07.07.14
Posted in GNU/Linux, Kernel, Microsoft, Patents at 4:50 pm by Dr. Roy Schestowitz
The FAT police is at it again
Summary: Canon and Microsoft sign a patent deal which relates to patents on FAT file systems and impacts some of Canon’s products, potentially Linux products as well (Canon makes drivers for Linux but does not develop products with Android or GNU/Linux just yet)
While we are unaware of any Android- or Linux-based products from Canon, the company does deliver drivers for FOSS platforms, especially since under a decade ago (we covered this quite often at the time of a turnaround). Therefore it is regretful to learn about FAT patents, which were disgraced by entities and people including Torvalds (there is prior art and TomTom never pushed the case to the end), are used to tax Canon products or legitimise FAT patents.
Linux-centric sites hardly paid attention to it last week, but someone in IRC told us about it. Looking it up very quickly we found Microsoft’s booster Mary Jo Foley at ZDNet saying: “Today’s patent agreement isn’t the first forged by the two companies. Canon previously licensed Microsoft exFAT file system technology for an undisclosed amount.”
Sometimes companies pay for it via Microsoft partners such as Tuxera, but sometimes there are deals like this one. The OIN’s CEO told us over the telephone that Microsoft has been using FAT patents while calling them “Linux-related” or something along those line in the case of LG and maybe Samsung also (Samsung’s deal seems to have been broader than that the second time around).
Nikon's deal with Microsoft was quite different and the booster correctly pointed out: “Today’s agreement also is not part of Microsoft’s ongoing campaign to convince companies using Linux, Android and ChromeOS to license its patents. Nikon announced an Android-related patent licensing deal with Microsoft in February 2013.”
This is not entirely true because the deal practically serves to legitimise exFAT, which is a common attack vector on embedded Linux. The post from the booster (hogwash of sorts) attracts comments from Microsoft sceptics, who know a lot better what Microsoft has been up to. There are comments such as: “Do we need a repeat of FAT? If I see a product’s filesystem using exFAT I will return it.”
Another person says: “The fact the the US Supreme Court recently re-addressed software patents is a move in the positive direction, even though it was not a large move. While much damage has already been done since these huge giants like Microsoft and IBM already have an enormous software patent portfolio, at least there is hope in future software patent releases. Eventually, technology will advance forward and the current software patent portfolios will probably start to become stale, at which point I can see the general public begin to feel the advantages if we make the right decisions today moving forward. But, we must end the monopolies that this huge companies get with their enormous patent portfolios. The trend in software patents granted within the past 30 years or so is staggering, just do some searches on this subject as it is well worth the reads. My hope is that we don’t continue to make the same mistakes moving forward.”
Canon has many patents on physical and mechanical or optical things like lenses. Microsoft has mostly software patents, which may be utterly worthless in the eyes of SCOTUS, as opposed to the USPTO that granted them without scrutiny. The USPTO has just become even more zealous about patents and it approves almost every patent application, even though SCOTUS deems many of those patents too abstract to be patentable (patent lawyers don't quite agree).
Carl Erickson, the “co-founder and president of Atomic Object, a software design and development company founded in 2001,” (based on his introduction) says that “Investors in software startups need to understand that such companies are unlikely to have strong IP protection through patents. Instead, investors should look for evidence of engaged, delighted users, significant market share or the potential for rapid growth, exclusive relationships or special market channels. For a software startup and their investors, these will beat patent pending, any day.”
His whole analysis, however, sometimes (in the text) claims that patents too are needed, with phrases such as:
As I wrote in my last post, protecting your intellectual property isn’t just about patents. It’s important for companies to ensure they own the copyright on their software.
Copyright protects a particular expression, patents protect an idea. The nature of software is such that an idea can be implemented in many different ways, in many different languages, and therefore patent protection on an idea is potentially legitimate and important. So when should you worry about a software patent?
If you’re confused by software patents, you’re not alone. While our legal and business structures will eventually adapt, technology, as usual, is moving faster, and the results aren’t always good or predictable. A recent Supreme Court decision didn’t radically alter the status quo, but reinforced a trend away from some of the sillier past decisions.
Software patents should be dragged to courts and defeated there. There is a valuable precedent now. All these FAT patent deals (Microsoft has been signing them for years) may be as valuable as estate on the Mars. █
Permalink
Send this to a friend
Posted in News Roundup at 4:17 pm by Dr. Roy Schestowitz
Contents
-
There’s an old quote from Jamie Zawinkski that goes: “Some people, when confronted with a problem, think ‘I know, I’ll use regular expressions.’ Now they have two problems.” Even people like me who like regular expressions laugh at the truth in that quote, because we’ve seen the consequences when someone doesn’t think through the implications of a poorly written pattern. When some people write a bad pattern, they end up with extra lines in a log file. When the NSA does it, they capture and retain Internet traffic on untold numbers of innocent people.
-
-
-
Kernel Space
-
Linus Torvalds has done another traditional Sunday afternoon development release of the Linux kernel. We’re now just a few weeks out from seeing the release of Linux 3.16.
Released just a few minutes ago was Linux 3.16-rc4. Merged over the past week was just the usual assortment of bug/regression fixes with nothing too major standing out from my Git watching of the code; Linus has yet to send out his official 3.16-rc4 announcement with his few remarks. The 3.16 activity to point out though from the past week for Phoronix readers would be Radeon DRM going for BAPM by default.
-
Greg Kroah-Hartman announced yesterday, July 6, that a new maintenance release for the Long Term Support 3.4.97 Linux kernel branch of the Linux kernel is available for download, urging users to upgrade to it as soon as possible.
-
Linus Torvalds has done another traditional Sunday afternoon development release of the Linux kernel. We’re now just a few weeks out from seeing the release of Linux 3.16.
-
Greg Kroah-Hartman has announced the immediate availability for download of the Linux 3.10.47 LTS (Long Term Support) kernel, along with the Linux kernels 3.4.97 LTS, 3.14.11 LTS and 3.15.4.
-
Samuli Suominen of Gentoo expressed some hesitation about this change, “I’d really hate to be forced to fork (or carry huge patchset) unnecessarily (I’m not a systemd hater, I’m not a eudev lover, I’m simply working on what is provided to me by *you*, udev upstream).” Lennart countered, “Oh god. You know, if you come me like this as blame me that I would ‘force’ you to do something, then you just piss me off and make me ignore you. Anyway, as soon as kdbus is merged this i how we will maintain udev, you have ample time to figure out some solution that works for you, but we will not support the udev-on-netlink case anymore. I see three options: a) fork things, Cool live with systemd, c) if hate systemd that much, but love udev so much, then implement an alternative userspace for kdbus to do initialiuzation/policy/activation. Also note that this will not be a change that is just internal between udev and libudev. We expect that clients will soonishly just start doing normal bus calls to the new udev, like they’d do them to any other system service instead of using libudev. Good luck.”
-
-
“I’m going to be maintaining the 3.14 kernel as a ‘longterm’ kernel for the next two years, so mention that on the kernel.org site,” Greg Kroah-Hartman said in a short email on July 3, 2014…
-
-
Cisco earlier this year unveiled its plans to build smarter routers and switches to help manage the massive flows of data expected between Internet-connected devices and the data center. This re-architecting of the Internet to bring computing capabilities to the edge of the network is what the company calls “fog computing” and it could help alleviate the data center strain that Gartner analysts predict will come from 26 billion installed units in the Internet of Things by 2020.
-
Benchmarks
-
The Deepin Desktop Environment is written using Google’s Go language and makes use of heavy HTML5. DDE also uses Compiz as its compositing window manager. As in the past some desktop environments / window managers have impaired the full-screen Linux gaming performance, I ran some simple Linux gaming benchmarks on Sunday to see if the Deepin 2014 performance differed at all from upstream Ubuntu 14.04 LTS. Ubuntu 14.04 was tested with the stock Unity 7.2 desktop using Compiz, GNOME Shell 3.10.4, and Xfce 4.10 all from the stock Trusty Tahr archive.
-
Applications
-
-
-
Docker isn’t actually everywhere, but the open source software designed to allow a Linux application (and its dependencies) to be packaged as a container has enjoyed massive success recently.
-
-
Instructionals/Technical
-
Games
-
ots of reports across the interwebs recently are about Crytek the creators of CRYENGINE being in financial trouble. They are the developers bringing the new Homefront: The Revolution FPS game to Linux.
I held off writing about this previously as it seemed a bit iffy with rumours coming in about Crytek being in some sort of trouble, but now there are reports of Crytek’s UK based office having workers not being payed for some-time and now around 100 staff members walking out of work and not coming back. This is very sad news and I cannot think of any other reason for staff not getting paid other than Crytek really being in trouble.
-
-
There is no questioning the power of Unreal Engine 4, but Linux users so far had nothing official to test this awesome engine.
However, the wait is finally over, as Epic’s Unreal Engine 4 has officially received its first batch of demos for the users of Linux.
The demos introduced to the operating system include the Elemental Demo, Effects Cave Demo, Realistic Rendering Demo, Reflections Subway Demo, Mobile Temple Demo, Sci-Fi Hallway Demo, Stylized Demo and Blueprint Examples Demo.
-
Linux seems to be finally becoming a viable gaming platform. That brings us into uncharted territories and we start to discover some deficiencies which were solved on other platforms a long time ago. One of those is GPU-based screen scaling.
-
Linux developers and fans of Unreal Engine 4 have started offering compiled builds of several UE4 tech demos and some simple games for 64-bit Linux.
-
Lets’ be honest, there’s a hidden child in every one of us that love Dinosaurs, be it the formidable Tyrannosaurus Rex or the mild Brontosaurus, we all have a dinosaur that we would love to have. Developers 800 North seems to have heard just that wish of us and brought it to reality with their Multiplayer shooter Dino D-Day. What’s more, Bundlestars have teamed up with PC Gamers to give away a million copies of the game on Steam for free!
-
Desktop Environments/WMs
-
This weekend marked the release of Deepin Linux 2014 along with the Deepin Desktop Environment 2.0 release that’s powered using HTML5. In my testing of the release today, it’s been working fairly well and is proving to be quite interesting.
-
-
Deepin, a Linux distribution that tries to provide users with a unique, stable, fast, safe, and user-friendly desktop experience based on the latest HTML5 technologies, has reached version 2014 and is available for download from Softpedia.
Key features of Deepin 2014 include support for multiple languages, 10 in total, which are fully integrated in the ISO image, the brand new Deepin Desktop Environment 2.0 with its amazing theme, starter Chinese phonetic search, intuitive hot zone settings, and a user guide, Deepin Control Center app, and new in-house built applications, such as Deepin Movie, Deepin Boot Maker, and Deepin Translator.
-
Generally speaking, I enjoyed my time with LXLE. The distribution got off to a good start with a smooth installation process and the project features clear documentation and release notes, letting people know exactly what to expect from the distribution. I like the LXDE desktop as I feel it does an excellent job of balancing user friendliness, performance and features. The LXLE feature which allows us to change the look of our desktop session is a nice bonus and may make it easier for Linux newcomers to navigate the LXDE interface. The distribution ships with a lot of great desktop applications, almost all of them worked well for me. I feel that most people will be able to sit down and just start using this distribution without worrying about configuring software or downloading additional applications. The interface was responsive, the distribution doesn’t use a lot of memory (even with preload enabled) and all of my hardware was handled properly.
-
Moonlight v0.5 Alpha is the first release and its aimed at hackers and developers wishing to forward their dream of “a simple, lightweight, functional and beautiful desktop environment.” Moonlight is written against the Qt5 tool-kit and the desktop environment is designed to be very modular. Moonlight shares some goals and code with the LXQt lightweight desktop project.
-
K Desktop Environment/KDE SC/Qt
-
I’ve been wondering for quite some time though how the state of Plasma Next is when it comes to accessibility. In this case accessibility is mostly how the applications and desktop shell expose semantics to the accessibility framework via an API (on Linux the beast is called AT-SPI, a DBus API). The goal is that assistive technology such as a screen readers (Orca), the screen magnifier, or Simon can pick up what’s going on and assist the user. This allows for example blind people to use the software. The big thing here is that while Qt never had good support for QGraphicsView accessibility, we plowed away at making things work well with Qt Quick. This afternoon I finally got around to looking at the next iteration of the KDE desktop for real. In fact I’m writing this in a running Plasma Next session on top of the frameworks 5 libraries. It feels a bit like the porting from KDE 3 to 4, except that most things seem to just work so far.
-
-
The first feature is function call-tips, that display the signature of the current function (or functions, if they are nested) as you type. This way, you can see the name and the type of the arguments, which can be very useful. This feature is available in Javascript and QML, and my example is, in fact, a QML code snippet.
-
KDE Frameworks 5 is due out today, the most exciting clean-up of libraries KDE has seen in years. Use KDE classes without brining in the rest of kdelibs. Packaging for Kubuntu is almost all green and Rohan should be uploading it to Utopic this week.
-
KDE Frameworks 5, the next-generation version of the KDE Platform that is more modularized than the former kdelibs, is expected to be released on Tuesday after it was originally scheduled for release back on 1 July. The official release of KDE Plasma 5 is meanwhile expected around the middle of the month (15 July). Details on some of the KDE Frameworks 5 changes can be found via the KDE Wiki.
