm format.

      We also celebrated the FSFE’s 15th birthday in C-Base with a ceremony where we honored many of our local heroes from around Europe. C-Base has kindly provided a recording of the ceremony if you’re interested in hearing the story of some of our heroes, all of whom you can find working in one of the FSFE’s teams today.

  • Public Services/Government

  • Openness/Sharing/Collaboration

    • Open Hardware/Modding

      • Tips for building your own maker workspace

        I firmly believe that in the absence of any intentional organizational strategy a person’s workspace becomes a reflection of their mind. Like bits of knowledge stored in the brain, tools and assets instinctively find themselves organized in a way that feels right to the individual.

        If this holds true, it stands to reason that, more often than not, our workspaces are always naturally trending away from being tidy and highly-functional. At this point, the odds are good that I’m just trying to rationalize why my office is an unmitigated disaster most of the time, but since you’ve made it this far, let’s make one more assumption: No two people are exactly alike, therefore no two workspaces are exactly alike.

        With this assertion firmly in place, I’d like to share a few things I’ve implemented for creating my workspace that have worked well for my brain. Your workspace will look different, but the practices I chose to follow here can be used for anyone looking to match their setup to their brain.

  • Programming/Development

    • PHPUnit 5.6

      RPM of PHPUnit version 5.6 are available in remi repository for Fedorra ≥ 22 and for Enterprise Linux (CentOS, RHEL…).

Leftovers

  • Is Apple’s software getting worse or what?

    For over a year, Apple’s software has been the subject of more derision than might be expected for a company of its size.

    Developer Marco Arment took Apple to task early last year, arguing that OS X (recently rebranded macOS) is full of embarrassing bugs and that the company is trying to do too much on unrealistic deadlines.

    Arment subsequently disavowed his post because of the widespread media attention it received. But there was blood in the water and the feeding frenzy has continued at Apple’s expense, at least in part because controversy, manufactured or not, drives online traffic.

  • Science

    • The really secret lives of bees: Ingenious experiment shows they learn like we do, from each other

      The bumblebee brain is puny, at least compared with the massive and fatty organ locked in your skull. At about 0.0002 percent the volume of yours, bee brains are close in size to the seeds stuck on a hamburger bun. Thinking about insect brains in terms of size alone, however, is a trap. The intelligence of sesame-brained bugs should not be underestimated.

      A study reported in the journal PLOS Biology on Tuesday, for instance, takes bee smarts in a surprising direction: Scientists from the Queen Mary University of London suggest that the “insects possess the essential cognitive elements for cultural transmission,” as they wrote in their new paper. It is possible to teach a single bee a new trick, in other words, and a different bee can learn that behavior from her peer.

    • Younger adults prefer to get their news in text, not video, according to new data from Pew Research

      Digital publishers may be pouring time and energy into cranking up their video operations, but for a lot of their potential viewers, text is still the way to go.

      New data from Pew Research finds that, when it comes to the news, younger adults still prefer words over moving images. While 46 percent of Americans overall say they prefer to watch the news over reading it, that number is far lower for Americans between the ages of 18 and 29 — only 38 percent of that group named video as their preferred news consumption format. In contrast, 42 percent said that they actually prefer text (which they prefer to read online, of course). Just 19 percent of young adults named listening as their preference. (“Smelling the news” was not an option.)

  • Hardware

    • Lenovo in talks to buy Fujitsu’s loss-making PC business

      In the early 2000s, Fujitsu was one of the top 5 PC makers globally. Today, it’s a loss-making enterprise that’s seen its market eroded by smartphones and tablets. The margins have squeezed, and IT conglomerate Fujitsu has been working to offload its non-core businesses and improve profitability. The company spun off its PC division as a separate business in February, a move that’s typically a precursor to a sale or other major restructuring option.

  • Health/Nutrition

    • Floridians Are Shrugging Off A Hurricane and Zika. But It’s Just the Beginning.

      Hurricane Matthew is whipping away at Florida’s shores this week—threatening lives and homes and parties.

      If you know any Floridians, you know that no one is really freaking out yet. We are masters of disaster in the worst kind of way, having endured hurricanes, tornados, weird crimes, Rick Scott, and a growing Zika virus problem in the past year alone. That’s why business owners in Miami this week were prepping for Hurricane Matthew with a kind of calm, cooperative indifference.

    • Four more states likely to legalize pot

      Voters in four states appear likely to approve ballot measures that would legalize marijuana for recreational purposes, according to recent surveys, while voters are split on the question in a fifth state.

      The polls, taken over the last few weeks, demonstrate a seismic shift in the politics of pot. Even a decade ago, voters rewarded politicians who promised to redouble the war on drugs. After November’s elections, nearly a quarter of Americans could live in states where marijuana consumption is legal.

      But proponents and opponents alike say that polls taken before Election Day often overstate support for legal marijuana measures.

      “If the pro-legalization side is not at 55 percent at this point, it will likely lose,” said Sean Noble, an Arizona-based Republican strategist working against that state’s legalization measure, Proposition 205. “We know that polling on legalization generally overperforms actual results.”

    • Over 140,000 women demonstrate against total ban on abortion

      Plans to impose a total ban on abortion have sparked a massive uncontrolled explosion of anger in Poland. On Monday 3 October a strike of Polish women was called, inspired by the example of Icelandic women, who held a nationwide strike in 1975. In Warsaw, over 50,000 demonstrated in the pouring rain, in Wroclaw 30,000 and Krakow 25,000. Tens of thousands more demonstrated all across the country. In Poznan, there were clashes with the police, while in Kielce demonstrators demolished a controversial homphobic exhibition. Even the police’s conservative estimates talk about 98,000 people demonstrating in over 143 separate protests across the country. Meanwhile, the left party Razem estimated that over 140,000 people had protested on the streets throughout the country. These are easily the biggest ever protests in defence of abortion rights in Poland, far exceeding the protests in 1993, when the current ban on abortion was introduced.

      The first wave of the movement started in spring with the anouncement that a right-wing pressure group had collected over 100,000 signatures (finally they collected 400,000) required to submit a draft law to the Polish parliament which would impose a total ban on abortion and punish women with up to three years in prison. The barbarity of the proposals is illustrated by the fact that all miscarriages would be treated as suspected abortions and would be subject to criminal investigation.

      However, already Poland has one of the most restrictive anti-abortion laws in Europe, allowing abortion only in the case of rape, a threat to the health or life of the woman, or deformation of the foetus. In practice, even when these conditions are fulfilled abortion is often prevented by doctors who exploit the so-called “conscience clause” and impose their own religious beliefs on patients by refusing vital treatment.

  • Security

    • Thursday’s security advisories
    • Fact Or Fiction? Sysadmin Claims This 48 Character String Will Crash Most Linux Distros
    • Crippling bug in Linux crashes system with a single tweet
    • keysafe with local shares

      If your gpg key is too valuable for you to feel comfortable with backing it up to the cloud using keysafe, here’s an alternative that might appeal more.

      Keysafe can now back up some shares of the key to local media, and other shares to the cloud. You can arrange things so that the key can’t be restored without access to some of the local media and some of the cloud servers, as well as your password.

      For example, I have 3 USB sticks, and there are 3 keysafe servers. So let’s make 6 shares total of my gpg secret key and require any 4 of them to restore it.

    • ‘Security fatigue’ is the worst thing to happen to people since insecurity

      CHANGING PASSWORDS is just too much for some people, according to research, and causes them to do stupid things.

      This is called ‘security fatigue’, apparently, and comes straight from the National Institute of Standards and Technology (NIST) and a collection of clipboards and pens.

      “After updating your password for the umpteenth time, have you resorted to using one you know you’ll remember because you’ve used it before? Have you ever given up on an online purchase because you just didn’t feel like creating a new account?” asked NIST.

      “If you have done any of those things, it might be the result of ‘security fatigue’. It exposes online users to risk and costs businesses money in lost customers.”

    • The new BYOD backlash hides an ulterior motive

      Recent research from IDC shows a clear picture: IT organizations are increasingly unhappy about BYOD and now want to curtail or end the practice.

      Their stated concern: The costs are too high and the savings too low. But those concerns are misguided and likely masking a secret agenda to regain control over mobile devices, not to save money. Face it: BYOD was never popular with IT.

  • Defence/Aggression

    • Here’s how the U.S. is dealing with Philippines leader Rodrigo Duterte’s blitz of rants, insults and ultimatums

      Like those from a battering ram, the hits just keep coming from the recently elected president of the Philippines, Rodrigo Duterte.

      Saying this week that President Obama could “go to hell,” Duterte has threatened to jettison decades of close security cooperation with the United States, suggesting Manila would turn to China or Russia for support.

      The latest anti-U.S. vitriol came as U.S. Marines and sailors practiced amphibious landings and other exercises with Philippine troops at coastal sites close to the strategic shipping lanes and disputed islands in the South China Sea, a regional hot spot.

      The joint exercises began Tuesday and are scheduled to run until Oct. 12. Last week, Duterte said this would be the final round of joint exercises with the U.S. military.

  • Environment/Energy/Wildlife/Nature

    • Top Climate Scientist: Tax Fossil Fuels to Save Younger Generations’ Future

      The report warns that future generations may be forced to use “negative emissions” measures to forcibly extract CO2 from the atmosphere as temperatures keep rising. (Photo: Joe Brusky/flickr/cc)

      Fossil fuels must be taxed out of existence to ensure that future generations are not saddled with a world of rising seas and extreme weather—and all the costs that come with them—according to a new research paper by renowned climate scientist and Columbia University professor James Hansen.

    • [Older] How to Talk About the Paris Climate Agreement at the Bar

      On October 5, the United Nations proudly announced that enough countries had agreed to the Paris Agreement for it to go into effect, 30 days from now. That’s great. But if you are a bit confused about what exactly this news means, fear not. I’m here to break it all down.

    • ‘Megadrought’ Risk In American Southwest Soars As Global Temperatures Rise

      Vast swathes of Southwestern United States — a region already grappling with parched conditions — may now have to brace for another threat — decadeslong “megadroughts.”

      According to a new study published Wednesday in the journal Science Advances, there is roughly a 70 to 90 percent chance that the Southwest would experience a megadrought — an extreme dry spell lasting 35 years or more — before the end of the century. And, if precipitation is below normal, it’s 99 percent certain that such an event will occur.

      “Megadroughts are rare events, occurring only once or twice each millennium. In earlier work, we showed that climate change boosts the chances of a megadrought, but in this paper we investigated how cutting fossil fuel emissions reduces this risk,” lead author Toby Ault, a professor of Earth and atmospheric sciences at Cornell University, said in a statement. “The increase in risk is not due to any particular change in the dynamic circulation of the atmosphere. It’s because the projected increase in atmospheric demand for moisture from the land surface will shift the soil moisture balance.”

      The present-day Earth is 1 degree Celsius hotter than it was 150 years ago. The Paris climate agreement, which is to come into force next month, aims to restrict this rise to below 2 degrees Celsius — a target that many experts now believe is almost certain to be breached.

    • Hurricanes will worsen as planet warms and sea levels rise, scientists warn

      Hurricane Matthew is already feared to have caused seven deaths after it hit Haiti and the Dominican Republic on Tuesday, bringing 145mph winds, pounding rain and storm surges to coastal communities.

      The category 4 storm, the strongest hurricane to hit Haiti in 50 years, is expected to surge northwards towards Florida’s east coast and up the south-eastern US coast by the weekend. It follows September’s Hurricane Hermine, which was the first hurricane to hit Florida in nearly 11 years.

    • Amid Media Blackout over Climate Change Links to Hurricane Matthew, Top Scientist Speaks Out

      States of emergency have been declared in Florida, Georgia and the Carolinas as Hurricane Matthew barrels toward the Southeast coastline. More than 2 million people have been urged to evacuate their homes. The record-breaking storm has already killed at least 26 people in Haiti and four in the Dominican Republic. The storm is soon expected to hit the Bahamas and then strengthen as it moves toward Florida. Meteorologists are predicting Matthew could be the strongest hurricane to hit the United States since Wilma in 2005. Many scientists are saying climate change has intensified Hurricane Matthew because warmer ocean waters help create stronger hurricanes. Matthew is already the longest-lived Category 4 or 5 hurricane in the Eastern Caribbean on record. To talk more about Hurricane Matthew and climate change, we speak to Guardian journalist Oliver Milman and Michael Mann, a distinguished professor of atmospheric science at Penn State University. His latest book, co-authored with political cartoonist Tom Toles, is titled “The Madhouse Effect: How Climate Change Denial Is Threatening Our Planet, Destroying Our Politics, and Driving Us Crazy.” Mann is also author of “The Hockey Stick and the Climate Wars: Dispatches from the Front Lines.”

    • Hurricane Matthew Drives Storm Surge Into Northeast Florida; Coastal Flood Damage Already in South Carolina; Dangerous Flood Threat in Carolinas, Georgia

      Hurricane Matthew’s eyewall continues to brush parts of Florida’s northeast coast with high winds and storm surge flooding, and will spread those impacts, in addition to potentially serious rainfall flooding into Georgia, South Carolina, and southern North Carolina through at least Saturday night.

  • Finance

    • Early indications show UK favouring ‘hard Brexit’, says expert

      The UK will trigger Article 50 of the Treaty of Lisbon, triggering the formal two-year Brexit negotiation process, by the end of March 2017, the prime minister has announced.

      The government also intends to publish a ‘Great Repeal Bill’ which, once given effect, will remove the 1972 European Communities Act from the UK statute book and enshrine any EU laws in effect on the date of the UK’s exit from the EU into UK law, Theresa May told the Conservative Party annual conference.

      May said that the process would give UK businesses and workers “maximum certainty as we leave” the EU, while retaining the government’s right to “amend, repeal and improve any law it chooses” at a later date. EU law expert Guy Lougher of Pinsent Masons, the law firm behind Out-Law.com, said that the comments provided “a helpful indication of the government’s intentions and priorities”.

      “Although the prime minister has indicated her opposition to the shorthand labels of ‘soft Brexit’ and ‘hard Brexit’, it appears that the government’s negotiation intentions and the likely outcome are closer to the latter than the former,” he said.

    • A ‘Genius’ Like Trump

      Trump’s business “genius” relies on stiffing creditors and contractors, laying off workers and driving the equity of investors down while he just walks away.

    • Privatizing the public sector is actually costing taxpayers money

      Privatization is bad news for federal, state and local government workers, and the communities where they live. That’s according to a new report released Wednesday by In the Public Interest, a research group focused on the effects of privatization.

      The study, “How Privatization Increases Inequality,” explores the role privatization plays in the American economy—compiling data on the estimated $1.5 trillion of state and local contracts doled out each year.

      “A lot of decisions are small,” says Donald Cohen, executive director of In the Public Interest, but “if you add all that up, it’s very significant.”

  • AstroTurf/Lobbying/Politics

    • Can Facebook influence an election result?

      But Facebook’s most powerful political tool may be one that’s hiding in plain sight. Consider the “I Voted” button.

      The button, dubbed by Facebook a “voter megaphone”, allows users to report whether they have voted and shows which of their friends have also voted.

    • Mike Pence is gaslighting America

      Video of Mike Pence denying Trump said any of the horrible, racist, stupid, uninformed and generally embarrassing things he spouts all day long, matched with Trump saying the stuff.

    • Green Party presidential nominee Dr. Jill Stein discusses her campaign

      She’s a dark horse in the presidential race, but green party nominee, Dr. Jill Stein could have a big impact on the outcome.

      Stein is campaigning in L.A. for a few days – trying to convince voters that she is the better choice. Green Party presidential candidate Jill Stein will make a campaign stop Thursday at Cal State Northridge.

      Stein is polling around the 2% mark in most of the national polls, but that is enough to sway the election to the winner.

    • CNN Censors Third Party Supporters as ‘Undecided’ in Focus Group

      After the first presidential debate on September 26, CNN hosted a focus group at the University of Richmond. According to Justin Smith, one of the 28 people included in the panels, CNN censored those who said they would be voting for a third party, declaring them “undecided.”.

      “Out of 28 panel members, five said they were decided on Clinton, two said they were decided on Trump, and 12 said they were going to vote 3rd party. But once they saw the response, they reshot the segment and replaced ‘3rd party’ with ‘still undecided.’ You’ll noticed on the live feed, I refused to raise my hand,” wrote Smith in a Facebook post. Smith is supporting Evan McMullin, former CIA operations officer and former chief policy director for the House Republican Conference in the U.S. House of Representatives, for president. “They then said they were going to reshoot it, except this time they changed ‘3rd party’ to ‘undecided.’ Some of us asked about the third party option, and they ignored us. They then said they were going to shoot it again, and still asked for ‘undecided’ voters and left out ‘3rd party.’ A lot of the members voted ‘undecided’ because it was the only option other than Trump or Clinton.” Smith posted the CNN video of the focus group and wrote that in the video he refused to raise his hand and vote “undecided” as a protest.

    • The Podesta Emails

      WikiLeaks series on deals involving Hillary Clinton campaign Chairman John Podesta. Mr Podesta is a long-term associate of the Clintons and was President Bill Clinton’s Chief of Staff from 1998 until 2001. Mr Podesta also owns the Podesta Group with his brother Tony, a major lobbying firm and is the Chair of the Center for American Progress (CAP), a Washington DC-based think tank.

    • Trump recorded having extremely lewd conversation about women in 2005

      Donald Trump bragged in vulgar terms about kissing, groping and trying to have sex with women during a 2005 conversation caught on a hot microphone, saying that “when you’re a star, they let you do it,” according to a video obtained by The Washington Post.

      The video captures Trump talking with Billy Bush, then of “Access Hollywood,” on a bus with the show’s name written across the side. They were arriving on the set of “Days of Our Lives” to tape a segment about Trump’s cameo on the soap opera.

  • Censorship/Free Speech

    • YouTube Takes Down European Parliament Video On Stopping Torture For ‘Violating Community Guidelines’

      Back in 2008, then Senator Joe Lieberman went on a ridiculous pro-censorship campaign, demanding that YouTube take down any “terrorist” videos. For reasons I still don’t understand, YouTube complied. As a result, watchdogs documenting Syrian atrocities had them censored from YouTube, because YouTube determined them to be in “violation” of its guidelines in publishing “shocking and offensive videos.”

      That was a few years ago, and it seems like the problem has only gotten worse — as have the ridiculous calls for YouTube and other platforms to be the giant censor in the digital sky. The latest victim? Would you believe it’s the European Parliament itself? Marietje Schaake, a really wonderful Member of the European Parliament (and a Techdirt reader), tweeted that the video she had posted of a European Parliament debate on “anti-torture” was taken down for “violating community guidelines.” Really.

    • Trump’s many, many threats to sue the press since launching his campaign

      Donald Trump’s outright contempt for journalists and press freedom is well known—but in the past month he has outdone himself.

      In the span of a long weekend in mid-September, Trump threatened to sue The New York Times, his staff had a Vice reporter arrested outside a campaign event, and he blamed the New York terrorist bombings on “freedom of the press.”

      This weekend, Trump struck again. After the Times’ huge scoop detailing how he took an almost billion-dollar loss on his 1995 taxes, Trump’s lawyer threatened “prompt initiation of appropriate legal action” against the Times once more. By my count, it is at least the 11th time Trump has threatened to sue a news organization or journalist during his campaign for president.

      I had intended to quantify how many journalists or news commentators Trump has threatened to sue over his lifetime, but that quickly turned into a fool’s errand. A simple Google search of “Trump threatens to sue” will return an overwhelming number of stories. In the past decade alone, he’s sued a former Times journalist who wrote a book about him that he later admitted he didn’t even read; he’s threatened to sue former View host Rosie O’Donnell for allegations that have been shown over and over again during this campaign to be correct; he’s sued HBO’s Bill Maher over a joke bet that involved proving he was not, in fact, born an orangutan.

    • Trump Adds To His Anti-First Amendment Legacy In Threatening To Sue Clinton For Campaign Ads

      Donald Trump keeps insisting that he’s a strong supporter of the 2nd Amendment of the Bill of Rights, but he appears to have skipped right past the 1st Amendment. We’ve discussed his stated plans to “open up” libel laws and his regular threats to sue newspapers for reporting on him in ways he dislikes. Trevor Timm, of the Freedom of the Press Foundation, recently tried to count how many times Trump had threatened to sue the media since his campaign began (ignoring all the threats from before the campaign).

    • Chrome and Firefox are blocking The Pirate Bay as a deceptive site, again

      THE PIRATE BAY is not a place you want to go, at least not according to the Chrome and Firefox browsers which have taken to warning people that the pages are perhaps poisoned and definitely deceptive.

      A post on TorrentFreak said that users are batting their heads against a blocking wall when they try to access magnets and that kind of stuff.

      We took to the water today in search of The Pirate Bay on Firefox. Virgin Media has put a cage around the site, but you can still get to it. Once there we were able to get to the main page, but no further.

      A search, with a capital R for research, took us to a page of links that took us to another page, but not one that we expect The Pirate Bay user base will enjoy.

    • Chrome and Firefox Brand The Pirate Bay As a “Phishing” Site…..Again

      Chrome and Firefox are again blocking direct access to The Pirate Bay’s download pages. According to Google’s safe browsing program, ThePirateBay.org is a “deceptive site” that may steal user information. The TPB crew has been alerted to the issue and hope it will be resolved soon.

  • Privacy/Surveillance

    • Yahoo helps the government read your emails. Just following orders, they say.

      Not long after Edward Snowden’s revelations of massive government surveillance of the American public, Yahoo was one of the eight tech giants that called for strong reforms that would protect their customers.

      And back in 2007, Yahoo went to court to challenge a government surveillance program in order to protect its users’ privacy.

      Well, that was then.

      Now, in a move that has outraged privacy advocates, Yahoo reportedly has helped take government intrusion to a new level. Without apparent protest, according to news reports, it built a mechanism that allowed the National Security Agency and the FBI to scan all of its users’ incoming emails for specific characters or words.

    • Verizon wants $1B discount on Yahoo deal after reports of hacking, spying

      Verizon is pushing for a $1 billion discount off its pending $4.8 billion agreement to buy Yahoo, several sources told The Post exclusively.

      The request comes on the heels of the web giant getting bludgeoned by bad news in the past few days.

      Yahoo revealed two weeks ago that it had been hacked in 2014 and that usernames and passwords for 500 million accounts were swiped.

      Then, earlier this week, it was learned that Yahoo had been ordered by a secret Foreign Intelligence Surveillance Court to scan emails for terrorist signatures.

      “In the last day we’ve heard that [AOL boss] Tim [Armstong] is getting cold feet. He’s pretty upset about the lack of disclosure and he’s saying, ‘Can we get out of this or can we reduce the price?’” said a source familiar with Verizon’s thinking.

      That might just be tough talk to get Yahoo to roll back the price. Verizon had been planning to couple Yahoo with its AOL unit to give it enough scale to be a third force to compete with Google and Facebook for digital ad dollars.

      The discount is being pushed because it feels Yahoo’s value has been diminished, sources said.

    • FBI Looking Into ‘Legal and Technical Options’ for Entering Another Terrorist’s iPhone

      A new case might lead the FBI and Apple into another fight over security and privacy on smartphones, following a confirmation yesterday by FBI special agent Rich Thorton that the FBI has the iPhone of Dahir Adan in its possession (via Wired).

      Adan was the culprit behind the stabbing of 10 people in a Minnesota mall in mid-September, and was eventually shot and killed by police. After the event, terrorist organization ISIS claimed credit for the attack on social media, but “no evidence has emerged to suggest ISIS had a hand in planning or executing the attack.”

      During a press conference in St. Cloud, Minnesota yesterday, Thorton confirmed that the FBI has Adan’s iPhone and that it is locked with a passcode. According to the special agent, the organization is “still trying to figure out how to gain access to the phone’s contents.” The issue currently is that the model and version of iOS running on the iPhone is known only to the FBI. Following the launch of iOS 8 in 2014, any iOS device running the software is encrypted to an extent that no malicious outsider — or even Apple itself — can get into the iPhone or iPad.

