EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

06.14.15

EPO Data Protection Officer ‘Just a Dictator’s Minion’, Approved Keyloggers and Hidden Cameras

Posted in Europe, Patents at 6:48 pm by Dr. Roy Schestowitz

An institution full of abuse at many levels and multiple departments

CCTV

Summary: The blackhat methods of the EPO (e.g. keyloggers) were approved internally by the so-called data protection officer of the EPO, according to new leaks

THE EPO spying scandal is merely the latest among many scandals (we were among the first to report these). It’s the result of the EPO’s desperate attempts to muzzle critics. According to newly-leaked documents from Germany, “the so-called data protection officer of the EPO signed off on keylogging, hidden cameras” (blatant violations of European privacy laws), which means that he is very much like Microsoft's so-called (bogus) privacy chiefs, not the ones Microsoft fired for actually trying to ensure privacy (i.e. doing their job).

“On Friday,” says the bearer of the leaked document, “the data protection officer of the state of Bavaria (whose capital is Munich, where the EPO is headquartered) was quoted by a newspaper (English translation here) with the suggestion “that an external data protection supervisor be assigned to the EPO because the internal inspectors are not independent enough and in the absence of any action matters are likely to get out of hand.” It has become known that the EPO used keyloggers and hidden cameras in its internal investigations of what may actually just have been the exercise of one or more people’s freedom of speech with respect to the EPO’s Jack Warner, vice president Željko Topić. After Mr. Topić lost a court ruling in his country of origin (Croatia), can be accused of pretty bad stuff. The Bavarian data privacy commissioner was spot-on: while the EPO does have a “data protection officer,” that person is just a dictator’s minion with no say over anything important.”

“It’s the result of the EPO’s desperate attempts to muzzle critics.”For an institution that goes as far as keyloggers, with approval from high-level officials, it may not seem radical to hire Control Risks, mercenaries of the British government (with special spy connections). “Control Risks” is of course a very nice euphemism, which one of our readers initially described as the “private security company hired by EPO” (that was before much was known about it).

Control Risks is of course unlikely to find out much of use by reading this site. What they are after must be identities of sources and at no point will they succeed, unless they think that the reporters and sources are very dumb (the same poor assumption police often makes about felons). We know that they even spy on our IRC channels, which is rather pathetic use of their time (and European taxpayers’ money). As counter-intuitive as it may first seem, the transparency of the channels is what makes them useless for blackmail or exploitation by spies. In other words, knowing that everything there is visible (not just to moles/intruders and leakers) discourages bad behaviour or self-incriminating communication therein. There are no secrets there and people in the channels don’t have an illusion of privacy. Now, compare that to what Wikileaks had done before an FBI mole from Iceland leaked the logs. We advise Control Risks to step back and we wish to tell EPO (in the Netherlands) that we are seeing (and banning) its IP addresses that have been hammering on this site. We know what you are up to.

In order to secure future reference of the leaked material we are adding it below as JPEG (just large enough to be legible). It is possible that the Sepp Blatter equivalent at the EPO is actually Željko Topić, not King Battistelli. What the EPO needs is a sacrificial lamb, not more coverup. The longer it goes on for, the more embarrassing it will become. Keyloggers and hidden cameras should be installed on (or pointed at) Topić’s PC, not everyone who works at the EPO.

EPO leak

Office of Personnel Management (OPM) and Microsoft Windows

Posted in Microsoft, Windows at 6:07 pm by Dr. Roy Schestowitz

Server

Summary: A look at lesser-explored aspects of the so-called OPN hack [sic], especially the systems involved

IN AN EFFORT to understand what repeatedly happened in the undoubtedly significant Office of Personnel Management (OPM) data breach/es [2-8], leaving aside the lack of concrete evidence of Chinese role [1], we tried to understand which platform was to blame. In the case of Sony it was reportedly a Microsoft Windows machine acting as the culprit or attack vector, just like Stuxnet in Iran with similar attempts against North Korea (there are still more articles about it).

“Hundreds of millions of credit card numbers got snatched from Windows.”NSA leaks were due to Microsoft SharePoint (Snowden gained access to the so-called ‘crown jewels’). As we last noted in an article about words from Kaspersky (still in headlines for it [9-12]), Windows is inherently not secure. Commercial targets of data breached that we wrote about before serve to show this. We gave readers a lot of examples over the years. Hundreds of millions of credit card numbers got snatched from Windows. the cost was enormous, but the role of Windows wasn’t ever emphasised in the corporate press.

Rebecca Abrahams published an article co-authored by Dr. Stephen Bryen, Founder & CTO of FortressFone Technologies. Unlike many other articles which point a finger at China (with little to actually back this accusation with), Abrahams does call out Windows and sheds light on what OPM uses:

Second, the government is very slow to improve security on its computers and networks. Many of the computers the government is using are antique. For example OPM still has 12-year old Windows XT as an operating system for its computers. Microsoft no longer supports XT and any vulnerability that develops is the problem of the user, not of the supplier. But even if the old stuff was upgraded it won’t help much because the systems are really clumsy amalgams of disparate parts which as a “system,” have never been properly vetted for security.

So there we go. Windows. We’re hardly surprised to say the least. The author probably means NT or XP (14 years old, not 12, unlike Server 2003), but does it matter much? Any version of Windows, no matter how old, is not secure. It’s not even designed to be secure.

Related/contextual items from the news:

  1. US wronging of China for cyber breaches harm mutual trust

    Out of ulterior motives, some US media and politicians have developed a habit of scapegoating China for any alleged cyber attack on the United States. Such groundless accusations would surely harm mutual trust between the two big powers of today’s world.

  2. The Massive Hack on US Personnel Agency is Worse Than Everyone Thought

    Last week, the human resources arm of the US government, the Office of Personnel Management (OPM) admitted that it had been victim of a massive data breach, where hackers stole personal data belonging to as many as 4 million government workers.

  3. Feds Who Didn’t Even Discover The OPM Hack Themselves, Still Say We Should Give Them Cybersecurity Powers

    We already described how the recent hack into the US federal government’s Office of Personnel Management (OPM) appears to be much more serious than was initially reported. The hack, likely by Chinese state hackers, appear to have obtained basically detailed personal info on all current and many former federal government employees.

  4. China-linked hackers get data on CIA, NSA personnel with security-clearance: report

    China-linked hackers appear to have gained access to sensitive background information submitted by US intelligence and military personnel for security clearances that could potentially expose them to blackmail, the Associated Press reported on Friday.

    In a report citing several US officials, the news agency said that data on nearly all of the millions of US security-clearance holders, including the Central Intelligence Agency (CIA), National Security Agency (NSA) and military special operations personnel, were potentially exposed in the attack on the Office of Personnel Management (OPM).

  5. Second OPM Hack Revealed: Even Worse Than The First

    And yet… this is the same federal government telling us that it wants more access to everyone else’s data to “protect” us from “cybersecurity threats” — and that encryption is bad? Yikes.

  6. Dossiers on US spies, military snatched in ‘SECOND govt data leak’

    A second data breach at the US Office of Personnel Management has compromised even more sensitive information about government employees than the first breach that was revealed earlier this week, sources claim. It’s possible at least 14 million Americans have chapter and verse on their lives leaked, we’re told.

    The Associated Press reports that hackers with close ties to China are believed to have obtained extensive background information on intelligence-linked government staffers – from CIA agents and NSA spies to military special ops – who have applied for security clearances.

    Among the records believed to have leaked from a compromised database are copies of Standard Form 86 [PDF], a questionnaire that is given to anyone who applies for a national security position, and is typically verified via interviews and background checks.

  7. Officials: Second hack exposed military and intel data
  8. Senate Quickly Says ‘No Way’ To Mitch McConnell’s Cynical Ploy To Add Bogus Cybersecurity Bill To NDAA

    Earlier this week, we noted that Senator Mitch McConnell, hot off of his huge flop in trying to preserve the NSA’s surveillance powers, had promised to insert the dangerous “cybersecurity” bill CISA directly into the NDAA (National Defense Authorization Act). As we discussed, while many have long suspected that CISA (and CISPA before it) were surveillance bills draped in “cybersecurity” clothing, the recent Snowden revelations that the NSA is using Section 702 “upstream” collection for “cybersecurity” issues revealed how CISA would massively expand the NSA’s ability to warrantlessly wiretap Americans’ communications.

  9. “Don’t Hack Me! That’s a Bad Idea,” Says Eugene Kaspersky to APT Groups
  10. Russian Software Security Lab Hacked, Indirectly Links Attack To NSA
  11. Israel, NSA May Have Hacked Antivirus Firm Kaspersky Lab

    Moscow-based antivirus firm Kaspersky Lab, famous for uncovering state-sponsored cyberattacks, today dropped its biggest bombshell yet: Its own computer networks were hit by state-sponsored hackers, probably working for Israeli intelligence or the U.S. National Security Agency. The same malware also attacked hotels that hosted ongoing top-level negotiations to curb Iran’s nuclear program.

  12. Protocols of the Hackers of Zion?

    When Israeli Prime Minister Benjamin Netanyahu met with Google chairman Eric Schmidt on Tuesday afternoon, he boasted about Israel’s “robust hi-tech and cyber industries.” According to The Jerusalem Post, “Netanyahu also noted that ‘Israel was making great efforts to diversify the markets with which it is trading in the technological field.’”

    Just how diversified and developed Israeli hi-tech innovation has become was revealed the very next morning, when the Russian cyber-security firm Kaspersky Labs, which claims more than 400 million users internationally, announced that sophisticated spyware with the hallmarks of Israeli origin (although no country was explicitly identified) had targeted three European hotels that had been venues for negotiations over Iran’s nuclear program.

    Wednesday’s Wall Street Journal, one of the first news sources to break the story, reported that Kaspersky itself had been hacked by malware whose code was remarkably similar to that of a virus attributed to Israel. Code-named “Duqu” because it used the letters DQ in the names of the files it created, the malware had first been detected in 2011. On Thursday, Symantec, another cyber-security firm, announced it too had discovered Duqu 2 on its global network, striking undisclosed telecommunication sites in Europe, North Africa, Hong Kong, and Southeast Asia. It said that Duqu 2 is much more difficult to detect that its predecessor because it lives exclusively in the memory of the computers it infects, rather than writing files to a drive or disk.

Abandoned Software is Not ‘Open Source’, Especially Software Tied to Proprietary Platforms Like Windows

Posted in Deception, Free/Libre Software, Microsoft at 5:28 pm by Dr. Roy Schestowitz

Treating ‘Open Source’ like a trash can or a wastebasket

Decay

Summary: Microsoft is hoping to achieve/get some positive karma (the openwashing effect) by putting a Windows tool that has essentially been abandoned (or made obsolete) in the ‘Open Source’ domain

Using “Abandoned Software” (AS) to label Microsoft “Open Source” (OS) isn’t a novel concept. It has been done by Microsoft before, even if the “OS” part too was altogether bogus (look but do not touch).

Microsoft appears to be pulling that card again, labelling Windows Live Writer (yes, remember “Live”? And it’s a Windows-only tool!) “Open Source”. As one site put it: “It is not updated regularly; the last update we ever saw for the device was back in 2012. Microsoft has not updated it since. Although there are users you [sic] are loyal and used the app religiously. Last month the live posts to Google’s Blogger platform stopped and it was then that it became vocal.”

Here is how IDG put it:

Microsoft will breathe life into Windows Live Writer by open sourcing the eight-year-old blog-publishing tool, a company manager said earlier this week.

What next? Making “KIN” and/or “Zune” something open-ish? If that’s the best Microsoft can do, then it is clearly too stubborn to ever leave the proprietary addiction. More openwashing of Microsoft this month is part of a familiar PR recipe…

Microsoft’s ‘Not Windows is Not Allowed’ Policy at Nokia

Posted in GNU/Linux, Microsoft at 5:02 pm by Dr. Roy Schestowitz

Total eclipse

Summary: The story of Nokia’s Moonraker, the baby which got knifed before birth, reportedly because of Microsoft’s pressure

WHEN Nokia was killed by Microsoft it wasn’t a slow death. A lot of Nokia’s products got killed almost immediately, especially anything which involved Linux. Yes, because “Microsoft loves Linux,” according to Microsoft’s CEO. Whenever Nokia tried new initiatives involving Linux at their core (there were several such initiatives) these quickly got shot at the back of the neck. Some staff left or was pushed out (see Jolla for example), leaving in Nokia only those loyal enough to Microsoft. According to a couple of new reports, one of which from a Microsoft booster and another from a Microsoft-sympathetic site, Microsoft killed a non-Windows smartwatch from Nokia. To quote the Microsoft booster:

The Verge reports that, according to its sources, Microsoft killed off the Moonraker watch when it bought Nokia, as Band had more sensors. While Moonraker could do things such as turn on the screen when you raise your arm and turn it off when you lower it, this apparently didn’t compare with the breadth of sensors found in the Band.

[...]

While Google and Apple smartwatches both run operating systems that are closely related to their phone platforms, Band is believed to run software that’s substantially lighter weight. While this allows Band to be smaller than full smartwatches, it also limits its utility as an app platform. Similar to the Apple Watch’s WatchKit (but unlike the forthcoming native SDK), Band apps run on the paired phone, using the Band itself only as a display device.

Nokia could have beat the rest of the market to it, but since Windows is laughably bloated and unsuitable for any watch-sized device, Microsoft could just not let it be.

“A lot of people make that analogy that competing with Bill Gates is like playing hardball. I’d say it’s more like a knife fight.”

Gary Clow, famous Microsoft victim

06.13.15

Links 13/6/2015: IPFire 2.17 is Out, OpenMandriva Plans

Posted in News Roundup at 5:02 pm by Dr. Roy Schestowitz

GNOME bluefish

Contents

GNU/Linux

Free Software/Open Source

  • Top 5 Open Source Alternatives to Microsoft Exchange

    Choosing an open source messaging server can save you money and admin time without losing out on features. Take a look at what our favorite alternatives to Microsoft Exchange have to offer.

  • Enterprises Flocking to Open Source Software

    Open source software is not a trend; it is here to stay. Debating the value of open source software (OSS) on technical considerations is a moving target. Determining the costs of implementing and using open source makes for a more stable argument. The initial software may be free, but learning, implementing, improving, connecting to, and operating it is not free. When you acquire OSS you will have more responsibilities than if you acquired closed product software from a vendor.

  • We Is Us — OPNFV & ETSI Accelerate NFV Adoption

    One question increasingly raised throughout the SDN/NFV community is, “Why are there so many groups associated with NFV/SDN?” While the answer is subject to debate, no one should be surprised that NFV and SDN are far too pervasive for any single organization and/or industry body to control.

  • How OPNFV and ETSI NFV are Advancing NFV Adoption

    ETSI was the birthplace of the NFV concept in 2012, and OPNFV was launched just two years later with many of the same members to help bring NFV from specs to reality using open source methodologies. Marc Cohn, who is an active participant in many open communities including OPNFV, OpenDaylight and the Open Networking Foundation, recently published an article for SDxCentral about how OPNFV and ETSI continue to work in tandem to accelerate NFV adoption.

  • LinkedIn Open Sources “Pinot” for Powerful Data Analytics

    When it comes to new open source tools that can make a difference, it’s wise to look to some of the tech companies that regularly open source their own in-house platforms and tools. Just witness Netflix, which has open sourced troves of useful cloud utilities. Facebook and Google have release a lot of useful tools as well.

  • Los Angeles County voting to shift from inkblots to open source

    Los Angeles County is home to a burgeoning technology industry. It boasts a roster of high-profile companies including Hulu, Snapchat, and Tinder. As of 2013, it offered more high-tech jobs than other major markets in the country, including Silicon Valley and New York City. Come election time, however, its residents cast their votes by marking inkblots on ballots that resemble Scantron forms.

  • Events

    • CFP Jam & LinuxFest Northwest Goes Hollywood

      Linux and FOSS make cameo appearances throughout the TV and film world, and lately we’ve been treated to the GNOME vs. KDE tête-à-tête in the USA Network’s pilot of a show called “Mr. Robot.” This scene piqued my interest enough to watch the pilot, which was a mix of downright scary and mildly interesting portrayals of tech types at various levels in the overt and covert tech-company hierarchy, wrapped in painfully mediocre dialog (why can’t Aaron Sorkin just write everything? Is that too much to ask?). SPOILER ALERT: The subtext of a psychologically wrecked, socially castrated hacker protagonist — the one using GNOME — is grating enough, but this stereotype is far and away eclipsed by the world domination seemingly at the fingertips of the suit using KDE, which he displayed at the end of the pilot. And we though it was Redmond seeking to take over the world when it’s really…KDE?

    • In Search of SELF in the Queen City

      Right away I ran across Brian Proffitt, whom many of you will remember from his days covering Linux and FOSS for news sites or from the time he spent at Linux Today. These days he’s all but given up journalism for real work, at Red Hat. However, the presentation he’s giving on Sunday here at SELF has a writerly ring to the title: “It’s Metaphors All the Way Down.”

      I also had a chance to talk with Deb Nicholson with the Open Invention Network, who’ll be giving a talk on Saturday about software patent litigation. Funny thing, patents were hardly mentioned in our conversation. Mainly we talked about tech corporations under the headings: the good, the bad and the pure evil. If anyone sees Clint Eastwood, tell him I have a movie idea…

  • Web Browsers

    • Chrome

    • Mozilla

      • My Frustration with Mozilla

        I recently decided to stop using Firefox as my main Browser. I’m not alone there. While browser statistics are notoriously difficult to track and hotly debated, all sources seem to point toward a downward trend for Firefox. At LQ, they actually aren’t doing too badly. In 2010 Firefox had a roughly 57% market share and so far this year they’re at 37%. LQ is a highly technical site, however, and the broader numbers don’t look quite so good. Over a similar period, for example, Wikipedia has Firefox dropping from over 30% to just over 15%. At the current rate NetMarketShare is tracking, Firefox will be in the single digits some time this year. You get the idea. So what’s going on , and what does that mean for Mozilla? And why did I choose now to make a switch personally?

      • Get bug squashing, Mozilla increases bounty payments: Linux Wrap

        Mozilla have decided to shake up the way they make payments with regard to bug squashing, in the statement they said “The bounty for valid potentially exploitable critical and high security rated client security vulnerabilities will be between $3000 and $7500 (USD) cash reward. The bounty program encourages the earliest possible reporting of these potentially exploitable bugs. A bounty may be paid for some moderate rated client security bugs at the discretion of the Bug Bounty Committee. If a bounty is paid for a moderate rated security issue, the amount will be between $500 and $2000 (US), depending on the severity of impact for the issue as determined by Bug Bounty Committee.”

  • SaaS/Big Data

    • Building a platform

      From the very beginning ownCloud has had bigger ambitions then just being a file sync and share tool. This is apparent from the name ownCloud. Today, we have more than our documents and photos online. Our social networks and shared thoughts, our appointments and shopping lists, audio and video conversations all happen and are stored somehwere ‘in the cloud’, all connected. You can comment on a song you like for others to see or share an appointment with co workers. ownCloud means to give you a chance to bring all that back under your control!

  • Databases

    • Oracle’s rising open source problem

      While a number of factors are at play in Oracle’s stumbles, one of the most persistent is the rise of open-source databases, both relational and non-relational (NoSQL), as a recent Bloomberg article posits. As Powa Technologies CEO says, “They scale and operate extremely well, and they don’t cost anything.”

  • Oracle/Java/LibreOffice

  • BSD

    • Securing OpenBSD From Us To You

      I’m going to talk today about signify, a tool I wrote for the OpenBSD project that cryptographically signs and verifies. This allows us to ensure that the releases we ship arrive on your computer in their original, intended form, without tampering.

    • Smallwall 1.8.2 Released To Let Monowall Live On

      This past February, Monowall announced the end of development as one of the most popular FreeBSD-based network/firewall focused distributions. For those still searching for a new replacement, Smallwall 1.8.2 has been released as the successor to Monowall 1.8.1.

  • Openness/Sharing

    • Swift 2.0 is open source, ApacheCon: Big Data, and more open source news
    • 3DPrinterOS Goes Open Source for Their Cloud Client

      If you’re that kind of development monster, you can now find the source code for the cloud client here on GitHub.

      This cloud client already sports support for the majority of desktop 3D printers, and through the GNU Affero General Public License, it’s being shared.

    • Create a ‘soft’ 3D printer with the open source Circular Knitic

      While the uses for additive manufacturing at home seem to be increasing on a seemingly daily basis, there are still some items in the home that haven’t been able to be created due to the lack of suitable technologies. Among others is the ability to fabricate soft objects using digital fabrication tools.

    • Bristol creatives create an open source, portable, WiFi-enabled Kinect
    • Ouya’s potential acquisition, Steam’s Summer Sale, and more open gaming news
    • Open Data

      • The Citadel reveals open data findings

        The United Nations has proactively researched and promoted open government data across the globe for close to five years now. The Open Data Institute maintains that open data can help “unlock supply, generate demand, and create and disseminate knowledge to address local and global issues.” McKinsey & Company report that “seven sectors alone could generate more than $3 trillion a year in additional value as a result of open data.”

        There is no doubt that open data is an important public policy area—one that is here to stay. Yet, for all the grand promises, scratch beneath the surface and one finds a remarkable paucity of hard empirical facts about what is and isn’t happening on the ground—in the real world of cities where most of us increasingly live and work.

      • “Dutch government hampers re-use of Chamber of Commerce data”

        The Dutch government has prepared a new Trade Register Law that will effectively forbid free re-use of the register data of its Chamber of Commerce (Kamer van Koophandel, KvK). In response to an internet consultation, Stefan de Konink, open data proponent and founder of the OpenGeo Foundation, wrote an open letter to the Dutch Ministry of Economic Affairs and the Ministry of Security and Justice, asking the Dutch government to reconsider its new policy.

  • Programming

Leftovers

  • Twitter chief executive Dick Costolo to step down

    Twitter chief executive Dick Costolo is to step down after coming under pressure following lacklustre results.

    Mr Costolo will remain on the social network’s board after the move on July 1, the company said on Thursday night.

    Twitter’s shares jumped 7.8pc in after-hours trading following the announcement, after closing flat at $35.84 during the day.

    Mr Costolo will be replaced in the interim by co-founder Jack Dorsey, chairman of Twitter and chief executive of Square, the mobile payments company he founded in 2009. He will also continue in both those roles.

  • Twitter’s Strategy Remains Unclear Even After CEO Resigns

    Investors applauded Twitter CEO Dick Costolo’s resignation. But did they jump the gun?

  • Health/Nutrition

    • Monsanto and the Subjugation of India

      After a study of GMOs over a four-year plus period, India’s multi-party Parliamentary Standing Committee on Agriculture recommended a ban on GM food crops stating they had no role in a country of small farmers. The Supreme Court appointed a technical expert committee (TEC), which recommended an indefinite moratorium on the field trials of GM crops until the government devised a proper regulatory and safety mechanism. As yet, no such mechanism exists, but open field trials are being given the go ahead. GMO crops approved for field trials include rice, maize, chickpea, sugarcane, and brinjal.

  • Security

    • OpenSSL Patches Logjam Flaw to Foil NSA Snoopers
    • OpenSSL releases seven patches for seven vulns
    • Who’s afraid of DNS? Nominet’s new ‘turing’ tool visualises hidden security threats

      UK domain registry Nominet has shown off a striking new visualisation tool called ‘turing’ that large organisations can use to peer into their DNS traffic to trace latency issues and spot previously invisible botnets and malware.

    • “Don’t Hack Me! That’s a Bad Idea,” Says Eugene Kaspersky to APT Groups
    • Russian Software Security Lab Hacked, Indirectly Links Attack To NSA
    • Israel, NSA May Have Hacked Antivirus Firm Kaspersky Lab

      Moscow-based antivirus firm Kaspersky Lab, famous for uncovering state-sponsored cyberattacks, today dropped its biggest bombshell yet: Its own computer networks were hit by state-sponsored hackers, probably working for Israeli intelligence or the U.S. National Security Agency. The same malware also attacked hotels that hosted ongoing top-level negotiations to curb Iran’s nuclear program.

    • The Massive Hack on US Personnel Agency is Worse Than Everyone Thought

      Last week, the human resources arm of the US government, the Office of Personnel Management (OPM) admitted that it had been victim of a massive data breach, where hackers stole personal data belonging to as many as 4 million government workers.

    • Feds Who Didn’t Even Discover The OPM Hack Themselves, Still Say We Should Give Them Cybersecurity Powers

      We already described how the recent hack into the US federal government’s Office of Personnel Management (OPM) appears to be much more serious than was initially reported. The hack, likely by Chinese state hackers, appear to have obtained basically detailed personal info on all current and many former federal government employees.

    • China-linked hackers get data on CIA, NSA personnel with security-clearance: report

      China-linked hackers appear to have gained access to sensitive background information submitted by US intelligence and military personnel for security clearances that could potentially expose them to blackmail, the Associated Press reported on Friday.

      In a report citing several US officials, the news agency said that data on nearly all of the millions of US security-clearance holders, including the Central Intelligence Agency (CIA), National Security Agency (NSA) and military special operations personnel, were potentially exposed in the attack on the Office of Personnel Management (OPM).

    • Second OPM Hack Revealed: Even Worse Than The First

      And yet… this is the same federal government telling us that it wants more access to everyone else’s data to “protect” us from “cybersecurity threats” — and that encryption is bad? Yikes.

    • Dossiers on US spies, military snatched in ‘SECOND govt data leak’

      A second data breach at the US Office of Personnel Management has compromised even more sensitive information about government employees than the first breach that was revealed earlier this week, sources claim. It’s possible at least 14 million Americans have chapter and verse on their lives leaked, we’re told.

      The Associated Press reports that hackers with close ties to China are believed to have obtained extensive background information on intelligence-linked government staffers – from CIA agents and NSA spies to military special ops – who have applied for security clearances.

      Among the records believed to have leaked from a compromised database are copies of Standard Form 86 [PDF], a questionnaire that is given to anyone who applies for a national security position, and is typically verified via interviews and background checks.

    • Officials: Second hack exposed military and intel data
    • Senate Quickly Says ‘No Way’ To Mitch McConnell’s Cynical Ploy To Add Bogus Cybersecurity Bill To NDAA

      Earlier this week, we noted that Senator Mitch McConnell, hot off of his huge flop in trying to preserve the NSA’s surveillance powers, had promised to insert the dangerous “cybersecurity” bill CISA directly into the NDAA (National Defense Authorization Act). As we discussed, while many have long suspected that CISA (and CISPA before it) were surveillance bills draped in “cybersecurity” clothing, the recent Snowden revelations that the NSA is using Section 702 “upstream” collection for “cybersecurity” issues revealed how CISA would massively expand the NSA’s ability to warrantlessly wiretap Americans’ communications.

    • Friday’s security updates
    • Protocols of the Hackers of Zion?

      When Israeli Prime Minister Benjamin Netanyahu met with Google chairman Eric Schmidt on Tuesday afternoon, he boasted about Israel’s “robust hi-tech and cyber industries.” According to The Jerusalem Post, “Netanyahu also noted that ‘Israel was making great efforts to diversify the markets with which it is trading in the technological field.’”

      Just how diversified and developed Israeli hi-tech innovation has become was revealed the very next morning, when the Russian cyber-security firm Kaspersky Labs, which claims more than 400 million users internationally, announced that sophisticated spyware with the hallmarks of Israeli origin (although no country was explicitly identified) had targeted three European hotels that had been venues for negotiations over Iran’s nuclear program.

      Wednesday’s Wall Street Journal, one of the first news sources to break the story, reported that Kaspersky itself had been hacked by malware whose code was remarkably similar to that of a virus attributed to Israel. Code-named “Duqu” because it used the letters DQ in the names of the files it created, the malware had first been detected in 2011. On Thursday, Symantec, another cyber-security firm, announced it too had discovered Duqu 2 on its global network, striking undisclosed telecommunication sites in Europe, North Africa, Hong Kong, and Southeast Asia. It said that Duqu 2 is much more difficult to detect that its predecessor because it lives exclusively in the memory of the computers it infects, rather than writing files to a drive or disk.

    • US wronging of China for cyber breaches harm mutual trust

      Out of ulterior motives, some US media and politicians have developed a habit of scapegoating China for any alleged cyber attack on the United States. Such groundless accusations would surely harm mutual trust between the two big powers of today’s world.

  • Defence/Police/Secrecy/Aggression

    • WaPo Thinks if You Knew What You Wanted, You’d Want Lindsey Graham

      In a column headlined “The most interesting presidential candidate you’re not paying any attention to,” Cillizza bemoans the fact that “Graham is an asterisk—or close to it—in polling in every early state (except for his home state of South Carolina) and nationally.” Graham, he writes, is “generally regarded as a cause candidate, with that cause being to represent the most hawkish views on foreign policy and national security against attacks by Kentucky Sen. Rand Paul.”

    • Germans conflicted about the Bush brand

      Jeb Bush, kicking off a six-day European tour, will pay tribute on Tuesday to America’s alliance with Western Europe, calling it “as relevant as the day it was founded” and arguing that our long-time allies want a more engaged United States.

      Only here in Germany, that is not exactly so.

      Germans are conflicted about the Bush brand. While Jeb’s father is still lionized for helping to unify the country after the Cold War, his brother remains tremendously unpopular due to the Iraq War, viewed by most here as a singly American disaster.

      But more than that, Germany is increasingly indifferent to the United States as a whole; uncertain whether these two world powers have much in common any more or even still really need one another.

    • Report: CIA Director Secretly Briefed Israeli Intelligence Officials on Iran Nuclear Deal

      Relations between President Barack Obama and Prime Minister Benjamin Netanyahu have been increasingly chilly, with Netanyahu appearing in March before Congress in Washington D.C. to denounce U.S. negotiations over Iran’s nuclear program.

  • Environment/Energy/Wildlife

    • Making tiny earthquakes to understand fracking-driven quakes

      In some places, notably Ohio and Oklahoma, the injection of used fracking fluid in deep disposal wells appears to have produced a significant uptick in earthquake activity. The earthquakes are mostly much too small to be felt at the surface, but a magnitude 5.6 quake in Oklahoma was large enough to cause some damage in 2011.

      This has made lots of news because of its scale, but it’s not our first experience with injection-triggered earthquakes. It’s a concern for geothermal power designs that inject water to depths where it can turn to turbine-driving steam, for example. And in the future, it could be a concern for efforts to store carbon dioxide in underground reservoirs.

    • California drought: Largest water cuts in state’s history ordered by state regulators

      California state regulators have ordered farmers and others to reduce their water consumption, with the largest cuts in the state’s history.

      The State Water Resources Control Board ordered over 100 water rights holders to stop all pumping from three major waterways in one of the country’s prime farm regions.

      Economists and agriculture experts say that the cuts are expected to have little immediate impact on food prices, with the growing of some crops to shift to regions with more water in the short-term.

  • Finance

    • Why Does Obama Want This Trade Deal So Badly?

      The political battle over the enormous, twelve-nation trade agreement known as the Trans-Pacific Partnership keeps getting stranger. President Obama has made the completion of the deal the number-one legislative priority of his second term. Indeed, Republican opponents of the T.P.P., in an effort to rally the red-state troops, have begun calling it Obamatrade. And yet most of the plan’s opponents are not Republicans; they’re Democrats.

      Obama’s chief allies in his vote-by-vote fight in the House of Representatives to win “fast-track authority” to negotiate this and other trade deals are Speaker John Boehner and Representative Paul Ryan—not his usual foxhole companions. The vote may come as soon as Friday. The House Republican leaders tell their dubious members that they are supporting Obama only in order to “constrain” him. Meanwhile, Obama is lobbying members of the Black Congressional Caucus, whose support he can normally count on, tirelessly and, for the most part, fruitlessly. “The president’s done everything except let me fly Air Force One,” Representative Cedric Richmond, Democrat of Louisiana, told the Christian Science Monitor this week. Nonetheless, Richmond said, “I’m leaning no.”

    • What Big Pharma wants from the big trade deal

      On Wednesday, a few pages from the secret Trans-Pacific Partnership trade agreement were published by Wikileaks and reported on by the New York Times. They seemed to indicate changes that go against the wishes of the pharmaceutical industry, eliminating language that sought to guarantee drug companies “competitive market-derived prices” when they sell overseas.

      But the pharmaceutical industry has been lobbying lawmakers on the TPP since the beginning, and shaping far more than this one section of the agreement, according to Lee Drutman, senior fellow at the New America foundation and author of “The Business of America Is Lobbying.”

    • Revealed: The true scale of Tony Blair’s global business empire

      The scale of Tony Blair’s globe-trotting is exposed for the first time in secret documents that suggest the taxpayer is paying up to £16,000 a week to help the former prime minister build his business empire.

      Documents seen by The Telegraph contain details of Mr Blair’s travels around the world, accompanied by a squad of police bodyguards, flying on private jets and staying in five-star hotels.

      The files suggest Mr Blair has used identical trips to carry out both private business meetings and talks in his capacity as Quartet Representative to the Middle East – leaving him open to accusations of a potential conflict of interest.

  • PR/AstroTurf/Lobbying

    • The Murdochs’ Generational Culture Of Corruption

      In announcing that his sons James and Lachlan will be largely taking control of his sprawling media company, press baron Rupert Murdoch did what observers always knew he wanted to do: pass on to his children the worldwide conglomerate that he’s built over the last five decades. In the United Sates, of course, that means handing over to his sons one of most important and influential voices in right-wing media and far-right politics, Fox News.

  • Censorship

  • Privacy

  • Civil Rights

    • Israel exonerates itself over Gaza beach killings of four children last year

      Israeli investigation says missile attack that killed boys aged between nine and 11 was ‘tragic accident’ in findings contradictory to journalists’ reports from scene

    • The Killing of Children

      This denial of the truth and claim of victimhood extends to the accusation of anti-Semitism trumpeted at every critic, including this one, despite the fact that I have the highest respect for the immense cultural and scientific achievements of the Jewish people. Israel is a different question entirely.

      It is this absolute divorce of propaganda from reality that makes Tony Blair an ideal figurehead. Blair has now become head of a Council of Europe (loosely) linked body which claims to exist to promote tolerance, but in fact exists entirely to promote extreme Islamophobia and to shut down criticism of Israel. And it is a further sign of the estrangement from reality of the influential Israelis behind Blair’s appointment that they believe Tony Blair will influence public opinion positively in their favour. A remarkable example of confirmation bias.

    • Criminally Yours: Safety, But At What Cost?

      For years, just being a young African-American or Hispanic male in New York meant getting stopped randomly. Most of the people stopped not only had committed no crime to justify the stop, but, once frisked, had no contraband, weapons, drugs, etc. A few fish may have been caught in this over-inclusive net, but (to extend the metaphor), of the ones thrown back, how many were affected by the intrusion? My guess — all of them.

      Getting stopped by police for no reason hurts. Not only your time, but your sense of security. Bad feelings well up, suspiciousness of cops, a sense of insecurity when you walk down the street, a feeling that anything can happen at any time by the people posted there to protect you.

    • Trouble Not Over for Florida Parents of 11-Year-Old Taken in CPS Dispute

      Yesterday I ran an interview with the Florida mom whose children were removed from their home for a month after a neighbor reported the family to Child Protective Services because their 11-year-old son was left outside by himself for 90 minutes.

    • Court: Iowa Residents Have Right to Be Drunk on Front Porch

      The right to be drunk on the front porch of a private home was endorsed Friday by the Iowa Supreme Court, which said a woman can’t be convicted of public intoxication while standing on her front steps.

      Patience Paye, 29, of Waterloo based the appeal of her 2013 case on the contention that her front steps are not a public place so she can’t be charged with public intoxication.

    • Fast Track

      I am delighted that a judge yesterday ruled that the Fast Track asylum appeals system is illegal. It is the most appalling abuse, specifically designed to limit the capacity of individuals in life threatening circumstances to properly develop and present their legal case and put it before a judge. The system of putting law-abiding people, often families, into detention harsher than our harshest maximum security prisons, allowed just one hour a day out of a tiny cell for exercise, is a minor inconvenience compared to the fundamental denial of proper right to justice. The recent unjust deportation of Majid Ali was just the latest of a series of fast track cases I have encountered. Nadira has finished the script of a short film about a tragic couple, based on substantial research of true stories of fast track detention, and is developing the production.

  • Internet/Net Neutrality

    • Court Denies Requests to Keep New Net Neutrality Rules From Taking Effect on Friday

      In the months since the Federal Communications Commission voted to regulate the Internet like a public utility, opponents of the new rules have clamored to keep them from taking effect this Friday.

      On Thursday, those opponents were disappointed as a federal judge denied their requests to stay the rules while litigation proceeds against them. The court did grant an expedited hearing of the case, meaning it could be argued as soon as the fall or early winter.

    • Sneak attack! Congress’ plan to kill Net neutrality

      The FCC’s Net neutrality rules are slated to go into effect today, but the U.S. House of Representatives on Wednesday launched a sneak attack that could strip the agency of its ability to actually enforce the regulations that protect an open Internet.

      The rules approved by the FCC in February and published to the Federal Register in April reclassify broadband as a utility under Title II of the Communications Act and prohibit ISPs from throttling content or implementing paid prioritization schemes that would create Internet fast lanes.

    • Facebook will favor posts in News Feed based on time friends spend looking at them

      Facebook is about to get a much better idea of what you do and don’t like in your News Feed — even if you don’t click the like button. The company is about to start measuring how long you look posts, photos, and comments in your feed. The thinking is, if you linger on a status update and read a couple of comments, you probably are interested in that content. And if you’re interested in that update, your friends would probably like to see it as well.

06.12.15

Badische Zeitung Labels European Patent Office (EPO) a Police State for Use of Very Intrusive Mass Surveillance Software (Updated)

Posted in Europe, Patents at 7:07 pm by Dr. Roy Schestowitz

Badische Zeitung

HufnagelM; CC BY-SA 3.0 de

Summary: Calls for changes at the EPO have spread to the largest media in German, adding to existing pressure on Battistelli and his ilk

The latest German press report about the EPO comes from Badische Zeitung which, according to Wikipedia, “is a German newspaper based in Freiburg im Breisgau, covering the Black Forest region. It has a circulation of 145,825 and a readership of 409,000.”

The article talks about the keyloggers which we wrote about a few days ago. We received an English translation [PDF] of the article. Here it is:

European Patent Office: Conditions redolent of a police state

At the European Patent Office, computers were spied on using cameras and surveillance software. A climate of industrial unrest prevails.

Bizarre shenanigans at the European Patent Office.
Photo: DPA

Friday, 12th June 2015
By: Thomas Magenheim
Published in the print edition of the Badische Zeitung

MUNICH. The European Patent Office (EPO) in Munich and its President, Benoit Battistelli, show no signs of settling down. Towards the end of last year, publicly accessible computers at the EPO were secretly monitored using cameras and surveillance software over a period of several weeks as confirmed by a number of insiders. The Federal Ministry of Justice in Berlin under Heiko Maas (SPD) is also informed about the incident.

As a result of the surveillance a member of EPO Boards of Appeal was suspended because he is alleged to have disseminated defamatory statements about the Office and its managers. The EPO which is not subject to national German law has refused to comment.

On the other hand, the Bavarian Data Protection Commissioner Thomas Petri has spoken out about the affair. He has requested that an external data protection supervisor be assigned to the EPO because the internal inspectors are not independent enough and in the absence of any action matters are likely to get out of hand. Such a demand is, however, not enforceable. That became clear recently following the judgment of a Dutch court which confirmed that the EPO was violating fundamental rights. Battistelli declared that the court had no jurisdiction and he ignored its ruling. The controversial President also prohibited a demonstration and although such an action might not be justified under German law, the extraordinary legal status of the EPO allowed him to get away with it.

For months now a battle has been raging at the EPO headquarters in Munich between Battistelli and many of the approximately 7,000 employees. The President is reforming the Office at the behest of the 38 Member States and he is far from squeamish in the manner in which he goes about it. Battistelli has therefore been placed under an obligation by the EPO’s Administrative Council to restore social peace at the EPO. However, the recent revelations about the surveillance affair now seem likely to torpedo these efforts.

“I no longer use my office computer to access any pages which might raise suspicions about me and also only use my private phone outside the EPO because everything can be intercepted,” said an EPA employee who wishes to remain anonymous. Many of his colleagues expressed similar sentiments. The goings-on inside the EPO nowadays resemble what was previously thought to only occur in China or at the FIFA. The computers which were under surveillance are actually installed for use by patent attorneys when they are at the EPO in order to allow them to communicate with their clients for the purpose of exchanging documents. Members of the EPO’s Administrative Council might also use them when the Council is in session. During the period of surveillance such a meeting of the Council was scheduled. This means that both patent attorneys and delegates to the Administrative Council could have been affected by the surveillance. The EPO declined to answer questions as to whether this was an isolated case or whether more actions of this kind are currently in progress stating that any questions concerning this matter “refer to a procedure that is currently pending and subject to strict confidentiality”.

In the meantime it remains unclear whether or not the suspended EPO staff member was really guilty of defamation or whether he was merely stating the truth. His remarks reportedly referred to the EPO Vice-President, Željko Topić, and included allegations of corruption relating to his time at the Croatian Patent Office.

The EPO staff union SUEPO has now declared the peace talks with Battistelli to be suspended. For the next Council meeting on June 23, it has called for renewed protest and it has appealed to the Federal Minister of Justice, Heiko Maas, to tackle the matter. The Federal Ministry of Justice points to the EPO’s status of immunity. Whatever about that, the issue of internal data protection has now cropped up on the agenda.

This serves to confirm that anyone questioning the potency, qualifications or ethics of Željko Topić, despite corruption and court rulings that support allegations of corruption, is now being threatened. It’s an imposition of self censorship. This is very reminiscent of the way China deals with dissidents.

Update (15/6/2015): There is a similar article in another German paper and another translation, including additional text [PDF].

The World is Already Leaving Microsoft Windows Behind, in Favour of ODF, Free Software, and GNU/Linux (Usually in Turn)

Posted in Free/Libre Software, GNU/Linux, Microsoft, Office Suites, OpenDocument, Standard, Windows at 6:07 pm by Dr. Roy Schestowitz

Windows too old and long in the tooth

Windows

Summary: The ongoing migration of various governments to Free/libre software contributes to the demise of Microsoft’s monopoly and common carrier

“REPORTS suggest Windows phone users are jumping ship with sales in rapid decline,” said the British media earlier this week (title is “Microsoft has a very big problem”). Linux and Android are certainly still gaining. When one switches completely to GNU/Linux, embrace of OpenDocument Format (ODF) and Free/libre software is often implied. It’s virtually imperative. It’s like the ultimate and most complete switch, whereas embrace of open standards or Free software alone tends to be ‘softer’ or rather restrained, staged, and at times hesitant. There is lobbying against each at varying (depending on perceived risk or severity) levels of granularity.

“Someone inside GE recently told me that GE was quietly dumping Windows for Linux in its lucrative CT scanners business.”Microsoft is in trouble and there is no denying that.

According to British media, Vista 8 continues to be a disaster technically and in some nations, unsurprisingly, GNU/Linux has greater market share than the latest Vista (Windows 8.1). The desktop monopoly too is in jeopardy, especially where governments made it their policy to embrace Free/libre software (Uruguay and Venezuela in this case).

Here in the UK the National Health Service (NHS), longtime prisoner of Microsoft, is putting up resistance and considering Free software in a growing number of operations. Making the huge mistake of putting Microsoft Windows in medical devices or facilities is not forgivable. Someone inside GE recently told me that GE was quietly dumping Windows for Linux in its lucrative CT scanners business. According to this new report, X-ray scanners (causing cancer) are behaving badly because of Windows. To quote: “the device proved an easy target. TrapX’s team was able to use an exploit for a known weakness in the Windows 2000 operating system to establish what TrapX refers to as a “pivot” – or point of control- on their test network from which they could attack other systems. After creating a backdoor into the device, TrapX researchers added a new user to the system and decrypted the local user password. The company was then able to extract the database files that would contain medical information.”

“In due course, having removed the Office barrier/hurdle, HMRC can move to GNU/Linux because Google is purely Web-based.”This can become ground for many lawsuits from patients or families of dead patients. This is the sort of scandal that ought to push all British government departments which still use Windows XP immediately to GNU/Linux. No version of Windows is secure; the underlying encryption (proprietary) tends to have back doors. Every piece of proprietary software must be assumed insecure until proven otherwise (by becoming Free software and standards-compliant). There are moves in this direction, namely of standards, in Sweden [1] and in Holland [2,3], with calls growing for the NHS to embrace openness [4]. There is an increasing push towards Free/libre software, not just open standards (which relate to one another). The governments in Europe should move to Free software like LibreOffice, where interoperability becomes trivial, to borrow Andy Updegrove’s latest arguments [5], but alas, as we noted the other day (alluding to the UK, Sweden, and India), HMRC is moving from one proprietary office suite to another. Here is the ‘damage control’ from Microsoft, which is trying to avoid the impression of being dumped. To quote the British press, “MICROSOFT HAS HIT BACK at claims that HM Revenue and Customs (HMRC) has dumped the firm in favour of Google’s cloud apps.

“The move, first reported at The Register, will see 70,000 HMRC employees switching from Microsoft’s productivity offering to Google’s cloud-based apps services.”

Google will emphasise ODF support (open standards), but it is not Free/libre software. In due course, having removed the Office barrier/hurdle, HMRC can move to GNU/Linux because Google is purely Web-based. HMRC’s footsteps are likely to be followed by other British government departments (owing to ODF as a national requirement for editable document), taking away some of Microsoft’s most lucrative contracts (British government) and showing other governments across the world that they too can dump Microsoft and proprietary software, not just Windows. Office is the cash cow, Windows is the common carrier. The demise of one leads to the demise of the other.

Related/contextual items from the news:

  1. Sweden refines specifications of open standards

    Sweden’s governmental procurement specialists at Statens inköpscentral are fine-tuning the list of ICT standards that public authorities may use as mandatory requirements when procuring software and ICT services. The procurement agency is working with standardisation specialists at the University of Skövde, to check which ICT standards are truly open.

  2. Dutch MP wants sanctions to enforce open standards

    Public administrations that continue to ignore the policy to implement open standards in their ICT solutions should be fined, says Dutch MP Astrid Oosenbrug. “Public administrations should come to grips with open data, open standards and open source. With all their talk about regaining the trust of their citizens and creating a participatory society, public administrations should take a cue from open source communities.”

  3. Dutch government agency switches core services to open source

    Public administrations that switch to open source regain financial scalability, says Jan-Taeke Schuilenga, IT architect at DUO, the Dutch government agency managing the financing of the country’s educational institutions. “We had reached the limit of proprietary licence possibilities. Switching to open source gave us freedom of choice.”

  4. Open data could save the NHS hundreds of millions, says top UK scientist

    The UK government must open up and highlight the power of more basic data sets to improve patient care in the NHS and save hundreds of millions of pounds a year, Nigel Shadbolt, chairman of the Open Data Institute (ODI) has urged.

  5. Licensing Standards that Include Code: Heads or Tails?

    Once upon a time, standards were standards and open source software was open source software (OSS), and the only thing people worried about was whether the copyright and patent rules relating to the standards would prevent them from being implemented in OSS. Actually, that was complicated enough, but it seems simple in comparison now that OSS is being included in the standards themselves. Now what?

    If this sounds unusual and exotic, it isn’t. In fact, code has been creeping into standards for years, often without the keepers of the intellectual property rights (IPR) Policies governing the standards even being aware of it.

The Disturbing Rise of Openwashing: Today’s Case of Apple and Microsoft

Posted in Apple, Deception, Free/Libre Software, Microsoft at 5:20 pm by Dr. Roy Schestowitz

Proprietary is not “Open Source”, it’s the very opposite of it

Watercolour

Summary: Apple and Microsoft are trying to change their colours (public perception), but underneath this thin cover the same old spots remain

NON-TECHNICAL FOLKS may easily be led into the illusion of ‘open’ Microsoft and ‘open’ Apple (openwashing), much like that of ‘green’ (and yellow) BP or ‘green’ Shell (greenwashing). There is also whitewashing, e.g. of Bill Gates, but these two examples are different matters. They all involve mass deception with a huge budget. it’s quite a theatre!

We have patiently watched hundreds of headlines about Apple. Some talking points were mentioned even in Linux sites/blogs of Swapnil Bhartiya [1, 2], not just a lot of general news sites [1, 2, 3]. Bloomberg went as far as saying that Apple has gone “open source” (that was the headline!), so we decided a rebuttal was needed. It reminded us of what Microsoft had done with .NET last year, re-announcing the news almost every week, even this week (using the term “Open Source .NET”, despite the fine prints that refute it; we wrote numerous articles to rebut that).

Bloomberg went as far as saying that Apple has gone “open source” (that was the headline!), so we decided a rebuttal was needed.”Here is ECT’s coverage of the Apple PR (there are literally hundreds more like it), complemented even by this tacit endorsement from Jim Zemlin [1, 2]. He claims “Developer Applause”. “It’s inspiring to see companies like Apple and Microsoft validate the work we’ve been doing for more than two decades,” Zemlin writes. “Applause” is the bizarre word here; it was also used by Sam Dean, speaking ‘on behalf’ of what he calls “Open Source” (some recent Web-centric poll, involving only about 100 subjects, also tried to paint Apple users/developers “Open Source” developers because they work on Web sites using Macs). We reject these claims based on observations and we are going to show some real responses from the real “Open Source” community, not some Apple fans who label themselves “Open Source” and label Apple likewise (often citing Apple marketing material/sites).

Digital Trends asked, “what’s in it for Apple?”

That’s a good question and it’s not hard to answer. In the “Open Source” community not everyone is enthusiastic at all, except perhaps Apple fans and people who buy stuff from Apple (including software) while wishing to label themselves “open”. It’s a branding exercise, putting aside API lock-in.

Steven J. Vaughan-Nichols asked (in his headline), “Just how open will Apple allow Swift to be?”

“Some people love that Apple is open sourcing its Swift programming languages,” he wrote. “Others are taking a wait-and-see attitude about just how ‘open’ Apple will make Swift.”

Simon Phipps, the outgoing OSI President (i.e. top authority for the “Open Source” brand), wrote that “questions loom over ‘open source’ Swift”. “Programming languages alone don’t make programs,” he wrote, but “the SDKs they leverage are the key. When Apple speaks of the SDKs that work well with Swift, it is highly unlikely it is talking about anything that works seamlessly on Android or indeed within any other Linux-based open source platform (not to mention Windows).

“Swift may be offering lip service to open source to pay table stakes with modern developers, but I’m not holding my breath when it comes to extending software freedom to anyone beyond Apple’s walled garden.”

Larry Cafiero, an “Open Source” proponent for many years, wrote: “While there have been no injury reports yet from the multitudes simultaneously jumping on the Swift-as-open-source bandwagon — and no shortage of “Apple to tailor Swift to open source” headlines (can someone hand me an air-sickness bag?) — you’ll have to excuse me if I don’t share the rampant enthusiasm for a couple of reasons.

“To be clear, like Microsoft’s foray into FOSS, Apple’s entry is a small step for FOSS, to paraphrase Neil Armstrong. It is hardly a giant leap for FOSSkind.”

Many others are refuting Apple’s and Microsoft’s recent claims of “embracing” FOSS (for languages or SDKs). These are self-serving moves, intended to make people blobs-dependent (whose blobs? their own!).

Microsoft openwasher Cade Metz weighed in too. Referring to his article, our reader iophk wrote: “One of thousands of articles, but doesn’t this noise obscure the fact that it is still locked in to iOS and OS X? I thought Objective C at least was cross-platform, except for a few libraries.”

Despite these obvious facts, the Linux.com “administrator” (perhaps meaning editor) went with flattery for Apple just earlier today. It also flattered Microsoft for trying to trap GNU/Linux (two bird with one stone), having recently openwashed Vista 10 using the modified (by him/her) headline “Microsoft’s Big Secret Windows 10 Feature is Open Source” (because of the Linux Foundation-connected AllSeen Alliance).

We are rather disturbed to see Apple and Microsoft openwashing even in the Linux Foundation’s sites, this latest example referencing a Microsoft puff pieces for Vista 10. They are now attempting to openwash it because of one paragraph that says: “Microsoft announced last November Windows 10 would pack a technology called AllJoyn. An open source framework that encourages devices to be interoperable, AllJoyn was developed by the AllSeen Alliance, a group of more than 150 companies including the likes of Electrolux, Honeywell, LG, and Qualcomm that have banded together to make an open standard for Internet of Things (IoT) devices to speak to each other.”

That’s about as bad as calling Microsoft “open source” because it continues to compile proprietary spyware Skype for GNU/Linux, except GNU/Linux that threatens Microsoft’s desktop monopoly (Chromebooks). As the British media put it the other day, “MICROSOFT is continuing to shun Google’s Chrome OS, opening up its browser-based Skype for Web service to all except those using a Google Chromebook.”

To summarise, don’t fall for the illusion that Microsoft and Apple are somehow ‘embracing’ FOSS; they are trying to exploit the “Open Source” brand to attract people to their proprietary crown jewels. That’s an entirely different thing.

« Previous Page« Previous entries « Previous Page · Next Page » Next entries »Next Page »

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channels: Come and chat with us in real time

New to This Site? Here Are Some Introductory Resources

No

Mono

ODF

Samba logo






We support

End software patents

GPLv3

GNU project

BLAG

EFF bloggers

Comcast is Blocktastic? SavetheInternet.com



Recent Posts