-
GNOME Desktop/GTK
-
-
Today I reached a new milestone. The last animations has been finished and I can now render out a full-fledged video about GNOME’s documentation efforts.
-
-
It appears that DistroWatch went down because of some kind of account issue with its web-hosting provider. This would not be the first, nor last, time an important site went down because of a simple payment problem. The website’s last update, a listing for the new version of Scientific Linux, was posted on July 4th.
-
New Releases
-
François Dupoux had the pleasure of announcing on July 7 that a major release of his popular SystemRescueCd Linux operating system designed for rescue and recovery tasks has been made available for download.
-
Zbigniew Konojacki announced the stable release of the 4MLinux 9.0 Allinone Edition operating system, which includes the 4MLinux 9.0 Media Edition, 4MLinux 9.0 Game Edition, 4MLinux 9.0 Rescue Edition, and 4MLinux 9.0 Server Edition distributions.
-
Today we are pleased to announce the release of Black Lab Linux for Enterprise 5.0.3 and Black Lab Linux for Education 5.0.3.
-
-
Screenshots
-
Red Hat Family
-
The first Alpha version of the upcoming Scientific Linux 7 operating system was announced by Pat Riehecky a few days ago on the mailing list for Scientific Linux developers worldwide. The release is based on the publicly available sources of the Red Hat Enterprise Linux 7 distribution.
-
Just announced in the last few hours, CentOS 7 for x86-64 has arrived. This is the first release under the new arrangements since Red Hat reversed into CentOS, leaving the distro independent but hiring a number of key players. Apart from this being a rapid arrival for a major new release, the announcement notes that they aim to get future updates heading out within 24-48 hours of release. There’s a new versioning system too, so this is Cento 7.0-1406,14/06 being June 2014, when Red Hat released RHEL 7.0 and the code base that this release of CentOS was built on. There’s torrents available for the DVD ISO, “Everything”, GNOME Live (the announcement has a malformed link for that.
-
As expected, CentOS, the popular Red Hat Enterprise Linux (RHEL) clone, which now works hand-in-golve with Red Hat, will be releasing CentOS 7 on Monday — less than a month after RHEL 7 was released.
-
-
-
-
Debian Family
-
Derivatives
-
Canonical/Ubuntu
-
-
The Ubuntu development team announced a couple of days ago, on July 5, in a security notice that they have updated the Linux kernel packages on the Ubuntu 10.04 LTS (Lucid Lynx), Ubuntu 12.04 LTS (Precise Pangolin), and Ubuntu 14.04 LTS (Trusty Tahr) operating systems, fixing a security issue that was found recently in the upstream Linux kernel packages.
-
Operating System U, the newest distribution out there that plans for commercial opportunities with laptop pre-loads and is powered by Arch Linux and Wayland, is now soliciting development ideas from the community.
-
-
Now this is definitely an interesting statistic no matter how you look at it – Ubuntu Touch, a mobile operating system platform that is ready, technically speaking, for a commercial release, has already hit the 100,000 app downloads mark. While this is far too small compared to the 1 billion downloads that Temple Run has achieved earlier this year, one ought to take into consideration that Ubuntu Touch itself has yet to ship on any other devices to date.
-
Dubbed Ultimate Edition 4.2 Lite, the brand new release of this Linux-based operating system is now derived from the Ubuntu 14.04 LTS (Trusty Tahr) distribution and uses MATE 1.8.0 as its default desktop environment.
The good news is that Ultimate Edition 4.2 is now an LTS (Long Term Support) release and will be supported with security patches and software updates until year 2019.
-
Trust in government is not exactly at an all-time high. Sure, there are oppressive governments such as Iran and China that filter and block web content, but even the USA has a spotty record. With all the news of PRISM and other spying programs, it is hard to tell which way is up anymore.
One way to solve this dilemma is through transparency and honesty. Unfortunately, as long as governments use closed-source software, it is hard to audit and trust the actions. Today, Canonical announces that not only has Munich taken an open approach to computing with Ubuntu, but the city is saving millions of euros too. Using open-source software and saving money? Hell, maybe all governments should make the switch to Linux.
-
Canonical’s Mir display server for Ubuntu Linux has cleared Mir 0.4.0 for Ubuntu 14.10 “Utopic” while Mir 0.5 is immediately under development.
-
-
When it comes to operating systems, Linux® is perhaps the world’s most popular open source OS. Linux has been running on thousands of MIPS devices that have shipped in very large volume (north of several billions of units).
-
-
Let’s face it: most automakers are notoriously bad at creating competent infotainment and navigation systems. This really is the case, with the few good ones out there representing the exception. A number of factors make this true, and in short, it’s basically down to costs, allocated development budgets and a general lack of deep knowledge and experience in the field on their part.
-
Priced at just £5, the kit comes with everything you need to have fun with basic electronics projects, including a tin to keep it all in. If it is successful, there will be more CamJam EduKits, the first of which will use sensors to detect temperature, light levels and movement. Profits from the kits will be donated to the Cambridge Raspberry Jam to continue both its educational and community work.
-
Phones
-
Ballnux
-
sAndroid is best known for its customizability. By installing a simple app, you can completely change the look of your smartphone. When compared to its competitor iOS, Android is miles ahead in this department. Despite the fact that the new iOS 7 offers a look that one finds hard not to drool over, Android users can imitate the flat-looking UI in a matter of seconds. In fact, we even wrote a whole article in helping you get that clean iOS 7 look.
-
Android
-
All the talk recently has been around Google’s new Android L operating system and when it will be released. We recently reported on some of the features of L which had been leaked and made available to download. We also advised last week of an L based Keyboard app which was also available to download which emulated the L keyboard expected sometime later in the year.
-
It has barely been two weeks since I/O and L’s official introduction and we have seen a crazy influx of ported L features. Today though we are able to bring you the very first (that we know of) working prototype of L. This was created by some of the developers over at xda and (as of print) seems to be on the whole working to a good degree.
-
At or around the time the Android L release comes out this fall, this means your phone and your Chromebook are going to be able to share even more stuff than they already do. If you have your phone with you, it can unlock your Chromebook (and if you have your smartwatch with you, it can unlock your phone). If you get a call or a text or your battery is running low, you’ll be told about it on your Chromebook. Some Android apps are even going to be able to run in Chrome OS, though Google didn’t talk much about the technical details.
-
When Android itself first arrived, it took some time succeed as well, as I noted in a post on OStatic back in 2009. Then, almost no phones shown at Mobile World Congress ran the platform. Since then, Google has shown that it can create strong markets for open mobile platforms.
In all likelihood, we’ll see Google offer incentives for developers to rally around Android Wear, and incentives for buyers. There, too, Google has prior experience, as it has incentivized users and developers surrounding both Android and Chrome OS.
-
Lamassu which has revolutionized the in-person acquisition of Bitcoin via a streamlined thirty-second process earlier introduced a modular two-Bitcoin ATM system; has now brought in Rakía, a brand-spanking-new open source back-end system for its ATMs. The decision is aimed to continue providing A better experience for its clients.
-
Recent reports from Facebook and Google confirmed what we’ve known all along: the giants of tech have a diversity problem. But in the world of open source, the problem is even worse.
According to a survey conducted last year, only about 11 percent of open source contributors are women. Meanwhile, women account for 23 percent of all computer programmers and 39.5 percent of web developers, according to the Bureau of Labor Statistics.
-
-
We’re thrilled to announce Oculus Connect, a developer conference that brings together engineers, designers, and creatives from around the world to share and collaborate in the interest of creating the best virtual reality experiences possible.
-
The company announced today that it is acquiring RakNet, which specializes in a software-development engine for connecting games across an online network. RakNet, which is also the name of the technology, enables studios to quickly add voice chat, network patching, and secure connections to their products. Oculus VR, which is building its Oculus Rift virtual-reality headset, notes that thousands of indie developers and major companies like Everquest developer Sony Online Entertainment and Minecraft studio Mojang licensed the tech for their games. Oculus isn’t just purchasing RakNet, it is also making it open source, which means other developers can see the code, add to it, and use it for free.
-
Mellanox® Technologies, Ltd. (NASDAQ:MLNX), a leading supplier of high-performance, end-to-end interconnect solutions for data center servers and storage systems, today announced that Ethernet Switch MLAG functionality is now available as open source as part of the community driven Open Ethernet program. MLAG provides the ability for a host to connect to two standalone switches with a pair of load balanced bonded interfaces. Now open and freely available, the MLAG functionality allows for faster failure recovery. The open source code is available at https://github.com/open-ethernet/mlag and can be installed and run on a Linux host.
-
Open Xchange acts as an open-source rival to Microsoft’s Office 365. With more companies moving to open source, we ask Mr Laguna if he believes that Microsoft’s proprietary system is viable.
-
Georgia Tech researchers enlist owners of websites — and website users — via Encore project
-
Web Browsers
-
Mozilla
-
While Mozilla was mostly in the headlines during the early part of this year for news related to Brendan Eich and for the company’s newfound focus on smartphones and Firefox OS, another piece of meaningful news regarding the company is largely being ignored: In April, Google Chrome moved past Firefox to take second place in desktop browser market share, according to web traffic stats from Net Applications.
-
Funding
-
As for open source, I think that the electronics world has been proprietary for a very long time, but open source is taking its hold, and will eventually play a huge role, just like it does in software. The Internet is built on open source underpinnings like GNU/Linux, and I hope that soon the hardware world will be too.
-
BSD
-
The third RC build of the 9.3-RELEASE release cycle is now available on the FTP servers for the amd64, i386, ia64, powerpc, powerpc64 and sparc64 architectures.
This is expected to be the final RC build of the 9.3-RELEASE cycle.
-
-
Glen Barber has announced the immediate availability for download of the third and probably the last RC (Release Candidate) version of the upcoming FreeBSD 9.3 operating system.
-
A Linux kernel developer is working on porting FreeBSD’s CAPSICUM security framework over to the Linux kernel.
In announcing his work at the end of June that’s now being discussed amongst kernel stakeholders, David Drysdale wrote, “The last couple of versions of FreeBSD (9.x/10.x) have included the Capsicum security framework, which allows security-aware applications to sandbox themselves in a very fine-grained way. For example, OpenSSH now uses Capsicum in its FreeBSD version to restrict sshd’s credentials checking process, to reduce the chances of credential leakage. It would be good to have equivalent functionality in Linux, so I’ve been working on getting the Capsicum framework running in the kernel, and I’d appreciate some feedback/opinions on the general design approach.”
-
FSF/FSFE/GNU/SFLC
-
Following last month’s release of Unicode 7.0, the GNU Unifont project is out with an open-source glyph for each printable code point in the Unicode 7.0 Plane 0 standard.
-
-
Free and open source software is a way of life for thousands of people. Yet, as we trudge the endless treadmill of release upon release, there’s one question you don’t hear much any more: where is open source heading? Or, perhaps, should it have a purpose at all?
Not too long ago, the answer to either question was obvious. The goal was to provide a free alternative to proprietary systems. But progress got stalled at a good-enough ninety percent or so, and looks likely to stay there for the foreseeable future.
-
Licensing
-
For Karen Sandler, software freedom isn’t simply a technical matter. Nor is it a purely ideological one.
It’s a matter of life and death.
Sandler, Executive Director of the non-profit Software Freedom Conservancy, says software freedom became personal when she realized her pacemaker/defibrillator was running code she couldn’t analyze. For nearly a decade—first at the Software Feedom Law Center, then at the GNOME Foundation before Conservancy—she’s been an advocate for the right to examine the software on which our lives depend.
-
Should open source software projects that give their products away freely have to pay taxes? Although the answer to that question traditionally has been “no,” the Internal Revenue Service (IRS) may be changing its mind, if the case of the Yorba desktop Linux software project is an indication.
-
-
Openness/Sharing
-
Interested in keeping track of what’s happening in the open source cloud? Opensource.com is your source for what’s happening right now in OpenStack, the open source cloud infrastructure project.
-
Intel wants to drive big-data analytics toward open-source software accelerated on its processors.
In a first step in that direction, it is working on an upgrade of its version of Hadoop that blends in features from the distribution provided by Cloudera, a leading open-source supplier of the code. Meanwhile it has already started working with customers to determine what sort of analytics apps they want on top of Hadoop and how to accelerate them on x86 chips.
-
PRISMicide, the first security solution based on open source smart cards, protects the privacy of its users… starting with their Bitcoin wallet.
-
Programming
-
First, Europe needs the human capital. Today, around 90% of jobs need digital skills. Yet, there are a million ICT jobs about to go unfilled for lack of them. Programming is the “new literacy”, with countless creative applications.
-
Security
-
Defence/Police/Secrecy/Aggression
-
These statements are reminiscent of Cold War propaganda and show how North Korea is neutralized in American eyes: North American media interprets their responses as madness.
Even if the republic’s response to this film is threatening, they haven’t threatened war, something which The Huffington Post and several other prominent media outlets reported. The Huffington Post even quotes The Christian Science Monitor, saying that Kim himself threatens “all-out war” upon release of the movie, though there aren’t any sources cited to prove this.
-
When DHS releases details to the worried public, it also releases them to jihadists.
-
I’m sorry Moniem and fellow Iraqis participate in this farce. They are hoodwinked. There will be no justice, merely damage control. And what of countless other unjustified killings, which will not even see the semblance of prosecution? Blackwater on one hand, Obama, with his hit list and targeted assassination on the other, and in between, CIA-JSOC paramilitary operations geared to regime change, together constitute the package of Obama’s liberal humanitarianism, bringing democracy to the ignorant at gunpoint.
-
The United Kingdom Cabinet Office Briefing Room (COBR) has trained the Nigerian security forces on crisis response strategies.
-
Thirteen months ago, during a speech at the National Defense University, President Barack Obama promised greater transparency and new guidelines for drone use as part of his counterterrorism strategy.
So much for promises.
An authoritative, bipartisan report released recently by the Stimson Center charged that the U.S. use of drones threatens to destabilize legal and moral norms worldwide. It also chastised the Obama administration’s failure to conduct a cost-benefit analysis of drone use and questioned drones’ effectiveness.
-
Targeted killings by drones may be justified at times against terrorist threats to the United States, but the “blow back” from unintended civilian killings in places like Pakistan and Yemen is becoming “a potent recruiting tool for terrorist organizations,” the report noted. The panel, which had experienced specialists from the George W. Bush and Clinton administrations, concluded that there was no indication that drone attacks on suspected terrorists had advanced “long-term U.S. security interests.”
-
-
-
Israel has arrested a group of Jewish extremists suspected of kidnapping and murdering a Palestinian teenager in a revenge killing, triggering violent clashes spreading from east Jerusalem throughout Israel.
Tensions were already peaking early Monday in the south after two Israeli strikes on Gaza left five militants dead, following continuous mortar and rocket fire at southern Israel.
-
-
-
-
-
Foreign Minister Avigdor Lieberman is gearing up to dissolve the Likud-Beitrinu ruling partnership in Israel, local media reported on Monday.
Lieberman is scheduled to hold a press conference at 12pm local time (10am GMT) at which he is widely expected to officially terminate the political deal.
-
Transparency Reporting
-
-
While Americans celebrated the adoption of the Declaration of Independence over the weekend, there were people around the globe, including in the United States, celebrating the birth of a man who is fighting for his freedom and the freedom of information: Julian Assange, who turned 43 years old on July 3.
Widely known for his roles as co-founder and editor-in-chief of WikiLeaks, Assange sought to create an organization that aligns with his belief that a transparent government reduces corruption and in turn creates a stronger democracy, which explains why WikiLeaks has released more classified intelligence documents than all other media organizations around the world combined.
-
Environment/Energy/Wildlife
-
Diesel drivers in rural America have been modifying their trucks to spew out black soot, then posting pics to the Internet. They hate you and your Prius
-
Finance
-
Thomas Piketty, writing from France, is the latest person to sound an alarm about the growing inequality of income and wealth. But his ideas have distinctly American roots that date to the country’s formation.
-
PR/AstroTurf/Lobbying
-
Censorship
-
The “right to be forgotten” in European law has now taken the place of what people in the past used to call “the forgiveness of sins”. Formerly it was believed that old offenses, especially when these did not result in prosecution or suit, were somehow effaced by the passage of time. “Long dormant claims have often more of cruelty than of justice in them”, says Halsbury’s Laws of England.
-
Last week, of course, there was a lot of attention around Google alerting publications that some of their stories had been removed from its index over “right to be forgotten” requests, following a dangerous European Court of Justice ruling. Various publications in the UK complained about some of the removals, and requested if there was any sort of appeals process. The BBC was initially told that there was no such process, though the Guardian claimed it was looking for ways to appeal.
-
We just wrote about the UK’s filtering systems blocking access to 20% of the world’s top 100,000 sites, even though only about 4% of those host the porn Prime Minister David Cameron seems so obsessed with blocking. Also noted in that story was the fact that many “pirate sites” are being blocked at ISP level via secret court orders.
-
Privacy
-
Critics have targeted a recent study on how emotions spread on the popular social network site Facebook, complaining that some 600,000 Facebook users did not know that they were taking part in an experiment. Somewhat more disturbing, the researchers deliberately manipulated users’ feelings to measure an effect called emotional contagion.
-
There are two interesting lessons to be drawn from the row about Facebook’s “emotional contagion” study. The first is what it tells us about Facebook’s users. The second is what it tells us about corporations such as Facebook.
In case you missed it, here’s the gist of the story. The first thing users of Facebook see when they log in is their news feed, a list of status updates, messages and photographs posted by friends. The list that is displayed to each individual user is not comprehensive (it doesn’t include all the possibly relevant information from all of that person’s friends). But nor is it random: Facebook’s proprietary algorithms choose which items to display in a process that is sometimes called “curation”. Nobody knows the criteria used by the algorithms – that’s as much of a trade secret as those used by Google’s page-ranking algorithm. All we know is that an algorithm decides what Facebook users see in their news feeds.
-
The government knows they are at high risk of legal action from ORG, Privacy International, Liberty and others, and of that legal action succeeding. ORG wrote to the government to ask them to stop trying to enforce EU data retention laws, as they had been invalidated. Thousands of ORG supporters wrote to ISPs to ask them to stop retaining their data illegally. One way or another, this law is likely to be struck down, and the government knows it.
-
Open Rights Group (ORG) has responded to government calls for emergency legislation that would require ISPs and telecoms companies to keep records of our phone calls, texts and internet usage as ‘spin’. The digital rights organisation believes that it is the threat of legal action from organisations like ORG, not the threat of terrorism, that are behind the calls for legislation.
-
If you think we’re exaggerating the threat to privacy from the NSA, remember that the Department of Homeland Security called DHS’ own privacy office “terrorists”.
-
-
-
Facebook’s failure to communicate about its mood experiment is the least of the things Internet companies do to us.
-
A bunch of this would not be admissible in trial, but this was a probable-cause hearing, and the rules are different for those. CNN writes: “a prosecutor insisted that the testimony helped portray the defendant’s state of mind and spoke to the negligence angle and helped establish motive.”
-
In a SPIEGEL interview, Edward Snowden’s lawyer, Jesselyn Radack, and former NSA contractor Thomas Drake discuss the reasons behind the American spying agency’s obssession with collecting data.
-
-
-
The German intelligence “double agent” who allegedly sold hundreds of top secret documents to the Americans was caught by his own country’s counter espionage agents while trying to broker an additional spying deal with the Russian secret services, according to intelligence sources in Berlin.
-
On Monday, Merkel spoke at a news conference in Beijing and said that if the German man did indeed work as a double agent for the US, it would be a clear opposite of how partner countries are supposed to treat each other, Reuters reported.
-
German Chancellor Angela Merkel has voiced concern about an alleged US spy in German intelligence, in her first comments on the affair.
Speaking on a visit to China, Ms Merkel said that if the allegations about a double agent were true, it would constitute a serious breach of trust.
-
-
German Chancellor Angela Merkel said on Monday allegations that a German man worked as a “double agent” for US intelligence were serious and, if true, were a clear contradiction of what cooperation between partners is supposed to be about. Merkel made the comments at a news conference while on a visit to Beijing, Reuters reports.
-
-
-
The arrest of a German intelligence employee for allegedly spying for the US has caused an uproar among German politicians. The country’s foreign minister has demanded an immediate clarification of the situation from Washington.
-
-
Germany’s Interior Minister Thomas de Maizière has said that an explanation has been sought from the US intelligence services over its contact with a German man arrested last week on suspicion of being a double agent, the media reported Sunday.
“I expect everyone to cooperate promptly to clear up these allegations – with quick and clear comments from the US as well,” Thomas de Maizière was quoted as saying by German tabloid Bild.
-
-
Relations between Germany and the US are being strained by a new scandal after the arrest of a German spy who was allegedly also working for the American intelligence services.
-
Ever since Edward Snowden’s revelations about the international spying done by the NSA, it has open a flood gate of information, knowledge and investigations. And the chance that you have been targeted or placed on the NSA’s watch list is pretty good.
-
The Obama administration on Sunday sought to play down new disclosures that the National Security Agency has swept up innocent and often personal emails from ordinary Internet users as it targets suspected terrorists in its global surveillance for potential threats.
-
Heaps of baby photos, fitness selfies, medical records and resumes are among thousands of private communications scooped up and stored by NSA spy programs.
That’s according to new disclosures based on documents Edward Snowden, the former National Security Agency contractor, gave to The Washington Post — disclosures that show just how easy it is for Americans’ private conversations to be swept into the spy agency’s traps.
-
-
-
Thousands of baby photos, selfies, medical records and CVs – all these private data appeared among communications vacuumed and stored by NSA spy programs, a recent Snowden disclosure says.
-
Looking at 22,000 surveillance reports, the Washington Post has reported that only 11 percent of people’s communications collected by the agency in its digital surveillance activities are targets of the NSA.
-
Creepy doesn’t begin to describe Facebook’s 2012 psychological experiment on 700,000 of its unwitting users. Any attempt to manipulate the emotional state of consumers is unconscionable. It reflects poorly on the entire tech community, confirming privacy activists’ worst fears.
-
The Electronic Frontier Foundation (EFF) has filed a Freedom of Information Act (FOIA) lawsuit against the NSA and the Office of the Director of National Intelligence (ODNI) to gain access to documents that will reveal how intelligence agencies handle sharing information about security holes in software and hardware that they discover or purchase. This process will help reveal if these intelligence agencies allow computers, intentionally to be vulnerable so that they can exploit these vulnerabilites both in thier country and worldwide.
-
That bulk collection, revealed by former government contractor Edward Snowden’s leaks, has raised questions about whether the exponential explosion of data — and the power to collect it — has made some of those 20th century decisions irrelevant.
-
A group of privacy organizations has written a letter to Congress saying that a newly released draft version of a bill, the Cybersecurity Information Sharing Act of 2014 (CISA), which aims to improve private and public sector sharing of cyber threat information, could pose a major risk to individuals’ privacy.
-
A large proportion of the data classified as “useless” by analysts contained “startlingly intimate” material. This included “stories of love and heartbreak, illicit sexual liaisons, mental-health crises, political and religious conversions, financial anxieties and disappointed hopes.” The NSA also gathered around 5,000 personal photos.
“In some photos, men show off their physiques. In others, women model lingerie, leaning suggestively into a webcam or striking risque poses in shorts and bikini tops.”
Even though these files were branded as “useless” by intelligence analysts, they were still retained by the NSA and can be accessed at any time by analysts should the need arise. In spite of criticism that the NSA’s intelligence practices are almost “Orwellian in nature,” the US government has yet to address the issue of ordinary user data that is inadvertently picked up by the NSA’s dragnet spy programs.
-
Lib Dems and Labour warn they will not allow any new law to become backdoor route to reinstate wider ‘snooper’s charter’
-
-
-
-
US cartoonist and journalist Ted Rall in a recent article wonders why 6,000 journalists agreed to keep secret the identity of the CIA station chief whose name was inadvertently revealed in an email to more than 6,000 plus reporters.
-
There are roughly five million plus people with active security clearances currently in the US, granted by a variety of different US agencies. Of these about 1.5 million have top secret clearances – which seem an excessive number when you compare it with say the number off all employees currently working for all the intelligence agencies in the U.S.
-
Since former CIA contractor Edward Snowden began revealing the NSA’s surveillance activities, web users have been self-censoring their posts for keywords that would be considered worthy of surveillance, a new study suggests.
-
The agency collected and stored intimate chats, photos, and emails belonging to innocent Americans—and secured them so poorly that reporters can now browse them at will.
-
David Truong, a Vietnamese antiwar activist whose conviction on espionage charges in the United States in 1978 raised alarms about the federal government’s use of wiretaps without court orders and spurred passage of the 1978 Federal Intelligence Surveillance Act prohibiting such practices, died on June 26 in Penang, Malaysia. He was 68.
-
The recent leak of the XKeyscore source code has raised an interesting question. Is there a second leaker? The report written by Jacob Appelbaum and others for DasErste.de detailed the NSA’s targeting of Tor users (and even those who just read about Tor) and the harvesting of their communications, but very explicitly did not state that Snowden was the source of this code snippet.
-
Civil Rights
-
To understand why U.S. drone strikes outside traditional battlefields make so many people so uneasy, look to the past and look to the future.
Start with the past. In 1976, exiled Chilean dissident Orlando Letelier was driving to work in Washington when a car bomb planted by Chilean agents ripped through his vehicle, killing Letelier and his young American assistant. From the viewpoint of Chile’s ruling military junta, the killing was justifiable: Gen. Augusto Pinochet’s regime considered itself at war with leftist insurgents and viewed Letelier as a security threat.
U.S. authorities saw things differently, of course: They condemned the bombing as an assassination. The FBI opened a murder investigation, and a Senate committee launched an inquiry into illegal foreign intelligence activities on U.S. soil.
-
Muslims the world over must introspect. There were no Americans, US State Department or CIA when the spread of Islam took place violently with the core mission to ‘kill infidels” or non-believers. Islam via sword cut across entire continents and destroyed entire civilizations. These natives did not even have time to defend against the attacks. Undeniably, the acts were not in self-defense and the use of sword were inspired by the Quran. It is these factors that raise the existential fears of non-Muslims once more. The fear of history repeating itself prevails when 95% of violent conflicts around the world involve Muslims even if these conflicts are mischievously ignited by Western Christian countries. These conflicts are drawn using Koranic verses by numerous Islamic groups. That Islamic groups/Islamic leaders uses verses from the Koran to instill mayhem and draw Muslims into their fold raises the question of how far Islam is being manipulated by Islamic leaders as well as how far the West is manipulating this weakness. That these groups have no shortage of followers and these groups are heavily funded and are able to easily manipulate moderate Muslims makes any to wonder how many Muslims are able to go against the tide without submitting themselves to their religion and those who are leading them. What needs to be said is that Muslims leaders and the West are manipulating Islam’s Koranic verses because there are verses that can be manipulated. Herein lies the core issue and root cause for the violence. With no central authority to control doctrine in Islam, a proliferation of bizarre religious edicts has resulted in chaos the world over.
-
Passengers hoping to fly to the US this summer will be turned away at airport security checkpoints if they have forgotten to put their mobile phone on to charge the night before.
-
-
THE UNITED STATES Transportation Security Administration (TSA) has announced security measures that might cause serious problems for air travellers who forget their chargers.
-
Don’t bring dead phones or laptops to those overseas airports for flights heading to the USA.
-
Internet/Net Neutrality
-
A research report published by the Pew Research Center revealed that among 1,400 experts, 65 percent believe that the Internet will be more open by the year 2025.
The respondents hope that, more than 10 years from now, there will be no major changes that will negatively affect how people obtain and share content on the Internet.
-
Intellectual Monopolies
-
Copyrights
-
Our duty as lawmakers is to find a balance between creators and the justified interests of society. Yet that balance is changing. Transforming technology is changing how people use and re-use information. And disrupting a longstanding legal framework.
-
For years Norway was pressured to do something drastic against pirates and 12 months ago this week the country introduced tough new legislation. But one year on and not a single file-sharer has been inquired about nor has a single site blocking request been filed. What’s going on in Scandinavia?
Permalink
Send this to a friend
07.06.14
Posted in News Roundup at 7:12 pm by Dr. Roy Schestowitz
Contents
-
Desktop
-
Like all things Linux and open source, users are spoilt for choice when it comes to selecting a desktop environment (or DE). But this choice that many perceive as freedom, others may also see as a little bewildering and confusing.
Right after making the soul-shaking decision of switching operating systems and installing an unknown system – by hand no less – a new Linux user is then greeted with weird sounding desktops to choose from with names like Gnome (a mini-desktop perhaps?), KDE (Isn’t that a double-glazing firm?) and Xfce (No idea). What veteran users herald as Linux’s crown jewels, to the innocent newcomer it’s like stumbling into a sci-fi convention where everyone is discussing a new TV series that you’ve never heard of but apparently it’s been around for years.
-
Kernel Space
-
Graphics Stack
-
The last Pixman stable release happened in November of 2013 while out this weekend is finally a new Pixman release.
While it’s been more than a half-year since the last stable Pixman release, the changes for the new v0.32.6 release aren’t particularly compelling but still worth pointing out.
-
Applications
-
Whether you’re producing podcasts or creating highly sophisticated sound recordings, one of these open source apps will suit your needs.
-
-
-
-
There are several programs for video ripping and transcoding in Linux, allowing to choose from a wide number of formats and containers for the output video files. This is an overview of six applications which allow you do transcode videos.
-
Mobile phone users should not regard their computer only as the means of recharging their phone, or transferring files to and from the phone’s storage. There’s a lot more than you can do with your Linux box. This article illustrates some good open source tools that let you manage your mobile phone.
-
Instructionals/Technical
-
Games
-
Aeon Command has been on Linux for quite some time now, but it’s finally on Steam with hopes of getting more interest. The game is really quite good too, so be sure to check it out.
-
-
VCMI is an ambitious project that aims to recreate the entire Heroes III engine and add new features, and has been in the works for a few years, and up to now it is in good shape.
-
Desktop Environments/WMs
-
K Desktop Environment/KDE SC/Qt
-
Plasma NM is going to be part of kde-workspace and as you may know NMQt is a dependency for Plasma NM. Plasma 5 release is approaching and since we may not get NMQt ready for KF5 in time we decided to ship a snapshort of NMQt with kde-workspace so that Plasma NM compiles. In the future we will remove the snapshot and rely on the NMQt in KF5.
-
-
This is the last but one update to the 2.8 series of the Calligra Suite, and Calligra Active released to fix recently found issues. The Calligra team recommends everybody to update.
Why is 2.8.4 skipped? Shortly before 2.8.4 release we discovered bug that sneaked in 2.8.2 version and decided to skip the 2.8.4 entirely and quickly release 2.8.5 instead with a proper fix. The bug is related to not showing file formats in Save dialogs.
-
The KDE Community has announced the release of Calligra 2.8.5. “This is the last (and last but one) update to the 2.8 series of the Calligra Suite, and Calligra Active released to fix recently found issues. The Calligra team recommends everybody to update,” says Jarosław Staniek of Calligra community.
-
-
-
Red Hat Family
-
Students from tertiary institutions in seven Asian Pacific countries are invited to attend the 4th Regional Red Hat Challenge – a knowledge-based technology competition.
-
Debian Family
-
I can set the display backlight to zero via software, which saves me a lot of battery life and also offers a bit of anti-spy-acroos-my-shoulder support. WLAN and bluetooth work nicely.
-
Derivatives
-
Canonical/Ubuntu
-
Flavours and Variants
-
Linux Mint 17 ‘Qiana’ KDE and Xfce editions were released late last month, just a few weeks after the main editions (Cinnamon and MATE) were put out. This release will have the same lifespan as the distribution which is based on, Ubuntu 14.04 Trusty Tahr, so it will be supported until 2019, for no less than five years.
-
Linux Deepin Project has been officially renamed as “Deepin Project”.
-
Deepin Linux 2014 is now available as the popular Chinese-developed derivative to Ubuntu 14.04 LTS that features its own lightweight desktop powered using HTML5 and Go with Compiz. The updated desktop in Deepin 2014 is called Deepin Desktop Environment 2.0.
-
-
The connected car is shifting into high gear, and the Linux Foundation wants an open-source platform in the pole position. The non-profit consortium recently announced the debut of Automotive Grade Linux (AGL), a customizable, open-source automotive software stack with Linux at its core.
-
A common, Linux-based software platform for the ‘connected car’ is one step closer, with the release of Automotive Grade Linux (AGL) this week.
AGL claims to be the industry’s only ‘fully open’ automotive platform, allowing carmakers to use a standardised single base upon which to build their own user experiences.
-
Phones
-
Android
-
The app allows you to code through HTML, JavaScript and Dart – Google’s JavaScript-like language, so there is no Java at this time, but you do get Git support.
-
In the next few months, Google will get some competition from Microsoft, Apple and a few startups in this space. For better or worse, none of them know as much about you as Google does, so it’ll be hard for them to replicate the Google Now experience. That should give Google a bit of an edge against the competition — unless the iWatch turns out to be so amazing that people will buy it even if it just shows the time and phone notifications.
-
Taking a look back at the week in news across the Android world, this week’s Android Circuit focuses on Samsung’s new Galaxy handsets; Android tops the US market share; the Android ‘L’ changes; Google Play Services’ update for Android Wear support; Android Wear apps arrive in the Play Store; the battle for the home screen continues with Aviate; and what happens next in the smartphone world.
-
Science
-
Hong Kong has one of the world’s best subway systems. It has a 99.9 per cent on time record – far better than London Underground or New York’s subway. It is owned and run by MTR Corporation, which also runs systems in Stockholm, Melbourne, London and Beijing. MTR is now planning to roll out its AI overseer to the other networks it manages.
-
Health/Nutrition
-
And efforts to make the most of precious farmland have been hampered by decades of urban sprawl, which has accelerated since Y 2011 when the overthrow of President Hosni Mubarak led to a security vacuum.
-
Defence/Police/Secrecy/Aggression
-
A cellphone video depicting a California Highway Patrol office punching a woman along the side of a freeway Tuesday evening has the agency investigating accusations of excessive force.
-
The Washington Post has published an exclusive report about the US National Security Agency’s surveillance activities, but withheld information of “considerable intelligence value,” including a secret overseas nuclear project.
-
-
In reacting to Moscow’s aggression in Ukraine, President Obama has reassured exposed NATO members Poland, Lithuania, Latvia and Estonia of firm U.S. support. But he has shown little inclination to show needed leadership by putting another integral element of NATO policy on the agenda of September’s Cardiff summit — enlargement of the alliance.
-
If Official Washington were not the corrupt and dangerous place that it is, the architects and apologists for the Iraq War would have faced stern accountability. Instead, they are still around – holding down influential jobs, making excuses and guiding the world into more wars, as ex-CIA analyst Paul R. Pillar notes.
-
A 41-minute documentary has been produced and is online, “Ukraine Crisis Today,” interviewing “terrorists” (as our side calls them) who have been bombed by the Ukrainian Government. We — that is, the United States — installed this Ukrainian government, on February 22nd, in a coup (falsely presented as a democracy movement, but run actually by the U.S. CIA and two Ukrainian fascist parties) against Ukraine’s democratically elected President, Viktor Yanukovych. The government that we installed is now bombing the areas of Ukraine where the voters had voted overwhelmingly for Yanukovych, in Ukraine’s last national election, which took place during February 2010. Our side calls the residents of the Yanukovich-supporting areas “terrorists.” Those are the people our Ukrainian regime bombs.
-
-
The mainstream U.S. media continues to sell the American people a one-sided storyline on the Ukraine crisis as the Kiev regime celebrates a key military victory at Slovyansk, an eastern city at the center of ethnic Russian resistance to last February’s violent coup that ousted elected President Yanukovych.
-
Halliburton, which offers a myriad of services, including oil field work, plus construction work, benefits when countries are “bombed to the stone age,” since those same countries need to be rebuilt. Angelo Young describes the war-profiteering in Cheney’s Halliburton Made $39.5 Billion On Iraq War…
-
Transparency Reporting
-
Finance
-
At the beginning of 2014, 13 states increased their minimum wage. Of these 13 states, four passed legislation raising their minimum wage (Connecticut, New Jersey, New York, and Rhode Island). In the other nine, their minimum wage automatically increased in line with inflation at the beginning of the year (Arizona, Colorado, Florida, Missouri, Montana, Ohio, Oregon, Vermont, and Washington state).
-
It might sound like an oxymoron, but this is a positive article about public services. So effectively has the coalition rebranded an economic crisis caused by private greed as the consequence of public ownership, that nationalisation has come to be seen as a universally discredited hangover from bad old Labour. So while current Labour is considering taking back parts of the rail network into public ownership the shadow chancellor, Ed Balls, last weekend was intoning the neoliberal catechism: “I don’t want to go back to the nationalisation of the 1970s.”
-
Censorship
-
Files which may be linked to child abuse claims seem to have been lost “on an industrial scale” at the Home Office, the chairman of the Commons home affairs select committee has said.
The Home Office has said its own review last year found that 114 potentially relevant files could not be located.
Keith Vaz MP said it was “a huge surprise” that so much potential evidence had gone missing.
Lord Tebbit said he hoped any review would be conducted quickly.
Number 10 has rejected calls for an over-arching public inquiry into historical child abuse claims.
-
Newspapers are now accusing Google of censoring their articles every time that a search result is being removed in relation to one of their articles. However, what the very lazy journalists are not doing is testing the search results to see if any of the key figures are likely to have gained the redaction, at least not before telling the world about it.
-
A law against being annoying in public was recently approved by the British House of Commons and sent to the House of Lords, which vetoed it. This was no surprise since Lords themselves are horribly annoying, with their castles and silly titles. (For example, does “Lord Privy Seal” means what it says, which is “Lord Toilet Sea-Mammal”?)
-
-
We will all die, and we will all be forgotten, in the end. I’m still unsophisticated enough to find that sad. But society seems fairly stoical about it, to say the least. These days thousands are campaigning for “the right to die” and “the right to be forgotten” as if they’re genuinely worried it might otherwise not happen.
-
Privacy
-
Noticeably absent from the trial and much of the media attention are the phone companies. Did they know their networks could be so systematically abused? Did they care?
-
-
Pakistan People’s Party (PPP) on Sunday formally lodged its protest with the United States over the spying of the largest political party by the National Security Agency (NSA), a private TV channel reported.
-
-
-
-
-
-
-
Berlin Letter: Spy scandals have returned a Cold War atmosphere to the German capital
-
In the US, Germany’s NSA scandal doesn’t make the headlines.
-
-
A suspected German double agent has worked for the U.S. Central Intelligence Agency (CIA), German newspaper “Bild am Sonntag” reported on Sunday.
The case was first uncovered on Friday. A 31-year-old employee of Germany’s Foreign Intelligence Service (BND) was reportedly detained Thursday in suspicion of having spied on a German investigation committee inquiring into U.S. surveillance on behalf of an American intelligence service.
-
I’ve heard it whispered in certain literary quarters that American novelists have failed to adequately respond to a post-9/11 world. That their fiction lacks sufficient imagination and indignation towards their government and its policies. I think this is a whisper of weak foundations. While the terror of drones, the NSA and the NRA are certainly worthy of tomes, I’m actually more intrigued with the terror of ordinary life. And few American writers I know capture this as masterfully as Joshua Ferris.
-
Nadim Kobeissi wants to bulldoze that steep learning curve. At the HOPE hacker conference in New York later this month he’ll release a beta version of an all-purpose file encryption program called miniLock, a free and open-source browser plugin designed to let even Luddites encrypt and decrypt files with practically uncrackable cryptographic protection in seconds.
-
-
-
-
For more than a year, NSA officials have insisted that although Edward Snowden had access to reports about NSA surveillance, he didn’t have access to the actual surveillance intercepts themselves. It turns out they were lying.1 In fact, he provided the Washington Post with a cache of 22,000 intercept reports containing 160,000 individual intercepts.
-
Ordinary Internet users, American and non-American alike, far outnumber legally targeted foreigners in the communications intercepted by the National Security Agency from U.S. digital networks, according to a four-month investigation by the Washington Post.
-
-
“Every single American embassy is an intelligence collection facility. The really second in charge of every embassy is the CIA station chief,” Scott Rickard, former US intelligence linguist, said in a Saturday interview with us.
-
Pakistan’s main opposition, Pakistan Peoples Party (PPP), has formally protested to the United States ambassador in Islamabad over media reports that the U.S. National Security Agency (NSA) was spying on the party in 2010 when it was ruling the country, the party’s spokesman said Sunday.
-
Apparently, the NSA has been watching some networks to try to build up their user profile data. The government agency has been targeting the Tor anonymising system to spy on its users.
-
-
An alleged double agent did not spy on Germany’s parliamentary NSA inquiry, according to the panel’s chairman. The suspect is accused of selling sensitive documents to a US intelligence agency.
-
They mailed copies of the documents they lifted to Washington Post reporter Betty Medsger, who broke the story. NBC News reporter Carl Stern later uncovered the FBI’s illegal Counter Intelligence Program (COINTELPRO), which sought to destroy, discredit and harass civil rights and anti-war groups and activists.
-
In honor of the Fourth of July, let’s talk a little about how horrifically paranoid and counterproductive the US government has become. And I’m not even talking about Congress! Instead I mean our old friend the No Such Agency, who, it turns out, have been singling out for special treatment anyone who displays any interest in tools which might make the NSA’s life more difficult.
-
The former secretary of state tells The Guardian in a video interview that if whistle-blower Edward Snowden is “serious” about joining the debate over “the tension between privacy and security,” he can come home. “But that’s his decision,” she adds.
To Clinton, the likely 2016 presidential candidate for the Democratic Party, Snowden broke the law; however, as a lawyer she holds that “he has a right to mount a defense. And he certainly has a right to launch both a legal defense and a public defense, which can of course affect the legal defense.” She claims, however, to be unaware of what the former NSA contractor would be charged with upon return since the indictments are “sealed.”
-
-
But this revelation about the NSA is something that appears investors are not paying enough attention to. I’m relatively certain, global buyers of network gear have a different perspective. Obviously, the NSA could have been intercepting gear from all the network providers, but being France based is certainly a positive for Alcatel’s forward orders. No matter how the spotlight has shown on the matter or the fact that Cisco did not appear to work in concert with the NSA, wouldn’t you agree that global buyers of gear, especially those sensitive to privacy, will be more likely to turn to the France based Alcatel-Lucent now, or the Sweden based Ericsson (ERIC)?
-
Civil Rights
-
The regime has repeatedly carried out artillery and air attacks on city centers, creating a humanitarian catastrophe—which is all but ignored by the US political-media establishment.
-
His CIA career included assignments in Africa, Afghanistan and Iraq, but the most perilous posting for Jeffrey Scudder turned out to be a two-year stint in a sleepy office that looks after the agency’s historical files.
-
One of the standard criticisms of Edward Snowden is that he should have tried harder to air his concerns via proper channels. This is fairly laughable on its face, since even now the NSA insists that all its programs were legal and it continues to fight efforts to change them or release any information about them. Still, maybe Snowden should have tried. What harm could it have done?
-
An award-winning American journalist says the US government’s spying operations targeting the entire Muslim community is misguided and “smacks of what was done in Nazi Germany.”
-
A number of Jewish suspects have been arrested over the murder of Palestinian teenager Mohammad Abu Khdair, whose death sparked days of violent protests.
-
Initial autopsy findings from the body of an East Jerusalem youth who Palestinians believe was kidnapped and killed by far-right Jews showed that he was burned alive, the Palestinian attorney-general has been reported as saying.
-
-
Security concerns are complicating the release of a controversial report on “enhanced interrogations techniques,” with officials fearing the document could inflame the Arab Street and put Americans in danger.
-
Internet/Net Neutrality
-
It’s the latest development in the tick-tock of two stories: the reactions of the world’s governments to the Snowden revelations that the NSA has their entire populations (and leaders) under deep surveillance; and Russia’s steady march to a totalitarian Internet that’s like Iran’s halal Internet, with Putin-authoritarian characteristics.
-
-
Permalink
Send this to a friend
Posted in Bill Gates at 6:54 am by Dr. Roy Schestowitz
Summary: Bill Gates’ private (for-profit) coup against public education is being impeded by people whom it negatively affects
SOME time ago it was reported in local media that Indiana had been getting out of the Bill Gates-imposed Common Core regime. Bill Gates apparently bribed not enough lawmakers, politicians, newspapers and non-profit origanisations over there. Passing taxpayers’ money to private pockets didn’t work as smoothly as expected.
According to new backlash against Gates, led by more public figures like Professor Diane Ravitch who wants Bill Gates investigated, it is “Good Riddance to Common Core Testing”, at least in some states:
Bill Gates’ money helped foist Common Core on Indiana
Indiana is no longer alone in abandoning the Common Core academic standards.
Oklahoma and South Carolina are pulling out, and North Carolina is headed for the door as well. Louisiana Gov. Bobby Jindal is taking his state out of the national standards, provoking a conflict with the state’s education superintendent and causing uncertainty about state testing in the fall.
Bill Gates is hardly any different from the Kochs. He has better marketing and he buys more media outlets than the Kochs, at the cost of around one million dollars per day. He does all this abusive lobbying while he keeps pretending to do charity (he hoards billions of additional dollars at times of recession), using heavy PR and bribed press. For people among world’s top 10 for wealth, the cost of bribing lots of papers and officials is by far outweighed by the profit this generates and Gates has been an incredibly useful example of this.
Here is a new and rather long article that covers some of the angles we have talked about before (although we may not agree with everything it says):
COMMON CORE WILL MAKE BILL GATES RICHER
[...]
Common Core will be used for “data mining.” In May 2012 Charles Scaliger wrote in The New American that “in the sagebrush desert of Bluffdale, Utah, in the shadow of the Wasatch mountains, a vast new federal surveillance and intelligence processing center is being erected. The so-called Utah Data Center, operated by the National Security Agency, will occupy more than a million square feet when it becomes operational sometimes next year.
Coincidentally this Data Center was completed in 2013 about the same time Common Core was being promoted by such organizations as the National Governors Association (which helps state governments get federal grants) and the Council of Chief State School Officers (which claims to provide leadership, advocacy and technical assistance on major educational issues) – started work on a common set of curriculum standards in English language arts and mathematics while using such deceitful words as “state led” and “voluntary.”
Thankfully, a lot of people now realise that not only in the education sector is Gates doing great harm. Former managers from Microsoft link to our articles about Gates, perhaps realising what was inconvenient to believe when Microsoft paid their salary. █
Permalink
Send this to a friend
Posted in Microsoft, Vista 8, Windows at 5:54 am by Dr. Roy Schestowitz
Lack of demand
Summary: The software bully which manipulates its financial reports is said to be unable to sell the latest Windows and a new Microsoft product running this version of Windows is axed before arrival
Microsoft’s criminal behaviour does not work quite so well in hardware, where bribes are harder to get budget for (unlike with software, which can be copied infinitely). Microsoft was already forced to kill many products and divisions and it has many famous failures in hardware, including Kin, Windows Mobile, and Xbox (which lost money). Now we learn that Microsoft has ditched yet another product. This article uses promotional language which fails to explain what a colossal failure Surface has been (the big table as well as the tablets with the same brand name).
Based on other reports like this one from ZDNet (citing the Microsoft-funded Net Applications), right after China banned Vista 8 and various countries/businesses rejected it for technical reasons:
Net Applications has found that Windows 8.x actually lost user share in June 2014, while Windows 7 has really been the operating system to gain from XP’s end of support.
This is not good for Microsoft’s financial bottom line. It’s also embarrassing because it shows systematic pushback.
Another ZDNet report says that Microsoft enables XP to still receive patches (a month ago IDG reported inaction from XP users). The NSA is going to benefit from this as more PCs have lots of back doors piling up. The NSA flags GNU/Linux users (or people who read GNU/Linux sites) for extra surveillance, based on leaked source code. Those who want security (e.g. Russia, China, Korea) will surely move to GNU/Linux very soon. █
Permalink
Send this to a friend
Posted in GNU/Linux, Microsoft at 5:31 am by Dr. Roy Schestowitz
Summary: The Internet of Things Alliance has just let the mole, Microsoft, dip its finger in the competition, as it so often does in order to derail the competition
The poorly-named “AllSeen Alliance” (or Internet of Things Alliance) is about to find out that it doesn’t pay off to welcome Microsoft. Resistance and antagonism are defence mechanisms here.
OpenStack learned that Microsoft involvement is trouble, as it had ushered in a proprietary culture (secrecy, neglect, technical incompatibilities, and distrust-inducing NSA back doors). The same goes for OpenDaylight, which is another way Microsoft got its foot inside the Linux Foundation (directly, not through Nokia or Novell).
While there is propaganda from Microsoft-bribed circles (e.g. Om Malik, who received Microsoft money and apparently still receives money from Microsoft to publicly openwash them as well as whitewash Nadella) it is clear that Microsoft is not an Open Source friend but a foe. Microsoft is doing so much to harm FOSS, as we shall continue to show perhaps for years to come (if Microsoft is still around).
IDG said that “Microsoft backs open source for the Internet of Things” (widely cited article), but it’s not clear what the word “backs” should be taken as. Microsoft competes with FOSS and Linux in this area, so Microsoft probably “backs” the Internet of Things in the same way that Microsoft “backs” ODF or the NSA “backs” Germany (see related news which fall outside the scope of this one particular post).
Having proprietary software inside a supposedly open initiative, just like in OpenDaylight, is a very dumb idea. In past years we covered examples where Microsoft was revealed to have pressured groups (rival groups) to let them in. Some successfully resisted and some admittedly perished after they had caved in for Microsoft’s manipulative mind game (e.g. complaining about exclusion and intolerance).
“Embrace, Extend, Extinguish” is what one of our readers immediately called the above news. One pro-GNU/Linux pundit stated: “Microsoft, like most companies, does what it is in its own interests, and I think joining the AllSeen Alliance is truly a marriage of convenience. So you’ll have to excuse me if I don’t interpret this move by Microsoft as marking some new attitude toward open source. It seems to be something that is clearly rooted in Microsoft’s self-interest rather than any shared open source vision.”
The Linux Foundation has once again let a malicious mole in. It will be interesting to see how long it takes before there are complaints from within. It always happens sooner or later.
The more moles the Linux Foundation brings in (Microsoft or its allies), the harder it will become for it to prevent entryism. Just look what happened to Nokia. █
Permalink
Send this to a friend
Posted in News Roundup at 2:01 am by Dr. Roy Schestowitz
Contents
-
Kernel Space
-
Lennart Poettering gave a talk recently in Beijing about the state of systemd and its future ahead.
Lennart keynoted at the joint FUDCon Beijing 2014 with GNOME.Asia 2014 event and he talked about the current position of systemd and its future going forward, while acknowledging it’s evolved more than just being a basic init system to being “a set of basic building blocks to build an OS from.”
-
Graphics Stack
-
NVIDIA has today released ther 331.89 Linux, Solaris, and FreeBSD graphics drivers within their long-lived 331.xx graphics driver branch.
-
While two X.Org GSoC projects already failed this summer, student developer Samuel Pitoiset continues making great progress on his work for implementing performance counter support within the open-source Nouveau NVIDIA graphics driver.
-
Applications
-
-
So I finally managed to put out a new Transmageddon release today. It is primarily a bugfix release, but considering how many critical bugs I ended up fixing for this release I am actually a bit embarassed about my earlier 1.x releases. There was for instances some stupidity in my code that triggered thread safety issues, which I know hit some of my users quite badly. But there were other things not working properly either, like dropping the video stream from a file. Anyway, I know some people think that filing bugs doesn’t help, but I think I fixed every reported Transmageddon bug with this release (although not every feature request bugzilla item). So if you have issues with Transmageddon 1.2 please let me know and I will try my best to fix them. I do try to keep a policy that it is better to have limited functionality, but what is there is solid as opposed to have a lot of features that are unreliable or outright broken.
-
-
If you’re like me, you may not have heard much about Corebird, a native GTK+3 Twitter client. Which is a bit surprising really, as Corebird is a very nice and stable application that holds it’s own with any of the other clients out there and deserves more love.
-
PCManFM or PCMan File Manager has reached version 1.2.1 earlier today. While there’s no official announcement on the project’s blog or homepage, we’ve dug up the changelog in order to notify our users of what’s new in this release.
-
-
-
-
-
-
Proprietary
-
It is pretty much acknowledged by now that Skype is evil. Maybe not as evil as a DRM on a brand new game, but very close. To summarize the events, Skype has been bought by Microsoft, has been spied on by the NSA, is now quitting its peer-to-peer protocol for a centralized system, and on top of that, is proprietary software. The worst of it is that just like a DRM on a game, we put up with all of this for the product. It is true that Skype at first did help users go into the VoIP realm. Its interface is intuitive, and its setup is simple. However, it is time to move on. For this, here is a list of six software to replace Skype with on Linux.
-
-
Instructionals/Technical
-
Wine or Emulation
-
The Wine development release 1.7.21 is now available.
What’s new in this release (see below for details):
- Support for critical sections in the C runtime.
- Unicode data updated to Unicode 7.0.
- Support for interlaced PNG encoding.
- Initial stub for the Packager library.
- Various bug fixes.
-
Games
-
-
At the end of April LGP was migrating servers and expected to “keep downtime to an absolute minimum” while more than two months later the once leading Linux game publishing company remains offline.
-
-
Desktop Environments/WMs
-
Enlightenment is flying high these days with the great contributions being done by Samsung’s investment into the project.
-
K Desktop Environment/KDE SC/Qt
-
One week-end of Calligra sprint is currently going on in the old and cozy center of Deventer in the Netherlands.
-
The Cutelyst 0.2 release that happened today is more real-world-ready. This release features framework documentation at Cutelyst.org, a WordPress-like blog has been written using Cutelyst as an example app, API updates, and a variety of other changes.
-
Five months ago I announced the very first release of Cutelyst, a web framework powered by Qt 5. Time passes and I started shaping my real world applications written with it, I should probably release a newer version earlier but it’s not very nice to keep releasing API that changes a lot, however next version (0.3.0) will still contains API changes.
-
We just finished migrating one of our stacks to a new and powerful piece of hardware. It was a major activity and took about 9 hours with around 2-3 hours of downtime per CMS. The activity is now complete, however there are a few rough edges that we’ll be ironing out over the weekend.
-
Technically, the functions to reach those goals all bring their own interactions and workflows. For users it is necessary to perceive clearly what happens and how to achieve the desired result. Unfortunately, some uncontrolled growth in KDE applications has lead to non-standardized implementation and application-specific short-cuts.
-
A few weeks ago I contacted Thomas Pfeiffer with the idea to design a new user interface for Klipper in Plasma 5.1. Surprisingly he informed me that a discussion was already started in the KDE Forums. Which is awesome as that means there was already some ideas on how the user interface could look like. Last week the number of new bug reports for KWin get lower so I started to look into Klipper for 5.1.
-
-
The KDE Community introduced the concept of convergence way back in 2008 with the arrival of KDE 4.x (back then it was still KDE Desktop). If you ever tried KDE on your netbook you would have noticed that the desktop that got installed was different from that you would get when you install the same iso on your desktop.
That was convergence. KDE knew what kind of form factor you have and would offer an interface optimized for that device.
KDE community was also developing something called Plasma Active, which was aimed at devices using touch-based interface as found on today’s smartphones and tablets.
-
-
A new Linux distribution under development is among the latest dreaming of commercial success in hopes of finally conquering the Linux desktop and having their OS pre-installed on systems being sold in brick and mortar stores.
-
Red Hat Family
-
Scientific Linux, the distribution developed by produced by the Fermi Laboratory and CERN as a derivative of the open Red Hat Enterprise Linux code-base, is preparing for their RHEL7 re-spin.
-
-
Fedora
-
Debian Family
-
After having put in place the infrastructure to allow companies to contribute financially to Debian LTS, I spent quite some time to draft the announce of the launch of Debian LTS (on a suggestion of Moritz Mühlenhoff who pointed out to me that there was no such announce yet).
-
With the help of the Debian System Administrators, it’s now setup on tracker.debian.org!
This service is also managed by the Debian QA team, it’s deployed in /srv/tracker.debian.org/ (on ticharich.debian.org, a VM) if you want to verify something on the live installation. It runs under the “qa” user (so members of the “qa-core” group can administer it).
-
Derivatives
-
Canonical/Ubuntu
-
We are pleased to announce today, July 4, that the Ubuntu MATE Remix 14.04 has reached Alpha stage and is available for download as Live DVD/USB images that can be installed.
Ubuntu MATE Remix 14.04 Alpha comes as a July 4 surprise to many who believed the controversial project would become reality sooner or later. It beautifully integrates the MATE desktop environment into the latest upstream Ubuntu release.
The distribution was developed by a few members of the Ubuntu community and provides users with an old-school graphical desktop environment, which reminds us of the good ol’ times of Ubuntu 10.04.
-
For some brief benchmarking during Independence Day in the US, I ran some tests comparing Ubuntu 14.04 LTS stable against a fresh development snapshot of Ubuntu 14.10.
Over Ubuntu 14.04, the Ubuntu 14.10 “Utopic Unicorn” in its current development state has the Linux 3.15 kernel (but will end up using Linux 3.16), Unity 7.3.0, Mesa 10.2 (10.3 should make it in time for Ubuntu 14.10), and GCC 4.8.3 (while GCC 4.9 should make it for 14.10).
-
As I have already written a few times already, Canonical’s Alan Pope and Martin Wimpress, one of the leading MATE developers have been working a lot at Ubuntu MATE Remix, a Ubuntu spin which uses Mate as the default desktop environment.
-
-
Flavours and Variants
-
Cinnamon has come a long way in terms of both usability and responsiveness, and Mint 17 ‘Qiana’ stands proof of this. As mentioned in my review of Mint 17 KDE edition, this release will be supported for five years, and it will also be the base for development of future Mint releases.
-
-
Will your next car run Linux? Cars go open-source with Automotive Grade Linux It’s early days, but Automotive Grade Linux already looks better than most proprietary systems
In-car tech has just gone open source with news of a new automotive-grade build of the Linux operating system. But what does this mean for your next car?
Linux in various forms is already widely used in cars. But to date, it’s largely been used in embedded systems, the operations of which are mostly obscured from owners and drivers.
-
-
Phones
-
Android
-
Reaching out to the next billion connected users is a phrase that has been tossed around liberally.
Mozilla used it when they announced their $25 smartphone initiative. Nokia’s (now Microsoft’s) Stephen Elop used it when Nokia launched the revamped Nokia Asha line last year, and again when he announced the Nokia X. Last year Google used the same phrase as it launched Android 4.4 KitKat.
However, these companies’ efforts are still to leave a mark in the countries where the supposed next billion connected customers reside. Firefox’ $25 smartphones are yet to enter the market, neither Nokia’s Asha nor X line have turned out to be “hot items”, while affordable smartphones running KitKat are still few and far between.
-
The security model on the Google Nexus devices is pretty straightforward. The OS is (nominally) secure and prevents anything from accessing the raw MTD devices. The bootloader will only allow the user to write to partitions if it’s unlocked. The recovery image will only permit you to install images that are signed with a trusted key. In combination, these facts mean that it’s impossible for an attacker to modify the OS image without unlocking the bootloader[1], and unlocking the bootloader wipes all your data. You’ll probably notice that.
-
HTC One M8 Prime release date may happen between October and December and is set to come preinstalled with the new Android L OS.
An XDA member leaked the roadmap of HTC in rolling out the Android L OS for its handsets. It seemed that HTC will offer the upcoming version of Android OS to its two-year-old gadgets. In a leaked document by HTC tipster @LlabTooFeR, smartphones from the past two years have all been marked with the “evaluation” stamp. Their tentative timeline is between October and December.
-
A new release is out for BlueZ, the Linux Bluetooth stack, with the developers continuing to work on the same theme of the past few months of adding Android features for BlueZ.
This week’s BlueZ 5.21 release adds support for the following features from Android: Scan Parameters, Device Information, and Health Device. BlueZ 5.21 also adds a kernel background auto-connection feature, support for storing/loading connection parameters, and also boasts a couple fixes over BlueZ 5.20.
-
CMS
-
“We’re heavily involved in Drupal. I’m a member of the Drupal security team and the former lead of the team for over two years,” Knaddison said. “So it’s an area where we have a fair amount of expertise and depth, and we feel that our situation is best served by fixing vulnerabilities directly in the software itself.”
-
Public Services/Government
-
Using open source software solutions is helping a Welsh pilot project to manage flood risks and provide a stepping stone for future research. The Citizen Observatory Web (Cobweb) project involves citizens using their smartphone or tablets, to submit data observations within the Dyfi area in Wales, to help collect environmental data for use in evidence based policy.
-
South Korea said that it will move away from Windows in the future to avoid dependency on the Microsoft operating system, citing the fact that Windows XP is no longer supported.
-
Usage of idiosyncratic software could push the Korean government away from Microsoft’s offerings and into open-source OSes like Linux
-
Openness/Sharing
-
In this week’s edition of our open source news roundup, we celebrate our digital independence and take a cruise with Automotive Grade Linux. Plus more!
-
-
Programming
-
Damian Conway is one of the Guardians of Perl (our term) and one of Perl 6′s chief architects. But he’s chiefly a computer scientist, a brilliant communicator and an educator. His presentations are often worth crossing continents for. He was the Adjunct Associate Professor in the Faculty of Information Technology at Melbourne’s Monash University between 2001 and 2010, and has run courses on everything from Regular Expressions for Bioinformatics to Presentation Aikido (and of course, lots of Perl). Which is why, when we discovered he was making a keynote at this year’s QCon conference in London in March, we braved train delays and the sardine travelling classes of the London Underground to meet him opposite Westminster Abbey.
-
Search company extends bans on pornography ads across its network, while conservative US pressure groups claim credit
-
Health/Nutrition
-
“We know in the field of aging that some people tend to senesce, or grow older, more rapidly than others, and some more slowly,” Olshansky told the Washington Post. “And we also know that the children of people who senesce more slowly tend to live longer than other people.”
-
Security
-
Defence/Police/Secrecy/Aggression
-
-
We could have built 120,000 new homes, desperately needed. Instead we spent the money on a bloody big ship. To what purpose? An aircraft carrier is of no use to defend the British Isles – land based planes can do that much better. It is to enable our armed forces to operate elsewhere, far from here. In other words, it is not for defence, it is for attack. It was ordered in the Blairite era of enthusiastic invasion of other countries.
-
The Queen will formally name the Royal Navy’s biggest ever ship on Friday, with whisky replacing the more traditional champagne at the ceremony.
She will smash a bottle of Islay malt whisky against the HMS Queen Elizabeth at the event at Rosyth dockyard in Fife, where the 65,000-tonne aircraft carrier has been assembled and fitted out.
The Queen will be accompanied by the Duke of Edinburgh at the naming ceremony, a naval tradition dating back thousands of years that combines a celebration and a solemn blessing.
-
Murphy was at Volk Field that day protesting drones, unmanned aerial vehicles. It was his first arrest at Volk Field, but his eighth or ninth overall — he lost count.
-
As our military contemplates Iraq again, we’re beset by unchallenged magical thinking — and a dangerous narcissism
-
Ideology or religion, nationalism, self-determination, and independence appear lofty notions and goals, but in reality, it is “always … about the oil, stupid!” to paraphrase Professor Schwartz paraphrasing Bill Clinton.
-
-
This mind-set is especially odious since the United States supported the terrible dictator Fulgencio Batista, and supported businesses and American mobsters who controlled the economy, impoverishing Cuba and its people.
We tried to bring Castro and his government down repeatedly, attempted to kill him, and placed CIA agents and others there to stir up revolt. These actions are not in the spirit of democracy and in line with our country’s best ideals. They are in line with those who think of power, control, and empire, but who hide behind the empty invocations of manifest destiny, national security, and democracy promotion.
-
His CIA career included assignments in Africa, Afghanistan and Iraq, but the most perilous posting for Jeffrey Scudder turned out to be a two-year stint in a sleepy office that looks after the agency’s historical files.
-
A 19-year veteran of the CIA claims he was fired for trying to make hundreds of once-secret documents public. Jeffrey Scudder shares his story about how his career unraveled.
-
The root of the CIA’s intervention in Congo was an overhyped analysis of the communist threat.
-
-
One key to solving the ISIS crisis is hunkered down in the presidential palace in Damascus, and his name is Bashar al-Assad. Demonized by the United States and by neoconservatives long before he waged a ruthless, take-no-prisoners blitzkrieg against the American- and Saudi-supported rebellion that began in 2011, Assad has proved to everyone (with the possible exception of Secretary of State John Kerry) that he’s staying put, at least for the foreseeable future. For all intents and purposes, Assad has won the civil war in Syria, and short of an Iraq-style invasion—which isn’t in the cards— there’s no way for the United States to oust Assad. Which is a good thing, because his ouster would immeasurably strengthen the extremists who’ve led the fight against him, including the Islamic State in Iraq and Syria, now “the Islamic State,” the Caliphate-mongering radicals who are an Al Qaeda offshoot. On the other hand, by ending its support for the Syrian rebels, who don’t have a prayer anyway, the United States would strengthen Assad and allow him to crush ISIS.
-
The revelation that General David Richards, the former head of Britain’s Armed Forces, drew up plans to train a 100,000-strong Syrian rebel army shows just how desperate the British government was to become embroiled in Syria’s brutal civil war.
During his three-year tenure as Chief of the Defence Staff, Lord Richards of Herstmonceux, as he has now become, was deeply sceptical of the Coalition’s willingness to embark on ill-considered – and potentially catastrophic – military adventures in the Arab world.
-
-
Britain was considering the option of training a massive, 100,000-strong army in Turkey and Jordan to defeat President Bashar Assad, according to a plan drawn up by a leading British general. The invasion was later scrapped as too risky.
-
James Risen of The New York Times, using recently disclosed State Department documents, has written a bombshell-of-a-story chronicling how Blackwater’s top manager threatened to kill the U.S. government’s chief investigator in 2007, thus thwarting an investigation into Blackwater’s operations just weeks before the company’s guards massacred 17 Iraqi civilians.
The story is characteristic Risen: unflinchingly and thoroughly reported. However, Risen may not be able to write such stories in a matter of months. Instead, he may be sitting in a jail cell as a result of a case being prosecuted against him by the Obama administration.
-
Russia sent several disassembled Su-25 fighter jets to Iraq this week, and Iran has also supplied Su-25s.
-
There’s a reason the CIA wanted to prevent the publication of Douglas Valentine’s 1986 book, The Phoenix Program: America’s Use of Terror in Vietnam. This masterwork is more than an exposé of the US pacification program in Vietnam the book is titled after. It is an indictment of a cynical and bloody plan to kill Vietnamese.
-
The Cold War against the Soviet Union became an industry in the United States.
-
With an ethnic Chechen Omar Shishani coming to the spotlight in ISIS’s activities in Iraq, analysts say Chechen war was an attempt by the Western countries to destabilize Russia through the Caucasus.
-
-
What we are seeing going on in the Ukraine can be understood from the perspective of American political intrigue. The true elite power in America is rapidly losing power and they are in a state of panic. These people are for the most part the former “cold warriors” in America’s military and intelligence establishments and their political underlings who are handled by them. The former are mainly remnants left over from the first Bush’s reign at the C.I.A. They are “American Firsters” who cloak themselves under the banner of patriotism however their true motivation is simply power for their own self-interests.
-
U.S. “unnamed officials” confirmed to Reuters on Thursday that over a hundred military troops have been operating covertly in Somalia since 2007.
-
Transparency Reporting
-
16 July hearing is first legal battle in the case since WikiLeaks founder sought asylum in the Ecuadorean embassy in London
-
Swedish Foreign Minister Carl Bildt refuses to address questions from Democracy Now!’s Amy Goodman about the case of WikiLeaks founder Julian Assange, who is wanted for questioning in Sweden on allegations of sexual offenses. Assange’s attorneys recently asked the Swedish government to withdraw a warrant that has kept him confined in Ecuador’s London Embassy for two years. Assange has voiced fears he would ultimately be sent for prosecution in the United States if he were to return to Sweden. Assange’s attorneys say the warrant should be lifted because it cannot be enforced while Assange is in the embassy and Swedish prosecutors refuse to question him in London. Although Assange faces a warrant for questioning, he has not been formally charged. Fifty-nine international organizations have submitted reports to the United Nations challenging Sweden’s treatment of Assange. Speaking at the Almedalen political festival in Visby, Bildt refuses to address the case directly, calling it an issue for the Swedish judicial system, not its political one. We get reaction to Bildt’s comments from Assange legal adviser Jen Robinson, who also discusses the parallels between Assange and National Security Agency whistleblower Edward Snowden. “We are now seeing a trend of whistleblowers, publishers, journalists having to seek asylum and refuge in countries around the world because of their concern about prosecution in the United States,” Robinson says.
-
Environment/Energy/Wildlife
-
-
Saving our skins might be surprisingly cheap. To avoid dangerous climate change, the world needs to boost spending on green energy by $1 trillion a year. That sounds scarily large, but we could cover a lot of it using the subsidies currently handed to fossil fuels.
-
The GOP delayed raising auto efficiency standards for 25 years, shouting it would “destroy Detroit.” Ironically, when the CAFE standards were finally raised, in Obama’s 1st year, guess what happened? (1) The GOP tried – openly and vociferously – to destroy the U.S. auto industry by refusing loans to GM and Chrysler (loans that are now 90% repaid). (2) The mileage standards are working! Mileage is rising rapidly, American drivers are saving billions at the pump, the automakers are highly profitable, the air is cleaner… a positive sum game with no negative aspects at all…
-
Finance
-
On Monday the Supreme Court struck down a key part of the Affordable Care Act, ruling that privately-owned corporations don’t have to offer their employees contraceptive coverage that conflicts with the corporate owners’ religious beliefs.
The owners of Hobby Lobby, the plaintiffs in the case, were always free to practice their religion. The Court bestowed religious freedom on their corporation as well—a leap of logic as absurd as giving corporations freedom of speech. Corporations aren’t people.
-
In a recent New York Times op-ed article, Nobel Prize-winning economist Joseph Stiglitz theorized that capitalism does not inevitably produce inequalities in wealth. Instead, he argued, today’s inequalities result from policy decisions made by politicians on all sorts of matters that affect people’s income: the tax structure that favors the rich, the bailout of the banks during the Great Recession, subsidies for rich farmers, cutting of food stamps, etc. In fact, he concluded, today there are no “truly fundamental laws of capitalism.” Thanks to democracy, people can steer the economy in a variety of directions and no single outcome is inevitable.
-
Journalist Phillip Dorling traced the impulse behind the Occupy movement back to the release of the U.S. Army helicopter gunship Collateral Murder video and noted how it was strongly based on the work of the whistleblower website Wikileaks. Amnesty International pointed to the role of leaked documents in triggering revolutionary global uprisings. The BBC documentary WikiLeaks: Secret Life of a Superpower also attributed their revelations as the spark for Arab revolutions, showing how U.S. cable leaks shared through social networking sites in 2010 became a powerful force that finally toppled the corrupt Tunisian dictator Ben Ali.
-
Grant by US agency to open markets to ‘competition’ draws protests from Salvadoran farmers and concern from NGOs
-
Censorship
-
-
-
Browse the web in the UK, and sooner or later there’s a good chance you’ll stumble across a website that’s been blocked. Sites like The Pirate Bay, Fenopy and H33t are no longer viewable due to court orders preventing access, and other sites — many perfectly legitimate — are being blocked by censorship filters.
-
Censorship, in most cases, is what happens in the newsroom.
-
Google — which opposed the court decision — responded by introducing an online form giving visitors to its European sites a formal route to make removal requests. In the first four days after uploading the form, Google received more than 41,000 requests.
-
-
Kendall Jones is a 19-year-old from Texas, a university student and a former cheerleader – but those characteristics of her life are not what she posts about on Facebook.
-
The European Court of Justice ruling requiring Google to ‘hide’ stories shows the need to defend digital freedom of speech
-
Freedom of religion was intended to guarantee freedom from governmental persecution because of private beliefs. Today, that freedom has been twisted and perverted into instead creating persecution against individuals, backed up by governmental force. It is time to abolish it as archaic and obsolete, and let the modern freedoms of opinion and speech take its place.
-
When the actor and comedian Steve Coogan (pictured) was made a patron of the Index on Censorship earlier this month, the British media’s guffawing could be heard round the world. Coogan, you see, is a leading light in Hacked Off, the celeb-packed censorious outfit that has spent the past three years agitating for state-backed regulation of Britain’s raucous tabloid press. For a venerable free-speech group like Index on Censorship to make the celebrity censor Coogan a patron is like the British Humanist Association giving a job to the Pope of Rome.
-
Sept. 17 last year was a pretty bad day for the Constitution on our campuses. Robert Van Tuinen of Modesto Junior College in California was prevented from passing out copies of the Constitution outside of his college’s tiny “free speech zone.” Near Los Angeles, Citrus College student Vinny Sinapi-Riddle was threatened with removal from campus for the “offense” of collecting signatures for a petition against NSA domestic surveillance outside his college’s tiny free speech area. I mention September 17 because that was Constitution Day. – See more at: http://westhawaiitoday.com/opinion/columns/colleges-are-slowly-taking-away-your-first-amendment-rights#sthash.VbYv0a4f.dpuf
-
Privacy
-
Freshly released but heavily censored FBI documents include tantalizing new information about events connected to the Sarasota Saudis who moved suddenly out of their home about two weeks before the 9/11 terrorist attacks, leaving behind clothing, jewelry and cars.
-
The law which bans online businesses from storing personal data of Russian citizens on servers located abroad today passed its third and final reading in the State Duma – the Russian parliament.
-
Only a fraction of our connections on social media are people we love. The rest are people we already probably dislike
-
-
-
-
The bare essentials of what happened over a week in 2012 are now clear. A study was conducted, unknown to the millions of Facebook users and to the many directly affected, by researchers from Facebook and from two American universities — Cornell University and the University of California. To carry out this hidden manipulation, Facebook altered the content that appeared on certain users’ news feeds to control the number of posts that contained words with positively or negatively charged emotions.
-
-
Why pledge allegiance to the united tech giants of America – and the surveillance for which they stand? I am one man, relatively invisible, with liberty and justice online
-
An article published on July 3 by German public broadcaster Das Erste reveals that the National Security Agency (NSA) is using its surveillance program XKeyScore to target users of the traffic anonymizing software Tor and the Tails operating system, for deep packet inspection, data retention, and heightened surveillance.
The article is based on “exclusive access to top secret NSA source code, interviews with former NSA employees, and the review of secret documents of the German government.” This is the first leak regarding NSA surveillance, which includes a portion of the programming source code being used by the spy agency.
-
Russia’s parliament passed a law on Friday to force Internet sites that store the personal data of Russian citizens to do so inside the country, a move the Kremlin says is for data protection but which critics see an attack on social networks.
-
That’s the message from Cheltenham’s Liberal Democrat MP Martin Horwood who believes it has become “fashionable” for people to have a go at GCHQ.
-
This week, Michael Hayden, who headed the CIA and the NSA during the Bush Administration, said that if he’d been on the Supreme Court for the 9 to 0 decision requiring a warrant before cell phone searches, the vote would’ve been 10 to zero. Former Congresswoman Jane Harman also spoke in favor of the ruling.
-
Germany summoned the US ambassador in Berlin on Friday following the arrest of a man reported to have spied for the United States, heightening friction between the two countries over alleged US eavesdropping in Germany.
-
-
A German student who ran a server that hid people’s IP addresses to help them stay anonymous was targeted by the United States National Security Agency (NSA). What are Germany’s means for holding the NSA accountable?
-
-
-
-
-
-
-
-
-
-
-
Linux Journal is reporting that apparently the NSA considers it an “extremist forum” and the NSA may also be targeting Linux users for increased surveillance. Linux Journal’s information is based on reports issues by German media that disclosed details on who the NSA has been targeting.
-
-
-
-
-
-
Testifying, Binney accused the NSA of having a “totalitarian mentality” and wanting “total information control” over citizens in breach of the US constitution. It was an approach that until now the public had only seen among dictators, he added.
-
When it comes to spying on its own citizens the former East Germany certainly had a lock on things.
-
-
Social networking site Facebook made headlines for a recently published study where it modified the emotional content of what appeared in people’s news feeds and studied the after-effect of that change on users. The experiment has been rightly condemned as an intrusion and a manipulation of unsuspecting users of the site. By not seeking informed consent of over 700,000 users in an experiment, Facebook breached broadly accepted ethical guidelines.
-
The Onion Router project has fired back at the National Security Agency, after it emerged that those who use the network – and read Linux magazines – are considered worthy of surveillance.
-
-
-
-
-
-
-
-
Aiming for a fresh start in troubled U.S.-India relations, U.S. Sen. John McCain met with newly elected Prime Minister Narendra Modi today in New Delhi. But McCain’s two-day visit was overshadowed by reports that the U.S. National Security Agency was granted permission in 2010 to spy on Modi’s political party.
-
-
-
Federal prosecutors say a 31-year-old German man was arrested Wednesday on suspicion of spying for foreign intelligence services. They did not identify the suspect or the intelligence services.
-
In the latest turn in the yearlong tensions with Germany over U.S. spying, a German man was arrested this week on suspicion of passing secret documents to a foreign power, believed to be the United States. The U.S. ambassador, John B. Emerson, was summoned to the Foreign Office here and urged to help with what German officials called a swift clarification of the case.
-
-
-
-
As if there weren’t enough reasons to attend HOPE X in NYC this month, now there’s a killer whistleblower panel.
-
A man believed to be a German intelligence operative has been arrested on suspicion of being a double agent for the US.
A spokesman for Chancellor Angela Merkel said she had been informed of the arrest but refused to give any further details.
“The Chancellor was… informed of this case,” Merkel spokesman Steffen Seibert told reporters in Berlin.
-
-
-
-
-
-
Most of the public and congressional concern about the National Security Agency’s electronic surveillance programs has focused on the bulk collection of Americans’ telephone “metadata” under a strained interpretation of the Patriot Act. That’s understandable, given the indiscriminate nature of the program. Fortunately, President Obama has now directed that the government obtain court approval before “querying” or searching the database of Americans’ phone records, and legislation moving forward in Congress would end government storage of the records.
-
-
As Wheeler notes, this wording may also indicate the agency’s anticipation of bulk records being maintained and held by service providers, thus further limiting its splashing around in the collected metadata. But it does indicate that the recently-imposed “hop” limitation is nearly useless. Rather than simply searching one hop out from the RAS selector, the agency is having its analysts build contract chains starting from that hop and moving outward. This puts the agency right back where it was prior to the minimal restrictions placed on it by the administration’s reform measures.
-
-
Germans still have an “overwhelmingly positive” image of the US, according to RTL’s Editor-in-Chief Peter Kloeppel, speaking at a round table discussion centered on transatlantic relations in light of the NSA scandal.
-
Civil Rights
-
INDEPENDENCE WASN’T invented in America on this day in 1776. Freedom and self-rule are concepts that predate George Washington and our other Founding Fathers by centuries.
-
From tongue-in-cheek London to NSA-wary Berlin and skeptical Dubai, expats are coming to grips with just how unsettling ‘blind patriotism’ can be
-
But as much as I’d like to wave a flag and have a grand ol’ time. I know that the land of the free has taken many steps in the wrong direction. In 2012 President Barack Obama signed into law the NDAA (National Defense Authorization Act). This act gave the U.S. government the right to indefinitely detain any U.S. citizen without trial, forever.
-
The shocking scale of female genital mutilation (FGM) in a Swedish school, where every single girl in one class had been subjected to the procedure, has been revealed.
-
A controversial report into EU Freedom of Movement, written as part of the government’s review of the balance of competencies within the European Union must be disclosed, the Information Commissioner has decided.
-
Document Casts Doubt over Accuracy of US Reports from Tehran — and Adds to Debate over Responsibility for the Coup
-
The long history of British abuse and torture in Kenya, Malaya, Aden, Cyprus, Northern Ireland and Afghanistan cannot be explained as the work of a few ‘bad apples’.
-
Women claiming damages from the Metropolitan police after being tricked into forming sexual relationships with undercover officers have won a legal victory in the high court in their ongoing battle for compensation.
Mr Justice Bean said on Wednesday that the Met could no longer rely on issuing a “neither confirm nor deny” (NCND) response to the claims for damages from the women.
-
Now, in the new post-constitutional America, we, too, torture. For legal purposes we do “a little sidestep” in the tradition of Charles Durning in “The Best Little Whorehouse in Texas.” We torture outside the United States and thus our Justice Department contends we are not violating the Constitution.
It isn’t too late. There are about 50 men and women in this country who run the television industry. They are far more powerful than members of the Federal Reserve or elected officials, such as members of Congress. They and their television companies have the power to open up a debate on all of this. If not, we are in the process of losing the great American experiment without even a chance to say goodbye. It’s the end of America as we know it.
-
Ministers yesterday said enhanced security would be in place for some time to come, while offering assurances that it will not cause “significant disruption”. It is also noteworthy that the official UK threat status remained unchanged at “substantial” – two rungs below the highest level. None the less, as school holidays begin and families head for the airports, the requirement to arrive at least two hours before take-off is likely to become closer to three hours. So accustomed have we become to removing jackets, belts and shoes that the queues tend to move faster than they once did. But there has been no relaxation in the ultra-strict measures brought in a few years ago which, for instance, prevented significant amounts of liquids being taken through security in hand luggage. Once introduced, they tend to be permanent.
-
Did you know that fireworks are actually a “propaganda campaign that inures us—especially the children among us—to the real wars half a world away”?
-
The pine-cone POO-lice are doing their jobs with all do vigilance. My cousin was cleaning the pine-cones from the ground, around his motor-home. A call was placed to 911 that a motor-home was emptying its waste in the street. The city police blockaded the street and sent in five squad cars. With palms resting on their semi-automatic pistols, the police were ready for action. A pine-cone mistaken for a human poo. Police ready to shoot an American over poo or pine-cones.
-
-
-
As a poll of American voters ranks Barack Obama as the worst president of all time, Matt Lewis says his presidency has been a disastrous flop – talented and much-hyped but ultimately unsatisfying
-
The Fifth Amendment is supposed to ensure that you are innocent until proven guilty, and government authorities cannot deprive you of your life, your liberty or your property without following strict legal guidelines. Unfortunately, those protections have been largely extinguished in recent years, especially in the wake of Congress’ passage of the National Defense Authorization Act (NDAA), which allows the president and the military to arrest and detain Americans indefinitely without due process.
-
If you judge political success by delivering on a three-word slogan at any cost, then Tony Abbott’s asylum policy has succeeded. He has for now, as he promised, “stopped the boats”.
-
Internet/Net Neutrality
-
-
-
This was followed by another question, irrespective of the respondents said yes or no. It asked them what they believed to be the biggest threat that the Internet will face by 2015. The experts canvassed by Pew believe that the government and big online corporations are the biggest threat to the Internet, and not hacking or some other form of cyber war.
-
-
-
Intellectual Monopolies
-
Copyrights
-
Qualcomm has forced GitHub to take down over 100 Git repositories over alleged copyright infringement.
Using the US Digital Millenium Copyright Act (DMCA), Qualcomm has forced GitHub to take down over 100 Git repositories on the basis of “Cyveillance has recently discovered the unauthorized publication, disclosure, and copying of highly sensitive, confidential, trade secret, and copyright-protected documents on the below web site. Specifically, we have confirmed that the documents whose locations and filenames identified below are confidential and proprietary to Qualcomm and were posted without Qualcomm’s permission.”
-
A company claiming to represent Qualcomm has shut down a number of repositories on source-code sharing site GitHub under provisions of the US Digital Millennium Copyright Act (DMCA) – including at least one repository belonging to Qualcomm itself.
-
Twitter has removed the profile pictures of several of its users after the company received a takedown notice from World Cup organizer FIFA. The football organization forbids the use of any of its official logos and emblems on social media, including pictures of the World Cup trophy.
-
The website of Argentina’s equivalent of the Recording Industry Association of America was hacked Tuesday and transformed into a Pirate Bay proxy, serving up torrents instead of industry lobbying affairs.
-
In a bid to tackle alleged infringement, popular music sharing platform SoundCloud is offering unlimited removal powers to certain copyright holders. Responding to a complaint from a UK DJ the company admitted that Universal Music can delete any and all SoundCloud tracks without oversight.
Permalink
Send this to a friend
07.05.14
Posted in Microsoft at 7:21 am by Dr. Roy Schestowitz
Summary: Microsoft control over the Internet (control that should never have been granted) is used to shut down millions of legitimate services
THIS is an incident that has infuriated many people, companies, organisations, etc. It’s widely publicised by now. Microsoft is above the law, apparently, or rather, Microsoft is the law in the United States (see our page about “Microsoft influence in the United States government”).
Tux Machines, our near-real-time news site, relied on No-IP until some months ago. Millions of people use the site every month. Millions of services and sites use No-IP every month. It means that billions of people are dependent on No-IP . It is a critical service for perhaps tens of millions of Web sites and other services (such as LDAP, E-mail, and so on). Well, Microsoft’s outrageous demands have ruined the services. It is Microsoft’s fault (due to its own sabotage like back doors and incompetence that makes many insecurities). Do Microsoft’s demands now supersede the rest of us? Can Microsoft knock offline millions of services all around the world and if so, where did Microsoft acquire such an infitinite power? Here is an explanation and roundup of the past few days’ responses, which resulted in Microsoft relinquishing control of No-IP (when it was already too late and huge damage had been done).
“Can Microsoft knock offline millions of services all around the world and if so, where did Microsoft acquire such an infitinite power?”Let’s start by stating that Microsoft has back doors and much of the blame for SPAM, DDOS etc. should be put on Microsoft Windows, which is insecure by design. Microsoft cannot claim to be pursuing better Internet security (ever!) while it does what it does for the NSA. For Microsoft to take a whole network to court is like the FBI and USDOJ going after MegaUpload; however, Microsoft, unlike the FBI and USDOJ, is not a Federal agency. So what the heck is going on here? And how can Microsoft get away with it? Surely there should be a class action lawsuit, but will victims be capable of finding each other, then organising? Here is the response from No-IP and an article about it which says:
Millions of legitimate servers that rely on dynamic domain name services from No-IP.com suffered outages on Monday after Microsoft seized 22 domain names it said were being abused in malware-related crimes against Windows users.
“Apparently,” it says, “the Microsoft infrastructure is not able to handle the billions of queries from our customers. Millions of innocent users are experiencing outages to their services because of Microsoft’s attempt” (Microsoft is probably arrogant enough to not even apologise).
“Microsoft now claims that it just wants to get us to clean up our act, but its draconian actions have affected millions of innocent Internet users,” says the above.
They should organise for class action lawsuit. Perhaps No-IP should sue Microsoft for loss of many customers and the customers too should sue Microsoft for the damage caused by its overreach and abuse. No-IP ought to help its clients organise for a class action lawsuit.
Two days ago I drafted a post about this, calling for class action against Microsoft over this whole overreach. I did not publish it at the time as I was waiting to see how much damage was done overall. The services had not been restored by that time. Some services were down for several days. Now, let’s try to estimate the damage. If we assume $1000 compensation for 1.8 milion servers, then that’s $1.8 billion, which Microsoft can probably borrow from one of its offshore havens to pay in reparations. Microsoft should be sued in an organised fashion and prepare to pay billions of dollars in compensation, just as they were forced to pay fines after browser-related crimes.
“So, to go after 2,000 or so bad sites, [Microsoft] has taken down four million,” Gogun said. Gogun is a senior employee at NoIP.
Here is some press coverage of interest and feedback from victims, including:
- “The dynamic DNS free domains from NoIp are working again. Thank @mictosoft for suspending 4mil honest users due to a “technical error”.” (Source)
- “No-Ip.com categorically claims microsoft did not talk or consult with them before hijacking their networks! Disrupted millions!” (Source)
- “Good to see that in the “land of the free” the bully with the money can take down the small guy” (Source)
- “Dear Microsoft, please stop breaking the domains relied on by everyone who doesn’t have a static IP – surely compensation due? #noip” (Source)
How can Microsoft gain the power to just shut down parts of the Web without an open legal process? Watch IDG’s (partly Microsoft-funded) coverage of the No-IP fiasco (tilted in favour of Microsoft to make it look like innocent “error”).
Tux Machines, which used to be No-IP-managed, went down around the same time that I repeatedly protested about this online. Interestingly enough (and that’s a fact), DDOS attacks on Tux Machines (by Windows-running PCs) began just a few minutes after I repeatedly ranted about Microsoft’s sabotage of No-IP. I can’t prove the correlation, but it was curious enough to note. The botmaster/s attacking Tux Machines was not stupid. There was hammering on different parts of the site each time one was blocked/denied (I had to manually block huge chunks of IPs and addresses). Following Microsoft’s logic, many of its back-doored (for NSA) Windows PCs attack Web sites, so it’s fine to just shut down Windows PCs universally.
Here is some other and later coverage of developments and an official response from Microsoft (face-saving lies). 1.8 million customers are said to be affected and “Microsoft Insists That No-IP ‘Outage’ Was Due To A ‘Technical Error’ Rather Than Gross Abuse Of Legal Process,” says TechDirt:
Microsoft Insists That No-IP ‘Outage’ Was Due To A ‘Technical Error’ Rather Than Gross Abuse Of Legal Process
Earlier today, we wrote about a ridiculous situation in which Microsoft was able to convince a judge to let it seize a bunch of popular domains from No-IP.com, the popular dynamic DNS provider, routing all their traffic through Microsoft servers, which were unable to handle the load, taking down a whole bunch of websites. Microsoft claimed that this was all part of a process of going after a few malware providers, though No-IP points out that Microsoft could have easily contacted them and the company’s fraud and abuse team would have cut off those malware providers.
To quote the conclusion: “That’s not a “technical error.” That’s Microsoft blatantly making an extreme claim that convinced a judge to hand over a whole bunch of domain names without any kind of due process or adversarial hearing. While Microsoft may have then had a technical error on top of that, what kicked this off was a very, very big legal error.”
Microsoft probably knows that it’s about to be sued, so it is making up stories about “errors” while Microsoft-funded press repeats the lies. Here is AOL coverage:
Microsoft seized 23 domains this week from No-IP, a provider of dynamic DNS services, after filing a civil suit alleging that the domains in question were used to distribute malware.
The domains, according to Microsoft, were used 93 percent of the time for distributing the Bladabindi and Jenxcus malware families. A court granted Microsoft custodianship — DNS authority — of the digital properties so that it could “identify and route all known bad traffic to the Microsoft sinkhole and classify the identified threats.”
This was an abuse of the Court. Microsoft deceived the Court to take over what one writer called “universe” (millions of domains). Microsoft broke the Internet for several days, having abused or bamboozled a court.
To quote one of our readers, Microsoft “is getting the heat for the attack against No-IP. Yes, they failed by trying to run Microsoft products in a production situation but the actual anger needs to be directed at the court which handed, ex parte, No-IP’s business over to Microsoft. How on earth was that allowed? That’s the real question and one that Microsoft appears to what to distract from with stupid side tracks on ‘technical issues’ to bring the attention away from legal issues. Fraud. There was no accidents involved: Microsoft took over the domain on purpose after a lot of work manipulating the court.
“Then underneath the technical side is Microsoft inherent, built-in vulnerability. Without Microsoft there would be no botnets.” █
Permalink
Send this to a friend
« Previous Page — « Previous entries « Previous Page · Next Page » Next entries » — Next Page »