    • Ex-Yahoo Employee: Government Spy Program Could Have Given a Hacker Access to All Email

      Contrary to a denial by Yahoo and a report by the New York Times, the company’s scanning program, revealed earlier this week by Reuters, provided the government with a custom-built back door into the company’s mail service — and it was so sloppily installed that it posed a privacy hazard for hundreds of millions of users, according to a former Yahoo employee with knowledge of the company’s security practices.

      Despite this week’s differing media accounts, this much isn’t disputed: In 2015, Yahoo provided the U.S. government with the means to scan every single email that landed in every single Yahoo Mail inbox. The scanning was kept an absolute secret — and as this ex-Yahoo source describes, that meant keeping it a secret from security personnel who came to believe it endangered Yahoo’s hundreds of millions of unwitting customers.

      The employee, who worked at Yahoo before, during, and after the installation of the email-scanning program, requested anonymity because of a nondisclosure agreement formed when the individual quit several months after the program was discovered internally last summer. The source declined to share certain specific names for fear of violating that same NDA or the NDA of others, but The Intercept has confirmed details of the source’s employment at Yahoo, which would have put the then-employee in a position to know this information.

    • Police documents reveal how law enforcement keep Stingray use secret

      Police records obtained by the Daily Dot reveal in unprecedented detail how the Obama administration enables law enforcement to suppress information about controversial phone-surveillance technology used by police throughout the United States.

      The documents, which link the purchase of so-called Stingray devices to various North Carolina state and local police agencies, include a fill-in-the-blank warrant drafted by the U.S. Justice Department (DOJ) and intended for use by state and local police that extends the veil of secrecy over law enforcement’s Stingray use.

      The records, originally acquired by Working Narratives under North Carolina public records law and shared with Daily Dot reporters, also offer new specifics about the capabilities of Stingrays bought by police in North Carolina from Harris Corporation, a leading U.S. manufacturer of cell-site simulators, and the company behind the original “StingRay” procured by the Pentagon and various intelligence agencies more than two decades ago. The North Carolina agencies referenced by the documents include the New Hanover County Sheriff’s Office; the Wilmington Police Department; and the North Carolina State Bureau of Investigation, an agency that reports directly to Gov. Patrick L McCrory (R).

    • At Booz Allen, a Vast U.S. Spy Operation, Run for Private Profit

      In the six weeks since federal agents raided a suburban Maryland home and arrested Harold T. Martin III on suspicion of stealing classified information from the National Security Agency, another organization has quietly prepared to face the fallout: Booz Allen Hamilton, Mr. Martin’s employer.

      Booz Allen, a consulting firm that earns billions of dollars by working for American intelligence agencies, has been called the world’s most profitable spy organization. News this week of Mr. Martin’s arrest in August could renew scrutiny of the firm’s operations and, more broadly, the lucrative contracting business that American intelligence now relies on to run its vast, global surveillance operations.

      Mr. Martin’s arrest is the second time in three years that a Booz Allen contractor has been accused of stealing potentially damaging material from the N.S.A. The company also employed Edward J. Snowden, who spirited out a cache of documents that, in 2013, exposed the extent of American surveillance programs in the United States and around the world.

      Booz Allen is one of a handful of defense and intelligence contractors that blur the line between the government’s intelligence work and private enterprise.

    • BT Yahoo! customers: Why! can’t! we! grrr! delete! our! webmail! accounts!?

      BT customers are unable to delete BT Yahoo email services – despite an exodus of users seeking to leave the security-challenged webmail biz.

      Since allegations arose that Yahoo built an app to enable it to scan all of its users’ emails at the request of US intelligence, many users have sought to delete their email accounts.

      That was in addition to Yahoo!’s confession last month that hackers had stolen the credentials for at least 500 million of its customer email accounts.

    • Imagining a Cashless World [Ed: Lack of anonymity in purchasing/payments now “driven in part by an epidemic of armed robberies in smaller shops,” says iophk]

      A fantastic heist (we like our crimes as smart and magical as dreams) took place some years back, when a stolen helicopter landed on the roof of a cash depot in Stockholm and three masked men smashed a skylight to climb inside. It was September 23, 2009. The depot was freshly stocked in expectation of a coming Swedish payday. Armed with a Kalashnikov, the invaders held employees at bay while their accomplices outside positioned road spikes to keep cop cars from swarming the building. Fake bombs had been set among the police helicopters to delay an aerial chase. The thieves loaded bag after bag of bills into their aircraft, then departed. Seven men were later caught and sentenced, but nearly all of the stolen cash—reportedly some $6.5 million—still has not been found.

      The robbery is known as the Västberga heist, and, like many capers, it became a source of public fascination. (It is the subject of Evan Ratliff’s e-book “Lifted.”) But it also earned astringent notice from some economic theorists, who saw in it a parable about the risks of paper money. Cash is the squirmy ferret of societal wealth—tricky to secure physically and, once liberated in the wild, almost impossible to get back—and money, as technology, has changed a lot in half a century. A day’s errands once called for bulging pockets. Now it’s possible to shop for groceries, pay rent, buy lunch, summon a taxi, and repay your sister for a movie without handling a checkbook, let alone fumbling with bills and coins. Most people think of card and electronic payments as conveniences, stand-ins for exchanging cold, hard cash. Yet a growing group of theorists, led in the United States by Kenneth S. Rogoff, a former chief economist at the International Monetary Fund, are embracing the idea that physical currency should be the exception rather than the rule.

    • Twitter tanks 20.1% as would-be suitors drop out

      Twitter shares plunged 20.1% Thursday after published reports said would-be suitors including Google would not bid for the struggling social media company.

      Technology news outlet Recode said Google and Disney would not pursue Twitter and Apple was unlikely to buy it either, deflating the stock that had soared on takeover speculation.

      Marc Benioff, CEO of Salesforce.com, considered one of the more likely suitors for Twitter, also seemed to downplay his interest during an analyst meeting at his company’s annual Dreamforce event in San Francisco.

      “We look at everything and we don’t buy most things, and we haven’t agreed to buy that company,” he said Wednesday, emphasizing that Salesforce.com has a “disciplined M&A process.”

    • Yahoo email scan fell under foreign spy law -sources

      A Yahoo operation in 2015 to scan the incoming email of its customers for specific information identified by the U.S. government was authorized under a foreign intelligence law, U.S. government officials familiar with the matter said.

      Reuters on Tuesday reported that the Yahoo program was in response to a classified U.S. government request to scan emails belonging to hundreds of millions of Yahoo users.

      The revelation rekindled a long-running debate in the United States over the proper balance between digital privacy and national security.

      The Department of Justice obtained the order from the Foreign Intelligence Surveillance Court, said the sources, who requested anonymity to speak freely.

  • Civil Rights/Policing

    • The FBI Treated Clinton With Kid Gloves

      Tim Kaine repeatedly defended Hillary Clinton’s use of a private email server during Tuesday night’s vice-presidential debate. “The FBI did an investigation,” he said at one point, “and they concluded that there was no reasonable prosecutor who would take it further.” But such a statement is credible only if it follows a real criminal investigation—that is, the sort of investigation that the FBI and the Justice Department conduct when they actually care about a case and want convictions.

    • Google ‘screwed over’ its non-millennials – now they can all fight back

      Google has been hit with a class-action lawsuit accusing the ad giant of discriminating against older employees.

      The Northern California District Court has certified [PDF] the case brought against the Chocolate Factory, allowing aggrieved applicants aged 40 and older to join together in filing a single suit.

      By certifying the case, the court allows the plaintiffs to take on Google’s legal might as a combined force, rather than individually. This, in turn, increases the likelihood of a favorable settlement from Cali-based Google.

      The complaint, originally filed in April of 2015, claims that Google discriminates against job candidates over the age of 40 when screening them. The suit accuses Google of violating the US Age Discrimination in Employment Act.

    • Report: DEA Blowing Money On Liars, Thieves, And Amtrak Employees

      If the Drug War is US law enforcement’s wildly-swinging fist, the DEA is its middle finger. Once the pointless brutality stops, the finger is extended to everyone — especially taxpayers.

      Even the agency’s name inadvertently belies its twisted motivations: “Drug Enforcement Agency.” Without further information, the name, on its own, seems to suggest a shoring up of the drug trade, rather than an adversarial force.

      The DEA has a lot of skin in the drug game. Without the steady flow of drugs, it ceases to exist. It operates with a great deal of autonomy and is often excused its worst excesses because most people agree (without much thought) that drugs are bad.

      The DEA controls a vast network of confidential informants. Actually, to state it more accurately, the DEA oversees… Never mind. The DEA pays a great deal of money to confidential informants. Beyond handing out cash, the DEA apparently does little else to keep its informants in line.

      A just-released Inspector General’s report [PDF] on the DEA’s use of confidential informants finds the agency has no problem paying out vast sums of money to lying informants and that it maintains a small army of otherwise-employed citizens who moonlight as cash/drug-sniffing humans for the nation’s top drug warriors.

      This year’s report builds on the lowlights of last year’s examination of the DEA’s informant program, in which the OIG basically stated the entire program runs without sufficient oversight. Nothing has changed in the interim. This report includes even more details of excess, abuse, and stupidity.

    • Cops arrest hundreds of people allegedly involved in IRS phone scam

      Hundreds of people in Mumbai, India have been detained in relation to a massive telephone scam where fake callers “from the IRS” targeted Americans. In said calls, scammers tried to convince recipients that they were from the IRS in order to con victims into forking over thousands of dollars payable via prepaid credit cards.

      According to The Guardian, 200 Indian police officers raided nine locations across one of India’s largest cities.

    • Indonesian arrested for streaming porn on billboard

      Indonesian police have arrested a man accused of hacking into a public billboard in Jakarta and streaming a pornographic film.

      The 24-year-old IT analyst has admitted the crime, said police, for which he could face up to six years in jail.

      Motorists were left in shock last week when footage from a Japanese porn film was displayed on an electronic screen in south Jakarta.

      The video ran for five minutes on Friday before power was eventually cut.

      However the clip had already been captured on many mobile phones and soon spread across social media.

      The man, who was arrested in his office, allegedly carried out the prank after seeing login details displayed on the billboard.

    • [Older] Valley Fair mall guard pulled gun on shopper for hitting traffic cone, lawsuit alleges

      A shopper at Westfield Valley Fair mall claims in a civil lawsuit that a security guard pulled a gun on him after he hit a traffic cone while trying to leave the mall in December.

      In the Santa Clara County Superior Court filing submitted last week, San Jose resident Nicholas Buchanan, an Apple engineer, is seeking unspecified damages against the mall, a security contractor, and two security guards for a Dec. 5, 2015 encounter. The lawsuit also takes issue with how the guard who drew a pistol on Buchanan was not licensed to carry a firearm at the time.

    • Malaysia: Islamic dept launches app allowing public to report Syariah offences

      RELIGIOUS authorities in the Malaysian state of Selangor has launched a mobile application that allows members of the public to report Syariah-related crimes, adding to concerns of growing Islamic fundamentalism in the Muslim-majority country.

      Selangor’s Islamic Religious Department (Jais) director Haris Kasim told The Star that the app allows the public to become the eyes and ears of enforcers, making it easier for them to report offences that breach the Syariah code, such as pre-marital or extramarital sex, or alcohol consumption, which are forbidden to Muslims.

      “The application, which was launched Tuesday, is simple and easy to use. Once installed on a smartphone, people can send over information and make reports to Jais very easily,” he was quoted as saying.

    • Chess star to boycott World Chess Championship in Iran over hijab

      A top chess player is boycotting the World Chess Championship in Iran because women will be legally required to wear the hijab while competing.

      Nazi Paikidze-Barnes, a Geogian-American chess player, is petitioning the World Chess Federation (FIDE) in a bid to change the host country of the women’s world championship competition from Iran.

      “I think it’s unacceptable to host a women’s World Championship in a place where women do not have basic fundamental rights and are treated as second-class citizens,” the 22-year-old told the BBC.

    • Muslim killer stabbed his care worker wife EIGHT TIMES because she looked after men

      After being arrested, Khan told a police officer: “Never get an arranged marriage bro.”

      The butcher was handed a life sentence after pleading guilty to murdering Nasreen.

      Manchester Crown Court heard Khan told his wife “it’s not halal for you to work with men”.

    • 16-year-old boy killed by LAPD called 911 before the shooting and left a ‘farewell note,’ police say

      A 16-year-old fatally shot by a Los Angeles police officer in South Los Angeles called 911 himself before the shooting and left his family a “farewell note,” leading investigators to believe he had a “desire to end his own life,” LAPD chief Charlie Beck said Thursday.

      Coroner’s officials identified the boy Thursday as Daniel Enrique Perez, who police say was shot after pointing a realistic-looking replica gun at officers.

      Beck said detectives identified Perez through a cellphone he was carrying, which was used to call 911 about 20 minutes before the deadly encounter. The caller reported a man with a gun matching Perez’s description, Beck said.

    • Norway sets out plans for banning burqa in schools and universities

      The burqa veil is to be banned in schools and universities across Norway following similar measures in other European countries, according to the Norwegian education minister.

      The country’s right-wing government confirmed it was considering “national regulations prohibiting the full-face veil in schools and universities”, a move supported by the opposition Labour Party.

      Education minister Torbjorn Roe Isaksen confirmed the ban would only apply to the full-face veil and not to other Islamic headscarves including the hijab, chador and niqab.

    • Top CIA officers to face questions about brutal interrogations in civil suit

      Two former high-ranking CIA officials will be compelled to answer questions under oath about the agency’s brutal interrogations of terrorism suspects, a federal judge ruled Tuesday as part of a lawsuit brought against former CIA contractors by the American Civil Liberties Union.

      The ruling would require Jose Rodriguez, who was the head of the CIA’s Counterterrorism Center after the Sept. 11, 2001, attacks on the United States, and John Rizzo, the agency’s former acting general counsel, to submit to depositions about a program that used methods widely condemned as torture.

      “This ruling is a critical step towards accountability, and it charts a way forward for torture victims to get their day in court,” ACLU attorney Dror Ladin said in a statement released by the organization after the ruling in federal court in Spokane, Wash.

    • How the Heated, Divisive Election of 1800 Was the First Real Test of American Democracy

      On a windy afternoon in February 1959, 14-year-old Craig Wade scooped up what seemed to be a crumpled rag that was blowing, tumbleweed style, across a railroad track in his hometown, Pittsfield, Massachusetts. He later told a local newspaper that he simply “likes to save things.”

  • Internet Policy/Net Neutrality

    • Facebook wants to bring its free internet service to the US [iophk: "zero-rating, so as to decide what people do and don’t have access to"]

      Facebook is in talks with the government and wireless carriers to bring its “Free Basics” internet service to the U.S., reports The Washington Post.

      If the plan works, Facebook “would target low-income and rural Americans who cannot afford reliable, high-speed Internet at home or on smartphones,” the report notes.

      Facebook didn’t immediately respond to a request for comment.

      Free Basics isn’t a full-fledged internet provider, but rather an agreement with carriers that lets people use Facebook and other sites without it counting towards their data plan.

      Facebook has run into trouble with Free Basics abroad. The program, which currently operates in 49 countries, was shut down earlier this year in India due to net neutrality concerns.

  • Intellectual Monopolies

    • Copyrights

      • EU Copyright Reform: Outside the Safe Harbours, Intermediary Liability Capsizes into Incoherence

        As has by now been extensively reported, on 14th September the European Commission released its new copyright reform package. Prominent within this is its proposal for a new Directive on Copyright in the Digital Single Market.

        The proposal contains an array of controversial offerings, but from the perspective of this intermediary liability blogger, the most interesting provision is the proposed Article 13 on ‘Certain uses of protected content by online services’. This is highly problematic in a number of different ways.

      • BitTorrent Fires CEOs, Closes Los Angeles Studio, Shutters BitTorrent Now (EXCLUSIVE)

        BitTorrent has fired its two co-CEOs Robert Delamar and Jeremy Johnson and laid of an unknown number of staffers, Variety has learned from multiple sources. BitTorrent CFO Dipak Joshi has stepped in as interim CEO.

        The company is also closing its Los Angeles-based production studio and shuttering its BitTorrent Now video streaming efforts. This comes just months after BitTorrent announced a renewed focus on media under the leadership of Delamar and Johnson.

        BitTorrent founder Bram Cohen laid out the changes in an email to staff earlier this week, according to a source, but layoffs apparently began as early as two weeks ago. In addition to being ousted as CEOs, Delamar and Johnson were also removed from the company’s board of directors.

        The company had officially announced the appointment of Delamar and Johnson as new co-CEOs in April. At the time, the duo laid out a renewed focus on media production and distribution, which involved the opening of a new Los Angeles-based production studio.

        These efforts culminated in BitTorrent Now, an ad-supported music and video streaming platform that launched in June. BitTorrent Now built on the company’s efforts to strike media distribution deals with independent artists, but didn’t actually use BitTorrent’s P2P technology for streaming.

10.06.16

Links 6/10/2016: KDE Student Programs, Dell With Ubuntu Linux

Posted in News Roundup at 3:41 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Linux is a new frontier for young developer

    When I was 17 years old, I started using Linux because I wanted a desktop that resembled my brother-in-law’s Gentoo laptop, which used the KDE environment. Instead, I got the now-nostalgic brown and orange GNOME 2 environment because I’d installed Ubuntu. (Ubuntu has since changed its color palette.)

  • Server

    • HPE, Dell & Cisco Lead Cloud Infrastructure Sales

      Fifth place was a five-way tie between Lenovo, NetApp, IBM, Huawei, and Inspur. IDC declares a statistical tie when there is less than a one percent difference in revenue among two or more vendors.

    • Automation is not DevOps

      It may sound counterproductive from an Automation specialist to reveal the limitations of his job, but I have seen a wide range of inefficiencies, and many failed attempt to fix them.

    • Making Sense of Cloud Native Applications, Platforms, Microservices, and More

      As more and more of our infrastructure moves into the cloud, the proliferation of buzzwords, new terms, and new ways of doing things can be daunting. Fabio Chiodini, Principal System Engineer at EMC, spent some time helping us make sense of these concepts during his LinuxCon Europe talk, “Cloud Native Applications, Containers, Microservices, Platforms, CI-CD…Oh My!!”

    • Introducing InfraKit, an open source toolkit for creating and managing declarative, self-healing infrastructure

      Docker’s mission is to build tools of mass innovation, starting with a programmable layer for the Internet that enables developers and IT operations teams to build and run distributed applications. As part of this mission, we have always endeavored to contribute software plumbing toolkits back to the community, following the UNIX philosophy of building small loosely coupled tools that are created to simply do one thing well. As Docker adoption has grown from 0 to 6 billion pulls, we have worked to address the needs of a growing and diverse set of distributed systems users. This work has led to the creation of many infrastructure plumbing components that have been contributed back to the community.

  • Kernel Space

  • Applications

    • Wireshark 2.2.1 Network Protocol Analyzer Adds Ascend & K12 Capture File Support

      Today, October 5, 2016, the Wireshark development team announced the release of the first maintenance update for the Wireshark 2.2 series of the world’s most popular network protocol analyzer software.

    • Docker 1.12.2 App Container Engine Is Almost Here, Second RC Brings More Fixes

      The development cycle of the Docker 1.12.2 maintenance update to the widely-used open-source and cross-platform application container engine continues with a second Released Candidate, as announced on October 3, 2016, by Docker engineer Victor Vieux.

      Docker 1.12.2 Release Candidate 2 (RC2) comes one week after the unveiling of the first RC milestone, mainly to address more of the bugs and annoyance discovered lately or reported by users since the first point release of the major Docker 1.12 release. Again, the entire changelog is attached below if you like to read the technical details.

      As you might know, Docker 1.12 introduced a lot of exciting new features, such as the built-in orchestration and routing mesh, the brand new Swarm Mode, as well as a bunch of networking improvements for better security. And it looks like Docker 1.12.2 will attempt to further improve the Swarm Mode and networking functionalities.

    • Kodi 17 “Krypton” Beta 3 Adds More PVR and Video Playback Improvements, Bugfixes

      The day of October 5, 2016, also brought us a new Beta of the upcoming Kodi 17 “Krypton” open-source and cross-platform media center software, the third and most probably the last for this development cycle.

      As we told you in the report about the second Beta of Kodi 17, the final release of the popular media center is launching later this fall with numerous new features and improvements in areas like skinning, video playback, PVR/DVR, live TV, music library, etc. Beta 3 comes three weeks after the release of the second Beta milestone, and it includes a bunch of fixes for various issues reported by users since then.

    • Frogr 1.2 released

      Of course, just a few hours after releasing frogr 1.1, I’ve noticed that there was actually no good reason to depend on gettext 0.19.8 for the purposes of removing the intltool dependency only, since 0.19.7 would be enough.

    • Frogr Flickr Uploader for Linux Is Now Available as a Flatpak

      Like most people living in 2016 I don’t use Flickr. But if I did, I’d probably use Frogr to manage and upload my photos. Frogr is one of a few apps that I’ve written about across all 7+ years I’ve run this site.

    • Libvirt 2.3 Virtualization API Released

      The libvirt Linux virtualization API has been updated to version 2.3 today with some new features and plenty of bug fixes.

    • Harmony Music Player Gets A Gorgeous Dark Mode, Other Improvements

      If you’re a fan of the Harmony music player then listen up: there’s a new update waiting for you to download.

    • This Extension Adds Dynamic Transparency to GNOME Shell’s Top Bar

      Making the GNOME top panel transparent is something a lot of users like to do — but it can look a little out of place when you maximise a window. Dynamic TopBar is a nifty little extension for the GNOME Shell desktop that “makes the top bar transparent when no window is maximized.”

    • ActivityPub and MediaGoblin at TPAC 2016 (or: ActivityPub needs your review!)

      It seems a recurring meme in MediaGoblin land to say “we’ve been quiet, because we’ve been busy” (or maybe historically on every tech blog ever), but I guess I can’t resist repeating the mantra. It’s true! Though the weight of my focus has been shifted from where I expected it to be. From the last few updates over the last year, you would be right to anticipate that the main thing I would be working on would be merging the federation code Jessica has written and getting 1.0 out the door. That was the plan, and we’re still working towards that, but priorities shifted as we realized the opportunities and time pressures we were under with ActivityPub. After the Social Working Group face to face meeting in June, Jessica and I sat down and talked about what we should do. Jessica had recently started working at Igalia (great people!) and was busy with that and other transitions in her life, so we discussed whether we thought it was most sensible to focus my energy on MediaGoblin or on ActivityPub. It was clear that ActivityPub was shaping into a solid specification, but it was also made clear that the Social Working Group’s charter was running out by the end of 2016. We both think ActivityPub is key to MediaGoblin’s success and didn’t want to see our invested time go to waste, so decided my immediate focus should switch to ActivityPub so it could successfully make it as a standard.

      Which isn’t doom and gloom for MediaGoblin! MediaGoblin development has continued… the community is good enough that people have been able to work while I’ve been busy. I’m happy to say we also appointed longtime contributor Boris Bobrov as co-maintainer to help reduce me being a bottleneck. (Thank you Boris, and congrats!) Other contributors have also stepped up to the plate. I’m especially thankful of Ben Sturmfels for hosting MediaGoblin hackathons and being so responsive to community members. (And of course, there are many others to thank, too!)

      Anyway, I’m not going anywhere, I’ve just been shifting focus to standards work for a bit… but it’s all for the greater good of MediaGoblin. (Well, and the greater federated social web!) Soon, we’ll be putting the work we’re doing on ActivityPub directly into MediaGoblin. When we merge Jessica’s work on federation, we will also retool it so that the first federated release of MediaGoblin will be blazing the trails with ActivityPub.

    • Instructionals/Technical

    • Games

      • Kickstarter-Funded Game Drops DRM-Free Version It Promised, Then Promises It Again After The Backlash

        Readers of this site should know by now that, as a general rule, DRM is equal parts dumb and ineffective. What in theory is a way for game publishers to stave off piracy typically instead amounts to a grand digital method for making sure legitimate customers can’t play the games they buy. Now, not all DRM is created equally shitty, of course — one of the more benign forms of DRM is Valve’s Steam platform. Because games purchased on the platform check in with Steam servers for product keys and otherwise encrypts the individual files for the game each user downloads, it’s a form of DRM.

        And because DRM is almost always annoying even at its best, there are some gamers who will only buy DRM-free games. Many Kickstarter campaigns for video games, in fact, explicitly state that backers and non-backers will have a DRM-free option for the game available, either through platforms like GOG and HumbleBundle, or directly from the developer. Duke Grabowski, Mighty Swashbuckler! was one such game, with developer Venture Moon Industries promising both a Steam release and a DRM-free release when it collected funds from backers. Then, suddenly, once the company got a publisher on board for the project, it announced that the game would only be available on Steam.

      • Steam woes in OpenMandriva…. Again!

        Steam updated today and, as a nasty surprise, I hit the same problem I had before with it.

        I tried the solution here, but it was not working this time: the code reverted to its original form, preventing the Steam runtime to work.

      • Mad Max Open World Action-Adventure Video Game Is Coming to SteamOS and Linux

        You won’t believe this, by Feral Interactive announced a few hours ago, October 5, 2016, that it will port the awesome Mad Max open world action-adventure video game to the SteamOS, Linux, and Mac platforms.

        Developed by Avalanche Studios and published by Warner Bros. Interactive Entertainment, the Mad Max has been officially released for Microsoft Windows operating systems, as well as PlayStation 4 and Xbox One gaming consoles a year ago, on September 2015.

      • A general guide for the best practices of buying Linux games

        Quite a number of people have asked me to talk about where to buy Linux games, how to make sure developers are supported and so on, so here I am.

        First of all, I am fully aware there will likely be a small backlash in the comments on certain points. We do seem to have a small minority of very vocal people who like to boast about buying dirt cheap games from places like G2A, which makes me sad. We also have a few who like to advocate piracy, which is not only sad, but makes us look really bad in the eyes of developers. For the most part though, the people commenting here are fantastic to talk to.

        To make this a point: I am not aiming to single anyone out, nor am I aiming to be hostile towards anyone. Read this as if we are all sitting around the table having a *insert favourite drink* and discussing the best way to support our platform. That’s what this is all about, everything I do is to help Linux gaming progress somehow.

        To get this out of the way; I flat out do not recommend buying from places like G2A and Kinguin, Samsai already wrote about that here. Read that as a starting point if you please. Basically, don’t pre-order, don’t buy from random reseller stores.

      • Shadow Warrior 2 may not come to Linux after all, it’s getting a bit confusing

        Shadow Warrior 2 was due to get a Linux version, then suddenly information on it vanished from the Steam page and Humble Store. The plot thickens from there.

        When queried about it, a developer for Flying Wild Hog blamed it on a publisher decision (Devolver Digital) not to have Linux at day-1. I personally spoke to Devolver on twitter, who claimed this was false and they didn’t know why the developer said so. That developer very quickly deleted their post after this, and then made a new one that was entirely different.

      • BUTCHER from Transhuman Design releases with day-1 Linux support, it’s brutal

        BUTCHER is a blood-soaked action platformer from Transhuman Design, the developer behind King Arthur’s Gold and Trench Run.

        It’s brutal, difficult, fast paced and it’s actually rather good. It’s almost as if Doom or Quake were re-designed as an action platformer, with the difficulty and speed of Broforce thrown in for good measure. That’s how I can best describe it. It has a similar atmosphere to Doom and Quake, and great action. There’s very little plot to it, no tutorials to get through and nothing standing in the way of getting in, killing stuff and getting on with it.

      • Slime Rancher updated, new slime types, new crops, and more
      • Dead Island Definitive Edition & Riptide Definitive Edition both patched to fix major issues

        It’s good to see both Dead Island Definitive Edition [Steam] & Riptide Definitive Edition [Steam] still being supported. Both have been patched to fix major issues.

      • ‘Stellar Tactics’, a space exploration RPG with classless character progression will come to Linux

        ‘Stellar Tactics’ [Official Site, Steam] is a rather expansive looking space exploration RPG and the good news is that the developer already has plans for a Linux version.

      • Wasteland 3 now on Fig ready to be funded, nearly hit the goal already
      • 7 Days to Die massive update released, Linux version seems to work okay now [Ed: Mono...]
      • Day of Infamy, the WWII FPS from New World Interactive updated, looks pretty good on Linux

        Day of Infamy [Steam] is the new FPS from the Insurgency developers New World Interactive. It has a Linux version, even though it’s not advertised yet. It seems to work pretty well and they just updated the game.

      • My triumph in Rocket League and why you need to own it on Linux

        I’m going to be honest, this is quite easily going to be my Game Of The Year on Linux.

      • If you need a decent action platformer, be sure to check out Super Time Force Ultra

        Super Time Force Ultra [GOG, Steam] was recently ported to Linux thanks to Aaron from Knockout Games, now I’ve had a chance to check out this action platformer I’ve given it a few thoughts.

      • Mad Max Is Making It’s Way To Mac And Linux

        Feral Interactive announced today that the open world, third-person action game Mad Max is coming to Mac and Linux on October 20th, 2016.

      • Mad Max is coming to Mac and Linux on October 20th
      • Feral Announces Open World Action Game ‘Mad Max’ is Coming to the Mac
      • ‘Wasteland Weekend’ Is Mad Max Meets Burning Man In The Coolest Possible Way
  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • KDE Student Programs announces Season of KDE 2016-2017

        KDE Student Programs announces the 2016-2017 Season of KDE for those who want to participate in mentored projects which enhance KDE in some way. Projects from past Seasons of KDE include new application features, the KDE Continuous Integration system, new reporting for developers, as well as a web framework, porting and a plethora of other work.

        Successful mentees earn a certificate of completion along with a very cool t-shirt and other goodies. Any person who wants to complete a project is eligible to enter.

      • KDE Plasma 5.8 LTS released

        After many work around in the previous beta version of KDE Plasma 5.8 beta,KDE team is finally here with their first LTS of Plasma desktop software release, KDE Plasma 5.8 LTS.
        Believe it or not, this release is surely gong to attract plenty of non-techie or simple users.But Techies are also not going to lose interest, this Ubuntu based beauty is going to prove the beast features as well.

    • GNOME Desktop/GTK

      • Web Engines Hackfest 2016!

        It had great talks that will eventually end up in videos uploaded to the web site. We were amazed at the progress being made to Servo, including some performance results that blew our minds. We also discussed the next steps for WebKitGTK+, WebKit for Wayland (or WPE), our own Clutter wrapper to WebKitGTK+ which is used for the Apertis project, and much more.

        [...]

        One of the main problems people reported was applications that use WebKitGTK+ not showing anything where the content was supposed to appear. It turns out the problem was caused by GTK+ not being able to create a GL context. If the system was simply not able to use GL there would be no problem: WebKit would then just disable accelerated compositing and things would work, albeit slower.

      • The GNOME 3.24 Release Date Is Set

        GNOME 3.24 is to be released on March 22, 2017 — providing that development goes to plan between now and then, of course!

  • Distributions

  • Devices/Embedded

    • i.MX6 UL COM has a carrier board with Raspberry Pi style expansion

      The Armadeus “Opos6UL” COM runs Linux on an i.MX6 UL SoC, and has eMMC, optional wireless, extended temp support, and a carrier board with RPi-style I/O.

      French embedded manufacturer Armadeus Systems, which last year shipped an APF6_SP computer-on-module with an i.MX6 and a Cyclone V GX FPGA, has now unveiled a more modest, but similarly Linux- and NXP-based COM aimed at IoT applications. The i.MX6 UltraLite (UL) based Opos6UL is designed for industrial products like IoT gateways, medical devices, small HMI, and autonomous robotics.

    • Phones

      • [Early Access] Sailfish OS Fiskarsinjoki

        It’s our great pleasure to announce that we are now starting to speed up deliveries of Sailfish OS updates.

        This post, as mentioned in the title, is about the next early access iteration, update Fiskarsinjoki. Fiskarsinjoki is a small Finnish river in the village of Fiskars. It passes through a park-like cultural landscape and lands in the Gulf of Finland – just some trivia for you to learn!

      • Jolla Puts Out Sailfish OS “Fiskarsinjoki” In Early Access

        Jolla is looking to push out Sailfish OS releases faster and thus today announced “Fiskarsinjoki” in early access form.

        This next iteration of Sailfish OS is codenamed Fiskarsinjoki over a small Finnish river. Fiskarsinjoki adds support for saving images/video directly to an SD card, easy conference calls support, an integrated scientific calculator, more editing options in the image gallery, file sharing support in the file manager, and various other small features and refinements.

      • While Google’s Ara Modular Phone Is Dead, Greybus Still Appears To Have A Future

        With the Linux 4.9 staging pull request comes the addition of the Greybus subsystem.

      • Tizen/ARTIK

        • Pre-Order Gear S3 Classic and Frontier Smartwatch in the UK

          The latest Tizen based smartwatch, the Gear S3, has been launched at the end of August. This gear device builds on the hit features of the Gear S2, the circular screen and rotating bezel immediately come to mind, and adds more features for the fashion and sports conscious amongst us.

        • Samsung Z2 is to be Launched in Kenya Today

          We’ve been following the launch of the Samsung Z2 closely, as you would expect from Tizen Experts, and we knew that Kenya was the next market to be graced by the Z2 and its 4G capabilities. Well it looks like today is the day as Samsung has been sending out Press Invites for the event over the last few days.

        • Xender File Transfer Sharing App Launched on the Tizen Store

          Many of our readers have been waiting for Xender, a file transfer & sharing app, to be released on the Tizen Store and today it finally has. Do you need to transfer a file between mobile phones or between your phone and the pc? This is what Xender is designed to do and it does it quite well. The app boasts at being the fastest all-in-one file transfer and sharing app!

        • SmartHome prototype using ARTIK Cloud and Particle Photon

          Samsung and hackster.io had announced an ‘IOT challenge Using ARTIK Cloud” a couple of months ago in order to bring the maker and developer community on board to samsung’s cloud platform. The deadlines for submissions of project ideas are about to close in 5 days at the time of writing. A huge list of entries have been flooding the doors of hackster.io and Samsung ever since the contest was announced.

      • Android

        • Google melts 78 Android security holes, two of which were critical
        • Remix OS Brings Android For PC
        • Lenovo exec: Nope, not building Windows Phones [Ed: learning from mistakes?]

          Lenovo will not build smartmobes running on Microsoft’s Windows operating system because it doubts the software giant’s long term commitment to the market.

          This is the view from Lenovo’s chief operations officer Gianfranco Lanci, who told attendees at the Canalys Channel Forum 2016 that Windows 10 was generating interest in the corporate market for PCs but that his company won’t entertain basing its phones on the OS.

          “We don’t have Windows phones or any plans to introduce a Windows Phone,” he said.

          “I don’t see the need to introduce a Windows Phone and I am not convinced Microsoft is supporting the phone for the future,” Lanci added.

          According to Gartner, Windows Phone/Windows 10 Mobile was the third most popular OS on the planet behind Android and iOS during Q2, running on 1.97 million phones compared to 297 million on Google’s OS and 44.39 million on Apple’s software.

        • Six reasons to have the Probox2 Air Android TV box in your home

          When it comes to home entertainment, especially the new wave of 4K-enabled products, it gets pretty expensive to kit out your home with equipment. And if you’re in a home with multiple screens, it’s even more so.

          The Probox2 is the latest Android-based TV box to hit the market and has a great number of features to at least tempt you to consider stumping up the cash to get quality visuals in all your rooms.

        • Introducing the Android Central Smartphone Buyer’s Guide

          It’s increasingly likely that you’re reading this on your smartphone. In fact, it’s likely you’re doing more on your phone than ever before, which is why it’s so important to buy the right one — for you and the people in your life.

          Here at Android Central, we don’t just play with phones — we live and breathe them. We’re constantly comparing them to the competition, seeking out the ideal device for each particular use case. We believe in the Android mantra of, “Be together, not the same,” which is why we are launching the Smartphone Buyer’s Guide to help you pick the right phone for your unique situation.

        • Android 7.1 Nougat Update vs. Pixel Android 7.1: Leaked Changelog Reveals Difference Between Pixel OS Features And Upcoming Update
        • Pixel’s best features aren’t coming to the new version of Android

          At Google’s hardware event this week, the new version of the Android operating system, Android 7.1 (Nougat 7.1), was barely mentioned. As it turns out, there was a reason for that: some of the new Pixel smartphones‘ best features won’t be arriving in the new OS. This includes features like Google Assistant, the built-in customer support service, unlimited and free backup of full-res photos and videos, Smart Storage, and more.

          Details on which features were “Pixel-only” were previously reported by Android Police, citing a changelog provided by a Google source. Google confirmed to us those changes are accurate.

          Some of the omissions make sense. For example, only Pixel phones will ship with the new, “quick switch” adapter that makes it easier to move your data from iPhone to Android. That requires hardware in the form of the adapter cable.

        • Google destroys the Android fan myth that the iPhone is too expensive

          For years the Android fanboy argument has been that the iPhone is too expensive and that Android offers them a way to get a high-end smartphone for a fraction of the price.

        • Andromeda Looks Like Android’s Ticket To The Big Screen

          Blending traditional and touch computer user input methods to create a satisfying experience and commercial success has proven elusive for the three big consumer operating system vendors. Apple, in fact, has mostly avoided the challenge by keeping the Mac and ther iPad distinct, with Tim Cook likening attempts to meld laptop and tablet interfaces to combining a refrigerator with a toaster.

          [...]

          If putting Android apps on Chrome OS has failed to excite, how about imbuing Android with elements of Chrome OS? That seems to be the idea behind Andromeda, a rumored forthcoming Google OS that would presumably aim to incorporate the best of both worlds. One model for how it may look and work comes from Remix OS, a tweaking of Android that debuted on a Surface-like device and has since become far more broadly available. It borrows desktop user interface elements from Windows even more aggressively than Chrome does.

          Five years ago, I wrote that Chrome OS was heading toward a niche—ultimately the education market—versus Android. Now, with Andromeda, the security and simplicity that makes Chrome OS great and the windowing user interface that makes it usable on laptops could become key ingredients in finally allowing Android to have an impact on larger-screen computing devices.

        • Best Android Camera

          Samsung introduced this camera setup in the Galaxy S7, and it’s just as fantastic today in the newer Galaxy Note 7. The 12MP resolution gives you plenty of pixels to work with, and the optical image stabilization (OIS) keeps everything clear whether you’re taking low-light shots or shooting video on the move.

          Just as important as the photo output is how quickly the camera operates. Two presses of the home button launch the camera in less than a second, and photos are taken instantaneously even when shooting in HDR or a tough lighting situation. The camera interface is simple but also powerful if you choose to move to the full Manual mode, which can enable great shots if you want to tweak and use a tripod.

        • Google’s new phones won’t solve Android’s fundamental problems

          It’s been a tougher question to answer recently, as Android phones have approached and in some cases beaten the iPhone in terms of design and capability.

          But there’s one major thing that keeps me recommending the iPhone over any Android phone: the iOS ecosystem.

          It’s the only platform with the best developer support and consistent updates with new features throughout the life of your device. Android can’t do that. In fact, many Android phones stop getting new updates and features after a year or so.

        • Best Rugged Android Phone

          It is truly a bummer that the Galaxy S7 Active is an AT&T exclusive because this is a smartphone worthy of all SIMs. Inside, it’s packed with the same stellar components as the rest of the Galaxy S7 family, including a Snapdragon 820 processor and 4GB of RAM. It also offers a massive 4000mAh battery, in addition to a rugged, dust-proof, and water-resistant enclosure. Its 5.1-inch Super AMOLED display is bright enough to see in the great outdoors and sits behind a shatter-resistant protective coating that can withstand the toughest of falls.

          Bottom line: The Galaxy S7 Active is what other consumer-oriented rugged smartphones should aim to be like.

        • ‘Android is not invincible’: What Google is risking by releasing its Pixel smartphone

          Android may be the dominant smartphone operating system (OS) but “it’s not invincible,” according to analysis firm IHS Markit, which argues that Google’s latest Pixel smartphone could risk antagonizing manufacturers reliant on the software.

          On Tuesday, Google – a subsidiary of Alphabet – held a hardware event in which it launched two smartphones – the Pixel and Pixel XL – a smart home hub called Google Home, a virtual reality (VR) headset, Wi-Fi routers and a new version of its Chromecast streaming device.

          The Pixel smartphone runs Google’s Android software and comes with Google Assistant – the technology giant’s digital personal assistant similar to Apple’s Siri, which is also present on its Home hub.

        • Google Play is reportedly streaming Android game demos
        • Google Patches Android for 78 Vulnerabilities in October Update
        • Shazam Lite for Android requires less storage and data
        • Samsung Galaxy S7 Android 7.0 Nougat Update Imminent? S7 Running Nougat Spotted On GFXBench

Free Software/Open Source

  • Open Source Pros Confident in Europe Job Market

    Open source careers may be even more in demand and rewarding in Europe than the rest of the world, according to new data from the 2016 Open Source Jobs Report released today by The Linux Foundation and Dice. European open source pros are more confident in the job market, get more incentives from employers, and more calls from recruiters than their counterparts worldwide, according to the data.

    The full report, released earlier this year, analyzed trends for open source careers and the motivations of professionals in the industry. Now, the data have been broken down to focus specifically on responses from more than 1,000 open source professionals in Europe, and how they compare to respondents from around the world.

  • How open source is enabling the digital art age

    This project was incredibly exciting to me because it demonstrated the freedom that digital art represents. Digital art allows traditional audio and visual methods to take on new forms by adding layers of data and interactivity. This means that your project can respond to events happening in its environment, or on the other side of the world. When a project begins acquiring hardware components like lighting or moving objects, the term digital art seems inadequate since the entire environment becomes the art piece.

    It is well-established that the open source movement has created an enormous amount of value for businesses and organizations. Often overlooked, however, is the amount of value that it has created for those looking to pursue creative ventures. The open source community has created a plethora of libraries and frameworks that reduce the barrier of entry for aspiring digital artists and musicians. Though there are many out there, I would like to focus on Processing and Arduino because they have most shaped my approach to both art and programming.

  • 4 open source alternatives for Google Calendar

    For many of us, our calendar is our lifeblood. Without it, we would be lost, perhaps both literally and figuratively.

    While some people can get away with a wall calendar or a paper day planner to organize their schedule, a whole lot of us have turned over the process of managing time allotments to a digital calendar. In truth, most of us are juggling quite a few calendars from both our work and personal lives, and often a few other organizations that we’re involved with, including anything from non-profits to tech meetups to social clubs.

  • Google releases open source ‘Cartographer’

    Machine learning and vision are essential technologies for the advancement of robotics. When sensors come together, they can enable a computer or robot to collect data and images in real-time.

    A good example of this technology in real-world use is the latest Roomba vacuums. As the robot cleans your dirty floor, it is using sensors combined with a camera to map your home. Today, Google releases Cartographer — an open source project that developers can use for many things, such as robots and self-driving cars.

  • Google open-sources Cartographer 3D mapping library

    Google today said that it’s open-sourced Cartographer, a library for mapping movement in space in both 2D and 3D. the technology works with the open source Robot Operating System (ROS), which makes the software easier to deploy in software systems for robots, self-driving cars, and drones.

    Cartographer is an implementation of simultaneous localization and mapping, better known by its acronym SLAM. But it’s not the only open source SLAM library; there are plenty others, like hector_slam. Proprietary alternatives are also available; for example, Apple recently acquired one company with SLAM software, Flyby Media. But this is Google we’re talking about — Google, the company with self-driving cars that have already driven more than 2 million miles without human control.

    “Our focus is on advancing and democratizing SLAM as a technology,” Googlers Damon Kohler, Wolfgang Hess, and Holger Rapp wrote in a blog post. “Currently, Cartographer is heavily focused on LIDAR SLAM. Through continued development and community contributions, we hope to add both support for more sensors and platforms as well as new features, such as lifelong mapping and localizing in a pre-existing map.”

  • Open Source As a Business

    It’s a script we’ve seen played out many times in the open source community. A great software idea becomes popular, and continues to be developed by a core group of people. Those people build a business around servicing the software. The business grows, and so does the company. In an effort to sustain growth, the company chooses to monetize their software.

    The business logic for this timeline is very clear, and from a certain point of view, hard to refute. Businesses exist to make money. Despite servicing a customer base that believes in the principles of open source, many companies choose – after a time – to abandon those principles to a larger or lesser degree for a traditional software business model.

  • FOSS Organizations, Judged on their Merits?

    The free and open source software community depends heavily upon the work of community-funded nonprofit organizations. These organizations develop software, organize community events, manage key infrastructure, and educate people about FOSS. They serve as key organizing points for the people and companies that develop and sustain FOSS.

    Historically, some of the most important FOSS nonprofits have been U.S. tax-exempt organizations—entities recognized by the U.S. Internal Revenue Service as exempt from federal income tax according to IRS regulations. But over the last few years, the community has witnessed changes in the IRS’s handling of applications for tax-exempt status from FOSS organizations. Most troubling, the IRS has denied applications from organizations whose missions and activities differ very little from existing (and exempt) FOSS nonprofits. The IRS’s actions raised concerns within the community about whether tax exempt status would be available to future FOSS organizations and what these changes might mean for the exempt organizations upon which the community already depends. The Open Source Initiative and the Software Freedom Conservancy formed a working group to explore these questions and gather more information about the issue.

    This post will cover what the working group has learned about how this issue developed, where things stand now, and what recent developments at the IRS mean for the future. In future posts, we’ll provide additional guidance to FOSS projects about organizational options, including when U.S. tax-exempt status is a viable option.

  • A guide to building trust in teams and organizations

    My travels globally have given me a feeling for how best to work in many different contexts—like Latin America, West Africa, North Africa, and Southeast Asia, to name a few. And I’ve found that I can more easily adapt my work style in these countries if I focus on something that plays a role in all of them: trust.

    In The Open Organization, Jim Whitehurst mentions that accountability and meritocracy are both central components of open organizations. Trust is linked to both of those concepts. But the truth, I’ve found, is that many people don’t have the information they need to determine whether they can trust a person or not. They need data, along with a system to evaluate that data and make decisions.

    I’ve found a way to measure trust, studied trust building, and developed a strategy for cultivating trust that’s worked for me over the years. I think it could work well in open organizations, where building trust is critical.

    Let me explain.

  • 5 Tips on Using OAuth 2.0 for Secure Authorization

    OAuth is an open standard in authorization that allows delegating access to remote resources without sharing the owner’s credentials. Instead of credentials, OAuth introduces tokens generated by the authorization server and accepted by the resource owner.

    In OAuth 1.0, each registered client was given a client secret and the token was provided in response to an authentication request signed by the client secret. That produced a secure implementation even in the case of communicating through an insecure channel, because the secret itself was only used to sign the request and was not passed across the network.

    OAuth 2.0 is a more straightforward protocol passing the client secret with every authentication request. Therefore, this protocol is not backward compatible with OAuth 1.0. Moreover, it is deemed less secure because it relies solely on the SSL/TLS layer. One of OAuth contributors, Eran Hammer, even said that OAuth 2.0 may become “the road to hell,” because:

    “… OAuth 2.0 at the hand of a developer with deep understanding of web security will likely result in a secure implementation. However, at the hands of most developers – as has been the experience from the past two years – 2.0 is likely to produce insecure implementations.”

    Despite this opinion, making a secure implementation of OAuth 2.0 is not that hard, because there are frameworks supporting it and best practices listed. SSL itself is a very reliable protocol that is impossible to compromise when proper certificate checks are thoroughly performed.

    Of course, if you are using OAuth 1.0, then continue to use it; there is no point in migrating to OAuth 2.0. But if you are developing a new mobile or an Angular web application (and often mobile and web applications come together, sharing the same server), then OAuth 2.0 will be a better choice. It already has some built-in support in the OWIN framework for .NET that can be easily extended to create different clients and use different security settings.

  • Tips for Evaluating a Company’s Open Source Culture

    There are four essential questions a company should ask before it decides to create an open source project, according to Duane O’Brien, open source programs evangelist at PayPal.

    Who cares?

    Are we still using it?

    Are we committing our own resources?

    Can we develop it all in the open?

    This framework, developed by O’Brien’s boss Danese Cooper, is useful in vetting internal software for release as open source projects.

  • Buggy code to the left of me, perfect source to the right, here I am, stuck in the middle with EU

    Midway through SUPERSEDE, the EU three-year project backed by €3.25m in funding to make software better, software still sucks.

    It’s always been thus, but now that computer code has a say in the driving of Teslas, confronts everyone daily on smartphones, and has crept into appliances, medical devices, and infrastructure, it’s a more visible problem.

    Robert Vamosi, security strategist at Synopsys, told The Register in a phone interview that software quality matters more than ever.

    “We’re seeing real-world examples of automobiles remotely attacked and medical devices being suspended when they need to keep functioning,” he said. “It’s becoming life-critical.”

    The organizations involved in SUPERSEDE – ATOS, Delta Informatica, SEnerCon, Siemens, Universitat Politècnica de Catalunya (UPC), the University of Applied Sciences and Arts Northwestern Switzerland (FHNW), and the University of Zurich (UZH) – aim to improve the user experience of their software products with a toolkit to provide better feedback and analytics data to application developers.

  • ETSI Releases Its Open Source MANO Software Stack

    ETSI’s Open Source MANO (OSM) group today announced Release ONE, the first code out of the NFV management and orchestration (MANO) project.

    ETSI touts that OSM can natively support VIMs from VMware and OpenStack and can also support various software-defined networking (SDN) controllers. It can also create a plug-in framework to improve platform maintenance and extensions.

  • The Evolution of Open Source Networking at AT&T

    For many years AT&T has been on the forefront of virtualizing a Tier 1 carrier network. They’ve done so in a very open fashion and are actively participating in, and driving, many open sources initiatives. Their open initiatives include Domain 2.0, ECOMP, and CORD, all of which are driving innovation in the global service provider market. Chris Rice, Sr. VP of Domain 2.0 Architecture and Design of AT&T, provided an overview of how AT&T got where they are today during his keynote address at the ODL Summit.

    Providing a bit of history of this journey, Rice noted that today’s implementations and visions started years ago. One of the first steps was the creation of what he called a router farm, which was initiated because of the end of life of a router and there wasn’t a new router that could just take its place. The goal was to remove the static relationship between the edge router and the customer. Once this was done, AT&T could provide better resiliency to their customers, detect failures, do planned maintenance, and schedule backups. They could also move configurations from one router to another vendor’s router. The result was faster and cheaper; however, “it just wasn’t as reusable as they wanted.” They learned the importance of separating services from the network and from the devices.

  • The legacy of Pieter Hintjens

    When I watched Chad Fowler’s GOTO Amsterdam 2014 Keynote it got me thinking about what our aims should be in life.

    He mentions Joel Spolsky’s post from 2001: Good Software Takes Ten Years. Get Used To It, and says software typically only lasts five years so rarely gets to be very good.

    He asks, what does it take create legacy software with a positive meaning, that is software so good that you are fondly remembered for it for many years to come.

    [...]

    Pieter was a man who knew all of this. His deep passion for optimal collaboration lead to the creation of C4: The Collective Code Construction Contract. Not only was he very talented technically, he also understood people and how to foster a strong community.

  • Events

    • FOSSCON

      This post is long past due, but I figured it is better late than never. At the start of the year, I set a goal to get more involved with attending and speaking at conferences. Through work, I was able to attend the Southern California Linux Expo (SCALE) in Pasadena, CA in January. I also got to give a talk at O’Relly’s Open Source Convention (OSCON) in Austin, TX in May. However, I really wanted to give a talk about my experience contributing in the Ubuntu community.

      José Antonio Rey encouraged me to submit the talk to FOSSCON. While I’ve been aware of FOSSCON for years thanks to my involvement with the freenode IRC network (which has had a reference to FOSSCON in the /motd for years), I had never actually attended it before. I also wasn’t quite sure how I would handle traveling from San Francisco, CA to Philadelphia, PA. Regardless, I decided to go ahead and apply.

      Fast forward a few weeks, and imagine my surprise when I woke up to an email saying that my talk proposal was accepted. People were actually interested in me and what I had to say. I immediately began researching flights. While they weren’t crazy expensive, they were still more money than I was comfortable spending. Luckily, José had a solution to this problem as well; he suggested applying for funding through the Ubuntu Community Donations fund. While I’ve been an Ubuntu Member for over 8 years, I’ve never used this resource before. However, I was happy when I received a very quick approval.

    • FOSS Wave: Bangalore at UVCE

      It was another lazy Saturday with a rare sight of empty Bangalore roads. This FOSS Wave event in Bangalore had been in planning for almost a month. Finally, here we were on September 10th, 2016 in front of the almost a century old structure of University Visvesvaraya College of Engineering.

      Five speakers reached the venue by 9:30am. We were to talk in two different sessions starting from 10:30am until 4:00pm on the following topics.

    • Fedora Join Meeting 26 September 2016 – Summary
    • systemd.conf 2016 is Over Now!

      A few days ago systemd.conf 2016 ended, our second conference of this kind. I personally enjoyed this conference a lot: the talks, the atmosphere, the audience, the organization, the location, they all were excellent!

      I’d like to take the opportunity to thanks everybody involved. In particular I’d like to thank Chris, Daniel, Sandra and Henrike for organizing the conference, your work was stellar!

      I’d also like to thank our sponsors, without which the conference couldn’t take place like this, of course. In particular I’d like to thank our gold sponsor, Red Hat, our organizing sponsor Kinvolk, as well as our silver sponsors CoreOS and Facebook. I’d also like to thank our bronze sponsors Collabora, OpenSUSE, Pantheon, Pengutronix, our supporting sponsor Codethink and last but not least our media sponsor Linux Magazin. Thank you all!

  • SaaS/Back End

    • Databricks Findings Show That Spark is Driving Cutting-Edge Innovation

      This summer, Databricks conducted a comprehensive Apache Spark Survey to identify insights on how organizations are using Spark and highlight growth trends since the company’s last Spark Survey in 2015. The 2016 survey results reflect answers from 900 distinct organizations and 1615 respondents, who were predominantly Apache Spark users, and the results are available now.

      The results show that the Spark community is still growing fast: the number of meetup members worldwide has tripled, and the number of contributors to the project has grown by 67% since last year. Moreover, Spark is driving cutting-edge innovation. Users arebuilding diverse apps, with significant growth in machine learning and streaming.

    • Transitioning from OpenStack Hobbyist to Professional

      To land your first OpenStack job, you’ll want to prove you have a functional understanding of OpenStack basics, can navigate the resources to solve problems, and have recognized competency in your focus area.
      Used with permission

      The hardest part of pivoting your career is proving that you are qualified in your new focus area. To land your first OpenStack job, you’ll want to prove you have a functional understanding of OpenStack basics, can navigate the resources to solve problems, and have recognized competency in your focus area.

      “A functional understanding of OpenStack” means you know how to work in OpenStack––not just naming the projects in alphabetical order or giving an overview of its history. While you’ll want to read up on its origins and future roadmap, you’ll also want to jump in by using tools like DevStack or TryStack to explore.

  • CMS

    • CMSpotlight: 5 CMS apps that deserve more attention

      Everybody knows about WordPress, Drupal and Joomla, although they are great and they are popular for a reason, there are quite a few other alternatives that you may have never heard of. Thousands of quality developers and designers work hard to create amazing masterpieces of applications. Most of them release their applications for free and they make them open source. The least we can do is spread the word so they can get the attention they well deserve. We’ve already listed a dozen CMS apps in our self-hosted alternatives post, but in this article, we’ll focus more on each CMS and its features. Here, 5 open source CMS apps will get the spotlight.

  • Education

    • Charlie Reisinger: FOSS in Education Proponent…and Practitioner

      “Charlie serves as the Technology Director for Penn Manor School District in Lancaster County Pennsylvania. A member of the senior leadership team, he directs instructional technology programs and technical infrastructure and operations. A passionate advocate and speaker on open source values in education, Charlie and his team implemented the largest classroom desktop Linux program in Pennsylvania.

      “Under his leadership, Penn Manor School District received the 2011 School of Excellence in Technology Award from the Pennsylvania School Boards Association (PSBA). In 2016, Penn Manor was recognized with the Districts of Distinction Award for the Open Source one-to-one Laptop Program.”

      The book’s title is The Open Schoolhouse: Building a Technology Program to Transform Learning and Empower Students. The Kindle version is only $4.99. I’ve read it. You should read it, too, if you’re a teacher, school administrator, student, parent, uncle or aunt or have friends or family with kids in school — or even if you’re a taxpayer someplace where they have public school or you’re connected in some way with a charter school or private school.

  • FSF/FSFE/GNU/SFLC

    • Classic Emacs editor gets a new-school makeover

      A new distribution of the Emacs editor, called Spacemacs, repackages the classic developer’s tool in a new skin for greater usefulness to a new generation of programmers.

      Emacs is one of the oldest text editors in existence. Its most popular variant (now 31 years old) is GNU Emacs, originally developed by Free Software Foundation president Richard Stallman. The editor’s enduring popularity comes from its extensibility and programmability courtesy of the built-in Emacs Lisp scripting language — and from the culture of tooling that’s sprung up as a result. Extensions for Emacs (and, thus, Spacemacs) provide everything from integration with GitHub to Slack chat windows.

  • Project Releases

    • FontForge release

      There’s a new release of FontForge available. “This release introduces a new icon set, new functionality for custom icon selection graphics, support for GlyphOrderAndAliasDB files, and support for Unicode 9.0.”

  • Public Services/Government

    • IBM, Microsoft, Oracle beware: Russia wants open source, sees you as security risk

      Russia is drafting a new law requiring Russian government agencies to give preference to open source and to block US software from computer systems, citing security concerns.

      Just weeks after Moscow committed to removing Microsoft Outlook and Exchange on 600,000 systems under orders from Russian president Vladimir Putin, the nation’s lower house, the State Duma, is drafting a bill to make it harder for agencies even to buy Russian software products that are based on foreign-made proprietary middleware and programming frameworks.

      The bill marks Russia’s latest attempt at substituting imported software with local products, but casts a wider net than existing restrictions on IT procurement by agencies and state-run enterprises.

    • Russia Weighs Replacing IBM, Microsoft With Open-Source Software

      Russia is taking another step to reduce dependence on Oracle Corp., Microsoft Corp. and International Business Machines Corp. technologies in the country’s $3 billion software market amid political tensions with the U.S.

      The State Duma, Russia’s lower house of parliament, is drafting a bill to restrict government agencies from buying licensed software, giving preference to open-source software. This would complement legislation that curbed state purchases of foreign programs last year, restricting the choice to about 2,000 local software makers.

      “Many local software firms are offering products based on foreign frameworks such as IBM’s WebSphere or Microsoft’s ASP.net,” said Andrey Chernogorov, executive secretary of the Duma’s commission on strategic information systems. “We are seeking to close this loophole for state purchases as it causes security risks.”

      The end of IBM’s partnership with Russian vendor Lanit last year created a potential vulnerability for the government’s website zakupki.gov.ru, which is based on a proprietary IBM platform, according to an explanatory note to the draft law. Additionally, license fees that Russian software makers pay foreign partners inflate their products’ cost of use.

      Some Russian regional administrations already started switching from Oracle to free database software adapted for their needs by local programmers, according to Duma documents.

    • Public review of German municipal eGovernment manual

      Germany’s Federal Ministry of the Interior is organising a three-month, online public review of a new manual for municipal eGovernment services. From 22 September until 30 November, a website will allow readers to comment on the document.

  • Openness/Sharing/Collaboration

    • Open Data

      • Udacity open sources an additional 183GB of driving data

        On stage at TechCrunch Disrupt last month, Udacity founder Sebastian Thrun announced that the online education company would be building its own autonomous car as part of its self-driving car nanodegree program. To get there, Udacity has created a series of challenges to leverage the power of community to build the safest car possible — meaning anyone and everyone is welcome to become a part of the open-sourced project. Challenge one was all about building a 3D model for a camera mount, but challenge two has brought deep learning into the mix.

        In the latest challenge, participants have been tasked with using driving data to predict steering angles. Initially, Udacity released 40GB of data to help at-home tinkerers build competitive models without access to the type of driving data that Tesla of Google would have. However, because deep learning models drink data by the pond rather than the gallon, the company pushed out an additional 183GB of driving data.

Leftovers

  • Health/Nutrition

    • Mike Pence’s Defining Moment As Governor? Enabling An HIV Outbreak

      With the exception of a brief detour into Indiana Gov. Mike Pence’s (R) anti-abortion beliefs during the vice presidential debate on Oct. 4, the night centered around foreign policy, not public health.

      It’s a shame, since lackluster public health efforts are what led to the defining moment of Pence’s one-term Indiana governorship: a massive HIV outbreak spurred by public health funding cuts and Pence’s moralistic stance against needle exchanges.

      A timeline of the HIV outbreak, the worst in state history, reads like a roadmap of what to do if you want to create a public health crisis.

    • Poland abortion: Parliament rejects abortion ban after women stage all-out strike

      Polish lawmakers have voted overwhelmingly to reject draft legislation that would introduce a near-total ban on abortion following mass protests in over 60 cities across the country.

      Some 100,000 women dressed in black staged nationwide demonstrations in Poland on Monday against plans to tighten the country’s already restrictive abortion rules, including banning the procedure even in cases of rape, with prison terms for women ending a pregnancy.

      The hastily arranged vote presents the first major domestic setback for the ruling conservatives, of which many members initially backed the proposal.

    • Water Wars: Two Indian States Are Fighting for This River’s Water

      As the world gets hotter, we’ve been warned that the next wars will be over water. In India, that future is here, and the latest proof is a battle between two neighboring states fighting over the river that runs through them.

      In the latest chapter of a century-old water war in southern India, riots rocked Bangalore, the techie capital city of Karnataka state, in September. Buses were set ablaze, and a man was killed by police trying to control the crowds. Protestors opposed a Supreme Court order for the state to release about 120,000 cusecs, or cubic feet per second of water, from the Cauvery river to Tamil Nadu, the state downstream, over 10 days.

    • Amid water crisis, Flint faces a Shigellosis outbreak

      Flint, Michigan, is dealing with another outbreak. This time it’s an infectious bacterial disease called Shigellosis, which can cause bloody diarrhea and fever and typically spreads when people don’t wash their hands.
      That’s exactly what’s happening in Flint, the county health director told CNN.

      A water crisis has plagued residents there for more than two years. Last year, people experienced rashes and hair loss when high levels of lead were found in the local water supply. In 2014, the area faced one of the worst outbreaks of Legionnaires’ disease in US history.
      Still afraid and mistrustful of the water, people in Flint — who are still forced to use either filtered or bottled water because of damaged water pipes — are bathing less, and refusing to wash their hands.

    • GOP seeks to block ObamaCare settlements with insurers

      Republicans in Congress are plotting ways to block the Obama administration from paying insurance companies hundreds of millions of dollars as part of an ObamaCare program.

      GOP lawmakers say they are looking at “a dozen” options — including a possible provision in the year-end spending bill — to prevent the administration from using an obscure fund within the Treasury Department to pay out massive settlements to insurers.

      The insurance companies are suing over a shortfall in an ObamaCare program that they say is damaging their businesses.

      Settling the cases could help insurers deal with losses on the ObamaCare marketplaces, but Republicans argue the move would be a “bailout” that would circumvent the will of Congress.

  • Security

    • Security advisories for Wednesday
    • 10 basic linux security measures everyone should be doing

      Akin to locking your doors and closing your windows there’s some really basic things everyone should be doing with their Linux installs (This is of course written from a Fedora viewpoint, but I think this pretty much applies to all computer OSes).

    • EFF Asks Court to Block U.S. From Prosecuting Security Researcher For Detecting and Publishing Computer Vulnerabilities

      The Electronic Frontier Foundation (EFF) asked a court Thursday for an order that would prevent the government from prosecuting its client, security researcher Matthew Green, for publishing a book about making computer systems more secure.

      Green is writing a book about methods of security research to recognize vulnerabilities in computer systems. This important work helps keep everyone safer by finding weaknesses in computer code running devices critical to our lives—electronic devices, cars, medical record systems, credit card processing, and ATM transactions. Green’s aim is to publish research that can be used to build more secure software.

    • Malta unveils Cyber Security Strategy

      The government of Malta has unveiled a National Cyber Security Strategy. The strategy provides the legal context to defend the country’s computer networks infrastructure and its users from threats.

    • Mirai “internet of things” malware from Krebs DDoS attack goes open source

      Last week, we wrote about a DDoS attack on well-known investigative cybercrime journalist Brian Krebs.

      To explain.

      A DDoS attack is an aggressive sort of DoS attack, where DoS is short for denial of service.

      A DoS is a bit like getting into the queue at the station to buy a ticket for the next train, only to have a time-waster squeeze in front of you and slow you down.

      By the time the miscreant has asked, innocently enough, about the different sorts of ticket available, and whether it costs extra to take a bicycle, and how much longer it would take if he were to change trains in Manchester, only to walk off without buying a ticket at all…

      …you’ve watched your train arrive, load up with passengers, and depart without you.

      A DDoS attack is worse: it’s short for distributed denial of service attack, and it’s much the same thing as a DoS, except that the trouble-stirrer doesn’t show up on his own.

    • Johnson & Johnson Warns Insulin Pump Owners They Could Be Killed By Hackers

      Initially the lack of security on “smart” Internet of Things devices was kind of funny as companies rushed to make a buck and put device security on the back burner. And while hackable tea kettles and refrigerators that leak your Gmail credentials just seem kind of stupid on the surface, people are slowly realizing that at scale — we’re introducing millions of new attack vectors into homes and businesses annually. Worse, compromised devices are now being used as part of massive new DDoS attacks like the one we recently saw launched against Brian Krebs.

      Unfortunately, companies that service the medical industry also decided a few years ago that it would be a good idea to connect every-damn-thing to networks without first understanding the security ramifications of the decision. As a result, we’re seeing a rise in not only the number of ransomware attacks launched on hospitals, but a spike in hackable devices like pacemakers that could mean life and death for some customers.

    • J&J warns diabetic patients: Insulin pump vulnerable to hacking

      Johnson & Johnson is telling patients that it has learned of a security vulnerability in one of its insulin pumps that a hacker could exploit to overdose diabetic patients with insulin, though it describes the risk as low.

      Medical device experts said they believe it was the first time a manufacturer had issued such a warning to patients about a cyber vulnerability, a hot topic in the industry following revelations last month about possible bugs in pacemakers and defibrillators.

      J&J executives told Reuters they knew of no examples of attempted hacking attacks on the device, the J&J Animas OneTouch Ping insulin pump. The company is nonetheless warning customers and providing advice on how to fix the problem.

    • Who Makes the IoT Things Under Attack?

      As KrebsOnSecurity observed over the weekend, the source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released. Here’s a look at which devices are being targeted by this malware.

      The malware, dubbed “Mirai,” spreads to vulnerable devices by continuously scanning the Internet for IoT systems protected by factory default usernames and passwords. Many readers have asked for more information about which devices and hardware makers were being targeted. As it happens, this is fairly easy to tell just from looking at the list of usernames and passwords included in the Mirai source code.

  • Transparency/Investigative Reporting

    • Is WikiLeaks still relevant?

      It was once celebrated as a champion of transparency. But now 10 years old, WikiLeaks has lost a lot of friends.

      The whistle-blowing website serves as the world’s best known source for leaked government and intelligence information.

      It has exposed corruption and misuse of power in many countries, including the United States.

      But WikiLeaks founder Julian Assange has become increasingly controversial over the past decade.

      Critics say his site is manipulated by politicians, and the way it releases classified documents is irresponsible.

      Assange has been hiding in the Ecuadorian Embassy in London to avoid possible extradition to Sweden, where he faces questions over allegations of sexual assault.

    • What Really Happens When You FOIA UK Police

      British authorities have a reputation for keeping incredibly tight-lipped about surveillance, especially when asked to release even basic details of programs or technologies under the Freedom of Information Act.

      But a lot more goes on behind the scenes of requests around surveillance topics than one might realise. By requesting the processing notes and communications for FOIA requests, it’s possible to gain insight into what really happens when someone asks for information on a controversial subject, and how, in some cases, police forces develop a national strategy to ensure that no information seeps out.

      For example, Motherboard has been using the FOIA to dig up details of UK law enforcement’s use of “equipment interference”, the government’s term for hacking. While managing to get some information out of agencies, such as how a few of them will share hacking technologies, many of the requests have been stonewalled.

  • Environment/Energy/Wildlife/Nature

    • ‘Great Pacific garbage patch’ far bigger than imagined, aerial survey shows

      The vast patch of garbage floating in the Pacific Ocean is far worse than previously thought, with an aerial survey finding a much larger mass of fishing nets, plastic containers and other discarded items than imagined.

      A reconnaissance flight taken in a modified C-130 Hercules aircraft found a vast clump of mainly plastic waste at the northern edge of what is known as the “great Pacific garbage patch”, located between Hawaii and California.

      The density of rubbish was several times higher than the Ocean Cleanup, a foundation part-funded by the Dutch government to rid the oceans of plastics, expected to find even at the heart of the patch, where most of the waste is concentrated.

      “Normally when you do an aerial survey of dolphins or whales, you make a sighting and record it,” said Boyan Slat, the founder of the Ocean Cleanup.

      “That was the plan for this survey. But then we opened the door and we saw the debris everywhere. Every half second you see something. So we had to take snapshots – it was impossible to record everything. It was bizarre to see that much garbage in what should be pristine ocean.”

    • Indonesia’s peat fires add to global warming

      The really scary thing about climate change is not simply that humans may fail to get their emissions under control. It is that, at some point, the Earth could take over and start adding even more emissions on its own.

      A new study underscores this risk by looking closely at Indonesia, which has a unique quality – some 70 billion tonnes of carbon that have built up in peatlands over millennia. In this, Indonesia is much like the Arctic, where even larger quantities of ancient carbon are stored in permafrost, and is also vulnerable.

      In each case, if that carbon gets out of the land and into the atmosphere, then global warming will get worse. But global warming could itself raise the odds of such massive carbon release. That is a dangerous position to be in as the world continues to warm.

    • Enjoy Earth While It Lasts: Atmospheric Carbon Levels Pass the Point of No Return

      The bad news: Earth’s climate change problem just passed a point of no return. Atmospheric carbon levels have passed 400 parts per million, and they won’t return to more environment-friendly levels “ever again for the indefinite future.”

    • Disappearing Yosemite glacier becomes symbol of climate change

      When naturalist John Muir explored Lyell Glacier in Yosemite National Park about 150 years ago, the river of ice stretched as far as 10 football fields between the peaks of the Lyell Canyon, a glacier one might expect to see in Alaska, not California.

      Today, it’s a sliver of the natural feature Muir called a “living glacier.” Over the last 130 years, the glacier has lost 78 percent of its surface, shrunk from about a half square mile to 66 acres.

      Stand on the glacier and it’s hard to hear anything except the sound of melting water rushing underneath. A big patch of bedrock is exposed in its middle.

      In its dying state, Lyell Glacier has become a vivid example of the effects of climate change and a touchstone for National Park Service officials increasingly concerned about global warming.

      In a speech about climate change at Yosemite this summer, President Barack Obama highlighted Lyell Glacier as a warning for the future.

    • Hurricane Matthew is about to slam Donald Trump’s most prized real estate

      Mar-a-Lago, the country club in West Palm Beach that is one of Donald Trump’s marquee pieces of real estate, is at risk of sustaining damage due to Hurricane Matthew.

      The storm will soon bear down on the east coast of Florida, with the National Hurricane Center issuing a serious warning about Matthew’s potential impact. The warning indicates the “potential for devastating damage across coastal Palm Beach County,” which is where Mar-a-Lago sits.

      In addition to seeing hurricane force winds of greater than 74 miles per hour, West Palm Beach, which is along the state’s east coast, where Mar-a-Lago sits, could receive more than three feet of standing water from the hurricane’s storm surge, according to a projection from the National Hurricane Center.

      The experimental storm surge inundation map below shows West Palm Beach with an arrow to the rough location of Mar-a-Lago.The inundation levels refer to a reasonable worst-case scenario for the flooding of normally dry land. There is about a 1-in-10 chance that storm surge flooding at any particular location, including the area where Mar-a-Lago is, could be higher than the values shown on the map.

  • Finance

    • Big Business Declares TPP the Winner in Vice Presidential Debate

      The U.S. Chamber of Commerce has already picked the winner in Tuesday night’s vice presidential debate between Sen. Tim Kaine, D-Va., and Gov. Mike Pence, R-Ind.

      It’s free trade! (Or, more accurately, corporate-friendly trade agreements.)

      Previewing the debate Tuesday morning, the Chamber tweeted merrily that both candidates have a “great track record on trade.”

      Their running mates are both on the record opposing the hugely controversial Trans-Pacific Partnership Agreement, but as the Chamber notes so happily, Kaine and Pence both have a long history of siding with big business. Both have praised the TPP and backed similar deals in the past.

      The Chamber, a trade group that represents some of the largest corporate entities in the world, from Goldman Sachs to Dow Chemical, has spent over $1.2 billion just on lobbying since 1998, making it by far the largest influence peddler in Washington, D.C.

    • Latest eGov Benchmark decries lack of decisiveness

      Europe’s governments lack decisiveness in digitising their public services and organisations, conclude the authors of the “eGovernment Benchmark 2016”, which was made public by the European Commission on 3 October. Progress in eGovernment is incremental, the study shows. The authors urge “an acceleration in order to keep up with private sector, and citizen’s expectations”.

    • Exclusive: WikiLeaks Guccifer 2.0 Teaser Exposes Pay-to-Play and Financial Data

      Hours after WikiLeaks held an early morning press conference commemorating their 10th anniversary, hacker Guccifer 2.0 released a trove of documents he claimed were from the Clinton Foundation. WikiLeaks tweeted the 800+MB of files hacked by Guccifer 2.0 shortly after. The documents include several Democratic National Committee (DNC), Democratic Congressional Campaign Committee (DCCC), and Virginia Democratic Party documents, though Guccifer 2.0 said he obtained them in a hack from the Clinton Foundation.

      The Clinton Foundation has denied this. Alleged communication files were leaked from the Clinton Foundation to the Observer upon request through Guccifer 2.0’s Twitter account, but the Clinton Foundation has not yet responded to a request for a statement on those specific documents.

    • NY Times Reporter Tells the Story Behind the Story of the Trump Tax Leak

      Donald Trump is the first major party presidential candidate in 40 years not to release his tax returns. However, the New York Times has obtained three pages of Trump’s 1995 income tax returns, which it revealed in a controversial investigative report published Saturday.

      “Donald Trump Tax Records Show He Could Have Avoided Taxes for Nearly Two Decades, The Times Found,” read the headline on the front page of Sunday’s New York Times.

  • AstroTurf/Lobbying/Politics

    • Jill Stein Is The Only Presidential Candidate Embracing the Term Latinx This Election

      On September 29, Green Party nominee Jill Stein’s campaign sent out an email with the title, “Join our Latinx movement!”, marking the first official appearance of the term “Latinx” in the 2016 election. The term, which arose from the desire to find a non-binary, gender inclusive word to refer to our community, has been gaining traction since it first came into use online in October of 2014. Today, it’s increasingly common to see “Latinx” used in media headlines (including some of our own), academic texts and activist literature – but the word has not arrived on the scene without its fair share of controversy and resistance. In 2016 much ink has been spilled making cases for or against the term – and in the comments of Remezcla posts we frequently see our usage of the term hotly debated.

    • Playboy Editor Claims Trump Forced Maples to Pose: ‘He Wanted Her to Do the Nude Layout; She Didn’t’

      Republican presidential candidate Donald Trump and his campaign have spent the week slut-shaming former Miss Universe Alicia Machado, saying she posed in Playboy and that there was a sex tape depicting her in it (there is not). An old New York Daily News article has surfaced that tells a story of Trump pressuring his future wife, against her will, to pose for Playboy magazine. Trump personally negotiated the fee, according to the report.

      The article, tweeted by historian Jeff Nichols, outlines how Trump insisted that Maples do the centerfold and negotiated a million-dollar check to compensate her.

    • Trump Joins Clinton In Pushing For Cyberwar

      We’ve noted a few times in the past our serious concerns about Hillary Clinton’s hawkish and tone deaf views on cybersecurity, in which she wants the US to go on the offensive on cyberattacking, even being willing to respond to attacks with real world military responses. She seems to ignore the fact that the US has a history of being some of the most aggressive players on offense on such things (Stuxnet, anyone?), and doesn’t seem to recognize how escalating such situations may not end well at all.

      Of course, her opponent, Donald Trump has been totally incomprehensible on cybersecurity during the course of his campaign. There was his first attempt to respond to questions about cybersecurity in which it’s not clear he understood the question, and started talking about nuclear weapons instead. Or the time he took a question on cybersecurity and answered by talking about the latest CNN poll. Or, of course, who can forget his debate performance on the topic, where his key insights were that his 10 year old was good with computers and a 400 lb. hacker may be responsible for the DNC hacks.

      It appears that the Trump campaign finally decided that maybe Trump should say something marginally coherent on the subject, and sent him out earlier this week with a prepared teleprompter speech, which Trump actually managed to get through without going too far off script. And… it’s basically the same kind of bullshit as Clinton — pushing for more aggressive and offensive cyberattacks.

    • Expanding the Debate: Green Ajamu Baraka “Debates” Pence & Kaine in Democracy Now!

      Vice-presidential candidates Republican Mike Pence and Democrat Tim Kaine faced off in Longwood University in Farmville, Virginia, Tuesday night in their first and only debate before next month’s election. Third-party vice-presidential candidates, including Libertarian William Weld and the Green Party’s Ajamu Baraka, were excluded from the debate stage under stringent rules set by the Commission on Presidential Debates, which is controlled by the Democratic and Republican parties. On Tuesday night, Democracy Now! aired a special “Expanding the Debate” broadcast, where we gave major third-party candidates a chance to respond to the same questions in real time as the major candidates. The Green Party’s Ajamu Baraka joined us live from Richmond, Virginia. Baraka is a longtime human rights activist and the founding executive director of the U.S. Human Rights Network and coordinator of the U.S.-based Black Left Unity Network’s Committee on International Affairs.

    • ‘Deplorable’: Donald Trump’s long war with veterans.

      Donald Trump Monday turned his destructive mouth on a group he ostensibly supports, displaying his trademark lack of sense and compassion when talking about the unseen wounds that too many vets carry home with them from war.

      “When you talk about the mental health problems, when people come back from war and combat and they see things that maybe a lot of folks in this room have seen many times over and you’re strong and you can handle it, but a lot of people can’t handle it,” he said during a question-and-answer session sponsored by the conservative Retired American Warriors PAC, referring to veterans who commit suicide.

      Most appallingly, this was probably Trump’s idea of tact and/or empathy for those who have seen combat. But contra his faux tough guy image and what he seemed to be suggesting, PTSD isn’t a symptom of weakness; it’s an at times debilitating wound of war. “To effectively argue that veterans with PTSD are somehow weak is both wrong and insulting.” Steve Benen wrote Monday. “The fact that Trump, even now, still doesn’t understand the basics of this issue is extraordinary.”

    • Jill Stein Polls: National Polling Is Likely Significantly Underestimating Support For The Green Party Candidate

      Jill Stein could soon be making a big jump in the polls, with the race between Donald Trump and Hillary Clinton starting to turn into a blowout and polls likely underestimating the growing support for the Green Party.

      Stein, running to the left of Hillary Clinton, has been lingering around the 2 percent mark in most of the national polls to come out in recent weeks. While it would take something of a miracle for Stein to win a state — or even grab double-digit support — the Green Party’s goal may be the 5 percent threshold that would guarantee matching federal funding for the next election cycle. And that could be well within reach.

      Although Stein appears to be only about halfway there in the polling, there are a number of signs that the current polling is underestimating the support for the Green Party this election cycle.

    • Amazon bans incentivized reviews tied to free or discounted products

      Amazon is making a significant change to its Community Guidelines, announced today, which will eliminate any incentivized reviews, except for those that emerge from within its own Amazon Vine program. This program allows Amazon – not the seller or vendor – to identify trusted reviewers, and has a number of controls in place in order to keep bias out of the review process.

      Amazon has historically prohibited compensation for reviews – even going so far as to sue those businesses who pay for fake reviews, as well as the individuals who write them, in an effort to make its review and rating system fairer and more helpful to online shoppers. However, it has allowed businesses to offer products to customers in exchange for their “honest” review.

      The only condition was that those reviewers would have to disclose their affiliation with the business in question in the text of their review. Reviewers were generally offered the product for free or at a discounted price, in exchange for their review.

      Although, in theory, these reviewers could write their true opinion on the product – positive or negative – these incentivized reviews have tended to be overwhelmingly biased in favor of the product being rated.

    • Iceland’s Pirates head for power on wave of public anger

      A party that hangs a skull-and-crossbones flag at its HQ, and promises to clean up corruption, grant asylum to Edward Snowden and accept the bitcoin virtual currency, could be on course to form the next Icelandic government.

      The Pirate Party has found a formula that has eluded many anti-establishment groups across Europe. It has tempered polarising policies like looser copyright enforcement rules and drug decriminalisation with pledges of economic stability that have won confidence among voters.

      This has allowed it to ride a wave of public anger at perceived corruption among the political elite – the biggest election issue in a country where a 2008 banking collapse hit thousands of savers and government figures have been mired in an offshore tax furore following the Panama Papers leaks.

      If the Pirates emerge as the biggest party in an Oct. 29 parliamentary election – as opinion polls suggest – they will deliver another defeat to Europe’s mainstream politicians.

    • Hacking an election is about influence and disruption, not voting machines

      Every time there’s an election, the topic of hacking one comes to the surface. During a presidential election, that conversation gets louder. Yet, even the elections held every two years see some sort of vote hacking coverage. But can you really hack an election? Maybe, but that depends on your goals.

      The topic of election hacking is different this year, and that’s because someone is actually hacking political targets. Adding fuel to the fire, on Aug. 12, 2016, during an event in Pennsylvania, Donald Trump warned the crowd that if he loses the battleground state, it’s because the vote was rigged.

      “The only way we can lose, in my opinion — and I really mean this, Pennsylvania — is if cheating goes on,” Trump said. This was no random remark either, Pennsylvania voting has been called in to question before. Such was the case when Republican supporters claimed Mitt Romney lost the state in 2008 due to fraud.

      When it comes to hacking elections, most people imagine voting machines compromised in such a way that a vote for candidate ‘A’ actually counts as a vote for candidate ‘B’ – or the votes just disappear.

    • If the election is hacked, we may never know

      The upcoming U.S. presidential election can be rigged and sabotaged, and we might never even know it happened.

      This Election Day voters in 10 states, or parts of them, will use touch-screen voting machines with rewritable flash memory and no paper backup of an individual’s vote; some will have rewritable flash memory. If malware is inserted into these machines that’s smart enough to rewrite itself, votes can be erased or assigned to another candidate with little possibility of figuring out the actual vote.

      In precincts where vote tallies raise suspicions, computer scientists will be called in the day after the election to conduct forensics. But even if a hack is suspected, or proven, it would likely be impossible to do anything about it.

    • The Clinton Foundation’s Legacy in Haiti – “Haitians are more than upset…”

      The Miami Herald has a video of Haitian activists protesting the Democratic National Convention, primarily because of the “Clinton Foundation’s spending in Haiti after the 2010 earthquake.” According to The Nation in a piece titled The Shelters That Clinton Built, the Clinton Foundation provided Haiti with trailers “structurally unsafe and laced with formaldehyde” that “came from the same company being sued for sickening Hurricane Katrina victims.” Pertaining to the Clinton Foundation’s legacy in Haiti, The New York Times writes “the Clintons have become prime targets of blame for the country’s woes.”

      As a result of the Clinton Foundation’s controversial involvement with Haiti, The Huffington Post reports that Florida’s Haitian-American community might have a profound impact on Election Day. Ryan Grim explains the influence of Florida’s Haitian-American community in a piece titled With All Eyes On Haiti, Its Diaspora In Florida Could Swing A Close Election. With a sudden shift in U.S. immigration policy dividing Haitian families, alongside the Clinton Foundation’s role in Haiti, Florida’s Haitian community’s discontent might impact other ethnic groups on Election Day.

      It’s this backdrop that motivated me to interview Harvard-trained investor and financial analyst Charles Ortel. Dady Cherry of Haiti Liberte’ refers to Ortel as “one of the world’s finest financial analysts” and Mr. Ortel has spent over one year investigating the financial peculiarities of the Clinton Foundation. He’s also researched extensively on the Foundation’s involvement with Haiti and other countries around the globe.

  • Censorship/Free Speech

    • EFF Exposing The Back-Room Deals That Allow Corporations And Governments To Control The Web

      The EFF is publishing a series looking at the multitude of ways gatekeepers and governments can make content disappear from the web — using everything from legislation they helped craft to applying pressure to multiple points between the content they want removed and the person who put it there.

      But not every tool used to remove content comes in a form that can be contested by the general public. Some of these tools are the result of private agreements with private entities — agreements in which users have no say. The EFF calls it “Shadow Regulation.”

    • Shadow Regulation: the Back-Room Threat to Digital Rights
    • Singapore jails teenager YouTube blogger for ‘insulting Christians and Muslims’ with videos

      A teenage boy has been jailed in Singapore for “wounding the feelings of Muslims and Christians” in a series of YouTube videos, sparking condemnation from the United Nations.

      It is the second time 17-year-old Amos Yee has been imprisoned over his blogs, being sentenced to four weeks in jail last year over footage where he compared revered former Prime Minister Lee Kuan Yew to Hitler and Jesus.

      He has been jailed for six weeks and fined $2,000 (£1,150) on six charges of intending to wound the feelings of Muslims and/or Christians and two of failing to attend a police station, the Straits Times reported.

    • Indonesia wants to criminalize memes

      If Trump’s job was to punish every internet user who ridiculed him with a meme, he’d sure have a lot of work to do. Luckily, U.S. netizens have enough freedom of speech to laugh at him as often as Harambe memes appear on Twitter.

      Yet making the use of memes illegal is not out of this world. Indonesia’s government is looking to criminalize internet users for posting them.

      Its Electronic Information and Transactions Law (ITE) punishes any electronic media communication that incites fear or embarrassment under its defamation article. The public has continuously called for the article’s removal, but instead Indonesia is introducing more restrictions to freedom of expression. Posting memes, texts, pictures, or videos would be punishable if found to have a defamatory or slanderous tone.

      According to the Indonesian government, this provision stands to prevent and control cyberbullying. But it can further be used as a political tool against opposition during elections.

    • Indonesia Government Introduces Vague Law Making Offensive/Embarrassing Memes Illegal

      Confession time: I think memes generally suck. Yes, yes, I know you love them, but when I think of memes, I tend to think of political memes on Facebook that I then have to drop Snopes.com links into the comments on, stupid copyright trolling over them, and that time Axl Rose tried to DMCA a meme so that nobody would see that he dipped into the chocolate fudge too much recently.

      Which is why I’m going to move to Indonesia, where the government has decided it’s time to put a strict control policy on any memes it finds offensive, embarrassing or that incite fear.

    • Jack Dorsey Is Losing Control of Twitter

      A few days before Twitter’s Sept. 8 board meeting, as the company’s finance team readied a presentation, it received conflicting directions on a crucial question. Should their slides reflect Twitter’s prospects as an independent company or delve into the benefits of getting acquired?

      Jack Dorsey, Twitter’s chief executive officer, argued that the 10-year-old company should remain on its current course and work to capitalize on recent product improvements and success in streaming live video, people familiar with the discussions said. Ev Williams, a former CEO who has a history of clashing with Dorsey, was in favor of exploring a sale. Other directors agreed they had a fiduciary duty to consider that option. The board ultimately decided to consider takeover prospects after getting an expression of interest from a potential acquirer, which led it to hire Goldman Sachs and Allen & Co. to evaluate possible bids.

    • Kerry Dougherty: Censorship backfires in Neptune Festival sand sculpture competition

      They never learn.

      When those in power try to silence the little guys, it often backfires. And when heavy-handed actions to stomp out tiny voices of dissent are exposed, the resulting tsunami of publicity often helps the group that was targeted.

      Case in point: Last weekend’s sand sculpture caper.

      A coalition of grassroots groups, opposed to light rail but unable to afford expensive radio and TV spots, entered the freelance division of the Neptune Festival sand sculpture competition. For a $15 entry fee, they created a modest little mound of sand with a simple message: “Please vote no light rail.”

    • How countries like China and Russia are able to control the internet

      In January 2011, protests broke out across Egypt to demand an end to the despotic and repressive regime of Hosni Mubarak. The protests were largely organized online, through social networks like Twitter and Facebook. Mubarak quickly realized this, and launched a counterattack: He severed all access to the internet from within Egypt.

    • Dam Busters screenwriter fell foul of Hollywood’s Nazi
    • British screenwriter was caught up in a censorship battle with Nazis

      A new book has revealed that the British Dam Busters screenwriter was caught up in a censorship battle with ‘Hitler’s Hollywood consul’ over the ‘negative’ portrayal of Germany after World War I.

      The book on RC Sherriff’s life suggests that Nazi agent Georg Gyssling managed to persuade Universal Pictures to halt The Road Back, All Quiet on the Western Front and Three Comrades in the 1930s.

      Roland Wales, who has written From Journey’s End to the Dam Busters: The Life of RC Sherriff, Playwright of the Trenches, said the studios bowed down to Gyssling’s demands in fear of losing revenue from German box offices.

      He said: ‘The Germans had a Consul in LA, a man called George Gyssling, part of whose job it was to keep up to date with the studio’s plans, and to encourage them to amend their films’

    • Art, Censorship and Race in Small-Town Idaho

      A home across the street from the school, where a Confederate flag regularly flies, became the center of the counterprotest movement with people running up and down the street waving Confederate flags, shouting “All Lives Matter” and “White Power.” In one instance, counterprotesters offered the students fried chicken and watermelon, saying, “Not that fried chicken and watermelon is racist or anything.”

      In the quiet of this past Sunday morning [Sept. 25], with nobody to witness but God and the approving eyes across the street, school officials painted all the parking spaces black, including Tamia’s. I wonder who painted the spaces and how they felt. Tamia was not informed.

    • A Call for Difficult Conversations, Not Censorship

      Re “Will the Left Survive Millennials?,” by Lionel Shriver (Op-Ed, Sept. 23):

      My initial response to Ms. Shriver’s keynote address at the Brisbane Writers Festival last month — walking out and writing about why — seemed to be largely misunderstood. Many took the reaction to be a call for censorship and responded with fury. They took as a given the right to say and write what they want, without critique, consequence or interrogation of intent.

      The debate is not about censorship: People can write in the voices they please. The real question is whether they should. It is about the structures that define the world in which we live and work.

      Fiction does not exist in a vacuum: It becomes people’s realities, because so often the only exposure we have to those with very different lived experiences to our own is through stories. But this discussion is larger than the world of fiction.

      Ms. Shriver claimed that those who now fight for equality have become the oppressor. Her words betrayed a disappointment that the times are changing, and lamented that people are so terrified of being caught saying the wrong thing that they instead choose not to say anything at all.

    • Here Are the Racist Code Words Trump’s Twitter Fans Are Now Using to Avoid Getting Banned
    • Racist Users Use Secret Codes on Twitter to Avoid Censorship
    • Ben Affleck Called Out for Censorship During ‘Accountant’ Press Junket
    • How Media Censorship Is Bringing Journalists Out On The Streets Of Kashmir
    • Even in difficult times, primary duty is to report: Mir Hilal, editor of banned daily Kashmir Reader
    • Banning Kashmir Reader
    • #Day90: Veteran Journalist Joins Protest Against ‘Kashmir Reader’ Ban, Recounts Experiences
    • Shutting down the messenger
    • Journalists hold sit-in outside Civil Secretariat
    • Government Bans Kashmir Newspaper, Fearing Anti-India Violence
    • #Day89: Ban on ‘Kashmir Reader’, Journalists Take Protest March To Secretariat
    • To Beat YouTube Censorship, Well-Known YouTuber Experiments With WebTorrent
  • Privacy/Surveillance

    • Other people’s computers

      The Internet of Things (IoT), which are devices connected to the internet, is gaining momentum. On the positive side, the idea of being able to remotely activate your central heating, or for your fridge to tell you when you’re nearly out of milk, is rather exciting. However, the darker side of IoT is its vulnerability to hacking, privacy concerns and consumer rights. This was a common theme at last Friday’s Gikii conference, an event dedicated to combining law, technology and popular culture. Think of tech law enthusiasts using episodes of Hannibal to illustrate cybersecurity flaws. Stand-up for geek lawyers.

      An opening talk by Jon Crowcroft, described the IoT as, ““Take all the stuff in the world with moving parts, and now make it as easy to use and reliable as your printer – then put it the far side of the Internet.” (Quote attributed to Derek McAuley.) The idea is that everyday objects are enhanced with internet connectivity. Done well, it should convey health, energy efficiency and productivity benefits. Done badly, and you have privacy concerns, hacking and consumers not being able to access goods and services they’ve paid for.

      Crowcroft noted some challenges of current IoT models, which largely rely on conveying information from devices to the cloud, and back again. He suggested three main critiques: 1) Poor Availability & Latency (connecting through the cloud introduces latency, dependent on internet connectivity), 2) Higher energy use and expense, and 3) Lower security and vulnerability to attack. Combined, these factors imply that the IoT does not currently offer the promised automated world.

    • Neighbor Describes NSA Contractor’s Arrest: “I Thought the Third World War Started”

      The raid took place on August 27. “I thought the Third World War had started,” Bennett told me via telephone, describing the sight of his neighbor of 10 years being hauled away by heavily armed FBI agents.

      Bennett recalls seeing “two dozen of these guys in camo uniforms, with rifles, come running across the yard knocking down his fence. … They dragged him out, threw him on the ground, handcuffed him, and took him away.” He says the FBI agents remained at Martin’s home until “3 or 4 o’clock in the morning” removing computer equipment and papers.

      Prior to this conversation, Bennett had not been informed of the reason for his neighbor’s arrest. He describes Martin, age 51, as a “good neighbor,” but someone who never talked about his work: “I knew he worked in Washington, but I didn’t know what he did.” Bennett added that he didn’t recall Martin ever talking about the U.S. government or fellow Booz Allen NSA contractor Edward Snowden.

    • NSA has lost some terrorists because of encryption, its top lawyer says [Ed: more anti-crypto hysteria]
    • Embarrassed about your cyber hygiene? UK’s new NatCybSecCent can help

      This week, the UK’s new National Cyber Security Centre, NatCybSecCent for short (and NCSC for super-short), has begun its operations. It’s part of GCHQ and will bring together a number of related groups: CESG—the information security arm of GCHQ—the Centre for the Protection of National Infrastructure, CERT-UK, and the Centre for Cyber Assessment. The NCSC will ultimately be based in London, with a team of around 700 led by Ciaran Martin.

      Mr Martin is a man with his finger on the pulse. Fully three weeks before prime minister Theresa May announced that the UK no longer wanted migrants coming over here and daring to save people’s lives in our health system, Mr Martin had already announced the digital equivalent: the Great British Firewall, presumably building on the glorious tradition of The Great British Bake Off.

    • UK Stands Up GCHQ National Cyber Security Center in London
    • Government takes fight to hackers with National Cyber Security Centre
    • National Cyber Security Centre opens doors
    • NSA contractor from Glen Burnie charged with stealing top-secret information
    • NSA contractor charged with stealing highly classified information
    • FBI Arrested NSA Contractor For Walking Off With ‘Highly Classified Information’

      The NY Times story about this claims that the information Martin had was “computer code.” There’s a lot of speculation on the Twitters that this is related to the infamous Shadow Brokers “leak” of NSA hacking tools. The dates don’t fully line up. The Shadow Brokers leak involved code from 2013. The DOJ claims that the code it found Martin had is from 2014 — though it’s certainly possible that the investigation into Shadow Brokers led them to Martin (the arrest came the week after the Shadow Brokers info went public).

      [...]

      As always, it will be interesting to hear the other side of this story. We’ve certainly seen the DOJ come down hard on former NSA employees and contractors, claiming they had made off with classified information, when the later details turned out to show a lot less. But this is clearly a story worth following…

      It should also make you wonder just how many “controls” the NSA has really put in place to keep employees and contractors from walking off with highly classified information. We know that Snowden did it back in 2013, but the NSA keeps insisting that it’s put in place more controls to stop it from happening again. And, if this truly is exploit code, this is much worse. Snowden made off with information about certain programs — but not actual code.

    • Judge Overturns Denied Email Search Warrant, Says Gov’t Can Get It All, Dig Through It Later

      The “Magistrate’s Revolt” was fun while it lasted. Post-Snowden, a few magistrate judges began viewing law enforcement’s electronic search warrant applications with a bit more skepticism. These judges also rolled back a bit of the deference extended to the federal government, forcing the DOJ to narrow search requests or drop gag orders.

      The first flames of the revolt to be snuffed out occurred in a DC district court — the same district where “In re Sealed Case” is the most common docket entry — when Judge Richard Roberts overrode two decisions by magistrate judge John Facciola. The deference to “government knows best” was reinstated and the feds got their gag order and broad search requests approved.

      The same thing is happening in the center of the country. Orin Kerr of the Volokh Conspiracy reports that a Kansas district court judge has reversed magistrate judge David Waxse’s denial of an email search warrant.

    • Yahoo calls report of secret email scanning ‘misleading’
    • FU Yahoo!

      The security scare that surfaced about two weeks ago after it was revealed that information on about 500 million Yahoo users had been compromised was bad enough. Even worse was the fact that the compromise began in 2014, with word just now being revealed. The bullet in the head was the revelation Wednesday by Reuters that in 2015 the company evidently searched through its customers incoming emails, spying for either the NSA or the FBI.

      With that news, any nostalgia I had left for the brand completely disappeared. As far as I’m concerned, the site can now completely disappear from the Internet and I won’t feel so much as a twinge of regret that it’s gone. I can forgive the type of incompetence that led to the big breach, but I can’t forgive a website that betrays the trust of its users.

      On Tuesday, just hours after Reuters published its exclusive story on Yahoo’s cooperation with our spymasters, the Electronic Frontier Foundation called the incident “the next front in the fight against mass surveillance.”

      The EFF article concluded by saying “this is a perfect example of why we need to reform Section 702 and rein in the NSA’s mass surveillance programs. Absent such reform, Congress must not reauthorize Section 702 when it expires at the end of next year.”

    • Yahoo Issues Tone Deaf Non-Denial Denial Of Email Scanning Report

      Of course, people are parsing every word of that and noting some… remaining questions. The article is misleading? Okay, how? Which parts? What did it get wrong? You narrowly interpret every government request? Great. So explain what was found here, or explain the specifics of what Yahoo is doing. “Does not exist on our systems”? Did it ever? Does it exist on someone else’s system? Does a different mail scanning system exist? Lots of people would like to know.

      More importantly, note that they say they want to minimize disclosures. But that’s not the key issue here, as Chris Soghoian points out. The Reuters report was on the searching of all emails, not the disclosure bit. Yes, sure, it seems clear that after searching everyone’s email, Yahoo likely only “disclosed” a small number to the NSA, but that’s not really the point, is it?

      I mean, I guess this statement is better than Yahoo’s original: “Yahoo is a law abiding company, and complies with the laws of the United States” statement. But, it’s not very reassuring. Much more important is what Yahoo could have said, but didn’t.

    • NY Times And Reuters Claim Totally Different Explanations For Yahoo’s Email Scanning

      On Wednesday afternoon the NY Times released a report that appeared to clarify some of the questions around Tuesday’s Reuters report about Yahoo scanning all emails. According to the NY Times, unlike the original Reuters report that talked about a “directive” (which would imply an NSA surveillance program such as the one under Section 702 of the FISA Amendments Act), the scanning was actually the result of a more traditional FISA Court order.

    • Yahoo denies building secret app to bulk scan emails for US intelligence

      YAHOO HAS unconvincingly denied accusations that it built an application to enable it to bulk-scan emails on the request of intelligence agencies following a demand by the US government.

      The decision by CEO Marissa Mayer to comply with the order, rather than fight it, reportedly led to the departure of Yahoo’s highly rated chief information security officer, Alex Stamos, although Stamos has chosen to keep schtum on the matter.

      The revelation was made on Tuesday in a Reuters report quoting three former employees of the company.

      However, Yahoo has finally got round to hitting back, describing the reports as “misleading”.

      “We narrowly interpret every government request for user data to minimise disclosure. The mail scanning described in the article does not exist on our systems,” said Yahoo.

      However, in a series of tweets, privacy campaigner Christopher Soghoian described the company’s curt denial as “carefully worded”, and said that Yahoo “has a history of putting out carefully written, deceptive denials when it comes to NSA surveillance”.

    • Yahoo Said to Have Aided U.S. Email Surveillance by Adapting Spam Filter

      A system intended to scan emails for child pornography and spam helped Yahoo satisfy a secret court order requiring it to search for messages containing a computer “signature” tied to the communications of a state-sponsored terrorist organization, several people familiar with the matter said on Wednesday.

      Two government officials who spoke on the condition of anonymity said the Justice Department obtained an individualized order from a judge of the Foreign Intelligence Surveillance Court last year. Yahoo was barred from disclosing the matter.

    • Facebook Messenger now lets you toggle end-to-end encryption [Ed: False, misleading claims. The FBI's Comey never even mentioned or shamed Facebook with the T word. It’s not because he forgot; it’s because they’re supine, complicit. When Facebook talks about encryption, safety, privacy etc. it’s probably alluding to resistance to China/Russia/boogeyman, not NATO/5 Eyes. How much is the corporate media willing to lie about Facebook encryption and privacy to entrap, mislead, potentially kill activists? Facebook helps the governments spy, retains private keys, we bet...]

      With the flick of a switch back in April, the popular international messaging service WhatsApp turned on end-to-end encryption for every conversation in its system, dramatically boosting security for its 1 billion-person userbase. At long last, parent company Facebook has finally rolled out the same protections for users of its standard Messenger service. Today, users can toggle the “Secret Conversations” feature on in settings to enable end-to-end encryption, ensuring that nobody can pry into chat content but the participants.

    • Basically All Big Tech Companies Deny Scanning Communications For NSA Like Yahoo Is Doing

      So, the big story yesterday was clearly the report that Yahoo had secretly agreed to scan all email accounts for a certain character string as sent to them by the NSA (or possibly the FBI). There has been lots of parsing of the Reuters report (and every little word can make a difference), but there are still lots of really big questions about what is actually going on. One big one, of course, is whether or not other tech companies received and/or complied with similar demands. So it seems worth nothing that they’ve basically all issued pretty direct and strenuous denials to doing anything like what Yahoo has been accused of doing.

      Twitter initially gave a “federal law prohibits us from answering your question” answer — and a reference to Twitter’s well documented lawsuit against the US government over its desire to reveal more details about government requests for info. However, it later clarified that it too was not doing what Yahoo was doing and had never received such a request. Microsoft’s response was interesting in that it says it’s not doing what Yahoo is, but refused to say if it had ever received a demand to do so. Google said it had never received such a request and would refuse to comply if it had. Facebook has also denied receiving such a request, and, like Google, says it would fight against complying. This still leaves lots of unanswered questions about why Yahoo gave in. Again, historically, Yahoo had been known to fight against these kinds of requests, which makes you wonder what exactly was going on here.

    • Government contractor arrested for stealing top secret data

      A federal contractor suspected of leaking powerful National Security Agency hacking tools has been arrested and charged with stealing highly classified information from the U.S. government, according to court records and a law enforcement official familiar with the case.

      Harold Thomas Martin III, 51, of Glen Burnie, Md., was charged with theft of government property and unauthorized removal and retention of classified materials, authorities said. He was arrested in August after investigators searched his home in Glen Burnie and found documents and digital information stored on various devices that contained highly classified information, authorities said.

      [Read the full criminal complaint filed against Harold Thomas Martin III]

      Investigators are probing whether Martin was responsible for an apparent leak that led to a cache of NSA hacking tools appearing online in August, according to an official familiar with the case. Those tools included “exploits” that take advantage of unknown flaws in firewalls, for instance, allowing the government to control a network.

    • N.S.A. Contractor Arrested in Possible New Theft of Secrets

      The F.B.I. secretly arrested a National Security Agency contractor in recent weeks and is investigating whether he stole and disclosed highly classified computer codes developed to hack into the networks of foreign governments, according to several senior law enforcement and intelligence officials.

      The theft raises the embarrassing prospect that for the second time in three years, an insider has managed to steal highly damaging secret information from the N.S.A. In 2013, Edward J. Snowden, who was also a contractor for the agency, took a vast trove of documents that were later passed to journalists, exposing N.S.A. surveillance programs in the United States and abroad.

      The contractor was identified as Harold T. Martin 3rd, 51, of Glen Burnie, Md., according to a criminal complaint filed in late August. He was charged with theft of government property, and unauthorized removal or retention of classified documents. During an F.B.I. raid of his house, agents seized documents and digital information stored on electronic devices. A large percentage of the materials found in his house and car contained highly classified information.

      At the time, F.B.I. agents interviewed Mr. Martin, and he initially denied having taken the documents and digital files. The agency later said he had stated that he knew he was not authorized to have the materials. According to the complaint, he told the agency that “he knew what he had done was wrong and that he should not have done it because he knew it was unauthorized.”

  • Civil Rights/Policing

    • ‘National Bird’ Exclusive Trailer: Errol Morris and Wim Wenders Present Story of Drone Warfare Whistleblowers

      Errol Morris and Wim Wenders both have new films out this year: Morris’ “The B-Side: Elsa Dorfman’s Portrait Photography” examines the life and work of polaroid portrait artist Elsa Dorfman, and Wenders’ “The Beautiful Days of Aranjuez” captures a conversation between a man and woman that encompasses the totality of life. But the two acclaimed directors have also executive produced Sonia Kennebeck’s documentary feature debut “National Bird,” about drone warfare and the three whistleblowers determined to break the silence around the controversial affair. Watch the trailer for the film below.

    • Feds indict 80 people — including 18 corrections officers — in ‘massive’ Maryland prison corruption case

      Federal authorities have won indictments against 80 people, including corrections officers and inmates, in an alleged conspiracy to sneak heroin, cocaine, cellphones, pornography and other contraband into the Eastern Correctional Institution in Westover.

      The largest federal indictment in Maryland history is the latest to allege that officers and inmates used sex, drugs and violence to run a criminal enterprise out of a state prison facility.

      It mirrors the 2013 case in which the Black Guerrilla Family gang used similar methods of bribery and intimidation to seize control of the Baltimore City Detention Center.

      Federal prosecutors now charge 18 corrections officers, 35 inmates and 27 others in a scheme in which the officers allegedly took bribes to sneak contraband into ECI, the state’s largest prison.

    • Decolonization—not western liberals—established human rights on the global agenda

      A paradox sits at the heart of the human rights movement. For decades it has made strong claims about the universality of human rights but then proceeded to present a discounted version of the universality story.

      Standard historical accounts have privileged the role of western actors, and their perspectives on historical causalities. These have been accompanied by an overemphasis on the 1940s and 1970s in explaining the emergence of human rights—an emphasis that reveals a scholarly addiction to “human rights moments” and iconic histories, instead of more richly contextualized narratives over time.

      The above-mentioned emphasis has resulted in a huge gap in knowledge concerning the intervening period – covering about 25 years from 1948 to the mid-1970s. In this period, the largest transformation of sovereign power in world history took place, namely decolonization. Surely, this structural transformation in the international system of states played a role in the post-1945 emergence of human rights en route to their contemporary significance?

    • Court acquits activist for violent anti-Zwate Piet protest

      The court acquitted anti-Zwarte Piet activist Jerry Afriyie on Thursday. Afriyie was charged with resisting arrest and assaulting a police officer during a violent protest in Gouda two years ago, NOS reports.

      During the Sinterklaas arrival festival in Gouda in 2014 supporters and opponents of blackface Zwarte Piet gathered to protest at the town hall. They had no permission to protest there and the police ordered them to leave. The atmosphere turned nasty and a total of 90 people were arrested, both in the pro- and anti-Zwarte Piet groups.

      Afriyie was the only one to end up in court, according to NOS. According to the Public Prosecutor, he resisted arrest and injured a police officer by pinching him hard in the leg.

    • Imam beaten with a SHOE on live TV after claiming women SHOULDN’T wear the burka

      The Muslim cleric was repeatedly beaten with a shoe when an on-air row over the Islamic veil turned violent.

      The fight broke out live on Egypt’s popular LTC TV during a discussion about the place of the burka in the Islamic world.

      Sydney imam Mostafa Rashid claimed that the headscarf is a cultural tradition rather than a religious duty.

    • Undercover Video Inside Islamic School In The UK — A Teacher Instructs That Gays Must Be Thrown From Tall Buildings

      Good news: If you aren’t married when you have sex with someone, you just get beaten — perhaps to death — because you are to be given 100 lashes.

    • Ramsey Orta, who filmed Eric Garner death, sentenced to 4 years

      The Staten Island man who filmed Eric Garner’s final breaths was sentenced Monday to four years in prison for possession of a weapon and drug charges.

      Ramsey Orta told his family “it will be okay” in Staten Island Supreme Court as Justice Stephen Rooney read out his sentence.

      As court officers put handcuffs on Orta, protesters stood up in the courtroom, holding their fists in the air, flashing peace signs and chanting, “No justice no peace! F–k these racist police!”

    • Thailand bars entry to teenage HK activist ‘at China’s request’

      Thailand on Wednesday barred entry to a Hong Kong student activist who helped organize pro-democracy protests in the Chinese-ruled city in 2014, with a Thai newspaper saying he had been deported and “blacklisted” at China’s request.

      Bespectacled Joshua Wong, 19, was detained in Bangkok where he had been invited to speak at universities about Hong Kong’s “Umbrella Movement” street protests and on setting up his political party, Demosisto.

      He was later put on a plane back to Hong Kong where he told reporters Thai authorities had not given him a reason for refusing him entry but had shown him a document citing a security law. One officer had mentioned a “blacklist”, he said.

      “As a Hong Kong person, I did not expect that even if I do not enter mainland China, I would be inside a foreign detention center, detained by other police. This is unbelievable,” he said.

    • Officers tried to run over man before shooting him 14 times, video shows

      In the last seconds before he was shot 14 times, Joseph Mann dodged the police cruiser once, then twice. Dashboard video recorded the officer’s words inside the car: “Fuck this guy. I’m going to hit him.”

      “OK, go for it. Go for it,” his partner replies.

      The Mann family’s attorney amended his complaint against the city of Sacramento on Friday and sent a letter to the justice department requesting a civil rights investigation into the Sacramento fatal police shooting of Mann, a 51-year-old homeless man with a history of mental illness.

      “It’s disgusting,” attorney John Burris told the Guardian. “It raises the question that this might have been a deliberate, premeditated murder, that they intended to do what they did.”

    • Victims of Pakistan’s ‘honor’ killings

      Tasleem was just 18 years old when her brother shot her in the head. Her crime was marrying a man of her choice, considered a betrayal of a family’s honor among many in Pakistan who live by an ancient code of conduct.

      Last year, three people a day were killed in the name of “honor” in Pakistan: a total of 1,096 women and 88 men, according to the independent Human Rights Commission of Pakistan, which says the true figure is likely higher because many such crimes go unreported.

      In 2014, the number was 1,005 women, including 82 children, up from 869 women killed a year earlier.

      Outrage at the practice has grown in recent months as Pakistani news channels have reported on girls who are shot, strangled or burned alive, most often by a brother or a parent.

      Pakistan’s conservative Prime Minister Nawaz Sharif has promised to introduce legislation that will remove a legal loophole that allows the family of a murder victim to effectively pardon the murderer. The loophole is often invoked in honor killings to prevent any prosecution.

    • Tougher penalties proposed for carrying a knife

      People caught carrying knives in the street will be jailed for longer under new proposals.

      Carrying a knife while in a group or gang, or filming attacks for social media could also spell more jail time.

      The Sentencing Council for England and Wales says it wants sentences to better recognise public concern amid a rise in recorded knife offences.

      Justice Minister Sam Gyimah said sentences should reflect the “devastation” caused by knife crime.

      Police recorded almost 29,000 crimes involving knives in the 12 months to March 2016 – a 10% rise on the year before.

    • Pakistani scholar ordered home from Australian tour after anti-Semitic video emerges

      A Pakistani scholar visiting Australia for a speaking tour has been ordered home after a video sermon surfaced of him saying the world will be purified when every Jew is wiped out.

      Muhammad Raza Saqib Mustafai, who has a Facebook fan base of almost a million people, spoke at the Ghausia Masjid in Blacktown and the Al-Madinah Masjid in Liverpool over the long weekend.

    • California Passes Asset Forfeiture Reform Bill That Closes Federal Loophole, Adds Conviction Requirement

      After years of civil asset forfeiture abuse, legislators are finally fighting back. Reform bills have been offered up all over the country. Unfortunately, very few of them have made it to state governors’ desks intact. The DOJ itself has played an integral part in thwarting true forfeiture reform, but legislators are also battling powerful police unions and a law enforcement lobby that needs to do little more than say the words “drug dealer” to convince fence-straddlers to come down on their side.

  • Internet Policy/Net Neutrality

    • Charter Joins AT&T In Using Lawsuits To Try And Slow Down Google Fiber

      For decades, incumbent broadband ISPs have all but owned state legislatures, often to the point where they’re quite literally allowed to write awful state law that actively harms state consumers. That’s why it has proven amusing to see these same ISPs cry like petulant children at Google Fiber’s disruption of the uncompetitive broadband market. AT&T, for example, has sued Louisville and Nashville for passing pole attachment reform that would speed up broadband deployment, all while claiming that doing so gives Google Fiber an unfair advantage.

  • Intellectual Monopolies

    • WIPO Conference Archive Missing Video Critical Of Artificial Intelligence, Social Media Giants

      This morning at the World Intellectual Property Organization General Assemblies, WIPO Director General Francis Gurry commented on the success of the WIPO Conference on the Global Digital Content Market, which took place in April. But the full video of the keynote speaker, who had sharp words for corporate internet giants and other new technologies, is missing from the archive.

      His comments were made during the WIPO General Assembly, as delegates were about to discuss the report of the Standing Committee on Copyright and Related Rights. A short video was then aired presenting a summary of the conference. The keynote speaker [pdf] of the conference was Jaron Lanier, a computer scientist, music composer and performer, and author of numerous books, the latest “Who Owns the Future.”

    • WIPO Development Agenda Needs More Promotion, Country Involvement, Experts Say

      Has the adoption of the World Intellectual Property Organization Development Agenda in 2007 changed the culture of the organisation, and what did it achieve? According to panellists at a side event to this week’s WIPO General Assembly, the Development Agenda has not yet changed the culture of the organisation and its primary focus to support and protect intellectual property. However, WIPO should follow the United Nations Sustainable Development Goals and collaborate with other UN agencies to include development consideration in its work, they say.

    • Vibrant Lauding Of “Historic” Marrakesh Treaty For The Blind At WIPO

      “Great victory”, “life-changing”, “historic milestone” – no adjectives were strong enough yesterday to celebrate the entry into force of the Marrakesh treaty at the World Intellectual Property Organization. The treaty, which went into effect on 30 September, “opens the door to the world’s knowledge,” to visually impaired people, but will need many more countries join, in particular countries that are major producers of special format books – the United States and the European Union.

10.05.16

Links 5/10/2016: New KDE (LTS), Mad Max Coming To GNU/Linux

Posted in News Roundup at 8:36 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

  • Desktop/Microsoft

    • Lenovo won’t make Windows 10 phones due to Microsoft’s commitment issues

      Lenovo’s COO, Gianfranco Lanci, has said that the Chinese tech giant doesn’t intend to release any new phones running Windows 10 Mobile. This is because he doubts Microsoft’s commitment to its floundering smartphone platform.

      Speaking at the Canalys Channel Forum 2016, Lanci said that while Windows 10 for desktops has been doing well in the business world, it has no plans to build smartphones using the operating system.

    • Latest Windows 10 Anniversary Update Build Sends Some Users To Reboot Loop Hell

      Those of you rocking a PC with the Windows 10 Anniversary Update may want to hold off on letting your system apply the latest round of fixes. There are several user complaints that Build 14393.222 (KB3194496), the seventh Cumulative Update since the Anniversary started flooding PCs in August, is borking systems by putting them into an endless reboot loop.

      The latest update package is supposed to deliver “quality improvements” in the form of several bug fixes for various issues, as well as improve the reliability of certain tasks, such as downloading and updating games from the Windows Store. Unfortunately, in many cases the installation fails somewhere along the way and rolls back the changes it made, as indicated by complaints posted to Microsoft’s support forums and Twitter. It also happened to me when I tried installing the update on my primary desktop.

    • More than half of PCs don’t have Windows 10 AU yet, and no one’s quite sure why

      Just 34.5 percent of all PCs are running Windows 10 version 1607, aka the Windows 10 Anniversary Update, according to AdDuplex, maker of a Windows 10 SDK for third-party app makers. The majority, 59.9 percent, are still running Windows 10 version 1511, also known as the Fall Update.

  • Kernel Space

    • Linus Torvalds admits ‘buggy crap’ made it into Linux 4.8

      Linus Torvalds gave the world Linux 4.8 earlier this week, but now appears to wish he didn’t after spotting some code he says can “kill the kernel.”

      When Torvalds announced Linux 4.8 on Sunday he said the final version added “a few stragging fixes since rc8.”

      But by Tuesday he was back on the Linux Kernel Mailing list apologising for a bug fix gone bad.

    • Open source compliance specs advance at LinuxCon

      The Linux Foundation announced the SPDX 2.1 and OpenChain 1.0 specs, which aim to clarify and standardize open source compliance and management.

      At LinuxCon Europe in Berlin, the Linux Foundation announced two new releases from different groups attempting to standardize open source license tracking, compliance, and supply chain management. The Software Package Data Exchange (SPDX) Project announced SPDX 2.1 for tracking complex open source license dependencies, adding new “Snippets” and appendix features, and the OpenChain Workgroup released OpenChain 1.0 for managing the open source supply chain.

    • Linux: The free operating system alternative that changed computing

      For most of us, when we think of PCs, we think of Windows. But Microsoft’s popular and well-known operating system isn’t the only option.

      Many users choose to live without Windows and run different operating systems like Linux instead.

      This year is a special one for Linux, as October 5 marks 25 years since the release of the Linux kernel.

      If you’re discovering Linux for the first time, find out all about it below.

    • Linux 4.8 adds Pi, Surface support but Linus Torvalds fumes over ‘kernel-killing’ bug [Ed: Linux foes go full swing to make the kernel look bad]

      Announcing the 4.8 release on Sunday, Torvalds’ correspondence on the Linux kernel mailing list appeared calm despite a few “pretty small” issues carried over from the eighth and final 4.8 release candidate. He signed off with his usual “go forth and test” command.

      The several highlights of 4.8 include support for the touchscreen on Microsoft’s Surface 3 device and the Raspberry Pi 3′s System on a Chip.

    • Linux 4.8 Kernel Support for Microsoft Surface 3 touchscreen [Ed: Microsoft sites put a "Microsoft" slant on Linux]
    • Solving the Linux kernel code reviewer shortage

      Operating system security is top of mind right now, and Linux is a big part of that discussion. One of the questions to be solved is: How do we ensure that patches going upstream are properly reviewed?

      Wolfram Sang has been a Linux kernel developer since 2008, and frequently talks at Linux conferences around the world, like LinuxCon Berlin 2016, about ways to improve kernel development practices.

  • Applications

  • Desktop Environments/WMs

    • K Desktop Environment/KDE SC/Qt

      • An Everyday Linux User Review Of Kubuntu 16.04

        My experience with Kubuntu has done nothing to convince me that I want to use KDE in the long term. If I did want to use KDE long term then my experience with Manjaro would definitely make me lean in that direction.

        This is an LTS release yet there are so many little niggles. New users to Linux will not be enamoured with having to find solutions to simple things like installing software.

        The problems are worse than those that I experienced with Ubuntu. At least with Ubuntu I could install a separate application for installing the good stuff like Chrome. With Kubuntu it is command line all the way and searching forums for solutions.

        With Linux Mint being so good it is hard for me to recommend Kubuntu 16.04.

        I am not the only person to have issues with Kubuntu, read this review by Dedoimedo, he runs into many of the same issues as I did.

      • KDE Neon 5.8 User Edition Linux OS Offers the Latest KDE Plasma 5.8 LTS Desktop

        The KDE Neon development team proudly announced a few minutes ago the release of the KDE Neon 5.8 User Edition GNU/Linux distribution with the recently released KDE Plasma 5.8 LTS desktop environment.

      • KDE 5.8 LTS, Fedora PSA, Magic Security Dust

        The top story today was the release of KDE Plasma 5.8 which was covered by all the top sites. This release brings some new features and long term support. It’s already in KDE neon as well. Elsewhere, The Inquirer began a new series on the legends of Linux and Fedora’s Adam Williamson posted a public service announcement for version 24. A bit of drama emerged from Andrew Ayer’s systemd post and Martin Owens ruminated on Free Software Faith.

      • KDE Turning 20, Launches Plasma 5.8 LTS Desktop To Celebrate Its Birthday
      • openSUSE: Beta 3 Release Updates FireFox, KDE Applications, VirtualBox

        The openSUSE Leap 42.2 Beta 3 was released today one day ahead of schedule and the last beta for 42.2 brought quite a few new versions for people to test.

        VirtualBox was upgraded from version 5.0.24 in Beta 2 to version 5.1.4 and there were an enormous amount of fixes applied to this newer version, which was released in August.

    • GNOME Desktop/GTK

  • Distributions

    • New Releases

    • Arch Family

    • Red Hat Family

      • Red Hat Releases WildFly Application Server Version 10.1

        Improved load balancing is accomplished through a new profile, called “load-balancer” in the default domain.xml file. Profiles in domain mode allow for centralized management of multiple nodes (physical or virtual). This allows for multiple instances of WildFly that can be configured to provide different services.

      • Finance

      • Fedora

        • FOSS Wave: Goa, India

          These sessions mark the beginning of FOSS Wave: Goa, India. We have seen a lot of enthusiasm in this event and many people were interested in learning about FOSS and cutting-edge technologies. Contributors are already flowing in and we expect more in the near future!

        • X crash during Fedora update when system has hybrid graphics and systemd-udev is in update

          Hi folks! This is a PSA about a fairly significant bug we’ve recently been able to pin down in Fedora 24+.

          Here’s the short version: especially if your system has hybrid graphics (that is, it has an Intel video adapter and also an AMD or NVIDIA one, and it’s supposed to switch to the most appropriate one for what you’re currently doing – NVIDIA calls this ‘Optimus’), DON’T UPDATE YOUR SYSTEM BY RUNNING DNF FROM THE DESKTOP. (Also if you have multiple graphics adapters that aren’t strictly ‘hybrid graphics’; the bug affects any case with multiple graphics adapters).

        • Fedora 24 Users: Don’t Run “DNF Update” From The Desktop

          Fedora 24 users are advised against currently updating your system using the common dnf update command when running GNOME, KDE, or any other graphical desktop. Due to an awkward bug being explored, it could leave your system in an unhappy state.

        • Fedora Devs Warn Users Not to Run “dnf update” Inside a Desktop on Fedora 24

          Earlier today, October 4, 2016, Fedora Project’s Adam Williamson published a public service announcement (PSA) to inform the Fedora Linux community about an important issue with the internal update process.

          It appears that many users of the Fedora 24 operating system have reported in the last 24 hours that they are getting “duplicated packages” and “kernel updates not working” errors when attempting to run the “dnf update” command to update their installations with new package versions released through the official software repositories.

    • Debian Family

      • My Free Software Activities in September 2016

        My monthly report covers a large part of what I have been doing in the free software world. I write it for my donators (thanks to them!) but also for the wider Debian community because it can give ideas to newcomers and it’s one of the best ways to find volunteers to work with me on projects that matter to me.

      • Derivatives

        • Parsix GNU/Linux 8.15 “Nev” Is Shipping with Linux Kernel 4.4 LTS, GNOME 3.22

          We reported a couple of days ago that the Parsix GNU/Linux 8.5 “Atticus” operating system had reached end of life on September 30, 2016, and its repositories will be closing too on October 10 to make room for the next Parsix GNU/Linux release.

          That’s right, we’re talking here about Parsix GNU/Linux 8.15 “Nev,” which was already announced last week by the developers of the Debian-based operating system and reported right here on this space. It looks like work on Parsix GNU/Linux 8.15 “Nev” had already begun, and the development team is teasing us with its new features.

  • Devices/Embedded

Free Software/Open Source

  • Dell EMC ‘backs’ Huawei open-source management disrupter

    LinuxCon Berlin Huawei today announced OpenSDS, an open-source project to replace vendor-specific storage controllers and says it has the weight of world number three Dell EMC behind it.

    It’s understood OpenSDS was presented to Linux Foundation reps on a recent visit to China.

    The idea is that vendors’ products would plug into one side of the finished OpenSDS and third parties’ tools and software, such as Docker, Kubernetes or OpenStack, into the other.

  • What CIOs need to know about open source forking

    Forking is a concept that can strike terror into the heart of any CIO that relies on open source software. Here’s how to make sure you’re on the right side of the split.

  • Open Source MANO Issues First Release

    ETSI’s Open Source MANO (OSM) group has today announced the availability of its OSM Release ONE, an open source Management and Orchestration (MANO) software stack closely aligned with ETSI NFV, and focused on helping industry accelerate the implementation of network virtualization. The OSM community aims to deliver a production-quality open source MANO stack that meets the requirements of commercial NFV networks.

    Available less than six months since the inaugural meeting of the OSM community, Release ONE has been engineered, tested and documented to allow for rapid installation in operator labs worldwide that seek to create a scalable and interoperable open source MANO environment. Release ONE substantially enhances interoperability with other components (VNFs, VIMs, SDN controllers) and creates a plugin framework to make platform maintenance and extensions significantly easier to provide and support.

  • Magisk Updated to v7, Now Completely Open Source

    Amongst the most notable changes, Magisk is now fully open source from v7 onwards, including the binaries that it makes use of. In addition to this, the Magisk Manager is now a completely different app altogether, becoming a part of the core experience. New features and improvements are planned, so we can be sure that things will continue to improve in the future.

  • Nextcloud 10.0.1 Maintenance Release Improves the Updater, Patches Over 40 Bugs

    The Nextcloud developers have released recently the first maintenance update to the Nextcloud 10 series of the open-source and cross-platform self-hosting cloud server forked from ownCloud.

  • Study: open source groups take security serious

    The IT security practices of some open source communities are exemplary, shows a study for the European Commission and European Parliament. Many communities use experts to ensure software security and to help their developers avoid security flaws. “These communities take security serious”, says Alberto Dominguez Serra, one of the authors working for Everis, a IT consultancy.

  • ZeroMQ founder Pieter Hintjens dies

    Pieter Hintjens, Belgian software developer and past president of the Foundation for a Free Information Infrastructure (FFII), gave much of his time and effort to the open-source community.

    He did so even up until the day he planned for his own death, which was today.

    Hintjens, who chose euthanasia today after dealing with terminal cancer, was a writer and a programmer who spent much of his life building large software systems and online communities, which he described as “Living Systems.”

  • It’s good to be an open source pro in Europe

    Open source employees in Europe have it good, especially when we compare that market to the rest of the world. This is according to a new report by Dice and The Linux Foundation. The report says that out of 1,000 European respondents, 60 per cent said it would be fairly easy to find a new job this year. Globally, the figure stands at about 50 per cent.

    “Demand for open source talent is growing and companies struggle to find experienced professionals to fill open roles,” said Bob Melk, President of Dice. “Rising salaries for open source professionals indicate companies recognize the need to attract, recruit and retain qualified open source professionals on a global scale. Regardless of where they reside around the world, these professionals are motivated by the opportunity to work on interesting projects.”

  • The 2016 Open Source Jobs Report Update: Insights From European Open Source Professionals
  • Walmart opens website to OS community
  • @WalmartLabs applies Electrode to get current with web dev
  • WalmartLabs open sources platform that powers Walmart.com
  • WalmartLabs open sources its React-powered universal application platform that underlines Walmart.com
  • Introducing Electrode, an open source release from WalmartLabs
  • These open-source compute technologies can help you build and scale your apps faster

    From ordering food, to finding a good doctor in the vicinity or enhancing our learning skills, most of us use an app, whether we are a teenager, in our 30s or even a septuagenarian.

    Not just big brands or multi-national companies, even small and medium businesses and startups are going down the app route. In fact, even your small neighbourhood street food joint wants you to rate their food and service on a popular restaurant search and discovery app because it means better business and value.

    For most organisations today, there are no second thoughts on whether an app is vital for their growth or not. The advantages of having an app are evident – from being able to stay on top of the customers’ mind and building brand loyalty, to being able to provide value to the customers, and doubling up as a marketing channel, apps are playing a vital role.

  • Tibco releases IoT integration toolkit to open source
  • Open Source Project Flogo Pushes IoT Integration and Connectivity to the Edge

    TIBCO Software Inc., a global leader in integration and analytics, today announced the immediate availability of its ultra-lightweight IoT integration solution, Project Flogo™. Its tiny open source integration engine allows application and business logic to run on edge devices, simplifying IoT integration challenges, avoiding technological lock-in, and reducing costs.

  • Tips from a software engineer for a balanced life

    Kent Dodds is a busy, busy guy. He’s a full stack JavaScript engineer at PayPal, hosts JavaScript Air, co-hosts React30, is an instructor on Egghead.io, is a Google Developer Expert, and spends a lot of time on Twitter and GitHub.

    He’s speaking at All Things Open this year on automating the open source contributions and maintenance management process in two sessions: Managing an Open Source Project and How to Open Source Your Stuff.

  • How to champion your committers

    A number of companies today proudly wear the open source badge to show their dedication to various projects, particular communities, or simply the idea of free software licensing. Many have gone down the Red Hat business route, creating a revenue model based on support and services, while others have built their business around proprietary features and add-ons to open source projects.

  • Aditya Mukerjee: Crossing the Language Divide in Open Source

    This fascinating talk from September’s GitHub Universe 2016 in San Francisco by Aditya Mukerjee, an engineer at Stripe, made me think a lot about language privilege and global digital inclusion. Mukerjee grabs you in his opening remarks, “I always keep my eye out for the ways technology can empower the disenfranchised — how it can amplify the voices of the subaltern. And it’s crucial to listen to those voices if we want to solve the biggest problems that the world faces.”

  • Web Browsers

  • FSF/FSFE/GNU/SFLC

    • Free Software Faith for the Long Term

      But that naturally led to the in-fighting. It’s typical for the front runner to be targeted by all the also-ran distributions. The FSF targeted Ubuntu’s practicalist concessions (even though they were fairly minimal), Other distributions ripped Ubuntu and their community apart, trying to block Ubuntu’s success. I’m not saying they meant to do it, or that it was a conspiracy. But that these other communities did not see Ubuntu’s success as their own success and naturally tried to undermine it as humans are likely to do.

      So for very human reasons, we’re here with no real champion for Free Software in the practical arena. Ubuntu has fallen for its own hype and is not able to being the Free Software faith with it, even if it was successful. The societal and long term benefits of Free software remain largely unknown to the majority of the world and we wait patiently for a successor that can try again to change the world.

    • Free Software Directory meeting recap for September 30th, 2016
    • Twenty-two new GNU releases in September

      apl-1.6a
      autoconf-archive-2016.09.16
      autogen-5.18.12
      bash-4.4
      denemo-2.0.12
      drgeo-16.10a
      emacs-25.1
      gawk-4.1.4
      global-6.5.5
      gnucash-2.6.14
      gnuchess-6.2.3
      gnu-c-manual-0.2.5
      gnutls-3.5.4
      gsl-2.2.1
      libmicrohttpd-0.9.51
      libosip2-5.0.0
      nano-2.7.0
      parallel-20160922
      readline-7.0
      texinfo-6.3
      unifont-9.0.02
      xorriso-1.4.6

  • Openness/Sharing/Collaboration

    • Open Access/Content

      • Amyris and Autodesk Offer Powerful Open Source Tools for Genetic Design to Enable Rapid DNA Engineering

        Genotype Specification Language (GSL), is a programming language that facilitates the rapid design of large and complex DNA constructs used to engineer genomes. The GSL compiler implements a high-level language based on traditional genetic notation, as well as a set of low-level DNA manipulation primitives. The language allows facile incorporation of parts from a library of cloned DNA constructs and from the “natural” library of parts in fully sequenced and annotated genomes. GSL was designed to engage genetic engineers in their native language while providing a framework for higher level abstract tooling. GSL was developed and open sourced by Amyris.

    • Open Hardware/Modding

      • OpenMYR Open Source Wireless Motors (video)

        The creator of the wireless motors Kyle Berezin explains more about their inspiration, design and features as well as some of the applications that they can be used for.

  • Programming/Development

    • The cost of forsaking C

      The C programming language is not trendy. The most recent edition of the canonical C text (the excitingly named The C Programming Language) was published in 1988; C is so unfashionable that the authors have neglected to update it in light of 30 years of progress in software engineering. Everyone “has been meaning to” learn Rust or Go or Clojure over a weekend, not C. There isn’t even a cute C animal in C’s non-logo on a C decal not stuck to your laptop.

      But Myles and I are not trendy people, so we insist that all of our students become fluent in C. A fresh class of C converts has just finished working through the K&R bible, making this a good time for me to reflect on why we deify this ancient tongue.

      We give students four reasons for learning C:

      It is still one of the most commonly used languages outside of the Bay Area web/mobile startup echo chamber;
      C’s influence can be seen in many modern languages;
      C helps you think like a computer; and,
      Most tools for writing software are written in C (or C++)

      The first is easy to dismiss if one likes the Bay Area web/mobile startup echo chamber, the second if one hates C’s influence on many more modern languages. Most engineers should take head of reason three, although our students also learn computer architecture and at least one assembly language, so have a firm mental model of how computers actually compute. But reason four is hard to ignore.

      Forsaking C means forsaking anything below the level of abstraction at which one happens to currently work. Those who work for instance as web developers forsake thoroughly understanding the browsers, operating systems and languages on top of which their own work stands.

Leftovers

  • Health/Nutrition

    • Revealed: MRSA variant found in British pork at Asda and Sainsbury’s

      Meat produced from British pigs has been shown to be infected with a livestock strain of MRSA, the Guardian can reveal, raising concerns that the UK is on the brink of another food scandal.

      Tests on a sample of 97 UK-produced pork products from supermarkets show that three – sold at Asda and Sainsbury’s – were contaminated with the superbug strain which can cause serious health problems.

      The Guardian, working with the Bureau of Investigative Journalism (BIJ), has also established that a loophole in import regulations is leaving an open door for MRSA CC398-infected live pigs from countries such as Denmark, where the disease is rife.

    • Poland abortion strike: Thousands of women in over 60 cities refuse to work in protest over restrictive laws

      Thousands of Polish women dressed in black have boycotted work and taken to the streets in protest against a plan to ban abortions.

      Without half their workforce, government offices, universities and schools in 60 cities across the country closed their doors.

      For the day of action, dubbed “Black Monday”, women donned dark-coloured clothes in a symbol of mourning for the loss of reproductive rights they fear.

      Poland already has one of Europe’s most restrictive abortion laws and opinion surveys show very little support for an even stricter law, despite the nation’s deep Catholicism and conservative political direction.

    • Flint Hit With Bacterial Illness as Residents Shun City Water

      Residents of Flint, Mich., affected by the contaminated-water crisis have added a new complication to their lives: an outbreak of shigellosis, a bacterial illness that is easily transmitted when people do not wash their hands.

      Health department officials in Genesee County, where Flint is the largest city, said there has been an increase in the gastrointestinal illness, which can lead to severe diarrhea, fever, nausea, vomiting, cramps and stools containing blood and mucus, according to a statement issued last month.

    • UNITAID-FIND Partnership To Scale Up Hepatitis C Diagnostics

      New medicines have revolutionised HCV treatment in high-income countries, yet the lack of appropriate diagnostic tools for HCV infection remains a challenge. Catharina Boehme, chief executive officer of FIND, outlined that HCV is “a silent killer which goes unnoticed until it is almost too late.” Accordingly, 85 percent of cases occur in low- and middle-income countries, with fewer than 1 percent of persons aware of their infection.

      The US$38.3 million project aims to develop “better, simpler, point-of-care diagnostic tools for HCV, and will introduce HCV testing and treatment in HIV programmes” with national governments and local implementation partners in Cameroon, Georgia, India, Malaysia, Myanmar, Thailand and Vietnam, over the next three years.

  • Security

  • Defence/Aggression

    • Putin Suspends Weapons-Grade Plutonium Deal With US

      resident Vladimir Putin on Monday suspended a Russia-U.S. deal on the disposal of weapons-grade plutonium, a move that comes amid escalating tensions over Syria between Moscow and Washington.

      Putin’s decree released by the Kremlin cited Washington’s “unfriendly actions” and the United States’ inability to fulfill its obligations under the 2000 deal as reasons for the move.

      However, the decree says that the weapons-grade plutonium that has fallen under the agreement will be kept away from weapons programs.

    • Clinton: ‘I don’t recall any joke’ about droning WikiLeaks founder

      Hillary Clinton on Tuesday said she doesn’t remember ever commenting — joking or otherwise — about using a drone strike against WikiLeaks founder Julian Assange.

      “I don’t recall any joke,” Clinton said, when asked Tuesday at a press conference in Pennsylvania.

      “It would have been a joke, if it had been said, but I don’t recall that.”

      The website TruePundit posted a report Sunday that alleged Clinton had in 2010 spoken of a drone strike against Assange.

      The report cited State Department sources and claimed Clinton had said: “Can’t we just drone this guy?”

    • Sen Mitch McConnell blames Obama for bill that Obama vetoed and McConnell repeatedly voted for

      Congress has overridden Obama’s repeated veto for the “Justice Against Sponsors of Terrorism Act,” which allows US citizens to sue the Saudi government over its alleged complicity in the 9/11 attacks — and which may allow people in other countries hamed by actions sponsored by the US government sue the US in those countries’ courts.

      However you feel about the Saudi role in 9/11, or the US government’s actions abroad, there is one absolutely unequivocal fact: Obama opposed the bill, and Republicans in the House and Senate passed it over his strenuous, repeated objections.

      But those facts haven’t stopped senior GOP senator Mitch McConnell from blaming Obama for the law, despite the fact that McConnell vote for the law, voted again for it, then voted “Aye” on the proposition, “Shall the Bill S. 2040 Pass, the Objections of the President of the United States to the Contrary Notwithstanding?” (McConnell was joined by 28 senators who’d also written a letter condemning the law, warning of the risk of “potential unintended consequences”).

      McConnell said “I hate to blame everything on him, and I don’t” but “it would have been helpful had we had a discussion about this much earlier than last week.” The White House had repeatedly sent information to the Senate about the potential negative consequences of the bill for US interests. Nevertheless, McConnell accused Obama of “dropping the ball” by merely repeatedly vetoing the bill and pleading with Congress to reconsider, which left Congress in a state where “[n]obody [in Congress] really had focused on the potential downside in terms of our international relationships.”

    • Philippine president: Obama to hell, EU to purgatory

      Philippine President Rodrigo Duterte has told President Barack Obama “you can go to hell” in his latest tirade against the U.S. over its criticism of his deadly anti-drug campaign.

      He also lashed out anew at the European Union in a speech Tuesday saying the 28-nation bloc, which has also criticized his brutal crackdown, “better choose purgatory, hell is filled up.”

      Duterte, who took office in June, has been hypersensitive to criticisms over his anti-drug fight, which has left more than an estimated 3,000 suspected drug dealers and pushers dead in just three months, alarming the United Nations, the E.U., the U.S. and human rights watchdogs.

    • PM wants British troops pulled out of European convention on human rights

      The Tory government want British soldiers to be exempt from the European Convention on Human Rights during future conflicts so they cannot be sued, in a move that has outraged activists.

      The plans were announced by prime minister Theresa May and defence secretary Michael Fallon at the Conservative party conference on Tuesday.

      The ECHR was established in 1953 by the Council of Europe with Britain as a founding member. Now, after more than 60 years, May wants out of the bits she doesn’t like.

    • FBI’s Comey: Actually, Chasing ISIS Off Twitter Makes It More Difficult For Us To Follow Them

      Over and over again we keep hearing politicians and others going on and on about the need for social media companies like Facebook, Twitter and Google to kick ISIS users off their platforms. Both Hillary Clinton and Donald Trump have called for this. And some people at these companies are supportive of this idea. Twitter regularly feels compelled to talk about how many ISIS accounts it removes.

      Yet, as we’ve pointed out each time it’s done so, this seems backwards. We’ve noted that intelligence officials have claimed that they actually get really good intelligence from following these social media accounts. But generally those voices aren’t heard as much. So it’s actually great to see FBI Direct James Comey (someone we rarely agree with) come out and say it directly: kicking ISIS members off Twitter makes things more difficult for law enforcement.

  • Transparency/Investigative Reporting

    • Indexing the Empire: How to Use Wikileaks’ Public Library of US Diplomacy

      “The Public Library of US Diplomacy,” or “PlusD,” is a very large and constantly expanding collection of internal documents from the US Department of State, published by WikiLeaks in a searchable archive. The library began in 2010 and at the time of writing contains 2,325,961 individual documents made up of about 2 billion words, spread over three collections of cables: Cablegate, the Kissinger Cables, and the Carter Cables. The State Department is the foreign affairs department of the US government and oversees the embassies and consulates of the United States all over the world. Each embassy or consulate corresponds with the State Department in Washington, DC, by sending daily telegram reports, or “cables,” between them, using a special electronic communications system.

      PlusD contains within it the WikiLeaks publication known as Cablegate: the collection of State Department cables published by WikiLeaks in 2010 and 2011. Cablegate itself consists of 251,287 cables, accounting for 261,276,536 words in total. If printed out in a standard-sized font, Cablegate alone would form a single line over 6,000 kilometers long — the distance to the center of the Earth. The cables are an average of 1,039 words long, revealing detailed internal information about the operation of 274 US embassies and consulates, and their activity within their host country.

  • Environment/Energy/Wildlife/Nature

    • How the Earth will pay us back for our carbon emissions with … more carbon emissions

      The really scary thing about climate change is not that humans will fail to get their emissions under control. The really scary thing is that at some point, the Earth will take over and start adding even more emissions on its own.

      A new study underscores this risk by looking closely at Indonesia, which has a unique quality — some 70 billion of tons of carbon that have built up in peatlands over millennia. In this, Indonesia is much like the Arctic, where even larger quantities of ancient carbon are stored in permafrost, and are also vulnerable.

    • Research Suggests Peat Fires In Indonesia Could Worsen Global Warming In This Century

      The really scary thing about climate change is not simply that humans may fail to get their emissions under control. It’s that at some point, the Earth could take over and start adding even more emissions on its own.

      A new study underscores this risk by looking closely at Indonesia, which has a unique quality – some 70 billion of tons of carbon that have built up in peatlands over millennia. In this, Indonesia is much like the Arctic, where even larger quantities of ancient carbon are stored in permafrost, and are also vulnerable.

      In each case, if that carbon gets out of the land and into the atmosphere, then global warming will get worse. But global warming could itself up the odds of such massive carbon release. That’s a dangerous position to be in as the world continues to warm.

      In the new study in Geophysical Research Letters, a team of researchers led by Yi Yin of the French Laboratoire des Sciences du Climat et de l’Environnement look at the potential of peat bogs in equatorial Asia – a region that includes Malaysia, Papua New Guinea and several other smaller countries but is dominated by Indonesia and some of its largest islands, Kalimantan and Sumatra – to worsen our climate problems. It’s timely, considering that last year amid El Niño-induced drought conditions Indonesian blazes emitted over 1.5 billion tons of carbon dioxide equivalents into the atmosphere. That’s more than the annual emissions of Japan (or, needless to say, of Indonesia’s fossil fuel burning).

  • Finance

    • Bitcoin makes inroads with new ATM in Kouvola

      A new Bitcoin ATM to be located in the southeastern city of Kouvola at the end of October will bring the number of such machines in Finland to nine. Officials say that because Bitcoin is a virtual currency that knows no borders, it’s difficult to estimate the number of users in Finland. Current guesstimates range from hundreds to tens of thousands.

    • Ericsson Slashes 3,000 Jobs in Sweden

      Ericsson AB said Tuesday that it plans to lay off nearly 20% of its home-country workforce, as the Swedish maker of telecom-network equipment races to cut costs amid intensifying competition from Chinese rivals and weak demand for its specialty wireless products.

    • Ericsson to slash about 3,000 jobs – up to 175 in Finland

      Some 175 Ericsson employees in Finland will be affected by the employer-employee negotiations that the Swedish telecom company announced it was starting on Tuesday.

      The company said that it plans to reduce up to 3,000 positions globally in production, research and development and sales and administration. Most of the personnel cuts will be made in Sweden.

      In a press release issued on Tuesday, Ericsson said that dismissals will be carried out using a combination of voluntary and forced reductions, as well as other measures, such as outsourcing.

      Altogether some one thousand of the affected employees work in Ericsson’s production unit, about 800 in research and development and around 1,200 in other departments.

  • AstroTurf/Lobbying/Politics

    • Tim Kaine brings Wall Street fundraising muscle to Clinton campaign

      Pundits were quick to point out the benefits Sen. Tim Kaine may bring Hillary Clinton as her running mate in helping win his home-and-battleground state of Virginia.

      But what flew under the radar was that Kaine may play a key role in helping Clinton raise money, especially when it comes to Wall Street.

      Clinton has proven herself a capable fundraiser, announcing nearly $90 million in contributions for the past month. The former secretary of state is a known quantity with Wall Street as well, having delivered speeches to banks and representing the heart of the financial services industry as a senator from New York.

      In the lead-up to Clinton’s pick of a running mate, the potential that she might choose Massachusetts Sen. Elizabeth Warren — who has made cracking down on banks a centerpiece of her agenda — had Wall Street ready to tighten its pockets for donations.

  • Censorship/Free Speech

    • After Facebook “censors” anti-Muslim posts, hate groups sue US gov’t

      In July 2016, an organization called the “American Freedom Defense Initiative” joined another group called Jihad Watch in suing US Attorney General Loretta Lynch. Both entities felt slighted by Facebook, Twitter, and YouTube.

      In their 25-page civil complaint, the two anti-Muslim activists and their respective organizations made a ludicrous argument. The groups claimed that as the country’s top cop, Lynch “enforces” Section 230 of the Communications Decency Act, a law that limits libel and other civil suits filed against websites, service providers, and other online publishers. However, the Communications Decency Act is a civil, rather than a criminal, statute.

      AFDI—which the Southern Poverty Law Center designated last year as an anti-Muslim hate group—is the same group that opposed the proposed Park51 Islamic center that was to be built two blocks from Ground Zero. In 2013, the AFDI’s co-founder, Pamela Geller, and her fellow co-founder, Robert Spencer (who also founded JihadWatch), were banned from entering the United Kingdom for their “extremist” views.

    • ‘The end of Trump’: how Facebook deepens millennials’ confirmation bias

      HBO host John Oliver achieved the destruction of Donald Trump on 29 February 2016. At least, according to the Daily Beast.

      Fansided, a popular social news aggregator, dates Trump’s destruction at 1 August while the Daily Good called it for 21 March. Salon found no fewer than “13 glorious times” that Oliver had destroyed the real estate tycoon.

      Sharp-eyed consumers of the news might note that it is impossible to, as the dictionary says, “put an end to the existence of something” more than a single time. But for #NeverTrump Facebook users who love any content they see as bringing Trump down a peg, the formulaic headline is indicative of the Facebook media landscape: the most shareable, clickable and likable content on the site aligns strongly with its readership’s pre-existing biases, assumptions and political affiliation.

      For millennials who have never known an election without Facebook, the political landscape of the social media network has massive implications for the upcoming contest between Hillary Clinton and Trump – not least of which because of Facebook’s outsized influence on their exposure to political news.

      Six out of every 10 millennials (61%) get their political news on Facebook, according to a survey conducted by Pew Research Center, making the 1.7 billion-user social behemoth (which includes more than 200 million in the United States) the largest millennial marketplace for news and ideas in the world. But within Facebook’s ecosystem exists a warren of walled gardens, intellectual biomes created by users whose interest in interacting with opposing political views – and those who are them – is nearly nonexistent.

    • Spare me the campus ayatollahs ruining my student life: An undergraduate’s fearless broadside against the joyless PC takeover of our universities

      The drunken travails of Kingsley Amis’s Lucky Jim — a shambolic junior academic — have long become a byword for the excesses of university life.

      Flirting, seduction and seeing how many pints you could fit in between lectures were once relatively harmless pastimes on campuses across Britain.

      Yet today, too many universities seem determined to nanny students who are deemed too fragile to be exposed to the rough and tumble of the real world.

      Consider the fact that, this week, it emerged that all new students arriving at Oxford and Cambridge are being asked to attend ‘consent classes’ aimed at preventing rape and sexual harassment at the universities.

      At Oxford, the courses are compulsory as part of freshers’ week, while the student union is urging rugby players to attend anti-sexism workshops to fight ‘lad culture’.

      At Cambridge, consent classes are also being held for freshers, with students of some colleges having to opt out if they don’t wish to attend.

    • Censorship turns up the volume
    • NO, HATE CRIME LAWS AREN’T CENSORSHIP – AND HERE’S WHY
    • Far-right Twitter and Facebook users make secret code to avoid censorship
    • Right-wingers and ‘free speech’ trolls devise secret internet language to dodge online censorship
    • White supremacy worms around censorship to create larger threats

      The alt-right has found a way to evade the censorship policies on social media platforms like Twitter and Instagram.

      The far, far, far-right hate group has begun using the names of Internet applications like “Yahoo” and “Google” as stand-ins for racial slurs and insults. This way, they can still congregate online to spread slander and white supremacy without the worry that their accounts will be flagged and deleted.

      This amount of hatred one group can have towards — seemingly — every population of non-white non-heterosexual people is flabbergasting.

      It’s hard not to feel helpless when trying to minimize the threat of a movement that is so dead-set on cultivating heinously racist views it feels it must re-code innocuous household words.

    • Eduardo Hernández Santos: Conflict, Censorship & the Male Body

      Following part one of his conversation with Lidia Hernández Tapia, Eduardo Hernández Santos talks about his groundbreaking early exhibitions, his recent series El Muro, and the “boom of the phallus” in Cuban art.

    • U.S. universities in China get academic freedom, but face internet censorship – report

      U.S. universities operating in China say they are given the freedom to teach what they like in class, but face restrictions such as internet censorship, according to a report by an independent, nonpartisan U.S. agency.

      In the recent report released by the Government Accountability Office (GAO), its survey of 12 U.S. universities found that while administrators had control over curriculum content, fewer than half of them had unrestricted access to the internet.

      For example, at one of the universities reviewed by GAO for the survey, users were unable to access Google’s search page and other sites that were available to users at other universities.

    • Propaganda and censorship remain China’s favoured tools of control

      Two recent court battles over historical facts have demonstrated how tight China’s ideological control is and how anxious the party leadership is about its legitimacy of rule.

      Two weeks ago, a Beijing court ruled against a popular blogger and a Hong Kong-based beverage company for mocking a Communist Party propaganda tale about a Korean war hero.

      And in August, a Beijing court upheld a libel ruling against a writer for two articles published in 2013 questioning certain details about five second world war heroes.

  • Privacy/Surveillance

    • Hackable Speed Cameras Highlight Risk Of Rush Toward IoT-Enabled ‘Smart’ Cities

      We’ve been talking at length about how the lack of security in the Internet of Things space is seen as a sort of adorable joke, but isn’t always a laughing matter. While the hillarious stupidity of some of the “smart” products flooding the market is undeniable, the reality is that the abysmal state of security in “IoT” devices (read: little to none) is creating millions of new attack vectors every year. And as Bruce Schneier recently warned, it’s only a matter of time before the check comes due, and these vulnerabilities contribute to hacking attacks on core infrastructure resulting in notable fatalities.

      Refrigerators that leak your Gmail credentials are one thing, but this looming calamity is going to be made notably worse by the rush toward “smart” cities. The same hardware vendors that can’t bother to secure their consumer-side hardware haven’t done a much better job securing the gear they’re shoveling toward cities under the promise of a better, more connected tomorrow.

    • AT&T Stops Charging Broadband Users Extra For Privacy

      A few years ago, AT&T came up with an “ingenious” idea: charge broadband consumers more money if they want to protect their privacy. Under this plan, users ordering AT&T’s U-Verse broadband service could get broadband for, say, $70 a month. But if you want to opt out of AT&T’s Internet Preferences program (which uses deep packet inspection to study your movement around the Internet down to the second) you’ll pay $30 to $50 more, per month. AT&T also made opting out as cumbersome as possible, knowing full well that few people would dare take the option.

      With its decision, AT&T effectively made user privacy a luxury option.

    • Subpoenas and Gag Orders Show Government Overreach, Tech Companies Argue

      It has been six months since the Justice Department backed off on demands that Apple help the F.B.I. break the security of a locked iPhone.

      But the government has not given up the fight with the tech industry. Open Whisper Systems, a maker of a widely used encryption app called Signal, received a subpoena in the first half of the year for subscriber information and other details associated with two phone numbers that came up in a federal grand jury investigation in Virginia.

      The subpoena arrived with a court order that said Open Whisper Systems was not allowed to tell anyone about the information request for one year.

      Technology companies contend that court-imposed gag orders are being used too often by law enforcement and that they violate the Bill of Rights. The companies also complain that law enforcement officials are casting a wide net over online communications — often too wide — in their investigations.

    • ShadowBrokers NSA Cyber-weapon Auction Generates Collective Yawn
    • Hackers find little demand for their stolen NSA hacking tools
    • Hacker group finds almost no takers for stolen NSA cyber tools
    • New Documents Reveal Government Effort to Impose Secrecy on Encryption Company

      When it comes to this country’s courts, longstanding practice, history, and the Constitution make clear that openness—of doors, of evidence, of arguments, of opinions—is the rule. Like the First Amendment’s guarantee of freedom of speech, that rule is not absolute. But it puts in place a default, one that forces those who want to keep court proceedings secret to show, in each case, that secrecy is warranted—and that the need for secrecy overcomes the traditions and values of openness that animate the default rule in the first place.

      But in far too many cases across the country, the government appears to have reversed the presumption that the First Amendment establishes, opting to keep secret information about its demands for private data where transparency is required and would serve the public good.

    • Feds Gagged Encrypted Communications Firm Open Whisper Systems Over Massively Overbroad Subpoena

      This morning the ACLU announced that it had convinced the government to remove a ridiculous gag order on a subpoena that had been sent to Open Whisper Systems, the makers of the popular Signal encrypted messaging app, and whose encrypted communication protocol is used by many others, including WhatsApp, Facebook and Google for their encrypted messaging offerings. It’s not that surprising that a grand jury would issue a subpoena to Open Whisper Systems demanding “subscriber name, address, telephone numbers, email addresses, method of payment, IP registration, IP history logs and addresses, account history, toll records, upstream and downstream providers, any associated accounts acquired through cookie data, and any other contact information from inception to the present” for certain accounts being investigated. But, of course, Open Whisper Systems has basically none of that data.

    • Decentralise (in a kind of centralised way)

      Once a month I am involved in running an informal session, loosely affiliated with Open Rights Group and FSFE, called Cryptonoise. Cryptonoise explores methods for protecting your digital rights, with a leaning towards focusing on privacy, and provides a venue for like minded people to meet up and discuss the state of the digital landscape and those that may try to infringe on the rights of digital citizens.

      We’ve all made it easy for large enterprises and governments to collect masses of data about our online activities because we perform most of those activities in the same place. Facebook, Google and Twitter spring to mind as examples of companies that have grown to dangerous sizes with little competition. This is not paranoia. This is real. We make it a lot more difficult when we spread out.

    • Surprise! Millennial office workers love email [Ed: Overreliance by young people on unencrypted communications]

      Millennials hate email, and they will finally kill this business scourge — or so you would think from popular discussions on the topic. But do a little research, and you discover that millennials not only don’t hate email, they use it more than any other age group.

      Yes, the text-obsessed and social-media-loving millennials are addicted to email, a recent survey of 1,004 mobile-using American office workers by Adobe Systems has found. Millennials (born between 1981 and 2001) check their email more often than any other group — even more than Gen X (born between 1961 and 1981) and baby boomers (born between 1947 and 1961) for whom email is the mainstay business communication method.

    • Bulk surveillance review is ‘fiction’, claims former NSA technical director

      Former NSA technical director Bill Binney talks about the Investigatory Powers Bill and the UK government’s independent review of bulk surveillance powers

    • Yahoo ‘secretly monitored emails on behalf of the US government’

      Some surveillance experts said this represents the first known case of a US internet company agreeing to a spy agency’s demand by searching all arriving messages, as opposed to examining stored messages or scanning a small number of accounts in real time.

    • Yahoo Secretly Scanned Users’ Emails For The NSA and FBI: Report

      Reuters says that U.S intelligence officials were searching for a specific set of characters within Yahoo emails, but it is unknown what exactly they were looking for. Reuters also reports that the order to search user emails came in the form of a “classified directive” sent to Yahoo’s legal team.

    • How American Companies Enable NSA Surveillance

      Without the cooperation of American companies — both voluntary and compelled — the National Security Agency’s system of mass surveillance simply would not have been possible. And on Tuesday, Reuters added the name of yet another American corporate giant to the list of those who have made it possible for American intelligence to intercept huge troves of information: Yahoo.

      According to the news service, the American internet giant designed custom software to filter its users’ emails according to a set of search terms, and deliver those messages to the NSA. The decision to enable NSA surveillance was reportedly made by CEO Marissa Mayer and without the knowledge of the company’s security chief, who quit in protest when he learned of the program.

    • Google and Microsoft Not Part of NSA Email Scanning Tied to Yahoo

      The details of the Yahoo email surveillance program, reportedly installed in 2015, are still emerging, but they immediately raise questions about whether other companies are participating as well. So far, four tech giants say they are not.

      “We’ve never received such a request, but if we did, our response would be simple: ‘no way’,” said a spokesperson from Google in response to a query about whether the NSA asked the company to build similar custom software to scan Gmail.

    • Yahoo Secretly Built Software To Scan All Emails Under Pressure From NSA Or FBI

      So Reuters has big exclusive report this morning about Yahoo creating “custom software to search all of its customers’ incoming emails for specific information” at the behest of the NSA or FBI. This was built last year — which came well after the Snowden disclosures, and after Yahoo had been revealed to have legally challenged earlier NSA dragnet attempts — and after it had rolled out end to end encryption on email.

      Apparently, this was a decision made at the top by Marissa Mayer, and pissed off the company’s top security guy, Alex Stamos (who is awesome and a big supporter of end-to-end encryption) leading him to leave the company (and move to Facebook, where he is currently).

    • Exclusive: Yahoo secretly scanned customer emails for U.S. intelligence – sources

      Yahoo Inc last year secretly built a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials, according to people familiar with the matter.

      The company complied with a classified U.S. government demand, scanning hundreds of millions of Yahoo Mail accounts at the behest of the National Security Agency or FBI, said three former employees and a fourth person apprised of the events.

    • Delete Your Yahoo Account

      There’s no good reason to have a Yahoo account these days. But after Tuesday’s bombshell report by Reuters, indicating the enormous, faltering web company designed a bespoke email-wiretap service for the U.S. government, we now know that a Yahoo account is a toxic surveillance liability.

      Reuters’s Joseph Menn is reporting that just last year, Yahoo chose to comply with a classified “directive” to build “a custom software program to search all of its customers’ incoming emails for specific information provided by U.S. intelligence officials” — the NSA in particular.

    • Yahoo! spied on users’ email at spy agencies’ behest: report

      Yahoo! searched all its users’ emails using a specially built program in order to try and locate specific information demanded by American intelligence officials, according to a Reuters report.

      The company, which was bought by Verizon in July for US$4.83 billion, agreed to scan all mail accounts in line with a classified directive from the US government, Reuters said, citing two former Yahoo! workers and a third person who had been informed about it.

      The directive came from the NSA or the FBI, the sources said.

      What the spy agencies were after was not specified by the sources, who said only that they had asked Yahoo! to search for a set of characters.

      Reuters said it had not been able to determine what kind of data, if any, was handed over to the spooks, and if other email providers had been confronted with similar demands.

    • Yahoo Reportedly Scanned Millions of Email Accounts for Intelligence Agencies

      Yahoo reportedly scanned hundreds of millions of email accounts at the behest of U.S. intelligence or law enforcement. The scans, reported by Reuters, allegedly selected incoming messages that contained a string of unknown characters.

      Yahoo did not deny the report, saying only that it is a “law abiding company, and complies with the laws of the United States.”

      According to the Tuesday report, Yahoo acceded to a 2015 government directive to give email access to the National Security Agency or the FBI. Reuters cited anonymous sources including two former employees and another person with knowledge of the events.

    • Yahoo ‘secretly scanned emails for US authorities’

      Yahoo secretly scanned millions of its users’ email accounts on behalf of the US government, according to a report.

      Reuters news agency says the firm built special software last year to comply with a classified request.

      “Yahoo is a law abiding company, and complies with the laws of the United States,” the tech firm said in a statement provided to the BBC.

      The allegation comes less than a fortnight after Yahoo said hackers had stolen data about many of its users.

    • Are smart toys spying on kids and stealing their imagination?

      Last weekend, I saw my first Christmas ad. And what a Smart Christmas it will be, judging by the haul on offer. Over the past year, companies have been teasing the various connected must-haves for the holidays: bots that can respond to kids’ questions and movements, and capture audio and video; an imitation smartwatch that chats with other devices over Bluetooth; not to mention the Barbie Hello Dreamhouse, a pink-and-white smart house for the iconic doll.

      Not everyone is excited about the intelligence creeping into kids’ toys. Privacy activists and developmental psychologists have objected on grounds ranging from security and privacy to fundamental worries about the nature of play. So should you be crossing these gadgets off your list? Or is this just a new variation on a familiar old song?

      As it happens, Barbie was at the centre of the last big smart toy brouhaha. Hello Barbie, perhaps 2015’s most controversial toy, could hold court on a wide range of topics – from fashion and family to dreams and paddleboarding. “Did you know that butterflies live everywhere in the world except Antarctica?” she might say, before confessing in a less guarded moment to “daydreaming about cupcakes”.

  • Civil Rights/Policing

    • Islamic communities contain ‘tsunamis of atheism’ that are being suppressed, says leading ex-Muslim

      Thousands of ex-Muslims in Britain are living in fear of violent revenge for abandoning the Islamic faith while others are afraid to admit they no longer believe, a support group for ex-Muslims has said.

      Maryam Namazie, founder of the Council of Ex-Muslims of Britain, described a “tsunami of atheism” in Muslim communities and urged that more needs to be done to recognise the dangers often faced by those who choose to renounce their faith.

      Speaking ahead of the release of Exposure, an ITV documentary that explores the lives of ex-Muslims faced with abuse and discrimination, Ms Namazie told The Independent: “There is a large group of people who are not seen and heard. Many young people living in Britain have left Islam and are facing huge ostracisation and isolation from their communities as a result.

    • State Appeals Court Says Not Just Any Nonexistent Law Can Be Used To Initiate Traffic Stops

      The US Supreme Court issued law enforcement fishing licenses with the Heien decision. Vehicle stops no longer needed to be predicated on legal violations. (If they ever were…) Law enforcement officers were no longer required to know the laws they were enforcing. The Supreme Court’s decision combined reasonable suspicion with an officer’s “reasonable” grasp of moving violations, further deteriorating the thin Fourth Amendment insulation protecting drivers from suspicionless, warrantless searches.

      With the standards lowered, officers can now stop anyone for almost any reason, provided they can make the justification stated in their report sound like a reasonable approximation of what they thought the law was, or what they wanted the law to be. (The Supreme Court’s Rodriguez decision still allows for bogus traffic stops. It just puts a highly-subjective time limit on the fishing expedition.)

      The Supreme Court’s case originated in North Carolina. Oddly enough, further down the judicial food chain, a North Carolina state appeals court has just suppressed evidence based on a traffic stop with no legal basis. (h/t The Newspaper)

      Antwon Eldridge was pulled over because his vehicle was missing the driver’s side mirror. This led to a search of his vehicle and the discovery of crack and marijuana. But the reason for the stop failed to hold up in court, even with the Heien decision in place.

  • DRM

    • HP Issues Flimsy Mea Culpa For Recent Printer Cartridge DRM Idiocy, But It’s Not Enough

      A few weeks ago we noted how HP had effectively delivered a DRM time bomb in the form of a software update that, once detonated, crippled customers’ ability to use competing third-party print cartridges in HP printers. While such ham-fisted behavior certainly isn’t new, in this case HP had actually first deployed the “security update” to its printers back in March — but didn’t activate its stealthy payload until last month. Once activated, the software update prevented HP printers from even detecting alternative ink cartridges, resulting in owners getting a rotating crop of error messages about faulty cartridges.

      HP customers were obviously annoyed, and the EFF was quick to pen an open letter to HP, quite correctly noting that HP abused its security update mechanism to trick its customers and actively erode product functionality. Ultimately HP was forced to respond via a blog post proclaiming the company was just “dedicated to the best printing experience” and wanted to correct some “confusion” about its DRM sneak attack. In short, HP strongly implied it was just trying to protect consumers from “potential security risks” (what sweethearts)…

  • Intellectual Monopolies

    • Trademarks

      • Taco John’s Continues To Wage A Long-Lost Trademark War To Keep ‘Taco Tuesday’ From Becoming Generic

        Way back in 2010, Mike wrote about how the Taco John’s restaurant chain had threatened a small restaurant in Oklahoma for daring to use the phrase “Taco Tuesday” in a promotion for cheap tacos on…you know…Tuesdays. Taco John’s did indeed have a trademark on the term in 49 of our 50 states, with the exception being New Jersey, because life is strange. The question at the time, as tends to be the question in most trademark disputes, was whether or not there was any potential customer confusion to worry about. Given the somewhat descriptive nature of the phrase, not to mention its widespread use both commercially and in common parlance, the whole thing seemed rather silly.

        Six years does little to change things, it seems. Taco John’s recently fired off a cease and desist notice to the Old Fashioned Tavern and Restaurant in Wisconsin for using the phrase.

      • The Trademarking of “Taco Tuesday”

        When the owners of the Old Fashioned Tavern and Restaurant received a cease and desist letter demanding they stop holding Taco Tuesdays, they thought it was a joke.

        For almost a decade, the restaurant had sold $2 tacos on Tuesday night. Other restaurants and bars in the area had similar promotions, and in cities like San Francisco and Los Angeles, Taco Tuesday specials are as plentiful as yoga classes.

        But the author of the letter claimed that “Taco Tuesday” was a federally registered trademark that belonged to Taco John’s, a chain of around 400 Mexican-style fast food restaurants. And as Old Fashioned manager Jennifer DeBolt told the local Cap Times, they quickly realized that “the law firm is completely legit.”

      • Following Coverage Of Trademark Dispute, Lawyer Demands Image On News Story Be Taken Down As Infringing
    • Copyrights

      • Judge: Vague IP-Address Evidence is Not Enough to Expose BitTorrent ‘Pirates’

        While relatively underreported, many U.S. district courts are still swamped with lawsuits against alleged film pirates.

        The copyright holders who initiate these cases generally rely on an IP address as evidence. This information is collected from BitTorrent swarms and linked to a geographical location using geolocation tools.

        With this information in hand, they then ask the courts to grant a subpoena, forcing Internet providers to hand over the personal details of the associated account holder.

        In most cases, courts sign off on these subpoenas quite easily, but in a recent case California Magistrate Judge Mitchell Dembin decided to ask for further clarification and additional evidence.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts