EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

08.29.15

Links 29/8/2015: NetworkManager 1.0.6, Systemd Merges “su” Command Replacement

Posted in News Roundup at 7:12 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

Leftovers

  • The 20 toughest job interview questions in the world

    Impossible to prepare for; unrelated to the job: jobseekers are facing tougher and weirder questions than ever in job interviews.

    Employers are turning to tricky questions to quickly sort through high numbers of candidates, so that only the very best shine through, according to Joe Wiggins, spokesman for Glassdoor in the UK.

    “Often it is to see how you react under pressure,” Wiggins said. “It’s to see what happens when the rug is pulled from under you – how do you prepare for the completely unexpected?”

  • Science

  • Hardware

    • LG’s new Rolly wireless keyboard turns into a pocket stick

      LG just announced the “Rolly,” a Bluetooth keyboard that folds up along the four rows of keys to create a wand-like device that can be tossed in a purse or pocket. LG is hardly the first electronics company to introduce a foldable, ultra-portable wireless keyboard — or even the first to introduce a gadget called the Rolly — but it might be the first to market either as a stick for your pocket.

  • Security

    • London Calling: Two-Factor Authentication Phishing From Iran

      This report describes an elaborate phishing campaign against targets in Iran’s diaspora, and at least one Western activist. The ongoing attacks attempt to circumvent the extra protections conferred by two-factor authentication in Gmail, and rely heavily on phone-call based phishing and “real time” login attempts by the attackers. Most of the attacks begin with a phone call from a UK phone number, with attackers speaking in either English or Farsi.

      The attacks point to extensive knowledge of the targets’ activities, and share infrastructure and tactics with campaigns previously linked to Iranian threat actors. We have documented a growing number of these attacks, and have received reports that we cannot confirm of targets and victims of highly similar attacks, including in Iran. The report includes extra detail to help potential targets recognize similar attacks. The report closes with some security suggestions, highlighting the importance of two-factor authentication.

    • Ins0mnia: Unlimited Background Time and Covert Execution on Non-Jailbroken iOS Devices

      FireEye mobile researchers discovered a security vulnerability that allowed an iOS application to continue to run, for an unlimited amount of time, even if the application was terminated by the user and not visible in the task switcher. This flaw allowed any iOS application to bypass Apple background restrictions. We call this vulnerability Ins0mnia.

    • Why is the smart home insecure? Because almost nobody cares

      It’s easy to laugh-and-point at Samsung over its latest smart-thing disaster: after all, it should have already learned its lesson from the Smart TV debacle, right?

      Except, of course, that wherever you see “Smart Home”, “Internet of Things”, “cloud” and “connected” in the same press release, there’s a security debacle coming. It might be Nest, WeMo, security systems, or home gateways – but it’s all the same.

    • Critical PayPal XSS vulnerability left accounts open to attack

      PayPal has patched a security vulnerability which could have been used by hackers to steal users’ login details, as well as to access unencrypted credit card information. A cross site scripting bug was discovered by Egyptian ‘vulnerabilities hunter’ Ebrahim Hegazy — ironically on PayPal’s Secure Payments subdomain.

    • Important Notice Regarding Public Availability of Stable Patches

      Grsecurity has existed for over 14 years now. During this time it has been the premier solution for hardening Linux against security exploits and served as a role model for many mainstream commercial applications elsewhere. All modern OSes took our lead and implemented to varying degrees a number of security defenses we pioneered; some have even been burned into silicon in newer processors. Over the past decade, these defenses (a small portion of those we’ve created and have yet to release) have single-handedly caused the greatest increase in security for users worldwide.

    • Finland detains Russian accused of U.S. malware crimes

      Finland confirmed on Thursday it has detained a Russian citizen, Maxim Senakh, at the request of U.S. federal authorities on computer fraud charges, in a move that Russia calls illegal.

    • Finland confirms arrest of Russian citizen accused of crimes in the US

      Finnish authorities have confirmed the detention of Maxim Senakh, a Russian citizen accused of committing malware crimes in the US. The Russian Foreign Ministry has expressed concern and called on Finland to respect international law.

    • More than 80% of healthcare IT leaders say their systems have been compromised

      Eighty-one percent of healthcare executives say their organizations have been compromised by at least one malware, botnet or other kind of cyberattack during the past two years, according to a survey by KPMG.

      The KPMG report also states that only half of those executives feel that they are adequately prepared to prevent future attacks. The attacks place sensitive patient data at risk of exposure, KPMG said.

      The 2015 KPMG Healthcare Cybersecurity Survey polled 223 CIOs, CTOs, chief security officers and chief compliance officers at healthcare providers and health plans.

    • Removal of SSLv3 from LibreSSL
    • Kansas seeks to block release of voting machine paper tapes

      The top election official in Kansas has asked a Sedgwick County judge to block the release of voting machine tapes sought by a Wichita mathematician who is researching statistical anomalies favoring Republicans in counts coming from large precincts in the November 2014 general election.

    • Friday’s security updates
    • Security updates for Thursday
    • nsenter gains SELinux support

      nsenter is a program that allows you to run program with namespaces of other processes

    • Iceland boosts ICT security measures, shares policy

      Iceland aims to shore up the security of its ICT infrastructure by raising awareness and increasing resilience. And next to updating its legislation, Iceland will also bolster the police’s capabilities to tackle cybercrime.

    • A Project to Guarantee Better Security for Open-Source Projects

      Open-source developers, however, can take steps to help catch these vulnerabilities before software is released. Secure development practices can catch many issues before they become full-blown problems. But, how can you tell which open-source projects are following these practices? The Core Infrastructure Initiative has launched a new “Best Practice Badge Program” this week to provide a solution by awarding digital badges to open-source projects that are developed using secure development practices.

  • Defence/Police/Secrecy/Aggression

    • Declassified CIA documents reveal how disastrous America’s post-9/11 plans really were

      First, the disastrous failures of US policy in Afghanistan and Iraq have led to an unprecedented programme of declassification of documents (some with significant redactions) as part of the cathartic process of trying to understand how so many mistakes were made before and after 9/11.

      Second, the cache of cables dumped by WikiLeaks, coupled with further revelations from material leaked by Edward Snowden, has provided an exceptional level of insight into the workings of the intelligence agencies over the past three decades, together with priceless new information about the decision-making processes and about operational activities.

      And third, there has been a cache of materials found locally following the military interventions of the past 12 years – such as audio tapes recovered from the presidential palace in Baghdad in 2003 that recorded thousands of hours of meetings, discussions and even phone calls made by Saddam Hussein and his inner circle, or boxes of cassettes that belonged to Osama bin Laden that were retrieved from a compound in Kandahar two year earlier.

      This treasure trove allows us to understand the failures, incompetence and poor planning that accompanied the invasions of Afghanistan and Iraq in astonishing detail, but also to frame these within the context of a wider region – and a wider period. These two countries form part of a belt that stretches from the Mediterranean to the Himalayas, linking East and West, and that for millennia has served as the world’s central nervous system. Trade, commodities, people, even disease, spread through the webs of networks that connect these locations to each other and ultimately connect the Atlantic coasts of Europe and North Africa to the Pacific coast of China and South-east Asia.

  • Transparency Reporting

    • Sweden and Ecuador to begin Julian Assange talks next week

      Sweden will begin talks with Ecuador about Julian Assange on Monday, after Stockholm moved to break the deadlock over five-year-old rape allegations against him.

      Sweden initially rejected a demand by Ecuador that the two countries establish a formal agreement on judicial cooperation before Swedish prosecutors could interrogate the WikiLeaks founder in Ecuador’s embassy in London, saying it did not negotiate bilateral treaties.

    • Exclusive: Read Julian Assange’s Introduction to The Wikileaks Files

      One day, a monk and two novices found a heavy stone in their path. “We will throw it away,” said the novices. But before they could do so, the monk took his ax and cleaved the stone in half. After seeking his approval, the novices then threw the halves away. “Why did you cleave the stone only to have us throw it away?” they asked. The monk pointed to the distance the half stones had traveled. Growing excited, one of the novices took the monk’s ax and rushed to where one half of the stone had landed. Cleaving it, he threw the quarter, whereupon the other novice grabbed the ax from him and rushed after it. He too cleaved the stone fragment and threw it afield. The novices continued on in this fashion, laughing and gasping, until the halves were so small they traveled not at all and drifted into their eyes like dust. The novices blinked in bewilderment. “Every stone has its size,” said the monk.

      At the time of writing, WikiLeaks has published 2,325,961 diplomatic cables and other US State Department records, comprising some two billion words. This stupendous and seemingly insurmountable body of internal state literature, which if printed would amount to some 30,000 volumes, represents something new. Like the State Department, it cannot be grasped without breaking it open and considering its parts. But to randomly pick up isolated diplomatic records that intersect with known entities and disputes, as some daily newspapers have done, is to miss “the empire” for its cables.

    • Assange: What Wikileaks Teaches Us About How the U.S. Operates

      At the time of writing, WikiLeaks has published 2,325,961 diplomatic cables and other US State Department records, comprising some two billion words. This stupendous and seemingly insurmountable body of internal state literature, which if printed would amount to some 30,000 volumes, represents something new.

      Like the State Department, it cannot be grasped without breaking it open and considering its parts. But to randomly pick up isolated diplomatic records that intersect with known entities and disputes, as some daily newspapers have done, is to miss “the empire” for its cables.

      Each corpus has its size.

      To obtain the right level of abstraction, one which considers the relationships between most of the cables for a region or country rather than considering cables in isolation, a more scholarly approach is needed. This approach is so natural that it seems odd that it has not been tried before.

      The study of empires has long been the study of their communications. Carved into stone or inked into parchment, empires from Babylon to the Ming dynasty left records of the organizational center communicating with its peripheries.

  • Environment/Energy/Wildlife

    • Naomi Klein on climate change: ‘I thought it best to write about my own raw terror’

      Naomi Klein, the Canadian author, film-maker and social activist, will arrive in Australia this month for a series of events.

    • WTO Ruling Against India’s Solar Push Threatens Climate, Clean Energy

      The World Trade Organization (WTO) on Wednesday ruled against India over its national solar energy program in a case brought by the U.S. government, sparking outrage from labor and environmental advocates.

      As power demands grow in India, the country’s government put forth a plan to create 100,000 megawatts of energy from solar cells and modules, and included incentives to domestic manufacturers to use locally-developed equipment.

    • SeaWorld criticism surges online after Harry Styles speaks out, analysts report

      It’s hard to imagine Wall Street bankers worrying about what One Direction heartthrob Harry Styles thinks. But, it turns out at least some of them do.

      Bankers at Credit Suisse on Thursday warned that Styles had sparked a surge in negative sentiment towards SeaWorld, the controversial aquatic theme park, which is already suffering a collapse in profits.

      “Does anybody like dolphins?” Styles asked his fans during a concert in San Diego, home to one of SeaWorld’s biggest parks, last month. Following a roar from the crowd, he told them: “Don’t go to SeaWorld.” Styles’s comments were captured by hundreds of people, including Game of Thrones’ Maisie Williams, and spread across social media.

  • Finance

    • More Than 4,000 Died Within Six Weeks Of Being Deemed ‘Fit For Work’, Reveal Government

      More than 4,000 people died within six weeks of being found “fit for work”, the Department for Work and Pensions (DWP) has revealed.

      Figures released today show that between December 2011 to February 2014, 4,010 people died after being told they should find work following a “Work Capability Assessment”.

      Of that figure, 1,360 died after losing an appeal against the decision.

      Labour branded the figures a “wake-up call” for the Government, who has faced criticism for the way the assessment tests are carried out.

    • TTIP deal: Business lobbyists dominate talks at expense of trade unions and NGOs

      European Commission officials have held hundreds of meetings with lobbyists to discuss the proposed Transatlantic Trade and Investment Partnership (TTIP) treaty – yet only around one in ten is with public interest groups.

      The world’s biggest companies in finance, technology, pharma, tobacco and telecoms are dominating discussions with the EU executive body’s trade department responsible for the proposed EU-US free trade treaty, which could become the biggest such deal ever made.

    • Jeb Bush Hits Up Hedge Funds in the Hamptons

      Jeb Bush is visiting the Hamptons today on a lucrative fundraising tour, hitting up multi-billionaires like hedge fund manager Julian Robertson to support his 2016 campaign.

      According to invitations obtained by the Center for Media and Democracy, the events over the next few days include a coffee reception in the morning, and a brunch at 11, and an evening reception. The fundraisers in the wealthy New York beach community are officially organized by Bush’s 2016 campaign–even though many of the hosts and attendees have already reached the legal maximum on contributions to Bush’s primary election effort.

  • PR/AstroTurf/Lobbying

    • Phone hacking: CPS may bring corporate charges against Murdoch publisher

      The Crown Prosecution Service (CPS) is considering bringing corporate charges against Rupert Murdoch’s British newspaper publisher over phone hacking, it has emerged.

      The Metropolitan police handed over a file of evidence on News International – now renamed News UK – to the CPS for consideration after an investigation that stretches back to 2011, when the News of the World was closed at the height of the scandal.

      “We have received a full file of evidence for consideration of corporate liability charges relating to the Operation Weeting phone-hacking investigation,” a spokeswoman confirmed.

      The file was transferred on 23 July and reignites the controversy for Rupert Murdoch’s News Corp, News UK’s parent company, which believed it had been through the worst and come out the other side after an eight-month trial of former News of the World journalists that concluded in June 2014.

    • On Fox, Rudy Giuliani Claims VA Shooter’s Suspected Mental Health Issues Went Unreported Because Of Equal Employment Regulations
    • Felicia Kornbluh on ‘Welfare Reform’ Anniversary

      Would that even that degree of critical consideration would be granted to the anniversary of another disaster for low-income communities of color: the move to “end welfare as we know it,” signed into law in August 1996 by Bill Clinton. If you don’t remember the media stampede — Black women having babies for government checks! Pregnant teenagers draining public resources! — that’s partly because elite media, having championed hard for the dismantling of the safety net, were markedly less interested in tracking the human fallout.

  • Censorship

    • United In Flight WiFi Blocks Popular News Sites

      So, just last month, we wrote about United Airlines idiotic inflight video system that forces you to install DRM on your own devices to watch a movie. And, now, it appears that the company is filtering out all sorts of news sites. The EFF’s Nate Cardozo was on a flight yesterday when he started noticing that he couldn’t get to certain tech websites, including Ars Technica and The Verge — instead receiving messages they were blocked due to United’s “access policy.” The same was true for political news site Daily Kos. Eventually he even realized that United also blocks the NY Times (via his phone after the laptop battery ran out).

    • Kimmel spices up the 2016 campaign with some creative censorship

      In this week’s installment of “Unnecessary Censorship,” Jimmy Kimmel Live uses its well-placed [bleeps] to make Trump’s bragging, Ted Cruz’s thoughts on political correctness, the Jeb Bush campaign’s plans, and a fan of President Obama all sound more vulgar than they were. In this week’s installment of “Unnecessary Censorship,” Jimmy Kimmel Live uses its well-placed [bleeps] to make Trump’s bragging, Ted Cruz’s thoughts on political correctness, the Jeb Bush campaign’s plans, and a fan of President Obama all sound more vulgar than they were.

    • Jimmy Kimmel censors Donald Trump on ‘This Week in Unnecessary Censorship’

      In the clip, the presidential candidate speaks to a crowd of his supporters, bragging about having a huge … something. Being bleeped twice makes whatever Trump is saying sound worse, and yet, oddly believable!

    • Tool Makes It Easier to Evade Online Censors

      He’s already talked with Tor developers about Marionette’s open-source code.

    • US bioethicist quits over censorship row at Northwestern University

      The edition had sparked controversy as it included a salacious account of a consensual sexual encounter between Syracuse University professor William J. Peace with a nurse in the 1970s, when he was an 18-year-old hospital patient.

    • Northwestern University bioethics professor resigns over censorship claim

      A Northwestern University professor has resigned her position at the Feinberg School of Medicine after, she said, her complaints of academic censorship were ignored.

      Alice Dreger, who worked part time as a clinical medical humanities and bioethics professor, initially complained in 2014 that the school dean removed a risque article from a website for the bioethics journal Atrium because of fear it would harm the school’s image.

    • Japan’s censorship of PlayStation 4 horror game Until Dawn is spectacularly bad 【Video】

      …Japan’s method of handling violent video game content can be quite perplexing at times.

    • How censors are keeping Chinese citizens in the dark about “Black Monday”

      …mentions of the country’s economic weakness were pretty much absent from major Chinese media reports.

    • VPN down: China goes after Astrill, other anti-censorship apps in run up to WW2 anniversary parade

      A number of services used to get around Chinese internet restrictions have been taken down or disrupted in the run up to a major parade in Beijing next week to mark the 70th anniversary of the end of the second world war.

      Popular virtual private network (VPN) provider Astrill warned users on Wednesday that they may suffer service outages between now and the parade on September 3.

      VPNs allow users to tunnel their internet traffic through an uncensored server, bypassing the so-called Great Firewall (GFW).

    • Besieged Malaysian PM Doubles Down on Online Censorship Ahead of Anti-Corruption Rally

      Last month we reported that the Malaysian government had censored the website of the Sarawak Report, which first broke news of the corruption allegations. A few days later, the government also suspended the publication licenses of two print publications that ran the same exposé.

    • Giving lip: censorship, subversion and the enduring power of the screen kiss

      The humble kiss has figured in its fair share of censorship debates over time. These debates have usually centred on whether the kiss should be represented at all, as well as a monitoring of the content and duration of the amorous scene.

    • North-South tension causes internet censorship in Korea: Is it justified?

      South Korea has the world’s fastest internet with connectivity clocked at 25.3MBps by Akamai Technologies last year. That’s over two times better than the 11.5MBps measured in the United States. Such a wired environment, coupled with wide internet use, seem optimal grounds to foster free, creative discussions among peers in a democracy.

    • DDoS attack hits GitHub after Chinese police force developer to remove code

      GitHub has fallen prey to a DDoS attack this week, allegedly perpetrated by Chinese actors, in response to tools available on the site that would help users circumvent censorship.

      On Tuesday the site found that it was under attack from malicious sources, following a similar tirade against the site in March of this year. This time, though, the attacks have been much more intense.

    • How censorship divides us

      Political correctness has made us more wary of one another.

    • Istanbul fest director steps down after censorship scandal

      Azize Tan has stepped down after nine years following protests over censorship at the latest edition in April, which led to the cancellation of the festival’s competitions and closing ceremony.

    • Egypt interferes with printing of three newspapers

      The Committee to Protect Journalists condemns a recent wave of newspaper censorship in Egypt. Three privately owned newspapers were prevented from going to print or into circulation because of content critical of President Abdel Fattah el-Sisi, according to news reports.

    • CPJ denounces recent wave of newspaper censorship

      The Committee to Protect Journalists (CPJ) condemned Tuesday the recent wave of newspaper censorship in Egypt, citing the new anti-terrorism law as the pretext for this phenomenon.

      Over the past two weeks, three newspapers were subjected to censorship, due to the presence of content critical of President Abdel Fattah Al-Sisi.

      A Sout Al-Omma newspaper issue was confiscated on 14 August for containing reports on the health condition of President Abdel Fattah Al-Sisi’s mother, as well as reports on a corrupt network of Mubarak-era figures.

    • A curious incident of censorship

      The book shows that differing opinions — and even vastly differing ways of thinking — exist and should be considered.

    • Trigger Warning Advocates Say They’re Not For Censorship

      Many of the responses to the article focus on the authors’ status as “rich, white-skinned and well-established men, who work at the moment in business-type jobs,” (though a lawyer working at a non-profit and a career academic might take issue with a few of those descriptors). Some accuse Lukianoff and Haidt of “hysteria,” “scaremongering,” and wanting to “silence discussions.” Others offered some nuance by conceding that trigger warnings “run the risk of students avoiding or disengaging the material out of fear of being triggered,” but think the threat to free expression in higher education is over-hyped.

    • Researchers create P2P Alibi Routing to avoid censorship and government surveillance

      University of Maryland researchers developed P2P Alibi Routing to allows users to choose where they do NOT want their packets to go, thereby avoiding ‘censorship of Internet traffic and suspicious boomerang routing.’

    • Takedown Resistant ‘Hydra Proxy’ Launches to Beat Censorship

      One year ago UK police noisily took down Immunicity, a site dedicated to providing access to blocked websites. To mark this anniversary a new platform titled Hydra Proxy has launched with the aim of providing a takedown resistant service for all. TorrentFreak caught up with its founder to learn more.

    • Censorship in Ridgefield

      Censorship often occurs because of power abuse, personal prejudice and ideological differences.

  • Privacy

  • Civil Rights

    • Associated Press sues FBI over fake news story

      The Associated Press filed a lawsuit (PDF) this morning, demanding the FBI hand over information about its use of fake news stories. The case stems from a 2007 incident regarding a bomb threat at a school. The FBI created a fake news story with an Associated Press byline, then e-mailed it to a suspect to plant malware on his computer.

      The AP sent a Freedom of Information Act request to the FBI last year seeking documents related to the 2014 sting. It also seeks to know how many times the FBI has used such a ruse since 2000. The FBI responded to the AP saying it could take two years or more to gather the information requested. Unsatisfied with the response, the Associated Press has taken the matter to court.

    • AP Sues FBI Over Impersonating An AP Reporter With A Fake AP Story

      Last fall, we wrote about how the FBI had set up a fake AP news story in order to implant malware during an investigation. This came out deep in a document that had been released via a FOIA request by EFF, and first noticed by Chris Soghoian of the ACLU. The documents showed the FBI discussing how to install some malware, called a CIPAV (for Computer and Internet Protocol Address Verifier) by creating a fake news story…

    • Fox Host Complains That NYPD Officers Have To Justify Their Stop-And-Frisks
    • How a Gun in a Suitcase Became a Permanent Ball and Chain

      For carriage of the gun, she was delivered to Rikers Island and charged with attempted criminal possession of a weapon and eventually posted a bail bond of $10,000. Appearing in court in Queens, she was told by a judge, she said, “‘This ain’t Texas; we don’t carry guns here.’”

    • Online identity theft to become a crime

      As of September 4, online identity theft will be illegal in Finland. Many people may soon find that even creating a fake social media profile can be considered a misdemeanour.

    • First State Legalizes Taser Drones for Cops, Thanks to a Lobbyist

      North Dakota police will be free to fire ‘less than lethal’ weapons from the air thanks to the influence of Big Drone.

      It is now legal for law enforcement in North Dakota to fly drones armed with everything from Tasers to tear gas thanks to a last-minute push by a pro-police lobbyist.

      With all the concern over the militarization of police in the past year, no one noticed that the state became the first in the union to allow police to equip drones with “less than lethal” weapons. House Bill 1328 wasn’t drafted that way, but then a lobbyist representing law enforcement—tight with a booming drone industry—got his hands on it.

      The bill’s stated intent was to require police to obtain a search warrant from a judge in order to use a drone to search for criminal evidence. In fact, the original draft of Representative Rick Becker’s bill would have banned all weapons on police drones.

    • Here’s What Actually Gets Terrorists To Tell The Truth — And It’s Not Torture

      Hollywood has a lot to answer for. Thanks to the hit TV show 24 and movies like Zero Dark Thirty, we think we know what terrorist interrogations look like: After being roughed up and threatened, the suspect breaks down and reveals all. Mass murder is thwarted. Osama Bin Laden is shot.

      The end, we tell ourselves, justifies the ugly means.

      Even after the abuses committed at CIA “black sites” were laid bare last year by the U.S. Senate Intelligence Committee, most Americans stuck to this view. Some 59% believed the CIA’s harsh interrogation methods were justified, in a December 2014 poll run for the Washington Post and ABC News.

    • The UK Hits Moral Rock Bottom

      The conduct of the political class is utterly shameless. Meantime they indulge their fantasies of stripping workers of all protection and of stopping aid to the needy, and while the politicians gorge and gorge, the poor are quietly being slipped away to die.

    • Beware of Chilcot

      I am worried that the continued delay in the publication of Chilcot’s report is giving rise to expectations that it will be forthright and damning of Blair and his supporters. Nothing could be further from the truth. Even though Blair plunged us into an illegal war with dreadful long-term consequences, the report has always been designed to be a typical Whitehall fudge. Mistakes made – errors of judgement – all in good faith – lessons learned. You don’t have to wait for it, that is it.

      The Chilcot team was handpicked by Gordon Brown – himself up to his neck in guilt for the illegal invasion – and three of the five had been aggressive proponents of the war. The remaining two, Chilcot and Baroness Prasad, are “sound” for the Establishment. Let me remind you of my analysis of the committee members in 2009. Sir Lawrence Freedman was an active propagandist for the invasion while Sir Martin Gilbert (died while contributing to the committee) was so enamoured of the invasion he compared Bush and Blair to Roosevelt and Churchill. Rod Lyne was actively involved in selling the WMD lies and arguably in danger of war crime accusation himself.

    • Katrina’s ‘Golden Opportunity’: 10 Years of Corporate Media Celebrating Disaster

      Americans love, above all, a narrative. Preferably a moral one, marked by a clear good and evil. For many so-called “school reformers,” the tragedy of Katrina, which marks its ten-year anniversary today, provided that narrative. Its stark before-and-after provided a clear A/B test as to the righteousness of their cause. Before was a “broken school system,” and after is a glossy, privatized education system.

      We’ll set aside the fact that this is largely a fantasy. Torture the data enough, and the “New Orleans miracle” can be teased out if one wants it enough. Despite studies and reporting showing otherwise, for the sake of this piece it doesn’t actually matter if radical post-Katrina New Orleans school reform was a “success,” a failure or somewhere in between. What is important is that so many corporatists think this “miracle” was not just an incidental positive but was, all things considered, worth it. Worth the 1,800 people killed and the 100,000 African-Americans permanently ejected from the city.

      The most popular examination of this pathology is, of course, from Naomi Klein, who coined the idea of the ”shock doctrine” in her 2007 book of the same name. In it, she explores how Katrina and other manmade and non-manmade disasters are exploited to rush through a radical right wing corporate agenda.

    • 10 Years After Hurricane Katrina, Media Need To See The Link Between Climate Change And Social Justice

      Ten years after Hurricane Katrina devastated the Gulf Coast, environmental justice advocates feel the time is long overdue for the media to start connecting the dots between climate change and social justice.

      There may be no clearer example of this intersection than in the impact and aftermath of 2005′s Hurricane Katrina. Between the devastating effects of the storm itself, and the decade-long effort to restore destroyed communities afterwards, the region’s African-American population has demonstrably suffered the most.

    • 13 Simple But Exciting Ways To Lose Your Citizenship In Tony Abbott’s Team Australia

      The government’s proposed citizenship stripping laws are about a lot more than taking citizenship off people who try to blow up a train. In fact, they may well rip away the rights of a vast range of people for a staggering number of reasons.

      We’ve gone though the expert responses to the bill – currently before a parliamentary inquiry – and picked out the best ways to see your citizenship disappear if you are a dual national.

      If you’re going to end up banished from Australia, you may as well have some fun doing it.

      Before we go on we should note that it’s not exactly clear how many dual nationals there are in Australia but if you’re one of them, this could soon apply to you. We’re looking at you, John Pilger… Germaine Greer, et al.

    • The Future of One-Party Rule in Singapore

      At the talk titled The Future of One-Party Rule in Singapore, Dr Chee spoke about the implications of one-party rule in the past, present and future and how the next general election will influence democratic politics in Singapore. Students and faculty posed questions after Dr Chee gave brief opening remarks, leading to a lively discussion in an already overflowing room of more than 100 members of the Yale-NUS community.

      [...]

      I am frustrated at how a country this economically advanced can be so socially backward, but to think about it, it is not surprising at all. With all that has been going down in recent years (e.g. Amos Yee, the National Library Board penguin saga), the world is looking at us. What Singapore needs right now is for people in power to put their foot down and say, “Hey, this is wrong, and I’m going to fight for what is right.” Unfortunately, at the end of the day, elections are a race for votes, and few are willing to risk losing votes this way. After all, the less people you piss off, the higher the chances you have at winning. We need social change, and we need it now. Yet how can we ever have real change if advocating for it only puts people off or gets you shut down?

  • Intellectual Monopolies

    • Trademarks

      • Armors, Glory and… religion in a US trade mark clash

        Regardless of spelling, Armor&Glory’s market impact appears minimal. According to the story, “it has so far made less than $100,000 in revenue since 2013 — about 0.003 percent of Under Armour’s sales just last year. The company’s online store sells $20 shorts and $25 shirts designed largely for a core Christian audience, with slogans like “Be spiritually attractive” and ‘Put on God’s armor and receive His glory.’”.

    • Copyrights

      • Piracy: Hollywood’s Losing a Few Pounds, Who Cares?

        Following news this week that a man is facing a custodial sentence after potentially defrauding the movie industry out of £120m, FACT Director General Kieron Sharp has been confronted with an uncomfortable truth. According to listeners contacting the BBC, the public has little sympathy with Hollywood.

      • Pirate Bay Founder Released From Jail But Immediately Re-Arrested

        Pirate Bay founder Gottfrid Svartholm was released from a Danish prison yesterday, only to be immediately re-arrested by police. The Swede is now expected to be extradited back to his home country where he will be returned to prison, but not before appearing in court today to appeal the decision.

      • Tech Giants Want to Punish DMCA Takedown Abusers

        The CCIA, which represents global tech firms including Google, Facebook and Microsoft, has published an extensive research paper on the future of copyright in the digital landscape. One of the main suggestions is to extent current copyright law, so that senders of wrongful DMCA takedown notices face serious legal consequences.

      • Facebook Wants to Crack Down on Pirated Videos

        Facebook says it will give video creators and publishers a way to remove copyrighted videos that have been uploaded to its popular social network without the proper permission.

08.27.15

Microsoft Loves Linux to Death and Still Tries to Kill GNU/Linux

Posted in FUD, GNU/Linux, Microsoft, Windows at 11:17 am by Dr. Roy Schestowitz

This is what Microsoft staff distributes to attendees in FOSS events:

Microsoft loves Linux
Photo credit: Neil McAllister

Summary: Microsoft’s relentless attacks on GNU/Linux and Free software in general (even if it runs on Windows) are so evident that claims of ‘love’ remain laughable at best (if not infuriating)

MICROSOFT JUST CANNOT HELP itself. It’s like a scorpion riding a tortoise over a river. It keeps attacking GNU/Linux while claiming that it “loves Linux”. The truth is, Microsoft loathes Linux with a deep passion, but it doesn’t want to show this because it needs to infiltrate Linux events such as LinuxCon. It’s a strategy of entryism. It’s really ugly.

Imagine Microsoft having Linux folks as its keynote guests/speakers in its developers’ events, preaching passionately in favour of Free software (GPL for instance). Microsoft keeps infiltrating every single Linux event that matters. Microsoft is paying for it and it knows that it’s annoying people who pay a lot of money to attend (or whose employers are sponsors). Microsoft runs many developers’ events. Imagine Linux ‘infiltrating’ these. That would be entryism in reverse. But FOSS doesn’t play dirty. We leave the crimes and the unethical deeds to Microsoft.

Several days ago someone wrote to point out that Microsoft speaks nonsense and spread FUD again. To quote:

The giant from Redmond must be desperate since it has to use a controversial story from a relatively small Italian city to combat open source software, as in the mean time many larger deployments also in Italy are happy with LibreOffice and the numbers produced by Provincia di Perugia prove the opposite of the Microsoft-publication.

As Robert Pogson put it: “Why do they keep spreading it? Every time they get caught lying they destroy their own credibility amongst their loyal followers, if there are any left…”

Microsoft and its goons recently spread some more lies about Munich, using media partners which took the words of just two people and made that seem like the whole of Munich was upset with GNU/Linux. “Most people don’t really realize that they have Linux and they do not really care,” wrote Mr. Heath yesterday [1]. He was the first person who wrote a story about this in English, foreseeing and properly preparing for Microsoft’s FUD attacks (Microsoft advocacy sites soon took the story out of context to lie about Munich).

Susan Linton, writing her daily column, said that “everyone reading of this knew that couldn’t be entirely right and today Heath reported, “the bulk of users have not taken issue with the move.” He quoted Munich IT developer, Jan-Marek Glogowski, at DebConf15 saying, “Most people don’t really realize that they have Linux and they do not really care, they want to do their stuff.” That’s not to say there aren’t issues and growing pains, primarily keeping up with hardware support with LTS Ubuntu-base, but plans are to keep forging ahead. Robert Pogson linked to the actual video from DebConf15.”

So basically we have just Microsoft FUD going on. Here is a new article that is just more utter lies, maybe ‘prepared’ propaganda from Microsoft (misleading, inaccurate) [2]. They have totally made up the ‘facts’ to sell people the illusion that GNU/Linux is a failure. It’s that same old tired Munich lobbying from Microsoft Germany. As Pogson noted:

Lately, in the news, we read that agitators are still pushing to roll back GNU/Linux desktops.

They really are just “agitators”; there are only 2 of them at the moment, but they are joined by Microsoft spinners who have access to newspapers and/or news sites. “Munich councillors want to return to proprietary software,” wrote Gijs Hillenius in the European press, but we are speaking about just “two councillors [who] have not yet responded to emails seeking their position on interoperability” (if they know what it is at all, as they’re non-technical). Maybe they need to ask Microsoft Germany.

This headline, “Munich Officials Who Dumped Windows For Linux Want Microsoft’s OS Back” [3], is also a lie because it’s not the same officials, there’s no change of mind, there are just 2 dissenting voices.

This latest round of anti-GNU/Linux FUD is not something that we are unfamiliar with. We wrote dozens of in-depth articles about this. Munich is a large-scale migration and as we showed in previous years, Microsoft usually orchestrates this FUD behind the scenes. Sometimes some information leaks out to the media, showing Microsoft’s role in it (occasionally through proxies like HP). All we have here is a PR exercise, not news.

Related/contextual items from the news:

  1. Here’s the one ‘major problem’ facing Munich after switching from Windows to Linux

    In spite of complaints from a couple of councillors about the Limux OS, the city council said the bulk of users have not taken issue with the move.

    “Most people don’t really realize that they have Linux and they do not really care,” said Jan-Marek Glogowski, a developer in the IT team at the City of Munich told the DebConf Debian developers meeting earlier this month.

  2. Report: 1 major Linux migration that went awry

    Whatever the case, the city of Munich will have to wait it out for another year at least. According to The Inquirer, a review and subsequent response into the future IT policy will not take place until the end of 2016.

  3. Munich Officials Who Dumped Windows For Linux Want Microsoft’s OS Back

Censorship, Self-Censorship and Intimidation Now the Modus Operandi at EPO

Posted in Europe, Patents at 10:51 am by Dr. Roy Schestowitz

Investigation Unit

Summary: The European Patent Office has ceased even trying to pretend that it respects human rights, including the right to free speech

Staff suicides at the EPO are a frequent occurrence [1, 2, 3] as the last/latest one was just a week ago. This can reasonably well be blamed on a regime of terror, led by the arrogant, Napoleonic Battistelli. He rules with an iron fist and violates many rules, laws, regulations, etc. There’s no real protection from a thug like him who pretends to be above the law (impunity), so people are rightly afraid. It’s the same with armed policemen who destroy video evidence and do as they wish, basically acting like unaccountable goons.

Worst among all is probably Battistelli’s so-called Investigation Unit, which is basically just a bunch of goons, who even hire the ‘British Blackwater’ to go after staff and after journalists. Just for the uninitiated, who haven’t been following what we covered here before, here are some reminders:

“The Office continues to filter emails sent to EPO staff and containing the word SUEPO in the subject,” SUEPO wrote on the 26th of this month (an update titled “Filtering of SUEPO emails”). It’s not exactly surprising anymore. The EPO is nuts, so this is expected. “A SUEPO lawyer addresses Mr Battistelli,” wrote SUEPO, “by pointing out the legal implications and requests the end of the filtering. A copy of the letter can be found here.”

In a very crude, undemocratic fashion they do not just try to completely gag opposition, even if that opposition is the staff union, i.e. EPO staff rather than outsiders. For the record, here is the text of this complaint from SUEPO (it’s in German, so translations would be well received)

Patent Practitioners: “The Unitary Patent Might be Able to Open the Floodgates for Software Patents in Europe”

Posted in Europe, Patents at 10:40 am by Dr. Roy Schestowitz

The US patent system may be getting exported to Europe (a silent occupation), without even consulting European citizens on this matter

Park in Manchester

Summary: The EPO-backed Unitary Patent scheme threatens to bring software patents to Europe and along with them a lot of patent trolls from all around the world (especially the United States)

“The Unitary Patent might be able to open the floodgates for software patents in Europe,” says this new analysis, published earlier today in a lawyers’ site. It echoes many of the warnings from the likes of FFII, among other European groups that have repeatedly warned about the Unitary Patent (UPC).

“It echoes many of the warnings from the likes of FFII, among other European groups that have repeatedly warned about the Unitary Patent (UPC).”The long piece is titled “The Murky Waters Of Software Patents” and it’s not as positive as one might expect. Given the publication it comes from (pro-patents), it’s hardly surprising at all. “Software patents,” says the author, “have been the subject of much debate – not only in the US, but also in Europe. This has been a thorny issue for many years and the future of software patents still remains unknown. At the outset, a breakdown of the differences between patents and copyrights will highlight why the patent is the form of intellectual property which is proving to be the most problematic with regards to software.”

The author later alludes to Alice, which we may write a lot more about tomorrow. “In the US,” he says, “software patents have been in existence since the early 1970s, but courts have recently started to reject software patents. The courts have ruled that simply “doing something on a computer” does not enable one to obtain a software patent on the matter. After hundreds of thousands of patents being issued, it became clear that there needed to be more restriction and the courts have recently been invalidating patents that were already granted. In 2014, in the landmark Alice Corp judgment, the courts stated “the mere recitation of a generic computer cannot transform a patent ineligible abstract idea into a patent eligible invention.” Thus the US is now retreating from its original position of granting software patents somewhat liberally.”

Then the author writes about Europe, in particular about the effects of the UPC. “The Unitary Patent,” he explains, “is a very recent brainchild of the European Patent Office. Through one single request, one will be able to obtain patent protection in 25 member states (Spain, Italy and Croatia are not currently participating). This patent will be subject to the exclusive jurisdiction of the Unitary Patent Court, which will comprise of a court of first instance, a court of appeal and a registry.

“The rulings of this court will affect the Member States who have ratified the agreement. The EPO hopes that the establishment of the court will add to more predictability in proceedings and avoid parallel litigation. Since all unitary patents will thus have their own court, there is also an expectation of faster and more efficient procedures than if these were to be held in the relevant Member States. So far, seven Member States have ratified the agreement – and Malta was among the first to do so. It will come into force once it has been ratified by thirteen states, which is expected to be around 2016. Nevertheless, the position of software patents under this new patent system will remain to be seen. When it comes into force, it will lay the cornerstone for more debate on the subject – as being able to achieve a unitary software patent will mean that it will automatically be recognized in all the Member States.

“The Unitary Patent might be able to open the floodgates for software patents in Europe, since if it allows for software patents, they will become immediately applicable in all the EU Member States. The same might be said for the contrary – however, the fact that the EPO allows for a Unitary Patent court of appeal means that this discussion might go on for years to come.”

Another site of patent lawyers now informs us of “Progress on the Unitary Patent”. It says that “[o]n 10 July 2015, the Preparatory Committee (which handles all the subsidiary issues arising from the creation of the Unified Patent Court (“UPC”), such as HR or IT management) met to discuss the last (18th) draft of the Rules of Procedure for the UPC. They are expected to reach an agreement on a final set of Rules in October 2015.

“The draft Protocol on Provisional Application of parts of the Agreement on a Unified Patent Court was also on the agenda as well as the salary package of the judges, the privileges and immunities of the UPC and the division of costs and responsibilities.”

According to this, Portugal too has caved in without even consulting or liaising with its citizens. What a coup!

“Confirmation of Portugal’s ratification of the UPC Agreement was published on 6 August 2015,” says a site about the UPC, “in the country’s Official Gazette of legislation. In the Diário da República Eletrónico, the Decree of the President of the Republic No. 90/2015 indicated that Aníbal Cavaco Silva had approved the UPC Agreement on 30 July 2015 following Parliament’s approval (No 108/2015) on 10 April 2015; a certified copy of the original UPC Agreement was also published in English and Portuguese. See here.”

Here in the UK as well, without even consulting citizens, the government is now preparing for the UPC. Nobody voted for it. This just serves to show how undemocratic the European Union has become, possibly even worse than the EPO alone.

What happens here is similar to what happens in New Zealand right now [1, 2, 3], with persistent efforts to thwart the law (a law banning software patents) through all-encompassing ‘trade’ deals, effectively ‘laundering’ the law at the behest of rich and powerful people who collude in secret. In New Zealand, the loopholes for software patenting have thus far been similar to Europe’s “as such”.

Microsoft Lies About Vista 10 and Increases Microsoft Surveillance (Even Beyond Vista 10 and Into Android, Vista 7/8)

Posted in Deception, Microsoft, Vista 10, Vista 7, Vista 8, Windows at 10:16 am by Dr. Roy Schestowitz

Bad Vista

Daily Express

Summary: Windows surveillance expands retroactively, making its way into platforms other than Windows and also expanding to predecessors of Vista 10

IN TERMS of sales and technical weaknesses, Vista 10 is a huge disaster, doing probably worse than its predecessor, which also did worse than the mythically ‘great’ Windows Vista. It really is a total disaster, but Microsoft employees won’t say this to the media for fear of personal retribution (firing).

“…Microsoft is putting Bing inside Cyanogen OS, not just from the company Cyanogen but also in OnePlus.”The unprecedented spyware problem is no longer limited to just Vista 10, so users of Windows on PCs are all affected. They should escape all of Windows as soon as possible because even older versions have spying features silently added to them. Well, this has actually been known for a while and we wrote about it several weeks ago. Now it appears as though more people become aware of it (the latest headline says “Updates Make Windows 7 and 8 Spy On You Like Windows 10″). Based on [1-3], Microsoft is putting Bing inside Cyanogen OS, not just from the company Cyanogen but also in OnePlus. This company, OnePlus, should dump Cyanogen OS, for reasons we covered here before [1, 2].

Mind this new article titled “Windows 10 automatically sends parents detailed dossier of their children’s internet history and computer use”. To quote just the opening paragraphs: “Windows 10 sends a weekly “activity update” on childrens’ internet browsing and computer history to parents, by default and without telling anyone. The feature could be dangerous as well as embarrassing, users have pointed out, allowing parents to watch everything their children do on the computer.

“Microsoft has become just a surveillance company and Windows the surveillance platform.”“The operating system sends a weekly note that includes a list of websites children have visited, how many hours per day they have spent on the computer, and for how long they have used their favourite apps, according to reports.”

Microsoft has become just a surveillance company and Windows the surveillance platform.

Vista 10 lies (“marketing”) now grow in lieu with Munich propaganda (anti-GNU/Linux myth-making, in order to scare CIOs who are fed up with Windows). Beware Microsoft’s fake vista 10 figures. These are being pushed by Microsoft into its boosters and moles in the media right now. The company has a long history gaming numbers to lie about number of ‘sales’ or ‘useds’ [sic]. Here is one Microsoft booster disseminating what it essentially Microsoft marketing with a sloppily-made image that cement the Big Lie (carving it in stone, within an image that cannot be edited for correction). “The only question,” wrote to us iopkh, “is how they are fiddling the stats.”

These claims are pulled directly from Microsoft, or rather, they are being pushed by Microsoft onto gullible journalists or complicit ‘journalists’. The author is a known Microsoft booster with history. Microsoft’s own figures hysterically debunk some early claims that the media cited a lot (between 45 million and 55 million ‘upgrades’ after 3 days). We warned that these were baseless claims from the rumour mill and Microsoft’s trolls army.

This time too we cannot trust the figures since they come from Microsoft. Based on how it has always gamed the numbers (‘sales’ not meaning actual sales or even users), we know these are lies. Look at web statistics from some of the more respected sources. Maybe 5% market share (or less) is what Microsoft’s latest beast has got at the moment, which given the price and other exceptional factors, is truly (and quite frankly) pathetic.

Related/contextual items from the news:

  1. OnePlus Rolls Out Cyanogen OS 12.1 Based On Android 5.1.1 Lollipop To OnePlus One Users Via OTA Update
  2. OnePlus One Now Receiving Cyanogen OS 12.1 Based on Android 5.1.1 Lollipop
  3. [Update: New Links] Cyanogen OS 12.1 OTA Update (Based On Android 5.1.1) Now Available To Download For The OnePlus One

Another Suicide at the EPO, Fifth by Our Count

Posted in Europe, Patents at 9:36 am by Dr. Roy Schestowitz

Summary: Yet another EPO member of staff has just committed suicide, leading to the inevitable question: how many people need to die before Battistelli and his minions are out of the Office for good?

THE EPO‘s management has been so rogue that suicides have been happening, as we previously covered in [1, 2, 3]. Any outsider would agree that this may be a sign of terrible, incompetent management that over-stresses staff and rules by fear, reigning by terror.

Hearing from sources that 5 people at the EPO have committed suicide under the Battistelli regime is going to motivate more activism against the EPO, including staff demonstrations. Staff at the EPO needn’t be suicidal or depression-leaning. Many employees — and examiners in particular — are highly qualified, often with Ph.D.-level degrees and many years of technical experience. Money is not an issue and these people are a lot smarter than their ‘boss’, Battistelli, who merely comes from a prestigious (expensive) French school and has plenty of powerful connections other than his cabal inside the EPO’s management.

“Yet another EPO employee committed suicide last week,” wrote a person to us. This person managed to secure possession of a note that Ciaran McGinley published and disseminated among all EPO staff this week. We have deleted the name of the dead person in order to respect the wishes of his family.

“Just watch how negative the work atmosphere has become.”“The note of Ciaran McGinley looks poetic,” said our source, “but it is highly hypocritical and cynical. The term suicide has been carefully omitted. The suicide rate has now become extremely worrying. This is the fifth suicide in 39 months during the mandate of Mr Battistelli. And it is the third one in the principal directorate of Mr McGinley since his appointment. Mr McGinley systematically refuses any independent investigation whether the workplace could have played a role in these tragedies. And his lyrical note would be sufficient to make his staff forget that they are told that they are overpaid and will soon be replaced by machines. Their professional pride has been completely destroyed.”

The EPO scandals are far from over. We have some exclusive stories about the EPO’s other abuses. They are lined up for publication next month and we are eager to expose corruption with more tenacity than before as the regime of Battistelli is costing more than just money (not to mention the harm to European citizens). Some people prefer not to live under it.

When Battistelli doesn’t just eliminate people by illegally ‘suspending’ them (like a house ban) he just turns out to be ruling by intimidation. That’s never a healthy way to manage. If some staff are opting to eliminate themselves rather than eliminate corrupt elements in the institution that employs them, who wins?

Just watch how negative the work atmosphere has become. It now including censorship, self-censorship, suspicion that ill staff are just lying to get a day off, and so on. This must end.

Below is the text of the message from Ciaran McGinley [PDF].

Our colleague ██████████ passed away

26.08.2015

A message of PD 2.1 Ciaran McGinley

Dear Colleagues,
By now, most of you will have been made aware of the unexpected passing away of our colleague ███████████. ██████, who was only 42 years old, leaves behind a wife and two young children. Our thoughts and deepest sympathy must, first and foremost, go to them. We have lost a colleague, a friend and a future leader. His family have lost something much more precious – a son, a husband and a father. I think I speak on behalf of everyone in PA when I express my shock and sadness about this tragic loss. His family have asked the EPO to be discreet and to respect what is a very private matter. We all therefore need to behave in a way that fully supports their wishes on this point. The best way to do this is to remember ██████ for how we at the EPO knew him – instantly likeable, open and always with a sincere, warm and caring smile.

Arrangements are currently being made for him to be flown home. The family has indicated that they prefer that the funeral takes place in a close, intimate circle. The family very much appreciate all the good wishes and expressions of sympathy, but they also want, and need, their privacy. The EPO social services have offered full support to the family as is usual in such tragic circumstances. Finally, I would like to take this opportunity to thank ████ OHS for the support she has offered and given to colleagues in the past two days – it has been much appreciated and I know that it will continue to be necessary in the coming weeks as we all try to get to terms with what has happened.

Ciaran McGinley

PD Patent Administration

Links 27/8/2015: ownCloud Desktop Client 2.0, Red Hat Downgraded

Posted in News Roundup at 8:45 am by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Google Hopes Open Source Will Give Its Cloud A Path To The Enterprise

    Instead, Google expects that becoming more open — and releasing more open-source software — will create a path for the company to make inroads into the enterprise. “Google has recognized that open is a better way of building,” McLuckie also noted. “We’ve come to admire the ability of the open-source community to drive innovation.”

    He argued that building out in the open not only allows it to build a better product for its customers, but also to enable faster integration cycles. In addition, having an open-source project that involves other companies also allows it to absorb the DNA of these companies into the product.

  • Like open source software, a book is more than its content

    Instead, we chose to partner with Harvard Business Review (HBR) Press. In many ways, HBR does for books what Red Hat does for open source software; it collaborates with creators and adds value to the products of these collaborations. Like any piece of open source software (such as Red Hat Enterprise Linux, for example), a book is far more than the content it contains. Like a software application, a book is a project with multiple stakeholders. It involves an agent that works to put the book on publishers’ radars. It involves an editorial team that reviews manuscripts and suggests improvements. And it involves a marketing team that decides how best to develop and target potential audiences.

  • Aligning Democratic Candidates with Open Source Software OSes

    A few days ago, I aligned Republican presidential hopefuls with open source Linux-based operating systems. Now, it’s the Democrats’ turn: If Hillary Clinton, Bernie Sanders et al. ran Linux, which distribution would they use? Read on for some perspective.

  • INSIGHT: Top 5 reasons why Open Source technology is the answer

    Organisations that can effectively harness people’s innate tendency to make their lives easier will be more likely to successfully develop software and applications that genuinely disrupt, or protect against disruption, as business needs dictate.

  • Software Development Environment Must Be Open, Says Red Hat

    The application development technology of the future must provide a framework for users to develop software quickly and get it to market fast.

    That’s according to Red Hat, who says open source technology is the answer.

    Red Hat says organisations that can effectively harness people’s innate tendency to make their lives easier will be more likely to successfully develop software and applications that genuinely disrupt, or protect against disruption, as business needs dictate.

  • 10 ways open source tech is changing the rules of the game

    In the last few years, open source software platforms such as Android have established themselves as essential catalysts for technology advances.

  • How Open Source Is Improving The Way Businesses Visualize Data

    It was recently reported that the Colorado-based startup SlamData is working on creating an enterprise version of its open source analytics platform. Their solution allows users to see and understand NoSQL data and this will now enable larger businesses to visualize data more effectively. The platform will enable large businesses to visualize semi-structured NoSQL data by adding proprietary security and management features to the main open source platform.

  • FCC Chairman Promises Open-Source Video-Conferencing Platform for ASL-Signing Callers

    FCC Chairman Tim Wheeler addressed the biannual meeting of the Telecommunications for the Deaf, Inc. (TDI) Conference in Baltimore on Thursday, with news of interest to anyone who works in assistive technologies.

  • For UNC scientists, open source is the way forward

    But scientists know they can manipulate those kinases to combat the disease. And chemical biologists at the University of North Carolina are leading an open source effort to unlock the secrets of kinase activity—secrets they say could pioneer a new generation of drug discovery.

  • How open source will power tomorrow’s tech unicorns

    With open source technology already powering business like Facebook, Google and Booking.com – and 70% of new apps – will it be the backbone of the next wave of unicorns?

  • A simple, scalable solution for storing and serving build artifacts

    Now we’re making Pinrepo open source on GitHub. There you can find all of the configuration stanzas and instructions to recreate it for yourself. It also includes a pypi release tool to release and maintain pypi packages. Check it out and let us know what you think! And, feel free to contribute back with your customizations and improvements.

  • Stephen Hawking’s Voice Is Now Open Source And Free To Download [Ed: Windows-only, Intel commercial as an ‘article’, exploiting a disabled person as the marketing logo]

    Currently, you’ll need a Windows machine to use ACAT. In the future, though, it would seem like this is exactly the kind of app that should be running on a smartphone, which is already bristling with cameras and sensors.

  • Markup lowdown: 4 markup languages every team should know

    When I ended my Doc Dish article about why you should use a rendered language for documentation, I told you that selecting a language was a matter for another day.

    Well another day has finally arrived.

    There’s no shortage of languages you can use for formatting and publishing your documentation, and your choice of language will depend on your project’s needs. In this article I’ll look at several different language options, ranging from the simplest to the most complex. It’s hardly an exhaustive list, so make the case for your favorite (or most hated) language in the comments.

  • Docs or it didn’t happen

    Many words have been written on community building, engagement, and retention. The discussion around community management is alive and kicking, with articles and blog posts everywhere about how to grow, support, and not mess up open source communities.

  • Events

    • Linux Plumbers Conference 2015

      Linux Plumbers 2015 finished up last Friday. Another great conference. The focus of Plumbers is supposed to be more problem solving/discussion and less talking/lecturing. To really get the most out of Plumbers, you need to be an active participant and asking questions or giving input. Plumbers was co-located with the group of conferences now run by the Linux Foundation. The fist day of Plumbers overlapped with the last day of Linux Con. This day was as bit more lecture focused like a regular conference. Even if Plumbers is typically a discussion conference, the talks I went to were all great.

    • Speakers and Agenda announced for Tizen Developer Conference 2015 Shenzhen

      The Tizen Developer Conference 2015 has been moved this year from San Francisco to Shenzhen, China, from September 17 to 18. This is the annual event that brings together open source and app developers who are interested in contributing to the growth of the Tizen ecosystem worldwide.

    • First Round of systemd.conf 2015 Sponsors

      We are happy to announce the first round of systemd.conf 2015 sponsors!

  • Web Browsers

    • Mozilla

      • Mozilla CEO threatens to fire person responsible for anonymous hate speech on Reddit

        An anonymous person complaining about “social justice bullies” at Mozilla will be fired if the person is discovered to be an employee, the company’s CEO said today. Speaking at Mozilla’s weekly public meeting, Mozilla CEO Chris Beard said Reddit user aioyama had “crossed the line” in a series of postings about women at the company, including recently departed community organizer Christie Koehler. In a series of tweets earlier this month, Koehler complained about Mozilla’s lack of diversity in the workplace and its failure to address accessibility issues.

      • SIMD in Rust

        For the last two months, I’ve been interning at Mozilla Research, working on improving the state of SIMD parallelism in Rust: exposing more CPU instructions in the compiler, and an in-progress library that provides a mostly-safe but low-level interface to that core functionality.

      • Rust Gains Greater SIMD Support

        A new SIMD scheme is now available in the latest nightly versions of the Rust programming language.

        Mozilla Research has been working on improving SIMD (Single Instruction Multiple Data) parallelism in Rust that’s simple to use.

  • SaaS/Big Data

  • Oracle/Java/LibreOffice

  • CMS

  • Business

  • Funding

    • Eclipse seeks donations for open source development

      The Eclipse Foundation, best known for its Eclipse IDE, is moving into funding its open source projects via donations.

      Previously, all Eclipse development was done by individuals and organizations contributing their time. “Today, we are significantly lowering the barriers for companies and individuals to actively invest in the ongoing development of the Eclipse platform,” Eclipse Executive Director Mike Milinkovich said in a recent blog post.

    • Mirantis Raises Another $100 Million, This Time from Intel
  • BSD

    • Why FreeBSD should not adopt launchd

      I have been keeping an eye on NextBSD for some time, when it was initially just openlaunchd, an effort initially started by R. Tyler as a GSoC student in 2005 to, unsurprisingly, port the launchd system and service manager to FreeBSD. It was stalled for a long time until its revival in late 2013, but again moving very slowly.

      Around November of 2014 at the MeetBSD conference, Jordan Hubbard delivered a talk entitled “FreeBSD: The Next 10 Years,” which outlined a general desire for a more “event-driven” and unified configuration approach to FreeBSD, strongly implying the use of launchd as system bootstrap and service daemon, as well as other parts of the OS X low-level userspace.

    • LLVM 3.7 & Clang 3.7 Are Bringing Exciting Compiler Features, Improvements

      The LLVM 3.7 release is imminent so here’s our usual look at the new features/improvements for this open-source compiler stack. Complete OpenMP 3 support is a big one but there’s also many other big ticket items to find in this major compiler update.

    • LLVM 3.7′s Release Is Imminent

      The release of LLVM 3.7 is imminent.

      Days after preparing the 3.7-RC3 release, Hans Wennborg of Google has announced the release of 3.7-RC3.

  • FSF/FSFE/GNU/SFLC

  • Public Services/Government

    • Umeå University computer club supports open source

      The Academic Computer Club at the Umeå University in Sweden is a major supporter of open source projects. ACC UMU hosts one of the popular free software mirrors, and is one of the official sponsors of the Debian open source software distribution, maintaining a few of the project’s servers. The club supports two more well-known projects, the Open and Free Technology Community (OFTC) and Freenode. Both projects provide communication facilities that benefit free software communities.s

    • How Scotland can protect itself from GCHQ spying by going open source

      One of the key lies out out in last years referendum was that we couldn’t exist securely without the British Security Services (the ones that brought you extraordinary rendition).

    • Digital Assembly developing list of digital rights for interaction with public agencies

      Citizens and businesses should have to provide basic information only once, eGovernment services should be user-friendly and intuitive, and users should be digitally literate in order to use online (public) services. These are the most important digital rights for citizens and businesses when interacting with public agencies, as identified by panellists and the audience at the workshop ‘Promoting e-society’.

  • Openness/Sharing

  • Programming

    • Facebook open-sources Hack code generator

      Hack is Facebook’s spinoff of the PHP language, working with the HHVM virtual machine. The library, meanwhile, generates code that is written into signed files to prevent undesired modifications. “The idea behind writing code that writes code is to raise the level of abstraction and reduce coupling,” Facebook said on its GitHub page for Hack Codegen.

  • Standards/Consortia

    • When everything’s a request for comments

      The Internet’s foundational documents are called “requests for comments” or “RFCs.” Published by the Internet Engineering Task Force (IETF), the organization whose stated goal is “to make the Internet work better,” RFCs define and explain the operational standards by which our worldwide network of networks functions. In other words, they specify the rules everyone should follow when building and implementing new Internet technologies. Engineers working on the Internet discuss potential RFCs, debate their merits, then post their decisions online for anyone to read.

    • Centimeters and Points are the best [ODF]

      For example, when saving ODF with LibreOffice, the unit that is used for storage depends on the user preferences. This can lead to inconveniences and rounding errors. If I specify a margin of 1.25cm and send it to someone who has the preferences set to use inches, the margin will be stored as 0.4925in. When that number is converted back to centimeters, the value is 1.25095cm which is 1‰ more than the original value.

Leftovers

  • Angry Birds maker Rovio plans deep job cuts as profits fall

    Finland’s Rovio, maker of mobile phone game Angry Birds, forecast its earnings would fall for a third consecutive year and said it planned to slash up to 39 percent of its workforce to try to improve its prospects.

    Rovio has failed to create new hit games since the 2009 launch of Angry Birds, the top paid mobile app of all time, though it has tried to capitalise on its most successful brand by licensing its use on string of consumer products.

  • Google Express Workers Vote ‘Yes’ to Union, as Warehouses Plan to Shut Down

    On Friday afternoon, 151 warehouse and shipping workers for Google Express, the search engine’s delivery service, voted in favor of joining a union. Last month, workers at the Palo Alto, Calif., facility agreed to join Teamsters Local 853, which has unionized shuttle drivers for eBay, Apple, Yahoo and other companies.

  • Science

    • MIT creates file system that will survive unexpected crashes

      IT’S A SITUATION that will be familiar to most computer users. Your computer crashes, and when you manage to get it back up and running the disk has corrupted some data. Probably the bit that was vital and so new that it hadn’t been backed up yet.

  • Health/Nutrition

    • NYT: Not Believing in Climate Change Is Like Believing in Food Shortages

      Is rejecting climate science, though, really like having believed that unchecked population growth would lead to food shortages? Contrary to Leonhardt’s glib “it hasn’t,” food shortages are a serious problem in the world right now. According to the UN World Food Programme, “Some 795 million people in the world do not have enough food to lead a healthy active life…about one in nine people on Earth.” The WFP notes that about 3.1 million children die from malnutrition a year–and that one in four children on Earth are stunted by lack of food. That seems fairly widespread.

      Unlike climate change denial, which if anything has exacerbated the problem of global warming, warnings about overpopulation may have had the intended effect of curbing population growth. China’s draconian one-child policy was directly inspired by the warnings of limits-to-growth advocates like the Club of Rome, along with numerous less coercive family planning initiatives. Partially as a result of these programs, the global population growth rate declined from above 2 percent in the 1960s and early ’70s to close to 1 percent and falling today. Without this reduction in growth, the population would be about 2 billion higher today than its current 7.3 billion.

  • Security

    • Tuesday’s security updates
    • Security updates for Wednesday
    • Court rules FTC can prosecute companies over lax online security

      The Third Circuit US Court of Appeals in Philadelphia has ruled that the Federal Trade Commission does have the right to prosecute firms who mishandle their customers’ data.

      Between 2008 and 2009, hotel chain Wyndham Worldwide – which runs hotels under the Days Inn, Howard Johnson, Ramada, Super 8, and Travelodge brands – suffered three computer intrusions. The hackers stole the personal information and credit card numbers of over 619,000 customers, causing at least $10.6m in thefts.

    • The Basic Principles of Security (and Why They Matter)

      Yet, despite the frequent complaints about the unrealistic demands of security, today the problem is just as likely to be the insistence on convenience. With the rise of desktop Linux and the popularity of Android, the pressure to be as easy to use as Windows is almost irresistible. As a result, there is no question that the average distribution is less secure than those of a decade ago. That is the price we pay for automounting external devices and giving new users automatic access to printers and scanners — and will continue to pay.

    • GitHub combats DDoS cyberattack

      At the time, the code repository said the cyberattack involved “a wide combination of attack vectors,” as well as new techniques including the hijacking of unsuspecting user traffic to flood GitHub, killing the service.

    • Jails – High value but shitty Virtualization

      Virtualization is nothing new, and depending how fundamentalist you define “virtualized environment” one can point to the earliest of timesharing systems as the origin.

      IBM’s mainframe hardware, the 360 machine series, introduced hardware virtualization, so that it was possible to run several of IBMs different and incompatible operating systems on the same computer at the same time.

      It’s more than a little bit ironic that a platform which have lasted 50 years now, were beset by backwards-compatibility issues almost from the start, and even more so that IBMs patents on this area of technology prevented anybody else from repeating their mistake for that long.

      Everybody else did software virtualization.

    • How to crack Ubuntu encryption and passwords

      During Positive Hack Days V, I made a fast track presentation about eCryptfs and password cracking. The idea came to me after using one feature of Ubuntu which consists in encrypting the home folder directory. This option can be selected during installation or activated later.

    • AT&T Hotspots: Now with Advertising Injection

      While traveling through Dulles Airport last week, I noticed an Internet oddity. The nearby AT&T hotspot was fairly fast—that was a pleasant surprise.

      But the web had sprouted ads. Lots of them, in places they didn’t belong.

    • Advertising malware rates have tripled in the last year, according to report

      Ad networks have been hit with a string of compromises in recent months, and according to a new report, many of the infections are making it through to consumers. A study published today by Cyphort found that instances of malware served by ad networks more than tripled between June 2014 and February 2015, based on monthly samples taken during the period. Dubbed “malvertising,” the attacks typically sneaking malicious ads onto far-reaching ad networks. The networks deliver those malware-seeded ads to popular websites, which pass them along to a portion of the visitors to the site. The attacks typically infect computers by exploiting vulnerabilities in Adobe Flash, typically triggered as soon as an ad is successfully loaded.

    • How security flaws work: the buffer overflow

      The most important central concept is the memory address. Every individual byte of memory has a corresponding numeric address. When the processor loads and stores data from main memory (RAM), it uses the memory address of the location it wants to read and write from. System memory isn’t just used for data; it’s also used for the executable code that makes up our software. This means that every function of a running program also has an address.

    • Lessons learned from cracking 4,000 Ashley Madison passwords

      When hackers released password data for more than 36 million Ashley Madison accounts last week, big-league cracking expert Jeremi Gosney didn’t bother running them through one of his massive computer clusters built for the sole purpose of password cracking. The reason: the passwords were protected by bcrypt, a cryptographic hashing algorithm so strong Gosney estimated it would take years using a highly specialized computer cluster just to check the dump for the top 10,000 most commonly used passwords.

  • Defence/Police/Secrecy/Aggression

    • UN Official Says Human Suffering in Yemen “Almost Incomprehensible”

      With a staggering four in five Yemenis now in need of immediate humanitarian aid, 1.5 million people displaced and a death toll that has surpassed 4,000 in just five months, a United Nations official told the Security Council on August 19 that the scale of human suffering is “almost incomprehensible”.

      Briefing the 15-member body upon his return from the embattled Arab nation on Aug. 19, Under-Secretary-General for Coordination of Humanitarian Affairs Stephen O’Brien stressed that the civilian population is bearing the brunt of the conflict and warned that unless warring parties came to the negotiating table there would soon be “nothing left to fight for”.

      An August assessment report by Save the Children-Yemen on the humanitarian situation in the country of 26 million noted that over 21 million people, or 80 percent of the population, require urgent relief in the form of food, fuel, medicines, sanitation and shelter.

    • Media and Nuclear Deal Opponents Continue to Spread Debunked Myth Iran Will Monitor Itself

      There is no dearth of rumors about the Iran nuclear deal. In the latest scare, two allegations have filled the media: the first, that the International Atomic Energy Agency (IAEA) and Iran made “secret side deals”; the second, that the IAEA, in those negotiations, put the Iranian government in charge of investigating alleged nuclear research at its Parchin military base.

      The latter supposed exposé comes from a now-debunked story by Associated Press (8/19/15). The piece, in its first draft, was full of errors and distortions (Vox, 8/20/15; War on the Rocks, 8/24/15). But its supposed revelations filled the airwaves.

    • The Iran Nuclear Deal: Give Diplomacy a Chance

      A war with Iran would be a catastrophe, yet by opposing diplomacy, hundreds of members of Congress may be blundering into just such a conflict. The Iran nuclear deal, as the complex diplomatic arrangement is popularly called, was agreed upon on July 14 by a consortium of key powerful countries, the European Union and Iran. The goal of the agreement is to limit Iran’s nuclear activities to peaceful purposes, and to block Iran’s ability to construct a nuclear bomb. Despite what its critics say, this agreement is not based on trust. It grants the International Atomic Energy Agency the power to conduct widespread, intrusive inspections to ensure that Iran keeps its many pledges. In return, many, but not all, of the sanctions on Iran, which have been crippling its economy, will be lifted.

      The alternative to diplomacy is to pour gasoline on a region of the world already on fire with intense, complex military conflicts. Iran’s military has more than half a million soldiers, no doubt with many more who could be mobilized if threatened with invasion. Iran shares a vast border to its west with Iraq, and to its east with Afghanistan, two nations with ongoing military and humanitarian disasters that have consumed the U.S. military since 2001, costing trillions of dollars and untold lives.

    • Autoplay Is for a G-Rated World

      Tragedy struck Bedford County, Virginia this morning when two journalists, Alison Parker and Adam Ward, were shot to death on live TV.

      The people viewing the broadcast at home had no choice but to watch the horror unfold, and neither did many social media users. Video of the shooting autoplayed on Twitter, Facebook (despite a content warning feature reportedly implemented in January), and other sites that support autoplay video.

  • Environment/Energy/Wildlife

    • Tourist Unclear On Concept Of Wild Animals Demands Yellowstone Provide Better Bears

      Mashable reports that the following note was left by a guest at Yellowstone and then posted on Reddit by a friend of someone who works at the park. The note was left upon checkout by someone who does not understand how wild bears work (they don’t fuck with you unless you’ve got a pool) but is nonetheless quite polite; it’s refreshing that they were so kind about their disappointment, unlike the woman who threatened to shit herself in anger at Town Hall when Disneyland didn’t have fireworks the last time I went.

    • Environmentalists Blast Obama’s Decision to Let Shell Drill in Arctic

      Apparently the president cares more about Big Oil than the environment, endangered animals, indigenous people — even his own climate legacy.

      [...]

      “This is a disaster,” said Kristin Brown, director of digital strategy at the League of Conservation Voters, in an email. “Shell has an awful safety track record — even the Interior Department says there’s a 75 percent risk of a large oil spill if these leases are developed, and in the unpredictable Arctic Ocean, cleanup would be next-to-impossible.”

    • ​The Nations That Will Be Hardest Hit by Water Shortages by 2040

      Water access is going to be one of the most pressing issues of the 21st century. As climate change dries out the already dry areas and makes the wet ones wetter, we’re poised to see some radical civilizational shifts. For one, a number of densely populated areas will come under serious water stress—which analysts fear will lead to strife, thirst, and even violent conflict. With that in mind, the World Resource Institute has assembled a new report projecting which nations are most likely to be hardest hit by water stress in coming decades.

  • Finance

    • Armando Iannucci urges BBC to monetise its programmes overseas and resist ‘prejudiced’ Tory attacks

      “If it was a car industry, our ministers would be out championing it overseas, trying to win contracts, boasting of the British jobs that would bring. And if the BBC were a weapons system, half the Cabinet would be on a plane to Saudi Arabia to tell them how brilliant it was,” he said.

    • Latest Seattle Jobs Numbers Disprove Fox’s Minimum Wage Misinformation

      New data from the Bureau of Labor Statistics (BLS) disproves allegations promoted by Fox News that the 2015 increase in Seattle’s minimum wage has destroyed restaurant jobs.

    • The stock market roller coaster is not being felt by most Americans for one simple reason

      That’s because fewer people are invested in the stock market today than at any time in nearly the last two decades — the product of dogged wage stagnation and a dramatic loss of faith in markets.

    • Prof. Wolff speaks to The Big Picture’s Thom Hartmann about Market Meltdown

      Prof. Wolff talks to The Big Picture’s Thom Hartmann about Monday’s historic lows in the financial markets. Prof. Wolff breaks down China’s economy and if the devaluation of the yuan is the root to this market meltdown. Then Prof. Wolff and Thom take a look at the U.S. economy and review wage growth, inequality, and pensions.

    • The Stock Market Is Not the Economy

      We are seeing the usual hysteria over the sharp drop in the markets in Asia, Europe, and perhaps the US. (Wall Street seems to be rallying as I write.) There are a few items worth noting as we enjoy the panic.

      First and most importantly, the stock market is not the economy. The stock market has fluctuations all the time that have nothing to do with the real economy. The most famous was the 1987 crash, which did not correspond to any real-world bad event that anyone could identify.

    • WSJ Editorial Blames Progressives For Student Debt, Claims Government Loans Send “Deadbeats” To College
    • Fox Exploits Stock Market Turbulence To Push GOP Policies, Major Tax Cuts

      On August 24, major stock markets in the United States opened their trading sessions with significant declines and sustained losses of 3 to 5 percent throughout much of the morning. Fox News used the event to advocate on behalf of numerous failed Republican policy demands, such as major tax cuts for the wealthy and a significant roll back of federal regulations.

    • Sanders Sends Letter to Postmaster General
    • ‘Suicide guidance’ given to benefits staff preparing for desperate calls on welfare reform

      GUIDELINES on how to deal with suicidal benefits claimants have been handed out by the Department for Work and Pensions to Scots workers tasked with rolling out the UK Government’s controversial welfare reforms.

      As part of a six-point plan for dealing with suicidal claimants who have been denied welfare payments, call-centre staff in Glasgow have been told to wave the guidance, printed on a laminated pink card, above their head.

      The guidance is meant to help staff dealing with unsuccessful applicants for Universal Credit who are threatening to self-harm or take their own life.

      A manager is then meant to rush over to listen in to the call and workers – who insist they have had no formal training in the procedure – must “make some assessment on the degree of risk” by asking a series of questions.

      One section of the six-point plan, titled “gather information”, demands that staff allow claimants to talk about their intention to commit suicide.

      The call-centre workers, who earn between £15,000 and £17,000 a year, must “find out specifically what is planned, when it is planned for, and whether the customer has the means-to-hand”, according to the guidance seen by the Sunday Herald.

  • PR/AstroTurf/Lobbying

  • Censorship

  • Privacy

    • The Illusion of Online Privacy

      As the Ashley Madison hack demonstrated, Web companies can’t guarantee privacy.

    • Almost None of the Women in the Ashley Madison Database Ever Used the Site

      When hacker group Impact Team released the Ashley Madison data, they asserted that “thousands” of the women’s profiles were fake. Later, this number got blown up in news stories that asserted “90-95%” of them were fake, though nobody put forth any evidence for such an enormous number. So I downloaded the data and analyzed it to find out how many actual women were using Ashley Madison, and who they were.

    • Here’s what Ashley Madison members have told me

      As someone said to me in one of the comments on my blog, trying to remove your data from the web is “like trying to remove pee from a swimming pool”. I added the DMCA comment in there as well because this has come up many times in the press. There’s a good piece on it in an article that emerged after news of the attack first broke last month (paradoxically, stating that DMCA is the reason the full data hadn’t been leaked), do read Parker Higgins’ comment about the “fraudulent” use of the act in terms of its’ use for removing data breaches. Regardless, a US law will in no way stop the mass distribution of this data, particularly via a decentralised mechanism like torrents.

    • Digital surveillance ‘worse than Orwell’, says new UN privacy chief

      The first UN privacy chief has said the world needs a Geneva convention style law for the internet to safeguard data and combat the threat of massive clandestine digital surveillance.

      Speaking to the Guardian weeks after his appointment as the UN special rapporteur on privacy, Joseph Cannataci described British surveillance oversight as being “a joke”, and said the situation is worse than anything George Orwell could have foreseen.

      He added that he doesn’t use Facebook or Twitter, and said it was regrettable that vast numbers of people sign away their digital rights without thinking about it.

    • Canada’s Police Want Laws That Will Give Them ‘Real Time’ Access to Your Data

      Thanks to a recent Supreme Court decision, Canadian cops need a warrant before they can get subscriber information from telecommunication companies—which is why police are now lobbying for a legal workaround so they can access that same information without court approval.

      In 2014, the Supreme Court of Canada decided that subscriber information such as names and addresses carries with it a reasonable expectation of privacy, and that accessing such information without a warrant constitutes an unlawful search. The ruling has caused “substantial resource and workload challenges for law enforcement,” according to a resolution adopted by the Canadian Association of Chiefs of Police (CACP) at its annual convention in August.

    • Vint Cerf Echoes Widespread Concerns About the Internet of Things

      According to a study from HP Security Research, 70 percent of the most widely used Internet of Things devices have notable security vulnerabilities.

    • Facebook promotes Scheeler to managing director

      Facebook has promoted Stephen Scheeler to the role of managing director of its Australia and New Zealand region business.

    • 9 steps to make you completely anonymous online

      The default state of Internet privacy is a travesty. But if you’re willing to work hard, you can experience the next best thing to absolute Internet anonymity

    • Everybody Hates When You Use Your Phone at Dinner

      It’s official: using your cell phone during a family dinner is frowned upon by pretty much everybody.

      A new survey by Pew Research Center found that 88% of respondents believe it’s “generally” not OK to use a cell phone during dinner. An even larger percentage, 94%, say cell phone use is inappropriate during meetings, while 95% say they shouldn’t be used at theaters and 96% say they shouldn’t be used during religious services.

    • Abe Asks U.S. to Investigate Alleged NSA Spying on Japanese Government

      Prime Minister Shinzo Abe on Wednesday asked U.S. President Barack Obama to investigate alleged spying by the National Security Agency on the Japanese government and companies, Mr. Abe’s spokesman said.

    • Concerns new Tor weakness is being exploited prompt dark market shutdown
    • IBM Tells Companies To Block Tor On Security Grounds

      Tor is increasingly being used to scan organisations for vulnerabilities and to launch attacks

      The Tor anonymisation network is increasingly used as the point of origin of attacks on public- and private-sector organisations, according to a new report by IBM, which recommends administrators ban access to the network.

      The report also noted increases in SQL injection and distributed denial-of-service attacks and of “ransomware” incidents that encrypt data belonging to an individual or an organisation, and then charge a fee to decrypt it.

    • UN privacy rapporteur invokes Orwell and calls for global digital privacy

      UN PRIVACY RAPPORTEUR Joseph Cannataci has suggested – and he is not the first – that citizens need better data protection from technology companies, governments, the internet, heck the 21st century.

      Cannataci, who assumed the position last month after a 29-person battle royal/interview process, has made it clear that, as a representative for privacy, he will represent privacy.

    • Ashley Madison faces proposed class-action lawsuit over half-deleted data

      After a breach of the site’s database, people combing through the information found that Ashley Madison, and other properties owned by parent company Avid Life Media (ALM), had retained quite a bit of information pertaining to users who purchased a “full delete” of their profile for £15, including GPS coordinates, date of birth, gender, ethnicity, weight, height, among other details. Although e-mail addresses, phone numbers, and descriptions written by users who sought “full deletes” were eliminated by the time the hackers accessed the database, the incidental data that Ashley Madison kept on those users could still paint quite a picture. The Register has a table that nicely illustrates what information Ashley Madison kept on “deleted” users and what it actually deleted.

      In addition, when Ars investigated the “full delete” option on Ashley Madison a year ago, we found that there was little difference between a “full delete” and the “hiding your profile” option, except that messages that a user sent to another user would be deleted if exiting users paid the fee.

  • Civil Rights

    • Former head of the Army leads the calls for translators to be given safe haven in Britain

      Generals, decorated war heroes, grieving families and politicians last night urged soldiers and members of the public to sign a petition to save Afghan interpreters from the Taliban.

      General Sir Richard Dannatt, former head of the Army, led the calls as he pledged to sign a petition asking David Cameron to give all translators a safe haven in Britain.

      He praised the Daily Mail for its Betrayal of the Brave series of articles highlighting the plight of frontline Afghans who risked their lives for UK troops in the battlefield.

      He said: ‘We have a moral obligation to look after these people and if they feel once we have left that they cannot assume their normal lives because of fear having worked for us, then it is our obligation to have them in this country.

    • Saudi Arabia executed 175 people in past year, says Amnesty International

      On average, one person every two days was put to death in kingdom, says new report, with figures for 2015 already ahead of those for whole of last year [...] on average one person every two days [...] Saudi courts allow for people to be executed for adultery, apostasy and witchcraft.

    • Instead of Releasing Dashcam, Cops Hire PR Firm to Help Cover Up Murder of Unarmed Teen

      A former police captain recently signed an affidavit affirming that several formal reprimands are missing from the personnel file of the officer who killed a 19-year-old during a marijuana bust. Although the police chief claims that no disciplinary actions have been taken against the officer, his former supervisor lists multiple performance issues resulting from the officer’s negligence. In an attempt to improve public relations, city officials have hired a PR firm at the expense of taxpayers’ dollars instead of releasing the dash cam videos of the shooting.

    • Woman ‘too drunk to fly’ after downing hundred-pound bottle of cognac airport security officials attempted to confiscate

      A woman reportedly downed a £120 bottle of cognac after airport security officials attempted to confiscate the liquid – only to be denied boarding as she was “too drunk to fly”.

      The woman, who is being identified only by her surname of Zhao, was allegedly seen rolling about on the floor of Beijing Capitol International Airport, according to the Beijing Times.

    • Feds’ cyberbullying reverses cops’ convictions for shooting unarmed people

      In the immediate aftermath of Hurricane Katrina back in 2005, five former New Orleans police officers were sentenced to six to 65 years in prison in connection to on-the-job deadly shootings of unarmed civilians. But recently, these five officers had their convictions set aside by a federal appeals court. Why? Federal prosecutors’ anonymous online comments posted underneath local news accounts of the officers’ ongoing 2011 trial “contributed to the mob mentality potentially inherent in instantaneous, unbridled, passionate online discourse,” the court said. In light of that, the appellate court found a fair trial wasn’t possible.

      The New Orleans-based 5th US Circuit Court of Appeals ruled last week (PDF) that the prosecutors’ behavior, unearthed by the same forensic expert who helped identify the Unabomber, created an “air of bullying” that federal prosecutors were “sworn to respect.”

    • Virginia Police Force BBC Reporters To Delete Camera Footage Of Police Pursuit Of Shooter

      …apparently two BBC reporters who were covering the police pursuit of the apparent shooter (who then shot himself) were forced by police to delete their own camera footage. This is illegal. I don’t know how many times it needs to be repeated. Even the DOJ has somewhat forcefully reminded police that they have no right to stop anyone from photographing or videotaping things, so long as they’re not interfering with an investigation.

    • Is using your mobile phone in public ruder than you think?

      Some 23% of Americans think it’s not OK to use your phone while walking down the street, but that’s nothing compared to how they feel about the cinema or church

    • Katrina: The Logic of Genocide

      The very upscale New Yorker magazine marked the tenth anniversary of Hurricane Katrina with a celebration of the benefits that supposedly accrued to the 100,000 mostly Black and poor people forced into exile from New Orleans. “Starting Over,” by magazine staff writer Malcolm Gladwell, a biracial Canadian who made his bones promoting the hyper-aggressive “broken windows” police strategy, concludes that involuntary displacement is a good thing for people who are stuck in “bad” neighborhoods or bad cities where poverty is high and chances for upward mobility are low. Since every heavily Black city in the country fits that description, the logic is that Black people should be dispersed to the four winds and prevented from forming concentrated populations.

  • Internet/Net Neutrality

    • Google Lobbied Against Real Net Neutrality In India, Just Like It Did In The States

      While Google is still seen as (and proclaims to be) a net neutrality advocate, evidence continues to mount that this is simply no longer the case. Back in 2010 you might recall that Google helped co-write the FCC’s original, flimsy net neutrality rules with the help of folks like AT&T and Verizon — ensuring ample loopholes and making sure the rules didn’t cover wireless at all. When the FCC moved to finally enact notably-tougher neutrality rules for wired and wireless networks earlier this year, Google was publicly mute but privately active in making sure the FCC didn’t seriously address the problems with usage caps and zero-rated (cap exempt) content.

  • Intellectual Monopolies

    • Copyrights

      • Man tries to copyright a chicken sandwich, learns that that’s completely ridiculous

        In 1987, Norberto Colón Lorenzana had what we can all agree is a pretty unremarkable idea. Colón, who had just started working at a fast food joint called Church’s Chicken in Puerto Rico, suggested to his employer that they try adding a basic fried chicken sandwich to a menu that was mostly chicken-by-the-piece.

      • UK Police ‘Hijack’ Ads on 251 Pirate Sites

        Data obtained through a Freedom of Information request reveals that City of London Police have targeted the ad revenue of 251 suspected pirate sites, replacing their banners with anti-piracy messaging. The police won’t reveal the domain names as that would raise their profiles, but the most prominent pirate sites are believed to be included.

      • Megaupload Wants U.S. Govt to Buy and Store its Servers

        Megaupload’s legal team is asking the court to preserve essential evidence hosted on its seized servers. The data is at risk of being destroyed and Kim Dotcom’s lawyers argue that the authorities should buy the servers and transfer them to a safe facility where they can be preserved at the Government’s cost.

      • DIY Tractor Repair Runs Afoul Of Copyright Law

        John Deere would not talk on tape, but in an emailed statement the company said ownership does not include the right to modify computer code embedded in that equipment.

      • Carl Malamud Asks YouTube To Institute Three Strikes Policy For Those Who Abuse Takedowns

        We write frequently about those who abuse the DMCA either directly for the sake of censorship or, more commonly, because some are in such a rush to take down anything and everything that they don’t bother (or care) to check to see if what they’re taking down is actually infringing. The latter, while common, could potentially expose those issuing the takedowns to serious legal liability, though the courts are still figuring out to what extent.

08.26.15

Microsoft-connected Mesosphere Threatens to Eliminate Free Software in the Datacentre

Posted in Free/Libre Software, GNU/Linux, Microsoft, Windows at 8:00 am by Dr. Roy Schestowitz

Data Center Operating System (DCOS) is a proprietary trap

“I’d be glad to help tilt lotus into into the death spiral. I could do it Friday afternoon but not Saturday. I could do it pretty much any time the following week.”

Brad Silverberg, Microsoft

Summary: Hiding behind a misleading ‘open’ label while actually backed by Microsoft (and based on new rumours may join Microsoft), Mesosphere wishes to eradicate Free and back doors-free software in large datacentres hosting a lot of physical and virtual servers

WE have patiently been watching with great concern a company called Mesosphere. We have been watching it for quite some time, but have not yet properly covered it in Techrights (except incidentally). I personally complained about it many times in social media sites, not just because it’s backed by Silverberg (some Microsoft-centric publications call him “Mr. Windows” these days) but because it’s basically proprietary yet pretends to be ‘open’. It’s a big deception. Mesosphere is a parasite that has been often (and mostly) promoted by friends of Microsoft over the past year. Mesosphere is one of those companies that only people bribed by Microsoft (like Om Malik and his increasingly-defunct ‘news’ network) would actually openwash, excepting perhaps some gullible journalists who truly believe that there is genuine openness at Mesosphere or merely repeat what others are writing (the corrupting effect of manufactured hype).

Thankfully, Mesosphere is now showing its true colours, so we need not merely speculate or accuse Mesosphere with relatively weak evidence. Mesosphere has nothing to do with FOSS, except the fact that it wants to replace it with its own proprietary operating system. It can be viewed as a Microsoft Trojan horse with Microsoft veterans backing it — the same sorts of people who would distribute “Microsoft loves Linux” buttons (spreading a Big Lie) to help themselves devour the GNU/Linux market.

“Avoid Mesosphere, Mesos, and the Data Center Operating System (DCOS). Treat them as a creation of Microsoft, emanated silently to entrap the competition.”A Microsoft propaganda site (and by extension a network) recently showed Microsoft’s anti-Linux plan of entryism [1, 2], trying to make GNU/Linux just subservient to Windows, essentially demoting it. Other Microsoft propaganda sites did the same thing at the same time. Then we saw rumours that Microsoft was essentially ‘buying’ its own moles, just as it had done with Xamarin (now bankrolled by Microsoft veterans). All one has to do now is watch headlines from the financial press, for instance:

There are many more like the above, but we omit them for the sake of brevity.

I personally feel somewhat vindicated, having repeatedly accused Mesosphere of serving Microsoft’s agenda. I said the same about Mono about a decade ago, well before it officially became a sort of Microsoft adjunct in the form of Xamarin. These are more like moles. They serve as Microsoft’s bridge into the heart of the competition.

Mesosphere ought to be treated as a Trojan horse or a proprietary software company with Microsoft roots (intending to replace GNU/Linux at datacentres). It shows true colours with articles such as “Why Microsoft Could Reportedly Want To Buy Cloud Startup Mesosphere Even At $1 Billion”.

Watch what Microsoft boosters are writing right now [1, 2, 3]. Headlines such as “Windows Server Getting Open Source Mesos Container Technology for Scaled Operations” or “Mesosphere And Microsoft Bring Mesos To Windows Server” speak volumes.

Microsoft’s many attacks on GNU/Linux and Free software can only be as effective as GNU/Linux users can be dumb, gullible, defeatist, or lenient. Scott M. Fulton III, a Microsoft expert, wrote the other day that:

Developers outside of Microsoft will be able to experiment for the first time with new classes of applications that run partly on Windows, partly on Linux.

As one response to this framed the key message: “It’s hard to imagine anyone actually wanting to build an application that is part-Linux, part-Windows. Or, to go one step further, to intentionally engineer a server-based program that straddles two very, very different flavors of operating system.

“Why on Earth would anyone build or use an application that needs two operating systems to function?”

Why would anyone need a platform from Mesosphere to manage GNU/Linux? It’s not even Free software, so back doors are to be expected (voluntary or not), compromising the security of everything down the hierarchy/stack.

Avoid Mesosphere, Mesos, and the Data Center Operating System (DCOS). Treat them as a creation of Microsoft, emanated silently to entrap the competition. Time will tell what Mesosphere really is and where it’s heading.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts